blob: 76ef0bc0be0a6fd086f28d0c3f0e36b12d3efbad [file] [log] [blame]
// Copyright 2022 The Fuchsia Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "src/connectivity/bluetooth/core/bt-host/public/pw_bluetooth_sapphire/internal/host/hci/acl_connection.h"
#include "src/connectivity/bluetooth/core/bt-host/public/pw_bluetooth_sapphire/internal/host/transport/transport.h"
namespace bt::hci {
namespace {
template <CommandChannel::EventCallbackResult (
AclConnection::*EventHandlerMethod)(const EventPacket&)>
CommandChannel::EventCallback BindEventHandler(
const WeakSelf<AclConnection>::WeakPtr& conn) {
return [conn](const EventPacket& event) {
if (conn.is_alive()) {
return (conn.get().*EventHandlerMethod)(event);
}
return CommandChannel::EventCallbackResult::kRemove;
};
}
template <CommandChannel::EventCallbackResult (
AclConnection::*EventHandlerMethod)(const EmbossEventPacket&)>
CommandChannel::EmbossEventCallback BindEventHandler(
const WeakPtr<AclConnection>& conn) {
return [conn](const EmbossEventPacket& event) {
if (conn.is_alive()) {
return (conn.get().*EventHandlerMethod)(event);
}
return CommandChannel::EventCallbackResult::kRemove;
};
}
} // namespace
AclConnection::AclConnection(hci_spec::ConnectionHandle handle,
const DeviceAddress& local_address,
const DeviceAddress& peer_address,
pw::bluetooth::emboss::ConnectionRole role,
const Transport::WeakPtr& hci)
: Connection(handle,
local_address,
peer_address,
hci,
[handle, hci] {
AclConnection::OnDisconnectionComplete(handle, hci);
}),
role_(role),
weak_self_(this) {
auto self = weak_self_.GetWeakPtr();
enc_change_id_ = hci->command_channel()->AddEventHandler(
hci_spec::kEncryptionChangeEventCode,
BindEventHandler<&AclConnection::OnEncryptionChangeEvent>(self));
enc_key_refresh_cmpl_id_ = hci->command_channel()->AddEventHandler(
hci_spec::kEncryptionKeyRefreshCompleteEventCode,
BindEventHandler<&AclConnection::OnEncryptionKeyRefreshCompleteEvent>(
self));
}
AclConnection::~AclConnection() {
// Unregister HCI event handlers.
hci()->command_channel()->RemoveEventHandler(enc_change_id_);
hci()->command_channel()->RemoveEventHandler(enc_key_refresh_cmpl_id_);
}
void AclConnection::OnDisconnectionComplete(hci_spec::ConnectionHandle handle,
const Transport::WeakPtr& hci) {
if (!hci.is_alive()) {
return;
}
// Notify ACL data channel that packets have been flushed from controller
// buffer.
hci->acl_data_channel()->ClearControllerPacketCount(handle);
}
CommandChannel::EventCallbackResult AclConnection::OnEncryptionChangeEvent(
const EmbossEventPacket& event) {
BT_ASSERT(event.event_code() == hci_spec::kEncryptionChangeEventCode);
auto params =
event
.unchecked_view<pw::bluetooth::emboss::EncryptionChangeEventV1View>();
if (!params.Ok()) {
bt_log(WARN, "hci", "malformed encryption change event");
return CommandChannel::EventCallbackResult::kContinue;
}
hci_spec::ConnectionHandle handle = params.connection_handle().Read();
// Silently ignore the event as it isn't meant for this connection.
if (handle != this->handle()) {
return CommandChannel::EventCallbackResult::kContinue;
}
if (state() != Connection::State::kConnected) {
bt_log(DEBUG, "hci", "encryption change ignored for closed connection");
return CommandChannel::EventCallbackResult::kContinue;
}
Result<> result = event.ToResult();
encryption_status_ = params.encryption_enabled().Read();
bool encryption_enabled =
encryption_status_ != pw::bluetooth::emboss::EncryptionStatus::OFF;
bt_log(DEBUG,
"hci",
"encryption change (%s) %s",
encryption_enabled ? "enabled" : "disabled",
bt_str(result));
// If peer and local Secure Connections support are present, the pairing logic
// needs to verify that the status received in the Encryption Changed event is
// for AES encryption.
if (use_secure_connections_ &&
encryption_status_ !=
pw::bluetooth::emboss::EncryptionStatus::ON_WITH_AES_FOR_BREDR) {
bt_log(DEBUG,
"hci",
"BR/EDR Secure Connection must use AES encryption. Closing "
"connection...");
HandleEncryptionStatus(fit::error(Error(HostError::kInsufficientSecurity)),
/*key_refreshed=*/false);
return CommandChannel::EventCallbackResult::kContinue;
}
HandleEncryptionStatus(result.is_ok()
? Result<bool>(fit::ok(encryption_enabled))
: result.take_error(),
/*key_refreshed=*/false);
return CommandChannel::EventCallbackResult::kContinue;
}
CommandChannel::EventCallbackResult
AclConnection::OnEncryptionKeyRefreshCompleteEvent(
const EmbossEventPacket& event) {
const auto params =
event
.view<pw::bluetooth::emboss::EncryptionKeyRefreshCompleteEventView>();
const hci_spec::ConnectionHandle handle = params.connection_handle().Read();
// Silently ignore this event as it isn't meant for this connection.
if (handle != this->handle()) {
return CommandChannel::EventCallbackResult::kContinue;
}
if (state() != Connection::State::kConnected) {
bt_log(
DEBUG, "hci", "encryption key refresh ignored for closed connection");
return CommandChannel::EventCallbackResult::kContinue;
}
Result<> status = event.ToResult();
bt_log(DEBUG, "hci", "encryption key refresh %s", bt_str(status));
// Report that encryption got disabled on failure status. The accuracy of this
// isn't that important since the link will be disconnected.
HandleEncryptionStatus(status.is_ok()
? Result<bool>(fit::ok(/*enabled=*/true))
: status.take_error(),
/*key_refreshed=*/true);
return CommandChannel::EventCallbackResult::kContinue;
}
} // namespace bt::hci