The bt_driver API was created when Zephyr only had a Bluetooth host stack, but no controller-side functionality. The only "driver" that was needed for the host was the HCI driver, and hence "HCI" was omitted from the name. With support both for host and controller Zephyr will be getting more Bluetooth driver types, in particular radio drivers. To prepare for this, move all HCI drivers to drivers/bluetooth/hci/ and rename the bt_driver API bt_hci_driver. Change-Id: I82829da80aa61f26c2bb2005380f1e88d069ac7d Signed-off-by: Johan Hedberg <johan.hedberg@intel.com>
1717 lines
38 KiB
C
1717 lines
38 KiB
C
/* conn.c - Bluetooth connection handling */
|
|
|
|
/*
|
|
* Copyright (c) 2015-2016 Intel Corporation
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <zephyr.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <stdbool.h>
|
|
#include <atomic.h>
|
|
#include <misc/byteorder.h>
|
|
#include <misc/util.h>
|
|
#include <misc/nano_work.h>
|
|
|
|
#include <bluetooth/log.h>
|
|
#include <bluetooth/hci.h>
|
|
#include <bluetooth/bluetooth.h>
|
|
#include <bluetooth/conn.h>
|
|
#include <bluetooth/hci_driver.h>
|
|
#include <bluetooth/att.h>
|
|
|
|
#include "hci_core.h"
|
|
#include "conn_internal.h"
|
|
#include "l2cap_internal.h"
|
|
#include "keys.h"
|
|
#include "smp.h"
|
|
#include "att_internal.h"
|
|
|
|
#if !defined(CONFIG_BLUETOOTH_DEBUG_CONN)
|
|
#undef BT_DBG
|
|
#define BT_DBG(fmt, ...)
|
|
#endif
|
|
|
|
/* Pool for outgoing ACL fragments */
|
|
static struct nano_fifo frag_buf;
|
|
static NET_BUF_POOL(frag_pool, 1, BT_L2CAP_BUF_SIZE(23), &frag_buf, NULL,
|
|
BT_BUF_USER_DATA_MIN);
|
|
|
|
/* Pool for dummy buffers to wake up the tx fibers */
|
|
static struct nano_fifo dummy;
|
|
static NET_BUF_POOL(dummy_pool, CONFIG_BLUETOOTH_MAX_CONN, 0, &dummy, NULL, 0);
|
|
|
|
/* How long until we cancel HCI_LE_Create_Connection */
|
|
#define CONN_TIMEOUT (3 * sys_clock_ticks_per_sec)
|
|
|
|
#if defined(CONFIG_BLUETOOTH_SMP) || defined(CONFIG_BLUETOOTH_BREDR)
|
|
const struct bt_conn_auth_cb *bt_auth;
|
|
#endif /* CONFIG_BLUETOOTH_SMP || CONFIG_BLUETOOTH_BREDR */
|
|
|
|
static struct bt_conn conns[CONFIG_BLUETOOTH_MAX_CONN];
|
|
static struct bt_conn_cb *callback_list;
|
|
|
|
#if defined(CONFIG_BLUETOOTH_BREDR)
|
|
enum pairing_method {
|
|
LEGACY, /* Legacy (pre-SSP) pairing */
|
|
JUST_WORKS, /* JustWorks pairing */
|
|
PASSKEY_INPUT, /* Passkey Entry input */
|
|
PASSKEY_DISPLAY, /* Passkey Entry display */
|
|
PASSKEY_CONFIRM, /* Passkey confirm */
|
|
};
|
|
|
|
/* based on table 5.7, Core Spec 4.2, Vol.3 Part C, 5.2.2.6 */
|
|
static const uint8_t ssp_method[4 /* remote */][4 /* local */] = {
|
|
{ JUST_WORKS, JUST_WORKS, PASSKEY_INPUT, JUST_WORKS },
|
|
{ JUST_WORKS, PASSKEY_CONFIRM, PASSKEY_INPUT, JUST_WORKS },
|
|
{ PASSKEY_DISPLAY, PASSKEY_DISPLAY, PASSKEY_INPUT, JUST_WORKS },
|
|
{ JUST_WORKS, JUST_WORKS, JUST_WORKS, JUST_WORKS },
|
|
};
|
|
#endif /* CONFIG_BLUETOOTH_BREDR */
|
|
|
|
#if defined(CONFIG_BLUETOOTH_DEBUG_CONN)
|
|
static const char *state2str(bt_conn_state_t state)
|
|
{
|
|
switch (state) {
|
|
case BT_CONN_DISCONNECTED:
|
|
return "disconnected";
|
|
case BT_CONN_CONNECT_SCAN:
|
|
return "connect-scan";
|
|
case BT_CONN_CONNECT:
|
|
return "connect";
|
|
case BT_CONN_CONNECTED:
|
|
return "connected";
|
|
case BT_CONN_DISCONNECT:
|
|
return "disconnect";
|
|
default:
|
|
return "(unknown)";
|
|
}
|
|
}
|
|
#endif
|
|
|
|
static void notify_connected(struct bt_conn *conn)
|
|
{
|
|
struct bt_conn_cb *cb;
|
|
|
|
for (cb = callback_list; cb; cb = cb->_next) {
|
|
if (cb->connected) {
|
|
cb->connected(conn, conn->err);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void notify_disconnected(struct bt_conn *conn)
|
|
{
|
|
struct bt_conn_cb *cb;
|
|
|
|
for (cb = callback_list; cb; cb = cb->_next) {
|
|
if (cb->disconnected) {
|
|
cb->disconnected(conn, conn->err);
|
|
}
|
|
}
|
|
}
|
|
|
|
void notify_le_param_updated(struct bt_conn *conn)
|
|
{
|
|
struct bt_conn_cb *cb;
|
|
|
|
for (cb = callback_list; cb; cb = cb->_next) {
|
|
if (cb->le_param_updated) {
|
|
cb->le_param_updated(conn, conn->le.interval,
|
|
conn->le.latency,
|
|
conn->le.timeout);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void le_conn_update(struct nano_work *work)
|
|
{
|
|
struct bt_conn_le *le = CONTAINER_OF(work, struct bt_conn_le,
|
|
update_work);
|
|
struct bt_conn *conn = CONTAINER_OF(le, struct bt_conn, le);
|
|
const struct bt_le_conn_param *param;
|
|
|
|
param = BT_LE_CONN_PARAM(conn->le.interval_min,
|
|
conn->le.interval_max,
|
|
conn->le.latency,
|
|
conn->le.timeout);
|
|
|
|
bt_conn_le_param_update(conn, param);
|
|
}
|
|
|
|
static struct bt_conn *conn_new(void)
|
|
{
|
|
struct bt_conn *conn = NULL;
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(conns); i++) {
|
|
if (!atomic_get(&conns[i].ref)) {
|
|
conn = &conns[i];
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!conn) {
|
|
return NULL;
|
|
}
|
|
|
|
memset(conn, 0, sizeof(*conn));
|
|
|
|
atomic_set(&conn->ref, 1);
|
|
|
|
return conn;
|
|
}
|
|
|
|
#if defined(CONFIG_BLUETOOTH_BREDR)
|
|
struct bt_conn *bt_conn_create_br(const bt_addr_t *peer,
|
|
const struct bt_br_conn_param *param)
|
|
{
|
|
struct bt_hci_cp_connect *cp;
|
|
struct bt_conn *conn;
|
|
struct net_buf *buf;
|
|
|
|
conn = bt_conn_lookup_addr_br(peer);
|
|
if (conn) {
|
|
switch (conn->state) {
|
|
return conn;
|
|
case BT_CONN_CONNECT:
|
|
case BT_CONN_CONNECTED:
|
|
return conn;
|
|
default:
|
|
bt_conn_unref(conn);
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
conn = bt_conn_add_br(peer);
|
|
if (!conn) {
|
|
return NULL;
|
|
}
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_CONNECT, sizeof(*cp));
|
|
if (!buf) {
|
|
bt_conn_unref(conn);
|
|
return NULL;
|
|
}
|
|
|
|
cp = net_buf_add(buf, sizeof(*cp));
|
|
|
|
memset(cp, 0, sizeof(*cp));
|
|
|
|
memcpy(&cp->bdaddr, peer, sizeof(cp->bdaddr));
|
|
cp->packet_type = sys_cpu_to_le16(0xcc18); /* DM1 DH1 DM3 DH5 DM5 DH5 */
|
|
cp->pscan_rep_mode = 0x02; /* R2 */
|
|
cp->allow_role_switch = param->allow_role_switch ? 0x01 : 0x00;
|
|
cp->clock_offset = 0x0000; /* TODO used cached clock offset */
|
|
|
|
if (bt_hci_cmd_send_sync(BT_HCI_OP_CONNECT, buf, NULL) < 0) {
|
|
bt_conn_unref(conn);
|
|
return NULL;
|
|
}
|
|
|
|
bt_conn_set_state(conn, BT_CONN_CONNECT);
|
|
conn->role = BT_CONN_ROLE_MASTER;
|
|
|
|
return conn;
|
|
}
|
|
|
|
struct bt_conn *bt_conn_lookup_addr_br(const bt_addr_t *peer)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(conns); i++) {
|
|
if (!atomic_get(&conns[i].ref)) {
|
|
continue;
|
|
}
|
|
|
|
if (conns[i].type != BT_CONN_TYPE_BR) {
|
|
continue;
|
|
}
|
|
|
|
if (!bt_addr_cmp(peer, &conns[i].br.dst)) {
|
|
return bt_conn_ref(&conns[i]);
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
struct bt_conn *bt_conn_add_br(const bt_addr_t *peer)
|
|
{
|
|
struct bt_conn *conn = conn_new();
|
|
|
|
if (!conn) {
|
|
return NULL;
|
|
}
|
|
|
|
bt_addr_copy(&conn->br.dst, peer);
|
|
conn->type = BT_CONN_TYPE_BR;
|
|
|
|
return conn;
|
|
}
|
|
|
|
static int pin_code_neg_reply(const bt_addr_t *bdaddr)
|
|
{
|
|
struct bt_hci_cp_pin_code_neg_reply *cp;
|
|
struct net_buf *buf;
|
|
|
|
BT_DBG("");
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_PIN_CODE_NEG_REPLY, sizeof(*cp));
|
|
if (!buf) {
|
|
return -ENOBUFS;
|
|
}
|
|
|
|
cp = net_buf_add(buf, sizeof(*cp));
|
|
bt_addr_copy(&cp->bdaddr, bdaddr);
|
|
|
|
return bt_hci_cmd_send_sync(BT_HCI_OP_PIN_CODE_NEG_REPLY, buf, NULL);
|
|
}
|
|
|
|
static int pin_code_reply(struct bt_conn *conn, const char *pin, uint8_t len)
|
|
{
|
|
struct bt_hci_cp_pin_code_reply *cp;
|
|
struct net_buf *buf;
|
|
|
|
BT_DBG("");
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_PIN_CODE_REPLY, sizeof(*cp));
|
|
if (!buf) {
|
|
return -ENOBUFS;
|
|
}
|
|
|
|
cp = net_buf_add(buf, sizeof(*cp));
|
|
|
|
bt_addr_copy(&cp->bdaddr, &conn->br.dst);
|
|
cp->pin_len = len;
|
|
strncpy((char *)cp->pin_code, pin, sizeof(cp->pin_code));
|
|
|
|
return bt_hci_cmd_send_sync(BT_HCI_OP_PIN_CODE_REPLY, buf, NULL);
|
|
}
|
|
|
|
int bt_conn_auth_pincode_entry(struct bt_conn *conn, const char *pin)
|
|
{
|
|
size_t len;
|
|
|
|
if (!bt_auth) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (conn->type != BT_CONN_TYPE_BR) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
len = strlen(pin);
|
|
if (len > 16) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (conn->required_sec_level == BT_SECURITY_HIGH && len < 16) {
|
|
BT_WARN("PIN code for %s is not 16 bytes wide",
|
|
bt_addr_str(&conn->br.dst));
|
|
return -EPERM;
|
|
}
|
|
|
|
/* Allow user send entered PIN to remote, then reset user state. */
|
|
if (!atomic_test_and_clear_bit(conn->flags, BT_CONN_USER)) {
|
|
return -EPERM;
|
|
}
|
|
|
|
if (len == 16) {
|
|
atomic_set_bit(conn->flags, BT_CONN_BR_LEGACY_SECURE);
|
|
}
|
|
|
|
return pin_code_reply(conn, pin, len);
|
|
}
|
|
|
|
void bt_conn_pin_code_req(struct bt_conn *conn)
|
|
{
|
|
if (bt_auth && bt_auth->pincode_entry) {
|
|
bool secure = false;
|
|
|
|
if (conn->required_sec_level == BT_SECURITY_HIGH) {
|
|
secure = true;
|
|
}
|
|
|
|
atomic_set_bit(conn->flags, BT_CONN_USER);
|
|
atomic_set_bit(conn->flags, BT_CONN_BR_PAIRING);
|
|
bt_auth->pincode_entry(conn, secure);
|
|
} else {
|
|
pin_code_neg_reply(&conn->br.dst);
|
|
}
|
|
}
|
|
|
|
uint8_t bt_conn_get_io_capa(void)
|
|
{
|
|
if (!bt_auth) {
|
|
return BT_IO_NO_INPUT_OUTPUT;
|
|
}
|
|
|
|
if (bt_auth->passkey_confirm && bt_auth->passkey_display) {
|
|
return BT_IO_DISPLAY_YESNO;
|
|
}
|
|
|
|
if (bt_auth->passkey_entry) {
|
|
return BT_IO_KEYBOARD_ONLY;
|
|
}
|
|
|
|
if (bt_auth->passkey_display) {
|
|
return BT_IO_DISPLAY_ONLY;
|
|
}
|
|
|
|
return BT_IO_NO_INPUT_OUTPUT;
|
|
}
|
|
|
|
static uint8_t ssp_pair_method(const struct bt_conn *conn)
|
|
{
|
|
return ssp_method[conn->br.remote_io_capa][bt_conn_get_io_capa()];
|
|
}
|
|
|
|
uint8_t bt_conn_ssp_get_auth(const struct bt_conn *conn)
|
|
{
|
|
/* Validate no bond auth request, and if valid use it. */
|
|
if ((conn->br.remote_auth == BT_HCI_NO_BONDING) ||
|
|
((conn->br.remote_auth == BT_HCI_NO_BONDING_MITM) &&
|
|
(ssp_pair_method(conn) > JUST_WORKS))) {
|
|
return conn->br.remote_auth;
|
|
}
|
|
|
|
/* Local & remote have enough IO capabilities to get MITM protection. */
|
|
if (ssp_pair_method(conn) > JUST_WORKS) {
|
|
return conn->br.remote_auth | BT_MITM;
|
|
}
|
|
|
|
/* No MITM protection possible so ignore remote MITM requirement. */
|
|
return (conn->br.remote_auth & ~BT_MITM);
|
|
}
|
|
|
|
static int ssp_confirm_reply(struct bt_conn *conn)
|
|
{
|
|
struct bt_hci_cp_user_confirm_reply *cp;
|
|
struct net_buf *buf;
|
|
|
|
BT_DBG("");
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_USER_CONFIRM_REPLY, sizeof(*cp));
|
|
if (!buf) {
|
|
return -ENOBUFS;
|
|
}
|
|
|
|
cp = net_buf_add(buf, sizeof(*cp));
|
|
bt_addr_copy(&cp->bdaddr, &conn->br.dst);
|
|
|
|
return bt_hci_cmd_send_sync(BT_HCI_OP_USER_CONFIRM_REPLY, buf, NULL);
|
|
}
|
|
|
|
static int ssp_confirm_neg_reply(struct bt_conn *conn)
|
|
{
|
|
struct bt_hci_cp_user_confirm_reply *cp;
|
|
struct net_buf *buf;
|
|
|
|
BT_DBG("");
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_USER_CONFIRM_NEG_REPLY, sizeof(*cp));
|
|
if (!buf) {
|
|
return -ENOBUFS;
|
|
}
|
|
|
|
cp = net_buf_add(buf, sizeof(*cp));
|
|
bt_addr_copy(&cp->bdaddr, &conn->br.dst);
|
|
|
|
return bt_hci_cmd_send_sync(BT_HCI_OP_USER_CONFIRM_NEG_REPLY, buf,
|
|
NULL);
|
|
}
|
|
|
|
void bt_conn_ssp_auth(struct bt_conn *conn, uint32_t passkey)
|
|
{
|
|
conn->br.pairing_method = ssp_pair_method(conn);
|
|
|
|
/*
|
|
* If local required security is HIGH then MITM is mandatory.
|
|
* MITM protection is no achievable when SSP 'justworks' is applied.
|
|
*/
|
|
if (conn->required_sec_level > BT_SECURITY_MEDIUM &&
|
|
conn->br.pairing_method == JUST_WORKS) {
|
|
BT_DBG("MITM protection infeasible for required security");
|
|
ssp_confirm_neg_reply(conn);
|
|
return;
|
|
}
|
|
|
|
switch (conn->br.pairing_method) {
|
|
case PASSKEY_CONFIRM:
|
|
atomic_set_bit(conn->flags, BT_CONN_USER);
|
|
bt_auth->passkey_confirm(conn, passkey);
|
|
break;
|
|
case PASSKEY_DISPLAY:
|
|
atomic_set_bit(conn->flags, BT_CONN_USER);
|
|
bt_auth->passkey_display(conn, passkey);
|
|
break;
|
|
case PASSKEY_INPUT:
|
|
atomic_set_bit(conn->flags, BT_CONN_USER);
|
|
bt_auth->passkey_entry(conn);
|
|
break;
|
|
case JUST_WORKS:
|
|
/*
|
|
* When local host works as pairing acceptor and 'justworks'
|
|
* model is applied then notify user about such pairing request.
|
|
* [BT Core 4.2 table 5.7, Vol 3, Part C, 5.2.2.6]
|
|
*/
|
|
if (bt_auth && bt_auth->pairing_confirm &&
|
|
!atomic_test_bit(conn->flags,
|
|
BT_CONN_BR_PAIRING_INITIATOR)) {
|
|
atomic_set_bit(conn->flags, BT_CONN_USER);
|
|
bt_auth->pairing_confirm(conn);
|
|
break;
|
|
}
|
|
ssp_confirm_reply(conn);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
static int ssp_passkey_reply(struct bt_conn *conn, unsigned int passkey)
|
|
{
|
|
struct bt_hci_cp_user_passkey_reply *cp;
|
|
struct net_buf *buf;
|
|
|
|
BT_DBG("");
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_USER_PASSKEY_REPLY, sizeof(*cp));
|
|
if (!buf) {
|
|
return -ENOBUFS;
|
|
}
|
|
|
|
cp = net_buf_add(buf, sizeof(*cp));
|
|
bt_addr_copy(&cp->bdaddr, &conn->br.dst);
|
|
cp->passkey = sys_cpu_to_le32(passkey);
|
|
|
|
return bt_hci_cmd_send_sync(BT_HCI_OP_USER_PASSKEY_REPLY, buf, NULL);
|
|
}
|
|
|
|
static int ssp_passkey_neg_reply(struct bt_conn *conn)
|
|
{
|
|
struct bt_hci_cp_user_passkey_neg_reply *cp;
|
|
struct net_buf *buf;
|
|
|
|
BT_DBG("");
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_USER_PASSKEY_NEG_REPLY, sizeof(*cp));
|
|
if (!buf) {
|
|
return -ENOBUFS;
|
|
}
|
|
|
|
cp = net_buf_add(buf, sizeof(*cp));
|
|
bt_addr_copy(&cp->bdaddr, &conn->br.dst);
|
|
|
|
return bt_hci_cmd_send_sync(BT_HCI_OP_USER_PASSKEY_NEG_REPLY, buf,
|
|
NULL);
|
|
}
|
|
|
|
static int bt_hci_connect_br_cancel(struct bt_conn *conn)
|
|
{
|
|
struct bt_hci_cp_connect_cancel *cp;
|
|
struct bt_hci_rp_connect_cancel *rp;
|
|
struct net_buf *buf, *rsp;
|
|
int err;
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_CONNECT_CANCEL, sizeof(*cp));
|
|
if (!buf) {
|
|
return -ENOBUFS;
|
|
}
|
|
|
|
cp = net_buf_add(buf, sizeof(*cp));
|
|
memcpy(&cp->bdaddr, &conn->br.dst, sizeof(cp->bdaddr));
|
|
|
|
err = bt_hci_cmd_send_sync(BT_HCI_OP_CONNECT_CANCEL, buf, &rsp);
|
|
if (err) {
|
|
return err;
|
|
}
|
|
|
|
rp = (void *)rsp->data;
|
|
|
|
err = rp->status ? -EIO : 0;
|
|
|
|
net_buf_unref(rsp);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int conn_auth(struct bt_conn *conn)
|
|
{
|
|
struct bt_hci_cp_auth_requested *auth;
|
|
struct net_buf *buf;
|
|
|
|
BT_DBG("");
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_AUTH_REQUESTED, sizeof(*auth));
|
|
if (!buf) {
|
|
return -ENOBUFS;
|
|
}
|
|
|
|
auth = net_buf_add(buf, sizeof(*auth));
|
|
auth->handle = sys_cpu_to_le16(conn->handle);
|
|
|
|
atomic_set_bit(conn->flags, BT_CONN_BR_PAIRING_INITIATOR);
|
|
|
|
return bt_hci_cmd_send_sync(BT_HCI_OP_AUTH_REQUESTED, buf, NULL);
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_BREDR */
|
|
|
|
#if defined(CONFIG_BLUETOOTH_SMP)
|
|
void bt_conn_identity_resolved(struct bt_conn *conn)
|
|
{
|
|
const bt_addr_le_t *rpa;
|
|
struct bt_conn_cb *cb;
|
|
|
|
if (conn->role == BT_HCI_ROLE_MASTER) {
|
|
rpa = &conn->le.resp_addr;
|
|
} else {
|
|
rpa = &conn->le.init_addr;
|
|
}
|
|
|
|
for (cb = callback_list; cb; cb = cb->_next) {
|
|
if (cb->identity_resolved) {
|
|
cb->identity_resolved(conn, rpa, &conn->le.dst);
|
|
}
|
|
}
|
|
}
|
|
|
|
int bt_conn_le_start_encryption(struct bt_conn *conn, uint64_t rand,
|
|
uint16_t ediv, const uint8_t *ltk, size_t len)
|
|
{
|
|
struct bt_hci_cp_le_start_encryption *cp;
|
|
struct net_buf *buf;
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_LE_START_ENCRYPTION, sizeof(*cp));
|
|
if (!buf) {
|
|
return -ENOBUFS;
|
|
}
|
|
|
|
cp = net_buf_add(buf, sizeof(*cp));
|
|
cp->handle = sys_cpu_to_le16(conn->handle);
|
|
cp->rand = rand;
|
|
cp->ediv = ediv;
|
|
|
|
memcpy(cp->ltk, ltk, len);
|
|
if (len < sizeof(cp->ltk)) {
|
|
memset(cp->ltk + len, 0, sizeof(cp->ltk) - len);
|
|
}
|
|
|
|
return bt_hci_cmd_send_sync(BT_HCI_OP_LE_START_ENCRYPTION, buf, NULL);
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_SMP */
|
|
|
|
#if defined(CONFIG_BLUETOOTH_SMP) || defined(CONFIG_BLUETOOTH_BREDR)
|
|
uint8_t bt_conn_enc_key_size(struct bt_conn *conn)
|
|
{
|
|
if (!conn->encrypt) {
|
|
return 0;
|
|
}
|
|
|
|
#if defined(CONFIG_BLUETOOTH_BREDR)
|
|
if (conn->type == BT_CONN_TYPE_BR) {
|
|
struct bt_hci_cp_read_encryption_key_size *cp;
|
|
struct bt_hci_rp_read_encryption_key_size *rp;
|
|
struct net_buf *buf;
|
|
struct net_buf *rsp;
|
|
uint8_t key_size;
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_READ_ENCRYPTION_KEY_SIZE,
|
|
sizeof(*cp));
|
|
if (!buf) {
|
|
return 0;
|
|
}
|
|
|
|
cp = net_buf_add(buf, sizeof(*cp));
|
|
cp->handle = sys_cpu_to_le16(conn->handle);
|
|
|
|
if (bt_hci_cmd_send_sync(BT_HCI_OP_READ_ENCRYPTION_KEY_SIZE,
|
|
buf, &rsp)) {
|
|
return 0;
|
|
}
|
|
|
|
rp = (void *)rsp->data;
|
|
|
|
key_size = rp->status ? 0 : rp->key_size;
|
|
|
|
net_buf_unref(rsp);
|
|
|
|
return key_size;
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_BREDR */
|
|
|
|
#if defined(CONFIG_BLUETOOTH_SMP)
|
|
return conn->le.keys ? conn->le.keys->enc_size : 0;
|
|
#else
|
|
return 0;
|
|
#endif /* CONFIG_BLUETOOTH_SMP */
|
|
}
|
|
|
|
void bt_conn_security_changed(struct bt_conn *conn)
|
|
{
|
|
struct bt_conn_cb *cb;
|
|
|
|
for (cb = callback_list; cb; cb = cb->_next) {
|
|
if (cb->security_changed) {
|
|
cb->security_changed(conn, conn->sec_level);
|
|
}
|
|
}
|
|
}
|
|
|
|
static int start_security(struct bt_conn *conn)
|
|
{
|
|
#if defined(CONFIG_BLUETOOTH_BREDR)
|
|
if (conn->type == BT_CONN_TYPE_BR) {
|
|
if (atomic_test_bit(conn->flags, BT_CONN_BR_PAIRING)) {
|
|
return -EBUSY;
|
|
}
|
|
|
|
if (conn->required_sec_level > BT_SECURITY_HIGH) {
|
|
return -ENOTSUP;
|
|
}
|
|
|
|
if (bt_conn_get_io_capa() == BT_IO_NO_INPUT_OUTPUT &&
|
|
conn->required_sec_level > BT_SECURITY_MEDIUM) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
return conn_auth(conn);
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_BREDR */
|
|
|
|
switch (conn->role) {
|
|
#if defined(CONFIG_BLUETOOTH_CENTRAL) && defined(CONFIG_BLUETOOTH_SMP)
|
|
case BT_HCI_ROLE_MASTER:
|
|
{
|
|
if (!conn->le.keys) {
|
|
conn->le.keys = bt_keys_find(BT_KEYS_LTK_P256,
|
|
&conn->le.dst);
|
|
if (!conn->le.keys) {
|
|
conn->le.keys = bt_keys_find(BT_KEYS_LTK,
|
|
&conn->le.dst);
|
|
}
|
|
}
|
|
|
|
if (!conn->le.keys ||
|
|
!(conn->le.keys->keys & (BT_KEYS_LTK | BT_KEYS_LTK_P256))) {
|
|
return bt_smp_send_pairing_req(conn);
|
|
}
|
|
|
|
if (conn->required_sec_level > BT_SECURITY_MEDIUM &&
|
|
!atomic_test_bit(conn->le.keys->flags,
|
|
BT_KEYS_AUTHENTICATED)) {
|
|
return bt_smp_send_pairing_req(conn);
|
|
}
|
|
|
|
if (conn->required_sec_level > BT_SECURITY_HIGH &&
|
|
!atomic_test_bit(conn->le.keys->flags,
|
|
BT_KEYS_AUTHENTICATED) &&
|
|
!(conn->le.keys->keys & BT_KEYS_LTK_P256)) {
|
|
return bt_smp_send_pairing_req(conn);
|
|
}
|
|
|
|
/* LE SC LTK and legacy master LTK are stored in same place */
|
|
return bt_conn_le_start_encryption(conn,
|
|
conn->le.keys->ltk.rand,
|
|
conn->le.keys->ltk.ediv,
|
|
conn->le.keys->ltk.val,
|
|
conn->le.keys->enc_size);
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_CENTRAL && CONFIG_BLUETOOTH_SMP */
|
|
#if defined(CONFIG_BLUETOOTH_PERIPHERAL) && defined(CONFIG_BLUETOOTH_SMP)
|
|
case BT_HCI_ROLE_SLAVE:
|
|
return bt_smp_send_security_req(conn);
|
|
#endif /* CONFIG_BLUETOOTH_PERIPHERAL && CONFIG_BLUETOOTH_SMP */
|
|
default:
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
|
|
int bt_conn_security(struct bt_conn *conn, bt_security_t sec)
|
|
{
|
|
int err;
|
|
|
|
if (conn->state != BT_CONN_CONNECTED) {
|
|
return -ENOTCONN;
|
|
}
|
|
|
|
#if defined(CONFIG_BLUETOOTH_SMP_SC_ONLY)
|
|
if (sec < BT_SECURITY_FIPS) {
|
|
return -EOPNOTSUPP;
|
|
}
|
|
#endif/* CONFIG_BLUETOOTH_SMP_SC_ONLY */
|
|
|
|
/* nothing to do */
|
|
if (conn->sec_level >= sec || conn->required_sec_level >= sec) {
|
|
return 0;
|
|
}
|
|
|
|
conn->required_sec_level = sec;
|
|
|
|
err = start_security(conn);
|
|
|
|
/* reset required security level in case of error */
|
|
if (err) {
|
|
conn->required_sec_level = conn->sec_level;
|
|
}
|
|
|
|
return err;
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_SMP */
|
|
|
|
void bt_conn_cb_register(struct bt_conn_cb *cb)
|
|
{
|
|
cb->_next = callback_list;
|
|
callback_list = cb;
|
|
}
|
|
|
|
static void bt_conn_reset_rx_state(struct bt_conn *conn)
|
|
{
|
|
if (!conn->rx_len) {
|
|
return;
|
|
}
|
|
|
|
net_buf_unref(conn->rx);
|
|
conn->rx = NULL;
|
|
conn->rx_len = 0;
|
|
}
|
|
|
|
void bt_conn_recv(struct bt_conn *conn, struct net_buf *buf, uint8_t flags)
|
|
{
|
|
struct bt_l2cap_hdr *hdr;
|
|
uint16_t len;
|
|
|
|
BT_DBG("handle %u len %u flags %02x", conn->handle, buf->len, flags);
|
|
|
|
/* Check packet boundary flags */
|
|
switch (flags) {
|
|
case BT_ACL_START:
|
|
hdr = (void *)buf->data;
|
|
len = sys_le16_to_cpu(hdr->len);
|
|
|
|
BT_DBG("First, len %u final %u", buf->len, len);
|
|
|
|
if (conn->rx_len) {
|
|
BT_ERR("Unexpected first L2CAP frame");
|
|
bt_conn_reset_rx_state(conn);
|
|
}
|
|
|
|
conn->rx_len = (sizeof(*hdr) + len) - buf->len;
|
|
BT_DBG("rx_len %u", conn->rx_len);
|
|
if (conn->rx_len) {
|
|
conn->rx = buf;
|
|
return;
|
|
}
|
|
|
|
break;
|
|
case BT_ACL_CONT:
|
|
if (!conn->rx_len) {
|
|
BT_ERR("Unexpected L2CAP continuation");
|
|
bt_conn_reset_rx_state(conn);
|
|
net_buf_unref(buf);
|
|
return;
|
|
}
|
|
|
|
if (buf->len > conn->rx_len) {
|
|
BT_ERR("L2CAP data overflow");
|
|
bt_conn_reset_rx_state(conn);
|
|
net_buf_unref(buf);
|
|
return;
|
|
}
|
|
|
|
BT_DBG("Cont, len %u rx_len %u", buf->len, conn->rx_len);
|
|
|
|
if (buf->len > net_buf_tailroom(conn->rx)) {
|
|
BT_ERR("Not enough buffer space for L2CAP data");
|
|
bt_conn_reset_rx_state(conn);
|
|
net_buf_unref(buf);
|
|
return;
|
|
}
|
|
|
|
memcpy(net_buf_add(conn->rx, buf->len), buf->data, buf->len);
|
|
conn->rx_len -= buf->len;
|
|
net_buf_unref(buf);
|
|
|
|
if (conn->rx_len) {
|
|
return;
|
|
}
|
|
|
|
buf = conn->rx;
|
|
conn->rx = NULL;
|
|
conn->rx_len = 0;
|
|
|
|
break;
|
|
default:
|
|
BT_ERR("Unexpected ACL flags (0x%02x)", flags);
|
|
bt_conn_reset_rx_state(conn);
|
|
net_buf_unref(buf);
|
|
return;
|
|
}
|
|
|
|
hdr = (void *)buf->data;
|
|
len = sys_le16_to_cpu(hdr->len);
|
|
|
|
if (sizeof(*hdr) + len != buf->len) {
|
|
BT_ERR("ACL len mismatch (%u != %u)", len, buf->len);
|
|
net_buf_unref(buf);
|
|
return;
|
|
}
|
|
|
|
BT_DBG("Successfully parsed %u byte L2CAP packet", buf->len);
|
|
|
|
bt_l2cap_recv(conn, buf);
|
|
}
|
|
|
|
int bt_conn_send(struct bt_conn *conn, struct net_buf *buf)
|
|
{
|
|
BT_DBG("conn handle %u buf len %u", conn->handle, buf->len);
|
|
|
|
if (buf->user_data_size < BT_BUF_USER_DATA_MIN) {
|
|
BT_ERR("Too small user data size");
|
|
net_buf_unref(buf);
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (conn->state != BT_CONN_CONNECTED) {
|
|
BT_ERR("not connected!");
|
|
net_buf_unref(buf);
|
|
return -ENOTCONN;
|
|
}
|
|
|
|
net_buf_put(&conn->tx_queue, buf);
|
|
return 0;
|
|
}
|
|
|
|
static bool send_frag(struct bt_conn *conn, struct net_buf *buf, uint8_t flags,
|
|
bool always_consume)
|
|
{
|
|
struct bt_hci_acl_hdr *hdr;
|
|
int err;
|
|
|
|
BT_DBG("conn %p buf %p len %u flags 0x%02x", conn, buf, buf->len,
|
|
flags);
|
|
|
|
/* Wait until the controller can accept ACL packets */
|
|
nano_fiber_sem_take(bt_conn_get_pkts(conn), TICKS_UNLIMITED);
|
|
|
|
/* Check for disconnection while waiting for pkts_sem */
|
|
if (conn->state != BT_CONN_CONNECTED) {
|
|
goto fail;
|
|
}
|
|
|
|
hdr = net_buf_push(buf, sizeof(*hdr));
|
|
hdr->handle = sys_cpu_to_le16(bt_acl_handle_pack(conn->handle, flags));
|
|
hdr->len = sys_cpu_to_le16(buf->len - sizeof(*hdr));
|
|
|
|
bt_buf_set_type(buf, BT_BUF_ACL_OUT);
|
|
|
|
err = bt_send(buf);
|
|
if (err) {
|
|
BT_ERR("Unable to send to driver (err %d)", err);
|
|
goto fail;
|
|
}
|
|
|
|
conn->pending_pkts++;
|
|
return true;
|
|
|
|
fail:
|
|
nano_fiber_sem_give(bt_conn_get_pkts(conn));
|
|
if (always_consume) {
|
|
net_buf_unref(buf);
|
|
}
|
|
return false;
|
|
}
|
|
|
|
static inline uint16_t conn_mtu(struct bt_conn *conn)
|
|
{
|
|
#if defined(CONFIG_BLUETOOTH_BREDR)
|
|
if (conn->type == BT_CONN_TYPE_BR || !bt_dev.le.mtu) {
|
|
return bt_dev.br.mtu;
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_BREDR */
|
|
|
|
return bt_dev.le.mtu;
|
|
}
|
|
|
|
static struct net_buf *create_frag(struct bt_conn *conn, struct net_buf *buf)
|
|
{
|
|
struct net_buf *frag;
|
|
uint16_t frag_len;
|
|
|
|
frag = bt_conn_create_pdu(&frag_buf, 0);
|
|
|
|
if (conn->state != BT_CONN_CONNECTED) {
|
|
net_buf_unref(frag);
|
|
return NULL;
|
|
}
|
|
|
|
frag_len = min(conn_mtu(conn), net_buf_tailroom(frag));
|
|
|
|
memcpy(net_buf_add(frag, frag_len), buf->data, frag_len);
|
|
net_buf_pull(buf, frag_len);
|
|
|
|
return frag;
|
|
}
|
|
|
|
static bool send_buf(struct bt_conn *conn, struct net_buf *buf)
|
|
{
|
|
struct net_buf *frag;
|
|
|
|
BT_DBG("conn %p buf %p len %u", conn, buf, buf->len);
|
|
|
|
/* Send directly if the packet fits the ACL MTU */
|
|
if (buf->len <= conn_mtu(conn)) {
|
|
return send_frag(conn, buf, BT_ACL_START_NO_FLUSH, false);
|
|
}
|
|
|
|
/* Create & enqueue first fragment */
|
|
frag = create_frag(conn, buf);
|
|
if (!frag) {
|
|
return false;
|
|
}
|
|
|
|
if (!send_frag(conn, frag, BT_ACL_START_NO_FLUSH, true)) {
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
* Send the fragments. For the last one simply use the original
|
|
* buffer (which works since we've used net_buf_pull on it.
|
|
*/
|
|
while (buf->len > conn_mtu(conn)) {
|
|
frag = create_frag(conn, buf);
|
|
if (!frag) {
|
|
return false;
|
|
}
|
|
|
|
if (!send_frag(conn, frag, BT_ACL_CONT, true)) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return send_frag(conn, buf, BT_ACL_CONT, false);
|
|
}
|
|
|
|
static void conn_tx_fiber(int arg1, int arg2)
|
|
{
|
|
struct bt_conn *conn = (struct bt_conn *)arg1;
|
|
struct net_buf *buf;
|
|
|
|
BT_DBG("Started for handle %u", conn->handle);
|
|
|
|
while (conn->state == BT_CONN_CONNECTED) {
|
|
/* Get next ACL packet for connection */
|
|
buf = net_buf_get_timeout(&conn->tx_queue, 0, TICKS_UNLIMITED);
|
|
if (conn->state != BT_CONN_CONNECTED) {
|
|
net_buf_unref(buf);
|
|
break;
|
|
}
|
|
|
|
if (!send_buf(conn, buf)) {
|
|
net_buf_unref(buf);
|
|
}
|
|
}
|
|
|
|
BT_DBG("handle %u disconnected - cleaning up", conn->handle);
|
|
|
|
/* Give back any allocated buffers */
|
|
while ((buf = net_buf_get_timeout(&conn->tx_queue, 0, TICKS_NONE))) {
|
|
net_buf_unref(buf);
|
|
}
|
|
|
|
BT_ASSERT(!conn->pending_pkts);
|
|
|
|
bt_conn_reset_rx_state(conn);
|
|
|
|
BT_DBG("handle %u exiting", conn->handle);
|
|
bt_conn_unref(conn);
|
|
}
|
|
|
|
struct bt_conn *bt_conn_add_le(const bt_addr_le_t *peer)
|
|
{
|
|
struct bt_conn *conn = conn_new();
|
|
|
|
if (!conn) {
|
|
return NULL;
|
|
}
|
|
|
|
bt_addr_le_copy(&conn->le.dst, peer);
|
|
#if defined(CONFIG_BLUETOOTH_SMP)
|
|
conn->sec_level = BT_SECURITY_LOW;
|
|
conn->required_sec_level = BT_SECURITY_LOW;
|
|
#endif /* CONFIG_BLUETOOTH_SMP */
|
|
conn->type = BT_CONN_TYPE_LE;
|
|
conn->le.interval_min = BT_GAP_INIT_CONN_INT_MIN;
|
|
conn->le.interval_max = BT_GAP_INIT_CONN_INT_MAX;
|
|
nano_delayed_work_init(&conn->le.update_work, le_conn_update);
|
|
|
|
return conn;
|
|
}
|
|
|
|
static void timeout_fiber(int arg1, int arg2)
|
|
{
|
|
struct bt_conn *conn = (struct bt_conn *)arg1;
|
|
|
|
ARG_UNUSED(arg2);
|
|
|
|
conn->timeout = NULL;
|
|
|
|
bt_conn_disconnect(conn, BT_HCI_ERR_REMOTE_USER_TERM_CONN);
|
|
bt_conn_unref(conn);
|
|
}
|
|
|
|
void bt_conn_set_state(struct bt_conn *conn, bt_conn_state_t state)
|
|
{
|
|
bt_conn_state_t old_state;
|
|
|
|
BT_DBG("%s -> %s", state2str(conn->state), state2str(state));
|
|
|
|
if (conn->state == state) {
|
|
BT_WARN("no transition");
|
|
return;
|
|
}
|
|
|
|
old_state = conn->state;
|
|
conn->state = state;
|
|
|
|
/* Actions needed for exiting the old state */
|
|
switch (old_state) {
|
|
case BT_CONN_DISCONNECTED:
|
|
/* Take a reference for the first state transition after
|
|
* bt_conn_add_le() and keep it until reaching DISCONNECTED
|
|
* again.
|
|
*/
|
|
bt_conn_ref(conn);
|
|
break;
|
|
case BT_CONN_CONNECT:
|
|
if (conn->timeout) {
|
|
fiber_delayed_start_cancel(conn->timeout);
|
|
conn->timeout = NULL;
|
|
|
|
/* Drop the reference taken by timeout fiber */
|
|
bt_conn_unref(conn);
|
|
}
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
/* Actions needed for entering the new state */
|
|
switch (conn->state) {
|
|
case BT_CONN_CONNECTED:
|
|
nano_fifo_init(&conn->tx_queue);
|
|
fiber_start(conn->stack, sizeof(conn->stack), conn_tx_fiber,
|
|
(int)bt_conn_ref(conn), 0, 7, 0);
|
|
|
|
bt_l2cap_connected(conn);
|
|
notify_connected(conn);
|
|
break;
|
|
case BT_CONN_DISCONNECTED:
|
|
/* Notify disconnection and queue a dummy buffer to wake
|
|
* up and stop the tx fiber for states where it was
|
|
* running.
|
|
*/
|
|
if (old_state == BT_CONN_CONNECTED ||
|
|
old_state == BT_CONN_DISCONNECT) {
|
|
bt_l2cap_disconnected(conn);
|
|
notify_disconnected(conn);
|
|
|
|
net_buf_put(&conn->tx_queue, net_buf_get(&dummy, 0));
|
|
} else if (old_state == BT_CONN_CONNECT) {
|
|
/* conn->err will be set in this case */
|
|
notify_connected(conn);
|
|
} else if (old_state == BT_CONN_CONNECT_SCAN && conn->err) {
|
|
/* this indicate LE Create Connection failed */
|
|
notify_connected(conn);
|
|
}
|
|
|
|
/* Return any unacknowledged packets */
|
|
while (conn->pending_pkts) {
|
|
nano_fiber_sem_give(bt_conn_get_pkts(conn));
|
|
conn->pending_pkts--;
|
|
}
|
|
|
|
/* Cancel Connection Update if it is pending */
|
|
if (conn->type == BT_CONN_TYPE_LE)
|
|
nano_delayed_work_cancel(&conn->le.update_work);
|
|
|
|
/* Release the reference we took for the very first
|
|
* state transition.
|
|
*/
|
|
bt_conn_unref(conn);
|
|
|
|
break;
|
|
case BT_CONN_CONNECT_SCAN:
|
|
break;
|
|
case BT_CONN_CONNECT:
|
|
/*
|
|
* Timer is needed only for LE. For other link types controller
|
|
* will handle connection timeout.
|
|
*/
|
|
if (conn->type != BT_CONN_TYPE_LE) {
|
|
break;
|
|
}
|
|
|
|
/* Add LE Create Connection timeout */
|
|
conn->timeout = fiber_delayed_start(conn->stack,
|
|
sizeof(conn->stack),
|
|
timeout_fiber,
|
|
(int)bt_conn_ref(conn),
|
|
0, 7, 0, CONN_TIMEOUT);
|
|
break;
|
|
case BT_CONN_DISCONNECT:
|
|
break;
|
|
default:
|
|
BT_WARN("no valid (%u) state was set", state);
|
|
|
|
break;
|
|
}
|
|
}
|
|
|
|
struct bt_conn *bt_conn_lookup_handle(uint16_t handle)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(conns); i++) {
|
|
if (!atomic_get(&conns[i].ref)) {
|
|
continue;
|
|
}
|
|
|
|
/* We only care about connections with a valid handle */
|
|
if (conns[i].state != BT_CONN_CONNECTED &&
|
|
conns[i].state != BT_CONN_DISCONNECT) {
|
|
continue;
|
|
}
|
|
|
|
if (conns[i].handle == handle) {
|
|
return bt_conn_ref(&conns[i]);
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
struct bt_conn *bt_conn_lookup_addr_le(const bt_addr_le_t *peer)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(conns); i++) {
|
|
if (!atomic_get(&conns[i].ref)) {
|
|
continue;
|
|
}
|
|
|
|
if (conns[i].type != BT_CONN_TYPE_LE) {
|
|
continue;
|
|
}
|
|
|
|
if (!bt_addr_le_cmp(peer, &conns[i].le.dst)) {
|
|
return bt_conn_ref(&conns[i]);
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
struct bt_conn *bt_conn_lookup_state_le(const bt_addr_le_t *peer,
|
|
const bt_conn_state_t state)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(conns); i++) {
|
|
if (!atomic_get(&conns[i].ref)) {
|
|
continue;
|
|
}
|
|
|
|
if (conns[i].type != BT_CONN_TYPE_LE) {
|
|
continue;
|
|
}
|
|
|
|
if (peer && bt_addr_le_cmp(peer, &conns[i].le.dst)) {
|
|
continue;
|
|
}
|
|
|
|
if (conns[i].state == state) {
|
|
return bt_conn_ref(&conns[i]);
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
struct bt_conn *bt_conn_ref(struct bt_conn *conn)
|
|
{
|
|
atomic_inc(&conn->ref);
|
|
|
|
BT_DBG("handle %u ref %u", conn->handle, atomic_get(&conn->ref));
|
|
|
|
return conn;
|
|
}
|
|
|
|
void bt_conn_unref(struct bt_conn *conn)
|
|
{
|
|
atomic_dec(&conn->ref);
|
|
|
|
BT_DBG("handle %u ref %u", conn->handle, atomic_get(&conn->ref));
|
|
}
|
|
|
|
const bt_addr_le_t *bt_conn_get_dst(const struct bt_conn *conn)
|
|
{
|
|
return &conn->le.dst;
|
|
}
|
|
|
|
int bt_conn_get_info(const struct bt_conn *conn, struct bt_conn_info *info)
|
|
{
|
|
info->type = conn->type;
|
|
info->role = conn->role;
|
|
|
|
switch (conn->type) {
|
|
case BT_CONN_TYPE_LE:
|
|
if (conn->role == BT_HCI_ROLE_MASTER) {
|
|
info->le.src = &conn->le.init_addr;
|
|
info->le.dst = &conn->le.resp_addr;
|
|
} else {
|
|
info->le.src = &conn->le.resp_addr;
|
|
info->le.dst = &conn->le.init_addr;
|
|
}
|
|
info->le.interval = conn->le.interval;
|
|
info->le.latency = conn->le.latency;
|
|
info->le.timeout = conn->le.timeout;
|
|
return 0;
|
|
#if defined(CONFIG_BLUETOOTH_BREDR)
|
|
case BT_CONN_TYPE_BR:
|
|
info->br.dst = &conn->br.dst;
|
|
return 0;
|
|
#endif
|
|
}
|
|
|
|
return -EINVAL;
|
|
}
|
|
|
|
static int bt_hci_disconnect(struct bt_conn *conn, uint8_t reason)
|
|
{
|
|
struct net_buf *buf;
|
|
struct bt_hci_cp_disconnect *disconn;
|
|
int err;
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_DISCONNECT, sizeof(*disconn));
|
|
if (!buf) {
|
|
return -ENOBUFS;
|
|
}
|
|
|
|
disconn = net_buf_add(buf, sizeof(*disconn));
|
|
disconn->handle = sys_cpu_to_le16(conn->handle);
|
|
disconn->reason = reason;
|
|
|
|
err = bt_hci_cmd_send(BT_HCI_OP_DISCONNECT, buf);
|
|
if (err) {
|
|
return err;
|
|
}
|
|
|
|
bt_conn_set_state(conn, BT_CONN_DISCONNECT);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int bt_hci_connect_le_cancel(struct bt_conn *conn)
|
|
{
|
|
if (conn->timeout) {
|
|
fiber_delayed_start_cancel(conn->timeout);
|
|
conn->timeout = NULL;
|
|
|
|
/* Drop the reference took by timeout fiber */
|
|
bt_conn_unref(conn);
|
|
}
|
|
|
|
return bt_hci_cmd_send(BT_HCI_OP_LE_CREATE_CONN_CANCEL, NULL);
|
|
}
|
|
|
|
int bt_conn_le_param_update(struct bt_conn *conn,
|
|
const struct bt_le_conn_param *param)
|
|
{
|
|
BT_DBG("conn %p features 0x%x params (%d-%d %d %d)", conn,
|
|
conn->le.features[0], param->interval_min, param->interval_max,
|
|
param->latency, param->timeout);
|
|
|
|
/* Check if there's a need to update conn params */
|
|
if (conn->le.interval >= param->interval_min &&
|
|
conn->le.interval <= param->interval_max) {
|
|
return -EALREADY;
|
|
}
|
|
|
|
/* Cancel any pending update */
|
|
nano_delayed_work_cancel(&conn->le.update_work);
|
|
|
|
if ((conn->role == BT_HCI_ROLE_SLAVE) &&
|
|
!BT_FEAT_LE_CONN_PARAM_REQ_PROC(bt_dev.le.features)) {
|
|
return bt_l2cap_update_conn_param(conn, param);
|
|
}
|
|
|
|
if (BT_FEAT_LE_CONN_PARAM_REQ_PROC(conn->le.features) &&
|
|
BT_FEAT_LE_CONN_PARAM_REQ_PROC(bt_dev.le.features)) {
|
|
return bt_conn_le_conn_update(conn, param);
|
|
}
|
|
|
|
return -EBUSY;
|
|
}
|
|
|
|
int bt_conn_disconnect(struct bt_conn *conn, uint8_t reason)
|
|
{
|
|
#if defined(CONFIG_BLUETOOTH_CENTRAL)
|
|
/* Disconnection is initiated by us, so auto connection shall
|
|
* be disabled. Otherwise the passive scan would be enabled
|
|
* and we could send LE Create Connection as soon as the remote
|
|
* starts advertising.
|
|
*/
|
|
if (conn->type == BT_CONN_TYPE_LE) {
|
|
bt_le_set_auto_conn(&conn->le.dst, NULL);
|
|
}
|
|
#endif
|
|
|
|
switch (conn->state) {
|
|
case BT_CONN_CONNECT_SCAN:
|
|
bt_conn_set_state(conn, BT_CONN_DISCONNECTED);
|
|
bt_le_scan_update(false);
|
|
return 0;
|
|
case BT_CONN_CONNECT:
|
|
#if defined(CONFIG_BLUETOOTH_BREDR)
|
|
if (conn->type == BT_CONN_TYPE_BR) {
|
|
return bt_hci_connect_br_cancel(conn);
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_BREDR */
|
|
|
|
return bt_hci_connect_le_cancel(conn);
|
|
case BT_CONN_CONNECTED:
|
|
return bt_hci_disconnect(conn, reason);
|
|
case BT_CONN_DISCONNECT:
|
|
return 0;
|
|
case BT_CONN_DISCONNECTED:
|
|
default:
|
|
return -ENOTCONN;
|
|
}
|
|
}
|
|
|
|
#if defined(CONFIG_BLUETOOTH_CENTRAL)
|
|
static void bt_conn_set_param_le(struct bt_conn *conn,
|
|
const struct bt_le_conn_param *param)
|
|
{
|
|
conn->le.interval_max = param->interval_max;
|
|
conn->le.latency = param->latency;
|
|
conn->le.timeout = param->timeout;
|
|
}
|
|
|
|
struct bt_conn *bt_conn_create_le(const bt_addr_le_t *peer,
|
|
const struct bt_le_conn_param *param)
|
|
{
|
|
struct bt_conn *conn;
|
|
|
|
if (!bt_le_conn_params_valid(param->interval_min, param->interval_max,
|
|
param->latency, param->timeout)) {
|
|
return NULL;
|
|
}
|
|
|
|
if (atomic_test_bit(bt_dev.flags, BT_DEV_EXPLICIT_SCAN)) {
|
|
return NULL;
|
|
}
|
|
|
|
conn = bt_conn_lookup_addr_le(peer);
|
|
if (conn) {
|
|
switch (conn->state) {
|
|
case BT_CONN_CONNECT_SCAN:
|
|
bt_conn_set_param_le(conn, param);
|
|
return conn;
|
|
case BT_CONN_CONNECT:
|
|
case BT_CONN_CONNECTED:
|
|
return conn;
|
|
default:
|
|
bt_conn_unref(conn);
|
|
return NULL;
|
|
}
|
|
}
|
|
|
|
conn = bt_conn_add_le(peer);
|
|
if (!conn) {
|
|
return NULL;
|
|
}
|
|
|
|
bt_conn_set_param_le(conn, param);
|
|
|
|
bt_conn_set_state(conn, BT_CONN_CONNECT_SCAN);
|
|
|
|
bt_le_scan_update(true);
|
|
|
|
return conn;
|
|
}
|
|
|
|
int bt_le_set_auto_conn(bt_addr_le_t *addr,
|
|
const struct bt_le_conn_param *param)
|
|
{
|
|
struct bt_conn *conn;
|
|
|
|
if (param && !bt_le_conn_params_valid(param->interval_min,
|
|
param->interval_max,
|
|
param->latency,
|
|
param->timeout)) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
conn = bt_conn_lookup_addr_le(addr);
|
|
if (!conn) {
|
|
conn = bt_conn_add_le(addr);
|
|
if (!conn) {
|
|
return -ENOMEM;
|
|
}
|
|
}
|
|
|
|
if (param) {
|
|
bt_conn_set_param_le(conn, param);
|
|
|
|
if (!atomic_test_and_set_bit(conn->flags,
|
|
BT_CONN_AUTO_CONNECT)) {
|
|
bt_conn_ref(conn);
|
|
}
|
|
} else {
|
|
if (atomic_test_and_clear_bit(conn->flags,
|
|
BT_CONN_AUTO_CONNECT)) {
|
|
bt_conn_unref(conn);
|
|
if (conn->state == BT_CONN_CONNECT_SCAN) {
|
|
bt_conn_set_state(conn, BT_CONN_DISCONNECTED);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (conn->state == BT_CONN_DISCONNECTED &&
|
|
atomic_test_bit(bt_dev.flags, BT_DEV_READY)) {
|
|
if (param) {
|
|
bt_conn_set_state(conn, BT_CONN_CONNECT_SCAN);
|
|
}
|
|
bt_le_scan_update(false);
|
|
}
|
|
|
|
bt_conn_unref(conn);
|
|
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_CENTRAL */
|
|
|
|
#if defined(CONFIG_BLUETOOTH_PERIPHERAL)
|
|
struct bt_conn *bt_conn_create_slave_le(const bt_addr_le_t *peer,
|
|
const struct bt_le_adv_param *param)
|
|
{
|
|
return NULL;
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_PERIPHERAL */
|
|
|
|
int bt_conn_le_conn_update(struct bt_conn *conn,
|
|
const struct bt_le_conn_param *param)
|
|
{
|
|
struct hci_cp_le_conn_update *conn_update;
|
|
struct net_buf *buf;
|
|
|
|
buf = bt_hci_cmd_create(BT_HCI_OP_LE_CONN_UPDATE,
|
|
sizeof(*conn_update));
|
|
if (!buf) {
|
|
return -ENOBUFS;
|
|
}
|
|
|
|
conn_update = net_buf_add(buf, sizeof(*conn_update));
|
|
memset(conn_update, 0, sizeof(*conn_update));
|
|
conn_update->handle = sys_cpu_to_le16(conn->handle);
|
|
conn_update->conn_interval_min = sys_cpu_to_le16(param->interval_min);
|
|
conn_update->conn_interval_max = sys_cpu_to_le16(param->interval_max);
|
|
conn_update->conn_latency = sys_cpu_to_le16(param->latency);
|
|
conn_update->supervision_timeout = sys_cpu_to_le16(param->timeout);
|
|
|
|
return bt_hci_cmd_send(BT_HCI_OP_LE_CONN_UPDATE, buf);
|
|
}
|
|
|
|
struct net_buf *bt_conn_create_pdu(struct nano_fifo *fifo, size_t reserve)
|
|
{
|
|
size_t head_reserve = reserve + sizeof(struct bt_hci_acl_hdr) +
|
|
CONFIG_BLUETOOTH_HCI_SEND_RESERVE;
|
|
|
|
return net_buf_get(fifo, head_reserve);
|
|
}
|
|
|
|
#if defined(CONFIG_BLUETOOTH_SMP) || defined(CONFIG_BLUETOOTH_BREDR)
|
|
int bt_conn_auth_cb_register(const struct bt_conn_auth_cb *cb)
|
|
{
|
|
if (!cb) {
|
|
bt_auth = NULL;
|
|
return 0;
|
|
}
|
|
|
|
/* cancel callback should always be provided */
|
|
if (!cb->cancel) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (bt_auth) {
|
|
return -EALREADY;
|
|
}
|
|
|
|
bt_auth = cb;
|
|
return 0;
|
|
}
|
|
|
|
int bt_conn_auth_passkey_entry(struct bt_conn *conn, unsigned int passkey)
|
|
{
|
|
if (!bt_auth) {
|
|
return -EINVAL;
|
|
}
|
|
#if defined(CONFIG_BLUETOOTH_SMP)
|
|
if (conn->type == BT_CONN_TYPE_LE) {
|
|
bt_smp_auth_passkey_entry(conn, passkey);
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_SMP */
|
|
#if defined(CONFIG_BLUETOOTH_BREDR)
|
|
if (conn->type == BT_CONN_TYPE_BR) {
|
|
/* User entered passkey, reset user state. */
|
|
if (!atomic_test_and_clear_bit(conn->flags, BT_CONN_USER)) {
|
|
return -EPERM;
|
|
}
|
|
|
|
if (conn->br.pairing_method == PASSKEY_INPUT) {
|
|
return ssp_passkey_reply(conn, passkey);
|
|
}
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_BREDR */
|
|
|
|
return -EINVAL;
|
|
}
|
|
|
|
int bt_conn_auth_passkey_confirm(struct bt_conn *conn)
|
|
{
|
|
if (!bt_auth) {
|
|
return -EINVAL;
|
|
};
|
|
#if defined(CONFIG_BLUETOOTH_SMP)
|
|
if (conn->type == BT_CONN_TYPE_LE) {
|
|
return bt_smp_auth_passkey_confirm(conn);
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_SMP */
|
|
#if defined(CONFIG_BLUETOOTH_BREDR)
|
|
if (conn->type == BT_CONN_TYPE_BR) {
|
|
/* Allow user confirm passkey value, then reset user state. */
|
|
if (!atomic_test_and_clear_bit(conn->flags, BT_CONN_USER)) {
|
|
return -EPERM;
|
|
}
|
|
|
|
return ssp_confirm_reply(conn);
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_BREDR */
|
|
|
|
return -EINVAL;
|
|
}
|
|
|
|
int bt_conn_auth_cancel(struct bt_conn *conn)
|
|
{
|
|
if (!bt_auth) {
|
|
return -EINVAL;
|
|
}
|
|
#if defined(CONFIG_BLUETOOTH_SMP)
|
|
if (conn->type == BT_CONN_TYPE_LE) {
|
|
return bt_smp_auth_cancel(conn);
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_SMP */
|
|
#if defined(CONFIG_BLUETOOTH_BREDR)
|
|
if (conn->type == BT_CONN_TYPE_BR) {
|
|
/* Allow user cancel authentication, then reset user state. */
|
|
if (!atomic_test_and_clear_bit(conn->flags, BT_CONN_USER)) {
|
|
return -EPERM;
|
|
}
|
|
|
|
switch (conn->br.pairing_method) {
|
|
case JUST_WORKS:
|
|
case PASSKEY_CONFIRM:
|
|
return ssp_confirm_neg_reply(conn);
|
|
case PASSKEY_INPUT:
|
|
return ssp_passkey_neg_reply(conn);
|
|
case PASSKEY_DISPLAY:
|
|
return bt_conn_disconnect(conn,
|
|
BT_HCI_ERR_AUTHENTICATION_FAIL);
|
|
case LEGACY:
|
|
return pin_code_neg_reply(&conn->br.dst);
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_BREDR */
|
|
|
|
return -EINVAL;
|
|
}
|
|
|
|
int bt_conn_auth_pairing_confirm(struct bt_conn *conn)
|
|
{
|
|
if (!bt_auth) {
|
|
return -EINVAL;
|
|
}
|
|
|
|
switch (conn->type) {
|
|
#if defined(CONFIG_BLUETOOTH_SMP)
|
|
case BT_CONN_TYPE_LE:
|
|
return bt_smp_auth_pairing_confirm(conn);
|
|
#endif /* CONFIG_BLUETOOTH_SMP */
|
|
#if defined(CONFIG_BLUETOOTH_BREDR)
|
|
case BT_CONN_TYPE_BR:
|
|
return ssp_confirm_reply(conn);
|
|
#endif /* CONFIG_BLUETOOTH_BREDR */
|
|
default:
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_SMP || CONFIG_BLUETOOTH_BREDR */
|
|
|
|
static void background_scan_init(void)
|
|
{
|
|
#if defined(CONFIG_BLUETOOTH_CENTRAL)
|
|
int i;
|
|
|
|
for (i = 0; i < ARRAY_SIZE(conns); i++) {
|
|
struct bt_conn *conn = &conns[i];
|
|
|
|
if (!atomic_get(&conn->ref)) {
|
|
continue;
|
|
}
|
|
|
|
if (atomic_test_bit(conn->flags, BT_CONN_AUTO_CONNECT)) {
|
|
bt_conn_set_state(conn, BT_CONN_CONNECT_SCAN);
|
|
}
|
|
}
|
|
#endif /* CONFIG_BLUETOOTH_CENTRAL */
|
|
}
|
|
|
|
int bt_conn_init(void)
|
|
{
|
|
int err;
|
|
|
|
net_buf_pool_init(frag_pool);
|
|
net_buf_pool_init(dummy_pool);
|
|
|
|
bt_att_init();
|
|
|
|
err = bt_smp_init();
|
|
if (err) {
|
|
return err;
|
|
}
|
|
|
|
bt_l2cap_init();
|
|
|
|
background_scan_init();
|
|
|
|
return 0;
|
|
}
|