3 * BlueZ - Bluetooth protocol stack for Linux
5 * Copyright (C) 2006-2010 Nokia Corporation
6 * Copyright (C) 2004-2010 Marcel Holtmann <marcel@holtmann.org>
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
36 #include <netinet/in.h>
38 #include <bluetooth/bluetooth.h>
39 #include <bluetooth/sdp.h>
40 #include <bluetooth/sdp_lib.h>
41 #include <bluetooth/uuid.h>
44 #include <dbus/dbus.h>
48 #include "../src/adapter.h"
49 #include "../src/manager.h"
50 #include "../src/device.h"
65 # define MAX(x, y) ((x) > (y) ? (x) : (y))
68 #define AVDTP_DISCOVER 0x01
69 #define AVDTP_GET_CAPABILITIES 0x02
70 #define AVDTP_SET_CONFIGURATION 0x03
71 #define AVDTP_GET_CONFIGURATION 0x04
72 #define AVDTP_RECONFIGURE 0x05
73 #define AVDTP_OPEN 0x06
74 #define AVDTP_START 0x07
75 #define AVDTP_CLOSE 0x08
76 #define AVDTP_SUSPEND 0x09
77 #define AVDTP_ABORT 0x0A
78 #define AVDTP_SECURITY_CONTROL 0x0B
79 #define AVDTP_GET_ALL_CAPABILITIES 0x0C
80 #define AVDTP_DELAY_REPORT 0x0D
82 #define AVDTP_PKT_TYPE_SINGLE 0x00
83 #define AVDTP_PKT_TYPE_START 0x01
84 #define AVDTP_PKT_TYPE_CONTINUE 0x02
85 #define AVDTP_PKT_TYPE_END 0x03
87 #define AVDTP_MSG_TYPE_COMMAND 0x00
88 #define AVDTP_MSG_TYPE_GEN_REJECT 0x01
89 #define AVDTP_MSG_TYPE_ACCEPT 0x02
90 #define AVDTP_MSG_TYPE_REJECT 0x03
92 #ifdef __TIZEN_PATCH__
93 #define REQ_TIMEOUT 10
97 #define ABORT_TIMEOUT 2
98 #define DISCONNECT_TIMEOUT 1
99 #define STREAM_TIMEOUT 20
101 #if __BYTE_ORDER == __LITTLE_ENDIAN
103 struct avdtp_common_header {
104 uint8_t message_type:2;
105 uint8_t packet_type:2;
106 uint8_t transaction:4;
107 } __attribute__ ((packed));
109 struct avdtp_single_header {
110 uint8_t message_type:2;
111 uint8_t packet_type:2;
112 uint8_t transaction:4;
115 } __attribute__ ((packed));
117 struct avdtp_start_header {
118 uint8_t message_type:2;
119 uint8_t packet_type:2;
120 uint8_t transaction:4;
121 uint8_t no_of_packets;
124 } __attribute__ ((packed));
126 struct avdtp_continue_header {
127 uint8_t message_type:2;
128 uint8_t packet_type:2;
129 uint8_t transaction:4;
130 } __attribute__ ((packed));
138 uint8_t media_type:4;
139 } __attribute__ ((packed));
144 } __attribute__ ((packed));
146 #elif __BYTE_ORDER == __BIG_ENDIAN
148 struct avdtp_common_header {
149 uint8_t transaction:4;
150 uint8_t packet_type:2;
151 uint8_t message_type:2;
152 } __attribute__ ((packed));
154 struct avdtp_single_header {
155 uint8_t transaction:4;
156 uint8_t packet_type:2;
157 uint8_t message_type:2;
160 } __attribute__ ((packed));
162 struct avdtp_start_header {
163 uint8_t transaction:4;
164 uint8_t packet_type:2;
165 uint8_t message_type:2;
166 uint8_t no_of_packets;
169 } __attribute__ ((packed));
171 struct avdtp_continue_header {
172 uint8_t transaction:4;
173 uint8_t packet_type:2;
174 uint8_t message_type:2;
175 } __attribute__ ((packed));
181 uint8_t media_type:4;
184 } __attribute__ ((packed));
189 } __attribute__ ((packed));
192 #error "Unknown byte order"
197 struct discover_resp {
198 struct seid_info seps[0];
199 } __attribute__ ((packed));
203 } __attribute__ ((packed));
206 struct seid first_seid;
207 struct seid other_seids[0];
208 } __attribute__ ((packed));
211 struct seid first_seid;
212 struct seid other_seids[0];
213 } __attribute__ ((packed));
217 } __attribute__ ((packed));
222 } __attribute__ ((packed));
224 #if __BYTE_ORDER == __LITTLE_ENDIAN
229 } __attribute__ ((packed));
238 } __attribute__ ((packed));
244 } __attribute__ ((packed));
251 uint8_t serv_cap_len;
254 } __attribute__ ((packed));
260 } __attribute__ ((packed));
262 #elif __BYTE_ORDER == __BIG_ENDIAN
267 } __attribute__ ((packed));
276 } __attribute__ ((packed));
282 } __attribute__ ((packed));
289 uint8_t serv_cap_len;
292 } __attribute__ ((packed));
298 } __attribute__ ((packed));
301 #error "Unknown byte order"
308 uint8_t message_type;
319 struct avdtp_stream *stream; /* Set if the request targeted a stream */
324 struct avdtp_remote_sep {
328 struct avdtp_service_capability *codec;
329 gboolean delay_reporting;
330 GSList *caps; /* of type struct avdtp_service_capability */
331 struct avdtp_stream *stream;
334 struct avdtp_server {
342 struct avdtp_local_sep {
344 struct avdtp_stream *stream;
345 struct seid_info info;
347 gboolean delay_reporting;
349 struct avdtp_sep_ind *ind;
350 struct avdtp_sep_cfm *cfm;
352 struct avdtp_server *server;
355 struct stream_callback {
356 avdtp_stream_state_cb cb;
361 struct avdtp_state_callback {
362 avdtp_session_state_cb cb;
367 struct avdtp_stream {
371 struct avdtp *session;
372 struct avdtp_local_sep *lsep;
376 struct avdtp_service_capability *codec;
377 guint io_id; /* Transport GSource ID */
378 guint timer; /* Waiting for other side to close or open
379 * the transport channel */
380 gboolean open_acp; /* If we are in ACT role for Open */
381 gboolean close_int; /* If we are in INT role for Close */
382 gboolean abort_int; /* If we are in INT role for Abort */
384 gboolean delay_reporting;
385 uint16_t delay; /* AVDTP 1.3 Delay Reporting feature */
386 gboolean starting; /* only valid while sep state == OPEN */
389 /* Structure describing an AVDTP connection between two devices */
397 struct avdtp_server *server;
400 avdtp_session_state_t state;
402 /* True if the session should be automatically disconnected */
405 /* True if the entire device is being disconnected */
406 gboolean device_disconnect;
411 GSList *seps; /* Elements of type struct avdtp_remote_sep * */
413 GSList *streams; /* Elements of type struct avdtp_stream * */
415 GSList *req_queue; /* Elements of type struct pending_req * */
416 GSList *prio_queue; /* Same as req_queue but is processed before it */
418 struct avdtp_stream *pending_open;
427 avdtp_discover_cb_t discov_cb;
430 struct pending_req *req;
434 /* Attempt stream setup instead of disconnecting */
435 gboolean stream_setup;
437 DBusPendingCall *pending_auth;
440 static GSList *servers = NULL;
442 static GSList *avdtp_callbacks = NULL;
444 static gboolean auto_connect = TRUE;
446 static int send_request(struct avdtp *session, gboolean priority,
447 struct avdtp_stream *stream, uint8_t signal_id,
448 void *buffer, size_t size);
449 static gboolean avdtp_parse_resp(struct avdtp *session,
450 struct avdtp_stream *stream,
451 uint8_t transaction, uint8_t signal_id,
452 void *buf, int size);
453 static gboolean avdtp_parse_rej(struct avdtp *session,
454 struct avdtp_stream *stream,
455 uint8_t transaction, uint8_t signal_id,
456 void *buf, int size);
457 static int process_queue(struct avdtp *session);
458 static void connection_lost(struct avdtp *session, int err);
459 static void avdtp_sep_set_state(struct avdtp *session,
460 struct avdtp_local_sep *sep,
461 avdtp_state_t state);
462 static void auth_cb(DBusError *derr, void *user_data);
464 static struct avdtp_server *find_server(GSList *list, const bdaddr_t *src)
466 for (; list; list = list->next) {
467 struct avdtp_server *server = list->data;
469 if (bacmp(&server->src, src) == 0)
476 static const char *avdtp_statestr(avdtp_state_t state)
479 case AVDTP_STATE_IDLE:
481 case AVDTP_STATE_CONFIGURED:
483 case AVDTP_STATE_OPEN:
485 case AVDTP_STATE_STREAMING:
487 case AVDTP_STATE_CLOSING:
489 case AVDTP_STATE_ABORTING:
492 return "<unknown state>";
496 static gboolean try_send(int sk, void *data, size_t len)
501 err = send(sk, data, len, 0);
502 } while (err < 0 && errno == EINTR);
505 error("send: %s (%d)", strerror(errno), errno);
507 } else if ((size_t) err != len) {
508 error("try_send: complete buffer not sent (%d/%zu bytes)",
516 static gboolean avdtp_send(struct avdtp *session, uint8_t transaction,
517 uint8_t message_type, uint8_t signal_id,
518 void *data, size_t len)
520 unsigned int cont_fragments, sent;
521 struct avdtp_start_header start;
522 struct avdtp_continue_header cont;
525 if (session->io == NULL) {
526 error("avdtp_send: session is closed");
530 sock = g_io_channel_unix_get_fd(session->io);
532 /* Single packet - no fragmentation */
533 if (sizeof(struct avdtp_single_header) + len <= session->omtu) {
534 struct avdtp_single_header single;
536 memset(&single, 0, sizeof(single));
538 single.transaction = transaction;
539 single.packet_type = AVDTP_PKT_TYPE_SINGLE;
540 single.message_type = message_type;
541 single.signal_id = signal_id;
543 memcpy(session->buf, &single, sizeof(single));
544 memcpy(session->buf + sizeof(single), data, len);
546 return try_send(sock, session->buf, sizeof(single) + len);
549 /* Check if there is enough space to start packet */
550 if (session->omtu < sizeof(start)) {
551 error("No enough space to fragment packet");
555 /* Count the number of needed fragments */
556 cont_fragments = (len - (session->omtu - sizeof(start))) /
557 (session->omtu - sizeof(cont)) + 1;
559 DBG("%zu bytes split into %d fragments", len, cont_fragments + 1);
561 /* Send the start packet */
562 memset(&start, 0, sizeof(start));
563 start.transaction = transaction;
564 start.packet_type = AVDTP_PKT_TYPE_START;
565 start.message_type = message_type;
566 start.no_of_packets = cont_fragments + 1;
567 start.signal_id = signal_id;
569 memcpy(session->buf, &start, sizeof(start));
570 memcpy(session->buf + sizeof(start), data,
571 session->omtu - sizeof(start));
573 if (!try_send(sock, session->buf, session->omtu))
576 DBG("first packet with %zu bytes sent", session->omtu - sizeof(start));
578 sent = session->omtu - sizeof(start);
580 /* Send the continue fragments and the end packet */
585 if (left + sizeof(cont) > session->omtu) {
586 cont.packet_type = AVDTP_PKT_TYPE_CONTINUE;
587 to_copy = session->omtu - sizeof(cont);
588 DBG("sending continue with %d bytes", to_copy);
590 cont.packet_type = AVDTP_PKT_TYPE_END;
592 DBG("sending end with %d bytes", to_copy);
595 cont.transaction = transaction;
596 cont.message_type = message_type;
598 memcpy(session->buf, &cont, sizeof(cont));
599 memcpy(session->buf + sizeof(cont), data + sent, to_copy);
601 if (!try_send(sock, session->buf, to_copy + sizeof(cont)))
610 static void pending_req_free(struct pending_req *req)
613 g_source_remove(req->timeout);
618 static void close_stream(struct avdtp_stream *stream)
622 if (stream->io == NULL)
625 sock = g_io_channel_unix_get_fd(stream->io);
627 shutdown(sock, SHUT_RDWR);
629 g_io_channel_shutdown(stream->io, FALSE, NULL);
631 g_io_channel_unref(stream->io);
635 static gboolean stream_close_timeout(gpointer user_data)
637 struct avdtp_stream *stream = user_data;
639 DBG("Timed out waiting for peer to close the transport channel");
643 close_stream(stream);
648 static gboolean stream_open_timeout(gpointer user_data)
650 struct avdtp_stream *stream = user_data;
652 DBG("Timed out waiting for peer to open the transport channel");
656 stream->session->pending_open = NULL;
658 avdtp_abort(stream->session, stream);
663 static gboolean disconnect_timeout(gpointer user_data)
665 struct avdtp *session = user_data;
666 struct audio_device *dev;
667 gboolean stream_setup;
669 session->dc_timer = 0;
670 stream_setup = session->stream_setup;
671 session->stream_setup = FALSE;
673 dev = manager_get_device(&session->server->src, &session->dst, FALSE);
675 if (dev && dev->sink && stream_setup)
676 sink_setup_stream(dev->sink, session);
677 else if (dev && dev->source && stream_setup)
678 source_setup_stream(dev->source, session);
680 connection_lost(session, ETIMEDOUT);
685 static void remove_disconnect_timer(struct avdtp *session)
687 g_source_remove(session->dc_timer);
688 session->dc_timer = 0;
689 session->stream_setup = FALSE;
692 static void set_disconnect_timer(struct avdtp *session)
694 if (session->dc_timer)
695 remove_disconnect_timer(session);
697 if (session->device_disconnect) {
698 session->dc_timer = g_idle_add(disconnect_timeout, session);
702 session->dc_timer = g_timeout_add_seconds(DISCONNECT_TIMEOUT,
707 void avdtp_error_init(struct avdtp_error *err, uint8_t category, int id)
709 err->category = category;
711 if (category == AVDTP_ERRNO)
712 err->err.posix_errno = id;
714 err->err.error_code = id;
717 uint8_t avdtp_error_category(struct avdtp_error *err)
719 return err->category;
722 int avdtp_error_error_code(struct avdtp_error *err)
724 assert(err->category != AVDTP_ERRNO);
725 return err->err.error_code;
728 int avdtp_error_posix_errno(struct avdtp_error *err)
730 assert(err->category == AVDTP_ERRNO);
731 return err->err.posix_errno;
734 static struct avdtp_stream *find_stream_by_rseid(struct avdtp *session,
739 for (l = session->streams; l != NULL; l = g_slist_next(l)) {
740 struct avdtp_stream *stream = l->data;
742 if (stream->rseid == rseid)
749 static struct avdtp_remote_sep *find_remote_sep(GSList *seps, uint8_t seid)
753 for (l = seps; l != NULL; l = g_slist_next(l)) {
754 struct avdtp_remote_sep *sep = l->data;
756 if (sep->seid == seid)
763 static void avdtp_set_state(struct avdtp *session,
764 avdtp_session_state_t new_state)
767 struct audio_device *dev;
769 avdtp_session_state_t old_state = session->state;
771 session->state = new_state;
773 avdtp_get_peers(session, &src, &dst);
774 dev = manager_get_device(&src, &dst, FALSE);
776 error("avdtp_set_state(): no matching audio device");
780 for (l = avdtp_callbacks; l != NULL; l = l->next) {
781 struct avdtp_state_callback *cb = l->data;
782 cb->cb(dev, session, old_state, new_state, cb->user_data);
786 static void stream_free(struct avdtp_stream *stream)
788 struct avdtp_remote_sep *rsep;
790 stream->lsep->info.inuse = 0;
791 stream->lsep->stream = NULL;
793 rsep = find_remote_sep(stream->session->seps, stream->rseid);
798 g_source_remove(stream->timer);
801 close_stream(stream);
804 g_source_remove(stream->io_id);
806 g_slist_free_full(stream->callbacks, g_free);
807 g_slist_free_full(stream->caps, g_free);
812 static gboolean stream_timeout(gpointer user_data)
814 struct avdtp_stream *stream = user_data;
815 struct avdtp *session = stream->session;
817 if (avdtp_close(session, stream, FALSE) < 0)
818 error("stream_timeout: closing AVDTP stream failed");
820 stream->idle_timer = 0;
825 static gboolean transport_cb(GIOChannel *chan, GIOCondition cond,
828 struct avdtp_stream *stream = data;
829 struct avdtp_local_sep *sep = stream->lsep;
831 if (stream->close_int && sep->cfm && sep->cfm->close)
832 sep->cfm->close(stream->session, sep, stream, NULL,
835 if (!(cond & G_IO_NVAL))
836 close_stream(stream);
840 if (!stream->abort_int)
841 avdtp_sep_set_state(stream->session, sep, AVDTP_STATE_IDLE);
846 static int get_send_buffer_size(int sk)
849 socklen_t optlen = sizeof(size);
851 if (getsockopt(sk, SOL_SOCKET, SO_SNDBUF, &size, &optlen) < 0) {
853 error("getsockopt(SO_SNDBUF) failed: %s (%d)", strerror(-err),
859 * Doubled value is returned by getsockopt since kernel uses that
860 * space for its own purposes (see man 7 socket, bookkeeping overhead
866 static int set_send_buffer_size(int sk, int size)
868 socklen_t optlen = sizeof(size);
870 if (setsockopt(sk, SOL_SOCKET, SO_SNDBUF, &size, optlen) < 0) {
872 error("setsockopt(SO_SNDBUF) failed: %s (%d)", strerror(-err),
880 static void handle_transport_connect(struct avdtp *session, GIOChannel *io,
881 uint16_t imtu, uint16_t omtu)
883 struct avdtp_stream *stream = session->pending_open;
884 struct avdtp_local_sep *sep = stream->lsep;
885 int sk, buf_size, min_buf_size;
888 session->pending_open = NULL;
891 g_source_remove(stream->timer);
896 if (!stream->open_acp && sep->cfm && sep->cfm->open) {
897 struct avdtp_error err;
898 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
899 sep->cfm->open(session, sep, NULL, &err,
905 if (stream->io == NULL)
906 stream->io = g_io_channel_ref(io);
911 /* Apply special settings only if local SEP is of type SRC */
912 if (sep->info.type != AVDTP_SEP_TYPE_SOURCE)
915 bt_io_set(stream->io, BT_IO_L2CAP, &err,
916 BT_IO_OPT_FLUSHABLE, TRUE,
919 error("Enabling flushable packets failed: %s", err->message);
922 DBG("Flushable packets enabled");
924 sk = g_io_channel_unix_get_fd(stream->io);
925 buf_size = get_send_buffer_size(sk);
929 DBG("sk %d, omtu %d, send buffer size %d", sk, omtu, buf_size);
930 min_buf_size = omtu * 2;
931 if (buf_size < min_buf_size) {
932 DBG("send buffer size to be increassed to %d",
934 set_send_buffer_size(sk, min_buf_size);
938 if (!stream->open_acp && sep->cfm && sep->cfm->open)
939 sep->cfm->open(session, sep, stream, NULL, sep->user_data);
941 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
943 stream->io_id = g_io_add_watch(io, G_IO_ERR | G_IO_HUP | G_IO_NVAL,
944 (GIOFunc) transport_cb, stream);
947 static int pending_req_cmp(gconstpointer a, gconstpointer b)
949 const struct pending_req *req = a;
950 const struct avdtp_stream *stream = b;
952 if (req->stream == stream)
958 static void cleanup_queue(struct avdtp *session, struct avdtp_stream *stream)
961 struct pending_req *req;
963 while ((l = g_slist_find_custom(session->prio_queue, stream,
966 pending_req_free(req);
967 session->prio_queue = g_slist_remove(session->prio_queue, req);
970 while ((l = g_slist_find_custom(session->req_queue, stream,
973 pending_req_free(req);
974 session->req_queue = g_slist_remove(session->req_queue, req);
978 static void handle_unanswered_req(struct avdtp *session,
979 struct avdtp_stream *stream)
981 struct pending_req *req;
982 struct avdtp_local_sep *lsep;
983 struct avdtp_error err;
985 if (session->req->signal_id == AVDTP_ABORT) {
986 /* Avoid freeing the Abort request here */
987 DBG("handle_unanswered_req: Abort req, returning");
988 session->req->stream = NULL;
995 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
999 switch (req->signal_id) {
1000 case AVDTP_RECONFIGURE:
1001 error("No reply to Reconfigure request");
1002 if (lsep && lsep->cfm && lsep->cfm->reconfigure)
1003 lsep->cfm->reconfigure(session, lsep, stream, &err,
1007 error("No reply to Open request");
1008 if (lsep && lsep->cfm && lsep->cfm->open)
1009 lsep->cfm->open(session, lsep, stream, &err,
1013 error("No reply to Start request");
1014 if (lsep && lsep->cfm && lsep->cfm->start)
1015 lsep->cfm->start(session, lsep, stream, &err,
1019 error("No reply to Suspend request");
1020 if (lsep && lsep->cfm && lsep->cfm->suspend)
1021 lsep->cfm->suspend(session, lsep, stream, &err,
1025 error("No reply to Close request");
1026 if (lsep && lsep->cfm && lsep->cfm->close)
1027 lsep->cfm->close(session, lsep, stream, &err,
1030 case AVDTP_SET_CONFIGURATION:
1031 error("No reply to SetConfiguration request");
1032 if (lsep && lsep->cfm && lsep->cfm->set_configuration)
1033 lsep->cfm->set_configuration(session, lsep, stream,
1034 &err, lsep->user_data);
1037 pending_req_free(req);
1040 static void avdtp_sep_set_state(struct avdtp *session,
1041 struct avdtp_local_sep *sep,
1042 avdtp_state_t state)
1044 struct avdtp_stream *stream = sep->stream;
1045 avdtp_state_t old_state;
1046 struct avdtp_error err, *err_ptr = NULL;
1050 error("Error changing sep state: stream not available");
1054 if (sep->state == state) {
1055 avdtp_error_init(&err, AVDTP_ERRNO, EIO);
1056 DBG("stream state change failed: %s", avdtp_strerror(&err));
1060 DBG("stream state changed: %s -> %s",
1061 avdtp_statestr(sep->state),
1062 avdtp_statestr(state));
1065 old_state = sep->state;
1069 case AVDTP_STATE_CONFIGURED:
1070 if (sep->info.type == AVDTP_SEP_TYPE_SINK)
1071 avdtp_delay_report(session, stream, stream->delay);
1073 case AVDTP_STATE_OPEN:
1074 stream->starting = FALSE;
1075 if ((old_state > AVDTP_STATE_OPEN && session->auto_dc) ||
1077 stream->idle_timer = g_timeout_add_seconds(STREAM_TIMEOUT,
1081 case AVDTP_STATE_STREAMING:
1082 if (stream->idle_timer) {
1083 g_source_remove(stream->idle_timer);
1084 stream->idle_timer = 0;
1086 stream->open_acp = FALSE;
1088 case AVDTP_STATE_CLOSING:
1089 case AVDTP_STATE_ABORTING:
1090 if (stream->idle_timer) {
1091 g_source_remove(stream->idle_timer);
1092 stream->idle_timer = 0;
1095 case AVDTP_STATE_IDLE:
1096 if (stream->idle_timer) {
1097 g_source_remove(stream->idle_timer);
1098 stream->idle_timer = 0;
1100 if (session->pending_open == stream)
1101 handle_transport_connect(session, NULL, 0, 0);
1102 if (session->req && session->req->stream == stream)
1103 handle_unanswered_req(session, stream);
1104 /* Remove pending commands for this stream from the queue */
1105 cleanup_queue(session, stream);
1111 l = stream->callbacks;
1113 struct stream_callback *cb = l->data;
1114 l = g_slist_next(l);
1115 cb->cb(stream, old_state, state, err_ptr, cb->user_data);
1118 if (state == AVDTP_STATE_IDLE &&
1119 g_slist_find(session->streams, stream)) {
1120 session->streams = g_slist_remove(session->streams, stream);
1121 stream_free(stream);
1125 static void finalize_discovery(struct avdtp *session, int err)
1127 struct avdtp_error avdtp_err;
1129 avdtp_error_init(&avdtp_err, AVDTP_ERRNO, err);
1131 if (!session->discov_cb)
1134 session->discov_cb(session, session->seps,
1135 err ? &avdtp_err : NULL,
1136 session->user_data);
1138 session->discov_cb = NULL;
1139 session->user_data = NULL;
1142 static void release_stream(struct avdtp_stream *stream, struct avdtp *session)
1144 struct avdtp_local_sep *sep = stream->lsep;
1146 if (sep->cfm && sep->cfm->abort &&
1147 (sep->state != AVDTP_STATE_ABORTING ||
1149 sep->cfm->abort(session, sep, stream, NULL, sep->user_data);
1151 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
1154 static int avdtp_cancel_authorization(struct avdtp *session)
1156 struct audio_device *dev;
1158 if (session->state != AVDTP_SESSION_STATE_CONNECTING)
1161 dev = manager_get_device(&session->server->src, &session->dst, FALSE);
1165 return audio_device_cancel_authorization(dev, auth_cb, session);
1168 static void connection_lost(struct avdtp *session, int err)
1172 ba2str(&session->dst, address);
1173 DBG("Disconnected from %s", address);
1176 avdtp_cancel_authorization(session);
1178 session->free_lock = 1;
1180 finalize_discovery(session, err);
1182 g_slist_foreach(session->streams, (GFunc) release_stream, session);
1183 session->streams = NULL;
1185 session->free_lock = 0;
1188 g_io_channel_shutdown(session->io, FALSE, NULL);
1189 g_io_channel_unref(session->io);
1193 avdtp_set_state(session, AVDTP_SESSION_STATE_DISCONNECTED);
1195 if (session->io_id) {
1196 g_source_remove(session->io_id);
1200 if (session->dc_timer)
1201 remove_disconnect_timer(session);
1203 session->auto_dc = TRUE;
1205 if (session->ref != 1)
1206 error("connection_lost: ref count not 1 after all callbacks");
1208 avdtp_unref(session);
1211 void avdtp_unref(struct avdtp *session)
1213 struct avdtp_server *server;
1220 DBG("%p: ref=%d", session, session->ref);
1222 if (session->ref == 1) {
1223 if (session->state == AVDTP_SESSION_STATE_CONNECTING &&
1225 avdtp_cancel_authorization(session);
1226 g_io_channel_shutdown(session->io, TRUE, NULL);
1227 g_io_channel_unref(session->io);
1229 avdtp_set_state(session,
1230 AVDTP_SESSION_STATE_DISCONNECTED);
1234 set_disconnect_timer(session);
1235 else if (!session->free_lock) /* Drop the local ref if we
1240 if (session->ref > 0)
1243 server = session->server;
1245 DBG("%p: freeing session and removing from list", session);
1247 if (session->dc_timer)
1248 remove_disconnect_timer(session);
1250 server->sessions = g_slist_remove(server->sessions, session);
1253 pending_req_free(session->req);
1255 g_slist_free_full(session->seps, g_free);
1257 g_free(session->buf);
1262 struct avdtp *avdtp_ref(struct avdtp *session)
1265 DBG("%p: ref=%d", session, session->ref);
1266 if (session->dc_timer)
1267 remove_disconnect_timer(session);
1271 static struct avdtp_local_sep *find_local_sep_by_seid(struct avdtp_server *server,
1276 for (l = server->seps; l != NULL; l = g_slist_next(l)) {
1277 struct avdtp_local_sep *sep = l->data;
1279 if (sep->info.seid == seid)
1286 struct avdtp_remote_sep *avdtp_find_remote_sep(struct avdtp *session,
1287 struct avdtp_local_sep *lsep)
1291 if (lsep->info.inuse)
1294 for (l = session->seps; l != NULL; l = g_slist_next(l)) {
1295 struct avdtp_remote_sep *sep = l->data;
1296 struct avdtp_service_capability *cap;
1297 struct avdtp_media_codec_capability *codec_data;
1299 /* Type must be different: source <-> sink */
1300 if (sep->type == lsep->info.type)
1303 if (sep->media_type != lsep->info.media_type)
1310 codec_data = (void *) cap->data;
1312 if (codec_data->media_codec_type != lsep->codec)
1315 if (sep->stream == NULL)
1322 static GSList *caps_to_list(uint8_t *data, int size,
1323 struct avdtp_service_capability **codec,
1324 gboolean *delay_reporting)
1329 if (delay_reporting)
1330 *delay_reporting = FALSE;
1332 for (processed = 0, caps = NULL; processed + 2 <= size;) {
1333 struct avdtp_service_capability *cap;
1334 uint8_t length, category;
1339 if (processed + 2 + length > size) {
1340 error("Invalid capability data in getcap resp");
1344 cap = g_malloc(sizeof(struct avdtp_service_capability) +
1346 memcpy(cap, data, 2 + length);
1348 processed += 2 + length;
1351 caps = g_slist_append(caps, cap);
1353 if (category == AVDTP_MEDIA_CODEC &&
1355 sizeof(struct avdtp_media_codec_capability))
1357 else if (category == AVDTP_DELAY_REPORTING && delay_reporting)
1358 *delay_reporting = TRUE;
1364 static gboolean avdtp_unknown_cmd(struct avdtp *session, uint8_t transaction,
1367 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_GEN_REJECT,
1368 signal_id, NULL, 0);
1371 static gboolean avdtp_discover_cmd(struct avdtp *session, uint8_t transaction,
1372 void *buf, int size)
1375 unsigned int rsp_size, sep_count, i;
1376 struct seid_info *seps;
1379 sep_count = g_slist_length(session->server->seps);
1381 if (sep_count == 0) {
1382 uint8_t err = AVDTP_NOT_SUPPORTED_COMMAND;
1383 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1384 AVDTP_DISCOVER, &err, sizeof(err));
1387 rsp_size = sep_count * sizeof(struct seid_info);
1389 seps = g_new0(struct seid_info, sep_count);
1391 for (l = session->server->seps, i = 0; l != NULL; l = l->next, i++) {
1392 struct avdtp_local_sep *sep = l->data;
1394 memcpy(&seps[i], &sep->info, sizeof(struct seid_info));
1397 ret = avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1398 AVDTP_DISCOVER, seps, rsp_size);
1404 static gboolean avdtp_getcap_cmd(struct avdtp *session, uint8_t transaction,
1405 struct seid_req *req, unsigned int size,
1409 struct avdtp_local_sep *sep = NULL;
1410 unsigned int rsp_size;
1411 uint8_t err, buf[1024], *ptr = buf;
1414 cmd = get_all ? AVDTP_GET_ALL_CAPABILITIES : AVDTP_GET_CAPABILITIES;
1416 if (size < sizeof(struct seid_req)) {
1417 err = AVDTP_BAD_LENGTH;
1421 sep = find_local_sep_by_seid(session->server, req->acp_seid);
1423 err = AVDTP_BAD_ACP_SEID;
1427 if (get_all && session->server->version < 0x0103)
1428 return avdtp_unknown_cmd(session, transaction, cmd);
1430 if (!sep->ind->get_capability(session, sep, get_all, &caps,
1431 &err, sep->user_data))
1434 for (l = caps, rsp_size = 0; l != NULL; l = g_slist_next(l)) {
1435 struct avdtp_service_capability *cap = l->data;
1437 if (rsp_size + cap->length + 2 > sizeof(buf))
1440 memcpy(ptr, cap, cap->length + 2);
1441 rsp_size += cap->length + 2;
1442 ptr += cap->length + 2;
1449 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT, cmd,
1453 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT, cmd,
1457 static void setconf_cb(struct avdtp *session, struct avdtp_stream *stream,
1458 struct avdtp_error *err)
1460 struct conf_rej rej;
1461 struct avdtp_local_sep *sep;
1464 rej.error = AVDTP_UNSUPPORTED_CONFIGURATION;
1465 rej.category = err->err.error_code;
1466 avdtp_send(session, session->in.transaction,
1467 AVDTP_MSG_TYPE_REJECT, AVDTP_SET_CONFIGURATION,
1472 if (!avdtp_send(session, session->in.transaction, AVDTP_MSG_TYPE_ACCEPT,
1473 AVDTP_SET_CONFIGURATION, NULL, 0)) {
1474 stream_free(stream);
1479 sep->stream = stream;
1480 sep->info.inuse = 1;
1481 session->streams = g_slist_append(session->streams, stream);
1483 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
1486 static gboolean avdtp_setconf_cmd(struct avdtp *session, uint8_t transaction,
1487 struct setconf_req *req, unsigned int size)
1489 struct conf_rej rej;
1490 struct avdtp_local_sep *sep;
1491 struct avdtp_stream *stream;
1492 uint8_t err, category = 0x00;
1493 struct audio_device *dev;
1497 if (size < sizeof(struct setconf_req)) {
1498 error("Too short getcap request");
1502 sep = find_local_sep_by_seid(session->server, req->acp_seid);
1504 err = AVDTP_BAD_ACP_SEID;
1509 err = AVDTP_SEP_IN_USE;
1513 avdtp_get_peers(session, &src, &dst);
1514 dev = manager_get_device(&src, &dst, FALSE);
1516 error("Unable to get a audio device object");
1517 err = AVDTP_BAD_STATE;
1521 switch (sep->info.type) {
1522 case AVDTP_SEP_TYPE_SOURCE:
1524 btd_device_add_uuid(dev->btd_dev, A2DP_SINK_UUID);
1526 error("Unable to get a audio sink object");
1527 err = AVDTP_BAD_STATE;
1532 case AVDTP_SEP_TYPE_SINK:
1534 btd_device_add_uuid(dev->btd_dev, A2DP_SOURCE_UUID);
1536 error("Unable to get a audio source object");
1537 err = AVDTP_BAD_STATE;
1544 stream = g_new0(struct avdtp_stream, 1);
1545 stream->session = session;
1547 stream->rseid = req->int_seid;
1548 stream->caps = caps_to_list(req->caps,
1549 size - sizeof(struct setconf_req),
1551 &stream->delay_reporting);
1553 /* Verify that the Media Transport capability's length = 0. Reject otherwise */
1554 for (l = stream->caps; l != NULL; l = g_slist_next(l)) {
1555 struct avdtp_service_capability *cap = l->data;
1557 if (cap->category == AVDTP_MEDIA_TRANSPORT && cap->length != 0) {
1558 err = AVDTP_BAD_MEDIA_TRANSPORT_FORMAT;
1563 if (stream->delay_reporting && session->version < 0x0103)
1564 session->version = 0x0103;
1566 if (sep->ind && sep->ind->set_configuration) {
1567 if (!sep->ind->set_configuration(session, sep, stream,
1571 err = AVDTP_UNSUPPORTED_CONFIGURATION;
1576 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1577 AVDTP_SET_CONFIGURATION, NULL, 0)) {
1578 stream_free(stream);
1582 sep->stream = stream;
1583 sep->info.inuse = 1;
1584 session->streams = g_slist_append(session->streams, stream);
1586 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
1592 stream_free(stream);
1595 rej.category = category;
1596 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1597 AVDTP_SET_CONFIGURATION, &rej, sizeof(rej));
1600 static gboolean avdtp_getconf_cmd(struct avdtp *session, uint8_t transaction,
1601 struct seid_req *req, int size)
1604 struct avdtp_local_sep *sep = NULL;
1610 if (size < (int) sizeof(struct seid_req)) {
1611 error("Too short getconf request");
1615 memset(buf, 0, sizeof(buf));
1617 sep = find_local_sep_by_seid(session->server, req->acp_seid);
1619 err = AVDTP_BAD_ACP_SEID;
1622 if (!sep->stream || !sep->stream->caps) {
1623 err = AVDTP_UNSUPPORTED_CONFIGURATION;
1627 for (l = sep->stream->caps, rsp_size = 0; l != NULL; l = g_slist_next(l)) {
1628 struct avdtp_service_capability *cap = l->data;
1630 if (rsp_size + cap->length + 2 > (int) sizeof(buf))
1633 memcpy(ptr, cap, cap->length + 2);
1634 rsp_size += cap->length + 2;
1635 ptr += cap->length + 2;
1638 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1639 AVDTP_GET_CONFIGURATION, buf, rsp_size);
1642 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1643 AVDTP_GET_CONFIGURATION, &err, sizeof(err));
1646 static gboolean avdtp_reconf_cmd(struct avdtp *session, uint8_t transaction,
1647 struct seid_req *req, int size)
1649 struct conf_rej rej;
1651 rej.error = AVDTP_NOT_SUPPORTED_COMMAND;
1652 rej.category = 0x00;
1654 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1655 AVDTP_RECONFIGURE, &rej, sizeof(rej));
1658 static void check_seid_collision(struct pending_req *req, uint8_t id)
1660 struct seid_req *seid = req->data;
1662 if (seid->acp_seid == id)
1663 req->collided = TRUE;
1666 static void check_start_collision(struct pending_req *req, uint8_t id)
1668 struct start_req *start = req->data;
1669 struct seid *seid = &start->first_seid;
1670 int count = 1 + req->data_size - sizeof(struct start_req);
1673 for (i = 0; i < count; i++, seid++) {
1674 if (seid->seid == id) {
1675 req->collided = TRUE;
1681 static void check_suspend_collision(struct pending_req *req, uint8_t id)
1683 struct suspend_req *suspend = req->data;
1684 struct seid *seid = &suspend->first_seid;
1685 int count = 1 + req->data_size - sizeof(struct suspend_req);
1688 for (i = 0; i < count; i++, seid++) {
1689 if (seid->seid == id) {
1690 req->collided = TRUE;
1696 static void avdtp_check_collision(struct avdtp *session, uint8_t cmd,
1697 struct avdtp_stream *stream)
1699 struct pending_req *req = session->req;
1701 if (req == NULL || (req->signal_id != cmd && cmd != AVDTP_ABORT))
1704 if (cmd == AVDTP_ABORT)
1705 cmd = req->signal_id;
1710 check_seid_collision(req, stream->rseid);
1713 check_start_collision(req, stream->rseid);
1716 check_suspend_collision(req, stream->rseid);
1721 static gboolean avdtp_open_cmd(struct avdtp *session, uint8_t transaction,
1722 struct seid_req *req, unsigned int size)
1724 struct avdtp_local_sep *sep;
1725 struct avdtp_stream *stream;
1728 if (size < sizeof(struct seid_req)) {
1729 error("Too short abort request");
1733 sep = find_local_sep_by_seid(session->server, req->acp_seid);
1735 err = AVDTP_BAD_ACP_SEID;
1739 if (sep->state != AVDTP_STATE_CONFIGURED) {
1740 err = AVDTP_BAD_STATE;
1744 stream = sep->stream;
1746 if (sep->ind && sep->ind->open) {
1747 if (!sep->ind->open(session, sep, stream, &err,
1752 avdtp_check_collision(session, AVDTP_OPEN, stream);
1754 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1755 AVDTP_OPEN, NULL, 0))
1758 stream->open_acp = TRUE;
1759 session->pending_open = stream;
1760 stream->timer = g_timeout_add_seconds(REQ_TIMEOUT,
1761 stream_open_timeout,
1767 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1768 AVDTP_OPEN, &err, sizeof(err));
1771 static gboolean avdtp_start_cmd(struct avdtp *session, uint8_t transaction,
1772 struct start_req *req, unsigned int size)
1774 struct avdtp_local_sep *sep;
1775 struct avdtp_stream *stream;
1776 struct stream_rej rej;
1778 uint8_t err, failed_seid;
1781 if (size < sizeof(struct start_req)) {
1782 error("Too short start request");
1786 seid_count = 1 + size - sizeof(struct start_req);
1788 seid = &req->first_seid;
1790 for (i = 0; i < seid_count; i++, seid++) {
1791 failed_seid = seid->seid;
1793 sep = find_local_sep_by_seid(session->server,
1794 req->first_seid.seid);
1795 if (!sep || !sep->stream) {
1796 err = AVDTP_BAD_ACP_SEID;
1800 stream = sep->stream;
1802 /* Also reject start cmd if state is not open */
1803 if (sep->state != AVDTP_STATE_OPEN) {
1804 err = AVDTP_BAD_STATE;
1807 stream->starting = TRUE;
1809 if (sep->ind && sep->ind->start) {
1810 if (!sep->ind->start(session, sep, stream, &err,
1815 avdtp_check_collision(session, AVDTP_START, stream);
1817 avdtp_sep_set_state(session, sep, AVDTP_STATE_STREAMING);
1820 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1821 AVDTP_START, NULL, 0);
1824 DBG("Rejecting (%d)", err);
1825 memset(&rej, 0, sizeof(rej));
1826 rej.acp_seid = failed_seid;
1828 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1829 AVDTP_START, &rej, sizeof(rej));
1832 static gboolean avdtp_close_cmd(struct avdtp *session, uint8_t transaction,
1833 struct seid_req *req, unsigned int size)
1835 struct avdtp_local_sep *sep;
1836 struct avdtp_stream *stream;
1839 if (size < sizeof(struct seid_req)) {
1840 error("Too short close request");
1844 sep = find_local_sep_by_seid(session->server, req->acp_seid);
1845 if (!sep || !sep->stream) {
1846 err = AVDTP_BAD_ACP_SEID;
1850 if (sep->state != AVDTP_STATE_OPEN &&
1851 sep->state != AVDTP_STATE_STREAMING) {
1852 err = AVDTP_BAD_STATE;
1856 stream = sep->stream;
1858 if (sep->ind && sep->ind->close) {
1859 if (!sep->ind->close(session, sep, stream, &err,
1864 avdtp_check_collision(session, AVDTP_CLOSE, stream);
1866 avdtp_sep_set_state(session, sep, AVDTP_STATE_CLOSING);
1868 if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1869 AVDTP_CLOSE, NULL, 0))
1872 stream->timer = g_timeout_add_seconds(REQ_TIMEOUT,
1873 stream_close_timeout,
1879 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1880 AVDTP_CLOSE, &err, sizeof(err));
1883 static gboolean avdtp_suspend_cmd(struct avdtp *session, uint8_t transaction,
1884 struct suspend_req *req, unsigned int size)
1886 struct avdtp_local_sep *sep;
1887 struct avdtp_stream *stream;
1888 struct stream_rej rej;
1890 uint8_t err, failed_seid;
1893 if (size < sizeof(struct suspend_req)) {
1894 error("Too short suspend request");
1898 seid_count = 1 + size - sizeof(struct suspend_req);
1900 seid = &req->first_seid;
1902 for (i = 0; i < seid_count; i++, seid++) {
1903 failed_seid = seid->seid;
1905 sep = find_local_sep_by_seid(session->server,
1906 req->first_seid.seid);
1907 if (!sep || !sep->stream) {
1908 err = AVDTP_BAD_ACP_SEID;
1912 stream = sep->stream;
1914 if (sep->state != AVDTP_STATE_STREAMING) {
1915 err = AVDTP_BAD_STATE;
1919 if (sep->ind && sep->ind->suspend) {
1920 if (!sep->ind->suspend(session, sep, stream, &err,
1925 avdtp_check_collision(session, AVDTP_SUSPEND, stream);
1927 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
1930 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1931 AVDTP_SUSPEND, NULL, 0);
1934 memset(&rej, 0, sizeof(rej));
1935 rej.acp_seid = failed_seid;
1937 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
1938 AVDTP_SUSPEND, &rej, sizeof(rej));
1941 static gboolean avdtp_abort_cmd(struct avdtp *session, uint8_t transaction,
1942 struct seid_req *req, unsigned int size)
1944 struct avdtp_local_sep *sep;
1948 if (size < sizeof(struct seid_req)) {
1949 error("Too short abort request");
1953 sep = find_local_sep_by_seid(session->server, req->acp_seid);
1954 if (!sep || !sep->stream)
1957 if (sep->ind && sep->ind->abort)
1958 sep->ind->abort(session, sep, sep->stream, &err,
1961 avdtp_check_collision(session, AVDTP_ABORT, sep->stream);
1963 ret = avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
1964 AVDTP_ABORT, NULL, 0);
1966 avdtp_sep_set_state(session, sep, AVDTP_STATE_ABORTING);
1971 static gboolean avdtp_secctl_cmd(struct avdtp *session, uint8_t transaction,
1972 struct seid_req *req, int size)
1974 return avdtp_unknown_cmd(session, transaction, AVDTP_SECURITY_CONTROL);
1977 static gboolean avdtp_delayreport_cmd(struct avdtp *session,
1978 uint8_t transaction,
1979 struct delay_req *req,
1982 struct avdtp_local_sep *sep;
1983 struct avdtp_stream *stream;
1986 if (size < sizeof(struct delay_req)) {
1987 error("Too short delay report request");
1991 sep = find_local_sep_by_seid(session->server, req->acp_seid);
1992 if (!sep || !sep->stream) {
1993 err = AVDTP_BAD_ACP_SEID;
1997 stream = sep->stream;
1999 if (sep->state != AVDTP_STATE_CONFIGURED &&
2000 sep->state != AVDTP_STATE_STREAMING) {
2001 err = AVDTP_BAD_STATE;
2005 stream->delay = ntohs(req->delay);
2007 if (sep->ind && sep->ind->delayreport) {
2008 if (!sep->ind->delayreport(session, sep, stream->rseid,
2009 stream->delay, &err,
2014 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
2015 AVDTP_DELAY_REPORT, NULL, 0);
2018 return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
2019 AVDTP_DELAY_REPORT, &err, sizeof(err));
2022 static gboolean avdtp_parse_cmd(struct avdtp *session, uint8_t transaction,
2023 uint8_t signal_id, void *buf, int size)
2025 switch (signal_id) {
2026 case AVDTP_DISCOVER:
2027 DBG("Received DISCOVER_CMD");
2028 return avdtp_discover_cmd(session, transaction, buf, size);
2029 case AVDTP_GET_CAPABILITIES:
2030 DBG("Received GET_CAPABILITIES_CMD");
2031 return avdtp_getcap_cmd(session, transaction, buf, size,
2033 case AVDTP_GET_ALL_CAPABILITIES:
2034 DBG("Received GET_ALL_CAPABILITIES_CMD");
2035 return avdtp_getcap_cmd(session, transaction, buf, size, TRUE);
2036 case AVDTP_SET_CONFIGURATION:
2037 DBG("Received SET_CONFIGURATION_CMD");
2038 return avdtp_setconf_cmd(session, transaction, buf, size);
2039 case AVDTP_GET_CONFIGURATION:
2040 DBG("Received GET_CONFIGURATION_CMD");
2041 return avdtp_getconf_cmd(session, transaction, buf, size);
2042 case AVDTP_RECONFIGURE:
2043 DBG("Received RECONFIGURE_CMD");
2044 return avdtp_reconf_cmd(session, transaction, buf, size);
2046 DBG("Received OPEN_CMD");
2047 return avdtp_open_cmd(session, transaction, buf, size);
2049 DBG("Received START_CMD");
2050 return avdtp_start_cmd(session, transaction, buf, size);
2052 DBG("Received CLOSE_CMD");
2053 return avdtp_close_cmd(session, transaction, buf, size);
2055 DBG("Received SUSPEND_CMD");
2056 return avdtp_suspend_cmd(session, transaction, buf, size);
2058 DBG("Received ABORT_CMD");
2059 return avdtp_abort_cmd(session, transaction, buf, size);
2060 case AVDTP_SECURITY_CONTROL:
2061 DBG("Received SECURITY_CONTROL_CMD");
2062 return avdtp_secctl_cmd(session, transaction, buf, size);
2063 case AVDTP_DELAY_REPORT:
2064 DBG("Received DELAY_REPORT_CMD");
2065 return avdtp_delayreport_cmd(session, transaction, buf, size);
2067 DBG("Received unknown request id %u", signal_id);
2068 return avdtp_unknown_cmd(session, transaction, signal_id);
2072 enum avdtp_parse_result { PARSE_ERROR, PARSE_FRAGMENT, PARSE_SUCCESS };
2074 static enum avdtp_parse_result avdtp_parse_data(struct avdtp *session,
2075 void *buf, size_t size)
2077 struct avdtp_common_header *header = buf;
2078 struct avdtp_single_header *single = (void *) session->buf;
2079 struct avdtp_start_header *start = (void *) session->buf;
2083 switch (header->packet_type) {
2084 case AVDTP_PKT_TYPE_SINGLE:
2085 if (size < sizeof(*single)) {
2086 error("Received too small single packet (%zu bytes)", size);
2089 if (session->in.active) {
2090 error("SINGLE: Invalid AVDTP packet fragmentation");
2094 payload = session->buf + sizeof(*single);
2095 payload_size = size - sizeof(*single);
2097 session->in.active = TRUE;
2098 session->in.data_size = 0;
2099 session->in.no_of_packets = 1;
2100 session->in.transaction = header->transaction;
2101 session->in.message_type = header->message_type;
2102 session->in.signal_id = single->signal_id;
2105 case AVDTP_PKT_TYPE_START:
2106 if (size < sizeof(*start)) {
2107 error("Received too small start packet (%zu bytes)", size);
2110 if (session->in.active) {
2111 error("START: Invalid AVDTP packet fragmentation");
2115 session->in.active = TRUE;
2116 session->in.data_size = 0;
2117 session->in.transaction = header->transaction;
2118 session->in.message_type = header->message_type;
2119 session->in.no_of_packets = start->no_of_packets;
2120 session->in.signal_id = start->signal_id;
2122 payload = session->buf + sizeof(*start);
2123 payload_size = size - sizeof(*start);
2126 case AVDTP_PKT_TYPE_CONTINUE:
2127 if (size < sizeof(struct avdtp_continue_header)) {
2128 error("Received too small continue packet (%zu bytes)",
2132 if (!session->in.active) {
2133 error("CONTINUE: Invalid AVDTP packet fragmentation");
2136 if (session->in.transaction != header->transaction) {
2137 error("Continue transaction id doesn't match");
2140 if (session->in.no_of_packets <= 1) {
2141 error("Too few continue packets");
2145 payload = session->buf + sizeof(struct avdtp_continue_header);
2146 payload_size = size - sizeof(struct avdtp_continue_header);
2149 case AVDTP_PKT_TYPE_END:
2150 if (size < sizeof(struct avdtp_continue_header)) {
2151 error("Received too small end packet (%zu bytes)", size);
2154 if (!session->in.active) {
2155 error("END: Invalid AVDTP packet fragmentation");
2158 if (session->in.transaction != header->transaction) {
2159 error("End transaction id doesn't match");
2162 if (session->in.no_of_packets > 1) {
2163 error("Got an end packet too early");
2167 payload = session->buf + sizeof(struct avdtp_continue_header);
2168 payload_size = size - sizeof(struct avdtp_continue_header);
2172 error("Invalid AVDTP packet type 0x%02X", header->packet_type);
2176 if (session->in.data_size + payload_size >
2177 sizeof(session->in.buf)) {
2178 error("Not enough incoming buffer space!");
2182 memcpy(session->in.buf + session->in.data_size, payload, payload_size);
2183 session->in.data_size += payload_size;
2185 if (session->in.no_of_packets > 1) {
2186 session->in.no_of_packets--;
2187 DBG("Received AVDTP fragment. %d to go",
2188 session->in.no_of_packets);
2189 return PARSE_FRAGMENT;
2192 session->in.active = FALSE;
2194 return PARSE_SUCCESS;
2197 static gboolean session_cb(GIOChannel *chan, GIOCondition cond,
2200 struct avdtp *session = data;
2201 struct avdtp_common_header *header;
2207 if (cond & G_IO_NVAL)
2210 header = (void *) session->buf;
2212 if (cond & (G_IO_HUP | G_IO_ERR))
2215 fd = g_io_channel_unix_get_fd(chan);
2216 size = read(fd, session->buf, session->imtu);
2218 error("IO Channel read error");
2222 if ((size_t) size < sizeof(struct avdtp_common_header)) {
2223 error("Received too small packet (%zu bytes)", size);
2227 switch (avdtp_parse_data(session, session->buf, size)) {
2230 case PARSE_FRAGMENT:
2236 if (session->in.message_type == AVDTP_MSG_TYPE_COMMAND) {
2237 if (!avdtp_parse_cmd(session, session->in.transaction,
2238 session->in.signal_id,
2240 session->in.data_size)) {
2241 error("Unable to handle command. Disconnecting");
2245 if (session->ref == 1 && !session->streams && !session->req)
2246 set_disconnect_timer(session);
2248 if (session->streams && session->dc_timer)
2249 remove_disconnect_timer(session);
2251 if (session->req && session->req->collided) {
2252 DBG("Collision detected");
2259 if (session->req == NULL) {
2260 error("No pending request, ignoring message");
2264 if (header->transaction != session->req->transaction) {
2265 error("Transaction label doesn't match");
2269 if (session->in.signal_id != session->req->signal_id) {
2270 error("Response signal doesn't match");
2274 g_source_remove(session->req->timeout);
2275 session->req->timeout = 0;
2277 switch (header->message_type) {
2278 case AVDTP_MSG_TYPE_ACCEPT:
2279 if (!avdtp_parse_resp(session, session->req->stream,
2280 session->in.transaction,
2281 session->in.signal_id,
2283 session->in.data_size)) {
2284 error("Unable to parse accept response");
2288 case AVDTP_MSG_TYPE_REJECT:
2289 if (!avdtp_parse_rej(session, session->req->stream,
2290 session->in.transaction,
2291 session->in.signal_id,
2293 session->in.data_size)) {
2294 error("Unable to parse reject response");
2298 case AVDTP_MSG_TYPE_GEN_REJECT:
2299 error("Received a General Reject message");
2302 error("Unknown message type 0x%02X", header->message_type);
2307 pending_req_free(session->req);
2308 session->req = NULL;
2310 process_queue(session);
2315 connection_lost(session, EIO);
2320 static struct avdtp *find_session(GSList *list, const bdaddr_t *dst)
2322 for (; list != NULL; list = g_slist_next(list)) {
2323 struct avdtp *s = list->data;
2325 if (bacmp(dst, &s->dst))
2334 static uint16_t get_version(struct avdtp *session)
2336 struct btd_adapter *adapter;
2337 struct btd_device *device;
2338 const sdp_record_t *rec;
2340 sdp_data_t *proto_desc;
2342 uint16_t ver = 0x0100;
2344 adapter = manager_find_adapter(&session->server->src);
2348 ba2str(&session->dst, addr);
2349 device = adapter_find_device(adapter, addr);
2353 rec = btd_device_get_record(device, A2DP_SINK_UUID);
2355 rec = btd_device_get_record(device, A2DP_SOURCE_UUID);
2360 if (sdp_get_access_protos(rec, &protos) < 0)
2363 proto_desc = sdp_get_proto_desc(protos, AVDTP_UUID);
2364 if (proto_desc && proto_desc->dtd == SDP_UINT16)
2365 ver = proto_desc->val.uint16;
2367 sdp_list_foreach(protos, (sdp_list_func_t) sdp_list_free, NULL);
2368 sdp_list_free(protos, NULL);
2373 static struct avdtp *avdtp_get_internal(const bdaddr_t *src, const bdaddr_t *dst)
2375 struct avdtp_server *server;
2376 struct avdtp *session;
2378 assert(src != NULL);
2379 assert(dst != NULL);
2381 server = find_server(servers, src);
2385 session = find_session(server->sessions, dst);
2387 if (session->pending_auth)
2393 session = g_new0(struct avdtp, 1);
2395 session->server = server;
2396 bacpy(&session->dst, dst);
2398 /* We don't use avdtp_set_state() here since this isn't a state change
2399 * but just setting of the initial state */
2400 session->state = AVDTP_SESSION_STATE_DISCONNECTED;
2401 session->auto_dc = TRUE;
2403 session->version = get_version(session);
2405 server->sessions = g_slist_append(server->sessions, session);
2410 struct avdtp *avdtp_get(bdaddr_t *src, bdaddr_t *dst)
2412 struct avdtp *session;
2414 session = avdtp_get_internal(src, dst);
2419 return avdtp_ref(session);
2422 static void avdtp_connect_cb(GIOChannel *chan, GError *err, gpointer user_data)
2424 struct avdtp *session = user_data;
2426 GError *gerr = NULL;
2429 error("%s", err->message);
2434 session->io = g_io_channel_ref(chan);
2436 bt_io_get(chan, BT_IO_L2CAP, &gerr,
2437 BT_IO_OPT_OMTU, &session->omtu,
2438 BT_IO_OPT_IMTU, &session->imtu,
2441 error("%s", gerr->message);
2446 ba2str(&session->dst, address);
2447 DBG("AVDTP: connected %s channel to %s",
2448 session->pending_open ? "transport" : "signaling",
2451 if (session->state == AVDTP_SESSION_STATE_CONNECTING) {
2452 DBG("AVDTP imtu=%u, omtu=%u", session->imtu, session->omtu);
2454 session->buf = g_malloc0(MAX(session->imtu, session->omtu));
2455 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTED);
2458 g_source_remove(session->io_id);
2460 /* This watch should be low priority since otherwise the
2461 * connect callback might be dispatched before the session
2462 * callback if the kernel wakes us up at the same time for
2463 * them. This could happen if a headset is very quick in
2464 * sending the Start command after connecting the stream
2465 * transport channel.
2467 session->io_id = g_io_add_watch_full(chan,
2469 G_IO_IN | G_IO_ERR | G_IO_HUP
2471 (GIOFunc) session_cb, session,
2474 if (session->stream_setup) {
2475 set_disconnect_timer(session);
2476 avdtp_set_auto_disconnect(session, FALSE);
2478 } else if (session->pending_open)
2479 handle_transport_connect(session, chan, session->imtu,
2484 process_queue(session);
2489 if (session->pending_open) {
2490 struct avdtp_stream *stream = session->pending_open;
2492 handle_transport_connect(session, NULL, 0, 0);
2494 if (avdtp_abort(session, stream) < 0)
2495 avdtp_sep_set_state(session, stream->lsep,
2498 connection_lost(session, EIO);
2501 static void auth_cb(DBusError *derr, void *user_data)
2503 struct avdtp *session = user_data;
2506 if (derr && dbus_error_is_set(derr)) {
2507 error("Access denied: %s", derr->message);
2508 connection_lost(session, EACCES);
2512 if (!bt_io_accept(session->io, avdtp_connect_cb, session, NULL,
2514 error("bt_io_accept: %s", err->message);
2515 connection_lost(session, EACCES);
2520 /* This is so that avdtp_connect_cb will know to do the right thing
2521 * with respect to the disconnect timer */
2522 session->stream_setup = TRUE;
2525 static void avdtp_confirm_cb(GIOChannel *chan, gpointer data)
2527 struct avdtp *session;
2528 struct audio_device *dev;
2534 bt_io_get(chan, BT_IO_L2CAP, &err,
2535 BT_IO_OPT_SOURCE_BDADDR, &src,
2536 BT_IO_OPT_DEST_BDADDR, &dst,
2537 BT_IO_OPT_DEST, address,
2540 error("%s", err->message);
2545 DBG("AVDTP: incoming connect from %s", address);
2547 session = avdtp_get_internal(&src, &dst);
2551 /* This state (ie, session is already *connecting*) happens when the
2552 * device initiates a connect (really a config'd L2CAP channel) even
2553 * though there is a connect we initiated in progress. In sink.c &
2554 * source.c, this state is referred to as XCASE connect:connect.
2555 * Abort the device's channel in favor of our own.
2557 if (session->state == AVDTP_SESSION_STATE_CONNECTING) {
2558 DBG("connect already in progress (XCASE connect:connect)");
2562 if (session->pending_open && session->pending_open->open_acp) {
2563 if (!bt_io_accept(chan, avdtp_connect_cb, session, NULL, NULL))
2569 error("Refusing unexpected connect from %s", address);
2573 dev = manager_get_device(&src, &dst, FALSE);
2575 dev = manager_get_device(&src, &dst, TRUE);
2577 error("Unable to get audio device object for %s",
2581 btd_device_add_uuid(dev->btd_dev, ADVANCED_AUDIO_UUID);
2584 session->io = g_io_channel_ref(chan);
2585 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTING);
2587 session->io_id = g_io_add_watch(chan, G_IO_ERR | G_IO_HUP | G_IO_NVAL,
2588 (GIOFunc) session_cb, session);
2590 perr = audio_device_request_authorization(dev, ADVANCED_AUDIO_UUID,
2593 avdtp_set_state(session, AVDTP_SESSION_STATE_DISCONNECTED);
2594 avdtp_unref(session);
2598 dev->auto_connect = auto_connect;
2603 g_io_channel_shutdown(chan, TRUE, NULL);
2606 static GIOChannel *l2cap_connect(struct avdtp *session)
2611 io = bt_io_connect(BT_IO_L2CAP, avdtp_connect_cb, session,
2613 BT_IO_OPT_SOURCE_BDADDR, &session->server->src,
2614 BT_IO_OPT_DEST_BDADDR, &session->dst,
2615 BT_IO_OPT_PSM, AVDTP_PSM,
2616 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
2619 error("%s", err->message);
2627 static void queue_request(struct avdtp *session, struct pending_req *req,
2631 session->prio_queue = g_slist_append(session->prio_queue, req);
2633 session->req_queue = g_slist_append(session->req_queue, req);
2636 static uint8_t req_get_seid(struct pending_req *req)
2638 if (req->signal_id == AVDTP_DISCOVER)
2641 return ((struct seid_req *) (req->data))->acp_seid;
2644 static int cancel_request(struct avdtp *session, int err)
2646 struct pending_req *req;
2647 struct seid_req sreq;
2648 struct avdtp_local_sep *lsep;
2649 struct avdtp_stream *stream;
2651 struct avdtp_error averr;
2654 session->req = NULL;
2656 avdtp_error_init(&averr, AVDTP_ERRNO, err);
2658 seid = req_get_seid(req);
2660 stream = find_stream_by_rseid(session, seid);
2665 stream->abort_int = TRUE;
2666 lsep = stream->lsep;
2670 switch (req->signal_id) {
2671 case AVDTP_RECONFIGURE:
2672 error("Reconfigure: %s (%d)", strerror(err), err);
2673 if (lsep && lsep->cfm && lsep->cfm->reconfigure)
2674 lsep->cfm->reconfigure(session, lsep, stream, &averr,
2678 error("Open: %s (%d)", strerror(err), err);
2679 if (lsep && lsep->cfm && lsep->cfm->open)
2680 lsep->cfm->open(session, lsep, stream, &averr,
2684 error("Start: %s (%d)", strerror(err), err);
2685 if (lsep && lsep->cfm && lsep->cfm->start) {
2686 lsep->cfm->start(session, lsep, stream, &averr,
2689 stream->starting = FALSE;
2693 error("Suspend: %s (%d)", strerror(err), err);
2694 if (lsep && lsep->cfm && lsep->cfm->suspend)
2695 lsep->cfm->suspend(session, lsep, stream, &averr,
2699 error("Close: %s (%d)", strerror(err), err);
2700 if (lsep && lsep->cfm && lsep->cfm->close) {
2701 lsep->cfm->close(session, lsep, stream, &averr,
2704 stream->close_int = FALSE;
2707 case AVDTP_SET_CONFIGURATION:
2708 error("SetConfiguration: %s (%d)", strerror(err), err);
2709 if (lsep && lsep->cfm && lsep->cfm->set_configuration)
2710 lsep->cfm->set_configuration(session, lsep, stream,
2711 &averr, lsep->user_data);
2713 case AVDTP_DISCOVER:
2714 error("Discover: %s (%d)", strerror(err), err);
2716 case AVDTP_GET_CAPABILITIES:
2717 error("GetCapabilities: %s (%d)", strerror(err), err);
2720 error("Abort: %s (%d)", strerror(err), err);
2727 memset(&sreq, 0, sizeof(sreq));
2728 sreq.acp_seid = seid;
2730 err = send_request(session, TRUE, stream, AVDTP_ABORT, &sreq,
2733 error("Unable to send abort request");
2740 connection_lost(session, err);
2742 pending_req_free(req);
2746 static gboolean request_timeout(gpointer user_data)
2748 struct avdtp *session = user_data;
2750 cancel_request(session, ETIMEDOUT);
2755 static int send_req(struct avdtp *session, gboolean priority,
2756 struct pending_req *req)
2758 static int transaction = 0;
2761 if (session->state == AVDTP_SESSION_STATE_DISCONNECTED) {
2762 session->io = l2cap_connect(session);
2767 avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTING);
2770 if (session->state < AVDTP_SESSION_STATE_CONNECTED ||
2771 session->req != NULL) {
2772 queue_request(session, req, priority);
2776 req->transaction = transaction++;
2779 /* FIXME: Should we retry to send if the buffer
2780 was not totally sent or in case of EINTR? */
2781 if (!avdtp_send(session, req->transaction, AVDTP_MSG_TYPE_COMMAND,
2782 req->signal_id, req->data, req->data_size)) {
2789 req->timeout = g_timeout_add_seconds(req->signal_id == AVDTP_ABORT ?
2790 ABORT_TIMEOUT : REQ_TIMEOUT,
2801 static int send_request(struct avdtp *session, gboolean priority,
2802 struct avdtp_stream *stream, uint8_t signal_id,
2803 void *buffer, size_t size)
2805 struct pending_req *req;
2807 if (stream && stream->abort_int && signal_id != AVDTP_ABORT) {
2808 DBG("Unable to send requests while aborting");
2812 req = g_new0(struct pending_req, 1);
2813 req->signal_id = signal_id;
2814 req->data = g_malloc(size);
2815 memcpy(req->data, buffer, size);
2816 req->data_size = size;
2817 req->stream = stream;
2819 return send_req(session, priority, req);
2822 static gboolean avdtp_discover_resp(struct avdtp *session,
2823 struct discover_resp *resp, int size)
2828 gboolean getcap_pending = FALSE;
2830 if (session->version >= 0x0103 && session->server->version >= 0x0103)
2831 getcap_cmd = AVDTP_GET_ALL_CAPABILITIES;
2833 getcap_cmd = AVDTP_GET_CAPABILITIES;
2835 sep_count = size / sizeof(struct seid_info);
2837 for (i = 0; i < sep_count; i++) {
2838 struct avdtp_remote_sep *sep;
2839 struct avdtp_stream *stream;
2840 struct seid_req req;
2842 DBG("seid %d type %d media %d in use %d",
2843 resp->seps[i].seid, resp->seps[i].type,
2844 resp->seps[i].media_type, resp->seps[i].inuse);
2846 stream = find_stream_by_rseid(session, resp->seps[i].seid);
2848 sep = find_remote_sep(session->seps, resp->seps[i].seid);
2850 if (resp->seps[i].inuse && !stream)
2852 sep = g_new0(struct avdtp_remote_sep, 1);
2853 session->seps = g_slist_append(session->seps, sep);
2856 sep->stream = stream;
2857 sep->seid = resp->seps[i].seid;
2858 sep->type = resp->seps[i].type;
2859 sep->media_type = resp->seps[i].media_type;
2861 memset(&req, 0, sizeof(req));
2862 req.acp_seid = sep->seid;
2864 ret = send_request(session, TRUE, NULL, getcap_cmd,
2868 getcap_pending = TRUE;
2871 if (!getcap_pending)
2872 finalize_discovery(session, -ret);
2877 static gboolean avdtp_get_capabilities_resp(struct avdtp *session,
2878 struct getcap_resp *resp,
2881 struct avdtp_remote_sep *sep;
2884 /* Check for minimum required packet size includes:
2885 * 1. getcap resp header
2886 * 2. media transport capability (2 bytes)
2887 * 3. media codec capability type + length (2 bytes)
2888 * 4. the actual media codec elements
2890 if (size < (sizeof(struct getcap_resp) + 4 +
2891 sizeof(struct avdtp_media_codec_capability))) {
2892 error("Too short getcap resp packet");
2896 seid = ((struct seid_req *) session->req->data)->acp_seid;
2898 sep = find_remote_sep(session->seps, seid);
2900 DBG("seid %d type %d media %d", sep->seid,
2901 sep->type, sep->media_type);
2904 g_slist_free_full(sep->caps, g_free);
2907 sep->delay_reporting = FALSE;
2910 sep->caps = caps_to_list(resp->caps, size - sizeof(struct getcap_resp),
2911 &sep->codec, &sep->delay_reporting);
2916 static gboolean avdtp_set_configuration_resp(struct avdtp *session,
2917 struct avdtp_stream *stream,
2918 struct avdtp_single_header *resp,
2921 struct avdtp_local_sep *sep = stream->lsep;
2923 if (sep->cfm && sep->cfm->set_configuration)
2924 sep->cfm->set_configuration(session, sep, stream, NULL,
2927 avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
2932 static gboolean avdtp_reconfigure_resp(struct avdtp *session,
2933 struct avdtp_stream *stream,
2934 struct avdtp_single_header *resp, int size)
2939 static gboolean avdtp_open_resp(struct avdtp *session, struct avdtp_stream *stream,
2940 struct seid_rej *resp, int size)
2942 struct avdtp_local_sep *sep = stream->lsep;
2944 stream->io = l2cap_connect(session);
2946 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
2950 session->pending_open = stream;
2955 static gboolean avdtp_start_resp(struct avdtp *session,
2956 struct avdtp_stream *stream,
2957 struct seid_rej *resp, int size)
2959 struct avdtp_local_sep *sep = stream->lsep;
2961 if (sep->cfm && sep->cfm->start)
2962 sep->cfm->start(session, sep, stream, NULL, sep->user_data);
2964 /* We might be in STREAMING already if both sides send START_CMD at the
2965 * same time and the one in SNK role doesn't reject it as it should */
2966 if (sep->state != AVDTP_STATE_STREAMING)
2967 avdtp_sep_set_state(session, sep, AVDTP_STATE_STREAMING);
2972 static gboolean avdtp_close_resp(struct avdtp *session,
2973 struct avdtp_stream *stream,
2974 struct seid_rej *resp, int size)
2976 struct avdtp_local_sep *sep = stream->lsep;
2978 avdtp_sep_set_state(session, sep, AVDTP_STATE_CLOSING);
2980 close_stream(stream);
2985 static gboolean avdtp_suspend_resp(struct avdtp *session,
2986 struct avdtp_stream *stream,
2987 void *data, int size)
2989 struct avdtp_local_sep *sep = stream->lsep;
2991 avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
2993 if (sep->cfm && sep->cfm->suspend)
2994 sep->cfm->suspend(session, sep, stream, NULL, sep->user_data);
2999 static gboolean avdtp_abort_resp(struct avdtp *session,
3000 struct avdtp_stream *stream,
3001 struct seid_rej *resp, int size)
3003 struct avdtp_local_sep *sep = stream->lsep;
3005 avdtp_sep_set_state(session, sep, AVDTP_STATE_ABORTING);
3007 if (sep->cfm && sep->cfm->abort)
3008 sep->cfm->abort(session, sep, stream, NULL, sep->user_data);
3010 avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
3015 static gboolean avdtp_delay_report_resp(struct avdtp *session,
3016 struct avdtp_stream *stream,
3017 void *data, int size)
3019 struct avdtp_local_sep *sep = stream->lsep;
3021 if (sep->cfm && sep->cfm->delay_report)
3022 sep->cfm->delay_report(session, sep, stream, NULL, sep->user_data);
3027 static gboolean avdtp_parse_resp(struct avdtp *session,
3028 struct avdtp_stream *stream,
3029 uint8_t transaction, uint8_t signal_id,
3030 void *buf, int size)
3032 struct pending_req *next;
3033 const char *get_all = "";
3035 if (session->prio_queue)
3036 next = session->prio_queue->data;
3037 else if (session->req_queue)
3038 next = session->req_queue->data;
3042 switch (signal_id) {
3043 case AVDTP_DISCOVER:
3044 DBG("DISCOVER request succeeded");
3045 return avdtp_discover_resp(session, buf, size);
3046 case AVDTP_GET_ALL_CAPABILITIES:
3048 case AVDTP_GET_CAPABILITIES:
3049 DBG("GET_%sCAPABILITIES request succeeded", get_all);
3050 if (!avdtp_get_capabilities_resp(session, buf, size))
3052 if (!(next && (next->signal_id == AVDTP_GET_CAPABILITIES ||
3053 next->signal_id == AVDTP_GET_ALL_CAPABILITIES)))
3054 finalize_discovery(session, 0);
3058 /* The remaining commands require an existing stream so bail out
3059 * here if the stream got unexpectedly disconnected */
3061 DBG("AVDTP: stream was closed while waiting for reply");
3065 switch (signal_id) {
3066 case AVDTP_SET_CONFIGURATION:
3067 DBG("SET_CONFIGURATION request succeeded");
3068 return avdtp_set_configuration_resp(session, stream,
3070 case AVDTP_RECONFIGURE:
3071 DBG("RECONFIGURE request succeeded");
3072 return avdtp_reconfigure_resp(session, stream, buf, size);
3074 DBG("OPEN request succeeded");
3075 return avdtp_open_resp(session, stream, buf, size);
3077 DBG("SUSPEND request succeeded");
3078 return avdtp_suspend_resp(session, stream, buf, size);
3080 DBG("START request succeeded");
3081 return avdtp_start_resp(session, stream, buf, size);
3083 DBG("CLOSE request succeeded");
3084 return avdtp_close_resp(session, stream, buf, size);
3086 DBG("ABORT request succeeded");
3087 return avdtp_abort_resp(session, stream, buf, size);
3088 case AVDTP_DELAY_REPORT:
3089 DBG("DELAY_REPORT request succeeded");
3090 return avdtp_delay_report_resp(session, stream, buf, size);
3093 error("Unknown signal id in accept response: %u", signal_id);
3097 static gboolean seid_rej_to_err(struct seid_rej *rej, unsigned int size,
3098 struct avdtp_error *err)
3100 if (size < sizeof(struct seid_rej)) {
3101 error("Too small packet for seid_rej");
3105 avdtp_error_init(err, 0x00, rej->error);
3110 static gboolean conf_rej_to_err(struct conf_rej *rej, unsigned int size,
3111 struct avdtp_error *err)
3113 if (size < sizeof(struct conf_rej)) {
3114 error("Too small packet for conf_rej");
3118 avdtp_error_init(err, rej->category, rej->error);
3123 static gboolean stream_rej_to_err(struct stream_rej *rej, unsigned int size,
3124 struct avdtp_error *err,
3127 if (size < sizeof(struct stream_rej)) {
3128 error("Too small packet for stream_rej");
3132 avdtp_error_init(err, 0x00, rej->error);
3135 *acp_seid = rej->acp_seid;
3140 static gboolean avdtp_parse_rej(struct avdtp *session,
3141 struct avdtp_stream *stream,
3142 uint8_t transaction, uint8_t signal_id,
3143 void *buf, int size)
3145 struct avdtp_error err;
3147 struct avdtp_local_sep *sep = stream ? stream->lsep : NULL;
3149 switch (signal_id) {
3150 case AVDTP_DISCOVER:
3151 if (!seid_rej_to_err(buf, size, &err))
3153 error("DISCOVER request rejected: %s (%d)",
3154 avdtp_strerror(&err), err.err.error_code);
3156 case AVDTP_GET_CAPABILITIES:
3157 case AVDTP_GET_ALL_CAPABILITIES:
3158 if (!seid_rej_to_err(buf, size, &err))
3160 error("GET_CAPABILITIES request rejected: %s (%d)",
3161 avdtp_strerror(&err), err.err.error_code);
3164 if (!seid_rej_to_err(buf, size, &err))
3166 error("OPEN request rejected: %s (%d)",
3167 avdtp_strerror(&err), err.err.error_code);
3168 if (sep && sep->cfm && sep->cfm->open)
3169 sep->cfm->open(session, sep, stream, &err,
3172 case AVDTP_SET_CONFIGURATION:
3173 if (!conf_rej_to_err(buf, size, &err))
3175 error("SET_CONFIGURATION request rejected: %s (%d)",
3176 avdtp_strerror(&err), err.err.error_code);
3177 if (sep && sep->cfm && sep->cfm->set_configuration)
3178 sep->cfm->set_configuration(session, sep, stream,
3179 &err, sep->user_data);
3181 case AVDTP_RECONFIGURE:
3182 if (!conf_rej_to_err(buf, size, &err))
3184 error("RECONFIGURE request rejected: %s (%d)",
3185 avdtp_strerror(&err), err.err.error_code);
3186 if (sep && sep->cfm && sep->cfm->reconfigure)
3187 sep->cfm->reconfigure(session, sep, stream, &err,
3191 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3193 error("START request rejected: %s (%d)",
3194 avdtp_strerror(&err), err.err.error_code);
3195 if (sep && sep->cfm && sep->cfm->start) {
3196 sep->cfm->start(session, sep, stream, &err,
3198 stream->starting = FALSE;
3202 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3204 error("SUSPEND request rejected: %s (%d)",
3205 avdtp_strerror(&err), err.err.error_code);
3206 if (sep && sep->cfm && sep->cfm->suspend)
3207 sep->cfm->suspend(session, sep, stream, &err,
3211 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3213 error("CLOSE request rejected: %s (%d)",
3214 avdtp_strerror(&err), err.err.error_code);
3215 if (sep && sep->cfm && sep->cfm->close) {
3216 sep->cfm->close(session, sep, stream, &err,
3218 stream->close_int = FALSE;
3222 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3224 error("ABORT request rejected: %s (%d)",
3225 avdtp_strerror(&err), err.err.error_code);
3226 if (sep && sep->cfm && sep->cfm->abort)
3227 sep->cfm->abort(session, sep, stream, &err,
3230 case AVDTP_DELAY_REPORT:
3231 if (!stream_rej_to_err(buf, size, &err, &acp_seid))
3233 error("DELAY_REPORT request rejected: %s (%d)",
3234 avdtp_strerror(&err), err.err.error_code);
3235 if (sep && sep->cfm && sep->cfm->delay_report)
3236 sep->cfm->delay_report(session, sep, stream, &err,
3240 error("Unknown reject response signal id: %u", signal_id);
3245 gboolean avdtp_is_connected(const bdaddr_t *src, const bdaddr_t *dst)
3247 struct avdtp_server *server;
3248 struct avdtp *session;
3250 server = find_server(servers, src);
3254 session = find_session(server->sessions, dst);
3258 if (session->state != AVDTP_SESSION_STATE_DISCONNECTED)
3264 struct avdtp_service_capability *avdtp_stream_get_codec(
3265 struct avdtp_stream *stream)
3269 for (l = stream->caps; l; l = l->next) {
3270 struct avdtp_service_capability *cap = l->data;
3272 if (cap->category == AVDTP_MEDIA_CODEC)
3279 gboolean avdtp_stream_has_capability(struct avdtp_stream *stream,
3280 struct avdtp_service_capability *cap)
3283 struct avdtp_service_capability *stream_cap;
3285 for (l = stream->caps; l; l = g_slist_next(l)) {
3286 stream_cap = l->data;
3288 if (stream_cap->category != cap->category ||
3289 stream_cap->length != cap->length)
3292 if (memcmp(stream_cap->data, cap->data, cap->length) == 0)
3299 gboolean avdtp_stream_has_capabilities(struct avdtp_stream *stream,
3302 for (; caps; caps = g_slist_next(caps)) {
3303 struct avdtp_service_capability *cap = caps->data;
3305 if (!avdtp_stream_has_capability(stream, cap))
3312 struct avdtp_remote_sep *avdtp_stream_get_remote_sep(
3313 struct avdtp_stream *stream)
3315 return avdtp_get_remote_sep(stream->session, stream->rseid);
3318 gboolean avdtp_stream_get_transport(struct avdtp_stream *stream, int *sock,
3319 uint16_t *imtu, uint16_t *omtu,
3322 if (stream->io == NULL)
3326 *sock = g_io_channel_unix_get_fd(stream->io);
3329 *omtu = stream->omtu;
3332 *imtu = stream->imtu;
3335 *caps = stream->caps;
3340 static int process_queue(struct avdtp *session)
3343 struct pending_req *req;
3348 if (session->prio_queue)
3349 queue = &session->prio_queue;
3351 queue = &session->req_queue;
3359 *queue = g_slist_remove(*queue, req);
3361 return send_req(session, FALSE, req);
3364 struct avdtp_remote_sep *avdtp_get_remote_sep(struct avdtp *session,
3369 for (l = session->seps; l; l = l->next) {
3370 struct avdtp_remote_sep *sep = l->data;
3372 if (sep->seid == seid)
3379 uint8_t avdtp_get_seid(struct avdtp_remote_sep *sep)
3384 uint8_t avdtp_get_type(struct avdtp_remote_sep *sep)
3389 struct avdtp_service_capability *avdtp_get_codec(struct avdtp_remote_sep *sep)
3394 gboolean avdtp_get_delay_reporting(struct avdtp_remote_sep *sep)
3396 return sep->delay_reporting;
3399 struct avdtp_stream *avdtp_get_stream(struct avdtp_remote_sep *sep)
3404 struct avdtp_service_capability *avdtp_service_cap_new(uint8_t category,
3405 void *data, int length)
3407 struct avdtp_service_capability *cap;
3409 if (category < AVDTP_MEDIA_TRANSPORT || category > AVDTP_DELAY_REPORTING)
3412 cap = g_malloc(sizeof(struct avdtp_service_capability) + length);
3413 cap->category = category;
3414 cap->length = length;
3415 memcpy(cap->data, data, length);
3420 static gboolean process_discover(gpointer data)
3422 struct avdtp *session = data;
3424 finalize_discovery(session, 0);
3429 int avdtp_discover(struct avdtp *session, avdtp_discover_cb_t cb,
3434 if (session->discov_cb)
3437 if (session->seps) {
3438 session->discov_cb = cb;
3439 session->user_data = user_data;
3440 g_idle_add(process_discover, session);
3444 err = send_request(session, FALSE, NULL, AVDTP_DISCOVER, NULL, 0);
3446 session->discov_cb = cb;
3447 session->user_data = user_data;
3453 gboolean avdtp_stream_remove_cb(struct avdtp *session,
3454 struct avdtp_stream *stream,
3458 struct stream_callback *cb;
3463 for (cb = NULL, l = stream->callbacks; l != NULL; l = l->next) {
3464 struct stream_callback *tmp = l->data;
3465 if (tmp && tmp->id == id) {
3474 stream->callbacks = g_slist_remove(stream->callbacks, cb);
3480 unsigned int avdtp_stream_add_cb(struct avdtp *session,
3481 struct avdtp_stream *stream,
3482 avdtp_stream_state_cb cb, void *data)
3484 struct stream_callback *stream_cb;
3485 static unsigned int id = 0;
3487 stream_cb = g_new(struct stream_callback, 1);
3489 stream_cb->user_data = data;
3490 stream_cb->id = ++id;
3492 stream->callbacks = g_slist_append(stream->callbacks, stream_cb);
3494 return stream_cb->id;
3497 int avdtp_get_configuration(struct avdtp *session, struct avdtp_stream *stream)
3499 struct seid_req req;
3501 if (session->state < AVDTP_SESSION_STATE_CONNECTED)
3504 memset(&req, 0, sizeof(req));
3505 req.acp_seid = stream->rseid;
3507 return send_request(session, FALSE, stream, AVDTP_GET_CONFIGURATION,
3511 static void copy_capabilities(gpointer data, gpointer user_data)
3513 struct avdtp_service_capability *src_cap = data;
3514 struct avdtp_service_capability *dst_cap;
3515 GSList **l = user_data;
3517 dst_cap = avdtp_service_cap_new(src_cap->category, src_cap->data,
3520 *l = g_slist_append(*l, dst_cap);
3523 int avdtp_set_configuration(struct avdtp *session,
3524 struct avdtp_remote_sep *rsep,
3525 struct avdtp_local_sep *lsep,
3527 struct avdtp_stream **stream)
3529 struct setconf_req *req;
3530 struct avdtp_stream *new_stream;
3533 struct avdtp_service_capability *cap;
3536 if (session->state != AVDTP_SESSION_STATE_CONNECTED)
3539 if (!(lsep && rsep))
3542 DBG("%p: int_seid=%u, acp_seid=%u", session,
3543 lsep->info.seid, rsep->seid);
3545 new_stream = g_new0(struct avdtp_stream, 1);
3546 new_stream->session = session;
3547 new_stream->lsep = lsep;
3548 new_stream->rseid = rsep->seid;
3550 if (rsep->delay_reporting && lsep->delay_reporting) {
3551 struct avdtp_service_capability *delay_reporting;
3553 delay_reporting = avdtp_service_cap_new(AVDTP_DELAY_REPORTING,
3555 caps = g_slist_append(caps, delay_reporting);
3556 new_stream->delay_reporting = TRUE;
3559 g_slist_foreach(caps, copy_capabilities, &new_stream->caps);
3561 /* Calculate total size of request */
3562 for (l = caps, caps_len = 0; l != NULL; l = g_slist_next(l)) {
3564 caps_len += cap->length + 2;
3567 req = g_malloc0(sizeof(struct setconf_req) + caps_len);
3569 req->int_seid = lsep->info.seid;
3570 req->acp_seid = rsep->seid;
3572 /* Copy the capabilities into the request */
3573 for (l = caps, ptr = req->caps; l != NULL; l = g_slist_next(l)) {
3575 memcpy(ptr, cap, cap->length + 2);
3576 ptr += cap->length + 2;
3579 err = send_request(session, FALSE, new_stream,
3580 AVDTP_SET_CONFIGURATION, req,
3581 sizeof(struct setconf_req) + caps_len);
3583 stream_free(new_stream);
3585 lsep->info.inuse = 1;
3586 lsep->stream = new_stream;
3587 rsep->stream = new_stream;
3588 session->streams = g_slist_append(session->streams, new_stream);
3590 *stream = new_stream;
3598 int avdtp_reconfigure(struct avdtp *session, GSList *caps,
3599 struct avdtp_stream *stream)
3601 struct reconf_req *req;
3605 struct avdtp_service_capability *cap;
3607 if (!g_slist_find(session->streams, stream))
3610 if (stream->lsep->state != AVDTP_STATE_OPEN)
3613 /* Calculate total size of request */
3614 for (l = caps, caps_len = 0; l != NULL; l = g_slist_next(l)) {
3616 caps_len += cap->length + 2;
3619 req = g_malloc0(sizeof(struct reconf_req) + caps_len);
3621 req->acp_seid = stream->rseid;
3623 /* Copy the capabilities into the request */
3624 for (l = caps, ptr = req->caps; l != NULL; l = g_slist_next(l)) {
3626 memcpy(ptr, cap, cap->length + 2);
3627 ptr += cap->length + 2;
3630 err = send_request(session, FALSE, stream, AVDTP_RECONFIGURE, req,
3631 sizeof(*req) + caps_len);
3637 int avdtp_open(struct avdtp *session, struct avdtp_stream *stream)
3639 struct seid_req req;
3641 if (!g_slist_find(session->streams, stream))
3644 if (stream->lsep->state > AVDTP_STATE_CONFIGURED)
3647 memset(&req, 0, sizeof(req));
3648 req.acp_seid = stream->rseid;
3650 return send_request(session, FALSE, stream, AVDTP_OPEN,
3654 int avdtp_start(struct avdtp *session, struct avdtp_stream *stream)
3656 struct start_req req;
3659 if (!g_slist_find(session->streams, stream))
3662 if (stream->lsep->state != AVDTP_STATE_OPEN)
3665 /* Recommendation 12:
3666 * If the RD has configured and opened a stream it is also responsible
3667 * to start the streaming via GAVDP_START.
3669 if (stream->open_acp) {
3670 stream->starting = TRUE;
3674 if (stream->close_int == TRUE) {
3675 error("avdtp_start: rejecting start since close is initiated");
3679 if (stream->starting == TRUE) {
3680 DBG("stream already started");
3681 return -EINPROGRESS;
3684 memset(&req, 0, sizeof(req));
3685 req.first_seid.seid = stream->rseid;
3687 ret = send_request(session, FALSE, stream, AVDTP_START,
3690 stream->starting = TRUE;
3695 int avdtp_close(struct avdtp *session, struct avdtp_stream *stream,
3698 struct seid_req req;
3701 if (!g_slist_find(session->streams, stream))
3704 if (stream->lsep->state < AVDTP_STATE_OPEN)
3707 if (stream->close_int == TRUE) {
3708 error("avdtp_close: rejecting since close is already initiated");
3712 if (immediate && session->req && stream == session->req->stream)
3713 return avdtp_abort(session, stream);
3715 memset(&req, 0, sizeof(req));
3716 req.acp_seid = stream->rseid;
3718 ret = send_request(session, FALSE, stream, AVDTP_CLOSE,
3721 stream->close_int = TRUE;
3726 int avdtp_suspend(struct avdtp *session, struct avdtp_stream *stream)
3728 struct seid_req req;
3730 if (!g_slist_find(session->streams, stream))
3733 if (stream->lsep->state <= AVDTP_STATE_OPEN || stream->close_int)
3736 memset(&req, 0, sizeof(req));
3737 req.acp_seid = stream->rseid;
3739 return send_request(session, FALSE, stream, AVDTP_SUSPEND,
3743 int avdtp_abort(struct avdtp *session, struct avdtp_stream *stream)
3745 struct seid_req req;
3748 if (!g_slist_find(session->streams, stream))
3751 if (stream->lsep->state == AVDTP_STATE_ABORTING)
3754 if (session->req && stream == session->req->stream)
3755 return cancel_request(session, ECANCELED);
3757 memset(&req, 0, sizeof(req));
3758 req.acp_seid = stream->rseid;
3760 ret = send_request(session, TRUE, stream, AVDTP_ABORT,
3763 stream->abort_int = TRUE;
3768 int avdtp_delay_report(struct avdtp *session, struct avdtp_stream *stream,
3771 struct delay_req req;
3773 if (!g_slist_find(session->streams, stream))
3776 if (stream->lsep->state != AVDTP_STATE_CONFIGURED &&
3777 stream->lsep->state != AVDTP_STATE_STREAMING)
3780 if (!stream->delay_reporting || session->version < 0x0103 ||
3781 session->server->version < 0x0103)
3784 stream->delay = delay;
3786 memset(&req, 0, sizeof(req));
3787 req.acp_seid = stream->rseid;
3788 req.delay = htons(delay);
3790 return send_request(session, TRUE, stream, AVDTP_DELAY_REPORT,
3794 struct avdtp_local_sep *avdtp_register_sep(const bdaddr_t *src, uint8_t type,
3797 gboolean delay_reporting,
3798 struct avdtp_sep_ind *ind,
3799 struct avdtp_sep_cfm *cfm,
3802 struct avdtp_server *server;
3803 struct avdtp_local_sep *sep;
3805 server = find_server(servers, src);
3809 if (g_slist_length(server->seps) > MAX_SEID)
3812 sep = g_new0(struct avdtp_local_sep, 1);
3814 sep->state = AVDTP_STATE_IDLE;
3815 sep->info.seid = g_slist_length(server->seps) + 1;
3816 sep->info.type = type;
3817 sep->info.media_type = media_type;
3818 sep->codec = codec_type;
3821 sep->user_data = user_data;
3822 sep->server = server;
3823 sep->delay_reporting = TRUE;
3825 DBG("SEP %p registered: type:%d codec:%d seid:%d", sep,
3826 sep->info.type, sep->codec, sep->info.seid);
3827 server->seps = g_slist_append(server->seps, sep);
3832 int avdtp_unregister_sep(struct avdtp_local_sep *sep)
3834 struct avdtp_server *server;
3839 server = sep->server;
3840 server->seps = g_slist_remove(server->seps, sep);
3843 release_stream(sep->stream, sep->stream->session);
3845 DBG("SEP %p unregistered: type:%d codec:%d seid:%d", sep,
3846 sep->info.type, sep->codec, sep->info.seid);
3853 static GIOChannel *avdtp_server_socket(const bdaddr_t *src, gboolean master)
3858 io = bt_io_listen(BT_IO_L2CAP, NULL, avdtp_confirm_cb,
3860 BT_IO_OPT_SOURCE_BDADDR, src,
3861 BT_IO_OPT_PSM, AVDTP_PSM,
3862 BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
3863 BT_IO_OPT_MASTER, master,
3866 error("%s", err->message);
3873 const char *avdtp_strerror(struct avdtp_error *err)
3875 if (err->category == AVDTP_ERRNO)
3876 return strerror(err->err.posix_errno);
3878 switch(err->err.error_code) {
3879 case AVDTP_BAD_HEADER_FORMAT:
3880 return "Bad Header Format";
3881 case AVDTP_BAD_LENGTH:
3882 return "Bad Packet Length";
3883 case AVDTP_BAD_ACP_SEID:
3884 return "Bad Acceptor SEID";
3885 case AVDTP_SEP_IN_USE:
3886 return "Stream End Point in Use";
3887 case AVDTP_SEP_NOT_IN_USE:
3888 return "Stream End Point Not in Use";
3889 case AVDTP_BAD_SERV_CATEGORY:
3890 return "Bad Service Category";
3891 case AVDTP_BAD_PAYLOAD_FORMAT:
3892 return "Bad Payload format";
3893 case AVDTP_NOT_SUPPORTED_COMMAND:
3894 return "Command Not Supported";
3895 case AVDTP_INVALID_CAPABILITIES:
3896 return "Invalid Capabilities";
3897 case AVDTP_BAD_RECOVERY_TYPE:
3898 return "Bad Recovery Type";
3899 case AVDTP_BAD_MEDIA_TRANSPORT_FORMAT:
3900 return "Bad Media Transport Format";
3901 case AVDTP_BAD_RECOVERY_FORMAT:
3902 return "Bad Recovery Format";
3903 case AVDTP_BAD_ROHC_FORMAT:
3904 return "Bad Header Compression Format";
3905 case AVDTP_BAD_CP_FORMAT:
3906 return "Bad Content Protetion Format";
3907 case AVDTP_BAD_MULTIPLEXING_FORMAT:
3908 return "Bad Multiplexing Format";
3909 case AVDTP_UNSUPPORTED_CONFIGURATION:
3910 return "Configuration not supported";
3911 case AVDTP_BAD_STATE:
3914 return "Unknow error";
3918 avdtp_state_t avdtp_sep_get_state(struct avdtp_local_sep *sep)
3923 void avdtp_get_peers(struct avdtp *session, bdaddr_t *src, bdaddr_t *dst)
3926 bacpy(src, &session->server->src);
3928 bacpy(dst, &session->dst);
3931 int avdtp_init(const bdaddr_t *src, GKeyFile *config, uint16_t *version)
3934 gboolean tmp, master = TRUE;
3935 struct avdtp_server *server;
3936 uint16_t ver = 0x0102;
3941 tmp = g_key_file_get_boolean(config, "General",
3944 DBG("audio.conf: %s", err->message);
3945 g_clear_error(&err);
3949 tmp = g_key_file_get_boolean(config, "General", "AutoConnect",
3952 g_clear_error(&err);
3956 if (g_key_file_get_boolean(config, "A2DP", "DelayReporting", NULL))
3960 server = g_new0(struct avdtp_server, 1);
3964 server->version = ver;
3967 *version = server->version;
3969 server->io = avdtp_server_socket(src, master);
3975 bacpy(&server->src, src);
3977 servers = g_slist_append(servers, server);
3982 void avdtp_exit(const bdaddr_t *src)
3984 struct avdtp_server *server;
3987 server = find_server(servers, src);
3991 l = server->sessions;
3993 struct avdtp *session = l->data;
3996 /* value of l pointer should be updated before invoking
3997 * connection_lost since it internally uses avdtp_unref
3998 * which operates on server->session list as well
4000 connection_lost(session, -ECONNABORTED);
4003 servers = g_slist_remove(servers, server);
4005 g_io_channel_shutdown(server->io, TRUE, NULL);
4006 g_io_channel_unref(server->io);
4010 gboolean avdtp_has_stream(struct avdtp *session, struct avdtp_stream *stream)
4012 return g_slist_find(session->streams, stream) ? TRUE : FALSE;
4015 void avdtp_set_auto_disconnect(struct avdtp *session, gboolean auto_dc)
4017 session->auto_dc = auto_dc;
4020 gboolean avdtp_stream_setup_active(struct avdtp *session)
4022 return session->stream_setup;
4025 void avdtp_set_device_disconnect(struct avdtp *session, gboolean dev_dc)
4027 session->device_disconnect = dev_dc;
4030 unsigned int avdtp_add_state_cb(avdtp_session_state_cb cb, void *user_data)
4032 struct avdtp_state_callback *state_cb;
4033 static unsigned int id = 0;
4035 state_cb = g_new(struct avdtp_state_callback, 1);
4037 state_cb->user_data = user_data;
4038 state_cb->id = ++id;
4040 avdtp_callbacks = g_slist_append(avdtp_callbacks, state_cb);
4042 return state_cb->id;
4045 gboolean avdtp_remove_state_cb(unsigned int id)
4049 for (l = avdtp_callbacks; l != NULL; l = l->next) {
4050 struct avdtp_state_callback *cb = l->data;
4051 if (cb && cb->id == id) {
4052 avdtp_callbacks = g_slist_remove(avdtp_callbacks, cb);