platform/upstream/bluez.git
8 years agoAdded code for LE Data length extension feature. 23/48223/6 accepted/tizen/mobile/20151207.124010 accepted/tizen/tv/20151207.124247 accepted/tizen/wearable/20151207.124359 submit/tizen_mobile/20151207.014408 submit/tizen_tv/20151207.014413 submit/tizen_wearable/20151207.014418
Sudha Bheemanna [Wed, 16 Sep 2015 11:04:53 +0000 (16:34 +0530)]
Added code for LE Data length extension feature.

Change-Id: I7c7cd8760935b378aa6f7e578ca27ddb1ba40176
Signed-off-by: Sudha Bheemanna <b.sudha@samsung.com>
8 years agoAdd the config for TM1 26/53126/2 accepted/tizen/mobile/20151202.230855 accepted/tizen/tv/20151202.230949 accepted/tizen/wearable/20151202.231048 submit/tizen_mobile/20151202.054839 submit/tizen_tv/20151202.054842 submit/tizen_wearable/20151202.054849
Taejin Woo [Wed, 2 Dec 2015 04:42:40 +0000 (13:42 +0900)]
Add the config for TM1

Change-Id: I7e8d58387ed37b1ff41d5c6489ff240e7f600bb4
Signed-off-by: Taejin Woo <tt.woo@samsung.com>
8 years agoaudio: Fix checkpatch error 22/51822/1
Bharat Panda [Mon, 16 Nov 2015 10:36:43 +0000 (16:06 +0530)]
audio: Fix checkpatch error

This patch fixes all extra checkpatch error introduced on top of
existing upstream code.

Change-Id: Ic64775a6c7e7a900ee2cbba4c5c9eec5e96bcb0b

8 years agoaudio/avrcp: Fix memory leak 16/51816/1
Bharat Panda [Mon, 16 Nov 2015 10:09:37 +0000 (15:39 +0530)]
audio/avrcp: Fix memory leak

This frees settings list after used otherwise it leaks as follow:

48 (24 direct, 24 indirect) bytes in 1 blocks are definitely lost in loss record 152 of 239
  at 0x4C28C50: malloc (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so)
  by 0x4E84679: g_malloc (in /usr/lib64/libglib-2.0.so.0.4400.1)
  by 0x4E9BCD2: g_slice_alloc (in /usr/lib64/libglib-2.0.so.0.4400.1)
  by 0x4E7A6E5: g_list_prepend (in /usr/lib64/libglib-2.0.so.0.4400.1)
  by 0x4E6E44B: g_hash_table_get_keys (in /usr/lib64/libglib-2.0.so.0.4400.1)
  by 0x426D5A: list_settings (media.c:1003)
  by 0x4336B4: player_list_settings (avrcp.c:1390)
  by 0x4336B4: avrcp_handle_register_notification (avrcp.c:1514)
  by 0x436711: handle_vendordep_pdu (avrcp.c:1827)
  by 0x42EB6F: session_cb (avctp.c:1025)
  by 0x4E7EA89: g_main_context_dispatch (in /usr/lib64/libglib-2.0.so.0.4400.1)
  by 0x4E7EE1F: ??? (in /usr/lib64/libglib-2.0.so.0.4400.1)
  by 0x4E7F141: g_main_loop_run (in /usr/lib64/libglib-2.0.so.0.4400.1)

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=cdcea1773a484767c766dccb63c32e0086d5bd4f

Change-Id: I87ee38c217b02981f9950a1f5c43ab73a54059cd

8 years agoaudio/avrcp: Bump TG to version 1.5 14/51814/1
Bharat Panda [Mon, 16 Nov 2015 10:03:10 +0000 (15:33 +0530)]
audio/avrcp: Bump TG to version 1.5

As AVRCP 1.5 features has been added and 1.4 is deprecated,
version 1.5 should be used instead.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=8a29308b4c581aec9042bf8fbe56f654c44ae506

Change-Id: If2c2d6b4e5890b0401a3f90522613190f54c64fb

8 years agoaudio/avrcp: Fix crash on RegisterNotification 13/51813/1
Bharat Panda [Mon, 16 Nov 2015 09:45:05 +0000 (15:15 +0530)]
audio/avrcp: Fix crash on RegisterNotification

When registering AVRCP_EVENT_ADDRESSED_PLAYER_CHANGED there may
not be any player available causing a crash.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=60050fe469df1536466d1c6819670ce70ca92287

Change-Id: I889d727e1c411fe9970548355a39fa874cd41ce0

8 years agoaudio/avrcp: Add Set Addressed Player support 10/51810/1
Bharat Panda [Mon, 16 Nov 2015 09:31:07 +0000 (15:01 +0530)]
audio/avrcp: Add Set Addressed Player support

Support added to handle Set Addressed Player PDU in TG role.
Send EVENT_ADDRESSED_PLAYER_CHANGED on SetAddressedPlayer SUCCESS
and follow procedure to reject all player specific events
currently registered with the player.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=4827d6b61fd4fae4d0ba2fe46c42e5021b97ca56

Change-Id: I0463a1875f2bf920985feaed3ff764c1a75bf083

8 years agoaudio: Fix not resetting connect_id 56/51756/1
Bharat Panda [Fri, 13 Nov 2015 13:37:13 +0000 (19:07 +0530)]
audio: Fix not resetting connect_id

Ever since discovery can be canceled connect_id is now set while
discovering so it needs to be reset on the callback otherwise it will
cause .connect to always return -EBUSY until .disconnect is called.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=a1a01a6f95fb3715dd7aa27af3543b6cb0a62da7

Change-Id: Ibd5af39c1346536f11a45390d3f262b2fcc15fa1

8 years agoaudio/avdtp: Fix added first endpoints 55/51755/1
Bharat Panda [Fri, 13 Nov 2015 13:24:19 +0000 (18:54 +0530)]
audio/avdtp: Fix added first endpoints

This resolves suspending and resuming only the first SEID.
Changes taken only for linux bluez, excluded android part of fix.

AVDTP_Start can contain several Stream Endpoing IDs to be resumed.
AVDTP_Suspend can contain several Stream Endpoing IDs to be suspended.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=b5c6b1ed97ee6fe03092223c5f4ba8800a186519
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=302e4163f39e87fe6ab951bc2e2eb322b43ed6cd

Change-Id: I5f63eeae8b901d39782855205aad00b34b32a762

8 years agoaudio/avrcp: Add support for GetTotalNumberOfItems 02/51502/1
Bharat Panda [Tue, 10 Nov 2015 07:07:36 +0000 (12:37 +0530)]
audio/avrcp: Add support for GetTotalNumberOfItems

Added support for AVRCP GetTotalNumberOfItems command to get
total num of items in a folder(with a given scope) prior calling
GetFolderItems to retrieve the content of the folder.

On response, emit PropertyChanged for "NumberOfItems" property on
MediaPlayer1 interface.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=f17d3a2c3b0d4a8869ff297f53d55d1cdd524421

Change-Id: I8b3274c376e0a009d4910412dce1b17e0f5b0ac6

8 years agoAudio/Media: Fix incorrect value dereference 95/51495/1
Bharat Panda [Tue, 10 Nov 2015 06:01:41 +0000 (11:31 +0530)]
Audio/Media: Fix incorrect value dereference

parameter value passed to the config_cb is a pointer to the
gbooloean. Dereferencing the value rather than address leads to
mismatch in handling the return value.

avdtp.c:avdtp_parse_cmd() Received SET_CONFIGURATION_CMD
a2dp.c:endpoint_setconf_ind() Source 0xb7d49ef8: Set_Configuration_Ind
a2dp.c:setup_ref() 0xb7d53b98: ref=2
media.c:media_adapter_get_player()
media.c:media_set_sink_callback()
media.c:media_endpoint_async_call() Calling SetConfiguration: name = :1.37 path = /MediaEndpoint/A2DPSource

*#0 0xb6cea184 in __libc_free (mem=0xbead3ae4) at malloc.c:3736
*#1 0xb6e33468 in g_free () from /usr/lib/libglib-2.0.so.0
*#2 0xb6f25db0 in auto_config (data=0xb7d53b98) at profiles/audio/a2dp.c:430
*#3 0xb6f2ad76 in config_cb (endpoint=<value optimized out>,
* ret=<value optimized out>, size=<value optimized out>,
* user_data=<value optimized out>) at profiles/audio/media.c:707
*#4 0xb6f2cc4a in endpoint_reply (call=<value optimized out>,
* user_data=0xb7d516b0) at profiles/audio/media.c:357
*#5 0xb6ddce96 in _dbus_pending_call_complete (pending=0xb7d53bc8)
* at dbus-pending-call.c:216
*#6 0xb6dcfe82 in complete_pending_call_and_unlock (connection=0xb7d44b40,
* pending=0xb7d53bc8, message=<value optimized out>)
* at dbus-connection.c:2331

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=8a5538eaa6edb40693e5f93564c41e59f45bee09

Change-Id: I1286a29c0559845e66f56e427aed26e517c6b9ea

8 years agoaudio: Fix possible crash when removing device 90/51490/1
Bharat Panda [Tue, 10 Nov 2015 05:37:38 +0000 (11:07 +0530)]
audio: Fix possible crash when removing device

Currently it is not possible to cancel avdtp_discover procedure
leading to crashe if the device is removed while avdtp_discover
is pending since its callback is still reachable.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=33b447daaa3adfc04dfbc123538360d998e2d7d7

Change-Id: I607f818bbe0fe1287b421548fb41d1047bb88210

8 years agoaudio: Fix audio service state 78/51478/1
Bharat Panda [Tue, 10 Nov 2015 04:59:40 +0000 (10:29 +0530)]
audio: Fix audio service state

When profile .disconnect is called the state of the service
is already set to disconnecting this is make no sense to
call btd_service_connect_complete as it will do nothing and
the state will never be updated to disconnected as it should.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=e316a77f5a5fd4675c5b1f0da8a52fc253233054

Change-Id: I9780763b6265d27b4a6957a18fb0b352b3d72a9c

8 years agoaudio/transport: Fix emitting volume changed too soon 75/51475/1
Bharat Panda [Tue, 10 Nov 2015 04:33:26 +0000 (10:03 +0530)]
audio/transport: Fix emitting volume changed too soon

The volume should start at maximum (127) but at that point there is no
reason to notify the remote since there is no stream ongoing so no
changes can be applied.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=bf25bb8b335e4cd967ad8e4d358addc7305818b9

Change-Id: I147023026c8d13ee9a8b90195bc88aeda7676112

8 years agoaudio/transport: Fix not emitting volume changes 29/51429/1
Bharat Panda [Mon, 9 Nov 2015 12:44:37 +0000 (18:14 +0530)]
audio/transport: Fix not emitting volume changes

Changes taken to add fix for not emitting volume change notification.

If Volume is changed locally the change should be propagated
using PropertiesChanged.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=4f7843a0fcc1a0a4336004de2702f657fb97b5ff

Change-Id: I97075d0daf716144f505ae39415727b77f54e5b9

8 years agoaudio/avrcp: Enable volume change notification 27/51427/1
Bharat Panda [Mon, 9 Nov 2015 12:13:30 +0000 (17:43 +0530)]
audio/avrcp: Enable volume change notification

Changes taken to enable volume change notification in TG role.

When acting as a TG volume changes should be notified using
RegisterNotification not SetAbsoluteVolume as the later is
a CT operation.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=ed347b646c57d1e75269a7dc69b6e2ab1a1b41b5

Change-Id: I317bfaf70b7088a3d9c531bb5c7a6536414fc09f

8 years agoaudio/avrcp: Fixes added for SetAbsoluteVolume 05/51305/1
Bharat Panda [Fri, 6 Nov 2015 10:34:34 +0000 (16:04 +0530)]
audio/avrcp: Fixes added for SetAbsoluteVolume

Added event support for SetAbsoluteVolume in TG supported_events.
Fix rejecting SetAbsoluteVolume without a player.

Repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=d8da70674705a397f287217070f3659c794cf804
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=85b829bdf15be8180465d91b22bd376c3d339f62

Change-Id: I1a532724765480ad449088371bd9c531d7c035bb

8 years agoshared/att: Add packed struct definition for err_rsp 68/51268/1
Gowtham Anandha Babu [Fri, 6 Nov 2015 05:08:43 +0000 (10:38 +0530)]
shared/att: Add packed struct definition for err_rsp

Reused the structure definition (bt_att_pdu_error_rsp) defined in
att-types.h by removing uint8_t array for sending err rsp pdu.

git repo link:
https://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=bca537e81493f11e99cc47ed7eb7d179410ee762

Change-Id: Ia3eda63d29f52e441f74f0a1f94d8776e91ed708

8 years agocore/gatt: Parse InProgress error code from err_msg 66/51266/1
Gowtham Anandha Babu [Fri, 6 Nov 2015 05:01:15 +0000 (10:31 +0530)]
core/gatt: Parse InProgress error code from err_msg

In Common Profile and Service Error Code descriptions (Supplement
to Bluetooth Core Specification, sections 1.2 and 2), it is
mentioned that following error codes are sent over the Attribute
Protocol.
1)Client Characteristic Configuration Descriptor Improperly Configured(0xFD)
2)Procedure Already in Progress(0xFE)
3)Out of Range(0xFF)

It should be treated as ATT Error codes. So, moved those to att-types.h
and handled org.bluez.Error.InProgress.

git repo link:
https://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=70489204d769568707d9a7607981c197e935391e

Change-Id: I17707fa3a6d5ed52ef6634cbe725ac0322a8292f

8 years agotools: Handle the common profile & service ecode 64/51264/2
Gowtham Anandha Babu [Fri, 6 Nov 2015 04:36:30 +0000 (10:06 +0530)]
tools: Handle the common profile & service ecode

Handles the common profile and service error codes sent over the
Attribute Protocol in btgatt-client and monitor.

git repo link:
https://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=25eadc12eada033a0a918410084b739122619d62

Change-Id: I11c03d6bde29929c9fff55b8ad27597034707ad4

8 years agogatt-database: Return meaningful ecodes for ccc write 63/51263/1
Gowtham Anandha Babu [Fri, 6 Nov 2015 04:30:16 +0000 (10:00 +0530)]
gatt-database: Return meaningful ecodes for ccc write

Removed generic ATT protocol error codes and added
Common Profile and Service Error Codes.

git repo link:
https://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=b58a5e5b607cd1f537428f66ed3295bb26453e99

Change-Id: Ib0020140c46151465ef3369971362f24dadc965c

8 years agoaudio/avrcp: Assing ids when registering a player 74/49874/2
Bharat Panda [Wed, 21 Oct 2015 06:11:13 +0000 (11:41 +0530)]
audio/avrcp: Assing ids when registering a player

This gives the local player an id so when respoding to
GetFolderItem they are distinguishable.

Currently this required for further making a specific player ID
as addressed player.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=cde3bb8ab9336970036af9a7c8c2ea398c7ba626

Change-Id: I778a74e198a5f7d80187f73a6c36f948b73ddac3

8 years agoaudio/avrcp: Add support for Avaialble Player Changed 71/49871/2
Bharat Panda [Wed, 21 Oct 2015 05:37:39 +0000 (11:07 +0530)]
audio/avrcp: Add support for Avaialble Player Changed

Added AVRCP_EVENT_AVAILABLE_PLAYERS_CHANGED as supported events,
send notification on change in available players list.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=581edd089595a3a06d4c0dae78af6b0d2a4dc4af

Change-Id: I00614764531561efa8b565fe5de6d4d16627e9e6

8 years agosrc/profile: Add GoepL2CapPsm in SDP record 32/49832/1
Gowtham Anandha Babu [Tue, 20 Oct 2015 12:37:59 +0000 (18:07 +0530)]
src/profile: Add GoepL2CapPsm in SDP record

As per the MAP & PBAP v1.2 SDP table, it should contain the GoepL2CapPsm
in its SDP record. This patch adds the same.

The below test cases verifies the presence of GoepL2CapPsm attribute is
in SDP record.
TC_PSE_CON_BV_02_C - PASS
TC_MSE_CON_BV_02_C - PASS

Git repo link:
https://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=b46e6a6ad1ef3cde070b984c3b32e6f872f2f40f

Change-Id: Ia06200ce19bfdff296d96de07b4e494d56aa5513

8 years agotools/obexctl: Add support for pull Vobjects 31/49831/1
Gowtham Anandha Babu [Tue, 20 Oct 2015 12:32:09 +0000 (18:02 +0530)]
tools/obexctl: Add support for pull Vobjects

PullBusinessCard from remote push server.

[obex]# connect 00:1B:DC:07:33:4E 00001105-0000-1000-8000-00805f9b34fb
Attempting to connect to 00:1B:DC:07:33:4E
[NEW] Session /org/bluez/obex/client/session0 [default]
[NEW] ObjectPush /org/bluez/obex/client/session0
Connection successful
[00:1B:DC:07:33:4E]# pull /home/vcard.vcf
Attempting to pull /home/vcard.vcf from /org/bluez/obex/client/session0
[NEW] Transfer /org/bluez/obex/client/session0/transfer0
Transfer /org/bluez/obex/client/session0/transfer0
        Status: queued
        Size: 0
        Filename: /home/vcard.vcf
        Session: /org/bluez/obex/client/session0
[CHG] Transfer /org/bluez/obex/client/session0/transfer0 Status: complete
[DEL] Transfer /org/bluez/obex/client/session0/transfer0
[DEL] Session /org/bluez/obex/client/session0 [default]
[DEL] ObjectPush /org/bluez/obex/client/session0

Git repo link:
https://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=893144c653bb1a517d35909c78ecbbb2f5883bf0

Change-Id: I8ed6c69a72104b913e941cc8246b42b81ca4a5a3

8 years agoobexd/opp: Fix OPP GET request path 30/49830/1
Gowtham Anandha Babu [Tue, 20 Oct 2015 12:29:31 +0000 (17:59 +0530)]
obexd/opp: Fix OPP GET request path

The default path is /etc/bluetooth/vcard.vcf which obexd
is not able to access.

obexd[11654]: obexd/src/obex.c:cmd_get() session 0x64edff0
obexd[11654]: GET(0x3), (null)(0xffffffff)
obexd[11654]: obexd/src/obex.c:parse_type() TYPE: text/x-vcard
obexd[11654]: open(/etc/bluetooth/vcard.vcf): Operation not permitted (1)
obexd[11654]: GET(0x3), NOT_FOUND(0x44)

After making this path as obex root folder,
it is able to succeed.

obexd[12246]: obexd/src/obex.c:cmd_get() session 0x64ed830
obexd[12246]: GET(0x3), (null)(0xffffffff)
obexd[12246]: obexd/src/obex.c:parse_type() TYPE: text/x-vcard
obexd[12246]: obexd/src/obex.c:driver_get_headers() name=(null) type=text/x-vcard object=0x8
obexd[12246]: GET(0x3), CONTINUE(0x10)
obexd[12246]: obexd/src/obex.c:send_data() name=(null) type=text/x-vcard file=0x8 size=3061
obexd[12246]: obexd/src/obex.c:driver_read() 73 read
obexd[12246]: obexd/src/obex.c:send_data() name=(null) type=text/x-vcard file=0x8 size=3066
obexd[12246]: obexd/src/obex.c:driver_read() 0 read
obexd[12246]: obexd/src/obex.c:transfer_complete()

Git repo link:
https://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=fd524d73a3a83b8e324b14c166670e0326bc3946

Change-Id: I3a3bfca7a879af3fa19ceff17d6b4b1372949438

8 years agoMerge "shared/tester: Fix divide by zero error" into tizen
Pyun DoHyun [Fri, 16 Oct 2015 05:31:26 +0000 (22:31 -0700)]
Merge "shared/tester: Fix divide by zero error" into tizen

8 years agoshared/tester: Fix divide by zero error 27/49527/1
Gowtham Anandha Babu [Wed, 14 Oct 2015 10:37:18 +0000 (16:07 +0530)]
shared/tester: Fix divide by zero error

Before adding a check - o/p:
Total: 0, Passed: 0 (-nan%), Failed: 0, Not Run: 0

After check - o/p:
Total: 0, Passed: 0 (0.0%), Failed: 0, Not Run: 0

Git repo link:
https://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=27f39bc20ef9c8eb7a60373700fbb2a62df20a79

Change-Id: If7363fd0d43040c88ea9b8d0dff7dc32f71fe0de

8 years agotools: Fix Invalid return to player message 32/49532/1
Bharat Panda [Wed, 14 Oct 2015 07:08:40 +0000 (12:38 +0530)]
tools: Fix Invalid return to player message

Return DBUS_HANDLER_RESULT_HANDLED instead of
DBUS_HANDLER_RESULT_NOT_YET_HANDLED for player message handle.

git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=b76028a667b1a9470151d19abf19487311fbe2f7

Change-Id: I1bd4c7cba3c89daa4549ecdf113b75c3ce76f5d6
Signed-off-by: Bharat Panda <bharat.panda@samsung.com>
8 years agoModify libdir for systemd 17/46117/1 tizen_3.0.m1_mobile tizen_3.0.m1_tv accepted/tizen/mobile/20150817.134202 accepted/tizen/tv/20150817.134544 accepted/tizen/wearable/20150817.134834 submit/tizen_common/20151015.190624 submit/tizen_common/20151019.135620 submit/tizen_common/20151023.083358 submit/tizen_common/20151026.085049 submit/tizen_mobile/20150817.053139 submit/tizen_tv/20150817.053142 submit/tizen_wearable/20150817.053146 tizen_3.0.m1_mobile_release tizen_3.0.m1_tv_release tizen_3.0.m2.a1_mobile_release tizen_3.0.m2.a1_tv_release
DoHyun Pyun [Mon, 17 Aug 2015 05:19:43 +0000 (14:19 +0900)]
Modify libdir for systemd

Change-Id: I555d55d7646ffbd372599e988569e3bb15adbc67
Signed-off-by: DoHyun Pyun <dh79.pyun@samsung.com>
8 years agoFix to get the read oob data 51/45251/1 accepted/tizen/mobile/20150804.111853 accepted/tizen/tv/20150804.111945 accepted/tizen/wearable/20150804.112024 submit/tizen_mobile/20150804.063157 submit/tizen_tv/20150804.063201 submit/tizen_wearable/20150804.063204
Taejin Woo [Fri, 17 Jul 2015 11:32:53 +0000 (20:32 +0900)]
Fix to get the read oob data

Change-Id: Ia459f360eacb1c226d82e61303c892ce8110da3c
Signed-off-by: Taejin Woo <tt.woo@samsung.com>
8 years agoDisable IPSP feature 80/43880/1 accepted/tizen/mobile/20150716.010917 accepted/tizen/tv/20150716.011013 accepted/tizen/wearable/20150716.011053 submit/tizen_mobile/20150715.060622 submit/tizen_tv/20150715.060634 submit/tizen_wearable/20150715.060637
seungku kim [Wed, 15 Jul 2015 04:17:16 +0000 (13:17 +0900)]
Disable IPSP feature

6lowpan patch in kernel was not applied yet, so IPSP is disabled
until 6lowpan patch applied.

Change-Id: Ib77c34951ec82d079f18ae051c0ea2b5696c1f95

8 years agoChange the excutable path to libexec 69/43469/1 accepted/tizen/mobile/20150710.004306 accepted/tizen/tv/20150710.005534 accepted/tizen/wearable/20150710.005637 submit/tizen_mobile/20150709.114028 submit/tizen_tv/20150709.114031 submit/tizen_wearable/20150709.114035
DoHyun Pyun [Thu, 9 Jul 2015 11:38:23 +0000 (20:38 +0900)]
Change the excutable path to libexec

lib path is different with 64 bit build environment

Change-Id: I49377ab948b7e118d8e63fac920572c7282a53d1
Signed-off-by: DoHyun Pyun <dh79.pyun@samsung.com>
8 years agoApply Tizen 3.0 security policy 60/42760/1 accepted/tizen/tv/20150703.015056 accepted/tizen/wearable/20150703.015109 submit/tizen_mobile/20150702.112120 submit/tizen_tv/20150702.112124 submit/tizen_wearable/20150702.112128
Taejin Woo [Thu, 2 Jul 2015 06:34:00 +0000 (15:34 +0900)]
Apply Tizen 3.0 security policy

Change-Id: I53eed5c5e09583ccf604534c5f1dc178e95d7016
Signed-off-by: Taejin Woo <tt.woo@samsung.com>
8 years ago3.0 specific patch: change the "/usr/lib" path for 64bit build 68/41268/1 accepted/tizen/mobile/20150616.011055 accepted/tizen/tv/20150615.001241 accepted/tizen/tv/20150616.011124 accepted/tizen/wearable/20150615.001349 accepted/tizen/wearable/20150616.011152 submit/tizen_mobile/20150612.090403 submit/tizen_mobile/20150615.054440 submit/tizen_tv/20150612.090408 submit/tizen_tv/20150615.054454 submit/tizen_wearable/20150612.090412 submit/tizen_wearable/20150615.054502
seungku kim [Fri, 12 Jun 2015 06:03:55 +0000 (15:03 +0900)]
3.0 specific patch: change the "/usr/lib" path for 64bit build

32bit = /usr/lib
64bit = /usr/lib64

Change-Id: Ic4dac00db88b831e3a9ecad1404d7424f46880b1

8 years agoFix issue in merged code for Tizen 3.0 72/39872/2 submit/tizen_mobile/20150612.045738 submit/tizen_tv/20150612.045742 submit/tizen_wearable/20150612.045746
Anupam Roy [Mon, 25 May 2015 19:08:49 +0000 (15:08 -0400)]
Fix issue in merged code for Tizen 3.0

Check discovery type only if discovery complete
is successful. In case status is not success,
dereferencing rp can lead to crash.

Change-Id: I186dd9a8f02fad7e782afee1146ae391cd82b57b
Signed-off-by: Anupam Roy <anupam.r@samsung.com>
8 years agoModify systemd service option 84/40784/1 submit/tizen_mobile/20150609.051101 submit/tizen_tv/20150609.051113 submit/tizen_wearable/20150609.051121
DoHyun Pyun [Tue, 9 Jun 2015 05:05:57 +0000 (14:05 +0900)]
Modify systemd service option

After applying systemd 219 version, will modify the option again

Change-Id: I4c859c6a1fd0a4ab10f588c8246031abbf851f36
Signed-off-by: DoHyun Pyun <dh79.pyun@samsung.com>
8 years agoUpgrade Bluez 5.28 and synchronize Tizen 2.4's bluez 07/40707/2
DoHyun Pyun [Mon, 8 Jun 2015 08:17:10 +0000 (17:17 +0900)]
Upgrade Bluez 5.28 and synchronize Tizen 2.4's bluez

Change-Id: Ifaf2154ba0ab19b180946e0d92f1817a1d9ed839
Signed-off-by: DoHyun Pyun <dh79.pyun@samsung.com>
8 years agoChange SmackExecLabel to SmackProcessLabel 97/40397/1 tizen_3.0.2015.q2_common accepted/tizen/common/20150604.131151 submit/tizen_common/20150603.000219 submit/tizen_mobile/20150603.102835 submit/tizen_tv/20150603.102841 submit/tizen_wearable/20150603.102850
Maciej Wereski [Fri, 24 Apr 2015 11:45:23 +0000 (13:45 +0200)]
Change SmackExecLabel to SmackProcessLabel

Since systemd v219 Tizen-specific SmackExecLabel option was dropped in
favour of SmackProcessLabel option from upstream.

Change-Id: I7f8d48c52ad2e975400adfe5f356188aa551a842
Signed-off-by: Maciej Wereski <m.wereski@partner.samsung.com>
9 years agoEnable to build arm 64bit 91/37491/2 accepted/tizen/common/20150521.125355 accepted/tizen/mobile/20150427.052122 accepted/tizen/mobile/20150505.044756 accepted/tizen/tv/20150505.044050 submit/tizen_common/20150520.888882 submit/tizen_mobile/20150401.025613 submit/tizen_mobile/20150427.013555 submit/tizen_mobile/20150504.080911 submit/tizen_tv/20150401.025622 submit/tizen_tv/20150504.080906 submit/tizen_wearable/20150401.025628
seungku kim [Mon, 30 Mar 2015 02:12:34 +0000 (11:12 +0900)]
Enable to build arm 64bit

Change-Id: I19ad806b9da3bd445a70b5c2559802703b75e7c0

9 years agoTizen 3.0: Fix issues in the merged code 85/36885/6
Sudha Bheemanna [Mon, 16 Mar 2015 14:04:55 +0000 (19:34 +0530)]
Tizen 3.0: Fix issues in the merged code

Fixed issues in the merged code found during testing.
Removed unwanted files.

Change-Id: I978bd815bd5f52b4e1431c85750b502dcb31bd96
Signed-off-by: Sudha Bheemanna <b.sudha@samsung.com>
9 years agoApplied bluez patches present in Tizen branch. The following patches have been applied : 01/35601/1
Abhinav Kumar [Thu, 19 Feb 2015 04:15:59 +0000 (09:45 +0530)]
Applied bluez patches present in Tizen branch. The following patches have been applied :

1> bluetooth player: add searchable value to show cmd
2> add property connected for input device
3> core/service: Add btd_service_get_version
4> core/profile: Add version information to btd_profile
5> core/service: Add btd_service_set_auto_connect
6> core/service: Add btd_service_get_auto_connect
7> core/device: Use service auto_connect flag
8> profiles: Add missing local_uuid
9> core/service: Add btd_service_set_blocked
10> core/service: Add btd_service_is_blocked
11> core/profile: Add authorization UUID information to btd_profile
12> core/device: Add device_is_service_blocked
13> core/adapter: Check if service is blocked before authorizing
14> plugins: Add initial code for service plugin
15> plugins/service: Add initial code
16> Fix bluetoothd core dumped if disable bt tethering
17> Fix Security Static Code Analysis
18> Add param fd into authorize service
19> Modify the param of authorize service
20> Fix the remaining Security Static Code Analysis
21> Fix the length of string
22> Fix the remaining Security Static Code Analysis

Change-Id: I3191182d850b1252248de76d4bd8f70768230b93

9 years agoChanges for successful build after porting of Tizen 2.4 code 00/35600/1
Abhinav Kumar [Wed, 18 Feb 2015 13:16:18 +0000 (18:46 +0530)]
Changes for successful build after porting of Tizen 2.4 code

1> Copied Tizen 2.4 code in tizen branch.
2> Made changes to spec file for successful build. Also added a new file .gbs.conf.

Change-Id: I6e479759454c1978e68340a0f3541fb66b437044

9 years agoFix the Security Static Code Analysis - set the length 14/33814/1 tizen_3.0.2014.q4_common tizen_3.0.2015.q1_common tizen_3.0_ivi accepted/tizen/common/20150115.110041 accepted/tizen/ivi/20150116.003606 accepted/tizen/mobile/20150116.011331 accepted/tizen/tv/20150116.010710 accepted/tizen/wearable/20150116.010409 submit/accepted/tizen_common/20150115.102016 submit/accepted/tizen_common/20150115.102032 submit/accepted/tizen_common/20150115.102428 submit/accepted/tizen_common/20150115.102714 submit/tizen/20150115.102847 submit/tizen/20150115.103005 tizen_3.0_ivi_release
wu zheng [Thu, 15 Jan 2015 09:42:17 +0000 (17:42 +0800)]
Fix the Security Static Code Analysis - set the length

Fix null terminated issues need to set length+1.

Change-Id: I239c424dc47d6578f2d5845aeff1e88821fd5ff2
Signed-off-by: Wu Zheng <wu.zheng@intel.com>
9 years agoFix the error array value overflow 99/33799/1 submit/accepted/tizen_common/20150115.053946 submit/tizen/20150115.100801
wu zheng [Thu, 15 Jan 2015 05:23:24 +0000 (13:23 +0800)]
Fix the error array value overflow

The array value overflow in the print function of hcitool.c.
Fix it.

Change-Id: Ic920df935cffc1a4d192244adaaa86ec68fcd203
Signed-off-by: Wu Zheng <wu.zheng@intel.com>
9 years agoFix the remaining Security Static Code Analysis 28/33728/1 accepted/tizen/common/20150114.145919 accepted/tizen/ivi/20150115.062849 accepted/tizen/mobile/20150115.021557 accepted/tizen/tv/20150115.004531 accepted/tizen/wearable/20150115.004810 submit/tizen/20150114.083556
wu zheng [Wed, 14 Jan 2015 08:20:30 +0000 (16:20 +0800)]
Fix the remaining Security Static Code Analysis

the latest item of array need to be set to 0.

Change-Id: Ibd2ed22830101a664545a949579423f59aa5517c
Signed-off-by: Wu Zheng <wu.zheng@intel.com>
9 years agoMerge "Fix the length of string" into tizen submit/tizen/20150114.072658
wu zheng [Wed, 14 Jan 2015 07:25:38 +0000 (23:25 -0800)]
Merge "Fix the length of string" into tizen

9 years agoFix the length of string 22/33722/1
wu zheng [Wed, 14 Jan 2015 07:13:47 +0000 (15:13 +0800)]
Fix the length of string

When string is char *, the length need to be set.

Change-Id: I8659442afe939af56ca0fe224cf145012197e8ba
Signed-off-by: Wu Zheng <wu.zheng@intel.com>
9 years agoMerge "Fix the remaining Security Static Code Analysis" into tizen submit/tizen/20150114.072143
wu zheng [Wed, 14 Jan 2015 07:09:04 +0000 (23:09 -0800)]
Merge "Fix the remaining Security Static Code Analysis" into tizen

9 years agoFix the remaining Security Static Code Analysis 21/33721/1
wu zheng [Wed, 14 Jan 2015 06:59:23 +0000 (14:59 +0800)]
Fix the remaining Security Static Code Analysis

Fix Bug-Tizen: TC-2072

Change-Id: I05bded3b341d718a5d44950923dd7fcc30a520c2
Signed-off-by: Wu Zheng <wu.zheng@intel.com>
9 years agoRevert "core: Fix unnecessary calls to agent_cancel()" 11/33711/2
Luiz Augusto von Dentz [Tue, 28 Oct 2014 11:31:26 +0000 (13:31 +0200)]
Revert "core: Fix unnecessary calls to agent_cancel()"

agent_cancel calls are necessary since agent_unref only call it in case
the last reference is dropped.

Taken from upstream:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=a67b0480a2c45b0d11e4db4142fc95fb36287dda

Change-Id: Ie50bc59bdb33ea7e711c4ae244c7dcf8c83c0b47
Signed-off-by: Changlong Xie <changlongx.xie@intel.com>
9 years agoobexd/client: Add support for MAP Event Report 1.1 48/32948/1 accepted/tizen/common/20150106.082126 accepted/tizen/ivi/20150112.091102 accepted/tizen/mobile/20150106.115704 accepted/tizen/tv/20150106.115522 accepted/tizen/wearable/20150106.115554 submit/tizen/20150105.030815
Gowtham Anandha Babu [Tue, 30 Dec 2014 14:26:57 +0000 (19:56 +0530)]
obexd/client: Add support for MAP Event Report 1.1

This adds support for Event Report 1.1 of MAP 1.2 which includes the
following atributes: Subject, datetime, sender_name, priority.

Adds null check for event values and fix leaking memory on event attributes.

Taken from upstream:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=bb57098100a9f47b1a0f6e2be8aa0a85a2d33384
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=60ebd27931f2f9241e1ddad521af36c0ed991524
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=7e03d3d92f726176718d855b771c95702726014c

Change-Id: If007c3fb03cfc36295e7424e6585f96b4a09010f

9 years agoobexd: Fix the double check for agent 37/32237/1
Gowtham Anandha Babu [Wed, 17 Dec 2014 05:55:49 +0000 (11:25 +0530)]
obexd: Fix the double check for agent

Removes the check for NULL agent.

Git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=cf5361615e4bf2468fe963f690b2c398071e215f

Change-Id: I5c0ab31c1b36de6007cb01ffe688aeafb4c6cebf

9 years agoobexd/client/map: Check msg value is valid 34/32234/1
Gowtham Anandha Babu [Wed, 17 Dec 2014 05:48:50 +0000 (11:18 +0530)]
obexd/client/map: Check msg value is valid

Checks for NULL value before passing to the callback.

Git repo link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=621861cd84d6f4522b35b16b10a347e733808dda

Change-Id: I8927ea737cca05e8025b3d987e7557d259b58027

9 years agotools/sdptool: Add support for MAP service 88/32088/1
Gowtham Anandha Babu [Mon, 15 Dec 2014 13:26:59 +0000 (18:56 +0530)]
tools/sdptool: Add support for MAP service

Add support for MAP service in local SDP server.

The MAP MAS record captured in local SDP server:

Service Name: OBEX Message Access Server
Service RecHandle: 0x1000e
Service Class ID List:
  "Message Access - MAS" (0x1132)
Protocol Descriptor List:
  "L2CAP" (0x0100)
  "RFCOMM" (0x0003)
    Channel: 17
  "OBEX" (0x0008)
Profile Descriptor List:
  "Message Access" (0x1134)
    Version: 0x0100

Now we are able to do sdptool search/add/del/get
for MAP service.

upstream git link:
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=fce2b49e318a88ab875028561c47e7563d46523e

Change-Id: Ia8251c956d1f7c5176a1ccca6b8409946a0952d4

9 years agoModify the param of authorize service 32/31932/1 accepted/tizen/common/20141218.123503 accepted/tizen/ivi/20141220.084236 accepted/tizen/mobile/20141221.092610 accepted/tizen/tv/20141219.005448 accepted/tizen/wearable/20141221.092543 submit/tizen/20141215.054609
wu zheng [Fri, 12 Dec 2014 09:08:50 +0000 (17:08 +0800)]
Modify the param of authorize service

NTB need to match the current of Bluetooth-Frwk.
Therefore, the param of authorize service is modified.
The test program need to be modified too.

Change-Id: I0d6a17d27f800bbbc112e40c1d113c4907b162dc
Signed-off-by: Wu Zheng <wu.zheng@intel.com>
9 years agotools/hciattach: Fix syntax error 17/31617/1 accepted/tizen/common/20141209.075734 accepted/tizen/mobile/20141216.074917 accepted/tizen/tv/20141210.193138 accepted/tizen/wearable/20141210.135901 submit/tizen/20141209.051932
Gowtham Anandha Babu [Mon, 8 Dec 2014 05:39:45 +0000 (11:09 +0530)]
tools/hciattach: Fix syntax error

This error may not be shown during normal compilation, because of
ifdef. Fixed the same.

Change-Id: I7cafed0387c43caecf6bbb866283c13954a1bac8

9 years agotools/csr_usb: Fix resource leak 46/31546/1
Gowtham Anandha Babu [Fri, 5 Dec 2014 13:56:28 +0000 (19:26 +0530)]
tools/csr_usb: Fix resource leak

File opened with fopen() should be
closed by fclose().

Change-Id: I35b96e4087c0a51c6027bd6236543915039d7ebb

9 years agoobexd/client: Fix crash while disconnecting 56/31256/1 accepted/tizen/common/20141205.181642 accepted/tizen/mobile/20141208.023444 submit/tizen/20141204.061729
wu zheng [Wed, 3 Dec 2014 09:45:34 +0000 (17:45 +0800)]
obexd/client: Fix crash while disconnecting

In case the transport is disconnected while disconnect command is pending
the session is freed on disconnect_complete but disconnect callback is
still valid causing the following crash:

Invalid read of size 4
at 0x42682A: obc_session_ref (session.c:132)
by 0x42797B: obc_session_shutdown (session.c:580)
by 0x4139DA: incoming_data (gobex.c:1406)
by 0x59712A5: g_main_context_dispatch (in /usr/lib64/libglib-2.0.so.0.3800.2)
by 0x5971627: ??? (in /usr/lib64/libglib-2.0.so.0.3800.2)
by 0x5971A39: g_main_loop_run (in /usr/lib64/libglib-2.0.so.0.3800.2)
by 0x40D78C: main (main.c:320)
Address 0x728d814 is 4 bytes inside a block of size 120 free'd
at 0x4C28577: free (in /usr/lib64/valgrind/vgpreload_memcheck-amd64-linux.so)
by 0x5976F7E: g_free (in /usr/lib64/libglib-2.0.so.0.3800.2)
by 0x4134B9: handle_response (gobex.c:1129)
by 0x4139BD: incoming_data (gobex.c:1403)
by 0x59712A5: g_main_context_dispatch (in /usr/lib64/libglib-2.0.so.0.3800.2)
by 0x5971627: ??? (in /usr/lib64/libglib-2.0.so.0.3800.2)
by 0x5971A39: g_main_loop_run (in /usr/lib64/libglib-2.0.so.0.3800.2)
by 0x40D78C: main (main.c:320)

The patch comes from upstream:
commit ID 765fc36308c8d806a597bb9eae13bdff82e081d8

Change-Id: Id2abc28533d6312c791ec8b9880a4073db529e31
Signed-off-by: Wu Zheng <wu.zheng@intel.com>
9 years agoMerge "Fix Security Static Code Analysis Bug-Tizen: TC-2072" into tizen accepted/tizen/common/20141124.170312 accepted/tizen/ivi/20141204.033203 accepted/tizen/mobile/20141128.101138 submit/tizen/20141124.114031 submit/tizen_ivi/20141201.222222
wu zheng [Mon, 24 Nov 2014 11:37:46 +0000 (03:37 -0800)]
Merge "Fix Security Static Code Analysis Bug-Tizen: TC-2072" into tizen

9 years agoAdd param fd into authorize service 84/30684/1
Gu Chaojie [Tue, 1 Jul 2014 02:51:59 +0000 (10:51 +0800)]
Add param fd into authorize service

Change-Id: I138b1a9f1e8fca2530d443d461d961a13727bafa
Signed-off-by: Gu Chaojie <chao.jie.gu@intel.com>
9 years agoFix Security Static Code Analysis 61/30561/2
Gu Chaojie [Sat, 22 Nov 2014 01:12:51 +0000 (09:12 +0800)]
Fix Security Static Code Analysis
Bug-Tizen: TC-2072

Change-Id: I7e92d05aca928992f185e402d6b3fffd0419584c
Signed-off-by: Gu Chaojie <chao.jie.gu@intel.com>
9 years agoFix bluetoothd core dumped if disable bt tethering. 75/29975/1 accepted/tizen/common/20141107.142341 accepted/tizen/ivi/20141112.024246 submit/tizen/20141107.030536 submit/tizen_mobile/20141120.000000
wu zheng [Thu, 6 Nov 2014 09:54:26 +0000 (17:54 +0800)]
Fix bluetoothd core dumped if disable bt tethering.

If the remote device connected with the current device
and the connection is tethering,
disable bt tethering in the current device,
it results in bluetoothd core dumped.

The related values aren't protected, it results in it.
The patch fixed the issue of TC-1988.

Change-Id: I7ae5d80712c4d9626602e011f9f66ccb992629b4
Signed-off-by: Wu Zheng <wu.zheng@intel.com>
9 years agoEnable GENIVI service plugin API accepted/tizen_3.0.2014.q3_common accepted/tizen_3.0.m14.3_ivi protex_M14.4 sandbox/mythi/devel tizen_3.0.2014.q3_common tizen_3.0.m14.3_ivi accepted/tizen/common/20140930.092521 accepted/tizen/ivi/20141001.180631 submit/tizen/20140930.034120 tizen_3.0.2014.q3_common_release tizen_3.0.m14.3_ivi_release
Mikko Ylinen [Tue, 23 Sep 2014 18:53:12 +0000 (21:53 +0300)]
Enable GENIVI service plugin API

A separate service API is needed by GENIVI compliance. This patch
enables it. However, install it to a separate plugins library.

Signed-off-by: Mikko Ylinen <mikko.ylinen@intel.com>
9 years agoplugins/service: Add Blocked property
Luiz Augusto von Dentz [Sat, 8 Feb 2014 12:46:18 +0000 (14:46 +0200)]
plugins/service: Add Blocked property

9 years agoplugins/service: Add AutoConnect property
Luiz Augusto von Dentz [Fri, 7 Feb 2014 14:56:41 +0000 (16:56 +0200)]
plugins/service: Add AutoConnect property

9 years agoplugins/service: Add Version property
Luiz Augusto von Dentz [Fri, 7 Feb 2014 14:04:32 +0000 (16:04 +0200)]
plugins/service: Add Version property

9 years agoplugins/service: Add Device property
Luiz Augusto von Dentz [Tue, 28 Jan 2014 17:43:53 +0000 (09:43 -0800)]
plugins/service: Add Device property

9 years agoplugins/service: Add implemention of .Disconnect method
Luiz Augusto von Dentz [Mon, 6 Jan 2014 15:11:43 +0000 (17:11 +0200)]
plugins/service: Add implemention of .Disconnect method

9 years agoplugins/service: Add implemention of .Connect method
Luiz Augusto von Dentz [Mon, 6 Jan 2014 14:59:36 +0000 (16:59 +0200)]
plugins/service: Add implemention of .Connect method

9 years agoplugins/service: Add LocalUUID property
Luiz Augusto von Dentz [Mon, 6 Jan 2014 14:19:39 +0000 (16:19 +0200)]
plugins/service: Add LocalUUID property

9 years agoplugins/service: Add RemoteUUID property
Luiz Augusto von Dentz [Mon, 6 Jan 2014 14:13:49 +0000 (16:13 +0200)]
plugins/service: Add RemoteUUID property

9 years agoplugins/service: Add State property
Luiz Augusto von Dentz [Mon, 6 Jan 2014 14:02:27 +0000 (16:02 +0200)]
plugins/service: Add State property

9 years agoplugins/service: Add initial code
Luiz Augusto von Dentz [Sun, 5 Jan 2014 17:08:29 +0000 (19:08 +0200)]
plugins/service: Add initial code

Add initial code that creates service objects data.

9 years agoplugins: Add initial code for service plugin
Luiz Augusto von Dentz [Sun, 5 Jan 2014 16:02:56 +0000 (18:02 +0200)]
plugins: Add initial code for service plugin

This plugin will be used to control services individually.

9 years agocore/adapter: Check if service is blocked before authorizing
Luiz Augusto von Dentz [Sat, 8 Feb 2014 12:39:35 +0000 (14:39 +0200)]
core/adapter: Check if service is blocked before authorizing

This add a call to device_is_service_blocked before authorizing a
connection.

9 years agocore/device: Add device_is_service_blocked
Luiz Augusto von Dentz [Sat, 8 Feb 2014 12:37:20 +0000 (14:37 +0200)]
core/device: Add device_is_service_blocked

This adds device_is_service_blocked which can be used to check if a
service is currently blocked.

9 years agocore/profile: Add authorization UUID information to btd_profile
Luiz Augusto von Dentz [Sat, 8 Feb 2014 12:15:33 +0000 (14:15 +0200)]
core/profile: Add authorization UUID information to btd_profile

This is necessary since some profiles may use different UUID for
authorization.

9 years agocore/service: Add btd_service_is_blocked
Luiz Augusto von Dentz [Sat, 8 Feb 2014 11:52:45 +0000 (13:52 +0200)]
core/service: Add btd_service_is_blocked

9 years agocore/service: Add btd_service_set_blocked
Luiz Augusto von Dentz [Sat, 8 Feb 2014 11:49:50 +0000 (13:49 +0200)]
core/service: Add btd_service_set_blocked

9 years agoprofiles: Add missing local_uuid
Luiz Augusto von Dentz [Fri, 7 Feb 2014 13:56:22 +0000 (15:56 +0200)]
profiles: Add missing local_uuid

9 years agocore/device: Use service auto_connect flag
Luiz Augusto von Dentz [Fri, 7 Feb 2014 14:28:36 +0000 (16:28 +0200)]
core/device: Use service auto_connect flag

This make use of service auto_connect flag to determine if the service
should be included in the list to be connected.

9 years agocore/service: Add btd_service_get_auto_connect
Luiz Augusto von Dentz [Fri, 7 Feb 2014 14:28:08 +0000 (16:28 +0200)]
core/service: Add btd_service_get_auto_connect

9 years agocore/service: Add btd_service_set_auto_connect
Luiz Augusto von Dentz [Fri, 7 Feb 2014 14:24:53 +0000 (16:24 +0200)]
core/service: Add btd_service_set_auto_connect

9 years agocore/service: Return required version in btd_service_get_version
Luiz Augusto von Dentz [Fri, 7 Feb 2014 13:42:51 +0000 (15:42 +0200)]
core/service: Return required version in btd_service_get_version

This makes btd_service_get_version check both local and remote version
and return the required version that the service should operate.

9 years agocore/profile: Add version information to btd_profile
Luiz Augusto von Dentz [Fri, 7 Feb 2014 13:40:06 +0000 (15:40 +0200)]
core/profile: Add version information to btd_profile

9 years agocore/service: Add btd_service_get_version
Luiz Augusto von Dentz [Fri, 7 Feb 2014 13:23:52 +0000 (15:23 +0200)]
core/service: Add btd_service_get_version

This adds btd_service_get_version which can be use to query service
version.

9 years agocore: Make device_get_path public
Luiz Augusto von Dentz [Mon, 6 Jan 2014 09:38:37 +0000 (11:38 +0200)]
core: Make device_get_path public

This renames device_get_path to btd_device_get_path so external plugin
can use of it as well.

9 years agofix obex systemd service to support multiuser 15/26215/2 accepted/tizen/ivi/20140902.081022 submit/tizen/20140822.031654
tony [Tue, 19 Aug 2014 09:01:52 +0000 (17:01 +0800)]
fix obex systemd service to support multiuser

This created obex root directory before runing obexd
if the directory does not exist.
Adding a shell script to handle this.

Bug-Tizen: TC-1436

Change-Id: I84d678b738c1ebca8966f4bbe123004a4d38e9bb
Signed-off-by: chunqiangx <chunqiangx.tang@intel.com>
9 years agofix obex systemd service to support multiuser 74/25474/1
Corentin Lecouvey [Tue, 5 Aug 2014 14:46:44 +0000 (16:46 +0200)]
fix obex systemd service to support multiuser

This allows to run an obexd daemon per user and set obex root directory
according to home user directory.

Bug-Tizen: TC-1436

Change-Id: I3c7c1da11269bd3d7ab2502e49a370e24588de3a
Signed-off-by: Corentin Lecouvey <corentin.lecouvey@open.eurogiciel.org>
9 years agoadd NAP network disconnect signal 77/23177/1
Gu Chaojie [Thu, 19 Jun 2014 02:02:53 +0000 (10:02 +0800)]
add NAP network disconnect signal

Change-Id: Ib869d38a192d9848581940538c91e8ede881d135
Signed-off-by: Gu Chaojie <chao.jie.gu@intel.com>
9 years agoadd input connect signal 48/22748/2 tizen_3.0.m14.2_ivi accepted/tizen/ivi/20140623.084947 submit/tizen/20140613.101940 submit/tizen_ivi/20140618.000000 submit/tizen_ivi/20140618.000001 submit/tizen_ivi/20140618.000002 submit/tizen_ivi/20140618.000003 submit/tizen_ivi/20140619.000000 submit/tizen_ivi/20140622.000000 submit/tizen_ivi/20140623.000000 tizen_3.0.m14.2_ivi_release
Gu Chaojie [Wed, 11 Jun 2014 08:13:44 +0000 (16:13 +0800)]
add input connect signal

Change-Id: Ife36b2531a588ff458f39fdffcdead52e745109a
Signed-off-by: Gu Chaojie <chao.jie.gu@intel.com>
9 years agoAdd NAP network signal accepted/tizen/ivi/20140613.100145 submit/tizen/20140610.094033
wu zheng [Tue, 10 Jun 2014 07:58:10 +0000 (03:58 -0400)]
Add NAP network signal

The patch exists in the bluez-5.12 tizen version.
Bluetooth-Frwk need the signal to notify the upper app.

Change-Id: I584a80c7d3970e6e85f3f143a861ae2ca559057f
Signed-off-by: Wu Zheng <wu.zheng@intel.com>
9 years agoadd property connected for input device 93/22593/1 submit/tizen/20140610.073017
Gu Chaojie [Mon, 9 Jun 2014 06:26:29 +0000 (14:26 +0800)]
add property connected for input device

Change-Id: I2bf22547f81e9a832861e31435d32297e87d4f89
Signed-off-by: Gu Chaojie <chao.jie.gu@intel.com>
9 years agoprofiles/audio: Fix propagation of EHOSTDOWN error 41/22541/1 submit/tizen/20140606.095742
Andrzej Kaczmarek [Wed, 4 Jun 2014 15:14:45 +0000 (17:14 +0200)]
profiles/audio: Fix propagation of EHOSTDOWN error

EHOSTDOWN error is now overwritten by EIO and once it's passed to
device_profile_connected it triggers connection of another profiles
while it should actually stop connecting them.

Change-Id: I2a2f802c582214170f7a2c8d89a550c72d07efab
Signed-off-by: Sebastian Chlad <sebastianx.chlad@intel.com>
9 years agocore: Fix cleaning pending services when ACL connection failed 40/22540/1
Andrzej Kaczmarek [Wed, 4 Jun 2014 15:14:44 +0000 (17:14 +0200)]
core: Fix cleaning pending services when ACL connection failed

In case ACL connection failed to establish, all pending services shall
be always removed. At the moment it's only done in case there's pending
Connect message which does not take into account reconnect scenario,
i.e. service connection was triggered by reconnection timeout and there
is no pending message.

In such case, when reconnection failed there will be some services on
pending list and subsequent reconnect attempts will fail with EBUSY
immediately.

Change-Id: I785bd791c8623a4452310d410e3dbb524e9976ec
Signed-off-by: Sebastian Chlad <sebastianx.chlad@intel.com>
9 years agopackaging: Add gatttool to bluez-test 38/22538/1
Sebastian Chlad [Thu, 5 Jun 2014 14:08:35 +0000 (16:08 +0200)]
packaging: Add gatttool to bluez-test

Change-Id: Ibb1714c7b774e106deaffcc3d08e3ccdda9f8493
Signed-off-by: Sebastian Chlad <sebastianx.chlad@intel.com>
9 years agopackaging: Add bluemoon to bluez.spec submit/tizen/20140605.113613
Sebastian Chlad [Tue, 27 May 2014 12:22:08 +0000 (14:22 +0200)]
packaging: Add bluemoon to bluez.spec

9 years agoUpdate BlueZ version to 5.19
Sebastian Chlad [Tue, 27 May 2014 10:06:14 +0000 (12:06 +0200)]
Update BlueZ version to 5.19

9 years ago[Bluez] enable bluez for mobile environment
seungku kim [Fri, 28 Mar 2014 06:17:11 +0000 (15:17 +0900)]
[Bluez] enable bluez for mobile environment

1. BROADCOM patchs are applied.
2. hciconfig, hciattach, hcitool, hcidump are changed.

Change-Id: Ia8944ec576830308212b6d7a637152042a9be931
Signed-off-by: seungku kim <seungku.kim@samsung.com>