411a5fdbb3
This will fix build.
353 lines
8.3 KiB
C
353 lines
8.3 KiB
C
/*
|
|
* server.c
|
|
*/
|
|
|
|
/*-
|
|
* Copyright (c) 2006 Maksim Yevmenkin <m_evmenkin@yahoo.com>
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* $Id: server.c,v 1.9 2006/09/07 21:06:53 max Exp $
|
|
* $FreeBSD$
|
|
*/
|
|
|
|
#include <sys/queue.h>
|
|
#include <assert.h>
|
|
#define L2CAP_SOCKET_CHECKED
|
|
#include <bluetooth.h>
|
|
#include <dev/vkbd/vkbd_var.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <syslog.h>
|
|
#include <unistd.h>
|
|
#include <usbhid.h>
|
|
#include "bthid_config.h"
|
|
#include "bthidd.h"
|
|
#include "kbd.h"
|
|
|
|
#undef max
|
|
#define max(x, y) (((x) > (y))? (x) : (y))
|
|
|
|
static int32_t server_accept (bthid_server_p srv, int32_t fd);
|
|
static int32_t server_process(bthid_server_p srv, int32_t fd);
|
|
|
|
/*
|
|
* Initialize server
|
|
*/
|
|
|
|
int32_t
|
|
server_init(bthid_server_p srv)
|
|
{
|
|
struct sockaddr_l2cap l2addr;
|
|
|
|
assert(srv != NULL);
|
|
|
|
srv->ctrl = srv->intr = -1;
|
|
FD_ZERO(&srv->rfdset);
|
|
FD_ZERO(&srv->wfdset);
|
|
LIST_INIT(&srv->sessions);
|
|
|
|
/* Open /dev/consolectl */
|
|
srv->cons = open("/dev/consolectl", O_RDWR);
|
|
if (srv->cons < 0) {
|
|
syslog(LOG_ERR, "Could not open /dev/consolectl. %s (%d)",
|
|
strerror(errno), errno);
|
|
return (-1);
|
|
}
|
|
|
|
/* Create control socket */
|
|
srv->ctrl = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
|
|
if (srv->ctrl < 0) {
|
|
syslog(LOG_ERR, "Could not create control L2CAP socket. " \
|
|
"%s (%d)", strerror(errno), errno);
|
|
close(srv->cons);
|
|
return (-1);
|
|
}
|
|
|
|
l2addr.l2cap_len = sizeof(l2addr);
|
|
l2addr.l2cap_family = AF_BLUETOOTH;
|
|
memcpy(&l2addr.l2cap_bdaddr, &srv->bdaddr, sizeof(l2addr.l2cap_bdaddr));
|
|
l2addr.l2cap_psm = htole16(0x11);
|
|
l2addr.l2cap_bdaddr_type = BDADDR_BREDR;
|
|
l2addr.l2cap_cid = 0;
|
|
|
|
if (bind(srv->ctrl, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) {
|
|
syslog(LOG_ERR, "Could not bind control L2CAP socket. " \
|
|
"%s (%d)", strerror(errno), errno);
|
|
close(srv->ctrl);
|
|
close(srv->cons);
|
|
return (-1);
|
|
}
|
|
|
|
if (listen(srv->ctrl, 10) < 0) {
|
|
syslog(LOG_ERR, "Could not listen on control L2CAP socket. " \
|
|
"%s (%d)", strerror(errno), errno);
|
|
close(srv->ctrl);
|
|
close(srv->cons);
|
|
return (-1);
|
|
}
|
|
|
|
/* Create intrrupt socket */
|
|
srv->intr = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
|
|
if (srv->intr < 0) {
|
|
syslog(LOG_ERR, "Could not create interrupt L2CAP socket. " \
|
|
"%s (%d)", strerror(errno), errno);
|
|
close(srv->ctrl);
|
|
close(srv->cons);
|
|
return (-1);
|
|
}
|
|
|
|
l2addr.l2cap_psm = htole16(0x13);
|
|
|
|
if (bind(srv->intr, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) {
|
|
syslog(LOG_ERR, "Could not bind interrupt L2CAP socket. " \
|
|
"%s (%d)", strerror(errno), errno);
|
|
close(srv->intr);
|
|
close(srv->ctrl);
|
|
close(srv->cons);
|
|
return (-1);
|
|
}
|
|
|
|
if (listen(srv->intr, 10) < 0) {
|
|
syslog(LOG_ERR, "Could not listen on interrupt L2CAP socket. "\
|
|
"%s (%d)", strerror(errno), errno);
|
|
close(srv->intr);
|
|
close(srv->ctrl);
|
|
close(srv->cons);
|
|
return (-1);
|
|
}
|
|
|
|
FD_SET(srv->ctrl, &srv->rfdset);
|
|
FD_SET(srv->intr, &srv->rfdset);
|
|
srv->maxfd = max(srv->ctrl, srv->intr);
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Shutdown server
|
|
*/
|
|
|
|
void
|
|
server_shutdown(bthid_server_p srv)
|
|
{
|
|
assert(srv != NULL);
|
|
|
|
close(srv->cons);
|
|
close(srv->ctrl);
|
|
close(srv->intr);
|
|
|
|
while (!LIST_EMPTY(&srv->sessions))
|
|
session_close(LIST_FIRST(&srv->sessions));
|
|
|
|
memset(srv, 0, sizeof(*srv));
|
|
}
|
|
|
|
/*
|
|
* Do one server iteration
|
|
*/
|
|
|
|
int32_t
|
|
server_do(bthid_server_p srv)
|
|
{
|
|
struct timeval tv;
|
|
fd_set rfdset, wfdset;
|
|
int32_t n, fd;
|
|
|
|
assert(srv != NULL);
|
|
|
|
tv.tv_sec = 1;
|
|
tv.tv_usec = 0;
|
|
|
|
/* Copy cached version of the fd sets and call select */
|
|
memcpy(&rfdset, &srv->rfdset, sizeof(rfdset));
|
|
memcpy(&wfdset, &srv->wfdset, sizeof(wfdset));
|
|
|
|
n = select(srv->maxfd + 1, &rfdset, &wfdset, NULL, &tv);
|
|
if (n < 0) {
|
|
if (errno == EINTR)
|
|
return (0);
|
|
|
|
syslog(LOG_ERR, "Could not select(%d, %p, %p). %s (%d)",
|
|
srv->maxfd + 1, &rfdset, &wfdset, strerror(errno), errno);
|
|
|
|
return (-1);
|
|
}
|
|
|
|
/* Process descriptors (if any) */
|
|
for (fd = 0; fd < srv->maxfd + 1 && n > 0; fd ++) {
|
|
if (FD_ISSET(fd, &rfdset)) {
|
|
n --;
|
|
|
|
if (fd == srv->ctrl || fd == srv->intr)
|
|
server_accept(srv, fd);
|
|
else
|
|
server_process(srv, fd);
|
|
} else if (FD_ISSET(fd, &wfdset)) {
|
|
n --;
|
|
|
|
client_connect(srv, fd);
|
|
}
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Accept new connection
|
|
*/
|
|
|
|
static int32_t
|
|
server_accept(bthid_server_p srv, int32_t fd)
|
|
{
|
|
bthid_session_p s;
|
|
hid_device_p d;
|
|
struct sockaddr_l2cap l2addr;
|
|
int32_t new_fd;
|
|
socklen_t len;
|
|
|
|
len = sizeof(l2addr);
|
|
if ((new_fd = accept(fd, (struct sockaddr *) &l2addr, &len)) < 0) {
|
|
syslog(LOG_ERR, "Could not accept %s connection. %s (%d)",
|
|
(fd == srv->ctrl)? "control" : "interrupt",
|
|
strerror(errno), errno);
|
|
return (-1);
|
|
}
|
|
|
|
/* Is device configured? */
|
|
if ((d = get_hid_device(&l2addr.l2cap_bdaddr)) == NULL) {
|
|
syslog(LOG_ERR, "Rejecting %s connection from %s. " \
|
|
"Device not configured",
|
|
(fd == srv->ctrl)? "control" : "interrupt",
|
|
bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
|
|
close(new_fd);
|
|
return (-1);
|
|
}
|
|
|
|
/* Check if we have session for the device */
|
|
if ((s = session_by_bdaddr(srv, &l2addr.l2cap_bdaddr)) == NULL) {
|
|
d->new_device = 0; /* reset new device flag */
|
|
write_hids_file();
|
|
|
|
/* Create new inbound session */
|
|
if ((s = session_open(srv, d)) == NULL) {
|
|
syslog(LOG_CRIT, "Could not open inbound session "
|
|
"for %s", bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
|
|
close(new_fd);
|
|
return (-1);
|
|
}
|
|
}
|
|
|
|
/* Update descriptors */
|
|
if (fd == srv->ctrl) {
|
|
assert(s->ctrl == -1);
|
|
s->ctrl = new_fd;
|
|
s->state = (s->intr == -1)? W4INTR : OPEN;
|
|
} else {
|
|
assert(s->intr == -1);
|
|
s->intr = new_fd;
|
|
s->state = (s->ctrl == -1)? W4CTRL : OPEN;
|
|
}
|
|
|
|
FD_SET(new_fd, &srv->rfdset);
|
|
if (new_fd > srv->maxfd)
|
|
srv->maxfd = new_fd;
|
|
|
|
syslog(LOG_NOTICE, "Accepted %s connection from %s",
|
|
(fd == srv->ctrl)? "control" : "interrupt",
|
|
bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
|
|
|
|
/* Register session's vkbd descriptor (if needed) for read */
|
|
if (s->state == OPEN && d->keyboard) {
|
|
assert(s->vkbd != -1);
|
|
|
|
FD_SET(s->vkbd, &srv->rfdset);
|
|
if (s->vkbd > srv->maxfd)
|
|
srv->maxfd = s->vkbd;
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
/*
|
|
* Process data on the connection
|
|
*/
|
|
|
|
static int32_t
|
|
server_process(bthid_server_p srv, int32_t fd)
|
|
{
|
|
bthid_session_p s = session_by_fd(srv, fd);
|
|
int32_t len, to_read;
|
|
int32_t (*cb)(bthid_session_p, uint8_t *, int32_t);
|
|
union {
|
|
uint8_t b[1024];
|
|
vkbd_status_t s;
|
|
} data;
|
|
|
|
if (s == NULL)
|
|
return (0); /* can happen on device disconnect */
|
|
|
|
|
|
if (fd == s->ctrl) {
|
|
cb = hid_control;
|
|
to_read = sizeof(data.b);
|
|
} else if (fd == s->intr) {
|
|
cb = hid_interrupt;
|
|
to_read = sizeof(data.b);
|
|
} else {
|
|
assert(fd == s->vkbd);
|
|
|
|
cb = kbd_status_changed;
|
|
to_read = sizeof(data.s);
|
|
}
|
|
|
|
do {
|
|
len = read(fd, &data, to_read);
|
|
} while (len < 0 && errno == EINTR);
|
|
|
|
if (len < 0) {
|
|
syslog(LOG_ERR, "Could not read data from %s (%s). %s (%d)",
|
|
bt_ntoa(&s->bdaddr, NULL),
|
|
(fd == s->ctrl)? "control" : "interrupt",
|
|
strerror(errno), errno);
|
|
session_close(s);
|
|
return (0);
|
|
}
|
|
|
|
if (len == 0) {
|
|
syslog(LOG_NOTICE, "Remote device %s has closed %s connection",
|
|
bt_ntoa(&s->bdaddr, NULL),
|
|
(fd == s->ctrl)? "control" : "interrupt");
|
|
session_close(s);
|
|
return (0);
|
|
}
|
|
|
|
(*cb)(s, (uint8_t *) &data, len);
|
|
|
|
return (0);
|
|
}
|
|
|