3 * BlueZ - Bluetooth protocol stack for Linux
5 * Copyright (C) 2006-2010 Nokia Corporation
6 * Copyright (C) 2004-2010 Marcel Holtmann <marcel@holtmann.org>
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
39 #include "lib/bluetooth.h"
41 #include "lib/sdp_lib.h"
44 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
45 #include <sys/ioctl.h>
46 #include <bluetooth/hci.h>
47 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
49 #include "btio/btio.h"
51 #include "src/shared/util.h"
52 #include "src/shared/queue.h"
53 #include "src/adapter.h"
54 #include "src/device.h"
56 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
57 #include "src/service.h"
58 #include "../../profile.h"
68 static unsigned int seids;
71 # define MAX(x, y) ((x) > (y) ? (x) : (y))
74 #define AVDTP_DISCOVER 0x01
75 #define AVDTP_GET_CAPABILITIES 0x02
76 #define AVDTP_SET_CONFIGURATION 0x03
77 #define AVDTP_GET_CONFIGURATION 0x04
78 #define AVDTP_RECONFIGURE 0x05
79 #define AVDTP_OPEN 0x06
80 #define AVDTP_START 0x07
81 #define AVDTP_CLOSE 0x08
82 #define AVDTP_SUSPEND 0x09
83 #define AVDTP_ABORT 0x0A
84 #define AVDTP_SECURITY_CONTROL 0x0B
85 #define AVDTP_GET_ALL_CAPABILITIES 0x0C
86 #define AVDTP_DELAY_REPORT 0x0D
88 #define AVDTP_PKT_TYPE_SINGLE 0x00
89 #define AVDTP_PKT_TYPE_START 0x01
90 #define AVDTP_PKT_TYPE_CONTINUE 0x02
91 #define AVDTP_PKT_TYPE_END 0x03
93 #define AVDTP_MSG_TYPE_COMMAND 0x00
94 #define AVDTP_MSG_TYPE_GEN_REJECT 0x01
95 #define AVDTP_MSG_TYPE_ACCEPT 0x02
96 #define AVDTP_MSG_TYPE_REJECT 0x03
98 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
99 #define REQ_TIMEOUT 10
101 #define REQ_TIMEOUT 6
103 #define ABORT_TIMEOUT 2
104 #define DISCONNECT_TIMEOUT 1
105 #define START_TIMEOUT 1
107 #if __BYTE_ORDER == __LITTLE_ENDIAN
109 struct avdtp_common_header {
110 uint8_t message_type:2;
111 uint8_t packet_type:2;
112 uint8_t transaction:4;
113 } __attribute__ ((packed));
115 struct avdtp_single_header {
116 uint8_t message_type:2;
117 uint8_t packet_type:2;
118 uint8_t transaction:4;
121 } __attribute__ ((packed));
123 struct avdtp_start_header {
124 uint8_t message_type:2;
125 uint8_t packet_type:2;
126 uint8_t transaction:4;
127 uint8_t no_of_packets;
130 } __attribute__ ((packed));
132 struct avdtp_continue_header {
133 uint8_t message_type:2;
134 uint8_t packet_type:2;
135 uint8_t transaction:4;
136 } __attribute__ ((packed));
144 uint8_t media_type:4;
145 } __attribute__ ((packed));
150 } __attribute__ ((packed));
152 #elif __BYTE_ORDER == __BIG_ENDIAN
154 struct avdtp_common_header {
155 uint8_t transaction:4;
156 uint8_t packet_type:2;
157 uint8_t message_type:2;
158 } __attribute__ ((packed));
160 struct avdtp_single_header {
161 uint8_t transaction:4;
162 uint8_t packet_type:2;
163 uint8_t message_type:2;
166 } __attribute__ ((packed));
168 struct avdtp_start_header {
169 uint8_t transaction:4;
170 uint8_t packet_type:2;
171 uint8_t message_type:2;
172 uint8_t no_of_packets;
175 } __attribute__ ((packed));
177 struct avdtp_continue_header {
178 uint8_t transaction:4;
179 uint8_t packet_type:2;
180 uint8_t message_type:2;
181 } __attribute__ ((packed));
187 uint8_t media_type:4;
190 } __attribute__ ((packed));
195 } __attribute__ ((packed));
198 #error "Unknown byte order"
203 struct discover_resp {
204 struct seid_info seps[0];
205 } __attribute__ ((packed));
209 } __attribute__ ((packed));
212 struct seid first_seid;
213 struct seid other_seids[0];
214 } __attribute__ ((packed));
217 struct seid first_seid;
218 struct seid other_seids[0];
219 } __attribute__ ((packed));
223 } __attribute__ ((packed));
228 } __attribute__ ((packed));
230 #if __BYTE_ORDER == __LITTLE_ENDIAN
235 } __attribute__ ((packed));
244 } __attribute__ ((packed));
250 } __attribute__ ((packed));
257 uint8_t serv_cap_len;
260 } __attribute__ ((packed));
266 } __attribute__ ((packed));
268 #elif __BYTE_ORDER == __BIG_ENDIAN
273 } __attribute__ ((packed));
282 } __attribute__ ((packed));
288 } __attribute__ ((packed));
295 uint8_t serv_cap_len;
298 } __attribute__ ((packed));
304 } __attribute__ ((packed));
307 #error "Unknown byte order"
314 uint8_t message_type;
325 struct avdtp_stream *stream; /* Set if the request targeted a stream */
330 struct avdtp_remote_sep {
334 struct avdtp_service_capability *codec;
335 gboolean delay_reporting;
336 GSList *caps; /* of type struct avdtp_service_capability */
337 struct avdtp_stream *stream;
340 struct avdtp_local_sep {
342 struct avdtp_stream *stream;
343 struct seid_info info;
345 gboolean delay_reporting;
347 struct avdtp_sep_ind *ind;
348 struct avdtp_sep_cfm *cfm;
352 struct stream_callback {
353 avdtp_stream_state_cb cb;
358 struct avdtp_state_callback {
359 avdtp_session_state_cb cb;
360 struct btd_device *dev;
365 struct discover_callback {
367 avdtp_discover_cb_t cb;
371 struct avdtp_stream {
375 struct avdtp *session;
376 struct avdtp_local_sep *lsep;
380 struct avdtp_service_capability *codec;
381 guint io_id; /* Transport GSource ID */
382 guint timer; /* Waiting for other side to close or open
383 * the transport channel */
384 gboolean open_acp; /* If we are in ACT role for Open */
385 gboolean close_int; /* If we are in INT role for Close */
386 gboolean abort_int; /* If we are in INT role for Abort */
387 guint start_timer; /* Wait START command timer */
388 gboolean delay_reporting;
389 uint16_t delay; /* AVDTP 1.3 Delay Reporting feature */
390 gboolean starting; /* only valid while sep state == OPEN */
393 /* Structure describing an AVDTP connection between two devices */
401 struct btd_device *device;
403 avdtp_session_state_t state;
408 GSList *seps; /* Elements of type struct avdtp_remote_sep * */
410 GSList *streams; /* Elements of type struct avdtp_stream * */
412 GSList *req_queue; /* Elements of type struct pending_req * */
413 GSList *prio_queue; /* Same as req_queue but is processed before it */
415 struct avdtp_stream *pending_open;
424 struct discover_callback *discover;
425 struct pending_req *req;
429 /* Attempt stream setup instead of disconnecting */
430 gboolean stream_setup;
433 static GSList *state_callbacks = NULL;
435 static int send_request(struct avdtp *session, gboolean priority,
436 struct avdtp_stream *stream, uint8_t signal_id,
437 void *buffer, size_t size);
438 static gboolean avdtp_parse_resp(struct avdtp *session,
439 struct avdtp_stream *stream,
440 uint8_t transaction, uint8_t signal_id,
441 void *buf, int size);
442 static gboolean avdtp_parse_rej(struct avdtp *session,
443 struct avdtp_stream *stream,
444 uint8_t transaction, uint8_t signal_id,
445 void *buf, int size);
446 static int process_queue(struct avdtp *session);
447 static void avdtp_sep_set_state(struct avdtp *session,
448 struct avdtp_local_sep *sep,
449 avdtp_state_t state);
451 static const char *avdtp_statestr(avdtp_state_t state)
454 case AVDTP_STATE_IDLE:
456 case AVDTP_STATE_CONFIGURED:
458 case AVDTP_STATE_OPEN:
460 case AVDTP_STATE_STREAMING:
462 case AVDTP_STATE_CLOSING:
464 case AVDTP_STATE_ABORTING:
467 return "<unknown state>";
471 static gboolean try_send(int sk, void *data, size_t len)
476 err = send(sk, data, len, 0);
477 } while (err < 0 && errno == EINTR);
480 error("send: %s (%d)", strerror(errno), errno);
482 } else if ((size_t) err != len) {
483 error("try_send: complete buffer not sent (%d/%zu bytes)",
491 static gboolean avdtp_send(struct avdtp *session, uint8_t transaction,
492 uint8_t message_type, uint8_t signal_id,
493 void *data, size_t len)
495 unsigned int cont_fragments, sent;
496 struct avdtp_start_header start;
497 struct avdtp_continue_header cont;
500 if (session->io == NULL) {
501 error("avdtp_send: session is closed");
505 sock = g_io_channel_unix_get_fd(session->io);
507 /* Single packet - no fragmentation */
508 if (sizeof(struct avdtp_single_header) + len <= session->omtu) {
509 struct avdtp_single_header single;
511 memset(&single, 0, sizeof(single));
513 single.transaction = transaction;
514 single.packet_type = AVDTP_PKT_TYPE_SINGLE;
515 single.message_type = message_type;
516 single.signal_id = signal_id;
518 memcpy(session->buf, &single, sizeof(single));
519 memcpy(session->buf + sizeof(single), data, len);
521 return try_send(sock, session->buf, sizeof(single) + len);
524 /* Check if there is enough space to start packet */
525 if (session->omtu < sizeof(start)) {
526 error("No enough space to fragment packet");
530 /* Count the number of needed fragments */
531 cont_fragments = (len - (session->omtu - sizeof(start))) /
532 (session->omtu - sizeof(cont)) + 1;
534 DBG("%zu bytes split into %d fragments", len, cont_fragments + 1);
536 /* Send the start packet */
537 memset(&start, 0, sizeof(start));
538 start.transaction = transaction;
539 start.packet_type = AVDTP_PKT_TYPE_START;
540 start.message_type = message_type;
541 start.no_of_packets = cont_fragments + 1;
542 start.signal_id = signal_id;
544 memcpy(session->buf, &start, sizeof(start));
545 memcpy(session->buf + sizeof(start), data,
546 session->omtu - sizeof(start));
548 if (!try_send(sock, session->buf, session->omtu))
551 DBG("first packet with %zu bytes sent", session->omtu - sizeof(start));
553 sent = session->omtu - sizeof(start);
555 /* Send the continue fragments and the end packet */
560 if (left + sizeof(cont) > session->omtu) {
561 cont.packet_type = AVDTP_PKT_TYPE_CONTINUE;
562 to_copy = session->omtu - sizeof(cont);
563 DBG("sending continue with %d bytes", to_copy);
565 cont.packet_type = AVDTP_PKT_TYPE_END;
567 DBG("sending end with %d bytes", to_copy);
570 cont.transaction = transaction;
571 cont.message_type = message_type;
573 memcpy(session->buf, &cont, sizeof(cont));
574 memcpy(session->buf + sizeof(cont), data + sent, to_copy);
576 if (!try_send(sock, session->buf, to_copy + sizeof(cont)))
585 static void pending_req_free(void *data)
587 struct pending_req *req = data;
590 g_source_remove(req->timeout);
595 static void close_stream(struct avdtp_stream *stream)
599 if (stream->io == NULL)
602 sock = g_io_channel_unix_get_fd(stream->io);
604 shutdown(sock, SHUT_RDWR);
606 g_io_channel_shutdown(stream->io, FALSE, NULL);
608 g_io_channel_unref(stream->io);
612 static gboolean stream_close_timeout(gpointer user_data)
614 struct avdtp_stream *stream = user_data;
616 DBG("Timed out waiting for peer to close the transport channel");
620 close_stream(stream);
625 static gboolean stream_open_timeout(gpointer user_data)
627 struct avdtp_stream *stream = user_data;
629 DBG("Timed out waiting for peer to open the transport channel");
633 stream->session->pending_open = NULL;
635 avdtp_abort(stream->session, stream);
640 void avdtp_error_init(struct avdtp_error *err, uint8_t category, int id)
642 err->category = category;
644 if (category == AVDTP_ERRNO)
645 err->err.posix_errno = id;
647 err->err.error_code = id;
650 uint8_t avdtp_error_category(struct avdtp_error *err)
652 return err->category;
655 int avdtp_error_error_code(struct avdtp_error *err)
657 assert(err->category != AVDTP_ERRNO);
658 return err->err.error_code;
661 int avdtp_error_posix_errno(struct avdtp_error *err)
663 assert(err->category == AVDTP_ERRNO);
664 return err->err.posix_errno;
667 static struct avdtp_stream *find_stream_by_rseid(struct avdtp *session,
672 for (l = session->streams; l != NULL; l = g_slist_next(l)) {
673 struct avdtp_stream *stream = l->data;
675 if (stream->rseid == rseid)
682 static struct avdtp_remote_sep *find_remote_sep(GSList *seps, uint8_t seid)
686 for (l = seps; l != NULL; l = g_slist_next(l)) {
687 struct avdtp_remote_sep *sep = l->data;
689 if (sep->seid == seid)
696 static void avdtp_set_state(struct avdtp *session,
697 avdtp_session_state_t new_state)
700 avdtp_session_state_t old_state = session->state;
702 session->state = new_state;
704 for (l = state_callbacks; l != NULL;) {
705 struct avdtp_state_callback *cb = l->data;
709 if (session->device != cb->dev)
712 cb->cb(cb->dev, session, old_state, new_state, cb->user_data);
716 static void stream_free(void *data)
718 struct avdtp_stream *stream = data;
719 struct avdtp_remote_sep *rsep;
721 stream->lsep->info.inuse = 0;
722 stream->lsep->stream = NULL;
724 rsep = find_remote_sep(stream->session->seps, stream->rseid);
729 g_source_remove(stream->timer);
732 close_stream(stream);
735 g_source_remove(stream->io_id);
737 g_slist_free_full(stream->callbacks, g_free);
738 g_slist_free_full(stream->caps, g_free);
743 static gboolean transport_cb(GIOChannel *chan, GIOCondition cond,
746 struct avdtp_stream *stream = data;
747 struct avdtp_local_sep *sep = stream->lsep;
749 if (stream->close_int && sep->cfm && sep->cfm->close)
750 sep->cfm->close(stream->session, sep, stream, NULL,
753 if (!(cond & G_IO_NVAL))
754 close_stream(stream);
758 if (!stream->abort_int)
759 avdtp_sep_set_state(stream->session, sep, AVDTP_STATE_IDLE);
764 static int get_send_buffer_size(int sk)
767 socklen_t optlen = sizeof(size);
769 if (getsockopt(sk, SOL_SOCKET, SO_SNDBUF, &size, &optlen) < 0) {
771 error("getsockopt(SO_SNDBUF) failed: %s (%d)", strerror(-err),
777 * Doubled value is returned by getsockopt since kernel uses that
778 * space for its own purposes (see man 7 socket, bookkeeping overhead
784 static int set_send_buffer_size(int sk, int size)
786 socklen_t optlen = sizeof(size);
788 if (setsockopt(sk, SOL_SOCKET, SO_SNDBUF, &size, optlen) < 0) {
790 error("setsockopt(SO_SNDBUF) failed: %s (%d)", strerror(-err),
798 static void handle_transport_connect(struct avdtp *session, GIOChannel *io,
799 uint16_t imtu, uint16_t omtu)
801 struct avdtp_stream *stream = session->pending_open;
802 struct avdtp_local_sep *sep = stream->lsep;
803 int sk, buf_size, min_buf_size;
806 session->pending_open = NULL;
809 g_source_remove(stream->timer);
814 if (!stream->open_acp && sep->cfm && sep->cfm->open) {
815 struct avdtp_error err;
816 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
817 sep->cfm->open(session, sep, NULL, &err,
823 if (stream->io == NULL)
824 stream->io = g_io_channel_ref(io);
829 /* Apply special settings only if local SEP is of type SRC */
830 if (sep->info.type != AVDTP_SEP_TYPE_SOURCE)
833 bt_io_set(stream->io, &err, BT_IO_OPT_FLUSHABLE, TRUE,
836 error("Enabling flushable packets failed: %s", err->message);
839 DBG("Flushable packets enabled");
841 sk = g_io_channel_unix_get_fd(stream->io);
842 buf_size = get_send_buffer_size(sk);
846 DBG("sk %d, omtu %d, send buffer size %d", sk, omtu, buf_size);
847 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
848 min_buf_size = omtu * 10;
850 min_buf_size = omtu * 2;
852 if (buf_size < min_buf_size) {
853 DBG("send buffer size to be increassed to %d",
855 set_send_buffer_size(sk, min_buf_size);
857 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
859 DBG("send buffer size to be decreassed to %d",
861 set_send_buffer_size(sk, min_buf_size);
865 if (!stream->open_acp && sep->cfm && sep->cfm->open)
866 sep->cfm->open(session, sep, stream, NULL, sep->user_data);
868 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
870 stream->io_id = g_io_add_watch(io, G_IO_ERR | G_IO_HUP | G_IO_NVAL,
871 (GIOFunc) transport_cb, stream);
874 static int pending_req_cmp(gconstpointer a, gconstpointer b)
876 const struct pending_req *req = a;
877 const struct avdtp_stream *stream = b;
879 if (req->stream == stream)
885 static void cleanup_queue(struct avdtp *session, struct avdtp_stream *stream)
888 struct pending_req *req;
890 while ((l = g_slist_find_custom(session->prio_queue, stream,
893 pending_req_free(req);
894 session->prio_queue = g_slist_remove(session->prio_queue, req);
897 while ((l = g_slist_find_custom(session->req_queue, stream,
900 pending_req_free(req);
901 session->req_queue = g_slist_remove(session->req_queue, req);
905 static void handle_unanswered_req(struct avdtp *session,
906 struct avdtp_stream *stream)
908 struct pending_req *req;
909 struct avdtp_local_sep *lsep;
910 struct avdtp_error err;
912 if (session->req->signal_id == AVDTP_ABORT) {
913 /* Avoid freeing the Abort request here */
914 DBG("handle_unanswered_req: Abort req, returning");
915 session->req->stream = NULL;
922 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
926 switch (req->signal_id) {
927 case AVDTP_RECONFIGURE:
928 error("No reply to Reconfigure request");
929 if (lsep && lsep->cfm && lsep->cfm->reconfigure)
930 lsep->cfm->reconfigure(session, lsep, stream, &err,
934 error("No reply to Open request");
935 if (lsep && lsep->cfm && lsep->cfm->open)
936 lsep->cfm->open(session, lsep, stream, &err,
940 error("No reply to Start request");
941 if (lsep && lsep->cfm && lsep->cfm->start)
942 lsep->cfm->start(session, lsep, stream, &err,
946 error("No reply to Suspend request");
947 if (lsep && lsep->cfm && lsep->cfm->suspend)
948 lsep->cfm->suspend(session, lsep, stream, &err,
952 error("No reply to Close request");
953 if (lsep && lsep->cfm && lsep->cfm->close)
954 lsep->cfm->close(session, lsep, stream, &err,
957 case AVDTP_SET_CONFIGURATION:
958 error("No reply to SetConfiguration request");
959 if (lsep && lsep->cfm && lsep->cfm->set_configuration)
960 lsep->cfm->set_configuration(session, lsep, stream,
961 &err, lsep->user_data);
964 pending_req_free(req);
967 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
968 static gboolean send_broadcom_a2dp_qos(const bdaddr_t *dst, gboolean qos_high)
972 struct hci_conn_info_req *cr;
975 dd = hci_open_dev(0);
980 cr = g_malloc0(sizeof(*cr) + sizeof(struct hci_conn_info));
983 bacpy(&cr->bdaddr, dst);
985 err = ioctl(dd, HCIGETCONNINFO, cr);
987 error("Fail to get HCIGETCOINFO");
993 cp.handle = cr->conn_info->handle;
994 DBG("Handle %d", cp.handle);
998 cp.priority = BRCM_QOS_PRIORITY_HIGH;
1000 cp.priority = BRCM_QOS_PRIORITY_NORMAL;
1002 if (hci_send_cmd(dd, OGF_VENDOR_CMD, BROADCOM_QOS_CMD,
1003 BROADCOM_QOS_CP_SIZE, &cp) < 0) {
1007 DBG("Send Broadcom Qos Patch %s", qos_high ? "High" : "Low");
1014 static gboolean send_sprd_a2dp_qos(const bdaddr_t *dst, gboolean qos_high)
1018 struct hci_conn_info_req *cr;
1021 dd = hci_open_dev(0);
1023 cr = g_malloc0(sizeof(*cr) + sizeof(struct hci_conn_info));
1025 cr->type = ACL_LINK;
1026 bacpy(&cr->bdaddr, dst);
1028 err = ioctl(dd, HCIGETCONNINFO, cr);
1030 error("Fail to get HCIGETCOINFO");
1036 cp.handle = cr->conn_info->handle;
1038 DBG("Handle %d", cp.handle);
1042 cp.qos.service_type = 0x02;
1043 cp.qos.token_rate = 0X000000C8;
1044 cp.qos.peak_bandwidth = 0X000000C8;
1045 cp.qos.latency = 0x00000001;
1046 cp.qos.delay_variation = 0xFFFFFFFF;
1048 cp.qos.service_type = 0x01;
1049 cp.qos.token_rate = 0X00000000;
1050 cp.qos.peak_bandwidth = 0X00000000;
1051 cp.qos.latency = 0x00000001;
1052 cp.qos.delay_variation = 0xFFFFFFFF;
1055 if (hci_send_cmd(dd, OGF_LINK_POLICY, OCF_QOS_SETUP,
1056 QOS_SETUP_CP_SIZE, &cp) < 0) {
1060 DBG("Send Spreadtrum Qos Patch %s", qos_high ? "High" : "Low");
1067 static gboolean fix_role_to_master(const bdaddr_t *dst, gboolean fix_to_master)
1071 struct hci_conn_info_req *cr;
1072 switch_role_cp sr_cp;
1073 write_link_policy_cp lp_cp;
1075 dd = hci_open_dev(0);
1077 error("hci_open_dev is failed");
1081 cr = g_malloc0(sizeof(*cr) + sizeof(struct hci_conn_info));
1083 cr->type = ACL_LINK;
1084 bacpy(&cr->bdaddr, dst);
1085 err = ioctl(dd, HCIGETCONNINFO, cr);
1087 error("Fail to get HCIGETCOINFO : %d", err);
1093 if (!(cr->conn_info->link_mode & HCI_LM_MASTER) && fix_to_master) {
1094 DBG("Need to role switch");
1096 bacpy(&sr_cp.bdaddr, dst);
1097 sr_cp.role = 0x00; /* 0x00 : Master, 0x01 : Slave */
1098 if (hci_send_cmd(dd, OGF_LINK_POLICY, OCF_SWITCH_ROLE,
1099 SWITCH_ROLE_CP_SIZE, &sr_cp) < 0) {
1100 error("switch role is failed");
1107 lp_cp.handle = cr->conn_info->handle;
1108 DBG("Handle %d", lp_cp.handle);
1111 lp_cp.policy = fix_to_master ? 0x00 : HCI_LP_SNIFF | HCI_LP_RSWITCH;
1112 DBG("Request link policy : 0x%X", lp_cp.policy);
1114 if (hci_send_cmd(dd, OGF_LINK_POLICY, OCF_WRITE_LINK_POLICY,
1115 WRITE_LINK_POLICY_CP_SIZE, &lp_cp) < 0) {
1116 error("write link policy is failed : %d", lp_cp.policy);
1125 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
1127 static void avdtp_sep_set_state(struct avdtp *session,
1128 struct avdtp_local_sep *sep,
1129 avdtp_state_t state)
1131 struct avdtp_stream *stream = sep->stream;
1132 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1133 struct btd_adapter *adapter = device_get_adapter(session->device);
1134 const bdaddr_t *dst;
1136 dst = device_get_address(session->device);
1138 avdtp_state_t old_state;
1139 struct avdtp_error err, *err_ptr = NULL;
1143 error("Error changing sep state: stream not available");
1147 if (sep->state == state) {
1148 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
1149 DBG("stream state change failed: %s", avdtp_strerror(&err));
1153 DBG("stream state changed: %s -> %s",
1154 avdtp_statestr(sep->state),
1155 avdtp_statestr(state));
1158 old_state = sep->state;
1162 case AVDTP_STATE_CONFIGURED:
1163 if (sep->info.type == AVDTP_SEP_TYPE_SINK)
1164 avdtp_delay_report(session, stream, stream->delay);
1166 case AVDTP_STATE_OPEN:
1167 stream->starting = FALSE;
1168 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1169 if (TIZEN_FEATURE_BLUEZ_BRCM_QOS) {
1170 send_broadcom_a2dp_qos(dst, FALSE);
1171 } else if (TIZEN_FEATURE_BLUEZ_SPRD_QOS) {
1172 if (old_state == AVDTP_STATE_STREAMING)
1173 send_sprd_a2dp_qos(dst, FALSE);
1176 if (TIZEN_FEATURE_BLUEZ_ROLE_CHANGE)
1177 fix_role_to_master(dst, FALSE);
1179 btd_adapter_set_streaming_mode(adapter, dst, FALSE);
1180 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
1182 case AVDTP_STATE_STREAMING:
1183 if (stream->start_timer) {
1184 g_source_remove(stream->start_timer);
1185 stream->start_timer = 0;
1188 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1189 if (TIZEN_FEATURE_BLUEZ_BRCM_QOS) {
1190 send_broadcom_a2dp_qos(dst, TRUE);
1191 } else if (TIZEN_FEATURE_BLUEZ_SPRD_QOS) {
1192 if (old_state == AVDTP_STATE_OPEN)
1193 send_sprd_a2dp_qos(dst, TRUE);
1195 if (TIZEN_FEATURE_BLUEZ_ROLE_CHANGE)
1196 fix_role_to_master(dst, TRUE);
1198 btd_adapter_set_streaming_mode(adapter, dst, TRUE);
1199 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
1200 stream->open_acp = FALSE;
1202 case AVDTP_STATE_CLOSING:
1203 case AVDTP_STATE_ABORTING:
1204 if (stream->start_timer) {
1205 g_source_remove(stream->start_timer);
1206 stream->start_timer = 0;
1209 case AVDTP_STATE_IDLE:
1210 if (stream->start_timer) {
1211 g_source_remove(stream->start_timer);
1212 stream->start_timer = 0;
1214 if (session->pending_open == stream)
1215 handle_transport_connect(session, NULL, 0, 0);
1216 if (session->req && session->req->stream == stream)
1217 handle_unanswered_req(session, stream);
1218 /* Remove pending commands for this stream from the queue */
1219 cleanup_queue(session, stream);
1225 l = stream->callbacks;
1227 struct stream_callback *cb = l->data;
1228 l = g_slist_next(l);
1229 cb->cb(stream, old_state, state, err_ptr, cb->user_data);
1232 if (state == AVDTP_STATE_IDLE &&
1233 g_slist_find(session->streams, stream)) {
1234 session->streams = g_slist_remove(session->streams, stream);
1235 stream_free(stream);
1239 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1240 void finalize_discovery(struct avdtp *session, int err)
1242 static void finalize_discovery(struct avdtp *session, int err)
1245 struct discover_callback *discover = session->discover;
1246 struct avdtp_error avdtp_err;
1251 avdtp_error_init(&avdtp_err, AVDTP_ERRNO, err);
1253 if (discover->id > 0)
1254 g_source_remove(discover->id);
1257 discover->cb(session, session->seps, err ? &avdtp_err : NULL,
1258 discover->user_data);
1260 session->discover = NULL;
1263 static void release_stream(struct avdtp_stream *stream, struct avdtp *session)
1265 struct avdtp_local_sep *sep = stream->lsep;
1267 if (sep->cfm && sep->cfm->abort &&
1268 (sep->state != AVDTP_STATE_ABORTING ||
1270 sep->cfm->abort(session, sep, stream, NULL, sep->user_data);
1272 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
1275 static void sep_free(gpointer data)
1277 struct avdtp_remote_sep *sep = data;
1279 g_slist_free_full(sep->caps, g_free);
1283 static void remove_disconnect_timer(struct avdtp *session)
1285 g_source_remove(session->dc_timer);
1286 session->dc_timer = 0;
1287 session->stream_setup = FALSE;
1290 static void avdtp_free(void *data)
1292 struct avdtp *session = data;
1296 g_slist_free_full(session->streams, stream_free);
1299 g_io_channel_shutdown(session->io, FALSE, NULL);
1300 g_io_channel_unref(session->io);
1303 if (session->io_id) {
1304 g_source_remove(session->io_id);
1308 if (session->dc_timer)
1309 remove_disconnect_timer(session);
1312 pending_req_free(session->req);
1314 g_slist_free_full(session->req_queue, pending_req_free);
1315 g_slist_free_full(session->prio_queue, pending_req_free);
1316 g_slist_free_full(session->seps, sep_free);
1318 g_free(session->buf);
1320 btd_device_unref(session->device);
1324 static void connection_lost(struct avdtp *session, int err)
1327 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1328 struct btd_service *service;
1331 session = avdtp_ref(session);
1333 ba2str(device_get_address(session->device), address);
1334 DBG("Disconnected from %s", address);
1336 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1337 service = btd_device_get_service(session->device, A2DP_SINK_UUID);
1339 btd_service_connecting_complete(service, -err);
1341 g_slist_foreach(session->streams, (GFunc) release_stream, session);
1342 session->streams = NULL;
1344 finalize_discovery(session, err);
1346 avdtp_set_state(session, AVDTP_SESSION_STATE_DISCONNECTED);
1348 DBG("%p: ref=%d", session, session->ref);
1350 avdtp_unref(session);
1353 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1354 static gboolean disconnect_acl_timeout(gpointer user_data)
1356 struct btd_device *device = user_data;
1360 btd_device_disconnect(device);
1366 static gboolean disconnect_timeout(gpointer user_data)
1368 struct avdtp *session = user_data;
1369 struct btd_service *service;
1370 gboolean stream_setup;
1371 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1372 struct btd_device *device = NULL;
1373 struct btd_adapter *adapter = NULL;
1374 const bdaddr_t *bdaddr = NULL;
1379 /* Fix : REVERSE_INULL */
1380 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1381 if (session->device == NULL) {
1382 error("session device NOT found");
1387 session->dc_timer = 0;
1389 stream_setup = session->stream_setup;
1390 session->stream_setup = FALSE;
1392 service = btd_device_get_service(session->device, A2DP_SINK_UUID);
1393 if (service && stream_setup) {
1394 sink_setup_stream(service, session);
1398 service = btd_device_get_service(session->device, A2DP_SOURCE_UUID);
1399 if (service && stream_setup) {
1400 source_setup_stream(service, session);
1404 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1405 if (session->device) {
1406 adapter = device_get_adapter(session->device);
1407 bdaddr = device_get_address(session->device);
1408 if (adapter && bdaddr)
1409 device = btd_adapter_find_device(adapter, bdaddr, BDADDR_BREDR);
1411 error("device is NOT found");
1415 connection_lost(session, ETIMEDOUT);
1417 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1420 disconnect_acl_timeout,
1427 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
1428 static void set_disconnect_timer_for_sink(struct avdtp *session, gboolean disconn)
1432 if (session->dc_timer)
1433 remove_disconnect_timer(session);
1435 device_get_name(session->device, name, sizeof(name));
1436 DBG("name : [%s]", name);
1437 if (g_str_equal(name, "VW BT") || g_str_equal(name, "VW MI") ||
1438 g_str_equal(name, "Seat ")) {
1439 session->dc_timer = g_timeout_add_seconds(3, disconnect_timeout,
1441 } else if (g_str_equal(name, "CAR M")) {
1442 session->dc_timer = g_timeout_add(200, disconnect_timeout,
1445 if (disconn == TRUE)
1446 session->dc_timer = g_timeout_add(100,
1450 session->dc_timer = g_timeout_add_seconds(DISCONNECT_TIMEOUT,
1457 static void set_disconnect_timer(struct avdtp *session)
1459 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1462 if (session->dc_timer)
1463 remove_disconnect_timer(session);
1465 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1466 device_get_name(session->device, name, sizeof(name));
1467 DBG("name : [%s]", name);
1468 if (g_str_equal(name, "VW BT") || g_str_equal(name, "VW MI") ||
1469 g_str_equal(name, "Seat ")) {
1470 session->dc_timer = g_timeout_add_seconds(3, disconnect_timeout,
1472 } else if (g_str_equal(name, "CAR M")) {
1473 session->dc_timer = g_timeout_add(200, disconnect_timeout,
1476 session->dc_timer = g_timeout_add_seconds(DISCONNECT_TIMEOUT,
1483 void avdtp_unref(struct avdtp *session)
1489 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
1490 struct btd_adapter *adapter;
1491 adapter = avdtp_get_adapter(session);
1494 DBG("%p: ref=%d", session, session->ref);
1496 if (session->ref > 0)
1499 switch (session->state) {
1500 case AVDTP_SESSION_STATE_CONNECTED:
1501 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
1502 if (btd_adapter_get_a2dp_role(adapter) == BLUETOOTH_A2DP_SINK_ROLE)
1503 set_disconnect_timer_for_sink(session, TRUE);
1505 set_disconnect_timer(session);
1507 set_disconnect_timer(session);
1510 case AVDTP_SESSION_STATE_CONNECTING:
1511 connection_lost(session, ECONNABORTED);
1513 case AVDTP_SESSION_STATE_DISCONNECTED:
1515 avdtp_free(session);
1520 struct avdtp *avdtp_ref(struct avdtp *session)
1523 DBG("%p: ref=%d", session, session->ref);
1524 if (session->dc_timer)
1525 remove_disconnect_timer(session);
1529 static bool match_by_seid(const void *data, const void *user_data)
1531 const struct avdtp_local_sep *sep = data;
1532 uint8_t seid = PTR_TO_UINT(user_data);
1534 return sep->info.seid == seid;
1537 static struct avdtp_local_sep *find_local_sep_by_seid(struct avdtp *session,
1540 return queue_find(session->lseps, match_by_seid, INT_TO_PTR(seid));
1543 struct avdtp_remote_sep *avdtp_find_remote_sep(struct avdtp *session,
1544 struct avdtp_local_sep *lsep)
1548 if (lsep->info.inuse)
1551 for (l = session->seps; l != NULL; l = g_slist_next(l)) {
1552 struct avdtp_remote_sep *sep = l->data;
1553 struct avdtp_service_capability *cap;
1554 struct avdtp_media_codec_capability *codec_data;
1556 /* Type must be different: source <-> sink */
1557 if (sep->type == lsep->info.type)
1560 if (sep->media_type != lsep->info.media_type)
1567 codec_data = (void *) cap->data;
1569 if (codec_data->media_codec_type != lsep->codec)
1572 if (lsep->ind && lsep->ind->match_codec)
1573 if (!lsep->ind->match_codec(session, codec_data,
1577 if (sep->stream == NULL)
1584 static GSList *caps_to_list(uint8_t *data, int size,
1585 struct avdtp_service_capability **codec,
1586 gboolean *delay_reporting)
1591 if (delay_reporting)
1592 *delay_reporting = FALSE;
1594 for (processed = 0, caps = NULL; processed + 2 <= size;) {
1595 struct avdtp_service_capability *cap;
1596 uint8_t length, category;
1601 if (processed + 2 + length > size) {
1602 error("Invalid capability data in getcap resp");
1606 cap = g_malloc(sizeof(struct avdtp_service_capability) +
1608 memcpy(cap, data, 2 + length);
1610 processed += 2 + length;
1613 caps = g_slist_append(caps, cap);
1615 if (category == AVDTP_MEDIA_CODEC &&
1617 sizeof(struct avdtp_media_codec_capability))
1619 else if (category == AVDTP_DELAY_REPORTING && delay_reporting)
1620 *delay_reporting = TRUE;
1626 static gboolean avdtp_unknown_cmd(struct avdtp *session, uint8_t transaction,
1629 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_GEN_REJECT,
1630 signal_id, NULL, 0);
1633 static void copy_seps(void *data, void *user_data)
1635 struct avdtp_local_sep *sep = data;
1636 struct seid_info **p = user_data;
1638 memcpy(*p, &sep->info, sizeof(struct seid_info));
1642 static gboolean avdtp_discover_cmd(struct avdtp *session, uint8_t transaction,
1643 void *buf, int size)
1645 unsigned int rsp_size, sep_count;
1646 struct seid_info *seps, *p;
1649 sep_count = queue_length(session->lseps);
1651 if (sep_count == 0) {
1652 uint8_t err = AVDTP_NOT_SUPPORTED_COMMAND;
1653 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1654 AVDTP_DISCOVER, &err, sizeof(err));
1657 rsp_size = sep_count * sizeof(struct seid_info);
1659 seps = g_new0(struct seid_info, sep_count);
1662 queue_foreach(session->lseps, copy_seps, &p);
1664 ret = avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1665 AVDTP_DISCOVER, seps, rsp_size);
1671 static gboolean avdtp_getcap_cmd(struct avdtp *session, uint8_t transaction,
1672 struct seid_req *req, unsigned int size,
1676 struct avdtp_local_sep *sep = NULL;
1677 unsigned int rsp_size;
1678 uint8_t err, buf[1024], *ptr = buf;
1681 cmd = get_all ? AVDTP_GET_ALL_CAPABILITIES : AVDTP_GET_CAPABILITIES;
1683 if (size < sizeof(struct seid_req)) {
1684 err = AVDTP_BAD_LENGTH;
1688 sep = find_local_sep_by_seid(session, req->acp_seid);
1690 err = AVDTP_BAD_ACP_SEID;
1694 if (!sep->ind->get_capability(session, sep, get_all, &caps,
1695 &err, sep->user_data))
1698 for (l = caps, rsp_size = 0; l != NULL; l = g_slist_next(l)) {
1699 struct avdtp_service_capability *cap = l->data;
1701 if (rsp_size + cap->length + 2 > sizeof(buf))
1704 memcpy(ptr, cap, cap->length + 2);
1705 rsp_size += cap->length + 2;
1706 ptr += cap->length + 2;
1713 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT, cmd,
1717 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT, cmd,
1721 static void setconf_cb(struct avdtp *session, struct avdtp_stream *stream,
1722 struct avdtp_error *err)
1724 struct conf_rej rej;
1725 struct avdtp_local_sep *sep;
1728 rej.error = AVDTP_UNSUPPORTED_CONFIGURATION;
1729 rej.category = err->err.error_code;
1730 avdtp_send(session, session->in.transaction,
1731 AVDTP_MSG_TYPE_REJECT, AVDTP_SET_CONFIGURATION,
1733 stream_free(stream);
1737 if (!avdtp_send(session, session->in.transaction, AVDTP_MSG_TYPE_ACCEPT,
1738 AVDTP_SET_CONFIGURATION, NULL, 0)) {
1739 stream_free(stream);
1744 sep->stream = stream;
1745 sep->info.inuse = 1;
1746 session->streams = g_slist_append(session->streams, stream);
1748 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
1751 static gboolean avdtp_setconf_cmd(struct avdtp *session, uint8_t transaction,
1752 struct setconf_req *req, unsigned int size)
1754 struct conf_rej rej;
1755 struct avdtp_local_sep *sep;
1756 struct avdtp_stream *stream;
1757 uint8_t err, category = 0x00;
1758 struct btd_service *service;
1761 if (size < sizeof(struct setconf_req)) {
1762 error("Too short getcap request");
1766 sep = find_local_sep_by_seid(session, req->acp_seid);
1768 err = AVDTP_BAD_ACP_SEID;
1773 err = AVDTP_SEP_IN_USE;
1777 switch (sep->info.type) {
1778 case AVDTP_SEP_TYPE_SOURCE:
1779 service = btd_device_get_service(session->device,
1781 if (service == NULL) {
1782 btd_device_add_uuid(session->device, A2DP_SINK_UUID);
1783 service = btd_device_get_service(session->device,
1785 if (service == NULL) {
1786 error("Unable to get a audio sink object");
1787 err = AVDTP_BAD_STATE;
1792 case AVDTP_SEP_TYPE_SINK:
1793 service = btd_device_get_service(session->device,
1795 if (service == NULL) {
1796 btd_device_add_uuid(session->device, A2DP_SOURCE_UUID);
1797 service = btd_device_get_service(session->device,
1799 if (service == NULL) {
1800 error("Unable to get a audio source object");
1801 err = AVDTP_BAD_STATE;
1808 stream = g_new0(struct avdtp_stream, 1);
1809 stream->session = session;
1811 stream->rseid = req->int_seid;
1812 stream->caps = caps_to_list(req->caps,
1813 size - sizeof(struct setconf_req),
1815 &stream->delay_reporting);
1817 /* Verify that the Media Transport capability's length = 0. Reject otherwise */
1818 for (l = stream->caps; l != NULL; l = g_slist_next(l)) {
1819 struct avdtp_service_capability *cap = l->data;
1821 if (cap->category == AVDTP_MEDIA_TRANSPORT && cap->length != 0) {
1822 err = AVDTP_BAD_MEDIA_TRANSPORT_FORMAT;
1827 if (stream->delay_reporting && session->version < 0x0103)
1828 session->version = 0x0103;
1830 if (sep->ind && sep->ind->set_configuration) {
1831 if (!sep->ind->set_configuration(session, sep, stream,
1835 err = AVDTP_UNSUPPORTED_CONFIGURATION;
1840 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1841 AVDTP_SET_CONFIGURATION, NULL, 0)) {
1842 stream_free(stream);
1846 sep->stream = stream;
1847 sep->info.inuse = 1;
1848 session->streams = g_slist_append(session->streams, stream);
1850 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
1856 stream_free(stream);
1859 rej.category = category;
1860 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1861 AVDTP_SET_CONFIGURATION, &rej, sizeof(rej));
1864 static gboolean avdtp_getconf_cmd(struct avdtp *session, uint8_t transaction,
1865 struct seid_req *req, int size)
1868 struct avdtp_local_sep *sep = NULL;
1874 if (size < (int) sizeof(struct seid_req)) {
1875 error("Too short getconf request");
1879 memset(buf, 0, sizeof(buf));
1881 sep = find_local_sep_by_seid(session, req->acp_seid);
1883 err = AVDTP_BAD_ACP_SEID;
1886 if (!sep->stream || !sep->stream->caps) {
1887 err = AVDTP_UNSUPPORTED_CONFIGURATION;
1891 for (l = sep->stream->caps, rsp_size = 0; l != NULL; l = g_slist_next(l)) {
1892 struct avdtp_service_capability *cap = l->data;
1894 if (rsp_size + cap->length + 2 > (int) sizeof(buf))
1897 memcpy(ptr, cap, cap->length + 2);
1898 rsp_size += cap->length + 2;
1899 ptr += cap->length + 2;
1902 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1903 AVDTP_GET_CONFIGURATION, buf, rsp_size);
1906 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1907 AVDTP_GET_CONFIGURATION, &err, sizeof(err));
1910 static gboolean avdtp_reconf_cmd(struct avdtp *session, uint8_t transaction,
1911 struct seid_req *req, int size)
1913 struct conf_rej rej;
1915 rej.error = AVDTP_NOT_SUPPORTED_COMMAND;
1916 rej.category = 0x00;
1918 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1919 AVDTP_RECONFIGURE, &rej, sizeof(rej));
1922 static void check_seid_collision(struct pending_req *req, uint8_t id)
1924 struct seid_req *seid = req->data;
1926 if (seid->acp_seid == id)
1927 req->collided = TRUE;
1930 static void check_start_collision(struct pending_req *req, uint8_t id)
1932 struct start_req *start = req->data;
1933 struct seid *seid = &start->first_seid;
1934 int count = 1 + req->data_size - sizeof(struct start_req);
1937 for (i = 0; i < count; i++, seid++) {
1938 if (seid->seid == id) {
1939 req->collided = TRUE;
1945 static void check_suspend_collision(struct pending_req *req, uint8_t id)
1947 struct suspend_req *suspend = req->data;
1948 struct seid *seid = &suspend->first_seid;
1949 int count = 1 + req->data_size - sizeof(struct suspend_req);
1952 for (i = 0; i < count; i++, seid++) {
1953 if (seid->seid == id) {
1954 req->collided = TRUE;
1960 static void avdtp_check_collision(struct avdtp *session, uint8_t cmd,
1961 struct avdtp_stream *stream)
1963 struct pending_req *req = session->req;
1965 if (req == NULL || (req->signal_id != cmd && cmd != AVDTP_ABORT))
1968 if (cmd == AVDTP_ABORT)
1969 cmd = req->signal_id;
1974 check_seid_collision(req, stream->rseid);
1977 check_start_collision(req, stream->rseid);
1980 check_suspend_collision(req, stream->rseid);
1985 static gboolean avdtp_open_cmd(struct avdtp *session, uint8_t transaction,
1986 struct seid_req *req, unsigned int size)
1988 struct avdtp_local_sep *sep;
1989 struct avdtp_stream *stream;
1992 if (size < sizeof(struct seid_req)) {
1993 error("Too short abort request");
1997 sep = find_local_sep_by_seid(session, req->acp_seid);
1999 err = AVDTP_BAD_ACP_SEID;
2003 if (sep->state != AVDTP_STATE_CONFIGURED) {
2004 err = AVDTP_BAD_STATE;
2008 stream = sep->stream;
2010 if (sep->ind && sep->ind->open) {
2011 if (!sep->ind->open(session, sep, stream, &err,
2016 avdtp_check_collision(session, AVDTP_OPEN, stream);
2018 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2019 AVDTP_OPEN, NULL, 0))
2022 stream->open_acp = TRUE;
2023 session->pending_open = stream;
2024 stream->timer = g_timeout_add_seconds(REQ_TIMEOUT,
2025 stream_open_timeout,
2031 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2032 AVDTP_OPEN, &err, sizeof(err));
2035 static gboolean avdtp_start_cmd(struct avdtp *session, uint8_t transaction,
2036 struct start_req *req, unsigned int size)
2038 struct avdtp_local_sep *sep;
2039 struct avdtp_stream *stream;
2040 struct stream_rej rej;
2042 uint8_t err, failed_seid;
2045 if (size < sizeof(struct start_req)) {
2046 error("Too short start request");
2050 seid_count = 1 + size - sizeof(struct start_req);
2052 seid = &req->first_seid;
2054 for (i = 0; i < seid_count; i++, seid++) {
2055 failed_seid = seid->seid;
2057 sep = find_local_sep_by_seid(session, seid->seid);
2058 if (!sep || !sep->stream) {
2059 err = AVDTP_BAD_ACP_SEID;
2063 stream = sep->stream;
2065 /* Also reject start cmd if state is not open */
2066 if (sep->state != AVDTP_STATE_OPEN) {
2067 err = AVDTP_BAD_STATE;
2070 stream->starting = TRUE;
2072 if (sep->ind && sep->ind->start) {
2073 if (!sep->ind->start(session, sep, stream, &err,
2078 avdtp_check_collision(session, AVDTP_START, stream);
2080 avdtp_sep_set_state(session, sep, AVDTP_STATE_STREAMING);
2083 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2084 AVDTP_START, NULL, 0);
2087 DBG("Rejecting (%d)", err);
2088 memset(&rej, 0, sizeof(rej));
2089 rej.acp_seid = failed_seid;
2091 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2092 AVDTP_START, &rej, sizeof(rej));
2095 static gboolean avdtp_close_cmd(struct avdtp *session, uint8_t transaction,
2096 struct seid_req *req, unsigned int size)
2098 struct avdtp_local_sep *sep;
2099 struct avdtp_stream *stream;
2102 if (size < sizeof(struct seid_req)) {
2103 error("Too short close request");
2107 sep = find_local_sep_by_seid(session, req->acp_seid);
2108 if (!sep || !sep->stream) {
2109 err = AVDTP_BAD_ACP_SEID;
2113 if (sep->state != AVDTP_STATE_OPEN &&
2114 sep->state != AVDTP_STATE_STREAMING) {
2115 err = AVDTP_BAD_STATE;
2119 stream = sep->stream;
2121 if (sep->ind && sep->ind->close) {
2122 if (!sep->ind->close(session, sep, stream, &err,
2127 avdtp_check_collision(session, AVDTP_CLOSE, stream);
2129 avdtp_sep_set_state(session, sep, AVDTP_STATE_CLOSING);
2131 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2132 AVDTP_CLOSE, NULL, 0))
2135 stream->timer = g_timeout_add_seconds(REQ_TIMEOUT,
2136 stream_close_timeout,
2142 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2143 AVDTP_CLOSE, &err, sizeof(err));
2146 static gboolean avdtp_suspend_cmd(struct avdtp *session, uint8_t transaction,
2147 struct suspend_req *req, unsigned int size)
2149 struct avdtp_local_sep *sep;
2150 struct avdtp_stream *stream;
2151 struct stream_rej rej;
2153 uint8_t err, failed_seid;
2156 if (size < sizeof(struct suspend_req)) {
2157 error("Too short suspend request");
2161 seid_count = 1 + size - sizeof(struct suspend_req);
2163 seid = &req->first_seid;
2165 for (i = 0; i < seid_count; i++, seid++) {
2166 failed_seid = seid->seid;
2168 sep = find_local_sep_by_seid(session, seid->seid);
2169 if (!sep || !sep->stream) {
2170 err = AVDTP_BAD_ACP_SEID;
2174 stream = sep->stream;
2176 if (sep->state != AVDTP_STATE_STREAMING) {
2177 err = AVDTP_BAD_STATE;
2181 if (sep->ind && sep->ind->suspend) {
2182 if (!sep->ind->suspend(session, sep, stream, &err,
2187 avdtp_check_collision(session, AVDTP_SUSPEND, stream);
2189 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
2192 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2193 AVDTP_SUSPEND, NULL, 0);
2196 memset(&rej, 0, sizeof(rej));
2197 rej.acp_seid = failed_seid;
2199 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2200 AVDTP_SUSPEND, &rej, sizeof(rej));
2203 static gboolean avdtp_abort_cmd(struct avdtp *session, uint8_t transaction,
2204 struct seid_req *req, unsigned int size)
2206 struct avdtp_local_sep *sep;
2210 if (size < sizeof(struct seid_req)) {
2211 error("Too short abort request");
2215 sep = find_local_sep_by_seid(session, req->acp_seid);
2216 if (!sep || !sep->stream)
2219 if (sep->ind && sep->ind->abort)
2220 sep->ind->abort(session, sep, sep->stream, &err,
2223 avdtp_check_collision(session, AVDTP_ABORT, sep->stream);
2225 ret = avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2226 AVDTP_ABORT, NULL, 0);
2228 avdtp_sep_set_state(session, sep, AVDTP_STATE_ABORTING);
2233 static gboolean avdtp_secctl_cmd(struct avdtp *session, uint8_t transaction,
2234 struct seid_req *req, int size)
2236 return avdtp_unknown_cmd(session, transaction, AVDTP_SECURITY_CONTROL);
2239 static gboolean avdtp_delayreport_cmd(struct avdtp *session,
2240 uint8_t transaction,
2241 struct delay_req *req,
2244 struct avdtp_local_sep *sep;
2245 struct avdtp_stream *stream;
2248 if (size < sizeof(struct delay_req)) {
2249 error("Too short delay report request");
2253 sep = find_local_sep_by_seid(session, req->acp_seid);
2254 if (!sep || !sep->stream) {
2255 err = AVDTP_BAD_ACP_SEID;
2259 stream = sep->stream;
2261 if (sep->state != AVDTP_STATE_CONFIGURED &&
2262 sep->state != AVDTP_STATE_STREAMING) {
2263 err = AVDTP_BAD_STATE;
2267 stream->delay = ntohs(req->delay);
2269 if (sep->ind && sep->ind->delayreport) {
2270 if (!sep->ind->delayreport(session, sep, stream->rseid,
2271 stream->delay, &err,
2276 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2277 AVDTP_DELAY_REPORT, NULL, 0);
2280 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2281 AVDTP_DELAY_REPORT, &err, sizeof(err));
2284 static gboolean avdtp_parse_cmd(struct avdtp *session, uint8_t transaction,
2285 uint8_t signal_id, void *buf, int size)
2287 switch (signal_id) {
2288 case AVDTP_DISCOVER:
2289 DBG("Received DISCOVER_CMD");
2290 return avdtp_discover_cmd(session, transaction, buf, size);
2291 case AVDTP_GET_CAPABILITIES:
2292 DBG("Received GET_CAPABILITIES_CMD");
2293 return avdtp_getcap_cmd(session, transaction, buf, size,
2295 case AVDTP_GET_ALL_CAPABILITIES:
2296 DBG("Received GET_ALL_CAPABILITIES_CMD");
2297 return avdtp_getcap_cmd(session, transaction, buf, size, TRUE);
2298 case AVDTP_SET_CONFIGURATION:
2299 DBG("Received SET_CONFIGURATION_CMD");
2300 return avdtp_setconf_cmd(session, transaction, buf, size);
2301 case AVDTP_GET_CONFIGURATION:
2302 DBG("Received GET_CONFIGURATION_CMD");
2303 return avdtp_getconf_cmd(session, transaction, buf, size);
2304 case AVDTP_RECONFIGURE:
2305 DBG("Received RECONFIGURE_CMD");
2306 return avdtp_reconf_cmd(session, transaction, buf, size);
2308 DBG("Received OPEN_CMD");
2309 return avdtp_open_cmd(session, transaction, buf, size);
2311 DBG("Received START_CMD");
2312 return avdtp_start_cmd(session, transaction, buf, size);
2314 DBG("Received CLOSE_CMD");
2315 return avdtp_close_cmd(session, transaction, buf, size);
2317 DBG("Received SUSPEND_CMD");
2318 return avdtp_suspend_cmd(session, transaction, buf, size);
2320 DBG("Received ABORT_CMD");
2321 return avdtp_abort_cmd(session, transaction, buf, size);
2322 case AVDTP_SECURITY_CONTROL:
2323 DBG("Received SECURITY_CONTROL_CMD");
2324 return avdtp_secctl_cmd(session, transaction, buf, size);
2325 case AVDTP_DELAY_REPORT:
2326 DBG("Received DELAY_REPORT_CMD");
2327 return avdtp_delayreport_cmd(session, transaction, buf, size);
2329 DBG("Received unknown request id %u", signal_id);
2330 return avdtp_unknown_cmd(session, transaction, signal_id);
2334 enum avdtp_parse_result { PARSE_ERROR, PARSE_FRAGMENT, PARSE_SUCCESS };
2336 static enum avdtp_parse_result avdtp_parse_data(struct avdtp *session,
2337 void *buf, size_t size)
2339 struct avdtp_common_header *header = buf;
2340 struct avdtp_single_header *single = (void *) session->buf;
2341 struct avdtp_start_header *start = (void *) session->buf;
2345 switch (header->packet_type) {
2346 case AVDTP_PKT_TYPE_SINGLE:
2347 if (size < sizeof(*single)) {
2348 error("Received too small single packet (%zu bytes)", size);
2351 if (session->in.active) {
2352 error("SINGLE: Invalid AVDTP packet fragmentation");
2356 payload = session->buf + sizeof(*single);
2357 payload_size = size - sizeof(*single);
2359 session->in.active = TRUE;
2360 session->in.data_size = 0;
2361 session->in.no_of_packets = 1;
2362 session->in.transaction = header->transaction;
2363 session->in.message_type = header->message_type;
2364 session->in.signal_id = single->signal_id;
2367 case AVDTP_PKT_TYPE_START:
2368 if (size < sizeof(*start)) {
2369 error("Received too small start packet (%zu bytes)", size);
2372 if (session->in.active) {
2373 error("START: Invalid AVDTP packet fragmentation");
2377 session->in.active = TRUE;
2378 session->in.data_size = 0;
2379 session->in.transaction = header->transaction;
2380 session->in.message_type = header->message_type;
2381 session->in.no_of_packets = start->no_of_packets;
2382 session->in.signal_id = start->signal_id;
2384 payload = session->buf + sizeof(*start);
2385 payload_size = size - sizeof(*start);
2388 case AVDTP_PKT_TYPE_CONTINUE:
2389 if (size < sizeof(struct avdtp_continue_header)) {
2390 error("Received too small continue packet (%zu bytes)",
2394 if (!session->in.active) {
2395 error("CONTINUE: Invalid AVDTP packet fragmentation");
2398 if (session->in.transaction != header->transaction) {
2399 error("Continue transaction id doesn't match");
2402 if (session->in.no_of_packets <= 1) {
2403 error("Too few continue packets");
2407 payload = session->buf + sizeof(struct avdtp_continue_header);
2408 payload_size = size - sizeof(struct avdtp_continue_header);
2411 case AVDTP_PKT_TYPE_END:
2412 if (size < sizeof(struct avdtp_continue_header)) {
2413 error("Received too small end packet (%zu bytes)", size);
2416 if (!session->in.active) {
2417 error("END: Invalid AVDTP packet fragmentation");
2420 if (session->in.transaction != header->transaction) {
2421 error("End transaction id doesn't match");
2424 if (session->in.no_of_packets > 1) {
2425 error("Got an end packet too early");
2429 payload = session->buf + sizeof(struct avdtp_continue_header);
2430 payload_size = size - sizeof(struct avdtp_continue_header);
2434 error("Invalid AVDTP packet type 0x%02X", header->packet_type);
2438 if (session->in.data_size + payload_size >
2439 sizeof(session->in.buf)) {
2440 error("Not enough incoming buffer space!");
2444 memcpy(session->in.buf + session->in.data_size, payload, payload_size);
2445 session->in.data_size += payload_size;
2447 if (session->in.no_of_packets > 1) {
2448 session->in.no_of_packets--;
2449 DBG("Received AVDTP fragment. %d to go",
2450 session->in.no_of_packets);
2451 return PARSE_FRAGMENT;
2454 session->in.active = FALSE;
2456 return PARSE_SUCCESS;
2459 static gboolean session_cb(GIOChannel *chan, GIOCondition cond,
2462 struct avdtp *session = data;
2463 struct avdtp_common_header *header;
2469 if (cond & G_IO_NVAL)
2472 header = (void *) session->buf;
2474 if (cond & (G_IO_HUP | G_IO_ERR))
2477 fd = g_io_channel_unix_get_fd(chan);
2478 size = read(fd, session->buf, session->imtu);
2480 error("IO Channel read error");
2484 if ((size_t) size < sizeof(struct avdtp_common_header)) {
2485 error("Received too small packet (%zu bytes)", size);
2489 switch (avdtp_parse_data(session, session->buf, size)) {
2492 case PARSE_FRAGMENT:
2498 if (session->in.message_type == AVDTP_MSG_TYPE_COMMAND) {
2499 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
2500 struct btd_service *service;
2502 service = btd_device_get_service(session->device, A2DP_SINK_UUID);
2503 if (service != NULL) {
2504 DBG("A2dp state %d", btd_service_get_state(
2505 btd_device_get_service(session->device, A2DP_SINK_UUID)));
2507 if (btd_service_get_state(btd_device_get_service(session->device,
2508 A2DP_SINK_UUID)) == BTD_SERVICE_STATE_DISCONNECTING) {
2509 DBG("avdtp:%p , disconnect timer is going on", session);
2514 if (!avdtp_parse_cmd(session, session->in.transaction,
2515 session->in.signal_id,
2517 session->in.data_size)) {
2518 error("Unable to handle command. Disconnecting");
2522 if (session->req && session->req->collided) {
2523 DBG("Collision detected");
2530 if (session->req == NULL) {
2531 error("No pending request, ignoring message");
2535 if (header->transaction != session->req->transaction) {
2536 error("Transaction label doesn't match");
2540 if (session->in.signal_id != session->req->signal_id) {
2541 error("Response signal doesn't match");
2545 g_source_remove(session->req->timeout);
2546 session->req->timeout = 0;
2548 switch (header->message_type) {
2549 case AVDTP_MSG_TYPE_ACCEPT:
2550 if (!avdtp_parse_resp(session, session->req->stream,
2551 session->in.transaction,
2552 session->in.signal_id,
2554 session->in.data_size)) {
2555 error("Unable to parse accept response");
2559 case AVDTP_MSG_TYPE_REJECT:
2560 if (!avdtp_parse_rej(session, session->req->stream,
2561 session->in.transaction,
2562 session->in.signal_id,
2564 session->in.data_size)) {
2565 error("Unable to parse reject response");
2569 case AVDTP_MSG_TYPE_GEN_REJECT:
2570 error("Received a General Reject message");
2573 error("Unknown message type 0x%02X", header->message_type);
2578 pending_req_free(session->req);
2579 session->req = NULL;
2581 process_queue(session);
2586 connection_lost(session, EIO);
2591 static uint16_t get_version(struct avdtp *session)
2593 const sdp_record_t *rec;
2595 sdp_data_t *proto_desc;
2596 uint16_t ver = 0x0100;
2598 rec = btd_device_get_record(session->device, A2DP_SINK_UUID);
2600 rec = btd_device_get_record(session->device, A2DP_SOURCE_UUID);
2605 if (sdp_get_access_protos(rec, &protos) < 0)
2608 proto_desc = sdp_get_proto_desc(protos, AVDTP_UUID);
2609 if (proto_desc && proto_desc->dtd == SDP_UINT16)
2610 ver = proto_desc->val.uint16;
2612 sdp_list_foreach(protos, (sdp_list_func_t) sdp_list_free, NULL);
2613 sdp_list_free(protos, NULL);
2618 static void avdtp_connect_cb(GIOChannel *chan, GError *err, gpointer user_data)
2620 struct avdtp *session = user_data;
2623 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2624 struct btd_adapter *adapter;
2625 adapter = avdtp_get_adapter(session);
2630 error("%s", err->message);
2635 session->io = g_io_channel_ref(chan);
2637 bt_io_get(chan, &err,
2638 BT_IO_OPT_OMTU, &session->omtu,
2639 BT_IO_OPT_IMTU, &session->imtu,
2643 error("%s", err->message);
2647 ba2str(device_get_address(session->device), address);
2648 DBG("AVDTP: connected %s channel to %s",
2649 session->pending_open ? "transport" : "signaling",
2652 if (session->state == AVDTP_SESSION_STATE_CONNECTING) {
2653 DBG("AVDTP imtu=%u, omtu=%u", session->imtu, session->omtu);
2655 session->buf = g_malloc0(MAX(session->imtu, session->omtu));
2656 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTED);
2659 g_source_remove(session->io_id);
2661 /* This watch should be low priority since otherwise the
2662 * connect callback might be dispatched before the session
2663 * callback if the kernel wakes us up at the same time for
2664 * them. This could happen if a headset is very quick in
2665 * sending the Start command after connecting the stream
2666 * transport channel.
2668 session->io_id = g_io_add_watch_full(chan,
2670 G_IO_IN | G_IO_ERR | G_IO_HUP
2672 (GIOFunc) session_cb, session,
2675 if (session->stream_setup) {
2676 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2677 if (btd_adapter_get_a2dp_role(adapter) == BLUETOOTH_A2DP_SINK_ROLE)
2678 set_disconnect_timer_for_sink(session, FALSE);
2680 set_disconnect_timer(session);
2682 set_disconnect_timer(session);
2685 } else if (session->pending_open)
2686 handle_transport_connect(session, chan, session->imtu,
2691 process_queue(session);
2696 if (session->pending_open) {
2697 struct avdtp_stream *stream = session->pending_open;
2699 handle_transport_connect(session, NULL, 0, 0);
2701 if (avdtp_abort(session, stream) < 0)
2702 avdtp_sep_set_state(session, stream->lsep,
2705 connection_lost(session, err_no);
2708 struct avdtp *avdtp_new(GIOChannel *chan, struct btd_device *device,
2709 struct queue *lseps)
2711 struct avdtp *session;
2713 session = g_new0(struct avdtp, 1);
2715 session->device = btd_device_ref(device);
2716 /* We don't use avdtp_set_state() here since this isn't a state change
2717 * but just setting of the initial state */
2718 session->state = AVDTP_SESSION_STATE_DISCONNECTED;
2719 session->lseps = lseps;
2721 session->version = get_version(session);
2726 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTING);
2728 btd_device_add_uuid(device, ADVANCED_AUDIO_UUID);
2730 session->io = g_io_channel_ref(chan);
2731 session->io_id = g_io_add_watch(chan, G_IO_ERR | G_IO_HUP | G_IO_NVAL,
2732 (GIOFunc) session_cb, session);
2734 /* This is so that avdtp_connect_cb will know to do the right thing
2735 * with respect to the disconnect timer */
2736 session->stream_setup = TRUE;
2738 avdtp_connect_cb(chan, NULL, session);
2743 static GIOChannel *l2cap_connect(struct avdtp *session)
2747 const bdaddr_t *src;
2748 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2749 struct btd_adapter *adapter;
2750 adapter = avdtp_get_adapter(session);
2753 src = btd_adapter_get_address(device_get_adapter(session->device));
2755 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2756 if (btd_adapter_get_a2dp_role(adapter) == BLUETOOTH_A2DP_SINK_ROLE) {
2757 io = bt_io_connect(avdtp_connect_cb, session,
2759 BT_IO_OPT_SOURCE_BDADDR, src,
2760 BT_IO_OPT_DEST_BDADDR,
2761 device_get_address(session->device),
2762 BT_IO_OPT_PSM, AVDTP_PSM,
2763 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2764 BT_IO_OPT_IMTU, 895,
2767 io = bt_io_connect(avdtp_connect_cb, session,
2769 BT_IO_OPT_SOURCE_BDADDR, src,
2770 BT_IO_OPT_DEST_BDADDR,
2771 device_get_address(session->device),
2772 BT_IO_OPT_PSM, AVDTP_PSM,
2773 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2777 io = bt_io_connect(avdtp_connect_cb, session,
2779 BT_IO_OPT_SOURCE_BDADDR, src,
2780 BT_IO_OPT_DEST_BDADDR,
2781 device_get_address(session->device),
2782 BT_IO_OPT_PSM, AVDTP_PSM,
2783 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2788 error("%s", err->message);
2796 static void queue_request(struct avdtp *session, struct pending_req *req,
2800 session->prio_queue = g_slist_append(session->prio_queue, req);
2802 session->req_queue = g_slist_append(session->req_queue, req);
2805 static uint8_t req_get_seid(struct pending_req *req)
2807 if (req->signal_id == AVDTP_DISCOVER)
2810 return ((struct seid_req *) (req->data))->acp_seid;
2813 static int cancel_request(struct avdtp *session, int err)
2815 struct pending_req *req;
2816 struct seid_req sreq;
2817 struct avdtp_local_sep *lsep;
2818 struct avdtp_stream *stream;
2820 struct avdtp_error averr;
2823 session->req = NULL;
2825 avdtp_error_init(&averr, AVDTP_ERRNO, err);
2827 seid = req_get_seid(req);
2829 stream = find_stream_by_rseid(session, seid);
2834 stream->abort_int = TRUE;
2835 lsep = stream->lsep;
2839 switch (req->signal_id) {
2840 case AVDTP_RECONFIGURE:
2841 error("Reconfigure: %s (%d)", strerror(err), err);
2842 if (lsep && lsep->cfm && lsep->cfm->reconfigure)
2843 lsep->cfm->reconfigure(session, lsep, stream, &averr,
2847 error("Open: %s (%d)", strerror(err), err);
2848 if (lsep && lsep->cfm && lsep->cfm->open)
2849 lsep->cfm->open(session, lsep, stream, &averr,
2853 error("Start: %s (%d)", strerror(err), err);
2854 if (lsep && lsep->cfm && lsep->cfm->start) {
2855 lsep->cfm->start(session, lsep, stream, &averr,
2858 stream->starting = FALSE;
2862 error("Suspend: %s (%d)", strerror(err), err);
2863 if (lsep && lsep->cfm && lsep->cfm->suspend)
2864 lsep->cfm->suspend(session, lsep, stream, &averr,
2868 error("Close: %s (%d)", strerror(err), err);
2869 if (lsep && lsep->cfm && lsep->cfm->close) {
2870 lsep->cfm->close(session, lsep, stream, &averr,
2873 stream->close_int = FALSE;
2876 case AVDTP_SET_CONFIGURATION:
2877 error("SetConfiguration: %s (%d)", strerror(err), err);
2878 if (lsep && lsep->cfm && lsep->cfm->set_configuration)
2879 lsep->cfm->set_configuration(session, lsep, stream,
2880 &averr, lsep->user_data);
2882 case AVDTP_DISCOVER:
2883 error("Discover: %s (%d)", strerror(err), err);
2885 case AVDTP_GET_CAPABILITIES:
2886 error("GetCapabilities: %s (%d)", strerror(err), err);
2889 error("Abort: %s (%d)", strerror(err), err);
2896 memset(&sreq, 0, sizeof(sreq));
2897 sreq.acp_seid = seid;
2899 err = send_request(session, TRUE, stream, AVDTP_ABORT, &sreq,
2902 error("Unable to send abort request");
2909 connection_lost(session, err);
2911 pending_req_free(req);
2915 static gboolean request_timeout(gpointer user_data)
2917 struct avdtp *session = user_data;
2919 cancel_request(session, ETIMEDOUT);
2924 static int send_req(struct avdtp *session, gboolean priority,
2925 struct pending_req *req)
2927 static int transaction = 0;
2930 if (session->state == AVDTP_SESSION_STATE_DISCONNECTED) {
2931 session->io = l2cap_connect(session);
2936 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTING);
2939 if (session->state < AVDTP_SESSION_STATE_CONNECTED ||
2940 session->req != NULL) {
2941 queue_request(session, req, priority);
2945 req->transaction = transaction++;
2948 /* FIXME: Should we retry to send if the buffer
2949 was not totally sent or in case of EINTR? */
2950 if (!avdtp_send(session, req->transaction, AVDTP_MSG_TYPE_COMMAND,
2951 req->signal_id, req->data, req->data_size)) {
2958 req->timeout = g_timeout_add_seconds(req->signal_id == AVDTP_ABORT ?
2959 ABORT_TIMEOUT : REQ_TIMEOUT,
2970 static int send_request(struct avdtp *session, gboolean priority,
2971 struct avdtp_stream *stream, uint8_t signal_id,
2972 void *buffer, size_t size)
2974 struct pending_req *req;
2976 if (stream && stream->abort_int && signal_id != AVDTP_ABORT) {
2977 DBG("Unable to send requests while aborting");
2981 req = g_new0(struct pending_req, 1);
2982 req->signal_id = signal_id;
2983 req->data = g_malloc(size);
2984 memcpy(req->data, buffer, size);
2985 req->data_size = size;
2986 req->stream = stream;
2988 return send_req(session, priority, req);
2991 static gboolean avdtp_discover_resp(struct avdtp *session,
2992 struct discover_resp *resp, int size)
2997 gboolean getcap_pending = FALSE;
2999 if (session->version >= 0x0103)
3000 getcap_cmd = AVDTP_GET_ALL_CAPABILITIES;
3002 getcap_cmd = AVDTP_GET_CAPABILITIES;
3004 sep_count = size / sizeof(struct seid_info);
3006 for (i = 0; i < sep_count; i++) {
3007 struct avdtp_remote_sep *sep;
3008 struct avdtp_stream *stream;
3009 struct seid_req req;
3011 DBG("seid %d type %d media %d in use %d",
3012 resp->seps[i].seid, resp->seps[i].type,
3013 resp->seps[i].media_type, resp->seps[i].inuse);
3015 stream = find_stream_by_rseid(session, resp->seps[i].seid);
3017 sep = find_remote_sep(session->seps, resp->seps[i].seid);
3019 if (resp->seps[i].inuse && !stream)
3021 sep = g_new0(struct avdtp_remote_sep, 1);
3022 session->seps = g_slist_append(session->seps, sep);
3025 sep->stream = stream;
3026 sep->seid = resp->seps[i].seid;
3027 sep->type = resp->seps[i].type;
3028 sep->media_type = resp->seps[i].media_type;
3030 memset(&req, 0, sizeof(req));
3031 req.acp_seid = sep->seid;
3033 ret = send_request(session, TRUE, NULL, getcap_cmd,
3037 getcap_pending = TRUE;
3040 if (!getcap_pending)
3041 finalize_discovery(session, -ret);
3046 static gboolean avdtp_get_capabilities_resp(struct avdtp *session,
3047 struct getcap_resp *resp,
3050 struct avdtp_remote_sep *sep;
3053 /* Check for minimum required packet size includes:
3054 * 1. getcap resp header
3055 * 2. media transport capability (2 bytes)
3056 * 3. media codec capability type + length (2 bytes)
3057 * 4. the actual media codec elements
3059 if (size < (sizeof(struct getcap_resp) + 4 +
3060 sizeof(struct avdtp_media_codec_capability))) {
3061 error("Too short getcap resp packet");
3065 seid = ((struct seid_req *) session->req->data)->acp_seid;
3067 sep = find_remote_sep(session->seps, seid);
3069 DBG("seid %d type %d media %d", sep->seid,
3070 sep->type, sep->media_type);
3073 g_slist_free_full(sep->caps, g_free);
3076 sep->delay_reporting = FALSE;
3079 sep->caps = caps_to_list(resp->caps, size - sizeof(struct getcap_resp),
3080 &sep->codec, &sep->delay_reporting);
3085 static gboolean avdtp_set_configuration_resp(struct avdtp *session,
3086 struct avdtp_stream *stream,
3087 struct avdtp_single_header *resp,
3090 struct avdtp_local_sep *sep = stream->lsep;
3092 if (sep->cfm && sep->cfm->set_configuration)
3093 sep->cfm->set_configuration(session, sep, stream, NULL,
3096 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
3101 static gboolean avdtp_reconfigure_resp(struct avdtp *session,
3102 struct avdtp_stream *stream,
3103 struct avdtp_single_header *resp, int size)
3108 static gboolean avdtp_open_resp(struct avdtp *session, struct avdtp_stream *stream,
3109 struct seid_rej *resp, int size)
3111 struct avdtp_local_sep *sep = stream->lsep;
3113 stream->io = l2cap_connect(session);
3115 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
3119 session->pending_open = stream;
3124 static gboolean avdtp_start_resp(struct avdtp *session,
3125 struct avdtp_stream *stream,
3126 struct seid_rej *resp, int size)
3128 struct avdtp_local_sep *sep = stream->lsep;
3130 if (sep->cfm && sep->cfm->start)
3131 sep->cfm->start(session, sep, stream, NULL, sep->user_data);
3133 /* We might be in STREAMING already if both sides send START_CMD at the
3134 * same time and the one in SNK role doesn't reject it as it should */
3135 if (sep->state != AVDTP_STATE_STREAMING)
3136 avdtp_sep_set_state(session, sep, AVDTP_STATE_STREAMING);
3141 static gboolean avdtp_close_resp(struct avdtp *session,
3142 struct avdtp_stream *stream,
3143 struct seid_rej *resp, int size)
3145 struct avdtp_local_sep *sep = stream->lsep;
3147 avdtp_sep_set_state(session, sep, AVDTP_STATE_CLOSING);
3149 close_stream(stream);
3154 static gboolean avdtp_suspend_resp(struct avdtp *session,
3155 struct avdtp_stream *stream,
3156 void *data, int size)
3158 struct avdtp_local_sep *sep = stream->lsep;
3160 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
3162 if (sep->cfm && sep->cfm->suspend)
3163 sep->cfm->suspend(session, sep, stream, NULL, sep->user_data);
3168 static gboolean avdtp_abort_resp(struct avdtp *session,
3169 struct avdtp_stream *stream,
3170 struct seid_rej *resp, int size)
3172 struct avdtp_local_sep *sep = stream->lsep;
3173 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
3175 error("Error in getting sep");
3180 avdtp_sep_set_state(session, sep, AVDTP_STATE_ABORTING);
3182 if (sep->cfm && sep->cfm->abort)
3183 sep->cfm->abort(session, sep, stream, NULL, sep->user_data);
3185 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
3190 static gboolean avdtp_delay_report_resp(struct avdtp *session,
3191 struct avdtp_stream *stream,
3192 void *data, int size)
3194 struct avdtp_local_sep *sep = stream->lsep;
3196 if (sep->cfm && sep->cfm->delay_report)
3197 sep->cfm->delay_report(session, sep, stream, NULL, sep->user_data);
3202 static gboolean avdtp_parse_resp(struct avdtp *session,
3203 struct avdtp_stream *stream,
3204 uint8_t transaction, uint8_t signal_id,
3205 void *buf, int size)
3207 struct pending_req *next;
3208 const char *get_all = "";
3210 if (session->prio_queue)
3211 next = session->prio_queue->data;
3212 else if (session->req_queue)
3213 next = session->req_queue->data;
3217 switch (signal_id) {
3218 case AVDTP_DISCOVER:
3219 DBG("DISCOVER request succeeded");
3220 return avdtp_discover_resp(session, buf, size);
3221 case AVDTP_GET_ALL_CAPABILITIES:
3223 case AVDTP_GET_CAPABILITIES:
3224 DBG("GET_%sCAPABILITIES request succeeded", get_all);
3225 if (!avdtp_get_capabilities_resp(session, buf, size))
3227 if (!(next && (next->signal_id == AVDTP_GET_CAPABILITIES ||
3228 next->signal_id == AVDTP_GET_ALL_CAPABILITIES)))
3229 finalize_discovery(session, 0);
3233 /* The remaining commands require an existing stream so bail out
3234 * here if the stream got unexpectedly disconnected */
3236 DBG("AVDTP: stream was closed while waiting for reply");
3240 switch (signal_id) {
3241 case AVDTP_SET_CONFIGURATION:
3242 DBG("SET_CONFIGURATION request succeeded");
3243 return avdtp_set_configuration_resp(session, stream,
3245 case AVDTP_RECONFIGURE:
3246 DBG("RECONFIGURE request succeeded");
3247 return avdtp_reconfigure_resp(session, stream, buf, size);
3249 DBG("OPEN request succeeded");
3250 return avdtp_open_resp(session, stream, buf, size);
3252 DBG("SUSPEND request succeeded");
3253 return avdtp_suspend_resp(session, stream, buf, size);
3255 DBG("START request succeeded");
3256 return avdtp_start_resp(session, stream, buf, size);
3258 DBG("CLOSE request succeeded");
3259 return avdtp_close_resp(session, stream, buf, size);
3261 DBG("ABORT request succeeded");
3262 return avdtp_abort_resp(session, stream, buf, size);
3263 case AVDTP_DELAY_REPORT:
3264 DBG("DELAY_REPORT request succeeded");
3265 return avdtp_delay_report_resp(session, stream, buf, size);
3268 error("Unknown signal id in accept response: %u", signal_id);
3272 static gboolean seid_rej_to_err(struct seid_rej *rej, unsigned int size,
3273 struct avdtp_error *err)
3275 if (size < sizeof(struct seid_rej)) {
3276 error("Too small packet for seid_rej");
3280 avdtp_error_init(err, 0x00, rej->error);
3285 static gboolean conf_rej_to_err(struct conf_rej *rej, unsigned int size,
3286 struct avdtp_error *err)
3288 if (size < sizeof(struct conf_rej)) {
3289 error("Too small packet for conf_rej");
3293 avdtp_error_init(err, rej->category, rej->error);
3298 static gboolean stream_rej_to_err(struct stream_rej *rej, unsigned int size,
3299 struct avdtp_error *err,
3302 if (size < sizeof(struct stream_rej)) {
3303 error("Too small packet for stream_rej");
3307 avdtp_error_init(err, 0x00, rej->error);
3310 *acp_seid = rej->acp_seid;
3315 static gboolean avdtp_parse_rej(struct avdtp *session,
3316 struct avdtp_stream *stream,
3317 uint8_t transaction, uint8_t signal_id,
3318 void *buf, int size)
3320 struct avdtp_error err;
3322 struct avdtp_local_sep *sep = stream ? stream->lsep : NULL;
3324 switch (signal_id) {
3325 case AVDTP_DISCOVER:
3326 if (!seid_rej_to_err(buf, size, &err))
3328 error("DISCOVER request rejected: %s (%d)",
3329 avdtp_strerror(&err), err.err.error_code);
3331 case AVDTP_GET_CAPABILITIES:
3332 case AVDTP_GET_ALL_CAPABILITIES:
3333 if (!seid_rej_to_err(buf, size, &err))
3335 error("GET_CAPABILITIES request rejected: %s (%d)",
3336 avdtp_strerror(&err), err.err.error_code);
3339 if (!seid_rej_to_err(buf, size, &err))
3341 error("OPEN request rejected: %s (%d)",
3342 avdtp_strerror(&err), err.err.error_code);
3343 if (sep && sep->cfm && sep->cfm->open)
3344 sep->cfm->open(session, sep, stream, &err,
3347 case AVDTP_SET_CONFIGURATION:
3348 if (!conf_rej_to_err(buf, size, &err))
3350 error("SET_CONFIGURATION request rejected: %s (%d)",
3351 avdtp_strerror(&err), err.err.error_code);
3352 if (sep && sep->cfm && sep->cfm->set_configuration)
3353 sep->cfm->set_configuration(session, sep, stream,
3354 &err, sep->user_data);
3356 case AVDTP_RECONFIGURE:
3357 if (!conf_rej_to_err(buf, size, &err))
3359 error("RECONFIGURE request rejected: %s (%d)",
3360 avdtp_strerror(&err), err.err.error_code);
3361 if (sep && sep->cfm && sep->cfm->reconfigure)
3362 sep->cfm->reconfigure(session, sep, stream, &err,
3366 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3368 error("START request rejected: %s (%d)",
3369 avdtp_strerror(&err), err.err.error_code);
3370 if (sep && sep->cfm && sep->cfm->start) {
3371 sep->cfm->start(session, sep, stream, &err,
3373 stream->starting = FALSE;
3377 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3379 error("SUSPEND request rejected: %s (%d)",
3380 avdtp_strerror(&err), err.err.error_code);
3381 if (sep && sep->cfm && sep->cfm->suspend)
3382 sep->cfm->suspend(session, sep, stream, &err,
3386 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3388 error("CLOSE request rejected: %s (%d)",
3389 avdtp_strerror(&err), err.err.error_code);
3390 if (sep && sep->cfm && sep->cfm->close) {
3391 sep->cfm->close(session, sep, stream, &err,
3393 stream->close_int = FALSE;
3397 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3399 error("ABORT request rejected: %s (%d)",
3400 avdtp_strerror(&err), err.err.error_code);
3401 if (sep && sep->cfm && sep->cfm->abort)
3402 sep->cfm->abort(session, sep, stream, &err,
3405 case AVDTP_DELAY_REPORT:
3406 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3408 error("DELAY_REPORT request rejected: %s (%d)",
3409 avdtp_strerror(&err), err.err.error_code);
3410 if (sep && sep->cfm && sep->cfm->delay_report)
3411 sep->cfm->delay_report(session, sep, stream, &err,
3415 error("Unknown reject response signal id: %u", signal_id);
3420 struct avdtp_service_capability *avdtp_stream_get_codec(
3421 struct avdtp_stream *stream)
3425 for (l = stream->caps; l; l = l->next) {
3426 struct avdtp_service_capability *cap = l->data;
3428 if (cap->category == AVDTP_MEDIA_CODEC)
3435 static gboolean avdtp_stream_has_capability(struct avdtp_stream *stream,
3436 struct avdtp_service_capability *cap)
3439 struct avdtp_service_capability *stream_cap;
3441 for (l = stream->caps; l; l = g_slist_next(l)) {
3442 stream_cap = l->data;
3444 if (stream_cap->category != cap->category ||
3445 stream_cap->length != cap->length)
3448 if (memcmp(stream_cap->data, cap->data, cap->length) == 0)
3455 gboolean avdtp_stream_has_capabilities(struct avdtp_stream *stream,
3458 for (; caps; caps = g_slist_next(caps)) {
3459 struct avdtp_service_capability *cap = caps->data;
3461 if (!avdtp_stream_has_capability(stream, cap))
3468 struct avdtp_remote_sep *avdtp_stream_get_remote_sep(
3469 struct avdtp_stream *stream)
3473 for (l = stream->session->seps; l; l = l->next) {
3474 struct avdtp_remote_sep *sep = l->data;
3476 if (sep->seid == stream->rseid)
3483 gboolean avdtp_stream_set_transport(struct avdtp_stream *stream, int fd,
3484 size_t imtu, size_t omtu)
3488 if (stream != stream->session->pending_open)
3491 io = g_io_channel_unix_new(fd);
3493 handle_transport_connect(stream->session, io, imtu, omtu);
3495 g_io_channel_unref(io);
3500 gboolean avdtp_stream_get_transport(struct avdtp_stream *stream, int *sock,
3501 uint16_t *imtu, uint16_t *omtu,
3504 if (stream->io == NULL)
3508 *sock = g_io_channel_unix_get_fd(stream->io);
3511 *omtu = stream->omtu;
3514 *imtu = stream->imtu;
3517 *caps = stream->caps;
3522 static int process_queue(struct avdtp *session)
3525 struct pending_req *req;
3530 if (session->prio_queue)
3531 queue = &session->prio_queue;
3533 queue = &session->req_queue;
3541 *queue = g_slist_remove(*queue, req);
3543 return send_req(session, FALSE, req);
3546 struct avdtp_service_capability *avdtp_get_codec(struct avdtp_remote_sep *sep)
3551 struct avdtp_service_capability *avdtp_service_cap_new(uint8_t category,
3552 void *data, int length)
3554 struct avdtp_service_capability *cap;
3556 if (category < AVDTP_MEDIA_TRANSPORT || category > AVDTP_DELAY_REPORTING)
3559 cap = g_malloc(sizeof(struct avdtp_service_capability) + length);
3560 cap->category = category;
3561 cap->length = length;
3562 memcpy(cap->data, data, length);
3567 static gboolean process_discover(gpointer data)
3569 struct avdtp *session = data;
3571 session->discover->id = 0;
3573 finalize_discovery(session, 0);
3578 int avdtp_discover(struct avdtp *session, avdtp_discover_cb_t cb,
3583 if (session->discover)
3586 session->discover = g_new0(struct discover_callback, 1);
3588 if (session->seps) {
3589 session->discover->cb = cb;
3590 session->discover->user_data = user_data;
3591 session->discover->id = g_idle_add(process_discover, session);
3595 err = send_request(session, FALSE, NULL, AVDTP_DISCOVER, NULL, 0);
3597 session->discover->cb = cb;
3598 session->discover->user_data = user_data;
3604 gboolean avdtp_stream_remove_cb(struct avdtp *session,
3605 struct avdtp_stream *stream,
3609 struct stream_callback *cb;
3614 for (cb = NULL, l = stream->callbacks; l != NULL; l = l->next) {
3615 struct stream_callback *tmp = l->data;
3616 if (tmp && tmp->id == id) {
3625 stream->callbacks = g_slist_remove(stream->callbacks, cb);
3631 unsigned int avdtp_stream_add_cb(struct avdtp *session,
3632 struct avdtp_stream *stream,
3633 avdtp_stream_state_cb cb, void *data)
3635 struct stream_callback *stream_cb;
3636 static unsigned int id = 0;
3638 stream_cb = g_new(struct stream_callback, 1);
3640 stream_cb->user_data = data;
3641 stream_cb->id = ++id;
3643 stream->callbacks = g_slist_append(stream->callbacks, stream_cb);
3645 return stream_cb->id;
3648 int avdtp_get_configuration(struct avdtp *session, struct avdtp_stream *stream)
3650 struct seid_req req;
3652 if (session->state < AVDTP_SESSION_STATE_CONNECTED)
3655 memset(&req, 0, sizeof(req));
3656 req.acp_seid = stream->rseid;
3658 return send_request(session, FALSE, stream, AVDTP_GET_CONFIGURATION,
3662 static void copy_capabilities(gpointer data, gpointer user_data)
3664 struct avdtp_service_capability *src_cap = data;
3665 struct avdtp_service_capability *dst_cap;
3666 GSList **l = user_data;
3668 dst_cap = avdtp_service_cap_new(src_cap->category, src_cap->data,
3671 *l = g_slist_append(*l, dst_cap);
3674 int avdtp_set_configuration(struct avdtp *session,
3675 struct avdtp_remote_sep *rsep,
3676 struct avdtp_local_sep *lsep,
3678 struct avdtp_stream **stream)
3680 struct setconf_req *req;
3681 struct avdtp_stream *new_stream;
3684 struct avdtp_service_capability *cap;
3687 if (session->state != AVDTP_SESSION_STATE_CONNECTED)
3690 if (!(lsep && rsep))
3693 DBG("%p: int_seid=%u, acp_seid=%u", session,
3694 lsep->info.seid, rsep->seid);
3696 new_stream = g_new0(struct avdtp_stream, 1);
3697 new_stream->session = session;
3698 new_stream->lsep = lsep;
3699 new_stream->rseid = rsep->seid;
3701 if (rsep->delay_reporting && lsep->delay_reporting) {
3702 struct avdtp_service_capability *delay_reporting;
3704 delay_reporting = avdtp_service_cap_new(AVDTP_DELAY_REPORTING,
3706 caps = g_slist_append(caps, delay_reporting);
3707 new_stream->delay_reporting = TRUE;
3710 g_slist_foreach(caps, copy_capabilities, &new_stream->caps);
3712 /* Calculate total size of request */
3713 for (l = caps, caps_len = 0; l != NULL; l = g_slist_next(l)) {
3715 caps_len += cap->length + 2;
3718 req = g_malloc0(sizeof(struct setconf_req) + caps_len);
3720 req->int_seid = lsep->info.seid;
3721 req->acp_seid = rsep->seid;
3723 /* Copy the capabilities into the request */
3724 for (l = caps, ptr = req->caps; l != NULL; l = g_slist_next(l)) {
3726 memcpy(ptr, cap, cap->length + 2);
3727 ptr += cap->length + 2;
3730 err = send_request(session, FALSE, new_stream,
3731 AVDTP_SET_CONFIGURATION, req,
3732 sizeof(struct setconf_req) + caps_len);
3734 stream_free(new_stream);
3736 lsep->info.inuse = 1;
3737 lsep->stream = new_stream;
3738 rsep->stream = new_stream;
3739 session->streams = g_slist_append(session->streams, new_stream);
3741 *stream = new_stream;
3749 int avdtp_open(struct avdtp *session, struct avdtp_stream *stream)
3751 struct seid_req req;
3753 if (!g_slist_find(session->streams, stream))
3756 if (stream->lsep->state > AVDTP_STATE_CONFIGURED)
3759 memset(&req, 0, sizeof(req));
3760 req.acp_seid = stream->rseid;
3762 return send_request(session, FALSE, stream, AVDTP_OPEN,
3766 static gboolean start_timeout(gpointer user_data)
3768 struct avdtp_stream *stream = user_data;
3769 struct avdtp *session = stream->session;
3771 stream->open_acp = FALSE;
3773 if (avdtp_start(session, stream) < 0)
3774 error("wait_timeout: avdtp_start failed");
3776 stream->start_timer = 0;
3781 int avdtp_start(struct avdtp *session, struct avdtp_stream *stream)
3783 struct start_req req;
3786 if (!g_slist_find(session->streams, stream))
3789 if (stream->lsep->state != AVDTP_STATE_OPEN)
3792 /* Recommendation 12:
3793 * If the RD has configured and opened a stream it is also responsible
3794 * to start the streaming via GAVDP_START.
3796 if (stream->open_acp) {
3797 /* If timer already active wait it */
3798 if (stream->start_timer)
3800 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
3803 uint32_t timeout_sec = START_TIMEOUT;
3805 ba2str(device_get_address(session->device), address);
3806 /* For Bose headset (Bose AE2w) 2 seconds timeout is required to avoid AVDTP ABORT_CMD */
3807 if (!strncasecmp(address, "00:0C:8A", 8))
3809 /* For Gear Circle, HS3000 headset, this headset doesn't initiate start command and
3810 * when we add timer for 1 second so idle may trigger callback after 1.2 sec or
3811 * 1.5 sec. So, don't timer for this headset.*/
3812 if (!strncasecmp(address, "10:92:66", 8) ||
3813 !strncasecmp(address, "A8:9F:BA", 8) ||
3814 !strncasecmp(address, "00:26:B4", 8)) {
3815 start_timeout(stream);
3818 /* Here we can't use Mac address as there are changing so check for name */
3820 device_get_name(session->device, name, sizeof(name));
3821 DBG("name : %s", name);
3822 if (g_str_equal(name, "HS3000")) {
3823 start_timeout(stream);
3827 stream->start_timer = g_timeout_add_seconds(timeout_sec,
3833 stream->start_timer = g_timeout_add_seconds(START_TIMEOUT,
3840 if (stream->close_int == TRUE) {
3841 error("avdtp_start: rejecting start since close is initiated");
3845 if (stream->starting == TRUE) {
3846 DBG("stream already started");
3847 return -EINPROGRESS;
3850 memset(&req, 0, sizeof(req));
3851 req.first_seid.seid = stream->rseid;
3853 ret = send_request(session, FALSE, stream, AVDTP_START,
3856 stream->starting = TRUE;
3861 int avdtp_close(struct avdtp *session, struct avdtp_stream *stream,
3864 struct seid_req req;
3867 if (!g_slist_find(session->streams, stream))
3870 if (stream->lsep->state < AVDTP_STATE_OPEN)
3873 if (stream->close_int == TRUE) {
3874 error("avdtp_close: rejecting since close is already initiated");
3878 if (immediate && session->req && stream == session->req->stream)
3879 return avdtp_abort(session, stream);
3881 memset(&req, 0, sizeof(req));
3882 req.acp_seid = stream->rseid;
3884 ret = send_request(session, FALSE, stream, AVDTP_CLOSE,
3887 stream->close_int = TRUE;
3892 int avdtp_suspend(struct avdtp *session, struct avdtp_stream *stream)
3894 struct seid_req req;
3896 if (!g_slist_find(session->streams, stream))
3899 if (stream->lsep->state <= AVDTP_STATE_OPEN || stream->close_int)
3902 memset(&req, 0, sizeof(req));
3903 req.acp_seid = stream->rseid;
3905 return send_request(session, FALSE, stream, AVDTP_SUSPEND,
3909 int avdtp_abort(struct avdtp *session, struct avdtp_stream *stream)
3911 struct seid_req req;
3914 if (!stream && session->discover) {
3915 /* Don't call cb since it being aborted */
3916 session->discover->cb = NULL;
3917 finalize_discovery(session, ECANCELED);
3921 if (!g_slist_find(session->streams, stream))
3924 if (stream->lsep->state == AVDTP_STATE_ABORTING)
3927 if (session->req && stream == session->req->stream)
3928 return cancel_request(session, ECANCELED);
3930 memset(&req, 0, sizeof(req));
3931 req.acp_seid = stream->rseid;
3933 ret = send_request(session, TRUE, stream, AVDTP_ABORT,
3936 stream->abort_int = TRUE;
3941 int avdtp_delay_report(struct avdtp *session, struct avdtp_stream *stream,
3944 struct delay_req req;
3946 if (!g_slist_find(session->streams, stream))
3949 if (stream->lsep->state != AVDTP_STATE_CONFIGURED &&
3950 stream->lsep->state != AVDTP_STATE_STREAMING)
3953 if (!stream->delay_reporting || session->version < 0x0103)
3956 stream->delay = delay;
3958 memset(&req, 0, sizeof(req));
3959 req.acp_seid = stream->rseid;
3960 req.delay = htons(delay);
3962 return send_request(session, TRUE, stream, AVDTP_DELAY_REPORT,
3966 struct avdtp_local_sep *avdtp_register_sep(struct queue *lseps, uint8_t type,
3969 gboolean delay_reporting,
3970 struct avdtp_sep_ind *ind,
3971 struct avdtp_sep_cfm *cfm,
3974 struct avdtp_local_sep *sep;
3975 uint8_t seid = util_get_uid(&seids, MAX_SEID);
3980 sep = g_new0(struct avdtp_local_sep, 1);
3982 sep->state = AVDTP_STATE_IDLE;
3983 sep->info.seid = seid;
3984 sep->info.type = type;
3985 sep->info.media_type = media_type;
3986 sep->codec = codec_type;
3989 sep->user_data = user_data;
3990 sep->delay_reporting = delay_reporting;
3992 DBG("SEP %p registered: type:%d codec:%d seid:%d", sep,
3993 sep->info.type, sep->codec, sep->info.seid);
3995 if (!queue_push_tail(lseps, sep)) {
4003 int avdtp_unregister_sep(struct queue *lseps, struct avdtp_local_sep *sep)
4009 release_stream(sep->stream, sep->stream->session);
4011 DBG("SEP %p unregistered: type:%d codec:%d seid:%d", sep,
4012 sep->info.type, sep->codec, sep->info.seid);
4014 util_clear_uid(&seids, sep->info.seid);
4015 queue_remove(lseps, sep);
4021 const char *avdtp_strerror(struct avdtp_error *err)
4023 if (err->category == AVDTP_ERRNO)
4024 return strerror(err->err.posix_errno);
4026 switch(err->err.error_code) {
4027 case AVDTP_BAD_HEADER_FORMAT:
4028 return "Bad Header Format";
4029 case AVDTP_BAD_LENGTH:
4030 return "Bad Packet Length";
4031 case AVDTP_BAD_ACP_SEID:
4032 return "Bad Acceptor SEID";
4033 case AVDTP_SEP_IN_USE:
4034 return "Stream End Point in Use";
4035 case AVDTP_SEP_NOT_IN_USE:
4036 return "Stream End Point Not in Use";
4037 case AVDTP_BAD_SERV_CATEGORY:
4038 return "Bad Service Category";
4039 case AVDTP_BAD_PAYLOAD_FORMAT:
4040 return "Bad Payload format";
4041 case AVDTP_NOT_SUPPORTED_COMMAND:
4042 return "Command Not Supported";
4043 case AVDTP_INVALID_CAPABILITIES:
4044 return "Invalid Capabilities";
4045 case AVDTP_BAD_RECOVERY_TYPE:
4046 return "Bad Recovery Type";
4047 case AVDTP_BAD_MEDIA_TRANSPORT_FORMAT:
4048 return "Bad Media Transport Format";
4049 case AVDTP_BAD_RECOVERY_FORMAT:
4050 return "Bad Recovery Format";
4051 case AVDTP_BAD_ROHC_FORMAT:
4052 return "Bad Header Compression Format";
4053 case AVDTP_BAD_CP_FORMAT:
4054 return "Bad Content Protection Format";
4055 case AVDTP_BAD_MULTIPLEXING_FORMAT:
4056 return "Bad Multiplexing Format";
4057 case AVDTP_UNSUPPORTED_CONFIGURATION:
4058 return "Configuration not supported";
4059 case AVDTP_BAD_STATE:
4062 return "Unknown error";
4066 avdtp_state_t avdtp_sep_get_state(struct avdtp_local_sep *sep)
4071 struct btd_adapter *avdtp_get_adapter(struct avdtp *session)
4073 return device_get_adapter(session->device);
4076 struct btd_device *avdtp_get_device(struct avdtp *session)
4078 return session->device;
4081 gboolean avdtp_has_stream(struct avdtp *session, struct avdtp_stream *stream)
4083 return g_slist_find(session->streams, stream) ? TRUE : FALSE;
4086 unsigned int avdtp_add_state_cb(struct btd_device *dev,
4087 avdtp_session_state_cb cb, void *user_data)
4089 struct avdtp_state_callback *state_cb;
4090 static unsigned int id = 0;
4092 state_cb = g_new(struct avdtp_state_callback, 1);
4094 state_cb->dev = dev;
4095 state_cb->id = ++id;
4096 state_cb->user_data = user_data;
4098 state_callbacks = g_slist_append(state_callbacks, state_cb);
4100 return state_cb->id;
4103 gboolean avdtp_remove_state_cb(unsigned int id)
4107 for (l = state_callbacks; l != NULL; l = l->next) {
4108 struct avdtp_state_callback *cb = l->data;
4109 if (cb && cb->id == id) {
4110 state_callbacks = g_slist_remove(state_callbacks, cb);