1 /* 2 * Copyright (C) 2014 BlueKitchen GmbH 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions 6 * are met: 7 * 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. Neither the name of the copyright holders nor the names of 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 4. Any redistribution, use, or modification is done solely for 17 * personal benefit and not for any commercial purpose or for 18 * monetary gain. 19 * 20 * THIS SOFTWARE IS PROVIDED BY BLUEKITCHEN GMBH AND CONTRIBUTORS 21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MATTHIAS 24 * RINGWALD OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 25 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 26 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 27 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 28 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 29 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF 30 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * Please inquire about commercial licensing options at 34 * [email protected] 35 * 36 */ 37 38 /* 39 * hci.h 40 * 41 * Created by Matthias Ringwald on 4/29/09. 42 * 43 */ 44 45 #ifndef __HCI_H 46 #define __HCI_H 47 48 #include "btstack-config.h" 49 50 #include <btstack/hci_cmds.h> 51 #include <btstack/utils.h> 52 #include "hci_transport.h" 53 #include "bt_control.h" 54 #include "remote_device_db.h" 55 56 #include <stdint.h> 57 #include <stdlib.h> 58 #include <stdarg.h> 59 #include <btstack/linked_list.h> 60 61 #if defined __cplusplus 62 extern "C" { 63 #endif 64 65 // packet header sizes 66 #define HCI_CMD_HEADER_SIZE 3 67 #define HCI_ACL_HEADER_SIZE 4 68 #define HCI_SCO_HEADER_SIZE 3 69 #define HCI_EVENT_HEADER_SIZE 2 70 71 // packet sizes (max payload) 72 #define HCI_ACL_DM1_SIZE 17 73 #define HCI_ACL_DH1_SIZE 27 74 #define HCI_ACL_2DH1_SIZE 54 75 #define HCI_ACL_3DH1_SIZE 83 76 #define HCI_ACL_DM3_SIZE 121 77 #define HCI_ACL_DH3_SIZE 183 78 #define HCI_ACL_DM5_SIZE 224 79 #define HCI_ACL_DH5_SIZE 339 80 #define HCI_ACL_2DH3_SIZE 367 81 #define HCI_ACL_3DH3_SIZE 552 82 #define HCI_ACL_2DH5_SIZE 679 83 #define HCI_ACL_3DH5_SIZE 1021 84 85 #define HCI_EVENT_PAYLOAD_SIZE 255 86 #define HCI_CMD_PAYLOAD_SIZE 255 87 88 #define LE_ADVERTISING_DATA_SIZE 31 89 90 // packet buffer sizes 91 // HCI_ACL_PAYLOAD_SIZE is configurable and defined in config.h 92 #define HCI_EVENT_BUFFER_SIZE (HCI_EVENT_HEADER_SIZE + HCI_EVENT_PAYLOAD_SIZE) 93 #define HCI_CMD_BUFFER_SIZE (HCI_CMD_HEADER_SIZE + HCI_CMD_PAYLOAD_SIZE) 94 #define HCI_ACL_BUFFER_SIZE (HCI_ACL_HEADER_SIZE + HCI_ACL_PAYLOAD_SIZE) 95 96 // size of hci buffers, big enough for command, event, or acl packet without H4 packet type 97 // @note cmd buffer is bigger than event buffer 98 #ifdef HCI_PACKET_BUFFER_SIZE 99 #if HCI_PACKET_BUFFER_SIZE < HCI_ACL_BUFFER_SIZE 100 #error HCI_PACKET_BUFFER_SIZE must be equal or larger than HCI_ACL_BUFFER_SIZE 101 #endif 102 #if HCI_PACKET_BUFFER_SIZE < HCI_CMD_BUFFER_SIZE 103 #error HCI_PACKET_BUFFER_SIZE must be equal or larger than HCI_CMD_BUFFER_SIZE 104 #endif 105 #else 106 #if HCI_ACL_BUFFER_SIZE > HCI_CMD_BUFFER_SIZE 107 #define HCI_PACKET_BUFFER_SIZE HCI_ACL_BUFFER_SIZE 108 #else 109 #define HCI_PACKET_BUFFER_SIZE HCI_CMD_BUFFER_SIZE 110 #endif 111 #endif 112 113 // additional pre-buffer space for packets to Bluetooth module, for now, used for HCI Transport H4 DMA 114 #define HCI_OUTGOING_PRE_BUFFER_SIZE 1 115 116 // BNEP may uncompress the IP Header by 16 bytes 117 #ifdef HAVE_BNEP 118 #define HCI_INCOMING_PRE_BUFFER_SIZE (16 - HCI_ACL_HEADER_SIZE - 4) 119 #endif 120 #ifndef HCI_INCOMING_PRE_BUFFER_SIZE 121 #define HCI_INCOMING_PRE_BUFFER_SIZE 0 122 #endif 123 124 // OGFs 125 #define OGF_LINK_CONTROL 0x01 126 #define OGF_LINK_POLICY 0x02 127 #define OGF_CONTROLLER_BASEBAND 0x03 128 #define OGF_INFORMATIONAL_PARAMETERS 0x04 129 #define OGF_STATUS_PARAMETERS 0x05 130 #define OGF_LE_CONTROLLER 0x08 131 #define OGF_BTSTACK 0x3d 132 #define OGF_VENDOR 0x3f 133 134 // cmds for BTstack 135 // get state: @returns HCI_STATE 136 #define BTSTACK_GET_STATE 0x01 137 138 // set power mode: @param HCI_POWER_MODE 139 #define BTSTACK_SET_POWER_MODE 0x02 140 141 // set capture mode: @param on 142 #define BTSTACK_SET_ACL_CAPTURE_MODE 0x03 143 144 // get BTstack version 145 #define BTSTACK_GET_VERSION 0x04 146 147 // get system Bluetooth state 148 #define BTSTACK_GET_SYSTEM_BLUETOOTH_ENABLED 0x05 149 150 // set system Bluetooth state 151 #define BTSTACK_SET_SYSTEM_BLUETOOTH_ENABLED 0x06 152 153 // enable inquiry scan for this client 154 #define BTSTACK_SET_DISCOVERABLE 0x07 155 156 // set global Bluetooth state 157 #define BTSTACK_SET_BLUETOOTH_ENABLED 0x08 158 159 // create l2cap channel: @param bd_addr(48), psm (16) 160 #define L2CAP_CREATE_CHANNEL 0x20 161 162 // disconnect l2cap disconnect, @param channel(16), reason(8) 163 #define L2CAP_DISCONNECT 0x21 164 165 // register l2cap service: @param psm(16), mtu (16) 166 #define L2CAP_REGISTER_SERVICE 0x22 167 168 // unregister l2cap disconnect, @param psm(16) 169 #define L2CAP_UNREGISTER_SERVICE 0x23 170 171 // accept connection @param bd_addr(48), dest cid (16) 172 #define L2CAP_ACCEPT_CONNECTION 0x24 173 174 // decline l2cap disconnect,@param bd_addr(48), dest cid (16), reason(8) 175 #define L2CAP_DECLINE_CONNECTION 0x25 176 177 // create l2cap channel: @param bd_addr(48), psm (16), mtu (16) 178 #define L2CAP_CREATE_CHANNEL_MTU 0x26 179 180 // register SDP Service Record: service record (size) 181 #define SDP_REGISTER_SERVICE_RECORD 0x30 182 183 // unregister SDP Service Record 184 #define SDP_UNREGISTER_SERVICE_RECORD 0x31 185 186 // Get remote RFCOMM services 187 #define SDP_CLIENT_QUERY_RFCOMM_SERVICES 0x32 188 189 // Get remote SDP services 190 #define SDP_CLIENT_QUERY_SERVICES 0x33 191 192 // RFCOMM "HCI" Commands 193 #define RFCOMM_CREATE_CHANNEL 0x40 194 #define RFCOMM_DISCONNECT 0x41 195 #define RFCOMM_REGISTER_SERVICE 0x42 196 #define RFCOMM_UNREGISTER_SERVICE 0x43 197 #define RFCOMM_ACCEPT_CONNECTION 0x44 198 #define RFCOMM_DECLINE_CONNECTION 0x45 199 #define RFCOMM_PERSISTENT_CHANNEL 0x46 200 #define RFCOMM_CREATE_CHANNEL_WITH_CREDITS 0x47 201 #define RFCOMM_REGISTER_SERVICE_WITH_CREDITS 0x48 202 #define RFCOMM_GRANT_CREDITS 0x49 203 204 // GAP Classic 0x50 205 #define GAP_DISCONNECT 0x50 206 207 // GAP LE 0x60 208 #define GAP_LE_SCAN_START 0x60 209 #define GAP_LE_SCAN_STOP 0x61 210 #define GAP_LE_CONNECT 0x62 211 #define GAP_LE_CONNECT_CANCEL 0x63 212 #define GAP_LE_SET_SCAN_PARAMETERS 0x64 213 214 // GATT (Client) 0x70 215 #define GATT_DISCOVER_ALL_PRIMARY_SERVICES 0x70 216 #define GATT_DISCOVER_PRIMARY_SERVICES_BY_UUID16 0x71 217 #define GATT_DISCOVER_PRIMARY_SERVICES_BY_UUID128 0x72 218 #define GATT_FIND_INCLUDED_SERVICES_FOR_SERVICE 0x73 219 #define GATT_DISCOVER_CHARACTERISTICS_FOR_SERVICE 0x74 220 #define GATT_DISCOVER_CHARACTERISTICS_FOR_SERVICE_BY_UUID128 0x75 221 #define GATT_DISCOVER_CHARACTERISTIC_DESCRIPTORS 0x76 222 #define GATT_READ_VALUE_OF_CHARACTERISTIC 0x77 223 #define GATT_READ_LONG_VALUE_OF_CHARACTERISTIC 0x78 224 #define GATT_WRITE_VALUE_OF_CHARACTERISTIC_WITHOUT_RESPONSE 0x79 225 #define GATT_WRITE_VALUE_OF_CHARACTERISTIC 0x7A 226 #define GATT_WRITE_LONG_VALUE_OF_CHARACTERISTIC 0x7B 227 #define GATT_RELIABLE_WRITE_LONG_VALUE_OF_CHARACTERISTIC 0x7C 228 #define GATT_READ_CHARACTERISTIC_DESCRIPTOR 0X7D 229 #define GATT_READ_LONG_CHARACTERISTIC_DESCRIPTOR 0X7E 230 #define GATT_WRITE_CHARACTERISTIC_DESCRIPTOR 0X7F 231 #define GATT_WRITE_LONG_CHARACTERISTIC_DESCRIPTOR 0X80 232 #define GATT_WRITE_CLIENT_CHARACTERISTIC_CONFIGURATION 0X81 233 #define GATT_GET_MTU 0x82 234 235 // 236 #define IS_COMMAND(packet, command) (READ_BT_16(packet,0) == command.opcode) 237 238 239 /** 240 * LE connection parameter update state 241 */ 242 243 typedef enum { 244 CON_PARAMETER_UPDATE_NONE, 245 CON_PARAMETER_UPDATE_SEND_REQUEST, 246 CON_PARAMETER_UPDATE_SEND_RESPONSE, 247 CON_PARAMETER_UPDATE_CHANGE_HCI_CON_PARAMETERS, 248 CON_PARAMETER_UPDATE_DENY 249 } le_con_parameter_update_state_t; 250 251 typedef struct le_connection_parameter_range{ 252 uint16_t le_conn_interval_min; 253 uint16_t le_conn_interval_max; 254 uint16_t le_conn_latency_min; 255 uint16_t le_conn_latency_max; 256 uint16_t le_supervision_timeout_min; 257 uint16_t le_supervision_timeout_max; 258 } le_connection_parameter_range_t; 259 260 // Authentication flags 261 typedef enum { 262 AUTH_FLAGS_NONE = 0x0000, 263 RECV_LINK_KEY_REQUEST = 0x0001, 264 HANDLE_LINK_KEY_REQUEST = 0x0002, 265 SENT_LINK_KEY_REPLY = 0x0004, 266 SENT_LINK_KEY_NEGATIVE_REQUEST = 0x0008, 267 RECV_LINK_KEY_NOTIFICATION = 0x0010, 268 DENY_PIN_CODE_REQUEST = 0x0040, 269 RECV_IO_CAPABILITIES_REQUEST = 0x0080, 270 SEND_IO_CAPABILITIES_REPLY = 0x0100, 271 SEND_USER_CONFIRM_REPLY = 0x0200, 272 SEND_USER_PASSKEY_REPLY = 0x0400, 273 274 // pairing status 275 LEGACY_PAIRING_ACTIVE = 0x2000, 276 SSP_PAIRING_ACTIVE = 0x4000, 277 278 // connection status 279 CONNECTION_ENCRYPTED = 0x8000, 280 } hci_authentication_flags_t; 281 282 /** 283 * Connection State 284 */ 285 typedef enum { 286 SEND_CREATE_CONNECTION = 0, 287 SENT_CREATE_CONNECTION, 288 SEND_CANCEL_CONNECTION, 289 SENT_CANCEL_CONNECTION, 290 RECEIVED_CONNECTION_REQUEST, 291 ACCEPTED_CONNECTION_REQUEST, 292 REJECTED_CONNECTION_REQUEST, 293 OPEN, 294 SEND_DISCONNECT, 295 SENT_DISCONNECT, 296 RECEIVED_DISCONNECTION_COMPLETE 297 } CONNECTION_STATE; 298 299 // bonding flags 300 enum { 301 BONDING_REQUEST_REMOTE_FEATURES = 0x01, 302 BONDING_RECEIVED_REMOTE_FEATURES = 0x02, 303 BONDING_REMOTE_SUPPORTS_SSP = 0x04, 304 BONDING_DISCONNECT_SECURITY_BLOCK = 0x08, 305 BONDING_DISCONNECT_DEDICATED_DONE = 0x10, 306 BONDING_SEND_AUTHENTICATE_REQUEST = 0x20, 307 BONDING_SEND_ENCRYPTION_REQUEST = 0x40, 308 BONDING_DEDICATED = 0x80, 309 BONDING_EMIT_COMPLETE_ON_DISCONNECT = 0x100 310 }; 311 312 typedef enum { 313 BLUETOOTH_OFF = 1, 314 BLUETOOTH_ON, 315 BLUETOOTH_ACTIVE 316 } BLUETOOTH_STATE; 317 318 // le central scanning state 319 typedef enum { 320 LE_SCAN_IDLE, 321 LE_START_SCAN, 322 LE_SCANNING, 323 LE_STOP_SCAN, 324 } le_scanning_state_t; 325 326 typedef enum { 327 LE_CONNECTING_IDLE, 328 LE_CONNECTING_DIRECT, 329 LE_CONNECTING_WHITELIST, 330 } le_connecting_state_t; 331 332 // 333 // SM internal types and globals 334 // 335 336 typedef enum { 337 338 // general states 339 // state = 0 340 SM_GENERAL_IDLE, 341 SM_GENERAL_SEND_PAIRING_FAILED, 342 SM_GENERAL_TIMEOUT, // no other security messages are exchanged 343 344 // Phase 1: Pairing Feature Exchange 345 SM_PH1_W4_USER_RESPONSE, 346 347 // Phase 2: Authenticating and Encrypting 348 349 // get random number for use as TK Passkey if we show it 350 SM_PH2_GET_RANDOM_TK, 351 SM_PH2_W4_RANDOM_TK, 352 353 // get local random number for confirm c1 354 SM_PH2_C1_GET_RANDOM_A, 355 SM_PH2_C1_W4_RANDOM_A, 356 SM_PH2_C1_GET_RANDOM_B, 357 SM_PH2_C1_W4_RANDOM_B, 358 359 // calculate confirm value for local side 360 // state = 10 361 SM_PH2_C1_GET_ENC_A, 362 SM_PH2_C1_W4_ENC_A, 363 SM_PH2_C1_GET_ENC_B, 364 SM_PH2_C1_W4_ENC_B, 365 366 // calculate confirm value for remote side 367 SM_PH2_C1_GET_ENC_C, 368 SM_PH2_C1_W4_ENC_C, 369 SM_PH2_C1_GET_ENC_D, 370 SM_PH2_C1_W4_ENC_D, 371 372 SM_PH2_C1_SEND_PAIRING_CONFIRM, 373 SM_PH2_SEND_PAIRING_RANDOM, 374 375 // calc STK 376 // state = 20 377 SM_PH2_CALC_STK, 378 SM_PH2_W4_STK, 379 380 SM_PH2_W4_CONNECTION_ENCRYPTED, 381 382 // Phase 3: Transport Specific Key Distribution 383 // calculate DHK, Y, EDIV, and LTK 384 SM_PH3_GET_RANDOM, 385 SM_PH3_W4_RANDOM, 386 SM_PH3_GET_DIV, 387 SM_PH3_W4_DIV, 388 SM_PH3_Y_GET_ENC, 389 SM_PH3_Y_W4_ENC, 390 SM_PH3_LTK_GET_ENC, 391 // state = 30 392 SM_PH3_LTK_W4_ENC, 393 SM_PH3_CSRK_GET_ENC, 394 SM_PH3_CSRK_W4_ENC, 395 396 // exchange keys 397 SM_PH3_DISTRIBUTE_KEYS, 398 SM_PH3_RECEIVE_KEYS, 399 400 // RESPONDER ROLE 401 // state = 35 402 SM_RESPONDER_IDLE, 403 SM_RESPONDER_SEND_SECURITY_REQUEST, 404 SM_RESPONDER_PH0_RECEIVED_LTK, 405 SM_RESPONDER_PH0_SEND_LTK_REQUESTED_NEGATIVE_REPLY, 406 SM_RESPONDER_PH1_W4_PAIRING_REQUEST, 407 SM_RESPONDER_PH1_PAIRING_REQUEST_RECEIVED, 408 SM_RESPONDER_PH1_SEND_PAIRING_RESPONSE, 409 SM_RESPONDER_PH1_W4_PAIRING_CONFIRM, 410 SM_RESPONDER_PH2_W4_PAIRING_RANDOM, 411 SM_RESPONDER_PH2_W4_LTK_REQUEST, 412 SM_RESPONDER_PH2_SEND_LTK_REPLY, 413 414 // Phase 4: re-establish previously distributed LTK 415 // state == 46 416 SM_RESPONDER_PH4_Y_GET_ENC, 417 SM_RESPONDER_PH4_Y_W4_ENC, 418 SM_RESPONDER_PH4_LTK_GET_ENC, 419 SM_RESPONDER_PH4_LTK_W4_ENC, 420 SM_RESPONDER_PH4_SEND_LTK, 421 422 // INITITIATOR ROLE 423 // state = 51 424 SM_INITIATOR_CONNECTED, 425 SM_INITIATOR_PH0_HAS_LTK, 426 SM_INITIATOR_PH0_SEND_START_ENCRYPTION, 427 SM_INITIATOR_PH0_W4_CONNECTION_ENCRYPTED, 428 SM_INITIATOR_PH1_W2_SEND_PAIRING_REQUEST, 429 SM_INITIATOR_PH1_SEND_PAIRING_REQUEST, 430 SM_INITIATOR_PH1_W4_PAIRING_RESPONSE, 431 SM_INITIATOR_PH2_W4_PAIRING_CONFIRM, 432 SM_INITIATOR_PH2_W4_PAIRING_RANDOM, 433 SM_INITIATOR_PH3_SEND_START_ENCRYPTION, 434 435 } security_manager_state_t; 436 437 typedef enum { 438 IRK_LOOKUP_IDLE, 439 IRK_LOOKUP_W4_READY, 440 IRK_LOOKUP_STARTED, 441 IRK_LOOKUP_SUCCEEDED, 442 IRK_LOOKUP_FAILED 443 } irk_lookup_state_t; 444 445 // Authorization state 446 typedef enum { 447 AUTHORIZATION_UNKNOWN, 448 AUTHORIZATION_PENDING, 449 AUTHORIZATION_DECLINED, 450 AUTHORIZATION_GRANTED 451 } authorization_state_t; 452 453 typedef struct sm_pairing_packet { 454 uint8_t code; 455 uint8_t io_capability; 456 uint8_t oob_data_flag; 457 uint8_t auth_req; 458 uint8_t max_encryption_key_size; 459 uint8_t initiator_key_distribution; 460 uint8_t responder_key_distribution; 461 } sm_pairing_packet_t; 462 463 // connection info available as long as connection exists 464 typedef struct sm_connection { 465 uint16_t sm_handle; 466 uint8_t sm_role; // 0 - IamMaster, 1 = IamSlave 467 uint8_t sm_security_request_received; 468 uint8_t sm_bonding_requested; 469 uint8_t sm_peer_addr_type; 470 bd_addr_t sm_peer_address; 471 security_manager_state_t sm_engine_state; 472 irk_lookup_state_t sm_irk_lookup_state; 473 uint8_t sm_connection_encrypted; 474 uint8_t sm_connection_authenticated; // [0..1] 475 uint8_t sm_actual_encryption_key_size; 476 sm_pairing_packet_t sm_m_preq; // only used during c1 477 authorization_state_t sm_connection_authorization_state; 478 uint16_t sm_local_ediv; 479 uint8_t sm_local_rand[8]; 480 int sm_le_db_index; 481 } sm_connection_t; 482 483 typedef struct { 484 // linked list - assert: first field 485 linked_item_t item; 486 487 // remote side 488 bd_addr_t address; 489 490 // module handle 491 hci_con_handle_t con_handle; 492 493 // le public, le random, classic 494 bd_addr_type_t address_type; 495 496 // connection state 497 CONNECTION_STATE state; 498 499 // bonding 500 uint16_t bonding_flags; 501 uint8_t bonding_status; 502 // requested security level 503 gap_security_level_t requested_security_level; 504 505 // 506 link_key_type_t link_key_type; 507 508 // errands 509 uint32_t authentication_flags; 510 511 timer_source_t timeout; 512 513 #ifdef HAVE_TIME 514 // timer 515 struct timeval timestamp; 516 #endif 517 #ifdef HAVE_TICK 518 uint32_t timestamp; // timeout in system ticks 519 #endif 520 521 // ACL packet recombination - PRE_BUFFER + ACL Header + ACL payload 522 uint8_t acl_recombination_buffer[HCI_INCOMING_PRE_BUFFER_SIZE + 4 + HCI_ACL_BUFFER_SIZE]; 523 uint16_t acl_recombination_pos; 524 uint16_t acl_recombination_length; 525 526 // number packets sent to controller 527 uint8_t num_acl_packets_sent; 528 uint8_t num_sco_packets_sent; 529 530 // LE Connection parameter update 531 le_con_parameter_update_state_t le_con_parameter_update_state; 532 uint8_t le_con_param_update_identifier; 533 uint16_t le_conn_interval_min; 534 uint16_t le_conn_interval_max; 535 uint16_t le_conn_latency; 536 uint16_t le_supervision_timeout; 537 538 #ifdef HAVE_BLE 539 // LE Security Manager 540 sm_connection_t sm_connection; 541 #endif 542 543 } hci_connection_t; 544 545 546 /** 547 * HCI Inititizlization State Machine 548 */ 549 typedef enum hci_init_state{ 550 HCI_INIT_SEND_RESET = 0, 551 HCI_INIT_W4_SEND_RESET, 552 HCI_INIT_SEND_READ_LOCAL_VERSION_INFORMATION, 553 HCI_INIT_W4_SEND_READ_LOCAL_VERSION_INFORMATION, 554 555 HCI_INIT_SET_BD_ADDR, 556 HCI_INIT_W4_SET_BD_ADDR, 557 558 HCI_INIT_SEND_RESET_ST_WARM_BOOT, 559 HCI_INIT_W4_SEND_RESET_ST_WARM_BOOT, 560 561 HCI_INIT_SEND_BAUD_CHANGE, 562 HCI_INIT_W4_SEND_BAUD_CHANGE, 563 HCI_INIT_CUSTOM_INIT, 564 HCI_INIT_W4_CUSTOM_INIT, 565 HCI_INIT_SEND_RESET_CSR_WARM_BOOT, 566 HCI_INIT_W4_CUSTOM_INIT_CSR_WARM_BOOT, 567 568 HCI_INIT_READ_BD_ADDR, 569 HCI_INIT_W4_READ_BD_ADDR, 570 HCI_INIT_READ_LOCAL_SUPPORTED_COMMANDS, 571 HCI_INIT_W4_READ_LOCAL_SUPPORTED_COMMANDS, 572 573 HCI_INIT_READ_BUFFER_SIZE, 574 HCI_INIT_W4_READ_BUFFER_SIZE, 575 HCI_INIT_READ_LOCAL_SUPPORTED_FEATUES, 576 HCI_INIT_W4_READ_LOCAL_SUPPORTED_FEATUES, 577 HCI_INIT_SET_EVENT_MASK, 578 HCI_INIT_W4_SET_EVENT_MASK, 579 HCI_INIT_WRITE_SIMPLE_PAIRING_MODE, 580 HCI_INIT_W4_WRITE_SIMPLE_PAIRING_MODE, 581 HCI_INIT_WRITE_PAGE_TIMEOUT, 582 HCI_INIT_W4_WRITE_PAGE_TIMEOUT, 583 584 HCI_INIT_WRITE_CLASS_OF_DEVICE, 585 HCI_INIT_W4_WRITE_CLASS_OF_DEVICE, 586 HCI_INIT_WRITE_LOCAL_NAME, 587 HCI_INIT_W4_WRITE_LOCAL_NAME, 588 HCI_INIT_WRITE_SCAN_ENABLE, 589 HCI_INIT_W4_WRITE_SCAN_ENABLE, 590 HCI_INIT_LE_READ_BUFFER_SIZE, 591 HCI_INIT_W4_LE_READ_BUFFER_SIZE, 592 HCI_INIT_WRITE_LE_HOST_SUPPORTED, 593 HCI_INIT_W4_WRITE_LE_HOST_SUPPORTED, 594 HCI_INIT_READ_WHITE_LIST_SIZE, 595 HCI_INIT_W4_READ_WHITE_LIST_SIZE, 596 597 HCI_INIT_LE_SET_SCAN_PARAMETERS, 598 HCI_INIT_W4_LE_SET_SCAN_PARAMETERS, 599 600 HCI_INIT_DONE, 601 602 HCI_FALLING_ASLEEP_DISCONNECT, 603 HCI_FALLING_ASLEEP_W4_WRITE_SCAN_ENABLE, 604 HCI_FALLING_ASLEEP_COMPLETE, 605 606 HCI_INIT_AFTER_SLEEP 607 608 } hci_substate_t; 609 610 enum { 611 LE_ADVERTISEMENT_TASKS_DISABLE = 1 << 0, 612 LE_ADVERTISEMENT_TASKS_SET_DATA = 1 << 1, 613 LE_ADVERTISEMENT_TASKS_SET_PARAMS = 1 << 2, 614 LE_ADVERTISEMENT_TASKS_ENABLE = 1 << 3, 615 }; 616 617 enum { 618 LE_WHITELIST_ON_CONTROLLER = 1 << 0, 619 LE_WHITELIST_ADD_TO_CONTROLLER = 1 << 1, 620 LE_WHITELIST_REMOVE_FROM_CONTROLLER = 1 << 2, 621 }; 622 623 typedef struct { 624 linked_item_t item; 625 bd_addr_t address; 626 bd_addr_type_t address_type; 627 uint8_t state; 628 } whitelist_entry_t; 629 630 /** 631 * main data structure 632 */ 633 typedef struct { 634 // transport component with configuration 635 hci_transport_t * hci_transport; 636 void * config; 637 638 // basic configuration 639 const char * local_name; 640 uint32_t class_of_device; 641 bd_addr_t local_bd_addr; 642 uint8_t ssp_enable; 643 uint8_t ssp_io_capability; 644 uint8_t ssp_authentication_requirement; 645 uint8_t ssp_auto_accept; 646 647 // hardware power controller 648 bt_control_t * control; 649 650 // list of existing baseband connections 651 linked_list_t connections; 652 653 // single buffer for HCI packet assembly + additional prebuffer for H4 drivers 654 uint8_t hci_packet_buffer_prefix[HCI_OUTGOING_PRE_BUFFER_SIZE]; 655 uint8_t hci_packet_buffer[HCI_PACKET_BUFFER_SIZE]; // opcode (16), len(8) 656 uint8_t hci_packet_buffer_reserved; 657 uint16_t acl_fragmentation_pos; 658 uint16_t acl_fragmentation_total_size; 659 660 /* host to controller flow control */ 661 uint8_t num_cmd_packets; 662 uint8_t acl_packets_total_num; 663 uint16_t acl_data_packet_length; 664 uint8_t sco_packets_total_num; 665 uint8_t sco_data_packet_length; 666 uint8_t le_acl_packets_total_num; 667 uint16_t le_data_packets_length; 668 669 /* local supported features */ 670 uint8_t local_supported_features[8]; 671 672 /* local supported commands summary - complete info is 64 bytes */ 673 /* 0 - read buffer size */ 674 /* 1 - write le host supported */ 675 uint8_t local_supported_commands[1]; 676 677 /* bluetooth device information from hci read local version information */ 678 // uint16_t hci_version; 679 // uint16_t hci_revision; 680 // uint16_t lmp_version; 681 uint16_t manufacturer; 682 // uint16_t lmp_subversion; 683 684 // usable packet types given acl_data_packet_length and HCI_ACL_BUFFER_SIZE 685 uint16_t packet_types; 686 687 /* callback to L2CAP layer */ 688 void (*packet_handler)(uint8_t packet_type, uint8_t *packet, uint16_t size); 689 690 /* remote device db */ 691 remote_device_db_t const*remote_device_db; 692 693 /* hci state machine */ 694 HCI_STATE state; 695 hci_substate_t substate; 696 timer_source_t timeout; 697 uint8_t cmds_ready; 698 699 uint16_t last_cmd_opcode; 700 701 uint8_t discoverable; 702 uint8_t connectable; 703 uint8_t bondable; 704 705 /* buffer for scan enable cmd - 0xff no change */ 706 uint8_t new_scan_enable_value; 707 708 // buffer for single connection decline 709 uint8_t decline_reason; 710 bd_addr_t decline_addr; 711 712 uint8_t adv_addr_type; 713 bd_addr_t adv_address; 714 715 le_scanning_state_t le_scanning_state; 716 le_connecting_state_t le_connecting_state; 717 718 // buffer for le scan type command - 0xff not set 719 uint8_t le_scan_type; 720 uint16_t le_scan_interval; 721 uint16_t le_scan_window; 722 723 le_connection_parameter_range_t le_connection_parameter_range; 724 725 uint8_t * le_advertisements_data; 726 uint8_t le_advertisements_data_len; 727 728 uint8_t le_advertisements_active; 729 uint8_t le_advertisements_enabled; 730 uint8_t le_advertisements_todo; 731 732 uint16_t le_advertisements_interval_min; 733 uint16_t le_advertisements_interval_max; 734 uint8_t le_advertisements_type; 735 uint8_t le_advertisements_own_address_type; 736 uint8_t le_advertisements_direct_address_type; 737 uint8_t le_advertisements_channel_map; 738 uint8_t le_advertisements_filter_policy; 739 bd_addr_t le_advertisements_direct_address; 740 741 // LE Whitelist Management 742 uint16_t le_whitelist_capacity; 743 linked_list_t le_whitelist; 744 745 // custom BD ADDR 746 bd_addr_t custom_bd_addr; 747 uint8_t custom_bd_addr_set; 748 749 // hardware error handler 750 void (*hardware_error_callback)(void); 751 752 } hci_stack_t; 753 754 /** 755 * set connection iterator 756 */ 757 void hci_connections_get_iterator(linked_list_iterator_t *it); 758 759 // create and send hci command packets based on a template and a list of parameters 760 uint16_t hci_create_cmd(uint8_t *hci_cmd_buffer, hci_cmd_t *cmd, ...); 761 uint16_t hci_create_cmd_internal(uint8_t *hci_cmd_buffer, const hci_cmd_t *cmd, va_list argptr); 762 763 /** 764 * run the hci control loop once 765 */ 766 void hci_run(void); 767 768 // send ACL packet prepared in hci packet buffer 769 int hci_send_acl_packet_buffer(int size); 770 771 // send SCO packet prepared in hci packet buffer 772 int hci_send_sco_packet_buffer(int size); 773 774 775 int hci_can_send_acl_packet_now(hci_con_handle_t con_handle); 776 int hci_can_send_prepared_acl_packet_now(hci_con_handle_t con_handle); 777 int hci_can_send_sco_packet_now(hci_con_handle_t con_handle); 778 int hci_can_send_prepared_sco_packet_now(hci_con_handle_t con_handle); 779 780 // reserves outgoing packet buffer. @returns 1 if successful 781 int hci_reserve_packet_buffer(void); 782 void hci_release_packet_buffer(void); 783 784 // used for internal checks in l2cap[-le].c 785 int hci_is_packet_buffer_reserved(void); 786 787 // get point to packet buffer 788 uint8_t* hci_get_outgoing_packet_buffer(void); 789 790 791 hci_connection_t * hci_connection_for_handle(hci_con_handle_t con_handle); 792 hci_connection_t * hci_connection_for_bd_addr_and_type(bd_addr_t addr, bd_addr_type_t addr_type); 793 int hci_is_le_connection(hci_connection_t * connection); 794 uint8_t hci_number_outgoing_packets(hci_con_handle_t handle); 795 uint8_t hci_number_free_acl_slots_for_handle(hci_con_handle_t con_handle); 796 int hci_authentication_active_for_handle(hci_con_handle_t handle); 797 uint16_t hci_max_acl_data_packet_length(void); 798 uint16_t hci_max_acl_le_data_packet_length(void); 799 uint16_t hci_usable_acl_packet_types(void); 800 int hci_non_flushable_packet_boundary_flag_supported(void); 801 802 void hci_disconnect_all(void); 803 804 void hci_emit_state(void); 805 void hci_emit_connection_complete(hci_connection_t *conn, uint8_t status); 806 void hci_emit_l2cap_check_timeout(hci_connection_t *conn); 807 void hci_emit_disconnection_complete(uint16_t handle, uint8_t reason); 808 void hci_emit_nr_connections_changed(void); 809 void hci_emit_hci_open_failed(void); 810 void hci_emit_btstack_version(void); 811 void hci_emit_system_bluetooth_enabled(uint8_t enabled); 812 void hci_emit_remote_name_cached(bd_addr_t addr, device_name_t *name); 813 void hci_emit_discoverable_enabled(uint8_t enabled); 814 void hci_emit_security_level(hci_con_handle_t con_handle, gap_security_level_t level); 815 void hci_emit_dedicated_bonding_result(bd_addr_t address, uint8_t status); 816 817 // query if the local side supports SSP 818 int hci_local_ssp_activated(void); 819 820 // query if the remote side supports SSP 821 int hci_remote_ssp_supported(hci_con_handle_t con_handle); 822 823 // query if both sides support SSP 824 int hci_ssp_supported_on_both_sides(hci_con_handle_t handle); 825 826 // disable automatic L2CAP disconnect for testing 827 void hci_disable_l2cap_timeout_check(void); 828 829 // disconnect because of security block 830 void hci_disconnect_security_block(hci_con_handle_t con_handle); 831 832 // send complete CMD packet 833 int hci_send_cmd_packet(uint8_t *packet, int size); 834 835 836 /* API_START */ 837 838 le_connection_parameter_range_t gap_le_get_connection_parameter_range(void); 839 void gap_le_set_connection_parameter_range(le_connection_parameter_range_t range); 840 841 /* LE Client Start */ 842 843 le_command_status_t le_central_start_scan(void); 844 le_command_status_t le_central_stop_scan(void); 845 le_command_status_t le_central_connect(bd_addr_t addr, bd_addr_type_t addr_type); 846 le_command_status_t le_central_connect_cancel(void); 847 le_command_status_t gap_disconnect(hci_con_handle_t handle); 848 void le_central_set_scan_parameters(uint8_t scan_type, uint16_t scan_interval, uint16_t scan_window); 849 850 /* LE Client End */ 851 852 void hci_connectable_control(uint8_t enable); 853 void hci_close(void); 854 855 /** 856 * @note New functions replacing: hci_can_send_packet_now[_using_packet_buffer] 857 */ 858 int hci_can_send_command_packet_now(void); 859 860 /** 861 * @brief Gets local address. 862 */ 863 void hci_local_bd_addr(bd_addr_t address_buffer); 864 865 /** 866 * @brief Set up HCI. Needs to be called before any other function. 867 */ 868 void hci_init(hci_transport_t *transport, void *config, bt_control_t *control, remote_device_db_t const* remote_device_db); 869 870 /** 871 * @brief Set class of device that will be set during Bluetooth init. 872 */ 873 void hci_set_class_of_device(uint32_t class_of_device); 874 875 /** 876 * @brief Set Public BD ADDR - passed on to Bluetooth chipset if supported in bt_control_h 877 */ 878 void hci_set_bd_addr(bd_addr_t addr); 879 880 /** 881 * @brief Registers a packet handler. Used if L2CAP is not used (rarely). 882 */ 883 void hci_register_packet_handler(void (*handler)(uint8_t packet_type, uint8_t *packet, uint16_t size)); 884 885 /** 886 * @brief Requests the change of BTstack power mode. 887 */ 888 int hci_power_control(HCI_POWER_MODE mode); 889 890 /** 891 * @brief Allows to control if device is discoverable. OFF by default. 892 */ 893 void hci_discoverable_control(uint8_t enable); 894 895 /** 896 * @brief Creates and sends HCI command packets based on a template and a list of parameters. Will return error if outgoing data buffer is occupied. 897 */ 898 int hci_send_cmd(const hci_cmd_t *cmd, ...); 899 900 /** 901 * @brief Deletes link key for remote device with baseband address. 902 */ 903 void hci_drop_link_key_for_bd_addr(bd_addr_t addr); 904 905 /* Configure Secure Simple Pairing */ 906 907 /** 908 * @brief Enable will enable SSP during init. 909 */ 910 void hci_ssp_set_enable(int enable); 911 912 /** 913 * @brief If set, BTstack will respond to io capability request using authentication requirement. 914 */ 915 void hci_ssp_set_io_capability(int ssp_io_capability); 916 void hci_ssp_set_authentication_requirement(int authentication_requirement); 917 918 /** 919 * @brief If set, BTstack will confirm a numeric comparison and enter '000000' if requested. 920 */ 921 void hci_ssp_set_auto_accept(int auto_accept); 922 923 /** 924 * @brief Get addr type and address used in advertisement packets. 925 */ 926 void hci_le_advertisement_address(uint8_t * addr_type, bd_addr_t addr); 927 928 /** 929 * @brief Set callback for Bluetooth Hardware Error 930 */ 931 void hci_set_hardware_error_callback(void (*fn)(void)); 932 933 /* API_END */ 934 935 /** 936 * @brief Set Advertisement Parameters 937 * @param adv_int_min 938 * @param adv_int_max 939 * @param adv_type 940 * @param own_address_type 941 * @param direct_address_type 942 * @param direct_address 943 * @param channel_map 944 * @param filter_policy 945 * 946 * @note internal use. use gap_advertisements_set_params from gap_le.h instead. 947 */ 948 void hci_le_advertisements_set_params(uint16_t adv_int_min, uint16_t adv_int_max, uint8_t adv_type, 949 uint8_t own_address_type, uint8_t direct_address_typ, bd_addr_t direct_address, 950 uint8_t channel_map, uint8_t filter_policy); 951 952 #if defined __cplusplus 953 } 954 #endif 955 956 #endif // __HCI_H 957