blob: d3863a5b39af3a0039cd9bb94c1d14d0c0b92fc2 [file] [log] [blame]
// Copyright 2023 The Pigweed Authors
//
// Licensed under the Apache License, Version 2.0 (the "License"); you may not
// use this file except in compliance with the License. You may obtain a copy of
// the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
// License for the specific language governing permissions and limitations under
// the License.
#include "pw_bluetooth_sapphire/internal/host/sm/pairing_channel.h"
#include "pw_bluetooth_sapphire/internal/host/common/assert.h"
#include "pw_bluetooth_sapphire/internal/host/common/byte_buffer.h"
#include "pw_bluetooth_sapphire/internal/host/l2cap/channel.h"
#include "pw_bluetooth_sapphire/internal/host/l2cap/scoped_channel.h"
#include "pw_bluetooth_sapphire/internal/host/sm/smp.h"
namespace bt::sm {
PairingChannel::PairingChannel(l2cap::Channel::WeakPtr chan,
fit::closure timer_resetter)
: chan_(std::move(chan)),
reset_timer_(std::move(timer_resetter)),
weak_self_(this) {
BT_ASSERT(chan_);
if (chan_->link_type() == bt::LinkType::kLE) {
BT_ASSERT(chan_->id() == l2cap::kLESMPChannelId);
} else if (chan_->link_type() == bt::LinkType::kACL) {
BT_ASSERT(chan_->id() == l2cap::kSMPChannelId);
} else {
BT_PANIC("unsupported link type for SMP!");
}
auto self = weak_self_.GetWeakPtr();
chan_->Activate(
[self](ByteBufferPtr sdu) {
if (self.is_alive()) {
self->OnRxBFrame(std::move(sdu));
} else {
bt_log(WARN, "sm", "dropped packet on SM channel!");
}
},
[self]() {
if (self.is_alive()) {
self->OnChannelClosed();
}
});
// The SMP fixed channel's MTU must be >=23 bytes (kNoSecureConnectionsMTU)
// per spec V5.0 Vol. 3 Part H 3.2. As SMP operates on a fixed channel, there
// is no way to configure this MTU, so we expect that L2CAP always provides a
// channel with a sufficiently large MTU. This assertion serves as an explicit
// acknowledgement of that contract between L2CAP and SMP.
BT_ASSERT(chan_->max_tx_sdu_size() >= kNoSecureConnectionsMtu &&
chan_->max_rx_sdu_size() >= kNoSecureConnectionsMtu);
}
PairingChannel::PairingChannel(l2cap::Channel::WeakPtr chan)
: PairingChannel(std::move(chan), []() {}) {}
void PairingChannel::SetChannelHandler(Handler::WeakPtr new_handler) {
BT_ASSERT(new_handler.is_alive());
bt_log(TRACE, "sm", "changing pairing channel handler");
handler_ = std::move(new_handler);
}
void PairingChannel::OnRxBFrame(ByteBufferPtr sdu) {
if (handler_.is_alive()) {
handler_->OnRxBFrame(std::move(sdu));
} else {
bt_log(WARN, "sm", "no handler to receive L2CAP packet callback!");
}
}
void PairingChannel::OnChannelClosed() {
if (handler_.is_alive()) {
handler_->OnChannelClosed();
} else {
bt_log(WARN, "sm", "no handler to receive L2CAP channel closed callback!");
}
}
} // namespace bt::sm