1 /* 2 * Copyright (C) 2014 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 24 * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 /* 39 * hci.h 40 * 41 * Created by Matthias Ringwald on 4/29/09. 42 * 43 */ 44 45 #ifndef __HCI_H 46 #define __HCI_H 47 48 #include "btstack-config.h" 49 50 #include <btstack/hci_cmds.h> 51 #include <btstack/utils.h> 52 #include "hci_transport.h" 53 #include "bt_control.h" 54 #include "remote_device_db.h" 55 56 #include <stdint.h> 57 #include <stdlib.h> 58 #include <stdarg.h> 59 #include <btstack/linked_list.h> 60 61 #if defined __cplusplus 62 extern "C" { 63 #endif 64 65 // packet header sizes 66 #define HCI_CMD_HEADER_SIZE 3 67 #define HCI_ACL_HEADER_SIZE 4 68 #define HCI_SCO_HEADER_SIZE 3 69 #define HCI_EVENT_HEADER_SIZE 2 70 71 // packet sizes (max payload) 72 #define HCI_ACL_DM1_SIZE 17 73 #define HCI_ACL_DH1_SIZE 27 74 #define HCI_ACL_2DH1_SIZE 54 75 #define HCI_ACL_3DH1_SIZE 83 76 #define HCI_ACL_DM3_SIZE 121 77 #define HCI_ACL_DH3_SIZE 183 78 #define HCI_ACL_DM5_SIZE 224 79 #define HCI_ACL_DH5_SIZE 339 80 #define HCI_ACL_2DH3_SIZE 367 81 #define HCI_ACL_3DH3_SIZE 552 82 #define HCI_ACL_2DH5_SIZE 679 83 #define HCI_ACL_3DH5_SIZE 1021 84 85 #define HCI_EVENT_PAYLOAD_SIZE 255 86 #define HCI_CMD_PAYLOAD_SIZE 255 87 88 #define LE_ADVERTISING_DATA_SIZE 31 89 90 // packet buffer sizes 91 // HCI_ACL_PAYLOAD_SIZE is configurable and defined in config.h 92 #define HCI_EVENT_BUFFER_SIZE (HCI_EVENT_HEADER_SIZE + HCI_EVENT_PAYLOAD_SIZE) 93 #define HCI_CMD_BUFFER_SIZE (HCI_CMD_HEADER_SIZE + HCI_CMD_PAYLOAD_SIZE) 94 #define HCI_ACL_BUFFER_SIZE (HCI_ACL_HEADER_SIZE + HCI_ACL_PAYLOAD_SIZE) 95 96 // size of hci buffers, big enough for command, event, or acl packet without H4 packet type 97 // @note cmd buffer is bigger than event buffer 98 #ifdef HCI_PACKET_BUFFER_SIZE 99 #if HCI_PACKET_BUFFER_SIZE < HCI_ACL_BUFFER_SIZE 100 #error HCI_PACKET_BUFFER_SIZE must be equal or larger than HCI_ACL_BUFFER_SIZE 101 #endif 102 #if HCI_PACKET_BUFFER_SIZE < HCI_CMD_BUFFER_SIZE 103 #error HCI_PACKET_BUFFER_SIZE must be equal or larger than HCI_CMD_BUFFER_SIZE 104 #endif 105 #else 106 #if HCI_ACL_BUFFER_SIZE > HCI_CMD_BUFFER_SIZE 107 #define HCI_PACKET_BUFFER_SIZE HCI_ACL_BUFFER_SIZE 108 #else 109 #define HCI_PACKET_BUFFER_SIZE HCI_CMD_BUFFER_SIZE 110 #endif 111 #endif 112 113 // additional pre-buffer space for packets to Bluetooth module, for now, used for HCI Transport H4 DMA 114 #define HCI_OUTGOING_PRE_BUFFER_SIZE 1 115 116 // BNEP may uncompress the IP Header by 16 bytes 117 #ifdef HAVE_BNEP 118 #define HCI_INCOMING_PRE_BUFFER_SIZE (16 - HCI_ACL_HEADER_SIZE - 4) 119 #endif 120 #ifndef HCI_INCOMING_PRE_BUFFER_SIZE 121 #define HCI_INCOMING_PRE_BUFFER_SIZE 0 122 #endif 123 124 // OGFs 125 #define OGF_LINK_CONTROL 0x01 126 #define OGF_LINK_POLICY 0x02 127 #define OGF_CONTROLLER_BASEBAND 0x03 128 #define OGF_INFORMATIONAL_PARAMETERS 0x04 129 #define OGF_STATUS_PARAMETERS 0x05 130 #define OGF_LE_CONTROLLER 0x08 131 #define OGF_BTSTACK 0x3d 132 #define OGF_VENDOR 0x3f 133 134 // cmds for BTstack 135 // get state: @returns HCI_STATE 136 #define BTSTACK_GET_STATE 0x01 137 138 // set power mode: @param HCI_POWER_MODE 139 #define BTSTACK_SET_POWER_MODE 0x02 140 141 // set capture mode: @param on 142 #define BTSTACK_SET_ACL_CAPTURE_MODE 0x03 143 144 // get BTstack version 145 #define BTSTACK_GET_VERSION 0x04 146 147 // get system Bluetooth state 148 #define BTSTACK_GET_SYSTEM_BLUETOOTH_ENABLED 0x05 149 150 // set system Bluetooth state 151 #define BTSTACK_SET_SYSTEM_BLUETOOTH_ENABLED 0x06 152 153 // enable inquiry scan for this client 154 #define BTSTACK_SET_DISCOVERABLE 0x07 155 156 // set global Bluetooth state 157 #define BTSTACK_SET_BLUETOOTH_ENABLED 0x08 158 159 // create l2cap channel: @param bd_addr(48), psm (16) 160 #define L2CAP_CREATE_CHANNEL 0x20 161 162 // disconnect l2cap disconnect, @param channel(16), reason(8) 163 #define L2CAP_DISCONNECT 0x21 164 165 // register l2cap service: @param psm(16), mtu (16) 166 #define L2CAP_REGISTER_SERVICE 0x22 167 168 // unregister l2cap disconnect, @param psm(16) 169 #define L2CAP_UNREGISTER_SERVICE 0x23 170 171 // accept connection @param bd_addr(48), dest cid (16) 172 #define L2CAP_ACCEPT_CONNECTION 0x24 173 174 // decline l2cap disconnect,@param bd_addr(48), dest cid (16), reason(8) 175 #define L2CAP_DECLINE_CONNECTION 0x25 176 177 // create l2cap channel: @param bd_addr(48), psm (16), mtu (16) 178 #define L2CAP_CREATE_CHANNEL_MTU 0x26 179 180 // register SDP Service Record: service record (size) 181 #define SDP_REGISTER_SERVICE_RECORD 0x30 182 183 // unregister SDP Service Record 184 #define SDP_UNREGISTER_SERVICE_RECORD 0x31 185 186 // Get remote RFCOMM services 187 #define SDP_CLIENT_QUERY_RFCOMM_SERVICES 0x32 188 189 // Get remote SDP services 190 #define SDP_CLIENT_QUERY_SERVICES 0x33 191 192 // RFCOMM "HCI" Commands 193 #define RFCOMM_CREATE_CHANNEL 0x40 194 #define RFCOMM_DISCONNECT 0x41 195 #define RFCOMM_REGISTER_SERVICE 0x42 196 #define RFCOMM_UNREGISTER_SERVICE 0x43 197 #define RFCOMM_ACCEPT_CONNECTION 0x44 198 #define RFCOMM_DECLINE_CONNECTION 0x45 199 #define RFCOMM_PERSISTENT_CHANNEL 0x46 200 #define RFCOMM_CREATE_CHANNEL_WITH_CREDITS 0x47 201 #define RFCOMM_REGISTER_SERVICE_WITH_CREDITS 0x48 202 #define RFCOMM_GRANT_CREDITS 0x49 203 204 // GAP Classic 0x50 205 #define GAP_DISCONNECT 0x50 206 207 // GAP LE 0x60 208 #define GAP_LE_SCAN_START 0x60 209 #define GAP_LE_SCAN_STOP 0x61 210 #define GAP_LE_CONNECT 0x62 211 #define GAP_LE_CONNECT_CANCEL 0x63 212 #define GAP_LE_SET_SCAN_PARAMETERS 0x64 213 214 // GATT (Client) 0x70 215 #define GATT_DISCOVER_ALL_PRIMARY_SERVICES 0x70 216 #define GATT_DISCOVER_PRIMARY_SERVICES_BY_UUID16 0x71 217 #define GATT_DISCOVER_PRIMARY_SERVICES_BY_UUID128 0x72 218 #define GATT_FIND_INCLUDED_SERVICES_FOR_SERVICE 0x73 219 #define GATT_DISCOVER_CHARACTERISTICS_FOR_SERVICE 0x74 220 #define GATT_DISCOVER_CHARACTERISTICS_FOR_SERVICE_BY_UUID128 0x75 221 #define GATT_DISCOVER_CHARACTERISTIC_DESCRIPTORS 0x76 222 #define GATT_READ_VALUE_OF_CHARACTERISTIC 0x77 223 #define GATT_READ_LONG_VALUE_OF_CHARACTERISTIC 0x78 224 #define GATT_WRITE_VALUE_OF_CHARACTERISTIC_WITHOUT_RESPONSE 0x79 225 #define GATT_WRITE_VALUE_OF_CHARACTERISTIC 0x7A 226 #define GATT_WRITE_LONG_VALUE_OF_CHARACTERISTIC 0x7B 227 #define GATT_RELIABLE_WRITE_LONG_VALUE_OF_CHARACTERISTIC 0x7C 228 #define GATT_READ_CHARACTERISTIC_DESCRIPTOR 0X7D 229 #define GATT_READ_LONG_CHARACTERISTIC_DESCRIPTOR 0X7E 230 #define GATT_WRITE_CHARACTERISTIC_DESCRIPTOR 0X7F 231 #define GATT_WRITE_LONG_CHARACTERISTIC_DESCRIPTOR 0X80 232 #define GATT_WRITE_CLIENT_CHARACTERISTIC_CONFIGURATION 0X81 233 #define GATT_GET_MTU 0x82 234 235 // 236 #define IS_COMMAND(packet, command) (READ_BT_16(packet,0) == command.opcode) 237 238 239 /** 240 * LE connection parameter update state 241 */ 242 243 typedef enum { 244 CON_PARAMETER_UPDATE_NONE, 245 CON_PARAMETER_UPDATE_SEND_RESPONSE, 246 CON_PARAMETER_UPDATE_CHANGE_HCI_CON_PARAMETERS, 247 CON_PARAMETER_UPDATE_DENY 248 } le_con_parameter_update_state_t; 249 250 typedef struct le_connection_parameter_range{ 251 uint16_t le_conn_interval_min; 252 uint16_t le_conn_interval_max; 253 uint16_t le_conn_latency_min; 254 uint16_t le_conn_latency_max; 255 uint16_t le_supervision_timeout_min; 256 uint16_t le_supervision_timeout_max; 257 } le_connection_parameter_range_t; 258 259 // Authentication flags 260 typedef enum { 261 AUTH_FLAGS_NONE = 0x0000, 262 RECV_LINK_KEY_REQUEST = 0x0001, 263 HANDLE_LINK_KEY_REQUEST = 0x0002, 264 SENT_LINK_KEY_REPLY = 0x0004, 265 SENT_LINK_KEY_NEGATIVE_REQUEST = 0x0008, 266 RECV_LINK_KEY_NOTIFICATION = 0x0010, 267 DENY_PIN_CODE_REQUEST = 0x0040, 268 RECV_IO_CAPABILITIES_REQUEST = 0x0080, 269 SEND_IO_CAPABILITIES_REPLY = 0x0100, 270 SEND_USER_CONFIRM_REPLY = 0x0200, 271 SEND_USER_PASSKEY_REPLY = 0x0400, 272 273 // pairing status 274 LEGACY_PAIRING_ACTIVE = 0x2000, 275 SSP_PAIRING_ACTIVE = 0x4000, 276 277 // connection status 278 CONNECTION_ENCRYPTED = 0x8000, 279 } hci_authentication_flags_t; 280 281 /** 282 * Connection State 283 */ 284 typedef enum { 285 SEND_CREATE_CONNECTION = 0, 286 SENT_CREATE_CONNECTION, 287 SEND_CANCEL_CONNECTION, 288 SENT_CANCEL_CONNECTION, 289 RECEIVED_CONNECTION_REQUEST, 290 ACCEPTED_CONNECTION_REQUEST, 291 REJECTED_CONNECTION_REQUEST, 292 OPEN, 293 SEND_DISCONNECT, 294 SENT_DISCONNECT, 295 RECEIVED_DISCONNECTION_COMPLETE 296 } CONNECTION_STATE; 297 298 // bonding flags 299 enum { 300 BONDING_REQUEST_REMOTE_FEATURES = 0x01, 301 BONDING_RECEIVED_REMOTE_FEATURES = 0x02, 302 BONDING_REMOTE_SUPPORTS_SSP = 0x04, 303 BONDING_DISCONNECT_SECURITY_BLOCK = 0x08, 304 BONDING_DISCONNECT_DEDICATED_DONE = 0x10, 305 BONDING_SEND_AUTHENTICATE_REQUEST = 0x20, 306 BONDING_SEND_ENCRYPTION_REQUEST = 0x40, 307 BONDING_DEDICATED = 0x80, 308 BONDING_EMIT_COMPLETE_ON_DISCONNECT = 0x100 309 }; 310 311 typedef enum { 312 BLUETOOTH_OFF = 1, 313 BLUETOOTH_ON, 314 BLUETOOTH_ACTIVE 315 } BLUETOOTH_STATE; 316 317 // le central scanning state 318 typedef enum { 319 LE_SCAN_IDLE, 320 LE_START_SCAN, 321 LE_SCANNING, 322 LE_STOP_SCAN, 323 } le_scanning_state_t; 324 325 // 326 // SM internal types and globals 327 // 328 329 typedef enum { 330 331 // general states 332 SM_GENERAL_IDLE, 333 SM_GENERAL_SEND_PAIRING_FAILED, 334 SM_GENERAL_TIMEOUT, // no other security messages are exchanged 335 336 // Phase 1: Pairing Feature Exchange 337 SM_PH1_W4_USER_RESPONSE, 338 339 // Phase 2: Authenticating and Encrypting 340 341 // get random number for use as TK Passkey if we show it 342 SM_PH2_GET_RANDOM_TK, 343 SM_PH2_W4_RANDOM_TK, 344 345 // get local random number for confirm c1 346 SM_PH2_C1_GET_RANDOM_A, 347 SM_PH2_C1_W4_RANDOM_A, 348 SM_PH2_C1_GET_RANDOM_B, 349 SM_PH2_C1_W4_RANDOM_B, 350 351 // calculate confirm value for local side 352 SM_PH2_C1_GET_ENC_A, 353 SM_PH2_C1_W4_ENC_A, 354 SM_PH2_C1_GET_ENC_B, 355 SM_PH2_C1_W4_ENC_B, 356 357 // calculate confirm value for remote side 358 SM_PH2_C1_GET_ENC_C, 359 SM_PH2_C1_W4_ENC_C, 360 SM_PH2_C1_GET_ENC_D, 361 SM_PH2_C1_W4_ENC_D, 362 363 SM_PH2_C1_SEND_PAIRING_CONFIRM, 364 SM_PH2_SEND_PAIRING_RANDOM, 365 366 // calc STK 367 SM_PH2_CALC_STK, 368 SM_PH2_W4_STK, 369 370 SM_PH2_W4_CONNECTION_ENCRYPTED, 371 372 // Phase 3: Transport Specific Key Distribution 373 374 // calculate DHK, Y, EDIV, and LTK 375 SM_PH3_GET_RANDOM, 376 SM_PH3_W4_RANDOM, 377 SM_PH3_GET_DIV, 378 SM_PH3_W4_DIV, 379 SM_PH3_Y_GET_ENC, 380 SM_PH3_Y_W4_ENC, 381 SM_PH3_LTK_GET_ENC, 382 SM_PH3_LTK_W4_ENC, 383 SM_PH3_CSRK_GET_ENC, 384 SM_PH3_CSRK_W4_ENC, 385 386 // exchange keys 387 SM_PH3_DISTRIBUTE_KEYS, 388 SM_PH3_RECEIVE_KEYS, 389 390 // Phase 4: re-establish previously distributed LTK 391 SM_PH4_Y_GET_ENC, 392 SM_PH4_Y_W4_ENC, 393 SM_PH4_LTK_GET_ENC, 394 SM_PH4_LTK_W4_ENC, 395 SM_PH4_SEND_LTK, 396 397 // RESPONDER ROLE 398 SM_RESPONDER_SEND_SECURITY_REQUEST, 399 SM_RESPONDER_PH0_RECEIVED_LTK, 400 SM_RESPONDER_PH0_SEND_LTK_REQUESTED_NEGATIVE_REPLY, 401 SM_RESPONDER_PH1_W4_PAIRING_REQUEST, 402 SM_RESPONDER_PH1_PAIRING_REQUEST_RECEIVED, 403 SM_RESPONDER_PH1_SEND_PAIRING_RESPONSE, 404 SM_RESPONDER_PH1_W4_PAIRING_CONFIRM, 405 SM_RESPONDER_PH2_W4_PAIRING_RANDOM, 406 SM_RESPONDER_PH2_W4_LTK_REQUEST, 407 SM_RESPONDER_PH2_SEND_LTK_REPLY, 408 409 // INITITIATOR ROLE 410 SM_INITIATOR_CONNECTED, 411 SM_INITIATOR_PH0_HAS_LTK, 412 SM_INITIATOR_PH0_SEND_START_ENCRYPTION, 413 SM_INITIATOR_PH0_W4_CONNECTION_ENCRYPTED, 414 SM_INITIATOR_PH1_W2_SEND_PAIRING_REQUEST, 415 SM_INITIATOR_PH1_SEND_PAIRING_REQUEST, 416 SM_INITIATOR_PH1_W4_PAIRING_RESPONSE, 417 SM_INITIATOR_PH2_W4_PAIRING_CONFIRM, 418 SM_INITIATOR_PH2_W4_PAIRING_RANDOM, 419 SM_INITIATOR_PH3_SEND_START_ENCRYPTION, 420 421 } security_manager_state_t; 422 423 typedef enum { 424 CSRK_LOOKUP_IDLE, 425 CSRK_LOOKUP_W4_READY, 426 CSRK_LOOKUP_STARTED, 427 } csrk_lookup_state_t; 428 429 // Authorization state 430 typedef enum { 431 AUTHORIZATION_UNKNOWN, 432 AUTHORIZATION_PENDING, 433 AUTHORIZATION_DECLINED, 434 AUTHORIZATION_GRANTED 435 } authorization_state_t; 436 437 typedef struct sm_pairing_packet { 438 uint8_t code; 439 uint8_t io_capability; 440 uint8_t oob_data_flag; 441 uint8_t auth_req; 442 uint8_t max_encryption_key_size; 443 uint8_t initiator_key_distribution; 444 uint8_t responder_key_distribution; 445 } sm_pairing_packet_t; 446 447 // connection info available as long as connection exists 448 typedef struct sm_connection { 449 uint16_t sm_handle; 450 uint8_t sm_role; // 0 - IamMaster, 1 = IamSlave 451 bd_addr_t sm_peer_address; 452 uint8_t sm_peer_addr_type; 453 security_manager_state_t sm_engine_state; 454 csrk_lookup_state_t sm_csrk_lookup_state; 455 uint8_t sm_connection_encrypted; 456 uint8_t sm_connection_authenticated; // [0..1] 457 uint8_t sm_actual_encryption_key_size; 458 sm_pairing_packet_t sm_m_preq; // only used during c1 459 authorization_state_t sm_connection_authorization_state; 460 uint16_t sm_local_ediv; 461 uint8_t sm_local_rand[8]; 462 int sm_le_db_index; 463 } sm_connection_t; 464 465 typedef struct { 466 // linked list - assert: first field 467 linked_item_t item; 468 469 // remote side 470 bd_addr_t address; 471 472 // module handle 473 hci_con_handle_t con_handle; 474 475 // le public, le random, classic 476 bd_addr_type_t address_type; 477 478 // connection state 479 CONNECTION_STATE state; 480 481 // bonding 482 uint16_t bonding_flags; 483 uint8_t bonding_status; 484 // requested security level 485 gap_security_level_t requested_security_level; 486 487 // 488 link_key_type_t link_key_type; 489 490 // errands 491 uint32_t authentication_flags; 492 493 timer_source_t timeout; 494 495 #ifdef HAVE_TIME 496 // timer 497 struct timeval timestamp; 498 #endif 499 #ifdef HAVE_TICK 500 uint32_t timestamp; // timeout in system ticks 501 #endif 502 503 // ACL packet recombination - PRE_BUFFER + ACL Header + ACL payload 504 uint8_t acl_recombination_buffer[HCI_INCOMING_PRE_BUFFER_SIZE + 4 + HCI_ACL_BUFFER_SIZE]; 505 uint16_t acl_recombination_pos; 506 uint16_t acl_recombination_length; 507 508 // number packets sent to controller 509 uint8_t num_acl_packets_sent; 510 uint8_t num_sco_packets_sent; 511 512 // LE Connection parameter update 513 le_con_parameter_update_state_t le_con_parameter_update_state; 514 uint16_t le_conn_interval_min; 515 uint16_t le_conn_interval_max; 516 uint16_t le_conn_latency; 517 uint16_t le_supervision_timeout; 518 uint16_t le_update_con_parameter_response; 519 520 #ifdef HAVE_BLE 521 // LE Security Manager 522 sm_connection_t sm_connection; 523 #endif 524 525 } hci_connection_t; 526 527 528 /** 529 * HCI Inititizlization State Machine 530 */ 531 typedef enum hci_init_state{ 532 HCI_INIT_SEND_RESET = 0, 533 HCI_INIT_W4_SEND_RESET, 534 HCI_INIT_SEND_BAUD_CHANGE, 535 HCI_INIT_W4_SEND_BAUD_CHANGE, 536 HCI_INIT_SET_BD_ADDR, 537 HCI_INIT_W4_SET_BD_ADDR, 538 HCI_INIT_CUSTOM_INIT, 539 HCI_INIT_W4_CUSTOM_INIT, 540 HCI_INIT_SEND_RESET_CSR_WARM_BOOT, 541 HCI_INIT_W4_CUSTOM_INIT_CSR_WARM_BOOT, 542 543 HCI_INIT_READ_BD_ADDR, 544 HCI_INIT_W4_READ_BD_ADDR, 545 546 HCI_INIT_READ_BUFFER_SIZE, 547 HCI_INIT_W4_READ_BUFFER_SIZE, 548 HCI_INIT_READ_LOCAL_SUPPORTED_FEATUES, 549 HCI_INIT_W4_READ_LOCAL_SUPPORTED_FEATUES, 550 HCI_INIT_SET_EVENT_MASK, 551 HCI_INIT_W4_SET_EVENT_MASK, 552 HCI_INIT_WRITE_SIMPLE_PAIRING_MODE, 553 HCI_INIT_W4_WRITE_SIMPLE_PAIRING_MODE, 554 HCI_INIT_WRITE_PAGE_TIMEOUT, 555 HCI_INIT_W4_WRITE_PAGE_TIMEOUT, 556 557 HCI_INIT_WRITE_CLASS_OF_DEVICE, 558 HCI_INIT_W4_WRITE_CLASS_OF_DEVICE, 559 HCI_INIT_WRITE_LOCAL_NAME, 560 HCI_INIT_W4_WRITE_LOCAL_NAME, 561 HCI_INIT_WRITE_SCAN_ENABLE, 562 HCI_INIT_W4_WRITE_SCAN_ENABLE, 563 HCI_INIT_LE_READ_BUFFER_SIZE, 564 HCI_INIT_W4_LE_READ_BUFFER_SIZE, 565 HCI_INIT_WRITE_LE_HOST_SUPPORTED, 566 HCI_INIT_W4_WRITE_LE_HOST_SUPPORTED, 567 568 HCI_INIT_LE_SET_SCAN_PARAMETERS, 569 HCI_INIT_W4_LE_SET_SCAN_PARAMETERS, 570 571 HCI_INIT_DONE, 572 573 HCI_FALLING_ASLEEP_DISCONNECT, 574 HCI_FALLING_ASLEEP_W4_WRITE_SCAN_ENABLE, 575 HCI_FALLING_ASLEEP_COMPLETE, 576 577 HCI_INIT_AFTER_SLEEP 578 579 } hci_substate_t; 580 581 582 /** 583 * main data structure 584 */ 585 typedef struct { 586 // transport component with configuration 587 hci_transport_t * hci_transport; 588 void * config; 589 590 // basic configuration 591 const char * local_name; 592 uint32_t class_of_device; 593 bd_addr_t local_bd_addr; 594 uint8_t ssp_enable; 595 uint8_t ssp_io_capability; 596 uint8_t ssp_authentication_requirement; 597 uint8_t ssp_auto_accept; 598 599 // hardware power controller 600 bt_control_t * control; 601 602 // list of existing baseband connections 603 linked_list_t connections; 604 605 // single buffer for HCI packet assembly + additional prebuffer for H4 drivers 606 uint8_t hci_packet_buffer_prefix[HCI_OUTGOING_PRE_BUFFER_SIZE]; 607 uint8_t hci_packet_buffer[HCI_PACKET_BUFFER_SIZE]; // opcode (16), len(8) 608 uint8_t hci_packet_buffer_reserved; 609 uint16_t acl_fragmentation_pos; 610 uint16_t acl_fragmentation_total_size; 611 612 /* host to controller flow control */ 613 uint8_t num_cmd_packets; 614 uint8_t acl_packets_total_num; 615 uint16_t acl_data_packet_length; 616 uint8_t sco_packets_total_num; 617 uint8_t sco_data_packet_length; 618 uint8_t le_acl_packets_total_num; 619 uint16_t le_data_packets_length; 620 621 /* local supported features */ 622 uint8_t local_supported_features[8]; 623 624 // usable packet types given acl_data_packet_length and HCI_ACL_BUFFER_SIZE 625 uint16_t packet_types; 626 627 /* callback to L2CAP layer */ 628 void (*packet_handler)(uint8_t packet_type, uint8_t *packet, uint16_t size); 629 630 /* remote device db */ 631 remote_device_db_t const*remote_device_db; 632 633 /* hci state machine */ 634 HCI_STATE state; 635 hci_substate_t substate; 636 timer_source_t timeout; 637 uint8_t cmds_ready; 638 639 uint16_t last_cmd_opcode; 640 641 uint8_t discoverable; 642 uint8_t connectable; 643 uint8_t bondable; 644 645 /* buffer for scan enable cmd - 0xff no change */ 646 uint8_t new_scan_enable_value; 647 648 // buffer for single connection decline 649 uint8_t decline_reason; 650 bd_addr_t decline_addr; 651 652 uint8_t adv_addr_type; 653 bd_addr_t adv_address; 654 655 le_scanning_state_t le_scanning_state; 656 657 // buffer for le scan type command - 0xff not set 658 uint8_t le_scan_type; 659 uint16_t le_scan_interval; 660 uint16_t le_scan_window; 661 662 le_connection_parameter_range_t le_connection_parameter_range; 663 664 // custom BD ADDR 665 bd_addr_t custom_bd_addr; 666 uint8_t custom_bd_addr_set; 667 668 } hci_stack_t; 669 670 /** 671 * set connection iterator 672 */ 673 void hci_connections_get_iterator(linked_list_iterator_t *it); 674 675 // create and send hci command packets based on a template and a list of parameters 676 uint16_t hci_create_cmd(uint8_t *hci_cmd_buffer, hci_cmd_t *cmd, ...); 677 uint16_t hci_create_cmd_internal(uint8_t *hci_cmd_buffer, const hci_cmd_t *cmd, va_list argptr); 678 679 /** 680 * run the hci control loop once 681 */ 682 void hci_run(void); 683 684 // send ACL packet prepared in hci packet buffer 685 int hci_send_acl_packet_buffer(int size); 686 687 // send SCO packet prepared in hci packet buffer 688 int hci_send_sco_packet_buffer(int size); 689 690 691 int hci_can_send_acl_packet_now(hci_con_handle_t con_handle); 692 int hci_can_send_prepared_acl_packet_now(hci_con_handle_t con_handle); 693 int hci_can_send_sco_packet_now(hci_con_handle_t con_handle); 694 int hci_can_send_prepared_sco_packet_now(hci_con_handle_t con_handle); 695 696 // reserves outgoing packet buffer. @returns 1 if successful 697 int hci_reserve_packet_buffer(void); 698 void hci_release_packet_buffer(void); 699 700 // used for internal checks in l2cap[-le].c 701 int hci_is_packet_buffer_reserved(void); 702 703 // get point to packet buffer 704 uint8_t* hci_get_outgoing_packet_buffer(void); 705 706 707 hci_connection_t * hci_connection_for_handle(hci_con_handle_t con_handle); 708 hci_connection_t * hci_connection_for_bd_addr_and_type(bd_addr_t addr, bd_addr_type_t addr_type); 709 int hci_is_le_connection(hci_connection_t * connection); 710 uint8_t hci_number_outgoing_packets(hci_con_handle_t handle); 711 uint8_t hci_number_free_acl_slots_for_handle(hci_con_handle_t con_handle); 712 int hci_authentication_active_for_handle(hci_con_handle_t handle); 713 uint16_t hci_max_acl_data_packet_length(void); 714 uint16_t hci_max_acl_le_data_packet_length(void); 715 uint16_t hci_usable_acl_packet_types(void); 716 int hci_non_flushable_packet_boundary_flag_supported(void); 717 718 void hci_disconnect_all(void); 719 720 void hci_emit_state(void); 721 void hci_emit_connection_complete(hci_connection_t *conn, uint8_t status); 722 void hci_emit_l2cap_check_timeout(hci_connection_t *conn); 723 void hci_emit_disconnection_complete(uint16_t handle, uint8_t reason); 724 void hci_emit_nr_connections_changed(void); 725 void hci_emit_hci_open_failed(void); 726 void hci_emit_btstack_version(void); 727 void hci_emit_system_bluetooth_enabled(uint8_t enabled); 728 void hci_emit_remote_name_cached(bd_addr_t addr, device_name_t *name); 729 void hci_emit_discoverable_enabled(uint8_t enabled); 730 void hci_emit_security_level(hci_con_handle_t con_handle, gap_security_level_t level); 731 void hci_emit_dedicated_bonding_result(bd_addr_t address, uint8_t status); 732 733 // query if the local side supports SSP 734 int hci_local_ssp_activated(void); 735 736 // query if the remote side supports SSP 737 int hci_remote_ssp_supported(hci_con_handle_t con_handle); 738 739 // query if both sides support SSP 740 int hci_ssp_supported_on_both_sides(hci_con_handle_t handle); 741 742 // disable automatic l2cap disconnect for testing 743 void hci_disable_l2cap_timeout_check(void); 744 745 // disconnect because of security block 746 void hci_disconnect_security_block(hci_con_handle_t con_handle); 747 748 // send complete CMD packet 749 int hci_send_cmd_packet(uint8_t *packet, int size); 750 751 752 /* API_START */ 753 754 le_connection_parameter_range_t gap_le_get_connection_parameter_range(); 755 void gap_le_set_connection_parameter_range(le_connection_parameter_range_t range); 756 757 /* LE Client Start */ 758 759 le_command_status_t le_central_start_scan(void); 760 le_command_status_t le_central_stop_scan(void); 761 le_command_status_t le_central_connect(bd_addr_t addr, bd_addr_type_t addr_type); 762 le_command_status_t le_central_connect_cancel(void); 763 le_command_status_t gap_disconnect(hci_con_handle_t handle); 764 void le_central_set_scan_parameters(uint8_t scan_type, uint16_t scan_interval, uint16_t scan_window); 765 766 /* LE Client End */ 767 768 void hci_connectable_control(uint8_t enable); 769 void hci_close(void); 770 771 // new functions replacing: 772 // hci_can_send_packet_now[_using_packet_buffer] 773 int hci_can_send_command_packet_now(void); 774 775 // gets local address 776 void hci_local_bd_addr(bd_addr_t address_buffer); 777 778 // Set up HCI. Needs to be called before any other function. 779 void hci_init(hci_transport_t *transport, void *config, bt_control_t *control, remote_device_db_t const* remote_device_db); 780 781 // Set class of device that will be set during Bluetooth init. 782 void hci_set_class_of_device(uint32_t class_of_device); 783 784 // Set Public BD ADDR - passed on to Bluetooth chipset if supported 785 // in bt_control_h 786 void hci_set_bd_addr(bd_addr_t addr); 787 788 // Registers a packet handler. Used if L2CAP is not used (rarely). 789 void hci_register_packet_handler(void (*handler)(uint8_t packet_type, uint8_t *packet, uint16_t size)); 790 791 // Requests the change of BTstack power mode. 792 int hci_power_control(HCI_POWER_MODE mode); 793 794 // Allows to control if device is discoverable. OFF by default. 795 void hci_discoverable_control(uint8_t enable); 796 797 // Creates and sends HCI command packets based on a template and 798 // a list of parameters. Will return error if outgoing data buffer 799 // is occupied. 800 int hci_send_cmd(const hci_cmd_t *cmd, ...); 801 802 // Deletes link key for remote device with baseband address. 803 void hci_drop_link_key_for_bd_addr(bd_addr_t addr); 804 805 /* Configure Secure Simple Pairing */ 806 807 // Enable will enable SSP during init. 808 void hci_ssp_set_enable(int enable); 809 810 // If set, BTstack will respond to io capability request using 811 // authentication requirement. 812 void hci_ssp_set_io_capability(int ssp_io_capability); 813 void hci_ssp_set_authentication_requirement(int authentication_requirement); 814 815 // If set, BTstack will confirm a numberic comparion and enter 816 // '000000' if requested. 817 void hci_ssp_set_auto_accept(int auto_accept); 818 819 // Get addr type and address used in advertisement packets. 820 void hci_le_advertisement_address(uint8_t * addr_type, bd_addr_t addr); 821 /* API_END */ 822 823 #if defined __cplusplus 824 } 825 #endif 826 827 #endif // __HCI_H 828