| /****************************************************************************** |
| * |
| * Copyright (C) 2001-2012 Broadcom Corporation |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at: |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| * |
| ******************************************************************************/ |
| |
| /****************************************************************************** |
| * |
| * This file contains BNEP utility functions |
| * |
| ******************************************************************************/ |
| |
| #include <stdio.h> |
| #include <string.h> |
| #include "gki.h" |
| #include "bt_types.h" |
| #include "bnep_int.h" |
| #include "btu.h" |
| #include "btm_int.h" |
| |
| |
| /********************************************************************************/ |
| /* L O C A L F U N C T I O N P R O T O T Y P E S */ |
| /********************************************************************************/ |
| static UINT8 *bnepu_init_hdr (BT_HDR *p_buf, UINT16 hdr_len, UINT8 pkt_type); |
| |
| void bnepu_process_peer_multicast_filter_set (tBNEP_CONN *p_bcb, UINT8 *p_filters, UINT16 len); |
| void bnepu_send_peer_multicast_filter_rsp (tBNEP_CONN *p_bcb, UINT16 response_code); |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_find_bcb_by_cid |
| ** |
| ** Description This function searches the bcb table for an entry with the |
| ** passed CID. |
| ** |
| ** Returns the BCB address, or NULL if not found. |
| ** |
| *******************************************************************************/ |
| tBNEP_CONN *bnepu_find_bcb_by_cid (UINT16 cid) |
| { |
| UINT16 xx; |
| tBNEP_CONN *p_bcb; |
| |
| /* Look through each connection control block */ |
| for (xx = 0, p_bcb = bnep_cb.bcb; xx < BNEP_MAX_CONNECTIONS; xx++, p_bcb++) |
| { |
| if ((p_bcb->con_state != BNEP_STATE_IDLE) && (p_bcb->l2cap_cid == cid)) |
| return (p_bcb); |
| } |
| |
| /* If here, not found */ |
| return (NULL); |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_find_bcb_by_bd_addr |
| ** |
| ** Description This function searches the BCB table for an entry with the |
| ** passed Bluetooth Address. |
| ** |
| ** Returns the BCB address, or NULL if not found. |
| ** |
| *******************************************************************************/ |
| tBNEP_CONN *bnepu_find_bcb_by_bd_addr (UINT8 *p_bda) |
| { |
| UINT16 xx; |
| tBNEP_CONN *p_bcb; |
| |
| /* Look through each connection control block */ |
| for (xx = 0, p_bcb = bnep_cb.bcb; xx < BNEP_MAX_CONNECTIONS; xx++, p_bcb++) |
| { |
| if (p_bcb->con_state != BNEP_STATE_IDLE) |
| { |
| if (!memcmp ((UINT8 *)(p_bcb->rem_bda), p_bda, BD_ADDR_LEN)) |
| return (p_bcb); |
| } |
| } |
| |
| /* If here, not found */ |
| return (NULL); |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_allocate_bcb |
| ** |
| ** Description This function allocates a new BCB. |
| ** |
| ** Returns BCB address, or NULL if none available. |
| ** |
| *******************************************************************************/ |
| tBNEP_CONN *bnepu_allocate_bcb (BD_ADDR p_rem_bda) |
| { |
| UINT16 xx; |
| tBNEP_CONN *p_bcb; |
| |
| /* Look through each connection control block for a free one */ |
| for (xx = 0, p_bcb = bnep_cb.bcb; xx < BNEP_MAX_CONNECTIONS; xx++, p_bcb++) |
| { |
| if (p_bcb->con_state == BNEP_STATE_IDLE) |
| { |
| memset ((UINT8 *)p_bcb, 0, sizeof (tBNEP_CONN)); |
| |
| p_bcb->conn_tle.param = (UINT32) p_bcb; |
| |
| memcpy ((UINT8 *)(p_bcb->rem_bda), (UINT8 *)p_rem_bda, BD_ADDR_LEN); |
| p_bcb->handle = xx + 1; |
| |
| return (p_bcb); |
| } |
| } |
| |
| /* If here, no free BCB found */ |
| return (NULL); |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_release_bcb |
| ** |
| ** Description This function releases a BCB. |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnepu_release_bcb (tBNEP_CONN *p_bcb) |
| { |
| /* Ensure timer is stopped */ |
| btu_stop_timer (&p_bcb->conn_tle); |
| |
| /* Drop any response pointer we may be holding */ |
| p_bcb->con_state = BNEP_STATE_IDLE; |
| p_bcb->p_pending_data = NULL; |
| |
| /* Free transmit queue */ |
| while (p_bcb->xmit_q.count) |
| { |
| GKI_freebuf (GKI_dequeue (&p_bcb->xmit_q)); |
| } |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnep_send_conn_req |
| ** |
| ** Description This function sends a BNEP connection request to peer |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnep_send_conn_req (tBNEP_CONN *p_bcb) |
| { |
| BT_HDR *p_buf; |
| UINT8 *p, *p_start; |
| |
| BNEP_TRACE_DEBUG1 ("BNEP sending setup req with dst uuid %x", p_bcb->dst_uuid.uu.uuid16); |
| if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) |
| { |
| BNEP_TRACE_ERROR0 ("BNEP - not able to send connection request"); |
| return; |
| } |
| |
| p_buf->offset = L2CAP_MIN_OFFSET; |
| p = p_start = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; |
| |
| /* Put in BNEP frame type - filter control */ |
| UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); |
| |
| /* Put in filter message type - set filters */ |
| UINT8_TO_BE_STREAM (p, BNEP_SETUP_CONNECTION_REQUEST_MSG); |
| |
| UINT8_TO_BE_STREAM (p, p_bcb->dst_uuid.len); |
| |
| if (p_bcb->dst_uuid.len == 2) |
| { |
| UINT16_TO_BE_STREAM (p, p_bcb->dst_uuid.uu.uuid16); |
| UINT16_TO_BE_STREAM (p, p_bcb->src_uuid.uu.uuid16); |
| } |
| #if (defined (BNEP_SUPPORTS_ALL_UUID_LENGTHS) && BNEP_SUPPORTS_ALL_UUID_LENGTHS == TRUE) |
| else if (p_bcb->dst_uuid.len == 4) |
| { |
| UINT32_TO_BE_STREAM (p, p_bcb->dst_uuid.uu.uuid32); |
| UINT32_TO_BE_STREAM (p, p_bcb->src_uuid.uu.uuid32); |
| } |
| else |
| { |
| memcpy (p, p_bcb->dst_uuid.uu.uuid128, p_bcb->dst_uuid.len); |
| p += p_bcb->dst_uuid.len; |
| memcpy (p, p_bcb->src_uuid.uu.uuid128, p_bcb->dst_uuid.len); |
| p += p_bcb->dst_uuid.len; |
| } |
| #endif |
| |
| p_buf->len = (UINT16)(p - p_start); |
| |
| bnepu_check_send_packet (p_bcb, p_buf); |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnep_send_conn_responce |
| ** |
| ** Description This function sends a BNEP setup response to peer |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnep_send_conn_responce (tBNEP_CONN *p_bcb, UINT16 resp_code) |
| { |
| BT_HDR *p_buf; |
| UINT8 *p; |
| |
| BNEP_TRACE_EVENT1 ("BNEP - bnep_send_conn_responce for CID: 0x%x", p_bcb->l2cap_cid); |
| if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) |
| { |
| BNEP_TRACE_ERROR0 ("BNEP - not able to send connection response"); |
| return; |
| } |
| |
| p_buf->offset = L2CAP_MIN_OFFSET; |
| p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; |
| |
| /* Put in BNEP frame type - filter control */ |
| UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); |
| |
| /* Put in filter message type - set filters */ |
| UINT8_TO_BE_STREAM (p, BNEP_SETUP_CONNECTION_RESPONSE_MSG); |
| |
| UINT16_TO_BE_STREAM (p, resp_code); |
| |
| p_buf->len = 4; |
| |
| bnepu_check_send_packet (p_bcb, p_buf); |
| |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_send_peer_our_filters |
| ** |
| ** Description This function sends our filters to a peer |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnepu_send_peer_our_filters (tBNEP_CONN *p_bcb) |
| { |
| #if (defined (BNEP_SUPPORTS_PROT_FILTERS) && BNEP_SUPPORTS_PROT_FILTERS == TRUE) |
| BT_HDR *p_buf; |
| UINT8 *p; |
| UINT16 xx; |
| |
| BNEP_TRACE_DEBUG0 ("BNEP sending peer our filters"); |
| |
| if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) |
| { |
| BNEP_TRACE_ERROR0 ("BNEP - no buffer send filters"); |
| return; |
| } |
| |
| p_buf->offset = L2CAP_MIN_OFFSET; |
| p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; |
| |
| /* Put in BNEP frame type - filter control */ |
| UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); |
| |
| /* Put in filter message type - set filters */ |
| UINT8_TO_BE_STREAM (p, BNEP_FILTER_NET_TYPE_SET_MSG); |
| |
| UINT16_TO_BE_STREAM (p, (4 * p_bcb->sent_num_filters)); |
| for (xx = 0; xx < p_bcb->sent_num_filters; xx++) |
| { |
| UINT16_TO_BE_STREAM (p, p_bcb->sent_prot_filter_start[xx]); |
| UINT16_TO_BE_STREAM (p, p_bcb->sent_prot_filter_end[xx]); |
| } |
| |
| p_buf->len = 4 + (4 * p_bcb->sent_num_filters); |
| |
| bnepu_check_send_packet (p_bcb, p_buf); |
| |
| p_bcb->con_flags |= BNEP_FLAGS_FILTER_RESP_PEND; |
| |
| /* Start timer waiting for setup response */ |
| btu_start_timer (&p_bcb->conn_tle, BTU_TTYPE_BNEP, BNEP_FILTER_SET_TIMEOUT); |
| #endif |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_send_peer_our_multi_filters |
| ** |
| ** Description This function sends our multicast filters to a peer |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnepu_send_peer_our_multi_filters (tBNEP_CONN *p_bcb) |
| { |
| #if (defined (BNEP_SUPPORTS_MULTI_FILTERS) && BNEP_SUPPORTS_MULTI_FILTERS == TRUE) |
| BT_HDR *p_buf; |
| UINT8 *p; |
| UINT16 xx; |
| |
| BNEP_TRACE_DEBUG0 ("BNEP sending peer our multicast filters"); |
| |
| if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) |
| { |
| BNEP_TRACE_ERROR0 ("BNEP - no buffer to send multicast filters"); |
| return; |
| } |
| |
| p_buf->offset = L2CAP_MIN_OFFSET; |
| p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; |
| |
| /* Put in BNEP frame type - filter control */ |
| UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); |
| |
| /* Put in filter message type - set filters */ |
| UINT8_TO_BE_STREAM (p, BNEP_FILTER_MULTI_ADDR_SET_MSG); |
| |
| UINT16_TO_BE_STREAM (p, (2 * BD_ADDR_LEN * p_bcb->sent_mcast_filters)); |
| for (xx = 0; xx < p_bcb->sent_mcast_filters; xx++) |
| { |
| memcpy (p, p_bcb->sent_mcast_filter_start[xx], BD_ADDR_LEN); |
| p += BD_ADDR_LEN; |
| memcpy (p, p_bcb->sent_mcast_filter_end[xx], BD_ADDR_LEN); |
| p += BD_ADDR_LEN; |
| } |
| |
| p_buf->len = 4 + (2 * BD_ADDR_LEN * p_bcb->sent_mcast_filters); |
| |
| bnepu_check_send_packet (p_bcb, p_buf); |
| |
| p_bcb->con_flags |= BNEP_FLAGS_MULTI_RESP_PEND; |
| |
| /* Start timer waiting for setup response */ |
| btu_start_timer (&p_bcb->conn_tle, BTU_TTYPE_BNEP, BNEP_FILTER_SET_TIMEOUT); |
| #endif |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_send_peer_filter_rsp |
| ** |
| ** Description This function sends a filter response to a peer |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnepu_send_peer_filter_rsp (tBNEP_CONN *p_bcb, UINT16 response_code) |
| { |
| BT_HDR *p_buf; |
| UINT8 *p; |
| |
| BNEP_TRACE_DEBUG0 ("BNEP sending filter response"); |
| if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) |
| { |
| BNEP_TRACE_ERROR0 ("BNEP - no buffer filter rsp"); |
| return; |
| } |
| |
| p_buf->offset = L2CAP_MIN_OFFSET; |
| p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; |
| |
| /* Put in BNEP frame type - filter control */ |
| UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); |
| |
| /* Put in filter message type - set filters */ |
| UINT8_TO_BE_STREAM (p, BNEP_FILTER_NET_TYPE_RESPONSE_MSG); |
| |
| UINT16_TO_BE_STREAM (p, response_code); |
| |
| p_buf->len = 4; |
| |
| bnepu_check_send_packet (p_bcb, p_buf); |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnep_send_command_not_understood |
| ** |
| ** Description This function sends a BNEP command not understood message |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnep_send_command_not_understood (tBNEP_CONN *p_bcb, UINT8 cmd_code) |
| { |
| BT_HDR *p_buf; |
| UINT8 *p; |
| |
| BNEP_TRACE_EVENT2 ("BNEP - bnep_send_command_not_understood for CID: 0x%x, cmd 0x%x", p_bcb->l2cap_cid, cmd_code); |
| if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) |
| { |
| BNEP_TRACE_ERROR0 ("BNEP - not able to send connection response"); |
| return; |
| } |
| |
| p_buf->offset = L2CAP_MIN_OFFSET; |
| p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; |
| |
| /* Put in BNEP frame type - filter control */ |
| UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); |
| |
| /* Put in filter message type - set filters */ |
| UINT8_TO_BE_STREAM (p, BNEP_CONTROL_COMMAND_NOT_UNDERSTOOD); |
| |
| UINT8_TO_BE_STREAM (p, cmd_code); |
| |
| p_buf->len = 3; |
| |
| bnepu_check_send_packet (p_bcb, p_buf); |
| |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_check_send_packet |
| ** |
| ** Description This function tries to send a packet to L2CAP. |
| ** If L2CAP is flow controlled, it enqueues the |
| ** packet to the transmit queue |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnepu_check_send_packet (tBNEP_CONN *p_bcb, BT_HDR *p_buf) |
| { |
| BNEP_TRACE_EVENT1 ("BNEP - bnepu_check_send_packet for CID: 0x%x", p_bcb->l2cap_cid); |
| if (p_bcb->con_flags & BNEP_FLAGS_L2CAP_CONGESTED) |
| { |
| if (p_bcb->xmit_q.count >= BNEP_MAX_XMITQ_DEPTH) |
| { |
| BNEP_TRACE_EVENT1 ("BNEP - congested, dropping buf, CID: 0x%x", p_bcb->l2cap_cid); |
| |
| GKI_freebuf (p_buf); |
| } |
| else |
| { |
| GKI_enqueue (&p_bcb->xmit_q, p_buf); |
| } |
| } |
| else |
| { |
| L2CA_DataWrite (p_bcb->l2cap_cid, p_buf); |
| } |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_build_bnep_hdr |
| ** |
| ** Description This function builds the BNEP header for a packet |
| ** Extension headers are not sent yet, so there is no |
| ** check for that. |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnepu_build_bnep_hdr (tBNEP_CONN *p_bcb, BT_HDR *p_buf, UINT16 protocol, |
| UINT8 *p_src_addr, UINT8 *p_dest_addr, BOOLEAN fw_ext_present) |
| { |
| UINT8 ext_bit, *p = (UINT8 *)NULL; |
| UINT8 type = BNEP_FRAME_COMPRESSED_ETHERNET; |
| |
| ext_bit = fw_ext_present ? 0x80 : 0x00; |
| |
| if ((p_src_addr) && (memcmp (p_src_addr, bnep_cb.my_bda, BD_ADDR_LEN))) |
| type = BNEP_FRAME_COMPRESSED_ETHERNET_SRC_ONLY; |
| |
| if (memcmp (p_dest_addr, p_bcb->rem_bda, BD_ADDR_LEN)) |
| type = (type == BNEP_FRAME_COMPRESSED_ETHERNET) ? BNEP_FRAME_COMPRESSED_ETHERNET_DEST_ONLY : BNEP_FRAME_GENERAL_ETHERNET; |
| |
| if (!p_src_addr) |
| p_src_addr = (UINT8 *)bnep_cb.my_bda; |
| |
| switch (type) |
| { |
| case BNEP_FRAME_GENERAL_ETHERNET: |
| p = bnepu_init_hdr (p_buf, 15, (UINT8)(ext_bit | BNEP_FRAME_GENERAL_ETHERNET)); |
| |
| memcpy (p, p_dest_addr, BD_ADDR_LEN); |
| p += BD_ADDR_LEN; |
| |
| memcpy (p, p_src_addr, BD_ADDR_LEN); |
| p += BD_ADDR_LEN; |
| break; |
| |
| case BNEP_FRAME_COMPRESSED_ETHERNET: |
| p = bnepu_init_hdr (p_buf, 3, (UINT8)(ext_bit | BNEP_FRAME_COMPRESSED_ETHERNET)); |
| break; |
| |
| case BNEP_FRAME_COMPRESSED_ETHERNET_SRC_ONLY: |
| p = bnepu_init_hdr (p_buf, 9, (UINT8)(ext_bit | BNEP_FRAME_COMPRESSED_ETHERNET_SRC_ONLY)); |
| |
| memcpy (p, p_src_addr, BD_ADDR_LEN); |
| p += BD_ADDR_LEN; |
| break; |
| |
| case BNEP_FRAME_COMPRESSED_ETHERNET_DEST_ONLY: |
| p = bnepu_init_hdr (p_buf, 9, (UINT8)(ext_bit | BNEP_FRAME_COMPRESSED_ETHERNET_DEST_ONLY)); |
| |
| memcpy (p, p_dest_addr, BD_ADDR_LEN); |
| p += BD_ADDR_LEN; |
| break; |
| } |
| |
| UINT16_TO_BE_STREAM (p, protocol); |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_init_hdr |
| ** |
| ** Description This function initializes the BNEP header |
| ** |
| ** Returns pointer to header in buffer |
| ** |
| *******************************************************************************/ |
| static UINT8 *bnepu_init_hdr (BT_HDR *p_buf, UINT16 hdr_len, UINT8 pkt_type) |
| { |
| UINT8 *p = (UINT8 *)(p_buf + 1) + p_buf->offset; |
| |
| /* See if we need to make space in the buffer */ |
| if (p_buf->offset < (hdr_len + L2CAP_MIN_OFFSET)) |
| { |
| UINT16 xx, diff = BNEP_MINIMUM_OFFSET - p_buf->offset; |
| p = p + p_buf->len - 1; |
| for (xx = 0; xx < p_buf->len; xx++, p--) |
| p[diff] = *p; |
| |
| p_buf->offset = BNEP_MINIMUM_OFFSET; |
| p = (UINT8 *)(p_buf + 1) + p_buf->offset; |
| } |
| |
| p_buf->len += hdr_len; |
| p_buf->offset -= hdr_len; |
| p -= hdr_len; |
| |
| *p++ = pkt_type; |
| |
| return (p); |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnep_process_setup_conn_req |
| ** |
| ** Description This function processes a peer's setup connection request |
| ** message. The destination UUID is verified and response sent |
| ** Connection open indication will be given to PAN profile |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnep_process_setup_conn_req (tBNEP_CONN *p_bcb, UINT8 *p_setup, UINT8 len) |
| { |
| BNEP_TRACE_EVENT1 ("BNEP - bnep_process_setup_conn_req for CID: 0x%x", p_bcb->l2cap_cid); |
| |
| if (p_bcb->con_state != BNEP_STATE_CONN_SETUP && |
| p_bcb->con_state != BNEP_STATE_SEC_CHECKING && |
| p_bcb->con_state != BNEP_STATE_CONNECTED) |
| { |
| BNEP_TRACE_ERROR1 ("BNEP - setup request in bad state %d", p_bcb->con_state); |
| bnep_send_conn_responce (p_bcb, BNEP_SETUP_CONN_NOT_ALLOWED); |
| return; |
| } |
| |
| /* Check if we already initiated security check or if waiting for user responce */ |
| if (p_bcb->con_flags & BNEP_FLAGS_SETUP_RCVD) |
| { |
| BNEP_TRACE_EVENT0 ("BNEP - Duplicate Setup message received while doing security check"); |
| return; |
| } |
| |
| /* Check if peer is the originator */ |
| if (p_bcb->con_state != BNEP_STATE_CONNECTED && |
| (!(p_bcb->con_flags & BNEP_FLAGS_SETUP_RCVD)) && |
| (p_bcb->con_flags & BNEP_FLAGS_IS_ORIG)) |
| { |
| BNEP_TRACE_ERROR1 ("BNEP - setup request when we are originator", p_bcb->con_state); |
| bnep_send_conn_responce (p_bcb, BNEP_SETUP_CONN_NOT_ALLOWED); |
| return; |
| } |
| |
| if (p_bcb->con_state == BNEP_STATE_CONNECTED) |
| { |
| memcpy ((UINT8 *)&(p_bcb->prv_src_uuid), (UINT8 *)&(p_bcb->src_uuid), sizeof (tBT_UUID)); |
| memcpy ((UINT8 *)&(p_bcb->prv_dst_uuid), (UINT8 *)&(p_bcb->dst_uuid), sizeof (tBT_UUID)); |
| } |
| |
| p_bcb->dst_uuid.len = p_bcb->src_uuid.len = len; |
| |
| if (p_bcb->dst_uuid.len == 2) |
| { |
| /* because peer initiated connection keep src uuid as dst uuid */ |
| BE_STREAM_TO_UINT16 (p_bcb->src_uuid.uu.uuid16, p_setup); |
| BE_STREAM_TO_UINT16 (p_bcb->dst_uuid.uu.uuid16, p_setup); |
| |
| /* If nothing has changed don't bother the profile */ |
| if (p_bcb->con_state == BNEP_STATE_CONNECTED && |
| p_bcb->src_uuid.uu.uuid16 == p_bcb->prv_src_uuid.uu.uuid16 && |
| p_bcb->dst_uuid.uu.uuid16 == p_bcb->prv_dst_uuid.uu.uuid16) |
| { |
| bnep_send_conn_responce (p_bcb, BNEP_SETUP_CONN_OK); |
| return; |
| } |
| } |
| #if (defined (BNEP_SUPPORTS_ALL_UUID_LENGTHS) && BNEP_SUPPORTS_ALL_UUID_LENGTHS == TRUE) |
| else if (p_bcb->dst_uuid.len == 4) |
| { |
| BE_STREAM_TO_UINT32 (p_bcb->src_uuid.uu.uuid32, p_setup); |
| BE_STREAM_TO_UINT32 (p_bcb->dst_uuid.uu.uuid32, p_setup); |
| } |
| else if (p_bcb->dst_uuid.len == 16) |
| { |
| memcpy (p_bcb->src_uuid.uu.uuid128, p_setup, p_bcb->src_uuid.len); |
| p_setup += p_bcb->src_uuid.len; |
| memcpy (p_bcb->dst_uuid.uu.uuid128, p_setup, p_bcb->dst_uuid.len); |
| p_setup += p_bcb->dst_uuid.len; |
| } |
| #endif |
| else |
| { |
| BNEP_TRACE_ERROR1 ("BNEP - Bad UID len %d in ConnReq", p_bcb->dst_uuid.len); |
| bnep_send_conn_responce (p_bcb, BNEP_SETUP_INVALID_UUID_SIZE); |
| return; |
| } |
| |
| p_bcb->con_state = BNEP_STATE_SEC_CHECKING; |
| p_bcb->con_flags |= BNEP_FLAGS_SETUP_RCVD; |
| |
| BNEP_TRACE_EVENT1 ("BNEP initiating security check for incoming call for uuid 0x%x", p_bcb->src_uuid.uu.uuid16); |
| #if (!defined (BNEP_DO_AUTH_FOR_ROLE_SWITCH) || BNEP_DO_AUTH_FOR_ROLE_SWITCH == FALSE) |
| if (p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED) |
| bnep_sec_check_complete (p_bcb->rem_bda, p_bcb, BTM_SUCCESS); |
| else |
| #endif |
| btm_sec_mx_access_request (p_bcb->rem_bda, BT_PSM_BNEP, FALSE, |
| BTM_SEC_PROTO_BNEP, bnep_get_uuid32(&(p_bcb->src_uuid)), |
| &bnep_sec_check_complete, p_bcb); |
| |
| return; |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnep_process_setup_conn_responce |
| ** |
| ** Description This function processes a peer's setup connection response |
| ** message. The response code is verified and |
| ** Connection open indication will be given to PAN profile |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnep_process_setup_conn_responce (tBNEP_CONN *p_bcb, UINT8 *p_setup) |
| { |
| tBNEP_RESULT resp; |
| UINT16 resp_code; |
| |
| BNEP_TRACE_DEBUG0 ("BNEP received setup responce"); |
| /* The state should be either SETUP or CONNECTED */ |
| if (p_bcb->con_state != BNEP_STATE_CONN_SETUP) |
| { |
| /* Should we disconnect ? */ |
| BNEP_TRACE_ERROR1 ("BNEP - setup response in bad state %d", p_bcb->con_state); |
| return; |
| } |
| |
| /* Check if we are the originator */ |
| if (!(p_bcb->con_flags & BNEP_FLAGS_IS_ORIG)) |
| { |
| BNEP_TRACE_ERROR1 ("BNEP - setup response when we are not originator", p_bcb->con_state); |
| return; |
| } |
| |
| BE_STREAM_TO_UINT16 (resp_code, p_setup); |
| |
| switch (resp_code) |
| { |
| case BNEP_SETUP_INVALID_SRC_UUID: |
| resp = BNEP_CONN_FAILED_SRC_UUID; |
| break; |
| |
| case BNEP_SETUP_INVALID_DEST_UUID: |
| resp = BNEP_CONN_FAILED_DST_UUID; |
| break; |
| |
| case BNEP_SETUP_INVALID_UUID_SIZE: |
| resp = BNEP_CONN_FAILED_UUID_SIZE; |
| break; |
| |
| case BNEP_SETUP_CONN_NOT_ALLOWED: |
| default: |
| resp = BNEP_CONN_FAILED; |
| break; |
| } |
| |
| /* Check the responce code */ |
| if (resp_code != BNEP_SETUP_CONN_OK) |
| { |
| if (p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED) |
| { |
| BNEP_TRACE_EVENT1 ("BNEP - role change response is %d", resp_code); |
| |
| /* Restore the earlier BNEP status */ |
| p_bcb->con_state = BNEP_STATE_CONNECTED; |
| p_bcb->con_flags &= (~BNEP_FLAGS_SETUP_RCVD); |
| memcpy ((UINT8 *)&(p_bcb->src_uuid), (UINT8 *)&(p_bcb->prv_src_uuid), sizeof (tBT_UUID)); |
| memcpy ((UINT8 *)&(p_bcb->dst_uuid), (UINT8 *)&(p_bcb->prv_dst_uuid), sizeof (tBT_UUID)); |
| |
| /* Ensure timer is stopped */ |
| btu_stop_timer (&p_bcb->conn_tle); |
| p_bcb->re_transmits = 0; |
| |
| /* Tell the user if he has a callback */ |
| if (bnep_cb.p_conn_state_cb) |
| (*bnep_cb.p_conn_state_cb) (p_bcb->handle, p_bcb->rem_bda, resp, TRUE); |
| |
| return; |
| } |
| else |
| { |
| BNEP_TRACE_ERROR1 ("BNEP - setup response %d is not OK", resp_code); |
| |
| L2CA_DisconnectReq (p_bcb->l2cap_cid); |
| |
| /* Tell the user if he has a callback */ |
| if ((p_bcb->con_flags & BNEP_FLAGS_IS_ORIG) && (bnep_cb.p_conn_state_cb)) |
| (*bnep_cb.p_conn_state_cb) (p_bcb->handle, p_bcb->rem_bda, resp, FALSE); |
| |
| bnepu_release_bcb (p_bcb); |
| return; |
| } |
| } |
| |
| /* Received successful responce */ |
| bnep_connected (p_bcb); |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnep_process_control_packet |
| ** |
| ** Description This function processes a peer's setup connection request |
| ** message. The destination UUID is verified and response sent |
| ** Connection open indication will be given to PAN profile |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| UINT8 *bnep_process_control_packet (tBNEP_CONN *p_bcb, UINT8 *p, UINT16 *rem_len, BOOLEAN is_ext) |
| { |
| UINT8 control_type; |
| BOOLEAN bad_pkt = FALSE; |
| UINT16 len, ext_len = 0; |
| |
| if (is_ext) |
| { |
| ext_len = *p++; |
| *rem_len = *rem_len - 1; |
| } |
| |
| control_type = *p++; |
| *rem_len = *rem_len - 1; |
| |
| BNEP_TRACE_EVENT3 ("BNEP processing control packet rem_len %d, is_ext %d, ctrl_type %d", *rem_len, is_ext, control_type); |
| |
| switch (control_type) |
| { |
| case BNEP_CONTROL_COMMAND_NOT_UNDERSTOOD: |
| BNEP_TRACE_ERROR1 ("BNEP Received Cmd not understood for ctl pkt type: %d", *p); |
| p++; |
| *rem_len = *rem_len - 1; |
| break; |
| |
| case BNEP_SETUP_CONNECTION_REQUEST_MSG: |
| len = *p++; |
| if (*rem_len < ((2 * len) + 1)) |
| { |
| bad_pkt = TRUE; |
| BNEP_TRACE_ERROR0 ("BNEP Received Setup message with bad length"); |
| break; |
| } |
| if (!is_ext) |
| bnep_process_setup_conn_req (p_bcb, p, (UINT8)len); |
| p += (2 * len); |
| *rem_len = *rem_len - (2 * len) - 1; |
| break; |
| |
| case BNEP_SETUP_CONNECTION_RESPONSE_MSG: |
| if (!is_ext) |
| bnep_process_setup_conn_responce (p_bcb, p); |
| p += 2; |
| *rem_len = *rem_len - 2; |
| break; |
| |
| case BNEP_FILTER_NET_TYPE_SET_MSG: |
| BE_STREAM_TO_UINT16 (len, p); |
| if (*rem_len < (len + 2)) |
| { |
| bad_pkt = TRUE; |
| BNEP_TRACE_ERROR0 ("BNEP Received Filter set message with bad length"); |
| break; |
| } |
| bnepu_process_peer_filter_set (p_bcb, p, len); |
| p += len; |
| *rem_len = *rem_len - len - 2; |
| break; |
| |
| case BNEP_FILTER_NET_TYPE_RESPONSE_MSG: |
| bnepu_process_peer_filter_rsp (p_bcb, p); |
| p += 2; |
| *rem_len = *rem_len - 2; |
| break; |
| |
| case BNEP_FILTER_MULTI_ADDR_SET_MSG: |
| BE_STREAM_TO_UINT16 (len, p); |
| if (*rem_len < (len + 2)) |
| { |
| bad_pkt = TRUE; |
| BNEP_TRACE_ERROR0 ("BNEP Received Multicast Filter Set message with bad length"); |
| break; |
| } |
| bnepu_process_peer_multicast_filter_set (p_bcb, p, len); |
| p += len; |
| *rem_len = *rem_len - len - 2; |
| break; |
| |
| case BNEP_FILTER_MULTI_ADDR_RESPONSE_MSG: |
| bnepu_process_multicast_filter_rsp (p_bcb, p); |
| p += 2; |
| *rem_len = *rem_len - 2; |
| break; |
| |
| default : |
| BNEP_TRACE_ERROR1 ("BNEP - bad ctl pkt type: %d", control_type); |
| bnep_send_command_not_understood (p_bcb, control_type); |
| if (is_ext) |
| { |
| p += (ext_len - 1); |
| *rem_len -= (ext_len - 1); |
| } |
| break; |
| } |
| |
| if (bad_pkt) |
| { |
| BNEP_TRACE_ERROR1 ("BNEP - bad ctl pkt length: %d", *rem_len); |
| *rem_len = 0; |
| return NULL; |
| } |
| |
| return p; |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_process_peer_filter_set |
| ** |
| ** Description This function processes a peer's filter control |
| ** 'set' message. The filters are stored in the BCB, |
| ** and an appropriate filter response message sent. |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnepu_process_peer_filter_set (tBNEP_CONN *p_bcb, UINT8 *p_filters, UINT16 len) |
| { |
| #if (defined (BNEP_SUPPORTS_PROT_FILTERS) && BNEP_SUPPORTS_PROT_FILTERS == TRUE) |
| UINT16 num_filters = 0; |
| UINT16 xx, resp_code = BNEP_FILTER_CRL_OK; |
| UINT16 start, end; |
| UINT8 *p_temp_filters; |
| |
| if ((p_bcb->con_state != BNEP_STATE_CONNECTED) && |
| (!(p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED))) |
| { |
| BNEP_TRACE_DEBUG0 ("BNEP received filter set from peer when there is no connection"); |
| return; |
| } |
| |
| BNEP_TRACE_DEBUG0 ("BNEP received filter set from peer"); |
| /* Check for length not a multiple of 4 */ |
| if (len & 3) |
| { |
| BNEP_TRACE_EVENT1 ("BNEP - bad filter len: %d", len); |
| bnepu_send_peer_filter_rsp (p_bcb, BNEP_FILTER_CRL_BAD_RANGE); |
| return; |
| } |
| |
| if (len) |
| num_filters = (UINT16) (len >> 2); |
| |
| /* Validate filter values */ |
| if (num_filters <= BNEP_MAX_PROT_FILTERS) |
| { |
| p_temp_filters = p_filters; |
| for (xx = 0; xx < num_filters; xx++) |
| { |
| BE_STREAM_TO_UINT16 (start, p_temp_filters); |
| BE_STREAM_TO_UINT16 (end, p_temp_filters); |
| |
| if (start > end) |
| { |
| resp_code = BNEP_FILTER_CRL_BAD_RANGE; |
| break; |
| } |
| } |
| } |
| else |
| resp_code = BNEP_FILTER_CRL_MAX_REACHED; |
| |
| if (resp_code != BNEP_FILTER_CRL_OK) |
| { |
| bnepu_send_peer_filter_rsp (p_bcb, resp_code); |
| return; |
| } |
| |
| if (bnep_cb.p_filter_ind_cb) |
| (*bnep_cb.p_filter_ind_cb) (p_bcb->handle, TRUE, 0, len, p_filters); |
| |
| p_bcb->rcvd_num_filters = num_filters; |
| for (xx = 0; xx < num_filters; xx++) |
| { |
| BE_STREAM_TO_UINT16 (start, p_filters); |
| BE_STREAM_TO_UINT16 (end, p_filters); |
| |
| p_bcb->rcvd_prot_filter_start[xx] = start; |
| p_bcb->rcvd_prot_filter_end[xx] = end; |
| } |
| |
| bnepu_send_peer_filter_rsp (p_bcb, resp_code); |
| #else |
| bnepu_send_peer_filter_rsp (p_bcb, BNEP_FILTER_CRL_UNSUPPORTED); |
| #endif |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_process_peer_filter_rsp |
| ** |
| ** Description This function processes a peer's filter control |
| ** 'response' message. |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnepu_process_peer_filter_rsp (tBNEP_CONN *p_bcb, UINT8 *p_data) |
| { |
| #if (defined (BNEP_SUPPORTS_PROT_FILTERS) && BNEP_SUPPORTS_PROT_FILTERS == TRUE) |
| UINT16 resp_code; |
| tBNEP_RESULT result; |
| |
| BNEP_TRACE_DEBUG0 ("BNEP received filter responce"); |
| /* The state should be CONNECTED */ |
| if ((p_bcb->con_state != BNEP_STATE_CONNECTED) && |
| (!(p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED))) |
| { |
| BNEP_TRACE_ERROR1 ("BNEP - filter response in bad state %d", p_bcb->con_state); |
| return; |
| } |
| |
| /* Check if we are the originator */ |
| if (!(p_bcb->con_flags & BNEP_FLAGS_FILTER_RESP_PEND)) |
| { |
| BNEP_TRACE_ERROR0 ("BNEP - filter response when not expecting"); |
| return; |
| } |
| |
| /* Ensure timer is stopped */ |
| btu_stop_timer (&p_bcb->conn_tle); |
| p_bcb->con_flags &= ~BNEP_FLAGS_FILTER_RESP_PEND; |
| p_bcb->re_transmits = 0; |
| |
| BE_STREAM_TO_UINT16 (resp_code, p_data); |
| |
| result = BNEP_SUCCESS; |
| if (resp_code != BNEP_FILTER_CRL_OK) |
| result = BNEP_SET_FILTER_FAIL; |
| |
| if (bnep_cb.p_filter_ind_cb) |
| (*bnep_cb.p_filter_ind_cb) (p_bcb->handle, FALSE, result, 0, NULL); |
| |
| return; |
| #endif |
| } |
| |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_process_multicast_filter_rsp |
| ** |
| ** Description This function processes multicast filter control |
| ** 'response' message. |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnepu_process_multicast_filter_rsp (tBNEP_CONN *p_bcb, UINT8 *p_data) |
| { |
| #if (defined (BNEP_SUPPORTS_MULTI_FILTERS) && BNEP_SUPPORTS_MULTI_FILTERS == TRUE) |
| UINT16 resp_code; |
| tBNEP_RESULT result; |
| |
| BNEP_TRACE_DEBUG0 ("BNEP received multicast filter responce"); |
| /* The state should be CONNECTED */ |
| if ((p_bcb->con_state != BNEP_STATE_CONNECTED) && |
| (!(p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED))) |
| { |
| BNEP_TRACE_ERROR1 ("BNEP - multicast filter response in bad state %d", p_bcb->con_state); |
| return; |
| } |
| |
| /* Check if we are the originator */ |
| if (!(p_bcb->con_flags & BNEP_FLAGS_MULTI_RESP_PEND)) |
| { |
| BNEP_TRACE_ERROR0 ("BNEP - multicast filter response when not expecting"); |
| return; |
| } |
| |
| /* Ensure timer is stopped */ |
| btu_stop_timer (&p_bcb->conn_tle); |
| p_bcb->con_flags &= ~BNEP_FLAGS_MULTI_RESP_PEND; |
| p_bcb->re_transmits = 0; |
| |
| BE_STREAM_TO_UINT16 (resp_code, p_data); |
| |
| result = BNEP_SUCCESS; |
| if (resp_code != BNEP_FILTER_CRL_OK) |
| result = BNEP_SET_FILTER_FAIL; |
| |
| if (bnep_cb.p_mfilter_ind_cb) |
| (*bnep_cb.p_mfilter_ind_cb) (p_bcb->handle, FALSE, result, 0, NULL); |
| |
| return; |
| #endif |
| } |
| |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_process_peer_multicast_filter_set |
| ** |
| ** Description This function processes a peer's filter control |
| ** 'set' message. The filters are stored in the BCB, |
| ** and an appropriate filter response message sent. |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnepu_process_peer_multicast_filter_set (tBNEP_CONN *p_bcb, UINT8 *p_filters, UINT16 len) |
| { |
| #if (defined (BNEP_SUPPORTS_MULTI_FILTERS) && BNEP_SUPPORTS_MULTI_FILTERS == TRUE) |
| UINT16 resp_code = BNEP_FILTER_CRL_OK; |
| UINT16 num_filters, xx; |
| UINT8 *p_temp_filters, null_bda[BD_ADDR_LEN] = {0,0,0,0,0,0}; |
| |
| if ((p_bcb->con_state != BNEP_STATE_CONNECTED) && |
| (!(p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED))) |
| { |
| BNEP_TRACE_DEBUG0 ("BNEP received multicast filter set from peer when there is no connection"); |
| return; |
| } |
| |
| if (len % 12) |
| { |
| BNEP_TRACE_EVENT1 ("BNEP - bad filter len: %d", len); |
| bnepu_send_peer_multicast_filter_rsp (p_bcb, BNEP_FILTER_CRL_BAD_RANGE); |
| return; |
| } |
| |
| if (len > (BNEP_MAX_MULTI_FILTERS * 2 * BD_ADDR_LEN)) |
| { |
| BNEP_TRACE_EVENT0 ("BNEP - Too many filters"); |
| bnepu_send_peer_multicast_filter_rsp (p_bcb, BNEP_FILTER_CRL_MAX_REACHED); |
| return; |
| } |
| |
| num_filters = 0; |
| if (len) |
| num_filters = (UINT16) (len / 12); |
| |
| /* Validate filter values */ |
| if (num_filters <= BNEP_MAX_MULTI_FILTERS) |
| { |
| p_temp_filters = p_filters; |
| for (xx = 0; xx < num_filters; xx++) |
| { |
| if (memcmp (p_temp_filters, p_temp_filters + BD_ADDR_LEN, BD_ADDR_LEN) > 0) |
| { |
| bnepu_send_peer_multicast_filter_rsp (p_bcb, BNEP_FILTER_CRL_BAD_RANGE); |
| return; |
| } |
| |
| p_temp_filters += (BD_ADDR_LEN * 2); |
| } |
| } |
| |
| p_bcb->rcvd_mcast_filters = num_filters; |
| for (xx = 0; xx < num_filters; xx++) |
| { |
| memcpy (p_bcb->rcvd_mcast_filter_start[xx], p_filters, BD_ADDR_LEN); |
| memcpy (p_bcb->rcvd_mcast_filter_end[xx], p_filters + BD_ADDR_LEN, BD_ADDR_LEN); |
| p_filters += (BD_ADDR_LEN * 2); |
| |
| /* Check if any of the ranges have all zeros as both starting and ending addresses */ |
| if ((memcmp (null_bda, p_bcb->rcvd_mcast_filter_start[xx], BD_ADDR_LEN) == 0) && |
| (memcmp (null_bda, p_bcb->rcvd_mcast_filter_end[xx], BD_ADDR_LEN) == 0)) |
| { |
| p_bcb->rcvd_mcast_filters = 0xFFFF; |
| break; |
| } |
| } |
| |
| BNEP_TRACE_EVENT1 ("BNEP multicast filters %d", p_bcb->rcvd_mcast_filters); |
| bnepu_send_peer_multicast_filter_rsp (p_bcb, resp_code); |
| |
| if (bnep_cb.p_mfilter_ind_cb) |
| (*bnep_cb.p_mfilter_ind_cb) (p_bcb->handle, TRUE, 0, len, p_filters); |
| #else |
| bnepu_send_peer_multicast_filter_rsp (p_bcb, BNEP_FILTER_CRL_UNSUPPORTED); |
| #endif |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnepu_send_peer_multicast_filter_rsp |
| ** |
| ** Description This function sends a filter response to a peer |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnepu_send_peer_multicast_filter_rsp (tBNEP_CONN *p_bcb, UINT16 response_code) |
| { |
| BT_HDR *p_buf; |
| UINT8 *p; |
| |
| BNEP_TRACE_DEBUG1 ("BNEP sending multicast filter response %d", response_code); |
| if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) |
| { |
| BNEP_TRACE_ERROR0 ("BNEP - no buffer filter rsp"); |
| return; |
| } |
| |
| p_buf->offset = L2CAP_MIN_OFFSET; |
| p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; |
| |
| /* Put in BNEP frame type - filter control */ |
| UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); |
| |
| /* Put in filter message type - set filters */ |
| UINT8_TO_BE_STREAM (p, BNEP_FILTER_MULTI_ADDR_RESPONSE_MSG); |
| |
| UINT16_TO_BE_STREAM (p, response_code); |
| |
| p_buf->len = 4; |
| |
| bnepu_check_send_packet (p_bcb, p_buf); |
| } |
| |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnep_sec_check_complete |
| ** |
| ** Description This function is registered with BTM and will be called |
| ** after completing the security procedures |
| ** |
| ** Returns void |
| ** |
| *******************************************************************************/ |
| void bnep_sec_check_complete (BD_ADDR bd_addr, void *p_ref_data, UINT8 result) |
| { |
| tBNEP_CONN *p_bcb = (tBNEP_CONN *)p_ref_data; |
| UINT16 resp_code = BNEP_SETUP_CONN_OK; |
| BOOLEAN is_role_change; |
| |
| BNEP_TRACE_EVENT1 ("BNEP security callback returned result %d", result); |
| if (p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED) |
| is_role_change = TRUE; |
| else |
| is_role_change = FALSE; |
| |
| /* check if the port is still waiting for security to complete */ |
| if (p_bcb->con_state != BNEP_STATE_SEC_CHECKING) |
| { |
| BNEP_TRACE_ERROR1 ("BNEP Connection in wrong state %d when security is completed", p_bcb->con_state); |
| return; |
| } |
| |
| /* if it is outgoing call and result is FAILURE return security fail error */ |
| if (!(p_bcb->con_flags & BNEP_FLAGS_SETUP_RCVD)) |
| { |
| if (result != BTM_SUCCESS) |
| { |
| if (p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED) |
| { |
| /* Tell the user that role change is failed because of security */ |
| if (bnep_cb.p_conn_state_cb) |
| (*bnep_cb.p_conn_state_cb) (p_bcb->handle, p_bcb->rem_bda, BNEP_SECURITY_FAIL, is_role_change); |
| |
| p_bcb->con_state = BNEP_STATE_CONNECTED; |
| memcpy ((UINT8 *)&(p_bcb->src_uuid), (UINT8 *)&(p_bcb->prv_src_uuid), sizeof (tBT_UUID)); |
| memcpy ((UINT8 *)&(p_bcb->dst_uuid), (UINT8 *)&(p_bcb->prv_dst_uuid), sizeof (tBT_UUID)); |
| return; |
| } |
| |
| L2CA_DisconnectReq (p_bcb->l2cap_cid); |
| |
| /* Tell the user if he has a callback */ |
| if (bnep_cb.p_conn_state_cb) |
| (*bnep_cb.p_conn_state_cb) (p_bcb->handle, p_bcb->rem_bda, BNEP_SECURITY_FAIL, is_role_change); |
| |
| bnepu_release_bcb (p_bcb); |
| return; |
| } |
| |
| /* Transition to the next appropriate state, waiting for connection confirm. */ |
| p_bcb->con_state = BNEP_STATE_CONN_SETUP; |
| |
| bnep_send_conn_req (p_bcb); |
| btu_start_timer (&p_bcb->conn_tle, BTU_TTYPE_BNEP, BNEP_CONN_TIMEOUT); |
| return; |
| } |
| |
| /* it is an incoming call respond appropriately */ |
| if (result != BTM_SUCCESS) |
| { |
| bnep_send_conn_responce (p_bcb, BNEP_SETUP_CONN_NOT_ALLOWED); |
| if (p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED) |
| { |
| /* Role change is failed because of security. Revert back to connected state */ |
| p_bcb->con_state = BNEP_STATE_CONNECTED; |
| p_bcb->con_flags &= (~BNEP_FLAGS_SETUP_RCVD); |
| memcpy ((UINT8 *)&(p_bcb->src_uuid), (UINT8 *)&(p_bcb->prv_src_uuid), sizeof (tBT_UUID)); |
| memcpy ((UINT8 *)&(p_bcb->dst_uuid), (UINT8 *)&(p_bcb->prv_dst_uuid), sizeof (tBT_UUID)); |
| return; |
| } |
| |
| L2CA_DisconnectReq (p_bcb->l2cap_cid); |
| |
| bnepu_release_bcb (p_bcb); |
| return; |
| } |
| |
| if (bnep_cb.p_conn_ind_cb) |
| { |
| p_bcb->con_state = BNEP_STATE_CONN_SETUP; |
| (*bnep_cb.p_conn_ind_cb) (p_bcb->handle, p_bcb->rem_bda, &p_bcb->dst_uuid, &p_bcb->src_uuid, is_role_change); |
| } |
| else |
| { |
| /* Profile didn't register connection indication call back */ |
| bnep_send_conn_responce (p_bcb, resp_code); |
| bnep_connected (p_bcb); |
| } |
| |
| return; |
| } |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnep_is_packet_allowed |
| ** |
| ** Description This function verifies whether the protocol passes through |
| ** the protocol filters set by the peer |
| ** |
| ** Returns BNEP_SUCCESS - if the protocol is allowed |
| ** BNEP_IGNORE_CMD - if the protocol is filtered out |
| ** |
| *******************************************************************************/ |
| tBNEP_RESULT bnep_is_packet_allowed (tBNEP_CONN *p_bcb, |
| BD_ADDR p_dest_addr, |
| UINT16 protocol, |
| BOOLEAN fw_ext_present, |
| UINT8 *p_data) |
| { |
| #if (defined (BNEP_SUPPORTS_PROT_FILTERS) && BNEP_SUPPORTS_PROT_FILTERS == TRUE) |
| if (p_bcb->rcvd_num_filters) |
| { |
| UINT16 i, proto; |
| |
| /* Findout the actual protocol to check for the filtering */ |
| proto = protocol; |
| if (proto == BNEP_802_1_P_PROTOCOL) |
| { |
| if (fw_ext_present) |
| { |
| UINT8 len, ext; |
| /* parse the extension headers and findout actual protocol */ |
| do { |
| |
| ext = *p_data++; |
| len = *p_data++; |
| p_data += len; |
| |
| } while (ext & 0x80); |
| } |
| p_data += 2; |
| BE_STREAM_TO_UINT16 (proto, p_data); |
| } |
| |
| for (i=0; i<p_bcb->rcvd_num_filters; i++) |
| { |
| if ((p_bcb->rcvd_prot_filter_start[i] <= proto) && |
| (proto <= p_bcb->rcvd_prot_filter_end[i])) |
| break; |
| } |
| |
| if (i == p_bcb->rcvd_num_filters) |
| { |
| BNEP_TRACE_DEBUG1 ("Ignoring protocol 0x%x in BNEP data write", proto); |
| return BNEP_IGNORE_CMD; |
| } |
| } |
| #endif |
| |
| #if (defined (BNEP_SUPPORTS_MULTI_FILTERS) && BNEP_SUPPORTS_MULTI_FILTERS == TRUE) |
| /* Ckeck for multicast address filtering */ |
| if ((p_dest_addr[0] & 0x01) && |
| p_bcb->rcvd_mcast_filters) |
| { |
| UINT16 i; |
| |
| /* Check if every multicast should be filtered */ |
| if (p_bcb->rcvd_mcast_filters != 0xFFFF) |
| { |
| /* Check if the address is mentioned in the filter range */ |
| for (i = 0; i < p_bcb->rcvd_mcast_filters; i++) |
| { |
| if ((memcmp (p_bcb->rcvd_mcast_filter_start[i], p_dest_addr, BD_ADDR_LEN) <= 0) && |
| (memcmp (p_bcb->rcvd_mcast_filter_end[i], p_dest_addr, BD_ADDR_LEN) >= 0)) |
| break; |
| } |
| } |
| |
| /* |
| ** If every multicast should be filtered or the address is not in the filter range |
| ** drop the packet |
| */ |
| if ((p_bcb->rcvd_mcast_filters == 0xFFFF) || (i == p_bcb->rcvd_mcast_filters)) |
| { |
| BNEP_TRACE_DEBUG6 ("Ignoring multicast address %x.%x.%x.%x.%x.%x in BNEP data write", |
| p_dest_addr[0], p_dest_addr[1], p_dest_addr[2], |
| p_dest_addr[3], p_dest_addr[4], p_dest_addr[5]); |
| return BNEP_IGNORE_CMD; |
| } |
| } |
| #endif |
| |
| return BNEP_SUCCESS; |
| } |
| |
| |
| |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnep_get_uuid32 |
| ** |
| ** Description This function returns the 32 bit equivalent of the given UUID |
| ** |
| ** Returns UINT32 - 32 bit equivalent of the UUID |
| ** |
| *******************************************************************************/ |
| UINT32 bnep_get_uuid32 (tBT_UUID *src_uuid) |
| { |
| UINT32 result; |
| |
| if (src_uuid->len == 2) |
| return ((UINT32)src_uuid->uu.uuid16); |
| else if (src_uuid->len == 4) |
| return (src_uuid->uu.uuid32 & 0x0000FFFF); |
| else |
| { |
| result = src_uuid->uu.uuid128[2]; |
| result = (result << 8) | (src_uuid->uu.uuid128[3]); |
| return result; |
| } |
| } |
| |
| |
| |
| |
| /******************************************************************************* |
| ** |
| ** Function bnep_dump_status |
| ** |
| ** Description This function dumps the bnep control block and connection |
| ** blocks information |
| ** |
| ** Returns none |
| ** |
| *******************************************************************************/ |
| void bnep_dump_status (void) |
| { |
| #if (defined (BNEP_SUPPORTS_DEBUG_DUMP) && BNEP_SUPPORTS_DEBUG_DUMP == TRUE) |
| UINT16 i; |
| char buff[200]; |
| tBNEP_CONN *p_bcb; |
| |
| BNEP_TRACE_DEBUG6 ("BNEP my BD Addr %x.%x.%x.%x.%x.%x", |
| bnep_cb.my_bda[0], bnep_cb.my_bda[1], bnep_cb.my_bda[2], |
| bnep_cb.my_bda[3], bnep_cb.my_bda[4], bnep_cb.my_bda[5]); |
| BNEP_TRACE_DEBUG3 ("profile registered %d, trace %d, got_my_bd_addr %d", |
| bnep_cb.profile_registered, bnep_cb.trace_level, bnep_cb.got_my_bd_addr); |
| |
| for (i = 0, p_bcb = bnep_cb.bcb; i < BNEP_MAX_CONNECTIONS; i++, p_bcb++) |
| { |
| sprintf (buff, "%d state %d, flags 0x%x, cid %d, pfilts %d, mfilts %d, src 0x%x, dst 0x%x, BD %x.%x.%x.%x.%x.%x", |
| i, p_bcb->con_state, p_bcb->con_flags, p_bcb->l2cap_cid, |
| p_bcb->rcvd_num_filters, p_bcb->rcvd_mcast_filters, |
| p_bcb->src_uuid.uu.uuid16, p_bcb->dst_uuid.uu.uuid16, |
| p_bcb->rem_bda[0], p_bcb->rem_bda[1], p_bcb->rem_bda[2], |
| p_bcb->rem_bda[3], p_bcb->rem_bda[4], p_bcb->rem_bda[5]); |
| |
| BNEP_TRACE_DEBUG0 (buff); |
| } |
| #endif |
| } |
| |
| |