Home | History | Annotate | Download | only in netbt
History log of /src/sys/netbt/l2cap_lower.c
RevisionDateAuthorComments
 1.10  05-Aug-2014  rtr split PRU_SEND function out of pr_generic() usrreq switches and put into
separate functions

xxx_send(struct socket *, struct mbuf *, struct mbuf *,
struct mbuf *, struct lwp *)

- always KASSERT(solocked(so)) even if not implemented

- replace calls to pr_generic() with req = PRU_SEND with calls to
pr_send()

rename existing functions that operate on PCB for consistency (and to
free up their names for xxx_send() PRUs

- l2cap_send() -> l2cap_send_pcb()
- sco_send() -> sco_send_pcb()
- rfcomm_send() -> rfcomm_send_pcb()

patch reviewed by rmind
 1.9  05-Aug-2008  plunky branches: 1.9.38; 1.9.54;
adjust message for previous change
 1.8  05-Aug-2008  plunky drop packets that exceed the negotiated MTU
 1.7  10-Nov-2007  plunky branches: 1.7.14; 1.7.18; 1.7.20; 1.7.24;
use more device_t and device_xxx() accessors

make bluetooth stack keep device_t instead of softc pointer as
device is not necessarily part of softc, and pass device_t to
driver callbacks. hci_devname is no longer required.
 1.6  21-Apr-2007  plunky branches: 1.6.6; 1.6.8; 1.6.12; 1.6.14;
Add 'service level' security for L2CAP and RFCOMM connections, following
the Linux (BlueZ) API.

- L2CAP or RFCOMM connections can require the baseband radio link
mode be any of:
authenticated (devices are paired)
encrypted (implies authentication)
secured (encryption, plus generate new link key)

- for sockets, the mode is set using setsockopt(2) and the socket
connection will be aborted if the mode change fails.

- mode settings will be applied during connection establishment, and
for safety, we enter a wait state and will only proceed when the mode
settings are successfuly set.

- It is possible to change the mode on already open connections, but
not possible to guarantee that data already queued (from either end)
will not be delivered. (this is a feature, not a bug)

- bthidev(4) and rfcomm_sppd(1) support "auth", "encrypt" and
"secure" options

- btdevctl(8) by default enables "auth" for HIDs, and "encrypt" for
keyboards (which are required to support it)
 1.5  30-Mar-2007  plunky be more explicit and consistent in use of KASSERT with pointers,
test against NULL
 1.4  20-Mar-2007  plunky discard inbound packets if the channel is not open
 1.3  15-Mar-2007  plunky remove C++ style comments
 1.2  07-Mar-2007  plunky branches: 1.2.2; 1.2.4; 1.2.6;
add validity check for inbound packets
 1.1  19-Jun-2006  gdamore branches: 1.1.2; 1.1.4; 1.1.6; 1.1.8; 1.1.14; 1.1.18; 1.1.20; 1.1.24;
Initial import of bluetooth stack on behalf of Iain Hibbert. (plunky@,
NetBSD Foundation Membership still pending.) This stack was written by
Iain under sponsorship from Itronix Inc.

The stack includes support for rfcomm networking (networking via your
bluetooth enabled cell phone), hid devices (keyboards/mice), and headsets.

Drivers for both PCMCIA and USB bluetooth controllers are included.
 1.1.24.2  04-Sep-2008  skrll Sync with netbsd-4.
 1.1.24.1  03-Sep-2007  wrstuden Sync w/ NetBSD-4-RC_1
 1.1.20.4  07-May-2007  yamt sync with head.
 1.1.20.3  15-Apr-2007  yamt sync with head.
 1.1.20.2  24-Mar-2007  yamt sync with head.
 1.1.20.1  12-Mar-2007  rmind Sync with HEAD.
 1.1.18.2  20-Aug-2008  bouyer Pull up following revision(s) (requested by plunky in ticket #1176):
sys/netbt/l2cap_lower.c: revision 1.8
drop packets that exceed the negotiated MTU
 1.1.18.1  19-Jul-2007  liamjfoy Pull up following revision(s) (requested by plunky in ticket #744):
sys/netbt/l2cap_lower.c: revision 1.6
sys/dev/bluetooth/btdev.h: revision 1.6
sys/netbt/sco_socket.c: revision 1.9
sys/netbt/rfcomm_upper.c: revision 1.3
sys/netbt/l2cap_socket.c: revision 1.7
sys/netbt/rfcomm_upper.c: revision 1.5
lib/libusbhid/usbhid.h: revision 1.5
sys/netbt/rfcomm_upper.c: revision 1.6
usr.sbin/btdevctl/btdevctl.c: revision 1.4
usr.sbin/btdevctl/btdevctl.h: revision 1.3
usr.sbin/btdevctl/btdevctl.8: revision 1.4
sys/netbt/rfcomm_session.c: revision 1.5
sys/netbt/hci.h: revision 1.10
usr.bin/rfcomm_sppd/rfcomm_sppd.c: revision 1.6
sys/netbt/hci_link.c: revision 1.11
usr.bin/rfcomm_sppd/rfcomm_sppd.c: revision 1.7
usr.bin/rfcomm_sppd/rfcomm_sppd.c: revision 1.8
sys/dev/bluetooth/btsco.c: revision 1.14
sys/netbt/rfcomm_session.c: revision 1.9
usr.sbin/btdevctl/sdp.c: revision 1.2
share/man/man9/bluetooth.9: revision 1.2
usr.sbin/btdevctl/sdp.c: revision 1.3
sys/dev/bluetooth/bthidev.c: revision 1.8
sys/netbt/l2cap.h: revision 1.4
sys/netbt/rfcomm.h: revision 1.3
sys/netbt/l2cap.h: revision 1.5
sys/netbt/l2cap_misc.c: revision 1.3
share/man/man4/bluetooth.4: revision 1.5
lib/libusbhid/usbhid.3: revision 1.11
sys/netbt/bluetooth.h: revision 1.5
share/man/man4/bthidev.4: revision 1.8
sys/netbt/rfcomm_dlc.c: revision 1.3
usr.sbin/btdevctl/print.c: revision 1.8
sys/netbt/rfcomm_socket.c: revision 1.7
sys/netbt/l2cap_signal.c: revision 1.4
sys/netbt/l2cap_signal.c: revision 1.5
sys/netbt/l2cap_signal.c: revision 1.7
sys/netbt/hci_event.c: revision 1.6
usr.bin/rfcomm_sppd/rfcomm_sppd.1: revision 1.5
sys/netbt/l2cap_upper.c: revision 1.3
sys/netbt/l2cap_lower.c: revision 1.2
usr.sbin/btdevctl/db.c: revision 1.3
sys/netbt/l2cap_upper.c: revision 1.6
lib/libusbhid/descr.c: revision 1.5
sys/netbt/l2cap_upper.c: revision 1.7
sys/netbt/l2cap_lower.c: revision 1.4
Add 'service level' security for L2CAP and RFCOMM connections, following
the Linux (BlueZ) API.
- L2CAP or RFCOMM connections can require the baseband radio link
mode be any of:
authenticated (devices are paired)
encrypted (implies authentication)
secured (encryption, plus generate new link key)
- for sockets, the mode is set using setsockopt(2) and the socket
connection will be aborted if the mode change fails.
- mode settings will be applied during connection establishment, and
for safety, we enter a wait state and will only proceed when the mode
settings are successfuly set.
- It is possible to change the mode on already open connections, but
not possible to guarantee that data already queued (from either end)
will not be delivered. (this is a feature, not a bug)
- bthidev(4) and rfcomm_sppd(1) support "auth", "encrypt" and
"secure" options
- btdevctl(8) by default enables "auth" for HIDs, and "encrypt" for
keyboards (which are required to support it)
- ALSO INCLUDES OTHER MINOR FIXES
 1.1.14.2  09-Sep-2006  rpaulo sync with head
 1.1.14.1  19-Jun-2006  rpaulo file l2cap_lower.c was added on branch rpaulo-netinet-merge-pcb on 2006-09-09 02:58:39 +0000
 1.1.8.2  13-Jul-2006  gdamore Merge from HEAD.
 1.1.8.1  19-Jun-2006  gdamore file l2cap_lower.c was added on branch gdamore-uart on 2006-07-13 17:49:58 +0000
 1.1.6.2  26-Jun-2006  yamt sync with head.
 1.1.6.1  19-Jun-2006  yamt file l2cap_lower.c was added on branch yamt-pdpolicy on 2006-06-26 12:53:57 +0000
 1.1.4.2  22-Jun-2006  chap Complete a sync sys/ with head.
 1.1.4.1  19-Jun-2006  chap file l2cap_lower.c was added on branch chap-midi on 2006-06-22 03:39:50 +0000
 1.1.2.4  15-Nov-2007  yamt sync with head.
 1.1.2.3  03-Sep-2007  yamt sync with head.
 1.1.2.2  21-Jun-2006  yamt sync with head.
 1.1.2.1  19-Jun-2006  yamt file l2cap_lower.c was added on branch yamt-lazymbuf on 2006-06-21 15:10:51 +0000
 1.2.6.2  29-Mar-2007  reinoud Pullup to -current
 1.2.6.1  18-Mar-2007  reinoud First attempt to bring branch in sync with HEAD
 1.2.4.1  11-Jul-2007  mjf Sync with head.
 1.2.2.2  08-Jun-2007  ad Sync with head.
 1.2.2.1  10-Apr-2007  ad Sync with head.
 1.6.14.1  19-Nov-2007  mjf Sync with HEAD.
 1.6.12.1  13-Nov-2007  bouyer Sync with HEAD
 1.6.8.1  09-Jan-2008  matt sync with HEAD
 1.6.6.1  11-Nov-2007  joerg Sync with HEAD.
 1.7.24.1  19-Oct-2008  haad Sync with HEAD.
 1.7.20.1  18-Sep-2008  wrstuden Sync with wrstuden-revivesa-base-2.
 1.7.18.1  04-May-2009  yamt sync with head.
 1.7.14.1  28-Sep-2008  mjf Sync with HEAD.
 1.9.54.1  10-Aug-2014  tls Rebase.
 1.9.38.1  20-Aug-2014  tls Rebase to HEAD as of a few days ago.

RSS XML Feed