diff options
Diffstat (limited to 'stack/bnep/bnep_utils.c')
-rw-r--r-- | stack/bnep/bnep_utils.c | 1449 |
1 files changed, 1449 insertions, 0 deletions
diff --git a/stack/bnep/bnep_utils.c b/stack/bnep/bnep_utils.c new file mode 100644 index 0000000..22c2730 --- /dev/null +++ b/stack/bnep/bnep_utils.c @@ -0,0 +1,1449 @@ +/*****************************************************************************/ +/* */ +/* Name: bnep_utils.c */ +/* */ +/* Description: this file contains BNEP utility functions */ +/* */ +/* */ +/* Copyright (c) 2001-2004, WIDCOMM Inc., All Rights Reserved. */ +/* WIDCOMM Bluetooth Core. Proprietary and confidential. */ +/*****************************************************************************/ +#include <stdio.h> +#include <string.h> +#include "gki.h" +#include "bt_types.h" +#include "bnep_int.h" +#include "btu.h" +#include "btm_int.h" + + +/********************************************************************************/ +/* L O C A L F U N C T I O N P R O T O T Y P E S */ +/********************************************************************************/ +static UINT8 *bnepu_init_hdr (BT_HDR *p_buf, UINT16 hdr_len, UINT8 pkt_type); + +void bnepu_process_peer_multicast_filter_set (tBNEP_CONN *p_bcb, UINT8 *p_filters, UINT16 len); +void bnepu_send_peer_multicast_filter_rsp (tBNEP_CONN *p_bcb, UINT16 response_code); + + +/******************************************************************************* +** +** Function bnepu_find_bcb_by_cid +** +** Description This function searches the bcb table for an entry with the +** passed CID. +** +** Returns the BCB address, or NULL if not found. +** +*******************************************************************************/ +tBNEP_CONN *bnepu_find_bcb_by_cid (UINT16 cid) +{ + UINT16 xx; + tBNEP_CONN *p_bcb; + + /* Look through each connection control block */ + for (xx = 0, p_bcb = bnep_cb.bcb; xx < BNEP_MAX_CONNECTIONS; xx++, p_bcb++) + { + if ((p_bcb->con_state != BNEP_STATE_IDLE) && (p_bcb->l2cap_cid == cid)) + return (p_bcb); + } + + /* If here, not found */ + return (NULL); +} + + +/******************************************************************************* +** +** Function bnepu_find_bcb_by_bd_addr +** +** Description This function searches the BCB table for an entry with the +** passed Bluetooth Address. +** +** Returns the BCB address, or NULL if not found. +** +*******************************************************************************/ +tBNEP_CONN *bnepu_find_bcb_by_bd_addr (UINT8 *p_bda) +{ + UINT16 xx; + tBNEP_CONN *p_bcb; + + /* Look through each connection control block */ + for (xx = 0, p_bcb = bnep_cb.bcb; xx < BNEP_MAX_CONNECTIONS; xx++, p_bcb++) + { + if (p_bcb->con_state != BNEP_STATE_IDLE) + { + if (!memcmp ((UINT8 *)(p_bcb->rem_bda), p_bda, BD_ADDR_LEN)) + return (p_bcb); + } + } + + /* If here, not found */ + return (NULL); +} + + +/******************************************************************************* +** +** Function bnepu_allocate_bcb +** +** Description This function allocates a new BCB. +** +** Returns BCB address, or NULL if none available. +** +*******************************************************************************/ +tBNEP_CONN *bnepu_allocate_bcb (BD_ADDR p_rem_bda) +{ + UINT16 xx; + tBNEP_CONN *p_bcb; + + /* Look through each connection control block for a free one */ + for (xx = 0, p_bcb = bnep_cb.bcb; xx < BNEP_MAX_CONNECTIONS; xx++, p_bcb++) + { + if (p_bcb->con_state == BNEP_STATE_IDLE) + { + memset ((UINT8 *)p_bcb, 0, sizeof (tBNEP_CONN)); + + p_bcb->conn_tle.param = (UINT32) p_bcb; + + memcpy ((UINT8 *)(p_bcb->rem_bda), (UINT8 *)p_rem_bda, BD_ADDR_LEN); + p_bcb->handle = xx + 1; + + return (p_bcb); + } + } + + /* If here, no free BCB found */ + return (NULL); +} + + +/******************************************************************************* +** +** Function bnepu_release_bcb +** +** Description This function releases a BCB. +** +** Returns void +** +*******************************************************************************/ +void bnepu_release_bcb (tBNEP_CONN *p_bcb) +{ + /* Ensure timer is stopped */ + btu_stop_timer (&p_bcb->conn_tle); + + /* Drop any response pointer we may be holding */ + p_bcb->con_state = BNEP_STATE_IDLE; + p_bcb->p_pending_data = NULL; + + /* Free transmit queue */ + while (p_bcb->xmit_q.count) + { + GKI_freebuf (GKI_dequeue (&p_bcb->xmit_q)); + } +} + + +/******************************************************************************* +** +** Function bnep_send_conn_req +** +** Description This function sends a BNEP connection request to peer +** +** Returns void +** +*******************************************************************************/ +void bnep_send_conn_req (tBNEP_CONN *p_bcb) +{ + BT_HDR *p_buf; + UINT8 *p, *p_start; + + BNEP_TRACE_DEBUG1 ("BNEP sending setup req with dst uuid %x", p_bcb->dst_uuid.uu.uuid16); + if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) + { + BNEP_TRACE_ERROR0 ("BNEP - not able to send connection request"); + return; + } + + p_buf->offset = L2CAP_MIN_OFFSET; + p = p_start = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; + + /* Put in BNEP frame type - filter control */ + UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); + + /* Put in filter message type - set filters */ + UINT8_TO_BE_STREAM (p, BNEP_SETUP_CONNECTION_REQUEST_MSG); + + UINT8_TO_BE_STREAM (p, p_bcb->dst_uuid.len); + + if (p_bcb->dst_uuid.len == 2) + { + UINT16_TO_BE_STREAM (p, p_bcb->dst_uuid.uu.uuid16); + UINT16_TO_BE_STREAM (p, p_bcb->src_uuid.uu.uuid16); + } +#if (defined (BNEP_SUPPORTS_ALL_UUID_LENGTHS) && BNEP_SUPPORTS_ALL_UUID_LENGTHS == TRUE) + else if (p_bcb->dst_uuid.len == 4) + { + UINT32_TO_BE_STREAM (p, p_bcb->dst_uuid.uu.uuid32); + UINT32_TO_BE_STREAM (p, p_bcb->src_uuid.uu.uuid32); + } + else + { + memcpy (p, p_bcb->dst_uuid.uu.uuid128, p_bcb->dst_uuid.len); + p += p_bcb->dst_uuid.len; + memcpy (p, p_bcb->src_uuid.uu.uuid128, p_bcb->dst_uuid.len); + p += p_bcb->dst_uuid.len; + } +#endif + + p_buf->len = (UINT16)(p - p_start); + + bnepu_check_send_packet (p_bcb, p_buf); +} + + +/******************************************************************************* +** +** Function bnep_send_conn_responce +** +** Description This function sends a BNEP setup response to peer +** +** Returns void +** +*******************************************************************************/ +void bnep_send_conn_responce (tBNEP_CONN *p_bcb, UINT16 resp_code) +{ + BT_HDR *p_buf; + UINT8 *p; + + BNEP_TRACE_EVENT1 ("BNEP - bnep_send_conn_responce for CID: 0x%x", p_bcb->l2cap_cid); + if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) + { + BNEP_TRACE_ERROR0 ("BNEP - not able to send connection response"); + return; + } + + p_buf->offset = L2CAP_MIN_OFFSET; + p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; + + /* Put in BNEP frame type - filter control */ + UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); + + /* Put in filter message type - set filters */ + UINT8_TO_BE_STREAM (p, BNEP_SETUP_CONNECTION_RESPONSE_MSG); + + UINT16_TO_BE_STREAM (p, resp_code); + + p_buf->len = 4; + + bnepu_check_send_packet (p_bcb, p_buf); + +} + + +/******************************************************************************* +** +** Function bnepu_send_peer_our_filters +** +** Description This function sends our filters to a peer +** +** Returns void +** +*******************************************************************************/ +void bnepu_send_peer_our_filters (tBNEP_CONN *p_bcb) +{ +#if (defined (BNEP_SUPPORTS_PROT_FILTERS) && BNEP_SUPPORTS_PROT_FILTERS == TRUE) + BT_HDR *p_buf; + UINT8 *p; + UINT16 xx; + + BNEP_TRACE_DEBUG0 ("BNEP sending peer our filters"); + + if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) + { + BNEP_TRACE_ERROR0 ("BNEP - no buffer send filters"); + return; + } + + p_buf->offset = L2CAP_MIN_OFFSET; + p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; + + /* Put in BNEP frame type - filter control */ + UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); + + /* Put in filter message type - set filters */ + UINT8_TO_BE_STREAM (p, BNEP_FILTER_NET_TYPE_SET_MSG); + + UINT16_TO_BE_STREAM (p, (4 * p_bcb->sent_num_filters)); + for (xx = 0; xx < p_bcb->sent_num_filters; xx++) + { + UINT16_TO_BE_STREAM (p, p_bcb->sent_prot_filter_start[xx]); + UINT16_TO_BE_STREAM (p, p_bcb->sent_prot_filter_end[xx]); + } + + p_buf->len = 4 + (4 * p_bcb->sent_num_filters); + + bnepu_check_send_packet (p_bcb, p_buf); + + p_bcb->con_flags |= BNEP_FLAGS_FILTER_RESP_PEND; + + /* Start timer waiting for setup response */ + btu_start_timer (&p_bcb->conn_tle, BTU_TTYPE_BNEP, BNEP_FILTER_SET_TIMEOUT); +#endif +} + + +/******************************************************************************* +** +** Function bnepu_send_peer_our_multi_filters +** +** Description This function sends our multicast filters to a peer +** +** Returns void +** +*******************************************************************************/ +void bnepu_send_peer_our_multi_filters (tBNEP_CONN *p_bcb) +{ +#if (defined (BNEP_SUPPORTS_MULTI_FILTERS) && BNEP_SUPPORTS_MULTI_FILTERS == TRUE) + BT_HDR *p_buf; + UINT8 *p; + UINT16 xx; + + BNEP_TRACE_DEBUG0 ("BNEP sending peer our multicast filters"); + + if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) + { + BNEP_TRACE_ERROR0 ("BNEP - no buffer to send multicast filters"); + return; + } + + p_buf->offset = L2CAP_MIN_OFFSET; + p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; + + /* Put in BNEP frame type - filter control */ + UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); + + /* Put in filter message type - set filters */ + UINT8_TO_BE_STREAM (p, BNEP_FILTER_MULTI_ADDR_SET_MSG); + + UINT16_TO_BE_STREAM (p, (2 * BD_ADDR_LEN * p_bcb->sent_mcast_filters)); + for (xx = 0; xx < p_bcb->sent_mcast_filters; xx++) + { + memcpy (p, p_bcb->sent_mcast_filter_start[xx], BD_ADDR_LEN); + p += BD_ADDR_LEN; + memcpy (p, p_bcb->sent_mcast_filter_end[xx], BD_ADDR_LEN); + p += BD_ADDR_LEN; + } + + p_buf->len = 4 + (2 * BD_ADDR_LEN * p_bcb->sent_mcast_filters); + + bnepu_check_send_packet (p_bcb, p_buf); + + p_bcb->con_flags |= BNEP_FLAGS_MULTI_RESP_PEND; + + /* Start timer waiting for setup response */ + btu_start_timer (&p_bcb->conn_tle, BTU_TTYPE_BNEP, BNEP_FILTER_SET_TIMEOUT); +#endif +} + + +/******************************************************************************* +** +** Function bnepu_send_peer_filter_rsp +** +** Description This function sends a filter response to a peer +** +** Returns void +** +*******************************************************************************/ +void bnepu_send_peer_filter_rsp (tBNEP_CONN *p_bcb, UINT16 response_code) +{ + BT_HDR *p_buf; + UINT8 *p; + + BNEP_TRACE_DEBUG0 ("BNEP sending filter response"); + if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) + { + BNEP_TRACE_ERROR0 ("BNEP - no buffer filter rsp"); + return; + } + + p_buf->offset = L2CAP_MIN_OFFSET; + p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; + + /* Put in BNEP frame type - filter control */ + UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); + + /* Put in filter message type - set filters */ + UINT8_TO_BE_STREAM (p, BNEP_FILTER_NET_TYPE_RESPONSE_MSG); + + UINT16_TO_BE_STREAM (p, response_code); + + p_buf->len = 4; + + bnepu_check_send_packet (p_bcb, p_buf); +} + + +/******************************************************************************* +** +** Function bnep_send_command_not_understood +** +** Description This function sends a BNEP command not understood message +** +** Returns void +** +*******************************************************************************/ +void bnep_send_command_not_understood (tBNEP_CONN *p_bcb, UINT8 cmd_code) +{ + BT_HDR *p_buf; + UINT8 *p; + + BNEP_TRACE_EVENT2 ("BNEP - bnep_send_command_not_understood for CID: 0x%x, cmd 0x%x", p_bcb->l2cap_cid, cmd_code); + if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) + { + BNEP_TRACE_ERROR0 ("BNEP - not able to send connection response"); + return; + } + + p_buf->offset = L2CAP_MIN_OFFSET; + p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; + + /* Put in BNEP frame type - filter control */ + UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); + + /* Put in filter message type - set filters */ + UINT8_TO_BE_STREAM (p, BNEP_CONTROL_COMMAND_NOT_UNDERSTOOD); + + UINT8_TO_BE_STREAM (p, cmd_code); + + p_buf->len = 3; + + bnepu_check_send_packet (p_bcb, p_buf); + +} + + +/******************************************************************************* +** +** Function bnepu_check_send_packet +** +** Description This function tries to send a packet to L2CAP. +** If L2CAP is flow controlled, it enqueues the +** packet to the transmit queue +** +** Returns void +** +*******************************************************************************/ +void bnepu_check_send_packet (tBNEP_CONN *p_bcb, BT_HDR *p_buf) +{ + BNEP_TRACE_EVENT1 ("BNEP - bnepu_check_send_packet for CID: 0x%x", p_bcb->l2cap_cid); + if (p_bcb->con_flags & BNEP_FLAGS_L2CAP_CONGESTED) + { + if (p_bcb->xmit_q.count >= BNEP_MAX_XMITQ_DEPTH) + { + BNEP_TRACE_EVENT1 ("BNEP - congested, dropping buf, CID: 0x%x", p_bcb->l2cap_cid); + + GKI_freebuf (p_buf); + } + else + { + GKI_enqueue (&p_bcb->xmit_q, p_buf); + } + } + else + { + L2CA_DataWrite (p_bcb->l2cap_cid, p_buf); + } +} + + +/******************************************************************************* +** +** Function bnepu_build_bnep_hdr +** +** Description This function builds the BNEP header for a packet +** Extension headers are not sent yet, so there is no +** check for that. +** +** Returns void +** +*******************************************************************************/ +void bnepu_build_bnep_hdr (tBNEP_CONN *p_bcb, BT_HDR *p_buf, UINT16 protocol, + UINT8 *p_src_addr, UINT8 *p_dest_addr, BOOLEAN fw_ext_present) +{ + UINT8 ext_bit, *p = (UINT8 *)NULL; + UINT8 type = BNEP_FRAME_COMPRESSED_ETHERNET; + + ext_bit = fw_ext_present ? 0x80 : 0x00; + + if ((p_src_addr) && (memcmp (p_src_addr, bnep_cb.my_bda, BD_ADDR_LEN))) + type = BNEP_FRAME_COMPRESSED_ETHERNET_SRC_ONLY; + + if (memcmp (p_dest_addr, p_bcb->rem_bda, BD_ADDR_LEN)) + type = (type == BNEP_FRAME_COMPRESSED_ETHERNET) ? BNEP_FRAME_COMPRESSED_ETHERNET_DEST_ONLY : BNEP_FRAME_GENERAL_ETHERNET; + + if (!p_src_addr) + p_src_addr = (UINT8 *)bnep_cb.my_bda; + + switch (type) + { + case BNEP_FRAME_GENERAL_ETHERNET: + p = bnepu_init_hdr (p_buf, 15, (UINT8)(ext_bit | BNEP_FRAME_GENERAL_ETHERNET)); + + memcpy (p, p_dest_addr, BD_ADDR_LEN); + p += BD_ADDR_LEN; + + memcpy (p, p_src_addr, BD_ADDR_LEN); + p += BD_ADDR_LEN; + break; + + case BNEP_FRAME_COMPRESSED_ETHERNET: + p = bnepu_init_hdr (p_buf, 3, (UINT8)(ext_bit | BNEP_FRAME_COMPRESSED_ETHERNET)); + break; + + case BNEP_FRAME_COMPRESSED_ETHERNET_SRC_ONLY: + p = bnepu_init_hdr (p_buf, 9, (UINT8)(ext_bit | BNEP_FRAME_COMPRESSED_ETHERNET_SRC_ONLY)); + + memcpy (p, p_src_addr, BD_ADDR_LEN); + p += BD_ADDR_LEN; + break; + + case BNEP_FRAME_COMPRESSED_ETHERNET_DEST_ONLY: + p = bnepu_init_hdr (p_buf, 9, (UINT8)(ext_bit | BNEP_FRAME_COMPRESSED_ETHERNET_DEST_ONLY)); + + memcpy (p, p_dest_addr, BD_ADDR_LEN); + p += BD_ADDR_LEN; + break; + } + + UINT16_TO_BE_STREAM (p, protocol); +} + + +/******************************************************************************* +** +** Function bnepu_init_hdr +** +** Description This function initializes the BNEP header +** +** Returns pointer to header in buffer +** +*******************************************************************************/ +static UINT8 *bnepu_init_hdr (BT_HDR *p_buf, UINT16 hdr_len, UINT8 pkt_type) +{ + UINT8 *p = (UINT8 *)(p_buf + 1) + p_buf->offset; + + /* See if we need to make space in the buffer */ + if (p_buf->offset < (hdr_len + L2CAP_MIN_OFFSET)) + { + UINT16 xx, diff = BNEP_MINIMUM_OFFSET - p_buf->offset; + p = p + p_buf->len - 1; + for (xx = 0; xx < p_buf->len; xx++, p--) + p[diff] = *p; + + p_buf->offset = BNEP_MINIMUM_OFFSET; + p = (UINT8 *)(p_buf + 1) + p_buf->offset; + } + + p_buf->len += hdr_len; + p_buf->offset -= hdr_len; + p -= hdr_len; + + *p++ = pkt_type; + + return (p); +} + + +/******************************************************************************* +** +** Function bnep_process_setup_conn_req +** +** Description This function processes a peer's setup connection request +** message. The destination UUID is verified and response sent +** Connection open indication will be given to PAN profile +** +** Returns void +** +*******************************************************************************/ +void bnep_process_setup_conn_req (tBNEP_CONN *p_bcb, UINT8 *p_setup, UINT8 len) +{ + BNEP_TRACE_EVENT1 ("BNEP - bnep_process_setup_conn_req for CID: 0x%x", p_bcb->l2cap_cid); + + if (p_bcb->con_state != BNEP_STATE_CONN_SETUP && + p_bcb->con_state != BNEP_STATE_SEC_CHECKING && + p_bcb->con_state != BNEP_STATE_CONNECTED) + { + BNEP_TRACE_ERROR1 ("BNEP - setup request in bad state %d", p_bcb->con_state); + bnep_send_conn_responce (p_bcb, BNEP_SETUP_CONN_NOT_ALLOWED); + return; + } + + /* Check if we already initiated security check or if waiting for user responce */ + if (p_bcb->con_flags & BNEP_FLAGS_SETUP_RCVD) + { + BNEP_TRACE_EVENT0 ("BNEP - Duplicate Setup message received while doing security check"); + return; + } + + /* Check if peer is the originator */ + if (p_bcb->con_state != BNEP_STATE_CONNECTED && + (!(p_bcb->con_flags & BNEP_FLAGS_SETUP_RCVD)) && + (p_bcb->con_flags & BNEP_FLAGS_IS_ORIG)) + { + BNEP_TRACE_ERROR1 ("BNEP - setup request when we are originator", p_bcb->con_state); + bnep_send_conn_responce (p_bcb, BNEP_SETUP_CONN_NOT_ALLOWED); + return; + } + + if (p_bcb->con_state == BNEP_STATE_CONNECTED) + { + memcpy ((UINT8 *)&(p_bcb->prv_src_uuid), (UINT8 *)&(p_bcb->src_uuid), sizeof (tBT_UUID)); + memcpy ((UINT8 *)&(p_bcb->prv_dst_uuid), (UINT8 *)&(p_bcb->dst_uuid), sizeof (tBT_UUID)); + } + + p_bcb->dst_uuid.len = p_bcb->src_uuid.len = len; + + if (p_bcb->dst_uuid.len == 2) + { + /* because peer initiated connection keep src uuid as dst uuid */ + BE_STREAM_TO_UINT16 (p_bcb->src_uuid.uu.uuid16, p_setup); + BE_STREAM_TO_UINT16 (p_bcb->dst_uuid.uu.uuid16, p_setup); + + /* If nothing has changed don't bother the profile */ + if (p_bcb->con_state == BNEP_STATE_CONNECTED && + p_bcb->src_uuid.uu.uuid16 == p_bcb->prv_src_uuid.uu.uuid16 && + p_bcb->dst_uuid.uu.uuid16 == p_bcb->prv_dst_uuid.uu.uuid16) + { + bnep_send_conn_responce (p_bcb, BNEP_SETUP_CONN_OK); + return; + } + } +#if (defined (BNEP_SUPPORTS_ALL_UUID_LENGTHS) && BNEP_SUPPORTS_ALL_UUID_LENGTHS == TRUE) + else if (p_bcb->dst_uuid.len == 4) + { + BE_STREAM_TO_UINT32 (p_bcb->src_uuid.uu.uuid32, p_setup); + BE_STREAM_TO_UINT32 (p_bcb->dst_uuid.uu.uuid32, p_setup); + } + else if (p_bcb->dst_uuid.len == 16) + { + memcpy (p_bcb->src_uuid.uu.uuid128, p_setup, p_bcb->src_uuid.len); + p_setup += p_bcb->src_uuid.len; + memcpy (p_bcb->dst_uuid.uu.uuid128, p_setup, p_bcb->dst_uuid.len); + p_setup += p_bcb->dst_uuid.len; + } +#endif + else + { + BNEP_TRACE_ERROR1 ("BNEP - Bad UID len %d in ConnReq", p_bcb->dst_uuid.len); + bnep_send_conn_responce (p_bcb, BNEP_SETUP_INVALID_UUID_SIZE); + return; + } + + p_bcb->con_state = BNEP_STATE_SEC_CHECKING; + p_bcb->con_flags |= BNEP_FLAGS_SETUP_RCVD; + + BNEP_TRACE_EVENT1 ("BNEP initiating security check for incoming call for uuid 0x%x", p_bcb->src_uuid.uu.uuid16); +#if (!defined (BNEP_DO_AUTH_FOR_ROLE_SWITCH) || BNEP_DO_AUTH_FOR_ROLE_SWITCH == FALSE) + if (p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED) + bnep_sec_check_complete (p_bcb->rem_bda, p_bcb, BTM_SUCCESS); + else +#endif + btm_sec_mx_access_request (p_bcb->rem_bda, BT_PSM_BNEP, FALSE, + BTM_SEC_PROTO_BNEP, bnep_get_uuid32(&(p_bcb->src_uuid)), + &bnep_sec_check_complete, p_bcb); + + return; +} + + +/******************************************************************************* +** +** Function bnep_process_setup_conn_responce +** +** Description This function processes a peer's setup connection response +** message. The response code is verified and +** Connection open indication will be given to PAN profile +** +** Returns void +** +*******************************************************************************/ +void bnep_process_setup_conn_responce (tBNEP_CONN *p_bcb, UINT8 *p_setup) +{ + tBNEP_RESULT resp; + UINT16 resp_code; + + BNEP_TRACE_DEBUG0 ("BNEP received setup responce"); + /* The state should be either SETUP or CONNECTED */ + if (p_bcb->con_state != BNEP_STATE_CONN_SETUP) + { + /* Should we disconnect ? */ + BNEP_TRACE_ERROR1 ("BNEP - setup response in bad state %d", p_bcb->con_state); + return; + } + + /* Check if we are the originator */ + if (!(p_bcb->con_flags & BNEP_FLAGS_IS_ORIG)) + { + BNEP_TRACE_ERROR1 ("BNEP - setup response when we are not originator", p_bcb->con_state); + return; + } + + BE_STREAM_TO_UINT16 (resp_code, p_setup); + + switch (resp_code) + { + case BNEP_SETUP_INVALID_SRC_UUID: + resp = BNEP_CONN_FAILED_SRC_UUID; + break; + + case BNEP_SETUP_INVALID_DEST_UUID: + resp = BNEP_CONN_FAILED_DST_UUID; + break; + + case BNEP_SETUP_INVALID_UUID_SIZE: + resp = BNEP_CONN_FAILED_UUID_SIZE; + break; + + case BNEP_SETUP_CONN_NOT_ALLOWED: + default: + resp = BNEP_CONN_FAILED; + break; + } + + /* Check the responce code */ + if (resp_code != BNEP_SETUP_CONN_OK) + { + if (p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED) + { + BNEP_TRACE_EVENT1 ("BNEP - role change response is %d", resp_code); + + /* Restore the earlier BNEP status */ + p_bcb->con_state = BNEP_STATE_CONNECTED; + p_bcb->con_flags &= (~BNEP_FLAGS_SETUP_RCVD); + memcpy ((UINT8 *)&(p_bcb->src_uuid), (UINT8 *)&(p_bcb->prv_src_uuid), sizeof (tBT_UUID)); + memcpy ((UINT8 *)&(p_bcb->dst_uuid), (UINT8 *)&(p_bcb->prv_dst_uuid), sizeof (tBT_UUID)); + + /* Ensure timer is stopped */ + btu_stop_timer (&p_bcb->conn_tle); + p_bcb->re_transmits = 0; + + /* Tell the user if he has a callback */ + if (bnep_cb.p_conn_state_cb) + (*bnep_cb.p_conn_state_cb) (p_bcb->handle, p_bcb->rem_bda, resp, TRUE); + + return; + } + else + { + BNEP_TRACE_ERROR1 ("BNEP - setup response %d is not OK", resp_code); + + L2CA_DisconnectReq (p_bcb->l2cap_cid); + + /* Tell the user if he has a callback */ + if ((p_bcb->con_flags & BNEP_FLAGS_IS_ORIG) && (bnep_cb.p_conn_state_cb)) + (*bnep_cb.p_conn_state_cb) (p_bcb->handle, p_bcb->rem_bda, resp, FALSE); + + bnepu_release_bcb (p_bcb); + return; + } + } + + /* Received successful responce */ + bnep_connected (p_bcb); +} + + +/******************************************************************************* +** +** Function bnep_process_control_packet +** +** Description This function processes a peer's setup connection request +** message. The destination UUID is verified and response sent +** Connection open indication will be given to PAN profile +** +** Returns void +** +*******************************************************************************/ +UINT8 *bnep_process_control_packet (tBNEP_CONN *p_bcb, UINT8 *p, UINT16 *rem_len, BOOLEAN is_ext) +{ + UINT8 control_type; + BOOLEAN bad_pkt = FALSE; + UINT16 len, ext_len = 0; + + if (is_ext) + { + ext_len = *p++; + *rem_len = *rem_len - 1; + } + + control_type = *p++; + *rem_len = *rem_len - 1; + + BNEP_TRACE_EVENT3 ("BNEP processing control packet rem_len %d, is_ext %d, ctrl_type %d", *rem_len, is_ext, control_type); + + switch (control_type) + { + case BNEP_CONTROL_COMMAND_NOT_UNDERSTOOD: + BNEP_TRACE_ERROR1 ("BNEP Received Cmd not understood for ctl pkt type: %d", *p); + p++; + *rem_len = *rem_len - 1; + break; + + case BNEP_SETUP_CONNECTION_REQUEST_MSG: + len = *p++; + if (*rem_len < ((2 * len) + 1)) + { + bad_pkt = TRUE; + BNEP_TRACE_ERROR0 ("BNEP Received Setup message with bad length"); + break; + } + if (!is_ext) + bnep_process_setup_conn_req (p_bcb, p, (UINT8)len); + p += (2 * len); + *rem_len = *rem_len - (2 * len) - 1; + break; + + case BNEP_SETUP_CONNECTION_RESPONSE_MSG: + if (!is_ext) + bnep_process_setup_conn_responce (p_bcb, p); + p += 2; + *rem_len = *rem_len - 2; + break; + + case BNEP_FILTER_NET_TYPE_SET_MSG: + BE_STREAM_TO_UINT16 (len, p); + if (*rem_len < (len + 2)) + { + bad_pkt = TRUE; + BNEP_TRACE_ERROR0 ("BNEP Received Filter set message with bad length"); + break; + } + bnepu_process_peer_filter_set (p_bcb, p, len); + p += len; + *rem_len = *rem_len - len - 2; + break; + + case BNEP_FILTER_NET_TYPE_RESPONSE_MSG: + bnepu_process_peer_filter_rsp (p_bcb, p); + p += 2; + *rem_len = *rem_len - 2; + break; + + case BNEP_FILTER_MULTI_ADDR_SET_MSG: + BE_STREAM_TO_UINT16 (len, p); + if (*rem_len < (len + 2)) + { + bad_pkt = TRUE; + BNEP_TRACE_ERROR0 ("BNEP Received Multicast Filter Set message with bad length"); + break; + } + bnepu_process_peer_multicast_filter_set (p_bcb, p, len); + p += len; + *rem_len = *rem_len - len - 2; + break; + + case BNEP_FILTER_MULTI_ADDR_RESPONSE_MSG: + bnepu_process_multicast_filter_rsp (p_bcb, p); + p += 2; + *rem_len = *rem_len - 2; + break; + + default : + BNEP_TRACE_ERROR1 ("BNEP - bad ctl pkt type: %d", control_type); + bnep_send_command_not_understood (p_bcb, control_type); + if (is_ext) + { + p += (ext_len - 1); + *rem_len -= (ext_len - 1); + } + break; + } + + if (bad_pkt) + { + BNEP_TRACE_ERROR1 ("BNEP - bad ctl pkt length: %d", *rem_len); + *rem_len = 0; + return NULL; + } + + return p; +} + + +/******************************************************************************* +** +** Function bnepu_process_peer_filter_set +** +** Description This function processes a peer's filter control +** 'set' message. The filters are stored in the BCB, +** and an appropriate filter response message sent. +** +** Returns void +** +*******************************************************************************/ +void bnepu_process_peer_filter_set (tBNEP_CONN *p_bcb, UINT8 *p_filters, UINT16 len) +{ +#if (defined (BNEP_SUPPORTS_PROT_FILTERS) && BNEP_SUPPORTS_PROT_FILTERS == TRUE) + UINT16 num_filters = 0; + UINT16 xx, resp_code = BNEP_FILTER_CRL_OK; + UINT16 start, end; + UINT8 *p_temp_filters; + + if ((p_bcb->con_state != BNEP_STATE_CONNECTED) && + (!(p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED))) + { + BNEP_TRACE_DEBUG0 ("BNEP received filter set from peer when there is no connection"); + return; + } + + BNEP_TRACE_DEBUG0 ("BNEP received filter set from peer"); + /* Check for length not a multiple of 4 */ + if (len & 3) + { + BNEP_TRACE_EVENT1 ("BNEP - bad filter len: %d", len); + bnepu_send_peer_filter_rsp (p_bcb, BNEP_FILTER_CRL_BAD_RANGE); + return; + } + + if (len) + num_filters = (UINT16) (len >> 2); + + /* Validate filter values */ + if (num_filters <= BNEP_MAX_PROT_FILTERS) + { + p_temp_filters = p_filters; + for (xx = 0; xx < num_filters; xx++) + { + BE_STREAM_TO_UINT16 (start, p_temp_filters); + BE_STREAM_TO_UINT16 (end, p_temp_filters); + + if (start > end) + { + resp_code = BNEP_FILTER_CRL_BAD_RANGE; + break; + } + } + } + else + resp_code = BNEP_FILTER_CRL_MAX_REACHED; + + if (resp_code != BNEP_FILTER_CRL_OK) + { + bnepu_send_peer_filter_rsp (p_bcb, resp_code); + return; + } + + if (bnep_cb.p_filter_ind_cb) + (*bnep_cb.p_filter_ind_cb) (p_bcb->handle, TRUE, 0, len, p_filters); + + p_bcb->rcvd_num_filters = num_filters; + for (xx = 0; xx < num_filters; xx++) + { + BE_STREAM_TO_UINT16 (start, p_filters); + BE_STREAM_TO_UINT16 (end, p_filters); + + p_bcb->rcvd_prot_filter_start[xx] = start; + p_bcb->rcvd_prot_filter_end[xx] = end; + } + + bnepu_send_peer_filter_rsp (p_bcb, resp_code); +#else + bnepu_send_peer_filter_rsp (p_bcb, BNEP_FILTER_CRL_UNSUPPORTED); +#endif +} + + +/******************************************************************************* +** +** Function bnepu_process_peer_filter_rsp +** +** Description This function processes a peer's filter control +** 'response' message. +** +** Returns void +** +*******************************************************************************/ +void bnepu_process_peer_filter_rsp (tBNEP_CONN *p_bcb, UINT8 *p_data) +{ +#if (defined (BNEP_SUPPORTS_PROT_FILTERS) && BNEP_SUPPORTS_PROT_FILTERS == TRUE) + UINT16 resp_code; + tBNEP_RESULT result; + + BNEP_TRACE_DEBUG0 ("BNEP received filter responce"); + /* The state should be CONNECTED */ + if ((p_bcb->con_state != BNEP_STATE_CONNECTED) && + (!(p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED))) + { + BNEP_TRACE_ERROR1 ("BNEP - filter response in bad state %d", p_bcb->con_state); + return; + } + + /* Check if we are the originator */ + if (!(p_bcb->con_flags & BNEP_FLAGS_FILTER_RESP_PEND)) + { + BNEP_TRACE_ERROR0 ("BNEP - filter response when not expecting"); + return; + } + + /* Ensure timer is stopped */ + btu_stop_timer (&p_bcb->conn_tle); + p_bcb->con_flags &= ~BNEP_FLAGS_FILTER_RESP_PEND; + p_bcb->re_transmits = 0; + + BE_STREAM_TO_UINT16 (resp_code, p_data); + + result = BNEP_SUCCESS; + if (resp_code != BNEP_FILTER_CRL_OK) + result = BNEP_SET_FILTER_FAIL; + + if (bnep_cb.p_filter_ind_cb) + (*bnep_cb.p_filter_ind_cb) (p_bcb->handle, FALSE, result, 0, NULL); + + return; +#endif +} + + + +/******************************************************************************* +** +** Function bnepu_process_multicast_filter_rsp +** +** Description This function processes multicast filter control +** 'response' message. +** +** Returns void +** +*******************************************************************************/ +void bnepu_process_multicast_filter_rsp (tBNEP_CONN *p_bcb, UINT8 *p_data) +{ +#if (defined (BNEP_SUPPORTS_MULTI_FILTERS) && BNEP_SUPPORTS_MULTI_FILTERS == TRUE) + UINT16 resp_code; + tBNEP_RESULT result; + + BNEP_TRACE_DEBUG0 ("BNEP received multicast filter responce"); + /* The state should be CONNECTED */ + if ((p_bcb->con_state != BNEP_STATE_CONNECTED) && + (!(p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED))) + { + BNEP_TRACE_ERROR1 ("BNEP - multicast filter response in bad state %d", p_bcb->con_state); + return; + } + + /* Check if we are the originator */ + if (!(p_bcb->con_flags & BNEP_FLAGS_MULTI_RESP_PEND)) + { + BNEP_TRACE_ERROR0 ("BNEP - multicast filter response when not expecting"); + return; + } + + /* Ensure timer is stopped */ + btu_stop_timer (&p_bcb->conn_tle); + p_bcb->con_flags &= ~BNEP_FLAGS_MULTI_RESP_PEND; + p_bcb->re_transmits = 0; + + BE_STREAM_TO_UINT16 (resp_code, p_data); + + result = BNEP_SUCCESS; + if (resp_code != BNEP_FILTER_CRL_OK) + result = BNEP_SET_FILTER_FAIL; + + if (bnep_cb.p_mfilter_ind_cb) + (*bnep_cb.p_mfilter_ind_cb) (p_bcb->handle, FALSE, result, 0, NULL); + + return; +#endif +} + + + +/******************************************************************************* +** +** Function bnepu_process_peer_multicast_filter_set +** +** Description This function processes a peer's filter control +** 'set' message. The filters are stored in the BCB, +** and an appropriate filter response message sent. +** +** Returns void +** +*******************************************************************************/ +void bnepu_process_peer_multicast_filter_set (tBNEP_CONN *p_bcb, UINT8 *p_filters, UINT16 len) +{ +#if (defined (BNEP_SUPPORTS_MULTI_FILTERS) && BNEP_SUPPORTS_MULTI_FILTERS == TRUE) + UINT16 resp_code = BNEP_FILTER_CRL_OK; + UINT16 num_filters, xx; + UINT8 *p_temp_filters, null_bda[BD_ADDR_LEN] = {0,0,0,0,0,0}; + + if ((p_bcb->con_state != BNEP_STATE_CONNECTED) && + (!(p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED))) + { + BNEP_TRACE_DEBUG0 ("BNEP received multicast filter set from peer when there is no connection"); + return; + } + + if (len % 12) + { + BNEP_TRACE_EVENT1 ("BNEP - bad filter len: %d", len); + bnepu_send_peer_multicast_filter_rsp (p_bcb, BNEP_FILTER_CRL_BAD_RANGE); + return; + } + + if (len > (BNEP_MAX_MULTI_FILTERS * 2 * BD_ADDR_LEN)) + { + BNEP_TRACE_EVENT0 ("BNEP - Too many filters"); + bnepu_send_peer_multicast_filter_rsp (p_bcb, BNEP_FILTER_CRL_MAX_REACHED); + return; + } + + num_filters = 0; + if (len) + num_filters = (UINT16) (len / 12); + + /* Validate filter values */ + if (num_filters <= BNEP_MAX_MULTI_FILTERS) + { + p_temp_filters = p_filters; + for (xx = 0; xx < num_filters; xx++) + { + if (memcmp (p_temp_filters, p_temp_filters + BD_ADDR_LEN, BD_ADDR_LEN) > 0) + { + bnepu_send_peer_multicast_filter_rsp (p_bcb, BNEP_FILTER_CRL_BAD_RANGE); + return; + } + + p_temp_filters += (BD_ADDR_LEN * 2); + } + } + + p_bcb->rcvd_mcast_filters = num_filters; + for (xx = 0; xx < num_filters; xx++) + { + memcpy (p_bcb->rcvd_mcast_filter_start[xx], p_filters, BD_ADDR_LEN); + memcpy (p_bcb->rcvd_mcast_filter_end[xx], p_filters + BD_ADDR_LEN, BD_ADDR_LEN); + p_filters += (BD_ADDR_LEN * 2); + + /* Check if any of the ranges have all zeros as both starting and ending addresses */ + if ((memcmp (null_bda, p_bcb->rcvd_mcast_filter_start[xx], BD_ADDR_LEN) == 0) && + (memcmp (null_bda, p_bcb->rcvd_mcast_filter_end[xx], BD_ADDR_LEN) == 0)) + { + p_bcb->rcvd_mcast_filters = 0xFFFF; + break; + } + } + + BNEP_TRACE_EVENT1 ("BNEP multicast filters %d", p_bcb->rcvd_mcast_filters); + bnepu_send_peer_multicast_filter_rsp (p_bcb, resp_code); + + if (bnep_cb.p_mfilter_ind_cb) + (*bnep_cb.p_mfilter_ind_cb) (p_bcb->handle, TRUE, 0, len, p_filters); +#else + bnepu_send_peer_multicast_filter_rsp (p_bcb, BNEP_FILTER_CRL_UNSUPPORTED); +#endif +} + + +/******************************************************************************* +** +** Function bnepu_send_peer_multicast_filter_rsp +** +** Description This function sends a filter response to a peer +** +** Returns void +** +*******************************************************************************/ +void bnepu_send_peer_multicast_filter_rsp (tBNEP_CONN *p_bcb, UINT16 response_code) +{ + BT_HDR *p_buf; + UINT8 *p; + + BNEP_TRACE_DEBUG1 ("BNEP sending multicast filter response %d", response_code); + if ((p_buf = (BT_HDR *)GKI_getpoolbuf (BNEP_POOL_ID)) == NULL) + { + BNEP_TRACE_ERROR0 ("BNEP - no buffer filter rsp"); + return; + } + + p_buf->offset = L2CAP_MIN_OFFSET; + p = (UINT8 *)(p_buf + 1) + L2CAP_MIN_OFFSET; + + /* Put in BNEP frame type - filter control */ + UINT8_TO_BE_STREAM (p, BNEP_FRAME_CONTROL); + + /* Put in filter message type - set filters */ + UINT8_TO_BE_STREAM (p, BNEP_FILTER_MULTI_ADDR_RESPONSE_MSG); + + UINT16_TO_BE_STREAM (p, response_code); + + p_buf->len = 4; + + bnepu_check_send_packet (p_bcb, p_buf); +} + + + +/******************************************************************************* +** +** Function bnep_sec_check_complete +** +** Description This function is registered with BTM and will be called +** after completing the security procedures +** +** Returns void +** +*******************************************************************************/ +void bnep_sec_check_complete (BD_ADDR bd_addr, void *p_ref_data, UINT8 result) +{ + tBNEP_CONN *p_bcb = (tBNEP_CONN *)p_ref_data; + UINT16 resp_code = BNEP_SETUP_CONN_OK; + BOOLEAN is_role_change; + + BNEP_TRACE_EVENT1 ("BNEP security callback returned result %d", result); + if (p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED) + is_role_change = TRUE; + else + is_role_change = FALSE; + + /* check if the port is still waiting for security to complete */ + if (p_bcb->con_state != BNEP_STATE_SEC_CHECKING) + { + BNEP_TRACE_ERROR1 ("BNEP Connection in wrong state %d when security is completed", p_bcb->con_state); + return; + } + + /* if it is outgoing call and result is FAILURE return security fail error */ + if (!(p_bcb->con_flags & BNEP_FLAGS_SETUP_RCVD)) + { + if (result != BTM_SUCCESS) + { + if (p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED) + { + /* Tell the user that role change is failed because of security */ + if (bnep_cb.p_conn_state_cb) + (*bnep_cb.p_conn_state_cb) (p_bcb->handle, p_bcb->rem_bda, BNEP_SECURITY_FAIL, is_role_change); + + p_bcb->con_state = BNEP_STATE_CONNECTED; + memcpy ((UINT8 *)&(p_bcb->src_uuid), (UINT8 *)&(p_bcb->prv_src_uuid), sizeof (tBT_UUID)); + memcpy ((UINT8 *)&(p_bcb->dst_uuid), (UINT8 *)&(p_bcb->prv_dst_uuid), sizeof (tBT_UUID)); + return; + } + + L2CA_DisconnectReq (p_bcb->l2cap_cid); + + /* Tell the user if he has a callback */ + if (bnep_cb.p_conn_state_cb) + (*bnep_cb.p_conn_state_cb) (p_bcb->handle, p_bcb->rem_bda, BNEP_SECURITY_FAIL, is_role_change); + + bnepu_release_bcb (p_bcb); + return; + } + + /* Transition to the next appropriate state, waiting for connection confirm. */ + p_bcb->con_state = BNEP_STATE_CONN_SETUP; + + bnep_send_conn_req (p_bcb); + btu_start_timer (&p_bcb->conn_tle, BTU_TTYPE_BNEP, BNEP_CONN_TIMEOUT); + return; + } + + /* it is an incoming call respond appropriately */ + if (result != BTM_SUCCESS) + { + bnep_send_conn_responce (p_bcb, BNEP_SETUP_CONN_NOT_ALLOWED); + if (p_bcb->con_flags & BNEP_FLAGS_CONN_COMPLETED) + { + /* Role change is failed because of security. Revert back to connected state */ + p_bcb->con_state = BNEP_STATE_CONNECTED; + p_bcb->con_flags &= (~BNEP_FLAGS_SETUP_RCVD); + memcpy ((UINT8 *)&(p_bcb->src_uuid), (UINT8 *)&(p_bcb->prv_src_uuid), sizeof (tBT_UUID)); + memcpy ((UINT8 *)&(p_bcb->dst_uuid), (UINT8 *)&(p_bcb->prv_dst_uuid), sizeof (tBT_UUID)); + return; + } + + L2CA_DisconnectReq (p_bcb->l2cap_cid); + + bnepu_release_bcb (p_bcb); + return; + } + + if (bnep_cb.p_conn_ind_cb) + { + p_bcb->con_state = BNEP_STATE_CONN_SETUP; + (*bnep_cb.p_conn_ind_cb) (p_bcb->handle, p_bcb->rem_bda, &p_bcb->dst_uuid, &p_bcb->src_uuid, is_role_change); + } + else + { + /* Profile didn't register connection indication call back */ + bnep_send_conn_responce (p_bcb, resp_code); + bnep_connected (p_bcb); + } + + return; +} + + +/******************************************************************************* +** +** Function bnep_is_packet_allowed +** +** Description This function verifies whether the protocol passes through +** the protocol filters set by the peer +** +** Returns BNEP_SUCCESS - if the protocol is allowed +** BNEP_IGNORE_CMD - if the protocol is filtered out +** +*******************************************************************************/ +tBNEP_RESULT bnep_is_packet_allowed (tBNEP_CONN *p_bcb, + BD_ADDR p_dest_addr, + UINT16 protocol, + BOOLEAN fw_ext_present, + UINT8 *p_data) +{ +#if (defined (BNEP_SUPPORTS_PROT_FILTERS) && BNEP_SUPPORTS_PROT_FILTERS == TRUE) + if (p_bcb->rcvd_num_filters) + { + UINT16 i, proto; + + /* Findout the actual protocol to check for the filtering */ + proto = protocol; + if (proto == BNEP_802_1_P_PROTOCOL) + { + if (fw_ext_present) + { + UINT8 len, ext; + /* parse the extension headers and findout actual protocol */ + do { + + ext = *p_data++; + len = *p_data++; + p_data += len; + + } while (ext & 0x80); + } + p_data += 2; + BE_STREAM_TO_UINT16 (proto, p_data); + } + + for (i=0; i<p_bcb->rcvd_num_filters; i++) + { + if ((p_bcb->rcvd_prot_filter_start[i] <= proto) && + (proto <= p_bcb->rcvd_prot_filter_end[i])) + break; + } + + if (i == p_bcb->rcvd_num_filters) + { + BNEP_TRACE_DEBUG1 ("Ignoring protocol 0x%x in BNEP data write", proto); + return BNEP_IGNORE_CMD; + } + } +#endif + +#if (defined (BNEP_SUPPORTS_MULTI_FILTERS) && BNEP_SUPPORTS_MULTI_FILTERS == TRUE) + /* Ckeck for multicast address filtering */ + if ((p_dest_addr[0] & 0x01) && + p_bcb->rcvd_mcast_filters) + { + UINT16 i; + + /* Check if every multicast should be filtered */ + if (p_bcb->rcvd_mcast_filters != 0xFFFF) + { + /* Check if the address is mentioned in the filter range */ + for (i = 0; i < p_bcb->rcvd_mcast_filters; i++) + { + if ((memcmp (p_bcb->rcvd_mcast_filter_start[i], p_dest_addr, BD_ADDR_LEN) <= 0) && + (memcmp (p_bcb->rcvd_mcast_filter_end[i], p_dest_addr, BD_ADDR_LEN) >= 0)) + break; + } + } + + /* + ** If every multicast should be filtered or the address is not in the filter range + ** drop the packet + */ + if ((p_bcb->rcvd_mcast_filters == 0xFFFF) || (i == p_bcb->rcvd_mcast_filters)) + { + BNEP_TRACE_DEBUG6 ("Ignoring multicast address %x.%x.%x.%x.%x.%x in BNEP data write", + p_dest_addr[0], p_dest_addr[1], p_dest_addr[2], + p_dest_addr[3], p_dest_addr[4], p_dest_addr[5]); + return BNEP_IGNORE_CMD; + } + } +#endif + + return BNEP_SUCCESS; +} + + + + + +/******************************************************************************* +** +** Function bnep_get_uuid32 +** +** Description This function returns the 32 bit equivalent of the given UUID +** +** Returns UINT32 - 32 bit equivalent of the UUID +** +*******************************************************************************/ +UINT32 bnep_get_uuid32 (tBT_UUID *src_uuid) +{ + UINT32 result; + + if (src_uuid->len == 2) + return ((UINT32)src_uuid->uu.uuid16); + else if (src_uuid->len == 4) + return (src_uuid->uu.uuid32 & 0x0000FFFF); + else + { + result = src_uuid->uu.uuid128[2]; + result = (result << 8) | (src_uuid->uu.uuid128[3]); + return result; + } +} + + + + +/******************************************************************************* +** +** Function bnep_dump_status +** +** Description This function dumps the bnep control block and connection +** blocks information +** +** Returns none +** +*******************************************************************************/ +void bnep_dump_status (void) +{ +#if (defined (BNEP_SUPPORTS_DEBUG_DUMP) && BNEP_SUPPORTS_DEBUG_DUMP == TRUE) + UINT16 i; + char buff[200]; + tBNEP_CONN *p_bcb; + + BNEP_TRACE_DEBUG6 ("BNEP my BD Addr %x.%x.%x.%x.%x.%x", + bnep_cb.my_bda[0], bnep_cb.my_bda[1], bnep_cb.my_bda[2], + bnep_cb.my_bda[3], bnep_cb.my_bda[4], bnep_cb.my_bda[5]); + BNEP_TRACE_DEBUG3 ("profile registered %d, trace %d, got_my_bd_addr %d", + bnep_cb.profile_registered, bnep_cb.trace_level, bnep_cb.got_my_bd_addr); + + for (i = 0, p_bcb = bnep_cb.bcb; i < BNEP_MAX_CONNECTIONS; i++, p_bcb++) + { + sprintf (buff, "%d state %d, flags 0x%x, cid %d, pfilts %d, mfilts %d, src 0x%x, dst 0x%x, BD %x.%x.%x.%x.%x.%x", + i, p_bcb->con_state, p_bcb->con_flags, p_bcb->l2cap_cid, + p_bcb->rcvd_num_filters, p_bcb->rcvd_mcast_filters, + p_bcb->src_uuid.uu.uuid16, p_bcb->dst_uuid.uu.uuid16, + p_bcb->rem_bda[0], p_bcb->rem_bda[1], p_bcb->rem_bda[2], + p_bcb->rem_bda[3], p_bcb->rem_bda[4], p_bcb->rem_bda[5]); + + BNEP_TRACE_DEBUG0 (buff); + } +#endif +} + + |