1 /******************************************************************************
2 *
3 * Copyright (C) 2002-2012 Broadcom Corporation
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 *
17 ******************************************************************************/
18
19 /******************************************************************************
20 *
21 * This file contains the HID HOST API entry points
22 *
23 ******************************************************************************/
24
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <string.h>
28
29 #include "bt_common.h"
30 #include "bt_types.h"
31 #include "btm_api.h"
32 #include "btm_int.h"
33 #include "btu.h"
34 #include "hiddefs.h"
35 #include "hidh_api.h"
36 #include "hidh_int.h"
37
38 tHID_HOST_CTB hh_cb;
39
40 static void hidh_search_callback(uint16_t sdp_result);
41
42 /*******************************************************************************
43 *
44 * Function HID_HostGetSDPRecord
45 *
46 * Description This function reads the device SDP record
47 *
48 * Returns tHID_STATUS
49 *
50 ******************************************************************************/
HID_HostGetSDPRecord(BD_ADDR addr,tSDP_DISCOVERY_DB * p_db,uint32_t db_len,tHID_HOST_SDP_CALLBACK * sdp_cback)51 tHID_STATUS HID_HostGetSDPRecord(BD_ADDR addr, tSDP_DISCOVERY_DB* p_db,
52 uint32_t db_len,
53 tHID_HOST_SDP_CALLBACK* sdp_cback) {
54 tSDP_UUID uuid_list;
55
56 if (hh_cb.sdp_busy) return HID_ERR_SDP_BUSY;
57
58 uuid_list.len = 2;
59 uuid_list.uu.uuid16 = UUID_SERVCLASS_HUMAN_INTERFACE;
60
61 hh_cb.p_sdp_db = p_db;
62 SDP_InitDiscoveryDb(p_db, db_len, 1, &uuid_list, 0, NULL);
63
64 if (SDP_ServiceSearchRequest(addr, p_db, hidh_search_callback)) {
65 hh_cb.sdp_cback = sdp_cback;
66 hh_cb.sdp_busy = true;
67 return HID_SUCCESS;
68 } else
69 return HID_ERR_NO_RESOURCES;
70 }
71
hidh_get_str_attr(tSDP_DISC_REC * p_rec,uint16_t attr_id,uint16_t max_len,char * str)72 void hidh_get_str_attr(tSDP_DISC_REC* p_rec, uint16_t attr_id, uint16_t max_len,
73 char* str) {
74 tSDP_DISC_ATTR* p_attr;
75 uint16_t name_len;
76
77 p_attr = SDP_FindAttributeInRec(p_rec, attr_id);
78 if (p_attr != NULL) {
79 name_len = SDP_DISC_ATTR_LEN(p_attr->attr_len_type);
80 if (name_len < max_len) {
81 memcpy(str, (char*)p_attr->attr_value.v.array, name_len);
82 str[name_len] = '\0';
83 } else {
84 memcpy(str, (char*)p_attr->attr_value.v.array, max_len - 1);
85 str[max_len - 1] = '\0';
86 }
87 } else
88 str[0] = '\0';
89 }
90
hidh_search_callback(uint16_t sdp_result)91 static void hidh_search_callback(uint16_t sdp_result) {
92 tSDP_DISCOVERY_DB* p_db = hh_cb.p_sdp_db;
93 tSDP_DISC_REC* p_rec;
94 tSDP_DISC_ATTR *p_attr, *p_subattr1, *p_subattr2, *p_repdesc;
95 tBT_UUID hid_uuid;
96 tHID_DEV_SDP_INFO* p_nvi = &hh_cb.sdp_rec;
97 uint16_t attr_mask = 0;
98
99 hid_uuid.len = LEN_UUID_16;
100 hid_uuid.uu.uuid16 = UUID_SERVCLASS_HUMAN_INTERFACE;
101
102 hh_cb.sdp_busy = false;
103
104 if (sdp_result != SDP_SUCCESS) {
105 hh_cb.sdp_cback(sdp_result, 0, NULL);
106 return;
107 }
108
109 p_rec = SDP_FindServiceUUIDInDb(p_db, &hid_uuid, NULL);
110 if (p_rec == NULL) {
111 hh_cb.sdp_cback(HID_SDP_NO_SERV_UUID, 0, NULL);
112 return;
113 }
114
115 memset(&hh_cb.sdp_rec, 0, sizeof(tHID_DEV_SDP_INFO));
116
117 /* First, verify the mandatory fields we care about */
118 if (((p_attr = SDP_FindAttributeInRec(p_rec, ATTR_ID_HID_DESCRIPTOR_LIST)) ==
119 NULL) ||
120 (SDP_DISC_ATTR_TYPE(p_attr->attr_len_type) != DATA_ELE_SEQ_DESC_TYPE) ||
121 ((p_subattr1 = p_attr->attr_value.v.p_sub_attr) == NULL) ||
122 (SDP_DISC_ATTR_TYPE(p_subattr1->attr_len_type) !=
123 DATA_ELE_SEQ_DESC_TYPE) ||
124 ((p_subattr2 = p_subattr1->attr_value.v.p_sub_attr) == NULL) ||
125 ((p_repdesc = p_subattr2->p_next_attr) == NULL) ||
126 (SDP_DISC_ATTR_TYPE(p_repdesc->attr_len_type) != TEXT_STR_DESC_TYPE)) {
127 hh_cb.sdp_cback(HID_SDP_MANDATORY_MISSING, 0, NULL);
128 return;
129 }
130
131 p_nvi->dscp_info.dl_len = SDP_DISC_ATTR_LEN(p_repdesc->attr_len_type);
132 if (p_nvi->dscp_info.dl_len != 0)
133 p_nvi->dscp_info.dsc_list = (uint8_t*)&p_repdesc->attr_value;
134
135 if (((p_attr = SDP_FindAttributeInRec(p_rec, ATTR_ID_HID_VIRTUAL_CABLE)) !=
136 NULL) &&
137 (p_attr->attr_value.v.u8)) {
138 attr_mask |= HID_VIRTUAL_CABLE;
139 }
140
141 if (((p_attr = SDP_FindAttributeInRec(
142 p_rec, ATTR_ID_HID_RECONNECT_INITIATE)) != NULL) &&
143 (p_attr->attr_value.v.u8)) {
144 attr_mask |= HID_RECONN_INIT;
145 }
146
147 if (((p_attr = SDP_FindAttributeInRec(
148 p_rec, ATTR_ID_HID_NORMALLY_CONNECTABLE)) != NULL) &&
149 (p_attr->attr_value.v.u8)) {
150 attr_mask |= HID_NORMALLY_CONNECTABLE;
151 }
152
153 if (((p_attr = SDP_FindAttributeInRec(p_rec, ATTR_ID_HID_SDP_DISABLE)) !=
154 NULL) &&
155 (p_attr->attr_value.v.u8)) {
156 attr_mask |= HID_SDP_DISABLE;
157 }
158
159 if (((p_attr = SDP_FindAttributeInRec(p_rec, ATTR_ID_HID_BATTERY_POWER)) !=
160 NULL) &&
161 (p_attr->attr_value.v.u8)) {
162 attr_mask |= HID_BATTERY_POWER;
163 }
164
165 if (((p_attr = SDP_FindAttributeInRec(p_rec, ATTR_ID_HID_REMOTE_WAKE)) !=
166 NULL) &&
167 (p_attr->attr_value.v.u8)) {
168 attr_mask |= HID_REMOTE_WAKE;
169 }
170
171 hidh_get_str_attr(p_rec, ATTR_ID_SERVICE_NAME, HID_MAX_SVC_NAME_LEN,
172 p_nvi->svc_name);
173 hidh_get_str_attr(p_rec, ATTR_ID_SERVICE_DESCRIPTION, HID_MAX_SVC_DESCR_LEN,
174 p_nvi->svc_descr);
175 hidh_get_str_attr(p_rec, ATTR_ID_PROVIDER_NAME, HID_MAX_PROV_NAME_LEN,
176 p_nvi->prov_name);
177
178 if (((p_attr = SDP_FindAttributeInRec(p_rec, ATTR_ID_HID_DEVICE_RELNUM)) !=
179 NULL)) {
180 p_nvi->rel_num = p_attr->attr_value.v.u16;
181 }
182
183 if (((p_attr = SDP_FindAttributeInRec(p_rec, ATTR_ID_HID_COUNTRY_CODE)) !=
184 NULL)) {
185 p_nvi->ctry_code = p_attr->attr_value.v.u8;
186 }
187
188 if (((p_attr = SDP_FindAttributeInRec(p_rec, ATTR_ID_HID_DEVICE_SUBCLASS)) !=
189 NULL)) {
190 p_nvi->sub_class = p_attr->attr_value.v.u8;
191 }
192
193 if (((p_attr = SDP_FindAttributeInRec(p_rec, ATTR_ID_HID_PARSER_VERSION)) !=
194 NULL)) {
195 p_nvi->hpars_ver = p_attr->attr_value.v.u16;
196 }
197
198 if (((p_attr = SDP_FindAttributeInRec(
199 p_rec, ATTR_ID_HID_LINK_SUPERVISION_TO)) != NULL)) {
200 attr_mask |= HID_SUP_TOUT_AVLBL;
201 p_nvi->sup_timeout = p_attr->attr_value.v.u16;
202 }
203
204 if (((p_attr = SDP_FindAttributeInRec(p_rec, ATTR_ID_HID_SSR_HOST_MAX_LAT)) !=
205 NULL)) {
206 attr_mask |= HID_SSR_MAX_LATENCY;
207 p_nvi->ssr_max_latency = p_attr->attr_value.v.u16;
208 } else
209 p_nvi->ssr_max_latency = HID_SSR_PARAM_INVALID;
210
211 if (((p_attr = SDP_FindAttributeInRec(
212 p_rec, ATTR_ID_HID_SSR_HOST_MIN_TOUT)) != NULL)) {
213 attr_mask |= HID_SSR_MIN_TOUT;
214 p_nvi->ssr_min_tout = p_attr->attr_value.v.u16;
215 } else
216 p_nvi->ssr_min_tout = HID_SSR_PARAM_INVALID;
217
218 hh_cb.sdp_rec.p_sdp_layer_rec = p_rec;
219 hh_cb.sdp_cback(SDP_SUCCESS, attr_mask, &hh_cb.sdp_rec);
220 }
221
222 /*******************************************************************************
223 *
224 * Function HID_HostInit
225 *
226 * Description This function initializes the control block and trace
227 * variable
228 *
229 * Returns void
230 *
231 ******************************************************************************/
HID_HostInit(void)232 void HID_HostInit(void) {
233 uint8_t log_level = hh_cb.trace_level;
234 memset(&hh_cb, 0, sizeof(tHID_HOST_CTB));
235 hh_cb.trace_level = log_level;
236
237 for (size_t i = 0; i < HID_HOST_MAX_DEVICES; i++) {
238 hh_cb.devices[i].conn.process_repage_timer =
239 alarm_new("hid_devices_conn.process_repage_timer");
240 }
241 }
242
243 /*******************************************************************************
244 *
245 * Function HID_HostSetTraceLevel
246 *
247 * Description This function sets the trace level for HID Host. If called
248 * with 0xFF, it simply reads the current trace level.
249 *
250 * Returns the new (current) trace level
251 *
252 ******************************************************************************/
HID_HostSetTraceLevel(uint8_t new_level)253 uint8_t HID_HostSetTraceLevel(uint8_t new_level) {
254 if (new_level != 0xFF) hh_cb.trace_level = new_level;
255
256 return (hh_cb.trace_level);
257 }
258
259 /*******************************************************************************
260 *
261 * Function HID_HostRegister
262 *
263 * Description This function registers HID-Host with lower layers
264 *
265 * Returns tHID_STATUS
266 *
267 ******************************************************************************/
HID_HostRegister(tHID_HOST_DEV_CALLBACK * dev_cback)268 tHID_STATUS HID_HostRegister(tHID_HOST_DEV_CALLBACK* dev_cback) {
269 tHID_STATUS st;
270
271 if (hh_cb.reg_flag) return HID_ERR_ALREADY_REGISTERED;
272
273 if (dev_cback == NULL) return HID_ERR_INVALID_PARAM;
274
275 /* Register with L2CAP */
276 st = hidh_conn_reg();
277 if (st != HID_SUCCESS) {
278 return st;
279 }
280
281 hh_cb.callback = dev_cback;
282 hh_cb.reg_flag = true;
283
284 return (HID_SUCCESS);
285 }
286
287 /*******************************************************************************
288 *
289 * Function HID_HostDeregister
290 *
291 * Description This function is called when the host is about power down.
292 *
293 * Returns tHID_STATUS
294 *
295 ******************************************************************************/
HID_HostDeregister(void)296 tHID_STATUS HID_HostDeregister(void) {
297 uint8_t i;
298
299 if (!hh_cb.reg_flag) return (HID_ERR_NOT_REGISTERED);
300
301 for (i = 0; i < HID_HOST_MAX_DEVICES; i++) {
302 HID_HostRemoveDev(i);
303 }
304
305 hidh_conn_dereg();
306 hh_cb.reg_flag = false;
307
308 return (HID_SUCCESS);
309 }
310
311 /*******************************************************************************
312 *
313 * Function HID_HostAddDev
314 *
315 * Description This is called so HID-host may manage this device.
316 *
317 * Returns tHID_STATUS
318 *
319 ******************************************************************************/
HID_HostAddDev(BD_ADDR addr,uint16_t attr_mask,uint8_t * handle)320 tHID_STATUS HID_HostAddDev(BD_ADDR addr, uint16_t attr_mask, uint8_t* handle) {
321 int i;
322 /* Find an entry for this device in hh_cb.devices array */
323 if (!hh_cb.reg_flag) return (HID_ERR_NOT_REGISTERED);
324
325 for (i = 0; i < HID_HOST_MAX_DEVICES; i++) {
326 if ((hh_cb.devices[i].in_use) &&
327 (!memcmp(addr, hh_cb.devices[i].addr, BD_ADDR_LEN)))
328 break;
329 }
330
331 if (i == HID_HOST_MAX_DEVICES) {
332 for (i = 0; i < HID_HOST_MAX_DEVICES; i++) {
333 if (!hh_cb.devices[i].in_use) break;
334 }
335 }
336
337 if (i == HID_HOST_MAX_DEVICES) return HID_ERR_NO_RESOURCES;
338
339 if (!hh_cb.devices[i].in_use) {
340 hh_cb.devices[i].in_use = true;
341 memcpy(hh_cb.devices[i].addr, addr, sizeof(BD_ADDR));
342 hh_cb.devices[i].state = HID_DEV_NO_CONN;
343 hh_cb.devices[i].conn_tries = 0;
344 }
345
346 if (attr_mask != HID_ATTR_MASK_IGNORE) hh_cb.devices[i].attr_mask = attr_mask;
347
348 *handle = i;
349
350 return (HID_SUCCESS);
351 }
352
353 /*******************************************************************************
354 *
355 * Function HID_HostRemoveDev
356 *
357 * Description This removes the device from the list of devices that the
358 * host has to manage.
359 *
360 * Returns tHID_STATUS
361 *
362 ******************************************************************************/
HID_HostRemoveDev(uint8_t dev_handle)363 tHID_STATUS HID_HostRemoveDev(uint8_t dev_handle) {
364 if (!hh_cb.reg_flag) return (HID_ERR_NOT_REGISTERED);
365
366 if ((dev_handle >= HID_HOST_MAX_DEVICES) ||
367 (!hh_cb.devices[dev_handle].in_use))
368 return HID_ERR_INVALID_PARAM;
369
370 HID_HostCloseDev(dev_handle);
371 hh_cb.devices[dev_handle].in_use = false;
372 hh_cb.devices[dev_handle].conn.conn_state = HID_CONN_STATE_UNUSED;
373 hh_cb.devices[dev_handle].conn.ctrl_cid =
374 hh_cb.devices[dev_handle].conn.intr_cid = 0;
375 hh_cb.devices[dev_handle].attr_mask = 0;
376 return HID_SUCCESS;
377 }
378
379 /*******************************************************************************
380 *
381 * Function HID_HostOpenDev
382 *
383 * Description This function is called when the user wants to initiate a
384 * connection attempt to a device.
385 *
386 * Returns void
387 *
388 ******************************************************************************/
HID_HostOpenDev(uint8_t dev_handle)389 tHID_STATUS HID_HostOpenDev(uint8_t dev_handle) {
390 if (!hh_cb.reg_flag) return (HID_ERR_NOT_REGISTERED);
391
392 if ((dev_handle >= HID_HOST_MAX_DEVICES) ||
393 (!hh_cb.devices[dev_handle].in_use))
394 return HID_ERR_INVALID_PARAM;
395
396 if (hh_cb.devices[dev_handle].state != HID_DEV_NO_CONN)
397 return HID_ERR_ALREADY_CONN;
398
399 hh_cb.devices[dev_handle].conn_tries = 1;
400 return hidh_conn_initiate(dev_handle);
401 }
402
403 /*******************************************************************************
404 *
405 * Function HID_HostWriteDev
406 *
407 * Description This function is called when the host has a report to send.
408 *
409 * report_id: is only used on GET_REPORT transaction if is
410 * specified. only valid when it is non-zero.
411 *
412 * Returns void
413 *
414 ******************************************************************************/
HID_HostWriteDev(uint8_t dev_handle,uint8_t t_type,uint8_t param,uint16_t data,uint8_t report_id,BT_HDR * pbuf)415 tHID_STATUS HID_HostWriteDev(uint8_t dev_handle, uint8_t t_type, uint8_t param,
416 uint16_t data, uint8_t report_id, BT_HDR* pbuf) {
417 tHID_STATUS status = HID_SUCCESS;
418
419 if (!hh_cb.reg_flag) {
420 HIDH_TRACE_ERROR("HID_ERR_NOT_REGISTERED");
421 status = HID_ERR_NOT_REGISTERED;
422 }
423
424 if ((dev_handle >= HID_HOST_MAX_DEVICES) ||
425 (!hh_cb.devices[dev_handle].in_use)) {
426 HIDH_TRACE_ERROR("HID_ERR_INVALID_PARAM");
427 status = HID_ERR_INVALID_PARAM;
428 }
429
430 else if (hh_cb.devices[dev_handle].state != HID_DEV_CONNECTED) {
431 HIDH_TRACE_ERROR("HID_ERR_NO_CONNECTION dev_handle %d", dev_handle);
432 status = HID_ERR_NO_CONNECTION;
433 }
434
435 if (status != HID_SUCCESS)
436 osi_free(pbuf);
437 else
438 status =
439 hidh_conn_snd_data(dev_handle, t_type, param, data, report_id, pbuf);
440
441 return status;
442 }
443
444 /*******************************************************************************
445 *
446 * Function HID_HostCloseDev
447 *
448 * Description This function disconnects the device.
449 *
450 * Returns void
451 *
452 ******************************************************************************/
HID_HostCloseDev(uint8_t dev_handle)453 tHID_STATUS HID_HostCloseDev(uint8_t dev_handle) {
454 if (!hh_cb.reg_flag) return (HID_ERR_NOT_REGISTERED);
455
456 if ((dev_handle >= HID_HOST_MAX_DEVICES) ||
457 (!hh_cb.devices[dev_handle].in_use))
458 return HID_ERR_INVALID_PARAM;
459
460 if (hh_cb.devices[dev_handle].state != HID_DEV_CONNECTED)
461 return HID_ERR_NO_CONNECTION;
462
463 alarm_cancel(hh_cb.devices[dev_handle].conn.process_repage_timer);
464 hh_cb.devices[dev_handle].conn_tries = HID_HOST_MAX_CONN_RETRY + 1;
465 return hidh_conn_disconnect(dev_handle);
466 }
467
HID_HostSetSecurityLevel(const char serv_name[],uint8_t sec_lvl)468 tHID_STATUS HID_HostSetSecurityLevel(const char serv_name[], uint8_t sec_lvl) {
469 if (!BTM_SetSecurityLevel(false, serv_name, BTM_SEC_SERVICE_HIDH_SEC_CTRL,
470 sec_lvl, HID_PSM_CONTROL, BTM_SEC_PROTO_HID,
471 HID_SEC_CHN)) {
472 HIDH_TRACE_ERROR("Security Registration 1 failed");
473 return (HID_ERR_NO_RESOURCES);
474 }
475
476 if (!BTM_SetSecurityLevel(true, serv_name, BTM_SEC_SERVICE_HIDH_SEC_CTRL,
477 sec_lvl, HID_PSM_CONTROL, BTM_SEC_PROTO_HID,
478 HID_SEC_CHN)) {
479 HIDH_TRACE_ERROR("Security Registration 2 failed");
480 return (HID_ERR_NO_RESOURCES);
481 }
482
483 if (!BTM_SetSecurityLevel(false, serv_name, BTM_SEC_SERVICE_HIDH_NOSEC_CTRL,
484 BTM_SEC_NONE, HID_PSM_CONTROL, BTM_SEC_PROTO_HID,
485 HID_NOSEC_CHN)) {
486 HIDH_TRACE_ERROR("Security Registration 3 failed");
487 return (HID_ERR_NO_RESOURCES);
488 }
489
490 if (!BTM_SetSecurityLevel(true, serv_name, BTM_SEC_SERVICE_HIDH_NOSEC_CTRL,
491 BTM_SEC_NONE, HID_PSM_CONTROL, BTM_SEC_PROTO_HID,
492 HID_NOSEC_CHN)) {
493 HIDH_TRACE_ERROR("Security Registration 4 failed");
494 return (HID_ERR_NO_RESOURCES);
495 }
496
497 if (!BTM_SetSecurityLevel(true, serv_name, BTM_SEC_SERVICE_HIDH_INTR,
498 BTM_SEC_NONE, HID_PSM_INTERRUPT, BTM_SEC_PROTO_HID,
499 0)) {
500 HIDH_TRACE_ERROR("Security Registration 5 failed");
501 return (HID_ERR_NO_RESOURCES);
502 }
503
504 if (!BTM_SetSecurityLevel(false, serv_name, BTM_SEC_SERVICE_HIDH_INTR,
505 BTM_SEC_NONE, HID_PSM_INTERRUPT, BTM_SEC_PROTO_HID,
506 0)) {
507 HIDH_TRACE_ERROR("Security Registration 6 failed");
508 return (HID_ERR_NO_RESOURCES);
509 }
510
511 return (HID_SUCCESS);
512 }
513
514 /******************************************************************************
515 *
516 * Function hid_known_hid_device
517 *
518 * Description check if this device is of type HID Device
519 *
520 * Returns true if device is HID Device else false
521 *
522 ******************************************************************************/
hid_known_hid_device(BD_ADDR bd_addr)523 bool hid_known_hid_device(BD_ADDR bd_addr) {
524 uint8_t i;
525 tBTM_INQ_INFO* p_inq_info = BTM_InqDbRead(bd_addr);
526
527 if (!hh_cb.reg_flag) return false;
528
529 /* First check for class of device , if Inq DB has information about this
530 * device*/
531 if (p_inq_info != NULL) {
532 /* Check if remote major device class is of type BTM_COD_MAJOR_PERIPHERAL */
533 if ((p_inq_info->results.dev_class[1] & BTM_COD_MAJOR_CLASS_MASK) ==
534 BTM_COD_MAJOR_PERIPHERAL) {
535 HIDH_TRACE_DEBUG(
536 "hid_known_hid_device:dev found in InqDB & COD matches HID dev");
537 return true;
538 }
539 } else {
540 /* Look for this device in security device DB */
541 tBTM_SEC_DEV_REC* p_dev_rec = btm_find_dev(bd_addr);
542 if ((p_dev_rec != NULL) &&
543 ((p_dev_rec->dev_class[1] & BTM_COD_MAJOR_CLASS_MASK) ==
544 BTM_COD_MAJOR_PERIPHERAL)) {
545 HIDH_TRACE_DEBUG(
546 "hid_known_hid_device:dev found in SecDevDB & COD matches HID dev");
547 return true;
548 }
549 }
550
551 /* Find an entry for this device in hh_cb.devices array */
552 for (i = 0; i < HID_HOST_MAX_DEVICES; i++) {
553 if ((hh_cb.devices[i].in_use) &&
554 (memcmp(bd_addr, hh_cb.devices[i].addr, BD_ADDR_LEN) == 0))
555 return true;
556 }
557 /* Check if this device is marked as HID Device in IOP Dev */
558 HIDH_TRACE_DEBUG("hid_known_hid_device:remote is not HID device");
559 return false;
560 }
561