Deleted Added
full compact
server.c (156784) server.c (162128)
1/*
2 * server.c
1/*
2 * server.c
3 *
4 * Copyright (c) 2004 Maksim Yevmenkin <m_evmenkin@yahoo.com>
3 */
4
5/*-
6 * Copyright (c) 2006 Maksim Yevmenkin <m_evmenkin@yahoo.com>
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright

--- 7 unchanged lines hidden (view full) ---

20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 *
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright

--- 7 unchanged lines hidden (view full) ---

22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 * SUCH DAMAGE.
29 *
28 * $Id: server.c,v 1.7 2004/11/17 21:59:42 max Exp $
29 * $FreeBSD: head/usr.sbin/bluetooth/bthidd/server.c 156784 2006-03-16 18:26:54Z emax $
30 * $Id: server.c,v 1.9 2006/09/07 21:06:53 max Exp $
31 * $FreeBSD: head/usr.sbin/bluetooth/bthidd/server.c 162128 2006-09-07 21:47:49Z emax $
30 */
31
32#include <sys/queue.h>
33#include <assert.h>
34#include <bluetooth.h>
32 */
33
34#include <sys/queue.h>
35#include <assert.h>
36#include <bluetooth.h>
37#include <dev/vkbd/vkbd_var.h>
35#include <errno.h>
36#include <fcntl.h>
37#include <stdio.h>
38#include <stdlib.h>
39#include <string.h>
40#include <syslog.h>
41#include <unistd.h>
42#include <usbhid.h>
38#include <errno.h>
39#include <fcntl.h>
40#include <stdio.h>
41#include <stdlib.h>
42#include <string.h>
43#include <syslog.h>
44#include <unistd.h>
45#include <usbhid.h>
43#include "bthidd.h"
44#include "bthid_config.h"
46#include "bthid_config.h"
47#include "bthidd.h"
45#include "kbd.h"
46
47#undef max
48#define max(x, y) (((x) > (y))? (x) : (y))
49
48#include "kbd.h"
49
50#undef max
51#define max(x, y) (((x) > (y))? (x) : (y))
52
50static int server_accept (bthid_server_p srv, int fd);
51static int server_process(bthid_server_p srv, int fd);
53static int32_t server_accept (bthid_server_p srv, int32_t fd);
54static int32_t server_process(bthid_server_p srv, int32_t fd);
52
53/*
54 * Initialize server
55 */
56
55
56/*
57 * Initialize server
58 */
59
57int
60int32_t
58server_init(bthid_server_p srv)
59{
60 struct sockaddr_l2cap l2addr;
61
62 assert(srv != NULL);
63
64 srv->ctrl = srv->intr = -1;
65 FD_ZERO(&srv->rfdset);
66 FD_ZERO(&srv->wfdset);
67 LIST_INIT(&srv->sessions);
68
61server_init(bthid_server_p srv)
62{
63 struct sockaddr_l2cap l2addr;
64
65 assert(srv != NULL);
66
67 srv->ctrl = srv->intr = -1;
68 FD_ZERO(&srv->rfdset);
69 FD_ZERO(&srv->wfdset);
70 LIST_INIT(&srv->sessions);
71
69 /* Allocate HID keycodes buffer */
70 srv->keys = bit_alloc(kbd_maxkey());
71 if (srv->keys == NULL) {
72 syslog(LOG_ERR, "Could not allocate HID keys buffer");
73 return (-1);
74 }
75 memset(srv->keys, 0, bitstr_size(kbd_maxkey()));
76
77 /* Get wired keyboard index (if was not specified) */
78 if (srv->windex == -1) {
79 srv->windex = kbd_get_index("/dev/console");
80 if (srv->windex < 0) {
81 syslog(LOG_ERR, "Could not open get wired keyboard " \
82 "index. %s (%d)", strerror(errno), errno);
83 free(srv->keys);
84 return (-1);
85 }
86 }
87
88 /* Open /dev/consolectl */
89 srv->cons = open("/dev/consolectl", O_RDWR);
90 if (srv->cons < 0) {
91 syslog(LOG_ERR, "Could not open /dev/consolectl. %s (%d)",
92 strerror(errno), errno);
93 return (-1);
94 }
95
72 /* Open /dev/consolectl */
73 srv->cons = open("/dev/consolectl", O_RDWR);
74 if (srv->cons < 0) {
75 syslog(LOG_ERR, "Could not open /dev/consolectl. %s (%d)",
76 strerror(errno), errno);
77 return (-1);
78 }
79
96 /* Open /dev/vkbdctl */
97 srv->vkbd = open("/dev/vkbdctl", O_RDWR);
98 if (srv->vkbd < 0) {
99 syslog(LOG_ERR, "Could not open /dev/vkbdctl. %s (%d)",
100 strerror(errno), errno);
101 close(srv->cons);
102 free(srv->keys);
103 return (-1);
104 }
105
106 /* Create control socket */
107 srv->ctrl = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
108 if (srv->ctrl < 0) {
109 syslog(LOG_ERR, "Could not create control L2CAP socket. " \
110 "%s (%d)", strerror(errno), errno);
80 /* Create control socket */
81 srv->ctrl = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
82 if (srv->ctrl < 0) {
83 syslog(LOG_ERR, "Could not create control L2CAP socket. " \
84 "%s (%d)", strerror(errno), errno);
111 close(srv->vkbd);
112 close(srv->cons);
85 close(srv->cons);
113 free(srv->keys);
114 return (-1);
115 }
116
117 l2addr.l2cap_len = sizeof(l2addr);
118 l2addr.l2cap_family = AF_BLUETOOTH;
119 memcpy(&l2addr.l2cap_bdaddr, &srv->bdaddr, sizeof(l2addr.l2cap_bdaddr));
120 l2addr.l2cap_psm = htole16(0x11);
121
122 if (bind(srv->ctrl, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) {
123 syslog(LOG_ERR, "Could not bind control L2CAP socket. " \
124 "%s (%d)", strerror(errno), errno);
125 close(srv->ctrl);
86 return (-1);
87 }
88
89 l2addr.l2cap_len = sizeof(l2addr);
90 l2addr.l2cap_family = AF_BLUETOOTH;
91 memcpy(&l2addr.l2cap_bdaddr, &srv->bdaddr, sizeof(l2addr.l2cap_bdaddr));
92 l2addr.l2cap_psm = htole16(0x11);
93
94 if (bind(srv->ctrl, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) {
95 syslog(LOG_ERR, "Could not bind control L2CAP socket. " \
96 "%s (%d)", strerror(errno), errno);
97 close(srv->ctrl);
126 close(srv->vkbd);
127 close(srv->cons);
98 close(srv->cons);
128 free(srv->keys);
129 return (-1);
130 }
131
132 if (listen(srv->ctrl, 10) < 0) {
133 syslog(LOG_ERR, "Could not listen on control L2CAP socket. " \
134 "%s (%d)", strerror(errno), errno);
135 close(srv->ctrl);
99 return (-1);
100 }
101
102 if (listen(srv->ctrl, 10) < 0) {
103 syslog(LOG_ERR, "Could not listen on control L2CAP socket. " \
104 "%s (%d)", strerror(errno), errno);
105 close(srv->ctrl);
136 close(srv->vkbd);
137 close(srv->cons);
106 close(srv->cons);
138 free(srv->keys);
139 return (-1);
140 }
141
142 /* Create intrrupt socket */
143 srv->intr = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
144 if (srv->intr < 0) {
145 syslog(LOG_ERR, "Could not create interrupt L2CAP socket. " \
146 "%s (%d)", strerror(errno), errno);
147 close(srv->ctrl);
107 return (-1);
108 }
109
110 /* Create intrrupt socket */
111 srv->intr = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
112 if (srv->intr < 0) {
113 syslog(LOG_ERR, "Could not create interrupt L2CAP socket. " \
114 "%s (%d)", strerror(errno), errno);
115 close(srv->ctrl);
148 close(srv->vkbd);
149 close(srv->cons);
116 close(srv->cons);
150 free(srv->keys);
151 return (-1);
152 }
153
154 l2addr.l2cap_psm = htole16(0x13);
155
156 if (bind(srv->intr, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) {
157 syslog(LOG_ERR, "Could not bind interrupt L2CAP socket. " \
158 "%s (%d)", strerror(errno), errno);
159 close(srv->intr);
160 close(srv->ctrl);
117 return (-1);
118 }
119
120 l2addr.l2cap_psm = htole16(0x13);
121
122 if (bind(srv->intr, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) {
123 syslog(LOG_ERR, "Could not bind interrupt L2CAP socket. " \
124 "%s (%d)", strerror(errno), errno);
125 close(srv->intr);
126 close(srv->ctrl);
161 close(srv->vkbd);
162 close(srv->cons);
127 close(srv->cons);
163 free(srv->keys);
164 return (-1);
165 }
166
167 if (listen(srv->intr, 10) < 0) {
168 syslog(LOG_ERR, "Could not listen on interrupt L2CAP socket. "\
169 "%s (%d)", strerror(errno), errno);
170 close(srv->intr);
171 close(srv->ctrl);
128 return (-1);
129 }
130
131 if (listen(srv->intr, 10) < 0) {
132 syslog(LOG_ERR, "Could not listen on interrupt L2CAP socket. "\
133 "%s (%d)", strerror(errno), errno);
134 close(srv->intr);
135 close(srv->ctrl);
172 close(srv->vkbd);
173 close(srv->cons);
136 close(srv->cons);
174 free(srv->keys);
175 return (-1);
176 }
177
178 FD_SET(srv->ctrl, &srv->rfdset);
179 FD_SET(srv->intr, &srv->rfdset);
180 srv->maxfd = max(srv->ctrl, srv->intr);
181
182 return (0);

--- 4 unchanged lines hidden (view full) ---

187 */
188
189void
190server_shutdown(bthid_server_p srv)
191{
192 assert(srv != NULL);
193
194 close(srv->cons);
137 return (-1);
138 }
139
140 FD_SET(srv->ctrl, &srv->rfdset);
141 FD_SET(srv->intr, &srv->rfdset);
142 srv->maxfd = max(srv->ctrl, srv->intr);
143
144 return (0);

--- 4 unchanged lines hidden (view full) ---

149 */
150
151void
152server_shutdown(bthid_server_p srv)
153{
154 assert(srv != NULL);
155
156 close(srv->cons);
195 close(srv->vkbd);
196 close(srv->ctrl);
197 close(srv->intr);
198
199 while (!LIST_EMPTY(&srv->sessions))
200 session_close(LIST_FIRST(&srv->sessions));
201
157 close(srv->ctrl);
158 close(srv->intr);
159
160 while (!LIST_EMPTY(&srv->sessions))
161 session_close(LIST_FIRST(&srv->sessions));
162
202 free(srv->keys);
203
204 memset(srv, 0, sizeof(*srv));
205}
206
207/*
208 * Do one server iteration
209 */
210
163 memset(srv, 0, sizeof(*srv));
164}
165
166/*
167 * Do one server iteration
168 */
169
211int
170int32_t
212server_do(bthid_server_p srv)
213{
214 struct timeval tv;
215 fd_set rfdset, wfdset;
171server_do(bthid_server_p srv)
172{
173 struct timeval tv;
174 fd_set rfdset, wfdset;
216 int n, fd;
175 int32_t n, fd;
217
218 assert(srv != NULL);
219
220 tv.tv_sec = 1;
221 tv.tv_usec = 0;
222
223 /* Copy cached version of the fd sets and call select */
224 memcpy(&rfdset, &srv->rfdset, sizeof(rfdset));

--- 28 unchanged lines hidden (view full) ---

253
254 return (0);
255}
256
257/*
258 * Accept new connection
259 */
260
176
177 assert(srv != NULL);
178
179 tv.tv_sec = 1;
180 tv.tv_usec = 0;
181
182 /* Copy cached version of the fd sets and call select */
183 memcpy(&rfdset, &srv->rfdset, sizeof(rfdset));

--- 28 unchanged lines hidden (view full) ---

212
213 return (0);
214}
215
216/*
217 * Accept new connection
218 */
219
261static int
262server_accept(bthid_server_p srv, int fd)
220static int32_t
221server_accept(bthid_server_p srv, int32_t fd)
263{
222{
264 bthid_session_p s = NULL;
265 hid_device_p d = NULL;
223 bthid_session_p s;
224 hid_device_p d;
266 struct sockaddr_l2cap l2addr;
225 struct sockaddr_l2cap l2addr;
267 int len, new_fd;
226 int32_t len, new_fd;
268
269 len = sizeof(l2addr);
270 if ((new_fd = accept(fd, (struct sockaddr *) &l2addr, &len)) < 0) {
271 syslog(LOG_ERR, "Could not accept %s connection. %s (%d)",
272 (fd == srv->ctrl)? "control" : "interrupt",
273 strerror(errno), errno);
274 return (-1);
275 }
276
227
228 len = sizeof(l2addr);
229 if ((new_fd = accept(fd, (struct sockaddr *) &l2addr, &len)) < 0) {
230 syslog(LOG_ERR, "Could not accept %s connection. %s (%d)",
231 (fd == srv->ctrl)? "control" : "interrupt",
232 strerror(errno), errno);
233 return (-1);
234 }
235
236 /* Is device configured? */
237 if ((d = get_hid_device(&l2addr.l2cap_bdaddr)) == NULL) {
238 syslog(LOG_ERR, "Rejecting %s connection from %s. " \
239 "Device not configured",
240 (fd == srv->ctrl)? "control" : "interrupt",
241 bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
242 close(new_fd);
243 return (-1);
244 }
245
277 /* Check if we have session for the device */
278 if ((s = session_by_bdaddr(srv, &l2addr.l2cap_bdaddr)) == NULL) {
246 /* Check if we have session for the device */
247 if ((s = session_by_bdaddr(srv, &l2addr.l2cap_bdaddr)) == NULL) {
279 /* Is device configured? */
280 if ((d = get_hid_device(&l2addr.l2cap_bdaddr)) == NULL) {
281 syslog(LOG_ERR, "Rejecting %s connection from %s. " \
282 "Device not configured",
283 (fd == srv->ctrl)? "control" : "interrupt",
284 bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
285 close(new_fd);
286 return (-1);
287 }
288
289 d->new_device = 0; /* reset new device flag */
290 write_hids_file();
291
292 /* Create new inbound session */
248 d->new_device = 0; /* reset new device flag */
249 write_hids_file();
250
251 /* Create new inbound session */
293 if ((s = session_open(srv, &l2addr.l2cap_bdaddr)) == NULL) {
294 syslog(LOG_CRIT, "Could not open inbound session " \
295 "for %s. Not enough memory",
296 bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
252 if ((s = session_open(srv, d)) == NULL) {
253 syslog(LOG_CRIT, "Could not open inbound session "
254 "for %s", bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
297 close(new_fd);
298 return (-1);
299 }
300 }
301
302 /* Update descriptors */
303 if (fd == srv->ctrl) {
304 assert(s->ctrl == -1);

--- 8 unchanged lines hidden (view full) ---

313 FD_SET(new_fd, &srv->rfdset);
314 if (new_fd > srv->maxfd)
315 srv->maxfd = new_fd;
316
317 syslog(LOG_NOTICE, "Accepted %s connection from %s",
318 (fd == srv->ctrl)? "control" : "interrupt",
319 bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
320
255 close(new_fd);
256 return (-1);
257 }
258 }
259
260 /* Update descriptors */
261 if (fd == srv->ctrl) {
262 assert(s->ctrl == -1);

--- 8 unchanged lines hidden (view full) ---

271 FD_SET(new_fd, &srv->rfdset);
272 if (new_fd > srv->maxfd)
273 srv->maxfd = new_fd;
274
275 syslog(LOG_NOTICE, "Accepted %s connection from %s",
276 (fd == srv->ctrl)? "control" : "interrupt",
277 bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
278
279 /* Register session's vkbd descriptor (if needed) for read */
280 if (s->state == OPEN && d->keyboard) {
281 assert(s->vkbd != -1);
282
283 FD_SET(s->vkbd, &srv->rfdset);
284 if (s->vkbd > srv->maxfd)
285 srv->maxfd = s->vkbd;
286 }
287
321 return (0);
322}
323
324/*
325 * Process data on the connection
326 */
327
288 return (0);
289}
290
291/*
292 * Process data on the connection
293 */
294
328static int
329server_process(bthid_server_p srv, int fd)
295static int32_t
296server_process(bthid_server_p srv, int32_t fd)
330{
297{
331 bthid_session_p s = session_by_fd(srv, fd);
332 char data[1024];
333 int len;
298 bthid_session_p s = session_by_fd(srv, fd);
299 int32_t len, to_read;
300 int32_t (*cb)(bthid_session_p, uint8_t *, int32_t);
301 union {
302 uint8_t b[1024];
303 vkbd_status_t s;
304 } data;
334
335 if (s == NULL)
336 return (0); /* can happen on device disconnect */
337
305
306 if (s == NULL)
307 return (0); /* can happen on device disconnect */
308
309
310 if (fd == s->ctrl) {
311 cb = hid_control;
312 to_read = sizeof(data.b);
313 } else if (fd == s->intr) {
314 cb = hid_interrupt;
315 to_read = sizeof(data.b);
316 } else {
317 assert(fd == s->vkbd);
318
319 cb = kbd_status_changed;
320 to_read = sizeof(data.s);
321 }
322
338 do {
323 do {
339 len = read(fd, data, sizeof(data));
324 len = read(fd, &data, to_read);
340 } while (len < 0 && errno == EINTR);
341
342 if (len < 0) {
343 syslog(LOG_ERR, "Could not read data from %s (%s). %s (%d)",
344 bt_ntoa(&s->bdaddr, NULL),
345 (fd == s->ctrl)? "control" : "interrupt",
346 strerror(errno), errno);
347 session_close(s);
348 return (0);
349 }
350
351 if (len == 0) {
352 syslog(LOG_NOTICE, "Remote device %s has closed %s connection",
353 bt_ntoa(&s->bdaddr, NULL),
354 (fd == s->ctrl)? "control" : "interrupt");
355 session_close(s);
356 return (0);
357 }
358
325 } while (len < 0 && errno == EINTR);
326
327 if (len < 0) {
328 syslog(LOG_ERR, "Could not read data from %s (%s). %s (%d)",
329 bt_ntoa(&s->bdaddr, NULL),
330 (fd == s->ctrl)? "control" : "interrupt",
331 strerror(errno), errno);
332 session_close(s);
333 return (0);
334 }
335
336 if (len == 0) {
337 syslog(LOG_NOTICE, "Remote device %s has closed %s connection",
338 bt_ntoa(&s->bdaddr, NULL),
339 (fd == s->ctrl)? "control" : "interrupt");
340 session_close(s);
341 return (0);
342 }
343
359 if (fd == s->ctrl)
360 hid_control(s, data, len);
361 else
362 hid_interrupt(s, data, len);
344 (*cb)(s, (uint8_t *) &data, len);
363
364 return (0);
365}
366
345
346 return (0);
347}
348