1 /******************************************************************************
2 *
3 * Copyright (C) 2009-2012 Broadcom Corporation
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 *
17 ******************************************************************************/
18
19 /************************************************************************************
20 *
21 * Filename: btif_hh.c
22 *
23 * Description: HID Host Profile Bluetooth Interface
24 *
25 *
26 ***********************************************************************************/
27 #include <hardware/bluetooth.h>
28 #include <hardware/bt_hh.h>
29 #include <stdio.h>
30 #include <stdlib.h>
31 #include <errno.h>
32 #include <string.h>
33
34 #define LOG_TAG "BTIF_HH"
35
36 #include "bta_api.h"
37 #include "bta_hh_api.h"
38 #include "bd.h"
39 #include "btif_storage.h"
40
41 #include "btif_common.h"
42 #include "btif_util.h"
43 #include "btif_hh.h"
44 #include "gki.h"
45 #include "l2c_api.h"
46
47
48 #define BTIF_HH_APP_ID_MI 0x01
49 #define BTIF_HH_APP_ID_KB 0x02
50
51 #define COD_HID_KEYBOARD 0x0540
52 #define COD_HID_POINTING 0x0580
53 #define COD_HID_COMBO 0x05C0
54 #define COD_HID_MAJOR 0x0500
55
56 #define KEYSTATE_FILEPATH "/data/misc/bluedroid/bt_hh_ks" //keep this in sync with HID host jni
57
58 #define HID_REPORT_CAPSLOCK 0x39
59 #define HID_REPORT_NUMLOCK 0x53
60 #define HID_REPORT_SCROLLLOCK 0x47
61
62 //For Apple Magic Mouse
63 #define MAGICMOUSE_VENDOR_ID 0x05ac
64 #define MAGICMOUSE_PRODUCT_ID 0x030d
65
66 #define LOGITECH_KB_MX5500_VENDOR_ID 0x046D
67 #define LOGITECH_KB_MX5500_PRODUCT_ID 0xB30B
68
69 extern const int BT_UID;
70 extern const int BT_GID;
71 static int btif_hh_prev_keyevents=0; //The previous key events
72 static int btif_hh_keylockstates=0; //The current key state of each key
73
74 #define BTIF_HH_ID_1 0
75 #define BTIF_HH_DEV_DISCONNECTED 3
76
77 #define BTIF_TIMEOUT_VUP_SECS 3
78
79
80 #ifndef BTUI_HH_SECURITY
81 #define BTUI_HH_SECURITY (BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT)
82 #endif
83
84 #ifndef BTUI_HH_MOUSE_SECURITY
85 #define BTUI_HH_MOUSE_SECURITY (BTA_SEC_NONE)
86 #endif
87
88 /* HH request events */
89 typedef enum
90 {
91 BTIF_HH_CONNECT_REQ_EVT = 0,
92 BTIF_HH_DISCONNECT_REQ_EVT,
93 BTIF_HH_VUP_REQ_EVT
94 } btif_hh_req_evt_t;
95
96
97 /************************************************************************************
98 ** Constants & Macros
99 ************************************************************************************/
100 #define BTIF_HH_SERVICES (BTA_HID_SERVICE_MASK)
101
102
103
104 /************************************************************************************
105 ** Local type definitions
106 ************************************************************************************/
107
108 typedef struct hid_kb_list
109 {
110 UINT16 product_id;
111 UINT16 version_id;
112 char* kb_name;
113 } tHID_KB_LIST;
114
115 /************************************************************************************
116 ** Static variables
117 ************************************************************************************/
118 btif_hh_cb_t btif_hh_cb;
119
120 static bthh_callbacks_t *bt_hh_callbacks = NULL;
121
122 /* List of HID keyboards for which the NUMLOCK state needs to be
123 * turned ON by default. Add devices to this list to apply the
124 * NUMLOCK state toggle on fpr first connect.*/
125 static tHID_KB_LIST hid_kb_numlock_on_list[] =
126 {
127 {LOGITECH_KB_MX5500_PRODUCT_ID,
128 LOGITECH_KB_MX5500_VENDOR_ID,
129 "Logitech MX5500 Keyboard"}
130 };
131
132
133 #define CHECK_BTHH_INIT() if (bt_hh_callbacks == NULL)\
134 {\
135 BTIF_TRACE_WARNING1("BTHH: %s: BTHH not initialized", __FUNCTION__);\
136 return BT_STATUS_NOT_READY;\
137 }\
138 else\
139 {\
140 BTIF_TRACE_EVENT1("BTHH: %s", __FUNCTION__);\
141 }
142
143
144
145 /************************************************************************************
146 ** Static functions
147 ************************************************************************************/
148
149 /************************************************************************************
150 ** Externs
151 ************************************************************************************/
152 extern void bta_hh_co_destroy(int fd);
153 extern void bta_hh_co_write(int fd, UINT8* rpt, UINT16 len);
154 extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
155 extern void bta_hh_co_send_hid_info(btif_hh_device_t *p_dev, char *dev_name, UINT16 vendor_id,
156 UINT16 product_id, UINT16 version, UINT8 ctry_code,
157 int dscp_len, UINT8 *p_dscp);
158 extern BOOLEAN check_cod(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
159 extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr);
160 extern BOOLEAN check_cod_hid(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
161 extern int scru_ascii_2_hex(char *p_ascii, int len, UINT8 *p_hex);
162
163 /*****************************************************************************
164 ** Local Function prototypes
165 *****************************************************************************/
166 static void set_keylockstate(int keymask, BOOLEAN isSet);
167 static void toggle_os_keylockstates(int fd, int changedkeystates);
168 static void sync_lockstate_on_connect(btif_hh_device_t *p_dev);
169 //static void hh_update_keyboard_lockstates(btif_hh_device_t *p_dev);
170 void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle);
171
172
173 /************************************************************************************
174 ** Functions
175 ************************************************************************************/
176
get_keylockstates()177 static int get_keylockstates()
178 {
179 return btif_hh_keylockstates;
180 }
181
set_keylockstate(int keymask,BOOLEAN isSet)182 static void set_keylockstate(int keymask, BOOLEAN isSet)
183 {
184 if(isSet)
185 btif_hh_keylockstates |= keymask;
186 }
187
188 /*******************************************************************************
189 **
190 ** Function toggle_os_keylockstates
191 **
192 ** Description Function to toggle the keyboard lock states managed by the linux.
193 ** This function is used in by two call paths
194 ** (1) if the lock state change occurred from an onscreen keyboard,
195 ** this function is called to update the lock state maintained
196 for the HID keyboard(s)
197 ** (2) if a HID keyboard is disconnected and reconnected,
198 ** this function is called to update the lock state maintained
199 for the HID keyboard(s)
200 ** Returns void
201 *******************************************************************************/
202
toggle_os_keylockstates(int fd,int changedlockstates)203 static void toggle_os_keylockstates(int fd, int changedlockstates)
204 {
205 BTIF_TRACE_EVENT3("%s: fd = %d, changedlockstates = 0x%x",
206 __FUNCTION__, fd, changedlockstates);
207 UINT8 hidreport[9];
208 int reportIndex;
209 memset(hidreport,0,9);
210 hidreport[0]=1;
211 reportIndex=4;
212
213 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_CAPSLOCK) {
214 BTIF_TRACE_DEBUG1("%s Setting CAPSLOCK", __FUNCTION__);
215 hidreport[reportIndex++] = (UINT8)HID_REPORT_CAPSLOCK;
216 }
217
218 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_NUMLOCK) {
219 BTIF_TRACE_DEBUG1("%s Setting NUMLOCK", __FUNCTION__);
220 hidreport[reportIndex++] = (UINT8)HID_REPORT_NUMLOCK;
221 }
222
223 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_SCROLLLOCK) {
224 BTIF_TRACE_DEBUG1("%s Setting SCROLLLOCK", __FUNCTION__);
225 hidreport[reportIndex++] = (UINT8) HID_REPORT_SCROLLLOCK;
226 }
227
228 BTIF_TRACE_DEBUG4("Writing hidreport #1 to os: "\
229 "%s: %x %x %x", __FUNCTION__,
230 hidreport[0], hidreport[1], hidreport[2]);
231 BTIF_TRACE_DEBUG4("%s: %x %x %x", __FUNCTION__,
232 hidreport[3], hidreport[4], hidreport[5]);
233 BTIF_TRACE_DEBUG4("%s: %x %x %x", __FUNCTION__,
234 hidreport[6], hidreport[7], hidreport[8]);
235 bta_hh_co_write(fd , hidreport, sizeof(hidreport));
236 usleep(200000);
237 memset(hidreport,0,9);
238 hidreport[0]=1;
239 BTIF_TRACE_DEBUG4("Writing hidreport #2 to os: "\
240 "%s: %x %x %x", __FUNCTION__,
241 hidreport[0], hidreport[1], hidreport[2]);
242 BTIF_TRACE_DEBUG4("%s: %x %x %x", __FUNCTION__,
243 hidreport[3], hidreport[4], hidreport[5]);
244 BTIF_TRACE_DEBUG4("%s: %x %x %x ", __FUNCTION__,
245 hidreport[6], hidreport[7], hidreport[8]);
246 bta_hh_co_write(fd , hidreport, sizeof(hidreport));
247 }
248
249 /*******************************************************************************
250 **
251 ** Function update_keyboard_lockstates
252 **
253 ** Description Sends a report to the keyboard to set the lock states of keys
254 **
255 *******************************************************************************/
update_keyboard_lockstates(btif_hh_device_t * p_dev)256 static void update_keyboard_lockstates(btif_hh_device_t *p_dev)
257 {
258 UINT8 len = 2; /* reportid + 1 byte report*/
259 BD_ADDR* bda;
260
261 /* Set report for other keyboards */
262 BTIF_TRACE_EVENT3("%s: setting report on dev_handle %d to 0x%x",
263 __FUNCTION__, p_dev->dev_handle, btif_hh_keylockstates);
264
265 if (p_dev->p_buf != NULL) {
266 GKI_freebuf(p_dev->p_buf);
267 }
268 /* Get SetReport buffer */
269 p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET +
270 sizeof(BT_HDR)));
271 if (p_dev->p_buf != NULL) {
272 p_dev->p_buf->len = len;
273 p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
274 p_dev->p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
275
276 /* LED status updated by data event */
277 UINT8 *pbuf_data = (UINT8 *)(p_dev->p_buf + 1)
278 + p_dev->p_buf->offset;
279 pbuf_data[0]=0x01; /*report id */
280 pbuf_data[1]=btif_hh_keylockstates; /*keystate*/
281 bda = (BD_ADDR*) (&p_dev->bd_addr);
282 BTA_HhSendData(p_dev->dev_handle, *bda,
283 p_dev->p_buf);
284 }
285 }
286
287 /*******************************************************************************
288 **
289 ** Function sync_lockstate_on_connect
290 **
291 ** Description Function to update the keyboard lock states managed by the OS
292 ** when a HID keyboard is connected or disconnected and reconnected
293 ** Returns void
294 *******************************************************************************/
sync_lockstate_on_connect(btif_hh_device_t * p_dev)295 static void sync_lockstate_on_connect(btif_hh_device_t *p_dev)
296 {
297 int keylockstates;
298
299 BTIF_TRACE_EVENT1("%s: Syncing keyboard lock states after "\
300 "reconnect...",__FUNCTION__);
301 /*If the device is connected, update keyboard state */
302 update_keyboard_lockstates(p_dev);
303
304 /*Check if the lockstate of caps,scroll,num is set.
305 If so, send a report to the kernel
306 so the lockstate is in sync */
307 keylockstates = get_keylockstates();
308 if (keylockstates)
309 {
310 BTIF_TRACE_DEBUG2("%s: Sending hid report to kernel "\
311 "indicating lock key state 0x%x",__FUNCTION__,
312 keylockstates);
313 usleep(200000);
314 toggle_os_keylockstates(p_dev->fd, keylockstates);
315 }
316 else
317 {
318 BTIF_TRACE_DEBUG2("%s: NOT sending hid report to kernel "\
319 "indicating lock key state 0x%x",__FUNCTION__,
320 keylockstates);
321 }
322 }
323
324 /*******************************************************************************
325 **
326 ** Function btif_hh_find_dev_by_handle
327 **
328 ** Description Return the device pointer of the specified device handle
329 **
330 ** Returns Device entry pointer in the device table
331 *******************************************************************************/
btif_hh_find_dev_by_handle(UINT8 handle)332 static btif_hh_device_t *btif_hh_find_dev_by_handle(UINT8 handle)
333 {
334 UINT32 i;
335 // LOGV("%s: handle = %d", __FUNCTION__, handle);
336 for (i = 0; i < BTIF_HH_MAX_HID; i++) {
337 if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN &&
338 btif_hh_cb.devices[i].dev_handle == handle)
339 {
340 return &btif_hh_cb.devices[i];
341 }
342 }
343 return NULL;
344 }
345
346
347 /*******************************************************************************
348 **
349 ** Function btif_hh_find_connected_dev_by_handle
350 **
351 ** Description Return the connected device pointer of the specified device handle
352 **
353 ** Returns Device entry pointer in the device table
354 *******************************************************************************/
btif_hh_find_connected_dev_by_handle(UINT8 handle)355 btif_hh_device_t *btif_hh_find_connected_dev_by_handle(UINT8 handle)
356 {
357 UINT32 i;
358 for (i = 0; i < BTIF_HH_MAX_HID; i++) {
359 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
360 btif_hh_cb.devices[i].dev_handle == handle)
361 {
362 return &btif_hh_cb.devices[i];
363 }
364 }
365 return NULL;
366 }
367
368 /*******************************************************************************
369 **
370 ** Function btif_hh_find_dev_by_bda
371 **
372 ** Description Return the device pointer of the specified bt_bdaddr_t.
373 **
374 ** Returns Device entry pointer in the device table
375 *******************************************************************************/
btif_hh_find_dev_by_bda(bt_bdaddr_t * bd_addr)376 static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr)
377 {
378 UINT32 i;
379 for (i = 0; i < BTIF_HH_MAX_HID; i++) {
380 if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN &&
381 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
382 {
383 return &btif_hh_cb.devices[i];
384 }
385 }
386 return NULL;
387 }
388
389 /*******************************************************************************
390 **
391 ** Function btif_hh_find_connected_dev_by_bda
392 **
393 ** Description Return the connected device pointer of the specified bt_bdaddr_t.
394 **
395 ** Returns Device entry pointer in the device table
396 *******************************************************************************/
btif_hh_find_connected_dev_by_bda(bt_bdaddr_t * bd_addr)397 static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr)
398 {
399 UINT32 i;
400 for (i = 0; i < BTIF_HH_MAX_HID; i++) {
401 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
402 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
403 {
404 return &btif_hh_cb.devices[i];
405 }
406 }
407 return NULL;
408 }
409
410 /*******************************************************************************
411 **
412 ** Function btif_hh_stop_vup_timer
413 **
414 ** Description stop vitual unplug timer
415 **
416 ** Returns void
417 *******************************************************************************/
btif_hh_stop_vup_timer(bt_bdaddr_t * bd_addr)418 void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr)
419 {
420 btif_hh_device_t *p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
421 if(p_dev != NULL)
422 {
423 if (p_dev->vup_timer_active)
424 {
425 BTIF_TRACE_DEBUG0("stop VUP timer ");
426 btu_stop_timer(&p_dev->vup_timer);
427 }
428 p_dev->vup_timer_active = FALSE;
429 }
430 }
431 /*******************************************************************************
432 **
433 ** Function btif_hh_start_vup_timer
434 **
435 ** Description start virtual unplug timer
436 **
437 ** Returns void
438 *******************************************************************************/
btif_hh_start_vup_timer(bt_bdaddr_t * bd_addr)439 void btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr)
440 {
441 btif_hh_device_t *p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
442
443 if (p_dev->vup_timer_active == FALSE)
444 {
445 BTIF_TRACE_DEBUG0("Start VUP timer ");
446 memset(&p_dev->vup_timer, 0, sizeof(TIMER_LIST_ENT));
447 p_dev->vup_timer.param = (UINT32)btif_hh_tmr_hdlr;
448 btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
449 BTIF_TIMEOUT_VUP_SECS);
450 }
451 else
452 {
453 BTIF_TRACE_DEBUG0("Restart VUP timer ");
454 btu_stop_timer(&p_dev->vup_timer);
455 btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
456 BTIF_TIMEOUT_VUP_SECS);
457 }
458 p_dev->vup_timer_active = TRUE;
459
460 }
461
462 /*******************************************************************************
463 **
464 ** Function btif_hh_add_added_dev
465 **
466 ** Description Add a new device to the added device list.
467 **
468 ** Returns TRUE if add successfully, otherwise FALSE.
469 *******************************************************************************/
btif_hh_add_added_dev(bt_bdaddr_t bda,tBTA_HH_ATTR_MASK attr_mask)470 BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bda, tBTA_HH_ATTR_MASK attr_mask)
471 {
472 int i;
473 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
474 if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN) == 0) {
475 BTIF_TRACE_WARNING6(" Device %02X:%02X:%02X:%02X:%02X:%02X already added",
476 bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
477 return FALSE;
478 }
479 }
480 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
481 if (btif_hh_cb.added_devices[i].bd_addr.address[0] == 0 &&
482 btif_hh_cb.added_devices[i].bd_addr.address[1] == 0 &&
483 btif_hh_cb.added_devices[i].bd_addr.address[2] == 0 &&
484 btif_hh_cb.added_devices[i].bd_addr.address[3] == 0 &&
485 btif_hh_cb.added_devices[i].bd_addr.address[4] == 0 &&
486 btif_hh_cb.added_devices[i].bd_addr.address[5] == 0)
487 {
488 BTIF_TRACE_WARNING6(" Added device %02X:%02X:%02X:%02X:%02X:%02X",
489 bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
490 memcpy(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN);
491 btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
492 btif_hh_cb.added_devices[i].attr_mask = attr_mask;
493 return TRUE;
494 }
495 }
496
497 BTIF_TRACE_WARNING1("%s: Error, out of space to add device",__FUNCTION__);
498 return FALSE;
499 }
500
501 /*******************************************************************************
502 **
503 ** Function btif_hh_remove_device
504 **
505 ** Description Remove an added device from the stack.
506 **
507 ** Returns void
508 *******************************************************************************/
btif_hh_remove_device(bt_bdaddr_t bd_addr)509 void btif_hh_remove_device(bt_bdaddr_t bd_addr)
510 {
511 int i;
512 btif_hh_device_t *p_dev;
513 btif_hh_added_device_t *p_added_dev;
514
515 ALOGI("%s: bda = %02x:%02x:%02x:%02x:%02x:%02x", __FUNCTION__,
516 bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
517
518 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
519 p_added_dev = &btif_hh_cb.added_devices[i];
520 if (memcmp(&(p_added_dev->bd_addr),&bd_addr, 6) == 0) {
521 BTA_HhRemoveDev(p_added_dev->dev_handle);
522 btif_storage_remove_hid_info(&(p_added_dev->bd_addr));
523 memset(&(p_added_dev->bd_addr), 0, 6);
524 p_added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
525 break;
526 }
527 }
528
529 p_dev = btif_hh_find_dev_by_bda(&bd_addr);
530 if (p_dev == NULL) {
531 BTIF_TRACE_WARNING6(" Oops, can't find device [%02x:%02x:%02x:%02x:%02x:%02x]",
532 bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
533 return;
534 }
535
536 /* need to notify up-layer device is disconnected to avoid state out of sync with up-layer */
537 HAL_CBACK(bt_hh_callbacks, connection_state_cb, &(p_dev->bd_addr), BTHH_CONN_STATE_DISCONNECTED);
538
539 p_dev->dev_status = BTHH_CONN_STATE_UNKNOWN;
540 p_dev->dev_handle = BTA_HH_INVALID_HANDLE;
541 if (btif_hh_cb.device_num > 0) {
542 btif_hh_cb.device_num--;
543 }
544 else {
545 BTIF_TRACE_WARNING1("%s: device_num = 0", __FUNCTION__);
546 }
547 if (p_dev->p_buf != NULL) {
548 GKI_freebuf(p_dev->p_buf);
549 p_dev->p_buf = NULL;
550 }
551
552 p_dev->hh_keep_polling = 0;
553 p_dev->hh_poll_thread_id = -1;
554 BTIF_TRACE_DEBUG2("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
555 if (p_dev->fd >= 0) {
556 bta_hh_co_destroy(p_dev->fd);
557 p_dev->fd = -1;
558 }
559 }
560
561
btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO * dest,tBTA_HH_DEV_DSCP_INFO * src)562 BOOLEAN btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO* dest , tBTA_HH_DEV_DSCP_INFO* src)
563 {
564 dest->descriptor.dl_len = 0;
565 if (src->descriptor.dl_len >0)
566 {
567 dest->descriptor.dsc_list = (UINT8 *) GKI_getbuf(src->descriptor.dl_len);
568 if (dest->descriptor.dsc_list == NULL)
569 {
570 BTIF_TRACE_WARNING1("%s: Failed to allocate DSCP for CB", __FUNCTION__);
571 return FALSE;
572 }
573 }
574 memcpy(dest->descriptor.dsc_list, src->descriptor.dsc_list, src->descriptor.dl_len);
575 dest->descriptor.dl_len = src->descriptor.dl_len;
576 dest->vendor_id = src->vendor_id;
577 dest->product_id = src->product_id;
578 dest->version = src->version;
579 dest->ctry_code = src->ctry_code;
580 return TRUE;
581 }
582
583
584 /*******************************************************************************
585 **
586 ** Function btif_hh_virtual_unplug
587 **
588 ** Description Virtual unplug initiated from the BTIF thread context
589 ** Special handling for HID mouse-
590 **
591 ** Returns void
592 **
593 *******************************************************************************/
594
btif_hh_virtual_unplug(bt_bdaddr_t * bd_addr)595 bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr)
596 {
597 BTIF_TRACE_DEBUG1("%s", __FUNCTION__);
598 btif_hh_device_t *p_dev;
599 char bd_str[18];
600 sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
601 bd_addr->address[0], bd_addr->address[1], bd_addr->address[2], bd_addr->address[3],
602 bd_addr->address[4], bd_addr->address[5]);
603 p_dev = btif_hh_find_dev_by_bda(bd_addr);
604 if ((p_dev != NULL) && (p_dev->dev_status == BTHH_CONN_STATE_CONNECTED)
605 && (p_dev->attr_mask & HID_VIRTUAL_CABLE))
606 {
607 BTIF_TRACE_DEBUG1("%s Sending BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG", __FUNCTION__);
608 /* start the timer */
609 btif_hh_start_vup_timer(bd_addr);
610 p_dev->local_vup = TRUE;
611 BTA_HhSendCtrl(p_dev->dev_handle, BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG);
612 return BT_STATUS_SUCCESS;
613 }
614 else
615 {
616 BTIF_TRACE_ERROR2("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
617 return BT_STATUS_FAIL;
618 }
619 }
620
621 /*******************************************************************************
622 **
623 ** Function btif_hh_connect
624 **
625 ** Description connection initiated from the BTIF thread context
626 **
627 ** Returns int status
628 **
629 *******************************************************************************/
630
btif_hh_connect(bt_bdaddr_t * bd_addr)631 bt_status_t btif_hh_connect(bt_bdaddr_t *bd_addr)
632 {
633 btif_hh_device_t *dev;
634 btif_hh_added_device_t *added_dev = NULL;
635 char bda_str[20];
636 int i;
637 BD_ADDR *bda = (BD_ADDR*)bd_addr;
638 tBTA_HH_CONN conn;
639 CHECK_BTHH_INIT();
640 dev = btif_hh_find_dev_by_bda(bd_addr);
641 BTIF_TRACE_DEBUG0("Connect _hh");
642 sprintf(bda_str, "%02X:%02X:%02X:%02X:%02X:%02X",
643 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
644 if (dev == NULL && btif_hh_cb.device_num >= BTIF_HH_MAX_HID) {
645 // No space for more HID device now.
646 BTIF_TRACE_WARNING2("%s: Error, exceeded the maximum supported HID device number %d",
647 __FUNCTION__, BTIF_HH_MAX_HID);
648 return BT_STATUS_FAIL;
649 }
650
651 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
652 if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) {
653 added_dev = &btif_hh_cb.added_devices[i];
654 BTIF_TRACE_WARNING3("%s: Device %s already added, attr_mask = 0x%x",
655 __FUNCTION__, bda_str, added_dev->attr_mask);
656 }
657 }
658
659 if (added_dev != NULL) {
660 if (added_dev->dev_handle == BTA_HH_INVALID_HANDLE) {
661 // No space for more HID device now.
662 BTIF_TRACE_ERROR2("%s: Error, device %s added but addition failed", __FUNCTION__, bda_str);
663 memset(&(added_dev->bd_addr), 0, 6);
664 added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
665 return BT_STATUS_FAIL;
666 }
667 }
668
669 if (added_dev == NULL ||
670 (added_dev->attr_mask & HID_NORMALLY_CONNECTABLE) != 0 ||
671 (added_dev->attr_mask & HID_RECONN_INIT) == 0)
672 {
673 tBTA_SEC sec_mask = BTUI_HH_SECURITY;
674 btif_hh_cb.status = BTIF_HH_DEV_CONNECTING;
675 BD_ADDR *bda = (BD_ADDR*)bd_addr;
676 BTA_HhOpen(*bda, BTA_HH_PROTO_RPT_MODE, sec_mask);
677 }
678 else
679 {
680 // This device shall be connected from the host side.
681 BTIF_TRACE_ERROR2("%s: Error, device %s can only be reconnected from device side",
682 __FUNCTION__, bda_str);
683 return BT_STATUS_FAIL;
684 }
685
686 HAL_CBACK(bt_hh_callbacks, connection_state_cb, bd_addr, BTHH_CONN_STATE_CONNECTING);
687 return BT_STATUS_SUCCESS;
688 }
689
690 /*******************************************************************************
691 **
692 ** Function btif_hh_disconnect
693 **
694 ** Description disconnection initiated from the BTIF thread context
695 **
696 ** Returns void
697 **
698 *******************************************************************************/
699
btif_hh_disconnect(bt_bdaddr_t * bd_addr)700 void btif_hh_disconnect(bt_bdaddr_t *bd_addr)
701 {
702 BD_ADDR *bda = (BD_ADDR*)bd_addr;
703 btif_hh_device_t *p_dev;
704 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
705 if (p_dev != NULL)
706 {
707 BTA_HhClose(p_dev->dev_handle);
708 }
709 else
710 BTIF_TRACE_DEBUG1("%s-- Error: device not connected:",__FUNCTION__);
711 }
712
713 /*******************************************************************************
714 **
715 ** Function btif_btif_hh_setreport
716 **
717 ** Description setreport initiated from the BTIF thread context
718 **
719 ** Returns void
720 **
721 *******************************************************************************/
722
btif_hh_setreport(btif_hh_device_t * p_dev,bthh_report_type_t r_type,UINT16 size,UINT8 * report)723 void btif_hh_setreport(btif_hh_device_t *p_dev, bthh_report_type_t r_type, UINT16 size,
724 UINT8* report)
725 {
726 UINT8 hexbuf[20];
727 UINT16 len = size;
728 int i = 0;
729 if (p_dev->p_buf != NULL) {
730 GKI_freebuf(p_dev->p_buf);
731 }
732 p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
733 if (p_dev->p_buf == NULL) {
734 APPL_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len);
735 return;
736 }
737
738 p_dev->p_buf->len = len;
739 p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
740
741 //Build a SetReport data buffer
742 memset(hexbuf, 0, 20);
743 for(i=0; i<len; i++)
744 hexbuf[i] = report[i];
745
746 UINT8* pbuf_data;
747 pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset;
748 memcpy(pbuf_data, hexbuf, len);
749 BTA_HhSetReport(p_dev->dev_handle, r_type, p_dev->p_buf);
750
751 }
752
753 /*****************************************************************************
754 ** Section name (Group of functions)
755 *****************************************************************************/
756
757 /*****************************************************************************
758 **
759 ** btif hh api functions (no context switch)
760 **
761 *****************************************************************************/
762
763
764 /*******************************************************************************
765 **
766 ** Function btif_hh_upstreams_evt
767 **
768 ** Description Executes HH UPSTREAMS events in btif context
769 **
770 ** Returns void
771 **
772 *******************************************************************************/
btif_hh_upstreams_evt(UINT16 event,char * p_param)773 static void btif_hh_upstreams_evt(UINT16 event, char* p_param)
774 {
775 tBTA_HH *p_data = (tBTA_HH *)p_param;
776 bdstr_t bdstr;
777 btif_hh_device_t *p_dev = NULL;
778 int i;
779 int len, tmplen;
780
781 BTIF_TRACE_DEBUG2("%s: event=%s", __FUNCTION__, dump_hh_event(event));
782
783 switch (event)
784 {
785 case BTA_HH_ENABLE_EVT:
786 BTIF_TRACE_DEBUG2("%s: BTA_HH_ENABLE_EVT: status =%d",__FUNCTION__, p_data->status);
787 if (p_data->status == BTA_HH_OK) {
788 btif_hh_cb.status = BTIF_HH_ENABLED;
789 BTIF_TRACE_DEBUG1("%s--Loading added devices",__FUNCTION__);
790 /* Add hid descriptors for already bonded hid devices*/
791 btif_storage_load_bonded_hid_info();
792 }
793 else {
794 btif_hh_cb.status = BTIF_HH_DISABLED;
795 BTIF_TRACE_WARNING1("BTA_HH_ENABLE_EVT: Error, HH enabling failed, status = %d", p_data->status);
796 }
797 break;
798
799 case BTA_HH_DISABLE_EVT:
800 btif_hh_cb.status = BTIF_HH_DISABLED;
801 if (p_data->status == BTA_HH_OK) {
802 int i;
803 //Clear the control block
804 memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
805 for (i = 0; i < BTIF_HH_MAX_HID; i++){
806 btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
807 }
808 }
809 else
810 BTIF_TRACE_WARNING1("BTA_HH_DISABLE_EVT: Error, HH disabling failed, status = %d", p_data->status);
811 break;
812
813 case BTA_HH_OPEN_EVT:
814 BTIF_TRACE_WARNING3("%s: BTA_HH_OPN_EVT: handle=%d, status =%d",__FUNCTION__, p_data->conn.handle, p_data->conn.status);
815 if (p_data->conn.status == BTA_HH_OK) {
816 p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
817 if (p_dev == NULL) {
818 BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Error, cannot find device with handle %d", p_data->conn.handle);
819 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
820 // The connect request must come from device side and exceeded the connected
821 // HID device number.
822 BTA_HhClose(p_data->conn.handle);
823 HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
824 }
825 else if (p_dev->fd < 0) {
826 BTIF_TRACE_WARNING0("BTA_HH_OPEN_EVT: Error, failed to find the uhid driver...");
827 memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
828 //remove the connection and then try again to reconnect from the mouse side to recover
829 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
830 BTA_HhClose(p_data->conn.handle);
831 }
832 else {
833 BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Found device...Getting dscp info for handle ... %d",p_data->conn.handle);
834 memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
835 btif_hh_cb.status = BTIF_HH_DEV_CONNECTED;
836 // Send set_idle if the peer_device is a keyboard
837 if (check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_KEYBOARD )||
838 check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_COMBO))
839 BTA_HhSetIdle(p_data->conn.handle, 0);
840 btif_hh_cb.p_curr_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
841 BTA_HhGetDscpInfo(p_data->conn.handle);
842 p_dev->dev_status = BTHH_CONN_STATE_CONNECTED;
843 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
844 }
845 }
846 else {
847 bt_bdaddr_t *bdaddr = (bt_bdaddr_t*)p_data->conn.bda;
848 HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
849 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
850 }
851 break;
852 case BTA_HH_CLOSE_EVT:
853 BTIF_TRACE_DEBUG2("BTA_HH_CLOSE_EVT: status = %d, handle = %d",
854 p_data->dev_status.status, p_data->dev_status.handle);
855 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
856 if (p_dev != NULL) {
857 BTIF_TRACE_DEBUG2("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
858 if (p_dev->fd >= 0){
859 UINT8 hidreport[9];
860 memset(hidreport,0,9);
861 hidreport[0]=1;
862 bta_hh_co_write(p_dev->fd , hidreport, sizeof(hidreport));
863 }
864 if(p_dev->vup_timer_active)
865 {
866 btif_hh_stop_vup_timer(&(p_dev->bd_addr));
867 }
868 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
869 p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
870 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
871 BTIF_TRACE_DEBUG2("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
872 bta_hh_co_destroy(p_dev->fd);
873 p_dev->fd = -1;
874 }
875 else {
876 BTIF_TRACE_WARNING1("Error: cannot find device with handle %d", p_data->dev_status.handle);
877 }
878 break;
879 case BTA_HH_GET_RPT_EVT:
880 BTIF_TRACE_DEBUG2("BTA_HH_GET_RPT_EVT: status = %d, handle = %d",
881 p_data->hs_data.status, p_data->hs_data.handle);
882 p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
883 HAL_CBACK(bt_hh_callbacks, get_report_cb,(bt_bdaddr_t*) &(p_dev->bd_addr), (bthh_status_t) p_data->hs_data.status,
884 (uint8_t*) p_data->hs_data.rsp_data.p_rpt_data, BT_HDR_SIZE);
885 break;
886
887 case BTA_HH_SET_RPT_EVT:
888 BTIF_TRACE_DEBUG2("BTA_HH_SET_RPT_EVT: status = %d, handle = %d",
889 p_data->dev_status.status, p_data->dev_status.handle);
890 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
891 if (p_dev != NULL && p_dev->p_buf != NULL) {
892 BTIF_TRACE_DEBUG0("Freeing buffer..." );
893 GKI_freebuf(p_dev->p_buf);
894 p_dev->p_buf = NULL;
895 }
896 break;
897
898 case BTA_HH_GET_PROTO_EVT:
899 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
900 BTIF_TRACE_WARNING4("BTA_HH_GET_PROTO_EVT: status = %d, handle = %d, proto = [%d], %s",
901 p_data->hs_data.status, p_data->hs_data.handle,
902 p_data->hs_data.rsp_data.proto_mode,
903 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_RPT_MODE) ? "Report Mode" :
904 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_BOOT_MODE) ? "Boot Mode" : "Unsupported");
905 HAL_CBACK(bt_hh_callbacks, protocol_mode_cb,(bt_bdaddr_t*) &(p_dev->bd_addr), (bthh_status_t)p_data->hs_data.status,
906 (bthh_protocol_mode_t) p_data->hs_data.rsp_data.proto_mode);
907 break;
908
909 case BTA_HH_SET_PROTO_EVT:
910 BTIF_TRACE_DEBUG2("BTA_HH_SET_PROTO_EVT: status = %d, handle = %d",
911 p_data->dev_status.status, p_data->dev_status.handle);
912 break;
913
914 case BTA_HH_GET_IDLE_EVT:
915 BTIF_TRACE_DEBUG3("BTA_HH_GET_IDLE_EVT: handle = %d, status = %d, rate = %d",
916 p_data->hs_data.handle, p_data->hs_data.status,
917 p_data->hs_data.rsp_data.idle_rate);
918 break;
919
920 case BTA_HH_SET_IDLE_EVT:
921 BTIF_TRACE_DEBUG2("BTA_HH_SET_IDLE_EVT: status = %d, handle = %d",
922 p_data->dev_status.status, p_data->dev_status.handle);
923 break;
924
925 case BTA_HH_GET_DSCP_EVT:
926 BTIF_TRACE_WARNING2("BTA_HH_GET_DSCP_EVT: status = %d, handle = %d",
927 p_data->dev_status.status, p_data->dev_status.handle);
928 len = p_data->dscp_info.descriptor.dl_len;
929 BTIF_TRACE_DEBUG1("BTA_HH_GET_DSCP_EVT: len = %d", len);
930 p_dev = btif_hh_cb.p_curr_dev;
931 if (p_dev == NULL) {
932 BTIF_TRACE_ERROR0("BTA_HH_GET_DSCP_EVT: No HID device is currently connected");
933 return;
934 }
935 if (p_dev->fd < 0) {
936 ALOGE("BTA_HH_GET_DSCP_EVT: Error, failed to find the uhid driver...");
937 return;
938 }
939 {
940 char *cached_name = NULL;
941 bt_bdname_t bdname;
942 bt_property_t prop_name;
943 BTIF_STORAGE_FILL_PROPERTY(&prop_name, BT_PROPERTY_BDNAME,
944 sizeof(bt_bdname_t), &bdname);
945 if (btif_storage_get_remote_device_property(
946 &p_dev->bd_addr, &prop_name) == BT_STATUS_SUCCESS)
947 {
948 cached_name = (char *)bdname.name;
949 }
950 else
951 {
952 cached_name = "Bluetooth HID";
953 }
954
955 BTIF_TRACE_WARNING2("%s: name = %s", __FUNCTION__, cached_name);
956 bta_hh_co_send_hid_info(p_dev, cached_name,
957 p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
958 p_data->dscp_info.version, p_data->dscp_info.ctry_code,
959 len, p_data->dscp_info.descriptor.dsc_list);
960 if (btif_hh_add_added_dev(p_dev->bd_addr, p_dev->attr_mask)) {
961 BD_ADDR bda;
962 bdcpy(bda, p_dev->bd_addr.address);
963 tBTA_HH_DEV_DSCP_INFO dscp_info;
964 bt_status_t ret;
965 bdcpy(bda, p_dev->bd_addr.address);
966 btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info);
967 BTIF_TRACE_DEBUG6("BTA_HH_GET_DSCP_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
968 p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
969 p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
970 p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
971 BTA_HhAddDev(bda, p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, dscp_info);
972 // write hid info to nvram
973 ret = btif_storage_add_hid_device_info(&(p_dev->bd_addr), p_dev->attr_mask,p_dev->sub_class,p_dev->app_id,
974 p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
975 p_data->dscp_info.version, p_data->dscp_info.ctry_code,
976 len, p_data->dscp_info.descriptor.dsc_list);
977
978 ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret);
979 BTIF_TRACE_WARNING0("BTA_HH_GET_DSCP_EVT: Called add device");
980
981 //Free buffer created for dscp_info;
982 if (dscp_info.descriptor.dl_len >0 && dscp_info.descriptor.dsc_list != NULL)
983 {
984 GKI_freebuf(dscp_info.descriptor.dsc_list);
985 dscp_info.descriptor.dsc_list = NULL;
986 dscp_info.descriptor.dl_len=0;
987 }
988 }
989 else {
990 //Device already added.
991 BTIF_TRACE_WARNING1("%s: Device already added ",__FUNCTION__);
992 }
993 /*Sync HID Keyboard lockstates */
994 tmplen = sizeof(hid_kb_numlock_on_list)
995 / sizeof(tHID_KB_LIST);
996 for(i = 0; i< tmplen; i++)
997 {
998 if(p_data->dscp_info.vendor_id
999 == hid_kb_numlock_on_list[i].version_id &&
1000 p_data->dscp_info.product_id
1001 == hid_kb_numlock_on_list[i].product_id)
1002 {
1003 BTIF_TRACE_DEBUG3("%s() idx[%d] Enabling "\
1004 "NUMLOCK for device :: %s", __FUNCTION__,
1005 i, hid_kb_numlock_on_list[i].kb_name);
1006 /* Enable NUMLOCK by default so that numeric
1007 keys work from first keyboard connect */
1008 set_keylockstate(BTIF_HH_KEYSTATE_MASK_NUMLOCK,
1009 TRUE);
1010 sync_lockstate_on_connect(p_dev);
1011 /* End Sync HID Keyboard lockstates */
1012 break;
1013 }
1014 }
1015 }
1016 break;
1017
1018 case BTA_HH_ADD_DEV_EVT:
1019 BTIF_TRACE_WARNING2("BTA_HH_ADD_DEV_EVT: status = %d, handle = %d",p_data->dev_info.status, p_data->dev_info.handle);
1020 int i;
1021 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
1022 if (memcmp(btif_hh_cb.added_devices[i].bd_addr.address, p_data->dev_info.bda, 6) == 0) {
1023 if (p_data->dev_info.status == BTA_HH_OK) {
1024 btif_hh_cb.added_devices[i].dev_handle = p_data->dev_info.handle;
1025 }
1026 else {
1027 memset(btif_hh_cb.added_devices[i].bd_addr.address, 0, 6);
1028 btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
1029 }
1030 break;
1031 }
1032 }
1033 break;
1034 case BTA_HH_RMV_DEV_EVT:
1035 BTIF_TRACE_DEBUG2("BTA_HH_RMV_DEV_EVT: status = %d, handle = %d",
1036 p_data->dev_info.status, p_data->dev_info.handle);
1037 BTIF_TRACE_DEBUG6("BTA_HH_RMV_DEV_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1038 p_data->dev_info.bda[0], p_data->dev_info.bda[1], p_data->dev_info.bda[2],
1039 p_data->dev_info.bda[3], p_data->dev_info.bda[4], p_data->dev_info.bda[5]);
1040 break;
1041
1042
1043 case BTA_HH_VC_UNPLUG_EVT:
1044 BTIF_TRACE_DEBUG2("BTA_HH_VC_UNPLUG_EVT: status = %d, handle = %d",
1045 p_data->dev_status.status, p_data->dev_status.handle);
1046 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
1047 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
1048 if (p_dev != NULL) {
1049 BTIF_TRACE_DEBUG6("BTA_HH_VC_UNPLUG_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1050 p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
1051 p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
1052 p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
1053 /* Stop the VUP timer */
1054 if(p_dev->vup_timer_active)
1055 {
1056 btif_hh_stop_vup_timer(&(p_dev->bd_addr));
1057 }
1058 p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
1059 BTIF_TRACE_DEBUG1("%s---Sending connection state change", __FUNCTION__);
1060 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
1061 BTIF_TRACE_DEBUG1("%s---Removing HID bond", __FUNCTION__);
1062 /* If it is locally initiated VUP or remote device has its major COD as
1063 Peripheral removed the bond.*/
1064 if (p_dev->local_vup || check_cod_hid(&(p_dev->bd_addr), COD_HID_MAJOR))
1065 {
1066 p_dev->local_vup = FALSE;
1067 BTA_DmRemoveDevice((UINT8 *)p_dev->bd_addr.address);
1068 }
1069 else
1070 btif_hh_remove_device(p_dev->bd_addr);
1071 HAL_CBACK(bt_hh_callbacks, virtual_unplug_cb,&(p_dev->bd_addr),
1072 p_data->dev_status.status);
1073 }
1074 break;
1075
1076 case BTA_HH_API_ERR_EVT :
1077 ALOGI("BTA_HH API_ERR");
1078 break;
1079
1080
1081
1082 default:
1083 BTIF_TRACE_WARNING2("%s: Unhandled event: %d", __FUNCTION__, event);
1084 break;
1085 }
1086 }
1087
1088 /*******************************************************************************
1089 **
1090 ** Function bte_hh_evt
1091 **
1092 ** Description Switches context from BTE to BTIF for all HH events
1093 **
1094 ** Returns void
1095 **
1096 *******************************************************************************/
1097
bte_hh_evt(tBTA_HH_EVT event,tBTA_HH * p_data)1098 static void bte_hh_evt(tBTA_HH_EVT event, tBTA_HH *p_data)
1099 {
1100 bt_status_t status;
1101 int param_len = 0;
1102
1103 if (BTA_HH_ENABLE_EVT == event)
1104 param_len = sizeof(tBTA_HH_STATUS);
1105 else if (BTA_HH_OPEN_EVT == event)
1106 param_len = sizeof(tBTA_HH_CONN);
1107 else if (BTA_HH_DISABLE_EVT == event)
1108 param_len = sizeof(tBTA_HH_STATUS);
1109 else if (BTA_HH_CLOSE_EVT == event)
1110 param_len = sizeof(tBTA_HH_CBDATA);
1111 else if (BTA_HH_GET_DSCP_EVT == event)
1112 param_len = sizeof(tBTA_HH_DEV_DSCP_INFO);
1113 else if ((BTA_HH_GET_PROTO_EVT == event) || (BTA_HH_GET_RPT_EVT == event)|| (BTA_HH_GET_IDLE_EVT == event))
1114 param_len = sizeof(tBTA_HH_HSDATA);
1115 else if ((BTA_HH_SET_PROTO_EVT == event) || (BTA_HH_SET_RPT_EVT == event) || (BTA_HH_VC_UNPLUG_EVT == event) || (BTA_HH_SET_IDLE_EVT == event))
1116 param_len = sizeof(tBTA_HH_CBDATA);
1117 else if ((BTA_HH_ADD_DEV_EVT == event) || (BTA_HH_RMV_DEV_EVT == event) )
1118 param_len = sizeof(tBTA_HH_DEV_INFO);
1119 else if (BTA_HH_API_ERR_EVT == event)
1120 param_len = 0;
1121 /* switch context to btif task context (copy full union size for convenience) */
1122 status = btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)p_data, param_len, NULL);
1123
1124 /* catch any failed context transfers */
1125 ASSERTC(status == BT_STATUS_SUCCESS, "context transfer failed", status);
1126 }
1127
1128 /*******************************************************************************
1129 **
1130 ** Function btif_hh_handle_evt
1131 **
1132 ** Description Switches context for immediate callback
1133 **
1134 ** Returns void
1135 **
1136 *******************************************************************************/
1137
btif_hh_handle_evt(UINT16 event,char * p_param)1138 static void btif_hh_handle_evt(UINT16 event, char *p_param)
1139 {
1140 bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param;
1141 BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event);
1142 int ret;
1143 switch(event)
1144 {
1145 case BTIF_HH_CONNECT_REQ_EVT:
1146 {
1147 ret = btif_hh_connect(bd_addr);
1148 if(ret == BT_STATUS_SUCCESS)
1149 {
1150 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_CONNECTING);
1151 }
1152 else
1153 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTED);
1154 }
1155 break;
1156
1157 case BTIF_HH_DISCONNECT_REQ_EVT:
1158 {
1159 BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event);
1160 btif_hh_disconnect(bd_addr);
1161 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTING);
1162 }
1163 break;
1164
1165 case BTIF_HH_VUP_REQ_EVT:
1166 {
1167 BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event);
1168 ret = btif_hh_virtual_unplug(bd_addr);
1169 }
1170 break;
1171
1172 default:
1173 {
1174 BTIF_TRACE_WARNING2("%s : Unknown event 0x%x", __FUNCTION__, event);
1175 }
1176 break;
1177 }
1178 }
1179
1180 /*******************************************************************************
1181 **
1182 ** Function btif_hh_tmr_hdlr
1183 **
1184 ** Description Process timer timeout
1185 **
1186 ** Returns void
1187 *******************************************************************************/
btif_hh_tmr_hdlr(TIMER_LIST_ENT * tle)1188 void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle)
1189 {
1190 btif_hh_device_t *p_dev;
1191 UINT8 i,j;
1192 tBTA_HH_EVT event;
1193 tBTA_HH p_data;
1194 int param_len = 0;
1195 memset(&p_data, 0, sizeof(tBTA_HH));
1196
1197 BTIF_TRACE_DEBUG2("%s timer_in_use=%d", __FUNCTION__, tle->in_use );
1198
1199 for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1200 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED)
1201 {
1202
1203 p_dev = &btif_hh_cb.devices[i];
1204
1205 if (p_dev->vup_timer_active)
1206 {
1207 p_dev->vup_timer_active = FALSE;
1208 event = BTA_HH_VC_UNPLUG_EVT;
1209 p_data.dev_status.status = BTHH_ERR;
1210 p_data.dev_status.handle = p_dev->dev_handle;
1211 param_len = sizeof(tBTA_HH_CBDATA);
1212
1213 /* switch context to btif task context */
1214 btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)&p_data,
1215 param_len, NULL);
1216 }
1217 }
1218 }
1219 }
1220
1221 /*******************************************************************************
1222 **
1223 ** Function btif_hh_init
1224 **
1225 ** Description initializes the hh interface
1226 **
1227 ** Returns bt_status_t
1228 **
1229 *******************************************************************************/
init(bthh_callbacks_t * callbacks)1230 static bt_status_t init( bthh_callbacks_t* callbacks )
1231 {
1232 UINT32 i;
1233 BTIF_TRACE_EVENT1("%s", __FUNCTION__);
1234
1235 bt_hh_callbacks = callbacks;
1236 memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
1237 for (i = 0; i < BTIF_HH_MAX_HID; i++){
1238 btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
1239 }
1240 /* Invoke the enable service API to the core to set the appropriate service_id */
1241 btif_enable_service(BTA_HID_SERVICE_ID);
1242 return BT_STATUS_SUCCESS;
1243 }
1244
1245 /*******************************************************************************
1246 **
1247 ** Function connect
1248 **
1249 ** Description connect to hid device
1250 **
1251 ** Returns bt_status_t
1252 **
1253 *******************************************************************************/
connect(bt_bdaddr_t * bd_addr)1254 static bt_status_t connect( bt_bdaddr_t *bd_addr)
1255 {
1256 if(btif_hh_cb.status != BTIF_HH_DEV_CONNECTING)
1257 {
1258 btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT,
1259 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1260 return BT_STATUS_SUCCESS;
1261 }
1262 else
1263 return BT_STATUS_BUSY;
1264 }
1265
1266 /*******************************************************************************
1267 **
1268 ** Function disconnect
1269 **
1270 ** Description disconnect from hid device
1271 **
1272 ** Returns bt_status_t
1273 **
1274 *******************************************************************************/
disconnect(bt_bdaddr_t * bd_addr)1275 static bt_status_t disconnect( bt_bdaddr_t *bd_addr )
1276 {
1277 CHECK_BTHH_INIT();
1278 btif_hh_device_t *p_dev;
1279
1280 if (btif_hh_cb.status == BTIF_HH_DISABLED)
1281 {
1282 BTIF_TRACE_WARNING2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1283 return BT_STATUS_FAIL;
1284 }
1285 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1286 if (p_dev != NULL)
1287 {
1288 return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT,
1289 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1290 }
1291 else
1292 {
1293 BTIF_TRACE_WARNING1("%s: Error, device not opened.", __FUNCTION__);
1294 return BT_STATUS_FAIL;
1295 }
1296 }
1297
1298 /*******************************************************************************
1299 **
1300 ** Function virtual_unplug
1301 **
1302 ** Description Virtual UnPlug (VUP) the specified HID device.
1303 **
1304 ** Returns bt_status_t
1305 **
1306 *******************************************************************************/
virtual_unplug(bt_bdaddr_t * bd_addr)1307 static bt_status_t virtual_unplug (bt_bdaddr_t *bd_addr)
1308 {
1309 CHECK_BTHH_INIT();
1310 btif_hh_device_t *p_dev;
1311 char bd_str[18];
1312 sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
1313 bd_addr->address[0], bd_addr->address[1], bd_addr->address[2], bd_addr->address[3],
1314 bd_addr->address[4], bd_addr->address[5]);
1315 if (btif_hh_cb.status == BTIF_HH_DISABLED)
1316 {
1317 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1318 return BT_STATUS_FAIL;
1319 }
1320 p_dev = btif_hh_find_dev_by_bda(bd_addr);
1321 if (!p_dev)
1322 {
1323 BTIF_TRACE_ERROR2("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
1324 return BT_STATUS_FAIL;
1325 }
1326 btif_transfer_context(btif_hh_handle_evt, BTIF_HH_VUP_REQ_EVT,
1327 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1328 return BT_STATUS_SUCCESS;
1329 }
1330
1331
1332 /*******************************************************************************
1333 **
1334 ** Function set_info
1335 **
1336 ** Description Set the HID device descriptor for the specified HID device.
1337 **
1338 ** Returns bt_status_t
1339 **
1340 *******************************************************************************/
set_info(bt_bdaddr_t * bd_addr,bthh_hid_info_t hid_info)1341 static bt_status_t set_info (bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info )
1342 {
1343 CHECK_BTHH_INIT();
1344 tBTA_HH_DEV_DSCP_INFO dscp_info;
1345 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1346
1347 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1348 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1349 BTIF_TRACE_DEBUG6("%s: sub_class = 0x%02x, app_id = %d, vendor_id = 0x%04x, "
1350 "product_id = 0x%04x, version= 0x%04x",
1351 __FUNCTION__, hid_info.sub_class,
1352 hid_info.app_id, hid_info.vendor_id, hid_info.product_id,
1353 hid_info.version);
1354
1355 if (btif_hh_cb.status == BTIF_HH_DISABLED)
1356 {
1357 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1358 return BT_STATUS_FAIL;
1359 }
1360
1361 dscp_info.vendor_id = hid_info.vendor_id;
1362 dscp_info.product_id = hid_info.product_id;
1363 dscp_info.version = hid_info.version;
1364 dscp_info.ctry_code = hid_info.ctry_code;
1365
1366 dscp_info.descriptor.dl_len = hid_info.dl_len;
1367 dscp_info.descriptor.dsc_list = (UINT8 *) GKI_getbuf(dscp_info.descriptor.dl_len);
1368 if (dscp_info.descriptor.dsc_list == NULL)
1369 {
1370 ALOGE("%s: Failed to allocate DSCP for CB", __FUNCTION__);
1371 return BT_STATUS_FAIL;
1372 }
1373 memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len);
1374
1375 if (btif_hh_add_added_dev(*bd_addr, hid_info.attr_mask))
1376 {
1377 BTA_HhAddDev(*bda, hid_info.attr_mask, hid_info.sub_class,
1378 hid_info.app_id, dscp_info);
1379 }
1380
1381 GKI_freebuf(dscp_info.descriptor.dsc_list);
1382
1383 return BT_STATUS_SUCCESS;
1384 }
1385 /*******************************************************************************
1386 **
1387 ** Function get_idle_time
1388 **
1389 ** Description Get the HID idle time
1390 **
1391 ** Returns bt_status_t
1392 **
1393 *******************************************************************************/
get_idle_time(bt_bdaddr_t * bd_addr)1394 static bt_status_t get_idle_time(bt_bdaddr_t *bd_addr)
1395 {
1396 CHECK_BTHH_INIT();
1397 btif_hh_device_t *p_dev;
1398 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1399
1400 BTIF_TRACE_DEBUG6(" addr = %02X:%02X:%02X:%02X:%02X:%02X",
1401 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1402
1403 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1404 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1405 return BT_STATUS_FAIL;
1406 }
1407
1408 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1409 if (p_dev != NULL) {
1410 //BTA_HhGetIdle(p_dev->dev_handle);
1411 }
1412 else {
1413 return BT_STATUS_FAIL;
1414 }
1415 return BT_STATUS_SUCCESS;
1416 }
1417
1418 /*******************************************************************************
1419 **
1420 ** Function set_idle_time
1421 **
1422 ** Description Set the HID idle time
1423 **
1424 ** Returns bt_status_t
1425 **
1426 *******************************************************************************/
set_idle_time(bt_bdaddr_t * bd_addr,uint8_t idle_time)1427 static bt_status_t set_idle_time (bt_bdaddr_t *bd_addr, uint8_t idle_time)
1428 {
1429 CHECK_BTHH_INIT();
1430 btif_hh_device_t *p_dev;
1431 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1432
1433 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1434 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1435
1436 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1437 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1438 return BT_STATUS_FAIL;
1439 }
1440
1441 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1442 if (p_dev == NULL) {
1443 BTIF_TRACE_WARNING6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1444 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1445 return BT_STATUS_FAIL;
1446 }
1447 else {
1448 //BTA_HhSetIdle(p_dev->dev_handle, idle_time);
1449 }
1450 return BT_STATUS_SUCCESS;
1451 }
1452
1453 /*******************************************************************************
1454 **
1455 ** Function get_protocol
1456 **
1457 ** Description Get the HID proto mode.
1458 **
1459 ** Returns bt_status_t
1460 **
1461 *******************************************************************************/
get_protocol(bt_bdaddr_t * bd_addr,bthh_protocol_mode_t protocolMode)1462 static bt_status_t get_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1463 {
1464 CHECK_BTHH_INIT();
1465 btif_hh_device_t *p_dev;
1466 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1467
1468 BTIF_TRACE_DEBUG6(" addr = %02X:%02X:%02X:%02X:%02X:%02X",
1469 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1470
1471 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1472 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1473 return BT_STATUS_FAIL;
1474 }
1475
1476 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1477 if (p_dev != NULL) {
1478 BTA_HhGetProtoMode(p_dev->dev_handle);
1479 }
1480 else {
1481 return BT_STATUS_FAIL;
1482 }
1483 return BT_STATUS_SUCCESS;
1484 }
1485
1486 /*******************************************************************************
1487 **
1488 ** Function set_protocol
1489 **
1490 ** Description Set the HID proto mode.
1491 **
1492 ** Returns bt_status_t
1493 **
1494 *******************************************************************************/
set_protocol(bt_bdaddr_t * bd_addr,bthh_protocol_mode_t protocolMode)1495 static bt_status_t set_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1496 {
1497 CHECK_BTHH_INIT();
1498 btif_hh_device_t *p_dev;
1499 UINT8 proto_mode = protocolMode;
1500 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1501
1502 BTIF_TRACE_DEBUG2("%s:proto_mode = %d", __FUNCTION__,protocolMode);
1503
1504 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1505 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1506
1507 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1508 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1509 return BT_STATUS_FAIL;
1510 }
1511
1512 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1513 if (p_dev == NULL) {
1514 BTIF_TRACE_WARNING6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1515 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1516 return BT_STATUS_FAIL;
1517 }
1518 else if (protocolMode != BTA_HH_PROTO_RPT_MODE && protocolMode != BTA_HH_PROTO_BOOT_MODE) {
1519 BTIF_TRACE_WARNING2("s: Error, device proto_mode = %d.", __FUNCTION__, proto_mode);
1520 return BT_STATUS_FAIL;
1521 }
1522 else {
1523 BTA_HhSetProtoMode(p_dev->dev_handle, protocolMode);
1524 }
1525
1526
1527 return BT_STATUS_SUCCESS;
1528 }
1529
1530 /*******************************************************************************
1531 **
1532 ** Function get_report
1533 **
1534 ** Description Send a GET_REPORT to HID device.
1535 **
1536 ** Returns bt_status_t
1537 **
1538 *******************************************************************************/
get_report(bt_bdaddr_t * bd_addr,bthh_report_type_t reportType,uint8_t reportId,int bufferSize)1539 static bt_status_t get_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize)
1540 {
1541 CHECK_BTHH_INIT();
1542 btif_hh_device_t *p_dev;
1543 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1544
1545 BTIF_TRACE_DEBUG4("%s:proto_mode = %dr_type = %d, rpt_id = %d, buf_size = %d", __FUNCTION__,
1546 reportType, reportId, bufferSize);
1547
1548 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1549 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1550
1551 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1552 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1553 return BT_STATUS_FAIL;
1554 }
1555
1556
1557 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1558 if (p_dev == NULL) {
1559 BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1560 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1561 return BT_STATUS_FAIL;
1562 }
1563 else if ( ((int) reportType) <= BTA_HH_RPTT_RESRV || ((int) reportType) > BTA_HH_RPTT_FEATURE) {
1564 BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1565 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1566 return BT_STATUS_FAIL;
1567 }
1568 else {
1569 BTA_HhGetReport(p_dev->dev_handle, reportType,
1570 reportId, bufferSize);
1571 }
1572
1573 return BT_STATUS_SUCCESS;
1574 }
1575
1576 /*******************************************************************************
1577 **
1578 ** Function set_report
1579 **
1580 ** Description Send a SET_REPORT to HID device.
1581 **
1582 ** Returns bt_status_t
1583 **
1584 *******************************************************************************/
set_report(bt_bdaddr_t * bd_addr,bthh_report_type_t reportType,char * report)1585 static bt_status_t set_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report)
1586 {
1587 CHECK_BTHH_INIT();
1588 btif_hh_device_t *p_dev;
1589 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1590
1591 BTIF_TRACE_DEBUG2("%s:reportType = %d", __FUNCTION__,reportType);
1592
1593 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1594 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1595
1596
1597 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1598 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1599 return BT_STATUS_FAIL;
1600 }
1601
1602 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1603 if (p_dev == NULL) {
1604 BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1605 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1606 return BT_STATUS_FAIL;
1607 }
1608 else if ( ( (int) reportType) <= BTA_HH_RPTT_RESRV || ( (int) reportType) > BTA_HH_RPTT_FEATURE) {
1609 BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1610 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1611 return BT_STATUS_FAIL;
1612 }
1613 else {
1614 int hex_bytes_filled;
1615 UINT8 hexbuf[200];
1616 UINT16 len = (strlen(report) + 1) / 2;
1617
1618 if (p_dev->p_buf != NULL) {
1619 GKI_freebuf(p_dev->p_buf);
1620 }
1621 p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
1622 if (p_dev->p_buf == NULL) {
1623 BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len);
1624 return BT_STATUS_FAIL;
1625 }
1626
1627 p_dev->p_buf->len = len;
1628 p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
1629
1630 /* Build a SetReport data buffer */
1631 memset(hexbuf, 0, 200);
1632 //TODO
1633 hex_bytes_filled = ascii_2_hex(report, len, hexbuf);
1634 ALOGI("Hex bytes filled, hex value: %d", hex_bytes_filled);
1635
1636 if (hex_bytes_filled) {
1637 UINT8* pbuf_data;
1638 pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset;
1639 memcpy(pbuf_data, hexbuf, hex_bytes_filled);
1640 BTA_HhSetReport(p_dev->dev_handle, reportType, p_dev->p_buf);
1641 }
1642 return BT_STATUS_SUCCESS;
1643 }
1644
1645
1646 }
1647
1648 /*******************************************************************************
1649 **
1650 ** Function send_data
1651 **
1652 ** Description Send a SEND_DATA to HID device.
1653 **
1654 ** Returns bt_status_t
1655 **
1656 *******************************************************************************/
send_data(bt_bdaddr_t * bd_addr,char * data)1657 static bt_status_t send_data (bt_bdaddr_t *bd_addr, char* data)
1658 {
1659 CHECK_BTHH_INIT();
1660 btif_hh_device_t *p_dev;
1661 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1662
1663 BTIF_TRACE_DEBUG1("%s", __FUNCTION__);
1664
1665 BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1666 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1667
1668 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1669 BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1670 return BT_STATUS_FAIL;
1671 }
1672
1673 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1674 if (p_dev == NULL) {
1675 BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1676 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1677 return BT_STATUS_FAIL;
1678 }
1679
1680 else {
1681 int hex_bytes_filled;
1682 UINT8 hexbuf[200];
1683 UINT16 len = (strlen(data) + 1) / 2;
1684
1685 if (p_dev->p_buf != NULL) {
1686 GKI_freebuf(p_dev->p_buf);
1687 }
1688 p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
1689 if (p_dev->p_buf == NULL) {
1690 BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len);
1691 return BT_STATUS_FAIL;
1692 }
1693
1694 p_dev->p_buf->len = len;
1695 p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
1696
1697 /* Build a SetReport data buffer */
1698 memset(hexbuf, 0, 200);
1699 hex_bytes_filled = ascii_2_hex(data, len, hexbuf);
1700 BTIF_TRACE_ERROR2("Hex bytes filled, hex value: %d, %d", hex_bytes_filled, len);
1701
1702 if (hex_bytes_filled) {
1703 UINT8* pbuf_data;
1704 pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset;
1705 memcpy(pbuf_data, hexbuf, hex_bytes_filled);
1706 p_dev->p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
1707 BTA_HhSendData(p_dev->dev_handle, *bda, p_dev->p_buf);
1708 return BT_STATUS_SUCCESS;
1709 }
1710
1711 }
1712 return BT_STATUS_FAIL;
1713 }
1714
1715
1716 /*******************************************************************************
1717 **
1718 ** Function cleanup
1719 **
1720 ** Description Closes the HH interface
1721 **
1722 ** Returns bt_status_t
1723 **
1724 *******************************************************************************/
cleanup(void)1725 static void cleanup( void )
1726 {
1727 BTIF_TRACE_EVENT1("%s", __FUNCTION__);
1728 btif_hh_device_t *p_dev;
1729 int i;
1730 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1731 BTIF_TRACE_WARNING2("%s: HH disabling or disabled already, status = %d", __FUNCTION__, btif_hh_cb.status);
1732 return;
1733 }
1734 btif_hh_cb.status = BTIF_HH_DISABLING;
1735 for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1736 p_dev = &btif_hh_cb.devices[i];
1737 if (p_dev->dev_status != BTHH_CONN_STATE_UNKNOWN && p_dev->fd >= 0) {
1738 BTIF_TRACE_DEBUG2("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
1739 bta_hh_co_destroy(p_dev->fd);
1740 p_dev->fd = -1;
1741 p_dev->hh_keep_polling = 0;
1742 p_dev->hh_poll_thread_id = -1;
1743 }
1744 }
1745
1746 if (bt_hh_callbacks)
1747 {
1748 btif_disable_service(BTA_HID_SERVICE_ID);
1749 bt_hh_callbacks = NULL;
1750 }
1751
1752 }
1753
1754 static const bthh_interface_t bthhInterface = {
1755 sizeof(bthhInterface),
1756 init,
1757 connect,
1758 disconnect,
1759 virtual_unplug,
1760 set_info,
1761 get_protocol,
1762 set_protocol,
1763 // get_idle_time,
1764 // set_idle_time,
1765 get_report,
1766 set_report,
1767 send_data,
1768 cleanup,
1769 };
1770
1771 /*******************************************************************************
1772 **
1773 ** Function btif_hh_execute_service
1774 **
1775 ** Description Initializes/Shuts down the service
1776 **
1777 ** Returns BT_STATUS_SUCCESS on success, BT_STATUS_FAIL otherwise
1778 **
1779 *******************************************************************************/
btif_hh_execute_service(BOOLEAN b_enable)1780 bt_status_t btif_hh_execute_service(BOOLEAN b_enable)
1781 {
1782 if (b_enable)
1783 {
1784 /* Enable and register with BTA-HH */
1785 BTA_HhEnable(BTA_SEC_NONE, bte_hh_evt);
1786 }
1787 else {
1788 /* Disable HH */
1789 BTA_HhDisable();
1790 }
1791 return BT_STATUS_SUCCESS;
1792 }
1793
1794 /*******************************************************************************
1795 **
1796 ** Function btif_hh_get_interface
1797 **
1798 ** Description Get the hh callback interface
1799 **
1800 ** Returns bthh_interface_t
1801 **
1802 *******************************************************************************/
btif_hh_get_interface()1803 const bthh_interface_t *btif_hh_get_interface()
1804 {
1805 BTIF_TRACE_EVENT1("%s", __FUNCTION__);
1806 return &bthhInterface;
1807 }
1808