/******************************************************************************
*
* Copyright 2018 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
******************************************************************************/
#include
#include
#include
#include "bt_types.h"
#include "btm_api.h"
#include "l2c_api.h"
#include "osi/include/osi.h"
#include "port_api.h"
#include "rfc_int.h"
#include "mock_btm_layer.h"
#include "mock_l2cap_layer.h"
#include "stack_rfcomm_test_utils.h"
#include "stack_test_packet_utils.h"
std::string DumpByteBufferToString(uint8_t* p_data, size_t len) {
std::stringstream str;
str.setf(std::ios_base::hex, std::ios::basefield);
str.setf(std::ios_base::uppercase);
str.fill('0');
for (size_t i = 0; i < len; ++i) {
str << std::setw(2) << static_cast(p_data[i]);
str << " ";
}
return str.str();
}
std::string DumpBtHdrToString(BT_HDR* p_hdr) {
uint8_t* p_hdr_data = p_hdr->data + p_hdr->offset;
return DumpByteBufferToString(p_hdr_data, p_hdr->len);
}
void PrintTo(BT_HDR* value, ::std::ostream* os) {
*os << DumpBtHdrToString(value);
}
void PrintTo(tL2CAP_CFG_INFO* value, ::std::ostream* os) {
*os << DumpByteBufferToString((uint8_t*)value, sizeof(tL2CAP_CFG_INFO));
}
namespace {
using testing::_;
using testing::DoAll;
using testing::Return;
using testing::Test;
using testing::StrictMock;
using testing::SaveArg;
using testing::SaveArgPointee;
using testing::Pointee;
using testing::StrEq;
using testing::NotNull;
using bluetooth::CreateL2capDataPacket;
using bluetooth::CreateAclPacket;
using bluetooth::AllocateWrappedIncomingL2capAclPacket;
using bluetooth::AllocateWrappedOutgoingL2capAclPacket;
using bluetooth::rfcomm::GetDlci;
using bluetooth::rfcomm::GetAddressField;
using bluetooth::rfcomm::GetControlField;
using bluetooth::rfcomm::CreateMccPnFrame;
using bluetooth::rfcomm::CreateMccMscFrame;
using bluetooth::rfcomm::CreateMultiplexerControlFrame;
using bluetooth::rfcomm::CreateRfcommPacket;
using bluetooth::rfcomm::CreateQuickDataPacket;
using bluetooth::rfcomm::CreateQuickPnPacket;
using bluetooth::rfcomm::CreateQuickSabmPacket;
using bluetooth::rfcomm::CreateQuickUaPacket;
using bluetooth::rfcomm::CreateQuickMscPacket;
MATCHER_P(PointerMemoryEqual, ptr,
DumpByteBufferToString((uint8_t*)ptr, sizeof(*ptr))) {
return memcmp(arg, ptr, sizeof(*ptr)) == 0;
}
MATCHER_P(BtHdrEqual, expected, DumpBtHdrToString(expected)) {
auto arg_hdr = static_cast(arg);
uint8_t* arg_data = arg_hdr->data + arg_hdr->offset;
auto expected_hdr = static_cast(expected);
uint8_t* expected_data = expected_hdr->data + expected_hdr->offset;
return memcmp(arg_data, expected_data, expected_hdr->len) == 0;
}
bluetooth::rfcomm::MockRfcommCallback* rfcomm_callback = nullptr;
void port_mgmt_cback_0(uint32_t code, uint16_t port_handle) {
rfcomm_callback->PortManagementCallback(code, port_handle, 0);
}
void port_mgmt_cback_1(uint32_t code, uint16_t port_handle) {
rfcomm_callback->PortManagementCallback(code, port_handle, 1);
}
void port_event_cback_0(uint32_t code, uint16_t port_handle) {
rfcomm_callback->PortEventCallback(code, port_handle, 0);
}
void port_event_cback_1(uint32_t code, uint16_t port_handle) {
rfcomm_callback->PortEventCallback(code, port_handle, 1);
}
RawAddress GetTestAddress(int index) {
CHECK_LT(index, UINT8_MAX);
RawAddress result = {
{0xAA, 0x00, 0x11, 0x22, 0x33, static_cast(index)}};
return result;
}
class StackRfcommTest : public Test {
public:
void StartServerPort(uint16_t uuid, uint8_t scn, uint16_t mtu,
tPORT_CALLBACK* management_callback,
tPORT_CALLBACK* event_callback,
uint16_t* server_handle) {
VLOG(1) << "Step 1";
ASSERT_EQ(RFCOMM_CreateConnection(uuid, scn, true, mtu, RawAddress::kAny,
server_handle, management_callback),
PORT_SUCCESS);
ASSERT_EQ(PORT_SetEventMask(*server_handle, PORT_EV_RXCHAR), PORT_SUCCESS);
ASSERT_EQ(PORT_SetEventCallback(*server_handle, event_callback),
PORT_SUCCESS);
}
void ConnectServerL2cap(const RawAddress& peer_addr, uint16_t acl_handle,
uint16_t lcid) {
VLOG(1) << "Step 1";
// Remote device connect to this channel, we shall accept
static const uint8_t cmd_id = 0x07;
EXPECT_CALL(l2cap_interface_,
ConnectResponse(peer_addr, cmd_id, lcid, L2CAP_CONN_OK, 0));
tL2CAP_CFG_INFO cfg_req = {.mtu_present = true, .mtu = L2CAP_MTU_SIZE};
EXPECT_CALL(l2cap_interface_,
ConfigRequest(lcid, PointerMemoryEqual(&cfg_req)))
.WillOnce(Return(true));
l2cap_appl_info_.pL2CA_ConnectInd_Cb(peer_addr, lcid, BT_PSM_RFCOMM,
cmd_id);
VLOG(1) << "Step 2";
// MTU configuration is done
cfg_req.mtu_present = false;
l2cap_appl_info_.pL2CA_ConfigCfm_Cb(lcid, L2CAP_CFG_OK, {});
VLOG(1) << "Step 3";
// Remote device also ask to configure MTU size
EXPECT_CALL(l2cap_interface_,
ConfigResponse(lcid, PointerMemoryEqual(&cfg_req)))
.WillOnce(Return(true));
l2cap_appl_info_.pL2CA_ConfigInd_Cb(lcid, &cfg_req);
VLOG(1) << "Step 4";
// Remote device connect to server channel 0
BT_HDR* sabm_channel_0 = AllocateWrappedIncomingL2capAclPacket(
CreateQuickSabmPacket(RFCOMM_MX_DLCI, lcid, acl_handle));
BT_HDR* ua_channel_0 = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickUaPacket(RFCOMM_MX_DLCI, lcid, acl_handle));
EXPECT_CALL(l2cap_interface_, DataWrite(lcid, BtHdrEqual(ua_channel_0)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
// Packet should be freed by RFCOMM
l2cap_appl_info_.pL2CA_DataInd_Cb(lcid, sabm_channel_0);
osi_free(ua_channel_0);
}
void ConnectServerPort(const RawAddress& peer_addr, uint16_t port_handle,
uint8_t scn, uint16_t mtu, uint16_t acl_handle,
uint16_t lcid, int port_callback_index) {
VLOG(1) << "Step 1";
// Negotiate parameters on scn
BT_HDR* uih_pn_cmd_from_peer = AllocateWrappedIncomingL2capAclPacket(
CreateQuickPnPacket(true, GetDlci(false, scn), true, mtu,
RFCOMM_PN_CONV_LAYER_CBFC_I >> 4, 0, RFCOMM_K_MAX,
lcid, acl_handle));
BT_HDR* uih_pn_rsp_to_peer = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickPnPacket(false, GetDlci(false, scn), false, mtu,
RFCOMM_PN_CONV_LAYER_CBFC_R >> 4, 0, RFCOMM_K_MAX,
lcid, acl_handle));
EXPECT_CALL(l2cap_interface_,
DataWrite(lcid, BtHdrEqual(uih_pn_rsp_to_peer)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
// uih_pn_cmd_from_peer should be freed by this method
l2cap_appl_info_.pL2CA_DataInd_Cb(lcid, uih_pn_cmd_from_peer);
osi_free(uih_pn_rsp_to_peer);
VLOG(1) << "Step 2";
// Remote device connect to scn
tBTM_SEC_CALLBACK* security_callback = nullptr;
void* p_port = nullptr;
BT_HDR* sabm_channel_dlci = AllocateWrappedIncomingL2capAclPacket(
CreateQuickSabmPacket(GetDlci(false, scn), lcid, acl_handle));
EXPECT_CALL(btm_security_internal_interface_,
MultiplexingProtocolAccessRequest(peer_addr, BT_PSM_RFCOMM,
false, BTM_SEC_PROTO_RFCOMM,
scn, NotNull(), NotNull()))
.WillOnce(DoAll(SaveArg<5>(&security_callback), SaveArg<6>(&p_port),
Return(BTM_SUCCESS)));
// sabm_channel_dlci should be freed by this method
l2cap_appl_info_.pL2CA_DataInd_Cb(lcid, sabm_channel_dlci);
VLOG(1) << "Step 3";
// Confirm security check should trigger port as connected
EXPECT_CALL(
rfcomm_callback_,
PortManagementCallback(PORT_SUCCESS, port_handle, port_callback_index));
BT_HDR* ua_channel_dlci = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickUaPacket(GetDlci(false, scn), lcid, acl_handle));
EXPECT_CALL(l2cap_interface_, DataWrite(lcid, BtHdrEqual(ua_channel_dlci)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
ASSERT_TRUE(security_callback);
security_callback(&peer_addr, BT_TRANSPORT_BR_EDR, p_port, BTM_SUCCESS);
osi_free(ua_channel_dlci);
VLOG(1) << "Step 4";
// Remote also need to configure its modem signal before we can send data
BT_HDR* uih_msc_cmd_from_peer = AllocateWrappedIncomingL2capAclPacket(
CreateQuickMscPacket(true, GetDlci(false, scn), lcid, acl_handle, true,
false, true, true, false, true));
BT_HDR* uih_msc_response_to_peer = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickMscPacket(false, GetDlci(false, scn), lcid, acl_handle,
false, false, true, true, false, true));
// We also have to do modem configuration ourself
EXPECT_CALL(l2cap_interface_,
DataWrite(lcid, BtHdrEqual(uih_msc_response_to_peer)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
BT_HDR* uih_msc_cmd_to_peer = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickMscPacket(false, GetDlci(false, scn), lcid, acl_handle, true,
false, true, true, false, true));
EXPECT_CALL(l2cap_interface_,
DataWrite(lcid, BtHdrEqual(uih_msc_cmd_to_peer)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
// uih_msc_cmd_from_peer should be freed by this method
l2cap_appl_info_.pL2CA_DataInd_Cb(lcid, uih_msc_cmd_from_peer);
osi_free(uih_msc_response_to_peer);
VLOG(1) << "Step 5";
// modem configuration is done
BT_HDR* uih_msc_response_from_peer = AllocateWrappedIncomingL2capAclPacket(
CreateQuickMscPacket(true, GetDlci(false, scn), lcid, acl_handle, false,
false, true, true, false, true));
// uih_msc_response_from_peer should be freed by this method
l2cap_appl_info_.pL2CA_DataInd_Cb(lcid, uih_msc_response_from_peer);
}
void StartClientPort(const RawAddress& peer_bd_addr, uint16_t uuid,
uint8_t scn, uint16_t mtu,
tPORT_CALLBACK* management_callback,
tPORT_CALLBACK* event_callback, uint16_t lcid,
uint16_t acl_handle, uint16_t* client_handle,
bool is_first_connection) {
VLOG(1) << "Step 1";
BT_HDR* uih_pn_channel_3 =
AllocateWrappedOutgoingL2capAclPacket(CreateQuickPnPacket(
true, GetDlci(false, scn), true, mtu, RFCOMM_PN_CONV_LAYER_TYPE_1,
RFCOMM_PN_PRIORITY_0, RFCOMM_K, lcid, acl_handle));
if (is_first_connection) {
EXPECT_CALL(l2cap_interface_, ConnectRequest(BT_PSM_RFCOMM, peer_bd_addr))
.WillOnce(Return(lcid));
} else {
EXPECT_CALL(l2cap_interface_,
DataWrite(lcid, BtHdrEqual(uih_pn_channel_3)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
}
ASSERT_EQ(RFCOMM_CreateConnection(uuid, scn, false, mtu, peer_bd_addr,
client_handle, management_callback),
PORT_SUCCESS);
ASSERT_EQ(PORT_SetEventMask(*client_handle, PORT_EV_RXCHAR), PORT_SUCCESS);
ASSERT_EQ(PORT_SetEventCallback(*client_handle, event_callback),
PORT_SUCCESS);
osi_free(uih_pn_channel_3);
}
void TestConnectClientPortL2cap(uint16_t acl_handle, uint16_t lcid) {
VLOG(1) << "Step 1";
// Send configuration request when L2CAP connect is succsseful
tL2CAP_CFG_INFO cfg_req = {.mtu_present = true, .mtu = L2CAP_MTU_SIZE};
EXPECT_CALL(l2cap_interface_,
ConfigRequest(lcid, PointerMemoryEqual(&cfg_req)))
.WillOnce(Return(true));
l2cap_appl_info_.pL2CA_ConnectCfm_Cb(lcid, L2CAP_CONN_OK);
VLOG(1) << "Step 2";
// Remote device confirms our configuration request
cfg_req.mtu_present = false;
l2cap_appl_info_.pL2CA_ConfigCfm_Cb(lcid, L2CAP_CFG_OK, {});
VLOG(1) << "Step 3";
// Remote device also asks to configure MTU
// Once configuration is done, we connect to multiplexer control channel 0
EXPECT_CALL(l2cap_interface_,
ConfigResponse(lcid, PointerMemoryEqual(&cfg_req)))
.WillOnce(Return(true));
// multiplexer control channel's DLCI is always 0
BT_HDR* sabm_channel_0 = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickSabmPacket(RFCOMM_MX_DLCI, lcid, acl_handle));
EXPECT_CALL(l2cap_interface_, DataWrite(lcid, BtHdrEqual(sabm_channel_0)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
l2cap_appl_info_.pL2CA_ConfigInd_Cb(lcid, &cfg_req);
osi_free(sabm_channel_0);
}
void ConnectClientPort(const RawAddress& peer_addr, uint16_t port_handle,
uint8_t scn, uint16_t mtu, uint16_t acl_handle,
uint16_t lcid, int port_callback_index,
bool is_first_connection) {
VLOG(1) << "Step 1";
if (is_first_connection) {
VLOG(1) << "Step 1.5";
// Once remote accept multiplexer control channel 0
// We change to desired channel on non-initiating device (remote device)
BT_HDR* ua_channel_0 = AllocateWrappedIncomingL2capAclPacket(
CreateQuickUaPacket(RFCOMM_MX_DLCI, lcid, acl_handle));
BT_HDR* uih_pn_channel_3 =
AllocateWrappedOutgoingL2capAclPacket(CreateQuickPnPacket(
true, GetDlci(false, scn), true, mtu,
RFCOMM_PN_CONV_LAYER_CBFC_I >> 4, RFCOMM_PN_PRIORITY_0,
RFCOMM_K_MAX, lcid, acl_handle));
EXPECT_CALL(l2cap_interface_,
DataWrite(lcid, BtHdrEqual(uih_pn_channel_3)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
l2cap_appl_info_.pL2CA_DataInd_Cb(lcid, ua_channel_0);
osi_free(uih_pn_channel_3);
}
VLOG(1) << "Step 2";
// Once remote accept service channel change, we start security procedure
BT_HDR* uih_pn_channel_3_accept =
AllocateWrappedIncomingL2capAclPacket(CreateQuickPnPacket(
false, GetDlci(false, scn), false, mtu,
RFCOMM_PN_CONV_LAYER_CBFC_I >> 4, RFCOMM_PN_PRIORITY_0,
RFCOMM_K_MAX, lcid, acl_handle));
tBTM_SEC_CALLBACK* security_callback = nullptr;
void* p_port = nullptr;
EXPECT_CALL(btm_security_internal_interface_,
MultiplexingProtocolAccessRequest(peer_addr, BT_PSM_RFCOMM,
true, BTM_SEC_PROTO_RFCOMM,
scn, NotNull(), NotNull()))
.WillOnce(DoAll(SaveArg<5>(&security_callback), SaveArg<6>(&p_port),
Return(BTM_SUCCESS)));
l2cap_appl_info_.pL2CA_DataInd_Cb(lcid, uih_pn_channel_3_accept);
VLOG(1) << "Step 3";
// Once security procedure is done, we officially connect to target scn
BT_HDR* sabm_channel_3 = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickSabmPacket(GetDlci(false, scn), lcid, acl_handle));
EXPECT_CALL(l2cap_interface_, DataWrite(lcid, BtHdrEqual(sabm_channel_3)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
ASSERT_TRUE(security_callback);
security_callback(&peer_addr, BT_TRANSPORT_BR_EDR, p_port, BTM_SUCCESS);
osi_free(sabm_channel_3);
VLOG(1) << "Step 4";
// When target scn is accepted by remote, we need to configure modem signal
// state beofre using the port
EXPECT_CALL(
rfcomm_callback_,
PortManagementCallback(PORT_SUCCESS, port_handle, port_callback_index));
BT_HDR* uih_msc_cmd = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickMscPacket(true, GetDlci(false, scn), lcid, acl_handle, true,
false, true, true, false, true));
EXPECT_CALL(l2cap_interface_, DataWrite(lcid, BtHdrEqual(uih_msc_cmd)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
BT_HDR* ua_channel_3 = AllocateWrappedIncomingL2capAclPacket(
CreateQuickUaPacket(GetDlci(false, scn), lcid, acl_handle));
l2cap_appl_info_.pL2CA_DataInd_Cb(lcid, ua_channel_3);
osi_free(uih_msc_cmd);
VLOG(1) << "Step 5";
// modem configuration is done
BT_HDR* uih_msc_response = AllocateWrappedIncomingL2capAclPacket(
CreateQuickMscPacket(false, GetDlci(false, scn), lcid, acl_handle,
false, false, true, true, false, true));
l2cap_appl_info_.pL2CA_DataInd_Cb(lcid, uih_msc_response);
VLOG(1) << "Step 6";
// Remote also need to configure its modem signal before we can send data
BT_HDR* uih_msc_cmd_from_peer = AllocateWrappedIncomingL2capAclPacket(
CreateQuickMscPacket(false, GetDlci(false, scn), lcid, acl_handle, true,
false, true, true, false, true));
BT_HDR* uih_msc_response_to_peer = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickMscPacket(true, GetDlci(false, scn), lcid, acl_handle, false,
false, true, true, false, true));
EXPECT_CALL(l2cap_interface_,
DataWrite(lcid, BtHdrEqual(uih_msc_response_to_peer)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
l2cap_appl_info_.pL2CA_DataInd_Cb(lcid, uih_msc_cmd_from_peer);
osi_free(uih_msc_response_to_peer);
}
void SendAndVerifyOutgoingTransmission(uint16_t port_handle,
bool is_initiator, uint8_t scn,
bool cr, const std::string& message,
int credits, uint16_t acl_handle,
uint16_t lcid) {
VLOG(1) << "Step 1";
BT_HDR* data_packet = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickDataPacket(GetDlci(is_initiator, scn), cr, lcid, acl_handle,
credits, message));
uint16_t transmitted_length = 0;
EXPECT_CALL(l2cap_interface_, DataWrite(lcid, BtHdrEqual(data_packet)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
ASSERT_EQ(PORT_WriteData(port_handle, message.data(), message.size(),
&transmitted_length),
PORT_SUCCESS);
ASSERT_EQ(transmitted_length, message.size());
}
void ReceiveAndVerifyIncomingTransmission(uint16_t port_handle,
bool is_initiator, uint8_t scn,
bool cr, const std::string& message,
int credits, uint16_t acl_handle,
uint16_t lcid,
int port_callback_index) {
VLOG(1) << "Step 1";
BT_HDR* data_packet = AllocateWrappedIncomingL2capAclPacket(
CreateQuickDataPacket(GetDlci(is_initiator, scn), cr, lcid, acl_handle,
credits, message));
EXPECT_CALL(rfcomm_callback_,
PortEventCallback(_, port_handle, port_callback_index));
l2cap_appl_info_.pL2CA_DataInd_Cb(lcid, data_packet);
VLOG(1) << "Step 2";
char buffer[L2CAP_MTU_SIZE] = {};
uint16_t length = 0;
int status = PORT_ReadData(port_handle, buffer, L2CAP_MTU_SIZE, &length);
ASSERT_EQ(status, PORT_SUCCESS);
ASSERT_THAT(buffer, StrEq(message));
}
protected:
void SetUp() override {
Test::SetUp();
bluetooth::manager::SetMockSecurityInternalInterface(
&btm_security_internal_interface_);
bluetooth::l2cap::SetMockInterface(&l2cap_interface_);
rfcomm_callback = &rfcomm_callback_;
EXPECT_CALL(l2cap_interface_, Register(BT_PSM_RFCOMM, _, _, _))
.WillOnce(Return(BT_PSM_RFCOMM));
RFCOMM_Init();
rfc_cb.trace_level = BT_TRACE_LEVEL_DEBUG;
}
void TearDown() override {
rfcomm_callback = nullptr;
bluetooth::l2cap::SetMockInterface(nullptr);
bluetooth::manager::SetMockSecurityInternalInterface(nullptr);
testing::Test::TearDown();
}
StrictMock
btm_security_internal_interface_;
StrictMock l2cap_interface_;
StrictMock rfcomm_callback_;
tL2CAP_APPL_INFO l2cap_appl_info_;
};
TEST_F(StackRfcommTest, SingleServerConnectionHelloWorld) {
// Prepare a server channel at kTestChannelNumber0
static const uint16_t acl_handle = 0x0009;
static const uint16_t lcid = 0x0054;
static const uint16_t test_uuid = 0x1112;
static const uint8_t test_scn = 8;
static const uint16_t test_mtu = 1600;
static const RawAddress test_address = GetTestAddress(0);
uint16_t server_handle = 0;
ASSERT_NO_FATAL_FAILURE(StartServerPort(test_uuid, test_scn, test_mtu,
port_mgmt_cback_0, port_event_cback_0,
&server_handle));
ASSERT_NO_FATAL_FAILURE(ConnectServerL2cap(test_address, acl_handle, lcid));
ASSERT_NO_FATAL_FAILURE(ConnectServerPort(
test_address, server_handle, test_scn, test_mtu, acl_handle, lcid, 0));
ASSERT_NO_FATAL_FAILURE(ReceiveAndVerifyIncomingTransmission(
server_handle, false, test_scn, true, "Hello World!\r", 50, acl_handle,
lcid, 0));
ASSERT_NO_FATAL_FAILURE(
SendAndVerifyOutgoingTransmission(server_handle, false, test_scn, false,
"\r!dlroW olleH", 4, acl_handle, lcid));
}
TEST_F(StackRfcommTest, MultiServerPortSameDeviceHelloWorld) {
// Prepare a server channel at kTestChannelNumber0
static const uint16_t acl_handle = 0x0009;
static const uint16_t lcid = 0x0054;
static const uint16_t test_mtu = 1600;
static const RawAddress test_address = GetTestAddress(0);
// Service 0
uint16_t server_handle_0 = 0;
static const uint8_t test_scn_0 = 8;
static const uint16_t test_uuid_0 = 0x1112;
ASSERT_NO_FATAL_FAILURE(StartServerPort(test_uuid_0, test_scn_0, test_mtu,
port_mgmt_cback_0, port_event_cback_0,
&server_handle_0));
ASSERT_NO_FATAL_FAILURE(ConnectServerL2cap(test_address, acl_handle, lcid));
ASSERT_NO_FATAL_FAILURE(ConnectServerPort(test_address, server_handle_0,
test_scn_0, test_mtu, acl_handle,
lcid, 0));
// Service 1
uint16_t server_handle_1 = 0;
static const uint8_t test_scn_1 = 10;
static const uint16_t test_uuid_1 = 0x111F;
ASSERT_NE(test_scn_1, test_scn_0);
ASSERT_NE(test_uuid_1, test_uuid_0);
ASSERT_NO_FATAL_FAILURE(StartServerPort(test_uuid_1, test_scn_1, test_mtu,
port_mgmt_cback_1, port_event_cback_1,
&server_handle_1));
// No L2CAP setup for 2nd device
ASSERT_NO_FATAL_FAILURE(ConnectServerPort(test_address, server_handle_1,
test_scn_1, test_mtu, acl_handle,
lcid, 1));
// Use service 0
ASSERT_NO_FATAL_FAILURE(ReceiveAndVerifyIncomingTransmission(
server_handle_0, false, test_scn_0, true, "Hello World0!\r", 50,
acl_handle, lcid, 0));
ASSERT_NO_FATAL_FAILURE(SendAndVerifyOutgoingTransmission(
server_handle_0, false, test_scn_0, false, "\r!0dlroW olleH", 4,
acl_handle, lcid));
// Use service 1
ASSERT_NO_FATAL_FAILURE(ReceiveAndVerifyIncomingTransmission(
server_handle_1, false, test_scn_1, true, "Hello World1!\r", 50,
acl_handle, lcid, 1));
ASSERT_NO_FATAL_FAILURE(SendAndVerifyOutgoingTransmission(
server_handle_1, false, test_scn_1, false, "\r!1dlroW olleH", 4,
acl_handle, lcid));
}
TEST_F(StackRfcommTest, SameServerPortMultiDeviceHelloWorld) {
// Prepare a server channel at kTestChannelNumber0
static const uint16_t test_mtu = 1600;
static const uint8_t test_scn = 3;
static const uint16_t test_uuid = 0x1112;
// Service 0
static const RawAddress test_address_0 = GetTestAddress(0);
static const uint16_t acl_handle_0 = 0x0009;
static const uint16_t lcid_0 = 0x0054;
uint16_t server_handle_0 = 0;
ASSERT_NO_FATAL_FAILURE(StartServerPort(test_uuid, test_scn, test_mtu,
port_mgmt_cback_0, port_event_cback_0,
&server_handle_0));
ASSERT_NO_FATAL_FAILURE(
ConnectServerL2cap(test_address_0, acl_handle_0, lcid_0));
ASSERT_NO_FATAL_FAILURE(ConnectServerPort(test_address_0, server_handle_0,
test_scn, test_mtu, acl_handle_0,
lcid_0, 0));
// Service 1
static const RawAddress test_address_1 = GetTestAddress(1);
static const uint16_t acl_handle_1 = 0x0012;
static const uint16_t lcid_1 = 0x0045;
uint16_t server_handle_1 = 0;
ASSERT_NO_FATAL_FAILURE(StartServerPort(test_uuid, test_scn, test_mtu,
port_mgmt_cback_1, port_event_cback_1,
&server_handle_1));
ASSERT_NO_FATAL_FAILURE(
ConnectServerL2cap(test_address_1, acl_handle_1, lcid_1));
ASSERT_NO_FATAL_FAILURE(ConnectServerPort(test_address_1, server_handle_1,
test_scn, test_mtu, acl_handle_1,
lcid_1, 1));
// Use service 0
ASSERT_NO_FATAL_FAILURE(ReceiveAndVerifyIncomingTransmission(
server_handle_0, false, test_scn, true, "Hello World0!\r", 50,
acl_handle_0, lcid_0, 0));
ASSERT_NO_FATAL_FAILURE(SendAndVerifyOutgoingTransmission(
server_handle_0, false, test_scn, false, "\r!0dlroW olleH", 4,
acl_handle_0, lcid_0));
// Use service 1
ASSERT_NO_FATAL_FAILURE(ReceiveAndVerifyIncomingTransmission(
server_handle_1, false, test_scn, true, "Hello World1!\r", 50,
acl_handle_1, lcid_1, 1));
ASSERT_NO_FATAL_FAILURE(SendAndVerifyOutgoingTransmission(
server_handle_1, false, test_scn, false, "\r!1dlroW olleH", 4,
acl_handle_1, lcid_1));
}
TEST_F(StackRfcommTest, SingleClientConnectionHelloWorld) {
static const uint16_t acl_handle = 0x0009;
static const uint16_t lcid = 0x0054;
static const uint16_t test_uuid = 0x1112;
static const uint8_t test_scn = 8;
static const uint16_t test_mtu = 1600;
static const RawAddress test_address = GetTestAddress(0);
uint16_t client_handle = 0;
ASSERT_NO_FATAL_FAILURE(StartClientPort(
test_address, test_uuid, test_scn, test_mtu, port_mgmt_cback_0,
port_event_cback_0, lcid, acl_handle, &client_handle, true));
ASSERT_NO_FATAL_FAILURE(TestConnectClientPortL2cap(acl_handle, lcid));
ASSERT_NO_FATAL_FAILURE(ConnectClientPort(test_address, client_handle,
test_scn, test_mtu, acl_handle,
lcid, 0, true));
ASSERT_NO_FATAL_FAILURE(SendAndVerifyOutgoingTransmission(
client_handle, false, test_scn, true, "\r!dlroW olleH", -1, acl_handle,
lcid));
ASSERT_NO_FATAL_FAILURE(ReceiveAndVerifyIncomingTransmission(
client_handle, false, test_scn, false, "Hello World!\r", -1, acl_handle,
lcid, 0));
}
TEST_F(StackRfcommTest, MultiClientPortSameDeviceHelloWorld) {
static const uint16_t acl_handle = 0x0009;
static const uint16_t lcid = 0x0054;
static const uint16_t test_mtu = 1600;
static const RawAddress test_address = GetTestAddress(0);
// Connection 0
static const uint16_t test_uuid_0 = 0x1112;
static const uint8_t test_scn_0 = 8;
uint16_t client_handle_0 = 0;
ASSERT_NO_FATAL_FAILURE(StartClientPort(
test_address, test_uuid_0, test_scn_0, test_mtu, port_mgmt_cback_0,
port_event_cback_0, lcid, acl_handle, &client_handle_0, true));
ASSERT_NO_FATAL_FAILURE(TestConnectClientPortL2cap(acl_handle, lcid));
ASSERT_NO_FATAL_FAILURE(ConnectClientPort(test_address, client_handle_0,
test_scn_0, test_mtu, acl_handle,
lcid, 0, true));
// Connection 1
static const uint16_t test_uuid_1 = 0x111F;
static const uint8_t test_scn_1 = 10;
uint16_t client_handle_1 = 0;
ASSERT_NO_FATAL_FAILURE(StartClientPort(
test_address, test_uuid_1, test_scn_1, test_mtu, port_mgmt_cback_1,
port_event_cback_1, lcid, acl_handle, &client_handle_1, false));
ASSERT_NO_FATAL_FAILURE(ConnectClientPort(test_address, client_handle_1,
test_scn_1, test_mtu, acl_handle,
lcid, 1, false));
// Use connection 0
ASSERT_NO_FATAL_FAILURE(SendAndVerifyOutgoingTransmission(
client_handle_0, false, test_scn_0, true, "\r!dlroW olleH", -1,
acl_handle, lcid));
ASSERT_NO_FATAL_FAILURE(ReceiveAndVerifyIncomingTransmission(
client_handle_0, false, test_scn_0, false, "Hello World!\r", -1,
acl_handle, lcid, 0));
// Use connection 1
ASSERT_NO_FATAL_FAILURE(SendAndVerifyOutgoingTransmission(
client_handle_1, false, test_scn_1, true, "\r!dlroW olleH", -1,
acl_handle, lcid));
ASSERT_NO_FATAL_FAILURE(ReceiveAndVerifyIncomingTransmission(
client_handle_1, false, test_scn_1, false, "Hello World!\r", -1,
acl_handle, lcid, 1));
}
TEST_F(StackRfcommTest, SameClientPortMultiDeviceHelloWorld) {
static const uint16_t test_uuid = 0x1112;
static const uint8_t test_scn = 8;
static const uint16_t test_mtu = 1600;
// Connection 0
static const RawAddress test_address_0 = GetTestAddress(0);
static const uint16_t acl_handle_0 = 0x0009;
static const uint16_t lcid_0 = 0x0054;
uint16_t client_handle_0 = 0;
ASSERT_NO_FATAL_FAILURE(StartClientPort(
test_address_0, test_uuid, test_scn, test_mtu, port_mgmt_cback_0,
port_event_cback_0, lcid_0, acl_handle_0, &client_handle_0, true));
ASSERT_NO_FATAL_FAILURE(TestConnectClientPortL2cap(acl_handle_0, lcid_0));
ASSERT_NO_FATAL_FAILURE(ConnectClientPort(test_address_0, client_handle_0,
test_scn, test_mtu, acl_handle_0,
lcid_0, 0, true));
// Connection 1
static const RawAddress test_address_1 = GetTestAddress(1);
static const uint16_t acl_handle_1 = 0x0012;
static const uint16_t lcid_1 = 0x0045;
uint16_t client_handle_1 = 0;
ASSERT_NO_FATAL_FAILURE(StartClientPort(
test_address_1, test_uuid, test_scn, test_mtu, port_mgmt_cback_1,
port_event_cback_1, lcid_1, acl_handle_1, &client_handle_1, true));
ASSERT_NO_FATAL_FAILURE(TestConnectClientPortL2cap(acl_handle_1, lcid_1));
ASSERT_NO_FATAL_FAILURE(ConnectClientPort(test_address_1, client_handle_1,
test_scn, test_mtu, acl_handle_1,
lcid_1, 1, true));
// Use connection 0
ASSERT_NO_FATAL_FAILURE(SendAndVerifyOutgoingTransmission(
client_handle_0, false, test_scn, true, "\r!dlroW olleH", -1,
acl_handle_0, lcid_0));
ASSERT_NO_FATAL_FAILURE(ReceiveAndVerifyIncomingTransmission(
client_handle_0, false, test_scn, false, "Hello World!\r", -1,
acl_handle_0, lcid_0, 0));
// Use connection 1
ASSERT_NO_FATAL_FAILURE(SendAndVerifyOutgoingTransmission(
client_handle_1, false, test_scn, true, "\r!dlroW olleH", -1,
acl_handle_1, lcid_1));
ASSERT_NO_FATAL_FAILURE(ReceiveAndVerifyIncomingTransmission(
client_handle_1, false, test_scn, false, "Hello World!\r", -1,
acl_handle_1, lcid_1, 1));
}
TEST_F(StackRfcommTest, TestConnectionCollision) {
static const uint16_t acl_handle = 0x0008;
static const uint16_t old_lcid = 0x004a;
static const uint16_t new_lcid = 0x005c;
static const uint16_t test_uuid = 0x1112;
static const uint8_t test_server_scn = 3;
static const uint8_t test_peer_scn = 10;
// Must be smaller than L2CAP_MTU_SIZE by at least 4 bytes
static const uint16_t test_mtu = 1000;
static const RawAddress test_address = GetTestAddress(0);
uint16_t server_handle = 0;
VLOG(1) << "Step 1";
// Prepare a server port
int status = RFCOMM_CreateConnection(test_uuid, test_server_scn, true,
test_mtu, RawAddress::kAny,
&server_handle, port_mgmt_cback_0);
ASSERT_EQ(status, PORT_SUCCESS);
status = PORT_SetEventMask(server_handle, PORT_EV_RXCHAR);
ASSERT_EQ(status, PORT_SUCCESS);
status = PORT_SetEventCallback(server_handle, port_event_cback_0);
ASSERT_EQ(status, PORT_SUCCESS);
VLOG(1) << "Step 2";
// Try to connect to a client port
uint16_t client_handle_1 = 0;
EXPECT_CALL(l2cap_interface_, ConnectRequest(BT_PSM_RFCOMM, test_address))
.Times(1)
.WillOnce(Return(old_lcid));
status = RFCOMM_CreateConnection(test_uuid, test_peer_scn, false, test_mtu,
test_address, &client_handle_1,
port_mgmt_cback_1);
ASSERT_EQ(status, PORT_SUCCESS);
status = PORT_SetEventMask(client_handle_1, PORT_EV_RXCHAR);
ASSERT_EQ(status, PORT_SUCCESS);
status = PORT_SetEventCallback(client_handle_1, port_event_cback_1);
ASSERT_EQ(status, PORT_SUCCESS);
VLOG(1) << "Step 3";
// While our connection is pending, remote device tries to connect to
// new_lcid, with L2CAP command id: pending_cmd_id
static const uint8_t pending_cmd_id = 0x05;
// RFCOMM starts timer for collision:
l2cap_appl_info_.pL2CA_ConnectInd_Cb(test_address, new_lcid, BT_PSM_RFCOMM,
pending_cmd_id);
VLOG(1) << "Step 4";
// Remote reject our connection request saying PSM not allowed
// This should trigger RFCOMM to accept remote L2CAP connection at new_lcid
EXPECT_CALL(l2cap_interface_, ConnectResponse(test_address, pending_cmd_id,
new_lcid, L2CAP_CONN_OK, 0))
.WillOnce(Return(true));
// Followed by configure request for MTU size
tL2CAP_CFG_INFO our_cfg_req = {.mtu_present = true, .mtu = L2CAP_MTU_SIZE};
EXPECT_CALL(l2cap_interface_,
ConfigRequest(new_lcid, PointerMemoryEqual(&our_cfg_req)))
.WillOnce(Return(true));
l2cap_appl_info_.pL2CA_ConnectCfm_Cb(old_lcid, L2CAP_CONN_NO_PSM);
VLOG(1) << "Step 5";
// Remote device also ask to configure MTU size as well
tL2CAP_CFG_INFO peer_cfg_req = {.mtu_present = true, .mtu = test_mtu};
// We responded by saying OK
tL2CAP_CFG_INFO our_cfg_rsp = {.result = L2CAP_CFG_OK,
.mtu = peer_cfg_req.mtu};
EXPECT_CALL(l2cap_interface_,
ConfigResponse(new_lcid, PointerMemoryEqual(&our_cfg_rsp)))
.WillOnce(Return(true));
l2cap_appl_info_.pL2CA_ConfigInd_Cb(new_lcid, &peer_cfg_req);
VLOG(1) << "Step 6";
// Remote device accepted our MTU size
l2cap_appl_info_.pL2CA_ConfigCfm_Cb(new_lcid, L2CAP_CFG_OK, {});
// L2CAP collision and connection setup done
VLOG(1) << "Step 7";
// Remote device connect multiplexer channel
BT_HDR* sabm_channel_0 = AllocateWrappedIncomingL2capAclPacket(
CreateQuickSabmPacket(RFCOMM_MX_DLCI, new_lcid, acl_handle));
// We accept
BT_HDR* ua_channel_0 = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickUaPacket(RFCOMM_MX_DLCI, new_lcid, acl_handle));
EXPECT_CALL(l2cap_interface_, DataWrite(new_lcid, BtHdrEqual(ua_channel_0)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
// And immediately try to configure test_peer_scn
BT_HDR* uih_pn_cmd_to_peer = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickPnPacket(false, GetDlci(true, test_peer_scn), true, test_mtu,
RFCOMM_PN_CONV_LAYER_CBFC_I >> 4, 0, RFCOMM_K_MAX,
new_lcid, acl_handle));
EXPECT_CALL(l2cap_interface_,
DataWrite(new_lcid, BtHdrEqual(uih_pn_cmd_to_peer)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
// Packet should be freed by this method
l2cap_appl_info_.pL2CA_DataInd_Cb(new_lcid, sabm_channel_0);
osi_free(ua_channel_0);
osi_free(uih_pn_cmd_to_peer);
VLOG(1) << "Step 8";
// Peer tries to configure test_server_scn
BT_HDR* uih_pn_cmd_from_peer = AllocateWrappedIncomingL2capAclPacket(
CreateQuickPnPacket(true, GetDlci(false, test_server_scn), true, test_mtu,
RFCOMM_PN_CONV_LAYER_CBFC_I >> 4, 0, RFCOMM_K_MAX,
new_lcid, acl_handle));
// We, as acceptor, must accept
BT_HDR* uih_pn_rsp_to_peer = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickPnPacket(false, GetDlci(false, test_server_scn), false,
test_mtu, RFCOMM_PN_CONV_LAYER_CBFC_R >> 4, 0,
RFCOMM_K_MAX, new_lcid, acl_handle));
EXPECT_CALL(l2cap_interface_,
DataWrite(new_lcid, BtHdrEqual(uih_pn_rsp_to_peer)))
.Times(1)
.WillOnce(Return(L2CAP_DW_SUCCESS));
l2cap_appl_info_.pL2CA_DataInd_Cb(new_lcid, uih_pn_cmd_from_peer);
osi_free(uih_pn_rsp_to_peer);
VLOG(1) << "Step 9";
// Remote never replies our configuration request for test_peer_scn
// But instead connect to test_server_scn directly
BT_HDR* sabm_server_scn =
AllocateWrappedIncomingL2capAclPacket(CreateQuickSabmPacket(
GetDlci(false, test_server_scn), new_lcid, acl_handle));
// We must do security check first
tBTM_SEC_CALLBACK* security_callback = nullptr;
void* p_port = nullptr;
EXPECT_CALL(btm_security_internal_interface_,
MultiplexingProtocolAccessRequest(
test_address, BT_PSM_RFCOMM, false, BTM_SEC_PROTO_RFCOMM,
test_server_scn, NotNull(), NotNull()))
.WillOnce(DoAll(SaveArg<5>(&security_callback), SaveArg<6>(&p_port),
Return(BTM_SUCCESS)));
l2cap_appl_info_.pL2CA_DataInd_Cb(new_lcid, sabm_server_scn);
VLOG(1) << "Step 10";
// After security check, we accept the connection
ASSERT_TRUE(security_callback);
BT_HDR* ua_server_scn =
AllocateWrappedOutgoingL2capAclPacket(CreateQuickUaPacket(
GetDlci(false, test_server_scn), new_lcid, acl_handle));
EXPECT_CALL(l2cap_interface_, DataWrite(new_lcid, BtHdrEqual(ua_server_scn)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
// Callback should come from server port instead, client port will timeout
// in 20 seconds
EXPECT_CALL(rfcomm_callback_,
PortManagementCallback(PORT_SUCCESS, server_handle, 0));
security_callback(&test_address, BT_TRANSPORT_BR_EDR, p_port, BTM_SUCCESS);
osi_free(ua_server_scn);
VLOG(1) << "Step 11";
// MPX_CTRL Modem Status Command (MSC)
BT_HDR* uih_msc_cmd_from_peer = AllocateWrappedIncomingL2capAclPacket(
CreateQuickMscPacket(true, GetDlci(false, test_server_scn), new_lcid,
acl_handle, true, false, true, true, false, true));
BT_HDR* uih_msc_rsp_to_peer = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickMscPacket(false, GetDlci(false, test_server_scn), new_lcid,
acl_handle, false, false, true, true, false, true));
// MPX_CTRL Modem Status Response (MSC)
EXPECT_CALL(l2cap_interface_,
DataWrite(new_lcid, BtHdrEqual(uih_msc_rsp_to_peer)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
BT_HDR* uih_msc_cmd_to_peer = AllocateWrappedOutgoingL2capAclPacket(
CreateQuickMscPacket(false, GetDlci(false, test_server_scn), new_lcid,
acl_handle, true, false, true, true, false, true));
EXPECT_CALL(l2cap_interface_,
DataWrite(new_lcid, BtHdrEqual(uih_msc_cmd_to_peer)))
.WillOnce(Return(L2CAP_DW_SUCCESS));
l2cap_appl_info_.pL2CA_DataInd_Cb(new_lcid, uih_msc_cmd_from_peer);
osi_free(uih_msc_rsp_to_peer);
osi_free(uih_msc_cmd_to_peer);
VLOG(1) << "Step 12";
BT_HDR* uih_msc_rsp_from_peer = AllocateWrappedIncomingL2capAclPacket(
CreateQuickMscPacket(true, GetDlci(false, test_server_scn), new_lcid,
acl_handle, false, false, true, true, false, true));
l2cap_appl_info_.pL2CA_DataInd_Cb(new_lcid, uih_msc_rsp_from_peer);
}
} // namespace