ESR10 v1.0
ESR10 v1.0
ESR10 v1.0
Release ESR10
Applies to:
v4.2
v4.1
v4.0
v3.0
v2.1
CSA3
CSA4
CSSv6
Profiles
Indicates:
Test Specification Impact
Revision History
Revision Date Comments
Web Site
This Errata Service Release can also be found on the official Bluetooth web site:
https://www.bluetooth.com/specification/adopted-specifications
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 page 3
Use of this specification is your acknowledgement that you agree to and will comply with the
following notices and disclaimers. You are advised to seek appropriate legal, engineering, and
other professional advice regarding the use, interpretation, and effect of this specification.
Use of Bluetooth specifications by members of Bluetooth SIG is governed by the membership
and other related agreements between Bluetooth SIG and its members, including those agree-
ments posted on Bluetooth SIG’s website located at www.bluetooth.com. Any use of this spec-
ification by a member that is not in compliance with the applicable membership and other
related agreements is prohibited and, among other things, may result in (i) termination of the
applicable agreements and (ii) liability for infringement of the intellectual property rights of Blue-
tooth SIG and its members.
Use of this specification by anyone who is not a member of Bluetooth SIG is prohibited and is
an infringement of the intellectual property rights of Bluetooth SIG and its members. The fur-
nishing of this specification does not grant any license to any intellectual property of Bluetooth
SIG or its members. THIS SPECIFICATION IS PROVIDED “AS IS” AND BLUETOOTH SIG,
ITS MEMBERS AND THEIR AFFILIATES MAKE NO REPRESENTATIONS OR WARRANTIES
AND DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ANY WARRAN-
TIES OF MERCHANTABILITY, TITLE, NON-INFRINGEMENT, FITNESS FOR ANY PARTICU-
LAR PURPOSE, OR THAT THE CONTENT OF THIS SPECIFICATION IS FREE OF
ERRORS. For the avoidance of doubt, Bluetooth SIG has not made any search or investigation
as to third parties that may claim rights in or to any specifications or any intellectual property
that may be required to implement any specifications and it disclaims any obligation or duty to
do so.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, BLUETOOTH SIG, ITS
MEMBERS AND THEIR AFFILIATES DISCLAIM ALL LIABILITY ARISING OUT OF OR
RELATING TO USE OF THIS SPECIFICATION AND ANY INFORMATION CONTAINED IN
THIS SPECIFICATION, INCLUDING LOST REVENUE, PROFITS, DATA OR PROGRAMS,
OR BUSINESS INTERRUPTION, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCI-
DENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE
THEORY OF LIABILITY, AND EVEN IF BLUETOOTH SIG, ITS MEMBERS OR THEIR AFFILI-
ATES HAVE BEEN ADVISED OF THE POSSIBILITY OF THE DAMAGES.
If this specification is a prototyping specification, it is solely for the purpose of developing and
using prototypes to verify the prototyping specifications at Bluetooth SIG sponsored IOP
events. Prototyping Specifications cannot be used to develop products for sale or distribution
and prototypes cannot be qualified for distribution.
Products equipped with Bluetooth wireless technology ("Bluetooth Products") and their combi-
nation, operation, use, implementation, and distribution may be subject to regulatory controls
under the laws and regulations of numerous countries that regulate products that use wireless
non-licensed spectrum. Examples include airline regulations, telecommunications regulations,
technology transfer controls and health and safety regulations. You are solely responsible for
complying with all applicable laws and regulations and for obtaining any and all required autho-
rizations, permits, or licenses in connection with your use of this specification and develop-
ment, manufacture, and distribution of Bluetooth Products. Nothing in this specification
provides any information or assistance in connection with complying with applicable laws or
regulations or obtaining required authorizations, permits, or licenses.
Bluetooth SIG is not required to adopt any specification or portion thereof. If this specification is
not the final version adopted by Bluetooth SIG’s Board of Directors, it may not be adopted. Any
specification adopted by Bluetooth SIG’s Board of Directors may be withdrawn, replaced, or
modified at any time. Bluetooth SIG reserves the right to change or alter final specifications in
accordance with its membership and operating agreements.
Copyright © 1999 - 2016. The Bluetooth word mark and logos are owned by Bluetooth SIG, Inc.
All copyrights in the Bluetooth Specifications themselves are owned by Apple, Inc, Ericsson
AB, Lenovo (Singapore) Pte. Ltd., Intel Corporation, Microsoft Corporation, Nokia Corporation
and Toshiba Corporation. Other third-party brands and names are the property of their respec-
tive owners.
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 page 4
Note that this document shows excerpts from the specification as they appear
in the final amended specification.
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 page 5
TABLE OF CONTENTS
Part I
CORE SPECIFICATION ERRATA
Core Errata Index Tables
By Number: ........................................................................................... 9
By Core Specification Volume and Part: ............................................. 18
1 Core Specification Supplement [CSS] Errata.................................. 28
2 Global Changes - Affecting Several Parts ....................................... 30
3 [Vol 0] Part B: Compliance requirements ........................................ 32
4 [Vol 1] Part A: Architecture ............................................................... 35
5 [Vol 1] Part Bb: Acronyms................................................................. 44
6 [Vol 1] Part E: IEEE LANGUAGE....................................................... 45
7 [Vol 2] Part A: Radio Specification ................................................... 48
8 [Vol 2] Part B: Baseband Specification............................................ 53
9 [Vol 2] Part C: Link Manager Protocol ............................................. 66
10 [Vol 2] Part D: Error Codes ............................................................... 71
11 [Vol 2] Part E: Host Controller Interface .......................................... 73
12 [Vol 2] Part F: Message Sequence Charts ..................................... 125
13 [Vol 2] Part H: Security Specification............................................. 131
14 [Vol 3] Part A: L2CAP ...................................................................... 136
15 [Vol 3] Part B: Service Discovery Protocol.................................... 142
16 [Vol 3] Part C: Generic Access Profile (GAP)................................ 143
17 [Vol 3] Part D: Test Support ............................................................ 166
18 [Vol 3] Part F: Attribute Protocol (ATT) .......................................... 168
19 [Vol 3] Part G: Generic Attribute Profile (GATT)............................ 171
20 [Vol 3] Part H: Security Manager .................................................... 178
21 [Vol 4] Part B: USB Transport Layer .............................................. 187
22 [Vol 5] Part A: 802.11 Protocol Adaptation Layer.......................... 188
23 [Vol 6] Part A: Physical Layer Specification .................................. 190
24 [Vol 6] Part B: Link Layer Specification......................................... 192
25 [Vol 6] Part C: Sample Data............................................................. 217
26 [Vol 6] Part D: Message Sequence Charts..................................... 218
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 page 6
Part II
GATT-BASED PROFILES & SERVICES ERRATA
Profile Errata Index Tables
By Number: ....................................................................................... 231
By Profile Name: ............................................................................... 231
1 Automation IO Service (AIOS) ........................................................ 233
2 Continuous Glucose Monitoring Profile (CGMP).......................... 234
3 Continuous Glucose Monitoring SystemService (CGMS) ........... 235
4 Current Time Service (CTS) ............................................................ 236
5 Device Information Service (DIS) ................................................... 237
6 Environmental Sensing Service (ESS)........................................... 238
7 Find Me Profile (FMP) ...................................................................... 239
8 Glucose Profile (GLP)...................................................................... 240
9 Immediate Alert Service (IAS)......................................................... 241
10 Internet Protocol Support Profile (IPSP)........................................ 242
11 Object Transfer Service (OTS) ........................................................ 243
Part III
TRADITIONAL PROFILES ERRATA
Profile Errata Index Tables
By Number: ....................................................................................... 245
By Profile Name: ............................................................................... 247
1 AUDIO/VIDEO REMOTE CONTROL PROFILE (AVRCP)................ 249
2 Basic Printing Profile (BPP)............................................................ 253
3 Calendar, Tasks and Notes Profile (CTN) ...................................... 254
4 Dial-up networkING PROFILE (DUN).............................................. 257
5 Generic Object Exchange Profile (GOEP) ..................................... 259
6 Health Device Profile (HDP) ............................................................ 260
7 Hands-Free Profile (HFP) ................................................................ 262
8 Human Interface DesignDevice Profile (HID) ................................ 266
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 page 7
Part IV
TEST SPECIFICATION IMPACT
Index Tables
By Number: ....................................................................................... 283
By Core Specification Volume and Part: ........................................... 283
1 TSE Mapping Table .......................................................................... 284
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release ESR10
Part I
By Number:
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 10
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 11
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 12
E6528 CSSv6
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 13
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 14
E6610 CSSv6
E6695 CSSv6
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 15
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 16
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 17
E7008 CSSv6
E7019 CSSv6
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 18
1 E7019
1.1.1 E6695
CSSv6
1.3.1 E6610
Part A
1.5.1 E6528
1.9.1 E7008
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 19
Vol 1, Part B
1 E6717 4.2 4.1 4.0
Acronyms
Vol 2, Part A
1 E6199 4.2 4.1 4.0 3.0 2.1
Radio Specification
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 20
Vol 2, Part D
2.1 E6421 4.2 4.1 4.0 3.0 2.1 CSA4
Error Codes
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 21
5 E6767 4.2
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 22
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 23
Vol 3, Part B
Service Discovery 2.4.1 E6421 4.2 4.1 4.0 3.0 2.1 CSA4
Protocol
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 24
12 E6401 4.2
12 E7355 4.2
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 25
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 26
Vol 4, Part A
UART Transport 2 E6264 4.2 4.1 4.0 3.0 2.1
Layer
Vol 4, Part B
4 E4165 4.2 4.1 4.0 3.0 2.1
USB Transport Layer
Vol 6, Part A
Physical Layer 1 E6228 4.2 4.1 4.0
Specification
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 27
Vol 6, Part C
1.2 E5809 4.2 4.1 4.0
Sample Data
Vol 7, Part A
MWS Coexistence 2.1.5 E5002 4.2 4.1 CSA3
Logical Signaling
Vol 7, Part B
1 E6915 4.2 4.1
WCI-1
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 28
Vol 7, Part C
1 E6915 4.2 4.1
WCI-2
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 29
This part defines the basic data types used for Extended Inquiry Response
(EIR), Advertising Data (AD), Scan Response Data, and OOB data blocks. All
data types defined here may be used for EIR or AD data types unless stated
otherwise. All data types may be used multiple times in the same packet unless
otherwise stated. Additional data types may be defined in profile specifications.
16-bit and 32-bit UUIDs shall [...] may assign 16-bit and 32-bit UUIDs [...]
EDITOR’S NOTE: After the first paragraph, add the following note.
LL_CONNECTION_UPDATE_REQ LL_CONNECTION_UPDATE_IND
LL_CHANNEL_MAP_REQ LL_CHANNEL_MAP_IND
LL_REJECT_IND_EXT LL_REJECT_EXT_IND
CONNECT_REQ CONNECT_IND
Original Change to
µsec µs
msec ms
sec s
secs seconds
Original Change to
second s
seconds s
EDITOR’S NOTE: Change all instances of "white list", "White list", or "white
List" to "White List"
Section 3.1
Using the abbreviations in Table 3.1 the following tables define Bluetooth
product types in terms of Core Configurations. For the respective Core
Configuration, the letter “M” indicates that it is mandatory to claim support, “O”
indicates that it is optional to claim support, “P” indicates that it is optionally
permitted to claim only partial support of the Core Configuration, “I” indicates
that the Core Configuration is inherently included in the combined Core
Configuration, “EX” indicates that support for the Core Configuration shall not
be claimed.
Section 3.1.1
BR and LE
BR CC EDR CC HS CC Combined CC LE CC HCI CC
BR End Product M P P EX EX O
HS End Product M M M EX EX O
LE End Product EX EX EX EX M O
Section 3.1.2.1
BR and LE
BR CC HS CC Combined CC LE CC
Host Parts Host Parts Host Parts Host Parts HCI CC
BR/EDR Host
M P EX EX M
Subsystem Product
HS Host
M M EX EX M
Subsystem Product
LE Host
EX EX EX M M
Subsystem Product
Section 3.1.2.2
BR and LE
BR CC EDR CC HS CC Combined CC LE CC
Controller Controller Controller Controller Controller HCI
Parts Parts Parts Parts Parts CC
BR Controller
Subsystem M P P EX EX M
Product
EDR Control-
ler Subsys- M M P EX EX M
tem Product
HS Controller
Subsystem M M M EX EX M
Product
HS only Con-
troller Subsys- EX EX M EX EX M
tem Product
LE Controller
Subsystem EX EX EX EX M M
Product
ATT ([Vol 3] Part F) All ATT requirements in the LE CC. If ATT is supported on BR,
all ATT requirements in the BR CC.
GATT ([Vol 3] Part G) All GATT requirements in the LE CC. If GATT is supported on
BR, all GATT requirements in the BR CC.
Section 2
Although these assumptions may not beare not always required for embedded
Bluetooth implementations that combine all layers in a single system, the
general architectural and QoS models are defined with these assumptions in
mind, in effect a lowest common denominator.
Section 3.1
Figure 3.2 shows a number of application traffic types. These are used to
classify the types of data that may be submitted to the Bluetooth core system.
The original data traffic type may not be the same ascan be different from the
Section 4.2.1.5
[...]A master device should aim to schedule broadcasts to coincide with periods
of physical link presence within the piconet physical channel, but this may not
always beis not always possible or practical. [...]
3.3.2.2.2 Characteristics
EDITOR’S NOTE: Section 1.4: Insert row with new term and definition.
Section 3.3.2.2.2: Insert/delete text in first paragraph.
Section 1.4
Section 3.3.2.2.2
[...] All advertising packets on the advertising PHY channels use a fixed Access
Address.
The transmitter may remove packets from the transmit queue such that the
receiver does not receive all the packets in the sequence. If this happens
detection of the missing packets is delegated to the L2CAP layer.
Version 3.0
Section is 3.1.3.1
Version 2.1
Section is 3.1.3
EDITOR’S NOTE: Move the connection between Control (PAL) AMP-C and
AMP Physical Link to be between Control (PAL) AMP-C and AMP ACL in
Figure 3.3.
Channels
L2CAP
Unicast Broadcast
User
User
(L2CAP)
Logical
Control User Control User Profile User Control Control User Control User
Links
(L2CAP)
AMP-U
(PAL) (L2CAP)
AMP-U (LMP) (L2CAP) Stream Broadcast (L2CAP) (LMP) (LL) (L2CAP) (LL) (LL)
AMP-C AMP-U ACL-C ACL-U Data (PBD) PSB-U PSB-C LE-C LE-U ADVB-C ADVB-U
Transports
Logical
AMP BR/EDR LE
ASB SCO eSCO CSB PSB ADVB
ACL ACL ACL
AMP
Links
BR/EDR LE LE
Physical
E6922 4.2 4.1 4.0 3.0 Vol 1, Part A Architecture Section 4.5
EDITOR’S NOTE: Remove stacked boxes from Figure 3.3. See Section 4.5
Links
Logical transport supported Supported by Bearer Overview
Links
Logical transport supported Supported by Bearer Overview
BR/EDR Secure
Connections
s1(AES-128) f5(AES-CMAC-128)
LE key
distribution: h6(AES-CMAC-128) h7(AES-CMAC-128) h6(AES-CMAC-128) h7(AES-CMAC-128)
BR/EDR
Link Key LTK
Stored
Long Term Key
[...]If the Controller cannot resolve the peer’s device identity address in an
advertisement or, it may pass the event to the Host for resolution in the Host.
Section 5.4.5
[...] There are two modes of privacy: device privacy mode and network privacy
mode. A device in device privacy mode is only concerned about the privacy of
the device and will accept advertising packets from peer devices that contain
their identity address as well as ones that contain a private address, even if
the peer device has distributed its IRK in the past. In network privacy mode, a
device will only accept advertising packets from peer devices that contain
Section 1
Acronym or
Writing out in full Comments
abbreviation
E7521 4.2 4.1 4.0 3.0 2.1 Vol 1, Part E IEEE Language
1.4 Should
1.5 May
Section 1.1
There is a strong implication that the presence of the word shall indicates a
testable requirement. All testable requirements shall be reflected in the
Protocolappropriate Implementation Conformance Statement (PICS). In turn,
all PICS indicators should be reflected in the Test Cases (TCs) either directly or
indirectly.
Section 1.4
Section 1.5
The use of may implies an optional condition in the PICS and therefore may
need to be reflected in the corresponding test cases.
E6421 4.2 4.1 4.0 3.0 2.1, Vol 1, Part E IEEE Language
CSA4
The use of may implies an optional condition in the PICS and therefore may
need to be reflected in the corresponding test cases.
This specification does not use the phrase may not except in the form may or
may not.
E6422 4.2 4.1 4.0 3.0 2.1 Vol 1, Part E IEEE Language
The following rules apply throughout this specification except where explicitly
overridden.
Binary numbers are normally written with a "b" suffix, so 1101b is the same as
the decimal number 13.
Hexadecimal numbers are written with a "0x" prefix, so 0x42 is the same as the
decimal number 66. The letters "a" to "f" are used to represent the digits 10 to
15, so 0x1a is the same as the decimal number 26. The case of letters in a
hexadecimal number is not significant.
All numbers not written in one of the above ways are decimal.
In some cases the specification needs to refer to some of the bits of an integer
value. Bits are always numbered from 0 as the least significant bit, so bit 0 of
1011b equals 1 while bit 2 equals 0. A single bit will be notated with a subscript,
as in CLK5.
Some values in this specification are divided into individual bits, each of which
has a description. If explicit bit values are not given then this description
represents the meaning when the bit equals 1 and the opposite applies when
the value is 0. For example, a description of:
E6694 4.2 4.1 4.0 3.0 2.1 Vol 1, Part E IEEE Language
EDITOR’S NOTE: Add new section in Volume 1, Part E to address this erratum
filed against Volume 3, Part B, Section 2.5.1
E6199 4.2 4.1 4.0 3.0 2.1 Vol 2, Part A Radio Specification Section 23.1
3 Transmitter Characteristics
Section 1
Europe:
Approval Standards: European Telecommunications Standards Institute, ETSI
Documents: EN 300 328, ETS 300-826EN 300 440, EN 301 489-17
Approval Authority: National Type Approval Authorities
Section 3
If transmitting antennas of directional gain greater than 0 dBi are used, the
power level delivered to the antenna shall be compensated to comply with the
applicable paragraphs in relevant regulatory standards: EN 300 328, EN 301
489-17 and FCC part 15.
Bluetooth devices are classified into three power classes based on the
modulation mode with the highest output power. That modulation mode shall
meet the specification requirements for the power class. The other modulation
modes do not need to meet the power class requirements of the applicable
device power class, but the maximum output power used for the other
modulation modes shall not exceed the maximum power of the modulation
mode used for classification.Bluetooth devices are classified into three power
classes based on their highest output power capabilities.
Section 4.2.5
Section A.1.2
The normal test voltage for the equipment shall be the nominal voltage for
which the equipment was designed.
Section A.1.2.1
The nominal test voltage for equipment to be connected to the mains shall be
the nominal mains voltage. The nominal voltage shall be the declared voltage
or any of the declared voltages for which the equipment was designed. The
frequency of the test power source corresponding to the AC mains shall be
within 2% of the nominal frequency.
Section A.1.2.2
When radio equipment is intended for operation from the alternator-fed lead-
acid battery power sources which are standard in vehicles, then the nominal
test voltage shall be 1.1 times the nominal voltage of the battery (6V, 12V, etc.).
Section A.1.2.3
Section A.2.1
The extreme temperature range shall be the largest temperature range given
by the combination of:
• The minimum temperature range 0 °C to +35 °C
• The product operating temperature range declared by the manufacturer.
This extreme temperature range and the declared operating temperature range
shall be recorded in the test report.
Section A.2.2
Tests at extreme power source voltages specified below are not required when
the equipment under test is designed for operation as part of and powered by
another system or piece of equipment. Where this is the case, the limit values
of the host system or host equipment shall apply. The appropriate limit values
shall be declared by the manufacturer and recorded in the test report.
Section A.2.2.1
Section A.2.2.2
When radio equipment is intended for operation from the alternator-fed lead-
acid battery power sources which are standard in vehicles, then extreme test
voltage shall be 1.3 and 0.9 times the nominal voltage of the battery (6V, 12V
etc.).
Section A.2.2.3
The lower extreme test voltage for equipment with power sources using the
following types of battery, shall be
a) for Leclanché, alkaline, or lithium type battery: 0.85 times the
nominal voltage of the battery
a) for mercury or nickel-cadmium types of battery: 0.9 times the
nominal voltage of the battery.
In both cases, the upper extreme test voltage shall be 1.15 times the nominal
voltage of the battery.
Section A.2.2.4
For equipment using other power sources, or capable of being operated from a
variety of power sources (primary or secondary), the extreme test voltages
shall be those declared by the manufacturer. These shall be recorded in the
test report.
Section B
The Basic Rate radio parameters shall be tested in the following conditions:
The Enhanced Data Rate radio parameters shall be tested in the following
conditions:
CLKR is the reference clock driven by the free running system clock. CLKN
may be offset from the reference clock by a timing offset. In STANDBY and in
Park, Hold, Sniff, and Connectionless Slave Broadcast modes the reference
clock may be driven by a low power oscillator (LPO) withshall have a worst
case accuracy (of +/-250ppm). Otherwise, the reference clock shall be driven
by the reference crystal oscillator withIn all other circumstances it shall have a
worst case accuracy of +/-20ppm; this accuracy shall also be used by the
piconet master device. The master shall use the higher resolution oscillator
while performing Piconet Clock Adjustment (see Section 8.6.10).
LSB MSB
EUI-48
0000 0001 0000 0000 0000 0000 0001 0010 0111 1011 0011 0101
The BD_ADDR may take any values except those that would have any of the 64
reserved LAP values for general and dedicated inquiries (see Section 1.2.1).
EDITOR’S NOTE:
Version 4.2
Change “Five” to “Several”.
channel and adapted piconet channel) are used for communication between
connected devices and are associated with a specific piconet.[...]
Section 2.2.4
[...]In some cases, it may not beis not possible to determine how much of an
observed offset is caused by external frame timing alignment
(time_base_offset) and how much is caused by the offset between master and
slave (slave_offset).
Section 2.2.5.2
[...]The master may notfail to transmit to the slave due to the master device
being busy with other tasks such as maintaining connections to other devices
in Sniff, Hold, or Park modes, due to SCO, eSCO, or Connectionless Slave
Broadcast activity, due to the master being involved in a scatternet, or due to
interference.
Section 6.5.1.2
The NULL packet may be used to return link information to the source
regarding the success of the previous transmission (ARQN), or the status of
the RX buffer (FLOW). The NULL packet maydoes not have to berequire
acknowledgedacknowledgment.
Section 8.10.2
The BR/EDR Controller may transfer Connectionless Slave Broadcast data to
the Host through HCI events. Because HCI events are limited to 255 bytes a
received packet may or may not fit into a single HCI event.[...]
Figure 2.10
master-to-slave slot slave-to-master slot master-to-slave slot slave-to-master slot master-to-slave slot
hop f(k) hop f(k+1) hop f ’(k) hop f ’(k)
hop f’(k) hop f’ (k)
68 μs
Master ID
625 μs 1250 μs
Figure 2.11
master-to-slave slot
master-to-slave slot master-to-slave slot slave-to-master slot master-to-slave slot
slave-to-master slot
hop f(k) hop f(k+1) hop f ’(k) hop f ’(k+1) hop f ’(k+1)
hop f’(k) hop f’(k+1) hop f’(k+1)
68 μs
Master ID
625 μs 1250 μs
B.1.8 synchronization_trainTO
B.1.9 synchronization_scanTO
EDITOR’S NOTE: Edit text as shown below. Only section 2.7.3 is in previous
version.
Section 2.7.3
[...] During each scan window, the device listens for the duration of
TSync_Scan_Window (see [Vol 2] Part E, Section 7.1.52). The RF Channel for
each scan window shall be selected as specified in Section 2.7.1. Each scan
window should be continuous and not interrupted by other activities. The
interval between the start of consecutive scan windows shall be equal to≤
TSync_Scan_Interval (see [Vol 2] Part E, Section 7.1.52). The values for
TSync_Scan_Window and TSync_Scan_Interval shall be chosen as follows:
• During Connectionless Slave Broadcast, refer to [Vol 2] Part E, Section
7.1.52.
• During Coarse Clock Adjustment Recovery Mode, the values chosen are
implementation specific.
≤ TSync_Scan_Interval ≤ TSync_Scan_Interval
f1 f2 f3
Section B.1.8
[...] At the baseband level a default value equivalent to 120 seconds should be
used for Connectionless Slave Broadcast and a default value equivalent to 20
seconds should be used for Coarse Clock Adjustment Recovery Mode. The
Host maycan change the value of synchronization_trainTO that is used during
Connectionless Slave Broadcast.
Section B.1.9
Before each transmission, the shift register shall be initialized with a portion of
the master Bluetooth clock, CLK6-1, extended with an MSB of value one. This
initialization shall be carried out with CLK1 written to position 0, CLK2 written to
position 1, etc. Exceptions are the FHS packet sent during inquiry response or
page response, and the extended inquiry response packet sent during inquiry
response, where initialization of the whitening register shall be carried out
differently. Instead of the master clock, the X-input used in the inquiry or page
response (depending on current state) routine shall be used, see Table 2.2.
The 5-bit value shall be extended with two MSBs of value 1. During register
initialization, the LSB of X (i.e., X0) shall be written to position 0, X1 shall be
written to position 1, etc.
8.6.3 eSCO
In the reserved slots both master and slave shall only listen and transmit at
their allocated slots at the first transmission time of each eSCO window.
Intermittent lapses due to, for instance, time-critical signaling during connection
establishment are allowed. Both master and slave may refrain from sending
data and may use instead POLL and NULL packets respectively. When the
master transmits a POLL packet instead of an eSCO 3-slot packet the slave
shall transmit starting in the same slot as if the master transmitted an eSCO 3-
slot packet. If the slave does not receive anything in the reserved master-to-
slave transmission slot it shall transmit , or the slave does not receive anything
in the reserved master-to-slave transmission slot, it shall start any transmission
in the same slot as if the master had transmitted the negotiated packet type.
For example, if the master had negotiated an EV5 packet the slave would
transmit three slots later. If the master does not receive a slave transmission in
response to an eSCO packet it causes an implicit NAK of the packet in
question. The listening requirements for the slave during the retransmission
window are the same as for an active ACL logical transport.
The STANDBY state is the default state in the device. In this state, the device
may be in a low-power mode. Only the native clock is running at the accuracy
of the LPO (or better)with a worst case accuracy of +/-250 ppm.
EDITOR’S NOTE: Add underscores and delete spaces in time values in 5th
and 6th paragraphs and in Table 6.1.
[...]The scan window shall be increased to minimize the setup delay. If one
SCO logical transport is present using HV3 packets and TSCO=6 slots or one
eSCO logical transport is present using EV3 packets and TeSCO=6 slots, a total
scan window Tw_ page_ scan of at least 36 slots (22.5ms) is recommended; if
two SCO links are present using HV3 packets and TSCO=6 slots or two eSCO
links are present using EV3 packets and TeSCO=6 slots, a total scan window of
at least 54 slots (33.75ms) is recommended.
The scan interval Tpage_ scan is defined as the interval between the beginnings
of two consecutive page scans. A distinction is made between the case where
the scan interval is equal to the scan window Tw _page_ scan (continuous scan),
the scan interval is maximal 1.28s, or the scan interval is maximal 2.56s. These
three cases shall determine the behavior of the paging device; that is, whether
the paging device shall use R0, R1 or R2, see also Section 8.3.2. Table 8.1
illustrates the relationship between Tpage_ scan and modes R0, R1 and R2.
Although scanning in the R0 mode is continuous, the scanning may be
R1 ≤ 1.28s
R2 ≤ 2.56s
Reserved -
Table 8.1: Relationship between scan interval, and paging modes R0, R1, and R2
EDITOR’S NOTE:
Version 4.2
Delete last sentence in 5th paragraph and add to new paragraph.
EDITOR’S NOTE: Revise and reorder the first three paragraphs. Change bars
reflect E6277 that was in ESR09.
The master of the piconet can broadcast messages to all slaves on the ASB
and PSB logical transports. An ASB or PSB broadcast packet shall have an
LT_ADDR set to all zero. If aEach new broadcast message carries ASB-U
data, it may be (which may be carried by a number of packetsfragmented in the
same way as ACL packets.) Therefore it shall start with a packet carrying the
start of L2CAP message indication (LLID=10b) and may be followed by
packets carrying the continuation of L2CAP message indication (LLID=01b). If
a new broadcast message carries ASB-C data, it shall not be fragmented and
shall consist of a single packet carrying or the LMP message indication
(LLID=11b). In either case, the master may carry out a number of
retransmissions of each of these packets to increase the probability for error-
free delivery; see also Section 7.6.5.
In step 1To begin the role switch, the slave A and master B shall perform a
TDD switch using the former hopping scheme (still using the Bluetooth device
address and clock of device B), so there is no piconet switch yet. The slot
offset information sent by slave A shall not be used yet; it is used when both
devices have switched to the new piconet and device B is positioning its
correlation window.but shall be used in step 3. Device A now becomes the
master, device B the slave. The LT_ADDR formerly used by device A in its
slave role, shall now be used by slave B.
B.1.2 pageTO
Section 3.2
For each slave, the timeout period, CSB_supervisionTO, shall be provided by
the Host.
Section 8.3.2
Train B shall be repeated for Npage times. If no response is obtained, knudge
may be updated in the case where slots to receive are periodically not
available and train A shall be tried again Npage times. Alternate use of train A
and train B and updates of knudge shall be continued until a response is
received or the timeout pageTO is exceeded. When extended_pageTO is
greater than zero, the timeout may be extended to (pageTO +
extended_page_TO). If a response is returned by the slave, the master device
enters the master response substate.
Section 8.6.10.3
Each single adjustment shall be performed by a directed packet from the
master to each slave and a response (e.g. baseband
acknowledgementacknowledgment) from each slave. If a slave does not
respond, the master shall suspend its updating of time_base_offset (but should
continue to poll that slave) at least until each slave has either responded or has
failed to respond for at least CLK_adj_drag_TO. In case several slaves fail to
respond, the master should ensure that each of the failing slaves gets at least
one CLK_adj_drag_TO to respond (these may be concurrent for multiple
slaves). The master need not allow more than one suspension of
CLK_adj_drag_TO for any given slave during a link supervision timeout for that
slave.
Section B.1.2
The pageTO defines the number of slots the page substate can last before a
response is received when the extended_pageTO is zero. The timer value may
be changed by the host. HCI provides a command to change the timer value.
E6852 4.2 4.1 4.0 3.0 2.1 Vol 2, Part C Link Manager Protocol (LMP)
If the maximum response time, see Section 2.4.1, is exceeded or if a link loss
is detected (see [Vol 2] Part B, Section 3.1), the party that waits for the
response shall conclude that the procedure has terminated unsuccessfully.
E4783 4.2 4.1 4.0 3.0 Vol 2, Part C Link Manager Protocol (LMP)
Implementations shall not violate the relative power level between modulations
(see [Vol 2] Part A, Section 3).
Mandatory
Name Type Unit Detailed
range
E6735 4.2 4.1 4.0 3.0 2.1 Vol 2, Part C Link Manager Protocol (LMP)
[...] The current link key mayshall not be changed before the connection
establishment procedure has completed. This feature is only supported if
broadcast encryption is supported as indicated by the LMP features mask.
E6447 4.2 4.1 4.0 3.0 2.1 Vol 2, Part C Link Manager Protocol (LMP)
[...]The slot offset shall be the time in microseconds betweenfrom the start of a
master transmission in the current piconet to the start of the next following
master transmission in the piconet where the BD_ADDR device (normally the
slave) is master at the time that the request is interpreted by the BD_ADDR
device.
E6776 4.2 4.1 4.0 3.0 2.1 Vol 2, Part C Link Manager Protocol (LMP)
E6606 4.2 4.1 4.0 3.0 2.1 Vol 2, Part C Link Manager Protocol (LMP)
E6773 4.2 4.1 4.0 3.0 2.1 Vol 2, Part C Link Manager Protocol (LMP)
Position
Length op Packet Possible in
LMP PDU (bytes) code type direction Contents payload
E6421 4.2 4.1 4.0 3.0 2.1, Vol 2, Part D Error Codes
CSA4
Section 2.1
The OpCode given might not correspond to any of the OpCodes specified in
this document, or any vendor-specific OpCodes, or the command may not
have not been implemented.
E6910 4.2 4.1 4.0 3.0 Vol 2, Part E Host Controller Interface
Supported
Name Vers. Summary description Controllers
Set Event Filter Command 1.1 The Set Event Filter command is BR/EDR,
used by the Host to specify different AMP
event filters. The Host may issue this
command multiple times to request
various conditions for the same type
of event filter and for different types of
event filters.
Section 3.16
Table 3.17
Supported
Name Vers. Summary description Controllers
Section 6.37
The synchronization_trainTO configuration parameter is used by the controller
to terminate the Synchronization Train after it has been started via the
HCI_Start_Synchronization_Train command.
Section 7.3.93
This command reads the Authenticated_Payload_Timeout
(authenticatedPayloadTO, see [Vol 2] Part B, Section Appendix B for BR/EDR
connections and [Vol 6] Part B, Section 5.4 for the LE connections) parameter
in the BR/EDRPrimary Controller on the specified Connection_Handle.
Section 7.3.94
This command writes the Authenticated_Payload_Timeout
(authenticatedPayloadTO, see [Vol 2] Part B, Section Appendix B and [Vol 6]
Part B, Section 5.4 for the LE connection) parameter in the Primary Controller
for the specified Connection_Handle.
Section 7.7.75
The Authenticated Payload Timeout Expired event is used to indicate that a
packet containing a valid MIC on the Connection_Handle was not received
within the authenticatedPayloadTO (see [Vol 2] Part B, Section Appendix B for
the BR/EDR and [Vol 6] Part B, Section 5.4 for the LE connection). Note: A
Host may choose to disconnect the link when this occurs.
E6421 4.2 4.1 4.0 3.0 2.1, Vol 2, Part E Host Controller Interface
CSA4
Section 4.5
If an error occurs for a command for which a Command Complete event is
returned, the Return Parameters field may notonly contain all some of the
return parameters specified for the command.[...]
Section A.10.1
4. Note: in the Connection Complete event the Encryption_Mode parameter
will show whether encryption was successfully turned on. If tThe remote device
maydoes not support encryption or may havehas set Encryption_Mode to 0x01
when the local device has not, so the encryption mode returned in the
Connection Complete event may or may not equal the encryption mode set in
the Write_Encryption_Mode command.
E6807 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
[...]The Supported Controllers column denotes the Controller types that can
support the command: All, BR/EDR, LE, or AMP, or a comma-separated list of
Controller types (e.g. “BR/EDR, LE”). Not all Controllers of the names type(s)
will necessarily support the command.
Supported
Name Vers. Summary description Controllers
Supported
Name Vers. Summary description Controllers
Section 3.5
Supported
Name Vers. Summary description Controllers
Section 3.18
Commands/Events Group
Section 3.19
Section 6.27
Section 7.8.9
EDITOR’S NOTE: Section 3.5: Add text to LE Set Random Address Command
Summary description. Section 7.8.10: Change “advertisement packets” to
“advertising packets.”
Section 3.5
Section 7.8.10
All changes below apply to v4.2. Changes in rows 0x00 and 0x01 also
apply to v4.1 and v4.0.
Section 3.14
Supported
Name Vers. Summary description Controllers
Section 3.19.
Section 6.27
Section 7.8.38
This command can be used at any time when address translation is disabled in
the Controller.
Return
Command OCF Command Parameters Parameter
Description:
When an entry on the resolving list is removed, the mode associated with that
entry shall also be removed.
This command can be used at any time when address translation is disabled in
the Controller.
If the device has not been added to the resolving list, the command shall be
rejected using the error code Unknown Connection Identifier (0x02).
Command Parameters:
0x00 Use Network Privacy Mode for this peer device (default)
Return Parameters:
Version 4.1
C8:Mandatory if LE Feature (LE Ping) is supported, otherwise optional.
E6452 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
5.3 Handles
Section 4.1.1
The Host chooses the Connection_ Handles for the following HCI Data Packets
based on the information returned in this event, and/or the LE Read Buffer Size
commands.
Section 4.3
When the Host receives a Disconnection Complete, Disconnection Physical
Link Complete or Disconnection Logical Link Complete event, the Host shall
assume that all unacknowledged HCI Data Packets that have been sent to the
Controller for the returned Handle have been flushed, and that the
corresponding data buffers have been freed. A Primary Controller does not
have to notify the Host about this in a Number Of Completed Packets event,
nor does the AMP Controller have to notify the Host about this in a Number Of
Completed Data Blocks event, before the disconnection event (and must not
do so afterwards because the Connection_Handle is no longer valid).
Section 5.3
Three types of handles are used to identify logical channels between the Host
and a Controller: Connection HandleConnection_Handles, Logical Link
Handles, and Physical Link Handles.
Section 7.1.15
Note: The Connection_Handle command parameter is used to identify the
other BR/EDR Controller, which forms the connection. The Connection_Handle
Section 7.1.16
The Set_Connection_Encryption command is used to enable and disable the
link level encryption. Note: the Connection_Handle command parameter is
used to identify the other BR/EDR Controller which forms the connection. The
Connection_Handle should be a Connection_Handle for an ACL connection.
The encryption setting will apply to all Connection_Handles with the same
remote BR/EDR Controller. While the encryption is being changed, all ACL
traffic must be turned off for all Connection_Handles associated with the
remote device.
Section 7.3.57
This command is used by the Host to cause the BR/EDR Controller to refresh
the encryption key on an ACL connection identified by a Connection_Handle
by pausing and resuming encryption.
Section 7.5.6
Connection_Handle: Size: 2 Octets (12 Bits meaningful)
Value Parameter Description
0xXXXX The Connection_Handle for the connection for which the master clock has
been read. If the Which_Clock parameter was 0, then the Connec-
tion_Handle shall be set to 0 and ignored upon receipt.
Range: 0x0000-0x0EFF (0x0F00 – 0x0FFF Reserved for future use)
Section 7.7.8
The Encryption Change event is used to indicate that the change of the
encryption mode has been completed. The Connection_Handle will be a
Connection_Handle for an ACL connection and is used to identify the remote
device. The Encryption_Enabled event parameter specifies the new
Encryption_Enabled parameter for the Connection_Handle specified by the
Connection_Handle event parameter. This event will occur on both devices to
notify the Hosts when Encryption has changed for the specified
Connection_Handleall connections between the two devices. Note: This event
shall not be generated if encryption is paused or resumed; during a role switch,
for example.
Section 7.7.9
The Change Connection Link Key Complete event is used to indicate that the
change in the Link Key for the Connection_Handle specified by the
Connection_Handle event parameterall connections to a given remote BR/
EDR Controller has been completed.
Section 7.7.10
The Master Link Key Complete event is used to indicate that the Link Key
managed by the master of the piconet has been changed. The
Connection_Handle will be a Connection_Handle for an ACL connection within
that piconet. The link key used for the connection will be the temporary link key
of the master device or the semi-permanent link key indicated by the Key_Flag.
The Key_Flag event parameter is used to indicate which Link Key (temporary
link key of the Master, or the semi-permanent link keys) is now being used in
the piconet.
Section 7.7.76
The SAM Status Change event indicates that the Controller has changed the
SAM status for the connection identified by the Connection_Handle; i.e., a new
SAM slot map has been enabled or the existing one disabled. Note: A change
from one SAM slot map to another only generates one event, not two.
E6541 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
Section 4.3
[...] A Primary Controller does not have to notify the Host about this in a
Number Of Completed Packets event, nor does the AMP Controller have to
notify the Host about this in a Number Of Completed Data Blocks event, before
the disconnection event (and must not do so afterwards because the
connection handle is no longer valid).
Section 7.7.19
[...] The Number Of Completed Packets event must not be sentshall not specify
a given connection handle before the corresponding Connection Complete
event for the corresponding connection or after an event indicating
disconnection of the corresponding connection.
E7024 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
Section 4.4
To indicate to the Host that the Controller is ready to receive HCI command
packets, the Controller may generate a Command Complete or Command
Status event with the Command Opcode set to 0x0000, and the Num HCI
Command Packets event parameter is set to 1 or more. Command Opcode
0x0000 is a NOP (No OPeration),special value indicating that this event is not
associated with a command sent by the Host. The Controller can send a
Command Complete or Command Status event with Command Opcode
0x0000 at any time and can be used to change the number of outstanding HCI
command packets that the Host can send before waiting. The Controller may
generate a Command Complete or Command Status event with the Num HCI
Command Packets event parameter set to zero to inform the Host that it must
stop sending commands.
Section 5.4.1
Note: The OGF composed of all ‘zeros’ and an OCF or all ‘zeros’ is the NOP
command. This command Opcode may be used in Command Flow Control.
(See Section 4.4.)
Section 7.7.14
[...] To indicate to the Host that the Controller is ready to receive HCI command
packets, the Controller generates a Command Complete event with the
Command_Opcode set to 0x0000, and the Num_HCI_Command_Packets
event parameter is set to 1 or more. Command_Opcode, 0x0000 is a NOP (No
OPeration),special value indicating that this event is not associated with a
command sent by the Host. The Controller can send a Command Complete
event with Command Opcode 0x0000 at any time and can be used to change
the number of outstanding HCI command packets that the Host can send
before waiting. See each command for the parameters that are returned by this
event.
Section 7.7.15
[...] To indicate to the Host that the Controller is ready to receive HCI command
packets, the Controller generates a Command Status event with Status 0x00
and Command_Opcode 0x0000, and the Num_HCI_Command_Packets event
parameter is set to 1 or more. Command_Opcode, 0x0000 is a NOP (No
OPeration)special value indicating that this event is not associated with a
command sent by the Host. The Controller can send a Command Status event
with Command Opcode 0x0000 at any time and can be used to change the
number of outstanding HCI command packets that the Host can send before
waiting.
0xXXXX (non-zero) Opcode of the command which caused this event and is pending
completion.
Section 4.1.1
HCI ACL Data Packets on an LE-U logical link shall be 27 octets or larger. A
Host shall not fragment HCI ACL Data Packetsan L2CAP message on an LE-U
logical link that areis 27 octets or less in length.
Hosts and Controllers shall be able to accept HCI ACL Data Packets with up to
27 bytes of data excluding the HCI ACL Data Packet header on
Connection_Handles associated with an LE-U logical link.The HCI ACL Data
Packet header is the first 4 octets of the packet.
Section 7.8.2
HC_LE_Data_Packet_Length: Size: 2 Octets
Value Parameter Description
0x00011B – 0xFFFF Maximum length (in octets) of the data portion of each HCI ACL
Data Packet that the Controller is able to accept.
Section 4.5
The above also applies to commands that have associated command specific
completion events with a status parameter in their completion event, with
fourfive exceptions. The first two exceptions are the Connection Complete and
the Synchronous Connection Complete events. On failure, for these two events
only, the second parameter, Connection_Handle, is not valid and the third
parameter, BD_ADDR, is valid for identification purposes. The third exception
isnext two exceptions are the LE Connection Complete and LE Enhanced
Connection Complete events. On failure, the Status parameter is valid, all other
parameters are not valid. The fourthfinal exception is the Logical Link
completion event. [...]
Section 5.3.1
[...] Connection Handles are assigned by the Primary Controller when a new
logical link is created, using the Connection Complete, Synchronous
Connection Complete, or LE Connection Complete, or LE Enhanced
Connection Complete events. Broadcast Connection Handles are handled
differently, and are described in Section 5.3.1.1.
Section 7.7.65.1
The Master_Clock_Accuracy parameter is only valid for a slave. On a master,
this parameter shall be set to 0x00.
Note: This event is not sent if the LE Enhanced Connection Complete event
(see Section 7.7.65.10) is unmasked.
Section 7.8.9
If the Advertising_Type parameter is 0x01 (ADV_DIRECT_IND, high duty
cycle) and the directed advertising fails to create a connection, an LE
Connection Complete or LE Enhanced Connection Complete event shall be
generated with the Status code set to Directed Advertising Timeout (0x3C).
Section 7.8.13
[...] This command shall only be issued after the LE_Create_Connection
command has been issued, a Command Status event has been received for
the LE Create Connection command and before the LE Connection Complete
or LE Enhanced Connection Complete event.
If the cancellation was successful then, after the Command Complete event for
the LE_Create_Connection_Cancel command:
• if the LE Enhanced Connection Complete event is unmasked, then that
event shall be sent.
• otherwise the LE Connection Complete or LE Enhanced Connection
Complete event shall be sent.
Section 5.4.2
[...] The format of the HCI ACL Data Packet is shown in Figure 5.12. The
definition for each of the fields in the data packets is explained below.[...]
Figure 5.12: HCI ACL Data Packet
Section 5.4.3
[...]The format of the synchronous Data Packet is shown in Figure 5.13. The
definition for each of the fields in the data packets is explained below.[...]
Figure 5.13: HCI Synchronous Data Packet
Section 5.4.4
[...]The format of the HCI Event Packet is shown in Figure 5.14, and the
definition of each field is explained below.[...]
Figure 5.14: HCI Event Packet
Section 7.6.8
See Figure 7.13, where the rightmost device has the eSCO_Loopback_Mode
parameter set to enabled and the leftmost device is in a normal mode of
operation.[...]
Figure 7.13: Secure Connections eSCO Loopback
Figure 7.24: Secure Connections eSCO loopback immediate
Figure 7.35: Secure Connections eSCO loopback delayed
Figure 7.46: Secure Connections eSCO loopback delayed with retransmissions
E6856 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
00b No broadcast. Only point-to-point (this is the only valid option for AMPs).
01b Active Slave Broadcast: packet is sent to all active slaves (i.e. packet is
usually not sent during park beacon slots), and it may be received by
slaves in sniff mode or park state.
10b Parked Slave Broadcast: packet is sent to all slaves and all slaves in park
state (i.e. packet is sent during park beacon slots if there are parked
slaves), and it may be received by slaves in sniff mode.
00b Point-to-point
01b BBR/EDR Packet received as a slave not in park state (either Active Slave
Broadcast or Parked Slave Broadcast)
10b BR/EDR Packet received as a slave in park state (Parked Slave Broad-
cast)
E6857 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
00b Correctly received data. The payload data belongs to received eSCO or
SCO packets that the baseband marked as “good data”.
01b Possibly invalid data. At least one eSCO packet has been marked by the
baseband as “data with possible errors” and all others have been marked
as “good data” in the eSCO interval(s) corresponding to the HCI Synchro-
nous Data Packet.
10b No data received. All data from the baseband received during the (e)SCO
interval(s) corresponding to the HCI Synchronous Data Packet have been
marked as "lost data" by the baseband. The Payload data octets shall be
set to 0.
11b Data partially lost. Not all, but at least one (e)SCO packet has been
marked as “lost data” by the baseband in the (e)SCO intervals corre-
sponding to the HCI Synchronous Data Packet. The payload data octets
corresponding to the missing (e)SCO packets shall be set to 0.
E6493 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
E6986 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
EDITOR’S NOTE: Move text from section 6.10 to a new section A.10.3 as
shown below
Section 6.10
Every time an inquiry response message is sent, the BR/EDR Controller will
start a timer (T_mandatory_pscan), the value of which is dependent on the
Page_Scan_Period_Mode. As long as this timer has not expired, the BR/EDR
Controller will use the mandatory page scan mode for all following page scans.
0x00 P0
0x01 P1
0x02 P2
0x03-0xFF Reserved
Section A.10.3
Every time an inquiry response message is sent, the BR/EDR Controller will
start a timer (T_mandatory_pscan), the value of which is dependent on the
Page_Scan_Period_Mode. As long as this timer has not expired, the BR/EDR
Controller will use the mandatory page scan mode for all following page scans.
0x00 P0
0x01 P1
0x02 P2
0x03-0xFF Reserved
EDITOR’S NOTE: Change “Time Default: 120 msec” to “Time Default: 120 s”
as shown below
E6918 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
E7068 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
E7069 4.2 4.1 4.0 3.0 2.1, Vol 2, Part E Host Controller Interface
CSA4
EDITOR’S NOTE: In the following 14 commands the wording dealing with error
codes has been aligned to what is used in the rest of Section 7. That is, a
wording along the lines of:
"If [some problem occurs], the Controller shall return the error code Encryption
Mode Not Acceptable (0x25)"
E7067 4.2 4.1 4.0 3.0 Vol 2, Part E Host Controller Interface
The AMP Controller may refuse to create the logical link if it has insufficient
resources. If the AMP Controller is already in the process of creating one or
more logical links, it may reject a Create Logical Link command with the error
code "Busy"Controller Busy (0x3A) (see [Vol 2] Part D, Section 2.55. [...]
E6566 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
Extended Flow Specification value defining transmitted traffic (see [Vol 3] Part A, Section
5.6)).
E6451 4.2 4.1 4.0 3.0 Vol 2, Part E Host Controller Interface
Command Return
Command OCF Parameters Parameters
E4999 4.2 4.1 4.0 CSA3 Vol 2, Part E Host Controller Interface
EDITOR’S NOTE: Add a new paragraph at the end of the Description as shown
below
If one direction has more supported rates than the other direction, the
Controller shall - in the direction with less supported rates - fill with sufficient
zeros to produce the same number of values. The rates for the two directions
are not necessarily paired.
The LPO_Allowed parameter informs the BR/EDR Controller whether the low
power oscillator is allowed to be used,it may use a lower accuracy clock or not.
E6997 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
The Hardware Error event is used to indicate some type of hardware failure for
the BR/EDR Controller. This event is used to notify the Host that a hardware
failure has occurred in the Controller.
EDITOR’S NOTE: Revise text under the Description for 7.7.65.1 and 7.7.65.10
and under Event(s) Generated for 7.8.9
Section 7.7.65.7
The LE Data Length Change event notifies the Host of a change to either the
maximum Payload length or the maximum transmission time of Data Channel
PDUspackets in either direction. The values reported are the maximum that will
actually be used on the connection following the change
0xXXXX The maximum number of payload octets in a Link Layer Data Channel
PDUpacket that the local Controller will send on this connection (con-
nEffectiveMaxTxOctets defined in [Vol 6] Part B, Section 4.5.10).
Range 0x001B-0x00FB (0x0000 - 0x001A and 0x00FC - 0xFFFF
Reserved for future use)
0xXXXX The maximum time that the local Controller will take to send a Link
Layer Data Channel PDUpacket on this connection (connEffectiveMax-
TxTime defined in [Vol 6] Part B, Section 4.5.10).
Range 0x0148-0x0848 (0x0000 - 0x0127 and 0x0849 - 0xFFFF
Reserved for future use)
0xXXXX The maximum number of payload octets in a Link Layer Data Channel
PDUpacket that the local controller expects to receive on this connec-
tion (connEffectiveMaxRxOctets defined in [Vol 6] Part B, Section
4.5.10).
Range 0x001B-0x00FB (0x0000 - 0x001A and 0x00FC - 0xFFFF
Reserved for future use)
0xXXXX The maximum time that the local Controller expects to take to receive a
Link Layer Data Channel PDUpacket on this connection (connEffec-
tiveMaxRxTime defined in [Vol 6] Part B, Section 4.5.10).
Range 0x0148-0x0848 (0x0000 - 0x0127 and 0x0849 - 0xFFFF
Reserved for future use)
Section 7.8.33
TxOctets: Size: 2 Octets
0xXXXX Preferred maximum number of payload octets that the local Control-
ler should include in a single Link Layer Data Packet PDUpacket on
this connection.
Range 0x001B-0x00FB (0x0000 - 0x001A and 0x00FC - 0xFFFF
Reserved for future use)
Section 7.8.46
supportedMaxTxOctets: Size: 2 Octet
0xXXXX Maximum number of payload octets that the local Controller supports
for transmission of a single Link Layer packet on a data connection.
Range 0x001B-0x00FB (0x0000 - 0x001A and 0x00FC - 0xFFFF
Reserved for future use)
0xXXXX Maximum time, in microseconds, that the local Controller supports for
transmission of a single Link Layer packet on a data connection.
Range 0x0148-0x0848 (0x0000 - 0x0147 and 0x0849 - 0xFFFF
Reserved for future use)
0xXXXX Maximum number of payload octets that the local Controller supports
for reception of a single Link Layer packet on a data connection.
Range 0x001B-0x00FB (0x0000 - 0x001A and 0x00FC - 0xFFFF
Reserved for future use)
0xXXXX Maximum time, in microseconds, that the local Controller supports for
reception of a single Link Layer packet on a data connection.
Range 0x0148-0x0848 (0x0000 - 0x0147 and 0x0849 - 0xFFFF
Reserved for future use)
EDITOR’S NOTE: Replace “in” with “of.” Add “which the Controller is unable to
resolve.”
EDITOR’S NOTE: Move parameter tables to match order in the top event table
EDITOR’S NOTE: Edit the Description column in the table below as follows:
0x00: Remove bullet and merge text into a single sentence.
0x01: Remove bullets and merge text into a single paragraph.
0x02 and 0x03: Changes as shown in the table.
0x00 Accept all advertising packets except directed advertising packets not
addressed to this device (default).
0x01 Accept only advertising packets from devices where the advertiser’s
address is in the White List. Directed advertising packets which are not
addressed forto this device shall be ignored.
EDITOR’S NOTE: Add text as shown below. The text in versions 4.1 and 4.0
are slightly different.
The Filter_Duplicates parameter controls whether the Link Layer should filter
out duplicate advertising reports (Filtering_Enabled) to the Host, or if the Link
Version 4.1
The Filter_Duplicates parameter controls whether the Link Layer shall filter
duplicate advertising reports to the Host, or if the Link Layer should generate
advertising reports for each packet received. See [Vol 6] Part B, Section
4.4.3.5.
Version 4.0
The Filter_Duplicates parameter controls whether the Link Layer shall filter
duplicate advertising reports to the Host, or if it shall generate advertising
reports for each packet received. See [Vol 6] Part B, Section 4.4.3.5.
Description:
Command Parameters:
Section 7.8.12
N = 0xXXXX Minimum value for the connection event interval. This shall be less
than or equal to Conn_Interval_Max.
Range: 0x0006 to 0x0C80
Time = N * 1.25 msecms
Time Range: 7.5 msecms to 4 secondss.
N = 0xXXXX Maximum value for the connection event interval. This shall be
greater than or equal to Conn_Interval_Min.]
Range: 0x0006 to 0x0C80
Time = N * 1.25 msecms
Time Range: 7.5 msecms to 4 secondss.
Section 7.8.18
N = 0xXXXX Minimum value for the connection event interval. This shall be
less than or equal to Conn_Interval_Max.
Range: 0x0006 to 0x0C80
Time = N * 1.25 msecms
Time Range: 7.5 msecms to 4 secondss.
N = 0xXXXX Maximum value for the connection event interval. This shall
be greater than or equal to Conn_Interval_Min.
Range: 0x0006 to 0x0C80
Time = N * 1.25 msecms
Time Range: 7.5 msecms to 4 secondss.
All changes below apply to v4.2. Changes in Sections 7.8.14 and 7.8.16
also apply to v4.1 and v4.0.
Section 7.8.14
Section 7.8.16
[...] When a controller cannot add a device to the list because there is no space
available, it should respond with error code 0x07 (Memory Capacity
Exceeded).
Section 7.8.38
[...] When a Controller cannot add a device to the resolving list because the list
is fullthere is no space available, it shall respond with error code 0x07 (Memory
Capacity Exceeded).
Section 7.8.41
Section 7.8.34
The LE_Read_Suggested_Default_Data_Length command allows the Host to
read the Host's suggested values (SuggestedMaxTxOctets and
SuggestedMaxTxTime) for the Controller's maximum transmitted number of
payload octets and maximum packet transmission time to be used for new
connections (connInitialMaxTxOctets and connInitialMaxTxTime - see ([Vol 6]
Part B, Section 4.5.10).
0xXXXX The Host's suggested value for the Controller's maximum transmitted
number of payload octets to be used for new connections- connInitial-
MaxTxOctets.
Range 0x001B-0x00FB (0x0000 - 0x001A and 0x00FC - 0xFFFF
Reserved for future use)
Default: 0x001B
0xXXXX The Host's suggested value for the Controller's maximum packet
transmission time to be used for new connections - connInitialMaxTx-
Time.
Range 0x0148-0x0848 (0x0000 - 0x0147 and 0x0849 - 0xFFFF
Reserved for future use)
Default: 0x0148
Section 7.8.35
The LE_Write_Suggested_Default_Data_Length command allows the Host to
specify its suggested values for the Controller's maximum transmission
number of payload octets and maximum packet transmission time to be used
for new connections. The Controller may use smaller or larger values for
connInitialMaxTxOctets and connInitialMaxTxTime based on local
information.(connInitialMaxTxOctets and connInitialMaxTxTime - see [Vol 6]
Part B, Section 4.5.10). The Controller may use smaller or larger values based
on local information.
0xXXXX The Host's suggested value for the Controller's maximum transmitted
number of payload octets to be used for new connections - connIni-
tialMaxTxOctets.
Range 0x001B-0x00FB (0x0000 - 0x001A and 0x00FC - 0xFFFF
Reserved for future use)
0xXXXX The Host's suggested value for the Controller's maximum packet
transmission time to be used for new connections -
connInitialMaxTxTime.
Range 0x0148-0x0848 (0x0000 - 0x0127 and 0x0849 - 0xFFFF
Reserved for future use)
E7045 4.2 4.1 4.0 3.0 2.1 Vol 2, Part E Host Controller Interface
Return
Command OGF OCF Command Parameters Parameters
Section A.3, A.4, A.8 and A.9 – Add OGF column (0x03) as in this example:
Command
Command OGF OCF Parameters Return Parameters
E5089 4.2 4.1 4.0 3.0 2.1 Vol 2, Part F Message Sequence Charts
Step 1: Host requests switch from Semi-permanent Link Key to Master Link Key
HCI_Master_Link_Key
(master_link_key)
HCI_Command_Status
LMP_temp_rand
LMP_temp_key
LMP_au_rand
LMP_sres
LMP_au_rand
LMP_sres
If (encryption is enabled)
then restart encryption
LMP_encryption_mode_req
(off)
LMP_accepted
LMP_stop_encryption_req
LMP_accepted
LMP_encryption_mode_req
(on)
LMP_accepted
LMP_encryption_key_size_req
LMP_accepted
LMP_start_encryption_req
LMP_accepted
HCI_Master_Link_Key_Complete HCI_Master_Link_Key_Complete
E6218 4.2 4.1 4.0 3.0 2.1 Vol 2, Part F Message Sequence Charts
Step 1: The host changes to a Master Link Key from a Semi-permanent Link
Key using the HCI_Master_Link_Key command when at least one device does
not support Encryption Pause Resume. (See Figure 4.34.)
E6428 4.2 4.1 4.0 3.0 2.1 Vol 2, Part F Message Sequence Charts
EDITOR’S NOTE: Specify the host in Figures 8.1, 8.2, 8.3, and 8.4
HCI_Write_Loopback_Mode
(local)
HCI_Connection_Complete
(ACL)
HCI_Connection_Complete
(SCO or eSCO)
HCI_Connection_Complete
(SCO or eSCO)
HCI_Connection_Complete
(SCO or eSCO)
HCI_Connection_Complete
Step 2a: Host A sends data to Controller while in Local Loopback Mode
Step 2b: Host A sends HCI Commands to Controller while in Local Loopback Mode
HCI_Loopback_Command
HCI_Loopback_Command
HCI_Write_Loopback_Mode
(no loopback)
HCI_Disconnection_Complete
(ACL)
HCI_Disconnection_Complete
(SCO or eSCO)
HCI_Disconnection_Complete
(SCO or eSCO)
HCI_Disconnection_Complete
(SCO or eSCO)
HCI_Command_Complete
Section 9
Figure 9.1
HCI_Write_Scan_Enable
HCI_Command_Complete
HCI_Truncated_Page
HCI_Command_Status
Page
Page
Page Response
HCI_Truncated_Page_Complete
Ppageresp_TO
HCI_Slave_Page_Response_Timeout
Figure 9.3
HCI_Write_Synchronization_Train_Parameters
HCI_Command_Complete
HCI_Start_Synchronization_Train
HCI_Command_Status
HCI_Receive_Synchronization_Train
HCI_Command_Status
HCI_Synchronization_Train_Received
synchronization_train_TO
HCI_Synchronization_Train_Complete
E6480 4.2 4.1 4.0 3.0 2.1, Vol 2, Part H Security Specification
CSA4
[...] For the longer lengths, the devices exchanging PIN codes may not use
mechanical (i.e. human) interaction, but rather may use software at the
application layermay use software at the application layer rather than
mechanical (i.e. human) interaction. For example, this can be a Diffie-Hellman
key agreement, where the exchanged key is passed on to the Kinit generation
process in both devices, just as in the case of a shorter PIN code.
E5792 4.2 4.1 4.0 3.0 2.1 Vol 2, Part H Security Specification
Initiating Non-initiating
Device A Device B
Authentication Stage
Out -Of-Band
7. Na
8. Nb
13.3 E5791 – R or r
E5791 4.2 4.1 4.0 3.0 2.1 Vol 2, Part H Security Specification
EDITOR’S NOTE: Update Table 7.2 and add a paragraph at the end of the
section
Ca = f1(PKax, PKbx, Na, 0) Ca = f1(PKax, PKax, Rra, 0) Cai = f1(PKax, PKbx, Nai, rai)
Cb = f1(PKbx, PKax, Nb, 0) Cb = f1(PKbx, PKbx, Rrb, 0) Cbi = f1(PKbx, PKax, Nbi, rbi)
where PKax denotes the x-coordinate of the public key PKa of A. Similarly,
PKbx denotes the x-coordinate of the public key PKb of B. Nai is the nonce
value of ith round. For each round Nai value is a new 128 bit number. Similarly,
rai is one bit value of the passkey expanded to 8 bits (either 0x80 or 0x81).
Na and Nb are nonces from Devices A and B. ra and rb are random values
generated by devices A and B.
The Baseband provides security using Counter with Cipher Block Chaining-
Message Authentication Code (CCM) as defined in IETF RFC 3610 (http://
www.ietf.org/rfc/rfc3610.txt) with a modification to the B1 counter mode block
format that omits the length of the additional authenticated data. The
description of the algorithm can also be found in the NIST Special Publication
800-38C (http://csrc.nist.gov/publications/PubsSPs.html).
For calculating the MIC, the payload is broken into two or more counter mode
blocks. The CCM specification refers to these blocks ast blocks B0 – Bn. [...]
Section 9.2
For calculating the MIC, the payload is broken into two or more counter mode
blocks. The CCM specification refers to these blocks ast blocks B0 – Bn. B0
applies to the nonce, B1 applies to the associated data {that is packet header
and payload header} and additional B blocks are generated as needed for
authentication of the payload body.
Offset Size
(octets) Field (octets) Value Description
Section 9.3
The CCM algorithm uses the AxAi blocks to generate a keystream that is used
to encrypt the MIC and payload body. Block A0A0 is always used to encrypt
and decrypt the MIC, when present. Block A1A1 is always used to encrypt and
decrypt the first 16 octets of the Ppayload body. Subsequent blocks are always
used to encrypt and decrypt the rest of the Ppayload body as needed.
8.6.5.6 Actions
Section 8.6.5.2
WAIT_F—Local busy has been cleared or the Retransmission timer has
expired and an S-frame with P=1 has been sent. The local L2CAP entity is
waiting for a frame with F=1. New I-frames cannot be sent while in the WAIT_F
state [...]
Section 4.20
Defines minimum value for the connection event interval in the following manner:
connIntervalMin = Interval Min * 1.25 ms. Interval Min range: 6 to 3200 frames
where 1 frame is 1.25 ms and equivalent to 2 BR/EDR slots. Values outside the
range are reserved. Interval Min shall be less than or equal to Interval Max.
• Interval Max (2 octets)
Defines maximum value for the connection event interval in the following manner:
connIntervalMax = Interval Max * 1.25 ms. Interval Max range: 6 to 3200 frames.
Values outside the range are reserved. Interval Max shall be equal to or greater
than the Interval Min.
EDITOR’S NOTE: In the third bullet, change the text in the last sentence.
• Result (2 octets)
[...] sending the response. Table 4.6 defines values for this field. The
DCID and SCID fields shall be ignored when the result field indicates the
connection was refused.If the result field does not indicate the connection
was successful, the DCID and SCID fields may be invalid and shall be
ignored.
6 State Machine
Section 5.3
[...]The Quality of Service guarantees are only provided for conformant traffic.
For non-conformant traffic there may not be insufficient resources such as
bandwidth and buffer space.[...]
Section 5.6
[...][Note that access latency is based on the time base of the Controller, which
may or may not be synchronous to the time base being used by the host or the
application.
Section 6
This section is informative. The state machine maydoes not necessarily
represent all possible scenarios.
Section 7.3.3
[...]Note that while SDUs and L2CAP PDUs are transported in peer-to-peer
fashion, the fragment size used by the Fragmentation and Recombination
routines is implementation specific and may not be the samedifferent in the
sender and the receiver.[...]
Section 8.6.5.3
PendingFrames—holds the number of pending I-frames. I-frames passed to
L2CAP from the upper layer may not be unable to be sent immediately
because the remote L2CAP entity's TxWindow is full, is in a busy condition or
the local L2CAP is in the incorrect state.[...]
Appendix A
The second problem is an attempt to configure a channel with an invalid CID.
For example device B may not have noan open connection on that CID
(0x01234567 in this example case).
EDITOR’S NOTE: Edit Figure 7.2 as shown below and move it from section
7.2.2 to the end of section 7.2.1. The bottom half of this figure is the same as in
Figure 7.4, so the same change is valid for Figure 7.4 in section 7.3.3.
Section 7.2.1
Service Data Unit
Encapsulate SDU
into L2CAP
L2CAP Length CID L2CAP Payload
B-frame
Embedded
Software Re-assemble &
HCI-USB buffer packets HCI 1 HCI 2 HCI n
Section 7.3.3
USB Hardware bus
Embedded
Software Re-assemble &
HCI-USB buffer packets HCI 1 HCI 2 HCI n
E6421 4.2 4.1 4.0 3.0 2.1, Vol 3, Part B Service Discovery Protocol
CSA4
Note that this example is only illustrative. This mayis not benecessarily a
practical printer class hierarchy.
E6575 4.2 4.1 4.0 Vol 3, Part C Generic Access Profile (GAP)
E7033 4.2 4.1 4.0 Vol 3, Part C Generic Access Profile (GAP)
Section 2.2.2.3
Any device that accepts the establishment of an LE active physical link using
any of the connection establishment procedures as defined in Section 9 is
referred to as being in the Peripheral role. A device operating in the Peripheral
role will be in the Slave role in the Link Layer Connection State as described in
[Vol 6] Part B, Section 4.5. A device operating in the Peripheral role is referred
to as a Peripheral. A Peripheral shall have both a transmitter and a receiver.
Section 2.2.2.4
3.2.5.3 Representation
Section 3.2.5.1
Section 3.2.5.2
Section 3.2.5.3
E4777 4.2 4.1 4.0 3.0 2.1 Vol 3, Part C Generic Access Profile (GAP)
4.3.2.1 Definition
Section 4.3.1.1
When both devices support Secure Simple Pairing and the local device isare in
non-bondable mode, the local host shall respond to an IO capability request
withwhere the Authentication_Requirements parameter requestings dedicated
bonding or general bonding with a negative response. An HCI-compliant host
stack shall respond to an HCI_IO_Capabilities_Request event with an
HCI_IO_Capabilities_Request_Negative_Reply command.
Section 4.3.2.1
When both devices support Secure Simple Pairing, the local host shall respond
to a user confirmation request with a positive response. An HCI-compliant host
stack shall respond to an HCI_User_Confirmation_Request event with an
HCI_User_Confirmation_Request_Reply command or an
HCI_User_Passkey_Request event with an
HCI_User_Passkey_Request_Reply command.
E6502 4.2 4.1 4.0 Vol 3, Part C Generic Access Profile (GAP)
[...] When the link key is stored, subsequent connections to the same device
will use authentication but this may fail if the remote device has deleted the link
key. Table 5.21 defines what shall be done depending on the type of the link
key and whether bonding was performed or not.
E4348 4.2 4.1 4.0 3.0 2.1 Vol 3, Part C Generic Access Profile (GAP)
EDITOR’S NOTE: Add text to Table 5.7 (Table 5.6 in previous versions):
Device A (Initiator)
Display Only DisplayYesNo KeyboardOnly NoInputNoOutput
Numeric Numeric Passkey Entry: Numeric
Comparison Comparison Responder Comparison
with auto- with auto- Display, with automatic
matic confir- matic confir- Initiator Input. confirmation on
DisplayOnly mation on mation on both devices.
both devices. device B only.
Un- Un- Authenticated Unauthenticated
authenticated authenticated
Numeric Numeric Passkey Entry: Numeric
Comparison Comparison: Responder Comparison
with auto- Both Display, Display, with automatic
matic confir- Both Confirm. Initiator Input. confirmation on
mation on device A only and
device A only. Yes/No confirma-
DisplayYes tion whether to
No pair on device B.
Device B does not
show the confir-
Device B (Responder)
mation value.
Un- Authenticated Authenticated Unauthenticated
authenticated
Passkey Passkey Passkey Entry: Numeric
Entry: Initia- Entry: Initiator Initiator and Comparison
Keyboard tor Display, Display, Responder with automatic
Only Responder Responder Input. confirmation on
Input. Input. both devices.
Authenticated Authenticated Authenticated Unauthenticated
Numeric Numeric Numeric Numeric
Comparison Comparison Comparison Comparison
with auto- with auto- with automatic with automatic
matic confir- matic confir- confirmation on confirmation on
mation on mation on both devices. both devices.
both devices. device B only
and Yes/No
NoInputNo confirmation
Output on whether to
pair on device
A. Device A
does not show
the confirma-
tion value.
Un- Un- Un- Unauthenticated
authenticated authenticated authenticated
Table 5.7: IO Capability Mapping to Authentication Stage 1
E6732 4.2 4.1 4.0 Vol 3, Part C Generic Access Profile (GAP)
Version 4.0
A device in the non-discoverable mode may send advertising events. AIf the
device in the non-discoverable mode that sends advertising events, it shall not
set the ‘LE General Discoverable Mode’ flag or ‘LE Limited Discoverable Mode’
flag in the Flags AD type. A Peripheral device in the non-connectable mode
may send non-connectable undirected advertising events or scannable
undirected advertising events or may not send advertising packets.
E5778 4.2 4.1 4.0 Vol 3, Part C Generic Access Profile (GAP)
9.2.4.2 Conditions
9.2.5.2 Conditions
9.2.6.2 Conditions
9.3.1 Requirements
9.3.3.2 Conditions
9.3.4.2 Conditions
9.3.5.2 Conditions
9.3.6.2 Conditions
9.3.7.2 Conditions
9.3.8.2 Conditions
9.3.9.2 Conditions
Section 9.2.3.2
While a device is in the Peripheral role the device may support the limited
discoverable mode. While a device is only in the Broadcaster, Observer or
Central role the device shall not support the limited discoverable mode.
Section 9.3.1
E6352 4.2 4.1 4.0 Vol 3, Part C Generic Access Profile (GAP)
General connection
establishment procedure
Connect to
peripheral
device?
Yes
Stop scanning
Connection successful
End of procedure
Figure 9.4: Flow chart for a device performing the general connection establishment procedure
Start scanning
Connect to
peripheral no
device?
yes
Stop scanning
End of procedure
E6764 4.2 4.1 4.0 Vol 3, Part C Generic Access Profile (GAP)
If either the Central or the Peripheral does not support the Connection
Parameters Request Link Layer Control procedure, then the Peripheral
initiating the connection parameter update procedure shall use the L2CAP
Connection Parameter Update Request command defined in [Vol 3] Part A,
Section 4.20 with the required connection parameters.[...]
Version 4.0
Change is in third paragraph.
E5407 4.2 4.1 4.0 Vol 3, Part C Generic Access Profile (GAP)
E4919 4.2 4.1 4.0 Vol 3, Part C Generic Access Profile (GAP)
When a local device receives a service request from a remote device, it shall
respond with an error code if the service request is denied. The error code is
dependent on whether the current connection is encrypted or not and on the
type of pairing that was performed to create the LTK or STK to be used.
If neither an LTK nor an STK is not available, the service request shall be
rejected with the error code “Insufficient Authentication”.
E5110 4.2 4.1 4.0 Vol 3, Part C Generic Access Profile (GAP)
A device shall generate a new Connection Signature Resolving Key CSRK for
each set of peer device(s) to which it sends signed data in a connections.
CSRK is defined in [Vol 3] Part H, Section 2.4.2.2.
E6421 4.2 4.1 4.0 3.0 2.1, Vol 3, Part C Generic Access Profile
CSA4 (GAP)
Section 10.4.2
Note that since the server does not respond to a Signed Write Command, the
higher layer application may or may not be notified of the ignored request.[...]
[...]Note that since the server does not respond to a Signed Write Command,
the higher layer application may or may not be notified of the ignored
request.[...]
Section 10.7.1.2
The Host shall generate a new resolvable private address or non-resolvable
private address when the timer TGAP(private_addr_int) expires.
Section 10.7.2.2
Note: TGAP(private_addr_int) timer may or may not be run if a Central is not
scanning or connected.
Section 10.7.3
Note: TGAP(private_addr_int) timer may or may not be run if a Broadcaster is
not advertising.
Section 10.7.4
Note: TGAP(private_addr_int) timer may or may not be run if an Observer is not
scanning.
Section 10.7
[...]
• If the Host wants to be in device privacy mode, it shall so instruct the
Controller for each peer in the resolving list.
Section 10.7.1.1
By default, network privacy mode is used when private addresses are resolved
and generated by the Controller.
Section 10.7.2.1
By default, network privacy mode is used when private addresses are resolved
and generated by the Controller.
Section 10.8
After a device has distributed its IRK, it should use resolvable private
addresses when establishing a connection with a peer device to which the IRK
has been distributed.
Section 12.5
The device shall check if the peer will only use Resolvable Private Addresses
(RPAs) after bonding by reading the Resolvable Private Address Only
characteristic.
The Resolvable Private Address Only characteristic defines whether the device
will only use Resolvable Private Addresses (RPAs) as local addresses. See
Table 12.8.
A device shall have only one instance of the Resolvable Private Address Only
characteristic. If the Resolvable Private Address Only characteristic is not
present, then it cannot be assumed that only Resolvable Private Addresses will
be used over the air.
Section 10.7.2
If, a privacy-enabled Central, that has a stored bond, receives a resolvable
private address, the Host may resolve the resolvable private address by
performing the "resolvable private address resolution procedure" as defined in
Section 10.8.2.3. If the resolution is successful, the Host may accept this and
future connection attempts from this device; otherwise, the Host will ignore the
remote device.
Section 10.8
A bonded device shall process a resolvable private address as defined in
Section 10.8.2.3 or by establishing a connection and then performing the
authentication procedure as defined in Section 10.3. A device that uses
generates a resolvable private address for its local address shall always
request to distribute its IRK value as defined in [Vol 3] Part H, Section 3.6.4 if
both sides are bondable, unless keys have been pre-distributed. If the request
to distribute the IRK fails then the peer device may authenticate re-connections
using the authentication procedure as defined in Section 10.3 or terminate the
current connection.
E5435 4.2 4.1 4.0 3.0 2.1 Vol 3, Part C Generic Access Profile (GAP)
EDITOR’S NOTE: Add a new row for Resolvable Private Address Only to table
12.2. In v4.0 it’s table 12.1.
BR/EDR LE LE LE LE
Characteristics Ref. GAP Role Broadcaster Observer Peripheral Central
Resolvable Pri-
12.5 O E E C3 C3
vate Address Only
Section 12
The GATT server shall contain the GAP service as defined in the GAP Service
Requirements in Table 12.1for devices supporting the Central and Peripheral
GAP roles and BR/EDR GAP role for BR/EDR/LE type devices. The GATT
Server may contain the GAP service for BR/EDR type devices supporting the
BR/EDR GAP role. A device shall have only one instance of the GAP service in
the GATT server. The GAP service is a GATT based service with the service
UUID as «GAP Service» defined in the Bluetooth Assigned Numbers
document.
Section 15.2
A BR/EDR or BR/EDR/LE device that supports the GATT profile on the BR/
EDR physical transport shall implement the GATT server. A BR/EDR/LE or LE-
only device that supports the LE Central and/or Peripheral roles shall
implement the GATT serverThe requirements for supporting a GATT Client or
GATT Server are specified in Table 15.1.
Section 15.3
EDITOR’S NOTE: Replace TBD in the 2nd column with 0x2AC9. See E6356.
E7032 4.2 4.1 4.0 Vol 3, Part C Generic Access Profile (GAP)
E7075 4.2 4.1 4.0 3.0 2.1 Vol 3, Part D Test Support
The same pseudorandom sequence of bits shall be used for each transmission
(i.e. the packet is repeated). A PRBS-9PRBS9 Ssequence is used, see [2] and
[3].
EDITOR’S NOTE: Revise text in footnote for Packet Class after Figure 1.9
Packet Class1
1. This is included because, in the future, the packet type numbering may not remainis
unambiguous.
E6421 4.2 4.1 4.0 3.0 2.1, Vol 3, Part D Test Support
CSA4
1.3 CONVENTIONS
In this specification PDU names appear in italics. Error codes defined in Table
3.3 (see Section 3.4.1.1) appear in « » (e.g. «Attribute Not Found»). Other
names such as parameters appear in Roman text.
EDITOR’S NOTE: Change size (octets) for Attribute Data List in Table 3.24
E5610 4.2 4.1 4.0 3.0 2.1 Vol 3, Part F Attribute Protocol (ATT)
When the flags parameter is set to 0x00 all pending prepare write values shall
be discarded for this client. The queue shall then be cleared, and an Execute
Write Response shall be sent.
If there are no pending prepared write values, then no values are written, and
an Execute Write Response shall be sent.
E6575 4.2 4.1 4.0 Vol 3, Part G Generic Attribute Profile (GATT)
Section 1.5
In this specification the use of literal terms such as procedure, PDUs, opcodes
or function names appear in italics. Specific names of fields in structures, pack-
ets, etc. also appear in italics. The use of « » (e.g. «Primary Service») indicates
a Bluetooth SIG-defined UUID or an Attribute Protocol error code (see [Vol 3]
Part F, Table 3.3).
E5383 4.2 4.1 4.0 Vol 3, Part G Generic Attribute Profile (GATT)
EDITOR’S NOTE: Add text to the end of the second to last paragraph
[...] Although the Attribute Handle values are in increasing order, following
Attribute Handle values may differ by more than one. That is to say there may
E7072 4.2 4.1 4.0 Vol 3, Part G Generic Attribute Profile (GATT)
EDITOR’S NOTE: In first paragraph, second sentence replase “or” with “of”,
E5242 4.2 4.1 4.0 Vol 3, Part G Generic Attribute Profile (GATT)
These bits shall be set according to the procedures allowed for this
characteristic, supportsas defined by higher layer specifications, without regard
to security requirements.
E7065 4.2 4.1 4.0 Vol 3, Part G Generic Attribute Profile (GATT)
Attribute
Handle Attribute Type Attribute Value Attribute Permissions
E7066 4.2 4.1 4.0 Vol 3, Part G Generic Attribute Profile (GATT)
The format field determines how a single value contained in the Characteristic
Value is formatted. If a format is not a whole number of octets, then the data
shall be contained within the least significant bits of the value, and all other bits
shall be set to zero on transmission and ignored upon receipt. If the
Characteristic Value is less than an octet, it occupies an entire octet.If a format
is not a whole number of octets, then the data shall be stored in the smallest
number of octets that can contain the value. The data shall occupy the whole of
each octet except the most significant bits of the last octet; all other bits in the
last octet shall be set to zero on transmission and ignored upon receipt.
This sub-procedure is complete when the Error Response is received and the
Error Code is set to «Attribute Not Found» or when the End Group Handle in
the Read by Type GroupFind By Type Value Response is 0xFFFF.
E5719 4.2 4.1 4.0 Vol 3, Part G Generic Attribute Profile (GATT)
The Read Response only contains athe complete Characteristic Value if that is
less than or equal to (ATT_MTU – 1) octets in length. If the Characteristic Value
is greater than (ATT_MTU – 1) octets in length, the Read Response only
contains the first portion of the Characteristic Value and the Read Long
Characteristic Value procedure may be used if the rest of the Characteristic
Value is required.
E5718 4.2 4.1 4.0 Vol 3, Part G Generic Attribute Profile (GATT)
Read By Type Response returns a list of Attribute Handle and Attribute Value
pairs corresponding to the characteristics contained in the handle range
provided.Read By Type Response returns a list of Attribute Handle and
Attribute Value pairs corresponding to the first characteristics contained in the
handle range that will fit into the Read By Type Response PDU. This procedure
does not return the complete list of all characteristics with the given
characteristic UUID within the range of values. If such an operation is required,
then the Discover All Characteristics by UUID sub procedure shall be used.
EDITOR’S NOTE: Change 2nd and 3rd “Read Response” to “Read Blob
Response” in Figure 4.10
&OLHQW 6HUYHU
5HDG5HTXHVW[
5HDG5HVSRQVH$9HU\/RQJ'HYLFH1DP
5HDG%ORE5HTXHVW[[
5HDG%ORE5HVSRQVHH8VLQJ$/RQJ$WWULEX
5HDG%ORE5HTXHVW[[&
5HDG%ORE5HVSRQVHWH
E7028 4.2 4.1 4.0 Vol 3, Part G Generic Attribute Profile (GATT)
4.11.1 Indications
EDITOR’S NOTE: Change “Attribute Handle” to italics and revise text as shown
below. In v4.0, the image didn’t have a typo.
Section 4.10.1
[...] The Attribute Protocol Handle Value Notification is used to perform this
sub-procedure. The Attribute Handle parameter shall be set to the
Characteristic Value Handle being notified, and the Attribute Value parameter
shall be set to the Characteristic Value.
Section 4.11.1
[...] The Attribute Protocol Handle Value Indication is used to perform this sub-
procedure. The Attribute Handle parameter shall be set to the Characteristic
Value Handle being indicated, and the Attribute Value parameter shall be set to
the cCharacteristic Value. Once the Handle Value Indication is received by the
client, the client shall respond with a Handle Value Confirmation.
&OLHQW 6HUYHU
+DQGOH9DOXH,QGLFLDWLRQ[[
+DQGOH9DOXH&RQILUPDWLRQ
E5359 4.2 4.1 4.0 Vol 3, Part G Generic Attribute Profile (GATT)
EDITOR’S NOTE: Revise text as shown below. All section except 3.5.1 apply
only to v4.2.
Section 2.2
• h6 is used to generate the LE LTK from a BR/EDR link key derived from
Secure Connections and is used to generate the BR/EDR link key from an
LE LTK derived from Secure Connections.
• h7 is used to generate intermediate keys while generating the LE LTK from a
BR/EDR link key derived from Secure Connections and the BR/EDR link key
from an LE LTK derived from Secure Connections.
The building block for the cryptographic functions ah, c1 and s1 is the security
function e.
The building block for the cryptographic functions f4, f5, f6, g2, h6 and h67 is
the security function AES-CMAC.
Inside the f4, f5, f6, g2, h6 and h67 functions when a multi-octet integer
parameter is used as input to AES-CMAC the most significant octet of the
integer shall be the first octet of the stream and the least significant octet of the
integer shall be the last octet of the stream. The output of AES-CMAC inside
these functions is a multi-octet integer where the first octet is MSB and the last
octet is LSB of this integer.
Section 2.2.11
The function h7 is used to convert keys of a given size from one key type to
another key type with equivalent strength.
The definition of the h7 function makes use of the hashing function AES-
CMACW with 128-bit key W.
Section 2.4.2.4
The LTK from the LE physical transport can be converted to the BR/EDR link
key for the BR/EDR transport as follows, using intermediate link key (ILK) as
an intermediate value:
The string “lebr” is mapped into keyID using extended ASCII as follows:
keyID[0] = 0111 0010
keyID[1] = 0110 0010
keyID[2] = 0110 0101
keyID[3] = 0110 1100
keyID = 0x6c656272
The string “tmp1” is mapped into keyID using extended ASCII as follows:
keyID[0] = 0011 0001
keyID[1] = 0111 0000
keyID[2] = 0110 1101
keyID[3] = 0111 0100
keyID = 0x746D7031
Note: If the LTK has an encryption key size that is less than 16 octets (128
bits), the BR/EDR link key is derived before the LTK gets masked.
Section 2.4.2.5
The BR/EDR Link Key from the BR/EDR physical transport can be converted to
the LTK for the LE transport as follows, using intermediate long term key (ILTK)
as an intermediate value:
The string “brle” is mapped into keyID using extended ASCII as follows:
keyID[0] = 0110 0101
keyID[1] = 0110 1100
keyID[2] = 0111 0010
keyID[3] = 0110 0010
keyID = 0x62726c65
The string “tmp2” is mapped into keyID using extended ASCII as follows:
keyID[0] = 0011 0010
keyID[1] = 0111 0000
keyID[2] = 0110 1101
keyID[3] = 0111 0100
keyID = 0x746D7032
Section 3.5.1
The keypress field is a 1-bit flag that is used only in the Passkey Entry protocol
and is ignored in other protocols. When both sides set that field to one,
Keypress notifications shall be generated and sent using SMP Pairing
Keypress Notification PDUs.
The CT2 field is a 1-bit flag that shall be set to 1 upon transmission to indicate
support for the h7 function. See sections 2.4.2.4 and 2.4.2.5. The CT2 field
shall ignored upon reception when at least one device sets SC to 0.
The reserved 32-bit field shall be set to zero and ignored upon reception.
Editor’s note: Figure 3.3 in v4.1 and earlier does not have sections SC (1 bit) or
Keypress (1 bit).
Section 3.5.2
The keypress field is a 1-bit flag that is used only in the Passkey Entry protocol
and is ignored in other protocols. When both sides set that field to one,
Keypress notifications shall be generated and sent using SMP Pairing
Keypress Notification PDUs.
The CT2 field is a 1-bit flag that shall be set to 1 upon transmission to indicate
support for the h7 function. See sections 2.4.2.4 and 2.4.2.5. The CT2 field
shall ignored upon reception when at least one device sets SC to 0.
The reserved 32-bit field shall be set to zero and ignored upon reception.
Section D.8
Section D.9
Section D.10
Section D.11
Section D.12
EDITOR’S NOTE: In Figures 2.5 and 2.6 replace "BD_ADDR" with "Device
Address” (twice in each figure).
When aSMP Pairing process completes, the Security Manager Timer shall be
stopped.
20.5 E7461 – Problem with CT2 bit in Auth Req when running
over BR/EDR
EDITOR’S NOTE: Delete and add text as shown below. See also E7301.
Section 3.5.1
The keypress field is a 1-bit flag that is used only in the Passkey Entry protocol
and is ignored in other protocols. When both sides set that field to one,
Keypress notifications shall be generated and sent using SMP Pairing
Keypress Notification PDUs.
The CT2 field is a 1-bit flag that shall be set to 1 upon transmission to indicate
support for the h7 function. See sections 2.4.2.4 and 2.4.2.5.
[...]
Section 3.5.2
The keypress field is a 1-bit flag that is used only in the Passkey Entry protocol
and is ignored in other protocols. When both sides set that field to one,
Keypress notifications shall be generated and sent using SMP Pairing
Keypress Notification PDUs.
The CT2 field is a 1-bit flag that shall be set to 1 upon transmission to indicate
support for the h7 function. See Sections 2.4.2.4 and 2.4.2.5.
[...]
0x0D BR/EDR pairing in progress Indicates that the pairing over the
LE transport failed due to a Pairing Request
sent over the BR/EDR transport in process-
gress.
Table 3.7: Pairing Failed Reason Codes
EDITOR’S NOTE: Update Figure 3.11 and revise 3rd bullet after figure
LSB MSB
If EncKey, IdKey, and SignKey are set to zero in the Initiator Key Distribution /
Generation and Responder Key Distribution / Generation fields, then no keys
shall be distributed or generated and the link will be encrypted using the
generated STK when using LE legacy pairing and LTK when using LE Secure
Connections pairing.
EDITOR’S NOTE: Revise 2nd paragraph of 1st bullet after Figure 3.11
When the SC bit is set to 1 by both devices and ifIn LE Secure Connections
pairing, when SMP is running on the LE transport, then the EncKey field is
ignored. EDIV and Rand shall be set to zero and shall not be distributed.
E6421 4.2 4.1 4.0 3.0 2.1, Vol 3, Part H Security Manager
CSA4
This method provides an LTK and CSRK with limited amount of entropy
because LTK and CSRK are directly related to EDIV and may not be asless
secure asthan other generation methods.
Section B.2.2
Section B.2.3
E6264 4.2 4.1 4.0 3.0 2.1 Vol 4, Part A UART Transport Layer
[...] HCI Synchronous Data Packet (see [Vol 2] Part E, Host Controller Interface
Functional Specification“Host Controller Interface Functional Specification” in
Volume 2, Part E). HCI Command Packets can only be sent to the Bluetooth
Host Controller, HCI Event Packets can only be sent from the Bluetooth [...][
E4165 4.2 4.1 4.0 3.0 2.1 Vol 4, Part B USB Transport Layer
Firmware upgrade capability is not a required feature. But iIf implemented, the
firmware upgrade shallshould be compliant with the “Universal Serial Bus
Device Class Specification for Device Firmware Upgrade” (version 1.01 dated
May 13, 1999or later) available on the USB Forum web site at
http://www.usb.org.
E6421 4.2 4.1 4.0 3.0 2.1, Vol 5, Part A 802.11 PAL
CSA4
3.2.1 Overview
Section 2.14.7
If a PCLv2 TLV is not included in the AMP Get AMP Assoc Request message
from a responder, then the initiating PAL shall not assume that the responder
may not havehas the ability to interpret PCLv2 TLVs.[...]
Section 3.2.1
The initiating PAL may not be able to select a suitable channelThere may be no
suitable channel that the initiating PAL can select or the responding PAL may
reject the selected channel. If the selection process cannot identify a channel,
then the physical link establishment shall be aborted.
Section 5.2.1
Interference can also arise between the 802.11 AMP radio and collocated
licensed band radios (LBRs) operating in adjacent bands to the ISM spectrum.
Due to 802.11 AMP transmissions, the collocated LBR may not be unable to
receive transmissions from its peer LBR.[...]
The SNAP header composed of the OUI of the Bluetooth SIG as shown in
Table 5.1 and the protocol identifier given in Table 5.2 shall be used to
distinguish AMP 4-way handshake messages from external security traffic.
E6228 4.2 4.1 4.0 Vol 6, Part A Physical Layer Specification Section 7.1
B Operating Conditions
Section 1
Europe:
Approval Standards: European Telecommunications Standards Institute, ETSI
Documents: EN 300 328, EN 300 440, EN 301 489-17EN 301 489, ETS 300-
826
Section A.1.1
Section A.2
Section A.2.1
The extreme temperature limits are defined as the minimum and maximum
temperatures of the operating temperature range declared by the product
manufacturer.
For the extreme test condition, the air humidity shall be at a level within the
operating air humidity range declared by the product manufacturer (see
Section A.1.1).
Section A.2.2
The applicable upper and lower extreme supply voltages shall be declared by
the product manufacturer.
Section B
Section 1.3
The public device address shall be created in accordance with [Vol 2] Part B,
Section 1.2, with the exception that the restriction on LAP values does not
apply unless the public device address will also be used as a BD_ADDR for a
BR/EDR Controller.section 9.2 ("48-bit universal LAN MAC addresses") of the
IEEE 802-2001 standard
(http://standards.ieee.org/findstds/standard/802-2001.html) and using a valid
Organizationally Unique Identifier (OUI) obtained from the IEEE Registration
Authority (see http://standards.ieee.org/regauth/oui/forms/ and sections 9 and
9.1 of the IEEE 802-2001 specification).
The public device address is divided into the following two fields:
• company_assigned field is contained in the 24 least significant bits
• company_id field is contained in the 24 most significant bits
LSB MSB
company_assigned company_id
(24 bits) (24 bits)
EDITOR’S NOTE: Replace all contents of 2.4.2.17 with the following text:
• The Link Layer shall process advertising packets only from devices in the
White List. A connectable dDirected advertising packet not containing the
scanner’s device address shall be ignored.
• The Link Layer shall process all advertising packets (i.e., the White List is
not used). A connectable dDirected advertising packet not containing the
scanner’s device address shall be ignored. This is the default on reset.
• The Link Layer shall process advertising packets only from devices in the
White List. A connectable dDirected advertising packet shall not be ignored
if the InitA is the scanner's device address or a resolvable private address.
• The Link Layer shall process all advertising packets (i.e., the White List is
not used). A connectable dDirected advertising packet shall not be ignored if
the InitA is the scanner's device address or a resolvable private address.
Non-connectable Undirected
4.4.2.6 Event Type
EDITOR’S NOTE: Revise text in the first paragraph of all three sections:
Section 4.4.2.3
When the connectable undirected advertising event type is used, advertising
indications (ADV_IND PDUs) are sent by the Link Layer.
Section 4.4.2.5
When the scannable undirected advertising event type is used, scannable
advertising indications (ADV_SCAN_IND PDUs) packets are sent by the Link
Layer.
Section 4.4.2.6
When the non-connectable undirected event type is used, non-connectable
advertising indications (ADV_NONCONN_IND PDUs) packets are sent by the
Link Layer.
E6847 4.2 4.1 4.0 Vol 6, Part B Link Layer Section 26.1
PV T_IFS
Adv_idx = 37 Adv_idx = 38
Advertising Advertising
event event
started closed
≤ 10 ms T_IFS
Adv_idx = 37 Adv_idx = 38
Advertising Advertising
Event Event
started closed
Figure 4.8: Low duty cycle connectable directed advertising event during which a
CONNECT_REQIND PDU is received
[...] The scanner filter policy shall apply when receiving an advertising PDU or
scanning PDU when scanning.
[...] The advertising report shall contain at least the advertiser's device address
and advertising data or scan response data if present. Duplicate advertising
reports are not required to be sent to the Host.The Host may request that
duplicate advertising reports are filtered. A duplicate advertising report is an
advertising report for the same device address while the Link Layer stays in the
Scanning State. The advertising data may change; advertising data or scan
response data is not considered significant when determining duplicate
advertising reports.
EDITOR’S NOTE: Edit section 4.4.3.2 beginning with the 4th paragraph.
After sending a SCAN_REQ PDU the Link Layer shall listens for a SCAN_RSP
PDU from that advertiser. If the SCAN_RSP PDU was not received from that
advertiser, it is considered a failure otherwise it is considered a success. On
every two consecutive failures, the upperLimit shall beis doubled until it
reaches the value of 256. On every two consecutive successes, the upperLimit
shall beis halved until it reaches the value of one. After success or failure of
receiving the SCAN_RSP PDU, the Link Layer shall sets backoffCount to a
new pseudo-random integer between one and upperLimit inclusive.
Section 4.5.1
E6421 4.2 4.1 4.0 3.0 2.1, Vol 6, Part B Link Layer
CSA4
Responding to
LL_CONNECTION_PARAM_REQ and
5.1.7.2 LL_CONNECTION_PARAM_RSP PDUs
Section 4.5.1
The slave shall increment connEventCounter for all connection events, even if
it mayis not be listening to the master due to slave latency in those events.
Section 4.5.9.1
A Link Layer may notfail to update nextExpectedSeqNum for reasons,
including, but not limited to, lack of receive buffer space. This will cause the
peer to resend the Data Channel PDU at a later time, thus enabling flow
control.
Section 5.1.4
[...] Cached information for a device from a previous connection mayis not
beauthoritative and, therefore, an implementation must be able to accept the
LL_UNKNOWN_RSP PDU if use of a feature is attempted that is not currently
supported or used by the peer.
Section 5.1.7.2
If the received LL_CONNECTION_PARAM_REQ PDU requests a change to
one or more of connInterval, connSlaveLatency, and connSupervisionTimeout
and if the values selected by the Link Layer are, respectively, within the range
of the connInterval, the value of connSlaveLatency and the value of
connSupervisionTimeout provided by the local Host, then the Link Layer may
choose to not indicate this request to its Host and proceed as if the Host has
accepted the remote device’s request.[...]
Therefore the start of the first packet will be no earlier than 1.25 ms +
transmitWindowOffset and no later than 1.25 ms + transmitWindowOffset +
transmitWindowSize after the end of the packet containing the
CONNECT_REQ PDU transmitted in the advertising channel.
The bit positions for each Link Layer Feature shall be as shown in Table 4.4.
This table also shows if these bits are valid for the intended destinationbetween
Controllers. If a bit is shown as not valid, using ‘N’, then this bit shall be ignored
upon receipt by the peer Controller.
Section 4.7
The White List and filter policies set by the Host are applied to the associated
Identity Address once the Resolvable Private Address has been resolved.
If the Host, when populating the resolving list, sets a peer IRK to all zeros, then
the peer address used within an Advertisementadvertising channel PDU shall
use the peer’s Identity Address, which is provided by the Host.
The Host specifies the privacy mode to be used with each peer identitys on the
resolving list. If it specifies that device privacy mode is to be used, then the
Controller shall accept both the peer's device identity address and a resolvable
private address generated by the peer device using its distributed IRK.
Otherwise, network privacy mode is used: the Controller shall only accept
resolvable private addresses generated by the peer device using its distributed
IRK. If the Host has added the peer device to the resolving list with an all-zero
peer IRK, the Controller shall only accept the peer's identity address, as
defined in Section 6.5.
If the Host, when populating the resolving list, sets a local IRK to all zeros, then
any local address used within an Advertisementadvertising channel PDU shall
use the local Identity Address, which is provided by the Host.
Section 6.2.1
listWhite List is enabled (see Section 4.3.2) and the successful resolution of the
scanner’s address shall determine if the advertiser processes the scan
request.
Section 6.2.2
Section 6.2.3
Section 6.3
Section 6.4
The Link Layer shall use resolvable private addresses for the initiator’s device
address (InitA field) when initiating connection establishment with an
associated device that exists in the Resolving List. The initiator’s device
address (InitA field) in the connect request PDU is generated using the
Resolving List Local IRK and the Resolvable Private Address Generation
Procedure (see Section 1.3.2.2). The Link Layer should not set the InitA field to
the same value of the InitA field in the received ADV_DIRECT_IND PDU.
Section 6.5
A private device shall not use its Identity Address in any packet type used on
the advertising channelsadvertising PDU. The Host may command the
Controller to advertise, scan, or initiate a connection using a Resolvable
Private Address when the resolving list is enabled. If the local or peer IRK in
the resolving list associated with the peer Identity Address is all zeros, the
Controller will use the Identity Address. If the peer IRK in the resolving list
associated with the peer Identity Address is all zeros, the Controller will in
some instances use or accept the Identity Address (see Table 6.1). If the Host
has instructed the Controller to use device privacy mode with a peer Identity
Address, the Controller will accept the peer’s Identity Address. This implies that
the device's network privacy is violated. To maintain a device’s network privacy,
the Host should only populate entries in the Controller’s resolving list with non-
zero IRKs and not instruct the Controller to use device privacy mode.
Resolving Address in
list Advertisement
Initiator uses
RPA
advertiser’s identity address Set Set Identity N
resolved
instead of a private address
Address spoofing:
Peer uses address previously
Set / Set / RPA RPA
sent over air. AdvA and N
Zero Zero resolved resolved
InitA are resolved using differ-
ent entries in the resolving list.
Table 24.1: Controller Decision Table for Privacy and Non-Privacy Mode
Either the master or the slave Link Layer may initiate this procedure at any time
after entering the Connection State by sending an LL_PING_REQ PDU. The
responding Link Layer responds with the LL_PING_RSP PDU. The initiating
Link Layer may be a master or slave.
EDITOR’S NOTE: Add note after paragraph beginning with "If the Link Layer
receives an LL_LENGTH_REQ, or an LL_LENGTH_RSP..."
Note: Because Link Layer PDUs are not required to be processed in real time,
it is possible for the local Controller to have queued but not yet transmitted an
LL_LENGTH_REQ PDU when it receives an LL_LENGTH_REQ PDU from the
peer device. In this situation each device responds as normal; the resulting
collision is harmless.
If the Link Layer of the master or slave sends the LL_LENGTH_REQ PDU to a
device that does not understand that PDU, then the device should expect an
LL_UNKNOWN_RSP PDU in response. If the Link Layer receives an
LL_UNKNOWN_RSP PDU with the UnknownType field set to
LL_LENGTH_REQ, then it shall not transmit another LL_LENGTH_REQ PDU
to the peer device.
Since LL Control PDUs are not interpreted in real time, collisions can occur
where both the Link Layer of the master and the Link Layer of the slave either
initiate the sameincompatible procedures out of a limited set of LL Control
Procedures or initiate procedures that update Link Layer parameters at a given
connEventCount. Two procedures are incompatible if they are the same
procedure or if they both involve an instant. In this situation, the following rules
in this section shall be followed:
A device shall not initiate a procedure after responding to a PDU that had
initiated an incompatible procedure until that procedure is complete.
• Otherwise, if the device is the master, it shall reject the PDU received from
the slave by issuing an LL_REJECT_EXT_IND (if supported by both
devices) or LL_REJECT_IND (otherwise) PDU. It shall then proceed with
procedure A.
• Otherwise (the device is the slave) it shall proceed to handle the master-
initiated procedure B and take no further action in the slave-initiated
procedure A except processing the rejection from the master.[E7106]
The Host shall be notified that the link has been disconnected with, or the
rejection PDU shall use (as appropriate):
• Error Code 0x23 (LMP Error Transaction Collision / LL Procedure Collision)
if procedures A and B are the same procedure;
• Error Code 0x23 (LMP Error Transaction Collision / LL Procedure Collision)
if procedure A is the Connection Update Procedure and procedure B is the
Connection Parameters Update Procedure;
• Error Code 0x2A (Different Transaction Collision) otherwise.
• If the slave initiates the Connection Parameters Request Procedure (Section
5.1.7) at the same time the master is in the process of initiating or has
already initiated a Connection Parameters Request Procedure or a
Connection Update Procedure (Section 5.1.1), then the master shall reject
the LL_CONNECTION_PARAM_REQ PDU received from the slave by
issuing an LL_REJECT_IND_EXT PDU with Error Code 0x23 (LMP Error
Transaction Collision) and proceed with the master initiated procedure. The
slave shall proceed to handle the master initiated procedure and consider
the slave initiated procedure as complete.
• If the slave initiates the Connection Parameters Request Procedure (Section
5.1.7) at the same time the master is in the process of initiating or has
already initiated a Channel Map Update Procedure, then the master shall
reject the LL_CONNECTION_PARAM_REQ PDU received from the slave
by issuing an LL_REJECT_IND_EXT PDU with Error Code 0x2A (Different
Transaction Collision) and proceed with the master initiated procedure. The
slave shall proceed to handle the master initiated procedure and consider
the slave initiated procedure as complete.
Two procedures are incompatible if they are the same procedure or if they both
involve an instant.
Section 5.4
LE Authenticated Payload Timeout (authenticatedPayloadTO) is a parameter
The Instant field shall be used to indicate the connEventCount when the
relevant change shall be applied; this is known as the instant for the procedure.
The master should allow a minimum of 6 connection events that the slave will
be listening for before the instant occurs, considering that the slave may only
be listening once every connSlaveLatency events.
6.2.1 ADV_IND
1. Note: E6119 (ESR09) moved this text from section 5.1.1 to the new section 5.5.
6.2.2 ADV_DIRECT_IND
EDITOR’S NOTE: Revise headings and add new paragraphs as shown below.
Section 4.4.2.3
If Link Layer Privacy has been enabled then the requirements in Section 6.2.1
shall also be followed.
Section 4.4.2.4
If Link Layer Privacy has been enabled then the requirements in Section 6.2.2
shall also be followed.
Section 4.4.2.5
If Link Layer Privacy has been enabled then the requirements in Section 6.2.3
shall also be followed.
Section 4.4.2.6
If Link Layer Privacy has been enabled then the requirements in Section 6.2.3
shall also be followed.
Section 4.4.3
If Link Layer Privacy has been enabled then the requirements in Section 6.3
shall also be followed.
Section 4.4.4
If Link Layer Privacy has been enabled then the requirements in Section 6.4
shall also be followed.
Section 6.2.1
Section 6.2.2
Section 6.2.3
Section 6.3
Section 6.4
The requirements in Section 4.4.4 shall also be followed in the Initiating State.
6.2.2 ADV_DIRECT_IND
EDITOR’S NOTE: Delete the indicated part from the last sentence in the
paragraphs shown below.
Section 6.2.1
When an advertiser receives a connection request that contains a resolvable
private address for the initiator’s address (InitA field); the Link Layer shall
resolve the private address (see Section 1.3.2.3). The advertising filter policy
where White List is enabled (see Section 4.3.2) and the successful resolution
of the initiator’s address shall determine if the advertiser establishes a
connection.
Section 6.2.2
When an advertiser receives a connection request that contains a resolvable
private address for the initiator’s address (InitA field); the Link Layer shall
resolve the private address (see Section 1.3.2.3). The advertising filter policy
(see Section 4.3.2) and the successful resolution of the initiator’s address shall
determine if the advertiser establishes a connection.
Section 6.2.3
An advertiser that receives a scan request that contains a resolvable private
address for the scanner’s device address, (ScanA field) shall resolve the
private address (see Section 1.3.2.3). The advertising filter policy where White
List is enabled (see Section 4.3.2) and the successful resolution of the
scanner's address shall determine if the advertiser processes the scan
request.
Section 6.3
A scanner that receives an advertising event that contains a resolvable private
address for the advertiser’s device address, (AdvA field) shall resolve the
private address (see Section 1.3.2.3). The scanner’s filter policy where White
List is enabled (see Section 4.3.3) and the successful resolution of the
advertiser’s address shall determine if the scanner responds with a scan
request.
Section 6.4
An initiator that receives a connectable advertising event that contains a
resolvable private address for the advertiser’s address, (AdvA field) shall
resolve the private address using the Peer IRK values (see Section 1.3.2.3).
The initiator’s filter policy (see Section 4.3.4) and the successful resolution of
the advertiser’s address shall determine if the initiator establishes a
connection.
The Link Layer may use resolvable private addresses or non-resolvable private
addresses for the scanner’s device address, (ScanA field) when entering the
Scanning State.
The scanning event PDU’s ScanA field is generated using the Resolving List’s
Local IRK value and the Resolvable Private Address Generation Procedure
(see Section 1.3.2.2), or the address is provided by the Host.
When two devices are in a connection, the two devices act in different roles. A
Link Layer in the Master Role is called a master. A Link Layer in the Slave Role
is called a slave. The master controls the timing of a connection event. A
connection event is a point of synchronization between the master and the
slave. There shall be only one connection, whether or not established, between
two LE device addresses. An initiator shall not send a connection request to an
advertiser it is already connected to.
Core Section(s) affected: 1.2 Derivation of the MIC and Encrypted Data
E6847 4.2 4.1 4.0 Vol 6, Part D Message Sequence Charts Section 24.9
6WHS6HWXS'HYLFH$WR,QLWLDWHDFRQQHFWLRQXVLQJ53$V
6HWXS'HYLFH%WRVHQGDGYHUWVXVLQJ53$V
Command Complete
ADV_IND
5HVROYH$GY$53$
8VH$GY$53$
*HQHUDWH,QLW$53$
CONNECT_REQIND
LE Enhanced Connection Complete
9HULI\$GY$53$
5HVROYH,QLW$53$
6WHS6HWXS'HYLFH$WR,QLWLDWHDFRQQHFWLRQXVLQJ53$V
6HWXS'HYLFH%WRVHQGDGYHUWVXVLQJ53$V
Command Complete
ADV_DIRECT_IND
5HVROYH$GY$53$
5HVROYH,QLW$53$
8VH$GY$53$
*HQHUDWH,QLW$53$
CONNECT_REQIND
LE Enhanced Connection Complete
9HULI\$GY$53$
5HVROYH,QLW$53$
6WHS'HYLFH%LVVHQGLQJ$GYHUWV'HYLFH$LQLWLDWHVFRQQHFWLRQWR'HYLFH%
LE Create Connection
Command Status
Advert
CONNECT_REQIND
LE Connection Complete
FRQQHFWLRQLQWHUYDOVZLWKQRSDFNHWVIURP'HYLFH%
LE Disconnection Complete
This example shows an initiation that fails to establish because Device B (the
advertiser) fails to respond to the Data Channel PDUs sent by Device A.
6WHS'HYLFH%LVVHQGLQJ$GYHUWV'HYLFH$LQLWLDWHVFRQQHFWLRQWR'HYLFH%
LE Create Connection
Command Status
Advert
CONNECT_REQ
LE Connection Complete
FRQQHFWLRQLQWHUYDOVZLWKQRSDFNHWVIURP'HYLFH%
LE Disconnection Complete
Device A may or may not send data channel PDUs in the 6 connection
intervals before establishment fails. If it does not do so, Device B is unable to
respond.
3.4 Events
3.4.2 LE_Packet_Report_Event
Section 3.4
There are two types of events sent by the DUT:
1. LE_Test_Status_Event
2. LE_Test_Packet_Report_Event
EThe event packet format is as shown in Figure 3.3. This packet format is used
for both Test Command Status Events and Packet Report Events.
0 LE_Test_Status_Event
1 LE_Packet_Reporting_Event
Section 3.4.2
The LE_Packet_Report_Event packet format is as shown in Figure 3.5. The
Packet Count parameter indicates the number of received LE Test Packets.
The Packet Count in the Packet Report ending a transmitter test shall be 0.
PRBS15:
A 15-bit pseudorandom binary sequence that is used for the interfering signal
and can optionally be used for wanted signal payload content. The PRBS15
sequence repeats itself after the (215 -1 = 32767) bit. The PRBS15 polynomi-
alsequence may be arbitrarily chosen where this is not explicitly specified in the
textgenerated in a fifteen stage shift register whose 14th and 15th stage out-
puts are added in a modulo-two addition stage (See Figure 4.6) and the result
is fed back to the input of the first stage. The sequence begins with the first
ONE of 15 consecutive ONEs (i.e. the shift register is initialized with fifteen
ONEs). The interfering signal is to be continuously modulated with PRBS15
data (i.e. no packet structures or pauses in the signal).
This PRBS15 definition is consistent with ITU T-REC-01 150-199605-I.
SERIES O: SPECIFICATIONS OF MEASURING EQUIPMENT - Equipment for
the measurement of digital and analogue/digital parameters.
+
Figure 4.6: Linear feedback shift register for generation of the PRBS15 sequence
EDITOR’S NOTE: Add the following sentence after Figure 4.5 and Figure 4.6:
The same pseudorandom sequence of bits shall be used for each transmission
(i.e. the packet is repeated).
EDITOR’S NOTE: Revise text in 2nd paragraph and update Figure 4.5
Version 4.2
While in LE direct RX mode, the nominal packet interval of the LE test packets
transmitted from the tester is(i.e. the time from the start of an LE test packet to
the start of the next LE test packet) depends on the LE Test Packet length as
defined in Table 4.2, depending on the LE Test Packet length (i.e. the time from
the start of a LE test packet to the start of the next LE test packet). The tester
packet interval may be extended up to a maximum of 12.5ms upon change of
the dirty transmitter parameter settings and during verification of the EUT PER
reporting functionality.
Version 4.1
While in LE direct RX mode, the nominal packet interval of the LE test packets
transmitted from the tester is 625µs (Ii.e. the time from the start of an LE test
packet to the start of the next LE test packet) depends on the LE Test Packet
length as defined in Table 4.2. The tester packet interval may be extended up
to a maximum of 12.5ms upon change of the dirty transmitter parameter
settings and during verification of the EUT PER reporting functionality.
(87WUDQVPLWWHVWHUUHFHLYH
From EUT
V3DFNHWLQWHUYDOPV
From Tester
t
7HVWHUWUDQVPLW(87UHFHLYH
While in LE direct RX mode, the nominal packet interval of the LE test packets
transmitted from the tester is defined in Table 4.2, depending on the LE Test
Packet length (i.e. the time from the start of a LE test packet to the start of the
next LE test packet). The tester packet interval may be extended up to a
maximum of 12.5ms upon change of the dirty transmitter parameter settings
and during verification of the EUT PER reporting functionality.
E5002 4.2 4.1 CSA3 Vol 7, Part A MWS Coexistence Logical Signaling
The MWS_PATTERN signal is sent by the MWS device to inform the Bluetooth
Controller which MWS_PATTERN is in use.
MWS_PATTERN changes take effect at the start of the next MWS Frame as
defined by the FRAME_SYNC signal plus the MWS_Frame_Sync_Offset.
At the start of each MWS Frame, as defined by the FRAME_SYNC signal plus
the MWS_Frame_Sync_Offset, the most recent MWS_PATTERN value takes
effect as follows.
• If it is 3, the current pattern continues in use.
• If it is the index of the current pattern, then that pattern is restarted.
• Otherwise the indicated pattern is started.
[...] Note: the physical layers for WCI-1 and WCI-2 (See [Vol 7] Part C) differ
but the transport layers are identical.
[Vol 7] Part B: Wireless Coexistence Interface 1 (WCI-1) Transport Specification 06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part I] page 232
[...] Note: the physical layers for WCI-2 and WCI-1 (see volume 7 part B) differ
but the transport layers are identical.
[Vol 7] Part C: Wireless Coexistence Interface 2 (WCI-2) Transport Specification 06 December 2016
Bluetooth SIG Proprietary
Errata Service Release ESR10
Part II
By Number:
Versions
Erratum Profile Section affected
By Profile Name:
Versions
Profile Section Erratum affected
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part II] page 235
Versions
Profile Section Erratum affected
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part II] page 236
If the device supports E2E-safety (E2E-CRC Supported bit is set in CGM Features), the CGM Feature
shall be protected by a CRC calculated over all data, see Section 3.11 for details.
This field is mandatory in this characteristic. If the device doesn’t support E2E-safety, the value of the
field shall be set to 0xFFFF.
If E2E-safety is supported and an error occurs, the error codes as defined in Section 1.8 shall be used.
3.9 PnP ID
The PnP_ID characteristic is a set of values that shall beis used to create a device ID
value that is unique for this device. Included in the characteristic are a Vendor ID source
field, a Vendor ID field, a Product ID field, and a Product Version field. These values are
used to identify all devices of a given type/model/version using numbers. Included in the
characteristic are a Vendor ID source field, a Vendor ID field, a Product ID field, and a
Product Version field.
The least significant bit (LSB) of each characteristic value corresponds to bit 0.
Within a field, the least significant octet (LSO) of the field value corresponds to the octet containing the
lowest numbered bit.
By Number:
Versions
Erratum Profile Section affected
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part III] page 249
Versions
Erratum Profile Section affected
By Profile Name:
Versions
Profile Section Erratum affected
8 E6209 1.6.1
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part III] page 250
Versions
Profile Section Erratum affected
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part III] page 251
Versions
Profile Section Erratum affected
0 E6937 1.2.2
9 E6820 1.2.1
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part III] page 252
EDITOR’S NOTE: In Table 8.2, format the rows to alternate as white and grey,
edit text, and align text as shown below
Item Definition Type Value AttrID Status Default
SOAPACTION Required for Contains the service type, hash-mark, and name of
requests only action to be invoked; all enclosed in double quotes as
shown in the examples associated with each SOAP
encoded operation.
EDITOR’S NOTE: Replace CCS with CSE in the figure as shown below
6'3,QWHURSHUDELOLW\5HTXLUHPHQWV
3URWRFRO'HVFULSWRU/LVW 0
%OXHWRRWK3URILOH 0
'HVFULSWRU/LVW
7DEOH7DEOHOLVWVDOOHQWULHVLQWKH6'3GDWDEDVHRIWKH*:GHILQHGE\WKLV
SURILOH7KHµ6WDWXV¶FROXPQLQGLFDWHVZKHWKHUWKHSUHVHQFHRIWKLVILHOGLVPDQGDWRU\RU
RSWLRQDO
7KHFRGHVDVVLJQHGWRWKHPQHPRQLFVXVHGLQWKHµ9DOXH¶FROXPQDQGWKHFRGHV
DVVLJQHGWRWKHDWWULEXWHLGHQWLILHUVFDQEHIRXQGLQWKH%OXHWRRWK$VVLJQHG1XPEHUV
VHFWLRQ
EDITOR’S NOTE: Revise Table 5.6 as shown below. This was trivially
accepted since GOEP 2.0 already fixed this.
Field/
Name Value Status Explanation
Header
Table 5.6: Fields and Headers in First CONNECT Response when Authenticating
The second CONNECT request has the following fields and headers in this
order:
L2CAP L2CAP
Section 4.3
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist.
Section 4.12
Aspreconditions a precondition for this procedure, an ongoing Audio Connection between the
AG and the HF shall exist.
Section 4.13.1
This case is described in Figure 4.24 below and implies, aspreconditions a precondition, that an
ongoing Service Level Connection between the AG and the HF shall exist. If this connection
does not exist, the AG shall autonomously establish the Service Level Connection using the
proper procedure as described in Section 4.2.
Section 4.13.4
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the AG shall
autonomously establish the Service Level Connection using the proper procedure as described
in Section 4.2.
Section 4.17
Aspreconditions a precondition for this procedure, an ongoing call process shall exist in the AG.
The audio paths of the ongoing call shall be available in the HF via an Audio Connection
established between the AG and the HF.
Section 4.18
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the HF shall
autonomously establish the Service Level Connection using the proper procedure as described
in Section 4.2.
Section 4.19
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the HF shall
autonomously establish the Service Level Connection using the proper procedure as described
in Section 4.2.
Section 4.20
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the HF shall
autonomously establish the Service Level Connection using the proper procedure as described
in Section 4.2.
Section 4.21
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the HF shall
autonomously establish the Service Level Connection using the proper procedure as described
in Section 4.2.
Section 4.22
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the initiator of the
procedure shall autonomously establish the Service Level Connection using the proper
procedure as described in Section 4.2.
Section 4.23
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the HF shall
autonomously establish the Service Level Connection using the proper procedure as described
in Section 4.2.
Section 4.24
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the HF shall
autonomously establish the Service Level Connection using the proper procedure as described
in Section 4.2.
Section 4.25
Aspreconditions a precondition for these procedures, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the initiator of the
procedure shall autonomously establish the Service Level Connection using the proper
procedure as described in Section 4.2.
Section 4.26
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the HF shall
autonomously establish the Service Level Connection using the proper procedure as described
in Section 4.2.
Section 4.28.1
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the AG shall
autonomously establish the Service Level Connection using the proper procedure as described
in Section 4.2.
Section 4.28.2
Aspreconditions a precondition for this procedure, an ongoing Service Level Connection
between the AG and the HF shall exist. If this connection does not exist, the HF shall
autonomously establish the Service Level Connection using the proper procedure as described
in Section 4.2.
Section 7.10
HIDProfileVersion
HIDDeviceReleaseNumber (not recommended for new designs; see Section 7.11.1)
HIDParserVersion
HIDDeviceSubclass
HIDCountryCode
HIDVirtualCable
HIDReconnectInitiate
HIDSDPDisable
HIDBatteryPower
HIDRemoteWake
HIDSupervisionTimeout
HIDNormallyConnectable
HIDBootDevice
1
Attribute ID Type & Size Required Section
HIDBatteryPower 0x0209 Bool8 O 7.11.9
HIDBootDevice 0x020E Bool8 M 7.11.11
HIDCountryCode 0x0203 uint8 M 7.11.3
HIDDescriptorList 0x0206 Sequence M 7.11.6
HIDDeviceReleaseNumber 0x0200 uint16 O2 7.11.1
HIDDeviceSubclass 0x0202 uint8 M 7.11.2
HIDLANGIDBaseList 0x0207 Sequence M 7.11.7
HIDNormallyConnectable 0x020D Bool 8 O 7.11.13
HIDParserVersion 0x020B Uint16 M 7.11.14
HIDProfileVersion 0x0201 uint16 M 0
HIDReconnectInitiate 0x0205 Bool8 M 7.11.5
HIDRemoteWake 0x020A Bool8 O 7.11.10
HIDSDPDisable 0x0208 Bool8 O 7.11.8
HIDSupervisionTimeout 0x020C Uint16 O 7.11.12
HIDVirtualCable 0x0204 Bool8 M 7.11.4
1
Notation: uint = Unsigned Integer, 8 = 8-bit, 16 = 16-bit, Bool = Boolean, Array = array
of specified data type.
2 HIDDeviceReleaseNumber is not recommended for new designs; see Section
7.11.1.
Table 18: SDP Attribute Summary (Alphabetical Order)
1
Attribute ID Type & Size Required Section
HIDDeviceReleaseNumber 0x0200 uint16 O2 7.11.1
HIDParserVersion 0x0201 uint16 M 0
HIDDeviceSubclass 0x0202 uint8 M 7.11.2
HIDCountryCode 0x0203 uint8 M 7.11.3
HIDVirtualCable 0x0204 Bool 8 M 7.11.4
HIDReconnectInitiate 0x0205 Bool 8 M 7.11.5
HIDDescriptorList 0x0206 Sequence M 7.11.6
HIDLANGIDBaseList 0x0207 Sequence M 7.11.7
HIDSDPDisable 0x0208 Bool 8 O 7.11.8
HIDBatteryPower 0x0209 Bool 8 O 7.11.9
HIDRemoteWake 0x020A Bool 8 O 7.11.10
HIDProfileVersion 0x020B Uint16 M 7.11.14
HIDSupervisionTimeout 0x020C Uint16 O 7.11.12
HIDNormallyConnectable 0x020D Bool 8 O 7.11.13
HIDBootDevice 0x020E Bool 8 M 7.11.11
0x020F – Reserved HID
0x03FF Attributes
0x0400 – Available for
0xFFFF HID Language
Strings
1
Notation: uint = Unsigned Integer, 8 = 8-bit, 16 = 16-bit, Bool = Boolean.
2 HIDDeviceReleaseNumber is not recommended for new designs; see Section 7.11.1.
Table 19: SDP Attribute Summary (Numeric Order)
Section 7.11.15
7.11.15 SDP Entry for HID Service
6 7
Item Definition Type Value Status Attribute
ID
Profile 0 UUID HID M
Parameter for Profile 0 Version uint16 0x0100, Note 4 M
LanguageBase Data Define Primary M 0x0006
AttributeIDList Element/ (and alternate)
Sequence language
HIDDeviceRelease 7.11.1 uint16 0x0100, Note 4 M 0x0200
Number
HIDParserVersion 0 uint16 0x0111, Note 5 M 0x0201
HIDDeviceSubclass 7.11.2 uint8 See Bluetooth M 0x0202
Defined
Numbers
Document [8]
Section 7.14
0x00 Suspend Informs HID Device that HID Host is entering the Suspend State as
defined in (§7.4.2, Bluetooth HID Profile Specification [5])
0x01 Exit Suspend Informs HID Device that HID Host is exiting the Suspend State as defined
in (§7.4.2, Bluetooth HID Profile Specification [5])
0x02 – N/A Reserved for Future Use.
0xFF
Table 2.17: HID Control PointInformation characteristic value field
5.8.2 Name
In a request:
This property shall be used to indicate the folder to which the Message object is to be
pushed. The property shall be empty in case the desired listing is that of the current
folder or shall be the name of a child folder; this may be any folder from the <x-
obex/folder-listing> object. Thus, the value shall not include any path information.
5.8.2 Name
In a request:
This property shall be used to indicate the folder to which the Message object is to be
pushed. The property shall be empty in case the desired listing is that of the current
folder or shall be the name of a child folder; this may be any folder from the <x-
obex/folder-listing> object. Thus, the value shall not include any path information.
5.3.4.4 MaxListCount
5.3.4.4 MaxListCount
This header shall be used to indicate the maximum number of entries of the <x-bt/vcard-
listing> listing object. The value 65535 means that the number of entries is not restricted. The
maximum number of entries shall be 65,535 if this header is not specified.
INDEX TABLES
By Number:
Erratum Volume/Part Versions affected
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part IV] page 287
Global
E6672 4.2 4.1 4.0
Several Parts
Vol 2, Part A
E6199 4.2 4.1 4.0 3.0 2.1
Radio Specification
Vol 3, Part D
E7075 4.2 4.1 4.0 3.0 2.1
Test Support
Vol 3, Part F
E5610 4.2 4.1 4.0 3.0 2.1
Attribute Protocol (ATT)
Vol 3, Part G
Generic Attribute Profile E4654 4.2
(GATT)
E6356 4.2
Vol 6, Part B
Link Layer
E6471 4.2
06 December 2016
Bluetooth SIG Proprietary
Errata Service Release to the Bluetooth Specification: ESR10 [Part IV] page 288
Test
Test Spec. Spec. Spec.
Spec. Errata Type Related
Errata Ref. Version Location
Impact
Test
Test Spec. Spec. Spec.
Spec. Errata Type Related
Errata Ref. Version Location
Impact