summaryrefslogtreecommitdiffstats
path: root/network/server.c
diff options
context:
space:
mode:
authorMarcel Holtmann <marcel@holtmann.org>2008-07-26 19:00:53 +0200
committerMarcel Holtmann <marcel@holtmann.org>2008-07-26 19:00:53 +0200
commitd6ae1c3f777832f8e32702f81fe64e33a1396928 (patch)
tree159a1e59f3929c9d795dbd1f3edd84d9dccba048 /network/server.c
parentb8e5fea8d31fbcd3d1c044385f8217dbf39892bb (diff)
parent3382af9114a9b2e657c7ddd0a5511edda6a37a90 (diff)
Import bluez-utils-3.36 revision history
Diffstat (limited to 'network/server.c')
-rw-r--r--network/server.c1097
1 files changed, 1097 insertions, 0 deletions
diff --git a/network/server.c b/network/server.c
new file mode 100644
index 00000000..e94964ae
--- /dev/null
+++ b/network/server.c
@@ -0,0 +1,1097 @@
+/*
+ *
+ * BlueZ - Bluetooth protocol stack for Linux
+ *
+ * Copyright (C) 2004-2008 Marcel Holtmann <marcel@holtmann.org>
+ *
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
+ *
+ */
+
+#ifdef HAVE_CONFIG_H
+#include <config.h>
+#endif
+
+#include <stdio.h>
+#include <unistd.h>
+#include <stdlib.h>
+#include <errno.h>
+#include <sys/stat.h>
+#include <sys/param.h>
+#include <net/if.h>
+
+#include <bluetooth/bluetooth.h>
+#include <bluetooth/hci.h>
+#include <bluetooth/hci_lib.h>
+#include <bluetooth/bnep.h>
+#include <bluetooth/l2cap.h>
+#include <bluetooth/sdp.h>
+#include <bluetooth/sdp_lib.h>
+
+#include <netinet/in.h>
+
+#include <glib.h>
+#include <gdbus.h>
+
+#include "../hcid/dbus-common.h"
+
+#include "logging.h"
+#include "error.h"
+#include "textfile.h"
+#include "dbus-service.h"
+#include "sdpd.h"
+#include "glib-helper.h"
+
+#define NETWORK_SERVER_INTERFACE "org.bluez.network.Server"
+#define SETUP_TIMEOUT 1000
+#define MAX_SETUP_ATTEMPTS 3
+
+#include "bridge.h"
+#include "common.h"
+#include "manager.h"
+
+/* Pending Authorization */
+struct setup_session {
+ char *address; /* Remote Bluetooth Address */
+ uint16_t dst_role; /* Destination role */
+ uint16_t src_role; /* Source role */
+ int nsk; /* L2CAP socket */
+ guint watch; /* BNEP socket watch */
+};
+
+struct timeout {
+ guint id; /* Timeout id */
+ guint watch; /* BNEP socket watch */
+};
+
+/* Main server structure */
+struct network_server {
+ bdaddr_t src; /* Bluetooth Local Address */
+ char *iface; /* Routing interface */
+ char *name; /* Server service name */
+ char *range; /* IP Address range */
+ char *path; /* D-Bus path */
+ gboolean enable; /* Enable flag */
+ uint32_t record_id; /* Service record id */
+ uint16_t id; /* Service class identifier */
+ GSList *clients; /* Active connections */
+};
+
+static GIOChannel *bnep_io = NULL;
+static DBusConnection *connection = NULL;
+static struct setup_session *setup = NULL;
+static GSList *servers = NULL;
+static const char *prefix = NULL;
+static gboolean security = TRUE;
+
+gint find_server(gconstpointer a, gconstpointer b)
+{
+ const struct network_server *ns = a;
+ const char *path = b;
+
+ return strcmp(ns->path, path);
+}
+
+static struct setup_session *setup_session_new(gchar *address,
+ uint16_t dst_role, uint16_t src_role, int nsk, guint watch)
+{
+ struct setup_session *setup;
+
+ setup = g_new0(struct setup_session, 1);
+ setup->address = g_strdup(address);
+ setup->dst_role = dst_role;
+ setup->src_role = src_role;
+ setup->nsk = nsk;
+ setup->watch = watch;
+
+ return setup;
+}
+
+static void setup_session_free(struct setup_session *setup)
+{
+ g_source_remove(setup->watch);
+ g_free(setup->address);
+ g_free(setup);
+}
+
+static struct network_server *server_find(bdaddr_t *src, uint16_t role)
+{
+ struct network_server *ns;
+ GSList *l;
+
+ for (l = servers; l; l = l->next) {
+ ns = l->data;
+ if (bacmp(&ns->src, src) != 0)
+ continue;
+ if (ns->id == role)
+ return ns;
+ }
+
+ return NULL;
+}
+
+static int store_property(bdaddr_t *src, uint16_t id,
+ const char *key, const char *value)
+{
+ char filename[PATH_MAX + 1];
+ char addr[18];
+
+ ba2str(src, addr);
+ if (id == BNEP_SVC_NAP)
+ create_name(filename, PATH_MAX, STORAGEDIR, addr, "nap");
+ else if (id == BNEP_SVC_GN)
+ create_name(filename, PATH_MAX, STORAGEDIR, addr, "gn");
+ else if (id == BNEP_SVC_PANU)
+ create_name(filename, PATH_MAX, STORAGEDIR, addr, "panu");
+
+ return textfile_put(filename, key, value);
+}
+
+static void add_lang_attr(sdp_record_t *r)
+{
+ sdp_lang_attr_t base_lang;
+ sdp_list_t *langs = 0;
+
+ /* UTF-8 MIBenum (http://www.iana.org/assignments/character-sets) */
+ base_lang.code_ISO639 = (0x65 << 8) | 0x6e;
+ base_lang.encoding = 106;
+ base_lang.base_offset = SDP_PRIMARY_LANG_BASE;
+ langs = sdp_list_append(0, &base_lang);
+ sdp_set_lang_attr(r, langs);
+ sdp_list_free(langs, 0);
+}
+
+static sdp_record_t *server_record_new(const char *name, uint16_t id)
+{
+ sdp_list_t *svclass, *pfseq, *apseq, *root, *aproto;
+ uuid_t root_uuid, pan, l2cap, bnep;
+ sdp_profile_desc_t profile[1];
+ sdp_list_t *proto[2];
+ sdp_data_t *v, *p;
+ uint16_t psm = BNEP_PSM, version = 0x0100;
+ uint16_t security_desc = (security ? 0x0001 : 0x0000);
+ uint16_t net_access_type = 0xfffe;
+ uint32_t max_net_access_rate = 0;
+ const char *desc = "BlueZ PAN service";
+ sdp_record_t *record;
+
+ record = sdp_record_alloc();
+ if (!record)
+ return NULL;
+
+ record->attrlist = NULL;
+ record->pattern = NULL;
+
+ switch (id) {
+ case BNEP_SVC_NAP:
+ sdp_uuid16_create(&pan, NAP_SVCLASS_ID);
+ svclass = sdp_list_append(NULL, &pan);
+ sdp_set_service_classes(record, svclass);
+
+ sdp_uuid16_create(&profile[0].uuid, NAP_PROFILE_ID);
+ profile[0].version = 0x0100;
+ pfseq = sdp_list_append(NULL, &profile[0]);
+ sdp_set_profile_descs(record, pfseq);
+
+ sdp_set_info_attr(record, name, NULL, desc);
+
+ sdp_attr_add_new(record, SDP_ATTR_NET_ACCESS_TYPE,
+ SDP_UINT16, &net_access_type);
+ sdp_attr_add_new(record, SDP_ATTR_MAX_NET_ACCESSRATE,
+ SDP_UINT32, &max_net_access_rate);
+ break;
+ case BNEP_SVC_GN:
+ sdp_uuid16_create(&pan, GN_SVCLASS_ID);
+ svclass = sdp_list_append(NULL, &pan);
+ sdp_set_service_classes(record, svclass);
+
+ sdp_uuid16_create(&profile[0].uuid, GN_PROFILE_ID);
+ profile[0].version = 0x0100;
+ pfseq = sdp_list_append(NULL, &profile[0]);
+ sdp_set_profile_descs(record, pfseq);
+
+ sdp_set_info_attr(record, name, NULL, desc);
+ break;
+ case BNEP_SVC_PANU:
+ sdp_uuid16_create(&pan, PANU_SVCLASS_ID);
+ svclass = sdp_list_append(NULL, &pan);
+ sdp_set_service_classes(record, svclass);
+
+ sdp_uuid16_create(&profile[0].uuid, PANU_PROFILE_ID);
+ profile[0].version = 0x0100;
+ pfseq = sdp_list_append(NULL, &profile[0]);
+ sdp_set_profile_descs(record, pfseq);
+
+ sdp_set_info_attr(record, name, NULL, desc);
+ break;
+ default:
+ return NULL;
+ }
+
+ sdp_uuid16_create(&root_uuid, PUBLIC_BROWSE_GROUP);
+ root = sdp_list_append(NULL, &root_uuid);
+ sdp_set_browse_groups(record, root);
+
+ sdp_uuid16_create(&l2cap, L2CAP_UUID);
+ proto[0] = sdp_list_append(NULL, &l2cap);
+ p = sdp_data_alloc(SDP_UINT16, &psm);
+ proto[0] = sdp_list_append(proto[0], p);
+ apseq = sdp_list_append(NULL, proto[0]);
+
+ sdp_uuid16_create(&bnep, BNEP_UUID);
+ proto[1] = sdp_list_append(NULL, &bnep);
+ v = sdp_data_alloc(SDP_UINT16, &version);
+ proto[1] = sdp_list_append(proto[1], v);
+
+ /* Supported protocols */
+ {
+ uint16_t ptype[] = {
+ 0x0800, /* IPv4 */
+ 0x0806, /* ARP */
+ };
+ sdp_data_t *head, *pseq;
+ int p;
+
+ for (p = 0, head = NULL; p < 2; p++) {
+ sdp_data_t *data = sdp_data_alloc(SDP_UINT16, &ptype[p]);
+ if (head)
+ sdp_seq_append(head, data);
+ else
+ head = data;
+ }
+ pseq = sdp_data_alloc(SDP_SEQ16, head);
+ proto[1] = sdp_list_append(proto[1], pseq);
+ }
+
+ apseq = sdp_list_append(apseq, proto[1]);
+
+ aproto = sdp_list_append(NULL, apseq);
+ sdp_set_access_protos(record, aproto);
+
+ add_lang_attr(record);
+
+ sdp_attr_add_new(record, SDP_ATTR_SECURITY_DESC,
+ SDP_UINT16, &security_desc);
+
+ sdp_data_free(p);
+ sdp_data_free(v);
+ sdp_list_free(apseq, NULL);
+ sdp_list_free(root, NULL);
+ sdp_list_free(aproto, NULL);
+ sdp_list_free(proto[0], NULL);
+ sdp_list_free(proto[1], NULL);
+ sdp_list_free(svclass, NULL);
+ sdp_list_free(pfseq, NULL);
+
+ return record;
+}
+
+static ssize_t send_bnep_ctrl_rsp(int sk, uint16_t val)
+{
+ struct bnep_control_rsp rsp;
+
+ rsp.type = BNEP_CONTROL;
+ rsp.ctrl = BNEP_SETUP_CONN_RSP;
+ rsp.resp = htons(val);
+
+ return send(sk, &rsp, sizeof(rsp), 0);
+}
+
+static int server_connadd(struct network_server *ns, int nsk,
+ const gchar *address, uint16_t dst_role)
+{
+ char devname[16];
+ const char *bridge;
+ int err;
+
+ /* Server can be disabled in the meantime */
+ if (ns->enable == FALSE)
+ return -EPERM;
+
+ memset(devname, 0, 16);
+ strncpy(devname, prefix, strlen(prefix));
+
+ err = bnep_connadd(nsk, dst_role, devname);
+ if (err < 0)
+ return err;
+
+ info("Added new connection: %s", devname);
+
+ bridge = bridge_get_name(ns->id);
+ if (bridge) {
+ if (bridge_add_interface(ns->id, devname) < 0) {
+ error("Can't add %s to the bridge %s: %s(%d)",
+ devname, bridge, strerror(errno),
+ errno);
+ return -EPERM;
+ }
+
+ bnep_if_up(devname, 0);
+ } else
+ bnep_if_up(devname, ns->id);
+
+ ns->clients = g_slist_append(ns->clients, g_strdup(address));
+
+ return 0;
+}
+
+static void req_auth_cb(DBusError *derr, void *user_data)
+{
+ struct network_server *ns = user_data;
+ uint16_t val;
+
+ if (!setup) {
+ info("Authorization cancelled: Client exited");
+ return;
+ }
+
+ if (derr) {
+ error("Access denied: %s", derr->message);
+ if (dbus_error_has_name(derr, DBUS_ERROR_NO_REPLY)) {
+ bdaddr_t dst;
+ str2ba(setup->address, &dst);
+ service_cancel_auth(&ns->src, &dst);
+ }
+ val = BNEP_CONN_NOT_ALLOWED;
+ goto done;
+ }
+
+ if (server_connadd(ns, setup->nsk,
+ setup->address, setup->dst_role) < 0)
+ val = BNEP_CONN_NOT_ALLOWED;
+ else
+ val = BNEP_SUCCESS;
+
+done:
+ send_bnep_ctrl_rsp(setup->nsk, val);
+ setup_session_free(setup);
+ setup = NULL;
+}
+
+static int authorize_connection(struct network_server *ns, const char *address)
+{
+ const char *uuid;
+ bdaddr_t dst;
+ int ret_val;
+
+ uuid = bnep_uuid(ns->id);
+ str2ba(address, &dst);
+
+ ret_val = service_req_auth(&ns->src, &dst, uuid, req_auth_cb, ns);
+
+ return ret_val;
+}
+
+static uint16_t inline bnep_setup_chk(uint16_t dst_role, uint16_t src_role)
+{
+ /* Allowed PAN Profile scenarios */
+ switch (dst_role) {
+ case BNEP_SVC_NAP:
+ case BNEP_SVC_GN:
+ if (src_role == BNEP_SVC_PANU)
+ return 0;
+ return BNEP_CONN_INVALID_SRC;
+ case BNEP_SVC_PANU:
+ if (src_role == BNEP_SVC_PANU ||
+ src_role == BNEP_SVC_GN ||
+ src_role == BNEP_SVC_NAP)
+ return 0;
+
+ return BNEP_CONN_INVALID_SRC;
+ }
+
+ return BNEP_CONN_INVALID_DST;
+}
+
+static uint16_t bnep_setup_decode(struct bnep_setup_conn_req *req,
+ uint16_t *dst_role, uint16_t *src_role)
+{
+ uint8_t *dest, *source;
+
+ dest = req->service;
+ source = req->service + req->uuid_size;
+
+ switch (req->uuid_size) {
+ case 2: /* UUID16 */
+ *dst_role = ntohs(bt_get_unaligned((uint16_t *) dest));
+ *src_role = ntohs(bt_get_unaligned((uint16_t *) source));
+ break;
+ case 4: /* UUID32 */
+ case 16: /* UUID128 */
+ *dst_role = ntohl(bt_get_unaligned((uint32_t *) dest));
+ *src_role = ntohl(bt_get_unaligned((uint32_t *) source));
+ break;
+ default:
+ return BNEP_CONN_INVALID_SVC;
+ }
+
+ return 0;
+}
+
+static gboolean bnep_setup(GIOChannel *chan,
+ GIOCondition cond, gpointer user_data)
+{
+ struct timeout *to = user_data;
+ struct network_server *ns;
+ uint8_t packet[BNEP_MTU];
+ struct bnep_setup_conn_req *req = (void *) packet;
+ struct sockaddr_l2 sa;
+ socklen_t size;
+ char address[18];
+ uint16_t rsp, src_role, dst_role;
+ int n, sk;
+
+ if (cond & G_IO_NVAL)
+ return FALSE;
+
+ if (cond & (G_IO_ERR | G_IO_HUP)) {
+ error("Hangup or error on BNEP socket");
+ return FALSE;
+ }
+
+ sk = g_io_channel_unix_get_fd(chan);
+
+ /* Reading BNEP_SETUP_CONNECTION_REQUEST_MSG */
+ n = read(sk, packet, sizeof(packet));
+ if (n < 0) {
+ error("read(): %s(%d)", strerror(errno), errno);
+ return FALSE;
+ }
+
+ if (req->type != BNEP_CONTROL || req->ctrl != BNEP_SETUP_CONN_REQ)
+ return FALSE;
+
+ rsp = bnep_setup_decode(req, &dst_role, &src_role);
+ if (rsp)
+ goto reply;
+
+ rsp = bnep_setup_chk(dst_role, src_role);
+ if (rsp)
+ goto reply;
+
+ size = sizeof(sa);
+ if (getsockname(sk, (struct sockaddr *) &sa, &size) < 0) {
+ rsp = BNEP_CONN_NOT_ALLOWED;
+ goto reply;
+ }
+
+ ba2str(&sa.l2_bdaddr, address);
+ ns = server_find(&sa.l2_bdaddr, dst_role);
+ if (!ns || ns->enable == FALSE) {
+ error("Server unavailable: %s (0x%x)", address, dst_role);
+ rsp = BNEP_CONN_NOT_ALLOWED;
+ goto reply;
+ }
+
+ if (getpeername(sk, (struct sockaddr *) &sa, &size) < 0) {
+ rsp = BNEP_CONN_NOT_ALLOWED;
+ goto reply;
+ }
+
+ ba2str(&sa.l2_bdaddr, address);
+
+ if (setup) {
+ error("Connection rejected: Pending authorization");
+ rsp = BNEP_CONN_NOT_ALLOWED;
+ goto reply;
+ }
+
+ setup = setup_session_new(address, dst_role, src_role, sk, to->watch);
+
+ /* Wait authorization before reply success */
+ if (authorize_connection(ns, address) < 0) {
+ setup_session_free(setup);
+ setup = NULL;
+ rsp = BNEP_CONN_NOT_ALLOWED;
+ goto reply;
+ }
+
+ g_source_remove(to->id);
+ to->id = 0;
+
+ return TRUE;
+
+reply:
+ send_bnep_ctrl_rsp(sk, rsp);
+
+ return FALSE;
+}
+
+static void setup_destroy(void *user_data)
+{
+ struct timeout *to = user_data;
+
+ if (to->id)
+ g_source_remove(to->id);
+
+ g_free(to);
+}
+
+static gboolean timeout_cb(void *user_data)
+{
+ struct timeout *to = user_data;
+
+ to->id = 0;
+ g_source_remove(to->watch);
+
+ return FALSE;
+}
+
+static void connect_event(GIOChannel *chan, int err, const bdaddr_t *src,
+ const bdaddr_t *dst, gpointer user_data)
+{
+ struct timeout *to;
+
+ if (err < 0) {
+ error("accept(): %s(%d)", strerror(errno), errno);
+ return;
+ }
+
+ g_io_channel_set_close_on_unref(chan, TRUE);
+
+ /*
+ * BNEP_SETUP_CONNECTION_REQUEST_MSG shall be received and
+ * user shall authorize the incomming connection before
+ * the time expires.
+ */
+ to = g_malloc0(sizeof(struct timeout));
+ to->id = g_timeout_add(SETUP_TIMEOUT, timeout_cb, to);
+ to->watch = g_io_add_watch_full(chan, G_PRIORITY_DEFAULT,
+ G_IO_IN | G_IO_HUP | G_IO_ERR | G_IO_NVAL,
+ bnep_setup, to, setup_destroy);
+ g_io_channel_unref(chan);
+
+ return;
+}
+
+int server_init(DBusConnection *conn, const char *iface_prefix,
+ gboolean secure)
+{
+ int lm;
+
+ lm = secure ? L2CAP_LM_SECURE : 0;
+
+ security = secure;
+ connection = dbus_connection_ref(conn);
+ prefix = iface_prefix;
+
+ bnep_io = bt_l2cap_listen(BDADDR_ANY, BNEP_PSM, BNEP_MTU, lm,
+ connect_event, NULL);
+ if (!bnep_io)
+ return -1;
+ g_io_channel_set_close_on_unref(bnep_io, FALSE);
+
+ if (bridge_create(BNEP_SVC_GN) < 0)
+ error("Can't create GN bridge");
+
+ return 0;
+}
+
+void server_exit()
+{
+ if (bnep_io != NULL) {
+ g_io_channel_close(bnep_io);
+ g_io_channel_unref(bnep_io);
+ bnep_io = NULL;
+ }
+
+ if (bridge_remove(BNEP_SVC_GN) < 0)
+ error("Can't remove GN bridge");
+
+ dbus_connection_unref(connection);
+ connection = NULL;
+}
+
+static uint32_t register_server_record(struct network_server *ns)
+{
+ sdp_record_t *record;
+
+ record = server_record_new(ns->name, ns->id);
+ if (!record) {
+ error("Unable to allocate new service record");
+ return 0;
+ }
+
+ if (add_record_to_server(&ns->src, record) < 0) {
+ error("Failed to register service record");
+ sdp_record_free(record);
+ return 0;
+ }
+
+ debug("register_server_record: got record id 0x%x", record->handle);
+
+ return record->handle;
+}
+
+static DBusMessage *get_uuid(DBusConnection *conn,
+ DBusMessage *msg, void *data)
+{
+ struct network_server *ns = data;
+ DBusMessage *reply;
+ const char *uuid;
+
+ reply = dbus_message_new_method_return(msg);
+ if (!reply)
+ return NULL;
+
+ uuid = bnep_uuid(ns->id);
+ dbus_message_append_args(reply,
+ DBUS_TYPE_STRING, &uuid,
+ DBUS_TYPE_INVALID);
+
+ return reply;
+}
+
+static inline DBusMessage *failed(DBusMessage *msg, const char *description)
+{
+ return g_dbus_create_error(msg, ERROR_INTERFACE ".Failed",
+ description);
+}
+
+static inline DBusMessage *invalid_arguments(DBusMessage *msg,
+ const char *description)
+{
+ return g_dbus_create_error(msg, ERROR_INTERFACE ".InvalidArguments",
+ description);
+}
+
+static DBusMessage *enable(DBusConnection *conn,
+ DBusMessage *msg, void *data)
+{
+ struct network_server *ns = data;
+ DBusMessage *reply;
+
+ if (ns->enable)
+ return g_dbus_create_error(msg, ERROR_INTERFACE
+ ".AlreadyExist",
+ "Server already enabled");
+
+ if (bacmp(&ns->src, BDADDR_ANY) == 0) {
+ int dev_id;
+
+ dev_id = hci_get_route(&ns->src);
+ if ((dev_id < 0) || (hci_devba(dev_id, &ns->src) < 0))
+ return failed(msg, "Adapter not available");
+
+ /* Store the server info */
+ server_store(ns->path);
+ }
+
+ reply = dbus_message_new_method_return(msg);
+ if (!reply)
+ return NULL;
+
+ /* Add the service record */
+ ns->record_id = register_server_record(ns);
+ if (!ns->record_id) {
+ dbus_message_unref(reply);
+ return failed(msg, "Service record registration failed");
+ }
+
+ ns->enable = TRUE;
+
+ store_property(&ns->src, ns->id, "enabled", "1");
+
+ g_dbus_emit_signal(conn, ns->path, NETWORK_SERVER_INTERFACE,
+ "Enabled", DBUS_TYPE_INVALID);
+
+ return reply;
+}
+
+static void kill_connection(void *data, void *udata)
+{
+ const char *address = data;
+ bdaddr_t dst;
+
+ str2ba(address, &dst);
+ bnep_kill_connection(&dst);
+}
+
+static DBusMessage *disable(DBusConnection *conn,
+ DBusMessage *msg, void *data)
+{
+ struct network_server *ns = data;
+ DBusMessage *reply;
+
+ reply = dbus_message_new_method_return(msg);
+ if (!reply)
+ return NULL;
+
+ if (!ns->enable)
+ return failed(msg, "Not enabled");
+
+ /* Remove the service record */
+ if (ns->record_id) {
+ remove_record_from_server(ns->record_id);
+ ns->record_id = 0;
+ }
+
+ ns->enable = FALSE;
+
+ g_slist_foreach(ns->clients, (GFunc) kill_connection, NULL);
+
+ store_property(&ns->src, ns->id, "enabled", "0");
+
+ g_dbus_emit_signal(conn, ns->path, NETWORK_SERVER_INTERFACE,
+ "Disabled", DBUS_TYPE_INVALID);
+
+ return reply;
+}
+
+static DBusMessage *is_enabled(DBusConnection *conn, DBusMessage *msg,
+ void *data)
+{
+ struct network_server *ns = data;
+ DBusMessage *reply;
+
+ reply = dbus_message_new_method_return(msg);
+ if (!reply)
+ return NULL;
+
+ dbus_message_append_args(reply, DBUS_TYPE_BOOLEAN, &ns->enable,
+ DBUS_TYPE_INVALID);
+
+ return reply;
+}
+
+static DBusMessage *set_name(DBusConnection *conn,
+ DBusMessage *msg, void *data)
+{
+ struct network_server *ns = data;
+ DBusMessage *reply;
+ const char *name;
+
+ reply = dbus_message_new_method_return(msg);
+ if (!reply)
+ return NULL;
+
+ if (!dbus_message_get_args(msg, NULL,
+ DBUS_TYPE_STRING, &name,
+ DBUS_TYPE_INVALID))
+ return NULL;
+
+ if (!name || (strlen(name) == 0))
+ return invalid_arguments(msg, "Invalid name");
+
+ if (ns->name)
+ g_free(ns->name);
+ ns->name = g_strdup(name);
+
+ if (ns->enable && ns->record_id) {
+ uint32_t handle = register_server_record(ns);
+ if (!handle) {
+ dbus_message_unref(reply);
+ return failed(msg,
+ "Service record attribute update failed");
+ }
+
+ remove_record_from_server(ns->record_id);
+ ns->record_id = handle;
+ }
+
+ store_property(&ns->src, ns->id, "name", ns->name);
+
+ return reply;
+}
+
+static DBusMessage *get_name(DBusConnection *conn,
+ DBusMessage *msg, void *data)
+{
+ struct network_server *ns = data;
+ char name[] = "";
+ const char *pname = (ns->name ? ns->name : name);
+ DBusMessage *reply;
+
+ reply = dbus_message_new_method_return(msg);
+ if (!reply)
+ return NULL;
+
+ dbus_message_append_args(reply,
+ DBUS_TYPE_STRING, &pname,
+ DBUS_TYPE_INVALID);
+
+ return reply;
+}
+
+static DBusMessage *set_address_range(DBusConnection *conn,
+ DBusMessage *msg, void *data)
+{
+ return NULL;
+}
+
+static DBusMessage *set_routing(DBusConnection *conn, DBusMessage *msg,
+ void *data)
+{
+ struct network_server *ns = data;
+ const char *iface;
+
+ if (!dbus_message_get_args(msg, NULL,
+ DBUS_TYPE_STRING, &iface,
+ DBUS_TYPE_INVALID))
+ return NULL;
+
+ /* FIXME: Check if the interface is valid/UP */
+ if (!iface || (strlen(iface) == 0))
+ return invalid_arguments(msg, "Invalid interface");
+
+ if (ns->iface)
+ g_free(ns->iface);
+ ns->iface = g_strdup(iface);
+
+ return dbus_message_new_method_return(msg);
+}
+
+static DBusMessage *get_info(DBusConnection *conn,
+ DBusMessage *msg, void *data)
+{
+ struct network_server *ns = data;
+ DBusMessage *reply;
+ DBusMessageIter iter;
+ DBusMessageIter dict;
+ const char *uuid;
+
+ reply = dbus_message_new_method_return(msg);
+ if (!reply)
+ return NULL;
+
+ dbus_message_iter_init_append(reply, &iter);
+
+ dbus_message_iter_open_container(&iter, DBUS_TYPE_ARRAY,
+ DBUS_DICT_ENTRY_BEGIN_CHAR_AS_STRING
+ DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_VARIANT_AS_STRING
+ DBUS_DICT_ENTRY_END_CHAR_AS_STRING, &dict);
+
+ dbus_message_iter_append_dict_entry(&dict, "name",
+ DBUS_TYPE_STRING, &ns->name);
+
+ uuid = bnep_uuid(ns->id);
+ dbus_message_iter_append_dict_entry(&dict, "uuid",
+ DBUS_TYPE_STRING, &uuid);
+
+ dbus_message_iter_close_container(&iter, &dict);
+
+ return reply;
+}
+
+static void server_free(struct network_server *ns)
+{
+ if (!ns)
+ return;
+
+ /* FIXME: Missing release/free all bnepX interfaces */
+ if (ns->record_id)
+ remove_record_from_server(ns->record_id);
+
+ if (ns->iface)
+ g_free(ns->iface);
+
+ if (ns->name)
+ g_free(ns->name);
+
+ if (ns->range)
+ g_free(ns->range);
+
+ if (ns->path)
+ g_free(ns->path);
+
+ if (ns->clients) {
+ g_slist_foreach(ns->clients, (GFunc) g_free, NULL);
+ g_slist_free(ns->clients);
+ }
+
+ g_free(ns);
+}
+
+static void server_unregister(void *data)
+{
+ struct network_server *ns = data;
+
+ info("Unregistered server path:%s", ns->path);
+
+ servers = g_slist_remove(servers, ns);
+ server_free(ns);
+}
+
+static GDBusMethodTable server_methods[] = {
+ { "GetUUID", "", "s", get_uuid },
+ { "Enable", "", "", enable },
+ { "Disable", "", "", disable },
+ { "IsEnabled", "", "b", is_enabled },
+ { "SetName", "s", "", set_name },
+ { "GetName", "", "s", get_name },
+ { "SetAddressRange", "ss", "", set_address_range },
+ { "SetRouting", "s", "", set_routing },
+ { "GetInfo", "", "a{sv}",get_info },
+ { }
+};
+
+static GDBusSignalTable server_signals[] = {
+ { "Enabled", "" },
+ { "Disabled", "" },
+ { }
+};
+
+int server_register(const char *path, bdaddr_t *src, uint16_t id)
+{
+ struct network_server *ns;
+
+ if (!path)
+ return -EINVAL;
+
+ ns = g_new0(struct network_server, 1);
+
+ if (!g_dbus_register_interface(connection, path,
+ NETWORK_SERVER_INTERFACE,
+ server_methods, server_signals, NULL,
+ ns, server_unregister)) {
+ error("D-Bus failed to register %s interface",
+ NETWORK_SERVER_INTERFACE);
+ server_free(ns);
+ return -1;
+ }
+
+ /* Setting a default name */
+ if (id == BNEP_SVC_NAP)
+ ns->name = g_strdup("BlueZ NAP service");
+ else if (id == BNEP_SVC_GN)
+ ns->name = g_strdup("BlueZ GN service");
+ else
+ ns->name = g_strdup("BlueZ PANU service");
+
+ ns->path = g_strdup(path);
+ ns->id = id;
+ bacpy(&ns->src, src);
+
+ servers = g_slist_append(servers, ns);
+
+ info("Registered server path:%s", path);
+
+ return 0;
+}
+
+int server_register_from_file(const char *path, const bdaddr_t *src,
+ uint16_t id, const char *filename)
+{
+ struct network_server *ns;
+ char *str;
+
+ if (!path)
+ return -EINVAL;
+
+ ns = g_new0(struct network_server, 1);
+
+ bacpy(&ns->src, src);
+ ns->path = g_strdup(path);
+ ns->id = id;
+ ns->name = textfile_get(filename, "name");
+ if (!ns->name) {
+ /* Name is mandatory */
+ server_free(ns);
+ return -1;
+ }
+
+ ns->range = textfile_get(filename, "address_range");
+ ns->iface = textfile_get(filename, "routing");
+
+ str = textfile_get(filename, "enabled");
+ if (str) {
+ if (strcmp("1", str) == 0) {
+ ns->record_id = register_server_record(ns);
+ ns->enable = TRUE;
+ }
+ g_free(str);
+ }
+
+ if (!g_dbus_register_interface(connection, path,
+ NETWORK_SERVER_INTERFACE,
+ server_methods, server_signals, NULL,
+ ns, server_unregister)) {
+ error("D-Bus failed to register %s interface",
+ NETWORK_SERVER_INTERFACE);
+ server_free(ns);
+ return -1;
+ }
+
+ servers = g_slist_append(servers, ns);
+
+ info("Registered server path:%s", path);
+
+ return 0;
+}
+
+int server_store(const char *path)
+{
+ struct network_server *ns;
+ char filename[PATH_MAX + 1];
+ char addr[18];
+ GSList *l;
+
+ l = g_slist_find_custom(servers, path, find_server);
+ if (!l) {
+ error("Unable to salve %s on storage", path);
+ return -ENOENT;
+ }
+
+ ns = l->data;
+ ba2str(&ns->src, addr);
+ if (ns->id == BNEP_SVC_NAP)
+ create_name(filename, PATH_MAX, STORAGEDIR, addr, "nap");
+ else if (ns->id == BNEP_SVC_GN)
+ create_name(filename, PATH_MAX, STORAGEDIR, addr, "gn");
+ else
+ create_name(filename, PATH_MAX, STORAGEDIR, addr, "panu");
+
+ create_file(filename, S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH);
+
+ textfile_put(filename, "name", ns->name);
+
+ if (ns->iface)
+ textfile_put(filename, "routing", ns->iface);
+
+ if (ns->range)
+ textfile_put(filename, "range", ns->range);
+
+ textfile_put(filename, "enabled", ns->enable ? "1": "0");
+
+ return 0;
+}
+
+int server_find_data(const char *path, const char *pattern)
+{
+ struct network_server *ns;
+ const char *uuid;
+ GSList *l;
+
+ l = g_slist_find_custom(servers, path, find_server);
+ if (!l)
+ return -1;
+
+ ns = l->data;
+ if (ns->name && strcasecmp(pattern, ns->name) == 0)
+ return 0;
+
+ if (ns->iface && strcasecmp(pattern, ns->iface) == 0)
+ return 0;
+
+ uuid = bnep_name(ns->id);
+ if (uuid && strcasecmp(pattern, uuid) == 0)
+ return 0;
+
+ if (bnep_service_id(pattern) == ns->id)
+ return 0;
+
+ return -1;
+}