/* * * BlueZ - Bluetooth protocol stack for Linux * * Copyright (C) 2004-2008 Marcel Holtmann * * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA * */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #include #include #include #include #include #include #include #include "logging.h" #include "dbus.h" #include "device.h" #include "server.h" #include "storage.h" static DBusConnection *connection = NULL; static void cancel_authorization(const char *addr) { DBusMessage *msg; const char *uuid = ""; msg = dbus_message_new_method_call("org.bluez", "/org/bluez", "org.bluez.Database", "CancelAuthorizationRequest"); if (!msg) { error("Unable to allocate new method call"); return; } dbus_message_append_args(msg, DBUS_TYPE_STRING, &addr, DBUS_TYPE_STRING, &uuid, DBUS_TYPE_INVALID); send_message_and_unref(connection, msg); } struct authorization_data { bdaddr_t src; bdaddr_t dst; }; static void authorization_callback(DBusPendingCall *pcall, void *data) { struct authorization_data *auth = data; DBusMessage *reply = dbus_pending_call_steal_reply(pcall); DBusError derr; dbus_error_init(&derr); if (dbus_set_error_from_message(&derr, reply) != TRUE) { dbus_message_unref(reply); input_device_connadd(&auth->src, &auth->dst); return; } error("Authorization denied: %s", derr.message); if (dbus_error_has_name(&derr, DBUS_ERROR_NO_REPLY)) { char addr[18]; memset(addr, 0, sizeof(addr)); ba2str(&auth->dst, addr); cancel_authorization(addr); } input_device_close_channels(&auth->src, &auth->dst); dbus_error_free(&derr); dbus_message_unref(reply); } static int authorize_device(bdaddr_t *src, bdaddr_t *dst) { struct authorization_data *auth; DBusMessage *msg; DBusPendingCall *pending; char addr[18]; const char *paddr = addr; const char *uuid = ""; /* FIXME: */ msg = dbus_message_new_method_call("org.bluez", "/org/bluez", "org.bluez.Database", "RequestAuthorization"); if (!msg) { error("Unable to allocat new RequestAuthorization method call"); return -ENOMEM; } memset(addr, 0, sizeof(addr)); ba2str(dst, addr); dbus_message_append_args(msg, DBUS_TYPE_STRING, &paddr, DBUS_TYPE_STRING, &uuid, DBUS_TYPE_INVALID); if (dbus_connection_send_with_reply(connection, msg, &pending, -1) == FALSE) return -EACCES; auth = g_new0(struct authorization_data, 1); bacpy(&auth->src, src); bacpy(&auth->dst, dst); dbus_pending_call_set_notify(pending, authorization_callback, auth, g_free); dbus_pending_call_unref(pending); dbus_message_unref(msg); return 0; } static gboolean connect_event(GIOChannel *chan, GIOCondition cond, gpointer data) { struct sockaddr_l2 addr; socklen_t addrlen; bdaddr_t src, dst; unsigned char psm; int sk, nsk; sk = g_io_channel_unix_get_fd(chan); memset(&addr, 0, sizeof(addr)); addrlen = sizeof(addr); nsk = accept(sk, (struct sockaddr *) &addr, &addrlen); if (nsk < 0) return TRUE; bacpy(&dst, &addr.l2_bdaddr); psm = btohs(addr.l2_psm); memset(&addr, 0, sizeof(addr)); addrlen = sizeof(addr); if (getsockname(nsk, (struct sockaddr *) &addr, &addrlen) < 0) { close(nsk); return TRUE; } bacpy(&src, &addr.l2_bdaddr); debug("Incoming connection on PSM %d", psm); if (input_device_set_channel(&src, &dst, psm, nsk) < 0) { /* Send unplug virtual cable to unknown devices */ if (psm == L2CAP_PSM_HIDP_CTRL) { unsigned char unplug[] = { 0x15 }; int err; err = write(nsk, unplug, sizeof(unplug)); } close(nsk); return TRUE; } if ((psm == L2CAP_PSM_HIDP_INTR) && (authorize_device(&src, &dst) < 0)) input_device_close_channels(&src, &dst); return TRUE; } static GIOChannel *setup_l2cap(unsigned int psm) { GIOChannel *io; struct sockaddr_l2 addr; int sk; sk = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP); if (sk < 0) return NULL; memset(&addr, 0, sizeof(addr)); addr.l2_family = AF_BLUETOOTH; bacpy(&addr.l2_bdaddr, BDADDR_ANY); addr.l2_psm = htobs(psm); if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { close(sk); return NULL; } if (listen(sk, 10) < 0) { close(sk); return NULL; } io = g_io_channel_unix_new(sk); g_io_channel_set_close_on_unref(io, TRUE); g_io_add_watch(io, G_IO_IN, connect_event, NULL); return io; } static GIOChannel *ctrl_io = NULL; static GIOChannel *intr_io = NULL; int server_start(DBusConnection *conn) { ctrl_io = setup_l2cap(L2CAP_PSM_HIDP_CTRL); if (!ctrl_io) { error("Failed to listen on control channel"); return -1; } g_io_channel_set_close_on_unref(ctrl_io, TRUE); intr_io = setup_l2cap(L2CAP_PSM_HIDP_INTR); if (!intr_io) { error("Failed to listen on interrupt channel"); g_io_channel_unref(ctrl_io); ctrl_io = NULL; } g_io_channel_set_close_on_unref(intr_io, TRUE); connection = conn; return 0; } void server_stop(void) { if (intr_io) g_io_channel_unref(intr_io); if (ctrl_io) g_io_channel_unref(ctrl_io); }