From patchwork Wed Nov 11 23:04:12 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luiz Augusto von Dentz X-Patchwork-Id: 11898821 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.6 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 313CDC388F9 for ; Thu, 12 Nov 2020 01:49:03 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 78E8D2076E for ; Thu, 12 Nov 2020 01:49:02 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="C5lVrfqj" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728530AbgKLBdC (ORCPT ); Wed, 11 Nov 2020 20:33:02 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57540 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727714AbgKKXE2 (ORCPT ); Wed, 11 Nov 2020 18:04:28 -0500 Received: from mail-pl1-x632.google.com (mail-pl1-x632.google.com [IPv6:2607:f8b0:4864:20::632]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 50D9BC0613D6 for ; Wed, 11 Nov 2020 15:04:28 -0800 (PST) Received: by mail-pl1-x632.google.com with SMTP id g11so1744091pll.13 for ; Wed, 11 Nov 2020 15:04:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=3yEDrCb1EBm4kbqOZCm/GZx8XbFSYSJgbEEeacRC6V4=; b=C5lVrfqjl5wo/6kqLG2VUb0EZ3ciCctlHFwT4kLTipXpGJ6oWS8U/Bf5z3kVspwsYV lCUn8b/+AjUm+7IyJYqn+thCf97XqprpOj16q1vxQPnhaSiBYYnhMYay6DqulVKsOKtq 4X8KAOMgd75tUQ2ZBdPkyaKsMTerse7zIyRmlKGL6hkzYmH9Jr6EuDJXoi1to4EjnON2 lxM+DVTl0k/wv7ct1gVl+tNqd4dWPdCElVqQlFJZp3TXpbyY/5mEgiSyIVGkUpwCC16G UM8AhBo7ZvVa79kLmefHTdPOtX2OEej8d1MATZV9mdgYftMIlETR6APc98W48/VfSZH9 KL0g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=3yEDrCb1EBm4kbqOZCm/GZx8XbFSYSJgbEEeacRC6V4=; b=PMm1pTWVVivonPz1JLuwrUwTW3RUJfDBYHaMl+sptUldXKKh99EQV4mZGeMRpF3TZ2 2Mgl/pL8buF9kCbNlgLMeDFbrpg90cbthUG86NK4agVPBzsQyg62lj88dempF31zkwVy oswqHvDy/5hNLeMjEBpL323Zc9RPdJQa4ukdJcJG2G8vpCZ0vy3kXQZnVSKN+6MUWJXW UGUOOq7fxmOdBcH/AAkNMls6/sxMGKz6aV7aE46pUz5KUfExbKvtvkGNDfEXW/qVqNA+ inCi0gjGYcoh9H6GGyFAMHBgXalwiDynu/EqTC8pzXMeioETzC8/NHxJgofKCFFMDsZV Qzew== X-Gm-Message-State: AOAM533PB1gMUfAXhwe7mmIzjv95OfZJJxJL2giBBewjBHTXc5sfXBuM DIntZ7GESSG+fOKyqlXw3jxqLPb7jcPoHw== X-Google-Smtp-Source: ABdhPJz3nVtp+wy5jMkGxT1Ewm2w70Mgv8jA3J+ANv+oe7ICBbjl8JM0Rpz5dJY5N2Iu4xtvggVsKA== X-Received: by 2002:a17:902:ed52:b029:d7:d0af:f89f with SMTP id y18-20020a170902ed52b02900d7d0aff89fmr20052689plb.26.1605135866054; Wed, 11 Nov 2020 15:04:26 -0800 (PST) Received: from localhost.localdomain (c-71-56-157-77.hsd1.or.comcast.net. [71.56.157.77]) by smtp.gmail.com with ESMTPSA id n27sm3867767pfq.59.2020.11.11.15.04.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 15:04:25 -0800 (PST) From: Luiz Augusto von Dentz To: linux-bluetooth@vger.kernel.org Subject: [PATCH v2 01/10] btdev: Rework command handling Date: Wed, 11 Nov 2020 15:04:12 -0800 Message-Id: <20201111230421.3364932-2-luiz.dentz@gmail.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201111230421.3364932-1-luiz.dentz@gmail.com> References: <20201111230421.3364932-1-luiz.dentz@gmail.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Luiz Augusto von Dentz This create command tables per version/supported command bits to make it easier to keep them in sync. --- emulator/btdev.c | 6985 +++++++++++++++++++++++++--------------------- 1 file changed, 3834 insertions(+), 3151 deletions(-) diff --git a/emulator/btdev.c b/emulator/btdev.c index a36493346..05604a9c9 100644 --- a/emulator/btdev.c +++ b/emulator/btdev.c @@ -20,6 +20,7 @@ #include #include #include +#include #include "lib/bluetooth.h" #include "lib/hci.h" @@ -36,6 +37,7 @@ #define ACL_HANDLE 42 #define ISO_HANDLE 44 +#define SCO_HANDLE 257 struct hook { btdev_hook_func handler; @@ -89,6 +91,7 @@ struct btdev { uint8_t random_addr[6]; uint8_t le_features[8]; uint8_t le_states[8]; + const struct btdev_cmd *cmds; uint16_t default_link_policy; uint8_t event_mask[8]; @@ -271,25 +274,1804 @@ static void get_bdaddr(uint16_t id, uint8_t index, uint8_t *bdaddr) bdaddr[5] = 0x00; } +struct btdev_cmd { + uint16_t opcode; + int (*func)(struct btdev *dev, const void *data, uint8_t len); + int (*complete)(struct btdev *dev, const void *data, uint8_t len); +}; + +#define CMD(_opcode, _func, _complete) \ + { \ + .opcode = _opcode, \ + .func = _func, \ + .complete = _complete, \ + } + +static void send_packet(struct btdev *btdev, const struct iovec *iov, + int iovlen) +{ + int i; + + if (!btdev->send_handler) + return; + + for (i = 0; i < iovlen; i++) { + if (!i) + util_hexdump('<', iov[i].iov_base, iov[i].iov_len, + btdev->debug_callback, btdev->debug_data); + else + util_hexdump(' ', iov[i].iov_base, iov[i].iov_len, + btdev->debug_callback, btdev->debug_data); + } + + btdev->send_handler(iov, iovlen, btdev->send_data); +} + +static void send_cmd(struct btdev *btdev, uint8_t evt, uint16_t opcode, + const struct iovec *iov, int iovlen) +{ + struct bt_hci_evt_hdr hdr; + struct iovec iov2[2 + iovlen]; + uint8_t pkt = BT_H4_EVT_PKT; + int i; + + util_debug(btdev->debug_callback, btdev->debug_data, + "event 0x%02x opcode 0x%04x", evt, opcode); + + iov2[0].iov_base = &pkt; + iov2[0].iov_len = sizeof(pkt); + + hdr.evt = evt; + hdr.plen = 0; + + iov2[1].iov_base = &hdr; + iov2[1].iov_len = sizeof(hdr); + + for (i = 0; i < iovlen; i++) { + hdr.plen += iov[i].iov_len; + iov2[2 + i].iov_base = iov[i].iov_base; + iov2[2 + i].iov_len = iov[i].iov_len; + } + + if (run_hooks(btdev, BTDEV_HOOK_POST_CMD, opcode, iov[i -1].iov_base, + iov[i -1].iov_len)) + send_packet(btdev, iov2, 2 + iovlen); +} + +static void cmd_complete(struct btdev *btdev, uint16_t opcode, + const void *data, uint8_t len) +{ + struct bt_hci_evt_cmd_complete cc; + struct iovec iov[2]; + + cc.ncmd = 0x01; + cc.opcode = cpu_to_le16(opcode); + + iov[0].iov_base = &cc; + iov[0].iov_len = sizeof(cc); + + iov[1].iov_base = (void *) data; + iov[1].iov_len = len; + + send_cmd(btdev, BT_HCI_EVT_CMD_COMPLETE, opcode, iov, 2); +} + +static int cmd_set_event_mask(struct btdev *dev, const void *data, uint8_t len) +{ + const struct bt_hci_cmd_set_event_mask *cmd = data; + uint8_t status; + + memcpy(dev->event_mask, cmd->mask, 8); + status = BT_HCI_ERR_SUCCESS; + + cmd_complete(dev, BT_HCI_CMD_SET_EVENT_MASK, &status, sizeof(status)); + + return 0; +} + +static void btdev_reset(struct btdev *btdev) +{ + /* FIXME: include here clearing of all states that should be + * cleared upon HCI_Reset + */ + + btdev->le_scan_enable = 0x00; + btdev->le_adv_enable = 0x00; +} + +static int cmd_reset(struct btdev *dev, const void *data, uint8_t len) +{ + uint8_t status; + + btdev_reset(dev); + status = BT_HCI_ERR_SUCCESS; + + cmd_complete(dev, BT_HCI_CMD_RESET, &status, sizeof(status)); + + return 0; +} + +static int cmd_read_local_version(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_local_version rsp; + + memset(&rsp, 0, sizeof(rsp)); + + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.hci_ver = dev->version; + rsp.hci_rev = cpu_to_le16(dev->revision); + rsp.lmp_ver = dev->version; + rsp.manufacturer = cpu_to_le16(dev->manufacturer); + rsp.lmp_subver = cpu_to_le16(dev->revision); + + cmd_complete(dev, BT_HCI_CMD_READ_LOCAL_VERSION, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_read_local_commands(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_local_commands rsp; + + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.commands, dev->commands, 64); + + cmd_complete(dev, BT_HCI_CMD_READ_LOCAL_COMMANDS, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_read_local_features(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_local_features rsp; + + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.features, dev->features, 8); + + cmd_complete(dev, BT_HCI_CMD_READ_LOCAL_FEATURES, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_read_buffer_size(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_buffer_size rsp; + + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.acl_mtu = cpu_to_le16(dev->acl_mtu); + rsp.sco_mtu = 0; + rsp.acl_max_pkt = cpu_to_le16(dev->acl_max_pkt); + rsp.sco_max_pkt = cpu_to_le16(0); + + cmd_complete(dev, BT_HCI_CMD_READ_BUFFER_SIZE, &rsp, sizeof(rsp)); + + return 0; +} + +#define CMD_COMMON_ALL \ + CMD(BT_HCI_CMD_SET_EVENT_MASK, cmd_set_event_mask, NULL), \ + CMD(BT_HCI_CMD_RESET, cmd_reset, NULL), \ + CMD(BT_HCI_CMD_READ_LOCAL_VERSION, cmd_read_local_version, NULL), \ + CMD(BT_HCI_CMD_READ_LOCAL_COMMANDS, cmd_read_local_commands, NULL), \ + CMD(BT_HCI_CMD_READ_LOCAL_FEATURES, cmd_read_local_features, NULL), \ + CMD(BT_HCI_CMD_READ_BUFFER_SIZE, cmd_read_buffer_size, NULL) + static void set_common_commands_all(struct btdev *btdev) { - btdev->commands[5] |= 0x40; /* Set Event Mask */ - btdev->commands[5] |= 0x80; /* Reset */ - btdev->commands[14] |= 0x08; /* Read Local Version */ - btdev->commands[14] |= 0x10; /* Read Local Supported Commands */ - btdev->commands[14] |= 0x20; /* Read Local Supported Features */ - btdev->commands[14] |= 0x80; /* Read Buffer Size */ + btdev->commands[5] |= 0x40; /* Set Event Mask */ + btdev->commands[5] |= 0x80; /* Reset */ + btdev->commands[14] |= 0x08; /* Read Local Version */ + btdev->commands[14] |= 0x10; /* Read Local Supported Commands */ + btdev->commands[14] |= 0x20; /* Read Local Supported Features */ + btdev->commands[14] |= 0x80; /* Read Buffer Size */ +} + +static void cmd_status(struct btdev *btdev, uint8_t status, uint16_t opcode) +{ + struct bt_hci_evt_cmd_status cs; + struct iovec iov; + + cs.status = status; + cs.ncmd = 0x01; + cs.opcode = cpu_to_le16(opcode); + + iov.iov_base = &cs; + iov.iov_len = sizeof(cs); + + send_cmd(btdev, BT_HCI_EVT_CMD_STATUS, opcode, &iov, 1); +} + +static int cmd_disconnect(struct btdev *dev, const void *data, uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_DISCONNECT); + + return 0; +} + +static void send_event(struct btdev *btdev, uint8_t event, + const void *data, uint8_t len) +{ + struct bt_hci_evt_hdr hdr; + struct iovec iov[3]; + uint8_t pkt = BT_H4_EVT_PKT; + + util_debug(btdev->debug_callback, btdev->debug_data, + "event 0x%02x", event); + + iov[0].iov_base = &pkt; + iov[0].iov_len = sizeof(pkt); + + hdr.evt = event; + hdr.plen = len; + + iov[1].iov_base = &hdr; + iov[1].iov_len = sizeof(hdr); + + if (len > 0) { + iov[2].iov_base = (void *) data; + iov[2].iov_len = len; + } + + if (run_hooks(btdev, BTDEV_HOOK_POST_EVT, event, data, len)) + send_packet(btdev, iov, len > 0 ? 3 : 2); +} + +static int cmd_disconnect_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_disconnect *cmd = data; + struct bt_hci_evt_disconnect_complete rsp; + struct btdev *remote = dev->conn; + + memset(&rsp, 0, sizeof(rsp)); + + if (!remote) { + rsp.status = BT_HCI_ERR_UNKNOWN_CONN_ID; + rsp.handle = cpu_to_le16(cmd->handle); + rsp.reason = 0x00; + + send_event(dev, BT_HCI_EVT_DISCONNECT_COMPLETE, &rsp, + sizeof(rsp)); + return 0; + } + + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.handle = cpu_to_le16(cmd->handle); + rsp.reason = cmd->reason; + + if (rsp.handle == ACL_HANDLE) { + dev->conn = NULL; + remote->conn = NULL; + } + + send_event(dev, BT_HCI_EVT_DISCONNECT_COMPLETE, &rsp, sizeof(rsp)); + send_event(remote, BT_HCI_EVT_DISCONNECT_COMPLETE, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_remote_version(struct btdev *dev, const void *data, uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_READ_REMOTE_VERSION); + + return 0; +} + +static int cmd_remote_version_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_read_remote_version *cmd = data; + struct bt_hci_evt_remote_version_complete ev; + + memset(&ev, 0, sizeof(ev)); + + if (dev->conn) { + ev.status = BT_HCI_ERR_SUCCESS; + ev.handle = cpu_to_le16(cmd->handle); + ev.lmp_ver = dev->conn->version; + ev.manufacturer = cpu_to_le16(dev->conn->manufacturer); + ev.lmp_subver = cpu_to_le16(dev->conn->revision); + } else { + ev.status = BT_HCI_ERR_UNKNOWN_CONN_ID; + ev.handle = cpu_to_le16(cmd->handle); + ev.lmp_ver = 0x00; + ev.manufacturer = cpu_to_le16(0); + ev.lmp_subver = cpu_to_le16(0); + } + + send_event(dev, BT_HCI_EVT_REMOTE_VERSION_COMPLETE, &ev, sizeof(ev)); + + return 0; +} + +static int cmd_set_host_flowctl(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_set_host_flow_control *cmd = data; + uint8_t status; + + if (cmd->enable > 0x03) { + status = BT_HCI_ERR_INVALID_PARAMETERS; + } else { + dev->host_flow_control = cmd->enable; + status = BT_HCI_ERR_SUCCESS; + } + + cmd_complete(dev, BT_HCI_CMD_SET_HOST_FLOW_CONTROL, &status, + sizeof(status)); + + return 0; +} + +static int cmd_host_buffer_size(struct btdev *dev, const void *data, + uint8_t len) +{ + uint8_t status = BT_HCI_ERR_SUCCESS; + + cmd_complete(dev, BT_HCI_CMD_HOST_BUFFER_SIZE, &status, sizeof(status)); + + return 0; +} + +static int cmd_read_bdaddr(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_read_bd_addr rsp; + + memset(&rsp, 0, sizeof(rsp)); + + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.bdaddr, dev->bdaddr, 6); + + cmd_complete(dev, BT_HCI_CMD_READ_BD_ADDR, &rsp, sizeof(rsp)); + + return 0; +} + +#define CMD_COMMON_BREDR_LE \ + CMD(BT_HCI_CMD_DISCONNECT, cmd_disconnect, cmd_disconnect_complete), \ + CMD(BT_HCI_CMD_READ_REMOTE_VERSION, cmd_remote_version, \ + cmd_remote_version_complete), \ + CMD(BT_HCI_CMD_SET_HOST_FLOW_CONTROL, cmd_set_host_flowctl, NULL), \ + CMD(BT_HCI_CMD_HOST_BUFFER_SIZE, cmd_host_buffer_size, NULL), \ + CMD(BT_HCI_CMD_READ_BD_ADDR, cmd_read_bdaddr, NULL) + +static void set_common_commands_bredrle(struct btdev *btdev) +{ + btdev->commands[0] |= 0x20; /* Disconnect */ + btdev->commands[2] |= 0x80; /* Read Remote Version Information */ + btdev->commands[10] |= 0x20; /* Set Host Flow Control */ + btdev->commands[10] |= 0x40; /* Host Buffer Size */ + btdev->commands[15] |= 0x02; /* Read BD ADDR */ +} + +static int cmd_inquiry(struct btdev *dev, const void *data, uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_INQUIRY); + + return 0; +} + +static bool inquiry_callback(void *user_data) +{ + struct inquiry_data *data = user_data; + struct btdev *btdev = data->btdev; + struct bt_hci_evt_inquiry_complete ic; + int sent = data->sent_count; + int i; + + /*Report devices only once and wait for inquiry timeout*/ + if (data->iter == MAX_BTDEV_ENTRIES) + return true; + + for (i = data->iter; i < MAX_BTDEV_ENTRIES; i++) { + /*Lets sent 10 inquiry results at once */ + if (sent + 10 == data->sent_count) + break; + + if (!btdev_list[i] || btdev_list[i] == btdev) + continue; + + if (!(btdev_list[i]->scan_enable & 0x02)) + continue; + + if (btdev->inquiry_mode == 0x02 && + btdev_list[i]->ext_inquiry_rsp[0]) { + struct bt_hci_evt_ext_inquiry_result ir; + + ir.num_resp = 0x01; + memcpy(ir.bdaddr, btdev_list[i]->bdaddr, 6); + ir.pscan_rep_mode = 0x00; + ir.pscan_period_mode = 0x00; + memcpy(ir.dev_class, btdev_list[i]->dev_class, 3); + ir.clock_offset = 0x0000; + ir.rssi = -60; + memcpy(ir.data, btdev_list[i]->ext_inquiry_rsp, 240); + + send_event(btdev, BT_HCI_EVT_EXT_INQUIRY_RESULT, + &ir, sizeof(ir)); + data->sent_count++; + continue; + } + + if (btdev->inquiry_mode > 0x00) { + struct bt_hci_evt_inquiry_result_with_rssi ir; + + ir.num_resp = 0x01; + memcpy(ir.bdaddr, btdev_list[i]->bdaddr, 6); + ir.pscan_rep_mode = 0x00; + ir.pscan_period_mode = 0x00; + memcpy(ir.dev_class, btdev_list[i]->dev_class, 3); + ir.clock_offset = 0x0000; + ir.rssi = -60; + + send_event(btdev, BT_HCI_EVT_INQUIRY_RESULT_WITH_RSSI, + &ir, sizeof(ir)); + data->sent_count++; + } else { + struct bt_hci_evt_inquiry_result ir; + + ir.num_resp = 0x01; + memcpy(ir.bdaddr, btdev_list[i]->bdaddr, 6); + ir.pscan_rep_mode = 0x00; + ir.pscan_period_mode = 0x00; + ir.pscan_mode = 0x00; + memcpy(ir.dev_class, btdev_list[i]->dev_class, 3); + ir.clock_offset = 0x0000; + + send_event(btdev, BT_HCI_EVT_INQUIRY_RESULT, + &ir, sizeof(ir)); + data->sent_count++; + } + } + data->iter = i; + + /* Check if we sent already required amount of responses*/ + if (data->num_resp && data->sent_count == data->num_resp) + goto finish; + + return true; + +finish: + /* Note that destroy will be called */ + ic.status = BT_HCI_ERR_SUCCESS; + send_event(btdev, BT_HCI_EVT_INQUIRY_COMPLETE, &ic, sizeof(ic)); + + return false; +} + +static void inquiry_destroy(void *user_data) +{ + struct inquiry_data *data = user_data; + struct btdev *btdev = data->btdev; + + if (!btdev) + goto finish; + + btdev->inquiry_id = 0; + + if (btdev->inquiry_timeout_id > 0) { + timeout_remove(btdev->inquiry_timeout_id); + btdev->inquiry_timeout_id = 0; + } + +finish: + free(data); +} + +static bool inquiry_timeout(void *user_data) +{ + struct inquiry_data *data = user_data; + struct btdev *btdev = data->btdev; + struct bt_hci_evt_inquiry_complete ic; + + timeout_remove(btdev->inquiry_id); + btdev->inquiry_timeout_id = 0; + + /* Inquiry is stopped, send Inquiry complete event. */ + ic.status = BT_HCI_ERR_SUCCESS; + send_event(btdev, BT_HCI_EVT_INQUIRY_COMPLETE, &ic, sizeof(ic)); + + return false; +} + +static int cmd_inquiry_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_inquiry *cmd = data; + struct inquiry_data *idata; + struct bt_hci_evt_inquiry_complete ic; + int status = BT_HCI_ERR_HARDWARE_FAILURE; + unsigned int inquiry_len_ms; + + if (dev->inquiry_id > 0) { + status = BT_HCI_ERR_COMMAND_DISALLOWED; + goto failed; + } + + idata = malloc0(sizeof(*idata)); + if (!idata) + goto failed; + + idata->btdev = dev; + idata->num_resp = cmd->num_resp; + + /* Add timeout to cancel inquiry */ + inquiry_len_ms = 1280 * cmd->length; + if (inquiry_len_ms) + dev->inquiry_timeout_id = timeout_add(inquiry_len_ms, + inquiry_timeout, + idata, NULL); + + dev->inquiry_id = timeout_add(DEFAULT_INQUIRY_INTERVAL, + inquiry_callback, idata, + inquiry_destroy); + /* Return if success */ + if (dev->inquiry_id > 0) + return 0; + +failed: + ic.status = status; + send_event(dev, BT_HCI_EVT_INQUIRY_COMPLETE, &ic, sizeof(ic)); + + return 0; +} + +static int cmd_inquiry_cancel(struct btdev *dev, const void *data, uint8_t len) +{ + uint8_t status; + + if (!dev->inquiry_id) { + status = BT_HCI_ERR_COMMAND_DISALLOWED; + goto done; + } + + timeout_remove(dev->inquiry_timeout_id); + dev->inquiry_timeout_id = 0; + timeout_remove(dev->inquiry_id); + dev->inquiry_id = 0; + + status = BT_HCI_ERR_SUCCESS; + +done: + cmd_complete(dev, BT_HCI_CMD_INQUIRY_CANCEL, &status, sizeof(status)); + + return 0; +} + +static int cmd_create_conn(struct btdev *dev, const void *data, uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_CREATE_CONN); + + return 0; +} + +static void conn_complete(struct btdev *btdev, + const uint8_t *bdaddr, uint8_t status) +{ + struct bt_hci_evt_conn_complete cc; + + if (!status) { + struct btdev *remote = find_btdev_by_bdaddr(bdaddr); + + btdev->conn = remote; + remote->conn = btdev; + + cc.status = status; + memcpy(cc.bdaddr, btdev->bdaddr, 6); + cc.encr_mode = 0x00; + + cc.handle = cpu_to_le16(ACL_HANDLE); + cc.link_type = 0x01; + + send_event(remote, BT_HCI_EVT_CONN_COMPLETE, &cc, sizeof(cc)); + + cc.handle = cpu_to_le16(ACL_HANDLE); + cc.link_type = 0x01; + } else { + cc.handle = cpu_to_le16(0x0000); + cc.link_type = 0x01; + } + + cc.status = status; + memcpy(cc.bdaddr, bdaddr, 6); + cc.encr_mode = 0x00; + + send_event(btdev, BT_HCI_EVT_CONN_COMPLETE, &cc, sizeof(cc)); +} + +static int cmd_create_conn_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_create_conn *cmd = data; + struct btdev *remote = find_btdev_by_bdaddr(cmd->bdaddr); + + if (remote && remote->scan_enable & 0x02) { + struct bt_hci_evt_conn_request cr; + + memcpy(cr.bdaddr, dev->bdaddr, 6); + memcpy(cr.dev_class, dev->dev_class, 3); + cr.link_type = 0x01; + + send_event(remote, BT_HCI_EVT_CONN_REQUEST, &cr, sizeof(cr)); + } else { + conn_complete(dev, cmd->bdaddr, BT_HCI_ERR_PAGE_TIMEOUT); + } + + return 0; +} + +static int cmd_add_sco_conn(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_evt_conn_complete cc; + + if (!dev->conn) + return 0; + + cc.status = BT_HCI_ERR_SUCCESS; + memcpy(cc.bdaddr, dev->conn->bdaddr, 6); + cc.handle = cpu_to_le16(SCO_HANDLE); + cc.link_type = 0x00; + cc.encr_mode = 0x00; + + send_event(dev, BT_HCI_EVT_CONN_COMPLETE, &cc, sizeof(cc)); + + return 0; +} + +static int cmd_create_conn_cancel(struct btdev *dev, const void *data, + uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_CREATE_CONN_CANCEL); + + return 0; +} + +static int cmd_create_conn_cancel_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_create_conn_cancel *cmd = data; + + conn_complete(dev, cmd->bdaddr, BT_HCI_ERR_UNKNOWN_CONN_ID); + + return 0; +} + +static int cmd_accept_conn(struct btdev *dev, const void *data, uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_ACCEPT_CONN_REQUEST); + + return 0; +} + +static int cmd_accept_conn_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_accept_conn_request *cmd = data; + struct btdev *remote = find_btdev_by_bdaddr(cmd->bdaddr); + + if (!remote) + return 0; + + if (dev->auth_enable || remote->auth_enable) + send_event(remote, BT_HCI_EVT_LINK_KEY_REQUEST, dev->bdaddr, 6); + else + conn_complete(dev, cmd->bdaddr, BT_HCI_ERR_SUCCESS); + + return 0; +} + +static int cmd_reject_conn(struct btdev *dev, const void *data, uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_REJECT_CONN_REQUEST); + + return 0; +} + +static int cmd_reject_conn_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_reject_conn_request *cmd = data; + + conn_complete(dev, cmd->bdaddr, BT_HCI_ERR_UNKNOWN_CONN_ID); + + return 0; +} + +static int cmd_link_key_reply(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_link_key_request_reply rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.bdaddr, data, 6); + cmd_complete(dev, BT_HCI_CMD_LINK_KEY_REQUEST_REPLY, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_link_key_reply_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_link_key_request_reply *cmd = data; + struct btdev *remote = dev->conn; + struct bt_hci_evt_auth_complete ev; + + memcpy(dev->link_key, cmd->link_key, 16); + + if (!remote) { + remote = find_btdev_by_bdaddr(cmd->bdaddr); + if (!remote) + return 0; + } + + if (!memcmp(remote->link_key, LINK_KEY_NONE, 16)) { + send_event(remote, BT_HCI_EVT_LINK_KEY_REQUEST, dev->bdaddr, 6); + return 0; + } + + ev.handle = cpu_to_le16(ACL_HANDLE); + + if (!memcmp(dev->link_key, remote->link_key, 16)) + ev.status = BT_HCI_ERR_SUCCESS; + else + ev.status = BT_HCI_ERR_AUTH_FAILURE; + + send_event(dev, BT_HCI_EVT_AUTH_COMPLETE, &ev, sizeof(ev)); + send_event(remote, BT_HCI_EVT_AUTH_COMPLETE, &ev, sizeof(ev)); + + return 0; +} + +static int cmd_link_key_neg_reply(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_link_key_request_neg_reply rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.bdaddr, data, 6); + cmd_complete(dev, BT_HCI_CMD_LINK_KEY_REQUEST_NEG_REPLY, &rsp, + sizeof(rsp)); + + return 0; +} + +static bool use_ssp(struct btdev *btdev1, struct btdev *btdev2) +{ + if (btdev1->auth_enable || btdev2->auth_enable) + return false; + + return (btdev1->simple_pairing_mode && btdev2->simple_pairing_mode); +} + +static int cmd_link_key_neg_reply_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_link_key_request_neg_reply *cmd = data; + struct btdev *remote = dev->conn; + + if (!remote) { + remote = find_btdev_by_bdaddr(cmd->bdaddr); + if (!remote) + return 0; + } + + if (use_ssp(dev, remote)) { + struct bt_hci_evt_io_capability_request io_req; + + memcpy(io_req.bdaddr, cmd->bdaddr, 6); + send_event(dev, BT_HCI_EVT_IO_CAPABILITY_REQUEST, &io_req, + sizeof(io_req)); + } else { + struct bt_hci_evt_pin_code_request pin_req; + + memcpy(pin_req.bdaddr, cmd->bdaddr, 6); + send_event(dev, BT_HCI_EVT_PIN_CODE_REQUEST, &pin_req, + sizeof(pin_req)); + } + + return 0; +} + +static int cmd_pin_code_reply(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_pin_code_request_neg_reply rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.bdaddr, data, 6); + cmd_complete(dev, BT_HCI_CMD_PIN_CODE_REQUEST_REPLY, &rsp, sizeof(rsp)); + + return 0; +} + +static uint8_t get_link_key_type(struct btdev *btdev) +{ + struct btdev *remote = btdev->conn; + uint8_t auth, unauth; + + if (!remote) + return 0x00; + + if (!btdev->simple_pairing_mode) + return 0x00; + + if (btdev->ssp_debug_mode || remote->ssp_debug_mode) + return 0x03; + + if (btdev->secure_conn_support && remote->secure_conn_support) { + unauth = 0x07; + auth = 0x08; + } else { + unauth = 0x04; + auth = 0x05; + } + + if (btdev->io_cap == 0x03 || remote->io_cap == 0x03) + return unauth; + + if (!(btdev->auth_req & 0x01) && !(remote->auth_req & 0x01)) + return unauth; + + /* DisplayOnly only produces authenticated with KeyboardOnly */ + if (btdev->io_cap == 0x00 && remote->io_cap != 0x02) + return unauth; + + /* DisplayOnly only produces authenticated with KeyboardOnly */ + if (remote->io_cap == 0x00 && btdev->io_cap != 0x02) + return unauth; + + return auth; +} + +static void link_key_notify(struct btdev *btdev, const uint8_t *bdaddr, + const uint8_t *key) +{ + struct bt_hci_evt_link_key_notify ev; + + memcpy(btdev->link_key, key, 16); + + memcpy(ev.bdaddr, bdaddr, 6); + memcpy(ev.link_key, key, 16); + ev.key_type = get_link_key_type(btdev); + + send_event(btdev, BT_HCI_EVT_LINK_KEY_NOTIFY, &ev, sizeof(ev)); +} + +static int cmd_pin_code_reply_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_pin_code_request_reply *cmd = data; + struct bt_hci_evt_auth_complete ev; + struct btdev *remote = dev->conn; + + if (!remote) { + remote = find_btdev_by_bdaddr(cmd->bdaddr); + if (!remote) + return 0; + } + + memcpy(dev->pin, cmd->pin_code, cmd->pin_len); + dev->pin_len = cmd->pin_len; + + if (!remote->pin_len) { + struct bt_hci_evt_pin_code_request pin_req; + + memcpy(pin_req.bdaddr, dev->bdaddr, 6); + send_event(remote, BT_HCI_EVT_PIN_CODE_REQUEST, &pin_req, + sizeof(pin_req)); + return 0; + } + + if (dev->pin_len == remote->pin_len && + !memcmp(dev->pin, remote->pin, dev->pin_len)) { + link_key_notify(dev, remote->bdaddr, LINK_KEY_DUMMY); + link_key_notify(remote, dev->bdaddr, LINK_KEY_DUMMY); + ev.status = BT_HCI_ERR_SUCCESS; + } else { + ev.status = BT_HCI_ERR_AUTH_FAILURE; + } + + if (remote->conn) { + ev.handle = cpu_to_le16(ACL_HANDLE); + send_event(remote, BT_HCI_EVT_AUTH_COMPLETE, &ev, sizeof(ev)); + } else { + conn_complete(remote, dev->bdaddr, ev.status); + } + + dev->pin_len = 0; + remote->pin_len = 0; + + return 0; +} + +static int cmd_pin_code_neg_reply(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_pin_code_request_neg_reply rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.bdaddr, data, 6); + cmd_complete(dev, BT_HCI_CMD_PIN_CODE_REQUEST_NEG_REPLY, &rsp, + sizeof(rsp)); + + return 0; +} + +static int cmd_pin_code_neg_reply_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_pin_code_request_neg_reply *cmd = data; + struct bt_hci_evt_auth_complete ev; + struct btdev *remote = dev->conn; + + if (!remote) { + remote = find_btdev_by_bdaddr(cmd->bdaddr); + if (!remote) + return 0; + } + + ev.status = BT_HCI_ERR_PIN_OR_KEY_MISSING; + ev.handle = cpu_to_le16(ACL_HANDLE); + + if (dev->conn) + send_event(dev, BT_HCI_EVT_AUTH_COMPLETE, &ev, sizeof(ev)); + else + conn_complete(dev, cmd->bdaddr, BT_HCI_ERR_PIN_OR_KEY_MISSING); + + if (remote->conn) { + if (remote->pin_len) + send_event(remote, BT_HCI_EVT_AUTH_COMPLETE, &ev, + sizeof(ev)); + } else { + conn_complete(remote, dev->bdaddr, + BT_HCI_ERR_PIN_OR_KEY_MISSING); + } + + return 0; +} + +static int cmd_auth_requested(struct btdev *dev, const void *data, uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_AUTH_REQUESTED); + + return 0; +} + +static int cmd_auth_requested_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_auth_requested *cmd = data; + struct btdev *remote = dev->conn; + + if (!remote) { + struct bt_hci_evt_auth_complete ev; + + ev.status = BT_HCI_ERR_UNKNOWN_CONN_ID; + ev.handle = cpu_to_le16(cmd->handle); + + send_event(dev, BT_HCI_EVT_AUTH_COMPLETE, &ev, sizeof(ev)); + + return 0; + } + + dev->auth_init = true; + + send_event(dev, BT_HCI_EVT_LINK_KEY_REQUEST, remote->bdaddr, 6); + + return 0; +} + +static int cmd_set_conn_encrypt(struct btdev *dev, const void *data, + uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_SET_CONN_ENCRYPT); + + return 0; +} + +static void encrypt_change(struct btdev *btdev, uint8_t mode, uint8_t status) +{ + struct bt_hci_evt_encrypt_change ev; + + ev.status = status; + ev.handle = cpu_to_le16(ACL_HANDLE); + ev.encr_mode = mode; + + send_event(btdev, BT_HCI_EVT_ENCRYPT_CHANGE, &ev, sizeof(ev)); +} + +static int cmd_set_conn_encrypt_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_set_conn_encrypt *cmd = data; + uint8_t mode; + + if (!dev->conn) + return 0; + + if (!cmd->encr_mode) + mode = 0x00; + else if (dev->secure_conn_support && dev->conn->secure_conn_support) + mode = 0x02; + else + mode = 0x01; + + encrypt_change(dev, mode, BT_HCI_ERR_SUCCESS); + encrypt_change(dev->conn, mode, BT_HCI_ERR_SUCCESS); + + return 0; +} + +static int cmd_remote_name(struct btdev *dev, const void *data, uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_REMOTE_NAME_REQUEST); + + return 0; +} + +static void name_request_complete(struct btdev *btdev, + const uint8_t *bdaddr, uint8_t status) +{ + struct bt_hci_evt_remote_name_request_complete nc; + + nc.status = status; + memcpy(nc.bdaddr, bdaddr, 6); + memset(nc.name, 0, 248); + + if (!status) { + struct btdev *remote = find_btdev_by_bdaddr(bdaddr); + + if (remote) + memcpy(nc.name, remote->name, 248); + else + nc.status = BT_HCI_ERR_UNKNOWN_CONN_ID; + } + + send_event(btdev, BT_HCI_EVT_REMOTE_NAME_REQUEST_COMPLETE, + &nc, sizeof(nc)); +} + +static int cmd_remote_name_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_remote_name_request *cmd = data; + + name_request_complete(dev, cmd->bdaddr, BT_HCI_ERR_SUCCESS); + + return 0; +} + +static int cmd_remote_name_cancel(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_remote_name_request_cancel *cmd = data; + struct bt_hci_rsp_remote_name_request_cancel rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.bdaddr, cmd->bdaddr, 6); + cmd_complete(dev, BT_HCI_CMD_REMOTE_NAME_REQUEST_CANCEL, &rsp, + sizeof(rsp)); + + return 0; +} + +static int cmd_remote_name_cancel_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_remote_name_request_cancel *cmd = data; + + name_request_complete(dev, cmd->bdaddr, BT_HCI_ERR_UNKNOWN_CONN_ID); + + return 0; +} + +static int cmd_read_remote_features(struct btdev *dev, const void *data, + uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_READ_REMOTE_FEATURES); + + return 0; +} + +static int cmd_read_remote_features_complete(struct btdev *dev, + const void *data, uint8_t len) +{ + const struct bt_hci_cmd_read_remote_features *cmd = data; + struct bt_hci_evt_remote_features_complete rfc; + + if (dev->conn) { + rfc.status = BT_HCI_ERR_SUCCESS; + rfc.handle = cpu_to_le16(cmd->handle); + memcpy(rfc.features, dev->conn->features, 8); + } else { + rfc.status = BT_HCI_ERR_UNKNOWN_CONN_ID; + rfc.handle = cpu_to_le16(cmd->handle); + memset(rfc.features, 0, 8); + } + + send_event(dev, BT_HCI_EVT_REMOTE_FEATURES_COMPLETE, &rfc, sizeof(rfc)); + + return 0; +} + +static int cmd_read_remote_ext_features(struct btdev *dev, const void *data, + uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, + BT_HCI_CMD_READ_REMOTE_EXT_FEATURES); + + return 0; +} + +static void btdev_get_host_features(struct btdev *btdev, uint8_t features[8]) +{ + memset(features, 0, 8); + if (btdev->simple_pairing_mode) + features[0] |= 0x01; + if (btdev->le_supported) + features[0] |= 0x02; + if (btdev->le_simultaneous) + features[0] |= 0x04; + if (btdev->secure_conn_support) + features[0] |= 0x08; +} + +static int cmd_read_remote_ext_features_compl(struct btdev *dev, + const void *data, uint8_t len) +{ + const struct bt_hci_cmd_read_remote_ext_features *cmd = data; + struct bt_hci_evt_remote_ext_features_complete ev; + + memset(&ev, 0, sizeof(ev)); + + if (dev->conn && cmd->page < 0x02) { + ev.handle = cpu_to_le16(cmd->handle); + ev.page = cmd->page; + ev.max_page = 0x01; + + switch (cmd->page) { + case 0x00: + ev.status = BT_HCI_ERR_SUCCESS; + memcpy(ev.features, dev->conn->features, 8); + break; + case 0x01: + ev.status = BT_HCI_ERR_SUCCESS; + btdev_get_host_features(dev->conn, ev.features); + break; + default: + ev.status = BT_HCI_ERR_INVALID_PARAMETERS; + memset(ev.features, 0, 8); + break; + } + } else { + ev.status = BT_HCI_ERR_UNKNOWN_CONN_ID; + ev.handle = cpu_to_le16(cmd->handle); + ev.page = cmd->page; + ev.max_page = 0x01; + memset(ev.features, 0, 8); + } + + send_event(dev, BT_HCI_EVT_REMOTE_EXT_FEATURES_COMPLETE, &ev, + sizeof(ev)); + + return 0; +} + +static int cmd_read_clock_offset(struct btdev *dev, const void *data, + uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_READ_CLOCK_OFFSET); + + return 0; +} + +static int cmd_read_clock_offset_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_read_clock_offset *cmd = data; + struct bt_hci_evt_clock_offset_complete ev; + + memset(&ev, 0, sizeof(ev)); + + if (dev->conn) { + ev.status = BT_HCI_ERR_SUCCESS; + ev.handle = cpu_to_le16(cmd->handle); + ev.clock_offset = 0; + } else { + ev.status = BT_HCI_ERR_UNKNOWN_CONN_ID; + ev.handle = cpu_to_le16(cmd->handle); + ev.clock_offset = 0; + } + + send_event(dev, BT_HCI_EVT_CLOCK_OFFSET_COMPLETE, &ev, sizeof(ev)); + + return 0; +} + +static int cmd_read_link_policy(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_default_link_policy rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.policy = cpu_to_le16(dev->default_link_policy); + cmd_complete(dev, BT_HCI_CMD_READ_DEFAULT_LINK_POLICY, &rsp, + sizeof(rsp)); + + return 0; +} + +static int cmd_write_link_policy(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_write_default_link_policy *cmd = data; + uint8_t status; + + dev->default_link_policy = le16_to_cpu(cmd->policy); + status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_WRITE_DEFAULT_LINK_POLICY, &status, + sizeof(status)); + + return 0; +} + +static int cmd_set_event_filter(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_set_event_filter *cmd = data; + uint8_t status; + + dev->event_filter = cmd->type; + status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_SET_EVENT_FILTER, &status, sizeof(status)); + + return 0; +} + +static int cmd_read_link_key(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_read_stored_link_key rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.max_num_keys = cpu_to_le16(0); + rsp.num_keys = cpu_to_le16(0); + cmd_complete(dev, BT_HCI_CMD_READ_STORED_LINK_KEY, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_write_link_key(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_write_stored_link_key rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.num_keys = 0; + cmd_complete(dev, BT_HCI_CMD_WRITE_STORED_LINK_KEY, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_delete_link_key(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_delete_stored_link_key rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.num_keys = cpu_to_le16(0); + cmd_complete(dev, BT_HCI_CMD_DELETE_STORED_LINK_KEY, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_read_local_name(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_read_local_name rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.name, dev->name, 248); + cmd_complete(dev, BT_HCI_CMD_READ_LOCAL_NAME, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_write_local_name(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_write_local_name *cmd = data; + uint8_t status; + + memcpy(dev->name, cmd->name, 248); + status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_WRITE_LOCAL_NAME, &status, sizeof(status)); + + return 0; +} + +static int cmd_read_accept_timeout(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_conn_accept_timeout rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.timeout = cpu_to_le16(dev->conn_accept_timeout); + cmd_complete(dev, BT_HCI_CMD_READ_CONN_ACCEPT_TIMEOUT, &rsp, + sizeof(rsp)); + + return 0; +} + +static int cmd_write_accept_timeout(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_write_conn_accept_timeout *cmd = data; + uint8_t status; + + dev->conn_accept_timeout = le16_to_cpu(cmd->timeout); + status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_WRITE_CONN_ACCEPT_TIMEOUT, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_page_timeout(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_page_timeout rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.timeout = cpu_to_le16(dev->page_timeout); + cmd_complete(dev, BT_HCI_CMD_READ_PAGE_TIMEOUT, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_write_page_timeout(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_write_page_timeout *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; + + dev->page_timeout = le16_to_cpu(cmd->timeout); + cmd_complete(dev, BT_HCI_CMD_WRITE_PAGE_TIMEOUT, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_scan_enable(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_scan_enable rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.enable = dev->scan_enable; + cmd_complete(dev, BT_HCI_CMD_READ_SCAN_ENABLE, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_write_scan_enable(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_write_scan_enable *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; + + dev->scan_enable = cmd->enable; + cmd_complete(dev, BT_HCI_CMD_WRITE_SCAN_ENABLE, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_page_scan(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_page_scan_activity rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.interval = cpu_to_le16(dev->page_scan_interval); + rsp.window = cpu_to_le16(dev->page_scan_window); + cmd_complete(dev, BT_HCI_CMD_READ_PAGE_SCAN_ACTIVITY, &rsp, + sizeof(rsp)); + + return 0; +} + +static int cmd_write_page_scan(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_write_page_scan_activity *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; + + dev->page_scan_interval = le16_to_cpu(cmd->interval); + dev->page_scan_window = le16_to_cpu(cmd->window); + cmd_complete(dev, BT_HCI_CMD_WRITE_PAGE_SCAN_ACTIVITY, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_inquiry_scan(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_inquiry_scan_activity rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.interval = cpu_to_le16(dev->inquiry_scan_interval); + rsp.window = cpu_to_le16(dev->inquiry_scan_window); + cmd_complete(dev, BT_HCI_CMD_READ_INQUIRY_SCAN_ACTIVITY, &rsp, + sizeof(rsp)); + + return 0; +} + +static int cmd_write_inquiry_scan(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_write_inquiry_scan_activity *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; + + dev->inquiry_scan_interval = le16_to_cpu(cmd->interval); + dev->inquiry_scan_window = le16_to_cpu(cmd->window); + cmd_complete(dev, BT_HCI_CMD_WRITE_INQUIRY_SCAN_ACTIVITY, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_auth_enable(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_auth_enable rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.enable = dev->auth_enable; + cmd_complete(dev, BT_HCI_CMD_READ_AUTH_ENABLE, &rsp, sizeof(rsp)); + + return 0; } -static void set_common_commands_bredrle(struct btdev *btdev) +static int cmd_write_auth_enable(struct btdev *dev, const void *data, + uint8_t len) { - btdev->commands[0] |= 0x20; /* Disconnect */ - btdev->commands[2] |= 0x80; /* Read Remote Version Information */ - btdev->commands[10] |= 0x20; /* Set Host Flow Control */ - btdev->commands[10] |= 0x40; /* Host Buffer Size */ - btdev->commands[15] |= 0x02; /* Read BD ADDR */ + const struct bt_hci_cmd_write_auth_enable *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; + + dev->auth_enable = cmd->enable; + cmd_complete(dev, BT_HCI_CMD_WRITE_AUTH_ENABLE, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_class(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_read_class_of_dev rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.dev_class, dev->dev_class, 3); + cmd_complete(dev, BT_HCI_CMD_READ_CLASS_OF_DEV, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_write_class(struct btdev *dev, const void *data, uint8_t len) +{ + const struct bt_hci_cmd_write_class_of_dev *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; + + memcpy(dev->dev_class, cmd->dev_class, 3); + cmd_complete(dev, BT_HCI_CMD_WRITE_CLASS_OF_DEV, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_voice(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_read_voice_setting rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.setting = cpu_to_le16(dev->voice_setting); + cmd_complete(dev, BT_HCI_CMD_READ_VOICE_SETTING, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_write_voice(struct btdev *dev, const void *data, uint8_t len) +{ + const struct bt_hci_cmd_write_voice_setting *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; + + dev->voice_setting = le16_to_cpu(cmd->setting); + cmd_complete(dev, BT_HCI_CMD_WRITE_VOICE_SETTING, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_num_iac(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_read_num_supported_iac rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.num_iac = 0x01; + cmd_complete(dev, BT_HCI_CMD_READ_NUM_SUPPORTED_IAC, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_read_current_iac_lap(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_current_iac_lap *rsp; + + rsp = alloca(sizeof(*rsp) + 3); + rsp->status = BT_HCI_ERR_SUCCESS; + rsp->num_iac = 0x01; + rsp->iac_lap[0] = 0x33; + rsp->iac_lap[1] = 0x8b; + rsp->iac_lap[2] = 0x9e; + cmd_complete(dev, BT_HCI_CMD_READ_CURRENT_IAC_LAP, rsp, + sizeof(*rsp) + 3); + + return 0; +} + +static int cmd_write_current_iac_lap(struct btdev *dev, const void *data, + uint8_t len) +{ + uint8_t status = BT_HCI_ERR_SUCCESS; + + cmd_complete(dev, BT_HCI_CMD_WRITE_CURRENT_IAC_LAP, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_inquiry_mode(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_inquiry_mode rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.mode = dev->inquiry_mode; + cmd_complete(dev, BT_HCI_CMD_READ_INQUIRY_MODE, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_write_inquiry_mode(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_write_inquiry_mode *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; + + dev->inquiry_mode = cmd->mode; + cmd_complete(dev, BT_HCI_CMD_WRITE_INQUIRY_MODE, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_page_scan_type(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_page_scan_type rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.type = dev->page_scan_type; + cmd_complete(dev, BT_HCI_CMD_READ_PAGE_SCAN_TYPE, &rsp, sizeof(rsp)); + + return 0; +} + +static int cmd_write_page_scan_type(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_write_page_scan_type *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; + + dev->page_scan_type = cmd->type; + cmd_complete(dev, BT_HCI_CMD_WRITE_PAGE_SCAN_TYPE, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_afh_mode(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_read_afh_assessment_mode rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.mode = dev->afh_assessment_mode; + cmd_complete(dev, BT_HCI_CMD_READ_AFH_ASSESSMENT_MODE, &rsp, + sizeof(rsp)); + + return 0; +} + +static int cmd_write_afh_mode(struct btdev *dev, const void *data, uint8_t len) +{ + const struct bt_hci_cmd_write_afh_assessment_mode *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; + + dev->afh_assessment_mode = cmd->mode; + cmd_complete(dev, BT_HCI_CMD_WRITE_AFH_ASSESSMENT_MODE, &status, + sizeof(status)); + + return 0; +} + +static int cmd_read_local_ext_features(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_local_ext_features rsp; + uint8_t page = ((const uint8_t *) data)[0]; + + memset(&rsp, 0, sizeof(rsp)); + rsp.page = page; + rsp.max_page = dev->max_page; + + if (page > dev->max_page) { + rsp.status = BT_HCI_ERR_INVALID_PARAMETERS; + goto done; + } + + rsp.status = BT_HCI_ERR_SUCCESS; + + switch (page) { + case 0x00: + memcpy(rsp.features, dev->features, 8); + break; + case 0x01: + btdev_get_host_features(dev, rsp.features); + break; + case 0x02: + memcpy(rsp.features, dev->feat_page_2, 8); + break; + default: + rsp.status = BT_HCI_ERR_INVALID_PARAMETERS; + break; + } + +done: + cmd_complete(dev, BT_HCI_CMD_READ_LOCAL_EXT_FEATURES, &rsp, + sizeof(rsp)); + + return 0; +} + +static int cmd_read_country_code(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_country_code rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.code = dev->country_code; + cmd_complete(dev, BT_HCI_CMD_READ_COUNTRY_CODE, &rsp, sizeof(rsp)); + + return 0; } +static int cmd_enable_dut_mode(struct btdev *dev, const void *data, + uint8_t len) +{ + uint8_t status = BT_HCI_ERR_SUCCESS; + + cmd_complete(dev, BT_HCI_CMD_ENABLE_DUT_MODE, &status, + sizeof(status)); + + return 0; +} + +#define CMD_COMMON_BREDR_20 \ + CMD(BT_HCI_CMD_INQUIRY, cmd_inquiry, cmd_inquiry_complete), \ + CMD(BT_HCI_CMD_INQUIRY_CANCEL, cmd_inquiry_cancel, NULL), \ + CMD(BT_HCI_CMD_CREATE_CONN, cmd_create_conn, \ + cmd_create_conn_complete), \ + CMD(BT_HCI_CMD_ADD_SCO_CONN, cmd_add_sco_conn, NULL), \ + CMD(BT_HCI_CMD_CREATE_CONN_CANCEL, cmd_create_conn_cancel, \ + cmd_create_conn_cancel_complete), \ + CMD(BT_HCI_CMD_ACCEPT_CONN_REQUEST, cmd_accept_conn, \ + cmd_accept_conn_complete), \ + CMD(BT_HCI_CMD_REJECT_CONN_REQUEST, cmd_reject_conn, \ + cmd_reject_conn_complete), \ + CMD(BT_HCI_CMD_LINK_KEY_REQUEST_REPLY, cmd_link_key_reply, \ + cmd_link_key_reply_complete), \ + CMD(BT_HCI_CMD_LINK_KEY_REQUEST_NEG_REPLY, \ + cmd_link_key_neg_reply, \ + cmd_link_key_neg_reply_complete), \ + CMD(BT_HCI_CMD_PIN_CODE_REQUEST_REPLY, cmd_pin_code_reply, \ + cmd_pin_code_reply_complete), \ + CMD(BT_HCI_CMD_PIN_CODE_REQUEST_NEG_REPLY, \ + cmd_pin_code_neg_reply, \ + cmd_pin_code_neg_reply_complete), \ + CMD(BT_HCI_CMD_AUTH_REQUESTED, cmd_auth_requested, \ + cmd_auth_requested_complete), \ + CMD(BT_HCI_CMD_SET_CONN_ENCRYPT, cmd_set_conn_encrypt, \ + cmd_set_conn_encrypt_complete), \ + CMD(BT_HCI_CMD_REMOTE_NAME_REQUEST, cmd_remote_name, \ + cmd_remote_name_complete), \ + CMD(BT_HCI_CMD_REMOTE_NAME_REQUEST_CANCEL, cmd_remote_name_cancel, \ + cmd_remote_name_cancel_complete), \ + CMD(BT_HCI_CMD_READ_REMOTE_FEATURES, cmd_read_remote_features, \ + cmd_read_remote_features_complete), \ + CMD(BT_HCI_CMD_READ_REMOTE_EXT_FEATURES, \ + cmd_read_remote_ext_features, \ + cmd_read_remote_ext_features_compl), \ + CMD(BT_HCI_CMD_READ_CLOCK_OFFSET, cmd_read_clock_offset, \ + cmd_read_clock_offset_complete), \ + CMD(BT_HCI_CMD_READ_DEFAULT_LINK_POLICY, cmd_read_link_policy, NULL), \ + CMD(BT_HCI_CMD_WRITE_DEFAULT_LINK_POLICY, cmd_write_link_policy, \ + NULL), \ + CMD(BT_HCI_CMD_SET_EVENT_FILTER, cmd_set_event_filter, NULL), \ + CMD(BT_HCI_CMD_READ_STORED_LINK_KEY, cmd_read_link_key, NULL), \ + CMD(BT_HCI_CMD_WRITE_STORED_LINK_KEY, cmd_write_link_key, NULL), \ + CMD(BT_HCI_CMD_DELETE_STORED_LINK_KEY, cmd_delete_link_key, NULL), \ + CMD(BT_HCI_CMD_READ_LOCAL_NAME, cmd_read_local_name, NULL), \ + CMD(BT_HCI_CMD_WRITE_LOCAL_NAME, cmd_write_local_name, NULL), \ + CMD(BT_HCI_CMD_READ_CONN_ACCEPT_TIMEOUT, cmd_read_accept_timeout, \ + NULL), \ + CMD(BT_HCI_CMD_WRITE_CONN_ACCEPT_TIMEOUT, cmd_write_accept_timeout, \ + NULL), \ + CMD(BT_HCI_CMD_READ_PAGE_TIMEOUT, cmd_read_page_timeout, NULL), \ + CMD(BT_HCI_CMD_WRITE_PAGE_TIMEOUT, cmd_write_page_timeout, NULL), \ + CMD(BT_HCI_CMD_READ_SCAN_ENABLE, cmd_read_scan_enable, NULL), \ + CMD(BT_HCI_CMD_WRITE_SCAN_ENABLE, cmd_write_scan_enable, NULL), \ + CMD(BT_HCI_CMD_READ_PAGE_SCAN_ACTIVITY, cmd_read_page_scan, NULL), \ + CMD(BT_HCI_CMD_WRITE_PAGE_SCAN_ACTIVITY, cmd_write_page_scan, NULL), \ + CMD(BT_HCI_CMD_READ_INQUIRY_SCAN_ACTIVITY, cmd_read_inquiry_scan, \ + NULL), \ + CMD(BT_HCI_CMD_WRITE_INQUIRY_SCAN_ACTIVITY, cmd_write_inquiry_scan, \ + NULL), \ + CMD(BT_HCI_CMD_READ_AUTH_ENABLE, cmd_read_auth_enable, NULL), \ + CMD(BT_HCI_CMD_WRITE_AUTH_ENABLE, cmd_write_auth_enable, NULL), \ + CMD(BT_HCI_CMD_READ_CLASS_OF_DEV, cmd_read_class, NULL), \ + CMD(BT_HCI_CMD_WRITE_CLASS_OF_DEV, cmd_write_class, NULL), \ + CMD(BT_HCI_CMD_READ_VOICE_SETTING, cmd_read_voice, NULL), \ + CMD(BT_HCI_CMD_WRITE_VOICE_SETTING, cmd_write_voice, NULL), \ + CMD(BT_HCI_CMD_READ_NUM_SUPPORTED_IAC, cmd_read_num_iac, NULL), \ + CMD(BT_HCI_CMD_READ_CURRENT_IAC_LAP, cmd_read_current_iac_lap, \ + NULL), \ + CMD(BT_HCI_CMD_WRITE_CURRENT_IAC_LAP, cmd_write_current_iac_lap, \ + NULL), \ + CMD(BT_HCI_CMD_READ_INQUIRY_MODE, cmd_read_inquiry_mode, NULL), \ + CMD(BT_HCI_CMD_WRITE_INQUIRY_MODE, cmd_write_inquiry_mode, NULL), \ + CMD(BT_HCI_CMD_READ_PAGE_SCAN_TYPE, cmd_read_page_scan_type, NULL), \ + CMD(BT_HCI_CMD_WRITE_PAGE_SCAN_TYPE, cmd_write_page_scan_type, NULL), \ + CMD(BT_HCI_CMD_READ_AFH_ASSESSMENT_MODE, cmd_read_afh_mode, NULL), \ + CMD(BT_HCI_CMD_WRITE_AFH_ASSESSMENT_MODE, cmd_write_afh_mode, NULL), \ + CMD(BT_HCI_CMD_READ_LOCAL_EXT_FEATURES, cmd_read_local_ext_features, \ + NULL), \ + CMD(BT_HCI_CMD_READ_COUNTRY_CODE, cmd_read_country_code, NULL), \ + CMD(BT_HCI_CMD_ENABLE_DUT_MODE, cmd_enable_dut_mode, NULL) + static void set_common_commands_bredr20(struct btdev *btdev) { btdev->commands[0] |= 0x01; /* Inquiry */ @@ -334,889 +2116,863 @@ static void set_common_commands_bredr20(struct btdev *btdev) btdev->commands[9] |= 0x02; /* Write Class Of Device */ btdev->commands[9] |= 0x04; /* Read Voice Setting */ btdev->commands[9] |= 0x08; /* Write Voice Setting */ + btdev->commands[11] |= 0x04; /* Read Number of Supported IAC */ + btdev->commands[11] |= 0x08; /* Read Current IAC LAP */ btdev->commands[11] |= 0x10; /* Write Current IAC LAP */ btdev->commands[12] |= 0x40; /* Read Inquiry Mode */ - btdev->commands[12] |= 0x80; /* Write Inquiry Mode */ - btdev->commands[13] |= 0x01; /* Read Page Scan Type */ - btdev->commands[13] |= 0x02; /* Write Page Scan Type */ - btdev->commands[13] |= 0x04; /* Read AFH Assess Mode */ - btdev->commands[13] |= 0x08; /* Write AFH Assess Mode */ - btdev->commands[14] |= 0x40; /* Read Local Extended Features */ - btdev->commands[15] |= 0x01; /* Read Country Code */ - btdev->commands[16] |= 0x04; /* Enable Device Under Test Mode */ -} - -static void set_bredr_commands(struct btdev *btdev) -{ - set_common_commands_all(btdev); - set_common_commands_bredrle(btdev); - set_common_commands_bredr20(btdev); - - btdev->commands[16] |= 0x08; /* Setup Synchronous Connection */ - btdev->commands[17] |= 0x01; /* Read Extended Inquiry Response */ - btdev->commands[17] |= 0x02; /* Write Extended Inquiry Response */ - btdev->commands[17] |= 0x20; /* Read Simple Pairing Mode */ - btdev->commands[17] |= 0x40; /* Write Simple Pairing Mode */ - btdev->commands[17] |= 0x80; /* Read Local OOB Data */ - btdev->commands[18] |= 0x01; /* Read Inquiry Response TX Power */ - btdev->commands[18] |= 0x02; /* Write Inquiry Response TX Power */ - btdev->commands[18] |= 0x80; /* IO Capability Request Reply */ - btdev->commands[20] |= 0x10; /* Read Encryption Key Size */ - btdev->commands[23] |= 0x04; /* Read Data Block Size */ - btdev->commands[29] |= 0x20; /* Read Local Supported Codecs */ - btdev->commands[30] |= 0x08; /* Get MWS Transport Layer Config */ -} - -static void set_bredr20_commands(struct btdev *btdev) -{ - set_common_commands_all(btdev); - set_common_commands_bredrle(btdev); - set_common_commands_bredr20(btdev); -} - -static void set_le_50_commands(struct btdev *btdev) -{ - btdev->commands[35] |= 0x20; /* LE Set Default PHY */ - btdev->commands[36] |= 0x02; /* LE Set Adv Set Random Address */ - btdev->commands[36] |= 0x04; /* LE Set Ext Adv Parameters */ - btdev->commands[36] |= 0x08; /* LE Set Ext Adv Data */ - btdev->commands[36] |= 0x10; /* LE Set Ext Scan Response Data */ - btdev->commands[36] |= 0x20; /* LE Set Ext Adv Enable */ - btdev->commands[36] |= 0x40; /* LE Read Maximum Adv Data Length */ - btdev->commands[36] |= 0x80; /* LE Read Num of Supported Adv Sets */ - btdev->commands[37] |= 0x01; /* LE Remove Adv Set */ - btdev->commands[37] |= 0x02; /* LE Clear Adv Sets */ - btdev->commands[37] |= 0x04; /* LE Set Periodic Adv Parameters */ - btdev->commands[37] |= 0x08; /* LE Set Periodic Adv Data */ - btdev->commands[37] |= 0x10; /* LE Set Periodic Adv Enable */ - btdev->commands[37] |= 0x20; /* LE Set Ext Scan Parameters */ - btdev->commands[37] |= 0x40; /* LE Set Ext Scan Enable */ - btdev->commands[37] |= 0x80; /* LE Ext Create Connection */ - btdev->commands[38] |= 0x01; /* LE Periodic Adv Create Sync */ - btdev->commands[38] |= 0x02; /* LE Periodic Adv Create Sync Cancel */ - btdev->commands[38] |= 0x04; /* LE Periodic Adv Terminate Sync */ - btdev->commands[38] |= 0x08; /* LE Add Device To Periodic Adv List */ - btdev->commands[38] |= 0x10; /* LE Remove Periodic Adv List */ - btdev->commands[38] |= 0x20; /* LE Clear Periodic Adv List */ - btdev->commands[38] |= 0x40; /* LE Read Periodic Adv List Size */ -} - -static void set_le_52_commands(struct btdev *btdev) -{ - btdev->commands[41] |= 0x20; /* LE Read Buffer Size v2 */ - btdev->commands[41] |= 0x40; /* LE Read ISO TX Sync */ - btdev->commands[41] |= 0x80; /* LE Set CIG Parameters */ - btdev->commands[42] |= 0x01; /* LE Set CIG Parameters Test */ - btdev->commands[42] |= 0x02; /* LE Create CIS */ - btdev->commands[42] |= 0x04; /* LE Remove CIG */ - btdev->commands[42] |= 0x08; /* LE Accept CIS */ - btdev->commands[42] |= 0x10; /* LE Reject CIS */ - btdev->commands[42] |= 0x20; /* LE Create BIG */ - btdev->commands[42] |= 0x40; /* LE Create BIG Test */ - btdev->commands[42] |= 0x80; /* LE Terminate BIG */ - btdev->commands[43] |= 0x01; /* LE BIG Create Sync */ - btdev->commands[43] |= 0x02; /* LE BIG Terminate Sync */ - btdev->commands[43] |= 0x04; /* LE Request Peer SCA */ - btdev->commands[43] |= 0x08; /* LE Setup ISO Path */ - btdev->commands[43] |= 0x10; /* LE Remove ISO Path */ - btdev->commands[43] |= 0x20; /* LE ISO TX Test */ - btdev->commands[43] |= 0x40; /* LE ISO RX Test */ - btdev->commands[43] |= 0x80; /* LE ISO Read Test Counter */ - btdev->commands[44] |= 0x01; /* LE ISO Test End */ - btdev->commands[44] |= 0x02; /* LE ISO Set Host Feature */ -} - -static void set_le_commands(struct btdev *btdev) -{ - set_common_commands_all(btdev); - set_common_commands_bredrle(btdev); - - btdev->commands[24] |= 0x20; /* Read LE Host Supported */ - btdev->commands[24] |= 0x20; /* Write LE Host Supported */ - btdev->commands[25] |= 0x01; /* LE Set Event Mask */ - btdev->commands[25] |= 0x02; /* LE Read Buffer Size */ - btdev->commands[25] |= 0x04; /* LE Read Local Features */ - btdev->commands[25] |= 0x10; /* LE Set Random Address */ - btdev->commands[25] |= 0x20; /* LE Set Adv Parameters */ - btdev->commands[25] |= 0x40; /* LE Read Adv TX Power */ - btdev->commands[25] |= 0x80; /* LE Set Adv Data */ - btdev->commands[26] |= 0x01; /* LE Set Scan Response Data */ - btdev->commands[26] |= 0x02; /* LE Set Adv Enable */ - btdev->commands[26] |= 0x04; /* LE Set Scan Parameters */ - btdev->commands[26] |= 0x08; /* LE Set Scan Enable */ - btdev->commands[26] |= 0x10; /* LE Create Connection */ - btdev->commands[26] |= 0x40; /* LE Read White List Size */ - btdev->commands[26] |= 0x80; /* LE Clear White List */ - btdev->commands[27] |= 0x04; /* LE Connection Update */ - btdev->commands[27] |= 0x20; /* LE Read Remote Used Features */ - btdev->commands[27] |= 0x40; /* LE Encrypt */ - btdev->commands[27] |= 0x80; /* LE Rand */ - btdev->commands[28] |= 0x01; /* LE Start Encryption */ - btdev->commands[28] |= 0x02; /* LE Long Term Key Request Reply */ - btdev->commands[28] |= 0x04; /* LE Long Term Key Request Neg Reply */ - btdev->commands[28] |= 0x08; /* LE Read Supported States */ - btdev->commands[28] |= 0x10; /* LE Receiver Test */ - btdev->commands[28] |= 0x20; /* LE Transmitter Test */ - btdev->commands[28] |= 0x40; /* LE Test End */ + btdev->commands[12] |= 0x80; /* Write Inquiry Mode */ + btdev->commands[13] |= 0x01; /* Read Page Scan Type */ + btdev->commands[13] |= 0x02; /* Write Page Scan Type */ + btdev->commands[13] |= 0x04; /* Read AFH Assess Mode */ + btdev->commands[13] |= 0x08; /* Write AFH Assess Mode */ + btdev->commands[14] |= 0x40; /* Read Local Extended Features */ + btdev->commands[15] |= 0x01; /* Read Country Code */ + btdev->commands[16] |= 0x04; /* Enable Device Under Test Mode */ +} - /* Extra LE commands for >= 4.1 adapters */ - btdev->commands[33] |= 0x10; /* LE Remote Conn Param Req Reply */ - btdev->commands[33] |= 0x20; /* LE Remote Conn Param Req Neg Reply */ +static int cmd_setup_sync_conn(struct btdev *dev, const void *data, uint8_t len) +{ + const struct bt_hci_cmd_setup_sync_conn *cmd = data; + struct bt_hci_evt_sync_conn_complete cc; + uint8_t status = BT_HCI_ERR_SUCCESS; - /* Extra LE commands for >= 4.2 adapters */ - btdev->commands[34] |= 0x02; /* LE Read Local P-256 Public Key */ - btdev->commands[34] |= 0x04; /* LE Generate DHKey */ + cmd_status(dev, status, BT_HCI_EVT_SYNC_CONN_COMPLETE); - /* Extra LE commands for >= 5.0 adapters */ - if (btdev->type >= BTDEV_TYPE_BREDRLE50) - set_le_50_commands(btdev); + if (!dev->conn) + return 0; - /* Extra LE commands for >= 5.2 adapters */ - if (btdev->type >= BTDEV_TYPE_BREDRLE52) - set_le_52_commands(btdev); -} + cc.status = status; + memcpy(cc.bdaddr, dev->conn->bdaddr, 6); -static void set_bredrle_commands(struct btdev *btdev) -{ - set_bredr_commands(btdev); - set_le_commands(btdev); + cc.handle = cpu_to_le16(status == BT_HCI_ERR_SUCCESS ? SCO_HANDLE : 0); + cc.link_type = 0x02; + cc.tx_interval = 0x000c; + cc.retrans_window = 0x06; + cc.rx_pkt_len = 60; + cc.tx_pkt_len = 60; + cc.air_mode = (cmd->voice_setting == 0x0060) ? 0x02 : 0x03; - /* Extra BR/EDR commands we want to only support for >= 4.0 - * adapters. - */ - btdev->commands[22] |= 0x04; /* Set Event Mask Page 2 */ - btdev->commands[31] |= 0x80; /* Read Sync Train Parameters */ - btdev->commands[32] |= 0x04; /* Read Secure Connections Support */ - btdev->commands[32] |= 0x08; /* Write Secure Connections Support */ - btdev->commands[32] |= 0x10; /* Read Auth Payload Timeout */ - btdev->commands[32] |= 0x20; /* Write Auth Payload Timeout */ - btdev->commands[32] |= 0x40; /* Read Local OOB Extended Data */ + send_event(dev, BT_HCI_EVT_SYNC_CONN_COMPLETE, &cc, sizeof(cc)); + + return 0; } -static void set_amp_commands(struct btdev *btdev) +static int cmd_read_ext_inquiry(struct btdev *dev, const void *data, + uint8_t len) { - set_common_commands_all(btdev); + struct bt_hci_rsp_read_ext_inquiry_response rsp; - btdev->commands[22] |= 0x20; /* Read Local AMP Info */ + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.fec = dev->ext_inquiry_fec; + memcpy(rsp.data, dev->ext_inquiry_rsp, 240); + cmd_complete(dev, BT_HCI_CMD_READ_EXT_INQUIRY_RESPONSE, &rsp, + sizeof(rsp)); + + return 0; } -static void set_bredrle_features(struct btdev *btdev) +static int cmd_write_ext_inquiry(struct btdev *dev, const void *data, + uint8_t len) { - btdev->features[0] |= 0x04; /* Encryption */ - btdev->features[0] |= 0x20; /* Role switch */ - btdev->features[0] |= 0x80; /* Sniff mode */ - btdev->features[1] |= 0x08; /* SCO link */ - btdev->features[2] |= 0x08; /* Transparent SCO */ - btdev->features[3] |= 0x40; /* RSSI with inquiry results */ - btdev->features[3] |= 0x80; /* Extended SCO link */ - btdev->features[4] |= 0x08; /* AFH capable slave */ - btdev->features[4] |= 0x10; /* AFH classification slave */ - btdev->features[4] |= 0x40; /* LE Supported */ - btdev->features[5] |= 0x02; /* Sniff subrating */ - btdev->features[5] |= 0x04; /* Pause encryption */ - btdev->features[5] |= 0x08; /* AFH capable master */ - btdev->features[5] |= 0x10; /* AFH classification master */ - btdev->features[6] |= 0x01; /* Extended Inquiry Response */ - btdev->features[6] |= 0x02; /* Simultaneous LE and BR/EDR */ - btdev->features[6] |= 0x08; /* Secure Simple Pairing */ - btdev->features[6] |= 0x10; /* Encapsulated PDU */ - btdev->features[6] |= 0x20; /* Erroneous Data Reporting */ - btdev->features[6] |= 0x40; /* Non-flushable Packet Boundary Flag */ - btdev->features[7] |= 0x01; /* Link Supervision Timeout Event */ - btdev->features[7] |= 0x02; /* Inquiry TX Power Level */ - btdev->features[7] |= 0x80; /* Extended features */ + const struct bt_hci_cmd_write_ext_inquiry_response *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; - if (btdev->type >= BTDEV_TYPE_BREDRLE50) { - /* These BREDR features are added to test new configuration - * command. If this is added above it will break existing tests - */ - btdev->features[0] |= 0x01; /* 3 slot Packets */ - btdev->features[0] |= 0x02; /* 5 slot Packets */ - btdev->features[3] |= 0x02; /* EDR ACL 2M mode */ - btdev->features[3] |= 0x04; /* EDR ACL 3M mode */ - btdev->features[4] |= 0x80; /* 3 slot EDR ACL packets */ - btdev->features[5] |= 0x01; /* 5 slot EDR ACL packets */ + dev->ext_inquiry_fec = cmd->fec; + memcpy(dev->ext_inquiry_rsp, cmd->data, 240); + cmd_complete(dev, BT_HCI_CMD_WRITE_EXT_INQUIRY_RESPONSE, &status, + sizeof(status)); - btdev->le_features[1] |= 0x01; /* LE 2M PHY */ - btdev->le_features[1] |= 0x08; /* LE Coded PHY */ - btdev->le_features[1] |= 0x10; /* LE EXT ADV */ - } + return 0; +} - if (btdev->type >= BTDEV_TYPE_BREDRLE52) { - btdev->le_features[3] |= 0x10; /* LE CIS Master */ - btdev->le_features[3] |= 0x20; /* LE CIS Slave */ - btdev->le_features[3] |= 0x40; /* LE ISO Broadcaster */ - btdev->le_features[3] |= 0x80; /* LE Synchronized Receiver */ - btdev->le_features[4] |= 0x01; /* LE ISO channels */ - } +static int cmd_read_ssp_mode(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_read_simple_pairing_mode rsp; - btdev->feat_page_2[0] |= 0x01; /* CSB - Master Operation */ - btdev->feat_page_2[0] |= 0x02; /* CSB - Slave Operation */ - btdev->feat_page_2[0] |= 0x04; /* Synchronization Train */ - btdev->feat_page_2[0] |= 0x08; /* Synchronization Scan */ - btdev->feat_page_2[0] |= 0x10; /* Inquiry Response Notification */ - btdev->feat_page_2[1] |= 0x01; /* Secure Connections */ - btdev->feat_page_2[1] |= 0x02; /* Ping */ + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.mode = dev->simple_pairing_mode; + cmd_complete(dev, BT_HCI_CMD_READ_SIMPLE_PAIRING_MODE, &rsp, + sizeof(rsp)); - btdev->max_page = 2; + return 0; } -static void set_bredr_features(struct btdev *btdev) +static int cmd_write_ssp_mode(struct btdev *dev, const void *data, uint8_t len) { - btdev->features[0] |= 0x04; /* Encryption */ - btdev->features[0] |= 0x20; /* Role switch */ - btdev->features[0] |= 0x80; /* Sniff mode */ - btdev->features[1] |= 0x08; /* SCO link */ - btdev->features[3] |= 0x40; /* RSSI with inquiry results */ - btdev->features[3] |= 0x80; /* Extended SCO link */ - btdev->features[4] |= 0x08; /* AFH capable slave */ - btdev->features[4] |= 0x10; /* AFH classification slave */ - btdev->features[5] |= 0x02; /* Sniff subrating */ - btdev->features[5] |= 0x04; /* Pause encryption */ - btdev->features[5] |= 0x08; /* AFH capable master */ - btdev->features[5] |= 0x10; /* AFH classification master */ - btdev->features[6] |= 0x01; /* Extended Inquiry Response */ - btdev->features[6] |= 0x08; /* Secure Simple Pairing */ - btdev->features[6] |= 0x10; /* Encapsulated PDU */ - btdev->features[6] |= 0x20; /* Erroneous Data Reporting */ - btdev->features[6] |= 0x40; /* Non-flushable Packet Boundary Flag */ - btdev->features[7] |= 0x01; /* Link Supervision Timeout Event */ - btdev->features[7] |= 0x02; /* Inquiry TX Power Level */ - btdev->features[7] |= 0x80; /* Extended features */ + const struct bt_hci_cmd_write_simple_pairing_mode *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; - btdev->max_page = 1; + dev->simple_pairing_mode = cmd->mode; + cmd_complete(dev, BT_HCI_CMD_WRITE_SIMPLE_PAIRING_MODE, &status, + sizeof(status)); + + return 0; } -static void set_bredr20_features(struct btdev *btdev) +static int cmd_read_oob_data(struct btdev *dev, const void *data, uint8_t len) { - btdev->features[0] |= 0x04; /* Encryption */ - btdev->features[0] |= 0x20; /* Role switch */ - btdev->features[0] |= 0x80; /* Sniff mode */ - btdev->features[1] |= 0x08; /* SCO link */ - btdev->features[3] |= 0x40; /* RSSI with inquiry results */ - btdev->features[3] |= 0x80; /* Extended SCO link */ - btdev->features[4] |= 0x08; /* AFH capable slave */ - btdev->features[4] |= 0x10; /* AFH classification slave */ - btdev->features[5] |= 0x02; /* Sniff subrating */ - btdev->features[5] |= 0x04; /* Pause encryption */ - btdev->features[5] |= 0x08; /* AFH capable master */ - btdev->features[5] |= 0x10; /* AFH classification master */ - btdev->features[7] |= 0x80; /* Extended features */ + struct bt_hci_rsp_read_local_oob_data rsp; - btdev->max_page = 1; + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_READ_LOCAL_OOB_DATA, &rsp, sizeof(rsp)); + + return 0; } -static void set_le_features(struct btdev *btdev) +static int cmd_read_inquiry_tx_power(struct btdev *dev, const void *data, + uint8_t len) { - btdev->features[4] |= 0x20; /* BR/EDR Not Supported */ - btdev->features[4] |= 0x40; /* LE Supported */ + struct bt_hci_rsp_read_inquiry_resp_tx_power rsp; - btdev->max_page = 1; + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.level = 0; + cmd_complete(dev, BT_HCI_CMD_READ_INQUIRY_RESP_TX_POWER, &rsp, + sizeof(rsp)); - btdev->le_features[0] |= 0x01; /* LE Encryption */ - btdev->le_features[0] |= 0x02; /* Connection Parameters Request */ - btdev->le_features[0] |= 0x08; /* Slave-initiated Features Exchange */ + return 0; } -static void set_le_states(struct btdev *btdev) +static int cmd_write_inquiry_tx_power(struct btdev *dev, const void *data, + uint8_t len) { - /* Set all 41 bits as per Bluetooth 5.0 specification */ - btdev->le_states[0] = 0xff; - btdev->le_states[1] = 0xff; - btdev->le_states[2] = 0xff; - btdev->le_states[3] = 0xff; - btdev->le_states[4] = 0xff; - btdev->le_states[5] = 0x03; + return -ENOTSUP; } -static void set_amp_features(struct btdev *btdev) +static int cmd_io_cap_reply(struct btdev *dev, const void *data, uint8_t len) { -} + struct btdev *remote = dev->conn; + const struct bt_hci_cmd_io_capability_request_reply *cmd = data; + struct bt_hci_evt_io_capability_response ev; + struct bt_hci_rsp_io_capability_request_reply rsp; + uint8_t status; -struct btdev *btdev_create(enum btdev_type type, uint16_t id) -{ - struct btdev *btdev; - int index; + if (!remote) { + status = BT_HCI_ERR_UNKNOWN_CONN_ID; + goto done; + } - btdev = malloc(sizeof(*btdev)); - if (!btdev) - return NULL; + status = BT_HCI_ERR_SUCCESS; - memset(btdev, 0, sizeof(*btdev)); + dev->io_cap = cmd->capability; + dev->auth_req = cmd->authentication; - if (type == BTDEV_TYPE_BREDRLE || type == BTDEV_TYPE_LE || - type == BTDEV_TYPE_BREDRLE50 || - type == BTDEV_TYPE_BREDRLE52) { - btdev->crypto = bt_crypto_new(); - if (!btdev->crypto) { - free(btdev); - return NULL; - } - } + memcpy(ev.bdaddr, dev->bdaddr, 6); + ev.capability = cmd->capability; + ev.oob_data = cmd->oob_data; + ev.authentication = cmd->authentication; - btdev->type = type; + send_event(remote, BT_HCI_EVT_IO_CAPABILITY_RESPONSE, &ev, sizeof(ev)); - btdev->manufacturer = 63; - btdev->revision = 0x0000; + if (remote->io_cap) { + struct bt_hci_evt_user_confirm_request cfm; - switch (btdev->type) { - case BTDEV_TYPE_BREDRLE: - case BTDEV_TYPE_BREDRLE50: - case BTDEV_TYPE_BREDRLE52: - btdev->version = 0x09; - set_bredrle_features(btdev); - set_bredrle_commands(btdev); - set_le_states(btdev); - break; - case BTDEV_TYPE_BREDR: - btdev->version = 0x05; - set_bredr_features(btdev); - set_bredr_commands(btdev); - break; - case BTDEV_TYPE_LE: - btdev->version = 0x09; - set_le_features(btdev); - set_le_commands(btdev); - set_le_states(btdev); - break; - case BTDEV_TYPE_AMP: - btdev->version = 0x01; - set_amp_features(btdev); - set_amp_commands(btdev); - break; - case BTDEV_TYPE_BREDR20: - btdev->version = 0x03; - set_bredr20_features(btdev); - set_bredr20_commands(btdev); - break; + memcpy(cfm.bdaddr, dev->bdaddr, 6); + cfm.passkey = 0; + + send_event(remote, BT_HCI_EVT_USER_CONFIRM_REQUEST, + &cfm, sizeof(cfm)); + + memcpy(cfm.bdaddr, cmd->bdaddr, 6); + send_event(dev, BT_HCI_EVT_USER_CONFIRM_REQUEST, + &cfm, sizeof(cfm)); + } else { + send_event(remote, BT_HCI_EVT_IO_CAPABILITY_REQUEST, + dev->bdaddr, 6); } - btdev->page_scan_interval = 0x0800; - btdev->page_scan_window = 0x0012; - btdev->page_scan_type = 0x00; +done: + rsp.status = status; + memcpy(rsp.bdaddr, cmd->bdaddr, 6); + cmd_complete(dev, BT_HCI_CMD_IO_CAPABILITY_REQUEST_REPLY, + &rsp, sizeof(rsp)); - btdev->sync_train_interval = 0x0080; - btdev->sync_train_timeout = 0x0002ee00; - btdev->sync_train_service_data = 0x00; + return 0; +} + +static void ssp_complete(struct btdev *btdev, const uint8_t *bdaddr, + uint8_t status, bool wait) +{ + struct bt_hci_evt_simple_pairing_complete iev, aev; + struct bt_hci_evt_auth_complete auth; + struct btdev *remote = btdev->conn; + struct btdev *init, *accp; + + if (!remote) + return; - btdev->acl_mtu = 192; - btdev->acl_max_pkt = 1; + btdev->ssp_status = status; + btdev->ssp_auth_complete = true; - btdev->iso_mtu = 251; - btdev->iso_max_pkt = 1; + if (!remote->ssp_auth_complete && wait) + return; - btdev->country_code = 0x00; + if (status == BT_HCI_ERR_SUCCESS && + remote->ssp_status != BT_HCI_ERR_SUCCESS) + status = remote->ssp_status; - index = add_btdev(btdev); - if (index < 0) { - bt_crypto_unref(btdev->crypto); - free(btdev); - return NULL; + iev.status = status; + aev.status = status; + + if (btdev->auth_init) { + init = btdev; + accp = remote; + memcpy(iev.bdaddr, bdaddr, 6); + memcpy(aev.bdaddr, btdev->bdaddr, 6); + } else { + init = remote; + accp = btdev; + memcpy(iev.bdaddr, btdev->bdaddr, 6); + memcpy(aev.bdaddr, bdaddr, 6); } - get_bdaddr(id, index, btdev->bdaddr); + send_event(init, BT_HCI_EVT_SIMPLE_PAIRING_COMPLETE, &iev, + sizeof(iev)); + send_event(accp, BT_HCI_EVT_SIMPLE_PAIRING_COMPLETE, &aev, + sizeof(aev)); - return btdev; + if (status == BT_HCI_ERR_SUCCESS) { + link_key_notify(init, iev.bdaddr, LINK_KEY_DUMMY); + link_key_notify(accp, aev.bdaddr, LINK_KEY_DUMMY); + } + + auth.status = status; + auth.handle = cpu_to_le16(ACL_HANDLE); + send_event(init, BT_HCI_EVT_AUTH_COMPLETE, &auth, sizeof(auth)); } -void btdev_destroy(struct btdev *btdev) +static int cmd_user_confirm_reply(struct btdev *dev, const void *data, + uint8_t len) { - if (!btdev) - return; + struct bt_hci_rsp_user_confirm_request_reply rsp; - if (btdev->inquiry_id > 0) - timeout_remove(btdev->inquiry_id); - - bt_crypto_unref(btdev->crypto); - del_btdev(btdev); + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.bdaddr, data, 6); + cmd_complete(dev, BT_HCI_CMD_USER_CONFIRM_REQUEST_REPLY, &rsp, + sizeof(rsp)); + ssp_complete(dev, data, BT_HCI_ERR_SUCCESS, true); - free(btdev); + return 0; } -bool btdev_set_debug(struct btdev *btdev, btdev_debug_func_t callback, - void *user_data, btdev_destroy_func_t destroy) +static int cmd_user_confirm_negative_reply(struct btdev *dev, const void *data, + uint8_t len) { - if (!btdev) - return false; + struct bt_hci_rsp_user_confirm_request_neg_reply rsp; - if (btdev->debug_destroy) - btdev->debug_destroy(btdev->debug_data); + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.bdaddr, data, 6); + cmd_complete(dev, BT_HCI_CMD_USER_CONFIRM_REQUEST_NEG_REPLY, + &rsp, sizeof(rsp)); + ssp_complete(dev, data, BT_HCI_ERR_AUTH_FAILURE, true); - btdev->debug_callback = callback; - btdev->debug_destroy = destroy; - btdev->debug_data = user_data; + return 0; +} - return true; +static int cmd_user_passkey_reply(struct btdev *dev, const void *data, + uint8_t len) +{ + return -ENOTSUP; } -const uint8_t *btdev_get_bdaddr(struct btdev *btdev) +static int cmd_user_passkey_negative_reply(struct btdev *dev, const void *data, + uint8_t len) { - return btdev->bdaddr; + return -ENOTSUP; } -uint8_t *btdev_get_features(struct btdev *btdev) +static int cmd_io_cap_negative_reply(struct btdev *dev, const void *data, + uint8_t len) { - return btdev->features; + const struct bt_hci_cmd_io_capability_request_neg_reply *cmd = data; + struct bt_hci_rsp_io_capability_request_neg_reply rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.bdaddr, cmd->bdaddr, 6); + cmd_complete(dev, BT_HCI_CMD_IO_CAPABILITY_REQUEST_NEG_REPLY, + &rsp, sizeof(rsp)); + + ssp_complete(dev, cmd->bdaddr, BT_HCI_ERR_AUTH_FAILURE, false); + + return 0; } -uint8_t btdev_get_scan_enable(struct btdev *btdev) +static int cmd_read_encrypt_key_size(struct btdev *dev, const void *data, + uint8_t len) { - return btdev->scan_enable; + const struct bt_hci_cmd_read_encrypt_key_size *cmd = data; + struct bt_hci_rsp_read_encrypt_key_size rsp; + + rsp.handle = cmd->handle; + + if (dev->conn) { + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.key_size = 16; + } else { + rsp.status = BT_HCI_ERR_UNKNOWN_CONN_ID; + rsp.key_size = 0; + } + + cmd_complete(dev, BT_HCI_CMD_READ_ENCRYPT_KEY_SIZE, &rsp, sizeof(rsp)); + + return 0; } -uint8_t btdev_get_le_scan_enable(struct btdev *btdev) +static int cmd_read_data_block_size(struct btdev *dev, const void *data, + uint8_t len) { - return btdev->le_scan_enable; + struct bt_hci_rsp_read_data_block_size rsp; + + memset(&rsp, 0, sizeof(rsp)); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.max_acl_len = cpu_to_le16(dev->acl_mtu); + rsp.block_len = cpu_to_le16(dev->acl_mtu); + rsp.num_blocks = cpu_to_le16(dev->acl_max_pkt); + cmd_complete(dev, BT_HCI_CMD_READ_DATA_BLOCK_SIZE, &rsp, sizeof(rsp)); + + return 0; } -void btdev_set_le_states(struct btdev *btdev, const uint8_t *le_states) +static int cmd_read_local_codecs(struct btdev *dev, const void *data, + uint8_t len) { - memcpy(btdev->le_states, le_states, sizeof(btdev->le_states)); + struct bt_hci_rsp_read_local_codecs *rsp; + + rsp = alloca(sizeof(*rsp) + 7); + rsp->status = BT_HCI_ERR_SUCCESS; + rsp->num_codecs = 0x06; + rsp->codec[0] = 0x00; + rsp->codec[1] = 0x01; + rsp->codec[2] = 0x02; + rsp->codec[3] = 0x03; + rsp->codec[4] = 0x04; + rsp->codec[5] = 0x05; + rsp->codec[6] = 0x00; + cmd_complete(dev, BT_HCI_CMD_READ_LOCAL_CODECS, rsp, sizeof(*rsp) + 7); + + return 0; } -static bool use_ssp(struct btdev *btdev1, struct btdev *btdev2) +static int cmd_get_mws_transport_config(struct btdev *dev, const void *data, + uint8_t len) { - if (btdev1->auth_enable || btdev2->auth_enable) - return false; + struct bt_hci_rsp_get_mws_transport_config *rsp; - return (btdev1->simple_pairing_mode && btdev2->simple_pairing_mode); + rsp = alloca(sizeof(*rsp)); + rsp->status = BT_HCI_ERR_SUCCESS; + rsp->num_transports = 0x00; + cmd_complete(dev, BT_HCI_CMD_GET_MWS_TRANSPORT_CONFIG, rsp, + sizeof(*rsp)); + + return 0; } -void btdev_set_command_handler(struct btdev *btdev, btdev_command_func handler, - void *user_data) +#define CMD_BREDR \ + CMD(BT_HCI_CMD_SETUP_SYNC_CONN, cmd_setup_sync_conn, NULL), \ + CMD(BT_HCI_CMD_READ_EXT_INQUIRY_RESPONSE, cmd_read_ext_inquiry, NULL), \ + CMD(BT_HCI_CMD_WRITE_EXT_INQUIRY_RESPONSE, cmd_write_ext_inquiry, \ + NULL), \ + CMD(BT_HCI_CMD_READ_SIMPLE_PAIRING_MODE, cmd_read_ssp_mode, NULL), \ + CMD(BT_HCI_CMD_WRITE_SIMPLE_PAIRING_MODE, cmd_write_ssp_mode, NULL), \ + CMD(BT_HCI_CMD_READ_LOCAL_OOB_DATA, cmd_read_oob_data, NULL), \ + CMD(BT_HCI_CMD_READ_INQUIRY_RESP_TX_POWER, cmd_read_inquiry_tx_power, \ + NULL), \ + CMD(BT_HCI_CMD_WRITE_INQUIRY_TX_POWER, cmd_write_inquiry_tx_power, \ + NULL), \ + CMD(BT_HCI_CMD_IO_CAPABILITY_REQUEST_REPLY, cmd_io_cap_reply, NULL), \ + CMD(BT_HCI_CMD_USER_CONFIRM_REQUEST_REPLY, cmd_user_confirm_reply, \ + NULL), \ + CMD(BT_HCI_CMD_USER_CONFIRM_REQUEST_NEG_REPLY, \ + cmd_user_confirm_negative_reply, \ + NULL), \ + CMD(BT_HCI_CMD_USER_PASSKEY_REQUEST_NEG_REPLY, cmd_user_passkey_reply, \ + NULL), \ + CMD(BT_HCI_CMD_USER_PASSKEY_REQUEST_NEG_REPLY, \ + cmd_user_passkey_negative_reply, \ + NULL), \ + CMD(BT_HCI_CMD_IO_CAPABILITY_REQUEST_NEG_REPLY, \ + cmd_io_cap_negative_reply, NULL), \ + CMD(BT_HCI_CMD_READ_ENCRYPT_KEY_SIZE, cmd_read_encrypt_key_size, \ + NULL), \ + CMD(BT_HCI_CMD_READ_DATA_BLOCK_SIZE, cmd_read_data_block_size, NULL), \ + CMD(BT_HCI_CMD_READ_LOCAL_CODECS, cmd_read_local_codecs, NULL), \ + CMD(BT_HCI_CMD_GET_MWS_TRANSPORT_CONFIG, cmd_get_mws_transport_config, \ + NULL) + +static const struct btdev_cmd cmd_bredr[] = { + CMD_COMMON_ALL, + CMD_COMMON_BREDR_LE, + CMD_COMMON_BREDR_20, + CMD_BREDR, + {} +}; + +static void set_bredr_commands(struct btdev *btdev) { - if (!btdev) - return; + set_common_commands_all(btdev); + set_common_commands_bredrle(btdev); + set_common_commands_bredr20(btdev); - btdev->command_handler = handler; - btdev->command_data = user_data; + btdev->commands[16] |= 0x08; /* Setup Synchronous Connection */ + btdev->commands[17] |= 0x01; /* Read Extended Inquiry Response */ + btdev->commands[17] |= 0x02; /* Write Extended Inquiry Response */ + btdev->commands[17] |= 0x20; /* Read Simple Pairing Mode */ + btdev->commands[17] |= 0x40; /* Write Simple Pairing Mode */ + btdev->commands[17] |= 0x80; /* Read Local OOB Data */ + btdev->commands[18] |= 0x01; /* Read Inquiry Response TX Power */ + btdev->commands[18] |= 0x02; /* Write Inquiry Response TX Power */ + btdev->commands[18] |= 0x80; /* IO Capability Request Reply */ + btdev->commands[19] |= 0x01; /* User Confirmation Request Reply */ + btdev->commands[19] |= 0x02; /* User Confirmation Request N Reply */ + btdev->commands[19] |= 0x04; /* User Passkey Request Reply */ + btdev->commands[19] |= 0x08; /* User Passkey Request N Reply */ + btdev->commands[20] |= 0x08; /* IO Capability Request N Reply */ + btdev->commands[20] |= 0x10; /* Read Encryption Key Size */ + btdev->commands[23] |= 0x04; /* Read Data Block Size */ + btdev->commands[29] |= 0x20; /* Read Local Supported Codecs */ + btdev->commands[30] |= 0x08; /* Get MWS Transport Layer Config */ + btdev->cmds = cmd_bredr; } -void btdev_set_send_handler(struct btdev *btdev, btdev_send_func handler, - void *user_data) -{ - if (!btdev) - return; +static const struct btdev_cmd cmd_bredr_20[] = { + CMD_COMMON_ALL, + CMD_COMMON_BREDR_LE, + CMD_COMMON_BREDR_20, + {} +}; - btdev->send_handler = handler; - btdev->send_data = user_data; +static void set_bredr20_commands(struct btdev *btdev) +{ + set_common_commands_all(btdev); + set_common_commands_bredrle(btdev); + set_common_commands_bredr20(btdev); + btdev->cmds = cmd_bredr_20; } -static void send_packet(struct btdev *btdev, const struct iovec *iov, - int iovlen) +static int cmd_read_le_host_supported(struct btdev *dev, const void *data, + uint8_t len) { - int i; + struct bt_hci_rsp_read_le_host_supported rsp; - if (!btdev->send_handler) - return; + memset(&rsp, 0, sizeof(rsp)); - for (i = 0; i < iovlen; i++) { - if (!i) - util_hexdump('<', iov[i].iov_base, iov[i].iov_len, - btdev->debug_callback, btdev->debug_data); - else - util_hexdump(' ', iov[i].iov_base, iov[i].iov_len, - btdev->debug_callback, btdev->debug_data); - } + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.supported = dev->le_supported; + rsp.simultaneous = dev->le_simultaneous; + cmd_complete(dev, BT_HCI_CMD_READ_LE_HOST_SUPPORTED, &rsp, sizeof(rsp)); - btdev->send_handler(iov, iovlen, btdev->send_data); + return 0; } -static void send_event(struct btdev *btdev, uint8_t event, - const void *data, uint8_t len) +static int cmd_write_le_host_supported(struct btdev *dev, const void *data, + uint8_t len) { - struct bt_hci_evt_hdr hdr; - struct iovec iov[3]; - uint8_t pkt = BT_H4_EVT_PKT; + const struct bt_hci_cmd_write_le_host_supported *cmd = data; + uint8_t status; - util_debug(btdev->debug_callback, btdev->debug_data, - "event 0x%02x", event); + dev->le_supported = cmd->supported; + dev->le_simultaneous = cmd->simultaneous; + status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_WRITE_LE_HOST_SUPPORTED, &status, + sizeof(status)); - iov[0].iov_base = &pkt; - iov[0].iov_len = sizeof(pkt); + return 0; +} - hdr.evt = event; - hdr.plen = len; +static int cmd_le_set_event_mask(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_le_set_event_mask *cmd = data; + uint8_t status; - iov[1].iov_base = &hdr; - iov[1].iov_len = sizeof(hdr); + memcpy(dev->le_event_mask, cmd->mask, 8); + status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_LE_SET_EVENT_MASK, &status, + sizeof(status)); - if (len > 0) { - iov[2].iov_base = (void *) data; - iov[2].iov_len = len; - } + return 0; +} - if (run_hooks(btdev, BTDEV_HOOK_POST_EVT, event, data, len)) - send_packet(btdev, iov, len > 0 ? 3 : 2); +static int cmd_le_read_buffer_size(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_le_read_buffer_size rsp; + + memset(&rsp, 0, sizeof(rsp)); + + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.le_mtu = cpu_to_le16(dev->acl_mtu); + rsp.le_max_pkt = dev->acl_max_pkt; + cmd_complete(dev, BT_HCI_CMD_LE_READ_BUFFER_SIZE, &rsp, sizeof(rsp)); + + return 0; } -static void send_cmd(struct btdev *btdev, uint8_t evt, uint16_t opcode, - const struct iovec *iov, int iovlen) +static int cmd_le_read_local_features(struct btdev *dev, const void *data, + uint8_t len) { - struct bt_hci_evt_hdr hdr; - struct iovec iov2[2 + iovlen]; - uint8_t pkt = BT_H4_EVT_PKT; - int i; + struct bt_hci_rsp_le_read_local_features rsp; - util_debug(btdev->debug_callback, btdev->debug_data, - "event 0x%02x opcode 0x%04x", evt, opcode); + memset(&rsp, 0, sizeof(rsp)); - iov2[0].iov_base = &pkt; - iov2[0].iov_len = sizeof(pkt); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.features, dev->le_features, 8); + cmd_complete(dev, BT_HCI_CMD_LE_READ_LOCAL_FEATURES, &rsp, sizeof(rsp)); - hdr.evt = evt; - hdr.plen = 0; + return 0; +} - iov2[1].iov_base = &hdr; - iov2[1].iov_len = sizeof(hdr); +static int cmd_set_random_address(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_le_set_random_address *cmd = data; + uint8_t status; - for (i = 0; i < iovlen; i++) { - hdr.plen += iov[i].iov_len; - iov2[2 + i].iov_base = iov[i].iov_base; - iov2[2 + i].iov_len = iov[i].iov_len; + memcpy(dev->random_addr, cmd->addr, 6); + status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_LE_SET_RANDOM_ADDRESS, &status, + sizeof(status)); + + return 0; +} + +static uint16_t ext_legacy_adv_type(uint8_t type) +{ + switch (type) { + case 0x00: + /* Connectable undirected - ADV_IND" */ + return 0x0013; + case 0x01: + /* Connectable directed - ADV_DIRECT_IND */ + return 0x0015; + case 0x02: + /* Scannable undirected - ADV_SCAN_IND */ + return 0x0012; + case 0x03: + /* Non connectable undirected - ADV_NONCONN_IND */ + return 0x0010; + case 0x04: + /* Scan response - SCAN_RSP */ + return 0x0012; } - if (run_hooks(btdev, BTDEV_HOOK_POST_CMD, opcode, iov[i -1].iov_base, - iov[i -1].iov_len)) - send_packet(btdev, iov2, 2 + iovlen); + return 0x0000; } -static void cmd_complete(struct btdev *btdev, uint16_t opcode, - const void *data, uint8_t len) +static int cmd_set_adv_params(struct btdev *dev, const void *data, uint8_t len) { - struct bt_hci_evt_cmd_complete cc; - struct iovec iov[2]; + const struct bt_hci_cmd_le_set_adv_parameters *cmd = data; + uint8_t status; - cc.ncmd = 0x01; - cc.opcode = cpu_to_le16(opcode); + if (dev->le_adv_enable) { + status = BT_HCI_ERR_COMMAND_DISALLOWED; + goto done; + } - iov[0].iov_base = &cc; - iov[0].iov_len = sizeof(cc); + dev->le_adv_type = cmd->type; + /* Use Legacy PDU if the remote is using EXT Scan */ + dev->le_ext_adv_type = ext_legacy_adv_type(cmd->type); + dev->le_adv_own_addr = cmd->own_addr_type; + dev->le_adv_direct_addr_type = cmd->direct_addr_type; + memcpy(dev->le_adv_direct_addr, cmd->direct_addr, 6); + + status = BT_HCI_ERR_SUCCESS; - iov[1].iov_base = (void *) data; - iov[1].iov_len = len; +done: + cmd_complete(dev, BT_HCI_CMD_LE_SET_ADV_PARAMETERS, &status, + sizeof(status)); - send_cmd(btdev, BT_HCI_EVT_CMD_COMPLETE, opcode, iov, 2); + return 0; } -static void cmd_status(struct btdev *btdev, uint8_t status, uint16_t opcode) +static int cmd_read_adv_tx_power(struct btdev *dev, const void *data, + uint8_t len) { - struct bt_hci_evt_cmd_status cs; - struct iovec iov; - - cs.status = status; - cs.ncmd = 0x01; - cs.opcode = cpu_to_le16(opcode); + struct bt_hci_rsp_le_read_adv_tx_power rsp; - iov.iov_base = &cs; - iov.iov_len = sizeof(cs); + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.level = 0; + cmd_complete(dev, BT_HCI_CMD_LE_READ_ADV_TX_POWER, &rsp, sizeof(rsp)); - send_cmd(btdev, BT_HCI_EVT_CMD_STATUS, opcode, &iov, 1); + return 0; } -static void le_meta_event(struct btdev *btdev, uint8_t event, - void *data, uint8_t len) +static int cmd_set_adv_data(struct btdev *dev, const void *data, uint8_t len) { - void *pkt_data; - - util_debug(btdev->debug_callback, btdev->debug_data, - "meta event 0x%02x", event); - - pkt_data = alloca(1 + len); - if (!pkt_data) - return; + const struct bt_hci_cmd_le_set_adv_data *cmd = data; + uint8_t status; - ((uint8_t *) pkt_data)[0] = event; + dev->le_adv_data_len = cmd->len; + memcpy(dev->le_adv_data, cmd->data, 31); + status = BT_HCI_ERR_SUCCESS; - if (len > 0) - memcpy(pkt_data + 1, data, len); + cmd_complete(dev, BT_HCI_CMD_LE_SET_ADV_DATA, &status, sizeof(status)); - send_event(btdev, BT_HCI_EVT_LE_META_EVENT, pkt_data, 1 + len); + return 0; } -static void num_completed_packets(struct btdev *btdev, uint16_t handle) +static int cmd_set_scan_rsp_data(struct btdev *dev, const void *data, + uint8_t len) { - if (btdev->conn) { - struct bt_hci_evt_num_completed_packets ncp; + const struct bt_hci_cmd_le_set_scan_rsp_data *cmd = data; + uint8_t status; - ncp.num_handles = 1; - ncp.handle = cpu_to_le16(handle); - ncp.count = cpu_to_le16(1); + dev->le_scan_data_len = cmd->len; + memcpy(dev->le_scan_data, cmd->data, 31); + status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_LE_SET_SCAN_RSP_DATA, &status, + sizeof(status)); - send_event(btdev, BT_HCI_EVT_NUM_COMPLETED_PACKETS, - &ncp, sizeof(ncp)); - } + return 0; } -static bool inquiry_callback(void *user_data) +static uint8_t get_ext_adv_type(uint8_t ext_adv_type) { - struct inquiry_data *data = user_data; - struct btdev *btdev = data->btdev; - struct bt_hci_evt_inquiry_complete ic; - int sent = data->sent_count; - int i; + /* + * If legacy bit is not set then just reset high duty cycle directed + * bit. + */ + if (!(ext_adv_type & 0x10)) + return (ext_adv_type & 0xf7); - /*Report devices only once and wait for inquiry timeout*/ - if (data->iter == MAX_BTDEV_ENTRIES) - return true; + /* + * Connectable low duty cycle directed advertising creates a + * connectable directed advertising report type. + */ + if (ext_adv_type == 0x001d) + return 0x0015; - for (i = data->iter; i < MAX_BTDEV_ENTRIES; i++) { - /*Lets sent 10 inquiry results at once */ - if (sent + 10 == data->sent_count) - break; + return ext_adv_type; +} - if (!btdev_list[i] || btdev_list[i] == btdev) - continue; +static const uint8_t *scan_addr(const struct btdev *btdev) +{ + if (btdev->le_scan_own_addr_type == 0x01) + return btdev->random_addr; - if (!(btdev_list[i]->scan_enable & 0x02)) - continue; + return btdev->bdaddr; +} - if (btdev->inquiry_mode == 0x02 && - btdev_list[i]->ext_inquiry_rsp[0]) { - struct bt_hci_evt_ext_inquiry_result ir; +static bool ext_adv_match(struct btdev *scan, struct btdev *adv) +{ + /* Match everything if this is not directed advertising */ + if (!(adv->le_ext_adv_type & 0x04)) + return true; - ir.num_resp = 0x01; - memcpy(ir.bdaddr, btdev_list[i]->bdaddr, 6); - ir.pscan_rep_mode = 0x00; - ir.pscan_period_mode = 0x00; - memcpy(ir.dev_class, btdev_list[i]->dev_class, 3); - ir.clock_offset = 0x0000; - ir.rssi = -60; - memcpy(ir.data, btdev_list[i]->ext_inquiry_rsp, 240); + if (scan->le_scan_own_addr_type != adv->le_adv_direct_addr_type) + return false; - send_event(btdev, BT_HCI_EVT_EXT_INQUIRY_RESULT, - &ir, sizeof(ir)); - data->sent_count++; - continue; - } + return !memcmp(scan_addr(scan), adv->le_adv_direct_addr, 6); +} - if (btdev->inquiry_mode > 0x00) { - struct bt_hci_evt_inquiry_result_with_rssi ir; +static const uint8_t *adv_addr(const struct btdev *btdev) +{ + if (btdev->le_adv_own_addr == 0x01) + return btdev->random_addr; - ir.num_resp = 0x01; - memcpy(ir.bdaddr, btdev_list[i]->bdaddr, 6); - ir.pscan_rep_mode = 0x00; - ir.pscan_period_mode = 0x00; - memcpy(ir.dev_class, btdev_list[i]->dev_class, 3); - ir.clock_offset = 0x0000; - ir.rssi = -60; + return btdev->bdaddr; +} - send_event(btdev, BT_HCI_EVT_INQUIRY_RESULT_WITH_RSSI, - &ir, sizeof(ir)); - data->sent_count++; - } else { - struct bt_hci_evt_inquiry_result ir; +static void le_send_adv_report(struct btdev *btdev, const struct btdev *remote, + uint8_t type) +{ + struct __packed { + uint8_t subevent; + union { + struct bt_hci_evt_le_adv_report lar; + uint8_t raw[10 + 31 + 1]; + }; + } meta_event; - ir.num_resp = 0x01; - memcpy(ir.bdaddr, btdev_list[i]->bdaddr, 6); - ir.pscan_rep_mode = 0x00; - ir.pscan_period_mode = 0x00; - ir.pscan_mode = 0x00; - memcpy(ir.dev_class, btdev_list[i]->dev_class, 3); - ir.clock_offset = 0x0000; + meta_event.subevent = BT_HCI_EVT_LE_ADV_REPORT; - send_event(btdev, BT_HCI_EVT_INQUIRY_RESULT, - &ir, sizeof(ir)); - data->sent_count++; - } + memset(&meta_event.lar, 0, sizeof(meta_event.lar)); + meta_event.lar.num_reports = 1; + meta_event.lar.event_type = type; + meta_event.lar.addr_type = remote->le_adv_own_addr; + memcpy(meta_event.lar.addr, adv_addr(remote), 6); + + /* Scan or advertising response */ + if (type == 0x04) { + meta_event.lar.data_len = remote->le_scan_data_len; + memcpy(meta_event.lar.data, remote->le_scan_data, + meta_event.lar.data_len); + } else { + meta_event.lar.data_len = remote->le_adv_data_len; + memcpy(meta_event.lar.data, remote->le_adv_data, + meta_event.lar.data_len); } - data->iter = i; + /* Not available */ + meta_event.raw[10 + meta_event.lar.data_len] = 127; + send_event(btdev, BT_HCI_EVT_LE_META_EVENT, &meta_event, + 1 + 10 + meta_event.lar.data_len + 1); +} - /* Check if we sent already required amount of responses*/ - if (data->num_resp && data->sent_count == data->num_resp) - goto finish; +static uint8_t get_adv_report_type(uint8_t adv_type) +{ + /* + * Connectable low duty cycle directed advertising creates a + * connectable directed advertising report type. + */ + if (adv_type == 0x04) + return 0x01; - return true; + return adv_type; +} -finish: - /* Note that destroy will be called */ - ic.status = BT_HCI_ERR_SUCCESS; - send_event(btdev, BT_HCI_EVT_INQUIRY_COMPLETE, &ic, sizeof(ic)); +static bool adv_match(struct btdev *scan, struct btdev *adv) +{ + /* Match everything if this is not directed advertising */ + if (adv->le_adv_type != 0x01 && adv->le_adv_type != 0x04) + return true; - return false; + if (scan->le_scan_own_addr_type != adv->le_adv_direct_addr_type) + return false; + + return !memcmp(scan_addr(scan), adv->le_adv_direct_addr, 6); } -static void inquiry_destroy(void *user_data) +static void le_set_adv_enable_complete(struct btdev *btdev) { - struct inquiry_data *data = user_data; - struct btdev *btdev = data->btdev; - - if (!btdev) - goto finish; + uint8_t report_type; + int i; - btdev->inquiry_id = 0; + report_type = get_adv_report_type(btdev->le_adv_type); - if (btdev->inquiry_timeout_id > 0) { - timeout_remove(btdev->inquiry_timeout_id); - btdev->inquiry_timeout_id = 0; - } + for (i = 0; i < MAX_BTDEV_ENTRIES; i++) { + if (!btdev_list[i] || btdev_list[i] == btdev) + continue; -finish: - free(data); -} + if (!btdev_list[i]->le_scan_enable) + continue; -static bool inquiry_timeout(void *user_data) -{ - struct inquiry_data *data = user_data; - struct btdev *btdev = data->btdev; - struct bt_hci_evt_inquiry_complete ic; + if (!adv_match(btdev_list[i], btdev)) + continue; - timeout_remove(btdev->inquiry_id); - btdev->inquiry_timeout_id = 0; + le_send_adv_report(btdev_list[i], btdev, report_type); - /* Inquiry is stopped, send Inquiry complete event. */ - ic.status = BT_HCI_ERR_SUCCESS; - send_event(btdev, BT_HCI_EVT_INQUIRY_COMPLETE, &ic, sizeof(ic)); + if (btdev_list[i]->le_scan_type != 0x01) + continue; - return false; + /* ADV_IND & ADV_SCAN_IND generate a scan response */ + if (btdev->le_adv_type == 0x00 || btdev->le_adv_type == 0x02) + le_send_adv_report(btdev_list[i], btdev, 0x04); + } } -static void inquiry_cmd(struct btdev *btdev, const void *cmd) +static int cmd_set_adv_enable(struct btdev *dev, const void *data, uint8_t len) { - const struct bt_hci_cmd_inquiry *inq_cmd = cmd; - struct inquiry_data *data; - struct bt_hci_evt_inquiry_complete ic; - int status = BT_HCI_ERR_HARDWARE_FAILURE; - unsigned int inquiry_len_ms; + const struct bt_hci_cmd_le_set_ext_adv_enable *cmd = data; + uint8_t status; - if (btdev->inquiry_id > 0) { + if (dev->le_adv_enable == cmd->enable) { status = BT_HCI_ERR_COMMAND_DISALLOWED; - goto failed; + goto done; } - data = malloc(sizeof(*data)); - if (!data) - goto failed; - - memset(data, 0, sizeof(*data)); - data->btdev = btdev; - data->num_resp = inq_cmd->num_resp; + dev->le_adv_enable = cmd->enable; + status = BT_HCI_ERR_SUCCESS; - /* Add timeout to cancel inquiry */ - inquiry_len_ms = 1280 * inq_cmd->length; - if (inquiry_len_ms) - btdev->inquiry_timeout_id = timeout_add(inquiry_len_ms, - inquiry_timeout, - data, NULL); +done: + cmd_complete(dev, BT_HCI_CMD_LE_SET_ADV_ENABLE, &status, + sizeof(status)); - btdev->inquiry_id = timeout_add(DEFAULT_INQUIRY_INTERVAL, - inquiry_callback, data, - inquiry_destroy); - /* Return if success */ - if (btdev->inquiry_id > 0) - return; + if (!status && dev->le_adv_enable) + le_set_adv_enable_complete(dev); -failed: - ic.status = status; - send_event(btdev, BT_HCI_EVT_INQUIRY_COMPLETE, &ic, sizeof(ic)); + return 0; } -static void inquiry_cancel(struct btdev *btdev) +static int cmd_set_scan_params(struct btdev *dev, const void *data, uint8_t len) { + const struct bt_hci_cmd_le_set_scan_parameters *cmd = data; uint8_t status; - if (!btdev->inquiry_id) { + if (dev->le_scan_enable) { status = BT_HCI_ERR_COMMAND_DISALLOWED; - cmd_complete(btdev, BT_HCI_CMD_INQUIRY_CANCEL, &status, - sizeof(status)); - return; + goto done; } - timeout_remove(btdev->inquiry_timeout_id); - btdev->inquiry_timeout_id = 0; - timeout_remove(btdev->inquiry_id); - btdev->inquiry_id = 0; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, BT_HCI_CMD_INQUIRY_CANCEL, &status, - sizeof(status)); -} - -static void conn_complete(struct btdev *btdev, - const uint8_t *bdaddr, uint8_t status) -{ - struct bt_hci_evt_conn_complete cc; - - if (!status) { - struct btdev *remote = find_btdev_by_bdaddr(bdaddr); + dev->le_scan_type = cmd->type; + dev->le_scan_own_addr_type = cmd->own_addr_type; - btdev->conn = remote; - remote->conn = btdev; - - cc.status = status; - memcpy(cc.bdaddr, btdev->bdaddr, 6); - cc.encr_mode = 0x00; +done: + cmd_complete(dev, BT_HCI_CMD_LE_SET_SCAN_PARAMETERS, &status, + sizeof(status)); - cc.handle = cpu_to_le16(ACL_HANDLE); - cc.link_type = 0x01; + return 0; +} - send_event(remote, BT_HCI_EVT_CONN_COMPLETE, &cc, sizeof(cc)); +static int cmd_set_scan_enable(struct btdev *dev, const void *data, uint8_t len) +{ + const struct bt_hci_cmd_le_set_scan_enable *cmd = data; + uint8_t status; - cc.handle = cpu_to_le16(ACL_HANDLE); - cc.link_type = 0x01; - } else { - cc.handle = cpu_to_le16(0x0000); - cc.link_type = 0x01; + if (dev->le_scan_enable == cmd->enable) { + status = BT_HCI_ERR_COMMAND_DISALLOWED; + goto done; } - cc.status = status; - memcpy(cc.bdaddr, bdaddr, 6); - cc.encr_mode = 0x00; + dev->le_scan_enable = cmd->enable; + dev->le_filter_dup = cmd->filter_dup; + status = BT_HCI_ERR_SUCCESS; - send_event(btdev, BT_HCI_EVT_CONN_COMPLETE, &cc, sizeof(cc)); +done: + cmd_complete(dev, BT_HCI_CMD_LE_SET_SCAN_ENABLE, &status, + sizeof(status)); + + return 0; } -static void accept_conn_request_complete(struct btdev *btdev, - const uint8_t *bdaddr) +static int cmd_set_scan_enable_complete(struct btdev *dev, const void *data, + uint8_t len) { - struct btdev *remote = find_btdev_by_bdaddr(bdaddr); + const struct bt_hci_cmd_le_set_scan_enable *cmd = data; + int i; - if (!remote) - return; + if (!dev->le_scan_enable || !cmd->enable) + return 0; - if (btdev->auth_enable || remote->auth_enable) - send_event(remote, BT_HCI_EVT_LINK_KEY_REQUEST, - btdev->bdaddr, 6); - else - conn_complete(btdev, bdaddr, BT_HCI_ERR_SUCCESS); -} + for (i = 0; i < MAX_BTDEV_ENTRIES; i++) { + uint8_t report_type; -static void sync_conn_complete(struct btdev *btdev, uint16_t voice_setting, - uint8_t status) -{ - struct bt_hci_evt_sync_conn_complete cc; + if (!btdev_list[i] || btdev_list[i] == dev) + continue; - if (!btdev->conn) - return; + if (!btdev_list[i]->le_adv_enable) + continue; - cc.status = status; - memcpy(cc.bdaddr, btdev->conn->bdaddr, 6); + if (!adv_match(dev, btdev_list[i])) + continue; - cc.handle = cpu_to_le16(status == BT_HCI_ERR_SUCCESS ? 257 : 0); - cc.link_type = 0x02; - cc.tx_interval = 0x000c; - cc.retrans_window = 0x06; - cc.rx_pkt_len = 60; - cc.tx_pkt_len = 60; - cc.air_mode = (voice_setting == 0x0060) ? 0x02 : 0x03; + report_type = get_adv_report_type(btdev_list[i]->le_adv_type); + le_send_adv_report(dev, btdev_list[i], report_type); - send_event(btdev, BT_HCI_EVT_SYNC_CONN_COMPLETE, &cc, sizeof(cc)); -} + if (dev->le_scan_type != 0x01) + continue; -static void sco_conn_complete(struct btdev *btdev, uint8_t status) -{ - struct bt_hci_evt_conn_complete cc; + /* ADV_IND & ADV_SCAN_IND generate a scan response */ + if (btdev_list[i]->le_adv_type == 0x00 || + btdev_list[i]->le_adv_type == 0x02) + le_send_adv_report(dev, btdev_list[i], 0x04); + } - if (!btdev->conn) - return; + return 0; +} - cc.status = status; - memcpy(cc.bdaddr, btdev->conn->bdaddr, 6); - cc.handle = cpu_to_le16(status == BT_HCI_ERR_SUCCESS ? 257 : 0); - cc.link_type = 0x00; - cc.encr_mode = 0x00; +static bool adv_connectable(struct btdev *btdev) +{ + if (!btdev->le_adv_enable) + return false; - send_event(btdev, BT_HCI_EVT_CONN_COMPLETE, &cc, sizeof(cc)); + return btdev->le_adv_type != 0x03; } static void le_conn_complete(struct btdev *btdev, @@ -1265,232 +3021,59 @@ static void le_conn_complete(struct btdev *btdev, send_event(btdev, BT_HCI_EVT_LE_META_EVENT, buf, sizeof(buf)); } -static void le_ext_conn_complete(struct btdev *btdev, - const struct bt_hci_cmd_le_ext_create_conn *leecc, - uint8_t status) -{ - char buf[1 + sizeof(struct bt_hci_evt_le_enhanced_conn_complete)]; - struct bt_hci_evt_le_enhanced_conn_complete *cc = (void *) &buf[1]; - struct bt_hci_le_ext_create_conn *lecc = (void *)leecc->data; - - memset(buf, 0, sizeof(buf)); - - buf[0] = BT_HCI_EVT_LE_ENHANCED_CONN_COMPLETE; - - if (!status) { - struct btdev *remote; - - remote = find_btdev_by_bdaddr_type(leecc->peer_addr, - leecc->peer_addr_type); - - btdev->conn = remote; - btdev->le_adv_enable = 0; - remote->conn = btdev; - remote->le_adv_enable = 0; - - cc->status = status; - cc->peer_addr_type = btdev->le_scan_own_addr_type; - if (cc->peer_addr_type == 0x01) - memcpy(cc->peer_addr, btdev->random_addr, 6); - else - memcpy(cc->peer_addr, btdev->bdaddr, 6); - - cc->role = 0x01; - cc->handle = cpu_to_le16(ACL_HANDLE); - cc->interval = lecc->max_interval; - cc->latency = lecc->latency; - cc->supv_timeout = lecc->supv_timeout; - - send_event(remote, BT_HCI_EVT_LE_META_EVENT, buf, sizeof(buf)); - } - - cc->status = status; - cc->peer_addr_type = leecc->peer_addr_type; - memcpy(cc->peer_addr, leecc->peer_addr, 6); - cc->role = 0x00; - - send_event(btdev, BT_HCI_EVT_LE_META_EVENT, buf, sizeof(buf)); -} - -static const uint8_t *scan_addr(const struct btdev *btdev) -{ - if (btdev->le_scan_own_addr_type == 0x01) - return btdev->random_addr; - - return btdev->bdaddr; -} - -static const uint8_t *adv_addr(const struct btdev *btdev) -{ - if (btdev->le_adv_own_addr == 0x01) - return btdev->random_addr; - - return btdev->bdaddr; -} - -static bool adv_match(struct btdev *scan, struct btdev *adv) -{ - /* Match everything if this is not directed advertising */ - if (adv->le_adv_type != 0x01 && adv->le_adv_type != 0x04) - return true; - - if (scan->le_scan_own_addr_type != adv->le_adv_direct_addr_type) - return false; - - return !memcmp(scan_addr(scan), adv->le_adv_direct_addr, 6); -} - -static bool ext_adv_match(struct btdev *scan, struct btdev *adv) -{ - /* Match everything if this is not directed advertising */ - if (!(adv->le_ext_adv_type & 0x04)) - return true; - - if (scan->le_scan_own_addr_type != adv->le_adv_direct_addr_type) - return false; - - return !memcmp(scan_addr(scan), adv->le_adv_direct_addr, 6); -} - -static bool adv_connectable(struct btdev *btdev) -{ - if (!btdev->le_adv_enable) - return false; - - return btdev->le_adv_type != 0x03; -} - -static bool ext_adv_connectable(struct btdev *btdev) +static int cmd_le_create_conn(struct btdev *dev, const void *data, uint8_t len) { - if (!btdev->le_adv_enable) - return false; + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_LE_CREATE_CONN); - return btdev->le_ext_adv_type & 0x01; + return 0; } -static void le_conn_request(struct btdev *btdev, - const struct bt_hci_cmd_le_create_conn *lecc) +static int cmd_le_create_conn_complete(struct btdev *dev, const void *data, + uint8_t len) { - struct btdev *remote = find_btdev_by_bdaddr_type(lecc->peer_addr, - lecc->peer_addr_type); - - if (remote && adv_connectable(remote) && adv_match(btdev, remote) && - remote->le_adv_own_addr == lecc->peer_addr_type) - le_conn_complete(btdev, lecc, 0); - else - le_conn_complete(btdev, lecc, - BT_HCI_ERR_CONN_FAILED_TO_ESTABLISH); -} + const struct bt_hci_cmd_le_create_conn *cmd = data; + struct btdev *remote; -static void le_ext_conn_request(struct btdev *btdev, - const struct bt_hci_cmd_le_ext_create_conn *leecc) -{ - struct btdev *remote = find_btdev_by_bdaddr_type(leecc->peer_addr, - leecc->peer_addr_type); + dev->le_scan_own_addr_type = cmd->own_addr_type; - if (remote && ext_adv_connectable(remote) && - ext_adv_match(btdev, remote) && - remote->le_adv_own_addr == leecc->peer_addr_type) - le_ext_conn_complete(btdev, leecc, 0); + remote = find_btdev_by_bdaddr_type(cmd->peer_addr, cmd->peer_addr_type); + if (remote && adv_connectable(remote) && adv_match(dev, remote) && + remote->le_adv_own_addr == cmd->peer_addr_type) + le_conn_complete(dev, cmd, 0); else - le_ext_conn_complete(btdev, leecc, - BT_HCI_ERR_CONN_FAILED_TO_ESTABLISH); -} - -static void le_cis_estabilished(struct btdev *dev, uint8_t status) -{ - struct bt_hci_evt_le_cis_established evt; - - memset(&evt, 0, sizeof(evt)); + le_conn_complete(dev, cmd, BT_HCI_ERR_CONN_FAILED_TO_ESTABLISH); - evt.status = status; - - if (dev->conn) - dev = dev->conn; - - if (!evt.status) { - evt.conn_handle = cpu_to_le16(ISO_HANDLE); - /* TODO: Figure out if these values makes sense */ - memcpy(evt.cig_sync_delay, dev->le_cig.params.m_interval, - sizeof(dev->le_cig.params.m_interval)); - memcpy(evt.cis_sync_delay, dev->le_cig.params.s_interval, - sizeof(dev->le_cig.params.s_interval)); - memcpy(evt.m_latency, &dev->le_cig.params.m_latency, - sizeof(dev->le_cig.params.m_latency)); - memcpy(evt.s_latency, &dev->le_cig.params.s_latency, - sizeof(dev->le_cig.params.s_latency)); - evt.m_phy = dev->le_cig.cis.m_phy; - evt.s_phy = dev->le_cig.cis.s_phy; - evt.nse = 0x01; - evt.m_bn = 0x01; - evt.s_bn = 0x01; - evt.m_ft = 0x01; - evt.s_ft = 0x01; - evt.m_mtu = dev->le_cig.cis.m_sdu; - evt.s_mtu = dev->le_cig.cis.s_sdu; - evt.interval = dev->le_cig.params.m_latency; - } - - le_meta_event(dev, BT_HCI_EVT_LE_CIS_ESTABLISHED, &evt, sizeof(evt)); - - if (dev->conn) - le_meta_event(dev->conn, BT_HCI_EVT_LE_CIS_ESTABLISHED, &evt, - sizeof(evt)); -} - -static void le_cis_request(struct btdev *dev, - const struct bt_hci_cmd_le_create_cis *leccis) -{ - struct btdev *remote = dev->conn; - - if (remote) { - struct bt_hci_evt_le_cis_req evt; - - evt.acl_handle = cpu_to_le16(ACL_HANDLE); - evt.cis_handle = cpu_to_le16(ISO_HANDLE); - evt.cig_id = 0x00; - evt.cis_id = 0x00; - - le_meta_event(remote, BT_HCI_EVT_LE_CIS_REQ, &evt, sizeof(evt)); - } else { - le_cis_estabilished(dev, BT_HCI_ERR_UNKNOWN_CONN_ID); - } + return 0; } -static void conn_request(struct btdev *btdev, const uint8_t *bdaddr) +static int cmd_read_wl_size(struct btdev *dev, const void *data, uint8_t len) { - struct btdev *remote = find_btdev_by_bdaddr(bdaddr); - - if (remote && remote->scan_enable & 0x02) { - struct bt_hci_evt_conn_request cr; + struct bt_hci_rsp_le_read_white_list_size rsp; - memcpy(cr.bdaddr, btdev->bdaddr, 6); - memcpy(cr.dev_class, btdev->dev_class, 3); - cr.link_type = 0x01; + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.size = 0; + cmd_complete(dev, BT_HCI_CMD_LE_READ_WHITE_LIST_SIZE, &rsp, + sizeof(rsp)); - send_event(remote, BT_HCI_EVT_CONN_REQUEST, &cr, sizeof(cr)); - } else { - conn_complete(btdev, bdaddr, BT_HCI_ERR_PAGE_TIMEOUT); - } + return 0; } -static void rej_le_conn_update(struct btdev *btdev, uint16_t handle, - uint8_t reason) +static int cmd_clear_wl(struct btdev *dev, const void *data, uint8_t len) { - struct btdev *remote = btdev->conn; - struct __packed { - uint8_t subevent; - struct bt_hci_evt_le_conn_update_complete ev; - } ev; + uint8_t status; - if (!remote) - return; + status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_LE_CLEAR_WHITE_LIST, &status, + sizeof(status)); - ev.subevent = BT_HCI_EVT_LE_CONN_UPDATE_COMPLETE; - ev.ev.handle = cpu_to_le16(handle); - ev.ev.status = cpu_to_le16(reason); + return 0; +} - send_event(remote, BT_HCI_EVT_LE_META_EVENT, &ev, sizeof(ev)); +static int cmd_conn_update(struct btdev *dev, const void *data, uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_LE_CONN_UPDATE); + + return 0; } static void le_conn_update(struct btdev *btdev, uint16_t handle, @@ -1545,545 +3128,436 @@ static void le_conn_param_req(struct btdev *btdev, uint16_t handle, send_event(remote, BT_HCI_EVT_LE_META_EVENT, &ev, sizeof(ev)); } -static void disconnect_complete(struct btdev *btdev, uint16_t handle, - uint8_t reason) +static int cmd_conn_update_complete(struct btdev *dev, const void *data, + uint8_t len) { - struct bt_hci_evt_disconnect_complete dc; - struct btdev *remote = btdev->conn; + const struct bt_hci_cmd_le_conn_update *cmd = data; + + if (dev->le_features[0] & 0x02) + le_conn_param_req(dev, le16_to_cpu(cmd->handle), + le16_to_cpu(cmd->min_interval), + le16_to_cpu(cmd->max_interval), + le16_to_cpu(cmd->latency), + le16_to_cpu(cmd->supv_timeout), + le16_to_cpu(cmd->min_length), + le16_to_cpu(cmd->max_length)); + else + le_conn_update(dev, le16_to_cpu(cmd->handle), + le16_to_cpu(cmd->min_interval), + le16_to_cpu(cmd->max_interval), + le16_to_cpu(cmd->latency), + le16_to_cpu(cmd->supv_timeout), + le16_to_cpu(cmd->min_length), + le16_to_cpu(cmd->max_length)); + + return 0; +} - if (!remote) { - dc.status = BT_HCI_ERR_UNKNOWN_CONN_ID; - dc.handle = cpu_to_le16(handle); - dc.reason = 0x00; +static void le_meta_event(struct btdev *btdev, uint8_t event, + void *data, uint8_t len) +{ + void *pkt_data; + + util_debug(btdev->debug_callback, btdev->debug_data, + "meta event 0x%02x", event); - send_event(btdev, BT_HCI_EVT_DISCONNECT_COMPLETE, - &dc, sizeof(dc)); + pkt_data = alloca(1 + len); + if (!pkt_data) return; - } - dc.status = BT_HCI_ERR_SUCCESS; - dc.handle = cpu_to_le16(handle); - dc.reason = reason; + ((uint8_t *) pkt_data)[0] = event; - if (dc.handle == ACL_HANDLE) { - btdev->conn = NULL; - remote->conn = NULL; - } + if (len > 0) + memcpy(pkt_data + 1, data, len); - send_event(btdev, BT_HCI_EVT_DISCONNECT_COMPLETE, &dc, sizeof(dc)); - send_event(remote, BT_HCI_EVT_DISCONNECT_COMPLETE, &dc, sizeof(dc)); + send_event(btdev, BT_HCI_EVT_LE_META_EVENT, pkt_data, 1 + len); } -static void link_key_req_reply_complete(struct btdev *btdev, - const uint8_t *bdaddr, - const uint8_t *link_key) +static int cmd_le_read_remote_features(struct btdev *dev, const void *data, + uint8_t len) { - struct btdev *remote = btdev->conn; - struct bt_hci_evt_auth_complete ev; - - memcpy(btdev->link_key, link_key, 16); + struct bt_hci_evt_le_remote_features_complete ev; + struct btdev *remote = dev->conn; if (!remote) { - remote = find_btdev_by_bdaddr(bdaddr); - if (!remote) - return; + cmd_status(dev, BT_HCI_ERR_UNKNOWN_CONN_ID, + BT_HCI_CMD_LE_READ_REMOTE_FEATURES); + return 0; } - if (!memcmp(remote->link_key, LINK_KEY_NONE, 16)) { - send_event(remote, BT_HCI_EVT_LINK_KEY_REQUEST, - btdev->bdaddr, 6); - return; - } + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_LE_READ_REMOTE_FEATURES); + memset(&ev, 0, sizeof(ev)); + ev.status = BT_HCI_ERR_SUCCESS; ev.handle = cpu_to_le16(ACL_HANDLE); + memcpy(ev.features, remote->le_features, 8); - if (!memcmp(btdev->link_key, remote->link_key, 16)) - ev.status = BT_HCI_ERR_SUCCESS; - else - ev.status = BT_HCI_ERR_AUTH_FAILURE; + le_meta_event(dev, BT_HCI_EVT_LE_REMOTE_FEATURES_COMPLETE, &ev, + sizeof(ev)); - send_event(btdev, BT_HCI_EVT_AUTH_COMPLETE, &ev, sizeof(ev)); - send_event(remote, BT_HCI_EVT_AUTH_COMPLETE, &ev, sizeof(ev)); + return 0; } -static void link_key_req_neg_reply_complete(struct btdev *btdev, - const uint8_t *bdaddr) +static int cmd_encrypt(struct btdev *dev, const void *data, uint8_t len) { - struct btdev *remote = btdev->conn; + const struct bt_hci_cmd_le_encrypt *cmd = data; + struct bt_hci_rsp_le_encrypt rsp; - if (!remote) { - remote = find_btdev_by_bdaddr(bdaddr); - if (!remote) - return; + if (!bt_crypto_e(dev->crypto, cmd->key, cmd->plaintext, rsp.data)) { + cmd_status(dev, BT_HCI_ERR_COMMAND_DISALLOWED, + BT_HCI_CMD_LE_ENCRYPT); + return 0; } - if (use_ssp(btdev, remote)) { - struct bt_hci_evt_io_capability_request io_req; - - memcpy(io_req.bdaddr, bdaddr, 6); - send_event(btdev, BT_HCI_EVT_IO_CAPABILITY_REQUEST, &io_req, - sizeof(io_req)); - } else { - struct bt_hci_evt_pin_code_request pin_req; + rsp.status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_LE_ENCRYPT, &rsp, sizeof(rsp)); - memcpy(pin_req.bdaddr, bdaddr, 6); - send_event(btdev, BT_HCI_EVT_PIN_CODE_REQUEST, &pin_req, - sizeof(pin_req)); - } + return 0; } -static uint8_t get_link_key_type(struct btdev *btdev) +static int cmd_rand(struct btdev *dev, const void *data, uint8_t len) { - struct btdev *remote = btdev->conn; - uint8_t auth, unauth; - - if (!remote) - return 0x00; - - if (!btdev->simple_pairing_mode) - return 0x00; - - if (btdev->ssp_debug_mode || remote->ssp_debug_mode) - return 0x03; + struct bt_hci_rsp_le_rand rsp; - if (btdev->secure_conn_support && remote->secure_conn_support) { - unauth = 0x07; - auth = 0x08; - } else { - unauth = 0x04; - auth = 0x05; + if (!bt_crypto_random_bytes(dev->crypto, + (uint8_t *)&rsp.number, 8)) { + cmd_status(dev, BT_HCI_ERR_COMMAND_DISALLOWED, + BT_HCI_CMD_LE_RAND); + return 0; } - if (btdev->io_cap == 0x03 || remote->io_cap == 0x03) - return unauth; - - if (!(btdev->auth_req & 0x01) && !(remote->auth_req & 0x01)) - return unauth; - - /* DisplayOnly only produces authenticated with KeyboardOnly */ - if (btdev->io_cap == 0x00 && remote->io_cap != 0x02) - return unauth; - - /* DisplayOnly only produces authenticated with KeyboardOnly */ - if (remote->io_cap == 0x00 && btdev->io_cap != 0x02) - return unauth; + rsp.status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_LE_RAND, &rsp, sizeof(rsp)); - return auth; + return 0; } -static void link_key_notify(struct btdev *btdev, const uint8_t *bdaddr, - const uint8_t *key) +static int cmd_start_encrypt(struct btdev *dev, const void *data, uint8_t len) { - struct bt_hci_evt_link_key_notify ev; + const struct bt_hci_cmd_le_start_encrypt *cmd = data; + char buf[1 + sizeof(struct bt_hci_evt_le_long_term_key_request)]; + struct bt_hci_evt_le_long_term_key_request *ev = (void *) &buf[1]; + struct btdev *remote = dev->conn; - memcpy(btdev->link_key, key, 16); + if (!remote) { + cmd_status(dev, BT_HCI_ERR_UNKNOWN_CONN_ID, + BT_HCI_CMD_LE_START_ENCRYPT); + return 0; + } - memcpy(ev.bdaddr, bdaddr, 6); - memcpy(ev.link_key, key, 16); - ev.key_type = get_link_key_type(btdev); + memcpy(dev->le_ltk, cmd->ltk, 16); - send_event(btdev, BT_HCI_EVT_LINK_KEY_NOTIFY, &ev, sizeof(ev)); -} + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_LE_START_ENCRYPT); -static void encrypt_change(struct btdev *btdev, uint8_t mode, uint8_t status) -{ - struct bt_hci_evt_encrypt_change ev; + memset(buf, 0, sizeof(buf)); + buf[0] = BT_HCI_EVT_LE_LONG_TERM_KEY_REQUEST; + ev->handle = cpu_to_le16(ACL_HANDLE); + ev->ediv = cmd->ediv; + ev->rand = cmd->rand; - ev.status = status; - ev.handle = cpu_to_le16(ACL_HANDLE); - ev.encr_mode = mode; + send_event(remote, BT_HCI_EVT_LE_META_EVENT, buf, sizeof(buf)); - send_event(btdev, BT_HCI_EVT_ENCRYPT_CHANGE, &ev, sizeof(ev)); + return 0; } -static void pin_code_req_reply_complete(struct btdev *btdev, - const uint8_t *bdaddr, uint8_t pin_len, - const uint8_t *pin_code) +static int cmd_ltk_reply(struct btdev *dev, const void *data, uint8_t len) { - struct bt_hci_evt_auth_complete ev; - struct btdev *remote = btdev->conn; + const struct bt_hci_cmd_le_ltk_req_reply *cmd = data; + struct bt_hci_evt_encrypt_change ev; + struct bt_hci_rsp_le_ltk_req_reply rp; + struct btdev *remote = dev->conn; if (!remote) { - remote = find_btdev_by_bdaddr(bdaddr); - if (!remote) - return; + rp.status = BT_HCI_ERR_UNKNOWN_CONN_ID; + cmd_complete(dev, BT_HCI_CMD_LE_LTK_REQ_REPLY, &rp, sizeof(rp)); + return 0; } - memcpy(btdev->pin, pin_code, pin_len); - btdev->pin_len = pin_len; + memcpy(dev->le_ltk, cmd->ltk, 16); - if (!remote->pin_len) { - struct bt_hci_evt_pin_code_request pin_req; + memset(&rp, 0, sizeof(rp)); + rp.handle = cpu_to_le16(ACL_HANDLE); - memcpy(pin_req.bdaddr, btdev->bdaddr, 6); - send_event(remote, BT_HCI_EVT_PIN_CODE_REQUEST, &pin_req, - sizeof(pin_req)); - return; - } + rp.status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_LE_LTK_REQ_REPLY, &rp, sizeof(rp)); - if (btdev->pin_len == remote->pin_len && - !memcmp(btdev->pin, remote->pin, btdev->pin_len)) { - link_key_notify(btdev, remote->bdaddr, LINK_KEY_DUMMY); - link_key_notify(remote, btdev->bdaddr, LINK_KEY_DUMMY); - ev.status = BT_HCI_ERR_SUCCESS; - } else { - ev.status = BT_HCI_ERR_AUTH_FAILURE; - } + memset(&ev, 0, sizeof(ev)); - if (remote->conn) { - ev.handle = cpu_to_le16(ACL_HANDLE); - send_event(remote, BT_HCI_EVT_AUTH_COMPLETE, &ev, sizeof(ev)); + if (memcmp(dev->le_ltk, remote->le_ltk, 16)) { + ev.status = BT_HCI_ERR_AUTH_FAILURE; + ev.encr_mode = 0x00; } else { - conn_complete(remote, btdev->bdaddr, ev.status); - } - - btdev->pin_len = 0; - remote->pin_len = 0; -} - -static void pin_code_req_neg_reply_complete(struct btdev *btdev, - const uint8_t *bdaddr) -{ - struct bt_hci_evt_auth_complete ev; - struct btdev *remote = btdev->conn; - - if (!remote) { - remote = find_btdev_by_bdaddr(bdaddr); - if (!remote) - return; + ev.status = BT_HCI_ERR_SUCCESS; + ev.encr_mode = 0x01; } - ev.status = BT_HCI_ERR_PIN_OR_KEY_MISSING; ev.handle = cpu_to_le16(ACL_HANDLE); - if (btdev->conn) - send_event(btdev, BT_HCI_EVT_AUTH_COMPLETE, &ev, sizeof(ev)); - else - conn_complete(btdev, bdaddr, BT_HCI_ERR_PIN_OR_KEY_MISSING); + send_event(dev, BT_HCI_EVT_ENCRYPT_CHANGE, &ev, sizeof(ev)); + send_event(remote, BT_HCI_EVT_ENCRYPT_CHANGE, &ev, sizeof(ev)); - if (remote->conn) { - if (remote->pin_len) - send_event(remote, BT_HCI_EVT_AUTH_COMPLETE, &ev, - sizeof(ev)); - } else { - conn_complete(remote, btdev->bdaddr, - BT_HCI_ERR_PIN_OR_KEY_MISSING); - } + return 0; } -static void auth_request_complete(struct btdev *btdev, uint16_t handle) +static int cmd_ltk_neg_reply(struct btdev *dev, const void *data, uint8_t len) { - struct btdev *remote = btdev->conn; + struct bt_hci_rsp_le_ltk_req_neg_reply rp; + struct bt_hci_evt_encrypt_change ev; + struct btdev *remote = dev->conn; if (!remote) { - struct bt_hci_evt_auth_complete ev; - - ev.status = BT_HCI_ERR_UNKNOWN_CONN_ID; - ev.handle = cpu_to_le16(handle); - - send_event(btdev, BT_HCI_EVT_AUTH_COMPLETE, &ev, sizeof(ev)); - - return; + rp.status = BT_HCI_ERR_UNKNOWN_CONN_ID; + cmd_complete(dev, BT_HCI_CMD_LE_LTK_REQ_NEG_REPLY, &rp, + sizeof(rp)); + return 0; } - btdev->auth_init = true; - - send_event(btdev, BT_HCI_EVT_LINK_KEY_REQUEST, remote->bdaddr, 6); -} - -static void name_request_complete(struct btdev *btdev, - const uint8_t *bdaddr, uint8_t status) -{ - struct bt_hci_evt_remote_name_request_complete nc; - - nc.status = status; - memcpy(nc.bdaddr, bdaddr, 6); - memset(nc.name, 0, 248); + memset(&rp, 0, sizeof(rp)); + rp.handle = cpu_to_le16(ACL_HANDLE); + rp.status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_LE_LTK_REQ_NEG_REPLY, &rp, sizeof(rp)); - if (!status) { - struct btdev *remote = find_btdev_by_bdaddr(bdaddr); + memset(&ev, 0, sizeof(ev)); + ev.status = BT_HCI_ERR_PIN_OR_KEY_MISSING; + ev.handle = cpu_to_le16(ACL_HANDLE); - if (remote) - memcpy(nc.name, remote->name, 248); - else - nc.status = BT_HCI_ERR_UNKNOWN_CONN_ID; - } + send_event(remote, BT_HCI_EVT_ENCRYPT_CHANGE, &ev, sizeof(ev)); - send_event(btdev, BT_HCI_EVT_REMOTE_NAME_REQUEST_COMPLETE, - &nc, sizeof(nc)); + return 0; } -static void remote_features_complete(struct btdev *btdev, uint16_t handle) +static int cmd_le_read_supported_states(struct btdev *dev, const void *data, + uint8_t len) { - struct bt_hci_evt_remote_features_complete rfc; - - if (btdev->conn) { - rfc.status = BT_HCI_ERR_SUCCESS; - rfc.handle = cpu_to_le16(handle); - memcpy(rfc.features, btdev->conn->features, 8); - } else { - rfc.status = BT_HCI_ERR_UNKNOWN_CONN_ID; - rfc.handle = cpu_to_le16(handle); - memset(rfc.features, 0, 8); - } + struct bt_hci_rsp_le_read_supported_states rsp; - send_event(btdev, BT_HCI_EVT_REMOTE_FEATURES_COMPLETE, - &rfc, sizeof(rfc)); -} + memset(&rsp, 0, sizeof(0)); + rsp.status = BT_HCI_ERR_SUCCESS; + memcpy(rsp.states, dev->le_states, 8); + cmd_complete(dev, BT_HCI_CMD_LE_READ_SUPPORTED_STATES, &rsp, + sizeof(rsp)); -static void btdev_get_host_features(struct btdev *btdev, uint8_t features[8]) -{ - memset(features, 0, 8); - if (btdev->simple_pairing_mode) - features[0] |= 0x01; - if (btdev->le_supported) - features[0] |= 0x02; - if (btdev->le_simultaneous) - features[0] |= 0x04; - if (btdev->secure_conn_support) - features[0] |= 0x08; + return 0; } -static void remote_ext_features_complete(struct btdev *btdev, uint16_t handle, - uint8_t page) +static int cmd_rx_test(struct btdev *dev, const void *data, uint8_t len) { - struct bt_hci_evt_remote_ext_features_complete refc; - - if (btdev->conn && page < 0x02) { - refc.handle = cpu_to_le16(handle); - refc.page = page; - refc.max_page = 0x01; - - switch (page) { - case 0x00: - refc.status = BT_HCI_ERR_SUCCESS; - memcpy(refc.features, btdev->conn->features, 8); - break; - case 0x01: - refc.status = BT_HCI_ERR_SUCCESS; - btdev_get_host_features(btdev->conn, refc.features); - break; - default: - refc.status = BT_HCI_ERR_INVALID_PARAMETERS; - memset(refc.features, 0, 8); - break; - } - } else { - refc.status = BT_HCI_ERR_UNKNOWN_CONN_ID; - refc.handle = cpu_to_le16(handle); - refc.page = page; - refc.max_page = 0x01; - memset(refc.features, 0, 8); - } - - send_event(btdev, BT_HCI_EVT_REMOTE_EXT_FEATURES_COMPLETE, - &refc, sizeof(refc)); + return -ENOTSUP; } -static void remote_version_complete(struct btdev *btdev, uint16_t handle) +static int cmd_tx_test(struct btdev *dev, const void *data, uint8_t len) { - struct bt_hci_evt_remote_version_complete rvc; - - if (btdev->conn) { - rvc.status = BT_HCI_ERR_SUCCESS; - rvc.handle = cpu_to_le16(handle); - rvc.lmp_ver = btdev->conn->version; - rvc.manufacturer = cpu_to_le16(btdev->conn->manufacturer); - rvc.lmp_subver = cpu_to_le16(btdev->conn->revision); - } else { - rvc.status = BT_HCI_ERR_UNKNOWN_CONN_ID; - rvc.handle = cpu_to_le16(handle); - rvc.lmp_ver = 0x00; - rvc.manufacturer = cpu_to_le16(0); - rvc.lmp_subver = cpu_to_le16(0); - } - - send_event(btdev, BT_HCI_EVT_REMOTE_VERSION_COMPLETE, - &rvc, sizeof(rvc)); + return -ENOTSUP; } -static void remote_clock_offset_complete(struct btdev *btdev, uint16_t handle) +static int cmd_test_end(struct btdev *dev, const void *data, uint8_t len) { - struct bt_hci_evt_clock_offset_complete coc; - - if (btdev->conn) { - coc.status = BT_HCI_ERR_SUCCESS; - coc.handle = cpu_to_le16(handle); - coc.clock_offset = 0; - } else { - coc.status = BT_HCI_ERR_UNKNOWN_CONN_ID; - coc.handle = cpu_to_le16(handle); - coc.clock_offset = 0; - } - - send_event(btdev, BT_HCI_EVT_CLOCK_OFFSET_COMPLETE, - &coc, sizeof(coc)); + return -ENOTSUP; } -static void read_enc_key_size_complete(struct btdev *btdev, uint16_t handle) +static int cmd_conn_param_reply(struct btdev *dev, const void *data, + uint8_t len) { - struct bt_hci_rsp_read_encrypt_key_size rsp; - - rsp.handle = cpu_to_le16(handle); - - if (btdev->conn) { - rsp.status = BT_HCI_ERR_SUCCESS; - rsp.key_size = 16; - } else { - rsp.status = BT_HCI_ERR_UNKNOWN_CONN_ID; - rsp.key_size = 0; - } + uint8_t status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, BT_HCI_CMD_READ_ENCRYPT_KEY_SIZE, - &rsp, sizeof(rsp)); + cmd_complete(dev, BT_HCI_CMD_LE_CONN_PARAM_REQ_REPLY, &status, + sizeof(status)); + + return 0; } -static void io_cap_req_reply_complete(struct btdev *btdev, - const uint8_t *bdaddr, - uint8_t capability, uint8_t oob_data, - uint8_t authentication) +static int cmd_conn_param_reply_complete(struct btdev *dev, const void *data, + uint8_t len) { - struct btdev *remote = btdev->conn; - struct bt_hci_evt_io_capability_response ev; - struct bt_hci_rsp_io_capability_request_reply rsp; - uint8_t status; + const struct bt_hci_cmd_le_conn_param_req_reply *cmd = data; - if (!remote) { - status = BT_HCI_ERR_UNKNOWN_CONN_ID; - goto done; - } + le_conn_update(dev, le16_to_cpu(cmd->handle), + le16_to_cpu(cmd->min_interval), + le16_to_cpu(cmd->max_interval), + le16_to_cpu(cmd->latency), + le16_to_cpu(cmd->supv_timeout), + le16_to_cpu(cmd->min_length), + le16_to_cpu(cmd->max_length)); - status = BT_HCI_ERR_SUCCESS; + return 0; +} - btdev->io_cap = capability; - btdev->auth_req = authentication; +static int cmd_conn_param_neg_reply(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_le_conn_param_req_neg_reply *cmd = data; + struct bt_hci_rsp_le_conn_param_req_neg_reply rsp; - memcpy(ev.bdaddr, btdev->bdaddr, 6); - ev.capability = capability; - ev.oob_data = oob_data; - ev.authentication = authentication; + memset(&rsp, 0, sizeof(rsp)); - send_event(remote, BT_HCI_EVT_IO_CAPABILITY_RESPONSE, &ev, sizeof(ev)); + rsp.handle = cmd->handle; + rsp.status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_LE_CONN_PARAM_REQ_NEG_REPLY, &rsp, + sizeof(rsp)); - if (remote->io_cap) { - struct bt_hci_evt_user_confirm_request cfm; + return 0; +} - memcpy(cfm.bdaddr, btdev->bdaddr, 6); - cfm.passkey = 0; +static int cmd_conn_param_neg_reply_complete(struct btdev *dev, + const void *data, uint8_t len) +{ + const struct bt_hci_cmd_le_conn_param_req_neg_reply *cmd = data; + struct btdev *remote = dev->conn; + struct bt_hci_evt_le_conn_update_complete ev; - send_event(remote, BT_HCI_EVT_USER_CONFIRM_REQUEST, - &cfm, sizeof(cfm)); + if (!remote) + return 0; - memcpy(cfm.bdaddr, bdaddr, 6); - send_event(btdev, BT_HCI_EVT_USER_CONFIRM_REQUEST, - &cfm, sizeof(cfm)); - } else { - send_event(remote, BT_HCI_EVT_IO_CAPABILITY_REQUEST, - btdev->bdaddr, 6); - } + memset(&ev, 0, sizeof(ev)); -done: - rsp.status = status; - memcpy(rsp.bdaddr, bdaddr, 6); - cmd_complete(btdev, BT_HCI_CMD_IO_CAPABILITY_REQUEST_REPLY, - &rsp, sizeof(rsp)); + ev.handle = cpu_to_le16(cmd->handle); + ev.status = cpu_to_le16(cmd->reason); + + le_meta_event(remote, BT_HCI_EVT_LE_CONN_UPDATE_COMPLETE, &ev, + sizeof(ev)); + + return 0; } -static void io_cap_req_neg_reply_complete(struct btdev *btdev, - const uint8_t *bdaddr) +static int cmd_read_local_pk256(struct btdev *dev, const void *data, + uint8_t len) { - struct bt_hci_rsp_io_capability_request_neg_reply rsp; + return -ENOTSUP; +} - rsp.status = BT_HCI_ERR_SUCCESS; - memcpy(rsp.bdaddr, bdaddr, 6); - cmd_complete(btdev, BT_HCI_CMD_IO_CAPABILITY_REQUEST_NEG_REPLY, - &rsp, sizeof(rsp)); +static int cmd_gen_dhkey(struct btdev *dev, const void *data, uint8_t len) +{ + return -ENOTSUP; } -static void ssp_complete(struct btdev *btdev, const uint8_t *bdaddr, - uint8_t status, bool wait) +#define CMD_LE \ + CMD(BT_HCI_CMD_READ_LE_HOST_SUPPORTED, cmd_read_le_host_supported, \ + NULL), \ + CMD(BT_HCI_CMD_WRITE_LE_HOST_SUPPORTED, cmd_write_le_host_supported, \ + NULL), \ + CMD(BT_HCI_CMD_LE_SET_EVENT_MASK, cmd_le_set_event_mask, NULL), \ + CMD(BT_HCI_CMD_LE_READ_BUFFER_SIZE, cmd_le_read_buffer_size, NULL), \ + CMD(BT_HCI_CMD_LE_READ_LOCAL_FEATURES, cmd_le_read_local_features, \ + NULL), \ + CMD(BT_HCI_CMD_LE_SET_RANDOM_ADDRESS, cmd_set_random_address, NULL), \ + CMD(BT_HCI_CMD_LE_SET_ADV_PARAMETERS, cmd_set_adv_params, NULL), \ + CMD(BT_HCI_CMD_LE_READ_ADV_TX_POWER, cmd_read_adv_tx_power, NULL), \ + CMD(BT_HCI_CMD_LE_SET_ADV_DATA, cmd_set_adv_data, NULL), \ + CMD(BT_HCI_CMD_LE_SET_SCAN_RSP_DATA, cmd_set_scan_rsp_data, NULL), \ + CMD(BT_HCI_CMD_LE_SET_ADV_ENABLE, cmd_set_adv_enable, NULL), \ + CMD(BT_HCI_CMD_LE_SET_SCAN_PARAMETERS, cmd_set_scan_params, NULL), \ + CMD(BT_HCI_CMD_LE_SET_SCAN_ENABLE, cmd_set_scan_enable, \ + cmd_set_scan_enable_complete), \ + CMD(BT_HCI_CMD_LE_CREATE_CONN, cmd_le_create_conn, \ + cmd_le_create_conn_complete), \ + CMD(BT_HCI_CMD_LE_READ_WHITE_LIST_SIZE, cmd_read_wl_size, NULL), \ + CMD(BT_HCI_CMD_LE_CLEAR_WHITE_LIST, cmd_clear_wl, NULL), \ + CMD(BT_HCI_CMD_LE_CONN_UPDATE, cmd_conn_update, \ + cmd_conn_update_complete), \ + CMD(BT_HCI_CMD_LE_READ_REMOTE_FEATURES, cmd_le_read_remote_features, \ + NULL), \ + CMD(BT_HCI_CMD_LE_ENCRYPT, cmd_encrypt, NULL), \ + CMD(BT_HCI_CMD_LE_RAND, cmd_rand, NULL), \ + CMD(BT_HCI_CMD_LE_START_ENCRYPT, cmd_start_encrypt, NULL), \ + CMD(BT_HCI_CMD_LE_LTK_REQ_REPLY, cmd_ltk_reply, NULL), \ + CMD(BT_HCI_CMD_LE_LTK_REQ_NEG_REPLY, cmd_ltk_neg_reply, NULL), \ + CMD(BT_HCI_CMD_LE_READ_SUPPORTED_STATES, cmd_le_read_supported_states, \ + NULL), \ + CMD(BT_HCI_CMD_LE_RECEIVER_TEST, cmd_rx_test, NULL), \ + CMD(BT_HCI_CMD_LE_TRANSMITTER_TEST, cmd_tx_test, NULL), \ + CMD(BT_HCI_CMD_LE_ISO_TEST_END, cmd_test_end, NULL), \ + CMD(BT_HCI_CMD_LE_CONN_PARAM_REQ_REPLY, cmd_conn_param_reply, \ + cmd_conn_param_reply_complete), \ + CMD(BT_HCI_CMD_LE_CONN_PARAM_REQ_NEG_REPLY, cmd_conn_param_neg_reply, \ + cmd_conn_param_neg_reply_complete), \ + CMD(BT_HCI_CMD_LE_READ_LOCAL_PK256, cmd_read_local_pk256, NULL), \ + CMD(BT_HCI_CMD_LE_GENERATE_DHKEY, cmd_gen_dhkey, NULL) + +static int cmd_set_default_phy(struct btdev *dev, const void *data, + uint8_t len) { - struct bt_hci_evt_simple_pairing_complete iev, aev; - struct bt_hci_evt_auth_complete auth; - struct btdev *remote = btdev->conn; - struct btdev *init, *accp; + const struct bt_hci_cmd_le_set_default_phy *cmd = data; + uint8_t status; - if (!remote) - return; + if (cmd->all_phys > 0x03 || (!(cmd->all_phys & 0x01) && + (!cmd->tx_phys || cmd->tx_phys > 0x07)) || + (!(cmd->all_phys & 0x02) && + (!cmd->rx_phys || cmd->rx_phys > 0x07))) + status = BT_HCI_ERR_INVALID_PARAMETERS; + else + status = BT_HCI_ERR_SUCCESS; - btdev->ssp_status = status; - btdev->ssp_auth_complete = true; + cmd_complete(dev, BT_HCI_CMD_LE_SET_DEFAULT_PHY, &status, + sizeof(status)); - if (!remote->ssp_auth_complete && wait) - return; + return 0; +} - if (status == BT_HCI_ERR_SUCCESS && - remote->ssp_status != BT_HCI_ERR_SUCCESS) - status = remote->ssp_status; +static int cmd_set_adv_rand_addr(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_le_set_adv_set_rand_addr *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; - iev.status = status; - aev.status = status; + memcpy(dev->random_addr, cmd->bdaddr, 6); + cmd_complete(dev, BT_HCI_CMD_LE_SET_ADV_SET_RAND_ADDR, &status, + sizeof(status)); - if (btdev->auth_init) { - init = btdev; - accp = remote; - memcpy(iev.bdaddr, bdaddr, 6); - memcpy(aev.bdaddr, btdev->bdaddr, 6); - } else { - init = remote; - accp = btdev; - memcpy(iev.bdaddr, btdev->bdaddr, 6); - memcpy(aev.bdaddr, bdaddr, 6); - } + return 0; +} - send_event(init, BT_HCI_EVT_SIMPLE_PAIRING_COMPLETE, &iev, - sizeof(iev)); - send_event(accp, BT_HCI_EVT_SIMPLE_PAIRING_COMPLETE, &aev, - sizeof(aev)); +static int cmd_set_ext_adv_params(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_le_set_ext_adv_params *cmd = data; + struct bt_hci_rsp_le_set_ext_adv_params rsp; + uint8_t status; - if (status == BT_HCI_ERR_SUCCESS) { - link_key_notify(init, iev.bdaddr, LINK_KEY_DUMMY); - link_key_notify(accp, aev.bdaddr, LINK_KEY_DUMMY); + if (dev->le_adv_enable) { + status = BT_HCI_ERR_COMMAND_DISALLOWED; + cmd_complete(dev, BT_HCI_CMD_LE_SET_EXT_ADV_PARAMS, &status, + sizeof(status)); + return 0; } - auth.status = status; - auth.handle = cpu_to_le16(ACL_HANDLE); - send_event(init, BT_HCI_EVT_AUTH_COMPLETE, &auth, sizeof(auth)); + dev->le_ext_adv_type = le16_to_cpu(cmd->evt_properties); + dev->le_adv_own_addr = cmd->own_addr_type; + dev->le_adv_direct_addr_type = cmd->peer_addr_type; + memcpy(dev->le_adv_direct_addr, cmd->peer_addr, 6); + + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.tx_power = 0; + cmd_complete(dev, BT_HCI_CMD_LE_SET_EXT_ADV_PARAMS, &rsp, sizeof(rsp)); + + return 0; } -static void le_send_adv_report(struct btdev *btdev, const struct btdev *remote, - uint8_t type) +static int cmd_set_ext_adv_data(struct btdev *dev, const void *data, + uint8_t len) { - struct __packed { - uint8_t subevent; - union { - struct bt_hci_evt_le_adv_report lar; - uint8_t raw[10 + 31 + 1]; - }; - } meta_event; + const struct bt_hci_cmd_le_set_ext_adv_data *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; - meta_event.subevent = BT_HCI_EVT_LE_ADV_REPORT; + dev->le_adv_data_len = cmd->data_len; + memcpy(dev->le_adv_data, cmd->data, 31); + cmd_complete(dev, BT_HCI_CMD_LE_SET_EXT_ADV_DATA, &status, + sizeof(status)); - memset(&meta_event.lar, 0, sizeof(meta_event.lar)); - meta_event.lar.num_reports = 1; - meta_event.lar.event_type = type; - meta_event.lar.addr_type = remote->le_adv_own_addr; - memcpy(meta_event.lar.addr, adv_addr(remote), 6); + return 0; +} - /* Scan or advertising response */ - if (type == 0x04) { - meta_event.lar.data_len = remote->le_scan_data_len; - memcpy(meta_event.lar.data, remote->le_scan_data, - meta_event.lar.data_len); - } else { - meta_event.lar.data_len = remote->le_adv_data_len; - memcpy(meta_event.lar.data, remote->le_adv_data, - meta_event.lar.data_len); - } - /* Not available */ - meta_event.raw[10 + meta_event.lar.data_len] = 127; - send_event(btdev, BT_HCI_EVT_LE_META_EVENT, &meta_event, - 1 + 10 + meta_event.lar.data_len + 1); +static int cmd_set_ext_scan_rsp_data(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_le_set_ext_scan_rsp_data *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; + + dev->le_scan_data_len = cmd->data_len; + memcpy(dev->le_scan_data, cmd->data, 31); + cmd_complete(dev, BT_HCI_CMD_LE_SET_EXT_SCAN_RSP_DATA, &status, + sizeof(status)); + + return 0; } static void send_ext_adv(struct btdev *btdev, const struct btdev *remote, @@ -2123,88 +3597,6 @@ static void send_ext_adv(struct btdev *btdev, const struct btdev *remote, 1 + 24 + meta_event.lear.data_len); } -static uint8_t get_adv_report_type(uint8_t adv_type) -{ - /* - * Connectable low duty cycle directed advertising creates a - * connectable directed advertising report type. - */ - if (adv_type == 0x04) - return 0x01; - - return adv_type; -} - -static uint8_t get_ext_adv_type(uint8_t ext_adv_type) -{ - /* - * If legacy bit is not set then just reset high duty cycle directed - * bit. - */ - if (!(ext_adv_type & 0x10)) - return (ext_adv_type & 0xf7); - - /* - * Connectable low duty cycle directed advertising creates a - * connectable directed advertising report type. - */ - if (ext_adv_type == 0x001d) - return 0x0015; - - return ext_adv_type; -} - -static uint16_t ext_legacy_adv_type(uint8_t type) -{ - switch (type) { - case 0x00: - /* Connectable undirected - ADV_IND" */ - return 0x0013; - case 0x01: - /* Connectable directed - ADV_DIRECT_IND */ - return 0x0015; - case 0x02: - /* Scannable undirected - ADV_SCAN_IND */ - return 0x0012; - case 0x03: - /* Non connectable undirected - ADV_NONCONN_IND */ - return 0x0010; - case 0x04: - /* Scan response - SCAN_RSP */ - return 0x0012; - } - - return 0x0000; -} - -static void le_set_adv_enable_complete(struct btdev *btdev) -{ - uint8_t report_type; - int i; - - report_type = get_adv_report_type(btdev->le_adv_type); - - for (i = 0; i < MAX_BTDEV_ENTRIES; i++) { - if (!btdev_list[i] || btdev_list[i] == btdev) - continue; - - if (!btdev_list[i]->le_scan_enable) - continue; - - if (!adv_match(btdev_list[i], btdev)) - continue; - - le_send_adv_report(btdev_list[i], btdev, report_type); - - if (btdev_list[i]->le_scan_type != 0x01) - continue; - - /* ADV_IND & ADV_SCAN_IND generate a scan response */ - if (btdev->le_adv_type == 0x00 || btdev->le_adv_type == 0x02) - le_send_adv_report(btdev_list[i], btdev, 0x04); - } -} - static void le_set_ext_adv_enable_complete(struct btdev *btdev) { uint16_t report_type; @@ -2222,8 +3614,7 @@ static void le_set_ext_adv_enable_complete(struct btdev *btdev) if (!ext_adv_match(btdev_list[i], btdev)) continue; - send_ext_adv(btdev_list[i], btdev, report_type, - false); + send_ext_adv(btdev_list[i], btdev, report_type, false); if (btdev_list[i]->le_scan_type != 0x01) continue; @@ -2239,61 +3630,181 @@ static void le_set_ext_adv_enable_complete(struct btdev *btdev) else continue; - send_ext_adv(btdev_list[i], btdev, - report_type, true); + send_ext_adv(btdev_list[i], btdev, report_type, true); } } } -static void le_set_scan_enable_complete(struct btdev *btdev) +static int cmd_set_ext_adv_enable(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_le_set_ext_adv_enable *cmd = data; + uint8_t status; + + if (dev->le_adv_enable == cmd->enable) + status = BT_HCI_ERR_COMMAND_DISALLOWED; + else { + const struct bt_hci_cmd_ext_adv_set *eas; + + if (cmd->num_of_sets) { + eas = data + sizeof(*cmd); + if (eas->duration || cmd->num_of_sets > 1) + status = BT_HCI_ERR_INVALID_PARAMETERS; + else + status = BT_HCI_ERR_SUCCESS; + } else + status = BT_HCI_ERR_SUCCESS; + + if (status == BT_HCI_ERR_SUCCESS) + dev->le_adv_enable = cmd->enable; + } + + cmd_complete(dev, BT_HCI_CMD_LE_SET_EXT_ADV_ENABLE, &status, + sizeof(status)); + + if (status == BT_HCI_ERR_SUCCESS && dev->le_adv_enable) + le_set_ext_adv_enable_complete(dev); + + return 0; +} + +static int cmd_read_max_adv_data_len(struct btdev *dev, const void *data, + uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} + +static int cmd_read_num_adv_sets(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_le_read_num_supported_adv_sets rsp; + + memset(&rsp, 0, sizeof(rsp)); + + rsp.status = BT_HCI_ERR_SUCCESS; + /* Support one set as of now */ + rsp.num_of_sets = 1; + cmd_complete(dev, BT_HCI_CMD_LE_READ_NUM_SUPPORTED_ADV_SETS, &rsp, + sizeof(rsp)); + + return 0; +} + +static int cmd_remove_adv_set(struct btdev *dev, const void *data, + uint8_t len) +{ + uint8_t status = BT_HCI_ERR_SUCCESS; + + cmd_complete(dev, BT_HCI_CMD_LE_REMOVE_ADV_SET, &status, + sizeof(status)); + + return 0; +} + +static int cmd_clear_adv_sets(struct btdev *dev, const void *data, + uint8_t len) +{ + uint8_t status = BT_HCI_ERR_SUCCESS; + + cmd_complete(dev, BT_HCI_CMD_LE_CLEAR_ADV_SETS, &status, + sizeof(status)); + + return 0; +} + +static int cmd_set_per_adv_params(struct btdev *dev, const void *data, + uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} + +static int cmd_set_per_adv_data(struct btdev *dev, const void *data, + uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} + +static int cmd_set_per_adv_enable(struct btdev *dev, const void *data, + uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} + +static int cmd_set_ext_scan_params(struct btdev *dev, const void *data, + uint8_t len) { - int i; + const struct bt_hci_cmd_le_set_ext_scan_params *cmd = data; + const struct bt_hci_le_scan_phy *scan = (void *)cmd->data; + uint8_t status; - for (i = 0; i < MAX_BTDEV_ENTRIES; i++) { - uint8_t report_type; + if (dev->le_scan_enable) + status = BT_HCI_ERR_COMMAND_DISALLOWED; + else if (cmd->num_phys == 0) + status = BT_HCI_ERR_INVALID_PARAMETERS; + else { + status = BT_HCI_ERR_SUCCESS; + /* Currently we dont support multiple types in single + * command So just take the first one will do. + */ + dev->le_scan_type = scan->type; + dev->le_scan_own_addr_type = cmd->own_addr_type; + } - if (!btdev_list[i] || btdev_list[i] == btdev) - continue; + cmd_complete(dev, BT_HCI_CMD_LE_SET_EXT_SCAN_PARAMS, &status, + sizeof(status)); - if (!btdev_list[i]->le_adv_enable) - continue; + return 0; +} - if (!adv_match(btdev, btdev_list[i])) - continue; +static int cmd_set_ext_scan_enable(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_le_set_ext_scan_enable *cmd = data; + uint8_t status; - report_type = get_adv_report_type(btdev_list[i]->le_adv_type); - le_send_adv_report(btdev, btdev_list[i], report_type); + if (dev->le_scan_enable == cmd->enable) + status = BT_HCI_ERR_COMMAND_DISALLOWED; + else { + dev->le_scan_enable = cmd->enable; + dev->le_filter_dup = cmd->filter_dup; + status = BT_HCI_ERR_SUCCESS; + } - if (btdev->le_scan_type != 0x01) - continue; + cmd_complete(dev, BT_HCI_CMD_LE_SET_EXT_SCAN_ENABLE, &status, + sizeof(status)); - /* ADV_IND & ADV_SCAN_IND generate a scan response */ - if (btdev_list[i]->le_adv_type == 0x00 || - btdev_list[i]->le_adv_type == 0x02) - le_send_adv_report(btdev, btdev_list[i], 0x04); - } + return 0; } -static void le_set_ext_scan_enable_complete(struct btdev *btdev) +static int cmd_set_ext_scan_enable_complete(struct btdev *dev, const void *data, + uint8_t len) { + const struct bt_hci_cmd_le_set_ext_scan_enable *cmd = data; int i; + if (!dev->le_scan_enable || !cmd->enable) + return 0; + for (i = 0; i < MAX_BTDEV_ENTRIES; i++) { uint16_t report_type; - if (!btdev_list[i] || btdev_list[i] == btdev) + if (!btdev_list[i] || btdev_list[i] == dev) continue; if (!btdev_list[i]->le_adv_enable) continue; - if (!ext_adv_match(btdev, btdev_list[i])) + if (!ext_adv_match(dev, btdev_list[i])) continue; report_type = get_ext_adv_type(btdev_list[i]->le_ext_adv_type); - send_ext_adv(btdev, btdev_list[i], report_type, false); + send_ext_adv(dev, btdev_list[i], report_type, false); - if (btdev->le_scan_type != 0x01) + if (dev->le_scan_type != 0x01) continue; /* if scannable bit is set the send scan response */ @@ -2307,1937 +3818,1098 @@ static void le_set_ext_scan_enable_complete(struct btdev *btdev) else continue; - send_ext_adv(btdev, btdev_list[i], report_type, true); + send_ext_adv(dev, btdev_list[i], report_type, true); } } + + return 0; } -static void le_read_remote_features_complete(struct btdev *btdev) +static int cmd_ext_create_conn(struct btdev *dev, const void *data, uint8_t len) { - char buf[1 + sizeof(struct bt_hci_evt_le_remote_features_complete)]; - struct bt_hci_evt_le_remote_features_complete *ev = (void *) &buf[1]; - struct btdev *remote = btdev->conn; - - if (!remote) { - cmd_status(btdev, BT_HCI_ERR_UNKNOWN_CONN_ID, - BT_HCI_CMD_LE_READ_REMOTE_FEATURES); - return; - } - - cmd_status(btdev, BT_HCI_ERR_SUCCESS, - BT_HCI_CMD_LE_READ_REMOTE_FEATURES); - - memset(buf, 0, sizeof(buf)); - buf[0] = BT_HCI_EVT_LE_REMOTE_FEATURES_COMPLETE; - ev->status = BT_HCI_ERR_SUCCESS; - ev->handle = cpu_to_le16(ACL_HANDLE); - memcpy(ev->features, remote->le_features, 8); + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_LE_EXT_CREATE_CONN); - send_event(btdev, BT_HCI_EVT_LE_META_EVENT, buf, sizeof(buf)); + return 0; } -static void le_start_encrypt_complete(struct btdev *btdev, uint16_t ediv, - uint64_t rand) +static bool ext_adv_connectable(struct btdev *btdev) { - char buf[1 + sizeof(struct bt_hci_evt_le_long_term_key_request)]; - struct bt_hci_evt_le_long_term_key_request *ev = (void *) &buf[1]; - struct btdev *remote = btdev->conn; - - if (!remote) { - cmd_status(btdev, BT_HCI_ERR_UNKNOWN_CONN_ID, - BT_HCI_CMD_LE_START_ENCRYPT); - return; - } - - cmd_status(btdev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_LE_START_ENCRYPT); - - memset(buf, 0, sizeof(buf)); - buf[0] = BT_HCI_EVT_LE_LONG_TERM_KEY_REQUEST; - ev->handle = cpu_to_le16(ACL_HANDLE); - ev->ediv = ediv; - ev->rand = rand; + if (!btdev->le_adv_enable) + return false; - send_event(remote, BT_HCI_EVT_LE_META_EVENT, buf, sizeof(buf)); + return btdev->le_ext_adv_type & 0x01; } -static void le_encrypt_complete(struct btdev *btdev) +static void le_ext_conn_complete(struct btdev *btdev, + const struct bt_hci_cmd_le_ext_create_conn *cmd, + uint8_t status) { - struct bt_hci_evt_encrypt_change ev; - struct bt_hci_rsp_le_ltk_req_reply rp; - struct btdev *remote = btdev->conn; + struct bt_hci_evt_le_enhanced_conn_complete ev; + struct bt_hci_le_ext_create_conn *lecc = (void *)cmd->data; - memset(&rp, 0, sizeof(rp)); - rp.handle = cpu_to_le16(ACL_HANDLE); + memset(&ev, 0, sizeof(ev)); - if (!remote) { - rp.status = BT_HCI_ERR_UNKNOWN_CONN_ID; - cmd_complete(btdev, BT_HCI_CMD_LE_LTK_REQ_REPLY, &rp, - sizeof(rp)); - return; - } + if (!status) { + struct btdev *remote; - rp.status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, BT_HCI_CMD_LE_LTK_REQ_REPLY, &rp, sizeof(rp)); + remote = find_btdev_by_bdaddr_type(cmd->peer_addr, + cmd->peer_addr_type); - memset(&ev, 0, sizeof(ev)); + btdev->conn = remote; + btdev->le_adv_enable = 0; + remote->conn = btdev; + remote->le_adv_enable = 0; - if (memcmp(btdev->le_ltk, remote->le_ltk, 16)) { - ev.status = BT_HCI_ERR_AUTH_FAILURE; - ev.encr_mode = 0x00; - } else { - ev.status = BT_HCI_ERR_SUCCESS; - ev.encr_mode = 0x01; + ev.status = status; + ev.peer_addr_type = btdev->le_scan_own_addr_type; + if (ev.peer_addr_type == 0x01) + memcpy(ev.peer_addr, btdev->random_addr, 6); + else + memcpy(ev.peer_addr, btdev->bdaddr, 6); + + ev.role = 0x01; + ev.handle = cpu_to_le16(ACL_HANDLE); + ev.interval = lecc->max_interval; + ev.latency = lecc->latency; + ev.supv_timeout = lecc->supv_timeout; + + le_meta_event(remote, BT_HCI_EVT_LE_ENHANCED_CONN_COMPLETE, &ev, + sizeof(ev)); } - ev.handle = cpu_to_le16(ACL_HANDLE); + ev.status = status; + ev.peer_addr_type = cmd->peer_addr_type; + memcpy(ev.peer_addr, cmd->peer_addr, 6); + ev.role = 0x00; - send_event(btdev, BT_HCI_EVT_ENCRYPT_CHANGE, &ev, sizeof(ev)); - send_event(remote, BT_HCI_EVT_ENCRYPT_CHANGE, &ev, sizeof(ev)); + send_event(btdev, BT_HCI_EVT_LE_META_EVENT, &ev, sizeof(ev)); } -static void ltk_neg_reply_complete(struct btdev *btdev) +static int cmd_ext_create_conn_complete(struct btdev *dev, const void *data, + uint8_t len) { - struct bt_hci_rsp_le_ltk_req_neg_reply rp; - struct bt_hci_evt_encrypt_change ev; - struct btdev *remote = btdev->conn; - - memset(&rp, 0, sizeof(rp)); - rp.handle = cpu_to_le16(ACL_HANDLE); - - if (!remote) { - rp.status = BT_HCI_ERR_UNKNOWN_CONN_ID; - cmd_complete(btdev, BT_HCI_CMD_LE_LTK_REQ_NEG_REPLY, &rp, - sizeof(rp)); - return; - } + const struct bt_hci_cmd_le_ext_create_conn *cmd = data; + struct btdev *remote; - rp.status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, BT_HCI_CMD_LE_LTK_REQ_NEG_REPLY, &rp, sizeof(rp)); + dev->le_scan_own_addr_type = cmd->own_addr_type; - memset(&ev, 0, sizeof(ev)); - ev.status = BT_HCI_ERR_PIN_OR_KEY_MISSING; - ev.handle = cpu_to_le16(ACL_HANDLE); + remote = find_btdev_by_bdaddr_type(cmd->peer_addr, cmd->peer_addr_type); + if (remote && ext_adv_connectable(remote) && + ext_adv_match(dev, remote) && + remote->le_adv_own_addr == cmd->peer_addr_type) + le_ext_conn_complete(dev, cmd, 0); + else + le_ext_conn_complete(dev, cmd, + BT_HCI_ERR_CONN_FAILED_TO_ESTABLISH); - send_event(remote, BT_HCI_EVT_ENCRYPT_CHANGE, &ev, sizeof(ev)); + return 0; } -static void btdev_reset(struct btdev *btdev) +static int cmd_per_adv_create_sync(struct btdev *dev, const void *data, + uint8_t len) { - /* FIXME: include here clearing of all states that should be - * cleared upon HCI_Reset - */ - - btdev->le_scan_enable = 0x00; - btdev->le_adv_enable = 0x00; + /* TODO */ + return -ENOTSUP; } -static void le_setup_iso_path(struct btdev *dev, uint16_t handle, - uint8_t dir, uint8_t path) +static int cmd_per_adv_create_sync_cancel(struct btdev *dev, const void *data, + uint8_t len) { - struct bt_hci_rsp_le_setup_iso_path rsp; - - memset(&rsp, 0, sizeof(rsp)); - - if (handle != ISO_HANDLE) { - rsp.status = BT_HCI_ERR_UNKNOWN_CONN_ID; - goto done; - } - - /* Only support HCI or disabled paths */ - if (path && path != 0xff) { - rsp.status = BT_HCI_ERR_INVALID_PARAMETERS; - goto done; - } - - switch (dir) { - case 0x00: - dev->le_iso_path[0] = path; - rsp.handle = cpu_to_le16(ISO_HANDLE); - break; - case 0x01: - dev->le_iso_path[1] = path; - rsp.handle = cpu_to_le16(ISO_HANDLE); - break; - default: - rsp.status = BT_HCI_ERR_INVALID_PARAMETERS; - } - -done: - cmd_complete(dev, BT_HCI_CMD_LE_SETUP_ISO_PATH, &rsp, sizeof(rsp)); + /* TODO */ + return -ENOTSUP; } -static void default_cmd(struct btdev *btdev, uint16_t opcode, - const void *data, uint8_t len) +static int cmd_per_adv_term_sync(struct btdev *dev, const void *data, + uint8_t len) { - const struct bt_hci_cmd_remote_name_request_cancel *rnrc; - const struct bt_hci_cmd_write_default_link_policy *wdlp; - const struct bt_hci_cmd_set_event_mask *sem; - const struct bt_hci_cmd_set_event_filter *sef; - const struct bt_hci_cmd_write_local_name *wln; - const struct bt_hci_cmd_write_conn_accept_timeout *wcat; - const struct bt_hci_cmd_write_page_timeout *wpt; - const struct bt_hci_cmd_write_scan_enable *wse; - const struct bt_hci_cmd_write_page_scan_activity *wpsa; - const struct bt_hci_cmd_write_inquiry_scan_activity *wisa; - const struct bt_hci_cmd_write_page_scan_type *wpst; - const struct bt_hci_cmd_write_auth_enable *wae; - const struct bt_hci_cmd_write_class_of_dev *wcod; - const struct bt_hci_cmd_write_voice_setting *wvs; - const struct bt_hci_cmd_set_host_flow_control *shfc; - const struct bt_hci_cmd_write_inquiry_mode *wim; - const struct bt_hci_cmd_write_afh_assessment_mode *waam; - const struct bt_hci_cmd_write_ext_inquiry_response *weir; - const struct bt_hci_cmd_write_simple_pairing_mode *wspm; - const struct bt_hci_cmd_io_capability_request_reply *icrr; - const struct bt_hci_cmd_io_capability_request_reply *icrnr; - const struct bt_hci_cmd_read_encrypt_key_size *reks; - const struct bt_hci_cmd_write_le_host_supported *wlhs; - const struct bt_hci_cmd_write_secure_conn_support *wscs; - const struct bt_hci_cmd_set_event_mask_page2 *semp2; - const struct bt_hci_cmd_le_set_event_mask *lsem; - const struct bt_hci_cmd_le_set_random_address *lsra; - const struct bt_hci_cmd_le_set_adv_parameters *lsap; - const struct bt_hci_cmd_le_set_adv_data *lsad; - const struct bt_hci_cmd_le_set_scan_rsp_data *lssrd; - const struct bt_hci_cmd_setup_sync_conn *ssc; - const struct bt_hci_cmd_write_ssp_debug_mode *wsdm; - const struct bt_hci_cmd_le_set_adv_enable *lsae; - const struct bt_hci_cmd_le_set_scan_parameters *lssp; - const struct bt_hci_cmd_le_set_scan_enable *lsse; - const struct bt_hci_cmd_le_start_encrypt *lse; - const struct bt_hci_cmd_le_ltk_req_reply *llrr; - const struct bt_hci_cmd_le_encrypt *lenc_cmd; - const struct bt_hci_cmd_le_generate_dhkey *dh; - const struct bt_hci_cmd_le_conn_param_req_reply *lcprr_cmd; - const struct bt_hci_cmd_le_conn_param_req_neg_reply *lcprnr_cmd; - const struct bt_hci_cmd_read_local_amp_assoc *rlaa_cmd; - const struct bt_hci_cmd_read_rssi *rrssi; - const struct bt_hci_cmd_read_tx_power *rtxp; - const struct bt_hci_cmd_le_set_adv_set_rand_addr *lsasra; - const struct bt_hci_cmd_le_set_ext_adv_params *lseap; - const struct bt_hci_cmd_le_set_ext_adv_enable *lseae; - const struct bt_hci_cmd_le_set_ext_adv_data *lsead; - const struct bt_hci_cmd_le_set_ext_scan_rsp_data *lsesrd; - const struct bt_hci_cmd_le_set_default_phy *phys; - const struct bt_hci_cmd_le_set_ext_scan_params *lsesp; - const struct bt_hci_le_scan_phy *lsp; - const struct bt_hci_cmd_le_set_ext_scan_enable *lsese; - const struct bt_hci_cmd_le_reject_cis *lrcis; - const struct bt_hci_cmd_le_remove_iso_path *lerip; - struct bt_hci_rsp_read_default_link_policy rdlp; - struct bt_hci_rsp_read_stored_link_key rslk; - struct bt_hci_rsp_write_stored_link_key wslk; - struct bt_hci_rsp_delete_stored_link_key dslk; - struct bt_hci_rsp_read_local_name rln; - struct bt_hci_rsp_read_conn_accept_timeout rcat; - struct bt_hci_rsp_read_page_timeout rpt; - struct bt_hci_rsp_read_scan_enable rse; - struct bt_hci_rsp_read_page_scan_activity rpsa; - struct bt_hci_rsp_read_inquiry_scan_activity risa; - struct bt_hci_rsp_read_page_scan_type rpst; - struct bt_hci_rsp_read_auth_enable rae; - struct bt_hci_rsp_read_class_of_dev rcod; - struct bt_hci_rsp_read_voice_setting rvs; - struct bt_hci_rsp_read_num_supported_iac rnsi; - struct bt_hci_rsp_read_current_iac_lap *rcil; - struct bt_hci_rsp_read_inquiry_mode rim; - struct bt_hci_rsp_read_afh_assessment_mode raam; - struct bt_hci_rsp_read_ext_inquiry_response reir; - struct bt_hci_rsp_read_simple_pairing_mode rspm; - struct bt_hci_rsp_read_local_oob_data rlod; - struct bt_hci_rsp_read_inquiry_resp_tx_power rirtp; - struct bt_hci_rsp_read_le_host_supported rlhs; - struct bt_hci_rsp_read_secure_conn_support rscs; - struct bt_hci_rsp_read_local_oob_ext_data rloed; - struct bt_hci_rsp_read_sync_train_params rstp; - struct bt_hci_rsp_read_local_version rlv; - struct bt_hci_rsp_read_local_commands rlc; - struct bt_hci_rsp_read_local_features rlf; - struct bt_hci_rsp_read_local_ext_features rlef; - struct bt_hci_rsp_read_buffer_size rbs; - struct bt_hci_rsp_read_country_code rcc; - struct bt_hci_rsp_read_bd_addr rba; - struct bt_hci_rsp_read_data_block_size rdbs; - struct bt_hci_rsp_read_local_codecs *rlsc; - struct bt_hci_rsp_read_local_amp_info rlai; - struct bt_hci_rsp_read_local_amp_assoc rlaa_rsp; - struct bt_hci_rsp_get_mws_transport_config *gmtc; - struct bt_hci_rsp_le_conn_param_req_reply lcprr_rsp; - struct bt_hci_rsp_le_conn_param_req_neg_reply lcprnr_rsp; - struct bt_hci_rsp_le_read_buffer_size lrbs; - struct bt_hci_rsp_le_read_local_features lrlf; - struct bt_hci_rsp_le_read_adv_tx_power lratp; - struct bt_hci_rsp_le_read_supported_states lrss; - struct bt_hci_rsp_le_read_white_list_size lrwls; - struct bt_hci_rsp_le_encrypt lenc; - struct bt_hci_rsp_le_rand lr; - struct bt_hci_rsp_le_test_end lte; - struct bt_hci_rsp_remote_name_request_cancel rnrc_rsp; - struct bt_hci_rsp_link_key_request_reply lkrr_rsp; - struct bt_hci_rsp_link_key_request_neg_reply lkrnr_rsp; - struct bt_hci_rsp_pin_code_request_neg_reply pcrr_rsp; - struct bt_hci_rsp_pin_code_request_neg_reply pcrnr_rsp; - struct bt_hci_rsp_user_confirm_request_reply ucrr_rsp; - struct bt_hci_rsp_user_confirm_request_neg_reply ucrnr_rsp; - struct bt_hci_rsp_read_rssi rrssi_rsp; - struct bt_hci_rsp_read_tx_power rtxp_rsp; - struct bt_hci_evt_le_read_local_pk256_complete pk_evt; - struct bt_hci_evt_le_generate_dhkey_complete dh_evt; - struct bt_hci_rsp_le_read_num_supported_adv_sets rlrnsas; - struct bt_hci_rsp_le_set_ext_adv_params rlseap; - struct bt_hci_rsp_le_read_buffer_size_v2 lrbsv2; - struct lescp { - struct bt_hci_rsp_le_set_cig_params params; - uint16_t handle; - } __attribute__ ((packed)) lscp; - struct bt_hci_rsp_le_remove_cig lrc; - struct bt_hci_cmd_le_setup_iso_path *lesip; - uint8_t status, page; - - switch (opcode) { - case BT_HCI_CMD_INQUIRY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_INQUIRY_CANCEL: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - inquiry_cancel(btdev); - break; - - case BT_HCI_CMD_CREATE_CONN: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_DISCONNECT: - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_CREATE_CONN_CANCEL: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_ACCEPT_CONN_REQUEST: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_REJECT_CONN_REQUEST: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_LINK_KEY_REQUEST_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - lkrr_rsp.status = BT_HCI_ERR_SUCCESS; - memcpy(lkrr_rsp.bdaddr, data, 6); - cmd_complete(btdev, opcode, &lkrr_rsp, sizeof(lkrr_rsp)); - break; - - case BT_HCI_CMD_LINK_KEY_REQUEST_NEG_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - lkrnr_rsp.status = BT_HCI_ERR_SUCCESS; - memcpy(lkrnr_rsp.bdaddr, data, 6); - cmd_complete(btdev, opcode, &lkrnr_rsp, sizeof(lkrnr_rsp)); - break; - - case BT_HCI_CMD_PIN_CODE_REQUEST_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - pcrr_rsp.status = BT_HCI_ERR_SUCCESS; - memcpy(pcrr_rsp.bdaddr, data, 6); - cmd_complete(btdev, opcode, &pcrr_rsp, sizeof(pcrr_rsp)); - break; - - case BT_HCI_CMD_PIN_CODE_REQUEST_NEG_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - pcrnr_rsp.status = BT_HCI_ERR_SUCCESS; - memcpy(pcrnr_rsp.bdaddr, data, 6); - cmd_complete(btdev, opcode, &pcrnr_rsp, sizeof(pcrnr_rsp)); - break; - - case BT_HCI_CMD_AUTH_REQUESTED: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_SET_CONN_ENCRYPT: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_REMOTE_NAME_REQUEST: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_REMOTE_NAME_REQUEST_CANCEL: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rnrc = data; - rnrc_rsp.status = BT_HCI_ERR_SUCCESS; - memcpy(rnrc_rsp.bdaddr, rnrc->bdaddr, 6); - cmd_complete(btdev, opcode, &rnrc_rsp, sizeof(rnrc_rsp)); - break; - - case BT_HCI_CMD_READ_REMOTE_FEATURES: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_READ_REMOTE_EXT_FEATURES: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_READ_REMOTE_VERSION: - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_READ_CLOCK_OFFSET: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; - - case BT_HCI_CMD_READ_DEFAULT_LINK_POLICY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rdlp.status = BT_HCI_ERR_SUCCESS; - rdlp.policy = cpu_to_le16(btdev->default_link_policy); - cmd_complete(btdev, opcode, &rdlp, sizeof(rdlp)); - break; - - case BT_HCI_CMD_WRITE_DEFAULT_LINK_POLICY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wdlp = data; - btdev->default_link_policy = le16_to_cpu(wdlp->policy); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - - case BT_HCI_CMD_SET_EVENT_MASK: - sem = data; - memcpy(btdev->event_mask, sem->mask, 8); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - - case BT_HCI_CMD_RESET: - btdev_reset(btdev); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - - case BT_HCI_CMD_SET_EVENT_FILTER: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - sef = data; - btdev->event_filter = sef->type; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - - case BT_HCI_CMD_READ_STORED_LINK_KEY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rslk.status = BT_HCI_ERR_SUCCESS; - rslk.max_num_keys = cpu_to_le16(0); - rslk.num_keys = cpu_to_le16(0); - cmd_complete(btdev, opcode, &rslk, sizeof(rslk)); - break; + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_WRITE_STORED_LINK_KEY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wslk.status = BT_HCI_ERR_SUCCESS; - wslk.num_keys = 0; - cmd_complete(btdev, opcode, &wslk, sizeof(wslk)); - break; +static int cmd_per_adv_add(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_DELETE_STORED_LINK_KEY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - dslk.status = BT_HCI_ERR_SUCCESS; - dslk.num_keys = cpu_to_le16(0); - cmd_complete(btdev, opcode, &dslk, sizeof(dslk)); - break; +static int cmd_per_adv_remove(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_WRITE_LOCAL_NAME: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wln = data; - memcpy(btdev->name, wln->name, 248); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +static int cmd_per_adv_clear(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_READ_LOCAL_NAME: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rln.status = BT_HCI_ERR_SUCCESS; - memcpy(rln.name, btdev->name, 248); - cmd_complete(btdev, opcode, &rln, sizeof(rln)); - break; +static int cmd_read_per_adv_list_size(struct btdev *dev, const void *data, + uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_READ_CONN_ACCEPT_TIMEOUT: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rcat.status = BT_HCI_ERR_SUCCESS; - rcat.timeout = cpu_to_le16(btdev->conn_accept_timeout); - cmd_complete(btdev, opcode, &rcat, sizeof(rcat)); - break; +#define CMD_LE_50 \ + CMD(BT_HCI_CMD_LE_SET_DEFAULT_PHY, cmd_set_default_phy, NULL), \ + CMD(BT_HCI_CMD_LE_SET_ADV_SET_RAND_ADDR, cmd_set_adv_rand_addr, NULL), \ + CMD(BT_HCI_CMD_LE_SET_EXT_ADV_PARAMS, cmd_set_ext_adv_params, NULL), \ + CMD(BT_HCI_CMD_LE_SET_EXT_ADV_DATA, cmd_set_ext_adv_data, NULL), \ + CMD(BT_HCI_CMD_LE_SET_EXT_SCAN_RSP_DATA, cmd_set_ext_scan_rsp_data, \ + NULL), \ + CMD(BT_HCI_CMD_LE_SET_EXT_ADV_ENABLE, cmd_set_ext_adv_enable, NULL), \ + CMD(BT_HCI_CMD_LE_READ_MAX_ADV_DATA_LEN, cmd_read_max_adv_data_len, \ + NULL), \ + CMD(BT_HCI_CMD_LE_READ_NUM_SUPPORTED_ADV_SETS, cmd_read_num_adv_sets, \ + NULL), \ + CMD(BT_HCI_CMD_LE_REMOVE_ADV_SET, cmd_remove_adv_set, NULL), \ + CMD(BT_HCI_CMD_LE_CLEAR_ADV_SETS, cmd_clear_adv_sets, NULL), \ + CMD(BT_HCI_CMD_LE_SET_PERIODIC_ADV_PARAMS, cmd_set_per_adv_params, \ + NULL), \ + CMD(BT_HCI_CMD_LE_SET_PERIODIC_ADV_DATA, cmd_set_per_adv_data, NULL), \ + CMD(BT_HCI_CMD_LE_SET_PERIODIC_ADV_ENABLE, cmd_set_per_adv_enable, \ + NULL), \ + CMD(BT_HCI_CMD_LE_SET_EXT_SCAN_PARAMS, cmd_set_ext_scan_params, NULL), \ + CMD(BT_HCI_CMD_LE_SET_EXT_SCAN_ENABLE, cmd_set_ext_scan_enable, \ + cmd_set_ext_scan_enable_complete), \ + CMD(BT_HCI_CMD_LE_EXT_CREATE_CONN, cmd_ext_create_conn, \ + cmd_ext_create_conn_complete), \ + CMD(BT_HCI_CMD_LE_PERIODIC_ADV_CREATE_SYNC, cmd_per_adv_create_sync, \ + NULL), \ + CMD(BT_HCI_CMD_LE_PERIODIC_ADV_CREATE_SYNC_CANCEL, \ + cmd_per_adv_create_sync_cancel, NULL), \ + CMD(BT_HCI_CMD_LE_PERIODIC_ADV_TERM_SYNC, cmd_per_adv_term_sync, \ + NULL), \ + CMD(BT_HCI_CMD_LE_ADD_DEV_PERIODIC_ADV_LIST, cmd_per_adv_add, NULL), \ + CMD(BT_HCI_CMD_LE_REMOVE_DEV_PERIODIC_ADV_LIST, cmd_per_adv_remove, \ + NULL), \ + CMD(BT_HCI_CMD_LE_CLEAR_PERIODIC_ADV_LIST, cmd_per_adv_clear, NULL), \ + CMD(BT_HCI_CMD_LE_READ_PERIODIC_ADV_LIST_SIZE, \ + cmd_read_per_adv_list_size, NULL) + +static const struct btdev_cmd cmd_le_5_0[] = { + CMD_COMMON_ALL, + CMD_COMMON_BREDR_LE, + CMD_LE, + CMD_LE_50, + {} +}; - case BT_HCI_CMD_WRITE_CONN_ACCEPT_TIMEOUT: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wcat = data; - btdev->conn_accept_timeout = le16_to_cpu(wcat->timeout); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +static void set_le_50_commands(struct btdev *btdev) +{ + btdev->commands[35] |= 0x20; /* LE Set Default PHY */ + btdev->commands[36] |= 0x02; /* LE Set Adv Set Random Address */ + btdev->commands[36] |= 0x04; /* LE Set Ext Adv Parameters */ + btdev->commands[36] |= 0x08; /* LE Set Ext Adv Data */ + btdev->commands[36] |= 0x10; /* LE Set Ext Scan Response Data */ + btdev->commands[36] |= 0x20; /* LE Set Ext Adv Enable */ + btdev->commands[36] |= 0x40; /* LE Read Maximum Adv Data Length */ + btdev->commands[36] |= 0x80; /* LE Read Num of Supported Adv Sets */ + btdev->commands[37] |= 0x01; /* LE Remove Adv Set */ + btdev->commands[37] |= 0x02; /* LE Clear Adv Sets */ + btdev->commands[37] |= 0x04; /* LE Set Periodic Adv Parameters */ + btdev->commands[37] |= 0x08; /* LE Set Periodic Adv Data */ + btdev->commands[37] |= 0x10; /* LE Set Periodic Adv Enable */ + btdev->commands[37] |= 0x20; /* LE Set Ext Scan Parameters */ + btdev->commands[37] |= 0x40; /* LE Set Ext Scan Enable */ + btdev->commands[37] |= 0x80; /* LE Ext Create Connection */ + btdev->commands[38] |= 0x01; /* LE Periodic Adv Create Sync */ + btdev->commands[38] |= 0x02; /* LE Periodic Adv Create Sync Cancel */ + btdev->commands[38] |= 0x04; /* LE Periodic Adv Terminate Sync */ + btdev->commands[38] |= 0x08; /* LE Add Device To Periodic Adv List */ + btdev->commands[38] |= 0x10; /* LE Remove Periodic Adv List */ + btdev->commands[38] |= 0x20; /* LE Clear Periodic Adv List */ + btdev->commands[38] |= 0x40; /* LE Read Periodic Adv List Size */ + btdev->cmds = cmd_le_5_0; +} - case BT_HCI_CMD_READ_PAGE_TIMEOUT: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rpt.status = BT_HCI_ERR_SUCCESS; - rpt.timeout = cpu_to_le16(btdev->page_timeout); - cmd_complete(btdev, opcode, &rpt, sizeof(rpt)); - break; +static int cmd_read_size_v2(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_le_read_buffer_size_v2 rsp; - case BT_HCI_CMD_WRITE_PAGE_TIMEOUT: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wpt = data; - btdev->page_timeout = le16_to_cpu(wpt->timeout); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + memset(&rsp, 0, sizeof(rsp)); - case BT_HCI_CMD_READ_SCAN_ENABLE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rse.status = BT_HCI_ERR_SUCCESS; - rse.enable = btdev->scan_enable; - cmd_complete(btdev, opcode, &rse, sizeof(rse)); - break; + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.acl_mtu = cpu_to_le16(dev->acl_mtu); + rsp.acl_max_pkt = dev->acl_max_pkt; + rsp.iso_mtu = cpu_to_le16(dev->iso_mtu); + rsp.iso_max_pkt = dev->iso_max_pkt; + cmd_complete(dev, BT_HCI_CMD_LE_READ_BUFFER_SIZE_V2, &rsp, sizeof(rsp)); - case BT_HCI_CMD_WRITE_SCAN_ENABLE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wse = data; - btdev->scan_enable = wse->enable; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + return 0; +} - case BT_HCI_CMD_READ_PAGE_SCAN_ACTIVITY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rpsa.status = BT_HCI_ERR_SUCCESS; - rpsa.interval = cpu_to_le16(btdev->page_scan_interval); - rpsa.window = cpu_to_le16(btdev->page_scan_window); - cmd_complete(btdev, opcode, &rpsa, sizeof(rpsa)); - break; +static int cmd_read_iso_tx_sync(struct btdev *dev, const void *data, + uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_WRITE_PAGE_SCAN_ACTIVITY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wpsa = data; - btdev->page_scan_interval = le16_to_cpu(wpsa->interval); - btdev->page_scan_window = le16_to_cpu(wpsa->window); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +static int cmd_set_cig_params(struct btdev *dev, const void *data, + uint8_t len) +{ + struct lescp { + struct bt_hci_rsp_le_set_cig_params params; + uint16_t handle; + } __attribute__ ((packed)) rsp; - case BT_HCI_CMD_READ_INQUIRY_SCAN_ACTIVITY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - risa.status = BT_HCI_ERR_SUCCESS; - risa.interval = cpu_to_le16(btdev->inquiry_scan_interval); - risa.window = cpu_to_le16(btdev->inquiry_scan_window); - cmd_complete(btdev, opcode, &risa, sizeof(risa)); - break; + memset(&rsp, 0, sizeof(rsp)); - case BT_HCI_CMD_WRITE_INQUIRY_SCAN_ACTIVITY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wisa = data; - btdev->inquiry_scan_interval = le16_to_cpu(wisa->interval); - btdev->inquiry_scan_window = le16_to_cpu(wisa->window); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + memcpy(&dev->le_cig, data, len); + rsp.params.status = BT_HCI_ERR_SUCCESS; + rsp.params.cig_id = 0x00; + rsp.params.num_handles = 1; + rsp.handle = cpu_to_le16(ISO_HANDLE); + cmd_complete(dev, BT_HCI_CMD_LE_SET_CIG_PARAMS, &rsp, sizeof(rsp)); - case BT_HCI_CMD_READ_PAGE_SCAN_TYPE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rpst.status = BT_HCI_ERR_SUCCESS; - rpst.type = btdev->page_scan_type; - cmd_complete(btdev, opcode, &rpst, sizeof(rpst)); - break; + return 0; +} - case BT_HCI_CMD_WRITE_PAGE_SCAN_TYPE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wpst = data; - btdev->page_scan_type = wpst->type; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +static int cmd_set_cig_params_test(struct btdev *dev, const void *data, + uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_READ_AUTH_ENABLE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rae.status = BT_HCI_ERR_SUCCESS; - rae.enable = btdev->auth_enable; - cmd_complete(btdev, opcode, &rae, sizeof(rae)); - break; +static int cmd_create_cis(struct btdev *dev, const void *data, uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_LE_CREATE_CIS); - case BT_HCI_CMD_WRITE_AUTH_ENABLE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wae = data; - btdev->auth_enable = wae->enable; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + return 0; +} - case BT_HCI_CMD_READ_CLASS_OF_DEV: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rcod.status = BT_HCI_ERR_SUCCESS; - memcpy(rcod.dev_class, btdev->dev_class, 3); - cmd_complete(btdev, opcode, &rcod, sizeof(rcod)); - break; +static void le_cis_estabilished(struct btdev *dev, uint8_t status) +{ + struct bt_hci_evt_le_cis_established evt; - case BT_HCI_CMD_WRITE_CLASS_OF_DEV: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wcod = data; - memcpy(btdev->dev_class, wcod->dev_class, 3); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + memset(&evt, 0, sizeof(evt)); - case BT_HCI_CMD_READ_VOICE_SETTING: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rvs.status = BT_HCI_ERR_SUCCESS; - rvs.setting = cpu_to_le16(btdev->voice_setting); - cmd_complete(btdev, opcode, &rvs, sizeof(rvs)); - break; + evt.status = status; - case BT_HCI_CMD_WRITE_VOICE_SETTING: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wvs = data; - btdev->voice_setting = le16_to_cpu(wvs->setting); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + if (dev->conn) + dev = dev->conn; - case BT_HCI_CMD_SET_HOST_FLOW_CONTROL: - shfc = data; - if (shfc->enable > 0x03) { - status = BT_HCI_ERR_INVALID_PARAMETERS; - } else { - btdev->host_flow_control = shfc->enable; - status = BT_HCI_ERR_SUCCESS; - } - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + if (!evt.status) { + evt.conn_handle = cpu_to_le16(ISO_HANDLE); + /* TODO: Figure out if these values makes sense */ + memcpy(evt.cig_sync_delay, dev->le_cig.params.m_interval, + sizeof(dev->le_cig.params.m_interval)); + memcpy(evt.cis_sync_delay, dev->le_cig.params.s_interval, + sizeof(dev->le_cig.params.s_interval)); + memcpy(evt.m_latency, &dev->le_cig.params.m_latency, + sizeof(dev->le_cig.params.m_latency)); + memcpy(evt.s_latency, &dev->le_cig.params.s_latency, + sizeof(dev->le_cig.params.s_latency)); + evt.m_phy = dev->le_cig.cis.m_phy; + evt.s_phy = dev->le_cig.cis.s_phy; + evt.nse = 0x01; + evt.m_bn = 0x01; + evt.s_bn = 0x01; + evt.m_ft = 0x01; + evt.s_ft = 0x01; + evt.m_mtu = dev->le_cig.cis.m_sdu; + evt.s_mtu = dev->le_cig.cis.s_sdu; + evt.interval = dev->le_cig.params.m_latency; + } - case BT_HCI_CMD_HOST_BUFFER_SIZE: - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + le_meta_event(dev, BT_HCI_EVT_LE_CIS_ESTABLISHED, &evt, sizeof(evt)); - case BT_HCI_CMD_HOST_NUM_COMPLETED_PACKETS: - /* This command is special in the sense that no event is - * normally generated after the command has completed. - */ - break; + if (dev->conn) + le_meta_event(dev->conn, BT_HCI_EVT_LE_CIS_ESTABLISHED, &evt, + sizeof(evt)); +} - case BT_HCI_CMD_READ_NUM_SUPPORTED_IAC: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rnsi.status = BT_HCI_ERR_SUCCESS; - rnsi.num_iac = 0x01; - cmd_complete(btdev, opcode, &rnsi, sizeof(rnsi)); - break; +static int cmd_create_cis_complete(struct btdev *dev, const void *data, + uint8_t len) +{ + struct btdev *remote = dev->conn; - case BT_HCI_CMD_READ_CURRENT_IAC_LAP: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rcil = alloca(sizeof(*rcil) + 3); - rcil->status = BT_HCI_ERR_SUCCESS; - rcil->num_iac = 0x01; - rcil->iac_lap[0] = 0x33; - rcil->iac_lap[1] = 0x8b; - rcil->iac_lap[2] = 0x9e; - cmd_complete(btdev, opcode, rcil, sizeof(*rcil) + 3); - break; + if (remote) { + struct bt_hci_evt_le_cis_req evt; - case BT_HCI_CMD_WRITE_CURRENT_IAC_LAP: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + evt.acl_handle = cpu_to_le16(ACL_HANDLE); + evt.cis_handle = cpu_to_le16(ISO_HANDLE); + evt.cig_id = 0x00; + evt.cis_id = 0x00; - case BT_HCI_CMD_READ_INQUIRY_MODE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rim.status = BT_HCI_ERR_SUCCESS; - rim.mode = btdev->inquiry_mode; - cmd_complete(btdev, opcode, &rim, sizeof(rim)); - break; + le_meta_event(remote, BT_HCI_EVT_LE_CIS_REQ, &evt, sizeof(evt)); + } else { + le_cis_estabilished(dev, BT_HCI_ERR_UNKNOWN_CONN_ID); + } - case BT_HCI_CMD_WRITE_INQUIRY_MODE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wim = data; - btdev->inquiry_mode = wim->mode; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + return 0; +} - case BT_HCI_CMD_READ_AFH_ASSESSMENT_MODE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - raam.status = BT_HCI_ERR_SUCCESS; - raam.mode = btdev->afh_assessment_mode; - cmd_complete(btdev, opcode, &raam, sizeof(raam)); - break; +static int cmd_remove_cig(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_le_remove_cig rsp; - case BT_HCI_CMD_WRITE_AFH_ASSESSMENT_MODE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - waam = data; - btdev->afh_assessment_mode = waam->mode; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + memset(&dev->le_cig, 0, sizeof(dev->le_cig)); + memset(&rsp, 0, sizeof(rsp)); - case BT_HCI_CMD_READ_EXT_INQUIRY_RESPONSE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - reir.status = BT_HCI_ERR_SUCCESS; - reir.fec = btdev->ext_inquiry_fec; - memcpy(reir.data, btdev->ext_inquiry_rsp, 240); - cmd_complete(btdev, opcode, &reir, sizeof(reir)); - break; + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.cig_id = 0x00; + cmd_complete(dev, BT_HCI_CMD_LE_REMOVE_CIG, &rsp, sizeof(rsp)); - case BT_HCI_CMD_WRITE_EXT_INQUIRY_RESPONSE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - weir = data; - btdev->ext_inquiry_fec = weir->fec; - memcpy(btdev->ext_inquiry_rsp, weir->data, 240); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + return 0; +} - case BT_HCI_CMD_READ_SIMPLE_PAIRING_MODE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rspm.status = BT_HCI_ERR_SUCCESS; - rspm.mode = btdev->simple_pairing_mode; - cmd_complete(btdev, opcode, &rspm, sizeof(rspm)); - break; +static int cmd_accept_cis(struct btdev *dev, const void *data, uint8_t len) +{ + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_LE_ACCEPT_CIS); + le_cis_estabilished(dev, BT_HCI_ERR_SUCCESS); - case BT_HCI_CMD_WRITE_SIMPLE_PAIRING_MODE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wspm = data; - btdev->simple_pairing_mode = wspm->mode; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + return 0; +} - case BT_HCI_CMD_IO_CAPABILITY_REQUEST_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - icrr = data; - io_cap_req_reply_complete(btdev, icrr->bdaddr, - icrr->capability, - icrr->oob_data, - icrr->authentication); - break; +static int cmd_reject_cis(struct btdev *dev, const void *data, uint8_t len) +{ + const struct bt_hci_cmd_le_reject_cis *cmd = data; - case BT_HCI_CMD_IO_CAPABILITY_REQUEST_NEG_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - icrnr = data; - io_cap_req_neg_reply_complete(btdev, icrnr->bdaddr); - ssp_complete(btdev, icrnr->bdaddr, BT_HCI_ERR_AUTH_FAILURE, - false); - break; + cmd_status(dev, BT_HCI_ERR_SUCCESS, BT_HCI_CMD_LE_ACCEPT_CIS); + le_cis_estabilished(dev, cmd->reason); - case BT_HCI_CMD_USER_CONFIRM_REQUEST_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - ucrr_rsp.status = BT_HCI_ERR_SUCCESS; - memcpy(ucrr_rsp.bdaddr, data, 6); - cmd_complete(btdev, opcode, &ucrr_rsp, sizeof(ucrr_rsp)); - ssp_complete(btdev, data, BT_HCI_ERR_SUCCESS, true); - break; + return 0; +} - case BT_HCI_CMD_USER_CONFIRM_REQUEST_NEG_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - ucrnr_rsp.status = BT_HCI_ERR_SUCCESS; - memcpy(ucrnr_rsp.bdaddr, data, 6); - cmd_complete(btdev, opcode, &ucrnr_rsp, sizeof(ucrnr_rsp)); - ssp_complete(btdev, data, BT_HCI_ERR_AUTH_FAILURE, true); - break; +static int cmd_create_big(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_READ_LOCAL_OOB_DATA: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rlod.status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &rlod, sizeof(rlod)); - break; +static int cmd_create_big_test(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_READ_INQUIRY_RESP_TX_POWER: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rirtp.status = BT_HCI_ERR_SUCCESS; - rirtp.level = 0; - cmd_complete(btdev, opcode, &rirtp, sizeof(rirtp)); - break; +static int cmd_term_big(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_READ_LE_HOST_SUPPORTED: - if (btdev->type != BTDEV_TYPE_BREDRLE && - btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - rlhs.status = BT_HCI_ERR_SUCCESS; - rlhs.supported = btdev->le_supported; - rlhs.simultaneous = btdev->le_simultaneous; - cmd_complete(btdev, opcode, &rlhs, sizeof(rlhs)); - break; +static int cmd_big_create_sync(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_WRITE_LE_HOST_SUPPORTED: - if (btdev->type != BTDEV_TYPE_BREDRLE && - btdev->type != BTDEV_TYPE_LE && - btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - wlhs = data; - btdev->le_supported = wlhs->supported; - btdev->le_simultaneous = wlhs->simultaneous; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +static int cmd_big_term_sync(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_READ_SECURE_CONN_SUPPORT: - if (btdev->type != BTDEV_TYPE_BREDRLE && - btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - rscs.status = BT_HCI_ERR_SUCCESS; - rscs.support = btdev->secure_conn_support; - cmd_complete(btdev, opcode, &rscs, sizeof(rscs)); - break; +static int cmd_req_peer_sca(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_WRITE_SECURE_CONN_SUPPORT: - if (btdev->type != BTDEV_TYPE_BREDRLE && - btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - wscs = data; - btdev->secure_conn_support = wscs->support; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +static int cmd_setup_iso_path(struct btdev *dev, const void *data, uint8_t len) +{ + const struct bt_hci_cmd_le_setup_iso_path *cmd = data; + struct bt_hci_rsp_le_setup_iso_path rsp; - case BT_HCI_CMD_READ_LOCAL_OOB_EXT_DATA: - if (btdev->type != BTDEV_TYPE_BREDRLE && - btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - rloed.status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &rloed, sizeof(rloed)); - break; + memset(&rsp, 0, sizeof(rsp)); - case BT_HCI_CMD_READ_SYNC_TRAIN_PARAMS: - if (btdev->type != BTDEV_TYPE_BREDRLE && - btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - rstp.status = BT_HCI_ERR_SUCCESS; - rstp.interval = cpu_to_le16(btdev->sync_train_interval); - rstp.timeout = cpu_to_le32(btdev->sync_train_timeout); - rstp.service_data = btdev->sync_train_service_data; - cmd_complete(btdev, opcode, &rstp, sizeof(rstp)); - break; + if (le16_to_cpu(cmd->handle) != ISO_HANDLE) { + rsp.status = BT_HCI_ERR_UNKNOWN_CONN_ID; + goto done; + } - case BT_HCI_CMD_READ_LOCAL_VERSION: - rlv.status = BT_HCI_ERR_SUCCESS; - rlv.hci_ver = btdev->version; - rlv.hci_rev = cpu_to_le16(btdev->revision); - rlv.lmp_ver = btdev->version; - rlv.manufacturer = cpu_to_le16(btdev->manufacturer); - rlv.lmp_subver = cpu_to_le16(btdev->revision); - cmd_complete(btdev, opcode, &rlv, sizeof(rlv)); - break; + /* Only support HCI or disabled paths */ + if (cmd->path && cmd->path != 0xff) { + rsp.status = BT_HCI_ERR_INVALID_PARAMETERS; + goto done; + } - case BT_HCI_CMD_READ_LOCAL_COMMANDS: - rlc.status = BT_HCI_ERR_SUCCESS; - memcpy(rlc.commands, btdev->commands, 64); - cmd_complete(btdev, opcode, &rlc, sizeof(rlc)); + switch (cmd->direction) { + case 0x00: + dev->le_iso_path[0] = cmd->path; + rsp.handle = cpu_to_le16(ISO_HANDLE); break; - - case BT_HCI_CMD_READ_LOCAL_FEATURES: - rlf.status = BT_HCI_ERR_SUCCESS; - memcpy(rlf.features, btdev->features, 8); - cmd_complete(btdev, opcode, &rlf, sizeof(rlf)); + case 0x01: + dev->le_iso_path[1] = cmd->path; + rsp.handle = cpu_to_le16(ISO_HANDLE); break; + default: + rsp.status = BT_HCI_ERR_INVALID_PARAMETERS; + } - case BT_HCI_CMD_READ_LOCAL_EXT_FEATURES: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; +done: + cmd_complete(dev, BT_HCI_CMD_LE_SETUP_ISO_PATH, &rsp, sizeof(rsp)); - page = ((const uint8_t *) data)[0]; + return 0; +} - rlef.page = page; - rlef.max_page = btdev->max_page; +static int cmd_remove_iso_path(struct btdev *dev, const void *data, uint8_t len) +{ + const struct bt_hci_cmd_le_remove_iso_path *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; - if (page > btdev->max_page) { - rlef.status = BT_HCI_ERR_INVALID_PARAMETERS; - memset(rlef.features, 0, 8); - cmd_complete(btdev, opcode, &rlef, sizeof(rlef)); - break; - } + if (!dev->conn || le16_to_cpu(cmd->handle) != ISO_HANDLE) + status = BT_HCI_ERR_UNKNOWN_CONN_ID; - switch (page) { - case 0x00: - rlef.status = BT_HCI_ERR_SUCCESS; - memcpy(rlef.features, btdev->features, 8); - break; - case 0x01: - rlef.status = BT_HCI_ERR_SUCCESS; - btdev_get_host_features(btdev, rlef.features); - break; - case 0x02: - rlef.status = BT_HCI_ERR_SUCCESS; - memcpy(rlef.features, btdev->feat_page_2, 8); - break; - default: - rlef.status = BT_HCI_ERR_INVALID_PARAMETERS; - memset(rlef.features, 0, 8); - break; - } - cmd_complete(btdev, opcode, &rlef, sizeof(rlef)); + switch (cmd->direction) { + case 0x00: + dev->le_iso_path[0] = 0x00; break; - - case BT_HCI_CMD_READ_BUFFER_SIZE: - rbs.status = BT_HCI_ERR_SUCCESS; - rbs.acl_mtu = cpu_to_le16(btdev->acl_mtu); - rbs.sco_mtu = 0; - rbs.acl_max_pkt = cpu_to_le16(btdev->acl_max_pkt); - rbs.sco_max_pkt = cpu_to_le16(0); - cmd_complete(btdev, opcode, &rbs, sizeof(rbs)); + case 0x01: + dev->le_iso_path[1] = 0x00; break; + default: + status = BT_HCI_ERR_INVALID_PARAMETERS; + } - case BT_HCI_CMD_READ_COUNTRY_CODE: - rcc.status = BT_HCI_ERR_SUCCESS; - rcc.code = btdev->country_code; - cmd_complete(btdev, opcode, &rcc, sizeof(rcc)); - break; + cmd_complete(dev, BT_HCI_CMD_LE_REMOVE_ISO_PATH, &status, + sizeof(status)); - case BT_HCI_CMD_READ_BD_ADDR: - rba.status = BT_HCI_ERR_SUCCESS; - memcpy(rba.bdaddr, btdev->bdaddr, 6); - cmd_complete(btdev, opcode, &rba, sizeof(rba)); - break; + return 0; +} - case BT_HCI_CMD_READ_DATA_BLOCK_SIZE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rdbs.status = BT_HCI_ERR_SUCCESS; - rdbs.max_acl_len = cpu_to_le16(btdev->acl_mtu); - rdbs.block_len = cpu_to_le16(btdev->acl_mtu); - rdbs.num_blocks = cpu_to_le16(btdev->acl_max_pkt); - cmd_complete(btdev, opcode, &rdbs, sizeof(rdbs)); - break; +static int cmd_iso_tx_test(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_READ_LOCAL_CODECS: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - rlsc = alloca(sizeof(*rlsc) + 7); - rlsc->status = BT_HCI_ERR_SUCCESS; - rlsc->num_codecs = 0x06; - rlsc->codec[0] = 0x00; - rlsc->codec[1] = 0x01; - rlsc->codec[2] = 0x02; - rlsc->codec[3] = 0x03; - rlsc->codec[4] = 0x04; - rlsc->codec[5] = 0x05; - rlsc->codec[6] = 0x00; - cmd_complete(btdev, opcode, rlsc, sizeof(*rlsc) + 7); - break; +static int cmd_iso_rx_test(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_READ_RSSI: - rrssi = data; +static int cmd_iso_read_test_counter(struct btdev *dev, const void *data, + uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - rrssi_rsp.status = BT_HCI_ERR_SUCCESS; - rrssi_rsp.handle = rrssi->handle; - rrssi_rsp.rssi = -1; /* non-zero so we can see it in tester */ - cmd_complete(btdev, opcode, &rrssi_rsp, sizeof(rrssi_rsp)); - break; +static int cmd_iso_test_end(struct btdev *dev, const void *data, uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_READ_TX_POWER: - rtxp = data; +static int cmd_set_host_feature(struct btdev *dev, const void *data, + uint8_t len) +{ + uint8_t status = BT_HCI_ERR_SUCCESS; - switch (rtxp->type) { - case 0x00: - rtxp_rsp.status = BT_HCI_ERR_SUCCESS; - rtxp_rsp.level = -1; /* non-zero */ - break; + cmd_complete(dev, BT_HCI_CMD_LE_SET_HOST_FEATURE, &status, + sizeof(status)); - case 0x01: - rtxp_rsp.status = BT_HCI_ERR_SUCCESS; - rtxp_rsp.level = 4; /* max for class 2 radio */ - break; + return 0; +} - default: - rtxp_rsp.level = 0; - rtxp_rsp.status = BT_HCI_ERR_INVALID_PARAMETERS; - break; - } +#define CMD_LE_52 \ + CMD(BT_HCI_CMD_LE_READ_BUFFER_SIZE_V2, cmd_read_size_v2, NULL), \ + CMD(BT_HCI_CMD_LE_READ_ISO_TX_SYNC, cmd_read_iso_tx_sync, NULL), \ + CMD(BT_HCI_CMD_LE_SET_EVENT_MASK, cmd_le_set_event_mask, NULL), \ + CMD(BT_HCI_CMD_LE_SET_CIG_PARAMS, cmd_set_cig_params, NULL), \ + CMD(BT_HCI_CMD_LE_SET_CIG_PARAMS_TEST, cmd_set_cig_params_test, NULL), \ + CMD(BT_HCI_CMD_LE_CREATE_CIS, cmd_create_cis, \ + cmd_create_cis_complete), \ + CMD(BT_HCI_CMD_LE_REMOVE_CIG, cmd_remove_cig, NULL), \ + CMD(BT_HCI_CMD_LE_ACCEPT_CIS, cmd_accept_cis, NULL), \ + CMD(BT_HCI_CMD_LE_REJECT_CIS, cmd_reject_cis, NULL), \ + CMD(BT_HCI_CMD_LE_CREATE_BIG, cmd_create_big, NULL), \ + CMD(BT_HCI_CMD_LE_CREATE_BIG_TEST, cmd_create_big_test, NULL), \ + CMD(BT_HCI_CMD_LE_TERM_BIG, cmd_term_big, NULL), \ + CMD(BT_HCI_CMD_LE_BIG_CREATE_SYNC, cmd_big_create_sync, NULL), \ + CMD(BT_HCI_CMD_LE_BIG_TERM_SYNC, cmd_big_term_sync, NULL), \ + CMD(BT_HCI_CMD_LE_REQ_PEER_SCA, cmd_req_peer_sca, NULL), \ + CMD(BT_HCI_CMD_LE_SETUP_ISO_PATH, cmd_setup_iso_path, NULL), \ + CMD(BT_HCI_CMD_LE_REMOVE_ISO_PATH, cmd_remove_iso_path, NULL), \ + CMD(BT_HCI_CMD_LE_ISO_TX_TEST, cmd_iso_tx_test, NULL), \ + CMD(BT_HCI_CMD_LE_ISO_RX_TEST, cmd_iso_rx_test, NULL), \ + CMD(BT_HCI_CMD_LE_ISO_READ_TEST_COUNTER, cmd_iso_read_test_counter, \ + NULL), \ + CMD(BT_HCI_CMD_LE_ISO_TEST_END, cmd_iso_test_end, NULL), \ + CMD(BT_HCI_CMD_LE_SET_HOST_FEATURE, cmd_set_host_feature, NULL) + +static const struct btdev_cmd cmd_le_5_2[] = { + CMD_COMMON_ALL, + CMD_COMMON_BREDR_LE, + CMD_LE, + CMD_LE_50, + CMD_LE_52, + {} +}; - rtxp_rsp.handle = rtxp->handle; - cmd_complete(btdev, opcode, &rtxp_rsp, sizeof(rtxp_rsp)); - break; +static void set_le_52_commands(struct btdev *btdev) +{ + btdev->commands[41] |= 0x20; /* LE Read Buffer Size v2 */ + btdev->commands[41] |= 0x40; /* LE Read ISO TX Sync */ + btdev->commands[41] |= 0x80; /* LE Set CIG Parameters */ + btdev->commands[42] |= 0x01; /* LE Set CIG Parameters Test */ + btdev->commands[42] |= 0x02; /* LE Create CIS */ + btdev->commands[42] |= 0x04; /* LE Remove CIG */ + btdev->commands[42] |= 0x08; /* LE Accept CIS */ + btdev->commands[42] |= 0x10; /* LE Reject CIS */ + btdev->commands[42] |= 0x20; /* LE Create BIG */ + btdev->commands[42] |= 0x40; /* LE Create BIG Test */ + btdev->commands[42] |= 0x80; /* LE Terminate BIG */ + btdev->commands[43] |= 0x01; /* LE BIG Create Sync */ + btdev->commands[43] |= 0x02; /* LE BIG Terminate Sync */ + btdev->commands[43] |= 0x04; /* LE Request Peer SCA */ + btdev->commands[43] |= 0x08; /* LE Setup ISO Path */ + btdev->commands[43] |= 0x10; /* LE Remove ISO Path */ + btdev->commands[43] |= 0x20; /* LE ISO TX Test */ + btdev->commands[43] |= 0x40; /* LE ISO RX Test */ + btdev->commands[43] |= 0x80; /* LE ISO Read Test Counter */ + btdev->commands[44] |= 0x01; /* LE ISO Test End */ + btdev->commands[44] |= 0x02; /* LE ISO Set Host Feature */ + btdev->cmds = cmd_le_5_2; +} - case BT_HCI_CMD_READ_ENCRYPT_KEY_SIZE: - if (btdev->type != BTDEV_TYPE_BREDRLE && - btdev->type != BTDEV_TYPE_BREDR && - btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - reks = data; - read_enc_key_size_complete(btdev, le16_to_cpu(reks->handle)); - break; +static const struct btdev_cmd cmd_le[] = { + CMD_COMMON_ALL, + CMD_COMMON_BREDR_LE, + CMD_LE, + {} +}; - case BT_HCI_CMD_READ_LOCAL_AMP_INFO: - if (btdev->type != BTDEV_TYPE_AMP) - goto unsupported; - rlai.status = BT_HCI_ERR_SUCCESS; - rlai.amp_status = 0x01; /* Used for Bluetooth only */ - rlai.total_bw = cpu_to_le32(0); - rlai.max_bw = cpu_to_le32(0); - rlai.min_latency = cpu_to_le32(0); - rlai.max_pdu = cpu_to_le32(672); - rlai.amp_type = 0x01; /* 802.11 AMP Controller */ - rlai.pal_cap = cpu_to_le16(0x0000); - rlai.max_assoc_len = cpu_to_le16(672); - rlai.max_flush_to = cpu_to_le32(0xffffffff); - rlai.be_flush_to = cpu_to_le32(0xffffffff); - cmd_complete(btdev, opcode, &rlai, sizeof(rlai)); - break; +static void set_le_commands(struct btdev *btdev) +{ + set_common_commands_all(btdev); + set_common_commands_bredrle(btdev); - case BT_HCI_CMD_READ_LOCAL_AMP_ASSOC: - if (btdev->type != BTDEV_TYPE_AMP) - goto unsupported; - rlaa_cmd = data; - rlaa_rsp.status = BT_HCI_ERR_SUCCESS; - rlaa_rsp.phy_handle = rlaa_cmd->phy_handle; - rlaa_rsp.remain_assoc_len = cpu_to_le16(1); - rlaa_rsp.assoc_fragment[0] = 0x42; - memset(rlaa_rsp.assoc_fragment + 1, 0, - sizeof(rlaa_rsp.assoc_fragment) - 1); - cmd_complete(btdev, opcode, &rlaa_rsp, sizeof(rlaa_rsp)); - break; + btdev->commands[24] |= 0x20; /* Read LE Host Supported */ + btdev->commands[24] |= 0x20; /* Write LE Host Supported */ + btdev->commands[25] |= 0x01; /* LE Set Event Mask */ + btdev->commands[25] |= 0x02; /* LE Read Buffer Size */ + btdev->commands[25] |= 0x04; /* LE Read Local Features */ + btdev->commands[25] |= 0x10; /* LE Set Random Address */ + btdev->commands[25] |= 0x20; /* LE Set Adv Parameters */ + btdev->commands[25] |= 0x40; /* LE Read Adv TX Power */ + btdev->commands[25] |= 0x80; /* LE Set Adv Data */ + btdev->commands[26] |= 0x01; /* LE Set Scan Response Data */ + btdev->commands[26] |= 0x02; /* LE Set Adv Enable */ + btdev->commands[26] |= 0x04; /* LE Set Scan Parameters */ + btdev->commands[26] |= 0x08; /* LE Set Scan Enable */ + btdev->commands[26] |= 0x10; /* LE Create Connection */ + btdev->commands[26] |= 0x40; /* LE Read White List Size */ + btdev->commands[26] |= 0x80; /* LE Clear White List */ + btdev->commands[27] |= 0x04; /* LE Connection Update */ + btdev->commands[27] |= 0x20; /* LE Read Remote Used Features */ + btdev->commands[27] |= 0x40; /* LE Encrypt */ + btdev->commands[27] |= 0x80; /* LE Rand */ + btdev->commands[28] |= 0x01; /* LE Start Encryption */ + btdev->commands[28] |= 0x02; /* LE Long Term Key Request Reply */ + btdev->commands[28] |= 0x04; /* LE Long Term Key Request Neg Reply */ + btdev->commands[28] |= 0x08; /* LE Read Supported States */ + btdev->commands[28] |= 0x10; /* LE Receiver Test */ + btdev->commands[28] |= 0x20; /* LE Transmitter Test */ + btdev->commands[28] |= 0x40; /* LE Test End */ - case BT_HCI_CMD_GET_MWS_TRANSPORT_CONFIG: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - gmtc = alloca(sizeof(*gmtc)); - gmtc->status = BT_HCI_ERR_SUCCESS; - gmtc->num_transports = 0x00; - cmd_complete(btdev, opcode, gmtc, sizeof(*gmtc)); - break; + /* Extra LE commands for >= 4.1 adapters */ + btdev->commands[33] |= 0x10; /* LE Remote Conn Param Req Reply */ + btdev->commands[33] |= 0x20; /* LE Remote Conn Param Req Neg Reply */ - case BT_HCI_CMD_SET_EVENT_MASK_PAGE2: - if (btdev->type == BTDEV_TYPE_BREDR20 || - btdev->type == BTDEV_TYPE_AMP) - goto unsupported; - semp2 = data; - memcpy(btdev->event_mask_page2, semp2->mask, 8); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + /* Extra LE commands for >= 4.2 adapters */ + btdev->commands[34] |= 0x02; /* LE Read Local P-256 Public Key */ + btdev->commands[34] |= 0x04; /* LE Generate DHKey */ - case BT_HCI_CMD_LE_SET_EVENT_MASK: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lsem = data; - memcpy(btdev->le_event_mask, lsem->mask, 8); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + btdev->cmds = cmd_le; - case BT_HCI_CMD_LE_READ_BUFFER_SIZE: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lrbs.status = BT_HCI_ERR_SUCCESS; - lrbs.le_mtu = cpu_to_le16(btdev->acl_mtu); - lrbs.le_max_pkt = btdev->acl_max_pkt; - cmd_complete(btdev, opcode, &lrbs, sizeof(lrbs)); - break; + /* Extra LE commands for >= 5.0 adapters */ + if (btdev->type >= BTDEV_TYPE_BREDRLE50) { + set_le_50_commands(btdev); + btdev->cmds = cmd_le_5_0; + } - case BT_HCI_CMD_LE_READ_LOCAL_FEATURES: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lrlf.status = BT_HCI_ERR_SUCCESS; - memcpy(lrlf.features, btdev->le_features, 8); - cmd_complete(btdev, opcode, &lrlf, sizeof(lrlf)); - break; + /* Extra LE commands for >= 5.2 adapters */ + if (btdev->type >= BTDEV_TYPE_BREDRLE52) { + set_le_52_commands(btdev); + btdev->cmds = cmd_le_5_2; + } +} - case BT_HCI_CMD_LE_SET_RANDOM_ADDRESS: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lsra = data; - memcpy(btdev->random_addr, lsra->addr, 6); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +static int cmd_set_event_mask_2(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_set_event_mask_page2 *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; - case BT_HCI_CMD_LE_SET_ADV_PARAMETERS: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; + memcpy(dev->event_mask_page2, cmd->mask, 8); + cmd_complete(dev, BT_HCI_CMD_SET_EVENT_MASK_PAGE2, &status, + sizeof(status)); - if (btdev->le_adv_enable) { - status = BT_HCI_ERR_COMMAND_DISALLOWED; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - } + return 0; +} - lsap = data; - btdev->le_adv_type = lsap->type; - /* Use Legacy PDU if the remote is using EXT Scan */ - btdev->le_ext_adv_type = ext_legacy_adv_type(lsap->type); - btdev->le_adv_own_addr = lsap->own_addr_type; - btdev->le_adv_direct_addr_type = lsap->direct_addr_type; - memcpy(btdev->le_adv_direct_addr, lsap->direct_addr, 6); +static int cmd_read_sync_train_params(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_sync_train_params rsp; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + memset(&rsp, 0, sizeof(rsp)); - case BT_HCI_CMD_LE_READ_ADV_TX_POWER: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lratp.status = BT_HCI_ERR_SUCCESS; - lratp.level = 0; - cmd_complete(btdev, opcode, &lratp, sizeof(lratp)); - break; + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.interval = cpu_to_le16(dev->sync_train_interval); + rsp.timeout = cpu_to_le32(dev->sync_train_timeout); + rsp.service_data = dev->sync_train_service_data; + cmd_complete(dev, BT_HCI_CMD_READ_SYNC_TRAIN_PARAMS, &rsp, sizeof(rsp)); - case BT_HCI_CMD_LE_SET_ADV_ENABLE: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lsae = data; - if (btdev->le_adv_enable == lsae->enable) - status = BT_HCI_ERR_COMMAND_DISALLOWED; - else { - btdev->le_adv_enable = lsae->enable; - status = BT_HCI_ERR_SUCCESS; - } - cmd_complete(btdev, opcode, &status, sizeof(status)); - if (status == BT_HCI_ERR_SUCCESS && btdev->le_adv_enable) - le_set_adv_enable_complete(btdev); - break; + return 0; +} - case BT_HCI_CMD_LE_SET_SCAN_PARAMETERS: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; +static int cmd_read_sc_support(struct btdev *dev, const void *data, uint8_t len) +{ + struct bt_hci_rsp_read_secure_conn_support rsp; - lssp = data; + memset(&rsp, 0, sizeof(rsp)); - if (btdev->le_scan_enable) - status = BT_HCI_ERR_COMMAND_DISALLOWED; - else { - status = BT_HCI_ERR_SUCCESS; - btdev->le_scan_type = lssp->type; - btdev->le_scan_own_addr_type = lssp->own_addr_type; - } + rsp.status = BT_HCI_ERR_SUCCESS; + rsp.support = dev->secure_conn_support; + cmd_complete(dev, BT_HCI_CMD_READ_SECURE_CONN_SUPPORT, &rsp, + sizeof(rsp)); - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + return 0; +} - case BT_HCI_CMD_LE_SET_SCAN_ENABLE: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lsse = data; - if (btdev->le_scan_enable == lsse->enable) - status = BT_HCI_ERR_COMMAND_DISALLOWED; - else { - btdev->le_scan_enable = lsse->enable; - btdev->le_filter_dup = lsse->filter_dup; - status = BT_HCI_ERR_SUCCESS; - } - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +static int cmd_write_sc_support(struct btdev *dev, const void *data, + uint8_t len) +{ + const struct bt_hci_cmd_write_secure_conn_support *cmd = data; + uint8_t status = BT_HCI_ERR_SUCCESS; - case BT_HCI_CMD_LE_CREATE_CONN: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; + dev->secure_conn_support = cmd->support; + cmd_complete(dev, BT_HCI_CMD_WRITE_SECURE_CONN_SUPPORT, &status, + sizeof(status)); - case BT_HCI_CMD_LE_READ_WHITE_LIST_SIZE: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lrwls.status = BT_HCI_ERR_SUCCESS; - lrwls.size = 0; - cmd_complete(btdev, opcode, &lrwls, sizeof(lrwls)); - break; + return 0; +} - case BT_HCI_CMD_LE_CONN_UPDATE: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; +static int cmd_read_auth_payload_timeout(struct btdev *dev, const void *data, + uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_LE_CLEAR_WHITE_LIST: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +static int cmd_write_auth_payload_timeout(struct btdev *dev, const void *data, + uint8_t len) +{ + /* TODO */ + return -ENOTSUP; +} - case BT_HCI_CMD_LE_ENCRYPT: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lenc_cmd = data; - if (!bt_crypto_e(btdev->crypto, lenc_cmd->key, - lenc_cmd->plaintext, lenc.data)) { - cmd_status(btdev, BT_HCI_ERR_COMMAND_DISALLOWED, - opcode); - break; - } - lenc.status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &lenc, sizeof(lenc)); - break; +static int cmd_read_local_oob_ext_data(struct btdev *dev, const void *data, + uint8_t len) +{ + struct bt_hci_rsp_read_local_oob_ext_data rsp; - case BT_HCI_CMD_LE_RAND: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - if (!bt_crypto_random_bytes(btdev->crypto, - (uint8_t *)&lr.number, 8)) { - cmd_status(btdev, BT_HCI_ERR_COMMAND_DISALLOWED, - opcode); - break; - } - lr.status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &lr, sizeof(lr)); - break; + memset(&rsp, 0, sizeof(rsp)); - case BT_HCI_CMD_LE_READ_LOCAL_PK256: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - if (!ecc_make_key(pk_evt.local_pk256, btdev->le_local_sk256)) { - cmd_status(btdev, BT_HCI_ERR_COMMAND_DISALLOWED, - opcode); - break; - } - cmd_status(btdev, BT_HCI_ERR_SUCCESS, - BT_HCI_CMD_LE_READ_LOCAL_PK256); - pk_evt.status = BT_HCI_ERR_SUCCESS; - le_meta_event(btdev, BT_HCI_EVT_LE_READ_LOCAL_PK256_COMPLETE, - &pk_evt, sizeof(pk_evt)); - break; + rsp.status = BT_HCI_ERR_SUCCESS; + cmd_complete(dev, BT_HCI_CMD_READ_LOCAL_OOB_EXT_DATA, &rsp, + sizeof(rsp)); - case BT_HCI_CMD_LE_GENERATE_DHKEY: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - dh = data; - if (!ecdh_shared_secret(dh->remote_pk256, btdev->le_local_sk256, - dh_evt.dhkey)) { - cmd_status(btdev, BT_HCI_ERR_COMMAND_DISALLOWED, - opcode); - break; - } - cmd_status(btdev, BT_HCI_ERR_SUCCESS, - BT_HCI_CMD_LE_GENERATE_DHKEY); - dh_evt.status = BT_HCI_ERR_SUCCESS; - le_meta_event(btdev, BT_HCI_EVT_LE_GENERATE_DHKEY_COMPLETE, - &dh_evt, sizeof(dh_evt)); - break; + return 0; +} - case BT_HCI_CMD_LE_READ_SUPPORTED_STATES: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lrss.status = BT_HCI_ERR_SUCCESS; - memcpy(lrss.states, btdev->le_states, 8); - cmd_complete(btdev, opcode, &lrss, sizeof(lrss)); - break; +#define BT_BREDR_LE \ + CMD(BT_HCI_CMD_SET_EVENT_MASK_PAGE2, cmd_set_event_mask_2, NULL), \ + CMD(BT_HCI_CMD_READ_SYNC_TRAIN_PARAMS, cmd_read_sync_train_params, \ + NULL), \ + CMD(BT_HCI_CMD_READ_SECURE_CONN_SUPPORT, cmd_read_sc_support, NULL), \ + CMD(BT_HCI_CMD_WRITE_SECURE_CONN_SUPPORT, cmd_write_sc_support, NULL), \ + CMD(BT_HCI_CMD_READ_AUTH_PAYLOAD_TIMEOUT, \ + cmd_read_auth_payload_timeout, NULL), \ + CMD(BT_HCI_CMD_WRITE_AUTH_PAYLOAD_TIMEOUT, \ + cmd_write_auth_payload_timeout, NULL), \ + CMD(BT_HCI_CMD_READ_LOCAL_OOB_EXT_DATA, \ + cmd_read_local_oob_ext_data, NULL) + +static const struct btdev_cmd cmd_bredr_le[] = { + CMD_COMMON_ALL, + CMD_COMMON_BREDR_LE, + CMD_COMMON_BREDR_20, + CMD_BREDR, + CMD_LE, + CMD_LE_50, + CMD_LE_52, + BT_BREDR_LE, + {} +}; - case BT_HCI_CMD_LE_SET_ADV_DATA: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lsad = data; - btdev->le_adv_data_len = lsad->len; - memcpy(btdev->le_adv_data, lsad->data, 31); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +static void set_bredrle_commands(struct btdev *btdev) +{ + set_bredr_commands(btdev); + set_le_commands(btdev); - case BT_HCI_CMD_LE_SET_SCAN_RSP_DATA: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lssrd = data; - btdev->le_scan_data_len = lssrd->len; - memcpy(btdev->le_scan_data, lssrd->data, 31); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + /* Extra BR/EDR commands we want to only support for >= 4.0 + * adapters. + */ + btdev->commands[22] |= 0x04; /* Set Event Mask Page 2 */ + btdev->commands[31] |= 0x80; /* Read Sync Train Parameters */ + btdev->commands[32] |= 0x04; /* Read Secure Connections Support */ + btdev->commands[32] |= 0x08; /* Write Secure Connections Support */ + btdev->commands[32] |= 0x10; /* Read Auth Payload Timeout */ + btdev->commands[32] |= 0x20; /* Write Auth Payload Timeout */ + btdev->commands[32] |= 0x40; /* Read Local OOB Extended Data */ + btdev->cmds = cmd_bredr_le; +} - case BT_HCI_CMD_LE_READ_REMOTE_FEATURES: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - le_read_remote_features_complete(btdev); - break; +static void set_amp_commands(struct btdev *btdev) +{ + set_common_commands_all(btdev); - case BT_HCI_CMD_LE_START_ENCRYPT: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lse = data; - memcpy(btdev->le_ltk, lse->ltk, 16); - le_start_encrypt_complete(btdev, lse->ediv, lse->rand); - break; + btdev->commands[22] |= 0x20; /* Read Local AMP Info */ +} - case BT_HCI_CMD_LE_LTK_REQ_REPLY: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - llrr = data; - memcpy(btdev->le_ltk, llrr->ltk, 16); - le_encrypt_complete(btdev); - break; +static void set_bredrle_features(struct btdev *btdev) +{ + btdev->features[0] |= 0x04; /* Encryption */ + btdev->features[0] |= 0x20; /* Role switch */ + btdev->features[0] |= 0x80; /* Sniff mode */ + btdev->features[1] |= 0x08; /* SCO link */ + btdev->features[2] |= 0x08; /* Transparent SCO */ + btdev->features[3] |= 0x40; /* RSSI with inquiry results */ + btdev->features[3] |= 0x80; /* Extended SCO link */ + btdev->features[4] |= 0x08; /* AFH capable slave */ + btdev->features[4] |= 0x10; /* AFH classification slave */ + btdev->features[4] |= 0x40; /* LE Supported */ + btdev->features[5] |= 0x02; /* Sniff subrating */ + btdev->features[5] |= 0x04; /* Pause encryption */ + btdev->features[5] |= 0x08; /* AFH capable master */ + btdev->features[5] |= 0x10; /* AFH classification master */ + btdev->features[6] |= 0x01; /* Extended Inquiry Response */ + btdev->features[6] |= 0x02; /* Simultaneous LE and BR/EDR */ + btdev->features[6] |= 0x08; /* Secure Simple Pairing */ + btdev->features[6] |= 0x10; /* Encapsulated PDU */ + btdev->features[6] |= 0x20; /* Erroneous Data Reporting */ + btdev->features[6] |= 0x40; /* Non-flushable Packet Boundary Flag */ + btdev->features[7] |= 0x01; /* Link Supervision Timeout Event */ + btdev->features[7] |= 0x02; /* Inquiry TX Power Level */ + btdev->features[7] |= 0x80; /* Extended features */ - case BT_HCI_CMD_LE_LTK_REQ_NEG_REPLY: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - ltk_neg_reply_complete(btdev); - break; + if (btdev->type >= BTDEV_TYPE_BREDRLE50) { + /* These BREDR features are added to test new configuration + * command. If this is added above it will break existing tests + */ + btdev->features[0] |= 0x01; /* 3 slot Packets */ + btdev->features[0] |= 0x02; /* 5 slot Packets */ + btdev->features[3] |= 0x02; /* EDR ACL 2M mode */ + btdev->features[3] |= 0x04; /* EDR ACL 3M mode */ + btdev->features[4] |= 0x80; /* 3 slot EDR ACL packets */ + btdev->features[5] |= 0x01; /* 5 slot EDR ACL packets */ - case BT_HCI_CMD_SETUP_SYNC_CONN: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - ssc = data; - status = BT_HCI_ERR_SUCCESS; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - sync_conn_complete(btdev, ssc->voice_setting, - BT_HCI_ERR_SUCCESS); - break; + btdev->le_features[1] |= 0x01; /* LE 2M PHY */ + btdev->le_features[1] |= 0x08; /* LE Coded PHY */ + btdev->le_features[1] |= 0x10; /* LE EXT ADV */ + } - case BT_HCI_CMD_ADD_SCO_CONN: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - sco_conn_complete(btdev, BT_HCI_ERR_SUCCESS); - break; + if (btdev->type >= BTDEV_TYPE_BREDRLE52) { + btdev->le_features[3] |= 0x10; /* LE CIS Master */ + btdev->le_features[3] |= 0x20; /* LE CIS Slave */ + btdev->le_features[3] |= 0x40; /* LE ISO Broadcaster */ + btdev->le_features[3] |= 0x80; /* LE Synchronized Receiver */ + btdev->le_features[4] |= 0x01; /* LE ISO channels */ + } - case BT_HCI_CMD_ENABLE_DUT_MODE: - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + btdev->feat_page_2[0] |= 0x01; /* CSB - Master Operation */ + btdev->feat_page_2[0] |= 0x02; /* CSB - Slave Operation */ + btdev->feat_page_2[0] |= 0x04; /* Synchronization Train */ + btdev->feat_page_2[0] |= 0x08; /* Synchronization Scan */ + btdev->feat_page_2[0] |= 0x10; /* Inquiry Response Notification */ + btdev->feat_page_2[1] |= 0x01; /* Secure Connections */ + btdev->feat_page_2[1] |= 0x02; /* Ping */ - case BT_HCI_CMD_WRITE_SSP_DEBUG_MODE: - if (btdev->type == BTDEV_TYPE_LE) - goto unsupported; - wsdm = data; - btdev->ssp_debug_mode = wsdm->mode; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + btdev->max_page = 2; +} - case BT_HCI_CMD_LE_RECEIVER_TEST: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +static void set_bredr_features(struct btdev *btdev) +{ + btdev->features[0] |= 0x04; /* Encryption */ + btdev->features[0] |= 0x20; /* Role switch */ + btdev->features[0] |= 0x80; /* Sniff mode */ + btdev->features[1] |= 0x08; /* SCO link */ + btdev->features[3] |= 0x40; /* RSSI with inquiry results */ + btdev->features[3] |= 0x80; /* Extended SCO link */ + btdev->features[4] |= 0x08; /* AFH capable slave */ + btdev->features[4] |= 0x10; /* AFH classification slave */ + btdev->features[5] |= 0x02; /* Sniff subrating */ + btdev->features[5] |= 0x04; /* Pause encryption */ + btdev->features[5] |= 0x08; /* AFH capable master */ + btdev->features[5] |= 0x10; /* AFH classification master */ + btdev->features[6] |= 0x01; /* Extended Inquiry Response */ + btdev->features[6] |= 0x08; /* Secure Simple Pairing */ + btdev->features[6] |= 0x10; /* Encapsulated PDU */ + btdev->features[6] |= 0x20; /* Erroneous Data Reporting */ + btdev->features[6] |= 0x40; /* Non-flushable Packet Boundary Flag */ + btdev->features[7] |= 0x01; /* Link Supervision Timeout Event */ + btdev->features[7] |= 0x02; /* Inquiry TX Power Level */ + btdev->features[7] |= 0x80; /* Extended features */ - case BT_HCI_CMD_LE_TRANSMITTER_TEST: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; + btdev->max_page = 1; +} - case BT_HCI_CMD_LE_TEST_END: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lte.status = BT_HCI_ERR_SUCCESS; - lte.num_packets = 0; - cmd_complete(btdev, opcode, <e, sizeof(lte)); - break; +static void set_bredr20_features(struct btdev *btdev) +{ + btdev->features[0] |= 0x04; /* Encryption */ + btdev->features[0] |= 0x20; /* Role switch */ + btdev->features[0] |= 0x80; /* Sniff mode */ + btdev->features[1] |= 0x08; /* SCO link */ + btdev->features[3] |= 0x40; /* RSSI with inquiry results */ + btdev->features[3] |= 0x80; /* Extended SCO link */ + btdev->features[4] |= 0x08; /* AFH capable slave */ + btdev->features[4] |= 0x10; /* AFH classification slave */ + btdev->features[5] |= 0x02; /* Sniff subrating */ + btdev->features[5] |= 0x04; /* Pause encryption */ + btdev->features[5] |= 0x08; /* AFH capable master */ + btdev->features[5] |= 0x10; /* AFH classification master */ + btdev->features[7] |= 0x80; /* Extended features */ - case BT_HCI_CMD_LE_CONN_PARAM_REQ_REPLY: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lcprr_cmd = data; - lcprr_rsp.handle = lcprr_cmd->handle; - lcprr_rsp.status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &lcprr_rsp, sizeof(lcprr_rsp)); - break; - case BT_HCI_CMD_LE_CONN_PARAM_REQ_NEG_REPLY: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - lcprnr_cmd = data; - lcprnr_rsp.handle = lcprnr_cmd->handle; - lcprnr_rsp.status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &lcprnr_rsp, sizeof(lcprnr_rsp)); - break; - case BT_HCI_CMD_LE_READ_NUM_SUPPORTED_ADV_SETS: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - - rlrnsas.status = BT_HCI_ERR_SUCCESS; - /* Support one set as of now */ - rlrnsas.num_of_sets = 1; - cmd_complete(btdev, opcode, &rlrnsas, sizeof(rlrnsas)); - break; - case BT_HCI_CMD_LE_SET_ADV_SET_RAND_ADDR: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; + btdev->max_page = 1; +} - lsasra = data; - memcpy(btdev->random_addr, lsasra->bdaddr, 6); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - case BT_HCI_CMD_LE_SET_EXT_ADV_PARAMS: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - - if (btdev->le_adv_enable) { - status = BT_HCI_ERR_COMMAND_DISALLOWED; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - } +static void set_le_features(struct btdev *btdev) +{ + btdev->features[4] |= 0x20; /* BR/EDR Not Supported */ + btdev->features[4] |= 0x40; /* LE Supported */ - lseap = data; - btdev->le_ext_adv_type = le16_to_cpu(lseap->evt_properties); - btdev->le_adv_own_addr = lseap->own_addr_type; - btdev->le_adv_direct_addr_type = lseap->peer_addr_type; - memcpy(btdev->le_adv_direct_addr, lseap->peer_addr, 6); + btdev->max_page = 1; - rlseap.status = BT_HCI_ERR_SUCCESS; - rlseap.tx_power = 0; - cmd_complete(btdev, opcode, &rlseap, sizeof(rlseap)); - break; - case BT_HCI_CMD_LE_SET_EXT_ADV_ENABLE: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - - lseae = data; - if (btdev->le_adv_enable == lseae->enable) - status = BT_HCI_ERR_COMMAND_DISALLOWED; - else { - const struct bt_hci_cmd_ext_adv_set *eas; - - if (lseae->num_of_sets) { - eas = data + sizeof(*lseae); - if (eas->duration || lseae->num_of_sets > 1) - status = BT_HCI_ERR_INVALID_PARAMETERS; - else - status = BT_HCI_ERR_SUCCESS; - } else - status = BT_HCI_ERR_SUCCESS; + btdev->le_features[0] |= 0x01; /* LE Encryption */ + btdev->le_features[0] |= 0x02; /* Connection Parameters Request */ + btdev->le_features[0] |= 0x08; /* Slave-initiated Features Exchange */ +} - if (status == BT_HCI_ERR_SUCCESS) - btdev->le_adv_enable = lseae->enable; - } - cmd_complete(btdev, opcode, &status, sizeof(status)); - if (status == BT_HCI_ERR_SUCCESS && btdev->le_adv_enable) - le_set_ext_adv_enable_complete(btdev); - break; - case BT_HCI_CMD_LE_SET_EXT_ADV_DATA: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - - lsead = data; - btdev->le_adv_data_len = lsead->data_len; - memcpy(btdev->le_adv_data, lsead->data, 31); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - case BT_HCI_CMD_LE_SET_EXT_SCAN_RSP_DATA: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - - lsesrd = data; - btdev->le_scan_data_len = lsesrd->data_len; - memcpy(btdev->le_scan_data, lsesrd->data, 31); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - case BT_HCI_CMD_LE_REMOVE_ADV_SET: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; +static void set_le_states(struct btdev *btdev) +{ + /* Set all 41 bits as per Bluetooth 5.0 specification */ + btdev->le_states[0] = 0xff; + btdev->le_states[1] = 0xff; + btdev->le_states[2] = 0xff; + btdev->le_states[3] = 0xff; + btdev->le_states[4] = 0xff; + btdev->le_states[5] = 0x03; +} - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - case BT_HCI_CMD_LE_CLEAR_ADV_SETS: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; +static void set_amp_features(struct btdev *btdev) +{ +} - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - case BT_HCI_CMD_LE_SET_DEFAULT_PHY: - if (btdev->type == BTDEV_TYPE_BREDR) - goto unsupported; - phys = data; - if (phys->all_phys > 0x03 || - (!(phys->all_phys & 0x01) && - (!phys->tx_phys || phys->tx_phys > 0x07)) || - (!(phys->all_phys & 0x02) && - (!phys->rx_phys || phys->rx_phys > 0x07))) - status = BT_HCI_ERR_INVALID_PARAMETERS; - else - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - case BT_HCI_CMD_LE_SET_EXT_SCAN_PARAMS: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; +struct btdev *btdev_create(enum btdev_type type, uint16_t id) +{ + struct btdev *btdev; + int index; - lsesp = data; - lsp = (void *)lsesp->data; + btdev = malloc(sizeof(*btdev)); + if (!btdev) + return NULL; - if (btdev->le_scan_enable) - status = BT_HCI_ERR_COMMAND_DISALLOWED; - else if (lsesp->num_phys == 0) - status = BT_HCI_ERR_INVALID_PARAMETERS; - else { - status = BT_HCI_ERR_SUCCESS; - /* Currently we dont support multiple types in single - * command So just take the first one will do. - */ - btdev->le_scan_type = lsp->type; - btdev->le_scan_own_addr_type = lsesp->own_addr_type; - } + memset(btdev, 0, sizeof(*btdev)); - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - case BT_HCI_CMD_LE_SET_EXT_SCAN_ENABLE: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - - lsese = data; - if (btdev->le_scan_enable == lsese->enable) - status = BT_HCI_ERR_COMMAND_DISALLOWED; - else { - btdev->le_scan_enable = lsese->enable; - btdev->le_filter_dup = lsese->filter_dup; - status = BT_HCI_ERR_SUCCESS; + if (type == BTDEV_TYPE_BREDRLE || type == BTDEV_TYPE_LE || + type == BTDEV_TYPE_BREDRLE50 || + type == BTDEV_TYPE_BREDRLE52) { + btdev->crypto = bt_crypto_new(); + if (!btdev->crypto) { + free(btdev); + return NULL; } - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; - case BT_HCI_CMD_LE_EXT_CREATE_CONN: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; + } - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - break; + btdev->type = type; - case BT_HCI_CMD_LE_READ_BUFFER_SIZE_V2: - if (btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - lrbsv2.status = BT_HCI_ERR_SUCCESS; - lrbsv2.acl_mtu = cpu_to_le16(btdev->acl_mtu); - lrbsv2.acl_max_pkt = btdev->acl_max_pkt; - lrbsv2.iso_mtu = cpu_to_le16(btdev->iso_mtu); - lrbsv2.iso_max_pkt = btdev->iso_max_pkt; - cmd_complete(btdev, opcode, &lrbsv2, sizeof(lrbsv2)); - break; + btdev->manufacturer = 63; + btdev->revision = 0x0000; - case BT_HCI_CMD_LE_SET_CIG_PARAMS: - if (btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - memcpy(&btdev->le_cig, data, len); - lscp.params.status = BT_HCI_ERR_SUCCESS; - lscp.params.cig_id = 0x00; - lscp.params.num_handles = 1; - lscp.handle = cpu_to_le16(ISO_HANDLE); - cmd_complete(btdev, opcode, &lscp, sizeof(lscp)); + switch (btdev->type) { + case BTDEV_TYPE_BREDRLE: + case BTDEV_TYPE_BREDRLE50: + case BTDEV_TYPE_BREDRLE52: + btdev->version = 0x09; + set_bredrle_features(btdev); + set_bredrle_commands(btdev); + set_le_states(btdev); break; - - case BT_HCI_CMD_LE_CREATE_CIS: - if (btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - + case BTDEV_TYPE_BREDR: + btdev->version = 0x05; + set_bredr_features(btdev); + set_bredr_commands(btdev); break; - - case BT_HCI_CMD_LE_REMOVE_CIG: - if (btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - memset(&btdev->le_cig, 0, sizeof(btdev->le_cig)); - lrc.status = BT_HCI_ERR_SUCCESS; - lrc.cig_id = 0x00; - cmd_complete(btdev, opcode, &lrc, sizeof(lrc)); + case BTDEV_TYPE_LE: + btdev->version = 0x09; + set_le_features(btdev); + set_le_commands(btdev); + set_le_states(btdev); break; - - case BT_HCI_CMD_LE_ACCEPT_CIS: - if (btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; - - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); - le_cis_estabilished(btdev, BT_HCI_ERR_SUCCESS); - + case BTDEV_TYPE_AMP: + btdev->version = 0x01; + set_amp_features(btdev); + set_amp_commands(btdev); + break; + case BTDEV_TYPE_BREDR20: + btdev->version = 0x03; + set_bredr20_features(btdev); + set_bredr20_commands(btdev); break; + } - case BT_HCI_CMD_LE_REJECT_CIS: - if (btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; + btdev->page_scan_interval = 0x0800; + btdev->page_scan_window = 0x0012; + btdev->page_scan_type = 0x00; - cmd_status(btdev, BT_HCI_ERR_SUCCESS, opcode); + btdev->sync_train_interval = 0x0080; + btdev->sync_train_timeout = 0x0002ee00; + btdev->sync_train_service_data = 0x00; - lrcis = data; - le_cis_estabilished(btdev, lrcis->reason); + btdev->acl_mtu = 192; + btdev->acl_max_pkt = 1; - break; + btdev->iso_mtu = 251; + btdev->iso_max_pkt = 1; - case BT_HCI_CMD_LE_SETUP_ISO_PATH: - if (btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; + btdev->country_code = 0x00; - lesip = (void *)data; + index = add_btdev(btdev); + if (index < 0) { + bt_crypto_unref(btdev->crypto); + free(btdev); + return NULL; + } - le_setup_iso_path(btdev, le16_to_cpu(lesip->handle), - lesip->direction, lesip->path); + get_bdaddr(id, index, btdev->bdaddr); - break; + return btdev; +} - case BT_HCI_CMD_LE_REMOVE_ISO_PATH: - if (btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; +void btdev_destroy(struct btdev *btdev) +{ + if (!btdev) + return; - lerip = data; - status = BT_HCI_ERR_SUCCESS; + if (btdev->inquiry_id > 0) + timeout_remove(btdev->inquiry_id); - if (!btdev->conn || le16_to_cpu(lerip->handle) != ISO_HANDLE) - status = BT_HCI_ERR_UNKNOWN_CONN_ID; + bt_crypto_unref(btdev->crypto); + del_btdev(btdev); - switch (lerip->direction) { - case 0x00: - btdev->le_iso_path[0] = 0x00; - break; - case 0x01: - btdev->le_iso_path[1] = 0x00; - break; - default: - status = BT_HCI_ERR_INVALID_PARAMETERS; - } + free(btdev); +} - cmd_complete(btdev, opcode, &status, sizeof(status)); - break; +bool btdev_set_debug(struct btdev *btdev, btdev_debug_func_t callback, + void *user_data, btdev_destroy_func_t destroy) +{ + if (!btdev) + return false; - case BT_HCI_CMD_LE_SET_HOST_FEATURE: - if (btdev->type != BTDEV_TYPE_BREDRLE52) - goto unsupported; + if (btdev->debug_destroy) + btdev->debug_destroy(btdev->debug_data); - status = BT_HCI_ERR_SUCCESS; - cmd_complete(btdev, opcode, &status, sizeof(status)); + btdev->debug_callback = callback; + btdev->debug_destroy = destroy; + btdev->debug_data = user_data; - break; + return true; +} - default: - goto unsupported; - } +const uint8_t *btdev_get_bdaddr(struct btdev *btdev) +{ + return btdev->bdaddr; +} - return; +uint8_t *btdev_get_features(struct btdev *btdev) +{ + return btdev->features; +} -unsupported: - util_debug(btdev->debug_callback, btdev->debug_data, - "Unsupported command 0x%4.4x\n", opcode); - cmd_status(btdev, BT_HCI_ERR_UNKNOWN_COMMAND, opcode); +uint8_t btdev_get_scan_enable(struct btdev *btdev) +{ + return btdev->scan_enable; } -static void default_cmd_completion(struct btdev *btdev, uint16_t opcode, - const void *data, uint8_t len) +uint8_t btdev_get_le_scan_enable(struct btdev *btdev) { - const struct bt_hci_cmd_create_conn *cc; - const struct bt_hci_cmd_disconnect *dc; - const struct bt_hci_cmd_create_conn_cancel *ccc; - const struct bt_hci_cmd_accept_conn_request *acr; - const struct bt_hci_cmd_reject_conn_request *rcr; - const struct bt_hci_cmd_auth_requested *ar; - const struct bt_hci_cmd_set_conn_encrypt *sce; - const struct bt_hci_cmd_link_key_request_reply *lkrr; - const struct bt_hci_cmd_link_key_request_neg_reply *lkrnr; - const struct bt_hci_cmd_pin_code_request_neg_reply *pcrnr; - const struct bt_hci_cmd_pin_code_request_reply *pcrr; - const struct bt_hci_cmd_remote_name_request *rnr; - const struct bt_hci_cmd_remote_name_request_cancel *rnrc; - const struct bt_hci_cmd_read_remote_features *rrf; - const struct bt_hci_cmd_read_remote_ext_features *rref; - const struct bt_hci_cmd_read_remote_version *rrv; - const struct bt_hci_cmd_read_clock_offset *rco; - const struct bt_hci_cmd_le_create_conn *lecc; - const struct bt_hci_cmd_le_conn_update *lecu; - const struct bt_hci_cmd_le_conn_param_req_reply *lcprr; - const struct bt_hci_cmd_le_conn_param_req_neg_reply *lcprnr; - const struct bt_hci_cmd_le_set_scan_enable *lsse; - const struct bt_hci_cmd_le_set_ext_scan_enable *lsese; - const struct bt_hci_cmd_le_ext_create_conn *leecc; - const struct bt_hci_cmd_le_create_cis *leccis; - - switch (opcode) { - case BT_HCI_CMD_INQUIRY: - if (btdev->type == BTDEV_TYPE_LE) - return; - inquiry_cmd(btdev, data); - break; + return btdev->le_scan_enable; +} - case BT_HCI_CMD_CREATE_CONN: - if (btdev->type == BTDEV_TYPE_LE) - return; - cc = data; - conn_request(btdev, cc->bdaddr); - break; +void btdev_set_le_states(struct btdev *btdev, const uint8_t *le_states) +{ + memcpy(btdev->le_states, le_states, sizeof(btdev->le_states)); +} - case BT_HCI_CMD_DISCONNECT: - dc = data; - disconnect_complete(btdev, le16_to_cpu(dc->handle), dc->reason); - break; - case BT_HCI_CMD_CREATE_CONN_CANCEL: - if (btdev->type == BTDEV_TYPE_LE) - return; - ccc = data; - conn_complete(btdev, ccc->bdaddr, BT_HCI_ERR_UNKNOWN_CONN_ID); - break; +void btdev_set_command_handler(struct btdev *btdev, btdev_command_func handler, + void *user_data) +{ + if (!btdev) + return; - case BT_HCI_CMD_ACCEPT_CONN_REQUEST: - if (btdev->type == BTDEV_TYPE_LE) - return; - acr = data; - accept_conn_request_complete(btdev, acr->bdaddr); - break; + btdev->command_handler = handler; + btdev->command_data = user_data; +} - case BT_HCI_CMD_REJECT_CONN_REQUEST: - if (btdev->type == BTDEV_TYPE_LE) - return; - rcr = data; - conn_complete(btdev, rcr->bdaddr, BT_HCI_ERR_UNKNOWN_CONN_ID); - break; +void btdev_set_send_handler(struct btdev *btdev, btdev_send_func handler, + void *user_data) +{ + if (!btdev) + return; - case BT_HCI_CMD_LINK_KEY_REQUEST_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - return; - lkrr = data; - link_key_req_reply_complete(btdev, lkrr->bdaddr, lkrr->link_key); - break; + btdev->send_handler = handler; + btdev->send_data = user_data; +} - case BT_HCI_CMD_LINK_KEY_REQUEST_NEG_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - return; - lkrnr = data; - link_key_req_neg_reply_complete(btdev, lkrnr->bdaddr); - break; +static void num_completed_packets(struct btdev *btdev, uint16_t handle) +{ + if (btdev->conn) { + struct bt_hci_evt_num_completed_packets ncp; - case BT_HCI_CMD_PIN_CODE_REQUEST_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - return; - pcrr = data; - pin_code_req_reply_complete(btdev, pcrr->bdaddr, pcrr->pin_len, - pcrr->pin_code); - break; + ncp.num_handles = 1; + ncp.handle = cpu_to_le16(handle); + ncp.count = cpu_to_le16(1); - case BT_HCI_CMD_PIN_CODE_REQUEST_NEG_REPLY: - if (btdev->type == BTDEV_TYPE_LE) - return; - pcrnr = data; - pin_code_req_neg_reply_complete(btdev, pcrnr->bdaddr); - break; + send_event(btdev, BT_HCI_EVT_NUM_COMPLETED_PACKETS, + &ncp, sizeof(ncp)); + } +} - case BT_HCI_CMD_AUTH_REQUESTED: - if (btdev->type == BTDEV_TYPE_LE) - return; - ar = data; - auth_request_complete(btdev, le16_to_cpu(ar->handle)); - break; +static const struct btdev_cmd *default_cmd(struct btdev *btdev, uint16_t opcode, + const void *data, uint8_t len) +{ + const struct btdev_cmd *cmd; + uint8_t status = BT_HCI_ERR_UNKNOWN_COMMAND; + int err; - case BT_HCI_CMD_SET_CONN_ENCRYPT: - if (btdev->type == BTDEV_TYPE_LE) - return; - sce = data; - if (btdev->conn) { - uint8_t mode; - - if (!sce->encr_mode) - mode = 0x00; - else if (btdev->secure_conn_support && - btdev->conn->secure_conn_support) - mode = 0x02; - else - mode = 0x01; + for (cmd = btdev->cmds; cmd->func; cmd++) { + if (cmd->opcode != opcode) + continue; - encrypt_change(btdev, mode, BT_HCI_ERR_SUCCESS); - encrypt_change(btdev->conn, mode, BT_HCI_ERR_SUCCESS); + err = cmd->func(btdev, data, len); + switch (err) { + case 0: + return cmd; + case -ENOTSUP: + status = BT_HCI_ERR_UNKNOWN_COMMAND; + goto failed; + case -EINVAL: + status = BT_HCI_ERR_INVALID_PARAMETERS; + goto failed; + default: + status = BT_HCI_ERR_UNSPECIFIED_ERROR; + goto failed; } - break; - - case BT_HCI_CMD_REMOTE_NAME_REQUEST: - if (btdev->type == BTDEV_TYPE_LE) - return; - rnr = data; - name_request_complete(btdev, rnr->bdaddr, BT_HCI_ERR_SUCCESS); - break; - - case BT_HCI_CMD_REMOTE_NAME_REQUEST_CANCEL: - if (btdev->type == BTDEV_TYPE_LE) - return; - rnrc = data; - name_request_complete(btdev, rnrc->bdaddr, - BT_HCI_ERR_UNKNOWN_CONN_ID); - break; - - case BT_HCI_CMD_READ_REMOTE_FEATURES: - if (btdev->type == BTDEV_TYPE_LE) - return; - rrf = data; - remote_features_complete(btdev, le16_to_cpu(rrf->handle)); - break; - - case BT_HCI_CMD_READ_REMOTE_EXT_FEATURES: - if (btdev->type == BTDEV_TYPE_LE) - return; - rref = data; - remote_ext_features_complete(btdev, le16_to_cpu(rref->handle), - rref->page); - break; - - case BT_HCI_CMD_READ_REMOTE_VERSION: - rrv = data; - remote_version_complete(btdev, le16_to_cpu(rrv->handle)); - break; - - case BT_HCI_CMD_READ_CLOCK_OFFSET: - if (btdev->type == BTDEV_TYPE_LE) - return; - rco = data; - remote_clock_offset_complete(btdev, le16_to_cpu(rco->handle)); - break; + } - case BT_HCI_CMD_LE_CREATE_CONN: - if (btdev->type == BTDEV_TYPE_BREDR) - return; - lecc = data; - btdev->le_scan_own_addr_type = lecc->own_addr_type; - le_conn_request(btdev, lecc); - break; +failed: + util_debug(btdev->debug_callback, btdev->debug_data, + "Unsupported command 0x%4.4x\n", opcode); + cmd_status(btdev, status, opcode); - case BT_HCI_CMD_LE_CONN_UPDATE: - if (btdev->type == BTDEV_TYPE_BREDR) - return; - lecu = data; - if (btdev->le_features[0] & 0x02) - le_conn_param_req(btdev, le16_to_cpu(lecu->handle), - le16_to_cpu(lecu->min_interval), - le16_to_cpu(lecu->max_interval), - le16_to_cpu(lecu->latency), - le16_to_cpu(lecu->supv_timeout), - le16_to_cpu(lecu->min_length), - le16_to_cpu(lecu->max_length)); - else - le_conn_update(btdev, le16_to_cpu(lecu->handle), - le16_to_cpu(lecu->min_interval), - le16_to_cpu(lecu->max_interval), - le16_to_cpu(lecu->latency), - le16_to_cpu(lecu->supv_timeout), - le16_to_cpu(lecu->min_length), - le16_to_cpu(lecu->max_length)); - break; - case BT_HCI_CMD_LE_CONN_PARAM_REQ_REPLY: - if (btdev->type == BTDEV_TYPE_BREDR) - return; - lcprr = data; - le_conn_update(btdev, le16_to_cpu(lcprr->handle), - le16_to_cpu(lcprr->min_interval), - le16_to_cpu(lcprr->max_interval), - le16_to_cpu(lcprr->latency), - le16_to_cpu(lcprr->supv_timeout), - le16_to_cpu(lcprr->min_length), - le16_to_cpu(lcprr->max_length)); - break; - case BT_HCI_CMD_LE_CONN_PARAM_REQ_NEG_REPLY: - if (btdev->type == BTDEV_TYPE_BREDR) - return; - lcprnr = data; - rej_le_conn_update(btdev, le16_to_cpu(lcprnr->handle), - le16_to_cpu(lcprnr->reason)); - break; - break; - case BT_HCI_CMD_LE_SET_SCAN_ENABLE: - if (btdev->type == BTDEV_TYPE_BREDR) - return; - lsse = data; - if (btdev->le_scan_enable && lsse->enable) - le_set_scan_enable_complete(btdev); - break; - case BT_HCI_CMD_LE_SET_EXT_SCAN_ENABLE: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - return; - lsese = data; - if (btdev->le_scan_enable && lsese->enable) - le_set_ext_scan_enable_complete(btdev); - break; - case BT_HCI_CMD_LE_EXT_CREATE_CONN: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - return; - leecc = data; - btdev->le_scan_own_addr_type = leecc->own_addr_type; - le_ext_conn_request(btdev, leecc); - break; - case BT_HCI_CMD_LE_CREATE_CIS: - if (btdev->type != BTDEV_TYPE_BREDRLE50 && - btdev->type != BTDEV_TYPE_BREDRLE52) - return; - leccis = data; - le_cis_request(btdev, leccis); - break; - } + return NULL; } struct btdev_callback { @@ -4259,20 +4931,26 @@ static void handler_callback(btdev_callback callback, uint8_t response, uint8_t status, const void *data, uint8_t len) { struct btdev *btdev = callback->user_data; + const struct btdev_cmd *cmd; switch (response) { case BTDEV_RESPONSE_DEFAULT: if (!run_hooks(btdev, BTDEV_HOOK_PRE_CMD, callback->opcode, callback->data, callback->len)) return; - default_cmd(btdev, callback->opcode, + + cmd = default_cmd(btdev, callback->opcode, callback->data, callback->len); + if (!cmd) + return; if (!run_hooks(btdev, BTDEV_HOOK_PRE_EVT, callback->opcode, callback->data, callback->len)) return; - default_cmd_completion(btdev, callback->opcode, - callback->data, callback->len); + + if (cmd->complete) + cmd->complete(btdev, callback->data, callback->len); + break; case BTDEV_RESPONSE_COMMAND_STATUS: cmd_status(btdev, status, callback->opcode); @@ -4291,6 +4969,7 @@ static void process_cmd(struct btdev *btdev, const void *data, uint16_t len) { struct btdev_callback callback; const struct bt_hci_cmd_hdr *hdr = data; + const struct btdev_cmd *cmd; if (len < sizeof(*hdr)) return; @@ -4312,14 +4991,18 @@ static void process_cmd(struct btdev *btdev, const void *data, uint16_t len) if (!run_hooks(btdev, BTDEV_HOOK_PRE_CMD, callback.opcode, callback.data, callback.len)) return; - default_cmd(btdev, callback.opcode, + + cmd = default_cmd(btdev, callback.opcode, callback.data, callback.len); + if (!cmd) + return; if (!run_hooks(btdev, BTDEV_HOOK_PRE_EVT, callback.opcode, callback.data, callback.len)) return; - default_cmd_completion(btdev, callback.opcode, - callback.data, callback.len); + + if (cmd->complete) + cmd->complete(btdev, callback.data, callback.len); } } From patchwork Wed Nov 11 23:04:13 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luiz Augusto von Dentz X-Patchwork-Id: 11898817 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.6 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 128CFC388F9 for ; Thu, 12 Nov 2020 01:49:00 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 9EA572076E for ; Thu, 12 Nov 2020 01:48:59 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="eX3DTz4V" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728538AbgKLBdD (ORCPT ); Wed, 11 Nov 2020 20:33:03 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57536 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727717AbgKKXE3 (ORCPT ); Wed, 11 Nov 2020 18:04:29 -0500 Received: from mail-pl1-x643.google.com (mail-pl1-x643.google.com [IPv6:2607:f8b0:4864:20::643]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BEFE3C0613D4 for ; Wed, 11 Nov 2020 15:04:27 -0800 (PST) Received: by mail-pl1-x643.google.com with SMTP id k7so1769465plk.3 for ; Wed, 11 Nov 2020 15:04:27 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=/NU9/FITTUdHKeN53pXqdgB7hSm/j9midMBE9WhKgys=; b=eX3DTz4VJLP7UqJCkn5OEgH2DYlbSV0woYXfCgxKQamIDgNpfRnV2E0QCXeIri1ZyB PmybxEw0V5X60aGxO+csnzNK0QucLBzOf89VdMb/9O4nxMm1fCeDzPD/FUI8vEdI61dl VhAJRLTz0rr2Liu1GDExNHv2aN9NuW66ZnkViyF1YeBZWwbK0FdGZuBHHnENdK3oZ0hB d6u5hT7uZjpcAdmpi9cQ0yFuRRQ4INUNsCOhIiAPqb03zwrCS7hZMZUHST4uPb4Q8N3Q 0IrxnMuIfZHnF6C7kbAbYB4BnBf+Be2vDCjfuX+8alCSdw4cb7mJ4+AieaWtzZxbMdO5 h/MA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=/NU9/FITTUdHKeN53pXqdgB7hSm/j9midMBE9WhKgys=; b=WlD5zwv19mSjdPZa3HAvGC+mBJmYE7JAyqQXW3yV9k9nfwMPSghKofsokA8zuHauT5 H58kihVDCj7rlr/ckh3zJU6Kfn5LVON6kbLA/PGdLQ2B2UjHZhZqebKZ78igpp32MKj8 LKoz3PMxUawrqbjprH0IBEVDS1u134C6hsohmraOglxMbuSkApE51HF4aoPUiIVMUjLc IACaBag9eMKoNLxu+WnFh6CCn/pnVbtkJXMtwQpVqcUzu484brqqWjHHGXgeg7Bo0V3g Bes93lPTYXjciuentHD7tOC3pzyNB1S9tlTeq0ORvc6UiQpAPMxtCHI0eBFaSdfrm7QF vYhg== X-Gm-Message-State: AOAM532ugisbzFl75WRrL7Jl70aQXa70QHJeF8kh9H9KITNl6wWg2pLL M9s/YIZFsErZVt/X0RDaHqBLy5isF4P6jA== X-Google-Smtp-Source: ABdhPJzVz/Flfea7VY0ZI+ASbkCPSBsBT9zUqpJRXlbpqfEUXjWu4KEKH1OBt8oR4K9HHcM+/iTwKg== X-Received: by 2002:a17:902:bc8c:b029:d6:ff09:12e9 with SMTP id bb12-20020a170902bc8cb02900d6ff0912e9mr23569213plb.18.1605135867062; Wed, 11 Nov 2020 15:04:27 -0800 (PST) Received: from localhost.localdomain (c-71-56-157-77.hsd1.or.comcast.net. [71.56.157.77]) by smtp.gmail.com with ESMTPSA id n27sm3867767pfq.59.2020.11.11.15.04.26 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 15:04:26 -0800 (PST) From: Luiz Augusto von Dentz To: linux-bluetooth@vger.kernel.org Subject: [PATCH v2 02/10] bthost: Fix running request callbacks for remote requests Date: Wed, 11 Nov 2020 15:04:13 -0800 Message-Id: <20201111230421.3364932-3-luiz.dentz@gmail.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201111230421.3364932-1-luiz.dentz@gmail.com> References: <20201111230421.3364932-1-luiz.dentz@gmail.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Luiz Augusto von Dentz Ident are only unique per request/response pair so if a remote request is initiated we shall not attempt to run the callback even if the ident matches. --- emulator/bthost.c | 32 ++++++++++++++++++++++++++++++-- 1 file changed, 30 insertions(+), 2 deletions(-) diff --git a/emulator/bthost.c b/emulator/bthost.c index 32676e179..f29bda06e 100644 --- a/emulator/bthost.c +++ b/emulator/bthost.c @@ -1678,6 +1678,19 @@ static void handle_pending_l2reqs(struct bthost *bthost, struct btconn *conn, } } +static bool l2cap_rsp(uint8_t code) +{ + switch (code) { + case BT_L2CAP_PDU_CMD_REJECT: + case BT_L2CAP_PDU_CONN_RSP: + case BT_L2CAP_PDU_CONFIG_RSP: + case BT_L2CAP_PDU_INFO_RSP: + return true; + } + + return false; +} + static void l2cap_sig(struct bthost *bthost, struct btconn *conn, const void *data, uint16_t len) { @@ -1741,7 +1754,8 @@ static void l2cap_sig(struct bthost *bthost, struct btconn *conn, ret = false; } - handle_pending_l2reqs(bthost, conn, hdr->ident, hdr->code, + if (l2cap_rsp(hdr->code)) + handle_pending_l2reqs(bthost, conn, hdr->ident, hdr->code, data + sizeof(*hdr), hdr_len); if (ret) @@ -1898,6 +1912,19 @@ static bool l2cap_ecred_conn_rsp(struct bthost *bthost, struct btconn *conn, return true; } +static bool l2cap_le_rsp(uint8_t code) +{ + switch (code) { + case BT_L2CAP_PDU_CMD_REJECT: + case BT_L2CAP_PDU_CONN_PARAM_RSP: + case BT_L2CAP_PDU_LE_CONN_RSP: + case BT_L2CAP_PDU_ECRED_CONN_RSP: + return true; + } + + return false; +} + static void l2cap_le_sig(struct bthost *bthost, struct btconn *conn, const void *data, uint16_t len) { @@ -1960,7 +1987,8 @@ static void l2cap_le_sig(struct bthost *bthost, struct btconn *conn, ret = false; } - handle_pending_l2reqs(bthost, conn, hdr->ident, hdr->code, + if (l2cap_le_rsp(hdr->code)) + handle_pending_l2reqs(bthost, conn, hdr->ident, hdr->code, data + sizeof(*hdr), hdr_len); if (ret) From patchwork Wed Nov 11 23:04:14 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luiz Augusto von Dentz X-Patchwork-Id: 11898823 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.6 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id DABE3C4742C for ; Thu, 12 Nov 2020 01:48:57 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 626A52076E for ; Thu, 12 Nov 2020 01:48:57 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="jTbZM9U5" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728541AbgKLBdH (ORCPT ); Wed, 11 Nov 2020 20:33:07 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57542 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727727AbgKKXE3 (ORCPT ); Wed, 11 Nov 2020 18:04:29 -0500 Received: from mail-pg1-x541.google.com (mail-pg1-x541.google.com [IPv6:2607:f8b0:4864:20::541]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3BCB6C0617A6 for ; Wed, 11 Nov 2020 15:04:29 -0800 (PST) Received: by mail-pg1-x541.google.com with SMTP id w4so2459207pgg.13 for ; Wed, 11 Nov 2020 15:04:29 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=onJPTOr6HU09L4UHiBw13vB5nu+gIxArLKPFlHjjSEo=; b=jTbZM9U545EVaFFER142F3kpzR8azADDhGh6Ml/pZfqdM3iLOgGJ4T6Bg1iaO9KhRD kTdflRuG7zDFr72QmYEHQctjAjN4VVSDkp0wYy5owPJ6Dbo+1xAHMNYI2x/bh1Hv2WMN rsTTr7m+ILYNSe/L20NuYdW1NeSVBgwRI/altnGLSvsc3OWlZHPSeS50qHC/e4KcsSSG vhY+fW2HxqKcPrtlCyn7REZCt3n7Aod5bfC8wxh7bTQs3K/aKtDAHvx9X78K1S6EhCUT /2eKCda2w+q+WmA6WF03SCM4bDmUsKXLjY9lvh8PjcqIk42H3eIRn3P9EWPantYWu3QP ZWNg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=onJPTOr6HU09L4UHiBw13vB5nu+gIxArLKPFlHjjSEo=; b=haM9BOoGbIHIp/1AybdLSdJDeG5vM0bGK3MerLcghZVbFyUQloOxj5XVq5lJG09DxY 6quedyJSIECSqxorVdSe5G8rkCxuy6aWVh63mjVfQB8JUPLRvh2btOhw1tfG3lZlPgdb JA54BDZwC3fo+7Ht6UqAo1XlFaerFS2UD52OP3yKzgTkpDxFod7SfgoF7CEyFM3Q7py3 36S820WoCy/JJZIhf1tBby4FyEDNojqzoS2kjpMUUrvHASeMZqPWm7afMOTYv+WMzZcH akFyetQhAl6a5/5kDdopFaOe8jboR+SRi0gRU8Lg3IZf1rAHe+YSq0SMXz1bGhd/X23O h/iw== X-Gm-Message-State: AOAM533kS6qTGJK3oMpW915WAgulMiFkTCH/KAegLpu01eBxuT5kiGYm sgY08LnrKXIRCHcSNgV3U4JCrP2/cxaRyA== X-Google-Smtp-Source: ABdhPJweiiCWzDNA2OrLcABIjy3taF3wnx3ds27u9RzySAZXsH1s1iscKa0x9r1M7EItO/geGegW1Q== X-Received: by 2002:a17:90a:6004:: with SMTP id y4mr6257464pji.162.1605135868568; Wed, 11 Nov 2020 15:04:28 -0800 (PST) Received: from localhost.localdomain (c-71-56-157-77.hsd1.or.comcast.net. [71.56.157.77]) by smtp.gmail.com with ESMTPSA id n27sm3867767pfq.59.2020.11.11.15.04.27 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 15:04:27 -0800 (PST) From: Luiz Augusto von Dentz To: linux-bluetooth@vger.kernel.org Subject: [PATCH v2 03/10] l2cap-tester: Fix L2CAP LE Server - Success Date: Wed, 11 Nov 2020 15:04:14 -0800 Message-Id: <20201111230421.3364932-4-luiz.dentz@gmail.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201111230421.3364932-1-luiz.dentz@gmail.com> References: <20201111230421.3364932-1-luiz.dentz@gmail.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Luiz Augusto von Dentz This test was failing due to the kernel now using different values for MPS and credits. --- tools/l2cap-tester.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/l2cap-tester.c b/tools/l2cap-tester.c index ff641ba1d..11d549f22 100644 --- a/tools/l2cap-tester.c +++ b/tools/l2cap-tester.c @@ -501,8 +501,8 @@ static const uint8_t le_connect_req[] = { 0x80, 0x00, /* PSM */ static const uint8_t le_connect_rsp[] = { 0x40, 0x00, /* DCID */ 0xa0, 0x02, /* MTU */ - 0xe6, 0x00, /* MPS */ - 0x0a, 0x00, /* Credits */ + 0xbc, 0x00, /* MPS */ + 0x04, 0x00, /* Credits */ 0x00, 0x00, /* Result */ }; From patchwork Wed Nov 11 23:04:15 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luiz Augusto von Dentz X-Patchwork-Id: 11898811 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.6 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 55CD3C388F9 for ; Thu, 12 Nov 2020 01:48:56 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 07B032076E for ; Thu, 12 Nov 2020 01:48:55 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="NqkAHzLQ" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728544AbgKLBdI (ORCPT ); Wed, 11 Nov 2020 20:33:08 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57550 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727732AbgKKXEb (ORCPT ); Wed, 11 Nov 2020 18:04:31 -0500 Received: from mail-pl1-x641.google.com (mail-pl1-x641.google.com [IPv6:2607:f8b0:4864:20::641]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EE1ABC0617A7 for ; Wed, 11 Nov 2020 15:04:30 -0800 (PST) Received: by mail-pl1-x641.google.com with SMTP id b3so1744010pls.11 for ; Wed, 11 Nov 2020 15:04:30 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=msDZd2qOGah4QB3072sVg4wOX4q/SRtp2lmh0VCdYYs=; b=NqkAHzLQXxNMyOjZdTKYHT0DMRy7VIydx+fAKwnNr0tXkKChuXJYj15tQrFxSDnawl J4hQ2yyitL73xe1mMrNzPVdY8sK4EGo+5XiRQHlItZhqUczrGmxC+go1zMzn7IJ8U8lf q54cwxqRjc964h70Kt7rWk9BzQT+/zBdgPbur81xy6pM5GMauvLuikYB4+WXGb1OLn72 5yHU6ggm8rD12dqmJReP+lhP176cz+1sk1ejSJQQkmES4jBFArGVSkJ3jUR4U3tI9xoZ h2oDv4ZOfKuHqRSiay3fNoDqYLJoiiEHfmlFlvaCkKpK6QdiwjUCmTklrhLYyRS03YE8 WgGw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=msDZd2qOGah4QB3072sVg4wOX4q/SRtp2lmh0VCdYYs=; b=qDC81m2JyITl6B02g30H9NmqhiKnXMqkGEv4UgCN0HCxalUUC5llPZo1NlhrsKf6u/ Zor0SwprAX6h/korKQ6E6KKU6Yw1CItovOVsNDO2L0ufRTPfV14R9OOMpFCTOnYeRjT2 SCTPEWifKEVlDdQogz8/nHVjCpkhCfvhNIsU/rrqU6iDow4uSmik81DHQZWmsRe2lRMK Z0ilacyZ9QQAI/Rjta2Ws9MpwFIuxRyo/qP4ZS16usTHVMb0SQZlAY8ryWn5Sk6JKM76 coRU0DlwJK0XbYzHKD9RLTKl8MYF7DHJydTFt5OewTtqDH9tvMwXefAZ9wyKkBpgx4oZ zBkw== X-Gm-Message-State: AOAM530MnbXi5ZEe7OhEoletHczu/nHJCdGSR34FYuMrVH5ztrXglBkR 4+DEcnmsNXoL72Dq6Vpjn0nGBaDCcPK9qg== X-Google-Smtp-Source: ABdhPJyjakadasno1141qwDPJAG9qMgdg3vZA5SAbgHzSWWldiUr1uakSl/+Ia6WIpzZFuUXvLK3CA== X-Received: by 2002:a17:902:7482:b029:d6:682d:5c6c with SMTP id h2-20020a1709027482b02900d6682d5c6cmr22439170pll.84.1605135869745; Wed, 11 Nov 2020 15:04:29 -0800 (PST) Received: from localhost.localdomain (c-71-56-157-77.hsd1.or.comcast.net. [71.56.157.77]) by smtp.gmail.com with ESMTPSA id n27sm3867767pfq.59.2020.11.11.15.04.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 15:04:29 -0800 (PST) From: Luiz Augusto von Dentz To: linux-bluetooth@vger.kernel.org Subject: [PATCH v2 04/10] smp-tester: Fix not registering for MGMT_EV_USER_CONFIRM_REQUEST Date: Wed, 11 Nov 2020 15:04:15 -0800 Message-Id: <20201111230421.3364932-5-luiz.dentz@gmail.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201111230421.3364932-1-luiz.dentz@gmail.com> References: <20201111230421.3364932-1-luiz.dentz@gmail.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Luiz Augusto von Dentz For client test MGMT_EV_USER_CONFIRM_REQUEST shall be resgistered as well as the kernel has been updated to request user confirmation even when acting as initiator. --- tools/smp-tester.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/tools/smp-tester.c b/tools/smp-tester.c index 7823b6b17..644c451c2 100644 --- a/tools/smp-tester.c +++ b/tools/smp-tester.c @@ -501,6 +501,10 @@ static void setup_powered_client(const void *test_data) const struct smp_data *smp = data->test_data; unsigned char param[] = { 0x01 }; + mgmt_register(data->mgmt, MGMT_EV_USER_CONFIRM_REQUEST, + data->mgmt_index, user_confirm_request_callback, + data, NULL); + tester_print("Powering on controller"); mgmt_send(data->mgmt, MGMT_OP_SET_LE, data->mgmt_index, From patchwork Wed Nov 11 23:04:16 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luiz Augusto von Dentz X-Patchwork-Id: 11898815 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.6 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id EDE2FC61DD8 for ; Thu, 12 Nov 2020 01:48:53 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 8B34320809 for ; Thu, 12 Nov 2020 01:48:53 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="pKAfaeBm" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728551AbgKLBdK (ORCPT ); Wed, 11 Nov 2020 20:33:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57846 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727768AbgKKXG1 (ORCPT ); Wed, 11 Nov 2020 18:06:27 -0500 Received: from mail-pf1-x42c.google.com (mail-pf1-x42c.google.com [IPv6:2607:f8b0:4864:20::42c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4EC4DC061A04 for ; Wed, 11 Nov 2020 15:04:31 -0800 (PST) Received: by mail-pf1-x42c.google.com with SMTP id z3so2675421pfb.10 for ; Wed, 11 Nov 2020 15:04:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=DUsmgDMGWi0gwJpZndlTa8QMK8I/mdJWRyhl7CRKULU=; b=pKAfaeBmAUJaaz9jLXeL/KXps8oTLQAcvDlfoebETtKjOjyR0K/KmKIUm2Ic0NJ8/m mkPi/863S1yHVdTOwgDvSB8T8yrZQdvZYzGpSdLExPQUaH/hyUQddfe4ehL6E277rKRZ boLlqKxBOPuG0kRsJXk7zbCzW83JNnKiiGUBumYEM6f6QvszYR5egNxxr3dPoH3tYYeJ //6BS1XSX/bxF0scl2UNgnte0hBQqEg6JQt8hvN175mGXJBQ3URAPflRPvHnV8dh3ZXy y7jngWvgYjLafRoQPZSgRdxpAriMiOm16DeKvEhISZ58mFiUc3VJQhlkPG0diwO6NImd qLcQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=DUsmgDMGWi0gwJpZndlTa8QMK8I/mdJWRyhl7CRKULU=; b=pWulaQ+Fov1dnSoHdvQaYvdDGwM4Q0k8LHmZkFNojxCrYBqmOQ4D6ILMnmpkEMuZM7 YT+jPAc6N/o8ZPeZhw2yhyXbFtiFyc+VyaVnmi7OuphPjfWM9B6G53AeTn8B9y8+U13X U5XL1CeO4vUoXqORFMws9aQZnGtOkq0cqzcMulK5ekAb2sQo9o+l4bZQhlUhF2g+KvQg 8kqQshD25yYtWzhb8VawWrgCRuKhTz+yrTViBmI373/scuU18MLInL3Kf1PmX+d8MQOo IrZ3YD1DgnZYJ4v6M7Ph4uWj/R+ILqQSmaB1X/ZOVn9ZavxEt5FDauy6EF5q6I1KIPds 4HlQ== X-Gm-Message-State: AOAM532jkTdJSQlb4syrunYg7UXqfEP/2bLdiCHZc6VrWmZlZ+0oLJTh A32Ok+2E8m2v4Uo6CeaxBVaatj2/yrEpdg== X-Google-Smtp-Source: ABdhPJy4rkP9hIA+ymodNYAIRjyZONNDZ9IuiYfgRUk9WXYqmbOSpZFyAUrYFK0xGTGAks25LZl8fw== X-Received: by 2002:aa7:808a:0:b029:160:167d:d332 with SMTP id v10-20020aa7808a0000b0290160167dd332mr13965929pff.1.1605135870596; Wed, 11 Nov 2020 15:04:30 -0800 (PST) Received: from localhost.localdomain (c-71-56-157-77.hsd1.or.comcast.net. [71.56.157.77]) by smtp.gmail.com with ESMTPSA id n27sm3867767pfq.59.2020.11.11.15.04.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 15:04:30 -0800 (PST) From: Luiz Augusto von Dentz To: linux-bluetooth@vger.kernel.org Subject: [PATCH v2 05/10] shared/tester: Add option to filter by string Date: Wed, 11 Nov 2020 15:04:16 -0800 Message-Id: <20201111230421.3364932-6-luiz.dentz@gmail.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201111230421.3364932-1-luiz.dentz@gmail.com> References: <20201111230421.3364932-1-luiz.dentz@gmail.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Luiz Augusto von Dentz This adds option to filter by string which does not require to enter the entire prefix. --- src/shared/tester.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/src/shared/tester.c b/src/shared/tester.c index bd42c8bad..0c31e8b1c 100644 --- a/src/shared/tester.c +++ b/src/shared/tester.c @@ -106,6 +106,7 @@ static gboolean option_debug = FALSE; static gboolean option_monitor = FALSE; static gboolean option_list = FALSE; static const char *option_prefix = NULL; +static const char *option_string = NULL; struct monitor_hdr { uint16_t opcode; @@ -285,6 +286,12 @@ void tester_add_full(const char *name, const void *test_data, return; } + if (option_string && !strstr(name, option_string)) { + if (destroy) + destroy(user_data); + return; + } + if (option_list) { tester_log("%s", name); if (destroy) @@ -804,6 +811,8 @@ static GOptionEntry options[] = { "Only list the tests to be run" }, { "prefix", 'p', 0, G_OPTION_ARG_STRING, &option_prefix, "Run tests matching provided prefix" }, + { "string", 's', 0, G_OPTION_ARG_STRING, &option_string, + "Run tests matching provided string" }, { NULL }, }; From patchwork Wed Nov 11 23:04:17 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luiz Augusto von Dentz X-Patchwork-Id: 11898779 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,UNWANTED_LANGUAGE_BODY,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A2820C388F9 for ; Thu, 12 Nov 2020 01:33:15 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 1CFCD20809 for ; Thu, 12 Nov 2020 01:33:15 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="CLl4rPuB" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727302AbgKLBdN (ORCPT ); Wed, 11 Nov 2020 20:33:13 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57848 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727789AbgKKXG2 (ORCPT ); Wed, 11 Nov 2020 18:06:28 -0500 Received: from mail-pl1-x62b.google.com (mail-pl1-x62b.google.com [IPv6:2607:f8b0:4864:20::62b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 48CB9C061A47 for ; Wed, 11 Nov 2020 15:04:32 -0800 (PST) Received: by mail-pl1-x62b.google.com with SMTP id b3so1744045pls.11 for ; Wed, 11 Nov 2020 15:04:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=OlQzQ5QqgKmLpdDa8x/sdZPyVHoj8u2xzjyntZXMKfE=; b=CLl4rPuBMyNE9lQG6UA+B8oVKIYraIrbLQ3vcaUaTrQjxzjnMMm2jKagGmtEc4OiOp k/zyGzFODTJlhASb+G1P2MAOBoSUH4L6e9diCaWrFhg0WSXEzUBU4nFXApMS7q4VcWSr 2qT0iE1GHtK1CdfOhgw8kXZHQNiSA3q292XuecOhQ2fj0WtLUUichgKB2GhNrjPUq8v0 FOcph3qG6houavdvkn+RTC+hZ8mRMUB5r0TRj7fE9jdRogaytdjeYEmfIiPvWNTpPKC3 YnjJdmG6iMwMTg6hTAVj5r8qREFZJM8IN/ukgDRuo098m4qRfMdXR5B1YYqhthq5WfRW I20w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=OlQzQ5QqgKmLpdDa8x/sdZPyVHoj8u2xzjyntZXMKfE=; b=EvdgO3YeZanKAg3OnYkL1/Ufe45yoiJ0u0D6gAFljyWBfUWTfYVnag8j+HG7atJ1Je +eHI6ZAc2Zs86iG+TfSWU1JEFlyBKRr+/51TQ0NRhQrFxHMunPSu+FYgpfy1UWsMXs/b bXsgu26DMTEg1muWFS23HxErzJYoWo1Og4XtHtf83Aomw76eaGChfoVaYruvvuxQgDr/ Cx5XSbCB+7FNCBdDAg8WzdQGtOWVhwlZzXKWnksFSNLpBqbBOMiSctdx2xTghFlLSxD8 iZDupQ6RFV2oHlvDXAXo8uy+pMIJ5Sb+EhplPPTMb0/iEp1eelg+FF36zdrChSsev7uz iRFA== X-Gm-Message-State: AOAM532vaB0gXVmjQzlFRKwgWf3Q3fCaCAC8oIaSJ6JciwhW88MHX0H1 9X/ak+mk16SBNkDCGxec0RzKk5ZJikHZBA== X-Google-Smtp-Source: ABdhPJxfldlH8gzZ9CXFSyw5wxOevgzVJeCtjKaoCyGii2VP+7bkv+HwgwsUpeLxZyWTD/M1YQCrtQ== X-Received: by 2002:a17:902:bc83:b029:d6:ab18:1079 with SMTP id bb3-20020a170902bc83b02900d6ab181079mr24310641plb.22.1605135871419; Wed, 11 Nov 2020 15:04:31 -0800 (PST) Received: from localhost.localdomain (c-71-56-157-77.hsd1.or.comcast.net. [71.56.157.77]) by smtp.gmail.com with ESMTPSA id n27sm3867767pfq.59.2020.11.11.15.04.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 15:04:30 -0800 (PST) From: Luiz Augusto von Dentz To: linux-bluetooth@vger.kernel.org Subject: [PATCH v2 06/10] mgmt-tester: Update supported-features to not include HS Date: Wed, 11 Nov 2020 15:04:17 -0800 Message-Id: <20201111230421.3364932-7-luiz.dentz@gmail.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201111230421.3364932-1-luiz.dentz@gmail.com> References: <20201111230421.3364932-1-luiz.dentz@gmail.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Luiz Augusto von Dentz High speed has been disabled by default, also since it can be enabled this turn checks of supported-features into warnings to allow it work even if BT_HS has been enabled in the kernel. --- src/shared/util.h | 1 + tools/mgmt-tester.c | 196 ++++++++++++++++++++++---------------------- 2 files changed, 99 insertions(+), 98 deletions(-) diff --git a/src/shared/util.h b/src/shared/util.h index 8a920bc12..6fb702797 100644 --- a/src/shared/util.h +++ b/src/shared/util.h @@ -15,6 +15,7 @@ #include #define ARRAY_SIZE(arr) (sizeof(arr) / sizeof((arr)[0])) +#define BIT(n) (1 << (n)) #if __BYTE_ORDER == __LITTLE_ENDIAN #define le16_to_cpu(val) (val) diff --git a/tools/mgmt-tester.c b/tools/mgmt-tester.c index d8554411f..a5bfa1ce1 100644 --- a/tools/mgmt-tester.c +++ b/tools/mgmt-tester.c @@ -64,6 +64,23 @@ static void print_debug(const char *str, void *user_data) tester_print("%s%s", prefix, str); } +static void test_post_teardown(const void *test_data) +{ + struct test_data *data = tester_get_data(); + + if (data->sk >= 0) + close(data->sk); + + hciemu_unref(data->hciemu); + data->hciemu = NULL; +} + +static void test_pre_setup_failed(void) +{ + test_post_teardown(NULL); + tester_pre_setup_failed(); +} + static void read_version_callback(uint8_t status, uint16_t length, const void *param, void *user_data) { @@ -74,7 +91,7 @@ static void read_version_callback(uint8_t status, uint16_t length, tester_print(" Status: %s (0x%02x)", mgmt_errstr(status), status); if (status || !param) { - tester_pre_setup_failed(); + test_pre_setup_failed(); return; } @@ -92,11 +109,31 @@ static void read_commands_callback(uint8_t status, uint16_t length, tester_print(" Status: %s (0x%02x)", mgmt_errstr(status), status); if (status || !param) { - tester_pre_setup_failed(); + test_pre_setup_failed(); return; } } +static bool check_settings(uint32_t supported, uint32_t expected) +{ + int i; + + if (supported == expected) + return true; + + for (i = 0; i < 17; i++) { + if (supported & BIT(i)) + continue; + + if (expected & BIT(i)) { + tester_warn("Expected bit %u not supported", i); + return false; + } + } + + return true; +} + static void read_info_callback(uint8_t status, uint16_t length, const void *param, void *user_data) { @@ -111,7 +148,7 @@ static void read_info_callback(uint8_t status, uint16_t length, tester_print(" Status: %s (0x%02x)", mgmt_errstr(status), status); if (status || !param) { - tester_pre_setup_failed(); + test_pre_setup_failed(); return; } @@ -131,33 +168,43 @@ static void read_info_callback(uint8_t status, uint16_t length, tester_print(" Short name: %s", rp->short_name); if (strcmp(hciemu_get_address(data->hciemu), addr)) { - tester_pre_setup_failed(); + test_pre_setup_failed(); return; } if (rp->version != data->expected_version) { - tester_pre_setup_failed(); + tester_warn("Expected version: 0x%02x != 0x%02x", + rp->version, data->expected_version); + test_pre_setup_failed(); return; } if (manufacturer != data->expected_manufacturer) { - tester_pre_setup_failed(); + tester_warn("Expected manufacturer: 0x%04x != 0x%04x", + manufacturer, data->expected_manufacturer); + test_pre_setup_failed(); return; } - if (supported_settings != data->expected_supported_settings) { - tester_pre_setup_failed(); + if (!check_settings(supported_settings, + data->expected_supported_settings)) { + tester_warn("Expected supported settings: 0x%08x != 0x%08x", + supported_settings, + data->expected_supported_settings); + test_pre_setup_failed(); return; } - if (current_settings != data->initial_settings) { - tester_pre_setup_failed(); + if (!check_settings(current_settings, data->initial_settings)) { + tester_warn("Initial settings: 0x%08x != 0x%08x", + current_settings, data->initial_settings); + test_pre_setup_failed(); return; } if (rp->dev_class[0] != 0x00 || rp->dev_class[1] != 0x00 || rp->dev_class[2] != 0x00) { - tester_pre_setup_failed(); + test_pre_setup_failed(); return; } @@ -269,7 +316,7 @@ static void read_index_list_callback(uint8_t status, uint16_t length, tester_print(" Status: %s (0x%02x)", mgmt_errstr(status), status); if (status || !param) { - tester_pre_setup_failed(); + test_pre_setup_failed(); return; } @@ -282,7 +329,7 @@ static void read_index_list_callback(uint8_t status, uint16_t length, data->hciemu = hciemu_new(data->hciemu_type); if (!data->hciemu) { tester_warn("Failed to setup HCI emulation"); - tester_pre_setup_failed(); + test_pre_setup_failed(); } if (tester_use_debug()) @@ -299,14 +346,14 @@ static void test_pre_setup(const void *test_data) data->mgmt = mgmt_new_default(); if (!data->mgmt) { tester_warn("Failed to setup management interface"); - tester_pre_setup_failed(); + test_pre_setup_failed(); return; } data->mgmt_alt = mgmt_new_default(); if (!data->mgmt_alt) { tester_warn("Failed to setup alternate management interface"); - tester_pre_setup_failed(); + test_pre_setup_failed(); mgmt_unref(data->mgmt); data->mgmt = NULL; @@ -330,17 +377,6 @@ static void test_pre_setup(const void *test_data) data->sk = -1; } -static void test_post_teardown(const void *test_data) -{ - struct test_data *data = tester_get_data(); - - if (data->sk >= 0) - close(data->sk); - - hciemu_unref(data->hciemu); - data->hciemu = NULL; -} - static void test_add_condition(struct test_data *data) { data->unmet_conditions++; @@ -382,94 +418,58 @@ static void test_condition_complete(struct test_data *data) tester_test_passed(); } -#define test_bredrle_full(name, data, setup, func, timeout) \ +#define test_full(name, data, setup, func, timeout, type, version, \ + expected_settings, settings) \ do { \ struct test_data *user; \ user = new0(struct test_data, 1); \ - user->hciemu_type = HCIEMU_TYPE_BREDRLE; \ + user->hciemu_type = type; \ user->test_setup = setup; \ user->test_data = data; \ - user->expected_version = 0x09; \ + user->expected_version = version; \ user->expected_manufacturer = 0x003f; \ - user->expected_supported_settings = 0x0001bfff; \ - user->initial_settings = 0x00000080; \ + user->expected_supported_settings = expected_settings; \ + user->initial_settings = settings; \ tester_add_full(name, data, \ test_pre_setup, test_setup, func, NULL, \ test_post_teardown, timeout, user, free); \ } while (0) +#define test_bredrle_full(name, data, setup, func, timeout) \ + test_full(name, data, setup, func, timeout, HCIEMU_TYPE_BREDRLE, \ + 0x09, 0x0001beff, 0x00000080) + #define test_bredrle(name, data, setup, func) \ test_bredrle_full(name, data, setup, func, 2) #define test_bredr20(name, data, setup, func) \ - do { \ - struct test_data *user; \ - user = new0(struct test_data, 1); \ - user->hciemu_type = HCIEMU_TYPE_LEGACY; \ - user->test_setup = setup; \ - user->test_data = data; \ - user->expected_version = 0x03; \ - user->expected_manufacturer = 0x003f; \ - user->expected_supported_settings = 0x000110bf; \ - user->initial_settings = 0x00000080; \ - tester_add_full(name, data, \ - test_pre_setup, test_setup, func, NULL, \ - test_post_teardown, 2, user, free); \ - } while (0) + test_full(name, data, setup, func, 2, HCIEMU_TYPE_LEGACY, \ + 0x03, 0x000110bf, 0x00000080) #define test_bredr(name, data, setup, func) \ - do { \ - struct test_data *user; \ - user = new0(struct test_data, 1); \ - user->hciemu_type = HCIEMU_TYPE_BREDR; \ - user->test_setup = setup; \ - user->test_data = data; \ - user->expected_version = 0x05; \ - user->expected_manufacturer = 0x003f; \ - user->expected_supported_settings = 0x000111ff; \ - user->initial_settings = 0x00000080; \ - tester_add_full(name, data, \ - test_pre_setup, test_setup, func, NULL, \ - test_post_teardown, 2, user, free); \ - } while (0) + test_full(name, data, setup, func, 2, HCIEMU_TYPE_BREDR, \ + 0x05, 0x000110ff, 0x00000080) #define test_le_full(name, data, setup, func, timeout) \ - do { \ - struct test_data *user; \ - user = new0(struct test_data, 1); \ - user->hciemu_type = HCIEMU_TYPE_LE; \ - user->test_setup = setup; \ - user->test_data = data; \ - user->expected_version = 0x09; \ - user->expected_manufacturer = 0x003f; \ - user->expected_supported_settings = 0x0001be1b; \ - user->initial_settings = 0x00000200; \ - tester_add_full(name, data, \ - test_pre_setup, test_setup, func, NULL, \ - test_post_teardown, timeout, user, free); \ - } while (0) + test_full(name, data, setup, func, timeout, HCIEMU_TYPE_LE, \ + 0x09, 0x0001be1b, 0x00000200) #define test_le(name, data, setup, func) \ test_le_full(name, data, setup, func, 2) #define test_bredrle50_full(name, data, setup, func, timeout) \ - do { \ - struct test_data *user; \ - user = new0(struct test_data, 1); \ - user->hciemu_type = HCIEMU_TYPE_BREDRLE50; \ - user->test_setup = setup; \ - user->test_data = data; \ - user->expected_version = 0x09; \ - user->expected_manufacturer = 0x003f; \ - user->expected_supported_settings = 0x0001bfff; \ - user->initial_settings = 0x00000080; \ - tester_add_full(name, data, \ - test_pre_setup, test_setup, func, NULL, \ - test_post_teardown, timeout, user, free); \ - } while (0) + test_full(name, data, setup, func, timeout, HCIEMU_TYPE_BREDRLE50, \ + 0x09, 0x0001beff, 0x00000080) #define test_bredrle50(name, data, setup, func) \ - test_bredrle50_full(name, data, setup, func, 2) + test_bredrle50_full(name, data, setup, func, 2) + +#define test_hs_full(name, data, setup, func, timeout) \ + test_full(name, data, setup, func, timeout, HCIEMU_TYPE_BREDRLE, \ + 0x09, 0x0001bfff, 0x00000080) + +#define test_hs(name, data, setup, func) \ + test_hs_full(name, data, setup, func, 2) static void controller_setup(const void *test_data) { @@ -5069,7 +5069,7 @@ static const char ext_ctrl_info1[] = { 0x00, 0x00, 0x00, 0x01, 0xaa, 0x00, /* btaddr */ 0x09, /* version */ 0x3f, 0x00, /* manufacturer */ - 0xff, 0xbf, 0x01, 0x00, /* supported settings */ + 0xff, 0xbe, 0x01, 0x00, /* supported settings */ 0x80, 0x00, 0x00, 0x00, /* current settings */ 0x09, 0x00, /* eir length */ 0x04, /* dev class length */ @@ -5114,7 +5114,7 @@ static const char ext_ctrl_info2[] = { 0x00, 0x00, 0x00, 0x01, 0xaa, 0x00, /* btaddr */ 0x09, /* version */ 0x3f, 0x00, /* manufacturer */ - 0xff, 0xbf, 0x01, 0x00, /* supported settings */ + 0xff, 0xbe, 0x01, 0x00, /* supported settings */ 0x81, 0x02, 0x00, 0x00, /* current settings */ 0x0D, 0x00, /* eir length */ 0x04, /* dev class length */ @@ -5145,7 +5145,7 @@ static const char ext_ctrl_info3[] = { 0x00, 0x00, 0x00, 0x01, 0xaa, 0x00, /* btaddr */ 0x09, /* version */ 0x3f, 0x00, /* manufacturer */ - 0xff, 0xbf, 0x01, 0x00, /* supported settings */ + 0xff, 0xbe, 0x01, 0x00, /* supported settings */ 0x80, 0x02, 0x00, 0x00, /* current settings */ 0x16, 0x00, /* eir length */ 0x04, /* dev class length */ @@ -5180,7 +5180,7 @@ static const char ext_ctrl_info4[] = { 0x00, 0x00, 0x00, 0x01, 0xaa, 0x00, /* btaddr */ 0x09, /* version */ 0x3f, 0x00, /* manufacturer */ - 0xff, 0xbf, 0x01, 0x00, /* supported settings */ + 0xff, 0xbe, 0x01, 0x00, /* supported settings */ 0x80, 0x02, 0x00, 0x00, /* current settings */ 0x1a, 0x00, /* eir length */ 0x04, /* dev class length */ @@ -5239,7 +5239,7 @@ static const char ext_ctrl_info5[] = { 0x00, 0x00, 0x00, 0x01, 0xaa, 0x00, /* btaddr */ 0x09, /* version */ 0x3f, 0x00, /* manufacturer */ - 0xff, 0xbf, 0x01, 0x00, /* supported settings */ + 0xff, 0xbe, 0x01, 0x00, /* supported settings */ 0x81, 0x02, 0x00, 0x00, /* current settings */ 0x1a, 0x00, /* eir len */ 0x04, /* dev class len */ @@ -9080,19 +9080,19 @@ int main(int argc, char *argv[]) &set_sc_only_on_success_test_2, NULL, test_command_generic); - test_bredrle("Set High Speed on - Success", + test_hs("Set High Speed on - Success", &set_hs_on_success_test, NULL, test_command_generic); - test_bredrle("Set High Speed on - Invalid parameters 1", + test_hs("Set High Speed on - Invalid parameters 1", &set_hs_on_invalid_param_test_1, NULL, test_command_generic); - test_bredrle("Set High Speed on - Invalid parameters 2", + test_hs("Set High Speed on - Invalid parameters 2", &set_hs_on_invalid_param_test_2, NULL, test_command_generic); - test_bredrle("Set High Speed on - Invalid parameters 3", + test_hs("Set High Speed on - Invalid parameters 3", &set_hs_on_invalid_param_test_3, NULL, test_command_generic); - test_bredrle("Set High Speed on - Invalid index", + test_hs("Set High Speed on - Invalid index", &set_hs_on_invalid_index_test, NULL, test_command_generic); From patchwork Wed Nov 11 23:04:18 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luiz Augusto von Dentz X-Patchwork-Id: 11898809 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.6 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 58379C56201 for ; Thu, 12 Nov 2020 01:48:41 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id EBB002076E for ; Thu, 12 Nov 2020 01:48:40 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="KiHl9Rrs" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728558AbgKLBdP (ORCPT ); Wed, 11 Nov 2020 20:33:15 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57852 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727798AbgKKXG3 (ORCPT ); Wed, 11 Nov 2020 18:06:29 -0500 Received: from mail-pg1-x543.google.com (mail-pg1-x543.google.com [IPv6:2607:f8b0:4864:20::543]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3B680C061A48 for ; Wed, 11 Nov 2020 15:04:33 -0800 (PST) Received: by mail-pg1-x543.google.com with SMTP id r186so2515822pgr.0 for ; Wed, 11 Nov 2020 15:04:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=nmK9sTU3Y2ZaVXAhCNryT5bZnp8+Duh8MrQV2hMbzXs=; b=KiHl9RrsD+wlut3vZGF7w3E9JYOWvjq9p4LWVH8jtyHZ2Y8xw8ZSKD2BtPdlMZj15x gE7sqpVJ7OzaHdR8L9ZMdjzdn7LJedUz/t09KMR2xKgNJqI7JVe6JiJUwTnaISJFyple KXvkjzZ3PBmTtvFD1lSr5K+EC0RQgdjRSSrtnITTi+H4FrMS5HcHvRAPqOU3dRbTDcZj fimi/YCEXD2RmAUicEGN/cr0WjOgyrtX5AGAlwFLK8vwzL/WjSxIqOQL03mgaHN/wJJh QPIbunirMItS/2dsME452Yl0HP/UbpbvOJxQPmLwlYbYHxOoOWBS8kL4gKwBZcMRtuQV rmyA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=nmK9sTU3Y2ZaVXAhCNryT5bZnp8+Duh8MrQV2hMbzXs=; b=V9BGy5zghrze4mK7rcOVns83EJKwE1Aer7DXFpoQ/oeJVWYw20pYy23oePha+Vlozt q2CtLShfVnMJ5U1PfOC377pA4VnaWzDWrninHnvyZ4R9OpRK6dlgBAGZRkro50ChtRbM U/1zKKZPfQBV2yBFyd1z+08Mw5LLnbaX+WyAGogiHHxDyQJSgMlhwVmeAtxUz1WQaBP0 7rAXjS7BAKkEEoy+P2gz1wkbR3gayQycjsE3y40ZGLk7JvEkhwWKGTGgIVOTIsbO7t1S Nun0OELLPw8p0peYtTtdYDHSrxzVlMGDUoPTWT/r9QoCGYOt9MAPliEMAjFAPtuCCged RDMw== X-Gm-Message-State: AOAM530xhRrOlNLzX63R1SPWiJteClRes5j0Yx57C/PX8jF+OlhrCS5g 7kciHy93Xthutbte7NM3SRErMF2waxIRMQ== X-Google-Smtp-Source: ABdhPJz+9MN6fSv19A9U8ZT4mJ8rPZynaF1HjfX+tsHESnb8S6haDB4VUcFrg5iKmoKi8j3D2o9vpQ== X-Received: by 2002:aa7:83c9:0:b029:158:11ce:4672 with SMTP id j9-20020aa783c90000b029015811ce4672mr24916131pfn.23.1605135872567; Wed, 11 Nov 2020 15:04:32 -0800 (PST) Received: from localhost.localdomain (c-71-56-157-77.hsd1.or.comcast.net. [71.56.157.77]) by smtp.gmail.com with ESMTPSA id n27sm3867767pfq.59.2020.11.11.15.04.31 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 15:04:31 -0800 (PST) From: Luiz Augusto von Dentz To: linux-bluetooth@vger.kernel.org Subject: [PATCH v2 07/10] mgmt-tester: Print unexpected command responses Date: Wed, 11 Nov 2020 15:04:18 -0800 Message-Id: <20201111230421.3364932-8-luiz.dentz@gmail.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201111230421.3364932-1-luiz.dentz@gmail.com> References: <20201111230421.3364932-1-luiz.dentz@gmail.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Luiz Augusto von Dentz This prints the difference between the command response and the expected command response to make it easier to debug. --- tools/mgmt-tester.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/tools/mgmt-tester.c b/tools/mgmt-tester.c index a5bfa1ce1..bb8eb578c 100644 --- a/tools/mgmt-tester.c +++ b/tools/mgmt-tester.c @@ -6315,6 +6315,9 @@ static void command_generic_callback(uint8_t status, uint16_t length, if (expect_param && expect_len > 0 && memcmp(param, expect_param, length)) { tester_warn("Unexpected cmd response parameter value"); + util_hexdump('>', param, length, print_debug, ""); + util_hexdump('!', expect_param, length, print_debug, + ""); tester_test_failed(); return; } From patchwork Wed Nov 11 23:04:19 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luiz Augusto von Dentz X-Patchwork-Id: 11898825 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.6 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4B335C4742C for ; Thu, 12 Nov 2020 01:48:52 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id EC5AD205ED for ; Thu, 12 Nov 2020 01:48:51 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="o/GoLZxJ" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728554AbgKLBdM (ORCPT ); Wed, 11 Nov 2020 20:33:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57854 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727773AbgKKXG2 (ORCPT ); Wed, 11 Nov 2020 18:06:28 -0500 Received: from mail-pg1-x544.google.com (mail-pg1-x544.google.com [IPv6:2607:f8b0:4864:20::544]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1C310C061A49 for ; Wed, 11 Nov 2020 15:04:34 -0800 (PST) Received: by mail-pg1-x544.google.com with SMTP id z24so2504567pgk.3 for ; Wed, 11 Nov 2020 15:04:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=V3N7kdL3t6+aPZZJFLnthlCjtlpwpOWNONCQrW7ZWzY=; b=o/GoLZxJxqkQkh+fmFx3KTmwX9Tx/q/ngp8oHJq6IPXbseRY+Eh+jAhW6E2RM04TF0 egWvgDGyXeBuv+MZN/9bv0ji+t4QjJY1et9BBgNdvf9ibkdojEI9t4KluGuiZv7BwU3o /MzNNpM+8bQUu2Ck1ddEfsxLSaOJ3JH+V7XYuygISdUaKhzFU7Oj2ogkt2ceevUbzYOy JRVX7du8pX0Y7XuhvFv+nNiWPTK5lWCs01yBUR7Fe82bnjmTBZ0btx1CQRlBcMIcHn7V K3OMOKavihtJRAPQOJOR8zeYcZ5yPuO3pOTjiAAYGHJ+ttkkIaW8riWfTMb1RfQr8Luk UNHA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=V3N7kdL3t6+aPZZJFLnthlCjtlpwpOWNONCQrW7ZWzY=; b=iGxivaznLUMvhK6B83+EqnQel3aqVqeDfpPhR9mZHAAJqtl9bNmIjLL1+B0shagwp1 p/aIrzV4iXIOlEaQ5e91pe7VbAMY5F678TUWoQ9oKoIV0xb2nNcnVxl/dobOAMPEGIfO V+mYVqcZDThaPTy7HrB65K+ybaejggXn+52Bogt54B07L1VmvVp5YcSorIaOwltpFJWD TmwcKOqDE+lNz1UeGb0/v90/l4K3MlMscKCkm/RSiiVjAIzM/3d8HPsh49wKFsxoAJ9A qserIM/UzVhSazG7fJXBUoqZ4wsmG/1H+h16xC+zy9lOYLvMcqo3K1Un8eYA9Tq3jplc l1iw== X-Gm-Message-State: AOAM531P8ZcfrrJExibpVkJk0KNlsB0y/ANoEzX9aEJCkx1CvMJoINpN JTsMf84s+yq6zZ9p5FQrduUC+EN9zQX2uw== X-Google-Smtp-Source: ABdhPJx0Wjz/JnWFKBLFcxsKUC1iXFaU0d2+kDkVX6J+FxXCYOQIAjB148X73E8aXO0WUhwsSfW3jg== X-Received: by 2002:a62:7ccd:0:b029:18b:9083:ae1b with SMTP id x196-20020a627ccd0000b029018b9083ae1bmr24108791pfc.27.1605135873435; Wed, 11 Nov 2020 15:04:33 -0800 (PST) Received: from localhost.localdomain (c-71-56-157-77.hsd1.or.comcast.net. [71.56.157.77]) by smtp.gmail.com with ESMTPSA id n27sm3867767pfq.59.2020.11.11.15.04.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 15:04:32 -0800 (PST) From: Luiz Augusto von Dentz To: linux-bluetooth@vger.kernel.org Subject: [PATCH v2 08/10] mgmt-tester: Update expected advertisement flags Date: Wed, 11 Nov 2020 15:04:19 -0800 Message-Id: <20201111230421.3364932-9-luiz.dentz@gmail.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201111230421.3364932-1-luiz.dentz@gmail.com> References: <20201111230421.3364932-1-luiz.dentz@gmail.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Luiz Augusto von Dentz This updates the expected advertisement flags which now includes MGMT_ADV_FLAG_CAN_SET_TX_POWER and MGMT_ADV_FLAG_HW_OFFLOAD. --- tools/mgmt-tester.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/mgmt-tester.c b/tools/mgmt-tester.c index bb8eb578c..0540efafc 100644 --- a/tools/mgmt-tester.c +++ b/tools/mgmt-tester.c @@ -6867,10 +6867,10 @@ static const struct generic_data set_appearance_success = { }; static const uint8_t read_adv_features_rsp_3[] = { - 0xff, 0x03, 0x00, 0x00, /* supported flags */ + 0xff, 0x0f, 0x00, 0x00, /* supported flags */ 0x1f, /* max_adv_data_len */ 0x1f, /* max_scan_rsp_len */ - 0x05, /* max_instances */ + 0x01, /* max_instances */ 0x00, /* num_instances */ }; From patchwork Wed Nov 11 23:04:20 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luiz Augusto von Dentz X-Patchwork-Id: 11898813 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.6 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id F00B1C388F9 for ; Thu, 12 Nov 2020 01:48:36 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id A034C205ED for ; Thu, 12 Nov 2020 01:48:36 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="ZA5C5TAJ" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728565AbgKLBdQ (ORCPT ); Wed, 11 Nov 2020 20:33:16 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57856 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727790AbgKKXG3 (ORCPT ); Wed, 11 Nov 2020 18:06:29 -0500 Received: from mail-pl1-x634.google.com (mail-pl1-x634.google.com [IPv6:2607:f8b0:4864:20::634]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3437AC061A4A for ; Wed, 11 Nov 2020 15:04:35 -0800 (PST) Received: by mail-pl1-x634.google.com with SMTP id k7so1769632plk.3 for ; Wed, 11 Nov 2020 15:04:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=83p4V2mr5pRBnhwAKvGaj5JJU8zNRKrOY+gpm6vhs1c=; b=ZA5C5TAJA6I+ikGjRKPBEnIT/b23oToZRItTUcJ7mHTo9h8Qjhe71lznltYqjkbhB9 JkZ/vYqdvArMgOpCaFn8b/ouu5jQov6DkOruh87NgPg77Z6l+xvEOjuPsneGiaN4H/xS 7VOSYljEZ+/PjuEa8fhotQpVQ6BCJvavI6/dLWJLZ0tR8VNS1u41CAN3dccSk272gC+Z VJCSvbdDhZxFUISS6mkyhEnVf6HTN4Q7pMqv8sGO3vl8djevnH6tWeHkdoU9JG1DDrzS CRAox9tAlxDxRi733lKn7TfZzJ3Um+54wNUHChu8yLi9sWXNAgru65rWocJFk4ZYrjxQ wMLw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=83p4V2mr5pRBnhwAKvGaj5JJU8zNRKrOY+gpm6vhs1c=; b=B3mhj0Gtb08g9ionVsr7cFJAsvurdPEvf0cseojgA45WASh5SVTe27tnfRRbxOW5te 1cT+7jtIUBys04OgZccGaUzj7Aa6CjXTeHhazH/Lp1mNu50ZHUqzsmjH1LZ9M+OXj522 vmcYE+O4z5oaToQHjWVec4Jamsd+AIaP1kw4ewFH+VgJ/v6Fp669P9N8mIKbmqhNrXfX VP5joKU8r5qlAbX3kiZd57qDLNA7M7VBoWQkLl0kom1lrNSBV1YLGKBi2DvvF49Y0qpP CDjamTRHYauIz0UZBzyAFgU2bC6BMM9E0DHgt9S5OTGf4BNW1CJ53YuO3FwSv9LJZcWW QY7Q== X-Gm-Message-State: AOAM532qPgn4kjgApjM/kGo9MlWSbiGga91IfjL2oez5ArHQjgQg/alH TwTa7mej6etKB3w+816ZkuTgn/21eCp+wA== X-Google-Smtp-Source: ABdhPJzf1L1UHYYgSeZHtS2cS0QjebiNNC4P5zIyMYnERjASN7C+wA6ZoJJ6LEtN00c+l3kvrleePw== X-Received: by 2002:a17:902:b688:b029:d6:ad52:ffab with SMTP id c8-20020a170902b688b02900d6ad52ffabmr12647461pls.61.1605135874525; Wed, 11 Nov 2020 15:04:34 -0800 (PST) Received: from localhost.localdomain (c-71-56-157-77.hsd1.or.comcast.net. [71.56.157.77]) by smtp.gmail.com with ESMTPSA id n27sm3867767pfq.59.2020.11.11.15.04.33 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 15:04:33 -0800 (PST) From: Luiz Augusto von Dentz To: linux-bluetooth@vger.kernel.org Subject: [PATCH v2 09/10] hciemu: Fix crash when test is aborted during pre setup Date: Wed, 11 Nov 2020 15:04:20 -0800 Message-Id: <20201111230421.3364932-10-luiz.dentz@gmail.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201111230421.3364932-1-luiz.dentz@gmail.com> References: <20201111230421.3364932-1-luiz.dentz@gmail.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Luiz Augusto von Dentz If the tester_pre_setup_failed is called all timeout related to the test must be cancelled as the test should have been freed by the application and the next test is about to start. --- emulator/hciemu.c | 8 +++++++- src/shared/tester.c | 5 +++++ 2 files changed, 12 insertions(+), 1 deletion(-) diff --git a/emulator/hciemu.c b/emulator/hciemu.c index fd6029deb..961de6359 100644 --- a/emulator/hciemu.c +++ b/emulator/hciemu.c @@ -43,6 +43,7 @@ struct hciemu { guint host_source; guint master_source; guint client_source; + guint start_source; struct queue *post_command_hooks; char bdaddr_str[18]; @@ -297,6 +298,8 @@ static gboolean start_stack(gpointer user_data) { struct hciemu *hciemu = user_data; + hciemu->start_source = 0; + bthost_start(hciemu->host_stack); return FALSE; @@ -353,7 +356,7 @@ struct hciemu *hciemu_new(enum hciemu_type type) return NULL; } - g_idle_add(start_stack, hciemu); + hciemu->start_source = g_idle_add(start_stack, hciemu); return hciemu_ref(hciemu); } @@ -378,6 +381,9 @@ void hciemu_unref(struct hciemu *hciemu) queue_destroy(hciemu->post_command_hooks, destroy_command_hook); + if (hciemu->start_source) + g_source_remove(hciemu->start_source); + g_source_remove(hciemu->host_source); g_source_remove(hciemu->client_source); g_source_remove(hciemu->master_source); diff --git a/src/shared/tester.c b/src/shared/tester.c index 0c31e8b1c..af33a79cd 100644 --- a/src/shared/tester.c +++ b/src/shared/tester.c @@ -541,6 +541,11 @@ void tester_pre_setup_failed(void) if (test->stage != TEST_STAGE_PRE_SETUP) return; + if (test->timeout_id > 0) { + g_source_remove(test->timeout_id); + test->timeout_id = 0; + } + print_progress(test->name, COLOR_RED, "pre setup failed"); g_idle_add(done_callback, test); From patchwork Wed Nov 11 23:04:21 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Luiz Augusto von Dentz X-Patchwork-Id: 11898777 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.6 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5A213C388F9 for ; Thu, 12 Nov 2020 01:33:19 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 01A7A20809 for ; Thu, 12 Nov 2020 01:33:18 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="Quhva8SF" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728571AbgKLBdR (ORCPT ); Wed, 11 Nov 2020 20:33:17 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57858 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727796AbgKKXG3 (ORCPT ); Wed, 11 Nov 2020 18:06:29 -0500 Received: from mail-pf1-x42a.google.com (mail-pf1-x42a.google.com [IPv6:2607:f8b0:4864:20::42a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 424C7C061A4B for ; Wed, 11 Nov 2020 15:04:36 -0800 (PST) Received: by mail-pf1-x42a.google.com with SMTP id y7so2666184pfq.11 for ; Wed, 11 Nov 2020 15:04:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=CyCLFBOWsD7IBPaN8oe2uAyPXTqgGQd+HZN7ekvkkvs=; b=Quhva8SFC1z/81pmjzzvbv4wa3LFfYKMW04ueVJYYLq5MDtH8NCFmiD2BuMq6hjbZE wlgVMmPO9LdCohoreSTr/HMBflzkuFW+fKyz1JchPL0wT+I/pKsLIJWWOLnWuyUAxNTy pRftCMUxn64VRujOs1L1a/fKOIZYz44hDsjPZQcozCpgT8Pd4k+9nqLOfy+48f+OzkHx zts9d5LHIDqyzlop5RF5vuyvmQbX2ATQucpkIoTFW74p5Cdo04+S3oG2w/ljuH8Ks78F UgW30v4hIduR3MwFdGx0st/KF6T61LO0AuQ26n/GEp4yiXV/VLf0RP/TJ7yJzcapKAAP /o0g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=CyCLFBOWsD7IBPaN8oe2uAyPXTqgGQd+HZN7ekvkkvs=; b=fffROg1i9Uih9ybeYsxdoN2ODH88LH/L26YpUD4TD/9/k5nhUIycEWPFRf1ZKyxBAm saC5zIGysGcWmtrYANpnmz1mvRna5d3yfpnclSi7lsQXVDinjsSRCypZPUn115JFUvZV 1sbvlSMrSK/l/snxher5RsDSKFXmtvZz5wwtopjk6ZBvzC4fgnr1RPTWmwzxD+wbsm2B QWX+DpTrJRpUyCHIGyDIlDDlY5oHS1QjrA28oJonMb2SPz9Cqu5eaBYuyDuiCKzLCA+J zHwRnMGUWobkI/VbZIFuJMBK3icDo0GvuBUEThTyBWfh1HWNVShBtPs0OtZl6ca8y0Iw MBpg== X-Gm-Message-State: AOAM533cc9iu8XoPtBV5tzFRmb0LGWNi2hwYaUCErMc3XBp3NzNYyWN8 DMKzvprdrLJAYTftq7Lt5KjmqHl3mSjyAg== X-Google-Smtp-Source: ABdhPJyjdJbay7Lyr36Dhci6O+3otqzqN+Yoewbxn/Pwk7mDwlNpg1EeWXKxt00YjOMeH3PaS/8HZA== X-Received: by 2002:aa7:9f5a:0:b029:18b:594b:fb6c with SMTP id h26-20020aa79f5a0000b029018b594bfb6cmr25697552pfr.45.1605135875566; Wed, 11 Nov 2020 15:04:35 -0800 (PST) Received: from localhost.localdomain (c-71-56-157-77.hsd1.or.comcast.net. [71.56.157.77]) by smtp.gmail.com with ESMTPSA id n27sm3867767pfq.59.2020.11.11.15.04.34 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Nov 2020 15:04:35 -0800 (PST) From: Luiz Augusto von Dentz To: linux-bluetooth@vger.kernel.org Subject: [PATCH v2 10/10] bthost: Fix sending uninitilized data Date: Wed, 11 Nov 2020 15:04:21 -0800 Message-Id: <20201111230421.3364932-11-luiz.dentz@gmail.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201111230421.3364932-1-luiz.dentz@gmail.com> References: <20201111230421.3364932-1-luiz.dentz@gmail.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org From: Luiz Augusto von Dentz Syscall param writev(vector[...]) points to uninitialised byte(s) at 0x4A8A497: writev (in /usr/lib64/libc-2.31.so) by 0x1365C1: send_packet (bthost.c:509) by 0x1365C1: send_packet (bthost.c:492) by 0x1365C1: next_cmd (bthost.c:737) by 0x137578: evt_cmd_complete (bthost.c:882) by 0x137578: process_evt (bthost.c:1343) by 0x137578: bthost_receive_h4 (bthost.c:2414) by 0x12DF49: receive_bthost.part.0 (hciemu.c:134) by 0x48B978E: g_main_context_dispatch (in /usr/lib64/libglib-2.0.so.0.6400.6) by 0x48B9B17: ??? (in /usr/lib64/libglib-2.0.so.0.6400.6) by 0x48B9E32: g_main_loop_run (in /usr/lib64/libglib-2.0.so.0.6400.6) by 0x14A664: mainloop_run (mainloop-glib.c:66) by 0x14AA41: mainloop_run_with_signal (mainloop-notify.c:188) by 0x149A7B: tester_run (tester.c:871) by 0x129C77: main (mgmt-tester.c:10219) Address 0x4c48c05 is 21 bytes inside a block of size 280 alloc'd at 0x483CAE9: calloc (vg_replace_malloc.c:760) by 0x136487: queue_command (bthost.c:472) by 0x136487: send_command (bthost.c:715) by 0x13948A: bthost_set_ext_adv_enable (bthost.c:2581) by 0x12CEBF: trigger_device_found (mgmt-tester.c:8513) by 0x148C9A: wait_callback (tester.c:749) by 0x48BA330: ??? (in /usr/lib64/libglib-2.0.so.0.6400.6) by 0x48B978E: g_main_context_dispatch (in /usr/lib64/libglib-2.0.so.0.6400.6) by 0x48B9B17: ??? (in /usr/lib64/libglib-2.0.so.0.6400.6) by 0x48B9E32: g_main_loop_run (in /usr/lib64/libglib-2.0.so.0.6400.6) by 0x14A664: mainloop_run (mainloop-glib.c:66) by 0x14AA41: mainloop_run_with_signal (mainloop-notify.c:188) by 0x149A7B: tester_run (tester.c:871) --- emulator/bthost.c | 1 + 1 file changed, 1 insertion(+) diff --git a/emulator/bthost.c b/emulator/bthost.c index f29bda06e..3b42c0664 100644 --- a/emulator/bthost.c +++ b/emulator/bthost.c @@ -2577,6 +2577,7 @@ void bthost_set_ext_adv_enable(struct bthost *bthost, uint8_t enable) send_command(bthost, BT_HCI_CMD_LE_SET_EXT_ADV_PARAMS, &cp, sizeof(cp)); + memset(&cp_enable, 0, sizeof(cp_enable)); cp_enable.enable = enable; send_command(bthost, BT_HCI_CMD_LE_SET_EXT_ADV_ENABLE, &cp_enable, sizeof(cp_enable));