2019-01-07 07:16:47 +00:00
|
|
|
|
/* Bluetooth Mesh */
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Copyright (c) 2017 Intel Corporation
|
|
|
|
|
*
|
|
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
|
|
|
|
|
#define BT_DBG_ENABLED IS_ENABLED(CONFIG_BLE_MESH_DEBUG_FRIEND)
|
|
|
|
|
|
|
|
|
|
#include "crypto.h"
|
|
|
|
|
#include "adv.h"
|
|
|
|
|
#include "mesh.h"
|
|
|
|
|
#include "transport.h"
|
|
|
|
|
#include "access.h"
|
|
|
|
|
#include "friend.h"
|
2020-01-19 10:57:13 +00:00
|
|
|
|
#include "foundation.h"
|
|
|
|
|
#include "mesh_main.h"
|
2019-12-06 07:34:18 +00:00
|
|
|
|
#include "provisioner_main.h"
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
#ifdef CONFIG_BLE_MESH_FRIEND
|
|
|
|
|
|
|
|
|
|
/* We reserve one extra buffer for each friendship, since we need to be able
|
|
|
|
|
* to resend the last sent PDU, which sits separately outside of the queue.
|
|
|
|
|
*/
|
|
|
|
|
#define FRIEND_BUF_COUNT ((CONFIG_BLE_MESH_FRIEND_QUEUE_SIZE + 1) * \
|
|
|
|
|
CONFIG_BLE_MESH_FRIEND_LPN_COUNT)
|
|
|
|
|
|
2019-10-24 08:06:50 +00:00
|
|
|
|
#define FRIEND_ADV(buf) CONTAINER_OF(BLE_MESH_ADV(buf), struct friend_adv, adv)
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
/* PDUs from Friend to the LPN should only be transmitted once with the
|
|
|
|
|
* smallest possible interval (20ms).
|
|
|
|
|
*/
|
|
|
|
|
#define FRIEND_XMIT BLE_MESH_TRANSMIT(0, 20)
|
|
|
|
|
|
|
|
|
|
struct friend_pdu_info {
|
|
|
|
|
u16_t src;
|
|
|
|
|
u16_t dst;
|
|
|
|
|
|
|
|
|
|
u8_t seq[3];
|
|
|
|
|
|
|
|
|
|
u8_t ttl: 7,
|
|
|
|
|
ctl: 1;
|
|
|
|
|
|
|
|
|
|
u32_t iv_index;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
NET_BUF_POOL_FIXED_DEFINE(friend_buf_pool, FRIEND_BUF_COUNT,
|
|
|
|
|
BLE_MESH_ADV_DATA_SIZE, NULL);
|
|
|
|
|
|
2019-10-24 08:06:50 +00:00
|
|
|
|
static struct friend_adv {
|
|
|
|
|
struct bt_mesh_adv adv;
|
|
|
|
|
u16_t app_idx;
|
|
|
|
|
} adv_pool[FRIEND_BUF_COUNT];
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
2019-09-17 08:56:52 +00:00
|
|
|
|
enum {
|
|
|
|
|
BLE_MESH_FRIENDSHIP_TERMINATE_ESTABLISH_FAIL,
|
|
|
|
|
BLE_MESH_FRIENDSHIP_TERMINATE_POLL_TIMEOUT,
|
|
|
|
|
BLE_MESH_FRIENDSHIP_TERMINATE_RECV_FRND_REQ,
|
|
|
|
|
BLE_MESH_FRIENDSHIP_TERMINATE_RECV_FRND_CLEAR,
|
|
|
|
|
BLE_MESH_FRIENDSHIP_TERMINATE_DISABLE,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void (*friend_cb)(bool establish, u16_t lpn_addr, u8_t reason);
|
|
|
|
|
|
2020-05-18 02:39:51 +00:00
|
|
|
|
static bool friend_init = false;
|
|
|
|
|
|
2019-12-06 07:34:18 +00:00
|
|
|
|
static struct bt_mesh_subnet *friend_subnet_get(u16_t net_idx)
|
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_subnet *sub = NULL;
|
|
|
|
|
|
|
|
|
|
if (IS_ENABLED(CONFIG_BLE_MESH_NODE) && bt_mesh_is_provisioned()) {
|
|
|
|
|
sub = bt_mesh_subnet_get(net_idx);
|
|
|
|
|
} else if (IS_ENABLED(CONFIG_BLE_MESH_PROVISIONER) && bt_mesh_is_provisioner_en()) {
|
2020-01-19 10:57:13 +00:00
|
|
|
|
sub = bt_mesh_provisioner_subnet_get(net_idx);
|
2019-12-06 07:34:18 +00:00
|
|
|
|
}
|
2019-09-17 08:56:52 +00:00
|
|
|
|
|
2019-12-06 07:34:18 +00:00
|
|
|
|
return sub;
|
|
|
|
|
}
|
2019-09-17 08:56:52 +00:00
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
static struct bt_mesh_adv *adv_alloc(int id)
|
|
|
|
|
{
|
2019-10-24 08:06:50 +00:00
|
|
|
|
adv_pool[id].app_idx = BLE_MESH_KEY_UNUSED;
|
|
|
|
|
return &adv_pool[id].adv;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static bool is_lpn_unicast(struct bt_mesh_friend *frnd, u16_t addr)
|
|
|
|
|
{
|
|
|
|
|
if (frnd->lpn == BLE_MESH_ADDR_UNASSIGNED) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return (addr >= frnd->lpn && addr < (frnd->lpn + frnd->num_elem));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
struct bt_mesh_friend *bt_mesh_friend_find(u16_t net_idx, u16_t lpn_addr,
|
|
|
|
|
bool valid, bool established)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
BT_DBG("net_idx 0x%04x lpn_addr 0x%04x", net_idx, lpn_addr);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
struct bt_mesh_friend *frnd = &bt_mesh.frnd[i];
|
|
|
|
|
|
|
|
|
|
if (valid && !frnd->valid) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (established && !frnd->established) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (net_idx != BLE_MESH_KEY_ANY && frnd->net_idx != net_idx) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (is_lpn_unicast(frnd, lpn_addr)) {
|
|
|
|
|
return frnd;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-02 07:30:40 +00:00
|
|
|
|
static void purge_buffers(sys_slist_t *list)
|
|
|
|
|
{
|
|
|
|
|
while (!sys_slist_is_empty(list)) {
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct net_buf *buf = NULL;
|
2019-09-02 07:30:40 +00:00
|
|
|
|
|
|
|
|
|
buf = (void *)sys_slist_get_not_empty(list);
|
|
|
|
|
|
|
|
|
|
buf->frags = NULL;
|
|
|
|
|
buf->flags &= ~NET_BUF_FRAGS;
|
|
|
|
|
|
|
|
|
|
net_buf_unref(buf);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
/* Intentionally start a little bit late into the ReceiveWindow when
|
|
|
|
|
* it's large enough. This may improve reliability with some platforms,
|
|
|
|
|
* like the PTS, where the receiver might not have sufficiently compensated
|
|
|
|
|
* for internal latencies required to start scanning.
|
|
|
|
|
*/
|
|
|
|
|
static s32_t recv_delay(struct bt_mesh_friend *frnd)
|
|
|
|
|
{
|
|
|
|
|
#if CONFIG_BLE_MESH_FRIEND_RECV_WIN > 50
|
|
|
|
|
return (s32_t)frnd->recv_delay + (CONFIG_BLE_MESH_FRIEND_RECV_WIN / 5);
|
|
|
|
|
#else
|
|
|
|
|
return frnd->recv_delay;
|
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-17 08:56:52 +00:00
|
|
|
|
static void friend_clear(struct bt_mesh_friend *frnd, u8_t reason)
|
2019-01-07 07:16:47 +00:00
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
BT_DBG("LPN 0x%04x", frnd->lpn);
|
|
|
|
|
|
|
|
|
|
k_delayed_work_cancel(&frnd->timer);
|
|
|
|
|
|
2019-09-17 08:56:52 +00:00
|
|
|
|
if (frnd->established) {
|
|
|
|
|
if (friend_cb) {
|
|
|
|
|
friend_cb(false, frnd->lpn, reason);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
friend_cred_del(frnd->net_idx, frnd->lpn);
|
|
|
|
|
|
|
|
|
|
if (frnd->last) {
|
|
|
|
|
/* Cancel the sending if necessary */
|
|
|
|
|
if (frnd->pending_buf) {
|
2019-11-26 12:14:31 +00:00
|
|
|
|
bt_mesh_adv_buf_ref_debug(__func__, frnd->last, 2U, BLE_MESH_BUF_REF_EQUAL);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
BLE_MESH_ADV(frnd->last)->busy = 0U;
|
2019-11-26 12:14:31 +00:00
|
|
|
|
} else {
|
|
|
|
|
bt_mesh_adv_buf_ref_debug(__func__, frnd->last, 1U, BLE_MESH_BUF_REF_EQUAL);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
net_buf_unref(frnd->last);
|
|
|
|
|
frnd->last = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-02 07:30:40 +00:00
|
|
|
|
purge_buffers(&frnd->queue);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(frnd->seg); i++) {
|
|
|
|
|
struct bt_mesh_friend_seg *seg = &frnd->seg[i];
|
|
|
|
|
|
2019-09-02 07:30:40 +00:00
|
|
|
|
purge_buffers(&seg->queue);
|
|
|
|
|
seg->seg_count = 0U;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
frnd->valid = 0U;
|
|
|
|
|
frnd->established = 0U;
|
|
|
|
|
frnd->pending_buf = 0U;
|
|
|
|
|
frnd->fsn = 0U;
|
|
|
|
|
frnd->queue_size = 0U;
|
|
|
|
|
frnd->pending_req = 0U;
|
|
|
|
|
(void)memset(frnd->sub_list, 0, sizeof(frnd->sub_list));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void bt_mesh_friend_clear_net_idx(u16_t net_idx)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
BT_DBG("net_idx 0x%04x", net_idx);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
struct bt_mesh_friend *frnd = &bt_mesh.frnd[i];
|
|
|
|
|
|
|
|
|
|
if (frnd->net_idx == BLE_MESH_KEY_UNUSED) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (net_idx == BLE_MESH_KEY_ANY || frnd->net_idx == net_idx) {
|
2019-09-17 08:56:52 +00:00
|
|
|
|
friend_clear(frnd, BLE_MESH_FRIENDSHIP_TERMINATE_DISABLE);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void bt_mesh_friend_sec_update(u16_t net_idx)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
BT_DBG("net_idx 0x%04x", net_idx);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
struct bt_mesh_friend *frnd = &bt_mesh.frnd[i];
|
|
|
|
|
|
|
|
|
|
if (frnd->net_idx == BLE_MESH_KEY_UNUSED) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (net_idx == BLE_MESH_KEY_ANY || frnd->net_idx == net_idx) {
|
|
|
|
|
frnd->sec_update = 1U;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int bt_mesh_friend_clear(struct bt_mesh_net_rx *rx, struct net_buf_simple *buf)
|
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_ctl_friend_clear *msg = (void *)buf->data;
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct bt_mesh_friend *frnd = NULL;
|
|
|
|
|
u16_t lpn_addr = 0U, lpn_counter = 0U;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
struct bt_mesh_net_tx tx = {
|
|
|
|
|
.sub = rx->sub,
|
|
|
|
|
.ctx = &rx->ctx,
|
|
|
|
|
.src = bt_mesh_primary_addr(),
|
|
|
|
|
.xmit = bt_mesh_net_transmit_get(),
|
|
|
|
|
};
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct bt_mesh_ctl_friend_clear_confirm cfm = {0};
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
if (buf->len < sizeof(*msg)) {
|
|
|
|
|
BT_WARN("%s, Too short Friend Clear", __func__);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
lpn_addr = sys_be16_to_cpu(msg->lpn_addr);
|
|
|
|
|
lpn_counter = sys_be16_to_cpu(msg->lpn_counter);
|
|
|
|
|
|
|
|
|
|
BT_DBG("LPN addr 0x%04x counter 0x%04x", lpn_addr, lpn_counter);
|
|
|
|
|
|
|
|
|
|
frnd = bt_mesh_friend_find(rx->sub->net_idx, lpn_addr, false, false);
|
|
|
|
|
if (!frnd) {
|
|
|
|
|
BT_WARN("%s, No matching LPN addr 0x%04x", __func__, lpn_addr);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* A Friend Clear message is considered valid if the result of the
|
|
|
|
|
* subtraction of the value of the LPNCounter field of the Friend
|
|
|
|
|
* Request message (the one that initiated the friendship) from the
|
|
|
|
|
* value of the LPNCounter field of the Friend Clear message, modulo
|
|
|
|
|
* 65536, is in the range 0 to 255 inclusive.
|
|
|
|
|
*/
|
|
|
|
|
if (lpn_counter - frnd->lpn_counter > 255) {
|
|
|
|
|
BT_WARN("%s, LPN Counter out of range (old %u new %u)",
|
|
|
|
|
__func__, frnd->lpn_counter, lpn_counter);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
tx.ctx->send_ttl = BLE_MESH_TTL_MAX;
|
|
|
|
|
|
|
|
|
|
cfm.lpn_addr = msg->lpn_addr;
|
|
|
|
|
cfm.lpn_counter = msg->lpn_counter;
|
|
|
|
|
|
|
|
|
|
bt_mesh_ctl_send(&tx, TRANS_CTL_OP_FRIEND_CLEAR_CFM, &cfm,
|
2020-03-26 10:08:18 +00:00
|
|
|
|
sizeof(cfm), NULL, NULL);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
2019-09-17 08:56:52 +00:00
|
|
|
|
friend_clear(frnd, BLE_MESH_FRIENDSHIP_TERMINATE_RECV_FRND_CLEAR);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void friend_sub_add(struct bt_mesh_friend *frnd, u16_t addr)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(frnd->sub_list); i++) {
|
|
|
|
|
if (frnd->sub_list[i] == BLE_MESH_ADDR_UNASSIGNED) {
|
|
|
|
|
frnd->sub_list[i] = addr;
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
BT_WARN("%s, No space in friend subscription list", __func__);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void friend_sub_rem(struct bt_mesh_friend *frnd, u16_t addr)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(frnd->sub_list); i++) {
|
|
|
|
|
if (frnd->sub_list[i] == addr) {
|
|
|
|
|
frnd->sub_list[i] = BLE_MESH_ADDR_UNASSIGNED;
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct net_buf *create_friend_pdu(struct bt_mesh_friend *frnd,
|
|
|
|
|
struct friend_pdu_info *info,
|
|
|
|
|
struct net_buf_simple *sdu)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct net_buf *buf = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
2019-09-02 07:30:40 +00:00
|
|
|
|
buf = bt_mesh_adv_create_from_pool(&friend_buf_pool, adv_alloc,
|
|
|
|
|
BLE_MESH_ADV_DATA,
|
|
|
|
|
FRIEND_XMIT, K_NO_WAIT);
|
|
|
|
|
if (!buf) {
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
net_buf_add_u8(buf, (info->iv_index & 1) << 7); /* Will be reset in encryption */
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
if (info->ctl) {
|
|
|
|
|
net_buf_add_u8(buf, info->ttl | 0x80);
|
|
|
|
|
} else {
|
|
|
|
|
net_buf_add_u8(buf, info->ttl);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
net_buf_add_mem(buf, info->seq, sizeof(info->seq));
|
|
|
|
|
|
|
|
|
|
net_buf_add_be16(buf, info->src);
|
|
|
|
|
net_buf_add_be16(buf, info->dst);
|
|
|
|
|
|
|
|
|
|
net_buf_add_mem(buf, sdu->data, sdu->len);
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
return buf;
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-24 08:06:50 +00:00
|
|
|
|
struct unseg_app_sdu_meta {
|
|
|
|
|
struct bt_mesh_net_rx net;
|
|
|
|
|
const u8_t *key;
|
|
|
|
|
struct bt_mesh_subnet *subnet;
|
|
|
|
|
bool is_dev_key;
|
|
|
|
|
u8_t aid;
|
|
|
|
|
u8_t *ad;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static int unseg_app_sdu_unpack(struct bt_mesh_friend *frnd,
|
|
|
|
|
struct net_buf *buf,
|
|
|
|
|
struct unseg_app_sdu_meta *meta)
|
|
|
|
|
{
|
|
|
|
|
u16_t app_idx = FRIEND_ADV(buf)->app_idx;
|
2020-01-19 10:57:13 +00:00
|
|
|
|
u8_t role = 0U;
|
|
|
|
|
int err = 0;
|
2019-10-24 08:06:50 +00:00
|
|
|
|
|
2019-12-06 07:34:18 +00:00
|
|
|
|
meta->subnet = friend_subnet_get(frnd->net_idx);
|
|
|
|
|
if (!meta->subnet) {
|
|
|
|
|
BT_ERR("Invalid subnet for unseg app sdu");
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
role = (IS_ENABLED(CONFIG_BLE_MESH_NODE) &&
|
|
|
|
|
bt_mesh_is_provisioned()) ? NODE : PROVISIONER;
|
|
|
|
|
|
2019-10-24 08:06:50 +00:00
|
|
|
|
meta->is_dev_key = (app_idx == BLE_MESH_KEY_DEV);
|
|
|
|
|
bt_mesh_net_header_parse(&buf->b, &meta->net);
|
|
|
|
|
err = bt_mesh_app_key_get(meta->subnet, app_idx, &meta->key,
|
2019-12-06 07:34:18 +00:00
|
|
|
|
&meta->aid, role, meta->net.ctx.addr);
|
2019-10-24 08:06:50 +00:00
|
|
|
|
if (err) {
|
2019-12-06 07:34:18 +00:00
|
|
|
|
BT_ERR("Failed to get AppKey");
|
2019-10-24 08:06:50 +00:00
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (BLE_MESH_ADDR_IS_VIRTUAL(meta->net.ctx.recv_dst)) {
|
|
|
|
|
meta->ad = bt_mesh_label_uuid_get(meta->net.ctx.recv_dst);
|
|
|
|
|
if (!meta->ad) {
|
2019-12-06 07:34:18 +00:00
|
|
|
|
BT_ERR("Failed to get label uuid");
|
2019-10-24 08:06:50 +00:00
|
|
|
|
return -ENOENT;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
meta->ad = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int unseg_app_sdu_decrypt(struct bt_mesh_friend *frnd,
|
|
|
|
|
struct net_buf *buf,
|
|
|
|
|
const struct unseg_app_sdu_meta *meta)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct net_buf_simple sdu = {0};
|
2019-10-24 08:17:22 +00:00
|
|
|
|
|
|
|
|
|
net_buf_simple_clone(&buf->b, &sdu);
|
|
|
|
|
net_buf_simple_pull(&sdu, 10);
|
|
|
|
|
sdu.len -= 4;
|
2019-10-24 08:06:50 +00:00
|
|
|
|
|
|
|
|
|
return bt_mesh_app_decrypt(meta->key, meta->is_dev_key, 0, &sdu, &sdu,
|
|
|
|
|
meta->ad, meta->net.ctx.addr,
|
|
|
|
|
meta->net.ctx.recv_dst, meta->net.seq,
|
|
|
|
|
BLE_MESH_NET_IVI_TX);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int unseg_app_sdu_encrypt(struct bt_mesh_friend *frnd,
|
|
|
|
|
struct net_buf *buf,
|
|
|
|
|
const struct unseg_app_sdu_meta *meta)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct net_buf_simple sdu = {0};
|
2019-10-24 08:17:22 +00:00
|
|
|
|
|
|
|
|
|
net_buf_simple_clone(&buf->b, &sdu);
|
|
|
|
|
net_buf_simple_pull(&sdu, 10);
|
|
|
|
|
sdu.len -= 4;
|
2019-10-24 08:06:50 +00:00
|
|
|
|
|
|
|
|
|
return bt_mesh_app_encrypt(meta->key, meta->is_dev_key, 0, &sdu,
|
|
|
|
|
meta->ad, meta->net.ctx.addr,
|
|
|
|
|
meta->net.ctx.recv_dst, bt_mesh.seq,
|
|
|
|
|
BLE_MESH_NET_IVI_TX);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int unseg_app_sdu_prepare(struct bt_mesh_friend *frnd,
|
|
|
|
|
struct net_buf *buf)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct unseg_app_sdu_meta meta = {0};
|
|
|
|
|
int err = 0;
|
2019-10-24 08:06:50 +00:00
|
|
|
|
|
|
|
|
|
if (FRIEND_ADV(buf)->app_idx == BLE_MESH_KEY_UNUSED) {
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = unseg_app_sdu_unpack(frnd, buf, &meta);
|
|
|
|
|
if (err) {
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-12 07:31:26 +00:00
|
|
|
|
/* No need to re-encrypt the message if the sequence number is
|
2019-10-24 08:06:50 +00:00
|
|
|
|
* unchanged.
|
|
|
|
|
*/
|
|
|
|
|
if (meta.net.seq == bt_mesh.seq) {
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = unseg_app_sdu_decrypt(frnd, buf, &meta);
|
|
|
|
|
if (err) {
|
|
|
|
|
BT_WARN("Decryption failed! %d", err);
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
err = unseg_app_sdu_encrypt(frnd, buf, &meta);
|
|
|
|
|
if (err) {
|
|
|
|
|
BT_WARN("Re-encryption failed! %d", err);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int encrypt_friend_pdu(struct bt_mesh_friend *frnd, struct net_buf *buf,
|
|
|
|
|
bool master_cred)
|
2019-10-23 02:51:33 +00:00
|
|
|
|
{
|
2019-12-06 07:34:18 +00:00
|
|
|
|
struct bt_mesh_subnet *sub = friend_subnet_get(frnd->net_idx);
|
2020-01-19 10:57:13 +00:00
|
|
|
|
const u8_t *enc = NULL, *priv = NULL;
|
|
|
|
|
u32_t iv_index = 0U;
|
|
|
|
|
u16_t src = 0U;
|
|
|
|
|
u8_t nid = 0U;
|
|
|
|
|
int err = 0;
|
2019-10-23 02:51:33 +00:00
|
|
|
|
|
2019-12-06 07:34:18 +00:00
|
|
|
|
if (!sub) {
|
|
|
|
|
BT_ERR("Invalid subnet to encrypt friend pdu");
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
if (master_cred) {
|
|
|
|
|
enc = sub->keys[sub->kr_flag].enc;
|
|
|
|
|
priv = sub->keys[sub->kr_flag].privacy;
|
|
|
|
|
nid = sub->keys[sub->kr_flag].nid;
|
|
|
|
|
} else {
|
|
|
|
|
if (friend_cred_get(sub, frnd->lpn, &nid, &enc, &priv)) {
|
|
|
|
|
BT_ERR("friend_cred_get failed");
|
|
|
|
|
return -ENOENT;
|
|
|
|
|
}
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
src = sys_get_be16(&buf->data[5]);
|
|
|
|
|
|
|
|
|
|
if (bt_mesh_elem_find(src)) {
|
2019-10-24 08:06:50 +00:00
|
|
|
|
u32_t seq;
|
|
|
|
|
|
|
|
|
|
if (FRIEND_ADV(buf)->app_idx != BLE_MESH_KEY_UNUSED) {
|
|
|
|
|
err = unseg_app_sdu_prepare(frnd, buf);
|
|
|
|
|
if (err) {
|
|
|
|
|
return err;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
seq = bt_mesh_next_seq();
|
2020-03-26 03:16:26 +00:00
|
|
|
|
sys_put_be24(seq, &buf->data[2]);
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
iv_index = BLE_MESH_NET_IVI_TX;
|
2019-10-24 08:06:50 +00:00
|
|
|
|
FRIEND_ADV(buf)->app_idx = BLE_MESH_KEY_UNUSED;
|
2019-10-23 02:51:33 +00:00
|
|
|
|
} else {
|
|
|
|
|
u8_t ivi = (buf->data[0] >> 7);
|
|
|
|
|
iv_index = (bt_mesh.iv_index - ((bt_mesh.iv_index & 1) != ivi));
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
buf->data[0] = (nid | (iv_index & 1) << 7);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
if (bt_mesh_net_encrypt(enc, &buf->b, iv_index, false)) {
|
|
|
|
|
BT_ERR("Encrypting failed");
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (bt_mesh_net_obfuscate(buf->data, iv_index, priv)) {
|
|
|
|
|
BT_ERR("Obfuscating failed");
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct net_buf *encode_friend_ctl(struct bt_mesh_friend *frnd,
|
|
|
|
|
u8_t ctl_op,
|
|
|
|
|
struct net_buf_simple *sdu)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct friend_pdu_info info = {0};
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
BT_DBG("LPN 0x%04x", frnd->lpn);
|
|
|
|
|
|
|
|
|
|
net_buf_simple_push_u8(sdu, TRANS_CTL_HDR(ctl_op, 0));
|
|
|
|
|
|
|
|
|
|
info.src = bt_mesh_primary_addr();
|
|
|
|
|
info.dst = frnd->lpn;
|
|
|
|
|
|
|
|
|
|
info.ctl = 1U;
|
|
|
|
|
info.ttl = 0U;
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
memset(info.seq, 0, sizeof(info.seq));
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
info.iv_index = BLE_MESH_NET_IVI_TX;
|
|
|
|
|
|
|
|
|
|
return create_friend_pdu(frnd, &info, sdu);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct net_buf *encode_update(struct bt_mesh_friend *frnd, u8_t md)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct bt_mesh_ctl_friend_update *upd = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
NET_BUF_SIMPLE_DEFINE(sdu, 1 + sizeof(*upd));
|
2019-12-06 07:34:18 +00:00
|
|
|
|
struct bt_mesh_subnet *sub = friend_subnet_get(frnd->net_idx);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
__ASSERT_NO_MSG(sub != NULL);
|
|
|
|
|
|
|
|
|
|
BT_DBG("lpn 0x%04x md 0x%02x", frnd->lpn, md);
|
|
|
|
|
|
|
|
|
|
net_buf_simple_reserve(&sdu, 1);
|
|
|
|
|
|
|
|
|
|
upd = net_buf_simple_add(&sdu, sizeof(*upd));
|
|
|
|
|
upd->flags = bt_mesh_net_flags(sub);
|
|
|
|
|
upd->iv_index = sys_cpu_to_be32(bt_mesh.iv_index);
|
|
|
|
|
upd->md = md;
|
|
|
|
|
|
|
|
|
|
return encode_friend_ctl(frnd, TRANS_CTL_OP_FRIEND_UPDATE, &sdu);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void enqueue_sub_cfm(struct bt_mesh_friend *frnd, u8_t xact)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct bt_mesh_ctl_friend_sub_confirm *cfm = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
NET_BUF_SIMPLE_DEFINE(sdu, 1 + sizeof(*cfm));
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct net_buf *buf = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
BT_DBG("lpn 0x%04x xact 0x%02x", frnd->lpn, xact);
|
|
|
|
|
|
|
|
|
|
net_buf_simple_reserve(&sdu, 1);
|
|
|
|
|
|
|
|
|
|
cfm = net_buf_simple_add(&sdu, sizeof(*cfm));
|
|
|
|
|
cfm->xact = xact;
|
|
|
|
|
|
|
|
|
|
buf = encode_friend_ctl(frnd, TRANS_CTL_OP_FRIEND_SUB_CFM, &sdu);
|
|
|
|
|
if (!buf) {
|
|
|
|
|
BT_ERR("%s, Unable to encode Subscription List Confirmation", __func__);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
if (encrypt_friend_pdu(frnd, buf, false)) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
if (frnd->last) {
|
|
|
|
|
BT_DBG("Discarding last PDU");
|
|
|
|
|
net_buf_unref(frnd->last);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
frnd->last = buf;
|
|
|
|
|
frnd->send_last = 1U;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void friend_recv_delay(struct bt_mesh_friend *frnd)
|
|
|
|
|
{
|
|
|
|
|
frnd->pending_req = 1U;
|
|
|
|
|
k_delayed_work_submit(&frnd->timer, recv_delay(frnd));
|
2020-01-19 10:57:13 +00:00
|
|
|
|
BT_INFO("Waiting RecvDelay of %d ms", recv_delay(frnd));
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int bt_mesh_friend_sub_add(struct bt_mesh_net_rx *rx,
|
|
|
|
|
struct net_buf_simple *buf)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct bt_mesh_friend *frnd = NULL;
|
|
|
|
|
u8_t xact = 0U;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
if (buf->len < BLE_MESH_FRIEND_SUB_MIN_LEN) {
|
|
|
|
|
BT_WARN("%s, Too short Friend Subscription Add", __func__);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
frnd = bt_mesh_friend_find(rx->sub->net_idx, rx->ctx.addr, true, true);
|
|
|
|
|
if (!frnd) {
|
|
|
|
|
BT_WARN("%s, No matching LPN addr 0x%04x", __func__, rx->ctx.addr);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (frnd->pending_buf) {
|
|
|
|
|
BT_WARN("%s, Previous buffer not yet sent!", __func__);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
friend_recv_delay(frnd);
|
|
|
|
|
|
|
|
|
|
xact = net_buf_simple_pull_u8(buf);
|
|
|
|
|
|
|
|
|
|
while (buf->len >= 2U) {
|
|
|
|
|
friend_sub_add(frnd, net_buf_simple_pull_be16(buf));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
enqueue_sub_cfm(frnd, xact);
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int bt_mesh_friend_sub_rem(struct bt_mesh_net_rx *rx,
|
|
|
|
|
struct net_buf_simple *buf)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct bt_mesh_friend *frnd = NULL;
|
|
|
|
|
u8_t xact = 0U;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
if (buf->len < BLE_MESH_FRIEND_SUB_MIN_LEN) {
|
|
|
|
|
BT_WARN("%s, Too short Friend Subscription Remove", __func__);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
frnd = bt_mesh_friend_find(rx->sub->net_idx, rx->ctx.addr, true, true);
|
|
|
|
|
if (!frnd) {
|
|
|
|
|
BT_WARN("%s, No matching LPN addr 0x%04x", __func__, rx->ctx.addr);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (frnd->pending_buf) {
|
|
|
|
|
BT_WARN("%s, Previous buffer not yet sent!", __func__);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
friend_recv_delay(frnd);
|
|
|
|
|
|
|
|
|
|
xact = net_buf_simple_pull_u8(buf);
|
|
|
|
|
|
|
|
|
|
while (buf->len >= 2U) {
|
|
|
|
|
friend_sub_rem(frnd, net_buf_simple_pull_be16(buf));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
enqueue_sub_cfm(frnd, xact);
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void enqueue_buf(struct bt_mesh_friend *frnd, struct net_buf *buf)
|
|
|
|
|
{
|
|
|
|
|
net_buf_slist_put(&frnd->queue, buf);
|
|
|
|
|
frnd->queue_size++;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void enqueue_update(struct bt_mesh_friend *frnd, u8_t md)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct net_buf *buf = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
buf = encode_update(frnd, md);
|
|
|
|
|
if (!buf) {
|
|
|
|
|
BT_ERR("%s, Unable to encode Friend Update", __func__);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
frnd->sec_update = 0U;
|
|
|
|
|
enqueue_buf(frnd, buf);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int bt_mesh_friend_poll(struct bt_mesh_net_rx *rx, struct net_buf_simple *buf)
|
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_ctl_friend_poll *msg = (void *)buf->data;
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct bt_mesh_friend *frnd = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
if (buf->len < sizeof(*msg)) {
|
|
|
|
|
BT_WARN("%s, Too short Friend Poll", __func__);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
frnd = bt_mesh_friend_find(rx->sub->net_idx, rx->ctx.addr, true, false);
|
|
|
|
|
if (!frnd) {
|
|
|
|
|
BT_WARN("%s, No matching LPN addr 0x%04x", __func__, rx->ctx.addr);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (msg->fsn & ~1) {
|
|
|
|
|
BT_WARN("%s, Prohibited (non-zero) padding bits", __func__);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (frnd->pending_buf) {
|
|
|
|
|
BT_WARN("%s, Previous buffer not yet sent!", __func__);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
BT_DBG("msg->fsn %u frnd->fsn %u", (msg->fsn & 1), frnd->fsn);
|
|
|
|
|
|
|
|
|
|
friend_recv_delay(frnd);
|
|
|
|
|
|
|
|
|
|
if (!frnd->established) {
|
2020-01-19 10:57:13 +00:00
|
|
|
|
BT_INFO("Friendship established with 0x%04x", frnd->lpn);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
frnd->established = 1U;
|
2019-09-17 08:56:52 +00:00
|
|
|
|
if (friend_cb) {
|
|
|
|
|
friend_cb(true, frnd->lpn, 0);
|
|
|
|
|
}
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (msg->fsn == frnd->fsn && frnd->last) {
|
|
|
|
|
BT_DBG("Re-sending last PDU");
|
|
|
|
|
frnd->send_last = 1U;
|
|
|
|
|
} else {
|
|
|
|
|
if (frnd->last) {
|
|
|
|
|
net_buf_unref(frnd->last);
|
|
|
|
|
frnd->last = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
frnd->fsn = msg->fsn;
|
|
|
|
|
|
|
|
|
|
if (sys_slist_is_empty(&frnd->queue)) {
|
|
|
|
|
enqueue_update(frnd, 0);
|
|
|
|
|
BT_DBG("Enqueued Friend Update to empty queue");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct bt_mesh_friend *find_clear(u16_t prev_friend)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
struct bt_mesh_friend *frnd = &bt_mesh.frnd[i];
|
|
|
|
|
|
|
|
|
|
if (frnd->clear.frnd == prev_friend) {
|
|
|
|
|
return frnd;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void friend_clear_sent(int err, void *user_data)
|
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_friend *frnd = user_data;
|
|
|
|
|
|
|
|
|
|
k_delayed_work_submit(&frnd->clear.timer,
|
|
|
|
|
K_SECONDS(frnd->clear.repeat_sec));
|
|
|
|
|
frnd->clear.repeat_sec *= 2U;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct bt_mesh_send_cb clear_sent_cb = {
|
|
|
|
|
.end = friend_clear_sent,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void send_friend_clear(struct bt_mesh_friend *frnd)
|
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_msg_ctx ctx = {
|
|
|
|
|
.net_idx = frnd->net_idx,
|
|
|
|
|
.app_idx = BLE_MESH_KEY_UNUSED,
|
|
|
|
|
.addr = frnd->clear.frnd,
|
|
|
|
|
.send_ttl = BLE_MESH_TTL_MAX,
|
|
|
|
|
};
|
|
|
|
|
struct bt_mesh_net_tx tx = {
|
2019-12-06 07:34:18 +00:00
|
|
|
|
.sub = friend_subnet_get(frnd->net_idx),
|
2019-01-07 07:16:47 +00:00
|
|
|
|
.ctx = &ctx,
|
|
|
|
|
.src = bt_mesh_primary_addr(),
|
|
|
|
|
.xmit = bt_mesh_net_transmit_get(),
|
|
|
|
|
};
|
|
|
|
|
struct bt_mesh_ctl_friend_clear req = {
|
|
|
|
|
.lpn_addr = sys_cpu_to_be16(frnd->lpn),
|
|
|
|
|
.lpn_counter = sys_cpu_to_be16(frnd->lpn_counter),
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
BT_DBG("%s", __func__);
|
|
|
|
|
|
2019-12-06 07:34:18 +00:00
|
|
|
|
if (!tx.sub) {
|
|
|
|
|
BT_ERR("Invalid subnet for Friend Clear");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
bt_mesh_ctl_send(&tx, TRANS_CTL_OP_FRIEND_CLEAR, &req,
|
2020-03-26 10:08:18 +00:00
|
|
|
|
sizeof(req), &clear_sent_cb, frnd);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void clear_timeout(struct k_work *work)
|
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_friend *frnd = CONTAINER_OF(work, struct bt_mesh_friend,
|
|
|
|
|
clear.timer.work);
|
2020-01-19 10:57:13 +00:00
|
|
|
|
u32_t duration = 0U;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
BT_DBG("LPN 0x%04x (old) Friend 0x%04x", frnd->lpn, frnd->clear.frnd);
|
|
|
|
|
|
|
|
|
|
duration = k_uptime_get_32() - frnd->clear.start;
|
|
|
|
|
if (duration > 2 * frnd->poll_to) {
|
|
|
|
|
BT_DBG("Clear Procedure timer expired");
|
|
|
|
|
frnd->clear.frnd = BLE_MESH_ADDR_UNASSIGNED;
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
send_friend_clear(frnd);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void clear_procedure_start(struct bt_mesh_friend *frnd)
|
|
|
|
|
{
|
|
|
|
|
BT_DBG("LPN 0x%04x (old) Friend 0x%04x", frnd->lpn, frnd->clear.frnd);
|
|
|
|
|
|
2019-09-02 04:40:31 +00:00
|
|
|
|
frnd->clear.start = k_uptime_get_32();
|
2019-01-07 07:16:47 +00:00
|
|
|
|
frnd->clear.repeat_sec = 1U;
|
|
|
|
|
|
|
|
|
|
send_friend_clear(frnd);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int bt_mesh_friend_clear_cfm(struct bt_mesh_net_rx *rx,
|
|
|
|
|
struct net_buf_simple *buf)
|
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_ctl_friend_clear_confirm *msg = (void *)buf->data;
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct bt_mesh_friend *frnd = NULL;
|
|
|
|
|
u16_t lpn_addr = 0U, lpn_counter = 0U;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
BT_DBG("%s", __func__);
|
|
|
|
|
|
|
|
|
|
if (buf->len < sizeof(*msg)) {
|
|
|
|
|
BT_WARN("%s, Too short Friend Clear Confirm", __func__);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
frnd = find_clear(rx->ctx.addr);
|
|
|
|
|
if (!frnd) {
|
|
|
|
|
BT_WARN("%s, No pending clear procedure for 0x%02x", __func__, rx->ctx.addr);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
lpn_addr = sys_be16_to_cpu(msg->lpn_addr);
|
|
|
|
|
if (lpn_addr != frnd->lpn) {
|
|
|
|
|
BT_WARN("%s, LPN address mismatch (0x%04x != 0x%04x)",
|
|
|
|
|
__func__, lpn_addr, frnd->lpn);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
lpn_counter = sys_be16_to_cpu(msg->lpn_counter);
|
|
|
|
|
if (lpn_counter != frnd->lpn_counter) {
|
|
|
|
|
BT_WARN("%s, LPN counter mismatch (0x%04x != 0x%04x)",
|
|
|
|
|
__func__, lpn_counter, frnd->lpn_counter);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
k_delayed_work_cancel(&frnd->clear.timer);
|
|
|
|
|
frnd->clear.frnd = BLE_MESH_ADDR_UNASSIGNED;
|
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void enqueue_offer(struct bt_mesh_friend *frnd, s8_t rssi)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct bt_mesh_ctl_friend_offer *off = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
NET_BUF_SIMPLE_DEFINE(sdu, 1 + sizeof(*off));
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct net_buf *buf = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
BT_DBG("%s", __func__);
|
|
|
|
|
|
|
|
|
|
net_buf_simple_reserve(&sdu, 1);
|
|
|
|
|
|
|
|
|
|
off = net_buf_simple_add(&sdu, sizeof(*off));
|
|
|
|
|
|
|
|
|
|
off->recv_win = CONFIG_BLE_MESH_FRIEND_RECV_WIN,
|
|
|
|
|
off->queue_size = CONFIG_BLE_MESH_FRIEND_QUEUE_SIZE,
|
|
|
|
|
off->sub_list_size = ARRAY_SIZE(frnd->sub_list),
|
|
|
|
|
off->rssi = rssi,
|
|
|
|
|
off->frnd_counter = sys_cpu_to_be16(frnd->counter);
|
|
|
|
|
|
|
|
|
|
buf = encode_friend_ctl(frnd, TRANS_CTL_OP_FRIEND_OFFER, &sdu);
|
|
|
|
|
if (!buf) {
|
|
|
|
|
BT_ERR("%s, Unable to encode Friend Offer", __func__);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
if (encrypt_friend_pdu(frnd, buf, true)) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
frnd->counter++;
|
|
|
|
|
|
|
|
|
|
if (frnd->last) {
|
|
|
|
|
net_buf_unref(frnd->last);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
frnd->last = buf;
|
|
|
|
|
frnd->send_last = 1U;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#define RECV_WIN CONFIG_BLE_MESH_FRIEND_RECV_WIN
|
|
|
|
|
#define RSSI_FACT(crit) (((crit) >> 5) & (u8_t)BIT_MASK(2))
|
|
|
|
|
#define RECV_WIN_FACT(crit) (((crit) >> 3) & (u8_t)BIT_MASK(2))
|
|
|
|
|
#define MIN_QUEUE_SIZE_LOG(crit) ((crit) & (u8_t)BIT_MASK(3))
|
|
|
|
|
#define MIN_QUEUE_SIZE(crit) ((u32_t)BIT(MIN_QUEUE_SIZE_LOG(crit)))
|
|
|
|
|
|
|
|
|
|
static s32_t offer_delay(struct bt_mesh_friend *frnd, s8_t rssi, u8_t crit)
|
|
|
|
|
{
|
|
|
|
|
/* Scaling factors. The actual values are 1, 1.5, 2 & 2.5, but we
|
|
|
|
|
* want to avoid floating-point arithmetic.
|
|
|
|
|
*/
|
|
|
|
|
static const u8_t fact[] = { 10, 15, 20, 25 };
|
2020-01-19 10:57:13 +00:00
|
|
|
|
s32_t delay = 0;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
2020-01-19 10:57:13 +00:00
|
|
|
|
BT_INFO("ReceiveWindowFactor %u ReceiveWindow %u RSSIFactor %u RSSI %d",
|
2019-01-07 07:16:47 +00:00
|
|
|
|
fact[RECV_WIN_FACT(crit)], RECV_WIN,
|
|
|
|
|
fact[RSSI_FACT(crit)], rssi);
|
|
|
|
|
|
|
|
|
|
/* Delay = ReceiveWindowFactor * ReceiveWindow - RSSIFactor * RSSI */
|
|
|
|
|
delay = (s32_t)fact[RECV_WIN_FACT(crit)] * RECV_WIN;
|
|
|
|
|
delay -= (s32_t)fact[RSSI_FACT(crit)] * rssi;
|
|
|
|
|
delay /= 10;
|
|
|
|
|
|
|
|
|
|
BT_DBG("Local Delay calculated as %d ms", delay);
|
|
|
|
|
|
|
|
|
|
if (delay < 100) {
|
|
|
|
|
return K_MSEC(100);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return K_MSEC(delay);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int bt_mesh_friend_req(struct bt_mesh_net_rx *rx, struct net_buf_simple *buf)
|
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_ctl_friend_req *msg = (void *)buf->data;
|
|
|
|
|
struct bt_mesh_friend *frnd = NULL;
|
2020-01-19 10:57:13 +00:00
|
|
|
|
u32_t poll_to = 0U;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
if (buf->len < sizeof(*msg)) {
|
|
|
|
|
BT_WARN("%s, Too short Friend Request", __func__);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (msg->recv_delay <= 0x09) {
|
|
|
|
|
BT_WARN("%s, Prohibited ReceiveDelay (0x%02x)", __func__, msg->recv_delay);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-26 03:16:26 +00:00
|
|
|
|
poll_to = sys_get_be24(msg->poll_to);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
if (poll_to <= 0x000009 || poll_to >= 0x34bc00) {
|
|
|
|
|
BT_WARN("%s, Prohibited PollTimeout (0x%06x)", __func__, poll_to);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (msg->num_elem == 0x00) {
|
|
|
|
|
BT_WARN("%s, Prohibited NumElements value (0x00)", __func__);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!BLE_MESH_ADDR_IS_UNICAST(rx->ctx.addr + msg->num_elem - 1)) {
|
|
|
|
|
BT_WARN("%s, LPN elements stretch outside of unicast range", __func__);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!MIN_QUEUE_SIZE_LOG(msg->criteria)) {
|
|
|
|
|
BT_WARN("%s, Prohibited Minimum Queue Size in Friend Request", __func__);
|
|
|
|
|
return -EINVAL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (CONFIG_BLE_MESH_FRIEND_QUEUE_SIZE < MIN_QUEUE_SIZE(msg->criteria)) {
|
|
|
|
|
BT_WARN("%s, We have a too small Friend Queue size (%u < %u)",
|
|
|
|
|
__func__, CONFIG_BLE_MESH_FRIEND_QUEUE_SIZE,
|
|
|
|
|
MIN_QUEUE_SIZE(msg->criteria));
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
frnd = bt_mesh_friend_find(rx->sub->net_idx, rx->ctx.addr, true, false);
|
|
|
|
|
if (frnd) {
|
|
|
|
|
BT_WARN("%s, Existing LPN re-requesting Friendship", __func__);
|
2019-09-17 08:56:52 +00:00
|
|
|
|
friend_clear(frnd, BLE_MESH_FRIENDSHIP_TERMINATE_RECV_FRND_REQ);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
goto init_friend;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
if (!bt_mesh.frnd[i].valid) {
|
|
|
|
|
frnd = &bt_mesh.frnd[i];
|
|
|
|
|
frnd->valid = 1U;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!frnd) {
|
|
|
|
|
BT_WARN("%s, No free Friend contexts for new LPN", __func__);
|
|
|
|
|
return -ENOMEM;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
init_friend:
|
|
|
|
|
frnd->lpn = rx->ctx.addr;
|
|
|
|
|
frnd->num_elem = msg->num_elem;
|
|
|
|
|
frnd->net_idx = rx->sub->net_idx;
|
|
|
|
|
frnd->recv_delay = msg->recv_delay;
|
|
|
|
|
frnd->poll_to = poll_to * 100U;
|
|
|
|
|
frnd->lpn_counter = sys_be16_to_cpu(msg->lpn_counter);
|
|
|
|
|
frnd->clear.frnd = sys_be16_to_cpu(msg->prev_addr);
|
|
|
|
|
|
2020-01-19 10:57:13 +00:00
|
|
|
|
BT_INFO("LPN 0x%04x rssi %d recv_delay %u poll_to %ums",
|
2019-10-24 01:51:16 +00:00
|
|
|
|
frnd->lpn, rx->ctx.recv_rssi, frnd->recv_delay, frnd->poll_to);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
2019-09-17 08:56:52 +00:00
|
|
|
|
/**
|
|
|
|
|
* Spec says:
|
|
|
|
|
* After a friendship has been established, if the PreviousAddress field
|
|
|
|
|
* of the Friend Request message contains a valid unicast address that is
|
|
|
|
|
* not the Friend node’s own unicast address, then the Friend node shall
|
|
|
|
|
* begin sending Friend Clear messages to that unicast address.
|
|
|
|
|
*/
|
2019-01-07 07:16:47 +00:00
|
|
|
|
if (BLE_MESH_ADDR_IS_UNICAST(frnd->clear.frnd) &&
|
|
|
|
|
!bt_mesh_elem_find(frnd->clear.frnd)) {
|
|
|
|
|
clear_procedure_start(frnd);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
k_delayed_work_submit(&frnd->timer,
|
2019-10-24 01:51:16 +00:00
|
|
|
|
offer_delay(frnd, rx->ctx.recv_rssi,
|
|
|
|
|
msg->criteria));
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
friend_cred_create(rx->sub, frnd->lpn, frnd->lpn_counter,
|
|
|
|
|
frnd->counter);
|
|
|
|
|
|
2019-10-24 01:51:16 +00:00
|
|
|
|
enqueue_offer(frnd, rx->ctx.recv_rssi);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
static bool is_seg(struct bt_mesh_friend_seg *seg, u16_t src, u16_t seq_zero)
|
|
|
|
|
{
|
|
|
|
|
struct net_buf *buf = (void *)sys_slist_peek_head(&seg->queue);
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct net_buf_simple_state state = {0};
|
|
|
|
|
u16_t buf_seq_zero = 0U;
|
|
|
|
|
u16_t buf_src = 0U;
|
2019-10-23 02:51:33 +00:00
|
|
|
|
|
|
|
|
|
if (!buf) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
net_buf_simple_save(&buf->b, &state);
|
|
|
|
|
net_buf_skip(buf, 5); /* skip IVI, NID, CTL, TTL, SEQ */
|
|
|
|
|
buf_src = net_buf_pull_be16(buf);
|
|
|
|
|
net_buf_skip(buf, 3); /* skip DST, OP/AID */
|
|
|
|
|
buf_seq_zero = ((net_buf_pull_be16(buf) >> 2) & TRANS_SEQ_ZERO_MASK);
|
|
|
|
|
net_buf_simple_restore(&buf->b, &state);
|
|
|
|
|
|
|
|
|
|
return ((src == buf_src) && (seq_zero == buf_seq_zero));
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
static struct bt_mesh_friend_seg *get_seg(struct bt_mesh_friend *frnd,
|
2019-10-23 02:51:33 +00:00
|
|
|
|
u16_t src, u16_t seq_zero,
|
2019-10-21 14:53:25 +00:00
|
|
|
|
u8_t seg_count)
|
2019-01-07 07:16:47 +00:00
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_friend_seg *unassigned = NULL;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(frnd->seg); i++) {
|
|
|
|
|
struct bt_mesh_friend_seg *seg = &frnd->seg[i];
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
if (is_seg(seg, src, seq_zero)) {
|
2019-01-07 07:16:47 +00:00
|
|
|
|
return seg;
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
if (!unassigned && !sys_slist_peek_head(&seg->queue)) {
|
2019-01-07 07:16:47 +00:00
|
|
|
|
unassigned = seg;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-02 07:30:40 +00:00
|
|
|
|
if (unassigned) {
|
|
|
|
|
unassigned->seg_count = seg_count;
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
return unassigned;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void enqueue_friend_pdu(struct bt_mesh_friend *frnd,
|
|
|
|
|
enum bt_mesh_friend_pdu_type type,
|
2019-10-23 02:51:33 +00:00
|
|
|
|
u16_t src, u8_t seg_count,
|
|
|
|
|
struct net_buf *buf)
|
2019-01-07 07:16:47 +00:00
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct bt_mesh_friend_seg *seg = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
BT_DBG("type %u", type);
|
|
|
|
|
|
|
|
|
|
if (type == BLE_MESH_FRIEND_PDU_SINGLE) {
|
|
|
|
|
if (frnd->sec_update) {
|
|
|
|
|
enqueue_update(frnd, 1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
enqueue_buf(frnd, buf);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
u16_t seq_zero = (((buf->data[10] << 8 | buf->data[11]) >> 2) & TRANS_SEQ_ZERO_MASK);
|
|
|
|
|
|
|
|
|
|
seg = get_seg(frnd, src, seq_zero, seg_count);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
if (!seg) {
|
2019-10-23 02:51:33 +00:00
|
|
|
|
BT_ERR("No free friend segment RX contexts for 0x%04x", src);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
net_buf_unref(buf);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
net_buf_slist_put(&seg->queue, buf);
|
|
|
|
|
|
|
|
|
|
if (type == BLE_MESH_FRIEND_PDU_COMPLETE) {
|
|
|
|
|
if (frnd->sec_update) {
|
|
|
|
|
enqueue_update(frnd, 1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
sys_slist_merge_slist(&frnd->queue, &seg->queue);
|
2019-10-23 02:51:33 +00:00
|
|
|
|
|
|
|
|
|
frnd->queue_size += seg->seg_count;
|
2019-09-02 07:30:40 +00:00
|
|
|
|
seg->seg_count = 0U;
|
|
|
|
|
} else {
|
|
|
|
|
/* Mark the buffer as having more to come after it */
|
|
|
|
|
buf->flags |= NET_BUF_FRAGS;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void buf_send_start(u16_t duration, int err, void *user_data)
|
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_friend *frnd = user_data;
|
|
|
|
|
|
|
|
|
|
BT_DBG("err %d", err);
|
|
|
|
|
|
|
|
|
|
frnd->pending_buf = 0U;
|
|
|
|
|
|
|
|
|
|
/* Friend Offer doesn't follow the re-sending semantics */
|
|
|
|
|
if (!frnd->established) {
|
|
|
|
|
net_buf_unref(frnd->last);
|
|
|
|
|
frnd->last = NULL;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void buf_send_end(int err, void *user_data)
|
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_friend *frnd = user_data;
|
|
|
|
|
|
|
|
|
|
BT_DBG("err %d", err);
|
|
|
|
|
|
|
|
|
|
if (frnd->pending_req) {
|
|
|
|
|
BT_WARN("Another request before previous completed sending");
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (frnd->established) {
|
|
|
|
|
k_delayed_work_submit(&frnd->timer, frnd->poll_to);
|
|
|
|
|
BT_DBG("Waiting %u ms for next poll", frnd->poll_to);
|
|
|
|
|
} else {
|
|
|
|
|
/* Friend offer timeout is 1 second */
|
|
|
|
|
k_delayed_work_submit(&frnd->timer, K_SECONDS(1));
|
|
|
|
|
BT_DBG("Waiting for first poll");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void friend_timeout(struct k_work *work)
|
|
|
|
|
{
|
|
|
|
|
struct bt_mesh_friend *frnd = CONTAINER_OF(work, struct bt_mesh_friend,
|
|
|
|
|
timer.work);
|
|
|
|
|
static const struct bt_mesh_send_cb buf_sent_cb = {
|
|
|
|
|
.start = buf_send_start,
|
|
|
|
|
.end = buf_send_end,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
__ASSERT_NO_MSG(frnd->pending_buf == 0U);
|
|
|
|
|
|
|
|
|
|
BT_DBG("lpn 0x%04x send_last %u last %p", frnd->lpn,
|
|
|
|
|
frnd->send_last, frnd->last);
|
|
|
|
|
|
|
|
|
|
if (frnd->send_last && frnd->last) {
|
|
|
|
|
BT_DBG("Sending frnd->last %p", frnd->last);
|
|
|
|
|
frnd->send_last = 0U;
|
|
|
|
|
goto send_last;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (frnd->established && !frnd->pending_req) {
|
|
|
|
|
BT_WARN("%s, Friendship lost with 0x%04x", __func__, frnd->lpn);
|
2019-09-17 08:56:52 +00:00
|
|
|
|
friend_clear(frnd, BLE_MESH_FRIENDSHIP_TERMINATE_POLL_TIMEOUT);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-02 07:30:40 +00:00
|
|
|
|
frnd->last = (void *)sys_slist_get(&frnd->queue);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
if (!frnd->last) {
|
|
|
|
|
BT_WARN("%s, Friendship not established with 0x%04x", __func__, frnd->lpn);
|
2019-09-17 08:56:52 +00:00
|
|
|
|
friend_clear(frnd, BLE_MESH_FRIENDSHIP_TERMINATE_ESTABLISH_FAIL);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
if (encrypt_friend_pdu(frnd, frnd->last, false)) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-02 07:30:40 +00:00
|
|
|
|
/* Clear the flag we use for segment tracking */
|
|
|
|
|
frnd->last->flags &= ~NET_BUF_FRAGS;
|
|
|
|
|
frnd->last->frags = NULL;
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
BT_DBG("Sending buf %p from Friend Queue of LPN 0x%04x",
|
|
|
|
|
frnd->last, frnd->lpn);
|
|
|
|
|
frnd->queue_size--;
|
|
|
|
|
|
|
|
|
|
send_last:
|
|
|
|
|
frnd->pending_req = 0U;
|
|
|
|
|
frnd->pending_buf = 1U;
|
|
|
|
|
bt_mesh_adv_send(frnd->last, &buf_sent_cb, frnd);
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-17 08:56:52 +00:00
|
|
|
|
void bt_mesh_friend_set_cb(void (*cb)(bool establish, u16_t lpn_addr, u8_t reason))
|
|
|
|
|
{
|
|
|
|
|
friend_cb = cb;
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
int bt_mesh_friend_init(void)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
2020-05-18 02:39:51 +00:00
|
|
|
|
if (friend_init == true) {
|
|
|
|
|
BT_WARN("%s, Already", __func__);
|
|
|
|
|
return -EALREADY;
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
struct bt_mesh_friend *frnd = &bt_mesh.frnd[i];
|
|
|
|
|
int j;
|
|
|
|
|
|
|
|
|
|
frnd->net_idx = BLE_MESH_KEY_UNUSED;
|
|
|
|
|
|
|
|
|
|
sys_slist_init(&frnd->queue);
|
|
|
|
|
|
|
|
|
|
k_delayed_work_init(&frnd->timer, friend_timeout);
|
|
|
|
|
k_delayed_work_init(&frnd->clear.timer, clear_timeout);
|
|
|
|
|
|
|
|
|
|
for (j = 0; j < ARRAY_SIZE(frnd->seg); j++) {
|
|
|
|
|
sys_slist_init(&frnd->seg[j].queue);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-18 02:39:51 +00:00
|
|
|
|
friend_init = true;
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-19 10:57:13 +00:00
|
|
|
|
int bt_mesh_friend_deinit(void)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
2020-05-18 02:39:51 +00:00
|
|
|
|
if (friend_init == false) {
|
|
|
|
|
BT_WARN("%s, Already", __func__);
|
|
|
|
|
return -EALREADY;
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-19 10:57:13 +00:00
|
|
|
|
bt_mesh_friend_clear_net_idx(BLE_MESH_KEY_ANY);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
struct bt_mesh_friend *frnd = &bt_mesh.frnd[i];
|
|
|
|
|
|
|
|
|
|
frnd->net_idx = BLE_MESH_KEY_UNUSED;
|
|
|
|
|
|
|
|
|
|
k_delayed_work_free(&frnd->timer);
|
|
|
|
|
k_delayed_work_free(&frnd->clear.timer);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bt_mesh_unref_buf_from_pool(&friend_buf_pool);
|
|
|
|
|
memset(adv_pool, 0, sizeof(adv_pool));
|
|
|
|
|
|
2020-05-18 02:39:51 +00:00
|
|
|
|
friend_init = false;
|
|
|
|
|
|
2020-01-19 10:57:13 +00:00
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-26 10:08:18 +00:00
|
|
|
|
static bool is_segack(struct net_buf *buf, const u64_t *seqauth, u16_t src)
|
2019-10-23 02:51:33 +00:00
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct net_buf_simple_state state = {0};
|
2019-10-23 02:51:33 +00:00
|
|
|
|
bool found = false;
|
|
|
|
|
|
|
|
|
|
if (buf->len != 16) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
net_buf_simple_save(&buf->b, &state);
|
|
|
|
|
|
|
|
|
|
net_buf_skip(buf, 1); /* skip IVI, NID */
|
|
|
|
|
|
|
|
|
|
if (!(net_buf_pull_u8(buf) >> 7)) {
|
|
|
|
|
goto end;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
net_buf_pull(buf, 3); /* skip SEQNUM */
|
|
|
|
|
|
|
|
|
|
if (src != net_buf_pull_be16(buf)) {
|
|
|
|
|
goto end;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
net_buf_skip(buf, 2); /* skip dst */
|
|
|
|
|
|
|
|
|
|
if (TRANS_CTL_OP((u8_t *) net_buf_pull_mem(buf, 1)) != TRANS_CTL_OP_ACK) {
|
|
|
|
|
goto end;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
found = ((net_buf_pull_be16(buf) >> 2) & TRANS_SEQ_ZERO_MASK) ==
|
|
|
|
|
(*seqauth & TRANS_SEQ_ZERO_MASK);
|
|
|
|
|
end:
|
|
|
|
|
net_buf_simple_restore(&buf->b, &state);
|
|
|
|
|
return found;
|
|
|
|
|
}
|
|
|
|
|
|
2020-03-26 10:08:18 +00:00
|
|
|
|
static void friend_purge_old_ack(struct bt_mesh_friend *frnd,
|
|
|
|
|
const u64_t *seq_auth, u16_t src)
|
2019-01-07 07:16:47 +00:00
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
sys_snode_t *cur = NULL, *prev = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
BT_DBG("SeqAuth %llx src 0x%04x", *seq_auth, src);
|
|
|
|
|
|
|
|
|
|
for (cur = sys_slist_peek_head(&frnd->queue);
|
|
|
|
|
cur != NULL; prev = cur, cur = sys_slist_peek_next(cur)) {
|
|
|
|
|
struct net_buf *buf = (void *)cur;
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
if (is_segack(buf, seq_auth, src)) {
|
2019-01-07 07:16:47 +00:00
|
|
|
|
BT_DBG("Removing old ack from Friend Queue");
|
|
|
|
|
|
|
|
|
|
sys_slist_remove(&frnd->queue, prev, cur);
|
|
|
|
|
frnd->queue_size--;
|
|
|
|
|
/* Make sure old slist entry state doesn't remain */
|
|
|
|
|
buf->frags = NULL;
|
|
|
|
|
|
|
|
|
|
net_buf_unref(buf);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void friend_lpn_enqueue_rx(struct bt_mesh_friend *frnd,
|
|
|
|
|
struct bt_mesh_net_rx *rx,
|
|
|
|
|
enum bt_mesh_friend_pdu_type type,
|
2020-03-26 10:08:18 +00:00
|
|
|
|
const u64_t *seq_auth, u8_t seg_count,
|
2019-09-02 07:30:40 +00:00
|
|
|
|
struct net_buf_simple *sbuf)
|
2019-01-07 07:16:47 +00:00
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct friend_pdu_info info = {0};
|
|
|
|
|
struct net_buf *buf = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
2019-10-24 08:10:35 +00:00
|
|
|
|
/* Because of network loopback, tx packets will also be passed into
|
|
|
|
|
* this rx function. These packets have already been added to the
|
|
|
|
|
* queue, and should be ignored.
|
|
|
|
|
*/
|
|
|
|
|
if (bt_mesh_elem_find(rx->ctx.addr)) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
BT_DBG("LPN 0x%04x queue_size %u", frnd->lpn, frnd->queue_size);
|
|
|
|
|
|
|
|
|
|
if (type == BLE_MESH_FRIEND_PDU_SINGLE && seq_auth) {
|
|
|
|
|
friend_purge_old_ack(frnd, seq_auth, rx->ctx.addr);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
info.src = rx->ctx.addr;
|
|
|
|
|
info.dst = rx->ctx.recv_dst;
|
|
|
|
|
|
|
|
|
|
if (rx->net_if == BLE_MESH_NET_IF_LOCAL) {
|
|
|
|
|
info.ttl = rx->ctx.recv_ttl;
|
|
|
|
|
} else {
|
|
|
|
|
info.ttl = rx->ctx.recv_ttl - 1U;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
info.ctl = rx->ctl;
|
|
|
|
|
|
2020-03-26 03:16:26 +00:00
|
|
|
|
sys_put_be24(rx->seq, info.seq);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
info.iv_index = BLE_MESH_NET_IVI_RX(rx);
|
|
|
|
|
|
|
|
|
|
buf = create_friend_pdu(frnd, &info, sbuf);
|
|
|
|
|
if (!buf) {
|
|
|
|
|
BT_ERR("%s, Failed to encode Friend buffer", __func__);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
enqueue_friend_pdu(frnd, type, info.src, seg_count, buf);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
BT_DBG("Queued message for LPN 0x%04x, queue_size %u",
|
|
|
|
|
frnd->lpn, frnd->queue_size);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void friend_lpn_enqueue_tx(struct bt_mesh_friend *frnd,
|
|
|
|
|
struct bt_mesh_net_tx *tx,
|
|
|
|
|
enum bt_mesh_friend_pdu_type type,
|
2020-03-26 10:08:18 +00:00
|
|
|
|
const u64_t *seq_auth, u8_t seg_count,
|
2019-09-02 07:30:40 +00:00
|
|
|
|
struct net_buf_simple *sbuf)
|
2019-01-07 07:16:47 +00:00
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct friend_pdu_info info = {0};
|
|
|
|
|
struct net_buf *buf = NULL;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
BT_DBG("LPN 0x%04x", frnd->lpn);
|
|
|
|
|
|
|
|
|
|
if (type == BLE_MESH_FRIEND_PDU_SINGLE && seq_auth) {
|
|
|
|
|
friend_purge_old_ack(frnd, seq_auth, tx->src);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
info.src = tx->src;
|
|
|
|
|
info.dst = tx->ctx->addr;
|
|
|
|
|
|
|
|
|
|
info.ttl = tx->ctx->send_ttl;
|
|
|
|
|
info.ctl = (tx->ctx->app_idx == BLE_MESH_KEY_UNUSED);
|
|
|
|
|
|
2020-03-26 03:16:26 +00:00
|
|
|
|
sys_put_be24(bt_mesh.seq, info.seq);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
info.iv_index = BLE_MESH_NET_IVI_TX;
|
|
|
|
|
|
|
|
|
|
buf = create_friend_pdu(frnd, &info, sbuf);
|
|
|
|
|
if (!buf) {
|
|
|
|
|
BT_ERR("%s, Failed to encode Friend buffer", __func__);
|
|
|
|
|
return;
|
|
|
|
|
}
|
2019-10-24 08:06:50 +00:00
|
|
|
|
|
|
|
|
|
if (type == BLE_MESH_FRIEND_PDU_SINGLE && !info.ctl) {
|
2020-05-12 07:31:26 +00:00
|
|
|
|
/* Unsegmented application packets may be re-encrypted later,
|
2019-10-24 08:06:50 +00:00
|
|
|
|
* as they depend on the the sequence number being the same
|
|
|
|
|
* when encrypting in transport and network.
|
|
|
|
|
*/
|
|
|
|
|
FRIEND_ADV(buf)->app_idx = tx->ctx->app_idx;
|
|
|
|
|
}
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
enqueue_friend_pdu(frnd, type, info.src, seg_count, buf);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
|
|
|
|
|
BT_DBG("Queued message for LPN 0x%04x", frnd->lpn);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static bool friend_lpn_matches(struct bt_mesh_friend *frnd, u16_t net_idx,
|
|
|
|
|
u16_t addr)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
if (!frnd->established) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (net_idx != frnd->net_idx) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (BLE_MESH_ADDR_IS_UNICAST(addr)) {
|
|
|
|
|
return is_lpn_unicast(frnd, addr);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(frnd->sub_list); i++) {
|
|
|
|
|
if (frnd->sub_list[i] == addr) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool bt_mesh_friend_match(u16_t net_idx, u16_t addr)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
struct bt_mesh_friend *frnd = &bt_mesh.frnd[i];
|
|
|
|
|
|
|
|
|
|
if (friend_lpn_matches(frnd, net_idx, addr)) {
|
|
|
|
|
BT_DBG("LPN 0x%04x matched address 0x%04x",
|
|
|
|
|
frnd->lpn, addr);
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
BT_DBG("No matching LPN for address 0x%04x", addr);
|
|
|
|
|
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2019-09-02 07:30:40 +00:00
|
|
|
|
static bool friend_queue_has_space(struct bt_mesh_friend *frnd, u16_t addr,
|
2020-03-26 10:08:18 +00:00
|
|
|
|
const u64_t *seq_auth, u8_t seg_count)
|
2019-09-02 07:30:40 +00:00
|
|
|
|
{
|
|
|
|
|
u32_t total = 0U;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
if (seg_count > CONFIG_BLE_MESH_FRIEND_QUEUE_SIZE) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(frnd->seg); i++) {
|
|
|
|
|
struct bt_mesh_friend_seg *seg = &frnd->seg[i];
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
if (seq_auth && is_seg(seg, addr, *seq_auth & TRANS_SEQ_ZERO_MASK)) {
|
2019-09-02 07:30:40 +00:00
|
|
|
|
/* If there's a segment queue for this message then the
|
|
|
|
|
* space verification has already happened.
|
|
|
|
|
*/
|
2019-10-23 02:51:33 +00:00
|
|
|
|
return true;
|
2019-09-02 07:30:40 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
total += seg->seg_count;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* If currently pending segments combined with this segmented message
|
|
|
|
|
* are more than the Friend Queue Size, then there's no space. This
|
|
|
|
|
* is because we don't have a mechanism of aborting already pending
|
|
|
|
|
* segmented messages to free up buffers.
|
|
|
|
|
*/
|
|
|
|
|
return (CONFIG_BLE_MESH_FRIEND_QUEUE_SIZE - total) > seg_count;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool bt_mesh_friend_queue_has_space(u16_t net_idx, u16_t src, u16_t dst,
|
2020-03-26 10:08:18 +00:00
|
|
|
|
const u64_t *seq_auth, u8_t seg_count)
|
2019-09-02 07:30:40 +00:00
|
|
|
|
{
|
|
|
|
|
bool someone_has_space = false, friend_match = false;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
struct bt_mesh_friend *frnd = &bt_mesh.frnd[i];
|
|
|
|
|
|
|
|
|
|
if (!friend_lpn_matches(frnd, net_idx, dst)) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
friend_match = true;
|
|
|
|
|
|
|
|
|
|
if (friend_queue_has_space(frnd, src, seq_auth, seg_count)) {
|
|
|
|
|
someone_has_space = true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* If there were no matched LPNs treat this as success, so the
|
|
|
|
|
* transport layer can continue its work.
|
|
|
|
|
*/
|
|
|
|
|
if (!friend_match) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* From the transport layers perspective it's good enough that at
|
|
|
|
|
* least one Friend Queue has space. If there were multiple Friend
|
|
|
|
|
* matches then the destination must be a group address, in which
|
|
|
|
|
* case e.g. segment acks are not sent.
|
|
|
|
|
*/
|
|
|
|
|
return someone_has_space;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static bool friend_queue_prepare_space(struct bt_mesh_friend *frnd, u16_t addr,
|
2020-03-26 10:08:18 +00:00
|
|
|
|
const u64_t *seq_auth, u8_t seg_count)
|
2019-09-02 07:30:40 +00:00
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
bool pending_segments = false;
|
|
|
|
|
u8_t avail_space = 0U;
|
2019-09-02 07:30:40 +00:00
|
|
|
|
|
|
|
|
|
if (!friend_queue_has_space(frnd, addr, seq_auth, seg_count)) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
avail_space = CONFIG_BLE_MESH_FRIEND_QUEUE_SIZE - frnd->queue_size;
|
|
|
|
|
pending_segments = false;
|
|
|
|
|
|
|
|
|
|
while (pending_segments || avail_space < seg_count) {
|
|
|
|
|
struct net_buf *buf = (void *)sys_slist_get(&frnd->queue);
|
|
|
|
|
|
|
|
|
|
if (!buf) {
|
|
|
|
|
BT_ERR("Unable to free up enough buffers");
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
frnd->queue_size--;
|
|
|
|
|
avail_space++;
|
|
|
|
|
|
|
|
|
|
pending_segments = (buf->flags & NET_BUF_FRAGS);
|
|
|
|
|
|
|
|
|
|
/* Make sure old slist entry state doesn't remain */
|
|
|
|
|
buf->frags = NULL;
|
|
|
|
|
buf->flags &= ~NET_BUF_FRAGS;
|
|
|
|
|
|
|
|
|
|
net_buf_unref(buf);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
void bt_mesh_friend_enqueue_rx(struct bt_mesh_net_rx *rx,
|
|
|
|
|
enum bt_mesh_friend_pdu_type type,
|
2020-03-26 10:08:18 +00:00
|
|
|
|
const u64_t *seq_auth, u8_t seg_count,
|
2019-09-02 07:30:40 +00:00
|
|
|
|
struct net_buf_simple *sbuf)
|
2019-01-07 07:16:47 +00:00
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
if (!rx->friend_match ||
|
|
|
|
|
(rx->ctx.recv_ttl <= 1U && rx->net_if != BLE_MESH_NET_IF_LOCAL) ||
|
|
|
|
|
bt_mesh_friend_get() != BLE_MESH_FRIEND_ENABLED) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
BT_DBG("recv_ttl %u net_idx 0x%04x src 0x%04x dst 0x%04x",
|
|
|
|
|
rx->ctx.recv_ttl, rx->sub->net_idx, rx->ctx.addr,
|
|
|
|
|
rx->ctx.recv_dst);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
struct bt_mesh_friend *frnd = &bt_mesh.frnd[i];
|
|
|
|
|
|
2019-09-02 07:30:40 +00:00
|
|
|
|
if (!friend_lpn_matches(frnd, rx->sub->net_idx,
|
2019-10-21 14:53:25 +00:00
|
|
|
|
rx->ctx.recv_dst)) {
|
2019-09-02 07:30:40 +00:00
|
|
|
|
continue;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
2019-09-02 07:30:40 +00:00
|
|
|
|
|
|
|
|
|
if (!friend_queue_prepare_space(frnd, rx->ctx.addr, seq_auth,
|
|
|
|
|
seg_count)) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
friend_lpn_enqueue_rx(frnd, rx, type, seq_auth, seg_count,
|
|
|
|
|
sbuf);
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool bt_mesh_friend_enqueue_tx(struct bt_mesh_net_tx *tx,
|
|
|
|
|
enum bt_mesh_friend_pdu_type type,
|
2020-03-26 10:08:18 +00:00
|
|
|
|
const u64_t *seq_auth, u8_t seg_count,
|
2019-09-02 07:30:40 +00:00
|
|
|
|
struct net_buf_simple *sbuf)
|
2019-01-07 07:16:47 +00:00
|
|
|
|
{
|
|
|
|
|
bool matched = false;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
if (!bt_mesh_friend_match(tx->sub->net_idx, tx->ctx->addr) ||
|
|
|
|
|
bt_mesh_friend_get() != BLE_MESH_FRIEND_ENABLED) {
|
|
|
|
|
return matched;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
BT_DBG("net_idx 0x%04x dst 0x%04x src 0x%04x", tx->sub->net_idx,
|
|
|
|
|
tx->ctx->addr, tx->src);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
struct bt_mesh_friend *frnd = &bt_mesh.frnd[i];
|
|
|
|
|
|
2019-09-02 07:30:40 +00:00
|
|
|
|
if (!friend_lpn_matches(frnd, tx->sub->net_idx,
|
|
|
|
|
tx->ctx->addr)) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!friend_queue_prepare_space(frnd, tx->src, seq_auth,
|
|
|
|
|
seg_count)) {
|
|
|
|
|
continue;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
2019-09-02 07:30:40 +00:00
|
|
|
|
|
|
|
|
|
friend_lpn_enqueue_tx(frnd, tx, type, seq_auth, seg_count,
|
|
|
|
|
sbuf);
|
|
|
|
|
matched = true;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return matched;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void bt_mesh_friend_clear_incomplete(struct bt_mesh_subnet *sub, u16_t src,
|
2020-03-26 10:08:18 +00:00
|
|
|
|
u16_t dst, const u64_t *seq_auth)
|
2019-01-07 07:16:47 +00:00
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
BT_DBG("%s", __func__);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(bt_mesh.frnd); i++) {
|
|
|
|
|
struct bt_mesh_friend *frnd = &bt_mesh.frnd[i];
|
|
|
|
|
int j;
|
|
|
|
|
|
|
|
|
|
if (!friend_lpn_matches(frnd, sub->net_idx, dst)) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (j = 0; j < ARRAY_SIZE(frnd->seg); j++) {
|
|
|
|
|
struct bt_mesh_friend_seg *seg = &frnd->seg[j];
|
|
|
|
|
|
2019-10-23 02:51:33 +00:00
|
|
|
|
if (!is_seg(seg, src, *seq_auth & TRANS_SEQ_ZERO_MASK)) {
|
2019-01-07 07:16:47 +00:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
BT_WARN("%s, Clearing incomplete segments for 0x%04x", __func__, src);
|
|
|
|
|
|
2019-09-02 07:30:40 +00:00
|
|
|
|
purge_buffers(&seg->queue);
|
|
|
|
|
seg->seg_count = 0U;
|
2019-10-23 02:51:33 +00:00
|
|
|
|
break;
|
2019-01-07 07:16:47 +00:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-12-06 07:34:18 +00:00
|
|
|
|
void bt_mesh_friend_remove_lpn(u16_t lpn_addr)
|
|
|
|
|
{
|
2020-01-19 10:57:13 +00:00
|
|
|
|
struct bt_mesh_friend *frnd = NULL;
|
2019-12-06 07:34:18 +00:00
|
|
|
|
|
|
|
|
|
frnd = bt_mesh_friend_find(BLE_MESH_KEY_ANY, lpn_addr, false, false);
|
|
|
|
|
if (frnd) {
|
|
|
|
|
friend_clear(frnd, BLE_MESH_FRIENDSHIP_TERMINATE_DISABLE);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-01-07 07:16:47 +00:00
|
|
|
|
#endif /* CONFIG_BLE_MESH_FRIEND */
|