3 * BlueZ - Bluetooth protocol stack for Linux
5 * Copyright (C) 2006-2010 Nokia Corporation
6 * Copyright (C) 2004-2010 Marcel Holtmann <marcel@holtmann.org>
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
39 #include "lib/bluetooth.h"
41 #include "lib/sdp_lib.h"
44 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
45 #include <sys/ioctl.h>
46 #include <bluetooth/hci.h>
47 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
49 #include "btio/btio.h"
52 #include "src/shared/util.h"
53 #include "src/shared/queue.h"
54 #include "src/adapter.h"
55 #include "src/device.h"
57 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
58 #include "src/service.h"
59 #include "../../profile.h"
60 #ifdef TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM
72 static unsigned int seids;
75 # define MAX(x, y) ((x) > (y) ? (x) : (y))
78 #define AVDTP_DISCOVER 0x01
79 #define AVDTP_GET_CAPABILITIES 0x02
80 #define AVDTP_SET_CONFIGURATION 0x03
81 #define AVDTP_GET_CONFIGURATION 0x04
82 #define AVDTP_RECONFIGURE 0x05
83 #define AVDTP_OPEN 0x06
84 #define AVDTP_START 0x07
85 #define AVDTP_CLOSE 0x08
86 #define AVDTP_SUSPEND 0x09
87 #define AVDTP_ABORT 0x0A
88 #define AVDTP_SECURITY_CONTROL 0x0B
89 #define AVDTP_GET_ALL_CAPABILITIES 0x0C
90 #define AVDTP_DELAY_REPORT 0x0D
92 #define AVDTP_PKT_TYPE_SINGLE 0x00
93 #define AVDTP_PKT_TYPE_START 0x01
94 #define AVDTP_PKT_TYPE_CONTINUE 0x02
95 #define AVDTP_PKT_TYPE_END 0x03
97 #define AVDTP_MSG_TYPE_COMMAND 0x00
98 #define AVDTP_MSG_TYPE_GEN_REJECT 0x01
99 #define AVDTP_MSG_TYPE_ACCEPT 0x02
100 #define AVDTP_MSG_TYPE_REJECT 0x03
102 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
103 #define REQ_TIMEOUT 10
105 #define REQ_TIMEOUT 6
107 #define SUSPEND_TIMEOUT 10
108 #define ABORT_TIMEOUT 2
109 #define DISCONNECT_TIMEOUT 1
110 #define START_TIMEOUT 1
112 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
113 struct avdtp *configured_session;
114 struct avdtp_stream *configured_stream;
117 #if __BYTE_ORDER == __LITTLE_ENDIAN
119 struct avdtp_common_header {
120 uint8_t message_type:2;
121 uint8_t packet_type:2;
122 uint8_t transaction:4;
123 } __attribute__ ((packed));
125 struct avdtp_single_header {
126 uint8_t message_type:2;
127 uint8_t packet_type:2;
128 uint8_t transaction:4;
131 } __attribute__ ((packed));
133 struct avdtp_start_header {
134 uint8_t message_type:2;
135 uint8_t packet_type:2;
136 uint8_t transaction:4;
137 uint8_t no_of_packets;
140 } __attribute__ ((packed));
142 struct avdtp_continue_header {
143 uint8_t message_type:2;
144 uint8_t packet_type:2;
145 uint8_t transaction:4;
146 } __attribute__ ((packed));
154 uint8_t media_type:4;
155 } __attribute__ ((packed));
160 } __attribute__ ((packed));
162 #elif __BYTE_ORDER == __BIG_ENDIAN
164 struct avdtp_common_header {
165 uint8_t transaction:4;
166 uint8_t packet_type:2;
167 uint8_t message_type:2;
168 } __attribute__ ((packed));
170 struct avdtp_single_header {
171 uint8_t transaction:4;
172 uint8_t packet_type:2;
173 uint8_t message_type:2;
176 } __attribute__ ((packed));
178 struct avdtp_start_header {
179 uint8_t transaction:4;
180 uint8_t packet_type:2;
181 uint8_t message_type:2;
182 uint8_t no_of_packets;
185 } __attribute__ ((packed));
187 struct avdtp_continue_header {
188 uint8_t transaction:4;
189 uint8_t packet_type:2;
190 uint8_t message_type:2;
191 } __attribute__ ((packed));
197 uint8_t media_type:4;
200 } __attribute__ ((packed));
205 } __attribute__ ((packed));
208 #error "Unknown byte order"
213 struct discover_resp {
214 struct seid_info seps[0];
215 } __attribute__ ((packed));
219 } __attribute__ ((packed));
222 struct seid first_seid;
223 struct seid other_seids[0];
224 } __attribute__ ((packed));
227 struct seid first_seid;
228 struct seid other_seids[0];
229 } __attribute__ ((packed));
233 } __attribute__ ((packed));
238 } __attribute__ ((packed));
240 #if __BYTE_ORDER == __LITTLE_ENDIAN
245 } __attribute__ ((packed));
254 } __attribute__ ((packed));
260 } __attribute__ ((packed));
267 uint8_t serv_cap_len;
270 } __attribute__ ((packed));
276 } __attribute__ ((packed));
278 #elif __BYTE_ORDER == __BIG_ENDIAN
283 } __attribute__ ((packed));
292 } __attribute__ ((packed));
298 } __attribute__ ((packed));
305 uint8_t serv_cap_len;
308 } __attribute__ ((packed));
314 } __attribute__ ((packed));
317 #error "Unknown byte order"
324 uint8_t message_type;
335 struct avdtp_stream *stream; /* Set if the request targeted a stream */
340 struct avdtp_remote_sep {
344 struct avdtp_service_capability *codec;
345 gboolean delay_reporting;
346 GSList *caps; /* of type struct avdtp_service_capability */
347 struct avdtp_stream *stream;
350 struct avdtp_local_sep {
352 struct avdtp_stream *stream;
353 struct seid_info info;
355 gboolean delay_reporting;
357 struct avdtp_sep_ind *ind;
358 struct avdtp_sep_cfm *cfm;
362 struct stream_callback {
363 avdtp_stream_state_cb cb;
368 struct avdtp_state_callback {
369 avdtp_session_state_cb cb;
370 struct btd_device *dev;
375 struct discover_callback {
377 avdtp_discover_cb_t cb;
381 struct avdtp_stream {
385 struct avdtp *session;
386 struct avdtp_local_sep *lsep;
390 struct avdtp_service_capability *codec;
391 guint io_id; /* Transport GSource ID */
392 guint timer; /* Waiting for other side to close or open
393 * the transport channel */
394 gboolean open_acp; /* If we are in ACT role for Open */
395 gboolean close_int; /* If we are in INT role for Close */
396 gboolean abort_int; /* If we are in INT role for Abort */
397 guint start_timer; /* Wait START command timer */
398 gboolean delay_reporting;
399 uint16_t delay; /* AVDTP 1.3 Delay Reporting feature */
400 gboolean starting; /* only valid while sep state == OPEN */
403 /* Structure describing an AVDTP connection between two devices */
405 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
406 struct avdtp_source_info {
407 struct btd_device *dev;
418 struct btd_device *device;
420 avdtp_session_state_t state;
425 GSList *seps; /* Elements of type struct avdtp_remote_sep * */
427 GSList *streams; /* Elements of type struct avdtp_stream * */
429 GSList *req_queue; /* Elements of type struct pending_req * */
430 GSList *prio_queue; /* Same as req_queue but is processed before it */
432 struct avdtp_stream *pending_open;
442 struct discover_callback *discover;
443 struct pending_req *req;
448 /* Attempt stream setup instead of disconnecting */
449 gboolean stream_setup;
452 static GSList *state_callbacks = NULL;
454 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
455 static GSList *list_source = NULL;
458 static int send_request(struct avdtp *session, gboolean priority,
459 struct avdtp_stream *stream, uint8_t signal_id,
460 void *buffer, size_t size);
461 static gboolean avdtp_parse_resp(struct avdtp *session,
462 struct avdtp_stream *stream,
463 uint8_t transaction, uint8_t signal_id,
464 void *buf, int size);
465 static gboolean avdtp_parse_rej(struct avdtp *session,
466 struct avdtp_stream *stream,
467 uint8_t transaction, uint8_t signal_id,
468 void *buf, int size);
469 static int process_queue(struct avdtp *session);
470 static void avdtp_sep_set_state(struct avdtp *session,
471 struct avdtp_local_sep *sep,
472 avdtp_state_t state);
474 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
475 void avdtp_set_source_status(struct btd_device *dev, bool pause)
477 GSList *l = list_source;
480 struct avdtp_source_info *ldev = l->data;
482 if (ldev->dev != dev && pause == false && ldev->pause == false) {
483 avrcp_pause(ldev->dev);
484 DBG("sending pause from status");
486 } else if (ldev->dev == dev) {
494 static void avdtp_add_source_device(struct btd_device *dev)
497 GSList *l = list_source;
500 struct avdtp_source_info *ldev = l->data;
502 if (ldev->dev == dev) {
503 DBG("in device %p", dev);
507 if (ldev->pause == false) {
508 avrcp_pause(ldev->dev);
509 DBG("Sending pause from steam");
518 struct avdtp_source_info *p;
520 p = g_new0(struct avdtp_source_info, 1);
523 list_source = g_slist_append(list_source, p);
527 static void avdtp_remove_source_devce(struct btd_device *dev)
531 for (l = list_source; l != NULL; l = l->next) {
532 struct avdtp_source_info *ldev = l->data;
533 if (ldev && ldev->dev == dev) {
534 list_source = g_slist_remove(list_source, ldev);
542 static const char *avdtp_statestr(avdtp_state_t state)
545 case AVDTP_STATE_IDLE:
547 case AVDTP_STATE_CONFIGURED:
549 case AVDTP_STATE_OPEN:
551 case AVDTP_STATE_STREAMING:
553 case AVDTP_STATE_CLOSING:
555 case AVDTP_STATE_ABORTING:
558 return "<unknown state>";
562 static gboolean try_send(int sk, void *data, size_t len)
567 err = send(sk, data, len, 0);
568 } while (err < 0 && errno == EINTR);
571 error("send: %s (%d)", strerror(errno), errno);
573 } else if ((size_t) err != len) {
574 error("try_send: complete buffer not sent (%d/%zu bytes)",
582 static gboolean avdtp_send(struct avdtp *session, uint8_t transaction,
583 uint8_t message_type, uint8_t signal_id,
584 void *data, size_t len)
586 unsigned int cont_fragments, sent;
587 struct avdtp_start_header start;
588 struct avdtp_continue_header cont;
591 if (session->io == NULL) {
592 error("avdtp_send: session is closed");
596 sock = g_io_channel_unix_get_fd(session->io);
598 /* Single packet - no fragmentation */
599 if (sizeof(struct avdtp_single_header) + len <= session->omtu) {
600 struct avdtp_single_header single;
602 memset(&single, 0, sizeof(single));
604 single.transaction = transaction;
605 single.packet_type = AVDTP_PKT_TYPE_SINGLE;
606 single.message_type = message_type;
607 single.signal_id = signal_id;
609 memcpy(session->buf, &single, sizeof(single));
610 memcpy(session->buf + sizeof(single), data, len);
612 return try_send(sock, session->buf, sizeof(single) + len);
615 /* Check if there is enough space to start packet */
616 if (session->omtu < sizeof(start)) {
617 error("No enough space to fragment packet");
621 /* Count the number of needed fragments */
622 cont_fragments = (len - (session->omtu - sizeof(start))) /
623 (session->omtu - sizeof(cont)) + 1;
625 DBG("%zu bytes split into %d fragments", len, cont_fragments + 1);
627 /* Send the start packet */
628 memset(&start, 0, sizeof(start));
629 start.transaction = transaction;
630 start.packet_type = AVDTP_PKT_TYPE_START;
631 start.message_type = message_type;
632 start.no_of_packets = cont_fragments + 1;
633 start.signal_id = signal_id;
635 memcpy(session->buf, &start, sizeof(start));
636 memcpy(session->buf + sizeof(start), data,
637 session->omtu - sizeof(start));
639 if (!try_send(sock, session->buf, session->omtu))
642 DBG("first packet with %zu bytes sent", session->omtu - sizeof(start));
644 sent = session->omtu - sizeof(start);
646 /* Send the continue fragments and the end packet */
651 if (left + sizeof(cont) > session->omtu) {
652 cont.packet_type = AVDTP_PKT_TYPE_CONTINUE;
653 to_copy = session->omtu - sizeof(cont);
654 DBG("sending continue with %d bytes", to_copy);
656 cont.packet_type = AVDTP_PKT_TYPE_END;
658 DBG("sending end with %d bytes", to_copy);
661 cont.transaction = transaction;
662 cont.message_type = message_type;
664 memcpy(session->buf, &cont, sizeof(cont));
665 memcpy(session->buf + sizeof(cont), data + sent, to_copy);
667 if (!try_send(sock, session->buf, to_copy + sizeof(cont)))
676 static void pending_req_free(void *data)
678 struct pending_req *req = data;
681 g_source_remove(req->timeout);
686 static void close_stream(struct avdtp_stream *stream)
690 if (stream->io == NULL)
693 sock = g_io_channel_unix_get_fd(stream->io);
695 shutdown(sock, SHUT_RDWR);
697 g_io_channel_shutdown(stream->io, FALSE, NULL);
699 g_io_channel_unref(stream->io);
703 static gboolean stream_close_timeout(gpointer user_data)
705 struct avdtp_stream *stream = user_data;
707 DBG("Timed out waiting for peer to close the transport channel");
711 close_stream(stream);
716 static gboolean stream_open_timeout(gpointer user_data)
718 struct avdtp_stream *stream = user_data;
720 DBG("Timed out waiting for peer to open the transport channel");
724 stream->session->pending_open = NULL;
726 avdtp_abort(stream->session, stream);
731 void avdtp_error_init(struct avdtp_error *err, uint8_t category, int id)
733 err->category = category;
735 if (category == AVDTP_ERRNO)
736 err->err.posix_errno = id;
738 err->err.error_code = id;
741 uint8_t avdtp_error_category(struct avdtp_error *err)
743 return err->category;
746 int avdtp_error_error_code(struct avdtp_error *err)
748 assert(err->category != AVDTP_ERRNO);
749 return err->err.error_code;
752 int avdtp_error_posix_errno(struct avdtp_error *err)
754 assert(err->category == AVDTP_ERRNO);
755 return err->err.posix_errno;
758 static struct avdtp_stream *find_stream_by_rseid(struct avdtp *session,
763 for (l = session->streams; l != NULL; l = g_slist_next(l)) {
764 struct avdtp_stream *stream = l->data;
766 if (stream->rseid == rseid)
773 static struct avdtp_remote_sep *find_remote_sep(GSList *seps, uint8_t seid)
777 for (l = seps; l != NULL; l = g_slist_next(l)) {
778 struct avdtp_remote_sep *sep = l->data;
780 if (sep->seid == seid)
787 static void avdtp_set_state(struct avdtp *session,
788 avdtp_session_state_t new_state)
791 avdtp_session_state_t old_state = session->state;
793 session->state = new_state;
795 for (l = state_callbacks; l != NULL;) {
796 struct avdtp_state_callback *cb = l->data;
800 if (session->device != cb->dev)
803 cb->cb(cb->dev, session, old_state, new_state, cb->user_data);
807 static void stream_free(void *data)
809 struct avdtp_stream *stream = data;
810 struct avdtp_remote_sep *rsep;
812 stream->lsep->info.inuse = 0;
813 stream->lsep->stream = NULL;
815 rsep = find_remote_sep(stream->session->seps, stream->rseid);
820 g_source_remove(stream->timer);
823 close_stream(stream);
826 g_source_remove(stream->io_id);
828 g_slist_free_full(stream->callbacks, g_free);
829 g_slist_free_full(stream->caps, g_free);
834 static gboolean transport_cb(GIOChannel *chan, GIOCondition cond,
837 struct avdtp_stream *stream = data;
838 struct avdtp_local_sep *sep = stream->lsep;
840 if (stream->close_int && sep->cfm && sep->cfm->close)
841 sep->cfm->close(stream->session, sep, stream, NULL,
844 if (!(cond & G_IO_NVAL))
845 close_stream(stream);
849 if (!stream->abort_int)
850 avdtp_sep_set_state(stream->session, sep, AVDTP_STATE_IDLE);
855 static int get_send_buffer_size(int sk)
858 socklen_t optlen = sizeof(size);
860 if (getsockopt(sk, SOL_SOCKET, SO_SNDBUF, &size, &optlen) < 0) {
862 error("getsockopt(SO_SNDBUF) failed: %s (%d)", strerror(-err),
868 * Doubled value is returned by getsockopt since kernel uses that
869 * space for its own purposes (see man 7 socket, bookkeeping overhead
875 static int set_send_buffer_size(int sk, int size)
877 socklen_t optlen = sizeof(size);
879 if (setsockopt(sk, SOL_SOCKET, SO_SNDBUF, &size, optlen) < 0) {
881 error("setsockopt(SO_SNDBUF) failed: %s (%d)", strerror(-err),
889 static void handle_transport_connect(struct avdtp *session, GIOChannel *io,
890 uint16_t imtu, uint16_t omtu)
892 struct avdtp_stream *stream = session->pending_open;
893 struct avdtp_local_sep *sep = stream->lsep;
894 int sk, buf_size, min_buf_size;
897 session->pending_open = NULL;
900 g_source_remove(stream->timer);
905 if (!stream->open_acp && sep->cfm && sep->cfm->open) {
906 struct avdtp_error err;
907 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
908 sep->cfm->open(session, sep, NULL, &err,
914 if (stream->io == NULL)
915 stream->io = g_io_channel_ref(io);
920 /* Apply special settings only if local SEP is of type SRC */
921 if (sep->info.type != AVDTP_SEP_TYPE_SOURCE)
924 bt_io_set(stream->io, &err, BT_IO_OPT_FLUSHABLE, TRUE,
927 error("Enabling flushable packets failed: %s", err->message);
930 DBG("Flushable packets enabled");
932 sk = g_io_channel_unix_get_fd(stream->io);
933 buf_size = get_send_buffer_size(sk);
937 DBG("sk %d, omtu %d, send buffer size %d", sk, omtu, buf_size);
938 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
939 min_buf_size = omtu * 10;
941 min_buf_size = omtu * 2;
943 if (buf_size < min_buf_size) {
944 DBG("send buffer size to be increassed to %d",
946 set_send_buffer_size(sk, min_buf_size);
948 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
950 DBG("send buffer size to be decreassed to %d",
952 set_send_buffer_size(sk, min_buf_size);
956 if (!stream->open_acp && sep->cfm && sep->cfm->open)
957 sep->cfm->open(session, sep, stream, NULL, sep->user_data);
959 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
961 stream->io_id = g_io_add_watch(io, G_IO_ERR | G_IO_HUP | G_IO_NVAL,
962 (GIOFunc) transport_cb, stream);
965 static int pending_req_cmp(gconstpointer a, gconstpointer b)
967 const struct pending_req *req = a;
968 const struct avdtp_stream *stream = b;
970 if (req->stream == stream)
976 static void cleanup_queue(struct avdtp *session, struct avdtp_stream *stream)
979 struct pending_req *req;
981 while ((l = g_slist_find_custom(session->prio_queue, stream,
984 pending_req_free(req);
985 session->prio_queue = g_slist_remove(session->prio_queue, req);
988 while ((l = g_slist_find_custom(session->req_queue, stream,
991 pending_req_free(req);
992 session->req_queue = g_slist_remove(session->req_queue, req);
996 static void handle_unanswered_req(struct avdtp *session,
997 struct avdtp_stream *stream)
999 struct pending_req *req;
1000 struct avdtp_local_sep *lsep;
1001 struct avdtp_error err;
1003 if (session->req->signal_id == AVDTP_ABORT) {
1004 /* Avoid freeing the Abort request here */
1005 DBG("handle_unanswered_req: Abort req, returning");
1006 session->req->stream = NULL;
1011 session->req = NULL;
1013 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
1015 lsep = stream->lsep;
1017 switch (req->signal_id) {
1018 case AVDTP_RECONFIGURE:
1019 error("No reply to Reconfigure request");
1020 if (lsep && lsep->cfm && lsep->cfm->reconfigure)
1021 lsep->cfm->reconfigure(session, lsep, stream, &err,
1025 error("No reply to Open request");
1026 if (lsep && lsep->cfm && lsep->cfm->open)
1027 lsep->cfm->open(session, lsep, stream, &err,
1031 error("No reply to Start request");
1032 if (lsep && lsep->cfm && lsep->cfm->start)
1033 lsep->cfm->start(session, lsep, stream, &err,
1037 error("No reply to Suspend request");
1038 if (lsep && lsep->cfm && lsep->cfm->suspend)
1039 lsep->cfm->suspend(session, lsep, stream, &err,
1043 error("No reply to Close request");
1044 if (lsep && lsep->cfm && lsep->cfm->close)
1045 lsep->cfm->close(session, lsep, stream, &err,
1048 case AVDTP_SET_CONFIGURATION:
1049 error("No reply to SetConfiguration request");
1050 if (lsep && lsep->cfm && lsep->cfm->set_configuration)
1051 lsep->cfm->set_configuration(session, lsep, stream,
1052 &err, lsep->user_data);
1055 pending_req_free(req);
1058 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1059 static gboolean send_broadcom_a2dp_qos(const bdaddr_t *dst, gboolean qos_high)
1063 struct hci_conn_info_req *cr;
1066 dd = hci_open_dev(0);
1071 cr = g_malloc0(sizeof(*cr) + sizeof(struct hci_conn_info));
1073 cr->type = ACL_LINK;
1074 bacpy(&cr->bdaddr, dst);
1076 err = ioctl(dd, HCIGETCONNINFO, cr);
1078 error("Fail to get HCIGETCOINFO");
1084 cp.handle = cr->conn_info->handle;
1085 DBG("Handle %d", cp.handle);
1089 cp.priority = BRCM_QOS_PRIORITY_HIGH;
1091 cp.priority = BRCM_QOS_PRIORITY_NORMAL;
1093 if (hci_send_cmd(dd, OGF_VENDOR_CMD, BROADCOM_QOS_CMD,
1094 BROADCOM_QOS_CP_SIZE, &cp) < 0) {
1098 DBG("Send Broadcom Qos Patch %s", qos_high ? "High" : "Low");
1105 static gboolean send_sprd_a2dp_qos(const bdaddr_t *dst, gboolean qos_high)
1109 struct hci_conn_info_req *cr;
1112 dd = hci_open_dev(0);
1116 cr = g_malloc0(sizeof(*cr) + sizeof(struct hci_conn_info));
1118 cr->type = ACL_LINK;
1119 bacpy(&cr->bdaddr, dst);
1121 err = ioctl(dd, HCIGETCONNINFO, cr);
1123 error("Fail to get HCIGETCOINFO");
1129 cp.handle = cr->conn_info->handle;
1131 DBG("Handle %d", cp.handle);
1135 cp.qos.service_type = 0x02;
1136 cp.qos.token_rate = 0X000000C8;
1137 cp.qos.peak_bandwidth = 0X000000C8;
1138 cp.qos.latency = 0x00000001;
1139 cp.qos.delay_variation = 0xFFFFFFFF;
1141 cp.qos.service_type = 0x01;
1142 cp.qos.token_rate = 0X00000000;
1143 cp.qos.peak_bandwidth = 0X00000000;
1144 cp.qos.latency = 0x00000001;
1145 cp.qos.delay_variation = 0xFFFFFFFF;
1148 if (hci_send_cmd(dd, OGF_LINK_POLICY, OCF_QOS_SETUP,
1149 QOS_SETUP_CP_SIZE, &cp) < 0) {
1153 DBG("Send Spreadtrum Qos Patch %s", qos_high ? "High" : "Low");
1160 static gboolean fix_role_to_master(const bdaddr_t *dst, gboolean fix_to_master)
1164 struct hci_conn_info_req *cr;
1165 switch_role_cp sr_cp;
1166 write_link_policy_cp lp_cp;
1168 dd = hci_open_dev(0);
1170 error("hci_open_dev is failed");
1174 cr = g_malloc0(sizeof(*cr) + sizeof(struct hci_conn_info));
1176 cr->type = ACL_LINK;
1177 bacpy(&cr->bdaddr, dst);
1178 err = ioctl(dd, HCIGETCONNINFO, cr);
1180 error("Fail to get HCIGETCOINFO : %d", err);
1186 if (!(cr->conn_info->link_mode & HCI_LM_MASTER) && fix_to_master) {
1187 DBG("Need to role switch");
1189 bacpy(&sr_cp.bdaddr, dst);
1190 sr_cp.role = 0x00; /* 0x00 : Master, 0x01 : Slave */
1191 if (hci_send_cmd(dd, OGF_LINK_POLICY, OCF_SWITCH_ROLE,
1192 SWITCH_ROLE_CP_SIZE, &sr_cp) < 0) {
1193 error("switch role is failed");
1200 lp_cp.handle = cr->conn_info->handle;
1201 DBG("Handle %d", lp_cp.handle);
1204 lp_cp.policy = fix_to_master ? 0x00 : HCI_LP_SNIFF | HCI_LP_RSWITCH;
1205 DBG("Request link policy : 0x%X", lp_cp.policy);
1207 if (hci_send_cmd(dd, OGF_LINK_POLICY, OCF_WRITE_LINK_POLICY,
1208 WRITE_LINK_POLICY_CP_SIZE, &lp_cp) < 0) {
1209 error("write link policy is failed : %d", lp_cp.policy);
1218 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
1220 static void avdtp_sep_set_state(struct avdtp *session,
1221 struct avdtp_local_sep *sep,
1222 avdtp_state_t state)
1224 struct avdtp_stream *stream = sep->stream;
1225 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1226 struct btd_adapter *adapter = device_get_adapter(session->device);
1227 const bdaddr_t *dst;
1229 dst = device_get_address(session->device);
1231 avdtp_state_t old_state;
1232 struct avdtp_error err, *err_ptr = NULL;
1236 error("Error changing sep state: stream not available");
1240 if (sep->state == state) {
1241 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
1242 DBG("stream state change failed: %s", avdtp_strerror(&err));
1246 DBG("stream state changed: %s -> %s",
1247 avdtp_statestr(sep->state),
1248 avdtp_statestr(state));
1251 old_state = sep->state;
1255 case AVDTP_STATE_CONFIGURED:
1256 if (sep->info.type == AVDTP_SEP_TYPE_SINK) {
1257 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1258 configured_session = session;
1259 configured_stream = stream;
1261 avdtp_delay_report(session, stream, stream->delay);
1264 case AVDTP_STATE_OPEN:
1265 stream->starting = FALSE;
1266 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1267 if (TIZEN_FEATURE_BLUEZ_BRCM_QOS || TIZEN_FEATURE_BLUEZ_SPEAKER_REFERENCE) {
1268 send_broadcom_a2dp_qos(dst, FALSE);
1269 } else if (TIZEN_FEATURE_BLUEZ_SPRD_QOS) {
1270 if (old_state == AVDTP_STATE_STREAMING)
1271 send_sprd_a2dp_qos(dst, FALSE);
1274 if (TIZEN_FEATURE_BLUEZ_ROLE_CHANGE)
1275 fix_role_to_master(dst, FALSE);
1277 btd_adapter_set_streaming_mode(adapter, dst, FALSE);
1278 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
1280 case AVDTP_STATE_STREAMING:
1281 if (stream->start_timer) {
1282 g_source_remove(stream->start_timer);
1283 stream->start_timer = 0;
1286 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1287 if (TIZEN_FEATURE_BLUEZ_BRCM_QOS || TIZEN_FEATURE_BLUEZ_SPEAKER_REFERENCE) {
1288 send_broadcom_a2dp_qos(dst, TRUE);
1289 } else if (TIZEN_FEATURE_BLUEZ_SPRD_QOS) {
1290 if (old_state == AVDTP_STATE_OPEN)
1291 send_sprd_a2dp_qos(dst, TRUE);
1293 if (TIZEN_FEATURE_BLUEZ_ROLE_CHANGE)
1294 fix_role_to_master(dst, TRUE);
1296 btd_adapter_set_streaming_mode(adapter, dst, TRUE);
1297 #endif /* TIZEN_FEATURE_BLUEZ_MODIFY */
1298 stream->open_acp = FALSE;
1300 case AVDTP_STATE_CLOSING:
1301 case AVDTP_STATE_ABORTING:
1302 if (stream->start_timer) {
1303 g_source_remove(stream->start_timer);
1304 stream->start_timer = 0;
1307 case AVDTP_STATE_IDLE:
1308 if (stream->start_timer) {
1309 g_source_remove(stream->start_timer);
1310 stream->start_timer = 0;
1312 if (session->pending_open == stream)
1313 handle_transport_connect(session, NULL, 0, 0);
1314 if (session->req && session->req->stream == stream)
1315 handle_unanswered_req(session, stream);
1316 /* Remove pending commands for this stream from the queue */
1317 cleanup_queue(session, stream);
1318 session->streams = g_slist_remove(session->streams, stream);
1324 l = stream->callbacks;
1326 struct stream_callback *cb = l->data;
1327 l = g_slist_next(l);
1328 cb->cb(stream, old_state, state, err_ptr, cb->user_data);
1331 if (state == AVDTP_STATE_IDLE)
1332 stream_free(stream);
1335 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1336 void finalize_discovery(struct avdtp *session, int err)
1338 static void finalize_discovery(struct avdtp *session, int err)
1341 struct discover_callback *discover = session->discover;
1342 struct avdtp_error avdtp_err;
1347 avdtp_error_init(&avdtp_err, AVDTP_ERRNO, err);
1349 if (discover->id > 0)
1350 g_source_remove(discover->id);
1353 discover->cb(session, session->seps, err ? &avdtp_err : NULL,
1354 discover->user_data);
1356 session->discover = NULL;
1359 static void release_stream(struct avdtp_stream *stream, struct avdtp *session)
1361 struct avdtp_local_sep *sep = stream->lsep;
1363 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
1364 /* Connection lost */
1365 avdtp_remove_source_devce(session->device);
1368 if (sep->cfm && sep->cfm->abort &&
1369 (sep->state != AVDTP_STATE_ABORTING ||
1371 sep->cfm->abort(session, sep, stream, NULL, sep->user_data);
1373 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
1376 static void sep_free(gpointer data)
1378 struct avdtp_remote_sep *sep = data;
1380 g_slist_free_full(sep->caps, g_free);
1384 static void remove_disconnect_timer(struct avdtp *session)
1386 if (!session->dc_timer)
1389 g_source_remove(session->dc_timer);
1390 session->dc_timer = 0;
1391 session->stream_setup = FALSE;
1393 /* Release disconnect timer reference */
1394 avdtp_unref(session);
1397 static void avdtp_free(void *data)
1399 struct avdtp *session = data;
1403 g_slist_free_full(session->streams, stream_free);
1406 g_io_channel_shutdown(session->io, FALSE, NULL);
1407 g_io_channel_unref(session->io);
1410 if (session->io_id) {
1411 g_source_remove(session->io_id);
1416 pending_req_free(session->req);
1418 g_slist_free_full(session->req_queue, pending_req_free);
1419 g_slist_free_full(session->prio_queue, pending_req_free);
1420 g_slist_free_full(session->seps, sep_free);
1422 g_free(session->buf);
1424 btd_device_unref(session->device);
1428 static void connection_lost(struct avdtp *session, int err)
1431 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1432 struct btd_service *service;
1435 session = avdtp_ref(session);
1437 ba2str(device_get_address(session->device), address);
1438 DBG("Disconnected from %s", address);
1440 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1441 service = btd_device_get_service(session->device, A2DP_SINK_UUID);
1443 btd_service_connecting_complete(service, -err);
1445 g_slist_foreach(session->streams, (GFunc) release_stream, session);
1446 session->streams = NULL;
1448 finalize_discovery(session, err);
1450 avdtp_set_state(session, AVDTP_SESSION_STATE_DISCONNECTED);
1452 DBG("%p: ref=%d", session, session->ref);
1454 avdtp_unref(session);
1457 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1458 static gboolean disconnect_acl_timeout(gpointer user_data)
1460 struct btd_device *device = user_data;
1464 btd_device_disconnect(device);
1470 static gboolean disconnect_timeout(gpointer user_data)
1472 struct avdtp *session = user_data;
1473 struct btd_service *service;
1474 gboolean stream_setup;
1475 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1476 struct btd_device *device = NULL;
1477 struct btd_adapter *adapter = NULL;
1478 const bdaddr_t *bdaddr = NULL;
1483 /* Fix : REVERSE_INULL */
1484 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1485 if (session->device == NULL) {
1486 error("session device NOT found");
1491 session->dc_timer = 0;
1493 stream_setup = session->stream_setup;
1494 session->stream_setup = FALSE;
1496 service = btd_device_get_service(session->device, A2DP_SINK_UUID);
1497 if (service && stream_setup) {
1498 sink_setup_stream(service, session);
1502 service = btd_device_get_service(session->device, A2DP_SOURCE_UUID);
1503 if (service && stream_setup) {
1504 source_setup_stream(service, session);
1508 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1509 if (session->device) {
1510 adapter = device_get_adapter(session->device);
1511 bdaddr = device_get_address(session->device);
1512 if (adapter && bdaddr)
1513 device = btd_adapter_find_device(adapter, bdaddr, BDADDR_BREDR);
1515 DBG("device exists");
1519 error("device is NOT found");
1523 connection_lost(session, ETIMEDOUT);
1526 /* Release disconnect timer reference */
1527 avdtp_unref(session);
1529 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1532 disconnect_acl_timeout,
1539 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
1540 static void set_disconnect_timer_for_sink(struct avdtp *session, gboolean disconn)
1544 if (session->dc_timer)
1545 remove_disconnect_timer(session);
1547 device_get_name(session->device, name, sizeof(name));
1548 DBG("name : [%s]", name);
1549 if (g_str_equal(name, "VW BT") || g_str_equal(name, "VW MI") ||
1550 g_str_equal(name, "Seat ")) {
1551 session->dc_timer = g_timeout_add_seconds(3, disconnect_timeout,
1553 } else if (g_str_equal(name, "CAR M")) {
1554 session->dc_timer = g_timeout_add(200, disconnect_timeout,
1557 if (disconn == TRUE)
1558 session->dc_timer = g_timeout_add(100,
1562 session->dc_timer = g_timeout_add_seconds(DISCONNECT_TIMEOUT,
1569 static void set_disconnect_timer(struct avdtp *session)
1571 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1574 /* Take a ref while disconnect timer is active */
1577 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
1578 device_get_name(session->device, name, sizeof(name));
1579 DBG("name : [%s]", name);
1580 if (g_str_equal(name, "VW BT") || g_str_equal(name, "VW MI") ||
1581 g_str_equal(name, "Seat ")) {
1582 session->dc_timer = g_timeout_add_seconds(3, disconnect_timeout,
1584 } else if (g_str_equal(name, "CAR M")) {
1585 session->dc_timer = g_timeout_add(200, disconnect_timeout,
1588 session->dc_timer = g_timeout_add_seconds(DISCONNECT_TIMEOUT,
1593 DBG("timeout %d", session->dc_timeout);
1594 if (!session->dc_timeout)
1595 session->dc_timer = g_idle_add(disconnect_timeout, session);
1597 session->dc_timer = g_timeout_add_seconds(session->dc_timeout,
1603 void avdtp_unref(struct avdtp *session)
1609 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
1610 struct btd_adapter *adapter;
1611 adapter = avdtp_get_adapter(session);
1614 DBG("%p: ref=%d", session, session->ref);
1616 if (session->ref > 0)
1619 switch (session->state) {
1620 case AVDTP_SESSION_STATE_CONNECTED:
1621 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
1622 if (btd_adapter_get_a2dp_role(adapter) == BLUETOOTH_A2DP_SINK_ROLE)
1623 set_disconnect_timer_for_sink(session, TRUE);
1625 set_disconnect_timer(session);
1627 set_disconnect_timer(session);
1630 case AVDTP_SESSION_STATE_CONNECTING:
1631 connection_lost(session, ECONNABORTED);
1633 case AVDTP_SESSION_STATE_DISCONNECTED:
1635 avdtp_free(session);
1640 struct avdtp *avdtp_ref(struct avdtp *session)
1643 DBG("%p: ref=%d", session, session->ref);
1644 remove_disconnect_timer(session);
1648 static bool match_by_seid(const void *data, const void *user_data)
1650 const struct avdtp_local_sep *sep = data;
1651 uint8_t seid = PTR_TO_UINT(user_data);
1653 return sep->info.seid == seid;
1656 static struct avdtp_local_sep *find_local_sep_by_seid(struct avdtp *session,
1659 return queue_find(session->lseps, match_by_seid, INT_TO_PTR(seid));
1662 struct avdtp_remote_sep *avdtp_find_remote_sep(struct avdtp *session,
1663 struct avdtp_local_sep *lsep)
1667 if (lsep->info.inuse)
1670 for (l = session->seps; l != NULL; l = g_slist_next(l)) {
1671 struct avdtp_remote_sep *sep = l->data;
1672 struct avdtp_service_capability *cap;
1673 struct avdtp_media_codec_capability *codec_data;
1675 /* Type must be different: source <-> sink */
1676 if (sep->type == lsep->info.type)
1679 if (sep->media_type != lsep->info.media_type)
1686 codec_data = (void *) cap->data;
1688 if (codec_data->media_codec_type != lsep->codec)
1691 if (lsep->ind && lsep->ind->match_codec)
1692 if (!lsep->ind->match_codec(session, codec_data,
1696 if (sep->stream == NULL)
1703 static GSList *caps_to_list(uint8_t *data, int size,
1704 struct avdtp_service_capability **codec,
1705 gboolean *delay_reporting)
1710 if (delay_reporting)
1711 *delay_reporting = FALSE;
1713 for (processed = 0, caps = NULL; processed + 2 <= size;) {
1714 struct avdtp_service_capability *cap;
1715 uint8_t length, category;
1720 if (processed + 2 + length > size) {
1721 error("Invalid capability data in getcap resp");
1725 cap = g_malloc(sizeof(struct avdtp_service_capability) +
1727 memcpy(cap, data, 2 + length);
1729 processed += 2 + length;
1732 caps = g_slist_append(caps, cap);
1734 if (category == AVDTP_MEDIA_CODEC &&
1736 sizeof(struct avdtp_media_codec_capability))
1738 else if (category == AVDTP_DELAY_REPORTING && delay_reporting)
1739 *delay_reporting = TRUE;
1745 static gboolean avdtp_unknown_cmd(struct avdtp *session, uint8_t transaction,
1748 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_GEN_REJECT,
1749 signal_id, NULL, 0);
1752 static void copy_seps(void *data, void *user_data)
1754 struct avdtp_local_sep *sep = data;
1755 struct seid_info **p = user_data;
1757 memcpy(*p, &sep->info, sizeof(struct seid_info));
1761 static gboolean avdtp_discover_cmd(struct avdtp *session, uint8_t transaction,
1762 void *buf, int size)
1764 unsigned int rsp_size, sep_count;
1765 struct seid_info *seps, *p;
1768 sep_count = queue_length(session->lseps);
1770 if (sep_count == 0) {
1771 uint8_t err = AVDTP_NOT_SUPPORTED_COMMAND;
1772 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1773 AVDTP_DISCOVER, &err, sizeof(err));
1776 rsp_size = sep_count * sizeof(struct seid_info);
1778 seps = g_new0(struct seid_info, sep_count);
1781 queue_foreach(session->lseps, copy_seps, &p);
1783 ret = avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1784 AVDTP_DISCOVER, seps, rsp_size);
1790 static gboolean avdtp_getcap_cmd(struct avdtp *session, uint8_t transaction,
1791 struct seid_req *req, unsigned int size,
1795 struct avdtp_local_sep *sep = NULL;
1796 unsigned int rsp_size;
1797 uint8_t err, buf[1024], *ptr = buf;
1800 cmd = get_all ? AVDTP_GET_ALL_CAPABILITIES : AVDTP_GET_CAPABILITIES;
1802 if (size < sizeof(struct seid_req)) {
1803 err = AVDTP_BAD_LENGTH;
1807 sep = find_local_sep_by_seid(session, req->acp_seid);
1809 err = AVDTP_BAD_ACP_SEID;
1813 if (!sep->ind->get_capability(session, sep, get_all, &caps,
1814 &err, sep->user_data))
1817 for (l = caps, rsp_size = 0; l != NULL; l = g_slist_next(l)) {
1818 struct avdtp_service_capability *cap = l->data;
1820 if (rsp_size + cap->length + 2 > sizeof(buf))
1823 memcpy(ptr, cap, cap->length + 2);
1824 rsp_size += cap->length + 2;
1825 ptr += cap->length + 2;
1832 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT, cmd,
1836 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT, cmd,
1840 static void setconf_cb(struct avdtp *session, struct avdtp_stream *stream,
1841 struct avdtp_error *err)
1843 struct conf_rej rej;
1844 struct avdtp_local_sep *sep;
1847 rej.error = AVDTP_UNSUPPORTED_CONFIGURATION;
1848 rej.category = err->err.error_code;
1849 avdtp_send(session, session->in.transaction,
1850 AVDTP_MSG_TYPE_REJECT, AVDTP_SET_CONFIGURATION,
1852 stream_free(stream);
1856 if (!avdtp_send(session, session->in.transaction, AVDTP_MSG_TYPE_ACCEPT,
1857 AVDTP_SET_CONFIGURATION, NULL, 0)) {
1858 stream_free(stream);
1863 sep->stream = stream;
1864 sep->info.inuse = 1;
1865 session->streams = g_slist_append(session->streams, stream);
1867 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
1870 static gboolean avdtp_setconf_cmd(struct avdtp *session, uint8_t transaction,
1871 struct setconf_req *req, unsigned int size)
1873 struct conf_rej rej;
1874 struct avdtp_local_sep *sep;
1875 struct avdtp_stream *stream;
1876 uint8_t err, category = 0x00;
1877 struct btd_service *service;
1880 if (size < sizeof(struct setconf_req)) {
1881 error("Too short getcap request");
1885 sep = find_local_sep_by_seid(session, req->acp_seid);
1887 err = AVDTP_BAD_ACP_SEID;
1892 err = AVDTP_SEP_IN_USE;
1896 switch (sep->info.type) {
1897 case AVDTP_SEP_TYPE_SOURCE:
1898 service = btd_device_get_service(session->device,
1900 if (service == NULL) {
1901 btd_device_add_uuid(session->device, A2DP_SINK_UUID);
1902 service = btd_device_get_service(session->device,
1904 if (service == NULL) {
1905 error("Unable to get a audio sink object");
1906 err = AVDTP_BAD_STATE;
1911 case AVDTP_SEP_TYPE_SINK:
1912 service = btd_device_get_service(session->device,
1914 if (service == NULL) {
1915 btd_device_add_uuid(session->device, A2DP_SOURCE_UUID);
1916 service = btd_device_get_service(session->device,
1918 if (service == NULL) {
1919 error("Unable to get a audio source object");
1920 err = AVDTP_BAD_STATE;
1927 stream = g_new0(struct avdtp_stream, 1);
1928 stream->session = session;
1930 stream->rseid = req->int_seid;
1931 stream->caps = caps_to_list(req->caps,
1932 size - sizeof(struct setconf_req),
1934 &stream->delay_reporting);
1936 /* Verify that the Media Transport capability's length = 0. Reject otherwise */
1937 for (l = stream->caps; l != NULL; l = g_slist_next(l)) {
1938 struct avdtp_service_capability *cap = l->data;
1940 if (cap->category == AVDTP_MEDIA_TRANSPORT && cap->length != 0) {
1941 err = AVDTP_BAD_MEDIA_TRANSPORT_FORMAT;
1946 if (stream->delay_reporting && session->version < 0x0103)
1947 session->version = 0x0103;
1949 if (sep->ind && sep->ind->set_configuration) {
1950 if (!sep->ind->set_configuration(session, sep, stream,
1954 err = AVDTP_UNSUPPORTED_CONFIGURATION;
1959 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1960 AVDTP_SET_CONFIGURATION, NULL, 0)) {
1961 stream_free(stream);
1965 sep->stream = stream;
1966 sep->info.inuse = 1;
1967 session->streams = g_slist_append(session->streams, stream);
1969 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
1975 stream_free(stream);
1978 rej.category = category;
1979 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1980 AVDTP_SET_CONFIGURATION, &rej, sizeof(rej));
1983 static gboolean avdtp_getconf_cmd(struct avdtp *session, uint8_t transaction,
1984 struct seid_req *req, int size)
1987 struct avdtp_local_sep *sep = NULL;
1993 if (size < (int) sizeof(struct seid_req)) {
1994 error("Too short getconf request");
1998 memset(buf, 0, sizeof(buf));
2000 sep = find_local_sep_by_seid(session, req->acp_seid);
2002 err = AVDTP_BAD_ACP_SEID;
2005 if (!sep->stream || !sep->stream->caps) {
2006 err = AVDTP_UNSUPPORTED_CONFIGURATION;
2010 for (l = sep->stream->caps, rsp_size = 0; l != NULL; l = g_slist_next(l)) {
2011 struct avdtp_service_capability *cap = l->data;
2013 if (rsp_size + cap->length + 2 > (int) sizeof(buf))
2016 memcpy(ptr, cap, cap->length + 2);
2017 rsp_size += cap->length + 2;
2018 ptr += cap->length + 2;
2021 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2022 AVDTP_GET_CONFIGURATION, buf, rsp_size);
2025 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2026 AVDTP_GET_CONFIGURATION, &err, sizeof(err));
2029 static gboolean avdtp_reconf_cmd(struct avdtp *session, uint8_t transaction,
2030 struct seid_req *req, int size)
2032 struct conf_rej rej;
2034 rej.error = AVDTP_NOT_SUPPORTED_COMMAND;
2035 rej.category = 0x00;
2037 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2038 AVDTP_RECONFIGURE, &rej, sizeof(rej));
2041 static void check_seid_collision(struct pending_req *req, uint8_t id)
2043 struct seid_req *seid = req->data;
2045 if (seid->acp_seid == id)
2046 req->collided = TRUE;
2049 static void check_start_collision(struct pending_req *req, uint8_t id)
2051 struct start_req *start = req->data;
2052 struct seid *seid = &start->first_seid;
2053 int count = 1 + req->data_size - sizeof(struct start_req);
2056 for (i = 0; i < count; i++, seid++) {
2057 if (seid->seid == id) {
2058 req->collided = TRUE;
2064 static void check_suspend_collision(struct pending_req *req, uint8_t id)
2066 struct suspend_req *suspend = req->data;
2067 struct seid *seid = &suspend->first_seid;
2068 int count = 1 + req->data_size - sizeof(struct suspend_req);
2071 for (i = 0; i < count; i++, seid++) {
2072 if (seid->seid == id) {
2073 req->collided = TRUE;
2079 static void avdtp_check_collision(struct avdtp *session, uint8_t cmd,
2080 struct avdtp_stream *stream)
2082 struct pending_req *req = session->req;
2084 if (req == NULL || (req->signal_id != cmd && cmd != AVDTP_ABORT))
2087 if (cmd == AVDTP_ABORT)
2088 cmd = req->signal_id;
2093 check_seid_collision(req, stream->rseid);
2096 check_start_collision(req, stream->rseid);
2099 check_suspend_collision(req, stream->rseid);
2104 static gboolean avdtp_open_cmd(struct avdtp *session, uint8_t transaction,
2105 struct seid_req *req, unsigned int size)
2107 struct avdtp_local_sep *sep;
2108 struct avdtp_stream *stream;
2111 if (size < sizeof(struct seid_req)) {
2112 error("Too short abort request");
2116 sep = find_local_sep_by_seid(session, req->acp_seid);
2118 err = AVDTP_BAD_ACP_SEID;
2122 if (sep->state != AVDTP_STATE_CONFIGURED) {
2123 err = AVDTP_BAD_STATE;
2127 stream = sep->stream;
2129 if (sep->ind && sep->ind->open) {
2130 if (!sep->ind->open(session, sep, stream, &err,
2135 avdtp_check_collision(session, AVDTP_OPEN, stream);
2137 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2138 AVDTP_OPEN, NULL, 0))
2141 stream->open_acp = TRUE;
2142 session->pending_open = stream;
2143 stream->timer = g_timeout_add_seconds(REQ_TIMEOUT,
2144 stream_open_timeout,
2150 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2151 AVDTP_OPEN, &err, sizeof(err));
2154 static gboolean avdtp_start_cmd(struct avdtp *session, uint8_t transaction,
2155 struct start_req *req, unsigned int size)
2158 struct avdtp_local_sep *sep;
2159 struct avdtp_stream *stream;
2160 struct stream_rej rej;
2162 uint8_t err, failed_seid;
2166 if (size < sizeof(struct start_req)) {
2167 error("Too short start request");
2171 seid_count = 1 + size - sizeof(struct start_req);
2173 seid = &req->first_seid;
2175 for (i = 0; i < seid_count; i++, seid++) {
2176 failed_seid = seid->seid;
2178 sep = find_local_sep_by_seid(session, seid->seid);
2179 if (!sep || !sep->stream) {
2180 err = AVDTP_BAD_ACP_SEID;
2184 stream = sep->stream;
2186 /* Also reject start cmd if state is not open */
2187 if (sep->state != AVDTP_STATE_OPEN) {
2188 err = AVDTP_BAD_STATE;
2191 stream->starting = TRUE;
2193 if (sep->ind && sep->ind->start) {
2194 if (!sep->ind->start(session, sep, stream, &err,
2199 avdtp_check_collision(session, AVDTP_START, stream);
2201 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
2202 avdtp_add_source_device(session->device);
2205 avdtp_sep_set_state(session, sep, AVDTP_STATE_STREAMING);
2208 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2209 AVDTP_START, NULL, 0);
2212 DBG("Rejecting (%d)", err);
2213 memset(&rej, 0, sizeof(rej));
2214 rej.acp_seid = failed_seid;
2216 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2217 AVDTP_START, &rej, sizeof(rej));
2220 static gboolean avdtp_close_cmd(struct avdtp *session, uint8_t transaction,
2221 struct seid_req *req, unsigned int size)
2223 struct avdtp_local_sep *sep;
2224 struct avdtp_stream *stream;
2227 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
2228 avdtp_remove_source_devce(session->device);
2231 if (size < sizeof(struct seid_req)) {
2232 error("Too short close request");
2236 sep = find_local_sep_by_seid(session, req->acp_seid);
2237 if (!sep || !sep->stream) {
2238 err = AVDTP_BAD_ACP_SEID;
2242 if (sep->state != AVDTP_STATE_OPEN &&
2243 sep->state != AVDTP_STATE_STREAMING) {
2244 err = AVDTP_BAD_STATE;
2248 stream = sep->stream;
2250 if (sep->ind && sep->ind->close) {
2251 if (!sep->ind->close(session, sep, stream, &err,
2256 avdtp_check_collision(session, AVDTP_CLOSE, stream);
2258 avdtp_sep_set_state(session, sep, AVDTP_STATE_CLOSING);
2260 session->dc_timeout = DISCONNECT_TIMEOUT;
2262 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2263 AVDTP_CLOSE, NULL, 0))
2266 stream->timer = g_timeout_add_seconds(REQ_TIMEOUT,
2267 stream_close_timeout,
2273 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2274 AVDTP_CLOSE, &err, sizeof(err));
2277 static gboolean avdtp_suspend_cmd(struct avdtp *session, uint8_t transaction,
2278 struct suspend_req *req, unsigned int size)
2280 struct avdtp_local_sep *sep;
2281 struct avdtp_stream *stream;
2282 struct stream_rej rej;
2284 uint8_t err, failed_seid;
2287 if (size < sizeof(struct suspend_req)) {
2288 error("Too short suspend request");
2292 seid_count = 1 + size - sizeof(struct suspend_req);
2294 seid = &req->first_seid;
2296 for (i = 0; i < seid_count; i++, seid++) {
2297 failed_seid = seid->seid;
2299 sep = find_local_sep_by_seid(session, seid->seid);
2300 if (!sep || !sep->stream) {
2301 err = AVDTP_BAD_ACP_SEID;
2305 stream = sep->stream;
2307 #if defined(TIZEN_FEATURE_BLUEZ_MODIFY) && defined(TIZEN_FEATURE_BLUEZ_A2DP_MULTISTREAM)
2308 if (sep->state != AVDTP_STATE_STREAMING) {
2309 DBG("Not streaming state: %d", sep->state);
2310 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2311 AVDTP_SUSPEND, NULL, 0);
2314 if (sep->state != AVDTP_STATE_STREAMING) {
2315 err = AVDTP_BAD_STATE;
2320 if (sep->ind && sep->ind->suspend) {
2321 if (!sep->ind->suspend(session, sep, stream, &err,
2326 avdtp_check_collision(session, AVDTP_SUSPEND, stream);
2328 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
2331 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2332 AVDTP_SUSPEND, NULL, 0);
2335 memset(&rej, 0, sizeof(rej));
2336 rej.acp_seid = failed_seid;
2338 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2339 AVDTP_SUSPEND, &rej, sizeof(rej));
2342 static gboolean avdtp_abort_cmd(struct avdtp *session, uint8_t transaction,
2343 struct seid_req *req, unsigned int size)
2345 struct avdtp_local_sep *sep;
2349 if (size < sizeof(struct seid_req)) {
2350 error("Too short abort request");
2354 sep = find_local_sep_by_seid(session, req->acp_seid);
2355 if (!sep || !sep->stream)
2358 if (sep->ind && sep->ind->abort)
2359 sep->ind->abort(session, sep, sep->stream, &err,
2362 avdtp_check_collision(session, AVDTP_ABORT, sep->stream);
2364 ret = avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2365 AVDTP_ABORT, NULL, 0);
2367 avdtp_sep_set_state(session, sep, AVDTP_STATE_ABORTING);
2368 session->dc_timeout = DISCONNECT_TIMEOUT;
2374 static gboolean avdtp_secctl_cmd(struct avdtp *session, uint8_t transaction,
2375 struct seid_req *req, int size)
2377 return avdtp_unknown_cmd(session, transaction, AVDTP_SECURITY_CONTROL);
2380 static gboolean avdtp_delayreport_cmd(struct avdtp *session,
2381 uint8_t transaction,
2382 struct delay_req *req,
2385 struct avdtp_local_sep *sep;
2386 struct avdtp_stream *stream;
2389 if (size < sizeof(struct delay_req)) {
2390 error("Too short delay report request");
2394 sep = find_local_sep_by_seid(session, req->acp_seid);
2395 if (!sep || !sep->stream) {
2396 err = AVDTP_BAD_ACP_SEID;
2400 stream = sep->stream;
2402 if (sep->state != AVDTP_STATE_CONFIGURED &&
2403 sep->state != AVDTP_STATE_OPEN &&
2404 sep->state != AVDTP_STATE_STREAMING) {
2405 err = AVDTP_BAD_STATE;
2409 stream->delay = ntohs(req->delay);
2411 if (sep->ind && sep->ind->delayreport) {
2412 if (!sep->ind->delayreport(session, sep, stream->rseid,
2413 stream->delay, &err,
2418 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2419 AVDTP_DELAY_REPORT, NULL, 0);
2422 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2423 AVDTP_DELAY_REPORT, &err, sizeof(err));
2426 static gboolean avdtp_parse_cmd(struct avdtp *session, uint8_t transaction,
2427 uint8_t signal_id, void *buf, int size)
2429 switch (signal_id) {
2430 case AVDTP_DISCOVER:
2431 DBG("Received DISCOVER_CMD");
2432 return avdtp_discover_cmd(session, transaction, buf, size);
2433 case AVDTP_GET_CAPABILITIES:
2434 DBG("Received GET_CAPABILITIES_CMD");
2435 return avdtp_getcap_cmd(session, transaction, buf, size,
2437 case AVDTP_GET_ALL_CAPABILITIES:
2438 DBG("Received GET_ALL_CAPABILITIES_CMD");
2439 return avdtp_getcap_cmd(session, transaction, buf, size, TRUE);
2440 case AVDTP_SET_CONFIGURATION:
2441 DBG("Received SET_CONFIGURATION_CMD");
2442 return avdtp_setconf_cmd(session, transaction, buf, size);
2443 case AVDTP_GET_CONFIGURATION:
2444 DBG("Received GET_CONFIGURATION_CMD");
2445 return avdtp_getconf_cmd(session, transaction, buf, size);
2446 case AVDTP_RECONFIGURE:
2447 DBG("Received RECONFIGURE_CMD");
2448 return avdtp_reconf_cmd(session, transaction, buf, size);
2450 DBG("Received OPEN_CMD");
2451 return avdtp_open_cmd(session, transaction, buf, size);
2453 DBG("Received START_CMD");
2454 return avdtp_start_cmd(session, transaction, buf, size);
2456 DBG("Received CLOSE_CMD");
2457 return avdtp_close_cmd(session, transaction, buf, size);
2459 DBG("Received SUSPEND_CMD");
2460 return avdtp_suspend_cmd(session, transaction, buf, size);
2462 DBG("Received ABORT_CMD");
2463 return avdtp_abort_cmd(session, transaction, buf, size);
2464 case AVDTP_SECURITY_CONTROL:
2465 DBG("Received SECURITY_CONTROL_CMD");
2466 return avdtp_secctl_cmd(session, transaction, buf, size);
2467 case AVDTP_DELAY_REPORT:
2468 DBG("Received DELAY_REPORT_CMD");
2469 return avdtp_delayreport_cmd(session, transaction, buf, size);
2471 DBG("Received unknown request id %u", signal_id);
2472 return avdtp_unknown_cmd(session, transaction, signal_id);
2476 enum avdtp_parse_result { PARSE_ERROR, PARSE_FRAGMENT, PARSE_SUCCESS };
2478 static enum avdtp_parse_result avdtp_parse_data(struct avdtp *session,
2479 void *buf, size_t size)
2481 struct avdtp_common_header *header = buf;
2482 struct avdtp_single_header *single = (void *) session->buf;
2483 struct avdtp_start_header *start = (void *) session->buf;
2487 switch (header->packet_type) {
2488 case AVDTP_PKT_TYPE_SINGLE:
2489 if (size < sizeof(*single)) {
2490 error("Received too small single packet (%zu bytes)", size);
2493 if (session->in.active) {
2494 error("SINGLE: Invalid AVDTP packet fragmentation");
2498 payload = session->buf + sizeof(*single);
2499 payload_size = size - sizeof(*single);
2501 session->in.active = TRUE;
2502 session->in.data_size = 0;
2503 session->in.no_of_packets = 1;
2504 session->in.transaction = header->transaction;
2505 session->in.message_type = header->message_type;
2506 session->in.signal_id = single->signal_id;
2509 case AVDTP_PKT_TYPE_START:
2510 if (size < sizeof(*start)) {
2511 error("Received too small start packet (%zu bytes)", size);
2514 if (session->in.active) {
2515 error("START: Invalid AVDTP packet fragmentation");
2519 session->in.active = TRUE;
2520 session->in.data_size = 0;
2521 session->in.transaction = header->transaction;
2522 session->in.message_type = header->message_type;
2523 session->in.no_of_packets = start->no_of_packets;
2524 session->in.signal_id = start->signal_id;
2526 payload = session->buf + sizeof(*start);
2527 payload_size = size - sizeof(*start);
2530 case AVDTP_PKT_TYPE_CONTINUE:
2531 if (size < sizeof(struct avdtp_continue_header)) {
2532 error("Received too small continue packet (%zu bytes)",
2536 if (!session->in.active) {
2537 error("CONTINUE: Invalid AVDTP packet fragmentation");
2540 if (session->in.transaction != header->transaction) {
2541 error("Continue transaction id doesn't match");
2544 if (session->in.no_of_packets <= 1) {
2545 error("Too few continue packets");
2549 payload = session->buf + sizeof(struct avdtp_continue_header);
2550 payload_size = size - sizeof(struct avdtp_continue_header);
2553 case AVDTP_PKT_TYPE_END:
2554 if (size < sizeof(struct avdtp_continue_header)) {
2555 error("Received too small end packet (%zu bytes)", size);
2558 if (!session->in.active) {
2559 error("END: Invalid AVDTP packet fragmentation");
2562 if (session->in.transaction != header->transaction) {
2563 error("End transaction id doesn't match");
2566 if (session->in.no_of_packets > 1) {
2567 error("Got an end packet too early");
2571 payload = session->buf + sizeof(struct avdtp_continue_header);
2572 payload_size = size - sizeof(struct avdtp_continue_header);
2576 error("Invalid AVDTP packet type 0x%02X", header->packet_type);
2580 if (session->in.data_size + payload_size >
2581 sizeof(session->in.buf)) {
2582 error("Not enough incoming buffer space!");
2586 memcpy(session->in.buf + session->in.data_size, payload, payload_size);
2587 session->in.data_size += payload_size;
2589 if (session->in.no_of_packets > 1) {
2590 session->in.no_of_packets--;
2591 DBG("Received AVDTP fragment. %d to go",
2592 session->in.no_of_packets);
2593 return PARSE_FRAGMENT;
2596 session->in.active = FALSE;
2598 return PARSE_SUCCESS;
2601 static gboolean session_cb(GIOChannel *chan, GIOCondition cond,
2604 struct avdtp *session = data;
2605 struct avdtp_common_header *header;
2611 if (cond & G_IO_NVAL)
2614 header = (void *) session->buf;
2616 if (cond & (G_IO_HUP | G_IO_ERR))
2619 fd = g_io_channel_unix_get_fd(chan);
2620 size = read(fd, session->buf, session->imtu);
2622 error("IO Channel read error");
2626 if ((size_t) size < sizeof(struct avdtp_common_header)) {
2627 error("Received too small packet (%zu bytes)", size);
2631 switch (avdtp_parse_data(session, session->buf, size)) {
2634 case PARSE_FRAGMENT:
2640 if (session->in.message_type == AVDTP_MSG_TYPE_COMMAND) {
2641 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
2642 struct btd_service *service;
2644 service = btd_device_get_service(session->device, A2DP_SINK_UUID);
2645 if (service != NULL) {
2646 DBG("A2dp state %d", btd_service_get_state(
2647 btd_device_get_service(session->device, A2DP_SINK_UUID)));
2649 if (btd_service_get_state(btd_device_get_service(session->device,
2650 A2DP_SINK_UUID)) == BTD_SERVICE_STATE_DISCONNECTING) {
2651 DBG("avdtp:%p , disconnect timer is going on", session);
2656 if (!avdtp_parse_cmd(session, session->in.transaction,
2657 session->in.signal_id,
2659 session->in.data_size)) {
2660 error("Unable to handle command. Disconnecting");
2664 if (session->req && session->req->collided) {
2665 DBG("Collision detected");
2672 if (session->req == NULL) {
2673 error("No pending request, ignoring message");
2677 if (header->transaction != session->req->transaction) {
2678 error("Transaction label doesn't match");
2682 if (session->in.signal_id != session->req->signal_id) {
2683 error("Response signal doesn't match");
2687 g_source_remove(session->req->timeout);
2688 session->req->timeout = 0;
2690 switch (header->message_type) {
2691 case AVDTP_MSG_TYPE_ACCEPT:
2692 if (!avdtp_parse_resp(session, session->req->stream,
2693 session->in.transaction,
2694 session->in.signal_id,
2696 session->in.data_size)) {
2697 error("Unable to parse accept response");
2701 case AVDTP_MSG_TYPE_REJECT:
2702 if (!avdtp_parse_rej(session, session->req->stream,
2703 session->in.transaction,
2704 session->in.signal_id,
2706 session->in.data_size)) {
2707 error("Unable to parse reject response");
2711 case AVDTP_MSG_TYPE_GEN_REJECT:
2712 error("Received a General Reject message");
2715 error("Unknown message type 0x%02X", header->message_type);
2720 pending_req_free(session->req);
2721 session->req = NULL;
2723 process_queue(session);
2728 connection_lost(session, EIO);
2733 static uint16_t get_version(struct avdtp *session)
2735 const sdp_record_t *rec;
2737 sdp_data_t *proto_desc;
2738 uint16_t ver = 0x0000;
2740 rec = btd_device_get_record(session->device, A2DP_SINK_UUID);
2742 rec = btd_device_get_record(session->device, A2DP_SOURCE_UUID);
2747 if (sdp_get_access_protos(rec, &protos) < 0)
2750 proto_desc = sdp_get_proto_desc(protos, AVDTP_UUID);
2751 if (proto_desc && proto_desc->dtd == SDP_UINT16)
2752 ver = proto_desc->val.uint16;
2754 sdp_list_foreach(protos, (sdp_list_func_t) sdp_list_free, NULL);
2755 sdp_list_free(protos, NULL);
2760 static void avdtp_connect_cb(GIOChannel *chan, GError *err, gpointer user_data)
2762 struct avdtp *session = user_data;
2765 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2766 struct btd_adapter *adapter;
2767 adapter = avdtp_get_adapter(session);
2772 error("%s", err->message);
2777 session->io = g_io_channel_ref(chan);
2779 /* Check if kernel supports reading packet types */
2780 bt_io_get(chan, NULL, BT_IO_OPT_PHY, &session->phy, BT_IO_OPT_INVALID);
2782 bt_io_get(chan, &err,
2783 BT_IO_OPT_OMTU, &session->omtu,
2784 BT_IO_OPT_IMTU, &session->imtu,
2788 error("%s", err->message);
2792 ba2str(device_get_address(session->device), address);
2793 DBG("AVDTP: connected %s channel to %s",
2794 session->pending_open ? "transport" : "signaling",
2797 if (session->state == AVDTP_SESSION_STATE_CONNECTING) {
2798 DBG("AVDTP imtu=%u, omtu=%u", session->imtu, session->omtu);
2800 session->buf = g_malloc0(MAX(session->imtu, session->omtu));
2801 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTED);
2804 g_source_remove(session->io_id);
2806 /* This watch should be low priority since otherwise the
2807 * connect callback might be dispatched before the session
2808 * callback if the kernel wakes us up at the same time for
2809 * them. This could happen if a headset is very quick in
2810 * sending the Start command after connecting the stream
2811 * transport channel.
2813 session->io_id = g_io_add_watch_full(chan,
2815 G_IO_IN | G_IO_ERR | G_IO_HUP
2817 (GIOFunc) session_cb, session,
2820 if (session->stream_setup) {
2821 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2822 if (btd_adapter_get_a2dp_role(adapter) == BLUETOOTH_A2DP_SINK_ROLE)
2823 set_disconnect_timer_for_sink(session, FALSE);
2825 set_disconnect_timer(session);
2827 set_disconnect_timer(session);
2830 } else if (session->pending_open)
2831 handle_transport_connect(session, chan, session->imtu,
2836 process_queue(session);
2841 if (session->pending_open) {
2842 struct avdtp_stream *stream = session->pending_open;
2844 handle_transport_connect(session, NULL, 0, 0);
2846 if (avdtp_abort(session, stream) < 0)
2847 avdtp_sep_set_state(session, stream->lsep,
2850 connection_lost(session, err_no);
2853 struct avdtp *avdtp_new(GIOChannel *chan, struct btd_device *device,
2854 struct queue *lseps)
2856 struct avdtp *session;
2858 session = g_new0(struct avdtp, 1);
2860 session->device = btd_device_ref(device);
2861 /* We don't use avdtp_set_state() here since this isn't a state change
2862 * but just setting of the initial state */
2863 session->state = AVDTP_SESSION_STATE_DISCONNECTED;
2864 session->lseps = lseps;
2866 session->version = get_version(session);
2871 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTING);
2873 btd_device_add_uuid(device, ADVANCED_AUDIO_UUID);
2875 session->io = g_io_channel_ref(chan);
2876 session->io_id = g_io_add_watch(chan, G_IO_ERR | G_IO_HUP | G_IO_NVAL,
2877 (GIOFunc) session_cb, session);
2879 /* This is so that avdtp_connect_cb will know to do the right thing
2880 * with respect to the disconnect timer */
2881 session->stream_setup = TRUE;
2883 session->dc_timeout = DISCONNECT_TIMEOUT;
2885 avdtp_connect_cb(chan, NULL, session);
2890 uint16_t avdtp_get_version(struct avdtp *session)
2892 return session->version;
2895 static GIOChannel *l2cap_connect(struct avdtp *session)
2899 const bdaddr_t *src;
2901 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2902 struct btd_adapter *adapter;
2903 adapter = avdtp_get_adapter(session);
2906 src = btd_adapter_get_address(device_get_adapter(session->device));
2907 if (main_opts.mps == MPS_OFF)
2908 mode = BT_IO_MODE_BASIC;
2910 mode = BT_IO_MODE_STREAMING;
2912 #if defined TIZEN_FEATURE_BLUEZ_MODIFY
2913 if (btd_adapter_get_a2dp_role(adapter) == BLUETOOTH_A2DP_SINK_ROLE) {
2914 io = bt_io_connect(avdtp_connect_cb, session,
2916 BT_IO_OPT_SOURCE_BDADDR, src,
2917 BT_IO_OPT_DEST_BDADDR,
2918 device_get_address(session->device),
2919 BT_IO_OPT_PSM, AVDTP_PSM,
2920 BT_IO_OPT_MODE, mode,
2921 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2922 BT_IO_OPT_IMTU, 895,
2926 io = bt_io_connect(avdtp_connect_cb, session,
2928 BT_IO_OPT_SOURCE_BDADDR, src,
2929 BT_IO_OPT_DEST_BDADDR,
2930 device_get_address(session->device),
2931 BT_IO_OPT_PSM, AVDTP_PSM,
2932 BT_IO_OPT_MODE, mode,
2933 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2938 io = bt_io_connect(avdtp_connect_cb, session,
2940 BT_IO_OPT_SOURCE_BDADDR, src,
2941 BT_IO_OPT_DEST_BDADDR,
2942 device_get_address(session->device),
2943 BT_IO_OPT_PSM, AVDTP_PSM,
2944 BT_IO_OPT_MODE, mode,
2945 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2946 /* Set Input MTU to 0 to auto-tune */
2950 io = bt_io_connect(avdtp_connect_cb, session,
2952 BT_IO_OPT_SOURCE_BDADDR, src,
2953 BT_IO_OPT_DEST_BDADDR,
2954 device_get_address(session->device),
2955 BT_IO_OPT_PSM, AVDTP_PSM,
2956 BT_IO_OPT_MODE, mode,
2957 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2962 error("%s", err->message);
2970 static void queue_request(struct avdtp *session, struct pending_req *req,
2974 session->prio_queue = g_slist_append(session->prio_queue, req);
2976 session->req_queue = g_slist_append(session->req_queue, req);
2979 static uint8_t req_get_seid(struct pending_req *req)
2981 if (req->signal_id == AVDTP_DISCOVER)
2984 return ((struct seid_req *) (req->data))->acp_seid;
2987 static int cancel_request(struct avdtp *session, int err)
2989 struct pending_req *req;
2990 struct seid_req sreq;
2991 struct avdtp_local_sep *lsep;
2992 struct avdtp_stream *stream;
2994 struct avdtp_error averr;
2997 session->req = NULL;
2999 avdtp_error_init(&averr, AVDTP_ERRNO, err);
3001 seid = req_get_seid(req);
3003 stream = find_stream_by_rseid(session, seid);
3008 lsep = stream->lsep;
3012 switch (req->signal_id) {
3013 case AVDTP_RECONFIGURE:
3014 error("Reconfigure: %s (%d)", strerror(err), err);
3015 if (lsep && lsep->cfm && lsep->cfm->reconfigure)
3016 lsep->cfm->reconfigure(session, lsep, stream, &averr,
3020 error("Open: %s (%d)", strerror(err), err);
3021 if (lsep && lsep->cfm && lsep->cfm->open)
3022 lsep->cfm->open(session, lsep, stream, &averr,
3026 error("Start: %s (%d)", strerror(err), err);
3027 if (lsep && lsep->cfm && lsep->cfm->start) {
3028 lsep->cfm->start(session, lsep, stream, &averr,
3031 stream->starting = FALSE;
3035 error("Suspend: %s (%d)", strerror(err), err);
3036 if (lsep && lsep->cfm && lsep->cfm->suspend)
3037 lsep->cfm->suspend(session, lsep, stream, &averr,
3041 error("Close: %s (%d)", strerror(err), err);
3042 if (lsep && lsep->cfm && lsep->cfm->close) {
3043 lsep->cfm->close(session, lsep, stream, &averr,
3046 stream->close_int = FALSE;
3049 case AVDTP_SET_CONFIGURATION:
3050 error("SetConfiguration: %s (%d)", strerror(err), err);
3051 if (lsep && lsep->cfm && lsep->cfm->set_configuration)
3052 lsep->cfm->set_configuration(session, lsep, stream,
3053 &averr, lsep->user_data);
3055 case AVDTP_DISCOVER:
3056 error("Discover: %s (%d)", strerror(err), err);
3058 case AVDTP_GET_CAPABILITIES:
3059 error("GetCapabilities: %s (%d)", strerror(err), err);
3062 error("Abort: %s (%d)", strerror(err), err);
3069 memset(&sreq, 0, sizeof(sreq));
3070 sreq.acp_seid = seid;
3072 err = send_request(session, TRUE, stream, AVDTP_ABORT, &sreq,
3075 error("Unable to send abort request");
3079 stream->abort_int = TRUE;
3084 connection_lost(session, err);
3086 pending_req_free(req);
3090 static gboolean request_timeout(gpointer user_data)
3092 struct avdtp *session = user_data;
3094 cancel_request(session, ETIMEDOUT);
3099 static int send_req(struct avdtp *session, gboolean priority,
3100 struct pending_req *req)
3102 static int transaction = 0;
3105 if (session->state == AVDTP_SESSION_STATE_DISCONNECTED) {
3106 session->io = l2cap_connect(session);
3111 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTING);
3114 if (session->state < AVDTP_SESSION_STATE_CONNECTED ||
3115 session->req != NULL) {
3116 queue_request(session, req, priority);
3120 req->transaction = transaction++;
3123 /* FIXME: Should we retry to send if the buffer
3124 was not totally sent or in case of EINTR? */
3125 if (!avdtp_send(session, req->transaction, AVDTP_MSG_TYPE_COMMAND,
3126 req->signal_id, req->data, req->data_size)) {
3133 switch (req->signal_id) {
3135 timeout = ABORT_TIMEOUT;
3138 timeout = SUSPEND_TIMEOUT;
3141 timeout = REQ_TIMEOUT;
3144 req->timeout = g_timeout_add_seconds(timeout, request_timeout, session);
3153 static int send_request(struct avdtp *session, gboolean priority,
3154 struct avdtp_stream *stream, uint8_t signal_id,
3155 void *buffer, size_t size)
3157 struct pending_req *req;
3159 if (stream && stream->abort_int && signal_id != AVDTP_ABORT) {
3160 DBG("Unable to send requests while aborting");
3164 req = g_new0(struct pending_req, 1);
3165 req->signal_id = signal_id;
3166 req->data = g_malloc(size);
3167 memcpy(req->data, buffer, size);
3168 req->data_size = size;
3169 req->stream = stream;
3171 return send_req(session, priority, req);
3174 static gboolean avdtp_discover_resp(struct avdtp *session,
3175 struct discover_resp *resp, int size)
3180 gboolean getcap_pending = FALSE;
3182 if (session->version >= 0x0103)
3183 getcap_cmd = AVDTP_GET_ALL_CAPABILITIES;
3185 getcap_cmd = AVDTP_GET_CAPABILITIES;
3187 sep_count = size / sizeof(struct seid_info);
3189 for (i = 0; i < sep_count; i++) {
3190 struct avdtp_remote_sep *sep;
3191 struct avdtp_stream *stream;
3192 struct seid_req req;
3194 DBG("seid %d type %d media %d in use %d",
3195 resp->seps[i].seid, resp->seps[i].type,
3196 resp->seps[i].media_type, resp->seps[i].inuse);
3198 stream = find_stream_by_rseid(session, resp->seps[i].seid);
3200 sep = find_remote_sep(session->seps, resp->seps[i].seid);
3201 if (sep && sep->type == resp->seps[i].type &&
3202 sep->media_type == resp->seps[i].media_type)
3205 if (resp->seps[i].inuse && !stream)
3208 sep = g_new0(struct avdtp_remote_sep, 1);
3209 session->seps = g_slist_append(session->seps, sep);
3211 sep->stream = stream;
3212 sep->seid = resp->seps[i].seid;
3213 sep->type = resp->seps[i].type;
3214 sep->media_type = resp->seps[i].media_type;
3216 memset(&req, 0, sizeof(req));
3217 req.acp_seid = sep->seid;
3219 ret = send_request(session, TRUE, NULL, getcap_cmd,
3223 getcap_pending = TRUE;
3226 if (!getcap_pending)
3227 finalize_discovery(session, -ret);
3232 static gboolean avdtp_get_capabilities_resp(struct avdtp *session,
3233 struct getcap_resp *resp,
3236 struct avdtp_remote_sep *sep;
3239 /* Check for minimum required packet size includes:
3240 * 1. getcap resp header
3241 * 2. media transport capability (2 bytes)
3242 * 3. media codec capability type + length (2 bytes)
3243 * 4. the actual media codec elements
3245 if (size < (sizeof(struct getcap_resp) + 4 +
3246 sizeof(struct avdtp_media_codec_capability))) {
3247 error("Too short getcap resp packet");
3251 seid = ((struct seid_req *) session->req->data)->acp_seid;
3253 sep = find_remote_sep(session->seps, seid);
3255 DBG("seid %d type %d media %d", sep->seid,
3256 sep->type, sep->media_type);
3259 g_slist_free_full(sep->caps, g_free);
3262 sep->delay_reporting = FALSE;
3265 sep->caps = caps_to_list(resp->caps, size - sizeof(struct getcap_resp),
3266 &sep->codec, &sep->delay_reporting);
3271 static gboolean avdtp_set_configuration_resp(struct avdtp *session,
3272 struct avdtp_stream *stream,
3273 struct avdtp_single_header *resp,
3276 struct avdtp_local_sep *sep = stream->lsep;
3278 if (sep->cfm && sep->cfm->set_configuration)
3279 sep->cfm->set_configuration(session, sep, stream, NULL,
3282 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
3287 static gboolean avdtp_reconfigure_resp(struct avdtp *session,
3288 struct avdtp_stream *stream,
3289 struct avdtp_single_header *resp, int size)
3294 static gboolean avdtp_open_resp(struct avdtp *session, struct avdtp_stream *stream,
3295 struct seid_rej *resp, int size)
3297 struct avdtp_local_sep *sep = stream->lsep;
3299 stream->io = l2cap_connect(session);
3301 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
3305 session->pending_open = stream;
3310 static gboolean avdtp_start_resp(struct avdtp *session,
3311 struct avdtp_stream *stream,
3312 struct seid_rej *resp, int size)
3314 struct avdtp_local_sep *sep = stream->lsep;
3316 if (sep->cfm && sep->cfm->start)
3317 sep->cfm->start(session, sep, stream, NULL, sep->user_data);
3319 /* We might be in STREAMING already if both sides send START_CMD at the
3320 * same time and the one in SNK role doesn't reject it as it should */
3321 if (sep->state != AVDTP_STATE_STREAMING)
3322 avdtp_sep_set_state(session, sep, AVDTP_STATE_STREAMING);
3327 static gboolean avdtp_close_resp(struct avdtp *session,
3328 struct avdtp_stream *stream,
3329 struct seid_rej *resp, int size)
3331 struct avdtp_local_sep *sep = stream->lsep;
3333 avdtp_sep_set_state(session, sep, AVDTP_STATE_CLOSING);
3335 close_stream(stream);
3340 static gboolean avdtp_suspend_resp(struct avdtp *session,
3341 struct avdtp_stream *stream,
3342 void *data, int size)
3344 struct avdtp_local_sep *sep = stream->lsep;
3346 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
3348 if (sep->cfm && sep->cfm->suspend)
3349 sep->cfm->suspend(session, sep, stream, NULL, sep->user_data);
3354 static gboolean avdtp_abort_resp(struct avdtp *session,
3355 struct avdtp_stream *stream,
3356 struct seid_rej *resp, int size)
3358 struct avdtp_local_sep *sep = stream->lsep;
3359 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
3361 error("Error in getting sep");
3366 avdtp_sep_set_state(session, sep, AVDTP_STATE_ABORTING);
3368 if (sep->cfm && sep->cfm->abort)
3369 sep->cfm->abort(session, sep, stream, NULL, sep->user_data);
3371 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
3376 static gboolean avdtp_delay_report_resp(struct avdtp *session,
3377 struct avdtp_stream *stream,
3378 void *data, int size)
3380 struct avdtp_local_sep *sep = stream->lsep;
3382 if (sep->cfm && sep->cfm->delay_report)
3383 sep->cfm->delay_report(session, sep, stream, NULL, sep->user_data);
3388 static gboolean avdtp_parse_resp(struct avdtp *session,
3389 struct avdtp_stream *stream,
3390 uint8_t transaction, uint8_t signal_id,
3391 void *buf, int size)
3393 struct pending_req *next;
3394 const char *get_all = "";
3396 if (session->prio_queue)
3397 next = session->prio_queue->data;
3398 else if (session->req_queue)
3399 next = session->req_queue->data;
3403 switch (signal_id) {
3404 case AVDTP_DISCOVER:
3405 DBG("DISCOVER request succeeded");
3406 return avdtp_discover_resp(session, buf, size);
3407 case AVDTP_GET_ALL_CAPABILITIES:
3410 case AVDTP_GET_CAPABILITIES:
3411 DBG("GET_%sCAPABILITIES request succeeded", get_all);
3412 if (!avdtp_get_capabilities_resp(session, buf, size))
3414 if (!(next && (next->signal_id == AVDTP_GET_CAPABILITIES ||
3415 next->signal_id == AVDTP_GET_ALL_CAPABILITIES)))
3416 finalize_discovery(session, 0);
3420 /* The remaining commands require an existing stream so bail out
3421 * here if the stream got unexpectedly disconnected */
3423 DBG("AVDTP: stream was closed while waiting for reply");
3427 switch (signal_id) {
3428 case AVDTP_SET_CONFIGURATION:
3429 DBG("SET_CONFIGURATION request succeeded");
3430 return avdtp_set_configuration_resp(session, stream,
3432 case AVDTP_RECONFIGURE:
3433 DBG("RECONFIGURE request succeeded");
3434 return avdtp_reconfigure_resp(session, stream, buf, size);
3436 DBG("OPEN request succeeded");
3437 return avdtp_open_resp(session, stream, buf, size);
3439 DBG("SUSPEND request succeeded");
3440 return avdtp_suspend_resp(session, stream, buf, size);
3442 DBG("START request succeeded");
3443 return avdtp_start_resp(session, stream, buf, size);
3445 DBG("CLOSE request succeeded");
3446 return avdtp_close_resp(session, stream, buf, size);
3448 DBG("ABORT request succeeded");
3449 return avdtp_abort_resp(session, stream, buf, size);
3450 case AVDTP_DELAY_REPORT:
3451 DBG("DELAY_REPORT request succeeded");
3452 return avdtp_delay_report_resp(session, stream, buf, size);
3455 error("Unknown signal id in accept response: %u", signal_id);
3459 static gboolean seid_rej_to_err(struct seid_rej *rej, unsigned int size,
3460 struct avdtp_error *err)
3462 if (size < sizeof(struct seid_rej)) {
3463 error("Too small packet for seid_rej");
3467 avdtp_error_init(err, 0x00, rej->error);
3472 static gboolean conf_rej_to_err(struct conf_rej *rej, unsigned int size,
3473 struct avdtp_error *err)
3475 if (size < sizeof(struct conf_rej)) {
3476 error("Too small packet for conf_rej");
3480 avdtp_error_init(err, rej->category, rej->error);
3485 static gboolean stream_rej_to_err(struct stream_rej *rej, unsigned int size,
3486 struct avdtp_error *err,
3489 if (size < sizeof(struct stream_rej)) {
3490 error("Too small packet for stream_rej");
3494 avdtp_error_init(err, 0x00, rej->error);
3497 *acp_seid = rej->acp_seid;
3502 static gboolean avdtp_parse_rej(struct avdtp *session,
3503 struct avdtp_stream *stream,
3504 uint8_t transaction, uint8_t signal_id,
3505 void *buf, int size)
3507 struct avdtp_error err;
3509 struct avdtp_local_sep *sep = stream ? stream->lsep : NULL;
3511 switch (signal_id) {
3512 case AVDTP_DISCOVER:
3513 if (!seid_rej_to_err(buf, size, &err))
3515 error("DISCOVER request rejected: %s (%d)",
3516 avdtp_strerror(&err), err.err.error_code);
3518 case AVDTP_GET_CAPABILITIES:
3519 case AVDTP_GET_ALL_CAPABILITIES:
3520 if (!seid_rej_to_err(buf, size, &err))
3522 error("GET_CAPABILITIES request rejected: %s (%d)",
3523 avdtp_strerror(&err), err.err.error_code);
3526 if (!seid_rej_to_err(buf, size, &err))
3528 error("OPEN request rejected: %s (%d)",
3529 avdtp_strerror(&err), err.err.error_code);
3530 if (sep && sep->cfm && sep->cfm->open)
3531 sep->cfm->open(session, sep, stream, &err,
3534 case AVDTP_SET_CONFIGURATION:
3535 if (!conf_rej_to_err(buf, size, &err))
3537 error("SET_CONFIGURATION request rejected: %s (%d)",
3538 avdtp_strerror(&err), err.err.error_code);
3539 if (sep && sep->cfm && sep->cfm->set_configuration)
3540 sep->cfm->set_configuration(session, sep, stream,
3541 &err, sep->user_data);
3543 case AVDTP_RECONFIGURE:
3544 if (!conf_rej_to_err(buf, size, &err))
3546 error("RECONFIGURE request rejected: %s (%d)",
3547 avdtp_strerror(&err), err.err.error_code);
3548 if (sep && sep->cfm && sep->cfm->reconfigure)
3549 sep->cfm->reconfigure(session, sep, stream, &err,
3553 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3555 error("START request rejected: %s (%d)",
3556 avdtp_strerror(&err), err.err.error_code);
3557 if (sep && sep->cfm && sep->cfm->start) {
3558 sep->cfm->start(session, sep, stream, &err,
3560 stream->starting = FALSE;
3564 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3566 error("SUSPEND request rejected: %s (%d)",
3567 avdtp_strerror(&err), err.err.error_code);
3568 if (sep && sep->cfm && sep->cfm->suspend)
3569 sep->cfm->suspend(session, sep, stream, &err,
3573 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3575 error("CLOSE request rejected: %s (%d)",
3576 avdtp_strerror(&err), err.err.error_code);
3577 if (sep && sep->cfm && sep->cfm->close) {
3578 sep->cfm->close(session, sep, stream, &err,
3580 stream->close_int = FALSE;
3584 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3586 error("ABORT request rejected: %s (%d)",
3587 avdtp_strerror(&err), err.err.error_code);
3588 if (sep && sep->cfm && sep->cfm->abort)
3589 sep->cfm->abort(session, sep, stream, &err,
3592 case AVDTP_DELAY_REPORT:
3593 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3595 error("DELAY_REPORT request rejected: %s (%d)",
3596 avdtp_strerror(&err), err.err.error_code);
3597 if (sep && sep->cfm && sep->cfm->delay_report)
3598 sep->cfm->delay_report(session, sep, stream, &err,
3602 error("Unknown reject response signal id: %u", signal_id);
3607 struct avdtp_service_capability *avdtp_stream_get_codec(
3608 struct avdtp_stream *stream)
3612 for (l = stream->caps; l; l = l->next) {
3613 struct avdtp_service_capability *cap = l->data;
3615 if (cap->category == AVDTP_MEDIA_CODEC)
3622 static gboolean avdtp_stream_has_capability(struct avdtp_stream *stream,
3623 struct avdtp_service_capability *cap)
3626 struct avdtp_service_capability *stream_cap;
3628 for (l = stream->caps; l; l = g_slist_next(l)) {
3629 stream_cap = l->data;
3631 if (stream_cap->category != cap->category ||
3632 stream_cap->length != cap->length)
3635 if (memcmp(stream_cap->data, cap->data, cap->length) == 0)
3642 gboolean avdtp_stream_has_capabilities(struct avdtp_stream *stream,
3645 for (; caps; caps = g_slist_next(caps)) {
3646 struct avdtp_service_capability *cap = caps->data;
3648 if (!avdtp_stream_has_capability(stream, cap))
3655 struct avdtp_remote_sep *avdtp_stream_get_remote_sep(
3656 struct avdtp_stream *stream)
3660 for (l = stream->session->seps; l; l = l->next) {
3661 struct avdtp_remote_sep *sep = l->data;
3663 if (sep->seid == stream->rseid)
3670 gboolean avdtp_stream_set_transport(struct avdtp_stream *stream, int fd,
3671 size_t imtu, size_t omtu)
3675 if (stream != stream->session->pending_open)
3678 io = g_io_channel_unix_new(fd);
3680 handle_transport_connect(stream->session, io, imtu, omtu);
3682 g_io_channel_unref(io);
3687 gboolean avdtp_stream_get_transport(struct avdtp_stream *stream, int *sock,
3688 uint16_t *imtu, uint16_t *omtu,
3691 if (stream->io == NULL)
3695 *sock = g_io_channel_unix_get_fd(stream->io);
3698 *omtu = stream->omtu;
3701 *imtu = stream->imtu;
3704 *caps = stream->caps;
3709 static int process_queue(struct avdtp *session)
3712 struct pending_req *req;
3717 if (session->prio_queue)
3718 queue = &session->prio_queue;
3720 queue = &session->req_queue;
3728 *queue = g_slist_remove(*queue, req);
3730 return send_req(session, FALSE, req);
3733 uint8_t avdtp_get_seid(struct avdtp_remote_sep *sep)
3738 uint8_t avdtp_get_type(struct avdtp_remote_sep *sep)
3743 struct avdtp_service_capability *avdtp_get_codec(struct avdtp_remote_sep *sep)
3748 bool avdtp_get_delay_reporting(struct avdtp_remote_sep *sep)
3750 return sep->delay_reporting;
3753 struct avdtp_service_capability *avdtp_service_cap_new(uint8_t category,
3754 void *data, int length)
3756 struct avdtp_service_capability *cap;
3758 if (category < AVDTP_MEDIA_TRANSPORT || category > AVDTP_DELAY_REPORTING)
3761 cap = g_malloc(sizeof(struct avdtp_service_capability) + length);
3762 cap->category = category;
3763 cap->length = length;
3764 memcpy(cap->data, data, length);
3769 struct avdtp_remote_sep *avdtp_register_remote_sep(struct avdtp *session,
3773 bool delay_reporting)
3775 struct avdtp_remote_sep *sep;
3778 sep = find_remote_sep(session->seps, seid);
3782 sep = g_new0(struct avdtp_remote_sep, 1);
3783 session->seps = g_slist_append(session->seps, sep);
3786 sep->media_type = AVDTP_MEDIA_TYPE_AUDIO;
3788 sep->delay_reporting = delay_reporting;
3790 for (l = caps; l; l = g_slist_next(l)) {
3791 struct avdtp_service_capability *cap = l->data;
3793 if (cap->category == AVDTP_MEDIA_CODEC)
3797 DBG("seid %d type %d media %d delay_reporting %s", sep->seid, sep->type,
3799 sep->delay_reporting ? "true" : "false");
3804 static gboolean process_discover(gpointer data)
3806 struct avdtp *session = data;
3808 session->discover->id = 0;
3810 finalize_discovery(session, 0);
3815 int avdtp_discover(struct avdtp *session, avdtp_discover_cb_t cb,
3820 if (session->discover)
3823 session->discover = g_new0(struct discover_callback, 1);
3825 if (session->seps) {
3826 session->discover->cb = cb;
3827 session->discover->user_data = user_data;
3828 session->discover->id = g_idle_add(process_discover, session);
3832 err = send_request(session, FALSE, NULL, AVDTP_DISCOVER, NULL, 0);
3834 session->discover->cb = cb;
3835 session->discover->user_data = user_data;
3841 gboolean avdtp_stream_remove_cb(struct avdtp *session,
3842 struct avdtp_stream *stream,
3846 struct stream_callback *cb;
3851 for (cb = NULL, l = stream->callbacks; l != NULL; l = l->next) {
3852 struct stream_callback *tmp = l->data;
3853 if (tmp && tmp->id == id) {
3862 stream->callbacks = g_slist_remove(stream->callbacks, cb);
3868 unsigned int avdtp_stream_add_cb(struct avdtp *session,
3869 struct avdtp_stream *stream,
3870 avdtp_stream_state_cb cb, void *data)
3872 struct stream_callback *stream_cb;
3873 static unsigned int id = 0;
3875 stream_cb = g_new(struct stream_callback, 1);
3877 stream_cb->user_data = data;
3878 stream_cb->id = ++id;
3880 stream->callbacks = g_slist_append(stream->callbacks, stream_cb);
3882 return stream_cb->id;
3885 int avdtp_get_configuration(struct avdtp *session, struct avdtp_stream *stream)
3887 struct seid_req req;
3889 if (session->state < AVDTP_SESSION_STATE_CONNECTED)
3892 memset(&req, 0, sizeof(req));
3893 req.acp_seid = stream->rseid;
3895 return send_request(session, FALSE, stream, AVDTP_GET_CONFIGURATION,
3899 static void copy_capabilities(gpointer data, gpointer user_data)
3901 struct avdtp_service_capability *src_cap = data;
3902 struct avdtp_service_capability *dst_cap;
3903 GSList **l = user_data;
3905 dst_cap = avdtp_service_cap_new(src_cap->category, src_cap->data,
3908 *l = g_slist_append(*l, dst_cap);
3911 int avdtp_set_configuration(struct avdtp *session,
3912 struct avdtp_remote_sep *rsep,
3913 struct avdtp_local_sep *lsep,
3915 struct avdtp_stream **stream)
3917 struct setconf_req *req;
3918 struct avdtp_stream *new_stream;
3921 struct avdtp_service_capability *cap;
3924 if (session->state != AVDTP_SESSION_STATE_CONNECTED)
3927 if (!(lsep && rsep))
3930 DBG("%p: int_seid=%u, acp_seid=%u", session,
3931 lsep->info.seid, rsep->seid);
3933 new_stream = g_new0(struct avdtp_stream, 1);
3934 new_stream->session = session;
3935 new_stream->lsep = lsep;
3936 new_stream->rseid = rsep->seid;
3938 if (rsep->delay_reporting && lsep->delay_reporting) {
3939 struct avdtp_service_capability *delay_reporting;
3941 delay_reporting = avdtp_service_cap_new(AVDTP_DELAY_REPORTING,
3943 caps = g_slist_append(caps, delay_reporting);
3944 new_stream->delay_reporting = TRUE;
3947 g_slist_foreach(caps, copy_capabilities, &new_stream->caps);
3949 /* Calculate total size of request */
3950 for (l = caps, caps_len = 0; l != NULL; l = g_slist_next(l)) {
3952 caps_len += cap->length + 2;
3955 req = g_malloc0(sizeof(struct setconf_req) + caps_len);
3957 req->int_seid = lsep->info.seid;
3958 req->acp_seid = rsep->seid;
3960 /* Copy the capabilities into the request */
3961 for (l = caps, ptr = req->caps; l != NULL; l = g_slist_next(l)) {
3963 memcpy(ptr, cap, cap->length + 2);
3964 ptr += cap->length + 2;
3967 err = send_request(session, FALSE, new_stream,
3968 AVDTP_SET_CONFIGURATION, req,
3969 sizeof(struct setconf_req) + caps_len);
3971 stream_free(new_stream);
3973 lsep->info.inuse = 1;
3974 lsep->stream = new_stream;
3975 rsep->stream = new_stream;
3976 session->streams = g_slist_append(session->streams, new_stream);
3978 *stream = new_stream;
3986 int avdtp_open(struct avdtp *session, struct avdtp_stream *stream)
3988 struct seid_req req;
3990 if (!g_slist_find(session->streams, stream))
3993 if (stream->lsep->state > AVDTP_STATE_CONFIGURED)
3996 memset(&req, 0, sizeof(req));
3997 req.acp_seid = stream->rseid;
3999 return send_request(session, FALSE, stream, AVDTP_OPEN,
4003 static gboolean start_timeout(gpointer user_data)
4005 struct avdtp_stream *stream = user_data;
4006 struct avdtp *session = stream->session;
4008 stream->open_acp = FALSE;
4010 if (avdtp_start(session, stream) < 0)
4011 error("wait_timeout: avdtp_start failed");
4013 stream->start_timer = 0;
4018 int avdtp_start(struct avdtp *session, struct avdtp_stream *stream)
4020 struct start_req req;
4023 if (!g_slist_find(session->streams, stream))
4026 if (stream->lsep->state != AVDTP_STATE_OPEN)
4029 /* Recommendation 12:
4030 * If the RD has configured and opened a stream it is also responsible
4031 * to start the streaming via GAVDP_START.
4033 if (stream->open_acp) {
4034 /* If timer already active wait it */
4035 if (stream->start_timer)
4037 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
4040 uint32_t timeout_sec = START_TIMEOUT;
4042 ba2str(device_get_address(session->device), address);
4043 /* For Bose headset (Bose AE2w) 2 seconds timeout is required to avoid AVDTP ABORT_CMD */
4044 if (!strncasecmp(address, "00:0C:8A", 8) ||
4045 !strncasecmp(address, "08:DF:1F", 8))
4047 /* For Gear Circle, HS3000 headset, this headset doesn't initiate start command and
4048 * when we add timer for 1 second so idle may trigger callback after 1.2 sec or
4049 * 1.5 sec. So, don't timer for this headset.*/
4050 if (!strncasecmp(address, "10:92:66", 8) ||
4051 !strncasecmp(address, "A8:9F:BA", 8) ||
4052 !strncasecmp(address, "00:26:B4", 8)) {
4053 start_timeout(stream);
4056 /* Here we can't use Mac address as there are changing so check for name */
4058 device_get_name(session->device, name, sizeof(name));
4059 DBG("name : %s", name);
4060 if (g_str_equal(name, "HS3000")) {
4061 start_timeout(stream);
4065 stream->start_timer = g_timeout_add_seconds(timeout_sec,
4071 stream->start_timer = g_timeout_add_seconds(START_TIMEOUT,
4078 if (stream->close_int == TRUE) {
4079 error("avdtp_start: rejecting start since close is initiated");
4083 if (stream->starting == TRUE) {
4084 DBG("stream already started");
4085 return -EINPROGRESS;
4088 memset(&req, 0, sizeof(req));
4089 req.first_seid.seid = stream->rseid;
4091 ret = send_request(session, FALSE, stream, AVDTP_START,
4094 stream->starting = TRUE;
4099 int avdtp_close(struct avdtp *session, struct avdtp_stream *stream,
4102 struct seid_req req;
4105 if (!g_slist_find(session->streams, stream))
4108 if (stream->lsep->state < AVDTP_STATE_OPEN)
4111 if (stream->close_int == TRUE) {
4112 error("avdtp_close: rejecting since close is already initiated");
4116 if (immediate && session->req && stream == session->req->stream)
4117 return avdtp_abort(session, stream);
4119 memset(&req, 0, sizeof(req));
4120 req.acp_seid = stream->rseid;
4122 ret = send_request(session, FALSE, stream, AVDTP_CLOSE,
4125 stream->close_int = TRUE;
4126 session->dc_timeout = 0;
4132 int avdtp_suspend(struct avdtp *session, struct avdtp_stream *stream)
4134 struct seid_req req;
4136 if (!g_slist_find(session->streams, stream))
4139 if (stream->lsep->state <= AVDTP_STATE_OPEN || stream->close_int)
4142 memset(&req, 0, sizeof(req));
4143 req.acp_seid = stream->rseid;
4145 return send_request(session, FALSE, stream, AVDTP_SUSPEND,
4149 int avdtp_abort(struct avdtp *session, struct avdtp_stream *stream)
4151 struct seid_req req;
4154 if (!stream && session->discover) {
4155 /* Don't call cb since it being aborted */
4156 session->discover->cb = NULL;
4157 finalize_discovery(session, ECANCELED);
4161 if (!g_slist_find(session->streams, stream))
4164 if (stream->lsep->state == AVDTP_STATE_ABORTING)
4167 avdtp_sep_set_state(session, stream->lsep, AVDTP_STATE_ABORTING);
4169 if (session->req && stream == session->req->stream)
4170 return cancel_request(session, ECANCELED);
4172 memset(&req, 0, sizeof(req));
4173 req.acp_seid = stream->rseid;
4175 ret = send_request(session, TRUE, stream, AVDTP_ABORT,
4178 stream->abort_int = TRUE;
4179 session->dc_timeout = 0;
4185 int avdtp_delay_report(struct avdtp *session, struct avdtp_stream *stream,
4188 struct delay_req req;
4190 if (!g_slist_find(session->streams, stream))
4193 if (stream->lsep->state != AVDTP_STATE_CONFIGURED &&
4194 stream->lsep->state != AVDTP_STATE_STREAMING)
4197 if (!stream->delay_reporting || session->version < 0x0103)
4200 stream->delay = delay;
4202 memset(&req, 0, sizeof(req));
4203 req.acp_seid = stream->rseid;
4204 req.delay = htons(delay);
4206 return send_request(session, TRUE, stream, AVDTP_DELAY_REPORT,
4210 #ifdef TIZEN_FEATURE_BLUEZ_MODIFY
4211 int delay_report_req(uint16_t delay)
4213 if (!configured_session)
4216 if (!configured_stream)
4219 return avdtp_delay_report(configured_session, configured_stream, delay);
4223 struct avdtp_local_sep *avdtp_register_sep(struct queue *lseps, uint8_t type,
4226 gboolean delay_reporting,
4227 struct avdtp_sep_ind *ind,
4228 struct avdtp_sep_cfm *cfm,
4231 struct avdtp_local_sep *sep;
4232 uint8_t seid = util_get_uid(&seids, MAX_SEID);
4237 sep = g_new0(struct avdtp_local_sep, 1);
4239 sep->state = AVDTP_STATE_IDLE;
4240 sep->info.seid = seid;
4241 sep->info.type = type;
4242 sep->info.media_type = media_type;
4243 sep->codec = codec_type;
4246 sep->user_data = user_data;
4247 sep->delay_reporting = delay_reporting;
4249 DBG("SEP %p registered: type:%d codec:%d seid:%d", sep,
4250 sep->info.type, sep->codec, sep->info.seid);
4252 if (!queue_push_tail(lseps, sep)) {
4260 int avdtp_unregister_sep(struct queue *lseps, struct avdtp_local_sep *sep)
4266 release_stream(sep->stream, sep->stream->session);
4268 DBG("SEP %p unregistered: type:%d codec:%d seid:%d", sep,
4269 sep->info.type, sep->codec, sep->info.seid);
4271 util_clear_uid(&seids, sep->info.seid);
4272 queue_remove(lseps, sep);
4278 const char *avdtp_strerror(struct avdtp_error *err)
4280 if (err->category == AVDTP_ERRNO)
4281 return strerror(err->err.posix_errno);
4283 switch(err->err.error_code) {
4284 case AVDTP_BAD_HEADER_FORMAT:
4285 return "Bad Header Format";
4286 case AVDTP_BAD_LENGTH:
4287 return "Bad Packet Length";
4288 case AVDTP_BAD_ACP_SEID:
4289 return "Bad Acceptor SEID";
4290 case AVDTP_SEP_IN_USE:
4291 return "Stream End Point in Use";
4292 case AVDTP_SEP_NOT_IN_USE:
4293 return "Stream End Point Not in Use";
4294 case AVDTP_BAD_SERV_CATEGORY:
4295 return "Bad Service Category";
4296 case AVDTP_BAD_PAYLOAD_FORMAT:
4297 return "Bad Payload format";
4298 case AVDTP_NOT_SUPPORTED_COMMAND:
4299 return "Command Not Supported";
4300 case AVDTP_INVALID_CAPABILITIES:
4301 return "Invalid Capabilities";
4302 case AVDTP_BAD_RECOVERY_TYPE:
4303 return "Bad Recovery Type";
4304 case AVDTP_BAD_MEDIA_TRANSPORT_FORMAT:
4305 return "Bad Media Transport Format";
4306 case AVDTP_BAD_RECOVERY_FORMAT:
4307 return "Bad Recovery Format";
4308 case AVDTP_BAD_ROHC_FORMAT:
4309 return "Bad Header Compression Format";
4310 case AVDTP_BAD_CP_FORMAT:
4311 return "Bad Content Protection Format";
4312 case AVDTP_BAD_MULTIPLEXING_FORMAT:
4313 return "Bad Multiplexing Format";
4314 case AVDTP_UNSUPPORTED_CONFIGURATION:
4315 return "Configuration not supported";
4316 case AVDTP_BAD_STATE:
4319 return "Unknown error";
4323 avdtp_state_t avdtp_sep_get_state(struct avdtp_local_sep *sep)
4328 uint8_t avdtp_sep_get_seid(struct avdtp_local_sep *sep)
4330 return sep->info.seid;
4333 struct btd_adapter *avdtp_get_adapter(struct avdtp *session)
4335 return device_get_adapter(session->device);
4338 struct btd_device *avdtp_get_device(struct avdtp *session)
4340 return session->device;
4343 gboolean avdtp_has_stream(struct avdtp *session, struct avdtp_stream *stream)
4345 return g_slist_find(session->streams, stream) ? TRUE : FALSE;
4348 unsigned int avdtp_add_state_cb(struct btd_device *dev,
4349 avdtp_session_state_cb cb, void *user_data)
4351 struct avdtp_state_callback *state_cb;
4352 static unsigned int id = 0;
4354 state_cb = g_new(struct avdtp_state_callback, 1);
4356 state_cb->dev = dev;
4357 state_cb->id = ++id;
4358 state_cb->user_data = user_data;
4360 state_callbacks = g_slist_append(state_callbacks, state_cb);
4362 return state_cb->id;
4365 gboolean avdtp_remove_state_cb(unsigned int id)
4369 for (l = state_callbacks; l != NULL; l = l->next) {
4370 struct avdtp_state_callback *cb = l->data;
4371 if (cb && cb->id == id) {
4372 state_callbacks = g_slist_remove(state_callbacks, cb);