| /* |
| * |
| * BlueZ - Bluetooth protocol stack for Linux |
| * |
| * Copyright (C) 2006-2007 Nokia Corporation |
| * Copyright (C) 2004-2008 Marcel Holtmann <marcel@holtmann.org> |
| * |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; either version 2 of the License, or |
| * (at your option) any later version. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License |
| * along with this program; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA |
| * |
| */ |
| |
| #ifdef HAVE_CONFIG_H |
| #include <config.h> |
| #endif |
| |
| #define _GNU_SOURCE |
| #include <stdio.h> |
| #include <errno.h> |
| #include <unistd.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/param.h> |
| #include <sys/ioctl.h> |
| #include <sys/socket.h> |
| |
| #include <bluetooth/bluetooth.h> |
| #include <bluetooth/hci.h> |
| #include <bluetooth/hci_lib.h> |
| #include <bluetooth/sdp.h> |
| |
| #include <glib.h> |
| #include <dbus/dbus.h> |
| #include <gdbus.h> |
| |
| #include "logging.h" |
| #include "textfile.h" |
| |
| #include "hcid.h" |
| #include "manager.h" |
| #include "adapter.h" |
| #include "device.h" |
| #include "error.h" |
| #include "glib-helper.h" |
| #include "dbus-common.h" |
| #include "agent.h" |
| #include "storage.h" |
| |
| static DBusConnection *connection = NULL; |
| |
| DBusMessage *new_authentication_return(DBusMessage *msg, uint8_t status) |
| { |
| switch (status) { |
| case 0x00: /* success */ |
| return dbus_message_new_method_return(msg); |
| |
| case 0x04: /* page timeout */ |
| case 0x08: /* connection timeout */ |
| case 0x10: /* connection accept timeout */ |
| case 0x22: /* LMP response timeout */ |
| case 0x28: /* instant passed - is this a timeout? */ |
| return dbus_message_new_error(msg, |
| ERROR_INTERFACE ".AuthenticationTimeout", |
| "Authentication Timeout"); |
| case 0x17: /* too frequent pairing attempts */ |
| return dbus_message_new_error(msg, |
| ERROR_INTERFACE ".RepeatedAttempts", |
| "Repeated Attempts"); |
| |
| case 0x06: |
| case 0x18: /* pairing not allowed (e.g. gw rejected attempt) */ |
| return dbus_message_new_error(msg, |
| ERROR_INTERFACE ".AuthenticationRejected", |
| "Authentication Rejected"); |
| |
| case 0x07: /* memory capacity */ |
| case 0x09: /* connection limit */ |
| case 0x0a: /* synchronous connection limit */ |
| case 0x0d: /* limited resources */ |
| case 0x13: /* user ended the connection */ |
| case 0x14: /* terminated due to low resources */ |
| return dbus_message_new_error(msg, |
| ERROR_INTERFACE ".AuthenticationCanceled", |
| "Authentication Canceled"); |
| |
| case 0x05: /* authentication failure */ |
| case 0x0E: /* rejected due to security reasons - is this auth failure? */ |
| case 0x25: /* encryption mode not acceptable - is this auth failure? */ |
| case 0x26: /* link key cannot be changed - is this auth failure? */ |
| case 0x29: /* pairing with unit key unsupported - is this auth failure? */ |
| case 0x2f: /* insufficient security - is this auth failure? */ |
| default: |
| return dbus_message_new_error(msg, |
| ERROR_INTERFACE ".AuthenticationFailed", |
| "Authentication Failed"); |
| } |
| } |
| |
| /***************************************************************** |
| * |
| * Section reserved to HCI commands confirmation handling and low |
| * level events(eg: device attached/dettached. |
| * |
| *****************************************************************/ |
| |
| static void pincode_cb(struct agent *agent, DBusError *err, const char *pincode, |
| struct btd_device *device) |
| { |
| struct btd_adapter *adapter = device_get_adapter(device); |
| pin_code_reply_cp pr; |
| bdaddr_t sba, dba; |
| size_t len; |
| int dev; |
| struct pending_auth_info *auth; |
| uint16_t dev_id = adapter_get_dev_id(adapter); |
| struct bonding_request_info *bonding = adapter_get_bonding_info(adapter); |
| |
| /* No need to reply anything if the authentication already failed */ |
| if (bonding && bonding->hci_status) |
| return; |
| |
| dev = hci_open_dev(dev_id); |
| if (dev < 0) { |
| error("hci_open_dev(%d): %s (%d)", dev_id, |
| strerror(errno), errno); |
| return; |
| } |
| |
| adapter_get_address(adapter, &sba); |
| device_get_address(device, &dba); |
| |
| auth = adapter_find_auth_request(adapter, &dba); |
| |
| if (err) { |
| hci_send_cmd(dev, OGF_LINK_CTL, |
| OCF_PIN_CODE_NEG_REPLY, 6, &dba); |
| goto done; |
| } |
| |
| len = strlen(pincode); |
| |
| set_pin_length(&sba, len); |
| |
| memset(&pr, 0, sizeof(pr)); |
| bacpy(&pr.bdaddr, &dba); |
| memcpy(pr.pin_code, pincode, len); |
| pr.pin_len = len; |
| hci_send_cmd(dev, OGF_LINK_CTL, OCF_PIN_CODE_REPLY, PIN_CODE_REPLY_CP_SIZE, &pr); |
| |
| done: |
| if (auth) { |
| auth->replied = TRUE; |
| auth->agent = NULL; |
| } |
| hci_close_dev(dev); |
| } |
| |
| int hcid_dbus_request_pin(int dev, bdaddr_t *sba, struct hci_conn_info *ci) |
| { |
| char addr[18]; |
| struct btd_adapter *adapter; |
| struct btd_device *device; |
| struct agent *agent = NULL; |
| int ret; |
| |
| adapter = manager_find_adapter(sba); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return -1; |
| } |
| |
| ba2str(&ci->bdaddr, addr); |
| |
| device = adapter_find_device(adapter, addr); |
| |
| if (device) |
| agent = device_get_agent(device); |
| |
| if (!agent) |
| agent = adapter_get_agent(adapter); |
| |
| if (!agent) |
| return -EPERM; |
| |
| if (!device) { |
| device = adapter_create_device(connection, adapter, addr); |
| if (!device) |
| return -ENODEV; |
| } |
| |
| ret = agent_request_pincode(agent, device, |
| (agent_pincode_cb) pincode_cb, |
| device); |
| if (ret == 0) { |
| struct pending_auth_info *auth; |
| auth = adapter_new_auth_request(adapter, &ci->bdaddr, |
| AUTH_TYPE_PINCODE); |
| auth->agent = agent; |
| } |
| |
| return ret; |
| } |
| |
| static void confirm_cb(struct agent *agent, DBusError *err, void *user_data) |
| { |
| struct btd_device *device = user_data; |
| struct btd_adapter *adapter = device_get_adapter(device); |
| user_confirm_reply_cp cp; |
| int dd; |
| struct pending_auth_info *auth; |
| uint16_t dev_id = adapter_get_dev_id(adapter); |
| struct bonding_request_info *bonding = adapter_get_bonding_info(adapter); |
| |
| /* No need to reply anything if the authentication already failed */ |
| if (bonding && bonding->hci_status) |
| return; |
| |
| dd = hci_open_dev(dev_id); |
| if (dd < 0) { |
| error("Unable to open hci%d", dev_id); |
| return; |
| } |
| |
| memset(&cp, 0, sizeof(cp)); |
| device_get_address(device, &cp.bdaddr); |
| |
| auth = adapter_find_auth_request(adapter, &cp.bdaddr); |
| |
| if (err) |
| hci_send_cmd(dd, OGF_LINK_CTL, OCF_USER_CONFIRM_NEG_REPLY, |
| USER_CONFIRM_REPLY_CP_SIZE, &cp); |
| else |
| hci_send_cmd(dd, OGF_LINK_CTL, OCF_USER_CONFIRM_REPLY, |
| USER_CONFIRM_REPLY_CP_SIZE, &cp); |
| |
| if (auth) { |
| auth->replied = TRUE; |
| auth->agent = FALSE; |
| } |
| |
| hci_close_dev(dd); |
| } |
| |
| static void passkey_cb(struct agent *agent, DBusError *err, uint32_t passkey, |
| void *user_data) |
| { |
| struct btd_device *device = user_data; |
| struct btd_adapter *adapter = device_get_adapter(device); |
| user_passkey_reply_cp cp; |
| bdaddr_t dba; |
| int dd; |
| struct pending_auth_info *auth; |
| uint16_t dev_id = adapter_get_dev_id(adapter); |
| struct bonding_request_info *bonding = adapter_get_bonding_info(adapter); |
| |
| /* No need to reply anything if the authentication already failed */ |
| if (bonding && bonding->hci_status) |
| return; |
| |
| dd = hci_open_dev(dev_id); |
| if (dd < 0) { |
| error("Unable to open hci%d", dev_id); |
| return; |
| } |
| |
| device_get_address(device, &dba); |
| |
| memset(&cp, 0, sizeof(cp)); |
| bacpy(&cp.bdaddr, &dba); |
| cp.passkey = passkey; |
| |
| auth = adapter_find_auth_request(adapter, &dba); |
| |
| if (err) |
| hci_send_cmd(dd, OGF_LINK_CTL, |
| OCF_USER_PASSKEY_NEG_REPLY, 6, &dba); |
| else |
| hci_send_cmd(dd, OGF_LINK_CTL, OCF_USER_PASSKEY_REPLY, |
| USER_PASSKEY_REPLY_CP_SIZE, &cp); |
| |
| if (auth) { |
| auth->replied = TRUE; |
| auth->agent = NULL; |
| } |
| |
| hci_close_dev(dd); |
| } |
| |
| static int get_auth_requirements(bdaddr_t *local, bdaddr_t *remote, |
| uint8_t *auth) |
| { |
| struct hci_auth_info_req req; |
| char addr[18]; |
| int err, dd, dev_id; |
| |
| ba2str(local, addr); |
| |
| dev_id = hci_devid(addr); |
| if (dev_id < 0) |
| return dev_id; |
| |
| dd = hci_open_dev(dev_id); |
| if (dd < 0) |
| return dd; |
| |
| memset(&req, 0, sizeof(req)); |
| bacpy(&req.bdaddr, remote); |
| |
| err = ioctl(dd, HCIGETAUTHINFO, (unsigned long) &req); |
| if (err < 0) { |
| debug("HCIGETAUTHINFO failed: %s (%d)", |
| strerror(errno), errno); |
| hci_close_dev(dd); |
| return err; |
| } |
| |
| hci_close_dev(dd); |
| |
| if (auth) |
| *auth = req.type; |
| |
| return 0; |
| } |
| |
| int hcid_dbus_user_confirm(bdaddr_t *sba, bdaddr_t *dba, uint32_t passkey) |
| { |
| struct btd_adapter *adapter; |
| struct btd_device *device; |
| struct agent *agent; |
| char addr[18]; |
| uint8_t type; |
| struct pending_auth_info *auth; |
| uint16_t dev_id; |
| |
| adapter = manager_find_adapter(sba); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return -1; |
| } |
| |
| dev_id = adapter_get_dev_id(adapter); |
| |
| if (get_auth_requirements(sba, dba, &type) < 0) { |
| int dd; |
| |
| dd = hci_open_dev(dev_id); |
| if (dd < 0) { |
| error("Unable to open hci%d", dev_id); |
| return -1; |
| } |
| |
| hci_send_cmd(dd, OGF_LINK_CTL, |
| OCF_USER_CONFIRM_NEG_REPLY, 6, dba); |
| |
| hci_close_dev(dd); |
| |
| return 0; |
| } |
| |
| ba2str(dba, addr); |
| |
| device = adapter_get_device(connection, adapter, addr); |
| if (!device) { |
| error("Device creation failed"); |
| return -1; |
| } |
| |
| /* If no MITM protection required, auto-accept */ |
| if (!(device_get_auth(device) & 0x01) && !(type & 0x01)) { |
| int dd; |
| |
| dd = hci_open_dev(dev_id); |
| if (dd < 0) { |
| error("Unable to open hci%d", dev_id); |
| return -1; |
| } |
| |
| hci_send_cmd(dd, OGF_LINK_CTL, |
| OCF_USER_CONFIRM_REPLY, 6, dba); |
| |
| hci_close_dev(dd); |
| |
| return 0; |
| } |
| |
| agent = device_get_agent(device); |
| |
| if (!agent) |
| agent = adapter_get_agent(adapter); |
| |
| if (!agent) { |
| error("No agent available for user confirm request"); |
| return -1; |
| } |
| |
| if (agent_request_confirmation(agent, device, passkey, |
| confirm_cb, device) < 0) { |
| error("Requesting passkey failed"); |
| return -1; |
| } |
| |
| auth = adapter_new_auth_request(adapter, dba, AUTH_TYPE_CONFIRM); |
| auth->agent = agent; |
| |
| return 0; |
| } |
| |
| int hcid_dbus_user_passkey(bdaddr_t *sba, bdaddr_t *dba) |
| { |
| struct btd_adapter *adapter; |
| struct btd_device *device; |
| struct agent *agent = NULL; |
| char addr[18]; |
| struct pending_auth_info *auth; |
| |
| adapter = manager_find_adapter(sba); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return -1; |
| } |
| |
| ba2str(dba, addr); |
| |
| device = adapter_get_device(connection, adapter, addr); |
| |
| if (device) |
| agent = device_get_agent(device); |
| |
| if (!agent) |
| agent = adapter_get_agent(adapter); |
| |
| if (!agent) { |
| error("No agent available for user confirm request"); |
| return -1; |
| } |
| |
| if (agent_request_passkey(agent, device, passkey_cb, device) < 0) { |
| error("Requesting passkey failed"); |
| return -1; |
| } |
| |
| auth = adapter_new_auth_request(adapter, dba, AUTH_TYPE_PASSKEY); |
| auth->agent = agent; |
| |
| return 0; |
| } |
| |
| int hcid_dbus_user_notify(bdaddr_t *sba, bdaddr_t *dba, uint32_t passkey) |
| { |
| struct btd_adapter *adapter; |
| struct btd_device *device; |
| struct agent *agent = NULL; |
| char addr[18]; |
| struct pending_auth_info *auth; |
| |
| adapter = manager_find_adapter(sba); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return -1; |
| } |
| |
| ba2str(dba, addr); |
| |
| device = adapter_get_device(connection, adapter, addr); |
| if (device) |
| agent = device_get_agent(device); |
| |
| if (!agent) |
| agent = adapter_get_agent(adapter); |
| |
| if (!agent) { |
| error("No agent available for user confirm request"); |
| return -1; |
| } |
| |
| if (agent_display_passkey(agent, device, passkey) < 0) { |
| error("Displaying passkey failed"); |
| return -1; |
| } |
| |
| auth = adapter_new_auth_request(adapter, dba, AUTH_TYPE_NOTIFY); |
| auth->agent = agent; |
| |
| return 0; |
| } |
| |
| void hcid_dbus_bonding_process_complete(bdaddr_t *local, bdaddr_t *peer, |
| uint8_t status) |
| { |
| struct btd_adapter *adapter; |
| char peer_addr[18]; |
| DBusMessage *reply; |
| struct btd_device *device; |
| struct bonding_request_info *bonding; |
| struct pending_auth_info *auth; |
| |
| debug("hcid_dbus_bonding_process_complete: status=%02x", status); |
| |
| ba2str(peer, peer_addr); |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("Unable to find matching adapter"); |
| return; |
| } |
| |
| bonding = adapter_get_bonding_info(adapter); |
| |
| if (bonding && bacmp(&bonding->bdaddr, peer)) |
| bonding = NULL; |
| |
| if (status == 0) { |
| device = adapter_get_device(connection, adapter, peer_addr); |
| if (!device) { |
| /* This should really only happen if we run out of |
| * memory */ |
| error("Unable to get device object!"); |
| status = HCI_REJECTED_LIMITED_RESOURCES; |
| } |
| } |
| |
| if (status && bonding) |
| bonding->hci_status = status; |
| |
| auth = adapter_find_auth_request(adapter, peer); |
| if (!auth) { |
| /* This means that there was no pending PIN or SSP token request |
| * from the controller, i.e. this is not a new pairing */ |
| debug("hcid_dbus_bonding_process_complete: no pending auth request"); |
| goto proceed; |
| } |
| |
| if (auth->agent) |
| agent_cancel(auth->agent); |
| |
| adapter_remove_auth_request(adapter, peer); |
| |
| /* If this is a new pairing send the appropriate signal for it |
| * and proceed with service discovery */ |
| if (status == 0) { |
| if (device_set_paired(connection, device, bonding) && bonding) |
| adapter_free_bonding_request(adapter); |
| return; |
| } |
| |
| proceed: |
| if (!bonding) |
| return; /* skip: no bonding req pending */ |
| |
| if (bonding->cancel) |
| reply = new_authentication_return(bonding->msg, |
| HCI_OE_USER_ENDED_CONNECTION); |
| else |
| reply = new_authentication_return(bonding->msg, status); |
| |
| g_dbus_send_message(connection, reply); |
| |
| adapter_free_bonding_request(adapter); |
| } |
| |
| void hcid_dbus_inquiry_start(bdaddr_t *local) |
| { |
| struct btd_adapter *adapter; |
| int state; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("Unable to find matching adapter"); |
| return; |
| } |
| |
| state = adapter_get_state(adapter); |
| state |= STD_INQUIRY; |
| adapter_set_state(adapter, state); |
| /* |
| * Cancel pending remote name request and clean the device list |
| * when inquiry is supported in periodic inquiry idle state. |
| */ |
| if (adapter_get_state(adapter) & PERIODIC_INQUIRY) |
| pending_remote_name_cancel(adapter); |
| |
| /* Disable name resolution for non D-Bus clients */ |
| if (!adapter_has_discov_sessions(adapter)) { |
| state = adapter_get_state(adapter); |
| state &= ~RESOLVE_NAME; |
| adapter_set_state(adapter, state); |
| } |
| } |
| |
| static int found_device_req_name(struct btd_adapter *adapter) |
| { |
| struct hci_request rq; |
| evt_cmd_status rp; |
| remote_name_req_cp cp; |
| struct remote_dev_info *dev, match; |
| int dd, req_sent = 0; |
| uint16_t dev_id = adapter_get_dev_id(adapter); |
| |
| memset(&match, 0, sizeof(struct remote_dev_info)); |
| bacpy(&match.bdaddr, BDADDR_ANY); |
| match.name_status = NAME_REQUIRED; |
| |
| dev = adapter_search_found_devices(adapter, &match); |
| if (!dev) |
| return -ENODATA; |
| |
| dd = hci_open_dev(dev_id); |
| if (dd < 0) |
| return -errno; |
| |
| memset(&rq, 0, sizeof(rq)); |
| rq.ogf = OGF_LINK_CTL; |
| rq.ocf = OCF_REMOTE_NAME_REQ; |
| rq.cparam = &cp; |
| rq.clen = REMOTE_NAME_REQ_CP_SIZE; |
| rq.rparam = &rp; |
| rq.rlen = EVT_CMD_STATUS_SIZE; |
| rq.event = EVT_CMD_STATUS; |
| |
| /* send at least one request or return failed if the list is empty */ |
| do { |
| /* flag to indicate the current remote name requested */ |
| dev->name_status = NAME_REQUESTED; |
| |
| memset(&rp, 0, sizeof(rp)); |
| memset(&cp, 0, sizeof(cp)); |
| bacpy(&cp.bdaddr, &dev->bdaddr); |
| cp.pscan_rep_mode = 0x02; |
| |
| if (hci_send_req(dd, &rq, HCI_REQ_TIMEOUT) < 0) |
| error("Unable to send the HCI remote name request: %s (%d)", |
| strerror(errno), errno); |
| |
| if (!rp.status) { |
| req_sent = 1; |
| break; |
| } |
| |
| error("Remote name request failed with status 0x%02x", |
| rp.status); |
| |
| /* if failed, request the next element */ |
| /* remove the element from the list */ |
| adapter_remove_found_device(adapter, &dev->bdaddr); |
| |
| /* get the next element */ |
| dev = adapter_search_found_devices(adapter, &match); |
| } while (dev); |
| |
| hci_close_dev(dd); |
| |
| if (!req_sent) |
| return -ENODATA; |
| |
| return 0; |
| } |
| |
| void hcid_dbus_inquiry_complete(bdaddr_t *local) |
| { |
| struct btd_adapter *adapter; |
| const gchar *path; |
| int state; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("Unable to find matching adapter"); |
| return; |
| } |
| |
| path = adapter_get_path(adapter); |
| |
| /* Out of range verification */ |
| if ((adapter_get_state(adapter) & PERIODIC_INQUIRY) && |
| !(adapter_get_state(adapter) & STD_INQUIRY)) |
| adapter_update_oor_devices(adapter); |
| |
| /* |
| * The following scenarios can happen: |
| * 1. standard inquiry: always send discovery completed signal |
| * 2. standard inquiry + name resolving: send discovery completed |
| * after name resolving |
| * 3. periodic inquiry: skip discovery completed signal |
| * 4. periodic inquiry + standard inquiry: always send discovery |
| * completed signal |
| * |
| * Keep in mind that non D-Bus requests can arrive. |
| */ |
| if (found_device_req_name(adapter) == 0) |
| return; |
| |
| /* reset the discover type to be able to handle D-Bus and non D-Bus |
| * requests */ |
| state = adapter_get_state(adapter); |
| state &= ~STD_INQUIRY; |
| state &= ~PERIODIC_INQUIRY; |
| adapter_set_state(adapter, state); |
| } |
| |
| void hcid_dbus_periodic_inquiry_start(bdaddr_t *local, uint8_t status) |
| { |
| struct btd_adapter *adapter; |
| int state; |
| |
| /* Don't send the signal if the cmd failed */ |
| if (status) |
| return; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return; |
| } |
| |
| state = adapter_get_state(adapter); |
| state |= PERIODIC_INQUIRY; |
| adapter_set_state(adapter, state); |
| } |
| |
| void hcid_dbus_periodic_inquiry_exit(bdaddr_t *local, uint8_t status) |
| { |
| struct btd_adapter *adapter; |
| int state; |
| |
| /* Don't send the signal if the cmd failed */ |
| if (status) |
| return; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return; |
| } |
| |
| /* reset the discover type to be able to handle D-Bus and non D-Bus |
| * requests */ |
| state = adapter_get_state(adapter); |
| state &= ~PERIODIC_INQUIRY; |
| adapter_set_state(adapter, state); |
| } |
| |
| static char *extract_eir_name(uint8_t *data, uint8_t *type) |
| { |
| if (!data || !type) |
| return NULL; |
| |
| if (data[0] == 0) |
| return NULL; |
| |
| *type = data[1]; |
| |
| switch (*type) { |
| case 0x08: |
| case 0x09: |
| return strndup((char *) (data + 2), data[0] - 1); |
| } |
| |
| return NULL; |
| } |
| |
| static void append_dict_valist(DBusMessageIter *iter, |
| const char *first_key, |
| va_list var_args) |
| { |
| DBusMessageIter dict; |
| const char *key; |
| int type; |
| void *val; |
| |
| dbus_message_iter_open_container(iter, DBUS_TYPE_ARRAY, |
| DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING |
| DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_VARIANT_AS_STRING |
| DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict); |
| |
| key = first_key; |
| while (key) { |
| type = va_arg(var_args, int); |
| val = va_arg(var_args, void *); |
| dbus_message_iter_append_dict_entry(&dict, key, type, val); |
| key = va_arg(var_args, char *); |
| } |
| |
| dbus_message_iter_close_container(iter, &dict); |
| } |
| |
| static void emit_device_found(const char *path, const char *address, |
| const char *first_key, ...) |
| { |
| DBusMessage *signal; |
| DBusMessageIter iter; |
| va_list var_args; |
| |
| signal = dbus_message_new_signal(path, ADAPTER_INTERFACE, |
| "DeviceFound"); |
| if (!signal) { |
| error("Unable to allocate new %s.DeviceFound signal", |
| ADAPTER_INTERFACE); |
| return; |
| } |
| dbus_message_iter_init_append(signal, &iter); |
| dbus_message_iter_append_basic(&iter, DBUS_TYPE_STRING, &address); |
| |
| va_start(var_args, first_key); |
| append_dict_valist(&iter, first_key, var_args); |
| va_end(var_args); |
| |
| dbus_connection_send(connection, signal, NULL); |
| |
| dbus_message_unref(signal); |
| } |
| |
| void hcid_dbus_inquiry_result(bdaddr_t *local, bdaddr_t *peer, uint32_t class, |
| int8_t rssi, uint8_t *data) |
| { |
| char filename[PATH_MAX + 1]; |
| struct btd_adapter *adapter; |
| char local_addr[18], peer_addr[18], *name, *tmp_name; |
| const char *paddr = peer_addr; |
| struct remote_dev_info *dev, match; |
| dbus_int16_t tmp_rssi = rssi; |
| uint8_t name_type = 0x00; |
| name_status_t name_status; |
| const gchar *path; |
| int state; |
| |
| ba2str(local, local_addr); |
| ba2str(peer, peer_addr); |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return; |
| } |
| |
| write_remote_class(local, peer, class); |
| |
| if (data) |
| write_remote_eir(local, peer, data); |
| |
| /* |
| * workaround to identify situation when the daemon started and |
| * a standard inquiry or periodic inquiry was already running |
| */ |
| if (!(adapter_get_state(adapter) & STD_INQUIRY) && |
| !(adapter_get_state(adapter) & PERIODIC_INQUIRY)) { |
| state = adapter_get_state(adapter); |
| state |= PERIODIC_INQUIRY; |
| adapter_set_state(adapter, state); |
| } |
| /* Out of range list update */ |
| if (adapter_get_state(adapter) & PERIODIC_INQUIRY) |
| adapter_remove_oor_device(adapter, peer_addr); |
| |
| memset(&match, 0, sizeof(struct remote_dev_info)); |
| bacpy(&match.bdaddr, peer); |
| match.name_status = NAME_SENT; |
| /* if found: don't send the name again */ |
| dev = adapter_search_found_devices(adapter, &match); |
| if (dev) |
| return; |
| |
| /* the inquiry result can be triggered by NON D-Bus client */ |
| if (adapter_get_state(adapter) & RESOLVE_NAME) |
| name_status = NAME_REQUIRED; |
| else |
| name_status = NAME_NOT_REQUIRED; |
| |
| create_name(filename, PATH_MAX, STORAGEDIR, local_addr, "names"); |
| name = textfile_get(filename, peer_addr); |
| |
| tmp_name = extract_eir_name(data, &name_type); |
| if (tmp_name) { |
| if (name_type == 0x09) { |
| write_device_name(local, peer, tmp_name); |
| name_status = NAME_NOT_REQUIRED; |
| |
| if (name) |
| g_free(name); |
| |
| name = tmp_name; |
| } else { |
| if (name) |
| free(tmp_name); |
| else |
| name = tmp_name; |
| } |
| } |
| |
| path = adapter_get_path(adapter); |
| |
| if (name) { |
| if (name_type != 0x08) |
| name_status = NAME_SENT; |
| |
| emit_device_found(path, paddr, |
| "Address", DBUS_TYPE_STRING, &paddr, |
| "Class", DBUS_TYPE_UINT32, &class, |
| "RSSI", DBUS_TYPE_INT16, &tmp_rssi, |
| "Name", DBUS_TYPE_STRING, &name, |
| NULL); |
| |
| g_free(name); |
| } else { |
| emit_device_found(path, paddr, |
| "Address", DBUS_TYPE_STRING, &paddr, |
| "Class", DBUS_TYPE_UINT32, &class, |
| "RSSI", DBUS_TYPE_INT16, &tmp_rssi, |
| NULL); |
| } |
| |
| /* add in the list to track name sent/pending */ |
| adapter_add_found_device(adapter, peer, rssi, name_status); |
| } |
| |
| void hcid_dbus_remote_class(bdaddr_t *local, bdaddr_t *peer, uint32_t class) |
| { |
| char peer_addr[18]; |
| const char *paddr = peer_addr; |
| uint32_t old_class = 0; |
| struct btd_adapter *adapter; |
| struct btd_device *device; |
| const gchar *dev_path; |
| |
| read_remote_class(local, peer, &old_class); |
| |
| if (old_class == class) |
| return; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return; |
| } |
| |
| ba2str(peer, peer_addr); |
| device = adapter_find_device(adapter, paddr); |
| |
| if (!device) |
| return; |
| |
| dev_path = device_get_path(device); |
| |
| dbus_connection_emit_property_changed(connection, dev_path, |
| DEVICE_INTERFACE, "Class", |
| DBUS_TYPE_UINT32, &class); |
| } |
| |
| void hcid_dbus_remote_name(bdaddr_t *local, bdaddr_t *peer, uint8_t status, |
| char *name) |
| { |
| struct btd_adapter *adapter; |
| char peer_addr[18]; |
| const char *paddr = peer_addr; |
| const gchar *dev_path; |
| int state; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return; |
| } |
| |
| ba2str(peer, peer_addr); |
| |
| if (!status) { |
| struct btd_device *device; |
| |
| device = adapter_find_device(adapter, paddr); |
| if (device) { |
| |
| dev_path = device_get_path(device); |
| |
| dbus_connection_emit_property_changed(connection, |
| dev_path, DEVICE_INTERFACE, |
| "Name", DBUS_TYPE_STRING, &name); |
| } |
| } |
| |
| /* remove from remote name request list */ |
| adapter_remove_found_device(adapter, peer); |
| |
| /* check if there is more devices to request names */ |
| if (found_device_req_name(adapter) == 0) |
| return; |
| |
| state = adapter_get_state(adapter); |
| state &= ~PERIODIC_INQUIRY; |
| state &= ~STD_INQUIRY; |
| adapter_set_state(adapter, state); |
| } |
| |
| void hcid_dbus_link_key_notify(bdaddr_t *local, bdaddr_t *peer) |
| { |
| char peer_addr[18]; |
| struct btd_device *device; |
| struct btd_adapter *adapter; |
| struct bonding_request_info *bonding; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return; |
| } |
| |
| ba2str(peer, peer_addr); |
| |
| device = adapter_find_device(adapter, peer_addr); |
| |
| bonding = adapter_get_bonding_info(adapter); |
| |
| if (!device_get_connected(device)) |
| device_set_secmode3_conn(device, TRUE); |
| else if (!bonding) |
| hcid_dbus_bonding_process_complete(local, peer, 0); |
| } |
| |
| void hcid_dbus_conn_complete(bdaddr_t *local, uint8_t status, uint16_t handle, |
| bdaddr_t *peer) |
| { |
| char peer_addr[18]; |
| struct btd_adapter *adapter; |
| struct bonding_request_info *bonding; |
| struct btd_device *device; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return; |
| } |
| |
| ba2str(peer, peer_addr); |
| |
| device = adapter_get_device(connection, adapter, peer_addr); |
| |
| if (status) { |
| struct pending_auth_info *auth; |
| |
| auth = adapter_find_auth_request(adapter, peer); |
| if (auth && auth->agent) |
| agent_cancel(auth->agent); |
| |
| adapter_remove_auth_request(adapter, peer); |
| |
| if (device) |
| device_set_secmode3_conn(device, FALSE); |
| |
| bonding = adapter_get_bonding_info(adapter); |
| if (bonding) |
| bonding->hci_status = status; |
| } else { |
| if (device) |
| device_set_connected(connection, device, TRUE); |
| |
| /* add in the active connetions list */ |
| adapter_add_active_conn(adapter, peer, handle); |
| } |
| } |
| |
| void hcid_dbus_disconn_complete(bdaddr_t *local, uint8_t status, |
| uint16_t handle, uint8_t reason) |
| { |
| DBusMessage *reply; |
| char peer_addr[18]; |
| struct btd_adapter *adapter; |
| struct btd_device *device; |
| struct active_conn_info *dev; |
| struct pending_auth_info *auth; |
| uint16_t dev_id; |
| struct bonding_request_info *bonding; |
| |
| if (status) { |
| error("Disconnection failed: 0x%02x", status); |
| return; |
| } |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return; |
| } |
| |
| dev = adapter_search_active_conn_by_handle(adapter, handle); |
| if (!dev) { |
| error("No matching connection for handle %u", handle); |
| return; |
| } |
| |
| ba2str(&dev->bdaddr, peer_addr); |
| |
| dev_id = adapter_get_dev_id(adapter); |
| |
| /* clean pending HCI cmds */ |
| hci_req_queue_remove(dev_id, &dev->bdaddr); |
| |
| /* Cancel D-Bus/non D-Bus requests */ |
| auth = adapter_find_auth_request(adapter, &dev->bdaddr); |
| if (auth && auth->agent) |
| agent_cancel(auth->agent); |
| |
| adapter_remove_auth_request(adapter, &dev->bdaddr); |
| |
| bonding = adapter_get_bonding_info(adapter); |
| /* Check if there is a pending Bonding request */ |
| if (bonding && (bacmp(&bonding->bdaddr, &dev->bdaddr) == 0)) { |
| if (bonding->cancel) { |
| /* reply authentication canceled */ |
| reply = new_authentication_return(bonding->msg, |
| HCI_OE_USER_ENDED_CONNECTION); |
| g_dbus_send_message(connection, reply); |
| } else { |
| reply = new_authentication_return(bonding->msg, |
| HCI_AUTHENTICATION_FAILURE); |
| dbus_connection_send(connection, reply, NULL); |
| dbus_message_unref(reply); |
| } |
| adapter_free_bonding_request(adapter); |
| } |
| |
| adapter_remove_active_conn(adapter, dev); |
| |
| device = adapter_find_device(adapter, peer_addr); |
| if (device) { |
| device_set_connected(connection, device, FALSE); |
| |
| if (device_is_temporary(device)) { |
| debug("Removing temporary device %s", peer_addr); |
| adapter_remove_device(connection, adapter, device); |
| } |
| } |
| } |
| |
| int set_limited_discoverable(int dd, const uint8_t *cls, gboolean limited) |
| { |
| uint32_t dev_class; |
| int err; |
| int num = (limited ? 2 : 1); |
| uint8_t lap[] = { 0x33, 0x8b, 0x9e, 0x00, 0x8b, 0x9e }; |
| /* |
| * 1: giac |
| * 2: giac + liac |
| */ |
| if (hci_write_current_iac_lap(dd, num, lap, HCI_REQ_TIMEOUT) < 0) { |
| err = errno; |
| error("Can't write current IAC LAP: %s(%d)", |
| strerror(err), err); |
| return -err; |
| } |
| |
| if (limited) { |
| if (cls[1] & 0x20) |
| return 0; /* Already limited */ |
| |
| dev_class = (cls[2] << 16) | ((cls[1] | 0x20) << 8) | cls[0]; |
| } else { |
| if (!(cls[1] & 0x20)) |
| return 0; /* Already clear */ |
| |
| dev_class = (cls[2] << 16) | ((cls[1] & 0xdf) << 8) | cls[0]; |
| } |
| |
| if (hci_write_class_of_dev(dd, dev_class, HCI_REQ_TIMEOUT) < 0) { |
| err = errno; |
| error("Can't write class of device: %s (%d)", |
| strerror(err), err); |
| return -err; |
| } |
| |
| return 0; |
| } |
| |
| int set_service_classes(int dd, const uint8_t *cls, uint8_t value) |
| { |
| uint32_t dev_class; |
| int err; |
| |
| if (cls[2] == value) |
| return 0; /* Already set */ |
| |
| dev_class = (value << 16) | (cls[1] << 8) | cls[0]; |
| |
| if (hci_write_class_of_dev(dd, dev_class, HCI_REQ_TIMEOUT) < 0) { |
| err = errno; |
| error("Can't write class of device: %s (%d)", |
| strerror(err), err); |
| return -err; |
| } |
| |
| return 0; |
| } |
| |
| /* Section reserved to device HCI callbacks */ |
| |
| void hcid_dbus_setname_complete(bdaddr_t *local) |
| { |
| int id, dd = -1; |
| read_local_name_rp rp; |
| struct hci_request rq; |
| const char *pname = (char *) rp.name; |
| char local_addr[18], name[249]; |
| |
| ba2str(local, local_addr); |
| |
| id = hci_devid(local_addr); |
| if (id < 0) { |
| error("No matching device id for %s", local_addr); |
| return; |
| } |
| |
| dd = hci_open_dev(id); |
| if (dd < 0) { |
| error("HCI device open failed: hci%d", id); |
| memset(&rp, 0, sizeof(rp)); |
| } else { |
| memset(&rq, 0, sizeof(rq)); |
| rq.ogf = OGF_HOST_CTL; |
| rq.ocf = OCF_READ_LOCAL_NAME; |
| rq.rparam = &rp; |
| rq.rlen = READ_LOCAL_NAME_RP_SIZE; |
| rq.event = EVT_CMD_COMPLETE; |
| |
| if (hci_send_req(dd, &rq, HCI_REQ_TIMEOUT) < 0) { |
| error("Sending getting name command failed: %s (%d)", |
| strerror(errno), errno); |
| rp.name[0] = '\0'; |
| } else if (rp.status) { |
| error("Getting name failed with status 0x%02x", |
| rp.status); |
| rp.name[0] = '\0'; |
| } |
| hci_close_dev(dd); |
| } |
| |
| strncpy(name, pname, sizeof(name) - 1); |
| name[248] = '\0'; |
| pname = name; |
| } |
| |
| void hcid_dbus_setscan_enable_complete(bdaddr_t *local) |
| { |
| struct btd_adapter *adapter; |
| read_scan_enable_rp rp; |
| struct hci_request rq; |
| int dd = -1; |
| uint16_t dev_id; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return; |
| } |
| |
| dev_id = adapter_get_dev_id(adapter); |
| |
| dd = hci_open_dev(dev_id); |
| if (dd < 0) { |
| error("HCI device open failed: hci%d", dev_id); |
| return; |
| } |
| |
| memset(&rq, 0, sizeof(rq)); |
| rq.ogf = OGF_HOST_CTL; |
| rq.ocf = OCF_READ_SCAN_ENABLE; |
| rq.rparam = &rp; |
| rq.rlen = READ_SCAN_ENABLE_RP_SIZE; |
| rq.event = EVT_CMD_COMPLETE; |
| |
| if (hci_send_req(dd, &rq, HCI_REQ_TIMEOUT) < 0) { |
| error("Sending read scan enable command failed: %s (%d)", |
| strerror(errno), errno); |
| goto failed; |
| } |
| |
| if (rp.status) { |
| error("Getting scan enable failed with status 0x%02x", |
| rp.status); |
| goto failed; |
| } |
| |
| adapter_remove_discov_timeout(adapter); |
| |
| if (adapter_get_scan_mode(adapter) != rp.enable) |
| adapter_mode_changed(adapter, rp.enable); |
| |
| failed: |
| if (dd >= 0) |
| hci_close_dev(dd); |
| } |
| |
| void hcid_dbus_write_class_complete(bdaddr_t *local) |
| { |
| struct btd_adapter *adapter; |
| int dd; |
| uint8_t cls[3]; |
| uint16_t dev_id; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return; |
| } |
| |
| dev_id = adapter_get_dev_id(adapter); |
| |
| dd = hci_open_dev(dev_id); |
| if (dd < 0) { |
| error("HCI device open failed: hci%d", dev_id); |
| return; |
| } |
| |
| if (hci_read_class_of_dev(dd, cls, HCI_REQ_TIMEOUT) < 0) { |
| error("Can't read class of device on hci%d: %s (%d)", |
| dev_id, strerror(errno), errno); |
| hci_close_dev(dd); |
| return; |
| } |
| |
| write_local_class(local, cls); |
| adapter_set_class(adapter, cls); |
| |
| hci_close_dev(dd); |
| } |
| |
| void hcid_dbus_write_simple_pairing_mode_complete(bdaddr_t *local) |
| { |
| struct btd_adapter *adapter; |
| int dd; |
| uint8_t mode; |
| uint16_t dev_id; |
| const gchar *path; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return; |
| } |
| |
| dev_id = adapter_get_dev_id(adapter); |
| path = adapter_get_path(adapter); |
| |
| dd = hci_open_dev(dev_id); |
| if (dd < 0) { |
| error("HCI adapter open failed: %s", path); |
| return; |
| } |
| |
| if (hci_read_simple_pairing_mode(dd, &mode, |
| HCI_REQ_TIMEOUT) < 0) { |
| error("Can't read class of adapter on %s: %s(%d)", |
| path, strerror(errno), errno); |
| hci_close_dev(dd); |
| return; |
| } |
| |
| adapter_update_ssp_mode(adapter, dd, mode); |
| |
| hci_close_dev(dd); |
| } |
| |
| int hcid_dbus_get_io_cap(bdaddr_t *local, bdaddr_t *remote, |
| uint8_t *cap, uint8_t *auth) |
| { |
| struct btd_adapter *adapter; |
| struct btd_device *device; |
| struct agent *agent = NULL; |
| char addr[18]; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return -1; |
| } |
| |
| if (get_auth_requirements(local, remote, auth) < 0) |
| return -1; |
| |
| ba2str(remote, addr); |
| |
| /* For CreatePairedDevice use dedicated bonding */ |
| device = adapter_find_device(adapter, addr); |
| if (device) { |
| agent = device_get_agent(device); |
| if (agent) |
| *auth = 0x03; |
| } |
| if (!agent) |
| agent = adapter_get_agent(adapter); |
| |
| if (!agent) { |
| /* This is the non bondable mode case */ |
| if (device && device_get_auth(device) > 0x01) { |
| debug("Bonding request, but no agent present"); |
| return -1; |
| } |
| |
| /* No agent available, and no bonding case */ |
| if (*auth < 0x02) { |
| debug("Allowing no bonding without agent"); |
| /* No input, no output */ |
| *cap = 0x03; |
| return 0; |
| } |
| |
| error("No agent available for IO capability"); |
| return -1; |
| } |
| |
| if (device && *auth < 0x02) { |
| /* If remote requests dedicated bonding follow that lead */ |
| if (device_get_auth(device) == 0x02 || |
| device_get_auth(device) == 0x03) |
| *auth = 0x02; |
| } |
| |
| *cap = agent_get_io_capability(agent); |
| |
| return 0; |
| } |
| |
| int hcid_dbus_set_io_cap(bdaddr_t *local, bdaddr_t *remote, |
| uint8_t cap, uint8_t auth) |
| { |
| struct btd_adapter *adapter; |
| struct btd_device *device; |
| char addr[18]; |
| |
| adapter = manager_find_adapter(local); |
| if (!adapter) { |
| error("No matching adapter found"); |
| return -1; |
| } |
| |
| ba2str(remote, addr); |
| |
| device = adapter_get_device(connection, adapter, addr); |
| if (device) { |
| device_set_cap(device, cap); |
| device_set_auth(device, auth); |
| } |
| |
| return 0; |
| } |
| |
| static int inquiry_cancel(int dd, int to) |
| { |
| struct hci_request rq; |
| uint8_t status; |
| |
| memset(&rq, 0, sizeof(rq)); |
| rq.ogf = OGF_LINK_CTL; |
| rq.ocf = OCF_INQUIRY_CANCEL; |
| rq.rparam = &status; |
| rq.rlen = sizeof(status); |
| rq.event = EVT_CMD_COMPLETE; |
| |
| if (hci_send_req(dd, &rq, to) < 0) |
| return -1; |
| |
| if (status) { |
| errno = bt_error(status); |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| static int remote_name_cancel(int dd, bdaddr_t *dba, int to) |
| { |
| remote_name_req_cancel_cp cp; |
| struct hci_request rq; |
| uint8_t status; |
| |
| memset(&rq, 0, sizeof(rq)); |
| memset(&cp, 0, sizeof(cp)); |
| |
| bacpy(&cp.bdaddr, dba); |
| |
| rq.ogf = OGF_LINK_CTL; |
| rq.ocf = OCF_REMOTE_NAME_REQ_CANCEL; |
| rq.cparam = &cp; |
| rq.clen = REMOTE_NAME_REQ_CANCEL_CP_SIZE; |
| rq.rparam = &status; |
| rq.rlen = sizeof(status); |
| rq.event = EVT_CMD_COMPLETE; |
| |
| if (hci_send_req(dd, &rq, to) < 0) |
| return -1; |
| |
| if (status) { |
| errno = bt_error(status); |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| int cancel_discovery(struct btd_adapter *adapter) |
| { |
| struct remote_dev_info *dev, match; |
| int dd, err = 0; |
| uint16_t dev_id = adapter_get_dev_id(adapter); |
| |
| dd = hci_open_dev(dev_id); |
| if (dd < 0) |
| return -ENODEV; |
| |
| /* |
| * If there is a pending read remote name request means |
| * that the inquiry complete event was already received |
| */ |
| memset(&match, 0, sizeof(struct remote_dev_info)); |
| bacpy(&match.bdaddr, BDADDR_ANY); |
| match.name_status = NAME_REQUESTED; |
| |
| dev = adapter_search_found_devices(adapter, &match); |
| if (dev) { |
| if (remote_name_cancel(dd, &dev->bdaddr, HCI_REQ_TIMEOUT) < 0) { |
| error("Read remote name cancel failed: %s, (%d)", |
| strerror(errno), errno); |
| err = -errno; |
| } |
| } else { |
| if (inquiry_cancel(dd, HCI_REQ_TIMEOUT) < 0) { |
| error("Inquiry cancel failed:%s (%d)", |
| strerror(errno), errno); |
| err = -errno; |
| } |
| } |
| |
| hci_close_dev(dd); |
| |
| return err; |
| } |
| |
| static int periodic_inquiry_exit(int dd, int to) |
| { |
| struct hci_request rq; |
| uint8_t status; |
| |
| memset(&rq, 0, sizeof(rq)); |
| rq.ogf = OGF_LINK_CTL; |
| rq.ocf = OCF_EXIT_PERIODIC_INQUIRY; |
| rq.rparam = &status; |
| rq.rlen = sizeof(status); |
| rq.event = EVT_CMD_COMPLETE; |
| |
| if (hci_send_req(dd, &rq, to) < 0) |
| return -1; |
| |
| if (status) { |
| errno = status; |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| int cancel_periodic_discovery(struct btd_adapter *adapter) |
| { |
| struct remote_dev_info *dev, match; |
| int dd, err = 0; |
| uint16_t dev_id = adapter_get_dev_id(adapter); |
| |
| dd = hci_open_dev(dev_id); |
| if (dd < 0) |
| return -ENODEV; |
| |
| /* find the pending remote name request */ |
| memset(&match, 0, sizeof(struct remote_dev_info)); |
| bacpy(&match.bdaddr, BDADDR_ANY); |
| match.name_status = NAME_REQUESTED; |
| |
| dev = adapter_search_found_devices(adapter, &match); |
| if (dev) { |
| if (remote_name_cancel(dd, &dev->bdaddr, HCI_REQ_TIMEOUT) < 0) { |
| error("Read remote name cancel failed: %s, (%d)", |
| strerror(errno), errno); |
| err = -errno; |
| } |
| } |
| |
| /* ovewrite err if necessary: stop periodic inquiry has higher |
| * priority */ |
| if (periodic_inquiry_exit(dd, HCI_REQ_TIMEOUT) < 0) { |
| error("Periodic Inquiry exit failed:%s (%d)", |
| strerror(errno), errno); |
| err = -errno; |
| } |
| |
| hci_close_dev(dd); |
| |
| return err; |
| } |
| |
| /* Most of the functions in this module require easy access to a connection so |
| * we keep it global here and provide these access functions the other (few) |
| * modules that require access to it */ |
| |
| void set_dbus_connection(DBusConnection *conn) |
| { |
| connection = conn; |
| } |
| |
| DBusConnection *get_dbus_connection(void) |
| { |
| return connection; |
| } |