1. 18 6月, 2020 8 次提交
  2. 13 6月, 2020 1 次提交
  3. 12 6月, 2020 3 次提交
  4. 08 6月, 2020 1 次提交
  5. 04 6月, 2020 2 次提交
  6. 29 5月, 2020 1 次提交
  7. 20 5月, 2020 2 次提交
  8. 18 5月, 2020 2 次提交
    • H
      Bluetooth: Add SCO fallback for invalid LMP parameters error · 56b5453a
      Hsin-Yu Chao 提交于
      Bluetooth PTS test case HFP/AG/ACC/BI-12-I accepts SCO connection
      with invalid parameter at the first SCO request expecting AG to
      attempt another SCO request with the use of "safe settings" for
      given codec, base on section 5.7.1.2 of HFP 1.7 specification.
      
      This patch addresses it by adding "Invalid LMP Parameters" (0x1e)
      to the SCO fallback case. Verified with below log:
      
      < HCI Command: Setup Synchronous Connection (0x01|0x0028) plen 17
              Handle: 256
              Transmit bandwidth: 8000
              Receive bandwidth: 8000
              Max latency: 13
              Setting: 0x0003
                Input Coding: Linear
                Input Data Format: 1's complement
                Input Sample Size: 8-bit
                # of bits padding at MSB: 0
                Air Coding Format: Transparent Data
              Retransmission effort: Optimize for link quality (0x02)
              Packet type: 0x0380
                3-EV3 may not be used
                2-EV5 may not be used
                3-EV5 may not be used
      > HCI Event: Command Status (0x0f) plen 4
            Setup Synchronous Connection (0x01|0x0028) ncmd 1
              Status: Success (0x00)
      > HCI Event: Number of Completed Packets (0x13) plen 5
              Num handles: 1
              Handle: 256
              Count: 1
      > HCI Event: Max Slots Change (0x1b) plen 3
              Handle: 256
              Max slots: 1
      > HCI Event: Synchronous Connect Complete (0x2c) plen 17
              Status: Invalid LMP Parameters / Invalid LL Parameters (0x1e)
              Handle: 0
              Address: 00:1B:DC:F2:21:59 (OUI 00-1B-DC)
              Link type: eSCO (0x02)
              Transmission interval: 0x00
              Retransmission window: 0x02
              RX packet length: 0
              TX packet length: 0
              Air mode: Transparent (0x03)
      < HCI Command: Setup Synchronous Connection (0x01|0x0028) plen 17
              Handle: 256
              Transmit bandwidth: 8000
              Receive bandwidth: 8000
              Max latency: 8
              Setting: 0x0003
                Input Coding: Linear
                Input Data Format: 1's complement
                Input Sample Size: 8-bit
                # of bits padding at MSB: 0
                Air Coding Format: Transparent Data
              Retransmission effort: Optimize for link quality (0x02)
              Packet type: 0x03c8
                EV3 may be used
                2-EV3 may not be used
                3-EV3 may not be used
                2-EV5 may not be used
                3-EV5 may not be used
      > HCI Event: Command Status (0x0f) plen 4
            Setup Synchronous Connection (0x01|0x0028) ncmd 1
              Status: Success (0x00)
      > HCI Event: Max Slots Change (0x1b) plen 3
              Handle: 256
              Max slots: 5
      > HCI Event: Max Slots Change (0x1b) plen 3
              Handle: 256
              Max slots: 1
      > HCI Event: Synchronous Connect Complete (0x2c) plen 17
              Status: Success (0x00)
              Handle: 257
              Address: 00:1B:DC:F2:21:59 (OUI 00-1B-DC)
              Link type: eSCO (0x02)
              Transmission interval: 0x06
              Retransmission window: 0x04
              RX packet length: 30
              TX packet length: 30
              Air mode: Transparent (0x03)
      Signed-off-by: NHsin-Yu Chao <hychao@chromium.org>
      Signed-off-by: NMarcel Holtmann <marcel@holtmann.org>
      56b5453a
    • Ł
      Bluetooth: Fix for GAP/SEC/SEM/BI-10-C · 49c06c9e
      Łukasz Rymanowski 提交于
      Security Mode 1 level 4, force us to use have key size 16 octects long.
      This patch adds check for that.
      
      This is required for the qualification test GAP/SEC/SEM/BI-10-C
      
      Logs from test when ATT is configured with sec level BT_SECURITY_FIPS
      
      < ACL Data TX: Handle 3585 flags 0x00 dlen 11                                                                       #28 [hci0] 3.785965
            SMP: Pairing Request (0x01) len 6
              IO capability: DisplayYesNo (0x01)
              OOB data: Authentication data not present (0x00)
              Authentication requirement: Bonding, MITM, SC, No Keypresses (0x0d)
              Max encryption key size: 16
              Initiator key distribution: EncKey Sign (0x05)
              Responder key distribution: EncKey IdKey Sign (0x07)
      > ACL Data RX: Handle 3585 flags 0x02 dlen 11                                                                       #35 [hci0] 3.883020
            SMP: Pairing Response (0x02) len 6
              IO capability: DisplayYesNo (0x01)
              OOB data: Authentication data not present (0x00)
              Authentication requirement: Bonding, MITM, SC, No Keypresses (0x0d)
              Max encryption key size: 7
              Initiator key distribution: EncKey Sign (0x05)
              Responder key distribution: EncKey IdKey Sign (0x07)
      < ACL Data TX: Handle 3585 flags 0x00 dlen 6                                                                        #36 [hci0] 3.883136
            SMP: Pairing Failed (0x05) len 1
              Reason: Encryption key size (0x06)
      Signed-off-by: NŁukasz Rymanowski <lukasz.rymanowski@codecoup.pl>
      Signed-off-by: NMarcel Holtmann <marcel@holtmann.org>
      49c06c9e
  9. 13 5月, 2020 6 次提交
  10. 11 5月, 2020 8 次提交
  11. 05 5月, 2020 1 次提交
  12. 28 4月, 2020 1 次提交
  13. 16 4月, 2020 1 次提交
  14. 15 4月, 2020 2 次提交
  15. 10 4月, 2020 1 次提交