summaryrefslogtreecommitdiffstats
path: root/hidd/main.c
diff options
context:
space:
mode:
Diffstat (limited to 'hidd/main.c')
-rw-r--r--hidd/main.c860
1 files changed, 0 insertions, 860 deletions
diff --git a/hidd/main.c b/hidd/main.c
deleted file mode 100644
index d0883b36..00000000
--- a/hidd/main.c
+++ /dev/null
@@ -1,860 +0,0 @@
-/*
- *
- * BlueZ - Bluetooth protocol stack for Linux
- *
- * Copyright (C) 2003-2008 Marcel Holtmann <marcel@holtmann.org>
- *
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
- *
- */
-
-#ifdef HAVE_CONFIG_H
-#include <config.h>
-#endif
-
-#define _GNU_SOURCE
-#include <stdio.h>
-#include <errno.h>
-#include <fcntl.h>
-#include <unistd.h>
-#include <stdlib.h>
-#include <string.h>
-#include <syslog.h>
-#include <signal.h>
-#include <getopt.h>
-#include <sys/poll.h>
-#include <sys/ioctl.h>
-#include <sys/socket.h>
-
-#include <bluetooth/bluetooth.h>
-#include <bluetooth/hci.h>
-#include <bluetooth/hci_lib.h>
-#include <bluetooth/l2cap.h>
-#include <bluetooth/sdp.h>
-#include <bluetooth/hidp.h>
-
-#include "hidd.h"
-
-#ifdef NEED_PPOLL
-#include "ppoll.h"
-#endif
-
-enum {
- NONE,
- SHOW,
- SERVER,
- SEARCH,
- CONNECT,
- KILL
-};
-
-static volatile sig_atomic_t __io_canceled = 0;
-
-static void sig_hup(int sig)
-{
-}
-
-static void sig_term(int sig)
-{
- __io_canceled = 1;
-}
-
-static int l2cap_connect(bdaddr_t *src, bdaddr_t *dst, unsigned short psm)
-{
- struct sockaddr_l2 addr;
- struct l2cap_options opts;
- int sk;
-
- if ((sk = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP)) < 0)
- return -1;
-
- memset(&addr, 0, sizeof(addr));
- addr.l2_family = AF_BLUETOOTH;
- bacpy(&addr.l2_bdaddr, src);
-
- if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
- close(sk);
- return -1;
- }
-
- memset(&opts, 0, sizeof(opts));
- opts.imtu = HIDP_DEFAULT_MTU;
- opts.omtu = HIDP_DEFAULT_MTU;
- opts.flush_to = 0xffff;
-
- setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts));
-
- memset(&addr, 0, sizeof(addr));
- addr.l2_family = AF_BLUETOOTH;
- bacpy(&addr.l2_bdaddr, dst);
- addr.l2_psm = htobs(psm);
-
- if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
- close(sk);
- return -1;
- }
-
- return sk;
-}
-
-static int l2cap_listen(const bdaddr_t *bdaddr, unsigned short psm, int lm, int backlog)
-{
- struct sockaddr_l2 addr;
- struct l2cap_options opts;
- int sk;
-
- if ((sk = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP)) < 0)
- return -1;
-
- memset(&addr, 0, sizeof(addr));
- addr.l2_family = AF_BLUETOOTH;
- bacpy(&addr.l2_bdaddr, bdaddr);
- addr.l2_psm = htobs(psm);
-
- if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
- close(sk);
- return -1;
- }
-
- setsockopt(sk, SOL_L2CAP, L2CAP_LM, &lm, sizeof(lm));
-
- memset(&opts, 0, sizeof(opts));
- opts.imtu = HIDP_DEFAULT_MTU;
- opts.omtu = HIDP_DEFAULT_MTU;
- opts.flush_to = 0xffff;
-
- setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts));
-
- if (listen(sk, backlog) < 0) {
- close(sk);
- return -1;
- }
-
- return sk;
-}
-
-static int l2cap_accept(int sk, bdaddr_t *bdaddr)
-{
- struct sockaddr_l2 addr;
- socklen_t addrlen;
- int nsk;
-
- memset(&addr, 0, sizeof(addr));
- addrlen = sizeof(addr);
-
- if ((nsk = accept(sk, (struct sockaddr *) &addr, &addrlen)) < 0)
- return -1;
-
- if (bdaddr)
- bacpy(bdaddr, &addr.l2_bdaddr);
-
- return nsk;
-}
-
-static int request_authentication(bdaddr_t *src, bdaddr_t *dst)
-{
- struct hci_conn_info_req *cr;
- char addr[18];
- int err, dd, dev_id;
-
- ba2str(src, addr);
- dev_id = hci_devid(addr);
- if (dev_id < 0)
- return dev_id;
-
- dd = hci_open_dev(dev_id);
- if (dd < 0)
- return dd;
-
- cr = malloc(sizeof(*cr) + sizeof(struct hci_conn_info));
- if (!cr)
- return -ENOMEM;
-
- bacpy(&cr->bdaddr, dst);
- cr->type = ACL_LINK;
- err = ioctl(dd, HCIGETCONNINFO, (unsigned long) cr);
- if (err < 0) {
- free(cr);
- hci_close_dev(dd);
- return err;
- }
-
- err = hci_authenticate_link(dd, htobs(cr->conn_info->handle), 25000);
-
- free(cr);
- hci_close_dev(dd);
-
- return err;
-}
-
-static int request_encryption(bdaddr_t *src, bdaddr_t *dst)
-{
- struct hci_conn_info_req *cr;
- char addr[18];
- int err, dd, dev_id;
-
- ba2str(src, addr);
- dev_id = hci_devid(addr);
- if (dev_id < 0)
- return dev_id;
-
- dd = hci_open_dev(dev_id);
- if (dd < 0)
- return dd;
-
- cr = malloc(sizeof(*cr) + sizeof(struct hci_conn_info));
- if (!cr)
- return -ENOMEM;
-
- bacpy(&cr->bdaddr, dst);
- cr->type = ACL_LINK;
- err = ioctl(dd, HCIGETCONNINFO, (unsigned long) cr);
- if (err < 0) {
- free(cr);
- hci_close_dev(dd);
- return err;
- }
-
- err = hci_encrypt_link(dd, htobs(cr->conn_info->handle), 1, 25000);
-
- free(cr);
- hci_close_dev(dd);
-
- return err;
-}
-
-static void enable_sixaxis(int csk)
-{
- const unsigned char buf[] = {
- 0x53 /*HIDP_TRANS_SET_REPORT | HIDP_DATA_RTYPE_FEATURE*/,
- 0xf4, 0x42, 0x03, 0x00, 0x00 };
- int err;
-
- err = write(csk, buf, sizeof(buf));
-}
-
-static int create_device(int ctl, int csk, int isk, uint8_t subclass, int nosdp, int nocheck, int bootonly, int encrypt, int timeout)
-{
- struct hidp_connadd_req req;
- struct sockaddr_l2 addr;
- socklen_t addrlen;
- bdaddr_t src, dst;
- char bda[18];
- int err;
-
- memset(&addr, 0, sizeof(addr));
- addrlen = sizeof(addr);
-
- if (getsockname(csk, (struct sockaddr *) &addr, &addrlen) < 0)
- return -1;
-
- bacpy(&src, &addr.l2_bdaddr);
-
- memset(&addr, 0, sizeof(addr));
- addrlen = sizeof(addr);
-
- if (getpeername(csk, (struct sockaddr *) &addr, &addrlen) < 0)
- return -1;
-
- bacpy(&dst, &addr.l2_bdaddr);
-
- memset(&req, 0, sizeof(req));
- req.ctrl_sock = csk;
- req.intr_sock = isk;
- req.flags = 0;
- req.idle_to = timeout * 60;
-
- err = get_stored_device_info(&src, &dst, &req);
- if (!err)
- goto create;
-
- if (!nocheck) {
- ba2str(&dst, bda);
- syslog(LOG_ERR, "Rejected connection from unknown device %s", bda);
- /* Return no error to avoid run_server() complaining too */
- return 0;
- }
-
- if (!nosdp) {
- err = get_sdp_device_info(&src, &dst, &req);
- if (err < 0)
- goto error;
- } else {
- struct l2cap_conninfo conn;
- socklen_t size;
- uint8_t class[3];
-
- memset(&conn, 0, sizeof(conn));
- size = sizeof(conn);
- if (getsockopt(csk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &size) < 0)
- memset(class, 0, 3);
- else
- memcpy(class, conn.dev_class, 3);
-
- if (class[1] == 0x25 && (class[2] == 0x00 || class[2] == 0x01))
- req.subclass = class[0];
- else
- req.subclass = 0xc0;
- }
-
-create:
- if (subclass != 0x00)
- req.subclass = subclass;
-
- ba2str(&dst, bda);
- syslog(LOG_INFO, "New HID device %s (%s)", bda, req.name);
-
- if (encrypt && (req.subclass & 0x40)) {
- err = request_authentication(&src, &dst);
- if (err < 0) {
- syslog(LOG_ERR, "Authentication for %s failed", bda);
- goto error;
- }
-
- err = request_encryption(&src, &dst);
- if (err < 0)
- syslog(LOG_ERR, "Encryption for %s failed", bda);
- }
-
- if (bootonly) {
- req.rd_size = 0;
- req.flags |= (1 << HIDP_BOOT_PROTOCOL_MODE);
- }
-
- if (req.vendor == 0x054c && req.product == 0x0268)
- enable_sixaxis(csk);
-
- err = ioctl(ctl, HIDPCONNADD, &req);
-
-error:
- if (req.rd_data)
- free(req.rd_data);
-
- return err;
-}
-
-static void run_server(int ctl, int csk, int isk, uint8_t subclass, int nosdp, int nocheck, int bootonly, int encrypt, int timeout)
-{
- struct pollfd p[2];
- sigset_t sigs;
- short events;
- int err, ncsk, nisk;
-
- sigfillset(&sigs);
- sigdelset(&sigs, SIGCHLD);
- sigdelset(&sigs, SIGPIPE);
- sigdelset(&sigs, SIGTERM);
- sigdelset(&sigs, SIGINT);
- sigdelset(&sigs, SIGHUP);
-
- p[0].fd = csk;
- p[0].events = POLLIN | POLLERR | POLLHUP;
-
- p[1].fd = isk;
- p[1].events = POLLIN | POLLERR | POLLHUP;
-
- while (!__io_canceled) {
- p[0].revents = 0;
- p[1].revents = 0;
-
- if (ppoll(p, 2, NULL, &sigs) < 1)
- continue;
-
- events = p[0].revents | p[1].revents;
-
- if (events & POLLIN) {
- ncsk = l2cap_accept(csk, NULL);
- nisk = l2cap_accept(isk, NULL);
-
- err = create_device(ctl, ncsk, nisk, subclass, nosdp, nocheck, bootonly, encrypt, timeout);
- if (err < 0)
- syslog(LOG_ERR, "HID create error %d (%s)",
- errno, strerror(errno));
-
- close(nisk);
- sleep(1);
- close(ncsk);
- }
- }
-}
-
-static char *hidp_state[] = {
- "unknown",
- "connected",
- "open",
- "bound",
- "listening",
- "connecting",
- "connecting",
- "config",
- "disconnecting",
- "closed"
-};
-
-static char *hidp_flagstostr(uint32_t flags)
-{
- static char str[100];
- str[0] = 0;
-
- strcat(str, "[");
-
- if (flags & (1 << HIDP_BOOT_PROTOCOL_MODE))
- strcat(str, "boot-protocol");
-
- strcat(str, "]");
-
- return str;
-}
-
-static void do_show(int ctl)
-{
- struct hidp_connlist_req req;
- struct hidp_conninfo ci[16];
- char addr[18];
- int i;
-
- req.cnum = 16;
- req.ci = ci;
-
- if (ioctl(ctl, HIDPGETCONNLIST, &req) < 0) {
- perror("Can't get connection list");
- close(ctl);
- exit(1);
- }
-
- for (i = 0; i < req.cnum; i++) {
- ba2str(&ci[i].bdaddr, addr);
- printf("%s %s [%04x:%04x] %s %s\n", addr, ci[i].name,
- ci[i].vendor, ci[i].product, hidp_state[ci[i].state],
- ci[i].flags ? hidp_flagstostr(ci[i].flags) : "");
- }
-}
-
-static void do_connect(int ctl, bdaddr_t *src, bdaddr_t *dst, uint8_t subclass, int fakehid, int bootonly, int encrypt, int timeout)
-{
- struct hidp_connadd_req req;
- uint16_t uuid = HID_SVCLASS_ID;
- uint8_t channel = 0;
- char name[256];
- int csk, isk, err;
-
- memset(&req, 0, sizeof(req));
-
- err = get_sdp_device_info(src, dst, &req);
- if (err < 0 && fakehid)
- err = get_alternate_device_info(src, dst,
- &uuid, &channel, name, sizeof(name) - 1);
-
- if (err < 0) {
- perror("Can't get device information");
- close(ctl);
- exit(1);
- }
-
- switch (uuid) {
- case HID_SVCLASS_ID:
- goto connect;
-
- case SERIAL_PORT_SVCLASS_ID:
- if (subclass == 0x40 || !strcmp(name, "Cable Replacement")) {
- if (epox_presenter(src, dst, channel) < 0) {
- close(ctl);
- exit(1);
- }
- break;
- }
- if (subclass == 0x1f || !strcmp(name, "SPP slave")) {
- if (jthree_keyboard(src, dst, channel) < 0) {
- close(ctl);
- exit(1);
- }
- break;
- }
- if (subclass == 0x02 || !strcmp(name, "Serial Port")) {
- if (celluon_keyboard(src, dst, channel) < 0) {
- close(ctl);
- exit(1);
- }
- break;
- }
- break;
-
- case HEADSET_SVCLASS_ID:
- case HANDSFREE_SVCLASS_ID:
- if (headset_presenter(src, dst, channel) < 0) {
- close(ctl);
- exit(1);
- }
- break;
- }
-
- return;
-
-connect:
- csk = l2cap_connect(src, dst, L2CAP_PSM_HIDP_CTRL);
- if (csk < 0) {
- perror("Can't create HID control channel");
- close(ctl);
- exit(1);
- }
-
- isk = l2cap_connect(src, dst, L2CAP_PSM_HIDP_INTR);
- if (isk < 0) {
- perror("Can't create HID interrupt channel");
- close(csk);
- close(ctl);
- exit(1);
- }
-
- err = create_device(ctl, csk, isk, subclass, 1, 1, bootonly, encrypt, timeout);
- if (err < 0) {
- fprintf(stderr, "HID create error %d (%s)\n",
- errno, strerror(errno));
- close(isk);
- sleep(1);
- close(csk);
- close(ctl);
- exit(1);
- }
-}
-
-static void do_search(int ctl, bdaddr_t *bdaddr, uint8_t subclass, int fakehid, int bootonly, int encrypt, int timeout)
-{
- inquiry_info *info = NULL;
- bdaddr_t src, dst;
- int i, dev_id, num_rsp, length, flags;
- char addr[18];
- uint8_t class[3];
-
- ba2str(bdaddr, addr);
- dev_id = hci_devid(addr);
- if (dev_id < 0) {
- dev_id = hci_get_route(NULL);
- hci_devba(dev_id, &src);
- } else
- bacpy(&src, bdaddr);
-
- length = 8; /* ~10 seconds */
- num_rsp = 0;
- flags = IREQ_CACHE_FLUSH;
-
- printf("Searching ...\n");
-
- num_rsp = hci_inquiry(dev_id, length, num_rsp, NULL, &info, flags);
-
- for (i = 0; i < num_rsp; i++) {
- memcpy(class, (info+i)->dev_class, 3);
- if (class[1] == 0x25 && (class[2] == 0x00 || class[2] == 0x01)) {
- bacpy(&dst, &(info+i)->bdaddr);
- ba2str(&dst, addr);
-
- printf("\tConnecting to device %s\n", addr);
- do_connect(ctl, &src, &dst, subclass, fakehid, bootonly, encrypt, timeout);
- }
- }
-
- if (!fakehid)
- goto done;
-
- for (i = 0; i < num_rsp; i++) {
- memcpy(class, (info+i)->dev_class, 3);
- if ((class[0] == 0x00 && class[2] == 0x00 &&
- (class[1] == 0x40 || class[1] == 0x1f)) ||
- (class[0] == 0x10 && class[1] == 0x02 && class[2] == 0x40)) {
- bacpy(&dst, &(info+i)->bdaddr);
- ba2str(&dst, addr);
-
- printf("\tConnecting to device %s\n", addr);
- do_connect(ctl, &src, &dst, subclass, 1, bootonly, 0, timeout);
- }
- }
-
-done:
- bt_free(info);
-
- if (!num_rsp) {
- fprintf(stderr, "\tNo devices in range or visible\n");
- close(ctl);
- exit(1);
- }
-}
-
-static void do_kill(int ctl, bdaddr_t *bdaddr, uint32_t flags)
-{
- struct hidp_conndel_req req;
- struct hidp_connlist_req cl;
- struct hidp_conninfo ci[16];
- int i;
-
- if (!bacmp(bdaddr, BDADDR_ALL)) {
- cl.cnum = 16;
- cl.ci = ci;
-
- if (ioctl(ctl, HIDPGETCONNLIST, &cl) < 0) {
- perror("Can't get connection list");
- close(ctl);
- exit(1);
- }
-
- for (i = 0; i < cl.cnum; i++) {
- bacpy(&req.bdaddr, &ci[i].bdaddr);
- req.flags = flags;
-
- if (ioctl(ctl, HIDPCONNDEL, &req) < 0) {
- perror("Can't release connection");
- close(ctl);
- exit(1);
- }
- }
-
- } else {
- bacpy(&req.bdaddr, bdaddr);
- req.flags = flags;
-
- if (ioctl(ctl, HIDPCONNDEL, &req) < 0) {
- perror("Can't release connection");
- close(ctl);
- exit(1);
- }
- }
-}
-
-static void usage(void)
-{
- printf("hidd - Bluetooth HID daemon version %s\n\n", VERSION);
-
- printf("Usage:\n"
- "\thidd [options] [commands]\n"
- "\n");
-
- printf("Options:\n"
- "\t-i <hciX|bdaddr> Local HCI device or BD Address\n"
- "\t-t <timeout> Set idle timeout (in minutes)\n"
- "\t-b <subclass> Overwrite the boot mode subclass\n"
- "\t-n, --nodaemon Don't fork daemon to background\n"
- "\t-h, --help Display help\n"
- "\n");
-
- printf("Commands:\n"
- "\t--server Start HID server\n"
- "\t--search Search for HID devices\n"
- "\t--connect <bdaddr> Connect remote HID device\n"
- "\t--unplug <bdaddr> Unplug the HID connection\n"
- "\t--kill <bdaddr> Terminate HID connection\n"
- "\t--killall Terminate all connections\n"
- "\t--show List current HID connections\n"
- "\n");
-}
-
-static struct option main_options[] = {
- { "help", 0, 0, 'h' },
- { "nodaemon", 0, 0, 'n' },
- { "subclass", 1, 0, 'b' },
- { "timeout", 1, 0, 't' },
- { "device", 1, 0, 'i' },
- { "master", 0, 0, 'M' },
- { "encrypt", 0, 0, 'E' },
- { "nosdp", 0, 0, 'D' },
- { "nocheck", 0, 0, 'Z' },
- { "bootonly", 0, 0, 'B' },
- { "hidonly", 0, 0, 'H' },
- { "show", 0, 0, 'l' },
- { "list", 0, 0, 'l' },
- { "server", 0, 0, 'd' },
- { "listen", 0, 0, 'd' },
- { "search", 0, 0, 's' },
- { "create", 1, 0, 'c' },
- { "connect", 1, 0, 'c' },
- { "disconnect", 1, 0, 'k' },
- { "terminate", 1, 0, 'k' },
- { "release", 1, 0, 'k' },
- { "kill", 1, 0, 'k' },
- { "killall", 0, 0, 'K' },
- { "unplug", 1, 0, 'u' },
- { 0, 0, 0, 0 }
-};
-
-int main(int argc, char *argv[])
-{
- struct sigaction sa;
- bdaddr_t bdaddr, dev;
- uint32_t flags = 0;
- uint8_t subclass = 0x00;
- char addr[18];
- int log_option = LOG_NDELAY | LOG_PID;
- int opt, ctl, csk, isk;
- int mode = SHOW, detach = 1, nosdp = 0, nocheck = 0, bootonly = 0;
- int fakehid = 1, encrypt = 0, timeout = 30, lm = 0;
-
- bacpy(&bdaddr, BDADDR_ANY);
-
- while ((opt = getopt_long(argc, argv, "+i:nt:b:MEDZBHldsc:k:Ku:h", main_options, NULL)) != -1) {
- switch(opt) {
- case 'i':
- if (!strncasecmp(optarg, "hci", 3))
- hci_devba(atoi(optarg + 3), &bdaddr);
- else
- str2ba(optarg, &bdaddr);
- break;
- case 'n':
- detach = 0;
- break;
- case 't':
- timeout = atoi(optarg);
- break;
- case 'b':
- if (!strncasecmp(optarg, "0x", 2))
- subclass = (uint8_t) strtol(optarg, NULL, 16);
- else
- subclass = atoi(optarg);
- break;
- case 'M':
- lm |= L2CAP_LM_MASTER;
- break;
- case 'E':
- encrypt = 1;
- break;
- case 'D':
- nosdp = 1;
- break;
- case 'Z':
- nocheck = 1;
- break;
- case 'B':
- bootonly = 1;
- break;
- case 'H':
- fakehid = 0;
- break;
- case 'l':
- mode = SHOW;
- break;
- case 'd':
- mode = SERVER;
- break;
- case 's':
- mode = SEARCH;
- break;
- case 'c':
- str2ba(optarg, &dev);
- mode = CONNECT;
- break;
- case 'k':
- str2ba(optarg, &dev);
- mode = KILL;
- break;
- case 'K':
- bacpy(&dev, BDADDR_ALL);
- mode = KILL;
- break;
- case 'u':
- str2ba(optarg, &dev);
- flags = (1 << HIDP_VIRTUAL_CABLE_UNPLUG);
- mode = KILL;
- break;
- case 'h':
- usage();
- exit(0);
- default:
- exit(0);
- }
- }
-
- ba2str(&bdaddr, addr);
-
- ctl = socket(AF_BLUETOOTH, SOCK_RAW, BTPROTO_HIDP);
- if (ctl < 0) {
- perror("Can't open HIDP control socket");
- exit(1);
- }
-
- switch (mode) {
- case SERVER:
- csk = l2cap_listen(&bdaddr, L2CAP_PSM_HIDP_CTRL, lm, 10);
- if (csk < 0) {
- perror("Can't listen on HID control channel");
- close(ctl);
- exit(1);
- }
-
- isk = l2cap_listen(&bdaddr, L2CAP_PSM_HIDP_INTR, lm, 10);
- if (isk < 0) {
- perror("Can't listen on HID interrupt channel");
- close(ctl);
- close(csk);
- exit(1);
- }
- break;
-
- case SEARCH:
- do_search(ctl, &bdaddr, subclass, fakehid, bootonly, encrypt, timeout);
- close(ctl);
- exit(0);
-
- case CONNECT:
- do_connect(ctl, &bdaddr, &dev, subclass, fakehid, bootonly, encrypt, timeout);
- close(ctl);
- exit(0);
-
- case KILL:
- do_kill(ctl, &dev, flags);
- close(ctl);
- exit(0);
-
- default:
- do_show(ctl);
- close(ctl);
- exit(0);
- }
-
- if (detach) {
- if (daemon(0, 0)) {
- perror("Can't start daemon");
- exit(1);
- }
- } else
- log_option |= LOG_PERROR;
-
- openlog("hidd", log_option, LOG_DAEMON);
-
- if (bacmp(&bdaddr, BDADDR_ANY))
- syslog(LOG_INFO, "Bluetooth HID daemon (%s)", addr);
- else
- syslog(LOG_INFO, "Bluetooth HID daemon");
-
- memset(&sa, 0, sizeof(sa));
- sa.sa_flags = SA_NOCLDSTOP;
-
- sa.sa_handler = sig_term;
- sigaction(SIGTERM, &sa, NULL);
- sigaction(SIGINT, &sa, NULL);
- sa.sa_handler = sig_hup;
- sigaction(SIGHUP, &sa, NULL);
-
- sa.sa_handler = SIG_IGN;
- sigaction(SIGCHLD, &sa, NULL);
- sigaction(SIGPIPE, &sa, NULL);
-
- run_server(ctl, csk, isk, subclass, nosdp, nocheck, bootonly, encrypt, timeout);
-
- syslog(LOG_INFO, "Exit");
-
- close(csk);
- close(isk);
- close(ctl);
-
- return 0;
-}