blob: 0fa2bc82cf6fa2fe3ec9458c71ea99e56b064e6a [file] [log] [blame]
/*
*
* BlueZ - Bluetooth protocol stack for Linux
*
* Copyright (C) 2004-2007 Marcel Holtmann <marcel@holtmann.org>
*
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <errno.h>
#include <unistd.h>
#include <stdlib.h>
#include <sys/ioctl.h>
#include <sys/socket.h>
#include <bluetooth/bluetooth.h>
#include <bluetooth/l2cap.h>
#include <bluetooth/hidp.h>
#include <bluetooth/hci.h>
#include <bluetooth/hci_lib.h>
#include <glib.h>
#include "logging.h"
#include "dbus.h"
#include "device.h"
#include "server.h"
#include "storage.h"
static DBusConnection *connection = NULL;
static void cancel_authorization(const char *addr)
{
DBusMessage *msg;
const char *uuid = "";
msg = dbus_message_new_method_call("org.bluez", "/org/bluez",
"org.bluez.Database",
"CancelAuthorizationRequest");
if (!msg) {
error("Unable to allocate new method call");
return;
}
dbus_message_append_args(msg,
DBUS_TYPE_STRING, &addr,
DBUS_TYPE_STRING, &uuid,
DBUS_TYPE_INVALID);
send_message_and_unref(connection, msg);
}
struct authorization_data {
bdaddr_t src;
bdaddr_t dst;
};
static void authorization_callback(DBusPendingCall *pcall, void *data)
{
struct authorization_data *auth = data;
DBusMessage *reply = dbus_pending_call_steal_reply(pcall);
DBusError derr;
dbus_error_init(&derr);
if (dbus_set_error_from_message(&derr, reply) != TRUE) {
dbus_message_unref(reply);
input_device_connadd(&auth->src, &auth->dst);
return;
}
error("Authorization denied: %s", derr.message);
if (dbus_error_has_name(&derr, DBUS_ERROR_NO_REPLY)) {
char addr[18];
memset(addr, 0, sizeof(addr));
ba2str(&auth->dst, addr);
cancel_authorization(addr);
}
input_device_close_channels(&auth->src, &auth->dst);
dbus_error_free(&derr);
dbus_message_unref(reply);
}
static int authorize_device(bdaddr_t *src, bdaddr_t *dst)
{
struct authorization_data *auth;
DBusMessage *msg;
DBusPendingCall *pending;
char addr[18];
const char *paddr = addr;
const char *uuid = ""; /* FIXME: */
msg = dbus_message_new_method_call("org.bluez", "/org/bluez",
"org.bluez.Database", "RequestAuthorization");
if (!msg) {
error("Unable to allocat new RequestAuthorization method call");
return -ENOMEM;
}
memset(addr, 0, sizeof(addr));
ba2str(dst, addr);
dbus_message_append_args(msg,
DBUS_TYPE_STRING, &paddr,
DBUS_TYPE_STRING, &uuid,
DBUS_TYPE_INVALID);
if (dbus_connection_send_with_reply(connection,
msg, &pending, -1) == FALSE)
return -EACCES;
auth = g_new0(struct authorization_data, 1);
bacpy(&auth->src, src);
bacpy(&auth->dst, dst);
dbus_pending_call_set_notify(pending, authorization_callback, auth, g_free);
dbus_pending_call_unref(pending);
dbus_message_unref(msg);
return 0;
}
static gboolean connect_event(GIOChannel *chan, GIOCondition cond, gpointer data)
{
struct sockaddr_l2 addr;
socklen_t addrlen;
bdaddr_t src, dst;
unsigned char psm;
int sk, nsk;
sk = g_io_channel_unix_get_fd(chan);
memset(&addr, 0, sizeof(addr));
addrlen = sizeof(addr);
nsk = accept(sk, (struct sockaddr *) &addr, &addrlen);
if (nsk < 0)
return TRUE;
bacpy(&dst, &addr.l2_bdaddr);
psm = btohs(addr.l2_psm);
memset(&addr, 0, sizeof(addr));
addrlen = sizeof(addr);
if (getsockname(nsk, (struct sockaddr *) &addr, &addrlen) < 0) {
close(nsk);
return TRUE;
}
bacpy(&src, &addr.l2_bdaddr);
debug("Incoming connection on PSM %d", psm);
if (input_device_set_channel(&src, &dst, psm, nsk) < 0) {
/* Send unplug virtual cable to unknown devices */
if (psm == L2CAP_PSM_HIDP_CTRL) {
unsigned char unplug[] = { 0x15 };
int err;
err = write(nsk, unplug, sizeof(unplug));
}
close(nsk);
return TRUE;
}
if ((psm == L2CAP_PSM_HIDP_INTR) && (authorize_device(&src, &dst) < 0))
input_device_close_channels(&src, &dst);
return TRUE;
}
static GIOChannel *setup_l2cap(unsigned int psm)
{
GIOChannel *io;
struct sockaddr_l2 addr;
int sk;
sk = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP);
if (sk < 0)
return NULL;
memset(&addr, 0, sizeof(addr));
addr.l2_family = AF_BLUETOOTH;
bacpy(&addr.l2_bdaddr, BDADDR_ANY);
addr.l2_psm = htobs(psm);
if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
close(sk);
return NULL;
}
if (listen(sk, 10) < 0) {
close(sk);
return NULL;
}
io = g_io_channel_unix_new(sk);
g_io_channel_set_close_on_unref(io, TRUE);
g_io_add_watch(io, G_IO_IN, connect_event, NULL);
return io;
}
static GIOChannel *ctrl_io = NULL;
static GIOChannel *intr_io = NULL;
int server_start(DBusConnection *conn)
{
ctrl_io = setup_l2cap(L2CAP_PSM_HIDP_CTRL);
if (!ctrl_io) {
error("Failed to listen on control channel");
return -1;
}
g_io_channel_set_close_on_unref(ctrl_io, TRUE);
intr_io = setup_l2cap(L2CAP_PSM_HIDP_INTR);
if (!intr_io) {
error("Failed to listen on interrupt channel");
g_io_channel_unref(ctrl_io);
ctrl_io = NULL;
}
g_io_channel_set_close_on_unref(intr_io, TRUE);
connection = conn;
return 0;
}
void server_stop(void)
{
if (intr_io)
g_io_channel_unref(intr_io);
if (ctrl_io)
g_io_channel_unref(ctrl_io);
}