blob: 2201be4d4269fcdc5a7dcd049e660a2b756df171 [file] [log] [blame]
/******************************************************************************
*
* Copyright 1999-2012 Broadcom Corporation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
******************************************************************************/
/******************************************************************************
*
* This file contains functions that interface with the HCI transport. On
* the receive side, it routes events to the appropriate handler, e.g.
* L2CAP, ScoMgr. On the transmit side, it manages the command
* transmission.
*
******************************************************************************/
#define LOG_TAG "bt_btu_hcif"
#include "stack/include/btu_hcif.h"
#include <base/functional/bind.h>
#include <base/location.h>
#include <bluetooth/log.h>
#include <cstdint>
#include "common/init_flags.h"
#include "common/metrics.h"
#include "device/include/controller.h"
#include "internal_include/bt_target.h"
#include "main/shim/hci_layer.h"
#include "os/log.h"
#include "osi/include/allocator.h"
#include "stack/btm/neighbor_inquiry.h"
#include "stack/include/acl_hci_link_interface.h"
#include "stack/include/ble_acl_interface.h"
#include "stack/include/ble_hci_link_interface.h"
#include "stack/include/bt_hdr.h"
#include "stack/include/bt_types.h"
#include "stack/include/btm_ble_addr.h"
#include "stack/include/btm_ble_api.h"
#include "stack/include/btm_iso_api.h"
#include "stack/include/btm_sec_api_types.h"
#include "stack/include/dev_hci_link_interface.h"
#include "stack/include/hci_error_code.h"
#include "stack/include/hci_evt_length.h"
#include "stack/include/inq_hci_link_interface.h"
#include "stack/include/l2cap_hci_link_interface.h"
#include "stack/include/main_thread.h"
#include "stack/include/sco_hci_link_interface.h"
#include "stack/include/sec_hci_link_interface.h"
#include "stack/include/stack_metrics_logging.h"
#include "types/hci_role.h"
#include "types/raw_address.h"
using namespace bluetooth;
using base::Location;
using bluetooth::hci::IsoManager;
bool BTM_BLE_IS_RESOLVE_BDA(const RawAddress& x); // TODO remove
void BTA_sys_signal_hw_error(); // TODO remove
void smp_cancel_start_encryption_attempt(); // TODO remove
void acl_disconnect_from_handle(uint16_t handle, tHCI_STATUS reason,
std::string comment); // TODO remove
/******************************************************************************/
/* L O C A L F U N C T I O N P R O T O T Y P E S */
/******************************************************************************/
static void btu_hcif_authentication_comp_evt(uint8_t* p);
static void btu_hcif_rmt_name_request_comp_evt(const uint8_t* p,
uint16_t evt_len);
static void btu_hcif_encryption_change_evt(uint8_t* p);
static void btu_hcif_read_rmt_ext_features_comp_evt(uint8_t* p,
uint8_t evt_len);
static void btu_hcif_command_complete_evt(BT_HDR* response, void* context);
static void btu_hcif_command_status_evt(uint8_t status, BT_HDR* command,
void* context);
static void btu_hcif_mode_change_evt(uint8_t* p);
static void btu_hcif_link_key_notification_evt(const uint8_t* p);
static void btu_hcif_read_clock_off_comp_evt(uint8_t* p);
static void btu_hcif_esco_connection_comp_evt(const uint8_t* p);
static void btu_hcif_esco_connection_chg_evt(uint8_t* p);
/* Parsing functions for btm functions */
static void btu_hcif_sec_pin_code_request(const uint8_t* p);
static void btu_hcif_sec_link_key_request(const uint8_t* p);
static void btu_hcif_sec_rmt_host_support_feat_evt(const uint8_t* p);
static void btu_hcif_proc_sp_req_evt(tBTM_SP_EVT event, const uint8_t* p);
static void btu_hcif_rem_oob_req(const uint8_t* p);
static void btu_hcif_simple_pair_complete(const uint8_t* p);
static void btu_hcif_proc_sp_req_evt(const tBTM_SP_EVT event, const uint8_t* p);
static void btu_hcif_create_conn_cancel_complete(const uint8_t* p,
uint16_t evt_len);
static void btu_hcif_read_local_oob_complete(const uint8_t* p,
uint16_t evt_len);
/* Simple Pairing Events */
static void btu_hcif_io_cap_request_evt(const uint8_t* p);
static void btu_hcif_io_cap_response_evt(const uint8_t* p);
static void btu_ble_proc_ltk_req(uint8_t* p, uint16_t evt_len);
static void btu_hcif_encryption_key_refresh_cmpl_evt(uint8_t* p);
/**
* Log HCI event metrics that are not handled in special functions
* @param evt_code event code
* @param p_event pointer to event parameter, skipping paremter length
*/
static void btu_hcif_log_event_metrics(uint8_t evt_code,
const uint8_t* p_event) {
uint32_t cmd = android::bluetooth::hci::CMD_UNKNOWN;
uint16_t status = android::bluetooth::hci::STATUS_UNKNOWN;
uint16_t reason = android::bluetooth::hci::STATUS_UNKNOWN;
uint16_t handle = bluetooth::common::kUnknownConnectionHandle;
int64_t value = 0;
RawAddress bda = RawAddress::kEmpty;
switch (evt_code) {
case HCI_IO_CAPABILITY_REQUEST_EVT:
case HCI_IO_CAPABILITY_RESPONSE_EVT:
case HCI_LINK_KEY_REQUEST_EVT:
case HCI_LINK_KEY_NOTIFICATION_EVT:
case HCI_USER_PASSKEY_REQUEST_EVT:
case HCI_USER_PASSKEY_NOTIFY_EVT:
case HCI_USER_CONFIRMATION_REQUEST_EVT:
case HCI_KEYPRESS_NOTIFY_EVT:
case HCI_REMOTE_OOB_DATA_REQUEST_EVT:
STREAM_TO_BDADDR(bda, p_event);
log_classic_pairing_event(bda, handle, cmd, evt_code, status, reason,
value);
break;
case HCI_SIMPLE_PAIRING_COMPLETE_EVT:
case HCI_RMT_NAME_REQUEST_COMP_EVT:
STREAM_TO_UINT8(status, p_event);
STREAM_TO_BDADDR(bda, p_event);
log_classic_pairing_event(bda, handle, cmd, evt_code, status, reason,
value);
break;
case HCI_AUTHENTICATION_COMP_EVT:
STREAM_TO_UINT8(status, p_event);
STREAM_TO_UINT16(handle, p_event);
handle = HCID_GET_HANDLE(handle);
log_classic_pairing_event(bda, handle, cmd, evt_code, status, reason,
value);
break;
case HCI_ENCRYPTION_CHANGE_EVT: {
uint8_t encryption_enabled;
STREAM_TO_UINT8(status, p_event);
STREAM_TO_UINT16(handle, p_event);
STREAM_TO_UINT8(encryption_enabled, p_event);
log_classic_pairing_event(bda, handle, cmd, evt_code, status, reason,
encryption_enabled);
break;
}
case HCI_ESCO_CONNECTION_COMP_EVT: {
uint8_t link_type;
STREAM_TO_UINT8(status, p_event);
STREAM_TO_UINT16(handle, p_event);
STREAM_TO_BDADDR(bda, p_event);
STREAM_TO_UINT8(link_type, p_event);
handle = HCID_GET_HANDLE(handle);
log_link_layer_connection_event(
&bda, handle, android::bluetooth::DIRECTION_UNKNOWN, link_type, cmd,
evt_code, android::bluetooth::hci::BLE_EVT_UNKNOWN, status, reason);
break;
}
case HCI_ESCO_CONNECTION_CHANGED_EVT: {
STREAM_TO_UINT8(status, p_event);
STREAM_TO_UINT16(handle, p_event);
handle = HCID_GET_HANDLE(handle);
log_link_layer_connection_event(
nullptr, handle, android::bluetooth::DIRECTION_UNKNOWN,
android::bluetooth::LINK_TYPE_UNKNOWN, cmd, evt_code,
android::bluetooth::hci::BLE_EVT_UNKNOWN, status, reason);
break;
}
// Ignore these events
case HCI_BLE_EVENT:
break;
case HCI_VENDOR_SPECIFIC_EVT:
break;
case HCI_CONNECTION_COMP_EVT: // EventCode::CONNECTION_COMPLETE
case HCI_CONNECTION_REQUEST_EVT: // EventCode::CONNECTION_REQUEST
case HCI_DISCONNECTION_COMP_EVT: // EventCode::DISCONNECTION_COMPLETE
default:
log::error(
"Unexpectedly received event_code:0x{:02x} that should not be "
"handled here",
evt_code);
break;
}
}
/*******************************************************************************
*
* Function btu_hcif_process_event
*
* Description This function is called when an event is received from
* the Host Controller.
*
* Returns void
*
******************************************************************************/
void btu_hcif_process_event(UNUSED_ATTR uint8_t controller_id,
const BT_HDR* p_msg) {
uint8_t* p = (uint8_t*)(p_msg + 1) + p_msg->offset;
uint8_t hci_evt_code, hci_evt_len;
uint8_t ble_sub_code;
STREAM_TO_UINT8(hci_evt_code, p);
STREAM_TO_UINT8(hci_evt_len, p);
// validate event size
if (hci_evt_len < hci_event_parameters_minimum_length[hci_evt_code]) {
log::warn("evt:0x{:2X}, malformed event of size {}", hci_evt_code,
hci_evt_len);
return;
}
btu_hcif_log_event_metrics(hci_evt_code, p);
switch (hci_evt_code) {
case HCI_INQUIRY_RESULT_EVT:
btm_process_inq_results(p, hci_evt_len, BTM_INQ_RESULT_STANDARD);
break;
case HCI_INQUIRY_RSSI_RESULT_EVT:
btm_process_inq_results(p, hci_evt_len, BTM_INQ_RESULT_WITH_RSSI);
break;
case HCI_EXTENDED_INQUIRY_RESULT_EVT:
btm_process_inq_results(p, hci_evt_len, BTM_INQ_RESULT_EXTENDED);
break;
case HCI_AUTHENTICATION_COMP_EVT:
btu_hcif_authentication_comp_evt(p);
break;
case HCI_RMT_NAME_REQUEST_COMP_EVT:
btu_hcif_rmt_name_request_comp_evt(p, hci_evt_len);
break;
case HCI_ENCRYPTION_CHANGE_EVT:
btu_hcif_encryption_change_evt(p);
break;
case HCI_ENCRYPTION_KEY_REFRESH_COMP_EVT:
btu_hcif_encryption_key_refresh_cmpl_evt(p);
break;
case HCI_READ_RMT_EXT_FEATURES_COMP_EVT:
btu_hcif_read_rmt_ext_features_comp_evt(p, hci_evt_len);
break;
case HCI_COMMAND_COMPLETE_EVT:
log::error(
"should not have received a command complete event. Someone didn't "
"go through the hci transmit_command function.");
break;
case HCI_COMMAND_STATUS_EVT:
log::error(
"should not have received a command status event. Someone didn't go "
"through the hci transmit_command function.");
break;
case HCI_MODE_CHANGE_EVT:
btu_hcif_mode_change_evt(p);
break;
case HCI_PIN_CODE_REQUEST_EVT:
btu_hcif_sec_pin_code_request(p);
break;
case HCI_LINK_KEY_REQUEST_EVT:
btu_hcif_sec_link_key_request(p);
break;
case HCI_LINK_KEY_NOTIFICATION_EVT:
btu_hcif_link_key_notification_evt(p);
break;
case HCI_READ_CLOCK_OFF_COMP_EVT:
btu_hcif_read_clock_off_comp_evt(p);
break;
case HCI_ESCO_CONNECTION_COMP_EVT:
btu_hcif_esco_connection_comp_evt(p);
break;
case HCI_ESCO_CONNECTION_CHANGED_EVT:
btu_hcif_esco_connection_chg_evt(p);
break;
case HCI_SNIFF_SUB_RATE_EVT:
btm_pm_proc_ssr_evt(p, hci_evt_len);
break;
case HCI_RMT_HOST_SUP_FEAT_NOTIFY_EVT:
btu_hcif_sec_rmt_host_support_feat_evt(p);
break;
case HCI_IO_CAPABILITY_REQUEST_EVT:
btu_hcif_io_cap_request_evt(p);
break;
case HCI_IO_CAPABILITY_RESPONSE_EVT:
btu_hcif_io_cap_response_evt(p);
break;
case HCI_USER_CONFIRMATION_REQUEST_EVT:
btu_hcif_proc_sp_req_evt(BTM_SP_CFM_REQ_EVT, p);
break;
case HCI_USER_PASSKEY_REQUEST_EVT:
btu_hcif_proc_sp_req_evt(BTM_SP_KEY_REQ_EVT, p);
break;
case HCI_REMOTE_OOB_DATA_REQUEST_EVT:
btu_hcif_rem_oob_req(p);
break;
case HCI_SIMPLE_PAIRING_COMPLETE_EVT:
btu_hcif_simple_pair_complete(p);
break;
case HCI_USER_PASSKEY_NOTIFY_EVT:
btu_hcif_proc_sp_req_evt(BTM_SP_KEY_NOTIF_EVT, p);
break;
case HCI_BLE_EVENT: {
STREAM_TO_UINT8(ble_sub_code, p);
uint8_t ble_evt_len = hci_evt_len - 1;
switch (ble_sub_code) {
case HCI_BLE_READ_REMOTE_FEAT_CMPL_EVT:
btm_ble_read_remote_features_complete(p, ble_evt_len);
break;
case HCI_BLE_LTK_REQ_EVT: /* received only at peripheral device */
btu_ble_proc_ltk_req(p, ble_evt_len);
break;
case HCI_BLE_REQ_PEER_SCA_CPL_EVT:
btm_acl_process_sca_cmpl_pkt(ble_evt_len, p);
break;
case HCI_BLE_CIS_EST_EVT:
case HCI_BLE_CREATE_BIG_CPL_EVT:
case HCI_BLE_TERM_BIG_CPL_EVT:
case HCI_BLE_CIS_REQ_EVT:
case HCI_BLE_BIG_SYNC_EST_EVT:
case HCI_BLE_BIG_SYNC_LOST_EVT:
IsoManager::GetInstance()->HandleHciEvent(ble_sub_code, p,
ble_evt_len);
break;
default:
log::error(
"Unexpectedly received LE sub_event_code:0x{:02x} that should "
"not be handled here",
ble_sub_code);
break;
}
} break;
// Events now captured by gd::hci_layer module
case HCI_VENDOR_SPECIFIC_EVT:
case HCI_HARDWARE_ERROR_EVT:
case HCI_NUM_COMPL_DATA_PKTS_EVT: // EventCode::NUMBER_OF_COMPLETED_PACKETS
case HCI_CONNECTION_COMP_EVT: // EventCode::CONNECTION_COMPLETE
case HCI_CONNECTION_REQUEST_EVT: // EventCode::CONNECTION_REQUEST
case HCI_READ_RMT_FEATURES_COMP_EVT: // EventCode::READ_REMOTE_SUPPORTED_FEATURES_COMPLETE
case HCI_READ_RMT_VERSION_COMP_EVT: // EventCode::READ_REMOTE_VERSION_INFORMATION_COMPLETE
case HCI_ROLE_CHANGE_EVT: // EventCode::ROLE_CHANGE
case HCI_DISCONNECTION_COMP_EVT: // EventCode::DISCONNECTION_COMPLETE
default:
log::error(
"Unexpectedly received event_code:0x{:02x} that should not be "
"handled here",
hci_evt_code);
break;
}
}
static void btu_hcif_log_command_metrics(uint16_t opcode, const uint8_t* p_cmd,
uint16_t cmd_status,
bool is_cmd_status) {
static uint16_t kUnknownBleEvt = android::bluetooth::hci::BLE_EVT_UNKNOWN;
uint16_t hci_event = android::bluetooth::hci::EVT_COMMAND_STATUS;
if (!is_cmd_status) {
hci_event = android::bluetooth::hci::EVT_UNKNOWN;
cmd_status = android::bluetooth::hci::STATUS_UNKNOWN;
}
RawAddress bd_addr;
uint16_t handle;
uint8_t reason;
switch (opcode) {
case HCI_CREATE_CONNECTION:
case HCI_CREATE_CONNECTION_CANCEL:
STREAM_TO_BDADDR(bd_addr, p_cmd);
log_link_layer_connection_event(
&bd_addr, bluetooth::common::kUnknownConnectionHandle,
android::bluetooth::DIRECTION_OUTGOING,
android::bluetooth::LINK_TYPE_ACL, opcode, hci_event, kUnknownBleEvt,
cmd_status, android::bluetooth::hci::STATUS_UNKNOWN);
break;
case HCI_DISCONNECT:
STREAM_TO_UINT16(handle, p_cmd);
STREAM_TO_UINT8(reason, p_cmd);
log_link_layer_connection_event(
nullptr, handle, android::bluetooth::DIRECTION_UNKNOWN,
android::bluetooth::LINK_TYPE_UNKNOWN, opcode, hci_event,
kUnknownBleEvt, cmd_status, reason);
break;
case HCI_SETUP_ESCO_CONNECTION:
case HCI_ENH_SETUP_ESCO_CONNECTION:
STREAM_TO_UINT16(handle, p_cmd);
log_link_layer_connection_event(
nullptr, handle, android::bluetooth::DIRECTION_OUTGOING,
android::bluetooth::LINK_TYPE_UNKNOWN, opcode, hci_event,
kUnknownBleEvt, cmd_status, android::bluetooth::hci::STATUS_UNKNOWN);
break;
case HCI_ACCEPT_CONNECTION_REQUEST:
case HCI_ACCEPT_ESCO_CONNECTION:
case HCI_ENH_ACCEPT_ESCO_CONNECTION:
STREAM_TO_BDADDR(bd_addr, p_cmd);
log_link_layer_connection_event(
&bd_addr, bluetooth::common::kUnknownConnectionHandle,
android::bluetooth::DIRECTION_INCOMING,
android::bluetooth::LINK_TYPE_UNKNOWN, opcode, hci_event,
kUnknownBleEvt, cmd_status, android::bluetooth::hci::STATUS_UNKNOWN);
break;
case HCI_REJECT_CONNECTION_REQUEST:
case HCI_REJECT_ESCO_CONNECTION:
STREAM_TO_BDADDR(bd_addr, p_cmd);
STREAM_TO_UINT8(reason, p_cmd);
log_link_layer_connection_event(
&bd_addr, bluetooth::common::kUnknownConnectionHandle,
android::bluetooth::DIRECTION_INCOMING,
android::bluetooth::LINK_TYPE_UNKNOWN, opcode, hci_event,
kUnknownBleEvt, cmd_status, reason);
break;
// BLE Commands
case HCI_BLE_CREATE_LL_CONN: {
p_cmd += 2; // Skip LE_Scan_Interval
p_cmd += 2; // Skip LE_Scan_Window;
uint8_t initiator_filter_policy;
STREAM_TO_UINT8(initiator_filter_policy, p_cmd);
uint8_t peer_address_type;
STREAM_TO_UINT8(peer_address_type, p_cmd);
STREAM_TO_BDADDR(bd_addr, p_cmd);
// Peer address should not be used if initiator filter policy is not 0x00
const RawAddress* bd_addr_p = nullptr;
if (initiator_filter_policy == 0x00) {
bd_addr_p = &bd_addr;
if (peer_address_type == BLE_ADDR_PUBLIC_ID ||
peer_address_type == BLE_ADDR_RANDOM_ID) {
// if identity address is not matched, this address is invalid
if (!btm_identity_addr_to_random_pseudo(&bd_addr, &peer_address_type,
false)) {
bd_addr_p = nullptr;
}
}
}
if (initiator_filter_policy == 0x00 ||
(cmd_status != HCI_SUCCESS && !is_cmd_status)) {
// Selectively log to avoid log spam due to acceptlist connections:
// - When doing non-acceptlist connection
// - When there is an error in command status
log_link_layer_connection_event(
bd_addr_p, bluetooth::common::kUnknownConnectionHandle,
android::bluetooth::DIRECTION_OUTGOING,
android::bluetooth::LINK_TYPE_ACL, opcode, hci_event,
kUnknownBleEvt, cmd_status,
android::bluetooth::hci::STATUS_UNKNOWN);
}
break;
}
case HCI_LE_EXTENDED_CREATE_CONNECTION: {
uint8_t initiator_filter_policy;
STREAM_TO_UINT8(initiator_filter_policy, p_cmd);
p_cmd += 1; // Skip Own_Address_Type
uint8_t peer_addr_type;
STREAM_TO_UINT8(peer_addr_type, p_cmd);
STREAM_TO_BDADDR(bd_addr, p_cmd);
// Peer address should not be used if initiator filter policy is not 0x00
const RawAddress* bd_addr_p = nullptr;
if (initiator_filter_policy == 0x00) {
bd_addr_p = &bd_addr;
// if identity address is not matched, this should be a static address
btm_identity_addr_to_random_pseudo(&bd_addr, &peer_addr_type, false);
}
if (initiator_filter_policy == 0x00 ||
(cmd_status != HCI_SUCCESS && !is_cmd_status)) {
// Selectively log to avoid log spam due to acceptlist connections:
// - When doing non-acceptlist connection
// - When there is an error in command status
log_link_layer_connection_event(
bd_addr_p, bluetooth::common::kUnknownConnectionHandle,
android::bluetooth::DIRECTION_OUTGOING,
android::bluetooth::LINK_TYPE_ACL, opcode, hci_event,
kUnknownBleEvt, cmd_status,
android::bluetooth::hci::STATUS_UNKNOWN);
}
break;
}
case HCI_BLE_CREATE_CONN_CANCEL:
if (cmd_status != HCI_SUCCESS && !is_cmd_status) {
// Only log errors to prevent log spam due to acceptlist connections
log_link_layer_connection_event(
nullptr, bluetooth::common::kUnknownConnectionHandle,
android::bluetooth::DIRECTION_OUTGOING,
android::bluetooth::LINK_TYPE_ACL, opcode, hci_event,
kUnknownBleEvt, cmd_status,
android::bluetooth::hci::STATUS_UNKNOWN);
}
break;
case HCI_READ_LOCAL_OOB_DATA:
log_classic_pairing_event(RawAddress::kEmpty,
bluetooth::common::kUnknownConnectionHandle,
opcode, hci_event, cmd_status,
android::bluetooth::hci::STATUS_UNKNOWN, 0);
break;
case HCI_WRITE_SIMPLE_PAIRING_MODE: {
uint8_t simple_pairing_mode;
STREAM_TO_UINT8(simple_pairing_mode, p_cmd);
log_classic_pairing_event(
RawAddress::kEmpty, bluetooth::common::kUnknownConnectionHandle,
opcode, hci_event, cmd_status,
android::bluetooth::hci::STATUS_UNKNOWN, simple_pairing_mode);
break;
}
case HCI_WRITE_SECURE_CONNS_SUPPORT: {
uint8_t secure_conn_host_support;
STREAM_TO_UINT8(secure_conn_host_support, p_cmd);
log_classic_pairing_event(
RawAddress::kEmpty, bluetooth::common::kUnknownConnectionHandle,
opcode, hci_event, cmd_status,
android::bluetooth::hci::STATUS_UNKNOWN, secure_conn_host_support);
break;
}
case HCI_AUTHENTICATION_REQUESTED:
STREAM_TO_UINT16(handle, p_cmd);
log_classic_pairing_event(RawAddress::kEmpty, handle, opcode, hci_event,
cmd_status,
android::bluetooth::hci::STATUS_UNKNOWN, 0);
break;
case HCI_SET_CONN_ENCRYPTION: {
STREAM_TO_UINT16(handle, p_cmd);
uint8_t encryption_enable;
STREAM_TO_UINT8(encryption_enable, p_cmd);
log_classic_pairing_event(
RawAddress::kEmpty, handle, opcode, hci_event, cmd_status,
android::bluetooth::hci::STATUS_UNKNOWN, encryption_enable);
break;
}
case HCI_DELETE_STORED_LINK_KEY: {
uint8_t delete_all_flag;
STREAM_TO_BDADDR(bd_addr, p_cmd);
STREAM_TO_UINT8(delete_all_flag, p_cmd);
log_classic_pairing_event(
bd_addr, bluetooth::common::kUnknownConnectionHandle, opcode,
hci_event, cmd_status, android::bluetooth::hci::STATUS_UNKNOWN,
delete_all_flag);
break;
}
case HCI_RMT_NAME_REQUEST:
case HCI_RMT_NAME_REQUEST_CANCEL:
case HCI_LINK_KEY_REQUEST_REPLY:
case HCI_LINK_KEY_REQUEST_NEG_REPLY:
case HCI_IO_CAPABILITY_REQUEST_REPLY:
case HCI_USER_CONF_REQUEST_REPLY:
case HCI_USER_CONF_VALUE_NEG_REPLY:
case HCI_USER_PASSKEY_REQ_REPLY:
case HCI_USER_PASSKEY_REQ_NEG_REPLY:
case HCI_REM_OOB_DATA_REQ_REPLY:
case HCI_REM_OOB_DATA_REQ_NEG_REPLY:
STREAM_TO_BDADDR(bd_addr, p_cmd);
log_classic_pairing_event(
bd_addr, bluetooth::common::kUnknownConnectionHandle, opcode,
hci_event, cmd_status, android::bluetooth::hci::STATUS_UNKNOWN, 0);
break;
case HCI_IO_CAP_REQ_NEG_REPLY:
STREAM_TO_BDADDR(bd_addr, p_cmd);
STREAM_TO_UINT8(reason, p_cmd);
log_classic_pairing_event(bd_addr,
bluetooth::common::kUnknownConnectionHandle,
opcode, hci_event, cmd_status, reason, 0);
break;
}
}
/*******************************************************************************
*
* Function btu_hcif_send_cmd
*
* Description This function is called to send commands to the Host
* Controller.
*
* Returns void
*
******************************************************************************/
void btu_hcif_send_cmd(UNUSED_ATTR uint8_t controller_id, const BT_HDR* p_buf) {
if (!p_buf) return;
uint16_t opcode;
const uint8_t* stream = p_buf->data + p_buf->offset;
STREAM_TO_UINT16(opcode, stream);
// Skip parameter length before logging
stream++;
btu_hcif_log_command_metrics(opcode, stream,
android::bluetooth::hci::STATUS_UNKNOWN, false);
bluetooth::shim::hci_layer_get_interface()->transmit_command(
p_buf, btu_hcif_command_complete_evt, btu_hcif_command_status_evt, NULL);
}
using hci_cmd_cb = base::OnceCallback<void(
uint8_t* /* return_parameters */, uint16_t /* return_parameters_length*/)>;
struct cmd_with_cb_data {
hci_cmd_cb cb;
base::Location posted_from;
};
void cmd_with_cb_data_init(cmd_with_cb_data* cb_wrapper) {
new (&cb_wrapper->cb) hci_cmd_cb;
new (&cb_wrapper->posted_from) Location;
}
void cmd_with_cb_data_cleanup(cmd_with_cb_data* cb_wrapper) {
cb_wrapper->cb.~hci_cmd_cb();
cb_wrapper->posted_from.~Location();
}
/**
* Log command complete events that is not handled individually in this file
* @param opcode opcode of the command
* @param p_return_params pointer to returned parameter after parameter length
* field
*/
static void btu_hcif_log_command_complete_metrics(
uint16_t opcode, const uint8_t* p_return_params) {
uint16_t status = android::bluetooth::hci::STATUS_UNKNOWN;
uint16_t reason = android::bluetooth::hci::STATUS_UNKNOWN;
uint16_t hci_event = android::bluetooth::hci::EVT_COMMAND_COMPLETE;
RawAddress bd_addr = RawAddress::kEmpty;
switch (opcode) {
case HCI_DELETE_STORED_LINK_KEY:
case HCI_READ_LOCAL_OOB_DATA:
case HCI_WRITE_SIMPLE_PAIRING_MODE:
case HCI_WRITE_SECURE_CONNS_SUPPORT:
STREAM_TO_UINT8(status, p_return_params);
log_classic_pairing_event(RawAddress::kEmpty,
bluetooth::common::kUnknownConnectionHandle,
opcode, hci_event, status, reason, 0);
break;
case HCI_READ_ENCR_KEY_SIZE: {
uint16_t handle;
uint8_t key_size;
STREAM_TO_UINT8(status, p_return_params);
STREAM_TO_UINT16(handle, p_return_params);
STREAM_TO_UINT8(key_size, p_return_params);
log_classic_pairing_event(RawAddress::kEmpty, handle, opcode, hci_event,
status, reason, key_size);
break;
}
case HCI_LINK_KEY_REQUEST_REPLY:
case HCI_LINK_KEY_REQUEST_NEG_REPLY:
case HCI_IO_CAPABILITY_REQUEST_REPLY:
case HCI_IO_CAP_REQ_NEG_REPLY:
case HCI_USER_CONF_REQUEST_REPLY:
case HCI_USER_CONF_VALUE_NEG_REPLY:
case HCI_USER_PASSKEY_REQ_REPLY:
case HCI_USER_PASSKEY_REQ_NEG_REPLY:
case HCI_REM_OOB_DATA_REQ_REPLY:
case HCI_REM_OOB_DATA_REQ_NEG_REPLY:
STREAM_TO_UINT8(status, p_return_params);
STREAM_TO_BDADDR(bd_addr, p_return_params);
log_classic_pairing_event(bd_addr,
bluetooth::common::kUnknownConnectionHandle,
opcode, hci_event, status, reason, 0);
break;
}
}
static void btu_hcif_command_complete_evt_with_cb_on_task(BT_HDR* event,
void* context) {
command_opcode_t opcode;
// 2 for event header: event code (1) + parameter length (1)
// 1 for num_hci_pkt command credit
uint8_t* stream = event->data + event->offset + 3;
STREAM_TO_UINT16(opcode, stream);
btu_hcif_log_command_complete_metrics(opcode, stream);
cmd_with_cb_data* cb_wrapper = (cmd_with_cb_data*)context;
log::verbose("command complete for: {}", cb_wrapper->posted_from.ToString());
// 2 for event header: event code (1) + parameter length (1)
// 3 for command complete header: num_hci_pkt (1) + opcode (2)
uint16_t param_len = static_cast<uint16_t>(event->len - 5);
std::move(cb_wrapper->cb).Run(stream, param_len);
cmd_with_cb_data_cleanup(cb_wrapper);
osi_free(cb_wrapper);
osi_free(event);
}
static void btu_hcif_command_complete_evt_with_cb(BT_HDR* response,
void* context) {
do_in_main_thread(
FROM_HERE, base::BindOnce(btu_hcif_command_complete_evt_with_cb_on_task,
response, context));
}
static void btu_hcif_command_status_evt_with_cb_on_task(uint8_t status,
BT_HDR* event,
void* context) {
command_opcode_t opcode;
uint8_t* stream = event->data + event->offset;
STREAM_TO_UINT16(opcode, stream);
CHECK(status != 0);
// stream + 1 to skip parameter length field
// No need to check length since stream is written by us
btu_hcif_log_command_metrics(opcode, stream + 1, status, true);
// report command status error
cmd_with_cb_data* cb_wrapper = (cmd_with_cb_data*)context;
log::verbose("command status for: {}", cb_wrapper->posted_from.ToString());
std::move(cb_wrapper->cb).Run(&status, sizeof(uint16_t));
cmd_with_cb_data_cleanup(cb_wrapper);
osi_free(cb_wrapper);
osi_free(event);
}
static void btu_hcif_command_status_evt_with_cb(uint8_t status, BT_HDR* command,
void* context) {
// Command is pending, we report only error.
if (!status) {
osi_free(command);
return;
}
do_in_main_thread(FROM_HERE,
base::BindOnce(btu_hcif_command_status_evt_with_cb_on_task,
status, command, context));
}
/* This function is called to send commands to the Host Controller. |cb| is
* called when command status event is called with error code, or when the
* command complete event is received. */
void btu_hcif_send_cmd_with_cb(const base::Location& posted_from,
uint16_t opcode, uint8_t* params,
uint8_t params_len, hci_cmd_cb cb) {
BT_HDR* p = (BT_HDR*)osi_malloc(HCI_CMD_BUF_SIZE);
uint8_t* pp = (uint8_t*)(p + 1);
p->len = HCIC_PREAMBLE_SIZE + params_len;
p->offset = 0;
UINT16_TO_STREAM(pp, opcode);
UINT8_TO_STREAM(pp, params_len);
if (params) {
memcpy(pp, params, params_len);
}
btu_hcif_log_command_metrics(opcode, pp,
android::bluetooth::hci::STATUS_UNKNOWN, false);
cmd_with_cb_data* cb_wrapper =
(cmd_with_cb_data*)osi_malloc(sizeof(cmd_with_cb_data));
cmd_with_cb_data_init(cb_wrapper);
cb_wrapper->cb = std::move(cb);
cb_wrapper->posted_from = posted_from;
bluetooth::shim::hci_layer_get_interface()->transmit_command(
p, btu_hcif_command_complete_evt_with_cb,
btu_hcif_command_status_evt_with_cb, (void*)cb_wrapper);
}
/*******************************************************************************
*
* Function btu_hcif_authentication_comp_evt
*
* Description Process event HCI_AUTHENTICATION_COMP_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_authentication_comp_evt(uint8_t* p) {
uint8_t status;
uint16_t handle;
STREAM_TO_UINT8(status, p);
STREAM_TO_UINT16(handle, p);
btm_sec_auth_complete(handle, static_cast<tHCI_STATUS>(status));
}
/*******************************************************************************
*
* Function btu_hcif_rmt_name_request_comp_evt
*
* Description Process event HCI_RMT_NAME_REQUEST_COMP_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_rmt_name_request_comp_evt(const uint8_t* p,
uint16_t evt_len) {
uint8_t status;
RawAddress bd_addr;
STREAM_TO_UINT8(status, p);
STREAM_TO_BDADDR(bd_addr, p);
evt_len -= (1 + BD_ADDR_LEN);
btm_process_remote_name(&bd_addr, p, evt_len, to_hci_status_code(status));
btm_sec_rmt_name_request_complete(&bd_addr, p, to_hci_status_code(status));
}
/*******************************************************************************
*
* Function btu_hcif_encryption_change_evt
*
* Description Process event HCI_ENCRYPTION_CHANGE_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_encryption_change_evt(uint8_t* p) {
uint8_t status;
uint16_t handle;
uint8_t encr_enable;
STREAM_TO_UINT8(status, p);
STREAM_TO_UINT16(handle, p);
STREAM_TO_UINT8(encr_enable, p);
btm_sec_encryption_change_evt(handle, static_cast<tHCI_STATUS>(status),
encr_enable);
}
/*******************************************************************************
*
* Function btu_hcif_read_rmt_ext_features_comp_evt
*
* Description Process event HCI_READ_RMT_EXT_FEATURES_COMP_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_read_rmt_ext_features_comp_evt(uint8_t* p,
uint8_t evt_len) {
uint8_t* p_cur = p;
uint8_t status;
uint16_t handle;
STREAM_TO_UINT8(status, p_cur);
if (status == HCI_SUCCESS)
btm_read_remote_ext_features_complete_raw(p, evt_len);
else {
STREAM_TO_UINT16(handle, p_cur);
btm_read_remote_ext_features_failed(status, handle);
}
}
/*******************************************************************************
*
* Function btu_hcif_esco_connection_comp_evt
*
* Description Process event HCI_ESCO_CONNECTION_COMP_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_esco_connection_comp_evt(const uint8_t* p) {
tBTM_ESCO_DATA data;
uint16_t handle;
RawAddress bda;
uint8_t status;
STREAM_TO_UINT8(status, p);
STREAM_TO_UINT16(handle, p);
STREAM_TO_BDADDR(bda, p);
STREAM_TO_UINT8(data.link_type, p);
STREAM_SKIP_UINT8(p); // tx_interval
STREAM_SKIP_UINT8(p); // retrans_window
STREAM_SKIP_UINT16(p); // rx_pkt_len
STREAM_SKIP_UINT16(p); // tx_pkt_len
STREAM_SKIP_UINT8(p); // air_mode
handle = HCID_GET_HANDLE(handle);
ASSERT_LOG(
handle <= HCI_HANDLE_MAX,
"Received eSCO connection complete event with invalid handle: 0x%X "
"that should be <= 0x%X",
handle, HCI_HANDLE_MAX);
data.bd_addr = bda;
if (status == HCI_SUCCESS) {
btm_sco_connected(bda, handle, &data);
} else {
btm_sco_connection_failed(static_cast<tHCI_STATUS>(status), bda, handle,
&data);
}
}
/*******************************************************************************
*
* Function btu_hcif_esco_connection_chg_evt
*
* Description Process event HCI_ESCO_CONNECTION_CHANGED_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_esco_connection_chg_evt(uint8_t* p) {
uint16_t handle;
uint16_t tx_pkt_len;
uint16_t rx_pkt_len;
uint8_t status;
uint8_t tx_interval;
uint8_t retrans_window;
STREAM_TO_UINT8(status, p);
STREAM_TO_UINT16(handle, p);
STREAM_TO_UINT8(tx_interval, p);
STREAM_TO_UINT8(retrans_window, p);
STREAM_TO_UINT16(rx_pkt_len, p);
STREAM_TO_UINT16(tx_pkt_len, p);
handle = HCID_GET_HANDLE(handle);
}
/*******************************************************************************
*
* Function btu_hcif_hdl_command_complete
*
* Description Handle command complete event
*
* Returns void
*
******************************************************************************/
static void btu_hcif_hdl_command_complete(uint16_t opcode, uint8_t* p,
uint16_t evt_len) {
switch (opcode) {
case HCI_SET_EVENT_FILTER:
break;
case HCI_DELETE_STORED_LINK_KEY:
btm_delete_stored_link_key_complete(p, evt_len);
break;
case HCI_READ_LOCAL_NAME:
btm_read_local_name_complete(p, evt_len);
break;
case HCI_GET_LINK_QUALITY:
btm_read_link_quality_complete(p, evt_len);
break;
case HCI_READ_RSSI:
btm_read_rssi_complete(p, evt_len);
break;
case HCI_READ_FAILED_CONTACT_COUNTER:
btm_read_failed_contact_counter_complete(p);
break;
case HCI_READ_AUTOMATIC_FLUSH_TIMEOUT:
btm_read_automatic_flush_timeout_complete(p);
break;
case HCI_READ_TRANSMIT_POWER_LEVEL:
btm_read_tx_power_complete(p, evt_len, false);
break;
case HCI_CREATE_CONNECTION_CANCEL:
btu_hcif_create_conn_cancel_complete(p, evt_len);
break;
case HCI_READ_LOCAL_OOB_DATA:
btu_hcif_read_local_oob_complete(p, evt_len);
break;
case HCI_READ_INQ_TX_POWER_LEVEL:
break;
case HCI_BLE_READ_ADV_CHNL_TX_POWER:
btm_read_tx_power_complete(p, evt_len, true);
break;
case HCI_BLE_WRITE_ADV_ENABLE:
btm_ble_write_adv_enable_complete(p, evt_len);
break;
case HCI_BLE_CREATE_LL_CONN:
case HCI_LE_EXTENDED_CREATE_CONNECTION:
// No command complete event for those commands according to spec
log::error("No command complete expected, but received!");
break;
case HCI_BLE_TRANSMITTER_TEST:
case HCI_BLE_RECEIVER_TEST:
case HCI_BLE_TEST_END:
btm_ble_test_command_complete(p);
break;
case HCI_BLE_ADD_DEV_RESOLVING_LIST:
btm_ble_add_resolving_list_entry_complete(p, evt_len);
break;
case HCI_BLE_RM_DEV_RESOLVING_LIST:
btm_ble_remove_resolving_list_entry_complete(p, evt_len);
break;
case HCI_BLE_CLEAR_RESOLVING_LIST:
btm_ble_clear_resolving_list_complete(p, evt_len);
break;
case HCI_BLE_READ_RESOLVABLE_ADDR_PEER:
btm_ble_read_resolving_list_entry_complete(p, evt_len);
break;
// Explicitly handled command complete events
case HCI_BLE_READ_RESOLVABLE_ADDR_LOCAL:
case HCI_BLE_SET_ADDR_RESOLUTION_ENABLE:
case HCI_BLE_SET_RAND_PRIV_ADDR_TIMOUT:
case HCI_CHANGE_LOCAL_NAME:
case HCI_WRITE_CLASS_OF_DEVICE:
case HCI_WRITE_DEF_POLICY_SETTINGS:
case HCI_WRITE_EXT_INQ_RESPONSE:
case HCI_WRITE_INQSCAN_TYPE:
case HCI_WRITE_INQUIRYSCAN_CFG:
case HCI_WRITE_INQUIRY_MODE:
case HCI_WRITE_LINK_SUPER_TOUT:
case HCI_WRITE_PAGESCAN_CFG:
case HCI_WRITE_PAGESCAN_TYPE:
case HCI_WRITE_PAGE_TOUT:
case HCI_WRITE_SCAN_ENABLE:
case HCI_WRITE_VOICE_SETTINGS:
break;
default:
log::error(
"Command complete for opcode:0x{:02x} should not be handled here",
opcode);
break;
}
}
/*******************************************************************************
*
* Function btu_hcif_command_complete_evt
*
* Description Process event HCI_COMMAND_COMPLETE_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_command_complete_evt_on_task(BT_HDR* event) {
command_opcode_t opcode;
// 2 for event header: event code (1) + parameter length (1)
// 1 for num_hci_pkt command credit
uint8_t* stream = event->data + event->offset + 3;
STREAM_TO_UINT16(opcode, stream);
btu_hcif_log_command_complete_metrics(opcode, stream);
// 2 for event header: event code (1) + parameter length (1)
// 3 for command complete header: num_hci_pkt (1) + opcode (2)
uint16_t param_len = static_cast<uint16_t>(event->len - 5);
btu_hcif_hdl_command_complete(opcode, stream, param_len);
osi_free(event);
}
static void btu_hcif_command_complete_evt(BT_HDR* response,
void* /* context */) {
do_in_main_thread(
FROM_HERE,
base::BindOnce(btu_hcif_command_complete_evt_on_task, response));
}
/*******************************************************************************
*
* Function btu_hcif_hdl_command_status
*
* Description Handle a command status event
*
* Returns void
*
******************************************************************************/
static void btu_hcif_hdl_command_status(uint16_t opcode, uint8_t status,
const uint8_t* p_cmd) {
ASSERT_LOG(p_cmd != nullptr, "Null command for opcode 0x%x", opcode);
p_cmd++; // Skip parameter total length
const tHCI_STATUS hci_status = to_hci_status_code(status);
RawAddress bd_addr;
uint16_t handle;
switch (opcode) {
case HCI_SWITCH_ROLE:
if (status != HCI_SUCCESS) {
// Tell BTM that the command failed
STREAM_TO_BDADDR(bd_addr, p_cmd);
btm_acl_role_changed(hci_status, bd_addr, HCI_ROLE_UNKNOWN);
}
break;
case HCI_CREATE_CONNECTION:
if (status != HCI_SUCCESS) {
STREAM_TO_BDADDR(bd_addr, p_cmd);
btm_acl_connected(bd_addr, HCI_INVALID_HANDLE, hci_status, 0);
}
break;
case HCI_AUTHENTICATION_REQUESTED:
if (status != HCI_SUCCESS) {
// Device refused to start authentication
// This is treated as an authentication failure
btm_sec_auth_complete(HCI_INVALID_HANDLE, hci_status);
}
break;
case HCI_SET_CONN_ENCRYPTION:
if (status != HCI_SUCCESS) {
// Device refused to start encryption
// This is treated as an encryption failure
btm_sec_encrypt_change(HCI_INVALID_HANDLE, hci_status, false);
}
break;
case HCI_RMT_NAME_REQUEST:
if (status != HCI_SUCCESS) {
// Tell inquiry processing that we are done
btm_process_remote_name(nullptr, nullptr, 0, hci_status);
btm_sec_rmt_name_request_complete(nullptr, nullptr, hci_status);
}
break;
case HCI_READ_RMT_EXT_FEATURES:
if (status != HCI_SUCCESS) {
STREAM_TO_UINT16(handle, p_cmd);
btm_read_remote_ext_features_failed(status, handle);
}
break;
case HCI_SETUP_ESCO_CONNECTION:
case HCI_ENH_SETUP_ESCO_CONNECTION:
if (status != HCI_SUCCESS) {
STREAM_TO_UINT16(handle, p_cmd);
RawAddress addr(RawAddress::kEmpty);
btm_sco_connection_failed(hci_status, addr, handle, nullptr);
}
break;
case HCI_BLE_START_ENC:
// Race condition: disconnection happened right before we send
// "LE Encrypt", controller responds with no connection, we should
// cancel the encryption attempt, rather than unpair the device.
if (status == HCI_ERR_NO_CONNECTION) {
smp_cancel_start_encryption_attempt();
}
break;
// Link Policy Commands
case HCI_EXIT_SNIFF_MODE:
case HCI_EXIT_PARK_MODE:
if (status != HCI_SUCCESS) {
// Allow SCO initiation to continue if waiting for change mode event
STREAM_TO_UINT16(handle, p_cmd);
btm_sco_chk_pend_unpark(hci_status, handle);
}
FALLTHROUGH_INTENDED; /* FALLTHROUGH */
case HCI_HOLD_MODE:
case HCI_SNIFF_MODE:
case HCI_PARK_MODE:
btm_pm_proc_cmd_status(hci_status);
break;
// Command status event not handled by a specialized module
case HCI_READ_RMT_CLOCK_OFFSET: // 0x041f
case HCI_CHANGE_CONN_PACKET_TYPE: // 0x040f
if (hci_status != HCI_SUCCESS) {
log::warn("Received bad command status for opcode:0x{:02x} status:{}",
opcode, hci_status_code_text(hci_status));
}
break;
default:
log::error(
"Command status for opcode:0x{:02x} should not be handled here "
"status:{}",
opcode, hci_status_code_text(hci_status));
}
}
void bluetooth::legacy::testing::btu_hcif_hdl_command_status(
uint16_t opcode, uint8_t status, const uint8_t* p_cmd) {
::btu_hcif_hdl_command_status(opcode, status, p_cmd);
}
/*******************************************************************************
*
* Function btu_hcif_command_status_evt
*
* Description Process event HCI_COMMAND_STATUS_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_command_status_evt_on_task(uint8_t status, BT_HDR* event) {
command_opcode_t opcode;
uint8_t* stream = event->data + event->offset;
STREAM_TO_UINT16(opcode, stream);
// stream + 1 to skip parameter length field
// No need to check length since stream is written by us
btu_hcif_log_command_metrics(opcode, stream + 1, status, true);
btu_hcif_hdl_command_status(opcode, status, stream);
osi_free(event);
}
static void btu_hcif_command_status_evt(uint8_t status, BT_HDR* command,
void* /* context */) {
do_in_main_thread(
FROM_HERE,
base::BindOnce(btu_hcif_command_status_evt_on_task, status, command));
}
/*******************************************************************************
*
* Function btu_hcif_mode_change_evt
*
* Description Process event HCI_MODE_CHANGE_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_mode_change_evt(uint8_t* p) {
uint8_t status;
uint16_t handle;
uint8_t current_mode;
uint16_t interval;
STREAM_TO_UINT8(status, p);
STREAM_TO_UINT16(handle, p);
STREAM_TO_UINT8(current_mode, p);
STREAM_TO_UINT16(interval, p);
btm_sco_chk_pend_unpark(static_cast<tHCI_STATUS>(status), handle);
btm_pm_proc_mode_change(static_cast<tHCI_STATUS>(status), handle,
static_cast<tHCI_MODE>(current_mode), interval);
#if (HID_DEV_INCLUDED == TRUE && HID_DEV_PM_INCLUDED == TRUE)
hidd_pm_proc_mode_change(status, current_mode, interval);
#endif
}
/* Parsing functions for btm functions */
void btu_hcif_sec_pin_code_request(const uint8_t* p) {
RawAddress bda;
STREAM_TO_BDADDR(bda, p);
btm_sec_pin_code_request(bda);
}
void btu_hcif_sec_link_key_request(const uint8_t* p) {
RawAddress bda;
STREAM_TO_BDADDR(bda, p);
btm_sec_link_key_request(bda);
}
void btu_hcif_rem_oob_req(const uint8_t* p) {
RawAddress bda;
STREAM_TO_BDADDR(bda, p);
btm_rem_oob_req(bda);
}
void btu_hcif_simple_pair_complete(const uint8_t* p) {
RawAddress bd_addr;
uint8_t status;
status = *p++;
STREAM_TO_BDADDR(bd_addr, p);
btm_simple_pair_complete(bd_addr, status);
}
void btu_hcif_sec_rmt_host_support_feat_evt(const uint8_t* p) {
RawAddress bd_addr; /* peer address */
uint8_t features_0;
STREAM_TO_BDADDR(bd_addr, p);
STREAM_TO_UINT8(features_0, p);
btm_sec_rmt_host_support_feat_evt(bd_addr, features_0);
}
void btu_hcif_proc_sp_req_evt(tBTM_SP_EVT event, const uint8_t* p) {
RawAddress bda;
uint32_t value = 0;
/* All events start with bd_addr */
STREAM_TO_BDADDR(bda, p);
switch (event) {
case BTM_SP_CFM_REQ_EVT:
case BTM_SP_KEY_NOTIF_EVT:
STREAM_TO_UINT32(value, p);
break;
case BTM_SP_KEY_REQ_EVT:
// No value needed.
break;
default:
log::warn("unexpected event:{}", sp_evt_to_text(event));
break;
}
btm_proc_sp_req_evt(event, bda, value);
}
void btu_hcif_create_conn_cancel_complete(const uint8_t* p, uint16_t evt_len) {
uint8_t status;
if (evt_len < 1 + BD_ADDR_LEN) {
log::error("malformatted event packet, too short");
return;
}
STREAM_TO_UINT8(status, p);
RawAddress bd_addr;
STREAM_TO_BDADDR(bd_addr, p);
btm_create_conn_cancel_complete(status, bd_addr);
}
void btu_hcif_read_local_oob_complete(const uint8_t* p, uint16_t evt_len) {
tBTM_SP_LOC_OOB evt_data;
uint8_t status;
if (evt_len < 1) {
goto err_out;
}
STREAM_TO_UINT8(status, p);
if (status == HCI_SUCCESS) {
evt_data.status = BTM_SUCCESS;
} else {
evt_data.status = BTM_ERR_PROCESSING;
}
if (evt_len < 32 + 1) {
goto err_out;
}
STREAM_TO_ARRAY16(evt_data.c.data(), p);
STREAM_TO_ARRAY16(evt_data.r.data(), p);
btm_read_local_oob_complete(evt_data);
return;
err_out:
log::error("bogus event packet, too short");
}
/*******************************************************************************
*
* Function btu_hcif_link_key_notification_evt
*
* Description Process event HCI_LINK_KEY_NOTIFICATION_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_link_key_notification_evt(const uint8_t* p) {
RawAddress bda;
Octet16 key;
uint8_t key_type;
STREAM_TO_BDADDR(bda, p);
STREAM_TO_ARRAY16(key.data(), p);
STREAM_TO_UINT8(key_type, p);
btm_sec_link_key_notification(bda, key, key_type);
}
/*******************************************************************************
*
* Function btu_hcif_read_clock_off_comp_evt
*
* Description Process event HCI_READ_CLOCK_OFF_COMP_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_read_clock_off_comp_evt(uint8_t* p) {
uint8_t status;
uint16_t handle;
uint16_t clock_offset;
STREAM_TO_UINT8(status, p);
/* If failed to get clock offset just drop the result */
if (status != HCI_SUCCESS) return;
STREAM_TO_UINT16(handle, p);
STREAM_TO_UINT16(clock_offset, p);
handle = HCID_GET_HANDLE(handle);
btm_sec_update_clock_offset(handle, clock_offset);
}
/**********************************************
* Simple Pairing Events
**********************************************/
/*******************************************************************************
*
* Function btu_hcif_io_cap_request_evt
*
* Description Process event HCI_IO_CAPABILITY_REQUEST_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_io_cap_request_evt(const uint8_t* p) {
RawAddress bda;
STREAM_TO_BDADDR(bda, p);
btm_io_capabilities_req(bda);
}
/*******************************************************************************
*
* Function btu_hcif_io_cap_request_evt
*
* Description Process event HCI_IO_CAPABILITY_REQUEST_EVT
*
* Returns void
*
******************************************************************************/
static void btu_hcif_io_cap_response_evt(const uint8_t* p) {
tBTM_SP_IO_RSP evt_data;
STREAM_TO_BDADDR(evt_data.bd_addr, p);
uint8_t io_cap;
STREAM_TO_UINT8(io_cap, p);
evt_data.io_cap = static_cast<tBTM_IO_CAP>(io_cap);
STREAM_TO_UINT8(evt_data.oob_data, p);
STREAM_TO_UINT8(evt_data.auth_req, p);
btm_io_capabilities_rsp(evt_data);
}
/**********************************************
* End of Simple Pairing Events
**********************************************/
static void btu_hcif_encryption_key_refresh_cmpl_evt(uint8_t* p) {
uint8_t status;
uint16_t handle;
STREAM_TO_UINT8(status, p);
STREAM_TO_UINT16(handle, p);
btm_sec_encryption_key_refresh_complete(handle,
static_cast<tHCI_STATUS>(status));
}
/**********************************************
* BLE Events
**********************************************/
static void btu_ble_proc_ltk_req(uint8_t* p, uint16_t evt_len) {
uint16_t ediv, handle;
uint8_t* pp;
// following the spec in Core_v5.3/Vol 4/Part E
// / 7.7.65.5 LE Long Term Key Request event
// A BLE Long Term Key Request event contains:
// - 1-byte subevent (already consumed in btu_hcif_process_event)
// - 2-byte connection handler
// - 8-byte random number
// - 2 byte Encrypted_Diversifier
if (evt_len < 2 + 8 + 2) {
log::error("Event packet too short");
return;
}
STREAM_TO_UINT16(handle, p);
pp = p + 8;
STREAM_TO_UINT16(ediv, pp);
btm_ble_ltk_request(handle, p, ediv);
/* This is empty until an upper layer cares about returning event */
}
/**********************************************
* End of BLE Events Handler
**********************************************/