3 * BlueZ - Bluetooth protocol stack for Linux
5 * Copyright (C) 2006-2010 Nokia Corporation
6 * Copyright (C) 2004-2010 Marcel Holtmann <marcel@holtmann.org>
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
39 #include "lib/bluetooth.h"
41 #include "lib/sdp_lib.h"
44 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
45 #include <sys/ioctl.h>
46 #include <bluetooth/hci.h>
47 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
49 #include "btio/btio.h"
52 #include "src/shared/util.h"
53 #include "src/shared/queue.h"
54 #include "src/adapter.h"
55 #include "src/device.h"
57 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
58 #include "src/service.h"
59 #include "../../profile.h"
60 #ifdef TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM
72 static unsigned int seids;
75 # define MAX(x, y) ((x) > (y) ? (x) : (y))
78 #define AVDTP_DISCOVER 0x01
79 #define AVDTP_GET_CAPABILITIES 0x02
80 #define AVDTP_SET_CONFIGURATION 0x03
81 #define AVDTP_GET_CONFIGURATION 0x04
82 #define AVDTP_RECONFIGURE 0x05
83 #define AVDTP_OPEN 0x06
84 #define AVDTP_START 0x07
85 #define AVDTP_CLOSE 0x08
86 #define AVDTP_SUSPEND 0x09
87 #define AVDTP_ABORT 0x0A
88 #define AVDTP_SECURITY_CONTROL 0x0B
89 #define AVDTP_GET_ALL_CAPABILITIES 0x0C
90 #define AVDTP_DELAY_REPORT 0x0D
92 #define AVDTP_PKT_TYPE_SINGLE 0x00
93 #define AVDTP_PKT_TYPE_START 0x01
94 #define AVDTP_PKT_TYPE_CONTINUE 0x02
95 #define AVDTP_PKT_TYPE_END 0x03
97 #define AVDTP_MSG_TYPE_COMMAND 0x00
98 #define AVDTP_MSG_TYPE_GEN_REJECT 0x01
99 #define AVDTP_MSG_TYPE_ACCEPT 0x02
100 #define AVDTP_MSG_TYPE_REJECT 0x03
102 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
103 #define REQ_TIMEOUT 10
105 #define REQ_TIMEOUT 6
107 #define SUSPEND_TIMEOUT 10
108 #define ABORT_TIMEOUT 2
109 #define DISCONNECT_TIMEOUT 1
110 #define START_TIMEOUT 1
112 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
113 struct avdtp *configured_session;
114 struct avdtp_stream *configured_stream;
117 #if __BYTE_ORDER == __LITTLE_ENDIAN
119 struct avdtp_common_header {
120 uint8_t message_type:2;
121 uint8_t packet_type:2;
122 uint8_t transaction:4;
123 } __attribute__ ((packed));
125 struct avdtp_single_header {
126 uint8_t message_type:2;
127 uint8_t packet_type:2;
128 uint8_t transaction:4;
131 } __attribute__ ((packed));
133 struct avdtp_start_header {
134 uint8_t message_type:2;
135 uint8_t packet_type:2;
136 uint8_t transaction:4;
137 uint8_t no_of_packets;
140 } __attribute__ ((packed));
142 struct avdtp_continue_header {
143 uint8_t message_type:2;
144 uint8_t packet_type:2;
145 uint8_t transaction:4;
146 } __attribute__ ((packed));
154 uint8_t media_type:4;
155 } __attribute__ ((packed));
160 } __attribute__ ((packed));
162 #elif __BYTE_ORDER == __BIG_ENDIAN
164 struct avdtp_common_header {
165 uint8_t transaction:4;
166 uint8_t packet_type:2;
167 uint8_t message_type:2;
168 } __attribute__ ((packed));
170 struct avdtp_single_header {
171 uint8_t transaction:4;
172 uint8_t packet_type:2;
173 uint8_t message_type:2;
176 } __attribute__ ((packed));
178 struct avdtp_start_header {
179 uint8_t transaction:4;
180 uint8_t packet_type:2;
181 uint8_t message_type:2;
182 uint8_t no_of_packets;
185 } __attribute__ ((packed));
187 struct avdtp_continue_header {
188 uint8_t transaction:4;
189 uint8_t packet_type:2;
190 uint8_t message_type:2;
191 } __attribute__ ((packed));
197 uint8_t media_type:4;
200 } __attribute__ ((packed));
205 } __attribute__ ((packed));
208 #error "Unknown byte order"
213 struct discover_resp {
214 struct seid_info seps[0];
215 } __attribute__ ((packed));
219 } __attribute__ ((packed));
222 struct seid first_seid;
223 struct seid other_seids[0];
224 } __attribute__ ((packed));
227 struct seid first_seid;
228 struct seid other_seids[0];
229 } __attribute__ ((packed));
233 } __attribute__ ((packed));
238 } __attribute__ ((packed));
240 #if __BYTE_ORDER == __LITTLE_ENDIAN
245 } __attribute__ ((packed));
254 } __attribute__ ((packed));
260 } __attribute__ ((packed));
267 uint8_t serv_cap_len;
270 } __attribute__ ((packed));
276 } __attribute__ ((packed));
278 #elif __BYTE_ORDER == __BIG_ENDIAN
283 } __attribute__ ((packed));
292 } __attribute__ ((packed));
298 } __attribute__ ((packed));
305 uint8_t serv_cap_len;
308 } __attribute__ ((packed));
314 } __attribute__ ((packed));
317 #error "Unknown byte order"
324 uint8_t message_type;
335 struct avdtp_stream *stream; /* Set if the request targeted a stream */
340 struct avdtp_remote_sep {
344 struct avdtp_service_capability *codec;
345 gboolean delay_reporting;
347 GSList *caps; /* of type struct avdtp_service_capability */
348 struct avdtp_stream *stream;
349 avdtp_remote_sep_destroy_t destroy;
353 struct avdtp_local_sep {
355 struct avdtp_stream *stream;
356 struct seid_info info;
358 gboolean delay_reporting;
360 struct avdtp_sep_ind *ind;
361 struct avdtp_sep_cfm *cfm;
365 struct stream_callback {
366 avdtp_stream_state_cb cb;
371 struct avdtp_state_callback {
372 avdtp_session_state_cb cb;
373 struct btd_device *dev;
378 struct discover_callback {
380 avdtp_discover_cb_t cb;
384 struct avdtp_stream {
388 struct avdtp *session;
389 struct avdtp_local_sep *lsep;
393 struct avdtp_service_capability *codec;
394 guint io_id; /* Transport GSource ID */
395 guint timer; /* Waiting for other side to close or open
396 * the transport channel */
397 gboolean open_acp; /* If we are in ACT role for Open */
398 gboolean close_int; /* If we are in INT role for Close */
399 gboolean abort_int; /* If we are in INT role for Abort */
400 guint start_timer; /* Wait START command timer */
401 gboolean delay_reporting;
402 uint16_t delay; /* AVDTP 1.3 Delay Reporting feature */
403 gboolean starting; /* only valid while sep state == OPEN */
406 /* Structure describing an AVDTP connection between two devices */
408 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
409 struct avdtp_source_info {
410 struct btd_device *dev;
421 struct btd_device *device;
423 avdtp_session_state_t state;
428 GSList *seps; /* Elements of type struct avdtp_remote_sep * */
430 GSList *streams; /* Elements of type struct avdtp_stream * */
432 GSList *req_queue; /* Elements of type struct pending_req * */
433 GSList *prio_queue; /* Same as req_queue but is processed before it */
435 struct avdtp_stream *pending_open;
445 struct discover_callback *discover;
446 struct pending_req *req;
451 /* Attempt stream setup instead of disconnecting */
452 gboolean stream_setup;
455 static GSList *state_callbacks = NULL;
457 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
458 static GSList *list_source = NULL;
461 static int send_request(struct avdtp *session, gboolean priority,
462 struct avdtp_stream *stream, uint8_t signal_id,
463 void *buffer, size_t size);
464 static gboolean avdtp_parse_resp(struct avdtp *session,
465 struct avdtp_stream *stream,
466 uint8_t transaction, uint8_t signal_id,
467 void *buf, int size);
468 static gboolean avdtp_parse_rej(struct avdtp *session,
469 struct avdtp_stream *stream,
470 uint8_t transaction, uint8_t signal_id,
471 void *buf, int size);
472 static int process_queue(struct avdtp *session);
473 static void avdtp_sep_set_state(struct avdtp *session,
474 struct avdtp_local_sep *sep,
475 avdtp_state_t state);
477 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
478 void avdtp_set_source_status(struct btd_device *dev, bool pause)
480 GSList *l = list_source;
483 struct avdtp_source_info *ldev = l->data;
485 if (ldev->dev != dev && pause == false && ldev->pause == false) {
486 avrcp_pause(ldev->dev);
487 DBG("sending pause from status");
489 } else if (ldev->dev == dev) {
497 static void avdtp_add_source_device(struct btd_device *dev)
500 GSList *l = list_source;
503 struct avdtp_source_info *ldev = l->data;
505 if (ldev->dev == dev) {
506 DBG("in device %p", dev);
510 if (ldev->pause == false) {
511 avrcp_pause(ldev->dev);
512 DBG("Sending pause from steam");
521 struct avdtp_source_info *p;
523 p = g_new0(struct avdtp_source_info, 1);
526 list_source = g_slist_append(list_source, p);
530 static void avdtp_remove_source_devce(struct btd_device *dev)
534 for (l = list_source; l != NULL; l = l->next) {
535 struct avdtp_source_info *ldev = l->data;
536 if (ldev && ldev->dev == dev) {
537 list_source = g_slist_remove(list_source, ldev);
545 static const char *avdtp_statestr(avdtp_state_t state)
548 case AVDTP_STATE_IDLE:
550 case AVDTP_STATE_CONFIGURED:
552 case AVDTP_STATE_OPEN:
554 case AVDTP_STATE_STREAMING:
556 case AVDTP_STATE_CLOSING:
558 case AVDTP_STATE_ABORTING:
561 return "<unknown state>";
565 static gboolean try_send(int sk, void *data, size_t len)
570 err = send(sk, data, len, 0);
571 } while (err < 0 && errno == EINTR);
574 error("send: %s (%d)", strerror(errno), errno);
576 } else if ((size_t) err != len) {
577 error("try_send: complete buffer not sent (%d/%zu bytes)",
585 static gboolean avdtp_send(struct avdtp *session, uint8_t transaction,
586 uint8_t message_type, uint8_t signal_id,
587 void *data, size_t len)
589 unsigned int cont_fragments, sent;
590 struct avdtp_start_header start;
591 struct avdtp_continue_header cont;
594 if (session->io == NULL) {
595 error("avdtp_send: session is closed");
599 sock = g_io_channel_unix_get_fd(session->io);
601 /* Single packet - no fragmentation */
602 if (sizeof(struct avdtp_single_header) + len <= session->omtu) {
603 struct avdtp_single_header single;
605 memset(&single, 0, sizeof(single));
607 single.transaction = transaction;
608 single.packet_type = AVDTP_PKT_TYPE_SINGLE;
609 single.message_type = message_type;
610 single.signal_id = signal_id;
612 memcpy(session->buf, &single, sizeof(single));
613 memcpy(session->buf + sizeof(single), data, len);
615 return try_send(sock, session->buf, sizeof(single) + len);
618 /* Check if there is enough space to start packet */
619 if (session->omtu < sizeof(start)) {
620 error("No enough space to fragment packet");
624 /* Count the number of needed fragments */
625 cont_fragments = (len - (session->omtu - sizeof(start))) /
626 (session->omtu - sizeof(cont)) + 1;
628 DBG("%zu bytes split into %d fragments", len, cont_fragments + 1);
630 /* Send the start packet */
631 memset(&start, 0, sizeof(start));
632 start.transaction = transaction;
633 start.packet_type = AVDTP_PKT_TYPE_START;
634 start.message_type = message_type;
635 start.no_of_packets = cont_fragments + 1;
636 start.signal_id = signal_id;
638 memcpy(session->buf, &start, sizeof(start));
639 memcpy(session->buf + sizeof(start), data,
640 session->omtu - sizeof(start));
642 if (!try_send(sock, session->buf, session->omtu))
645 DBG("first packet with %zu bytes sent", session->omtu - sizeof(start));
647 sent = session->omtu - sizeof(start);
649 /* Send the continue fragments and the end packet */
654 if (left + sizeof(cont) > session->omtu) {
655 cont.packet_type = AVDTP_PKT_TYPE_CONTINUE;
656 to_copy = session->omtu - sizeof(cont);
657 DBG("sending continue with %d bytes", to_copy);
659 cont.packet_type = AVDTP_PKT_TYPE_END;
661 DBG("sending end with %d bytes", to_copy);
664 cont.transaction = transaction;
665 cont.message_type = message_type;
667 memcpy(session->buf, &cont, sizeof(cont));
668 memcpy(session->buf + sizeof(cont), data + sent, to_copy);
670 if (!try_send(sock, session->buf, to_copy + sizeof(cont)))
679 static void pending_req_free(void *data)
681 struct pending_req *req = data;
684 g_source_remove(req->timeout);
689 static void close_stream(struct avdtp_stream *stream)
693 if (stream->io == NULL)
696 sock = g_io_channel_unix_get_fd(stream->io);
698 shutdown(sock, SHUT_RDWR);
700 g_io_channel_shutdown(stream->io, FALSE, NULL);
702 g_io_channel_unref(stream->io);
706 static gboolean stream_close_timeout(gpointer user_data)
708 struct avdtp_stream *stream = user_data;
710 DBG("Timed out waiting for peer to close the transport channel");
714 close_stream(stream);
719 static gboolean stream_open_timeout(gpointer user_data)
721 struct avdtp_stream *stream = user_data;
723 DBG("Timed out waiting for peer to open the transport channel");
727 stream->session->pending_open = NULL;
729 avdtp_abort(stream->session, stream);
734 void avdtp_error_init(struct avdtp_error *err, uint8_t category, int id)
736 err->category = category;
738 if (category == AVDTP_ERRNO)
739 err->err.posix_errno = id;
741 err->err.error_code = id;
744 uint8_t avdtp_error_category(struct avdtp_error *err)
746 return err->category;
749 int avdtp_error_error_code(struct avdtp_error *err)
751 assert(err->category != AVDTP_ERRNO);
752 return err->err.error_code;
755 int avdtp_error_posix_errno(struct avdtp_error *err)
757 assert(err->category == AVDTP_ERRNO);
758 return err->err.posix_errno;
761 static struct avdtp_stream *find_stream_by_rseid(struct avdtp *session,
766 for (l = session->streams; l != NULL; l = g_slist_next(l)) {
767 struct avdtp_stream *stream = l->data;
769 if (stream->rseid == rseid)
776 static struct avdtp_remote_sep *find_remote_sep(GSList *seps, uint8_t seid)
780 for (l = seps; l != NULL; l = g_slist_next(l)) {
781 struct avdtp_remote_sep *sep = l->data;
783 if (sep->seid == seid)
790 static void avdtp_set_state(struct avdtp *session,
791 avdtp_session_state_t new_state)
794 avdtp_session_state_t old_state = session->state;
796 session->state = new_state;
798 for (l = state_callbacks; l != NULL;) {
799 struct avdtp_state_callback *cb = l->data;
803 if (session->device != cb->dev)
806 cb->cb(cb->dev, session, old_state, new_state, cb->user_data);
810 static void stream_free(void *data)
812 struct avdtp_stream *stream = data;
813 struct avdtp_remote_sep *rsep;
815 stream->lsep->info.inuse = 0;
816 stream->lsep->stream = NULL;
818 rsep = find_remote_sep(stream->session->seps, stream->rseid);
823 g_source_remove(stream->timer);
826 close_stream(stream);
829 g_source_remove(stream->io_id);
831 g_slist_free_full(stream->callbacks, g_free);
832 g_slist_free_full(stream->caps, g_free);
837 static gboolean transport_cb(GIOChannel *chan, GIOCondition cond,
840 struct avdtp_stream *stream = data;
841 struct avdtp_local_sep *sep = stream->lsep;
843 if (stream->close_int && sep->cfm && sep->cfm->close)
844 sep->cfm->close(stream->session, sep, stream, NULL,
847 if (!(cond & G_IO_NVAL))
848 close_stream(stream);
852 if (!stream->abort_int)
853 avdtp_sep_set_state(stream->session, sep, AVDTP_STATE_IDLE);
858 static int get_send_buffer_size(int sk)
861 socklen_t optlen = sizeof(size);
863 if (getsockopt(sk, SOL_SOCKET, SO_SNDBUF, &size, &optlen) < 0) {
865 error("getsockopt(SO_SNDBUF) failed: %s (%d)", strerror(-err),
871 * Doubled value is returned by getsockopt since kernel uses that
872 * space for its own purposes (see man 7 socket, bookkeeping overhead
878 static int set_send_buffer_size(int sk, int size)
880 socklen_t optlen = sizeof(size);
882 if (setsockopt(sk, SOL_SOCKET, SO_SNDBUF, &size, optlen) < 0) {
884 error("setsockopt(SO_SNDBUF) failed: %s (%d)", strerror(-err),
892 static void handle_transport_connect(struct avdtp *session, GIOChannel *io,
893 uint16_t imtu, uint16_t omtu)
895 struct avdtp_stream *stream = session->pending_open;
896 struct avdtp_local_sep *sep = stream->lsep;
897 int sk, buf_size, min_buf_size;
900 session->pending_open = NULL;
903 g_source_remove(stream->timer);
908 if (!stream->open_acp && sep->cfm && sep->cfm->open) {
909 struct avdtp_error err;
910 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
911 sep->cfm->open(session, sep, NULL, &err,
917 if (stream->io == NULL)
918 stream->io = g_io_channel_ref(io);
923 /* Apply special settings only if local SEP is of type SRC */
924 if (sep->info.type != AVDTP_SEP_TYPE_SOURCE)
927 bt_io_set(stream->io, &err, BT_IO_OPT_FLUSHABLE, TRUE,
930 error("Enabling flushable packets failed: %s", err->message);
933 DBG("Flushable packets enabled");
935 sk = g_io_channel_unix_get_fd(stream->io);
936 buf_size = get_send_buffer_size(sk);
940 DBG("sk %d, omtu %d, send buffer size %d", sk, omtu, buf_size);
941 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
942 min_buf_size = omtu * 10;
944 min_buf_size = omtu * 2;
946 if (buf_size < min_buf_size) {
947 DBG("send buffer size to be increassed to %d",
949 set_send_buffer_size(sk, min_buf_size);
951 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
953 DBG("send buffer size to be decreassed to %d",
955 set_send_buffer_size(sk, min_buf_size);
959 if (!stream->open_acp && sep->cfm && sep->cfm->open)
960 sep->cfm->open(session, sep, stream, NULL, sep->user_data);
962 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
964 stream->io_id = g_io_add_watch(io, G_IO_ERR | G_IO_HUP | G_IO_NVAL,
965 (GIOFunc) transport_cb, stream);
968 static int pending_req_cmp(gconstpointer a, gconstpointer b)
970 const struct pending_req *req = a;
971 const struct avdtp_stream *stream = b;
973 if (req->stream == stream)
979 static void cleanup_queue(struct avdtp *session, struct avdtp_stream *stream)
982 struct pending_req *req;
984 while ((l = g_slist_find_custom(session->prio_queue, stream,
987 pending_req_free(req);
988 session->prio_queue = g_slist_remove(session->prio_queue, req);
991 while ((l = g_slist_find_custom(session->req_queue, stream,
994 pending_req_free(req);
995 session->req_queue = g_slist_remove(session->req_queue, req);
999 static void handle_unanswered_req(struct avdtp *session,
1000 struct avdtp_stream *stream)
1002 struct pending_req *req;
1003 struct avdtp_local_sep *lsep;
1004 struct avdtp_error err;
1006 if (session->req->signal_id == AVDTP_ABORT) {
1007 /* Avoid freeing the Abort request here */
1008 DBG("handle_unanswered_req: Abort req, returning");
1009 session->req->stream = NULL;
1014 session->req = NULL;
1016 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
1018 lsep = stream->lsep;
1020 switch (req->signal_id) {
1021 case AVDTP_RECONFIGURE:
1022 error("No reply to Reconfigure request");
1023 if (lsep && lsep->cfm && lsep->cfm->reconfigure)
1024 lsep->cfm->reconfigure(session, lsep, stream, &err,
1028 error("No reply to Open request");
1029 if (lsep && lsep->cfm && lsep->cfm->open)
1030 lsep->cfm->open(session, lsep, stream, &err,
1034 error("No reply to Start request");
1035 if (lsep && lsep->cfm && lsep->cfm->start)
1036 lsep->cfm->start(session, lsep, stream, &err,
1040 error("No reply to Suspend request");
1041 if (lsep && lsep->cfm && lsep->cfm->suspend)
1042 lsep->cfm->suspend(session, lsep, stream, &err,
1046 error("No reply to Close request");
1047 if (lsep && lsep->cfm && lsep->cfm->close)
1048 lsep->cfm->close(session, lsep, stream, &err,
1051 case AVDTP_SET_CONFIGURATION:
1052 error("No reply to SetConfiguration request");
1053 if (lsep && lsep->cfm && lsep->cfm->set_configuration)
1054 lsep->cfm->set_configuration(session, lsep, stream,
1055 &err, lsep->user_data);
1058 pending_req_free(req);
1061 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1062 static gboolean send_broadcom_a2dp_qos(const bdaddr_t *dst, gboolean qos_high)
1066 struct hci_conn_info_req *cr;
1069 dd = hci_open_dev(0);
1074 cr = g_malloc0(sizeof(*cr) + sizeof(struct hci_conn_info));
1076 cr->type = ACL_LINK;
1077 bacpy(&cr->bdaddr, dst);
1079 err = ioctl(dd, HCIGETCONNINFO, cr);
1081 error("Fail to get HCIGETCOINFO");
1087 cp.handle = cr->conn_info->handle;
1088 DBG("Handle %d", cp.handle);
1092 cp.priority = BRCM_QOS_PRIORITY_HIGH;
1094 cp.priority = BRCM_QOS_PRIORITY_NORMAL;
1096 if (hci_send_cmd(dd, OGF_VENDOR_CMD, BROADCOM_QOS_CMD,
1097 BROADCOM_QOS_CP_SIZE, &cp) < 0) {
1101 DBG("Send Broadcom Qos Patch %s", qos_high ? "High" : "Low");
1108 static gboolean send_sprd_a2dp_qos(const bdaddr_t *dst, gboolean qos_high)
1112 struct hci_conn_info_req *cr;
1115 dd = hci_open_dev(0);
1119 cr = g_malloc0(sizeof(*cr) + sizeof(struct hci_conn_info));
1121 cr->type = ACL_LINK;
1122 bacpy(&cr->bdaddr, dst);
1124 err = ioctl(dd, HCIGETCONNINFO, cr);
1126 error("Fail to get HCIGETCOINFO");
1132 cp.handle = cr->conn_info->handle;
1134 DBG("Handle %d", cp.handle);
1138 cp.qos.service_type = 0x02;
1139 cp.qos.token_rate = 0X000000C8;
1140 cp.qos.peak_bandwidth = 0X000000C8;
1141 cp.qos.latency = 0x00000001;
1142 cp.qos.delay_variation = 0xFFFFFFFF;
1144 cp.qos.service_type = 0x01;
1145 cp.qos.token_rate = 0X00000000;
1146 cp.qos.peak_bandwidth = 0X00000000;
1147 cp.qos.latency = 0x00000001;
1148 cp.qos.delay_variation = 0xFFFFFFFF;
1151 if (hci_send_cmd(dd, OGF_LINK_POLICY, OCF_QOS_SETUP,
1152 QOS_SETUP_CP_SIZE, &cp) < 0) {
1156 DBG("Send Spreadtrum Qos Patch %s", qos_high ? "High" : "Low");
1163 static gboolean fix_role_to_master(const bdaddr_t *dst, gboolean fix_to_master)
1167 struct hci_conn_info_req *cr;
1168 switch_role_cp sr_cp;
1169 write_link_policy_cp lp_cp;
1171 dd = hci_open_dev(0);
1173 error("hci_open_dev is failed");
1177 cr = g_malloc0(sizeof(*cr) + sizeof(struct hci_conn_info));
1179 cr->type = ACL_LINK;
1180 bacpy(&cr->bdaddr, dst);
1181 err = ioctl(dd, HCIGETCONNINFO, cr);
1183 error("Fail to get HCIGETCOINFO : %d", err);
1189 if (!(cr->conn_info->link_mode & HCI_LM_MASTER) && fix_to_master) {
1190 DBG("Need to role switch");
1192 bacpy(&sr_cp.bdaddr, dst);
1193 sr_cp.role = 0x00; /* 0x00 : Master, 0x01 : Slave */
1194 if (hci_send_cmd(dd, OGF_LINK_POLICY, OCF_SWITCH_ROLE,
1195 SWITCH_ROLE_CP_SIZE, &sr_cp) < 0) {
1196 error("switch role is failed");
1203 lp_cp.handle = cr->conn_info->handle;
1204 DBG("Handle %d", lp_cp.handle);
1207 lp_cp.policy = fix_to_master ? 0x00 : HCI_LP_SNIFF | HCI_LP_RSWITCH;
1208 DBG("Request link policy : 0x%X", lp_cp.policy);
1210 if (hci_send_cmd(dd, OGF_LINK_POLICY, OCF_WRITE_LINK_POLICY,
1211 WRITE_LINK_POLICY_CP_SIZE, &lp_cp) < 0) {
1212 error("write link policy is failed : %d", lp_cp.policy);
1221 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
1223 static void avdtp_sep_set_state(struct avdtp *session,
1224 struct avdtp_local_sep *sep,
1225 avdtp_state_t state)
1227 struct avdtp_stream *stream = sep->stream;
1228 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1229 struct btd_adapter *adapter = device_get_adapter(session->device);
1230 const bdaddr_t *dst;
1232 dst = device_get_address(session->device);
1234 avdtp_state_t old_state;
1235 struct avdtp_error err, *err_ptr = NULL;
1239 error("Error changing sep state: stream not available");
1243 if (sep->state == state) {
1244 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
1245 DBG("stream state change failed: %s", avdtp_strerror(&err));
1249 DBG("stream state changed: %s -> %s",
1250 avdtp_statestr(sep->state),
1251 avdtp_statestr(state));
1254 old_state = sep->state;
1258 case AVDTP_STATE_CONFIGURED:
1259 if (sep->info.type == AVDTP_SEP_TYPE_SINK) {
1260 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1261 configured_session = session;
1262 configured_stream = stream;
1264 avdtp_delay_report(session, stream, stream->delay);
1267 case AVDTP_STATE_OPEN:
1268 stream->starting = FALSE;
1269 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1270 if (TIZEN_FEATURE_BLUEZ_BRCM_QOS || TIZEN_FEATURE_BLUEZ_SPEAKER_REFERENCE) {
1271 send_broadcom_a2dp_qos(dst, FALSE);
1272 } else if (TIZEN_FEATURE_BLUEZ_SPRD_QOS) {
1273 if (old_state == AVDTP_STATE_STREAMING)
1274 send_sprd_a2dp_qos(dst, FALSE);
1277 if (TIZEN_FEATURE_BLUEZ_ROLE_CHANGE)
1278 fix_role_to_master(dst, FALSE);
1280 btd_adapter_set_streaming_mode(adapter, dst, FALSE);
1281 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
1283 case AVDTP_STATE_STREAMING:
1284 if (stream->start_timer) {
1285 g_source_remove(stream->start_timer);
1286 stream->start_timer = 0;
1289 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1290 if (TIZEN_FEATURE_BLUEZ_BRCM_QOS || TIZEN_FEATURE_BLUEZ_SPEAKER_REFERENCE) {
1291 send_broadcom_a2dp_qos(dst, TRUE);
1292 } else if (TIZEN_FEATURE_BLUEZ_SPRD_QOS) {
1293 if (old_state == AVDTP_STATE_OPEN)
1294 send_sprd_a2dp_qos(dst, TRUE);
1296 if (TIZEN_FEATURE_BLUEZ_ROLE_CHANGE)
1297 fix_role_to_master(dst, TRUE);
1299 btd_adapter_set_streaming_mode(adapter, dst, TRUE);
1300 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
1301 stream->open_acp = FALSE;
1303 case AVDTP_STATE_CLOSING:
1304 case AVDTP_STATE_ABORTING:
1305 if (stream->start_timer) {
1306 g_source_remove(stream->start_timer);
1307 stream->start_timer = 0;
1310 case AVDTP_STATE_IDLE:
1311 if (stream->start_timer) {
1312 g_source_remove(stream->start_timer);
1313 stream->start_timer = 0;
1315 if (session->pending_open == stream)
1316 handle_transport_connect(session, NULL, 0, 0);
1317 if (session->req && session->req->stream == stream)
1318 handle_unanswered_req(session, stream);
1319 /* Remove pending commands for this stream from the queue */
1320 cleanup_queue(session, stream);
1321 session->streams = g_slist_remove(session->streams, stream);
1327 l = stream->callbacks;
1329 struct stream_callback *cb = l->data;
1330 l = g_slist_next(l);
1331 cb->cb(stream, old_state, state, err_ptr, cb->user_data);
1334 if (state == AVDTP_STATE_IDLE)
1335 stream_free(stream);
1338 static void sep_free(gpointer data)
1340 struct avdtp_remote_sep *sep = data;
1343 sep->destroy(sep->user_data);
1345 g_slist_free_full(sep->caps, g_free);
1349 static void remove_disappeared(void *data, void *user_data)
1351 struct avdtp_remote_sep *sep = data;
1352 struct avdtp *session = user_data;
1354 if (sep->discovered)
1357 DBG("seid %d disappeared", sep->seid);
1359 session->seps = g_slist_remove(session->seps, sep);
1364 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1365 void finalize_discovery(struct avdtp *session, int err)
1367 static void finalize_discovery(struct avdtp *session, int err)
1370 struct discover_callback *discover = session->discover;
1371 struct avdtp_error avdtp_err;
1376 avdtp_error_init(&avdtp_err, AVDTP_ERRNO, err);
1378 if (discover->id > 0)
1379 g_source_remove(discover->id);
1382 g_slist_foreach(session->seps, remove_disappeared, session);
1385 discover->cb(session, session->seps, err ? &avdtp_err : NULL,
1386 discover->user_data);
1388 session->discover = NULL;
1391 static void release_stream(struct avdtp_stream *stream, struct avdtp *session)
1393 struct avdtp_local_sep *sep = stream->lsep;
1395 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
1396 /* Connection lost */
1397 avdtp_remove_source_devce(session->device);
1400 if (sep->cfm && sep->cfm->abort &&
1401 (sep->state != AVDTP_STATE_ABORTING ||
1403 sep->cfm->abort(session, sep, stream, NULL, sep->user_data);
1405 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
1408 static void remove_disconnect_timer(struct avdtp *session)
1410 if (!session->dc_timer)
1413 g_source_remove(session->dc_timer);
1414 session->dc_timer = 0;
1415 session->stream_setup = FALSE;
1417 /* Release disconnect timer reference */
1418 avdtp_unref(session);
1421 static void avdtp_free(void *data)
1423 struct avdtp *session = data;
1427 g_slist_free_full(session->streams, stream_free);
1430 g_io_channel_shutdown(session->io, FALSE, NULL);
1431 g_io_channel_unref(session->io);
1434 if (session->io_id) {
1435 g_source_remove(session->io_id);
1440 pending_req_free(session->req);
1442 g_slist_free_full(session->req_queue, pending_req_free);
1443 g_slist_free_full(session->prio_queue, pending_req_free);
1444 g_slist_free_full(session->seps, sep_free);
1446 g_free(session->buf);
1448 btd_device_unref(session->device);
1452 static void connection_lost(struct avdtp *session, int err)
1455 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1456 struct btd_service *service;
1459 session = avdtp_ref(session);
1461 ba2str(device_get_address(session->device), address);
1462 DBG("Disconnected from %s", address);
1464 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1465 service = btd_device_get_service(session->device, A2DP_SINK_UUID);
1467 btd_service_connecting_complete(service, -err);
1469 g_slist_foreach(session->streams, (GFunc) release_stream, session);
1470 session->streams = NULL;
1472 finalize_discovery(session, err);
1474 avdtp_set_state(session, AVDTP_SESSION_STATE_DISCONNECTED);
1476 DBG("%p: ref=%d", session, session->ref);
1478 avdtp_unref(session);
1481 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1482 static gboolean disconnect_acl_timeout(gpointer user_data)
1484 struct btd_device *device = user_data;
1488 btd_device_disconnect(device);
1494 static gboolean disconnect_timeout(gpointer user_data)
1496 struct avdtp *session = user_data;
1497 struct btd_service *service;
1498 gboolean stream_setup;
1499 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1500 struct btd_device *device = NULL;
1501 struct btd_adapter *adapter = NULL;
1502 const bdaddr_t *bdaddr = NULL;
1507 /* Fix : REVERSE_INULL */
1508 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1509 if (session->device == NULL) {
1510 error("session device NOT found");
1515 session->dc_timer = 0;
1517 stream_setup = session->stream_setup;
1518 session->stream_setup = FALSE;
1520 service = btd_device_get_service(session->device, A2DP_SINK_UUID);
1521 if (service && stream_setup) {
1522 sink_setup_stream(service, session);
1526 service = btd_device_get_service(session->device, A2DP_SOURCE_UUID);
1527 if (service && stream_setup) {
1528 source_setup_stream(service, session);
1532 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1533 if (session->device) {
1534 adapter = device_get_adapter(session->device);
1535 bdaddr = device_get_address(session->device);
1536 if (adapter && bdaddr)
1537 device = btd_adapter_find_device(adapter, bdaddr, BDADDR_BREDR);
1539 DBG("device exists");
1543 error("device is NOT found");
1547 connection_lost(session, ETIMEDOUT);
1550 /* Release disconnect timer reference */
1551 avdtp_unref(session);
1553 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1556 disconnect_acl_timeout,
1563 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
1564 static void set_disconnect_timer_for_sink(struct avdtp *session, gboolean disconn)
1568 if (session->dc_timer)
1569 remove_disconnect_timer(session);
1571 device_get_name(session->device, name, sizeof(name));
1572 DBG("name : [%s]", name);
1573 if (g_str_equal(name, "VW BT") || g_str_equal(name, "VW MI") ||
1574 g_str_equal(name, "Seat ")) {
1575 session->dc_timer = g_timeout_add_seconds(3, disconnect_timeout,
1577 } else if (g_str_equal(name, "CAR M")) {
1578 session->dc_timer = g_timeout_add(200, disconnect_timeout,
1581 if (disconn == TRUE)
1582 session->dc_timer = g_timeout_add(100,
1586 session->dc_timer = g_timeout_add_seconds(DISCONNECT_TIMEOUT,
1593 static void set_disconnect_timer(struct avdtp *session)
1595 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1598 /* Take a ref while disconnect timer is active */
1601 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1602 device_get_name(session->device, name, sizeof(name));
1603 DBG("name : [%s]", name);
1604 if (g_str_equal(name, "VW BT") || g_str_equal(name, "VW MI") ||
1605 g_str_equal(name, "Seat ")) {
1606 session->dc_timer = g_timeout_add_seconds(3, disconnect_timeout,
1608 } else if (g_str_equal(name, "CAR M")) {
1609 session->dc_timer = g_timeout_add(200, disconnect_timeout,
1612 session->dc_timer = g_timeout_add_seconds(DISCONNECT_TIMEOUT,
1617 DBG("timeout %d", session->dc_timeout);
1618 if (!session->dc_timeout)
1619 session->dc_timer = g_idle_add(disconnect_timeout, session);
1621 session->dc_timer = g_timeout_add_seconds(session->dc_timeout,
1627 void avdtp_unref(struct avdtp *session)
1633 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
1634 struct btd_adapter *adapter;
1635 adapter = avdtp_get_adapter(session);
1638 DBG("%p: ref=%d", session, session->ref);
1640 if (session->ref > 0)
1643 switch (session->state) {
1644 case AVDTP_SESSION_STATE_CONNECTED:
1645 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
1646 if (btd_adapter_get_a2dp_role(adapter) == BLUETOOTH_A2DP_SINK_ROLE)
1647 set_disconnect_timer_for_sink(session, TRUE);
1649 set_disconnect_timer(session);
1651 set_disconnect_timer(session);
1654 case AVDTP_SESSION_STATE_CONNECTING:
1655 connection_lost(session, ECONNABORTED);
1657 case AVDTP_SESSION_STATE_DISCONNECTED:
1659 avdtp_free(session);
1664 struct avdtp *avdtp_ref(struct avdtp *session)
1667 DBG("%p: ref=%d", session, session->ref);
1668 remove_disconnect_timer(session);
1672 static bool match_by_seid(const void *data, const void *user_data)
1674 const struct avdtp_local_sep *sep = data;
1675 uint8_t seid = PTR_TO_UINT(user_data);
1677 return sep->info.seid == seid;
1680 static struct avdtp_local_sep *find_local_sep_by_seid(struct avdtp *session,
1683 return queue_find(session->lseps, match_by_seid, INT_TO_PTR(seid));
1686 struct avdtp_remote_sep *avdtp_find_remote_sep(struct avdtp *session,
1687 struct avdtp_local_sep *lsep)
1691 if (lsep->info.inuse)
1694 for (l = session->seps; l != NULL; l = g_slist_next(l)) {
1695 struct avdtp_remote_sep *sep = l->data;
1696 struct avdtp_service_capability *cap;
1697 struct avdtp_media_codec_capability *codec_data;
1699 /* Type must be different: source <-> sink */
1700 if (sep->type == lsep->info.type)
1703 if (sep->media_type != lsep->info.media_type)
1710 codec_data = (void *) cap->data;
1712 if (codec_data->media_codec_type != lsep->codec)
1715 if (lsep->ind && lsep->ind->match_codec)
1716 if (!lsep->ind->match_codec(session, codec_data,
1720 if (sep->stream == NULL)
1727 static GSList *caps_to_list(uint8_t *data, int size,
1728 struct avdtp_service_capability **codec,
1729 gboolean *delay_reporting)
1734 if (delay_reporting)
1735 *delay_reporting = FALSE;
1737 for (processed = 0, caps = NULL; processed + 2 <= size;) {
1738 struct avdtp_service_capability *cap;
1739 uint8_t length, category;
1744 if (processed + 2 + length > size) {
1745 error("Invalid capability data in getcap resp");
1749 cap = g_malloc(sizeof(struct avdtp_service_capability) +
1751 memcpy(cap, data, 2 + length);
1753 processed += 2 + length;
1756 caps = g_slist_append(caps, cap);
1758 if (category == AVDTP_MEDIA_CODEC &&
1760 sizeof(struct avdtp_media_codec_capability))
1762 else if (category == AVDTP_DELAY_REPORTING && delay_reporting)
1763 *delay_reporting = TRUE;
1769 static gboolean avdtp_unknown_cmd(struct avdtp *session, uint8_t transaction,
1772 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_GEN_REJECT,
1773 signal_id, NULL, 0);
1776 static void copy_seps(void *data, void *user_data)
1778 struct avdtp_local_sep *sep = data;
1779 struct seid_info **p = user_data;
1781 memcpy(*p, &sep->info, sizeof(struct seid_info));
1785 static gboolean avdtp_discover_cmd(struct avdtp *session, uint8_t transaction,
1786 void *buf, int size)
1788 unsigned int rsp_size, sep_count;
1789 struct seid_info *seps, *p;
1792 sep_count = queue_length(session->lseps);
1794 if (sep_count == 0) {
1795 uint8_t err = AVDTP_NOT_SUPPORTED_COMMAND;
1796 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1797 AVDTP_DISCOVER, &err, sizeof(err));
1800 rsp_size = sep_count * sizeof(struct seid_info);
1802 seps = g_new0(struct seid_info, sep_count);
1805 queue_foreach(session->lseps, copy_seps, &p);
1807 ret = avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1808 AVDTP_DISCOVER, seps, rsp_size);
1814 static gboolean avdtp_getcap_cmd(struct avdtp *session, uint8_t transaction,
1815 struct seid_req *req, unsigned int size,
1819 struct avdtp_local_sep *sep = NULL;
1820 unsigned int rsp_size;
1821 uint8_t err, buf[1024], *ptr = buf;
1824 cmd = get_all ? AVDTP_GET_ALL_CAPABILITIES : AVDTP_GET_CAPABILITIES;
1826 if (size < sizeof(struct seid_req)) {
1827 err = AVDTP_BAD_LENGTH;
1831 sep = find_local_sep_by_seid(session, req->acp_seid);
1833 err = AVDTP_BAD_ACP_SEID;
1837 if (!sep->ind->get_capability(session, sep, get_all, &caps,
1838 &err, sep->user_data))
1841 for (l = caps, rsp_size = 0; l != NULL; l = g_slist_next(l)) {
1842 struct avdtp_service_capability *cap = l->data;
1844 if (rsp_size + cap->length + 2 > sizeof(buf))
1847 memcpy(ptr, cap, cap->length + 2);
1848 rsp_size += cap->length + 2;
1849 ptr += cap->length + 2;
1856 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT, cmd,
1860 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT, cmd,
1864 static void setconf_cb(struct avdtp *session, struct avdtp_stream *stream,
1865 struct avdtp_error *err)
1867 struct conf_rej rej;
1868 struct avdtp_local_sep *sep;
1871 rej.error = AVDTP_UNSUPPORTED_CONFIGURATION;
1872 rej.category = err->err.error_code;
1873 avdtp_send(session, session->in.transaction,
1874 AVDTP_MSG_TYPE_REJECT, AVDTP_SET_CONFIGURATION,
1876 stream_free(stream);
1880 if (!avdtp_send(session, session->in.transaction, AVDTP_MSG_TYPE_ACCEPT,
1881 AVDTP_SET_CONFIGURATION, NULL, 0)) {
1882 stream_free(stream);
1887 sep->stream = stream;
1888 sep->info.inuse = 1;
1889 session->streams = g_slist_append(session->streams, stream);
1891 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
1894 static gboolean avdtp_setconf_cmd(struct avdtp *session, uint8_t transaction,
1895 struct setconf_req *req, unsigned int size)
1897 struct conf_rej rej;
1898 struct avdtp_local_sep *sep;
1899 struct avdtp_stream *stream;
1900 uint8_t err, category = 0x00;
1901 struct btd_service *service;
1904 if (size < sizeof(struct setconf_req)) {
1905 error("Too short getcap request");
1909 sep = find_local_sep_by_seid(session, req->acp_seid);
1911 err = AVDTP_BAD_ACP_SEID;
1916 err = AVDTP_SEP_IN_USE;
1920 switch (sep->info.type) {
1921 case AVDTP_SEP_TYPE_SOURCE:
1922 service = btd_device_get_service(session->device,
1924 if (service == NULL) {
1925 btd_device_add_uuid(session->device, A2DP_SINK_UUID);
1926 service = btd_device_get_service(session->device,
1928 if (service == NULL) {
1929 error("Unable to get a audio sink object");
1930 err = AVDTP_BAD_STATE;
1935 case AVDTP_SEP_TYPE_SINK:
1936 service = btd_device_get_service(session->device,
1938 if (service == NULL) {
1939 btd_device_add_uuid(session->device, A2DP_SOURCE_UUID);
1940 service = btd_device_get_service(session->device,
1942 if (service == NULL) {
1943 error("Unable to get a audio source object");
1944 err = AVDTP_BAD_STATE;
1951 stream = g_new0(struct avdtp_stream, 1);
1952 stream->session = session;
1954 stream->rseid = req->int_seid;
1955 stream->caps = caps_to_list(req->caps,
1956 size - sizeof(struct setconf_req),
1958 &stream->delay_reporting);
1960 /* Verify that the Media Transport capability's length = 0. Reject otherwise */
1961 for (l = stream->caps; l != NULL; l = g_slist_next(l)) {
1962 struct avdtp_service_capability *cap = l->data;
1964 if (cap->category == AVDTP_MEDIA_TRANSPORT && cap->length != 0) {
1965 err = AVDTP_BAD_MEDIA_TRANSPORT_FORMAT;
1970 if (stream->delay_reporting && session->version < 0x0103)
1971 session->version = 0x0103;
1973 if (sep->ind && sep->ind->set_configuration) {
1974 if (!sep->ind->set_configuration(session, sep, stream,
1978 err = AVDTP_UNSUPPORTED_CONFIGURATION;
1983 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1984 AVDTP_SET_CONFIGURATION, NULL, 0)) {
1985 stream_free(stream);
1989 sep->stream = stream;
1990 sep->info.inuse = 1;
1991 session->streams = g_slist_append(session->streams, stream);
1993 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
1999 stream_free(stream);
2002 rej.category = category;
2003 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2004 AVDTP_SET_CONFIGURATION, &rej, sizeof(rej));
2007 static gboolean avdtp_getconf_cmd(struct avdtp *session, uint8_t transaction,
2008 struct seid_req *req, int size)
2011 struct avdtp_local_sep *sep = NULL;
2017 if (size < (int) sizeof(struct seid_req)) {
2018 error("Too short getconf request");
2022 memset(buf, 0, sizeof(buf));
2024 sep = find_local_sep_by_seid(session, req->acp_seid);
2026 err = AVDTP_BAD_ACP_SEID;
2029 if (!sep->stream || !sep->stream->caps) {
2030 err = AVDTP_UNSUPPORTED_CONFIGURATION;
2034 for (l = sep->stream->caps, rsp_size = 0; l != NULL; l = g_slist_next(l)) {
2035 struct avdtp_service_capability *cap = l->data;
2037 if (rsp_size + cap->length + 2 > (int) sizeof(buf))
2040 memcpy(ptr, cap, cap->length + 2);
2041 rsp_size += cap->length + 2;
2042 ptr += cap->length + 2;
2045 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2046 AVDTP_GET_CONFIGURATION, buf, rsp_size);
2049 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2050 AVDTP_GET_CONFIGURATION, &err, sizeof(err));
2053 static gboolean avdtp_reconf_cmd(struct avdtp *session, uint8_t transaction,
2054 struct seid_req *req, int size)
2056 struct conf_rej rej;
2058 rej.error = AVDTP_NOT_SUPPORTED_COMMAND;
2059 rej.category = 0x00;
2061 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2062 AVDTP_RECONFIGURE, &rej, sizeof(rej));
2065 static void check_seid_collision(struct pending_req *req, uint8_t id)
2067 struct seid_req *seid = req->data;
2069 if (seid->acp_seid == id)
2070 req->collided = TRUE;
2073 static void check_start_collision(struct pending_req *req, uint8_t id)
2075 struct start_req *start = req->data;
2076 struct seid *seid = &start->first_seid;
2077 int count = 1 + req->data_size - sizeof(struct start_req);
2080 for (i = 0; i < count; i++, seid++) {
2081 if (seid->seid == id) {
2082 req->collided = TRUE;
2088 static void check_suspend_collision(struct pending_req *req, uint8_t id)
2090 struct suspend_req *suspend = req->data;
2091 struct seid *seid = &suspend->first_seid;
2092 int count = 1 + req->data_size - sizeof(struct suspend_req);
2095 for (i = 0; i < count; i++, seid++) {
2096 if (seid->seid == id) {
2097 req->collided = TRUE;
2103 static void avdtp_check_collision(struct avdtp *session, uint8_t cmd,
2104 struct avdtp_stream *stream)
2106 struct pending_req *req = session->req;
2108 if (req == NULL || (req->signal_id != cmd && cmd != AVDTP_ABORT))
2111 if (cmd == AVDTP_ABORT)
2112 cmd = req->signal_id;
2117 check_seid_collision(req, stream->rseid);
2120 check_start_collision(req, stream->rseid);
2123 check_suspend_collision(req, stream->rseid);
2128 static gboolean avdtp_open_cmd(struct avdtp *session, uint8_t transaction,
2129 struct seid_req *req, unsigned int size)
2131 struct avdtp_local_sep *sep;
2132 struct avdtp_stream *stream;
2135 if (size < sizeof(struct seid_req)) {
2136 error("Too short abort request");
2140 sep = find_local_sep_by_seid(session, req->acp_seid);
2142 err = AVDTP_BAD_ACP_SEID;
2146 if (sep->state != AVDTP_STATE_CONFIGURED) {
2147 err = AVDTP_BAD_STATE;
2151 stream = sep->stream;
2153 if (sep->ind && sep->ind->open) {
2154 if (!sep->ind->open(session, sep, stream, &err,
2159 avdtp_check_collision(session, AVDTP_OPEN, stream);
2161 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2162 AVDTP_OPEN, NULL, 0))
2165 stream->open_acp = TRUE;
2166 session->pending_open = stream;
2167 stream->timer = g_timeout_add_seconds(REQ_TIMEOUT,
2168 stream_open_timeout,
2174 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2175 AVDTP_OPEN, &err, sizeof(err));
2178 static gboolean avdtp_start_cmd(struct avdtp *session, uint8_t transaction,
2179 struct start_req *req, unsigned int size)
2182 struct avdtp_local_sep *sep;
2183 struct avdtp_stream *stream;
2184 struct stream_rej rej;
2186 uint8_t err, failed_seid;
2190 if (size < sizeof(struct start_req)) {
2191 error("Too short start request");
2195 seid_count = 1 + size - sizeof(struct start_req);
2197 seid = &req->first_seid;
2199 for (i = 0; i < seid_count; i++, seid++) {
2200 failed_seid = seid->seid;
2202 sep = find_local_sep_by_seid(session, seid->seid);
2203 if (!sep || !sep->stream) {
2204 err = AVDTP_BAD_ACP_SEID;
2208 stream = sep->stream;
2210 /* Also reject start cmd if state is not open */
2211 if (sep->state != AVDTP_STATE_OPEN) {
2212 err = AVDTP_BAD_STATE;
2215 stream->starting = TRUE;
2217 if (sep->ind && sep->ind->start) {
2218 if (!sep->ind->start(session, sep, stream, &err,
2223 avdtp_check_collision(session, AVDTP_START, stream);
2225 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
2226 avdtp_add_source_device(session->device);
2229 avdtp_sep_set_state(session, sep, AVDTP_STATE_STREAMING);
2232 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2233 AVDTP_START, NULL, 0);
2236 DBG("Rejecting (%d)", err);
2237 memset(&rej, 0, sizeof(rej));
2238 rej.acp_seid = failed_seid;
2240 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2241 AVDTP_START, &rej, sizeof(rej));
2244 static gboolean avdtp_close_cmd(struct avdtp *session, uint8_t transaction,
2245 struct seid_req *req, unsigned int size)
2247 struct avdtp_local_sep *sep;
2248 struct avdtp_stream *stream;
2251 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
2252 avdtp_remove_source_devce(session->device);
2255 if (size < sizeof(struct seid_req)) {
2256 error("Too short close request");
2260 sep = find_local_sep_by_seid(session, req->acp_seid);
2261 if (!sep || !sep->stream) {
2262 err = AVDTP_BAD_ACP_SEID;
2266 if (sep->state != AVDTP_STATE_OPEN &&
2267 sep->state != AVDTP_STATE_STREAMING) {
2268 err = AVDTP_BAD_STATE;
2272 stream = sep->stream;
2274 if (sep->ind && sep->ind->close) {
2275 if (!sep->ind->close(session, sep, stream, &err,
2280 avdtp_check_collision(session, AVDTP_CLOSE, stream);
2282 avdtp_sep_set_state(session, sep, AVDTP_STATE_CLOSING);
2284 session->dc_timeout = DISCONNECT_TIMEOUT;
2286 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2287 AVDTP_CLOSE, NULL, 0))
2290 stream->timer = g_timeout_add_seconds(REQ_TIMEOUT,
2291 stream_close_timeout,
2297 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2298 AVDTP_CLOSE, &err, sizeof(err));
2301 static gboolean avdtp_suspend_cmd(struct avdtp *session, uint8_t transaction,
2302 struct suspend_req *req, unsigned int size)
2304 struct avdtp_local_sep *sep;
2305 struct avdtp_stream *stream;
2306 struct stream_rej rej;
2308 uint8_t err, failed_seid;
2311 if (size < sizeof(struct suspend_req)) {
2312 error("Too short suspend request");
2316 seid_count = 1 + size - sizeof(struct suspend_req);
2318 seid = &req->first_seid;
2320 for (i = 0; i < seid_count; i++, seid++) {
2321 failed_seid = seid->seid;
2323 sep = find_local_sep_by_seid(session, seid->seid);
2324 if (!sep || !sep->stream) {
2325 err = AVDTP_BAD_ACP_SEID;
2329 stream = sep->stream;
2331 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
2332 if (sep->state != AVDTP_STATE_STREAMING) {
2333 DBG("Not streaming state: %d", sep->state);
2334 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2335 AVDTP_SUSPEND, NULL, 0);
2338 if (sep->state != AVDTP_STATE_STREAMING) {
2339 err = AVDTP_BAD_STATE;
2344 if (sep->ind && sep->ind->suspend) {
2345 if (!sep->ind->suspend(session, sep, stream, &err,
2350 avdtp_check_collision(session, AVDTP_SUSPEND, stream);
2352 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
2355 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2356 AVDTP_SUSPEND, NULL, 0);
2359 memset(&rej, 0, sizeof(rej));
2360 rej.acp_seid = failed_seid;
2362 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2363 AVDTP_SUSPEND, &rej, sizeof(rej));
2366 static gboolean avdtp_abort_cmd(struct avdtp *session, uint8_t transaction,
2367 struct seid_req *req, unsigned int size)
2369 struct avdtp_local_sep *sep;
2373 if (size < sizeof(struct seid_req)) {
2374 error("Too short abort request");
2378 sep = find_local_sep_by_seid(session, req->acp_seid);
2379 if (!sep || !sep->stream)
2382 if (sep->ind && sep->ind->abort)
2383 sep->ind->abort(session, sep, sep->stream, &err,
2386 avdtp_check_collision(session, AVDTP_ABORT, sep->stream);
2388 ret = avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2389 AVDTP_ABORT, NULL, 0);
2391 avdtp_sep_set_state(session, sep, AVDTP_STATE_ABORTING);
2392 session->dc_timeout = DISCONNECT_TIMEOUT;
2398 static gboolean avdtp_secctl_cmd(struct avdtp *session, uint8_t transaction,
2399 struct seid_req *req, int size)
2401 return avdtp_unknown_cmd(session, transaction, AVDTP_SECURITY_CONTROL);
2404 static gboolean avdtp_delayreport_cmd(struct avdtp *session,
2405 uint8_t transaction,
2406 struct delay_req *req,
2409 struct avdtp_local_sep *sep;
2410 struct avdtp_stream *stream;
2413 if (size < sizeof(struct delay_req)) {
2414 error("Too short delay report request");
2418 sep = find_local_sep_by_seid(session, req->acp_seid);
2419 if (!sep || !sep->stream) {
2420 err = AVDTP_BAD_ACP_SEID;
2424 stream = sep->stream;
2426 if (sep->state != AVDTP_STATE_CONFIGURED &&
2427 sep->state != AVDTP_STATE_OPEN &&
2428 sep->state != AVDTP_STATE_STREAMING) {
2429 err = AVDTP_BAD_STATE;
2433 stream->delay = ntohs(req->delay);
2435 if (sep->ind && sep->ind->delayreport) {
2436 if (!sep->ind->delayreport(session, sep, stream->rseid,
2437 stream->delay, &err,
2442 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2443 AVDTP_DELAY_REPORT, NULL, 0);
2446 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2447 AVDTP_DELAY_REPORT, &err, sizeof(err));
2450 static gboolean avdtp_parse_cmd(struct avdtp *session, uint8_t transaction,
2451 uint8_t signal_id, void *buf, int size)
2453 switch (signal_id) {
2454 case AVDTP_DISCOVER:
2455 DBG("Received DISCOVER_CMD");
2456 return avdtp_discover_cmd(session, transaction, buf, size);
2457 case AVDTP_GET_CAPABILITIES:
2458 DBG("Received GET_CAPABILITIES_CMD");
2459 return avdtp_getcap_cmd(session, transaction, buf, size,
2461 case AVDTP_GET_ALL_CAPABILITIES:
2462 DBG("Received GET_ALL_CAPABILITIES_CMD");
2463 return avdtp_getcap_cmd(session, transaction, buf, size, TRUE);
2464 case AVDTP_SET_CONFIGURATION:
2465 DBG("Received SET_CONFIGURATION_CMD");
2466 return avdtp_setconf_cmd(session, transaction, buf, size);
2467 case AVDTP_GET_CONFIGURATION:
2468 DBG("Received GET_CONFIGURATION_CMD");
2469 return avdtp_getconf_cmd(session, transaction, buf, size);
2470 case AVDTP_RECONFIGURE:
2471 DBG("Received RECONFIGURE_CMD");
2472 return avdtp_reconf_cmd(session, transaction, buf, size);
2474 DBG("Received OPEN_CMD");
2475 return avdtp_open_cmd(session, transaction, buf, size);
2477 DBG("Received START_CMD");
2478 return avdtp_start_cmd(session, transaction, buf, size);
2480 DBG("Received CLOSE_CMD");
2481 return avdtp_close_cmd(session, transaction, buf, size);
2483 DBG("Received SUSPEND_CMD");
2484 return avdtp_suspend_cmd(session, transaction, buf, size);
2486 DBG("Received ABORT_CMD");
2487 return avdtp_abort_cmd(session, transaction, buf, size);
2488 case AVDTP_SECURITY_CONTROL:
2489 DBG("Received SECURITY_CONTROL_CMD");
2490 return avdtp_secctl_cmd(session, transaction, buf, size);
2491 case AVDTP_DELAY_REPORT:
2492 DBG("Received DELAY_REPORT_CMD");
2493 return avdtp_delayreport_cmd(session, transaction, buf, size);
2495 DBG("Received unknown request id %u", signal_id);
2496 return avdtp_unknown_cmd(session, transaction, signal_id);
2500 enum avdtp_parse_result { PARSE_ERROR, PARSE_FRAGMENT, PARSE_SUCCESS };
2502 static enum avdtp_parse_result avdtp_parse_data(struct avdtp *session,
2503 void *buf, size_t size)
2505 struct avdtp_common_header *header = buf;
2506 struct avdtp_single_header *single = (void *) session->buf;
2507 struct avdtp_start_header *start = (void *) session->buf;
2511 switch (header->packet_type) {
2512 case AVDTP_PKT_TYPE_SINGLE:
2513 if (size < sizeof(*single)) {
2514 error("Received too small single packet (%zu bytes)", size);
2517 if (session->in.active) {
2518 error("SINGLE: Invalid AVDTP packet fragmentation");
2522 payload = session->buf + sizeof(*single);
2523 payload_size = size - sizeof(*single);
2525 session->in.active = TRUE;
2526 session->in.data_size = 0;
2527 session->in.no_of_packets = 1;
2528 session->in.transaction = header->transaction;
2529 session->in.message_type = header->message_type;
2530 session->in.signal_id = single->signal_id;
2533 case AVDTP_PKT_TYPE_START:
2534 if (size < sizeof(*start)) {
2535 error("Received too small start packet (%zu bytes)", size);
2538 if (session->in.active) {
2539 error("START: Invalid AVDTP packet fragmentation");
2543 session->in.active = TRUE;
2544 session->in.data_size = 0;
2545 session->in.transaction = header->transaction;
2546 session->in.message_type = header->message_type;
2547 session->in.no_of_packets = start->no_of_packets;
2548 session->in.signal_id = start->signal_id;
2550 payload = session->buf + sizeof(*start);
2551 payload_size = size - sizeof(*start);
2554 case AVDTP_PKT_TYPE_CONTINUE:
2555 if (size < sizeof(struct avdtp_continue_header)) {
2556 error("Received too small continue packet (%zu bytes)",
2560 if (!session->in.active) {
2561 error("CONTINUE: Invalid AVDTP packet fragmentation");
2564 if (session->in.transaction != header->transaction) {
2565 error("Continue transaction id doesn't match");
2568 if (session->in.no_of_packets <= 1) {
2569 error("Too few continue packets");
2573 payload = session->buf + sizeof(struct avdtp_continue_header);
2574 payload_size = size - sizeof(struct avdtp_continue_header);
2577 case AVDTP_PKT_TYPE_END:
2578 if (size < sizeof(struct avdtp_continue_header)) {
2579 error("Received too small end packet (%zu bytes)", size);
2582 if (!session->in.active) {
2583 error("END: Invalid AVDTP packet fragmentation");
2586 if (session->in.transaction != header->transaction) {
2587 error("End transaction id doesn't match");
2590 if (session->in.no_of_packets > 1) {
2591 error("Got an end packet too early");
2595 payload = session->buf + sizeof(struct avdtp_continue_header);
2596 payload_size = size - sizeof(struct avdtp_continue_header);
2600 error("Invalid AVDTP packet type 0x%02X", header->packet_type);
2604 if (session->in.data_size + payload_size >
2605 sizeof(session->in.buf)) {
2606 error("Not enough incoming buffer space!");
2610 memcpy(session->in.buf + session->in.data_size, payload, payload_size);
2611 session->in.data_size += payload_size;
2613 if (session->in.no_of_packets > 1) {
2614 session->in.no_of_packets--;
2615 DBG("Received AVDTP fragment. %d to go",
2616 session->in.no_of_packets);
2617 return PARSE_FRAGMENT;
2620 session->in.active = FALSE;
2622 return PARSE_SUCCESS;
2625 static gboolean session_cb(GIOChannel *chan, GIOCondition cond,
2628 struct avdtp *session = data;
2629 struct avdtp_common_header *header;
2635 if (cond & G_IO_NVAL)
2638 header = (void *) session->buf;
2640 if (cond & (G_IO_HUP | G_IO_ERR))
2643 fd = g_io_channel_unix_get_fd(chan);
2644 size = read(fd, session->buf, session->imtu);
2646 error("IO Channel read error");
2650 if ((size_t) size < sizeof(struct avdtp_common_header)) {
2651 error("Received too small packet (%zu bytes)", size);
2655 switch (avdtp_parse_data(session, session->buf, size)) {
2658 case PARSE_FRAGMENT:
2664 if (session->in.message_type == AVDTP_MSG_TYPE_COMMAND) {
2665 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
2666 struct btd_service *service;
2668 service = btd_device_get_service(session->device, A2DP_SINK_UUID);
2669 if (service != NULL) {
2670 DBG("A2dp state %d", btd_service_get_state(
2671 btd_device_get_service(session->device, A2DP_SINK_UUID)));
2673 if (btd_service_get_state(btd_device_get_service(session->device,
2674 A2DP_SINK_UUID)) == BTD_SERVICE_STATE_DISCONNECTING) {
2675 DBG("avdtp:%p , disconnect timer is going on", session);
2680 if (!avdtp_parse_cmd(session, session->in.transaction,
2681 session->in.signal_id,
2683 session->in.data_size)) {
2684 error("Unable to handle command. Disconnecting");
2688 if (session->req && session->req->collided) {
2689 DBG("Collision detected");
2696 if (session->req == NULL) {
2697 error("No pending request, ignoring message");
2701 if (header->transaction != session->req->transaction) {
2702 error("Transaction label doesn't match");
2706 if (session->in.signal_id != session->req->signal_id) {
2707 error("Response signal doesn't match");
2711 g_source_remove(session->req->timeout);
2712 session->req->timeout = 0;
2714 switch (header->message_type) {
2715 case AVDTP_MSG_TYPE_ACCEPT:
2716 if (!avdtp_parse_resp(session, session->req->stream,
2717 session->in.transaction,
2718 session->in.signal_id,
2720 session->in.data_size)) {
2721 error("Unable to parse accept response");
2725 case AVDTP_MSG_TYPE_REJECT:
2726 if (!avdtp_parse_rej(session, session->req->stream,
2727 session->in.transaction,
2728 session->in.signal_id,
2730 session->in.data_size)) {
2731 error("Unable to parse reject response");
2735 case AVDTP_MSG_TYPE_GEN_REJECT:
2736 error("Received a General Reject message");
2739 error("Unknown message type 0x%02X", header->message_type);
2744 pending_req_free(session->req);
2745 session->req = NULL;
2747 process_queue(session);
2752 connection_lost(session, EIO);
2757 static uint16_t get_version(struct avdtp *session)
2759 const sdp_record_t *rec;
2761 sdp_data_t *proto_desc;
2762 uint16_t ver = 0x0000;
2764 rec = btd_device_get_record(session->device, A2DP_SINK_UUID);
2766 rec = btd_device_get_record(session->device, A2DP_SOURCE_UUID);
2771 if (sdp_get_access_protos(rec, &protos) < 0)
2774 proto_desc = sdp_get_proto_desc(protos, AVDTP_UUID);
2775 if (proto_desc && proto_desc->dtd == SDP_UINT16)
2776 ver = proto_desc->val.uint16;
2778 sdp_list_foreach(protos, (sdp_list_func_t) sdp_list_free, NULL);
2779 sdp_list_free(protos, NULL);
2784 static void avdtp_connect_cb(GIOChannel *chan, GError *err, gpointer user_data)
2786 struct avdtp *session = user_data;
2789 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2790 struct btd_adapter *adapter;
2791 adapter = avdtp_get_adapter(session);
2796 error("%s", err->message);
2801 session->io = g_io_channel_ref(chan);
2803 /* Check if kernel supports reading packet types */
2804 bt_io_get(chan, NULL, BT_IO_OPT_PHY, &session->phy, BT_IO_OPT_INVALID);
2806 bt_io_get(chan, &err,
2807 BT_IO_OPT_OMTU, &session->omtu,
2808 BT_IO_OPT_IMTU, &session->imtu,
2812 error("%s", err->message);
2816 ba2str(device_get_address(session->device), address);
2817 DBG("AVDTP: connected %s channel to %s",
2818 session->pending_open ? "transport" : "signaling",
2821 if (session->state == AVDTP_SESSION_STATE_CONNECTING) {
2822 DBG("AVDTP imtu=%u, omtu=%u", session->imtu, session->omtu);
2824 session->buf = g_malloc0(MAX(session->imtu, session->omtu));
2825 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTED);
2828 g_source_remove(session->io_id);
2830 /* This watch should be low priority since otherwise the
2831 * connect callback might be dispatched before the session
2832 * callback if the kernel wakes us up at the same time for
2833 * them. This could happen if a headset is very quick in
2834 * sending the Start command after connecting the stream
2835 * transport channel.
2837 session->io_id = g_io_add_watch_full(chan,
2839 G_IO_IN | G_IO_ERR | G_IO_HUP
2841 (GIOFunc) session_cb, session,
2844 if (session->stream_setup) {
2845 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2846 if (btd_adapter_get_a2dp_role(adapter) == BLUETOOTH_A2DP_SINK_ROLE)
2847 set_disconnect_timer_for_sink(session, FALSE);
2849 set_disconnect_timer(session);
2851 set_disconnect_timer(session);
2854 } else if (session->pending_open)
2855 handle_transport_connect(session, chan, session->imtu,
2860 process_queue(session);
2865 if (session->pending_open) {
2866 struct avdtp_stream *stream = session->pending_open;
2868 handle_transport_connect(session, NULL, 0, 0);
2870 if (avdtp_abort(session, stream) < 0)
2871 avdtp_sep_set_state(session, stream->lsep,
2874 connection_lost(session, err_no);
2877 struct avdtp *avdtp_new(GIOChannel *chan, struct btd_device *device,
2878 struct queue *lseps)
2880 struct avdtp *session;
2882 session = g_new0(struct avdtp, 1);
2884 session->device = btd_device_ref(device);
2885 /* We don't use avdtp_set_state() here since this isn't a state change
2886 * but just setting of the initial state */
2887 session->state = AVDTP_SESSION_STATE_DISCONNECTED;
2888 session->lseps = lseps;
2890 session->version = get_version(session);
2895 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTING);
2897 btd_device_add_uuid(device, ADVANCED_AUDIO_UUID);
2899 session->io = g_io_channel_ref(chan);
2900 session->io_id = g_io_add_watch(chan, G_IO_ERR | G_IO_HUP | G_IO_NVAL,
2901 (GIOFunc) session_cb, session);
2903 /* This is so that avdtp_connect_cb will know to do the right thing
2904 * with respect to the disconnect timer */
2905 session->stream_setup = TRUE;
2907 session->dc_timeout = DISCONNECT_TIMEOUT;
2909 avdtp_connect_cb(chan, NULL, session);
2914 uint16_t avdtp_get_version(struct avdtp *session)
2916 return session->version;
2919 static GIOChannel *l2cap_connect(struct avdtp *session)
2923 const bdaddr_t *src;
2925 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2926 struct btd_adapter *adapter;
2927 adapter = avdtp_get_adapter(session);
2930 src = btd_adapter_get_address(device_get_adapter(session->device));
2931 if (main_opts.mps == MPS_OFF)
2932 mode = BT_IO_MODE_BASIC;
2934 mode = BT_IO_MODE_STREAMING;
2936 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2937 if (btd_adapter_get_a2dp_role(adapter) == BLUETOOTH_A2DP_SINK_ROLE) {
2938 io = bt_io_connect(avdtp_connect_cb, session,
2940 BT_IO_OPT_SOURCE_BDADDR, src,
2941 BT_IO_OPT_DEST_BDADDR,
2942 device_get_address(session->device),
2943 BT_IO_OPT_PSM, AVDTP_PSM,
2944 BT_IO_OPT_MODE, mode,
2945 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2946 BT_IO_OPT_IMTU, 895,
2950 io = bt_io_connect(avdtp_connect_cb, session,
2952 BT_IO_OPT_SOURCE_BDADDR, src,
2953 BT_IO_OPT_DEST_BDADDR,
2954 device_get_address(session->device),
2955 BT_IO_OPT_PSM, AVDTP_PSM,
2956 BT_IO_OPT_MODE, mode,
2957 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2962 io = bt_io_connect(avdtp_connect_cb, session,
2964 BT_IO_OPT_SOURCE_BDADDR, src,
2965 BT_IO_OPT_DEST_BDADDR,
2966 device_get_address(session->device),
2967 BT_IO_OPT_PSM, AVDTP_PSM,
2968 BT_IO_OPT_MODE, mode,
2969 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2970 /* Set Input MTU to 0 to auto-tune */
2974 io = bt_io_connect(avdtp_connect_cb, session,
2976 BT_IO_OPT_SOURCE_BDADDR, src,
2977 BT_IO_OPT_DEST_BDADDR,
2978 device_get_address(session->device),
2979 BT_IO_OPT_PSM, AVDTP_PSM,
2980 BT_IO_OPT_MODE, mode,
2981 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2986 error("%s", err->message);
2994 static void queue_request(struct avdtp *session, struct pending_req *req,
2998 session->prio_queue = g_slist_append(session->prio_queue, req);
3000 session->req_queue = g_slist_append(session->req_queue, req);
3003 static uint8_t req_get_seid(struct pending_req *req)
3005 if (req->signal_id == AVDTP_DISCOVER)
3008 return ((struct seid_req *) (req->data))->acp_seid;
3011 static int cancel_request(struct avdtp *session, int err)
3013 struct pending_req *req;
3014 struct seid_req sreq;
3015 struct avdtp_local_sep *lsep;
3016 struct avdtp_stream *stream;
3018 struct avdtp_error averr;
3021 session->req = NULL;
3023 avdtp_error_init(&averr, AVDTP_ERRNO, err);
3025 seid = req_get_seid(req);
3027 stream = find_stream_by_rseid(session, seid);
3032 lsep = stream->lsep;
3036 switch (req->signal_id) {
3037 case AVDTP_RECONFIGURE:
3038 error("Reconfigure: %s (%d)", strerror(err), err);
3039 if (lsep && lsep->cfm && lsep->cfm->reconfigure)
3040 lsep->cfm->reconfigure(session, lsep, stream, &averr,
3044 error("Open: %s (%d)", strerror(err), err);
3045 if (lsep && lsep->cfm && lsep->cfm->open)
3046 lsep->cfm->open(session, lsep, stream, &averr,
3050 error("Start: %s (%d)", strerror(err), err);
3051 if (lsep && lsep->cfm && lsep->cfm->start) {
3052 lsep->cfm->start(session, lsep, stream, &averr,
3055 stream->starting = FALSE;
3059 error("Suspend: %s (%d)", strerror(err), err);
3060 if (lsep && lsep->cfm && lsep->cfm->suspend)
3061 lsep->cfm->suspend(session, lsep, stream, &averr,
3065 error("Close: %s (%d)", strerror(err), err);
3066 if (lsep && lsep->cfm && lsep->cfm->close) {
3067 lsep->cfm->close(session, lsep, stream, &averr,
3070 stream->close_int = FALSE;
3073 case AVDTP_SET_CONFIGURATION:
3074 error("SetConfiguration: %s (%d)", strerror(err), err);
3075 if (lsep && lsep->cfm && lsep->cfm->set_configuration)
3076 lsep->cfm->set_configuration(session, lsep, stream,
3077 &averr, lsep->user_data);
3079 case AVDTP_DISCOVER:
3080 error("Discover: %s (%d)", strerror(err), err);
3082 case AVDTP_GET_CAPABILITIES:
3083 error("GetCapabilities: %s (%d)", strerror(err), err);
3086 error("Abort: %s (%d)", strerror(err), err);
3093 memset(&sreq, 0, sizeof(sreq));
3094 sreq.acp_seid = seid;
3096 err = send_request(session, TRUE, stream, AVDTP_ABORT, &sreq,
3099 error("Unable to send abort request");
3103 stream->abort_int = TRUE;
3108 connection_lost(session, err);
3110 pending_req_free(req);
3114 static gboolean request_timeout(gpointer user_data)
3116 struct avdtp *session = user_data;
3118 cancel_request(session, ETIMEDOUT);
3123 static int send_req(struct avdtp *session, gboolean priority,
3124 struct pending_req *req)
3126 static int transaction = 0;
3129 if (session->state == AVDTP_SESSION_STATE_DISCONNECTED) {
3130 session->io = l2cap_connect(session);
3135 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTING);
3138 if (session->state < AVDTP_SESSION_STATE_CONNECTED ||
3139 session->req != NULL) {
3140 queue_request(session, req, priority);
3144 req->transaction = transaction++;
3147 /* FIXME: Should we retry to send if the buffer
3148 was not totally sent or in case of EINTR? */
3149 if (!avdtp_send(session, req->transaction, AVDTP_MSG_TYPE_COMMAND,
3150 req->signal_id, req->data, req->data_size)) {
3157 switch (req->signal_id) {
3159 timeout = ABORT_TIMEOUT;
3162 timeout = SUSPEND_TIMEOUT;
3165 timeout = REQ_TIMEOUT;
3168 req->timeout = g_timeout_add_seconds(timeout, request_timeout, session);
3177 static int send_request(struct avdtp *session, gboolean priority,
3178 struct avdtp_stream *stream, uint8_t signal_id,
3179 void *buffer, size_t size)
3181 struct pending_req *req;
3183 if (stream && stream->abort_int && signal_id != AVDTP_ABORT) {
3184 DBG("Unable to send requests while aborting");
3188 req = g_new0(struct pending_req, 1);
3189 req->signal_id = signal_id;
3190 req->data = g_malloc(size);
3191 memcpy(req->data, buffer, size);
3192 req->data_size = size;
3193 req->stream = stream;
3195 return send_req(session, priority, req);
3198 static gboolean avdtp_discover_resp(struct avdtp *session,
3199 struct discover_resp *resp, int size)
3204 gboolean getcap_pending = FALSE;
3206 if (session->version >= 0x0103)
3207 getcap_cmd = AVDTP_GET_ALL_CAPABILITIES;
3209 getcap_cmd = AVDTP_GET_CAPABILITIES;
3211 sep_count = size / sizeof(struct seid_info);
3213 for (i = 0; i < sep_count; i++) {
3214 struct avdtp_remote_sep *sep;
3215 struct avdtp_stream *stream;
3216 struct seid_req req;
3218 DBG("seid %d type %d media %d in use %d",
3219 resp->seps[i].seid, resp->seps[i].type,
3220 resp->seps[i].media_type, resp->seps[i].inuse);
3222 stream = find_stream_by_rseid(session, resp->seps[i].seid);
3224 sep = find_remote_sep(session->seps, resp->seps[i].seid);
3225 if (sep && sep->type == resp->seps[i].type &&
3226 sep->media_type == resp->seps[i].media_type &&
3228 sep->discovered = true;
3232 if (resp->seps[i].inuse && !stream)
3235 sep = g_new0(struct avdtp_remote_sep, 1);
3236 session->seps = g_slist_append(session->seps, sep);
3238 sep->stream = stream;
3239 sep->seid = resp->seps[i].seid;
3240 sep->type = resp->seps[i].type;
3241 sep->media_type = resp->seps[i].media_type;
3242 sep->discovered = true;
3244 memset(&req, 0, sizeof(req));
3245 req.acp_seid = sep->seid;
3247 ret = send_request(session, TRUE, NULL, getcap_cmd,
3251 getcap_pending = TRUE;
3254 if (!getcap_pending)
3255 finalize_discovery(session, -ret);
3260 static gboolean avdtp_get_capabilities_resp(struct avdtp *session,
3261 struct getcap_resp *resp,
3264 struct avdtp_remote_sep *sep;
3267 /* Check for minimum required packet size includes:
3268 * 1. getcap resp header
3269 * 2. media transport capability (2 bytes)
3270 * 3. media codec capability type + length (2 bytes)
3271 * 4. the actual media codec elements
3273 if (size < (sizeof(struct getcap_resp) + 4 +
3274 sizeof(struct avdtp_media_codec_capability))) {
3275 error("Too short getcap resp packet");
3279 seid = ((struct seid_req *) session->req->data)->acp_seid;
3281 sep = find_remote_sep(session->seps, seid);
3283 DBG("seid %d type %d media %d", sep->seid,
3284 sep->type, sep->media_type);
3287 g_slist_free_full(sep->caps, g_free);
3290 sep->delay_reporting = FALSE;
3293 sep->caps = caps_to_list(resp->caps, size - sizeof(struct getcap_resp),
3294 &sep->codec, &sep->delay_reporting);
3299 static gboolean avdtp_set_configuration_resp(struct avdtp *session,
3300 struct avdtp_stream *stream,
3301 struct avdtp_single_header *resp,
3304 struct avdtp_local_sep *sep = stream->lsep;
3306 if (sep->cfm && sep->cfm->set_configuration)
3307 sep->cfm->set_configuration(session, sep, stream, NULL,
3310 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
3315 static gboolean avdtp_reconfigure_resp(struct avdtp *session,
3316 struct avdtp_stream *stream,
3317 struct avdtp_single_header *resp, int size)
3322 static gboolean avdtp_open_resp(struct avdtp *session, struct avdtp_stream *stream,
3323 struct seid_rej *resp, int size)
3325 struct avdtp_local_sep *sep = stream->lsep;
3327 stream->io = l2cap_connect(session);
3329 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
3333 session->pending_open = stream;
3338 static gboolean avdtp_start_resp(struct avdtp *session,
3339 struct avdtp_stream *stream,
3340 struct seid_rej *resp, int size)
3342 struct avdtp_local_sep *sep = stream->lsep;
3344 if (sep->cfm && sep->cfm->start)
3345 sep->cfm->start(session, sep, stream, NULL, sep->user_data);
3347 /* We might be in STREAMING already if both sides send START_CMD at the
3348 * same time and the one in SNK role doesn't reject it as it should */
3349 if (sep->state != AVDTP_STATE_STREAMING)
3350 avdtp_sep_set_state(session, sep, AVDTP_STATE_STREAMING);
3355 static gboolean avdtp_close_resp(struct avdtp *session,
3356 struct avdtp_stream *stream,
3357 struct seid_rej *resp, int size)
3359 struct avdtp_local_sep *sep = stream->lsep;
3361 avdtp_sep_set_state(session, sep, AVDTP_STATE_CLOSING);
3363 close_stream(stream);
3368 static gboolean avdtp_suspend_resp(struct avdtp *session,
3369 struct avdtp_stream *stream,
3370 void *data, int size)
3372 struct avdtp_local_sep *sep = stream->lsep;
3374 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
3376 if (sep->cfm && sep->cfm->suspend)
3377 sep->cfm->suspend(session, sep, stream, NULL, sep->user_data);
3382 static gboolean avdtp_abort_resp(struct avdtp *session,
3383 struct avdtp_stream *stream,
3384 struct seid_rej *resp, int size)
3386 struct avdtp_local_sep *sep = stream->lsep;
3387 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
3389 error("Error in getting sep");
3394 avdtp_sep_set_state(session, sep, AVDTP_STATE_ABORTING);
3396 if (sep->cfm && sep->cfm->abort)
3397 sep->cfm->abort(session, sep, stream, NULL, sep->user_data);
3399 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
3404 static gboolean avdtp_delay_report_resp(struct avdtp *session,
3405 struct avdtp_stream *stream,
3406 void *data, int size)
3408 struct avdtp_local_sep *sep = stream->lsep;
3410 if (sep->cfm && sep->cfm->delay_report)
3411 sep->cfm->delay_report(session, sep, stream, NULL, sep->user_data);
3416 static gboolean avdtp_parse_resp(struct avdtp *session,
3417 struct avdtp_stream *stream,
3418 uint8_t transaction, uint8_t signal_id,
3419 void *buf, int size)
3421 struct pending_req *next;
3422 const char *get_all = "";
3424 if (session->prio_queue)
3425 next = session->prio_queue->data;
3426 else if (session->req_queue)
3427 next = session->req_queue->data;
3431 switch (signal_id) {
3432 case AVDTP_DISCOVER:
3433 DBG("DISCOVER request succeeded");
3434 return avdtp_discover_resp(session, buf, size);
3435 case AVDTP_GET_ALL_CAPABILITIES:
3438 case AVDTP_GET_CAPABILITIES:
3439 DBG("GET_%sCAPABILITIES request succeeded", get_all);
3440 if (!avdtp_get_capabilities_resp(session, buf, size))
3442 if (!(next && (next->signal_id == AVDTP_GET_CAPABILITIES ||
3443 next->signal_id == AVDTP_GET_ALL_CAPABILITIES)))
3444 finalize_discovery(session, 0);
3448 /* The remaining commands require an existing stream so bail out
3449 * here if the stream got unexpectedly disconnected */
3451 DBG("AVDTP: stream was closed while waiting for reply");
3455 switch (signal_id) {
3456 case AVDTP_SET_CONFIGURATION:
3457 DBG("SET_CONFIGURATION request succeeded");
3458 return avdtp_set_configuration_resp(session, stream,
3460 case AVDTP_RECONFIGURE:
3461 DBG("RECONFIGURE request succeeded");
3462 return avdtp_reconfigure_resp(session, stream, buf, size);
3464 DBG("OPEN request succeeded");
3465 return avdtp_open_resp(session, stream, buf, size);
3467 DBG("SUSPEND request succeeded");
3468 return avdtp_suspend_resp(session, stream, buf, size);
3470 DBG("START request succeeded");
3471 return avdtp_start_resp(session, stream, buf, size);
3473 DBG("CLOSE request succeeded");
3474 return avdtp_close_resp(session, stream, buf, size);
3476 DBG("ABORT request succeeded");
3477 return avdtp_abort_resp(session, stream, buf, size);
3478 case AVDTP_DELAY_REPORT:
3479 DBG("DELAY_REPORT request succeeded");
3480 return avdtp_delay_report_resp(session, stream, buf, size);
3483 error("Unknown signal id in accept response: %u", signal_id);
3487 static gboolean seid_rej_to_err(struct seid_rej *rej, unsigned int size,
3488 struct avdtp_error *err)
3490 if (size < sizeof(struct seid_rej)) {
3491 error("Too small packet for seid_rej");
3495 avdtp_error_init(err, 0x00, rej->error);
3500 static gboolean conf_rej_to_err(struct conf_rej *rej, unsigned int size,
3501 struct avdtp_error *err)
3503 if (size < sizeof(struct conf_rej)) {
3504 error("Too small packet for conf_rej");
3508 avdtp_error_init(err, rej->category, rej->error);
3513 static gboolean stream_rej_to_err(struct stream_rej *rej, unsigned int size,
3514 struct avdtp_error *err,
3517 if (size < sizeof(struct stream_rej)) {
3518 error("Too small packet for stream_rej");
3522 avdtp_error_init(err, 0x00, rej->error);
3525 *acp_seid = rej->acp_seid;
3530 static gboolean avdtp_parse_rej(struct avdtp *session,
3531 struct avdtp_stream *stream,
3532 uint8_t transaction, uint8_t signal_id,
3533 void *buf, int size)
3535 struct avdtp_error err;
3537 struct avdtp_local_sep *sep = stream ? stream->lsep : NULL;
3539 switch (signal_id) {
3540 case AVDTP_DISCOVER:
3541 if (!seid_rej_to_err(buf, size, &err))
3543 error("DISCOVER request rejected: %s (%d)",
3544 avdtp_strerror(&err), err.err.error_code);
3546 case AVDTP_GET_CAPABILITIES:
3547 case AVDTP_GET_ALL_CAPABILITIES:
3548 if (!seid_rej_to_err(buf, size, &err))
3550 error("GET_CAPABILITIES request rejected: %s (%d)",
3551 avdtp_strerror(&err), err.err.error_code);
3554 if (!seid_rej_to_err(buf, size, &err))
3556 error("OPEN request rejected: %s (%d)",
3557 avdtp_strerror(&err), err.err.error_code);
3558 if (sep && sep->cfm && sep->cfm->open)
3559 sep->cfm->open(session, sep, stream, &err,
3562 case AVDTP_SET_CONFIGURATION:
3563 if (!conf_rej_to_err(buf, size, &err))
3565 error("SET_CONFIGURATION request rejected: %s (%d)",
3566 avdtp_strerror(&err), err.err.error_code);
3567 if (sep && sep->cfm && sep->cfm->set_configuration)
3568 sep->cfm->set_configuration(session, sep, stream,
3569 &err, sep->user_data);
3571 case AVDTP_RECONFIGURE:
3572 if (!conf_rej_to_err(buf, size, &err))
3574 error("RECONFIGURE request rejected: %s (%d)",
3575 avdtp_strerror(&err), err.err.error_code);
3576 if (sep && sep->cfm && sep->cfm->reconfigure)
3577 sep->cfm->reconfigure(session, sep, stream, &err,
3581 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3583 error("START request rejected: %s (%d)",
3584 avdtp_strerror(&err), err.err.error_code);
3585 if (sep && sep->cfm && sep->cfm->start) {
3586 sep->cfm->start(session, sep, stream, &err,
3588 stream->starting = FALSE;
3592 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3594 error("SUSPEND request rejected: %s (%d)",
3595 avdtp_strerror(&err), err.err.error_code);
3596 if (sep && sep->cfm && sep->cfm->suspend)
3597 sep->cfm->suspend(session, sep, stream, &err,
3601 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3603 error("CLOSE request rejected: %s (%d)",
3604 avdtp_strerror(&err), err.err.error_code);
3605 if (sep && sep->cfm && sep->cfm->close) {
3606 sep->cfm->close(session, sep, stream, &err,
3608 stream->close_int = FALSE;
3612 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3614 error("ABORT request rejected: %s (%d)",
3615 avdtp_strerror(&err), err.err.error_code);
3616 if (sep && sep->cfm && sep->cfm->abort)
3617 sep->cfm->abort(session, sep, stream, &err,
3620 case AVDTP_DELAY_REPORT:
3621 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3623 error("DELAY_REPORT request rejected: %s (%d)",
3624 avdtp_strerror(&err), err.err.error_code);
3625 if (sep && sep->cfm && sep->cfm->delay_report)
3626 sep->cfm->delay_report(session, sep, stream, &err,
3630 error("Unknown reject response signal id: %u", signal_id);
3635 struct avdtp_service_capability *avdtp_stream_get_codec(
3636 struct avdtp_stream *stream)
3640 for (l = stream->caps; l; l = l->next) {
3641 struct avdtp_service_capability *cap = l->data;
3643 if (cap->category == AVDTP_MEDIA_CODEC)
3650 static gboolean avdtp_stream_has_capability(struct avdtp_stream *stream,
3651 struct avdtp_service_capability *cap)
3654 struct avdtp_service_capability *stream_cap;
3656 for (l = stream->caps; l; l = g_slist_next(l)) {
3657 stream_cap = l->data;
3659 if (stream_cap->category != cap->category ||
3660 stream_cap->length != cap->length)
3663 if (memcmp(stream_cap->data, cap->data, cap->length) == 0)
3670 gboolean avdtp_stream_has_capabilities(struct avdtp_stream *stream,
3673 for (; caps; caps = g_slist_next(caps)) {
3674 struct avdtp_service_capability *cap = caps->data;
3676 if (!avdtp_stream_has_capability(stream, cap))
3683 struct avdtp_remote_sep *avdtp_stream_get_remote_sep(
3684 struct avdtp_stream *stream)
3688 for (l = stream->session->seps; l; l = l->next) {
3689 struct avdtp_remote_sep *sep = l->data;
3691 if (sep->seid == stream->rseid)
3698 gboolean avdtp_stream_set_transport(struct avdtp_stream *stream, int fd,
3699 size_t imtu, size_t omtu)
3703 if (stream != stream->session->pending_open)
3706 io = g_io_channel_unix_new(fd);
3708 handle_transport_connect(stream->session, io, imtu, omtu);
3710 g_io_channel_unref(io);
3715 gboolean avdtp_stream_get_transport(struct avdtp_stream *stream, int *sock,
3716 uint16_t *imtu, uint16_t *omtu,
3719 if (stream->io == NULL)
3723 *sock = g_io_channel_unix_get_fd(stream->io);
3726 *omtu = stream->omtu;
3729 *imtu = stream->imtu;
3732 *caps = stream->caps;
3737 static int process_queue(struct avdtp *session)
3740 struct pending_req *req;
3745 if (session->prio_queue)
3746 queue = &session->prio_queue;
3748 queue = &session->req_queue;
3756 *queue = g_slist_remove(*queue, req);
3758 return send_req(session, FALSE, req);
3761 uint8_t avdtp_get_seid(struct avdtp_remote_sep *sep)
3766 uint8_t avdtp_get_type(struct avdtp_remote_sep *sep)
3771 struct avdtp_service_capability *avdtp_get_codec(struct avdtp_remote_sep *sep)
3776 bool avdtp_get_delay_reporting(struct avdtp_remote_sep *sep)
3778 return sep->delay_reporting;
3781 struct avdtp_service_capability *avdtp_service_cap_new(uint8_t category,
3782 void *data, int length)
3784 struct avdtp_service_capability *cap;
3786 if (category < AVDTP_MEDIA_TRANSPORT || category > AVDTP_DELAY_REPORTING)
3789 cap = g_malloc(sizeof(struct avdtp_service_capability) + length);
3790 cap->category = category;
3791 cap->length = length;
3792 memcpy(cap->data, data, length);
3797 struct avdtp_remote_sep *avdtp_register_remote_sep(struct avdtp *session,
3801 bool delay_reporting)
3803 struct avdtp_remote_sep *sep;
3806 sep = find_remote_sep(session->seps, seid);
3810 sep = g_new0(struct avdtp_remote_sep, 1);
3811 session->seps = g_slist_append(session->seps, sep);
3814 sep->media_type = AVDTP_MEDIA_TYPE_AUDIO;
3816 sep->delay_reporting = delay_reporting;
3818 for (l = caps; l; l = g_slist_next(l)) {
3819 struct avdtp_service_capability *cap = l->data;
3821 if (cap->category == AVDTP_MEDIA_CODEC)
3825 DBG("seid %d type %d media %d delay_reporting %s", sep->seid, sep->type,
3827 sep->delay_reporting ? "true" : "false");
3832 void avdtp_remote_sep_set_destroy(struct avdtp_remote_sep *sep, void *user_data,
3833 avdtp_remote_sep_destroy_t destroy)
3838 sep->user_data = user_data;
3839 sep->destroy = destroy;
3842 static gboolean process_discover(gpointer data)
3844 struct avdtp *session = data;
3846 session->discover->id = 0;
3848 finalize_discovery(session, 0);
3853 int avdtp_discover(struct avdtp *session, avdtp_discover_cb_t cb,
3858 if (session->discover)
3861 session->discover = g_new0(struct discover_callback, 1);
3863 if (session->seps) {
3864 session->discover->cb = cb;
3865 session->discover->user_data = user_data;
3866 session->discover->id = g_idle_add(process_discover, session);
3870 err = send_request(session, FALSE, NULL, AVDTP_DISCOVER, NULL, 0);
3872 session->discover->cb = cb;
3873 session->discover->user_data = user_data;
3879 gboolean avdtp_stream_remove_cb(struct avdtp *session,
3880 struct avdtp_stream *stream,
3884 struct stream_callback *cb;
3889 for (cb = NULL, l = stream->callbacks; l != NULL; l = l->next) {
3890 struct stream_callback *tmp = l->data;
3891 if (tmp && tmp->id == id) {
3900 stream->callbacks = g_slist_remove(stream->callbacks, cb);
3906 unsigned int avdtp_stream_add_cb(struct avdtp *session,
3907 struct avdtp_stream *stream,
3908 avdtp_stream_state_cb cb, void *data)
3910 struct stream_callback *stream_cb;
3911 static unsigned int id = 0;
3913 stream_cb = g_new(struct stream_callback, 1);
3915 stream_cb->user_data = data;
3916 stream_cb->id = ++id;
3918 stream->callbacks = g_slist_append(stream->callbacks, stream_cb);
3920 return stream_cb->id;
3923 int avdtp_get_configuration(struct avdtp *session, struct avdtp_stream *stream)
3925 struct seid_req req;
3927 if (session->state < AVDTP_SESSION_STATE_CONNECTED)
3930 memset(&req, 0, sizeof(req));
3931 req.acp_seid = stream->rseid;
3933 return send_request(session, FALSE, stream, AVDTP_GET_CONFIGURATION,
3937 static void copy_capabilities(gpointer data, gpointer user_data)
3939 struct avdtp_service_capability *src_cap = data;
3940 struct avdtp_service_capability *dst_cap;
3941 GSList **l = user_data;
3943 dst_cap = avdtp_service_cap_new(src_cap->category, src_cap->data,
3946 *l = g_slist_append(*l, dst_cap);
3949 int avdtp_set_configuration(struct avdtp *session,
3950 struct avdtp_remote_sep *rsep,
3951 struct avdtp_local_sep *lsep,
3953 struct avdtp_stream **stream)
3955 struct setconf_req *req;
3956 struct avdtp_stream *new_stream;
3959 struct avdtp_service_capability *cap;
3962 if (session->state != AVDTP_SESSION_STATE_CONNECTED)
3965 if (!(lsep && rsep))
3968 DBG("%p: int_seid=%u, acp_seid=%u", session,
3969 lsep->info.seid, rsep->seid);
3971 new_stream = g_new0(struct avdtp_stream, 1);
3972 new_stream->session = session;
3973 new_stream->lsep = lsep;
3974 new_stream->rseid = rsep->seid;
3976 if (rsep->delay_reporting && lsep->delay_reporting) {
3977 struct avdtp_service_capability *delay_reporting;
3979 delay_reporting = avdtp_service_cap_new(AVDTP_DELAY_REPORTING,
3981 caps = g_slist_append(caps, delay_reporting);
3982 new_stream->delay_reporting = TRUE;
3985 g_slist_foreach(caps, copy_capabilities, &new_stream->caps);
3987 /* Calculate total size of request */
3988 for (l = caps, caps_len = 0; l != NULL; l = g_slist_next(l)) {
3990 caps_len += cap->length + 2;
3993 req = g_malloc0(sizeof(struct setconf_req) + caps_len);
3995 req->int_seid = lsep->info.seid;
3996 req->acp_seid = rsep->seid;
3998 /* Copy the capabilities into the request */
3999 for (l = caps, ptr = req->caps; l != NULL; l = g_slist_next(l)) {
4001 memcpy(ptr, cap, cap->length + 2);
4002 ptr += cap->length + 2;
4005 err = send_request(session, FALSE, new_stream,
4006 AVDTP_SET_CONFIGURATION, req,
4007 sizeof(struct setconf_req) + caps_len);
4009 stream_free(new_stream);
4011 lsep->info.inuse = 1;
4012 lsep->stream = new_stream;
4013 rsep->stream = new_stream;
4014 session->streams = g_slist_append(session->streams, new_stream);
4016 *stream = new_stream;
4024 int avdtp_open(struct avdtp *session, struct avdtp_stream *stream)
4026 struct seid_req req;
4028 if (!g_slist_find(session->streams, stream))
4031 if (stream->lsep->state > AVDTP_STATE_CONFIGURED)
4034 memset(&req, 0, sizeof(req));
4035 req.acp_seid = stream->rseid;
4037 return send_request(session, FALSE, stream, AVDTP_OPEN,
4041 static gboolean start_timeout(gpointer user_data)
4043 struct avdtp_stream *stream = user_data;
4044 struct avdtp *session = stream->session;
4046 stream->open_acp = FALSE;
4048 if (avdtp_start(session, stream) < 0)
4049 error("wait_timeout: avdtp_start failed");
4051 stream->start_timer = 0;
4056 int avdtp_start(struct avdtp *session, struct avdtp_stream *stream)
4058 struct start_req req;
4061 if (!g_slist_find(session->streams, stream))
4064 if (stream->lsep->state != AVDTP_STATE_OPEN)
4067 /* Recommendation 12:
4068 * If the RD has configured and opened a stream it is also responsible
4069 * to start the streaming via GAVDP_START.
4071 if (stream->open_acp) {
4072 /* If timer already active wait it */
4073 if (stream->start_timer)
4075 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
4078 uint32_t timeout_sec = START_TIMEOUT;
4080 ba2str(device_get_address(session->device), address);
4081 /* For Bose headset (Bose AE2w) 2 seconds timeout is required to avoid AVDTP ABORT_CMD */
4082 if (!strncasecmp(address, "00:0C:8A", 8) ||
4083 !strncasecmp(address, "08:DF:1F", 8))
4085 /* For Gear Circle, HS3000 headset, this headset doesn't initiate start command and
4086 * when we add timer for 1 second so idle may trigger callback after 1.2 sec or
4087 * 1.5 sec. So, don't timer for this headset.*/
4088 if (!strncasecmp(address, "10:92:66", 8) ||
4089 !strncasecmp(address, "A8:9F:BA", 8) ||
4090 !strncasecmp(address, "00:26:B4", 8)) {
4091 start_timeout(stream);
4094 /* Here we can't use Mac address as there are changing so check for name */
4096 device_get_name(session->device, name, sizeof(name));
4097 DBG("name : %s", name);
4098 if (g_str_equal(name, "HS3000")) {
4099 start_timeout(stream);
4103 stream->start_timer = g_timeout_add_seconds(timeout_sec,
4109 stream->start_timer = g_timeout_add_seconds(START_TIMEOUT,
4116 if (stream->close_int == TRUE) {
4117 error("avdtp_start: rejecting start since close is initiated");
4121 if (stream->starting == TRUE) {
4122 DBG("stream already started");
4123 return -EINPROGRESS;
4126 memset(&req, 0, sizeof(req));
4127 req.first_seid.seid = stream->rseid;
4129 ret = send_request(session, FALSE, stream, AVDTP_START,
4132 stream->starting = TRUE;
4137 int avdtp_close(struct avdtp *session, struct avdtp_stream *stream,
4140 struct seid_req req;
4143 if (!g_slist_find(session->streams, stream))
4146 if (stream->lsep->state < AVDTP_STATE_OPEN)
4149 if (stream->close_int == TRUE) {
4150 error("avdtp_close: rejecting since close is already initiated");
4154 if (immediate && session->req && stream == session->req->stream)
4155 return avdtp_abort(session, stream);
4157 memset(&req, 0, sizeof(req));
4158 req.acp_seid = stream->rseid;
4160 ret = send_request(session, FALSE, stream, AVDTP_CLOSE,
4163 stream->close_int = TRUE;
4164 session->dc_timeout = 0;
4170 int avdtp_suspend(struct avdtp *session, struct avdtp_stream *stream)
4172 struct seid_req req;
4174 if (!g_slist_find(session->streams, stream))
4177 if (stream->lsep->state <= AVDTP_STATE_OPEN || stream->close_int)
4180 memset(&req, 0, sizeof(req));
4181 req.acp_seid = stream->rseid;
4183 return send_request(session, FALSE, stream, AVDTP_SUSPEND,
4187 int avdtp_abort(struct avdtp *session, struct avdtp_stream *stream)
4189 struct seid_req req;
4192 if (!stream && session->discover) {
4193 /* Don't call cb since it being aborted */
4194 session->discover->cb = NULL;
4195 finalize_discovery(session, ECANCELED);
4199 if (!g_slist_find(session->streams, stream))
4202 if (stream->lsep->state == AVDTP_STATE_ABORTING)
4205 avdtp_sep_set_state(session, stream->lsep, AVDTP_STATE_ABORTING);
4207 if (session->req && stream == session->req->stream)
4208 return cancel_request(session, ECANCELED);
4210 memset(&req, 0, sizeof(req));
4211 req.acp_seid = stream->rseid;
4213 ret = send_request(session, TRUE, stream, AVDTP_ABORT,
4216 stream->abort_int = TRUE;
4217 session->dc_timeout = 0;
4223 int avdtp_delay_report(struct avdtp *session, struct avdtp_stream *stream,
4226 struct delay_req req;
4228 if (!g_slist_find(session->streams, stream))
4231 if (stream->lsep->state != AVDTP_STATE_CONFIGURED &&
4232 stream->lsep->state != AVDTP_STATE_STREAMING)
4235 if (!stream->delay_reporting || session->version < 0x0103)
4238 stream->delay = delay;
4240 memset(&req, 0, sizeof(req));
4241 req.acp_seid = stream->rseid;
4242 req.delay = htons(delay);
4244 return send_request(session, TRUE, stream, AVDTP_DELAY_REPORT,
4248 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
4249 int delay_report_req(uint16_t delay)
4251 if (!configured_session)
4254 if (!configured_stream)
4257 return avdtp_delay_report(configured_session, configured_stream, delay);
4261 struct avdtp_local_sep *avdtp_register_sep(struct queue *lseps, uint8_t type,
4264 gboolean delay_reporting,
4265 struct avdtp_sep_ind *ind,
4266 struct avdtp_sep_cfm *cfm,
4269 struct avdtp_local_sep *sep;
4270 uint8_t seid = util_get_uid(&seids, MAX_SEID);
4275 sep = g_new0(struct avdtp_local_sep, 1);
4277 sep->state = AVDTP_STATE_IDLE;
4278 sep->info.seid = seid;
4279 sep->info.type = type;
4280 sep->info.media_type = media_type;
4281 sep->codec = codec_type;
4284 sep->user_data = user_data;
4285 sep->delay_reporting = delay_reporting;
4287 DBG("SEP %p registered: type:%d codec:%d seid:%d", sep,
4288 sep->info.type, sep->codec, sep->info.seid);
4290 if (!queue_push_tail(lseps, sep)) {
4298 int avdtp_unregister_sep(struct queue *lseps, struct avdtp_local_sep *sep)
4304 release_stream(sep->stream, sep->stream->session);
4306 DBG("SEP %p unregistered: type:%d codec:%d seid:%d", sep,
4307 sep->info.type, sep->codec, sep->info.seid);
4309 util_clear_uid(&seids, sep->info.seid);
4310 queue_remove(lseps, sep);
4316 const char *avdtp_strerror(struct avdtp_error *err)
4318 if (err->category == AVDTP_ERRNO)
4319 return strerror(err->err.posix_errno);
4321 switch(err->err.error_code) {
4322 case AVDTP_BAD_HEADER_FORMAT:
4323 return "Bad Header Format";
4324 case AVDTP_BAD_LENGTH:
4325 return "Bad Packet Length";
4326 case AVDTP_BAD_ACP_SEID:
4327 return "Bad Acceptor SEID";
4328 case AVDTP_SEP_IN_USE:
4329 return "Stream End Point in Use";
4330 case AVDTP_SEP_NOT_IN_USE:
4331 return "Stream End Point Not in Use";
4332 case AVDTP_BAD_SERV_CATEGORY:
4333 return "Bad Service Category";
4334 case AVDTP_BAD_PAYLOAD_FORMAT:
4335 return "Bad Payload format";
4336 case AVDTP_NOT_SUPPORTED_COMMAND:
4337 return "Command Not Supported";
4338 case AVDTP_INVALID_CAPABILITIES:
4339 return "Invalid Capabilities";
4340 case AVDTP_BAD_RECOVERY_TYPE:
4341 return "Bad Recovery Type";
4342 case AVDTP_BAD_MEDIA_TRANSPORT_FORMAT:
4343 return "Bad Media Transport Format";
4344 case AVDTP_BAD_RECOVERY_FORMAT:
4345 return "Bad Recovery Format";
4346 case AVDTP_BAD_ROHC_FORMAT:
4347 return "Bad Header Compression Format";
4348 case AVDTP_BAD_CP_FORMAT:
4349 return "Bad Content Protection Format";
4350 case AVDTP_BAD_MULTIPLEXING_FORMAT:
4351 return "Bad Multiplexing Format";
4352 case AVDTP_UNSUPPORTED_CONFIGURATION:
4353 return "Configuration not supported";
4354 case AVDTP_BAD_STATE:
4357 return "Unknown error";
4361 avdtp_state_t avdtp_sep_get_state(struct avdtp_local_sep *sep)
4366 uint8_t avdtp_sep_get_seid(struct avdtp_local_sep *sep)
4368 return sep->info.seid;
4371 struct btd_adapter *avdtp_get_adapter(struct avdtp *session)
4373 return device_get_adapter(session->device);
4376 struct btd_device *avdtp_get_device(struct avdtp *session)
4378 return session->device;
4381 gboolean avdtp_has_stream(struct avdtp *session, struct avdtp_stream *stream)
4383 return g_slist_find(session->streams, stream) ? TRUE : FALSE;
4386 unsigned int avdtp_add_state_cb(struct btd_device *dev,
4387 avdtp_session_state_cb cb, void *user_data)
4389 struct avdtp_state_callback *state_cb;
4390 static unsigned int id = 0;
4392 state_cb = g_new(struct avdtp_state_callback, 1);
4394 state_cb->dev = dev;
4395 state_cb->id = ++id;
4396 state_cb->user_data = user_data;
4398 state_callbacks = g_slist_append(state_callbacks, state_cb);
4400 return state_cb->id;
4403 gboolean avdtp_remove_state_cb(unsigned int id)
4407 for (l = state_callbacks; l != NULL; l = l->next) {
4408 struct avdtp_state_callback *cb = l->data;
4409 if (cb && cb->id == id) {
4410 state_callbacks = g_slist_remove(state_callbacks, cb);