summaryrefslogtreecommitdiffstats
path: root/btif/src
diff options
context:
space:
mode:
Diffstat (limited to 'btif/src')
-rwxr-xr-x[-rw-r--r--]btif/src/bluetooth.c9
-rw-r--r--btif/src/btif_dm.c208
-rw-r--r--btif/src/btif_hh.c1419
-rw-r--r--btif/src/btif_storage.c29
-rwxr-xr-x[-rw-r--r--]btif/src/btif_util.c24
5 files changed, 1664 insertions, 25 deletions
diff --git a/btif/src/bluetooth.c b/btif/src/bluetooth.c
index 2480e28..df6c635 100644..100755
--- a/btif/src/bluetooth.c
+++ b/btif/src/bluetooth.c
@@ -60,6 +60,8 @@
#include <hardware/bluetooth.h>
#include <hardware/bt_hf.h>
#include <hardware/bt_av.h>
+#include <hardware/bt_hh.h>
+
#define LOG_NDDEBUG 0
#define LOG_TAG "bluedroid"
@@ -96,6 +98,10 @@ bt_callbacks_t *bt_hal_cbacks = NULL;
extern bthf_interface_t *btif_hf_get_interface();
/* advanced audio profile */
extern btav_interface_t *btif_av_get_interface();
+/* hid host profile */
+extern bthh_interface_t *btif_hh_get_interface();
+
+
/************************************************************************************
** Functions
@@ -311,7 +317,8 @@ static const void* get_profile_interface (const char *profile_id)
if (is_profile(profile_id, BT_PROFILE_ADVANCED_AUDIO_ID))
return btif_av_get_interface();
-
+ if (is_profile(profile_id, BT_PROFILE_HIDHOST_ID))
+ return btif_hh_get_interface();
return NULL;
}
diff --git a/btif/src/btif_dm.c b/btif/src/btif_dm.c
index fa0330e..6210a5f 100644
--- a/btif/src/btif_dm.c
+++ b/btif/src/btif_dm.c
@@ -68,12 +68,16 @@
#include "btif_api.h"
#include "btif_util.h"
#include "btif_storage.h"
+#include "btif_hh.h"
/******************************************************************************
** Constants & Macros
******************************************************************************/
#define COD_UNCLASSIFIED ((0x1F) << 8)
+#define COD_HID_KEYBOARD 0x0540
+#define COD_HID_POINTING 0x0580
+#define COD_HID_COMBO 0x05C0
#define BTIF_DM_DEFAULT_INQ_MAX_RESULTS 0
#define BTIF_DM_DEFAULT_INQ_MAX_DURATION 10
@@ -92,6 +96,9 @@ typedef struct {
******************************************************************************/
static btif_dm_pairing_cb_t pairing_cb;
static bt_status_t btif_dm_get_remote_services(bt_bdaddr_t *remote_addr);
+static void btif_dm_generic_evt(UINT16 event, char* p_param);
+static void btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr);
+static void btif_dm_cb_hid_remote_name(tBTM_REMOTE_DEV_NAME *p_remote_name);
/******************************************************************************
** Externs
@@ -99,6 +106,8 @@ static bt_status_t btif_dm_get_remote_services(bt_bdaddr_t *remote_addr);
extern UINT16 bta_service_id_to_uuid_lkup_tbl [BTA_MAX_SERVICE_ID];
extern bt_status_t btif_hf_execute_service(BOOLEAN b_enable);
extern bt_status_t btif_av_execute_service(BOOLEAN b_enable);
+extern bt_status_t btif_hh_execute_service(BOOLEAN b_enable);
+
/******************************************************************************
** Functions
@@ -118,6 +127,11 @@ bt_status_t btif_in_execute_service_request(tBTA_SERVICE_ID service_id,
{
btif_av_execute_service(b_enable);
}break;
+ case BTA_HID_SERVICE_ID:
+ {
+ btif_hh_execute_service(b_enable);
+ }
+
default:
BTIF_TRACE_ERROR1("%s: Unknown service being enabled", __FUNCTION__);
return BT_STATUS_FAIL;
@@ -207,6 +221,23 @@ static BOOLEAN check_cached_remote_name(tBTA_DM_SEARCH *p_search_data,
return FALSE;
}
+BOOLEAN check_cod(const bt_bdaddr_t *remote_bdaddr, uint32_t cod)
+{
+ uint32_t remote_cod;
+ bt_property_t prop_name;
+
+ /* check if we already have it in our btif_storage cache */
+ BTIF_STORAGE_FILL_PROPERTY(&prop_name, BT_PROPERTY_CLASS_OF_DEVICE,
+ sizeof(uint32_t), &remote_cod);
+ if (btif_storage_get_remote_device_property((bt_bdaddr_t *)remote_bdaddr, &prop_name) == BT_STATUS_SUCCESS)
+ {
+ if ((remote_cod & 0x7ff) == cod)
+ return TRUE;
+ }
+
+ return FALSE;
+}
+
static void bond_state_changed(bt_status_t status, bt_bdaddr_t *bd_addr, bt_bond_state_t state)
{
/* Send bonding state only once - based on outgoing/incoming we may receive duplicates */
@@ -228,6 +259,140 @@ static void bond_state_changed(bt_status_t status, bt_bdaddr_t *bd_addr, bt_bond
/*******************************************************************************
**
+** Function hid_remote_name_cback
+**
+** Description Remote name callback for HID device. Called in stack context
+** Special handling for HID devices
+**
+** Returns void
+**
+*******************************************************************************/
+static void hid_remote_name_cback(void *p_param)
+{
+ BTIF_TRACE_DEBUG1("%s", __FUNCTION__);
+
+ btif_transfer_context(btif_dm_generic_evt, BTIF_DM_CB_HID_REMOTE_NAME,
+ (char *)p_param, sizeof(tBTM_REMOTE_DEV_NAME), NULL);
+}
+
+/*******************************************************************************
+**
+** Function btif_dm_cb_hid_remote_name
+**
+** Description Remote name callback for HID device. Called in btif context
+** Special handling for HID devices
+**
+** Returns void
+**
+*******************************************************************************/
+static void btif_dm_cb_hid_remote_name(tBTM_REMOTE_DEV_NAME *p_remote_name)
+{
+ BTIF_TRACE_DEBUG3("%s: status=%d pairing_cb.state=%d", __FUNCTION__, p_remote_name->status, pairing_cb.state);
+ if (pairing_cb.state == BT_BOND_STATE_BONDING)
+ {
+ bt_bdaddr_t remote_bd;
+
+ bdcpy(remote_bd.address, pairing_cb.bd_addr);
+
+ if (p_remote_name->status == BTM_SUCCESS)
+ {
+ bond_state_changed(BT_STATUS_SUCCESS, &remote_bd, BT_BOND_STATE_BONDED);
+ //btif_hh_mouse_pairing(remote_bd);
+ }
+ else
+ bond_state_changed(BT_STATUS_FAIL, &remote_bd, BT_BOND_STATE_NONE);
+ }
+}
+
+/*******************************************************************************
+**
+** Function btif_dm_cb_create_bond
+**
+** Description Create bond initiated from the BTIF thread context
+** Special handling for HID devices
+**
+** Returns void
+**
+*******************************************************************************/
+static void btif_dm_cb_create_bond(bt_bdaddr_t *bd_addr)
+{
+ bond_state_changed(BT_STATUS_SUCCESS, bd_addr, BT_BOND_STATE_BONDING);
+
+ /* TODO:
+ ** 1. Check if ACL is already up with this device
+ ** 2. Disable unpaired devices from connecting while we are bonding
+ ** 3. special handling for HID devices
+ */
+ if (check_cod(bd_addr, COD_HID_POINTING))
+ {
+ /* For HID mouse, no pairing required. Hence we fake the pairing process
+ * by retrieving the remote device name.
+ */
+ BTIF_TRACE_DEBUG0("Create bond for hid mouse");
+ tBTM_STATUS status;
+ BD_ADDR bda;
+ bdcpy(bda, bd_addr->address);
+
+ BTIF_TRACE_DEBUG1("%s: Bypass bonding for HID Mouse", __FUNCTION__);
+ status = BTM_ReadRemoteDeviceName(bda, hid_remote_name_cback);
+
+ if (status != BTM_CMD_STARTED)
+ {
+ BTIF_TRACE_DEBUG2("%s: status = %d", __FUNCTION__, status);
+ bond_state_changed(BT_STATUS_FAIL, bd_addr, BT_BOND_STATE_NONE);
+ return;
+ }
+ /* Trigger SDP on the device */
+ BTIF_TRACE_DEBUG1("%s:Starting SDP", __FUNCTION__);
+ btif_dm_get_remote_services(bd_addr);
+ }
+ else
+ {
+ BTA_DmBond ((UINT8 *)bd_addr->address);
+ }
+
+}
+
+/*******************************************************************************
+**
+** Function btif_dm_cb_remove_bond
+**
+** Description remove bond initiated from the BTIF thread context
+** Special handling for HID devices
+**
+** Returns void
+**
+*******************************************************************************/
+static void btif_dm_cb_remove_bond(bt_bdaddr_t *bd_addr)
+{
+ bdstr_t bdstr;
+ /*special handling for HID devices */
+#if (defined(BTA_HH_INCLUDED) && (BTA_HH_INCLUDED == TRUE))
+ if (check_cod(bd_addr, COD_HID_POINTING )) {
+ btif_hh_remove_device(*bd_addr);
+ //todo
+ //virtual_unplug(bd_addr);
+ bond_state_changed(BT_STATUS_SUCCESS, bd_addr, BT_BOND_STATE_NONE);
+ return;
+ }
+ else if (check_cod(bd_addr, COD_HID_KEYBOARD)|| check_cod(bd_addr, COD_HID_COMBO)) {
+ btif_hh_remove_device(*bd_addr);
+ }
+#endif
+ if (BTA_DmRemoveDevice((UINT8 *)bd_addr->address) == BTA_SUCCESS)
+ {
+ BTIF_TRACE_DEBUG1("Successfully removed bonding with device: %s",
+ bd2str((bt_bdaddr_t *)bd_addr, &bdstr));
+ }
+ else
+ BTIF_TRACE_DEBUG1("Removed bonding with device failed: %s",
+ bd2str((bt_bdaddr_t *)bd_addr, &bdstr));
+
+
+}
+
+/*******************************************************************************
+**
** Function search_devices_copy_cb
**
** Description Deep copy callback for search devices event
@@ -840,9 +1005,21 @@ static void btif_dm_generic_evt(UINT16 event, char* p_param)
}
break;
- case BTIF_DM_CB_BONDING_STARTED:
+ case BTIF_DM_CB_CREATE_BOND:
+ {
+ btif_dm_cb_create_bond((bt_bdaddr_t *)p_param);
+ }
+ break;
+
+ case BTIF_DM_CB_REMOVE_BOND:
{
- bond_state_changed(BT_STATUS_SUCCESS, (bt_bdaddr_t *)p_param, BT_BOND_STATE_BONDING);
+ btif_dm_cb_remove_bond((bt_bdaddr_t *)p_param);
+ }
+ break;
+
+ case BTIF_DM_CB_HID_REMOTE_NAME:
+ {
+ btif_dm_cb_hid_remote_name((tBTM_REMOTE_DEV_NAME *)p_param);
}
break;
@@ -1029,16 +1206,8 @@ bt_status_t btif_dm_create_bond(const bt_bdaddr_t *bd_addr)
if (pairing_cb.state != BT_BOND_STATE_NONE)
return BT_STATUS_BUSY;
- /* TODO:
- ** 1. Check if ACL is already up with this device
- ** 2. Disable unpaired devices from connecting while we are bonding
- ** 3. special handling for HID devices
- */
-
- BTA_DmBond ((UINT8 *)bd_addr->address);
-
- /* Invoke the discovery_started callback */
- btif_transfer_context(btif_dm_generic_evt, BTIF_DM_CB_BONDING_STARTED, (char *)bd_addr, sizeof(bt_bdaddr_t), NULL);
+ btif_transfer_context(btif_dm_generic_evt, BTIF_DM_CB_CREATE_BOND,
+ (char *)bd_addr, sizeof(bt_bdaddr_t), NULL);
return BT_STATUS_SUCCESS;
}
@@ -1083,18 +1252,9 @@ bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr)
bdstr_t bdstr;
BTIF_TRACE_EVENT2("%s: bd_addr=%s", __FUNCTION__, bd2str((bt_bdaddr_t *)bd_addr, &bdstr));
+ btif_transfer_context(btif_dm_generic_evt, BTIF_DM_CB_REMOVE_BOND,
+ (char *)bd_addr, sizeof(bt_bdaddr_t), NULL);
- /* TODO: special handling for HID devices */
- if (BTA_DmRemoveDevice((UINT8 *)bd_addr->address) == BTA_SUCCESS)
- {
- BTIF_TRACE_DEBUG1("Successfully removed bonding with device: %s",
- bd2str((bt_bdaddr_t *)bd_addr, &bdstr));
-
- }
- else
- {
- return BT_STATUS_FAIL;
- }
return BT_STATUS_SUCCESS;
}
@@ -1259,7 +1419,7 @@ void btif_dm_execute_service_request(UINT16 event, char *p_param)
bt_property_t property;
bt_uuid_t local_uuids[BT_MAX_NUM_UUIDS];
/* Now send the UUID_PROPERTY_CHANGED event to the upper layer */
- BTIF_STORAGE_FILL_PROPERTY(&property, BT_PROPERTY_UUIDS,
+ BTIF_STORAGE_FILL_PROPERTY(&property, BT_PROPERTY_UUIDS,
sizeof(local_uuids), local_uuids);
btif_storage_get_adapter_property(&property);
HAL_CBACK(bt_hal_cbacks, adapter_properties_cb,
diff --git a/btif/src/btif_hh.c b/btif/src/btif_hh.c
new file mode 100644
index 0000000..cdc80f5
--- /dev/null
+++ b/btif/src/btif_hh.c
@@ -0,0 +1,1419 @@
+/************************************************************************************
+ *
+ * Copyright (C) 2009-2012 Broadcom Corporation
+ *
+ * This program is the proprietary software of Broadcom Corporation and/or its
+ * licensors, and may only be used, duplicated, modified or distributed
+ * pursuant to the terms and conditions of a separate, written license
+ * agreement executed between you and Broadcom (an "Authorized License").
+ * Except as set forth in an Authorized License, Broadcom grants no license
+ * (express or implied), right to use, or waiver of any kind with respect to
+ * the Software, and Broadcom expressly reserves all rights in and to the
+ * Software and all intellectual property rights therein.
+ * IF YOU HAVE NO AUTHORIZED LICENSE, THEN YOU HAVE NO RIGHT TO USE THIS
+ * SOFTWARE IN ANY WAY, AND SHOULD IMMEDIATELY NOTIFY BROADCOM AND DISCONTINUE
+ * ALL USE OF THE SOFTWARE.
+ *
+ * Except as expressly set forth in the Authorized License,
+ *
+ * 1. This program, including its structure, sequence and organization,
+ * constitutes the valuable trade secrets of Broadcom, and you shall
+ * use all reasonable efforts to protect the confidentiality thereof,
+ * and to use this information only in connection with your use of
+ * Broadcom integrated circuit products.
+ *
+ * 2. TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS PROVIDED
+ * "AS IS" AND WITH ALL FAULTS AND BROADCOM MAKES NO PROMISES,
+ * REPRESENTATIONS OR WARRANTIES, EITHER EXPRESS, IMPLIED, STATUTORY,
+ * OR OTHERWISE, WITH RESPECT TO THE SOFTWARE. BROADCOM SPECIFICALLY
+ * DISCLAIMS ANY AND ALL IMPLIED WARRANTIES OF TITLE, MERCHANTABILITY,
+ * NONINFRINGEMENT, FITNESS FOR A PARTICULAR PURPOSE, LACK OF VIRUSES,
+ * ACCURACY OR COMPLETENESS, QUIET ENJOYMENT, QUIET POSSESSION OR
+ * CORRESPONDENCE TO DESCRIPTION. YOU ASSUME THE ENTIRE RISK ARISING OUT
+ * OF USE OR PERFORMANCE OF THE SOFTWARE.
+ *
+ * 3. TO THE MAXIMUM EXTENT PERMITTED BY LAW, IN NO EVENT SHALL BROADCOM OR
+ * ITS LICENSORS BE LIABLE FOR
+ * (i) CONSEQUENTIAL, INCIDENTAL, SPECIAL, INDIRECT, OR EXEMPLARY
+ * DAMAGES WHATSOEVER ARISING OUT OF OR IN ANY WAY RELATING TO
+ * YOUR USE OF OR INABILITY TO USE THE SOFTWARE EVEN IF BROADCOM
+ * HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES; OR
+ * (ii) ANY AMOUNT IN EXCESS OF THE AMOUNT ACTUALLY PAID FOR THE
+ * SOFTWARE ITSELF OR U.S. $1, WHICHEVER IS GREATER. THESE
+ * LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF
+ * ESSENTIAL PURPOSE OF ANY LIMITED REMEDY.
+ *
+ ************************************************************************************/
+
+/************************************************************************************
+ *
+ * Filename: btif_hh.c
+ *
+ * Description: HID Host Profile Bluetooth Interface
+ *
+ *
+ ***********************************************************************************/
+#include <hardware/bluetooth.h>
+#include <hardware/bt_hh.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <errno.h>
+#include <string.h>
+
+#define LOG_TAG "BTIF_HH"
+
+#include "bta_api.h"
+#include "bta_hh_api.h"
+#include "bd.h"
+#include "btif_storage.h"
+
+
+
+
+
+#include "btif_common.h"
+#include "btif_util.h"
+#include "btif_hh.h"
+#include "gki.h"
+#include "l2c_api.h"
+
+
+#define BTIF_HH_APP_ID_MI 0x01
+#define BTIF_HH_APP_ID_KB 0x02
+
+#define COD_HID_KEYBOARD 0x0540
+#define COD_HID_POINTING 0x0580
+#define COD_HID_COMBO 0x05C0
+
+#define KEYSTATE_FILEPATH "/data/misc/bluedroid/bt_hh_ks" //keep this in sync with HID host jni
+
+#define HID_REPORT_CAPSLOCK 0x39
+#define HID_REPORT_NUMLOCK 0x53
+#define HID_REPORT_SCROLLLOCK 0x47
+
+#define MAX_KEYSTATES 3
+#define KEYSTATE_MASK_NUMLOCK 0x01
+#define KEYSTATE_MASK_CAPSLOCK 0x02
+#define KEYSTATE_MASK_SCROLLLOCK 0x04
+
+
+extern const int BT_UID;
+extern const int BT_GID;
+static int btif_hh_prev_keyevents=0; //The previous key events
+static int btif_hh_keylockstates=0; //The current key state of each key
+
+#define BTIF_HH_ID_1 0
+#define BTIF_HH_DEV_DISCONNECTED 3
+
+
+#ifndef BTUI_HH_SECURITY
+#define BTUI_HH_SECURITY (BTA_SEC_AUTHENTICATE | BTA_SEC_ENCRYPT)
+#endif
+
+#ifndef BTUI_HH_MOUSE_SECURITY
+#define BTUI_HH_MOUSE_SECURITY (BTA_SEC_NONE)
+#endif
+
+/* HH request events */
+typedef enum
+{
+ BTIF_HH_CONNECT_REQ_EVT = 0,
+ BTIF_HH_DISCONNECT_REQ_EVT
+} btif_hh_req_evt_t;
+
+
+/************************************************************************************
+** Constants & Macros
+************************************************************************************/
+#define BTIF_HH_SERVICES (BTA_HID_SERVICE_MASK)
+
+
+
+/************************************************************************************
+** Local type definitions
+************************************************************************************/
+
+/************************************************************************************
+** Static variables
+************************************************************************************/
+btif_hh_cb_t btif_hh_cb;
+static bthh_callbacks_t *bt_hh_callbacks = NULL;
+
+#define CHECK_BTHH_INIT() if (bt_hh_callbacks == NULL)\
+ {\
+ BTIF_TRACE_WARNING1("BTHH: %s: BTHH not initialized", __FUNCTION__);\
+ return BT_STATUS_NOT_READY;\
+ }\
+ else\
+ {\
+ BTIF_TRACE_EVENT1("BTHH: %s", __FUNCTION__);\
+ }
+
+
+
+/************************************************************************************
+** Static functions
+************************************************************************************/
+
+/************************************************************************************
+** Externs
+************************************************************************************/
+
+extern bt_status_t btif_dm_remove_bond(const bt_bdaddr_t *bd_addr);
+extern void bta_hh_co_send_hid_info(btif_hh_device_t *p_dev, char *dev_name, UINT16 vendor_id,
+ UINT16 product_id, UINT16 version, UINT8 ctry_code,
+ int dscp_len, UINT8 *p_dscp);
+extern BOOLEAN check_cod(const bt_bdaddr_t *remote_bdaddr, uint32_t cod);
+
+extern int scru_ascii_2_hex(char *p_ascii, int len, UINT8 *p_hex);
+
+/************************************************************************************
+** Functions
+************************************************************************************/
+/*******************************************************************************
+**
+** Function btif_hh_find_dev_by_handle
+**
+** Description Return the device pointer of the specified device handle
+**
+** Returns Device entry pointer in the device table
+*******************************************************************************/
+static btif_hh_device_t *btif_hh_find_dev_by_handle(UINT8 handle)
+{
+ UINT32 i;
+ // LOGV("%s: handle = %d", __FUNCTION__, handle);
+ for (i = 0; i < BTIF_HH_MAX_HID; i++) {
+ if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN &&
+ btif_hh_cb.devices[i].dev_handle == handle)
+ {
+ return &btif_hh_cb.devices[i];
+ }
+ }
+ return NULL;
+}
+
+
+/*******************************************************************************
+**
+** Function btif_hh_find_connected_dev_by_handle
+**
+** Description Return the connected device pointer of the specified device handle
+**
+** Returns Device entry pointer in the device table
+*******************************************************************************/
+btif_hh_device_t *btif_hh_find_connected_dev_by_handle(UINT8 handle)
+{
+ UINT32 i;
+ BTIF_TRACE_WARNING2("%s: handle = %d", __FUNCTION__, handle);
+ for (i = 0; i < BTIF_HH_MAX_HID; i++) {
+ if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
+ btif_hh_cb.devices[i].dev_handle == handle)
+ {
+ return &btif_hh_cb.devices[i];
+ }
+ }
+ return NULL;
+}
+
+/*******************************************************************************
+**
+** Function btif_hh_find_dev_by_bda
+**
+** Description Return the device pointer of the specified bt_bdaddr_t.
+**
+** Returns Device entry pointer in the device table
+*******************************************************************************/
+static btif_hh_device_t *btif_hh_find_dev_by_bda(bt_bdaddr_t *bd_addr)
+{
+ UINT32 i;
+ BTIF_TRACE_EVENT1("%s", __FUNCTION__);
+ for (i = 0; i < BTIF_HH_MAX_HID; i++) {
+ if (btif_hh_cb.devices[i].dev_status != BTHH_CONN_STATE_UNKNOWN &&
+ memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
+ {
+ return &btif_hh_cb.devices[i];
+ }
+ }
+ return NULL;
+}
+
+/*******************************************************************************
+**
+** Function btif_hh_find_connected_dev_by_bda
+**
+** Description Return the connected device pointer of the specified bt_bdaddr_t.
+**
+** Returns Device entry pointer in the device table
+*******************************************************************************/
+static btif_hh_device_t *btif_hh_find_connected_dev_by_bda(bt_bdaddr_t *bd_addr)
+{
+ UINT32 i;
+ BTIF_TRACE_EVENT1("%s", __FUNCTION__);
+ for (i = 0; i < BTIF_HH_MAX_HID; i++) {
+ if (btif_hh_cb.devices[i].dev_status == BTHH_CONN_STATE_CONNECTED &&
+ memcmp(&(btif_hh_cb.devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0)
+ {
+ return &btif_hh_cb.devices[i];
+ }
+ }
+ return NULL;
+}
+
+static void btif_hh_update_keyboard_lockstates(btif_hh_device_t *p_dev)
+{
+ UINT8 len = 2; //reportid + 1 byte report
+}
+
+/*******************************************************************************
+**
+** Function btif_hh_update_keyevents
+**
+** Description Called by bta_co_hh.c when a key with a
+** lock state is pressed OR released.
+**
+** Returns void
+*******************************************************************************/
+void btif_hh_update_keyevents(UINT8 dev_handle, int keyevents)
+{
+ int keys_pressed_released;
+
+ BTIF_TRACE_DEBUG4("%s, dev_handle %d, previous keyevents 0x%x, current keyevents 0x%x",
+ __FUNCTION__, dev_handle, btif_hh_prev_keyevents,keyevents);
+
+ //Determines which keys have been pressed and released
+ //Bit set ==> key pressed
+ //Bit unset ==> key no longer pressed
+ //A key was pressed and released if bit from previous event was set
+ //And current bit is not set. We detect this by bitwise anding prev
+ //key event with the XOR of prev keyevents and the current key events.
+ keys_pressed_released = (btif_hh_prev_keyevents) &
+ (btif_hh_prev_keyevents ^ keyevents);
+ BTIF_TRACE_DEBUG2("%s, keys_pressed_released 0x%x", __FUNCTION__,keys_pressed_released);
+
+ //Set the prev_keyevents to the most recent key events.
+ btif_hh_prev_keyevents = keyevents;
+
+
+ if (keys_pressed_released)
+ {
+ //Determine state of the keys. (Caps/num/scroll engaged or not)
+ btif_hh_keylockstates = btif_hh_keylockstates ^ keys_pressed_released;
+
+ BTIF_TRACE_WARNING3("%s, keys_pressed_released 0x%x, btif_hh_keylockstates 0x%x",
+ __FUNCTION__,keys_pressed_released,btif_hh_keylockstates);
+
+ // btapp_hh_write_keylockstates();
+ // btapp_hh_update_all_keyboard_lockstates();
+ }
+}
+
+/*******************************************************************************
+**
+** Function btif_hh_add_added_dev
+**
+** Description Add a new device to the added device list.
+**
+** Returns TRUE if add successfully, otherwise FALSE.
+*******************************************************************************/
+BOOLEAN btif_hh_add_added_dev(bt_bdaddr_t bda, tBTA_HH_ATTR_MASK attr_mask)
+{
+ int i;
+ for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
+ if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN) == 0) {
+ BTIF_TRACE_WARNING6(" Device %02X:%02X:%02X:%02X:%02X:%02X already added",
+ bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
+ return FALSE;
+ }
+ }
+ for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
+ if (btif_hh_cb.added_devices[i].bd_addr.address[0] == 0 &&
+ btif_hh_cb.added_devices[i].bd_addr.address[1] == 0 &&
+ btif_hh_cb.added_devices[i].bd_addr.address[2] == 0 &&
+ btif_hh_cb.added_devices[i].bd_addr.address[3] == 0 &&
+ btif_hh_cb.added_devices[i].bd_addr.address[4] == 0 &&
+ btif_hh_cb.added_devices[i].bd_addr.address[5] == 0)
+ {
+ BTIF_TRACE_WARNING6(" Added device %02X:%02X:%02X:%02X:%02X:%02X",
+ bda.address[0], bda.address[1], bda.address[2], bda.address[3], bda.address[4], bda.address[5]);
+ memcpy(&(btif_hh_cb.added_devices[i].bd_addr), &bda, BD_ADDR_LEN);
+ btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
+ btif_hh_cb.added_devices[i].attr_mask = attr_mask;
+ return TRUE;
+ }
+ }
+
+ BTIF_TRACE_WARNING1("%s: Error, out of space to add device",__FUNCTION__);
+ return FALSE;
+}
+
+/*******************************************************************************
+ **
+ ** Function btif_hh_remove_device
+ **
+ ** Description Remove an added device from the stack.
+ **
+ ** Returns void
+ *******************************************************************************/
+void btif_hh_remove_device(bt_bdaddr_t bd_addr)
+{
+ int i;
+ btif_hh_device_t *p_dev;
+ btif_hh_added_device_t *p_added_dev;
+
+ LOGI("%s: bda = %02x:%02x:%02x:%02x:%02x:%02x", __FUNCTION__,
+ bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
+
+ for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
+ p_added_dev = &btif_hh_cb.added_devices[i];
+ if (memcmp(&(p_added_dev->bd_addr),&bd_addr, 6) == 0) {
+ BTA_HhRemoveDev(p_added_dev->dev_handle);
+
+ memset(&(p_added_dev->bd_addr), 0, 6);
+ p_added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
+ break;
+ }
+ }
+
+ p_dev = btif_hh_find_dev_by_bda(&bd_addr);
+ if (p_dev == NULL) {
+ BTIF_TRACE_WARNING6(" Oops, can't find device [%02x:%02x:%02x:%02x:%02x:%02x]",
+ bd_addr.address[0], bd_addr.address[1], bd_addr.address[2], bd_addr.address[3], bd_addr.address[4], bd_addr.address[5]);
+ return;
+ }
+
+ p_dev->dev_status = BTIF_HH_DEV_UNKNOWN;
+ p_dev->dev_handle = BTA_HH_INVALID_HANDLE;
+ if (btif_hh_cb.device_num > 0) {
+ btif_hh_cb.device_num--;
+ }
+ else {
+ BTIF_TRACE_WARNING1("%s: device_num = 0", __FUNCTION__);
+ }
+ if (p_dev->p_buf != NULL) {
+ GKI_freebuf(p_dev->p_buf);
+ p_dev->p_buf = NULL;
+ }
+
+#if (defined(HH_USE_BTHID) && (HH_USE_BTHID == TRUE))
+ BTIF_TRACE_DEBUG2("%s: bthid fd = %d", __FUNCTION__, p_dev->fd);
+ if (p_dev->fd >= 0) {
+ close(p_dev->fd);
+ p_dev->fd = -1;
+ }
+#endif /* (defined(HH_USE_BTHID) && (HH_USE_BTHID == TRUE)) */
+}
+
+
+BOOLEAN btif_hh_copy_hid_info(tBTA_HH_DEV_DSCP_INFO* dest , tBTA_HH_DEV_DSCP_INFO* src)
+{
+ dest->descriptor.dl_len = 0;
+ if (src->descriptor.dl_len >0)
+ {
+ dest->descriptor.dsc_list = (UINT8 *) GKI_getbuf(src->descriptor.dl_len);
+ if (dest->descriptor.dsc_list == NULL)
+ {
+ BTIF_TRACE_WARNING1("%s: Failed to allocate DSCP for CB", __FUNCTION__);
+ return FALSE;
+ }
+ }
+ memcpy(dest->descriptor.dsc_list, src->descriptor.dsc_list, src->descriptor.dl_len);
+ dest->descriptor.dl_len = src->descriptor.dl_len;
+ dest->vendor_id = src->vendor_id;
+ dest->product_id = src->product_id;
+ dest->version = src->version;
+ dest->ctry_code = src->ctry_code;
+ return TRUE;
+}
+
+/*******************************************************************************
+ **
+ ** Function btif_hh_mouse_pairing
+ **
+ ** Description btif_dm uses this method to inform btif_hh that the mouse
+ ** did fake pairing. A mouse is virtually plugged (paired)
+ ** dircetly by connecting. If the connection is failed, we need
+ ** remove the bonding.
+ ** Returns void
+ *******************************************************************************/
+void btif_hh_mouse_pairing(bt_bdaddr_t bd_addr)
+{
+ BTIF_TRACE_DEBUG1("%s", __FUNCTION__);
+ if (btif_hh_cb.status != BTIF_HH_ENABLED) {
+ BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
+ return;
+ }
+
+ btif_hh_cb.mouse_pairing = TRUE;
+ memcpy(&(btif_hh_cb.mouse_pairing_bda), &bd_addr, BD_ADDR_LEN);
+}
+
+
+/*******************************************************************************
+ **
+ ** Function btif_hh_clear_mouse_pairing
+ **
+ ** Description btif_dm uses this method to check whether device disconnected
+ ** is perform pairing. If yes, remove the bonding.
+ ** Returns void
+ *******************************************************************************/
+void btif_hh_clear_mouse_pairing(bt_bdaddr_t bd_addr)
+{
+ BTIF_TRACE_DEBUG1("%s", __FUNCTION__);
+ if (btif_hh_cb.mouse_pairing) {
+ BTIF_TRACE_DEBUG1("%s", __FUNCTION__);
+ if (memcmp(&(btif_hh_cb.mouse_pairing_bda), &bd_addr, BD_ADDR_LEN) == 0) {
+ btif_hh_cb.mouse_pairing = FALSE;
+ //TODO: Send signal
+ // SIG_HH_VUP
+ }
+ }
+}
+
+/*****************************************************************************
+** Section name (Group of functions)
+*****************************************************************************/
+
+/*****************************************************************************
+**
+** btif hh api functions (no context switch)
+**
+*****************************************************************************/
+
+
+/*******************************************************************************
+**
+** Function btif_hh_upstreams_evt
+**
+** Description Executes HH UPSTREAMS events in btif context
+**
+** Returns void
+**
+*******************************************************************************/
+static void btif_hh_upstreams_evt(UINT16 event, char* p_param)
+{
+ tBTA_HH *p_data = (tBTA_HH *)p_param;
+ bdstr_t bdstr;
+ btif_hh_device_t *p_dev = NULL;
+ int len;
+
+ BTIF_TRACE_DEBUG2("%s: event=%s", __FUNCTION__, dump_hh_event(event));
+
+ switch (event)
+ {
+ case BTA_HH_ENABLE_EVT:
+ BTIF_TRACE_DEBUG2("%s: BTA_HH_ENABLE_EVT: status =%d",__FUNCTION__, p_data->status);
+ if (p_data->status == BTA_HH_OK) {
+ btif_hh_cb.status = BTIF_HH_ENABLED;
+ BTIF_TRACE_DEBUG1("%s--Loading added devices",__FUNCTION__);
+ //TODO:
+ //btif_storage_load_bonded_hid_info();
+ }
+ else {
+ btif_hh_cb.status = BTIF_HH_DISABLED;
+ BTIF_TRACE_WARNING1("BTA_HH_ENABLE_EVT: Error, HH enabling failed, status = %d", p_data->status);
+ }
+ break;
+
+ case BTA_HH_DISABLE_EVT:
+ btif_hh_cb.status = BTIF_HH_DISABLED;
+ if (p_data->status != BTA_HH_OK) {
+ BTIF_TRACE_WARNING1("BTA_HH_DISABLE_EVT: Error, HH disabling failed, status = %d", p_data->status);
+ }
+ break;
+
+ case BTA_HH_OPEN_EVT:
+ BTIF_TRACE_WARNING3("%s: BTA_HH_OPN_EVT: handle=%d, status =%d",__FUNCTION__, p_data->conn.handle, p_data->conn.status);
+ if (p_data->conn.status == BTA_HH_OK) {
+ p_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
+ if (p_dev == NULL) {
+ BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Error, cannot find device with handle %d", p_data->conn.handle);
+
+ // The connect request must come from device side and exceeded the connected
+ // HID device number.
+ BTA_HhClose(p_data->conn.handle);
+ HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
+ }
+ else if (p_dev->fd < 0) {
+ BTIF_TRACE_WARNING0("BTA_HH_OPEN_EVT: Error, failed to find the bthid driver...");
+ BTA_HhClose(p_data->conn.handle);
+ p_dev->dev_status = BTHH_CONN_STATE_FAILED_NO_BTHID_DRIVER;
+ HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
+ if (btif_hh_cb.mouse_pairing &&
+ memcmp(&(btif_hh_cb.mouse_pairing_bda), p_data->conn.bda, BD_ADDR_LEN) == 0){
+ BTIF_TRACE_DEBUG0("OPEN_EVT: Mouse pairing");
+ // VUP the device
+ btif_hh_cb.mouse_pairing = FALSE;
+ //BTA_HhSendCtrl(p_dev->dev_handle, BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG);
+ }
+ }
+ else {
+ BTIF_TRACE_WARNING1("BTA_HH_OPEN_EVT: Found device...Getting dscp info for handle ... %d",p_data->conn.handle);
+ memcpy(&(p_dev->bd_addr), p_data->conn.bda, BD_ADDR_LEN);
+ //BTA_HhSetIdle(p_data->conn.handle, 0);
+ btif_hh_cb.p_curr_dev = btif_hh_find_connected_dev_by_handle(p_data->conn.handle);
+ BTA_HhGetDscpInfo(p_data->conn.handle);
+ p_dev->dev_status = BTHH_CONN_STATE_CONNECTED;
+ HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
+ if (btif_hh_cb.mouse_pairing &&
+ memcmp(&(btif_hh_cb.mouse_pairing_bda), p_data->conn.bda, BD_ADDR_LEN) == 0){
+ btif_hh_cb.mouse_pairing = FALSE;
+ }
+ }
+ }
+ else {
+ bt_bdaddr_t *bdaddr = (bt_bdaddr_t*)p_data->conn.bda;
+ HAL_CBACK(bt_hh_callbacks, connection_state_cb, (bt_bdaddr_t*) &p_data->conn.bda,BTHH_CONN_STATE_DISCONNECTED);
+ if (btif_hh_cb.mouse_pairing &&
+ memcmp(&(btif_hh_cb.mouse_pairing_bda), p_data->conn.bda, BD_ADDR_LEN) == 0)
+ {
+ BTIF_TRACE_WARNING0("BTA_HH_OPEN_EVT: Mouse paired but connectio failed. Remove bonding...");
+ btif_hh_cb.mouse_pairing = FALSE;
+ //TODO remove bonding
+ //btif_dm_cb_remove_bond(bdaddr);
+ HAL_CBACK(bt_hh_callbacks, virtual_unplug_cb,bdaddr,BTHH_CONN_STATE_DISCONNECTED);
+ }
+ }
+ break;
+ case BTA_HH_CLOSE_EVT:
+ BTIF_TRACE_DEBUG2("BTA_HH_CLOSE_EVT: status = %d, handle = %d",
+ p_data->dev_status.status, p_data->dev_status.handle);
+ p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
+ if (p_dev != NULL) {
+#if (defined(HH_USE_BTHID) && (HH_USE_BTHID == TRUE))
+ BTIF_TRACE_DEBUG2("%s: bthid fd = %d", __FUNCTION__, p_dev->fd);
+ if (p_dev->fd >= 0){
+ UINT8 hidreport[9];
+ memset(hidreport,0,9);
+ hidreport[0]=1;
+ write(p_dev->fd, hidreport, 9);
+ }
+#endif
+ p_dev->dev_status = BTHH_CONN_STATE_DISCONNECTED;
+ HAL_CBACK(bt_hh_callbacks, connection_state_cb,&(p_dev->bd_addr), p_dev->dev_status);
+ BTIF_TRACE_DEBUG2("%s: Closing bthid.ko fd = %d", __FUNCTION__, p_dev->fd);
+ close(p_dev->fd);
+ p_dev->fd = -1;
+ }
+ else {
+ BTIF_TRACE_WARNING1("Error: cannot find device with handle %d", p_data->dev_status.handle);
+ }
+ break;
+ case BTA_HH_GET_RPT_EVT:
+ BTIF_TRACE_DEBUG2("BTA_HH_GET_RPT_EVT: status = %d, handle = %d",
+ p_data->hs_data.status, p_data->hs_data.handle);
+ break;
+
+ case BTA_HH_SET_RPT_EVT:
+ BTIF_TRACE_DEBUG2("BTA_HH_SET_RPT_EVT: status = %d, handle = %d",
+ p_data->dev_status.status, p_data->dev_status.handle);
+ p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
+ if (p_dev != NULL && p_dev->p_buf != NULL) {
+ BTIF_TRACE_DEBUG0("Freeing buffer..." );
+ GKI_freebuf(p_dev->p_buf);
+ p_dev->p_buf = NULL;
+ }
+ break;
+
+ case BTA_HH_GET_PROTO_EVT:
+ BTIF_TRACE_WARNING4("BTA_HH_GET_PROTO_EVT: status = %d, handle = %d, proto = [%d], %s",
+ p_data->hs_data.status, p_data->hs_data.handle,
+ p_data->hs_data.rsp_data.proto_mode,
+ (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_RPT_MODE) ? "Report Mode" :
+ (p_data->hs_data.rsp_data.proto_mode == BTA_HH_PROTO_BOOT_MODE) ? "Boot Mode" : "Unsupported");
+ break;
+
+ case BTA_HH_SET_PROTO_EVT:
+ BTIF_TRACE_DEBUG2("BTA_HH_SET_PROTO_EVT: status = %d, handle = %d",
+ p_data->dev_status.status, p_data->dev_status.handle);
+ break;
+ /*
+ case BTA_HH_GET_IDLE_EVT:
+ BTIF_TRACE_DEBUG3("BTA_HH_GET_IDLE_EVT: handle = %d, status = %d, rate = %d",
+ p_data->hs_data.handle, p_data->hs_data.status,
+ p_data->hs_data.rsp_data.idle_rate);
+ break;
+
+ case BTA_HH_SET_IDLE_EVT:
+ BTIF_TRACE_DEBUG2("BTA_HH_SET_IDLE_EVT: status = %d, handle = %d",
+ p_data->dev_status.status, p_data->dev_status.handle);
+ btif_hh_cb.p_curr_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
+ BTA_HhGetDscpInfo(p_data->dev_status.handle);
+ break;
+ */
+
+ case BTA_HH_GET_DSCP_EVT:
+ BTIF_TRACE_WARNING2("BTA_HH_GET_DSCP_EVT: status = %d, handle = %d",
+ p_data->dev_status.status, p_data->dev_status.handle);
+ len = p_data->dscp_info.descriptor.dl_len;
+ BTIF_TRACE_DEBUG1("BTA_HH_GET_DSCP_EVT: len = %d", len);
+ p_dev = btif_hh_cb.p_curr_dev;
+ if (p_dev == NULL) {
+ BTIF_TRACE_ERROR0("BTA_HH_GET_DSCP_EVT: No HID device is currently connected");
+ return;
+ }
+
+#if (defined(HH_USE_BTHID) && (HH_USE_BTHID == TRUE))
+ if (p_dev->fd < 0) {
+ LOGE("BTA_HH_GET_DSCP_EVT: Error, failed to find the bthid driver...");
+ return;
+ }
+#endif
+ {
+ char *cached_name = NULL;
+ char name[] = "Broadcom Bluetooth HID";
+ if (cached_name == NULL) {
+ cached_name = name;
+ }
+
+ BTIF_TRACE_WARNING2("%s: name = %s", __FUNCTION__, cached_name);
+
+ bta_hh_co_send_hid_info(p_dev, cached_name,
+ p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
+ p_data->dscp_info.version, p_data->dscp_info.ctry_code,
+ len, p_data->dscp_info.descriptor.dsc_list);
+ if (btif_hh_add_added_dev(p_dev->bd_addr, p_dev->attr_mask)) {
+ BD_ADDR bda;
+ bdcpy(bda, p_dev->bd_addr.address);
+ tBTA_HH_DEV_DSCP_INFO dscp_info;
+ bt_status_t ret;
+ bdcpy(bda, p_dev->bd_addr.address);
+ btif_hh_copy_hid_info(&dscp_info, &p_data->dscp_info);
+ BTIF_TRACE_DEBUG6("BTA_HH_GET_DSCP_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
+ p_dev->bd_addr.address[0], p_dev->bd_addr.address[1], p_dev->bd_addr.address[2],
+ p_dev->bd_addr.address[3], p_dev->bd_addr.address[4], p_dev->bd_addr.address[5]);
+
+ BTIF_TRACE_DEBUG6("BTA_HH_GET_DSCP_EVT:bda2 = %02x:%02x:%02x:%02x:%02x:%02x",
+ bda[0], bda[1], bda[2],
+ bda[3], bda[4], bda[5]);
+
+ BTIF_TRACE_WARNING0("BTA_HH_GET_DSCP_EVT: Calling add device");
+ BTIF_TRACE_WARNING1("BTA_HH_GET_DSCP_EVT: attr_mask %d", p_dev->attr_mask);
+ BTIF_TRACE_WARNING1("BTA_HH_GET_DSCP_EVT: sub_class %d", p_dev->sub_class);
+ BTIF_TRACE_WARNING1("BTA_HH_GET_DSCP_EVT: app_id %d", p_dev->app_id);
+ BTIF_TRACE_WARNING2("BTA_HH_GET_DSCP_EVT:desc_len=%d, dscp_info %d",len,&dscp_info);
+ BTIF_TRACE_DEBUG4("BTA_HH_GET_DSCP_EVT:country_code=%d,dscp_len=%d,version_id=%d,product_id=%d",
+ dscp_info.ctry_code,
+ dscp_info.descriptor.dl_len,
+ dscp_info.vendor_id,dscp_info.product_id);
+ BTA_HhAddDev(bda, p_dev->attr_mask,p_dev->sub_class,p_dev->app_id, dscp_info);
+ //TODO write hid info to nvram
+ /*
+ ret = btif_storage_add_hid_device_info(&(p_dev->bd_addr), p_dev->attr_mask,p_dev->sub_class,p_dev->app_id,
+ p_data->dscp_info.vendor_id, p_data->dscp_info.product_id,
+ p_data->dscp_info.version, p_data->dscp_info.ctry_code,
+ len, p_data->dscp_info.descriptor.dsc_list);
+
+ ASSERTC(ret == BT_STATUS_SUCCESS, "storing hid info failed", ret);*/
+ BTIF_TRACE_WARNING0("BTA_HH_GET_DSCP_EVT: Called add device");
+
+ //Free buffer created for dscp_info;
+ if (dscp_info.descriptor.dl_len >0 && dscp_info.descriptor.dsc_list != NULL)
+ {
+ GKI_freebuf(dscp_info.descriptor.dsc_list);
+ dscp_info.descriptor.dsc_list = NULL;
+ dscp_info.descriptor.dl_len=0;
+ }
+
+
+
+ //TODO:SEND hid info signal
+ //Sync HID Keyboard lockstates
+ // btif_hh_sync_lockstate_reconnect(p_dev);
+ //End Sync HID Keyboard lockstates
+ }
+ else {
+ //Device already added.
+ BTIF_TRACE_WARNING1("%s: Device already added ",__FUNCTION__);
+ }
+ }
+ break;
+
+ case BTA_HH_ADD_DEV_EVT:
+ BTIF_TRACE_WARNING2("BTA_HH_ADD_DEV_EVT: status = %d, handle = %d",p_data->dev_info.status, p_data->dev_info.handle);
+ int i;
+ for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
+ if (memcmp(btif_hh_cb.added_devices[i].bd_addr.address, p_data->dev_info.bda, 6) == 0) {
+ if (p_data->dev_info.status == BTA_HH_OK) {
+ btif_hh_cb.added_devices[i].dev_handle = p_data->dev_info.handle;
+ }
+ else {
+ memset(btif_hh_cb.added_devices[i].bd_addr.address, 0, 6);
+ btif_hh_cb.added_devices[i].dev_handle = BTA_HH_INVALID_HANDLE;
+ }
+ break;
+ }
+ }
+ break;
+ case BTA_HH_RMV_DEV_EVT:
+ BTIF_TRACE_DEBUG2("BTA_HH_RMV_DEV_EVT: status = %d, handle = %d",
+ p_data->dev_info.status, p_data->dev_info.handle);
+ BTIF_TRACE_DEBUG6("BTA_HH_RMV_DEV_EVT:bda = %02x:%02x:%02x:%02x:%02x:%02x",
+ p_data->dev_info.bda[0], p_data->dev_info.bda[1], p_data->dev_info.bda[2],
+ p_data->dev_info.bda[3], p_data->dev_info.bda[4], p_data->dev_info.bda[5]);
+ break;
+
+ case BTA_HH_VC_UNPLUG_EVT:
+ LOGI("BTA_HH_VC_UNPLUG_EVT: status = %d, handle = %d",
+ p_data->dev_status.status, p_data->dev_status.handle);
+ p_dev = btif_hh_find_connected_dev_by_handle(p_data->dev_status.handle);
+ if (p_dev != NULL) {
+ //TODO:
+ //SEND COnnection signal and VUP signal
+ if (btif_hh_cb.mouse_pairing &&
+ memcmp(&(btif_hh_cb.mouse_pairing_bda), &(p_dev->bd_addr), BD_ADDR_LEN) == 0)
+ {
+ btif_hh_cb.mouse_pairing = FALSE;
+ }
+ }
+ break;
+
+ case BTA_HH_API_ERR_EVT :
+ LOGI("BTA_HH API_ERR");
+ break;
+
+
+
+ default:
+ BTIF_TRACE_WARNING2("%s: Unhandled event: %d", __FUNCTION__, event);
+ break;
+ }
+}
+
+/*******************************************************************************
+**
+** Function bte_hh_evt
+**
+** Description Switches context from BTE to BTIF for all HH events
+**
+** Returns void
+**
+*******************************************************************************/
+
+static void bte_hh_evt(tBTA_HH_EVT event, tBTA_HH *p_data)
+{
+ bt_status_t status;
+ int param_len = 0;
+
+ if (BTA_HH_ENABLE_EVT == event)
+ param_len = sizeof(tBTA_HH_STATUS);
+ else if (BTA_HH_OPEN_EVT == event)
+ param_len = sizeof(tBTA_HH_CONN);
+ else if (BTA_HH_DISABLE_EVT == event)
+ param_len = sizeof(tBTA_HH_STATUS);
+ else if (BTA_HH_CLOSE_EVT == event)
+ param_len = sizeof(tBTA_HH_CBDATA);
+ else if (BTA_HH_GET_DSCP_EVT == event)
+ param_len = sizeof(tBTA_HH_DEV_DSCP_INFO);
+ else if ((BTA_HH_GET_PROTO_EVT == event) || (BTA_HH_GET_RPT_EVT == event) )//|| (BTA_HH_GET_IDLE_EVT == event))
+ param_len = sizeof(tBTA_HH_HSDATA);
+ else if ((BTA_HH_SET_PROTO_EVT == event) || (BTA_HH_SET_RPT_EVT == event) || (BTA_HH_VC_UNPLUG_EVT == event)) //|| (BTA_HH_SET_IDLE_EVT == event))
+ param_len = sizeof(tBTA_HH_CBDATA);
+ else if ((BTA_HH_ADD_DEV_EVT == event) || (BTA_HH_RMV_DEV_EVT == event) )
+ param_len = sizeof(tBTA_HH_DEV_INFO);
+ else if (BTA_HH_API_ERR_EVT == event)
+ param_len = 0;
+ /* switch context to btif task context (copy full union size for convenience) */
+ status = btif_transfer_context(btif_hh_upstreams_evt, (uint16_t)event, (void*)p_data, param_len, NULL);
+
+ /* catch any failed context transfers */
+ ASSERTC(status == BT_STATUS_SUCCESS, "context transfer failed", status);
+}
+
+/*******************************************************************************
+**
+** Function btif_hh_handle_evt
+**
+** Description Switches context for immediate callback
+**
+** Returns void
+**
+*******************************************************************************/
+
+static void btif_hh_handle_evt(UINT16 event, char *p_param)
+{
+ bt_bdaddr_t *bd_addr = (bt_bdaddr_t*)p_param;
+ BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event);
+ switch(event)
+ {
+ case BTIF_HH_CONNECT_REQ_EVT:
+ {
+ HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_CONNECTING);
+ }
+ break;
+ case BTIF_HH_DISCONNECT_REQ_EVT:
+ {
+ BTIF_TRACE_EVENT2("%s: event=%d", __FUNCTION__, event);
+ HAL_CBACK(bt_hh_callbacks, connection_state_cb,bd_addr,BTHH_CONN_STATE_DISCONNECTING);
+ }
+ break;
+
+ default:
+ {
+ BTIF_TRACE_WARNING2("%s : Unknown event 0x%x", __FUNCTION__, event);
+ }
+ break;
+ }
+}
+
+
+/*******************************************************************************
+**
+** Function btif_hh_init
+**
+** Description initializes the hh interface
+**
+** Returns bt_status_t
+**
+*******************************************************************************/
+static bt_status_t init( bthh_callbacks_t* callbacks )
+{
+ UINT32 i;
+ BTIF_TRACE_EVENT1("%s", __FUNCTION__);
+
+ bt_hh_callbacks = callbacks;
+ memset(&btif_hh_cb, 0, sizeof(btif_hh_cb));
+ for (i = 0; i < BTIF_HH_MAX_HID; i++){
+ btif_hh_cb.devices[i].dev_status = BTHH_CONN_STATE_UNKNOWN;
+ }
+ /* Invoke the enable service API to the core to set the appropriate service_id */
+ btif_enable_service(BTA_HID_SERVICE_ID);
+ return BT_STATUS_SUCCESS;
+}
+
+/*******************************************************************************
+**
+** Function connect
+**
+** Description connect to hid device
+**
+** Returns bt_status_t
+**
+*******************************************************************************/
+static bt_status_t connect( bt_bdaddr_t *bd_addr)
+{
+ btif_hh_device_t *dev;
+ btif_hh_added_device_t *added_dev = NULL;
+ char bda_str[20];
+ int i;
+ BD_ADDR *bda = (BD_ADDR*)bd_addr;
+ tBTA_HH_CONN conn;
+ CHECK_BTHH_INIT();
+ BTIF_TRACE_EVENT1("%s", __FUNCTION__);
+ dev = btif_hh_find_dev_by_bda(bd_addr);
+ sprintf(bda_str, "%02X:%02X:%02X:%02X:%02X:%02X",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+ if (dev == NULL && btif_hh_cb.device_num >= BTIF_HH_MAX_HID) {
+ // No space for more HID device now.
+ BTIF_TRACE_WARNING2("%s: Error, exceeded the maximum supported HID device number %d",
+ __FUNCTION__, BTIF_HH_MAX_HID);
+ return BT_STATUS_FAIL;
+ }
+
+ for (i = 0; i < BTIF_HH_MAX_ADDED_DEV; i++) {
+ if (memcmp(&(btif_hh_cb.added_devices[i].bd_addr), bd_addr, BD_ADDR_LEN) == 0) {
+ added_dev = &btif_hh_cb.added_devices[i];
+ BTIF_TRACE_WARNING3("%s: Device %s already added, attr_mask = 0x%x",
+ __FUNCTION__, bda_str, added_dev->attr_mask);
+ }
+ }
+
+ if (added_dev != NULL) {
+ if (added_dev->dev_handle == BTA_HH_INVALID_HANDLE) {
+ // No space for more HID device now.
+ LOGE("%s: Error, device %s added but addition failed", __FUNCTION__, bda_str);
+ memset(&(added_dev->bd_addr), 0, 6);
+ added_dev->dev_handle = BTA_HH_INVALID_HANDLE;
+ return BT_STATUS_FAIL;
+ }
+ }
+ if (added_dev == NULL ||
+ (added_dev->attr_mask & HID_NORMALLY_CONNECTABLE) != 0 ||
+ (added_dev->attr_mask & HID_RECONN_INIT) == 0)
+ {
+ tBTA_SEC sec_mask = BTUI_HH_SECURITY;
+ if (check_cod(bd_addr, COD_HID_POINTING)){
+ sec_mask = BTUI_HH_MOUSE_SECURITY;
+ }
+ BTA_HhOpen(*bda, BTA_HH_PROTO_RPT_MODE, sec_mask);
+ //return BT_STATUS_SUCCESS;
+ return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_CONNECT_REQ_EVT,
+ (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
+ }
+ else {
+ // This device shall be connected from the host side.
+ LOGI("%s: Error, device %s can only be reconnected from device side",
+ __FUNCTION__, bda_str);
+ //TODO
+ /* if ((remote_class & BT_DEV_CLASS_MASK) == BT_DEV_CLASS_HID_POINTING) {
+ //SIG_HH_CONNECTION, *bda, HH_CONN_STATUS_FAILED_MOUSE_FROM_HOST);
+ }
+ else {
+ // SIG_HH_CONNECTION, *bda, HH_CONN_STATUS_FAILED_KBD_FROM_HOST);
+ }*/
+ }
+
+ return BT_STATUS_BUSY;
+}
+
+/*******************************************************************************
+**
+** Function disconnect
+**
+** Description disconnect from hid device
+**
+** Returns bt_status_t
+**
+*******************************************************************************/
+static bt_status_t disconnect( bt_bdaddr_t *bd_addr )
+{
+ CHECK_BTHH_INIT();
+ btif_hh_device_t *p_dev;
+
+
+ if (btif_hh_cb.status != BTIF_HH_ENABLED)
+ {
+ BTIF_TRACE_WARNING2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
+ return BT_STATUS_FAIL;
+ }
+
+ p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
+ if (p_dev != NULL)
+ {
+ BTA_HhClose(p_dev->dev_handle);
+ return btif_transfer_context(btif_hh_handle_evt, BTIF_HH_DISCONNECT_REQ_EVT,
+ (char*)bd_addr, sizeof(bt_bdaddr_t), NULL);
+ }
+ else
+ {
+ BTIF_TRACE_WARNING1("%s: Error, device not opened.", __FUNCTION__);
+ return BT_STATUS_FAIL;
+ }
+}
+
+/*******************************************************************************
+**
+** Function virtual_unplug
+**
+** Description Virtual UnPlug (VUP) the specified HID device.
+**
+** Returns bt_status_t
+**
+*******************************************************************************/
+static bt_status_t virtual_unplug (bt_bdaddr_t *bd_addr)
+{
+ CHECK_BTHH_INIT();
+ btif_hh_device_t *p_dev;
+ char bd_str[18];
+ sprintf(bd_str, "%02X:%02X:%02X:%02X:%02X:%02X",
+ bd_addr->address[0], bd_addr->address[1], bd_addr->address[2], bd_addr->address[3],
+ bd_addr->address[4], bd_addr->address[5]);
+ if (btif_hh_cb.status != BTIF_HH_ENABLED)
+ {
+ BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
+ return BT_STATUS_FAIL;
+ }
+
+ p_dev = btif_hh_find_dev_by_bda(bd_addr);
+ if (p_dev != NULL)
+ {
+ BTA_HhSendCtrl(p_dev->dev_handle, BTA_HH_CTRL_VIRTUAL_CABLE_UNPLUG);
+ return BT_STATUS_FAIL;
+ }
+ else {
+ BTIF_TRACE_ERROR2("%s: Error, device %s not opened.", __FUNCTION__, bd_str);
+ return BT_STATUS_FAIL;
+ }
+
+ return BT_STATUS_SUCCESS;
+}
+
+/*******************************************************************************
+**
+** Function set_info
+**
+** Description Set the HID device descriptor for the specified HID device.
+**
+** Returns bt_status_t
+**
+*******************************************************************************/
+static bt_status_t set_info (bt_bdaddr_t *bd_addr, bthh_hid_info_t hid_info )
+{
+ CHECK_BTHH_INIT();
+ tBTA_HH_DEV_DSCP_INFO dscp_info;
+ BD_ADDR* bda = (BD_ADDR*) bd_addr;
+
+ BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+ BTIF_TRACE_DEBUG6("%s: sub_class = 0x%02x, app_id = %d, vendor_id = 0x%04x, "
+ "product_id = 0x%04x, version= 0x%04x",
+ __FUNCTION__, hid_info.sub_class,
+ hid_info.app_id, hid_info.vendor_id, hid_info.product_id,
+ hid_info.version);
+
+ if (btif_hh_cb.status != BTIF_HH_ENABLED)
+ {
+ BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
+ return BT_STATUS_FAIL;
+ }
+
+ dscp_info.vendor_id = hid_info.vendor_id;
+ dscp_info.product_id = hid_info.product_id;
+ dscp_info.version = hid_info.version;
+ dscp_info.ctry_code = hid_info.ctry_code;
+
+ dscp_info.descriptor.dl_len = hid_info.dl_len;
+ dscp_info.descriptor.dsc_list = (UINT8 *) GKI_getbuf(dscp_info.descriptor.dl_len);
+ if (dscp_info.descriptor.dsc_list == NULL)
+ {
+ LOGE("%s: Failed to allocate DSCP for CB", __FUNCTION__);
+ return BT_STATUS_FAIL;
+ }
+ memcpy(dscp_info.descriptor.dsc_list, &(hid_info.dsc_list), hid_info.dl_len);
+
+ if (btif_hh_add_added_dev(*bd_addr, hid_info.attr_mask))
+ {
+ BTA_HhAddDev(*bda, hid_info.attr_mask, hid_info.sub_class,
+ hid_info.app_id, dscp_info);
+ }
+
+ GKI_freebuf(dscp_info.descriptor.dsc_list);
+
+ return BT_STATUS_SUCCESS;
+}
+
+/*******************************************************************************
+**
+** Function get_protocol
+**
+** Description Get the HID proto mode.
+**
+** Returns bt_status_t
+**
+*******************************************************************************/
+static bt_status_t get_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
+{
+ CHECK_BTHH_INIT();
+ btif_hh_device_t *p_dev;
+ BD_ADDR* bda = (BD_ADDR*) bd_addr;
+
+ BTIF_TRACE_DEBUG6(" addr = %02X:%02X:%02X:%02X:%02X:%02X",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+
+ if (btif_hh_cb.status != BTIF_HH_ENABLED) {
+ BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
+ return BT_STATUS_FAIL;
+ }
+
+ p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
+ if (p_dev != NULL) {
+ BTA_HhGetProtoMode(p_dev->dev_handle);
+ }
+ else {
+ return BT_STATUS_FAIL;
+ }
+ return BT_STATUS_SUCCESS;
+}
+
+/*******************************************************************************
+**
+** Function set_protocol
+**
+** Description Set the HID proto mode.
+**
+** Returns bt_status_t
+**
+*******************************************************************************/
+static bt_status_t set_protocol (bt_bdaddr_t *bd_addr, bthh_protocol_mode_t protocolMode)
+{
+ CHECK_BTHH_INIT();
+ btif_hh_device_t *p_dev;
+ UINT8 proto_mode = protocolMode;
+ BD_ADDR* bda = (BD_ADDR*) bd_addr;
+
+ BTIF_TRACE_DEBUG2("%s:proto_mode = %d", __FUNCTION__,protocolMode);
+
+ BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+
+ if (btif_hh_cb.status != BTIF_HH_ENABLED) {
+ BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
+ return BT_STATUS_FAIL;
+ }
+
+ p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
+ if (p_dev == NULL) {
+ BTIF_TRACE_WARNING6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+ return BT_STATUS_FAIL;
+ }
+ else if (protocolMode != BTA_HH_PROTO_RPT_MODE && protocolMode != BTA_HH_PROTO_BOOT_MODE) {
+ BTIF_TRACE_WARNING2("s: Error, device proto_mode = %d.", __FUNCTION__, proto_mode);
+ return BT_STATUS_FAIL;
+ }
+ else {
+ BTA_HhSetProtoMode(p_dev->dev_handle, protocolMode);
+ }
+
+
+ return BT_STATUS_SUCCESS;
+}
+
+/*******************************************************************************
+**
+** Function get_report
+**
+** Description Send a GET_REPORT to HID device.
+**
+** Returns bt_status_t
+**
+*******************************************************************************/
+static bt_status_t get_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, uint8_t reportId, int bufferSize)
+{
+ CHECK_BTHH_INIT();
+ btif_hh_device_t *p_dev;
+ BD_ADDR* bda = (BD_ADDR*) bd_addr;
+
+ BTIF_TRACE_DEBUG4("%s:proto_mode = %dr_type = %d, rpt_id = %d, buf_size = %d", __FUNCTION__,
+ reportType, reportId, bufferSize);
+
+ BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+
+ if (btif_hh_cb.status != BTIF_HH_ENABLED) {
+ BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
+ return BT_STATUS_FAIL;
+ }
+
+
+ p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
+ if (p_dev == NULL) {
+ BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+ return BT_STATUS_FAIL;
+ }
+ else if (reportType <= BTA_HH_RPTT_RESRV || reportType > BTA_HH_RPTT_FEATURE) {
+ BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+ return BT_STATUS_FAIL;
+ }
+ else {
+ BTA_HhGetReport(p_dev->dev_handle, reportType,
+ reportId, bufferSize);
+ }
+
+ return BT_STATUS_SUCCESS;
+}
+
+/*******************************************************************************
+**
+** Function set_report
+**
+** Description Send a SET_REPORT to HID device.
+**
+** Returns bt_status_t
+**
+*******************************************************************************/
+static bt_status_t set_report (bt_bdaddr_t *bd_addr, bthh_report_type_t reportType, char* report)
+{
+ CHECK_BTHH_INIT();
+ btif_hh_device_t *p_dev;
+ BD_ADDR* bda = (BD_ADDR*) bd_addr;
+
+ BTIF_TRACE_DEBUG2("%s:reportType = %d", __FUNCTION__,reportType);
+
+ BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+
+
+ if (btif_hh_cb.status != BTIF_HH_ENABLED) {
+ BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
+ return BT_STATUS_FAIL;
+ }
+
+ p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
+ if (p_dev == NULL) {
+ BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+ return BT_STATUS_FAIL;
+ }
+ else if (reportType <= BTA_HH_RPTT_RESRV || reportType > BTA_HH_RPTT_FEATURE) {
+ BTIF_TRACE_ERROR6(" Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+ return BT_STATUS_FAIL;
+ }
+ else {
+ int hex_bytes_filled;
+ UINT8 hexbuf[200];
+ UINT16 len = (strlen(report) + 1) / 2;
+
+ if (p_dev->p_buf != NULL) {
+ GKI_freebuf(p_dev->p_buf);
+ }
+ p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
+ if (p_dev->p_buf == NULL) {
+ BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len);
+ return BT_STATUS_FAIL;
+ }
+
+ p_dev->p_buf->len = len;
+ p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
+
+ /* Build a SetReport data buffer */
+ memset(hexbuf, 0, 200);
+ //TODO
+ /*hex_bytes_filled = scru_ascii_2_hex(report, len, hexbuf);
+ LOGI("Hex bytes filled, hex value: %d", hex_bytes_filled);
+
+ if (hex_bytes_filled) {
+ UINT8* pbuf_data;
+ pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset;
+ memcpy(pbuf_data, hexbuf, hex_bytes_filled);
+ BTA_HhSetReport(p_dev->dev_handle, reportType, p_dev->p_buf);
+ }*/
+ return BT_STATUS_SUCCESS;
+ }
+
+
+}
+
+/*******************************************************************************
+**
+** Function send_data
+**
+** Description Send a SEND_DATA to HID device.
+**
+** Returns bt_status_t
+**
+*******************************************************************************/
+static bt_status_t send_data (bt_bdaddr_t *bd_addr, char* data)
+{
+ CHECK_BTHH_INIT();
+ btif_hh_device_t *p_dev;
+ BD_ADDR* bda = (BD_ADDR*) bd_addr;
+
+ BTIF_TRACE_DEBUG1("%s", __FUNCTION__);
+
+ BTIF_TRACE_DEBUG6("addr = %02X:%02X:%02X:%02X:%02X:%02X",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+
+ if (btif_hh_cb.status != BTIF_HH_ENABLED) {
+ BTIF_TRACE_ERROR2("%s: Error, HH status = %d", __FUNCTION__, btif_hh_cb.status);
+ return BT_STATUS_FAIL;
+ }
+
+ p_dev = btif_hh_find_connected_dev_by_bda(bd_addr);
+ if (p_dev == NULL) {
+ BTIF_TRACE_ERROR6("%s: Error, device %02X:%02X:%02X:%02X:%02X:%02X not opened.",
+ (*bda)[0], (*bda)[1], (*bda)[2], (*bda)[3], (*bda)[4], (*bda)[5]);
+ return BT_STATUS_FAIL;
+ }
+
+ else {
+ int hex_bytes_filled;
+ UINT8 hexbuf[200];
+ UINT16 len = (strlen(data) + 1) / 2;
+
+ if (p_dev->p_buf != NULL) {
+ GKI_freebuf(p_dev->p_buf);
+ }
+ p_dev->p_buf = GKI_getbuf((UINT16) (len + BTA_HH_MIN_OFFSET + sizeof(BT_HDR)));
+ if (p_dev->p_buf == NULL) {
+ BTIF_TRACE_ERROR2("%s: Error, failed to allocate RPT buffer, len = %d", __FUNCTION__, len);
+ return BT_STATUS_FAIL;
+ }
+
+ p_dev->p_buf->len = len;
+ p_dev->p_buf->offset = BTA_HH_MIN_OFFSET;
+
+ /* Build a SetReport data buffer */
+ memset(hexbuf, 0, 200);
+ //TODO
+ /*
+ hex_bytes_filled = scru_ascii_2_hex(data, len, hexbuf);
+ BTIF_TRACE_ERROR2("Hex bytes filled, hex value: %d, %d", hex_bytes_filled, len);
+
+ if (hex_bytes_filled) {
+ UINT8* pbuf_data;
+ pbuf_data = (UINT8*) (p_dev->p_buf + 1) + p_dev->p_buf->offset;
+ memcpy(pbuf_data, hexbuf, hex_bytes_filled);
+ BTA_HhSendData(p_dev->dev_handle, *bda, p_dev->p_buf);
+ return BT_STATUS_SUCCESS;
+ }*/
+
+ }
+ return BT_STATUS_FAIL;
+}
+
+
+/*******************************************************************************
+**
+** Function cleanup
+**
+** Description Closes the HH interface
+**
+** Returns bt_status_t
+**
+*******************************************************************************/
+static void cleanup( void )
+{
+ BTIF_TRACE_EVENT1("%s", __FUNCTION__);
+
+ if (bt_hh_callbacks)
+ {
+ btif_disable_service(BTA_HID_SERVICE_ID);
+ bt_hh_callbacks = NULL;
+ }
+}
+
+static const bthh_interface_t bthhInterface = {
+ sizeof(bt_interface_t),
+ init,
+ connect,
+ disconnect,
+ virtual_unplug,
+ set_info,
+ get_protocol,
+ set_protocol,
+ get_report,
+ set_report,
+ send_data,
+ cleanup,
+};
+
+/*******************************************************************************
+**
+** Function btif_hh_execute_service
+**
+** Description Initializes/Shuts down the service
+**
+** Returns BT_STATUS_SUCCESS on success, BT_STATUS_FAIL otherwise
+**
+*******************************************************************************/
+bt_status_t btif_hh_execute_service(BOOLEAN b_enable)
+{
+ if (b_enable)
+ {
+ /* Enable and register with BTA-HH */
+ BTA_HhEnable(BTA_SEC_NONE, FALSE, bte_hh_evt);
+ }
+ else {
+ /* Disable HH */
+ BTA_HhDisable();
+ }
+ return BT_STATUS_SUCCESS;
+}
+
+/*******************************************************************************
+**
+** Function btif_hh_get_interface
+**
+** Description Get the hh callback interface
+**
+** Returns bthh_interface_t
+**
+*******************************************************************************/
+const bthh_interface_t *btif_hh_get_interface()
+{
+ BTIF_TRACE_EVENT1("%s", __FUNCTION__);
+ return &bthhInterface;
+}
diff --git a/btif/src/btif_storage.c b/btif/src/btif_storage.c
index 956bcb4..2e2d0a5 100644
--- a/btif/src/btif_storage.c
+++ b/btif/src/btif_storage.c
@@ -108,6 +108,9 @@
#include "btif_util.h"
#include "unv.h"
#include "bd.h"
+#include "gki.h"
+#include "bta_hh_api.h"
+#include "btif_hh.h"
/************************************************************************************
** Constants & Macros
@@ -123,6 +126,7 @@
#define BTIF_STORAGE_PATH_REMOTE_LINKKEYS "remote_linkkeys"
#define BTIF_STORAGE_PATH_REMOTE_ALIASES "remote_aliases"
#define BTIF_STORAGE_PATH_REMOTE_SERVICES "remote_services"
+#define BTIF_STORAGE_PATH_REMOTE_HIDINFO "hid_info"
#define BTIF_STORAGE_KEY_ADAPTER_NAME "name"
#define BTIF_STORAGE_KEY_ADAPTER_SCANMODE "scan_mode"
@@ -153,6 +157,7 @@
#define STORAGE_REMOTE_LINKKEYS_ENTRY_SIZE (LINK_KEY_LEN*2 + 1 + 2 + 1 + 2)
+
/* currently remote services is the potentially largest entry */
#define BTIF_STORAGE_MAX_LINE_SZ BTIF_REMOTE_SERVICES_ENTRY_SIZE_MAX
@@ -525,6 +530,29 @@ static bt_status_t btif_in_fetch_bonded_devices(btif_bonded_devices_t *p_bonded_
return BT_STATUS_SUCCESS;
}
+static int hex_str_to_int(const char* str, int size)
+{
+ int n = 0;
+ char c = *str++;
+ while (size-- != 0) {
+ n <<= 4;
+ if (c >= '0' && c <= '9')
+ {
+ n |= c - '0';
+ }
+ else if (c >= 'a' && c <= 'z')
+ {
+ n |= c - 'a' + 10;
+ }
+ else { // (c >= 'A' && c <= 'Z')
+ n |= c - 'A' + 10;
+ }
+
+ c = *str++;
+ }
+ return n;
+}
+
/************************************************************************************
** Externs
@@ -1059,3 +1087,4 @@ bt_status_t btif_storage_load_bonded_devices(void)
}
return BT_STATUS_SUCCESS;
}
+
diff --git a/btif/src/btif_util.c b/btif/src/btif_util.c
index a1a5d97..f5c06f8 100644..100755
--- a/btif/src/btif_util.c
+++ b/btif/src/btif_util.c
@@ -73,6 +73,8 @@
#include "btif_dm.h"
#include "btif_util.h"
#include "bta_ag_api.h"
+#include "bta_hh_api.h"
+
/************************************************************************************
@@ -269,6 +271,28 @@ const char* dump_hf_event(UINT16 event)
}
}
+const char* dump_hh_event(UINT16 event)
+{
+ switch(event)
+ {
+ CASE_RETURN_STR(BTA_HH_ENABLE_EVT)
+ CASE_RETURN_STR(BTA_HH_DISABLE_EVT)
+ CASE_RETURN_STR(BTA_HH_OPEN_EVT)
+ CASE_RETURN_STR(BTA_HH_CLOSE_EVT)
+ CASE_RETURN_STR(BTA_HH_GET_DSCP_EVT)
+ CASE_RETURN_STR(BTA_HH_GET_PROTO_EVT)
+ CASE_RETURN_STR(BTA_HH_GET_RPT_EVT)
+ CASE_RETURN_STR(BTA_HH_SET_PROTO_EVT)
+ CASE_RETURN_STR(BTA_HH_SET_RPT_EVT)
+ CASE_RETURN_STR(BTA_HH_VC_UNPLUG_EVT)
+ CASE_RETURN_STR(BTA_HH_ADD_DEV_EVT)
+ CASE_RETURN_STR(BTA_HH_RMV_DEV_EVT)
+ CASE_RETURN_STR(BTA_HH_API_ERR_EVT)
+ default:
+ return "UNKNOWN MSG ID";
+ }
+}
+
const char* dump_hf_conn_state(UINT16 event)
{