1 /******************************************************************************
2 *
3 * Copyright (C) 2009-2012 Broadcom Corporation
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 *
17 ******************************************************************************/
18
19 /************************************************************************************
20 *
21 * Filename: btif_hh.c
22 *
23 * Description: HID Host Profile Bluetooth Interface
24 *
25 *
26 ***********************************************************************************/
27 #include <hardware/bluetooth.h>
28 #include <hardware/bt_hh.h>
29 #include <stdio.h>
30 #include <stdlib.h>
31 #include <errno.h>
32 #include <string.h>
33
34 #define LOG_TAG "BTIF_HH"
35
36 #include "bta_api.h"
37 #include "bta_hh_api.h"
38 #include "bd.h"
39 #include "btif_storage.h"
40
41 #include "btif_common.h"
42 #include "btif_util.h"
43 #include "btif_hh.h"
44 #include "gki.h"
45 #include "l2c_api.h"
46
47
48 #define BTIF_HH_APP_ID_MI 0x01
49 #define BTIF_HH_APP_ID_KB 0x02
50
51 #define COD_HID_KEYBOARD 0x0540
52 #define COD_HID_POINTING 0x0580
53 #define COD_HID_COMBO 0x05C0
54 #define COD_HID_MAJOR 0x0500
55
56 #define KEYSTATE_FILEPATH "/data/misc/bluedroid/bt_hh_ks" //keep this in sync with HID host jni
57
58 #define HID_REPORT_CAPSLOCK 0x39
59 #define HID_REPORT_NUMLOCK 0x53
60 #define HID_REPORT_SCROLLLOCK 0x47
61
62 //For Apple Magic Mouse
63 #define MAGICMOUSE_VENDOR_ID 0x05ac
64 #define MAGICMOUSE_PRODUCT_ID 0x030d
65
66 #define LOGITECH_KB_MX5500_VENDOR_ID 0x046D
67 #define LOGITECH_KB_MX5500_PRODUCT_ID 0xB30B
68
69 extern const int BT_UID;
70 extern const int BT_GID;
71 static int btif_hh_prev_keyevents=0; //The previous key events
72 static int btif_hh_keylockstates=0; //The current key state of each key
73
74 #define BTIF_HH_ID_1 0
75 #define BTIF_HH_DEV_DISCONNECTED 3
76
77 #define BTIF_TIMEOUT_VUP_SECS 3
78
79
80 #ifndef BTUI_HH_SECURITY
81 #define BTUI_HH_SECURITY (BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT)
82 #endif
83
84 #ifndef BTUI_HH_MOUSE_SECURITY
85 #define BTUI_HH_MOUSE_SECURITY (BTA_SEC_NONE)
86 #endif
87
88 /* HH request events */
89 typedef enum
90 {
91 BTIF_HH_CONNECT_REQ_EVT = 0,
92 BTIF_HH_DISCONNECT_REQ_EVT,
93 BTIF_HH_VUP_REQ_EVT
94 } btif_hh_req_evt_t;
95
96
97 /************************************************************************************
98 ** Constants & Macros
99 ************************************************************************************/
100 #define BTIF_HH_SERVICES (BTA_HID_SERVICE_MASK)
101
102
103
104 /************************************************************************************
105 ** Local type definitions
106 ************************************************************************************/
107
108 typedef struct hid_kb_list
109 {
110 UINT16 product_id;
111 UINT16 version_id;
112 char* kb_name;
113 } tHID_KB_LIST;
114
115 /************************************************************************************
116 ** Static variables
117 ************************************************************************************/
118 btif_hh_cb_t btif_hh_cb;
119
120 static bthh_callbacks_t *bt_hh_callbacks = NULL;
121
122 /* List of HID keyboards for which the NUMLOCK state needs to be
123 * turned ON by default. Add devices to this list to apply the
124 * NUMLOCK state toggle on fpr first connect.*/
125 static tHID_KB_LIST hid_kb_numlock_on_list[] =
126 {
127 {LOGITECH_KB_MX5500_PRODUCT_ID,
128 LOGITECH_KB_MX5500_VENDOR_ID,
129 "Logitech MX5500 Keyboard"}
130 };
131
132
133 #define CHECK_BTHH_INIT() if (bt_hh_callbacks == NULL)\
134 {\
135 BTIF_TRACE_WARNING("BTHH: %s: BTHH not initialized", __FUNCTION__);\
136 return BT_STATUS_NOT_READY;\
137 }\
138 else\
139 {\
140 BTIF_TRACE_EVENT("BTHH: %s", __FUNCTION__);\
141 }
142
143
144
145 /************************************************************************************
146 ** Static functions
147 ************************************************************************************/
148
149 /************************************************************************************
150 ** Externs
151 ************************************************************************************/
152 extern void bta_hh_co_destroy(int fd);
153 extern void bta_hh_co_write(int fd, UINT8* rpt, UINT16 len);
154 extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
155 extern void bta_hh_co_send_hid_info(btif_hh_device_t *p_dev, char *dev_name, UINT16 vendor_id,
156 UINT16 product_id, UINT16 version, UINT8 ctry_code,
157 int dscp_len, UINT8 *p_dscp);
158 extern BOOLEAN check_cod(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
159 extern void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr);
160 extern BOOLEAN check_cod_hid(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
161 extern int scru_ascii_2_hex(char *p_ascii, int len, UINT8 *p_hex);
162 extern void btif_dm_hh_open_failed(bt_bdaddr_t *bdaddr);
163
164 /*****************************************************************************
165 ** Local Function prototypes
166 *****************************************************************************/
167 static void set_keylockstate(int keymask, BOOLEAN isSet);
168 static void toggle_os_keylockstates(int fd, int changedkeystates);
169 static void sync_lockstate_on_connect(btif_hh_device_t *p_dev);
170 //static void hh_update_keyboard_lockstates(btif_hh_device_t *p_dev);
171 void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle);
172
173
174 /************************************************************************************
175 ** Functions
176 ************************************************************************************/
177
get_keylockstates()178 static int get_keylockstates()
179 {
180 return btif_hh_keylockstates;
181 }
182
set_keylockstate(int keymask,BOOLEAN isSet)183 static void set_keylockstate(int keymask, BOOLEAN isSet)
184 {
185 if(isSet)
186 btif_hh_keylockstates |= keymask;
187 }
188
189 /*******************************************************************************
190 **
191 ** Function toggle_os_keylockstates
192 **
193 ** Description Function to toggle the keyboard lock states managed by the linux.
194 ** This function is used in by two call paths
195 ** (1) if the lock state change occurred from an onscreen keyboard,
196 ** this function is called to update the lock state maintained
197 for the HID keyboard(s)
198 ** (2) if a HID keyboard is disconnected and reconnected,
199 ** this function is called to update the lock state maintained
200 for the HID keyboard(s)
201 ** Returns void
202 *******************************************************************************/
203
toggle_os_keylockstates(int fd,int changedlockstates)204 static void toggle_os_keylockstates(int fd, int changedlockstates)
205 {
206 BTIF_TRACE_EVENT("%s: fd = %d, changedlockstates = 0x%x",
207 __FUNCTION__, fd, changedlockstates);
208 UINT8 hidreport[9];
209 int reportIndex;
210 memset(hidreport,0,9);
211 hidreport[0]=1;
212 reportIndex=4;
213
214 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_CAPSLOCK) {
215 BTIF_TRACE_DEBUG("%s Setting CAPSLOCK", __FUNCTION__);
216 hidreport[reportIndex++] = (UINT8)HID_REPORT_CAPSLOCK;
217 }
218
219 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_NUMLOCK) {
220 BTIF_TRACE_DEBUG("%s Setting NUMLOCK", __FUNCTION__);
221 hidreport[reportIndex++] = (UINT8)HID_REPORT_NUMLOCK;
222 }
223
224 if (changedlockstates & BTIF_HH_KEYSTATE_MASK_SCROLLLOCK) {
225 BTIF_TRACE_DEBUG("%s Setting SCROLLLOCK", __FUNCTION__);
226 hidreport[reportIndex++] = (UINT8) HID_REPORT_SCROLLLOCK;
227 }
228
229 BTIF_TRACE_DEBUG("Writing hidreport #1 to os: "\
230 "%s: %x %x %x", __FUNCTION__,
231 hidreport[0], hidreport[1], hidreport[2]);
232 BTIF_TRACE_DEBUG("%s: %x %x %x", __FUNCTION__,
233 hidreport[3], hidreport[4], hidreport[5]);
234 BTIF_TRACE_DEBUG("%s: %x %x %x", __FUNCTION__,
235 hidreport[6], hidreport[7], hidreport[8]);
236 bta_hh_co_write(fd , hidreport, sizeof(hidreport));
237 usleep(200000);
238 memset(hidreport,0,9);
239 hidreport[0]=1;
240 BTIF_TRACE_DEBUG("Writing hidreport #2 to os: "\
241 "%s: %x %x %x", __FUNCTION__,
242 hidreport[0], hidreport[1], hidreport[2]);
243 BTIF_TRACE_DEBUG("%s: %x %x %x", __FUNCTION__,
244 hidreport[3], hidreport[4], hidreport[5]);
245 BTIF_TRACE_DEBUG("%s: %x %x %x ", __FUNCTION__,
246 hidreport[6], hidreport[7], hidreport[8]);
247 bta_hh_co_write(fd , hidreport, sizeof(hidreport));
248 }
249
250 /*******************************************************************************
251 **
252 ** Function create_pbuf
253 **
254 ** Description Helper function to create p_buf for send_data or set_report
255 **
256 *******************************************************************************/
create_pbuf(UINT16 len,UINT8 * data)257 static BT_HDR *create_pbuf(UINT16 len, UINT8 *data)
258 {
259 BT_HDR* p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
260
261 if (p_buf) {
262 UINT8* pbuf_data;
263
264 p_buf->len = len;
265 p_buf->offset = BTA_HH_MIN_OFFSET;
266
267 pbuf_data = (UINT8*) (p_buf + 1) + p_buf->offset;
268 memcpy(pbuf_data, data, len);
269 }
270 return p_buf;
271 }
272
273 /*******************************************************************************
274 **
275 ** Function update_keyboard_lockstates
276 **
277 ** Description Sends a report to the keyboard to set the lock states of keys
278 **
279 *******************************************************************************/
update_keyboard_lockstates(btif_hh_device_t * p_dev)280 static void update_keyboard_lockstates(btif_hh_device_t *p_dev)
281 {
282 UINT8 len = 2; /* reportid + 1 byte report*/
283 BD_ADDR* bda;
284 BT_HDR* p_buf;
285 UINT8 data[] = {0x01, /* report id */
286 btif_hh_keylockstates}; /* keystate */
287
288 /* Set report for other keyboards */
289 BTIF_TRACE_EVENT("%s: setting report on dev_handle %d to 0x%x",
290 __FUNCTION__, p_dev->dev_handle, btif_hh_keylockstates);
291
292 /* Get SetReport buffer */
293 p_buf = create_pbuf(len, data);
294 if (p_buf != NULL) {
295 p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
296 bda = (BD_ADDR*) (&p_dev->bd_addr);
297 BTA_HhSendData(p_dev->dev_handle, *bda, p_buf);
298 }
299 }
300
301 /*******************************************************************************
302 **
303 ** Function sync_lockstate_on_connect
304 **
305 ** Description Function to update the keyboard lock states managed by the OS
306 ** when a HID keyboard is connected or disconnected and reconnected
307 ** Returns void
308 *******************************************************************************/
sync_lockstate_on_connect(btif_hh_device_t * p_dev)309 static void sync_lockstate_on_connect(btif_hh_device_t *p_dev)
310 {
311 int keylockstates;
312
313 BTIF_TRACE_EVENT("%s: Syncing keyboard lock states after "\
314 "reconnect...",__FUNCTION__);
315 /*If the device is connected, update keyboard state */
316 update_keyboard_lockstates(p_dev);
317
318 /*Check if the lockstate of caps,scroll,num is set.
319 If so, send a report to the kernel
320 so the lockstate is in sync */
321 keylockstates = get_keylockstates();
322 if (keylockstates)
323 {
324 BTIF_TRACE_DEBUG("%s: Sending hid report to kernel "\
325 "indicating lock key state 0x%x",__FUNCTION__,
326 keylockstates);
327 usleep(200000);
328 toggle_os_keylockstates(p_dev->fd, keylockstates);
329 }
330 else
331 {
332 BTIF_TRACE_DEBUG("%s: NOT sending hid report to kernel "\
333 "indicating lock key state 0x%x",__FUNCTION__,
334 keylockstates);
335 }
336 }
337
338 /*******************************************************************************
339 **
340 ** Function btif_hh_find_connected_dev_by_handle
341 **
342 ** Description Return the connected device pointer of the specified device handle
343 **
344 ** Returns Device entry pointer in the device table
345 *******************************************************************************/
btif_hh_find_connected_dev_by_handle(UINT8 handle)346 btif_hh_device_t *btif_hh_find_connected_dev_by_handle(UINT8 handle)
347 {
348 UINT32 i;
349 for (i = 0; i < BTIF_HH_MAX_HID; i++) {
350 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
351 btif_hh_cb.devices[i].dev_handle == handle)
352 {
353 return &btif_hh_cb.devices[i];
354 }
355 }
356 return NULL;
357 }
358
359 /*******************************************************************************
360 **
361 ** Function btif_hh_find_dev_by_bda
362 **
363 ** Description Return the device pointer of the specified bt_bdaddr_t.
364 **
365 ** Returns Device entry pointer in the device table
366 *******************************************************************************/
btif_hh_find_dev_by_bda(bt_bdaddr_t * bd_addr)367 static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr)
368 {
369 UINT32 i;
370 for (i = 0; i < BTIF_HH_MAX_HID; i++) {
371 if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN &&
372 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
373 {
374 return &btif_hh_cb.devices[i];
375 }
376 }
377 return NULL;
378 }
379
380 /*******************************************************************************
381 **
382 ** Function btif_hh_find_connected_dev_by_bda
383 **
384 ** Description Return the connected device pointer of the specified bt_bdaddr_t.
385 **
386 ** Returns Device entry pointer in the device table
387 *******************************************************************************/
btif_hh_find_connected_dev_by_bda(bt_bdaddr_t * bd_addr)388 static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr)
389 {
390 UINT32 i;
391 for (i = 0; i < BTIF_HH_MAX_HID; i++) {
392 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
393 memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
394 {
395 return &btif_hh_cb.devices[i];
396 }
397 }
398 return NULL;
399 }
400
401 /*******************************************************************************
402 **
403 ** Function btif_hh_stop_vup_timer
404 **
405 ** Description stop vitual unplug timer
406 **
407 ** Returns void
408 *******************************************************************************/
btif_hh_stop_vup_timer(bt_bdaddr_t * bd_addr)409 void btif_hh_stop_vup_timer(bt_bdaddr_t *bd_addr)
410 {
411 btif_hh_device_t *p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
412 if(p_dev != NULL)
413 {
414 if (p_dev->vup_timer_active)
415 {
416 BTIF_TRACE_DEBUG("stop VUP timer ");
417 btu_stop_timer(&p_dev->vup_timer);
418 }
419 p_dev->vup_timer_active = FALSE;
420 }
421 }
422 /*******************************************************************************
423 **
424 ** Function btif_hh_start_vup_timer
425 **
426 ** Description start virtual unplug timer
427 **
428 ** Returns void
429 *******************************************************************************/
btif_hh_start_vup_timer(bt_bdaddr_t * bd_addr)430 void btif_hh_start_vup_timer(bt_bdaddr_t *bd_addr)
431 {
432 btif_hh_device_t *p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
433
434 if (p_dev->vup_timer_active == FALSE)
435 {
436 BTIF_TRACE_DEBUG("Start VUP timer ");
437 memset(&p_dev->vup_timer, 0, sizeof(TIMER_LIST_ENT));
438 p_dev->vup_timer.param = (UINT32)btif_hh_tmr_hdlr;
439 btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
440 BTIF_TIMEOUT_VUP_SECS);
441 }
442 else
443 {
444 BTIF_TRACE_DEBUG("Restart VUP timer ");
445 btu_stop_timer(&p_dev->vup_timer);
446 btu_start_timer(&p_dev->vup_timer, BTU_TTYPE_USER_FUNC,
447 BTIF_TIMEOUT_VUP_SECS);
448 }
449 p_dev->vup_timer_active = TRUE;
450
451 }
452
453 /*******************************************************************************
454 **
455 ** Function btif_hh_add_added_dev
456 **
457 ** Description Add a new device to the added device list.
458 **
459 ** Returns TRUE if add successfully, otherwise FALSE.
460 *******************************************************************************/
btif_hh_add_added_dev(bt_bdaddr_t bda,tBTA_HH_ATTR_MASK attr_mask)461 BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bda, tBTA_HH_ATTR_MASK attr_mask)
462 {
463 int i;
464 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
465 if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN) == 0) {
466 BTIF_TRACE_WARNING(" Device %02X:%02X:%02X:%02X:%02X:%02X already added",
467 bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
468 return FALSE;
469 }
470 }
471 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
472 if (btif_hh_cb.added_devices[i].bd_addr.address[0] == 0 &&
473 btif_hh_cb.added_devices[i].bd_addr.address[1] == 0 &&
474 btif_hh_cb.added_devices[i].bd_addr.address[2] == 0 &&
475 btif_hh_cb.added_devices[i].bd_addr.address[3] == 0 &&
476 btif_hh_cb.added_devices[i].bd_addr.address[4] == 0 &&
477 btif_hh_cb.added_devices[i].bd_addr.address[5] == 0)
478 {
479 BTIF_TRACE_WARNING(" Added device %02X:%02X:%02X:%02X:%02X:%02X",
480 bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
481 memcpy(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN);
482 btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
483 btif_hh_cb.added_devices[i].attr_mask = attr_mask;
484 return TRUE;
485 }
486 }
487
488 BTIF_TRACE_WARNING("%s: Error, out of space to add device",__FUNCTION__);
489 return FALSE;
490 }
491
492 /*******************************************************************************
493 **
494 ** Function btif_hh_remove_device
495 **
496 ** Description Remove an added device from the stack.
497 **
498 ** Returns void
499 *******************************************************************************/
btif_hh_remove_device(bt_bdaddr_t bd_addr)500 void btif_hh_remove_device(bt_bdaddr_t bd_addr)
501 {
502 int i;
503 btif_hh_device_t *p_dev;
504 btif_hh_added_device_t *p_added_dev;
505
506 ALOGI("%s: bda = %02x:%02x:%02x:%02x:%02x:%02x", __FUNCTION__,
507 bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
508
509 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
510 p_added_dev = &btif_hh_cb.added_devices[i];
511 if (memcmp(&(p_added_dev->bd_addr),&bd_addr, 6) == 0) {
512 BTA_HhRemoveDev(p_added_dev->dev_handle);
513 btif_storage_remove_hid_info(&(p_added_dev->bd_addr));
514 memset(&(p_added_dev->bd_addr), 0, 6);
515 p_added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
516 break;
517 }
518 }
519
520 p_dev = btif_hh_find_dev_by_bda(&bd_addr);
521 if (p_dev == NULL) {
522 BTIF_TRACE_WARNING(" Oops, can't find device [%02x:%02x:%02x:%02x:%02x:%02x]",
523 bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
524 return;
525 }
526
527 /* need to notify up-layer device is disconnected to avoid state out of sync with up-layer */
528 HAL_CBACK(bt_hh_callbacks, connection_state_cb, &(p_dev->bd_addr), BTHH_CONN_STATE_DISCONNECTED);
529
530 p_dev->dev_status = BTHH_CONN_STATE_UNKNOWN;
531 p_dev->dev_handle = BTA_HH_INVALID_HANDLE;
532 if (btif_hh_cb.device_num > 0) {
533 btif_hh_cb.device_num--;
534 }
535 else {
536 BTIF_TRACE_WARNING("%s: device_num = 0", __FUNCTION__);
537 }
538
539 p_dev->hh_keep_polling = 0;
540 p_dev->hh_poll_thread_id = -1;
541 BTIF_TRACE_DEBUG("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
542 if (p_dev->fd >= 0) {
543 bta_hh_co_destroy(p_dev->fd);
544 p_dev->fd = -1;
545 }
546 }
547
548
btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO * dest,tBTA_HH_DEV_DSCP_INFO * src)549 BOOLEAN btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO* dest , tBTA_HH_DEV_DSCP_INFO* src)
550 {
551 dest->descriptor.dl_len = 0;
552 if (src->descriptor.dl_len >0)
553 {
554 dest->descriptor.dsc_list = (UINT8 *) GKI_getbuf(src->descriptor.dl_len);
555 if (dest->descriptor.dsc_list == NULL)
556 {
557 BTIF_TRACE_WARNING("%s: Failed to allocate DSCP for CB", __FUNCTION__);
558 return FALSE;
559 }
560 }
561 memcpy(dest->descriptor.dsc_list, src->descriptor.dsc_list, src->descriptor.dl_len);
562 dest->descriptor.dl_len = src->descriptor.dl_len;
563 dest->vendor_id = src->vendor_id;
564 dest->product_id = src->product_id;
565 dest->version = src->version;
566 dest->ctry_code = src->ctry_code;
567 dest->ssr_max_latency = src->ssr_max_latency;
568 dest->ssr_min_tout = src->ssr_min_tout;
569 return TRUE;
570 }
571
572
573 /*******************************************************************************
574 **
575 ** Function btif_hh_virtual_unplug
576 **
577 ** Description Virtual unplug initiated from the BTIF thread context
578 ** Special handling for HID mouse-
579 **
580 ** Returns void
581 **
582 *******************************************************************************/
583
btif_hh_virtual_unplug(bt_bdaddr_t * bd_addr)584 bt_status_t btif_hh_virtual_unplug(bt_bdaddr_t *bd_addr)
585 {
586 BTIF_TRACE_DEBUG("%s", __FUNCTION__);
587 btif_hh_device_t *p_dev;
588 char bd_str[18];
589 sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
590 bd_addr->address[0], bd_addr->address[1], bd_addr->address[2], bd_addr->address[3],
591 bd_addr->address[4], bd_addr->address[5]);
592 p_dev = btif_hh_find_dev_by_bda(bd_addr);
593 if ((p_dev != NULL) && (p_dev->dev_status == BTHH_CONN_STATE_CONNECTED)
594 && (p_dev->attr_mask & HID_VIRTUAL_CABLE))
595 {
596 BTIF_TRACE_DEBUG("%s Sending BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG", __FUNCTION__);
597 /* start the timer */
598 btif_hh_start_vup_timer(bd_addr);
599 p_dev->local_vup = TRUE;
600 BTA_HhSendCtrl(p_dev->dev_handle, BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG);
601 return BT_STATUS_SUCCESS;
602 }
603 else
604 {
605 BTIF_TRACE_ERROR("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
606 return BT_STATUS_FAIL;
607 }
608 }
609
610 /*******************************************************************************
611 **
612 ** Function btif_hh_connect
613 **
614 ** Description connection initiated from the BTIF thread context
615 **
616 ** Returns int status
617 **
618 *******************************************************************************/
619
btif_hh_connect(bt_bdaddr_t * bd_addr)620 bt_status_t btif_hh_connect(bt_bdaddr_t *bd_addr)
621 {
622 btif_hh_device_t *dev;
623 btif_hh_added_device_t *added_dev = NULL;
624 char bda_str[20];
625 int i;
626 BD_ADDR *bda = (BD_ADDR*)bd_addr;
627 tBTA_HH_CONN conn;
628 CHECK_BTHH_INIT();
629 dev = btif_hh_find_dev_by_bda(bd_addr);
630 BTIF_TRACE_DEBUG("Connect _hh");
631 sprintf(bda_str, "%02X:%02X:%02X:%02X:%02X:%02X",
632 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
633 if (dev == NULL && btif_hh_cb.device_num >= BTIF_HH_MAX_HID) {
634 // No space for more HID device now.
635 BTIF_TRACE_WARNING("%s: Error, exceeded the maximum supported HID device number %d",
636 __FUNCTION__, BTIF_HH_MAX_HID);
637 return BT_STATUS_FAIL;
638 }
639
640 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
641 if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) {
642 added_dev = &btif_hh_cb.added_devices[i];
643 BTIF_TRACE_WARNING("%s: Device %s already added, attr_mask = 0x%x",
644 __FUNCTION__, bda_str, added_dev->attr_mask);
645 }
646 }
647
648 if (added_dev != NULL) {
649 if (added_dev->dev_handle == BTA_HH_INVALID_HANDLE) {
650 // No space for more HID device now.
651 BTIF_TRACE_ERROR("%s: Error, device %s added but addition failed", __FUNCTION__, bda_str);
652 memset(&(added_dev->bd_addr), 0, 6);
653 added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
654 return BT_STATUS_FAIL;
655 }
656 }
657
658 if (added_dev == NULL ||
659 (added_dev->attr_mask & HID_NORMALLY_CONNECTABLE) != 0 ||
660 (added_dev->attr_mask & HID_RECONN_INIT) == 0)
661 {
662 tBTA_SEC sec_mask = BTUI_HH_SECURITY;
663 btif_hh_cb.status = BTIF_HH_DEV_CONNECTING;
664 BD_ADDR *bda = (BD_ADDR*)bd_addr;
665 BTA_HhOpen(*bda, BTA_HH_PROTO_RPT_MODE, sec_mask);
666 }
667 else
668 {
669 // This device shall be connected from the host side.
670 BTIF_TRACE_ERROR("%s: Error, device %s can only be reconnected from device side",
671 __FUNCTION__, bda_str);
672 return BT_STATUS_FAIL;
673 }
674
675 HAL_CBACK(bt_hh_callbacks, connection_state_cb, bd_addr, BTHH_CONN_STATE_CONNECTING);
676 return BT_STATUS_SUCCESS;
677 }
678
679 /*******************************************************************************
680 **
681 ** Function btif_hh_disconnect
682 **
683 ** Description disconnection initiated from the BTIF thread context
684 **
685 ** Returns void
686 **
687 *******************************************************************************/
688
btif_hh_disconnect(bt_bdaddr_t * bd_addr)689 void btif_hh_disconnect(bt_bdaddr_t *bd_addr)
690 {
691 BD_ADDR *bda = (BD_ADDR*)bd_addr;
692 btif_hh_device_t *p_dev;
693 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
694 if (p_dev != NULL)
695 {
696 BTA_HhClose(p_dev->dev_handle);
697 }
698 else
699 BTIF_TRACE_DEBUG("%s-- Error: device not connected:",__FUNCTION__);
700 }
701
702 /*******************************************************************************
703 **
704 ** Function btif_btif_hh_setreport
705 **
706 ** Description setreport initiated from the BTIF thread context
707 **
708 ** Returns void
709 **
710 *******************************************************************************/
btif_hh_setreport(btif_hh_device_t * p_dev,bthh_report_type_t r_type,UINT16 size,UINT8 * report)711 void btif_hh_setreport(btif_hh_device_t *p_dev, bthh_report_type_t r_type, UINT16 size,
712 UINT8* report)
713 {
714 BT_HDR* p_buf = create_pbuf(size, report);
715 if (p_buf == NULL) {
716 APPL_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, size = %d", __FUNCTION__, size);
717 return;
718 }
719 BTA_HhSetReport(p_dev->dev_handle, r_type, p_buf);
720 }
721
722 /*****************************************************************************
723 ** Section name (Group of functions)
724 *****************************************************************************/
725
726 /*****************************************************************************
727 **
728 ** btif hh api functions (no context switch)
729 **
730 *****************************************************************************/
731
732
733 /*******************************************************************************
734 **
735 ** Function btif_hh_upstreams_evt
736 **
737 ** Description Executes HH UPSTREAMS events in btif context
738 **
739 ** Returns void
740 **
741 *******************************************************************************/
btif_hh_upstreams_evt(UINT16 event,char * p_param)742 static void btif_hh_upstreams_evt(UINT16 event, char* p_param)
743 {
744 tBTA_HH *p_data = (tBTA_HH *)p_param;
745 bdstr_t bdstr;
746 btif_hh_device_t *p_dev = NULL;
747 int i;
748 int len, tmplen;
749
750 BTIF_TRACE_DEBUG("%s: event=%s", __FUNCTION__, dump_hh_event(event));
751
752 switch (event)
753 {
754 case BTA_HH_ENABLE_EVT:
755 BTIF_TRACE_DEBUG("%s: BTA_HH_ENABLE_EVT: status =%d",__FUNCTION__, p_data->status);
756 if (p_data->status == BTA_HH_OK) {
757 btif_hh_cb.status = BTIF_HH_ENABLED;
758 BTIF_TRACE_DEBUG("%s--Loading added devices",__FUNCTION__);
759 /* Add hid descriptors for already bonded hid devices*/
760 btif_storage_load_bonded_hid_info();
761 }
762 else {
763 btif_hh_cb.status = BTIF_HH_DISABLED;
764 BTIF_TRACE_WARNING("BTA_HH_ENABLE_EVT: Error, HH enabling failed, status = %d", p_data->status);
765 }
766 break;
767
768 case BTA_HH_DISABLE_EVT:
769 btif_hh_cb.status = BTIF_HH_DISABLED;
770 if (p_data->status == BTA_HH_OK) {
771 int i;
772 //Clear the control block
773 memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
774 for (i = 0; i < BTIF_HH_MAX_HID; i++){
775 btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
776 }
777 }
778 else
779 BTIF_TRACE_WARNING("BTA_HH_DISABLE_EVT: Error, HH disabling failed, status = %d", p_data->status);
780 break;
781
782 case BTA_HH_OPEN_EVT:
783 BTIF_TRACE_WARNING("%s: BTA_HH_OPN_EVT: handle=%d, status =%d",__FUNCTION__, p_data->conn.handle, p_data->conn.status);
784 if (p_data->conn.status == BTA_HH_OK) {
785 p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
786 if (p_dev == NULL) {
787 BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Error, cannot find device with handle %d", p_data->conn.handle);
788 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
789 // The connect request must come from device side and exceeded the connected
790 // HID device number.
791 BTA_HhClose(p_data->conn.handle);
792 HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
793 }
794 else if (p_dev->fd < 0) {
795 BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Error, failed to find the uhid driver...");
796 memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
797 //remove the connection and then try again to reconnect from the mouse side to recover
798 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
799 BTA_HhClose(p_data->conn.handle);
800 }
801 else {
802 BTIF_TRACE_WARNING("BTA_HH_OPEN_EVT: Found device...Getting dscp info for handle ... %d",p_data->conn.handle);
803 memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
804 btif_hh_cb.status = BTIF_HH_DEV_CONNECTED;
805 // Send set_idle if the peer_device is a keyboard
806 if (check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_KEYBOARD )||
807 check_cod((bt_bdaddr_t*)p_data->conn.bda, COD_HID_COMBO))
808 BTA_HhSetIdle(p_data->conn.handle, 0);
809 btif_hh_cb.p_curr_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
810 BTA_HhGetDscpInfo(p_data->conn.handle);
811 p_dev->dev_status = BTHH_CONN_STATE_CONNECTED;
812 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
813 }
814 }
815 else {
816 bt_bdaddr_t *bdaddr = (bt_bdaddr_t*)p_data->conn.bda;
817 btif_dm_hh_open_failed(bdaddr);
818 HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
819 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
820 }
821 break;
822 case BTA_HH_CLOSE_EVT:
823 BTIF_TRACE_DEBUG("BTA_HH_CLOSE_EVT: status = %d, handle = %d",
824 p_data->dev_status.status, p_data->dev_status.handle);
825 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
826 if (p_dev != NULL) {
827 BTIF_TRACE_DEBUG("%s: uhid fd = %d", __FUNCTION__, p_dev->fd);
828 if(p_dev->vup_timer_active)
829 {
830 btif_hh_stop_vup_timer(&(p_dev->bd_addr));
831 }
832 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
833 p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
834 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
835 BTIF_TRACE_DEBUG("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
836 bta_hh_co_destroy(p_dev->fd);
837 p_dev->fd = -1;
838 }
839 else {
840 BTIF_TRACE_WARNING("Error: cannot find device with handle %d", p_data->dev_status.handle);
841 }
842 break;
843 case BTA_HH_GET_RPT_EVT: {
844 BT_HDR *hdr = p_data->hs_data.rsp_data.p_rpt_data;
845 UINT8 *data = NULL;
846 UINT16 len = 0;
847
848 BTIF_TRACE_DEBUG("BTA_HH_GET_RPT_EVT: status = %d, handle = %d",
849 p_data->hs_data.status, p_data->hs_data.handle);
850 p_dev = btif_hh_find_connected_dev_by_handle(p_data->hs_data.handle);
851 if (p_dev) {
852 /* p_rpt_data is NULL in HANDSHAKE response case */
853 if (hdr) {
854 data = (UINT8 *)(hdr + 1) + hdr->offset;
855 len = hdr->len;
856 HAL_CBACK(bt_hh_callbacks, get_report_cb,
857 (bt_bdaddr_t*) &(p_dev->bd_addr),
858 (bthh_status_t) p_data->hs_data.status, data, len);
859 } else {
860 HAL_CBACK(bt_hh_callbacks, handshake_cb,
861 (bt_bdaddr_t*) &(p_dev->bd_addr),
862 (bthh_status_t) p_data->hs_data.status);
863 }
864 } else {
865 BTIF_TRACE_WARNING("Error: cannot find device with handle %d", p_data->hs_data.handle);
866 }
867 break;
868 }
869 case BTA_HH_SET_RPT_EVT:
870 BTIF_TRACE_DEBUG("BTA_HH_SET_RPT_EVT: status = %d, handle = %d",
871 p_data->dev_status.status, p_data->dev_status.handle);
872 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
873 if (p_dev != NULL) {
874 HAL_CBACK(bt_hh_callbacks, handshake_cb,
875 (bt_bdaddr_t*) &(p_dev->bd_addr),
876 (bthh_status_t) p_data->hs_data.status);
877 }
878 break;
879
880 case BTA_HH_GET_PROTO_EVT:
881 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
882 BTIF_TRACE_WARNING("BTA_HH_GET_PROTO_EVT: status = %d, handle = %d, proto = [%d], %s",
883 p_data->hs_data.status, p_data->hs_data.handle,
884 p_data->hs_data.rsp_data.proto_mode,
885 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_RPT_MODE) ? "Report Mode" :
886 (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_BOOT_MODE) ? "Boot Mode" : "Unsupported");
887 if (p_data->hs_data.rsp_data.proto_mode != BTA_HH_PROTO_UNKNOWN) {
888 HAL_CBACK(bt_hh_callbacks, protocol_mode_cb,
889 (bt_bdaddr_t*) &(p_dev->bd_addr),
890 (bthh_status_t)p_data->hs_data.status,
891 (bthh_protocol_mode_t) p_data->hs_data.rsp_data.proto_mode);
892 } else {
893 HAL_CBACK(bt_hh_callbacks, handshake_cb,
894 (bt_bdaddr_t*) &(p_dev->bd_addr),
895 (bthh_status_t)p_data->hs_data.status);
896 }
897 break;
898
899 case BTA_HH_SET_PROTO_EVT:
900 BTIF_TRACE_DEBUG("BTA_HH_SET_PROTO_EVT: status = %d, handle = %d",
901 p_data->dev_status.status, p_data->dev_status.handle);
902 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
903 if (p_dev) {
904 HAL_CBACK(bt_hh_callbacks, handshake_cb,
905 (bt_bdaddr_t*)&(p_dev->bd_addr),
906 (bthh_status_t)p_data->hs_data.status);
907 }
908 break;
909
910 case BTA_HH_GET_IDLE_EVT:
911 BTIF_TRACE_DEBUG("BTA_HH_GET_IDLE_EVT: handle = %d, status = %d, rate = %d",
912 p_data->hs_data.handle, p_data->hs_data.status,
913 p_data->hs_data.rsp_data.idle_rate);
914 break;
915
916 case BTA_HH_SET_IDLE_EVT:
917 BTIF_TRACE_DEBUG("BTA_HH_SET_IDLE_EVT: status = %d, handle = %d",
918 p_data->dev_status.status, p_data->dev_status.handle);
919 break;
920
921 case BTA_HH_GET_DSCP_EVT:
922 len = p_data->dscp_info.descriptor.dl_len;
923 BTIF_TRACE_DEBUG("BTA_HH_GET_DSCP_EVT: len = %d", len);
924 p_dev = btif_hh_cb.p_curr_dev;
925 if (p_dev == NULL) {
926 BTIF_TRACE_ERROR("BTA_HH_GET_DSCP_EVT: No HID device is currently connected");
927 return;
928 }
929 if (p_dev->fd < 0) {
930 ALOGE("BTA_HH_GET_DSCP_EVT: Error, failed to find the uhid driver...");
931 return;
932 }
933 {
934 char *cached_name = NULL;
935 bt_bdname_t bdname;
936 bt_property_t prop_name;
937 BTIF_STORAGE_FILL_PROPERTY(&prop_name, BT_PROPERTY_BDNAME,
938 sizeof(bt_bdname_t), &bdname);
939 if (btif_storage_get_remote_device_property(
940 &p_dev->bd_addr, &prop_name) == BT_STATUS_SUCCESS)
941 {
942 cached_name = (char *)bdname.name;
943 }
944 else
945 {
946 cached_name = "Bluetooth HID";
947 }
948
949 BTIF_TRACE_WARNING("%s: name = %s", __FUNCTION__, cached_name);
950 bta_hh_co_send_hid_info(p_dev, cached_name,
951 p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
952 p_data->dscp_info.version, p_data->dscp_info.ctry_code,
953 len, p_data->dscp_info.descriptor.dsc_list);
954 if (btif_hh_add_added_dev(p_dev->bd_addr, p_dev->attr_mask)) {
955 BD_ADDR bda;
956 bdcpy(bda, p_dev->bd_addr.address);
957 tBTA_HH_DEV_DSCP_INFO dscp_info;
958 bt_status_t ret;
959 bdcpy(bda, p_dev->bd_addr.address);
960 btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info);
961 BTIF_TRACE_DEBUG("BTA_HH_GET_DSCP_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
962 p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
963 p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
964 p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
965 BTA_HhAddDev(bda, p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, dscp_info);
966 // write hid info to nvram
967 ret = btif_storage_add_hid_device_info(&(p_dev->bd_addr), p_dev->attr_mask,p_dev->sub_class,p_dev->app_id,
968 p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
969 p_data->dscp_info.version, p_data->dscp_info.ctry_code,
970 p_data->dscp_info.ssr_max_latency, p_data->dscp_info.ssr_min_tout,
971 len, p_data->dscp_info.descriptor.dsc_list);
972
973 ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret);
974 BTIF_TRACE_WARNING("BTA_HH_GET_DSCP_EVT: Called add device");
975
976 //Free buffer created for dscp_info;
977 if (dscp_info.descriptor.dl_len >0 && dscp_info.descriptor.dsc_list != NULL)
978 {
979 GKI_freebuf(dscp_info.descriptor.dsc_list);
980 dscp_info.descriptor.dsc_list = NULL;
981 dscp_info.descriptor.dl_len=0;
982 }
983 }
984 else {
985 //Device already added.
986 BTIF_TRACE_WARNING("%s: Device already added ",__FUNCTION__);
987 }
988 /*Sync HID Keyboard lockstates */
989 tmplen = sizeof(hid_kb_numlock_on_list)
990 / sizeof(tHID_KB_LIST);
991 for(i = 0; i< tmplen; i++)
992 {
993 if(p_data->dscp_info.vendor_id
994 == hid_kb_numlock_on_list[i].version_id &&
995 p_data->dscp_info.product_id
996 == hid_kb_numlock_on_list[i].product_id)
997 {
998 BTIF_TRACE_DEBUG("%s() idx[%d] Enabling "\
999 "NUMLOCK for device :: %s", __FUNCTION__,
1000 i, hid_kb_numlock_on_list[i].kb_name);
1001 /* Enable NUMLOCK by default so that numeric
1002 keys work from first keyboard connect */
1003 set_keylockstate(BTIF_HH_KEYSTATE_MASK_NUMLOCK,
1004 TRUE);
1005 sync_lockstate_on_connect(p_dev);
1006 /* End Sync HID Keyboard lockstates */
1007 break;
1008 }
1009 }
1010 }
1011 break;
1012
1013 case BTA_HH_ADD_DEV_EVT:
1014 BTIF_TRACE_WARNING("BTA_HH_ADD_DEV_EVT: status = %d, handle = %d",p_data->dev_info.status, p_data->dev_info.handle);
1015 int i;
1016 for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
1017 if (memcmp(btif_hh_cb.added_devices[i].bd_addr.address, p_data->dev_info.bda, 6) == 0) {
1018 if (p_data->dev_info.status == BTA_HH_OK) {
1019 btif_hh_cb.added_devices[i].dev_handle = p_data->dev_info.handle;
1020 }
1021 else {
1022 memset(btif_hh_cb.added_devices[i].bd_addr.address, 0, 6);
1023 btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
1024 }
1025 break;
1026 }
1027 }
1028 break;
1029 case BTA_HH_RMV_DEV_EVT:
1030 BTIF_TRACE_DEBUG("BTA_HH_RMV_DEV_EVT: status = %d, handle = %d",
1031 p_data->dev_info.status, p_data->dev_info.handle);
1032 BTIF_TRACE_DEBUG("BTA_HH_RMV_DEV_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1033 p_data->dev_info.bda[0], p_data->dev_info.bda[1], p_data->dev_info.bda[2],
1034 p_data->dev_info.bda[3], p_data->dev_info.bda[4], p_data->dev_info.bda[5]);
1035 break;
1036
1037
1038 case BTA_HH_VC_UNPLUG_EVT:
1039 BTIF_TRACE_DEBUG("BTA_HH_VC_UNPLUG_EVT: status = %d, handle = %d",
1040 p_data->dev_status.status, p_data->dev_status.handle);
1041 p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
1042 btif_hh_cb.status = BTIF_HH_DEV_DISCONNECTED;
1043 if (p_dev != NULL) {
1044 BTIF_TRACE_DEBUG("BTA_HH_VC_UNPLUG_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
1045 p_dev->bd_addr.address[0], p_dev->bd_addr.address[1],
1046 p_dev->bd_addr.address[2],p_dev->bd_addr.address[3],
1047 p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
1048 /* Stop the VUP timer */
1049 if(p_dev->vup_timer_active)
1050 {
1051 btif_hh_stop_vup_timer(&(p_dev->bd_addr));
1052 }
1053 p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
1054 BTIF_TRACE_DEBUG("%s---Sending connection state change", __FUNCTION__);
1055 HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
1056 BTIF_TRACE_DEBUG("%s---Removing HID bond", __FUNCTION__);
1057 /* If it is locally initiated VUP or remote device has its major COD as
1058 Peripheral removed the bond.*/
1059 if (p_dev->local_vup || check_cod_hid(&(p_dev->bd_addr), COD_HID_MAJOR))
1060 {
1061 p_dev->local_vup = FALSE;
1062 BTA_DmRemoveDevice((UINT8 *)p_dev->bd_addr.address);
1063 }
1064 else
1065 btif_hh_remove_device(p_dev->bd_addr);
1066 HAL_CBACK(bt_hh_callbacks, virtual_unplug_cb,&(p_dev->bd_addr),
1067 p_data->dev_status.status);
1068 }
1069 break;
1070
1071 case BTA_HH_API_ERR_EVT :
1072 ALOGI("BTA_HH API_ERR");
1073 break;
1074
1075
1076
1077 default:
1078 BTIF_TRACE_WARNING("%s: Unhandled event: %d", __FUNCTION__, event);
1079 break;
1080 }
1081 }
1082
1083 /*******************************************************************************
1084 **
1085 ** Function bte_hh_evt
1086 **
1087 ** Description Switches context from BTE to BTIF for all HH events
1088 **
1089 ** Returns void
1090 **
1091 *******************************************************************************/
1092
bte_hh_evt(tBTA_HH_EVT event,tBTA_HH * p_data)1093 static void bte_hh_evt(tBTA_HH_EVT event, tBTA_HH *p_data)
1094 {
1095 bt_status_t status;
1096 int param_len = 0;
1097
1098 if (BTA_HH_ENABLE_EVT == event)
1099 param_len = sizeof(tBTA_HH_STATUS);
1100 else if (BTA_HH_OPEN_EVT == event)
1101 param_len = sizeof(tBTA_HH_CONN);
1102 else if (BTA_HH_DISABLE_EVT == event)
1103 param_len = sizeof(tBTA_HH_STATUS);
1104 else if (BTA_HH_CLOSE_EVT == event)
1105 param_len = sizeof(tBTA_HH_CBDATA);
1106 else if (BTA_HH_GET_DSCP_EVT == event)
1107 param_len = sizeof(tBTA_HH_DEV_DSCP_INFO);
1108 else if ((BTA_HH_GET_PROTO_EVT == event) || (BTA_HH_GET_RPT_EVT == event)|| (BTA_HH_GET_IDLE_EVT == event))
1109 param_len = sizeof(tBTA_HH_HSDATA);
1110 else if ((BTA_HH_SET_PROTO_EVT == event) || (BTA_HH_SET_RPT_EVT == event) || (BTA_HH_VC_UNPLUG_EVT == event) || (BTA_HH_SET_IDLE_EVT == event))
1111 param_len = sizeof(tBTA_HH_CBDATA);
1112 else if ((BTA_HH_ADD_DEV_EVT == event) || (BTA_HH_RMV_DEV_EVT == event) )
1113 param_len = sizeof(tBTA_HH_DEV_INFO);
1114 else if (BTA_HH_API_ERR_EVT == event)
1115 param_len = 0;
1116 /* switch context to btif task context (copy full union size for convenience) */
1117 status = btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)p_data, param_len, NULL);
1118
1119 /* catch any failed context transfers */
1120 ASSERTC(status == BT_STATUS_SUCCESS, "context transfer failed", status);
1121 }
1122
1123 /*******************************************************************************
1124 **
1125 ** Function btif_hh_handle_evt
1126 **
1127 ** Description Switches context for immediate callback
1128 **
1129 ** Returns void
1130 **
1131 *******************************************************************************/
1132
btif_hh_handle_evt(UINT16 event,char * p_param)1133 static void btif_hh_handle_evt(UINT16 event, char *p_param)
1134 {
1135 bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param;
1136 BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event);
1137 int ret;
1138 switch(event)
1139 {
1140 case BTIF_HH_CONNECT_REQ_EVT:
1141 {
1142 ret = btif_hh_connect(bd_addr);
1143 if(ret == BT_STATUS_SUCCESS)
1144 {
1145 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_CONNECTING);
1146 }
1147 else
1148 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTED);
1149 }
1150 break;
1151
1152 case BTIF_HH_DISCONNECT_REQ_EVT:
1153 {
1154 BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event);
1155 btif_hh_disconnect(bd_addr);
1156 HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTING);
1157 }
1158 break;
1159
1160 case BTIF_HH_VUP_REQ_EVT:
1161 {
1162 BTIF_TRACE_EVENT("%s: event=%d", __FUNCTION__, event);
1163 ret = btif_hh_virtual_unplug(bd_addr);
1164 }
1165 break;
1166
1167 default:
1168 {
1169 BTIF_TRACE_WARNING("%s : Unknown event 0x%x", __FUNCTION__, event);
1170 }
1171 break;
1172 }
1173 }
1174
1175 /*******************************************************************************
1176 **
1177 ** Function btif_hh_tmr_hdlr
1178 **
1179 ** Description Process timer timeout
1180 **
1181 ** Returns void
1182 *******************************************************************************/
btif_hh_tmr_hdlr(TIMER_LIST_ENT * tle)1183 void btif_hh_tmr_hdlr(TIMER_LIST_ENT *tle)
1184 {
1185 btif_hh_device_t *p_dev;
1186 UINT8 i,j;
1187 tBTA_HH_EVT event;
1188 tBTA_HH p_data;
1189 int param_len = 0;
1190 memset(&p_data, 0, sizeof(tBTA_HH));
1191
1192 BTIF_TRACE_DEBUG("%s timer_in_use=%d", __FUNCTION__, tle->in_use );
1193
1194 for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1195 if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED)
1196 {
1197
1198 p_dev = &btif_hh_cb.devices[i];
1199
1200 if (p_dev->vup_timer_active)
1201 {
1202 p_dev->vup_timer_active = FALSE;
1203 event = BTA_HH_VC_UNPLUG_EVT;
1204 p_data.dev_status.status = BTHH_ERR;
1205 p_data.dev_status.handle = p_dev->dev_handle;
1206 param_len = sizeof(tBTA_HH_CBDATA);
1207
1208 /* switch context to btif task context */
1209 btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)&p_data,
1210 param_len, NULL);
1211 }
1212 }
1213 }
1214 }
1215
1216 /*******************************************************************************
1217 **
1218 ** Function btif_hh_init
1219 **
1220 ** Description initializes the hh interface
1221 **
1222 ** Returns bt_status_t
1223 **
1224 *******************************************************************************/
init(bthh_callbacks_t * callbacks)1225 static bt_status_t init( bthh_callbacks_t* callbacks )
1226 {
1227 UINT32 i;
1228 BTIF_TRACE_EVENT("%s", __FUNCTION__);
1229
1230 bt_hh_callbacks = callbacks;
1231 memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
1232 for (i = 0; i < BTIF_HH_MAX_HID; i++){
1233 btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
1234 }
1235 /* Invoke the enable service API to the core to set the appropriate service_id */
1236 btif_enable_service(BTA_HID_SERVICE_ID);
1237 return BT_STATUS_SUCCESS;
1238 }
1239
1240 /*******************************************************************************
1241 **
1242 ** Function connect
1243 **
1244 ** Description connect to hid device
1245 **
1246 ** Returns bt_status_t
1247 **
1248 *******************************************************************************/
connect(bt_bdaddr_t * bd_addr)1249 static bt_status_t connect( bt_bdaddr_t *bd_addr)
1250 {
1251 if(btif_hh_cb.status != BTIF_HH_DEV_CONNECTING)
1252 {
1253 btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT,
1254 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1255 return BT_STATUS_SUCCESS;
1256 }
1257 else
1258 return BT_STATUS_BUSY;
1259 }
1260
1261 /*******************************************************************************
1262 **
1263 ** Function disconnect
1264 **
1265 ** Description disconnect from hid device
1266 **
1267 ** Returns bt_status_t
1268 **
1269 *******************************************************************************/
disconnect(bt_bdaddr_t * bd_addr)1270 static bt_status_t disconnect( bt_bdaddr_t *bd_addr )
1271 {
1272 CHECK_BTHH_INIT();
1273 btif_hh_device_t *p_dev;
1274
1275 if (btif_hh_cb.status == BTIF_HH_DISABLED)
1276 {
1277 BTIF_TRACE_WARNING("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1278 return BT_STATUS_FAIL;
1279 }
1280 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1281 if (p_dev != NULL)
1282 {
1283 return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT,
1284 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1285 }
1286 else
1287 {
1288 BTIF_TRACE_WARNING("%s: Error, device not opened.", __FUNCTION__);
1289 return BT_STATUS_FAIL;
1290 }
1291 }
1292
1293 /*******************************************************************************
1294 **
1295 ** Function virtual_unplug
1296 **
1297 ** Description Virtual UnPlug (VUP) the specified HID device.
1298 **
1299 ** Returns bt_status_t
1300 **
1301 *******************************************************************************/
virtual_unplug(bt_bdaddr_t * bd_addr)1302 static bt_status_t virtual_unplug (bt_bdaddr_t *bd_addr)
1303 {
1304 CHECK_BTHH_INIT();
1305 btif_hh_device_t *p_dev;
1306 char bd_str[18];
1307 sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
1308 bd_addr->address[0], bd_addr->address[1], bd_addr->address[2], bd_addr->address[3],
1309 bd_addr->address[4], bd_addr->address[5]);
1310 if (btif_hh_cb.status == BTIF_HH_DISABLED)
1311 {
1312 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1313 return BT_STATUS_FAIL;
1314 }
1315 p_dev = btif_hh_find_dev_by_bda(bd_addr);
1316 if (!p_dev)
1317 {
1318 BTIF_TRACE_ERROR("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
1319 return BT_STATUS_FAIL;
1320 }
1321 btif_transfer_context(btif_hh_handle_evt, BTIF_HH_VUP_REQ_EVT,
1322 (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
1323 return BT_STATUS_SUCCESS;
1324 }
1325
1326
1327 /*******************************************************************************
1328 **
1329 ** Function set_info
1330 **
1331 ** Description Set the HID device descriptor for the specified HID device.
1332 **
1333 ** Returns bt_status_t
1334 **
1335 *******************************************************************************/
set_info(bt_bdaddr_t * bd_addr,bthh_hid_info_t hid_info)1336 static bt_status_t set_info (bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info )
1337 {
1338 CHECK_BTHH_INIT();
1339 tBTA_HH_DEV_DSCP_INFO dscp_info;
1340 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1341
1342 BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1343 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1344 BTIF_TRACE_DEBUG("%s: sub_class = 0x%02x, app_id = %d, vendor_id = 0x%04x, "
1345 "product_id = 0x%04x, version= 0x%04x",
1346 __FUNCTION__, hid_info.sub_class,
1347 hid_info.app_id, hid_info.vendor_id, hid_info.product_id,
1348 hid_info.version);
1349
1350 if (btif_hh_cb.status == BTIF_HH_DISABLED)
1351 {
1352 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1353 return BT_STATUS_FAIL;
1354 }
1355
1356 dscp_info.vendor_id = hid_info.vendor_id;
1357 dscp_info.product_id = hid_info.product_id;
1358 dscp_info.version = hid_info.version;
1359 dscp_info.ctry_code = hid_info.ctry_code;
1360
1361 dscp_info.descriptor.dl_len = hid_info.dl_len;
1362 dscp_info.descriptor.dsc_list = (UINT8 *) GKI_getbuf(dscp_info.descriptor.dl_len);
1363 if (dscp_info.descriptor.dsc_list == NULL)
1364 {
1365 ALOGE("%s: Failed to allocate DSCP for CB", __FUNCTION__);
1366 return BT_STATUS_FAIL;
1367 }
1368 memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len);
1369
1370 if (btif_hh_add_added_dev(*bd_addr, hid_info.attr_mask))
1371 {
1372 BTA_HhAddDev(*bda, hid_info.attr_mask, hid_info.sub_class,
1373 hid_info.app_id, dscp_info);
1374 }
1375
1376 GKI_freebuf(dscp_info.descriptor.dsc_list);
1377
1378 return BT_STATUS_SUCCESS;
1379 }
1380
1381 /*******************************************************************************
1382 **
1383 ** Function get_protocol
1384 **
1385 ** Description Get the HID proto mode.
1386 **
1387 ** Returns bt_status_t
1388 **
1389 *******************************************************************************/
get_protocol(bt_bdaddr_t * bd_addr,bthh_protocol_mode_t protocolMode)1390 static bt_status_t get_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1391 {
1392 CHECK_BTHH_INIT();
1393 btif_hh_device_t *p_dev;
1394 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1395 UNUSED(protocolMode);
1396
1397 BTIF_TRACE_DEBUG(" addr = %02X:%02X:%02X:%02X:%02X:%02X",
1398 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1399
1400 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1401 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1402 return BT_STATUS_FAIL;
1403 }
1404
1405 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1406 if (p_dev != NULL) {
1407
1408 BTA_HhGetProtoMode(p_dev->dev_handle);
1409 }
1410 else {
1411 return BT_STATUS_FAIL;
1412 }
1413 return BT_STATUS_SUCCESS;
1414 }
1415
1416 /*******************************************************************************
1417 **
1418 ** Function set_protocol
1419 **
1420 ** Description Set the HID proto mode.
1421 **
1422 ** Returns bt_status_t
1423 **
1424 *******************************************************************************/
set_protocol(bt_bdaddr_t * bd_addr,bthh_protocol_mode_t protocolMode)1425 static bt_status_t set_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
1426 {
1427 CHECK_BTHH_INIT();
1428 btif_hh_device_t *p_dev;
1429 UINT8 proto_mode = protocolMode;
1430 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1431
1432 BTIF_TRACE_DEBUG("%s:proto_mode = %d", __FUNCTION__,protocolMode);
1433
1434 BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1435 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1436
1437 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1438 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1439 return BT_STATUS_FAIL;
1440 }
1441
1442 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1443 if (p_dev == NULL) {
1444 BTIF_TRACE_WARNING(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1445 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1446 return BT_STATUS_FAIL;
1447 }
1448 else if (protocolMode != BTA_HH_PROTO_RPT_MODE && protocolMode != BTA_HH_PROTO_BOOT_MODE) {
1449 BTIF_TRACE_WARNING("s: Error, device proto_mode = %d.", __FUNCTION__, proto_mode);
1450 return BT_STATUS_FAIL;
1451 }
1452 else {
1453 BTA_HhSetProtoMode(p_dev->dev_handle, protocolMode);
1454 }
1455
1456
1457 return BT_STATUS_SUCCESS;
1458 }
1459
1460 /*******************************************************************************
1461 **
1462 ** Function get_report
1463 **
1464 ** Description Send a GET_REPORT to HID device.
1465 **
1466 ** Returns bt_status_t
1467 **
1468 *******************************************************************************/
get_report(bt_bdaddr_t * bd_addr,bthh_report_type_t reportType,uint8_t reportId,int bufferSize)1469 static bt_status_t get_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize)
1470 {
1471 CHECK_BTHH_INIT();
1472 btif_hh_device_t *p_dev;
1473 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1474
1475 BTIF_TRACE_DEBUG("%s:proto_mode = %dr_type = %d, rpt_id = %d, buf_size = %d", __FUNCTION__,
1476 reportType, reportId, bufferSize);
1477
1478 BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1479 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1480
1481 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1482 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1483 return BT_STATUS_FAIL;
1484 }
1485
1486
1487 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1488 if (p_dev == NULL) {
1489 BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1490 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1491 return BT_STATUS_FAIL;
1492 }
1493 else if ( ((int) reportType) <= BTA_HH_RPTT_RESRV || ((int) reportType) > BTA_HH_RPTT_FEATURE) {
1494 BTIF_TRACE_ERROR(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1495 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1496 return BT_STATUS_FAIL;
1497 }
1498 else {
1499 BTA_HhGetReport(p_dev->dev_handle, reportType,
1500 reportId, bufferSize);
1501 }
1502
1503 return BT_STATUS_SUCCESS;
1504 }
1505
1506 /*******************************************************************************
1507 **
1508 ** Function set_report
1509 **
1510 ** Description Send a SET_REPORT to HID device.
1511 **
1512 ** Returns bt_status_t
1513 **
1514 *******************************************************************************/
set_report(bt_bdaddr_t * bd_addr,bthh_report_type_t reportType,char * report)1515 static bt_status_t set_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report)
1516 {
1517 CHECK_BTHH_INIT();
1518 btif_hh_device_t *p_dev;
1519 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1520
1521 BTIF_TRACE_DEBUG("%s:reportType = %d", __FUNCTION__,reportType);
1522
1523 BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1524 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1525
1526
1527 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1528 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1529 return BT_STATUS_FAIL;
1530 }
1531
1532 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1533 if (p_dev == NULL) {
1534 BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1535 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1536 return BT_STATUS_FAIL;
1537 }
1538 else if ( ( (int) reportType) <= BTA_HH_RPTT_RESRV || ( (int) reportType) > BTA_HH_RPTT_FEATURE) {
1539 BTIF_TRACE_ERROR(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1540 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1541 return BT_STATUS_FAIL;
1542 }
1543 else {
1544 int hex_bytes_filled;
1545 UINT8 *hexbuf;
1546 UINT16 len = (strlen(report) + 1) / 2;
1547
1548 hexbuf = GKI_getbuf(len);
1549 if (hexbuf == NULL) {
1550 BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1551 __FUNCTION__, len);
1552 return BT_STATUS_FAIL;
1553 }
1554
1555 /* Build a SetReport data buffer */
1556 memset(hexbuf, 0, len);
1557 //TODO
1558 hex_bytes_filled = ascii_2_hex(report, len, hexbuf);
1559 BTIF_TRACE_DEBUG("Hex bytes filled, hex value: %d", hex_bytes_filled);
1560 if (hex_bytes_filled) {
1561 BT_HDR* p_buf = create_pbuf(hex_bytes_filled, hexbuf);
1562 if (p_buf == NULL) {
1563 BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1564 __FUNCTION__, hex_bytes_filled);
1565 GKI_freebuf(hexbuf);
1566 return BT_STATUS_FAIL;
1567 }
1568 BTA_HhSetReport(p_dev->dev_handle, reportType, p_buf);
1569 GKI_freebuf(hexbuf);
1570 return BT_STATUS_SUCCESS;
1571 }
1572 GKI_freebuf(hexbuf);
1573 return BT_STATUS_FAIL;
1574 }
1575 }
1576
1577 /*******************************************************************************
1578 **
1579 ** Function send_data
1580 **
1581 ** Description Send a SEND_DATA to HID device.
1582 **
1583 ** Returns bt_status_t
1584 **
1585 *******************************************************************************/
send_data(bt_bdaddr_t * bd_addr,char * data)1586 static bt_status_t send_data (bt_bdaddr_t *bd_addr, char* data)
1587 {
1588 CHECK_BTHH_INIT();
1589 btif_hh_device_t *p_dev;
1590 BD_ADDR* bda = (BD_ADDR*) bd_addr;
1591
1592 BTIF_TRACE_DEBUG("%s", __FUNCTION__);
1593
1594 BTIF_TRACE_DEBUG("addr = %02X:%02X:%02X:%02X:%02X:%02X",
1595 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1596
1597 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1598 BTIF_TRACE_ERROR("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
1599 return BT_STATUS_FAIL;
1600 }
1601
1602 p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
1603 if (p_dev == NULL) {
1604 BTIF_TRACE_ERROR("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
1605 (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
1606 return BT_STATUS_FAIL;
1607 }
1608
1609 else {
1610 int hex_bytes_filled;
1611 UINT8 *hexbuf;
1612 UINT16 len = (strlen(data) + 1) / 2;
1613
1614 hexbuf = GKI_getbuf(len);
1615 if (hexbuf == NULL) {
1616 BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1617 __FUNCTION__, len);
1618 return BT_STATUS_FAIL;
1619 }
1620
1621 /* Build a SendData data buffer */
1622 memset(hexbuf, 0, len);
1623 hex_bytes_filled = ascii_2_hex(data, len, hexbuf);
1624 BTIF_TRACE_ERROR("Hex bytes filled, hex value: %d, %d", hex_bytes_filled, len);
1625
1626 if (hex_bytes_filled) {
1627 BT_HDR* p_buf = create_pbuf(hex_bytes_filled, hexbuf);
1628 if (p_buf == NULL) {
1629 BTIF_TRACE_ERROR("%s: Error, failed to allocate RPT buffer, len = %d",
1630 __FUNCTION__, hex_bytes_filled);
1631 GKI_freebuf(hexbuf);
1632 return BT_STATUS_FAIL;
1633 }
1634 p_buf->layer_specific = BTA_HH_RPTT_OUTPUT;
1635 BTA_HhSendData(p_dev->dev_handle, *bda, p_buf);
1636 GKI_freebuf(hexbuf);
1637 return BT_STATUS_SUCCESS;
1638 }
1639 GKI_freebuf(hexbuf);
1640 return BT_STATUS_FAIL;
1641 }
1642 }
1643
1644
1645 /*******************************************************************************
1646 **
1647 ** Function cleanup
1648 **
1649 ** Description Closes the HH interface
1650 **
1651 ** Returns bt_status_t
1652 **
1653 *******************************************************************************/
cleanup(void)1654 static void cleanup( void )
1655 {
1656 BTIF_TRACE_EVENT("%s", __FUNCTION__);
1657 btif_hh_device_t *p_dev;
1658 int i;
1659 if (btif_hh_cb.status == BTIF_HH_DISABLED) {
1660 BTIF_TRACE_WARNING("%s: HH disabling or disabled already, status = %d", __FUNCTION__, btif_hh_cb.status);
1661 return;
1662 }
1663 btif_hh_cb.status = BTIF_HH_DISABLING;
1664 for (i = 0; i < BTIF_HH_MAX_HID; i++) {
1665 p_dev = &btif_hh_cb.devices[i];
1666 if (p_dev->dev_status != BTHH_CONN_STATE_UNKNOWN && p_dev->fd >= 0) {
1667 BTIF_TRACE_DEBUG("%s: Closing uhid fd = %d", __FUNCTION__, p_dev->fd);
1668 bta_hh_co_destroy(p_dev->fd);
1669 p_dev->fd = -1;
1670 p_dev->hh_keep_polling = 0;
1671 p_dev->hh_poll_thread_id = -1;
1672 }
1673 }
1674
1675 if (bt_hh_callbacks)
1676 {
1677 btif_disable_service(BTA_HID_SERVICE_ID);
1678 bt_hh_callbacks = NULL;
1679 }
1680
1681 }
1682
1683 static const bthh_interface_t bthhInterface = {
1684 sizeof(bthhInterface),
1685 init,
1686 connect,
1687 disconnect,
1688 virtual_unplug,
1689 set_info,
1690 get_protocol,
1691 set_protocol,
1692 // get_idle_time,
1693 // set_idle_time,
1694 get_report,
1695 set_report,
1696 send_data,
1697 cleanup,
1698 };
1699
1700 /*******************************************************************************
1701 **
1702 ** Function btif_hh_execute_service
1703 **
1704 ** Description Initializes/Shuts down the service
1705 **
1706 ** Returns BT_STATUS_SUCCESS on success, BT_STATUS_FAIL otherwise
1707 **
1708 *******************************************************************************/
btif_hh_execute_service(BOOLEAN b_enable)1709 bt_status_t btif_hh_execute_service(BOOLEAN b_enable)
1710 {
1711 if (b_enable)
1712 {
1713 /* Enable and register with BTA-HH */
1714 BTA_HhEnable(BTUI_HH_SECURITY, bte_hh_evt);
1715 }
1716 else {
1717 /* Disable HH */
1718 BTA_HhDisable();
1719 }
1720 return BT_STATUS_SUCCESS;
1721 }
1722
1723 /*******************************************************************************
1724 **
1725 ** Function btif_hh_get_interface
1726 **
1727 ** Description Get the hh callback interface
1728 **
1729 ** Returns bthh_interface_t
1730 **
1731 *******************************************************************************/
btif_hh_get_interface()1732 const bthh_interface_t *btif_hh_get_interface()
1733 {
1734 BTIF_TRACE_EVENT("%s", __FUNCTION__);
1735 return &bthhInterface;
1736 }
1737