server.c (156784) | server.c (162128) |
---|---|
1/* 2 * server.c | 1/* 2 * server.c |
3 * 4 * Copyright (c) 2004 Maksim Yevmenkin <m_evmenkin@yahoo.com> | 3 */ 4 5/*- 6 * Copyright (c) 2006 Maksim Yevmenkin <m_evmenkin@yahoo.com> |
5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright --- 7 unchanged lines hidden (view full) --- 20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26 * SUCH DAMAGE. 27 * | 7 * All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright --- 7 unchanged lines hidden (view full) --- 22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 28 * SUCH DAMAGE. 29 * |
28 * $Id: server.c,v 1.7 2004/11/17 21:59:42 max Exp $ 29 * $FreeBSD: head/usr.sbin/bluetooth/bthidd/server.c 156784 2006-03-16 18:26:54Z emax $ | 30 * $Id: server.c,v 1.9 2006/09/07 21:06:53 max Exp $ 31 * $FreeBSD: head/usr.sbin/bluetooth/bthidd/server.c 162128 2006-09-07 21:47:49Z emax $ |
30 */ 31 32#include <sys/queue.h> 33#include <assert.h> 34#include <bluetooth.h> | 32 */ 33 34#include <sys/queue.h> 35#include <assert.h> 36#include <bluetooth.h> |
37#include <dev/vkbd/vkbd_var.h> |
|
35#include <errno.h> 36#include <fcntl.h> 37#include <stdio.h> 38#include <stdlib.h> 39#include <string.h> 40#include <syslog.h> 41#include <unistd.h> 42#include <usbhid.h> | 38#include <errno.h> 39#include <fcntl.h> 40#include <stdio.h> 41#include <stdlib.h> 42#include <string.h> 43#include <syslog.h> 44#include <unistd.h> 45#include <usbhid.h> |
43#include "bthidd.h" | |
44#include "bthid_config.h" | 46#include "bthid_config.h" |
47#include "bthidd.h" |
|
45#include "kbd.h" 46 47#undef max 48#define max(x, y) (((x) > (y))? (x) : (y)) 49 | 48#include "kbd.h" 49 50#undef max 51#define max(x, y) (((x) > (y))? (x) : (y)) 52 |
50static int server_accept (bthid_server_p srv, int fd); 51static int server_process(bthid_server_p srv, int fd); | 53static int32_t server_accept (bthid_server_p srv, int32_t fd); 54static int32_t server_process(bthid_server_p srv, int32_t fd); |
52 53/* 54 * Initialize server 55 */ 56 | 55 56/* 57 * Initialize server 58 */ 59 |
57int | 60int32_t |
58server_init(bthid_server_p srv) 59{ 60 struct sockaddr_l2cap l2addr; 61 62 assert(srv != NULL); 63 64 srv->ctrl = srv->intr = -1; 65 FD_ZERO(&srv->rfdset); 66 FD_ZERO(&srv->wfdset); 67 LIST_INIT(&srv->sessions); 68 | 61server_init(bthid_server_p srv) 62{ 63 struct sockaddr_l2cap l2addr; 64 65 assert(srv != NULL); 66 67 srv->ctrl = srv->intr = -1; 68 FD_ZERO(&srv->rfdset); 69 FD_ZERO(&srv->wfdset); 70 LIST_INIT(&srv->sessions); 71 |
69 /* Allocate HID keycodes buffer */ 70 srv->keys = bit_alloc(kbd_maxkey()); 71 if (srv->keys == NULL) { 72 syslog(LOG_ERR, "Could not allocate HID keys buffer"); 73 return (-1); 74 } 75 memset(srv->keys, 0, bitstr_size(kbd_maxkey())); 76 77 /* Get wired keyboard index (if was not specified) */ 78 if (srv->windex == -1) { 79 srv->windex = kbd_get_index("/dev/console"); 80 if (srv->windex < 0) { 81 syslog(LOG_ERR, "Could not open get wired keyboard " \ 82 "index. %s (%d)", strerror(errno), errno); 83 free(srv->keys); 84 return (-1); 85 } 86 } 87 | |
88 /* Open /dev/consolectl */ 89 srv->cons = open("/dev/consolectl", O_RDWR); 90 if (srv->cons < 0) { 91 syslog(LOG_ERR, "Could not open /dev/consolectl. %s (%d)", 92 strerror(errno), errno); 93 return (-1); 94 } 95 | 72 /* Open /dev/consolectl */ 73 srv->cons = open("/dev/consolectl", O_RDWR); 74 if (srv->cons < 0) { 75 syslog(LOG_ERR, "Could not open /dev/consolectl. %s (%d)", 76 strerror(errno), errno); 77 return (-1); 78 } 79 |
96 /* Open /dev/vkbdctl */ 97 srv->vkbd = open("/dev/vkbdctl", O_RDWR); 98 if (srv->vkbd < 0) { 99 syslog(LOG_ERR, "Could not open /dev/vkbdctl. %s (%d)", 100 strerror(errno), errno); 101 close(srv->cons); 102 free(srv->keys); 103 return (-1); 104 } 105 | |
106 /* Create control socket */ 107 srv->ctrl = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP); 108 if (srv->ctrl < 0) { 109 syslog(LOG_ERR, "Could not create control L2CAP socket. " \ 110 "%s (%d)", strerror(errno), errno); | 80 /* Create control socket */ 81 srv->ctrl = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP); 82 if (srv->ctrl < 0) { 83 syslog(LOG_ERR, "Could not create control L2CAP socket. " \ 84 "%s (%d)", strerror(errno), errno); |
111 close(srv->vkbd); | |
112 close(srv->cons); | 85 close(srv->cons); |
113 free(srv->keys); | |
114 return (-1); 115 } 116 117 l2addr.l2cap_len = sizeof(l2addr); 118 l2addr.l2cap_family = AF_BLUETOOTH; 119 memcpy(&l2addr.l2cap_bdaddr, &srv->bdaddr, sizeof(l2addr.l2cap_bdaddr)); 120 l2addr.l2cap_psm = htole16(0x11); 121 122 if (bind(srv->ctrl, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) { 123 syslog(LOG_ERR, "Could not bind control L2CAP socket. " \ 124 "%s (%d)", strerror(errno), errno); 125 close(srv->ctrl); | 86 return (-1); 87 } 88 89 l2addr.l2cap_len = sizeof(l2addr); 90 l2addr.l2cap_family = AF_BLUETOOTH; 91 memcpy(&l2addr.l2cap_bdaddr, &srv->bdaddr, sizeof(l2addr.l2cap_bdaddr)); 92 l2addr.l2cap_psm = htole16(0x11); 93 94 if (bind(srv->ctrl, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) { 95 syslog(LOG_ERR, "Could not bind control L2CAP socket. " \ 96 "%s (%d)", strerror(errno), errno); 97 close(srv->ctrl); |
126 close(srv->vkbd); | |
127 close(srv->cons); | 98 close(srv->cons); |
128 free(srv->keys); | |
129 return (-1); 130 } 131 132 if (listen(srv->ctrl, 10) < 0) { 133 syslog(LOG_ERR, "Could not listen on control L2CAP socket. " \ 134 "%s (%d)", strerror(errno), errno); 135 close(srv->ctrl); | 99 return (-1); 100 } 101 102 if (listen(srv->ctrl, 10) < 0) { 103 syslog(LOG_ERR, "Could not listen on control L2CAP socket. " \ 104 "%s (%d)", strerror(errno), errno); 105 close(srv->ctrl); |
136 close(srv->vkbd); | |
137 close(srv->cons); | 106 close(srv->cons); |
138 free(srv->keys); | |
139 return (-1); 140 } 141 142 /* Create intrrupt socket */ 143 srv->intr = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP); 144 if (srv->intr < 0) { 145 syslog(LOG_ERR, "Could not create interrupt L2CAP socket. " \ 146 "%s (%d)", strerror(errno), errno); 147 close(srv->ctrl); | 107 return (-1); 108 } 109 110 /* Create intrrupt socket */ 111 srv->intr = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP); 112 if (srv->intr < 0) { 113 syslog(LOG_ERR, "Could not create interrupt L2CAP socket. " \ 114 "%s (%d)", strerror(errno), errno); 115 close(srv->ctrl); |
148 close(srv->vkbd); | |
149 close(srv->cons); | 116 close(srv->cons); |
150 free(srv->keys); | |
151 return (-1); 152 } 153 154 l2addr.l2cap_psm = htole16(0x13); 155 156 if (bind(srv->intr, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) { 157 syslog(LOG_ERR, "Could not bind interrupt L2CAP socket. " \ 158 "%s (%d)", strerror(errno), errno); 159 close(srv->intr); 160 close(srv->ctrl); | 117 return (-1); 118 } 119 120 l2addr.l2cap_psm = htole16(0x13); 121 122 if (bind(srv->intr, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) { 123 syslog(LOG_ERR, "Could not bind interrupt L2CAP socket. " \ 124 "%s (%d)", strerror(errno), errno); 125 close(srv->intr); 126 close(srv->ctrl); |
161 close(srv->vkbd); | |
162 close(srv->cons); | 127 close(srv->cons); |
163 free(srv->keys); | |
164 return (-1); 165 } 166 167 if (listen(srv->intr, 10) < 0) { 168 syslog(LOG_ERR, "Could not listen on interrupt L2CAP socket. "\ 169 "%s (%d)", strerror(errno), errno); 170 close(srv->intr); 171 close(srv->ctrl); | 128 return (-1); 129 } 130 131 if (listen(srv->intr, 10) < 0) { 132 syslog(LOG_ERR, "Could not listen on interrupt L2CAP socket. "\ 133 "%s (%d)", strerror(errno), errno); 134 close(srv->intr); 135 close(srv->ctrl); |
172 close(srv->vkbd); | |
173 close(srv->cons); | 136 close(srv->cons); |
174 free(srv->keys); | |
175 return (-1); 176 } 177 178 FD_SET(srv->ctrl, &srv->rfdset); 179 FD_SET(srv->intr, &srv->rfdset); 180 srv->maxfd = max(srv->ctrl, srv->intr); 181 182 return (0); --- 4 unchanged lines hidden (view full) --- 187 */ 188 189void 190server_shutdown(bthid_server_p srv) 191{ 192 assert(srv != NULL); 193 194 close(srv->cons); | 137 return (-1); 138 } 139 140 FD_SET(srv->ctrl, &srv->rfdset); 141 FD_SET(srv->intr, &srv->rfdset); 142 srv->maxfd = max(srv->ctrl, srv->intr); 143 144 return (0); --- 4 unchanged lines hidden (view full) --- 149 */ 150 151void 152server_shutdown(bthid_server_p srv) 153{ 154 assert(srv != NULL); 155 156 close(srv->cons); |
195 close(srv->vkbd); | |
196 close(srv->ctrl); 197 close(srv->intr); 198 199 while (!LIST_EMPTY(&srv->sessions)) 200 session_close(LIST_FIRST(&srv->sessions)); 201 | 157 close(srv->ctrl); 158 close(srv->intr); 159 160 while (!LIST_EMPTY(&srv->sessions)) 161 session_close(LIST_FIRST(&srv->sessions)); 162 |
202 free(srv->keys); 203 | |
204 memset(srv, 0, sizeof(*srv)); 205} 206 207/* 208 * Do one server iteration 209 */ 210 | 163 memset(srv, 0, sizeof(*srv)); 164} 165 166/* 167 * Do one server iteration 168 */ 169 |
211int | 170int32_t |
212server_do(bthid_server_p srv) 213{ 214 struct timeval tv; 215 fd_set rfdset, wfdset; | 171server_do(bthid_server_p srv) 172{ 173 struct timeval tv; 174 fd_set rfdset, wfdset; |
216 int n, fd; | 175 int32_t n, fd; |
217 218 assert(srv != NULL); 219 220 tv.tv_sec = 1; 221 tv.tv_usec = 0; 222 223 /* Copy cached version of the fd sets and call select */ 224 memcpy(&rfdset, &srv->rfdset, sizeof(rfdset)); --- 28 unchanged lines hidden (view full) --- 253 254 return (0); 255} 256 257/* 258 * Accept new connection 259 */ 260 | 176 177 assert(srv != NULL); 178 179 tv.tv_sec = 1; 180 tv.tv_usec = 0; 181 182 /* Copy cached version of the fd sets and call select */ 183 memcpy(&rfdset, &srv->rfdset, sizeof(rfdset)); --- 28 unchanged lines hidden (view full) --- 212 213 return (0); 214} 215 216/* 217 * Accept new connection 218 */ 219 |
261static int 262server_accept(bthid_server_p srv, int fd) | 220static int32_t 221server_accept(bthid_server_p srv, int32_t fd) |
263{ | 222{ |
264 bthid_session_p s = NULL; 265 hid_device_p d = NULL; | 223 bthid_session_p s; 224 hid_device_p d; |
266 struct sockaddr_l2cap l2addr; | 225 struct sockaddr_l2cap l2addr; |
267 int len, new_fd; | 226 int32_t len, new_fd; |
268 269 len = sizeof(l2addr); 270 if ((new_fd = accept(fd, (struct sockaddr *) &l2addr, &len)) < 0) { 271 syslog(LOG_ERR, "Could not accept %s connection. %s (%d)", 272 (fd == srv->ctrl)? "control" : "interrupt", 273 strerror(errno), errno); 274 return (-1); 275 } 276 | 227 228 len = sizeof(l2addr); 229 if ((new_fd = accept(fd, (struct sockaddr *) &l2addr, &len)) < 0) { 230 syslog(LOG_ERR, "Could not accept %s connection. %s (%d)", 231 (fd == srv->ctrl)? "control" : "interrupt", 232 strerror(errno), errno); 233 return (-1); 234 } 235 |
236 /* Is device configured? */ 237 if ((d = get_hid_device(&l2addr.l2cap_bdaddr)) == NULL) { 238 syslog(LOG_ERR, "Rejecting %s connection from %s. " \ 239 "Device not configured", 240 (fd == srv->ctrl)? "control" : "interrupt", 241 bt_ntoa(&l2addr.l2cap_bdaddr, NULL)); 242 close(new_fd); 243 return (-1); 244 } 245 |
|
277 /* Check if we have session for the device */ 278 if ((s = session_by_bdaddr(srv, &l2addr.l2cap_bdaddr)) == NULL) { | 246 /* Check if we have session for the device */ 247 if ((s = session_by_bdaddr(srv, &l2addr.l2cap_bdaddr)) == NULL) { |
279 /* Is device configured? */ 280 if ((d = get_hid_device(&l2addr.l2cap_bdaddr)) == NULL) { 281 syslog(LOG_ERR, "Rejecting %s connection from %s. " \ 282 "Device not configured", 283 (fd == srv->ctrl)? "control" : "interrupt", 284 bt_ntoa(&l2addr.l2cap_bdaddr, NULL)); 285 close(new_fd); 286 return (-1); 287 } 288 | |
289 d->new_device = 0; /* reset new device flag */ 290 write_hids_file(); 291 292 /* Create new inbound session */ | 248 d->new_device = 0; /* reset new device flag */ 249 write_hids_file(); 250 251 /* Create new inbound session */ |
293 if ((s = session_open(srv, &l2addr.l2cap_bdaddr)) == NULL) { 294 syslog(LOG_CRIT, "Could not open inbound session " \ 295 "for %s. Not enough memory", 296 bt_ntoa(&l2addr.l2cap_bdaddr, NULL)); | 252 if ((s = session_open(srv, d)) == NULL) { 253 syslog(LOG_CRIT, "Could not open inbound session " 254 "for %s", bt_ntoa(&l2addr.l2cap_bdaddr, NULL)); |
297 close(new_fd); 298 return (-1); 299 } 300 } 301 302 /* Update descriptors */ 303 if (fd == srv->ctrl) { 304 assert(s->ctrl == -1); --- 8 unchanged lines hidden (view full) --- 313 FD_SET(new_fd, &srv->rfdset); 314 if (new_fd > srv->maxfd) 315 srv->maxfd = new_fd; 316 317 syslog(LOG_NOTICE, "Accepted %s connection from %s", 318 (fd == srv->ctrl)? "control" : "interrupt", 319 bt_ntoa(&l2addr.l2cap_bdaddr, NULL)); 320 | 255 close(new_fd); 256 return (-1); 257 } 258 } 259 260 /* Update descriptors */ 261 if (fd == srv->ctrl) { 262 assert(s->ctrl == -1); --- 8 unchanged lines hidden (view full) --- 271 FD_SET(new_fd, &srv->rfdset); 272 if (new_fd > srv->maxfd) 273 srv->maxfd = new_fd; 274 275 syslog(LOG_NOTICE, "Accepted %s connection from %s", 276 (fd == srv->ctrl)? "control" : "interrupt", 277 bt_ntoa(&l2addr.l2cap_bdaddr, NULL)); 278 |
279 /* Register session's vkbd descriptor (if needed) for read */ 280 if (s->state == OPEN && d->keyboard) { 281 assert(s->vkbd != -1); 282 283 FD_SET(s->vkbd, &srv->rfdset); 284 if (s->vkbd > srv->maxfd) 285 srv->maxfd = s->vkbd; 286 } 287 |
|
321 return (0); 322} 323 324/* 325 * Process data on the connection 326 */ 327 | 288 return (0); 289} 290 291/* 292 * Process data on the connection 293 */ 294 |
328static int 329server_process(bthid_server_p srv, int fd) | 295static int32_t 296server_process(bthid_server_p srv, int32_t fd) |
330{ | 297{ |
331 bthid_session_p s = session_by_fd(srv, fd); 332 char data[1024]; 333 int len; | 298 bthid_session_p s = session_by_fd(srv, fd); 299 int32_t len, to_read; 300 int32_t (*cb)(bthid_session_p, uint8_t *, int32_t); 301 union { 302 uint8_t b[1024]; 303 vkbd_status_t s; 304 } data; |
334 335 if (s == NULL) 336 return (0); /* can happen on device disconnect */ 337 | 305 306 if (s == NULL) 307 return (0); /* can happen on device disconnect */ 308 |
309 310 if (fd == s->ctrl) { 311 cb = hid_control; 312 to_read = sizeof(data.b); 313 } else if (fd == s->intr) { 314 cb = hid_interrupt; 315 to_read = sizeof(data.b); 316 } else { 317 assert(fd == s->vkbd); 318 319 cb = kbd_status_changed; 320 to_read = sizeof(data.s); 321 } 322 |
|
338 do { | 323 do { |
339 len = read(fd, data, sizeof(data)); | 324 len = read(fd, &data, to_read); |
340 } while (len < 0 && errno == EINTR); 341 342 if (len < 0) { 343 syslog(LOG_ERR, "Could not read data from %s (%s). %s (%d)", 344 bt_ntoa(&s->bdaddr, NULL), 345 (fd == s->ctrl)? "control" : "interrupt", 346 strerror(errno), errno); 347 session_close(s); 348 return (0); 349 } 350 351 if (len == 0) { 352 syslog(LOG_NOTICE, "Remote device %s has closed %s connection", 353 bt_ntoa(&s->bdaddr, NULL), 354 (fd == s->ctrl)? "control" : "interrupt"); 355 session_close(s); 356 return (0); 357 } 358 | 325 } while (len < 0 && errno == EINTR); 326 327 if (len < 0) { 328 syslog(LOG_ERR, "Could not read data from %s (%s). %s (%d)", 329 bt_ntoa(&s->bdaddr, NULL), 330 (fd == s->ctrl)? "control" : "interrupt", 331 strerror(errno), errno); 332 session_close(s); 333 return (0); 334 } 335 336 if (len == 0) { 337 syslog(LOG_NOTICE, "Remote device %s has closed %s connection", 338 bt_ntoa(&s->bdaddr, NULL), 339 (fd == s->ctrl)? "control" : "interrupt"); 340 session_close(s); 341 return (0); 342 } 343 |
359 if (fd == s->ctrl) 360 hid_control(s, data, len); 361 else 362 hid_interrupt(s, data, len); | 344 (*cb)(s, (uint8_t *) &data, len); |
363 364 return (0); 365} 366 | 345 346 return (0); 347} 348 |