l2cap_socket.c revision 1.9.38.2 1 1.9.38.1 tls /* $NetBSD: l2cap_socket.c,v 1.9.38.2 2017/12/03 11:39:03 jdolecek Exp $ */
2 1.1 gdamore
3 1.1 gdamore /*-
4 1.1 gdamore * Copyright (c) 2005 Iain Hibbert.
5 1.1 gdamore * Copyright (c) 2006 Itronix Inc.
6 1.1 gdamore * All rights reserved.
7 1.1 gdamore *
8 1.1 gdamore * Redistribution and use in source and binary forms, with or without
9 1.1 gdamore * modification, are permitted provided that the following conditions
10 1.1 gdamore * are met:
11 1.1 gdamore * 1. Redistributions of source code must retain the above copyright
12 1.1 gdamore * notice, this list of conditions and the following disclaimer.
13 1.1 gdamore * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 gdamore * notice, this list of conditions and the following disclaimer in the
15 1.1 gdamore * documentation and/or other materials provided with the distribution.
16 1.1 gdamore * 3. The name of Itronix Inc. may not be used to endorse
17 1.1 gdamore * or promote products derived from this software without specific
18 1.1 gdamore * prior written permission.
19 1.1 gdamore *
20 1.1 gdamore * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21 1.1 gdamore * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 1.1 gdamore * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 1.1 gdamore * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24 1.1 gdamore * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 1.1 gdamore * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 1.1 gdamore * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27 1.1 gdamore * ON ANY THEORY OF LIABILITY, WHETHER IN
28 1.1 gdamore * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 1.1 gdamore * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 1.1 gdamore * POSSIBILITY OF SUCH DAMAGE.
31 1.1 gdamore */
32 1.1 gdamore
33 1.1 gdamore #include <sys/cdefs.h>
34 1.9.38.1 tls __KERNEL_RCSID(0, "$NetBSD: l2cap_socket.c,v 1.9.38.2 2017/12/03 11:39:03 jdolecek Exp $");
35 1.6 plunky
36 1.6 plunky /* load symbolic names */
37 1.6 plunky #ifdef BLUETOOTH_DEBUG
38 1.6 plunky #define PRUREQUESTS
39 1.6 plunky #define PRCOREQUESTS
40 1.6 plunky #endif
41 1.1 gdamore
42 1.1 gdamore #include <sys/param.h>
43 1.1 gdamore #include <sys/domain.h>
44 1.1 gdamore #include <sys/kernel.h>
45 1.1 gdamore #include <sys/mbuf.h>
46 1.1 gdamore #include <sys/proc.h>
47 1.1 gdamore #include <sys/protosw.h>
48 1.1 gdamore #include <sys/socket.h>
49 1.1 gdamore #include <sys/socketvar.h>
50 1.1 gdamore #include <sys/systm.h>
51 1.1 gdamore
52 1.1 gdamore #include <netbt/bluetooth.h>
53 1.1 gdamore #include <netbt/l2cap.h>
54 1.1 gdamore
55 1.1 gdamore /*
56 1.1 gdamore * L2CAP Sockets
57 1.1 gdamore *
58 1.1 gdamore * SOCK_SEQPACKET - normal L2CAP connection
59 1.1 gdamore *
60 1.1 gdamore * SOCK_DGRAM - connectionless L2CAP - XXX not yet
61 1.1 gdamore */
62 1.1 gdamore
63 1.1 gdamore static void l2cap_connecting(void *);
64 1.1 gdamore static void l2cap_connected(void *);
65 1.1 gdamore static void l2cap_disconnected(void *, int);
66 1.1 gdamore static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
67 1.1 gdamore static void l2cap_complete(void *, int);
68 1.7 plunky static void l2cap_linkmode(void *, int);
69 1.1 gdamore static void l2cap_input(void *, struct mbuf *);
70 1.1 gdamore
71 1.1 gdamore static const struct btproto l2cap_proto = {
72 1.1 gdamore l2cap_connecting,
73 1.1 gdamore l2cap_connected,
74 1.1 gdamore l2cap_disconnected,
75 1.1 gdamore l2cap_newconn,
76 1.1 gdamore l2cap_complete,
77 1.7 plunky l2cap_linkmode,
78 1.7 plunky l2cap_input,
79 1.1 gdamore };
80 1.1 gdamore
81 1.1 gdamore /* sysctl variables */
82 1.1 gdamore int l2cap_sendspace = 4096;
83 1.1 gdamore int l2cap_recvspace = 4096;
84 1.1 gdamore
85 1.9.38.1 tls static int
86 1.9.38.1 tls l2cap_attach(struct socket *so, int proto)
87 1.9.38.1 tls {
88 1.9.38.1 tls int error;
89 1.9.38.1 tls
90 1.9.38.1 tls KASSERT(so->so_pcb == NULL);
91 1.9.38.1 tls
92 1.9.38.1 tls if (so->so_lock == NULL) {
93 1.9.38.1 tls mutex_obj_hold(bt_lock);
94 1.9.38.1 tls so->so_lock = bt_lock;
95 1.9.38.1 tls solock(so);
96 1.9.38.1 tls }
97 1.9.38.1 tls KASSERT(solocked(so));
98 1.9.38.1 tls
99 1.9.38.1 tls /*
100 1.9.38.1 tls * For L2CAP socket PCB we just use an l2cap_channel structure
101 1.9.38.1 tls * since we have nothing to add..
102 1.9.38.1 tls */
103 1.9.38.1 tls error = soreserve(so, l2cap_sendspace, l2cap_recvspace);
104 1.9.38.1 tls if (error)
105 1.9.38.1 tls return error;
106 1.9.38.1 tls
107 1.9.38.1 tls return l2cap_attach_pcb((struct l2cap_channel **)&so->so_pcb,
108 1.9.38.1 tls &l2cap_proto, so);
109 1.9.38.1 tls }
110 1.9.38.1 tls
111 1.9.38.1 tls static void
112 1.9.38.1 tls l2cap_detach(struct socket *so)
113 1.9.38.1 tls {
114 1.9.38.1 tls KASSERT(so->so_pcb != NULL);
115 1.9.38.1 tls l2cap_detach_pcb((struct l2cap_channel **)&so->so_pcb);
116 1.9.38.1 tls KASSERT(so->so_pcb == NULL);
117 1.9.38.1 tls }
118 1.9.38.1 tls
119 1.9.38.1 tls static int
120 1.9.38.2 jdolecek l2cap_accept(struct socket *so, struct sockaddr *nam)
121 1.9.38.1 tls {
122 1.9.38.1 tls struct l2cap_channel *pcb = so->so_pcb;
123 1.9.38.1 tls
124 1.9.38.1 tls KASSERT(solocked(so));
125 1.9.38.1 tls KASSERT(nam != NULL);
126 1.9.38.1 tls
127 1.9.38.1 tls if (pcb == NULL)
128 1.9.38.1 tls return EINVAL;
129 1.9.38.1 tls
130 1.9.38.2 jdolecek return l2cap_peeraddr_pcb(pcb, (struct sockaddr_bt *)nam);
131 1.9.38.1 tls }
132 1.9.38.1 tls
133 1.9.38.1 tls static int
134 1.9.38.2 jdolecek l2cap_bind(struct socket *so, struct sockaddr *nam, struct lwp *l)
135 1.9.38.1 tls {
136 1.9.38.1 tls struct l2cap_channel *pcb = so->so_pcb;
137 1.9.38.2 jdolecek struct sockaddr_bt *sa = (struct sockaddr_bt *)nam;
138 1.9.38.1 tls
139 1.9.38.1 tls KASSERT(solocked(so));
140 1.9.38.1 tls KASSERT(nam != NULL);
141 1.9.38.1 tls
142 1.9.38.1 tls if (pcb == NULL)
143 1.9.38.1 tls return EINVAL;
144 1.9.38.1 tls
145 1.9.38.1 tls if (sa->bt_len != sizeof(struct sockaddr_bt))
146 1.9.38.1 tls return EINVAL;
147 1.9.38.1 tls
148 1.9.38.1 tls if (sa->bt_family != AF_BLUETOOTH)
149 1.9.38.1 tls return EAFNOSUPPORT;
150 1.9.38.1 tls
151 1.9.38.1 tls return l2cap_bind_pcb(pcb, sa);
152 1.9.38.1 tls }
153 1.9.38.1 tls
154 1.9.38.1 tls static int
155 1.9.38.1 tls l2cap_listen(struct socket *so, struct lwp *l)
156 1.9.38.1 tls {
157 1.9.38.1 tls struct l2cap_channel *pcb = so->so_pcb;
158 1.9.38.1 tls
159 1.9.38.1 tls KASSERT(solocked(so));
160 1.9.38.1 tls
161 1.9.38.1 tls if (pcb == NULL)
162 1.9.38.1 tls return EINVAL;
163 1.9.38.1 tls
164 1.9.38.1 tls return l2cap_listen_pcb(pcb);
165 1.9.38.1 tls }
166 1.9.38.1 tls
167 1.9.38.1 tls static int
168 1.9.38.2 jdolecek l2cap_connect(struct socket *so, struct sockaddr *nam, struct lwp *l)
169 1.9.38.1 tls {
170 1.9.38.1 tls struct l2cap_channel *pcb = so->so_pcb;
171 1.9.38.2 jdolecek struct sockaddr_bt *sa = (struct sockaddr_bt *)nam;
172 1.9.38.1 tls
173 1.9.38.1 tls KASSERT(solocked(so));
174 1.9.38.1 tls KASSERT(nam != NULL);
175 1.9.38.1 tls
176 1.9.38.1 tls if (pcb == NULL)
177 1.9.38.1 tls return EINVAL;
178 1.9.38.1 tls
179 1.9.38.1 tls if (sa->bt_len != sizeof(struct sockaddr_bt))
180 1.9.38.1 tls return EINVAL;
181 1.9.38.1 tls
182 1.9.38.1 tls if (sa->bt_family != AF_BLUETOOTH)
183 1.9.38.1 tls return EAFNOSUPPORT;
184 1.9.38.1 tls
185 1.9.38.1 tls soisconnecting(so);
186 1.9.38.1 tls return l2cap_connect_pcb(pcb, sa);
187 1.9.38.1 tls }
188 1.9.38.1 tls
189 1.9.38.1 tls static int
190 1.9.38.1 tls l2cap_connect2(struct socket *so, struct socket *so2)
191 1.9.38.1 tls {
192 1.9.38.1 tls KASSERT(solocked(so));
193 1.9.38.1 tls
194 1.9.38.1 tls if (so->so_pcb == NULL)
195 1.9.38.1 tls return EINVAL;
196 1.9.38.1 tls
197 1.9.38.1 tls return EOPNOTSUPP;
198 1.9.38.1 tls }
199 1.9.38.1 tls
200 1.9.38.1 tls static int
201 1.9.38.1 tls l2cap_disconnect(struct socket *so)
202 1.9.38.1 tls {
203 1.9.38.1 tls struct l2cap_channel *pcb = so->so_pcb;
204 1.9.38.1 tls
205 1.9.38.1 tls KASSERT(solocked(so));
206 1.9.38.1 tls
207 1.9.38.1 tls if (pcb == NULL)
208 1.9.38.1 tls return EINVAL;
209 1.9.38.1 tls
210 1.9.38.1 tls soisdisconnecting(so);
211 1.9.38.1 tls return l2cap_disconnect_pcb(pcb, so->so_linger);
212 1.9.38.1 tls }
213 1.9.38.1 tls
214 1.9.38.1 tls static int
215 1.9.38.1 tls l2cap_shutdown(struct socket *so)
216 1.9.38.1 tls {
217 1.9.38.1 tls KASSERT(solocked(so));
218 1.9.38.1 tls
219 1.9.38.1 tls socantsendmore(so);
220 1.9.38.1 tls return 0;
221 1.9.38.1 tls }
222 1.9.38.1 tls
223 1.9.38.1 tls static int
224 1.9.38.1 tls l2cap_abort(struct socket *so)
225 1.9.38.1 tls {
226 1.9.38.1 tls struct l2cap_channel *pcb = so->so_pcb;
227 1.9.38.1 tls
228 1.9.38.1 tls KASSERT(solocked(so));
229 1.9.38.1 tls
230 1.9.38.1 tls if (pcb == NULL)
231 1.9.38.1 tls return EINVAL;
232 1.9.38.1 tls
233 1.9.38.1 tls l2cap_disconnect_pcb(pcb, 0);
234 1.9.38.1 tls soisdisconnected(so);
235 1.9.38.1 tls l2cap_detach(so);
236 1.9.38.1 tls return 0;
237 1.9.38.1 tls }
238 1.9.38.1 tls
239 1.9.38.1 tls static int
240 1.9.38.1 tls l2cap_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
241 1.9.38.1 tls {
242 1.9.38.1 tls return EPASSTHROUGH;
243 1.9.38.1 tls }
244 1.9.38.1 tls
245 1.9.38.1 tls static int
246 1.9.38.1 tls l2cap_stat(struct socket *so, struct stat *ub)
247 1.9.38.1 tls {
248 1.9.38.1 tls KASSERT(solocked(so));
249 1.9.38.1 tls
250 1.9.38.1 tls return 0;
251 1.9.38.1 tls }
252 1.9.38.1 tls
253 1.9.38.1 tls static int
254 1.9.38.2 jdolecek l2cap_peeraddr(struct socket *so, struct sockaddr *nam)
255 1.9.38.1 tls {
256 1.9.38.1 tls struct l2cap_channel *pcb = so->so_pcb;
257 1.9.38.1 tls
258 1.9.38.1 tls KASSERT(solocked(so));
259 1.9.38.1 tls KASSERT(pcb != NULL);
260 1.9.38.1 tls KASSERT(nam != NULL);
261 1.9.38.1 tls
262 1.9.38.2 jdolecek return l2cap_peeraddr_pcb(pcb, (struct sockaddr_bt *)nam);
263 1.9.38.1 tls }
264 1.9.38.1 tls
265 1.9.38.1 tls static int
266 1.9.38.2 jdolecek l2cap_sockaddr(struct socket *so, struct sockaddr *nam)
267 1.9.38.1 tls {
268 1.9.38.1 tls struct l2cap_channel *pcb = so->so_pcb;
269 1.9.38.1 tls
270 1.9.38.1 tls KASSERT(solocked(so));
271 1.9.38.1 tls KASSERT(pcb != NULL);
272 1.9.38.1 tls KASSERT(nam != NULL);
273 1.9.38.1 tls
274 1.9.38.2 jdolecek return l2cap_sockaddr_pcb(pcb, (struct sockaddr_bt *)nam);
275 1.9.38.1 tls }
276 1.9.38.1 tls
277 1.9.38.1 tls static int
278 1.9.38.1 tls l2cap_rcvd(struct socket *so, int flags, struct lwp *l)
279 1.9.38.1 tls {
280 1.9.38.1 tls KASSERT(solocked(so));
281 1.9.38.1 tls
282 1.9.38.1 tls return EOPNOTSUPP;
283 1.9.38.1 tls }
284 1.9.38.1 tls
285 1.9.38.1 tls static int
286 1.9.38.1 tls l2cap_recvoob(struct socket *so, struct mbuf *m, int flags)
287 1.9.38.1 tls {
288 1.9.38.1 tls KASSERT(solocked(so));
289 1.9.38.1 tls
290 1.9.38.1 tls return EOPNOTSUPP;
291 1.9.38.1 tls }
292 1.9.38.1 tls
293 1.9.38.1 tls static int
294 1.9.38.2 jdolecek l2cap_send(struct socket *so, struct mbuf *m, struct sockaddr *nam,
295 1.9.38.1 tls struct mbuf *control, struct lwp *l)
296 1.9.38.1 tls {
297 1.9.38.1 tls struct l2cap_channel *pcb = so->so_pcb;
298 1.9.38.1 tls struct mbuf *m0;
299 1.9.38.1 tls int error = 0;
300 1.9.38.1 tls
301 1.9.38.1 tls KASSERT(solocked(so));
302 1.9.38.1 tls KASSERT(m != NULL);
303 1.9.38.1 tls
304 1.9.38.1 tls if (control)
305 1.9.38.1 tls m_freem(control);
306 1.9.38.1 tls
307 1.9.38.1 tls if (pcb == NULL) {
308 1.9.38.1 tls error = EINVAL;
309 1.9.38.1 tls goto release;
310 1.9.38.1 tls }
311 1.9.38.1 tls
312 1.9.38.1 tls if (m->m_pkthdr.len == 0)
313 1.9.38.1 tls goto release;
314 1.9.38.1 tls
315 1.9.38.1 tls if (m->m_pkthdr.len > pcb->lc_omtu) {
316 1.9.38.1 tls error = EMSGSIZE;
317 1.9.38.1 tls goto release;
318 1.9.38.1 tls }
319 1.9.38.1 tls
320 1.9.38.1 tls m0 = m_copypacket(m, M_DONTWAIT);
321 1.9.38.1 tls if (m0 == NULL) {
322 1.9.38.1 tls error = ENOMEM;
323 1.9.38.1 tls goto release;
324 1.9.38.1 tls }
325 1.9.38.1 tls
326 1.9.38.1 tls sbappendrecord(&so->so_snd, m);
327 1.9.38.1 tls return l2cap_send_pcb(pcb, m0);
328 1.9.38.1 tls
329 1.9.38.1 tls release:
330 1.9.38.1 tls if (m)
331 1.9.38.1 tls m_freem(m);
332 1.9.38.1 tls
333 1.9.38.1 tls return error;
334 1.9.38.1 tls }
335 1.9.38.1 tls
336 1.9.38.1 tls static int
337 1.9.38.1 tls l2cap_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control)
338 1.9.38.1 tls {
339 1.9.38.1 tls KASSERT(solocked(so));
340 1.9.38.1 tls
341 1.9.38.1 tls if (m)
342 1.9.38.1 tls m_freem(m);
343 1.9.38.1 tls if (control)
344 1.9.38.1 tls m_freem(control);
345 1.9.38.1 tls
346 1.9.38.1 tls return EOPNOTSUPP;
347 1.9.38.1 tls }
348 1.9.38.1 tls
349 1.9.38.1 tls static int
350 1.9.38.1 tls l2cap_purgeif(struct socket *so, struct ifnet *ifp)
351 1.9.38.1 tls {
352 1.9.38.1 tls
353 1.9.38.1 tls return EOPNOTSUPP;
354 1.9.38.1 tls }
355 1.9.38.1 tls
356 1.1 gdamore /*
357 1.9 plunky * l2cap_ctloutput(req, socket, sockopt)
358 1.1 gdamore *
359 1.1 gdamore * Apply configuration commands to channel. This corresponds to
360 1.1 gdamore * "Reconfigure Channel Request" in the L2CAP specification.
361 1.1 gdamore */
362 1.1 gdamore int
363 1.9 plunky l2cap_ctloutput(int req, struct socket *so, struct sockopt *sopt)
364 1.1 gdamore {
365 1.1 gdamore struct l2cap_channel *pcb = so->so_pcb;
366 1.1 gdamore int err = 0;
367 1.1 gdamore
368 1.1 gdamore DPRINTFN(2, "%s\n", prcorequests[req]);
369 1.1 gdamore
370 1.4 plunky if (pcb == NULL)
371 1.4 plunky return EINVAL;
372 1.4 plunky
373 1.9 plunky if (sopt->sopt_level != BTPROTO_L2CAP)
374 1.4 plunky return ENOPROTOOPT;
375 1.1 gdamore
376 1.1 gdamore switch(req) {
377 1.1 gdamore case PRCO_GETOPT:
378 1.9 plunky err = l2cap_getopt(pcb, sopt);
379 1.1 gdamore break;
380 1.1 gdamore
381 1.1 gdamore case PRCO_SETOPT:
382 1.9 plunky err = l2cap_setopt(pcb, sopt);
383 1.1 gdamore break;
384 1.1 gdamore
385 1.1 gdamore default:
386 1.4 plunky err = ENOPROTOOPT;
387 1.1 gdamore break;
388 1.1 gdamore }
389 1.1 gdamore
390 1.1 gdamore return err;
391 1.1 gdamore }
392 1.1 gdamore
393 1.1 gdamore /**********************************************************************
394 1.1 gdamore *
395 1.1 gdamore * L2CAP Protocol socket callbacks
396 1.1 gdamore *
397 1.1 gdamore */
398 1.1 gdamore
399 1.1 gdamore static void
400 1.1 gdamore l2cap_connecting(void *arg)
401 1.1 gdamore {
402 1.1 gdamore struct socket *so = arg;
403 1.1 gdamore
404 1.1 gdamore DPRINTF("Connecting\n");
405 1.1 gdamore soisconnecting(so);
406 1.1 gdamore }
407 1.1 gdamore
408 1.1 gdamore static void
409 1.1 gdamore l2cap_connected(void *arg)
410 1.1 gdamore {
411 1.1 gdamore struct socket *so = arg;
412 1.1 gdamore
413 1.1 gdamore DPRINTF("Connected\n");
414 1.1 gdamore soisconnected(so);
415 1.1 gdamore }
416 1.1 gdamore
417 1.1 gdamore static void
418 1.1 gdamore l2cap_disconnected(void *arg, int err)
419 1.1 gdamore {
420 1.1 gdamore struct socket *so = arg;
421 1.1 gdamore
422 1.1 gdamore DPRINTF("Disconnected (%d)\n", err);
423 1.1 gdamore
424 1.1 gdamore so->so_error = err;
425 1.1 gdamore soisdisconnected(so);
426 1.1 gdamore }
427 1.1 gdamore
428 1.1 gdamore static void *
429 1.3 christos l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
430 1.3 christos struct sockaddr_bt *raddr)
431 1.1 gdamore {
432 1.1 gdamore struct socket *so = arg;
433 1.1 gdamore
434 1.1 gdamore DPRINTF("New Connection\n");
435 1.9.38.1 tls so = sonewconn(so, false);
436 1.1 gdamore if (so == NULL)
437 1.1 gdamore return NULL;
438 1.1 gdamore
439 1.1 gdamore soisconnecting(so);
440 1.1 gdamore
441 1.1 gdamore return so->so_pcb;
442 1.1 gdamore }
443 1.1 gdamore
444 1.1 gdamore static void
445 1.1 gdamore l2cap_complete(void *arg, int count)
446 1.1 gdamore {
447 1.1 gdamore struct socket *so = arg;
448 1.1 gdamore
449 1.1 gdamore while (count-- > 0)
450 1.1 gdamore sbdroprecord(&so->so_snd);
451 1.1 gdamore
452 1.1 gdamore sowwakeup(so);
453 1.1 gdamore }
454 1.1 gdamore
455 1.1 gdamore static void
456 1.7 plunky l2cap_linkmode(void *arg, int new)
457 1.7 plunky {
458 1.7 plunky struct socket *so = arg;
459 1.9 plunky struct sockopt sopt;
460 1.7 plunky int mode;
461 1.7 plunky
462 1.7 plunky DPRINTF("auth %s, encrypt %s, secure %s\n",
463 1.7 plunky (new & L2CAP_LM_AUTH ? "on" : "off"),
464 1.7 plunky (new & L2CAP_LM_ENCRYPT ? "on" : "off"),
465 1.7 plunky (new & L2CAP_LM_SECURE ? "on" : "off"));
466 1.7 plunky
467 1.9 plunky sockopt_init(&sopt, BTPROTO_L2CAP, SO_L2CAP_LM, 0);
468 1.9 plunky (void)l2cap_getopt(so->so_pcb, &sopt);
469 1.9 plunky (void)sockopt_getint(&sopt, &mode);
470 1.9 plunky sockopt_destroy(&sopt);
471 1.9 plunky
472 1.7 plunky if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
473 1.7 plunky || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
474 1.7 plunky || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
475 1.9.38.1 tls l2cap_disconnect_pcb(so->so_pcb, 0);
476 1.7 plunky }
477 1.7 plunky
478 1.7 plunky static void
479 1.1 gdamore l2cap_input(void *arg, struct mbuf *m)
480 1.1 gdamore {
481 1.1 gdamore struct socket *so = arg;
482 1.1 gdamore
483 1.1 gdamore if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
484 1.1 gdamore printf("%s: packet (%d bytes) dropped (socket buffer full)\n",
485 1.1 gdamore __func__, m->m_pkthdr.len);
486 1.1 gdamore m_freem(m);
487 1.1 gdamore return;
488 1.1 gdamore }
489 1.1 gdamore
490 1.1 gdamore DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
491 1.1 gdamore
492 1.1 gdamore sbappendrecord(&so->so_rcv, m);
493 1.1 gdamore sorwakeup(so);
494 1.1 gdamore }
495 1.9.38.1 tls
496 1.9.38.1 tls PR_WRAP_USRREQS(l2cap)
497 1.9.38.1 tls
498 1.9.38.1 tls #define l2cap_attach l2cap_attach_wrapper
499 1.9.38.1 tls #define l2cap_detach l2cap_detach_wrapper
500 1.9.38.1 tls #define l2cap_accept l2cap_accept_wrapper
501 1.9.38.1 tls #define l2cap_bind l2cap_bind_wrapper
502 1.9.38.1 tls #define l2cap_listen l2cap_listen_wrapper
503 1.9.38.1 tls #define l2cap_connect l2cap_connect_wrapper
504 1.9.38.1 tls #define l2cap_connect2 l2cap_connect2_wrapper
505 1.9.38.1 tls #define l2cap_disconnect l2cap_disconnect_wrapper
506 1.9.38.1 tls #define l2cap_shutdown l2cap_shutdown_wrapper
507 1.9.38.1 tls #define l2cap_abort l2cap_abort_wrapper
508 1.9.38.1 tls #define l2cap_ioctl l2cap_ioctl_wrapper
509 1.9.38.1 tls #define l2cap_stat l2cap_stat_wrapper
510 1.9.38.1 tls #define l2cap_peeraddr l2cap_peeraddr_wrapper
511 1.9.38.1 tls #define l2cap_sockaddr l2cap_sockaddr_wrapper
512 1.9.38.1 tls #define l2cap_rcvd l2cap_rcvd_wrapper
513 1.9.38.1 tls #define l2cap_recvoob l2cap_recvoob_wrapper
514 1.9.38.1 tls #define l2cap_send l2cap_send_wrapper
515 1.9.38.1 tls #define l2cap_sendoob l2cap_sendoob_wrapper
516 1.9.38.1 tls #define l2cap_purgeif l2cap_purgeif_wrapper
517 1.9.38.1 tls
518 1.9.38.1 tls const struct pr_usrreqs l2cap_usrreqs = {
519 1.9.38.1 tls .pr_attach = l2cap_attach,
520 1.9.38.1 tls .pr_detach = l2cap_detach,
521 1.9.38.1 tls .pr_accept = l2cap_accept,
522 1.9.38.1 tls .pr_bind = l2cap_bind,
523 1.9.38.1 tls .pr_listen = l2cap_listen,
524 1.9.38.1 tls .pr_connect = l2cap_connect,
525 1.9.38.1 tls .pr_connect2 = l2cap_connect2,
526 1.9.38.1 tls .pr_disconnect = l2cap_disconnect,
527 1.9.38.1 tls .pr_shutdown = l2cap_shutdown,
528 1.9.38.1 tls .pr_abort = l2cap_abort,
529 1.9.38.1 tls .pr_ioctl = l2cap_ioctl,
530 1.9.38.1 tls .pr_stat = l2cap_stat,
531 1.9.38.1 tls .pr_peeraddr = l2cap_peeraddr,
532 1.9.38.1 tls .pr_sockaddr = l2cap_sockaddr,
533 1.9.38.1 tls .pr_rcvd = l2cap_rcvd,
534 1.9.38.1 tls .pr_recvoob = l2cap_recvoob,
535 1.9.38.1 tls .pr_send = l2cap_send,
536 1.9.38.1 tls .pr_sendoob = l2cap_sendoob,
537 1.9.38.1 tls .pr_purgeif = l2cap_purgeif,
538 1.9.38.1 tls };
539