1/*
2 * server.c
3 */
4
5/*-
6 * Copyright (c) 2006 Maksim Yevmenkin <m_evmenkin@yahoo.com>
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 *    notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 *    notice, this list of conditions and the following disclaimer in the
16 *    documentation and/or other materials provided with the distribution.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 * SUCH DAMAGE.
29 *
30 * $Id: server.c,v 1.9 2006/09/07 21:06:53 max Exp $
31 * $FreeBSD$
32 */
33
34#include <sys/queue.h>
35#include <assert.h>
36#include <bluetooth.h>
37#include <dev/vkbd/vkbd_var.h>
38#include <errno.h>
39#include <fcntl.h>
40#include <stdio.h>
41#include <stdlib.h>
42#include <string.h>
43#include <syslog.h>
44#include <unistd.h>
45#include <usbhid.h>
46#include "bthid_config.h"
47#include "bthidd.h"
48#include "kbd.h"
49
50#undef	max
51#define	max(x, y)	(((x) > (y))? (x) : (y))
52
53static int32_t	server_accept (bthid_server_p srv, int32_t fd);
54static int32_t	server_process(bthid_server_p srv, int32_t fd);
55
56/*
57 * Initialize server
58 */
59
60int32_t
61server_init(bthid_server_p srv)
62{
63	struct sockaddr_l2cap	l2addr;
64
65	assert(srv != NULL);
66
67	srv->ctrl = srv->intr = -1;
68	FD_ZERO(&srv->rfdset);
69	FD_ZERO(&srv->wfdset);
70	LIST_INIT(&srv->sessions);
71
72	/* Open /dev/consolectl */
73	srv->cons = open("/dev/consolectl", O_RDWR);
74	if (srv->cons < 0) {
75		syslog(LOG_ERR, "Could not open /dev/consolectl. %s (%d)",
76			strerror(errno), errno);
77		return (-1);
78	}
79
80	/* Create control socket */
81	srv->ctrl = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
82	if (srv->ctrl < 0) {
83		syslog(LOG_ERR, "Could not create control L2CAP socket. " \
84			"%s (%d)", strerror(errno), errno);
85		close(srv->cons);
86		return (-1);
87	}
88
89	l2addr.l2cap_len = sizeof(l2addr);
90	l2addr.l2cap_family = AF_BLUETOOTH;
91	memcpy(&l2addr.l2cap_bdaddr, &srv->bdaddr, sizeof(l2addr.l2cap_bdaddr));
92	l2addr.l2cap_psm = htole16(0x11);
93
94	if (bind(srv->ctrl, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) {
95		syslog(LOG_ERR, "Could not bind control L2CAP socket. " \
96			"%s (%d)", strerror(errno), errno);
97		close(srv->ctrl);
98		close(srv->cons);
99		return (-1);
100	}
101
102	if (listen(srv->ctrl, 10) < 0) {
103		syslog(LOG_ERR, "Could not listen on control L2CAP socket. " \
104			"%s (%d)", strerror(errno), errno);
105		close(srv->ctrl);
106		close(srv->cons);
107		return (-1);
108	}
109
110	/* Create intrrupt socket */
111	srv->intr = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
112	if (srv->intr < 0) {
113		syslog(LOG_ERR, "Could not create interrupt L2CAP socket. " \
114			"%s (%d)", strerror(errno), errno);
115		close(srv->ctrl);
116		close(srv->cons);
117		return (-1);
118	}
119
120	l2addr.l2cap_psm = htole16(0x13);
121
122	if (bind(srv->intr, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) {
123		syslog(LOG_ERR, "Could not bind interrupt L2CAP socket. " \
124			"%s (%d)", strerror(errno), errno);
125		close(srv->intr);
126		close(srv->ctrl);
127		close(srv->cons);
128		return (-1);
129	}
130
131	if (listen(srv->intr, 10) < 0) {
132		syslog(LOG_ERR, "Could not listen on interrupt L2CAP socket. "\
133			"%s (%d)", strerror(errno), errno);
134		close(srv->intr);
135		close(srv->ctrl);
136		close(srv->cons);
137		return (-1);
138	}
139
140	FD_SET(srv->ctrl, &srv->rfdset);
141	FD_SET(srv->intr, &srv->rfdset);
142	srv->maxfd = max(srv->ctrl, srv->intr);
143
144	return (0);
145}
146
147/*
148 * Shutdown server
149 */
150
151void
152server_shutdown(bthid_server_p srv)
153{
154	assert(srv != NULL);
155
156	close(srv->cons);
157	close(srv->ctrl);
158	close(srv->intr);
159
160	while (!LIST_EMPTY(&srv->sessions))
161		session_close(LIST_FIRST(&srv->sessions));
162
163	memset(srv, 0, sizeof(*srv));
164}
165
166/*
167 * Do one server iteration
168 */
169
170int32_t
171server_do(bthid_server_p srv)
172{
173	struct timeval	tv;
174	fd_set		rfdset, wfdset;
175	int32_t		n, fd;
176
177	assert(srv != NULL);
178
179	tv.tv_sec = 1;
180	tv.tv_usec = 0;
181
182	/* Copy cached version of the fd sets and call select */
183	memcpy(&rfdset, &srv->rfdset, sizeof(rfdset));
184	memcpy(&wfdset, &srv->wfdset, sizeof(wfdset));
185
186	n = select(srv->maxfd + 1, &rfdset, &wfdset, NULL, &tv);
187	if (n < 0) {
188		if (errno == EINTR)
189			return (0);
190
191		syslog(LOG_ERR, "Could not select(%d, %p, %p). %s (%d)",
192			srv->maxfd + 1, &rfdset, &wfdset, strerror(errno), errno);
193
194		return (-1);
195	}
196
197	/* Process descriptors (if any) */
198	for (fd = 0; fd < srv->maxfd + 1 && n > 0; fd ++) {
199		if (FD_ISSET(fd, &rfdset)) {
200			n --;
201
202			if (fd == srv->ctrl || fd == srv->intr)
203				server_accept(srv, fd);
204			else
205				server_process(srv, fd);
206		} else if (FD_ISSET(fd, &wfdset)) {
207			n --;
208
209			client_connect(srv, fd);
210		}
211	}
212
213	return (0);
214}
215
216/*
217 * Accept new connection
218 */
219
220static int32_t
221server_accept(bthid_server_p srv, int32_t fd)
222{
223	bthid_session_p		s;
224	hid_device_p		d;
225	struct sockaddr_l2cap	l2addr;
226	int32_t			new_fd;
227	socklen_t		len;
228
229	len = sizeof(l2addr);
230	if ((new_fd = accept(fd, (struct sockaddr *) &l2addr, &len)) < 0) {
231		syslog(LOG_ERR, "Could not accept %s connection. %s (%d)",
232			(fd == srv->ctrl)? "control" : "interrupt",
233			strerror(errno), errno);
234		return (-1);
235	}
236
237	/* Is device configured? */
238	if ((d = get_hid_device(&l2addr.l2cap_bdaddr)) == NULL) {
239		syslog(LOG_ERR, "Rejecting %s connection from %s. " \
240			"Device not configured",
241			(fd == srv->ctrl)? "control" : "interrupt",
242			bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
243		close(new_fd);
244		return (-1);
245	}
246
247	/* Check if we have session for the device */
248	if ((s = session_by_bdaddr(srv, &l2addr.l2cap_bdaddr)) == NULL) {
249		d->new_device = 0; /* reset new device flag */
250		write_hids_file();
251
252		/* Create new inbound session */
253		if ((s = session_open(srv, d)) == NULL) {
254			syslog(LOG_CRIT, "Could not open inbound session "
255				"for %s", bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
256			close(new_fd);
257			return (-1);
258		}
259	}
260
261	/* Update descriptors */
262	if (fd == srv->ctrl) {
263		assert(s->ctrl == -1);
264		s->ctrl = new_fd;
265		s->state = (s->intr == -1)? W4INTR : OPEN;
266	} else {
267		assert(s->intr == -1);
268		s->intr = new_fd;
269		s->state = (s->ctrl == -1)? W4CTRL : OPEN;
270	}
271
272	FD_SET(new_fd, &srv->rfdset);
273	if (new_fd > srv->maxfd)
274		srv->maxfd = new_fd;
275
276	syslog(LOG_NOTICE, "Accepted %s connection from %s",
277		(fd == srv->ctrl)? "control" : "interrupt",
278		bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
279
280	/* Register session's vkbd descriptor (if needed) for read */
281	if (s->state == OPEN && d->keyboard) {
282		assert(s->vkbd != -1);
283
284		FD_SET(s->vkbd, &srv->rfdset);
285		if (s->vkbd > srv->maxfd)
286			srv->maxfd = s->vkbd;
287	}
288
289	return (0);
290}
291
292/*
293 * Process data on the connection
294 */
295
296static int32_t
297server_process(bthid_server_p srv, int32_t fd)
298{
299	bthid_session_p		s = session_by_fd(srv, fd);
300	int32_t			len, to_read;
301	int32_t			(*cb)(bthid_session_p, uint8_t *, int32_t);
302	union {
303		uint8_t		b[1024];
304		vkbd_status_t	s;
305	}			data;
306
307	if (s == NULL)
308		return (0); /* can happen on device disconnect */
309
310
311	if (fd == s->ctrl) {
312		cb = hid_control;
313		to_read = sizeof(data.b);
314	} else if (fd == s->intr) {
315		cb = hid_interrupt;
316		to_read = sizeof(data.b);
317	} else {
318		assert(fd == s->vkbd);
319
320		cb = kbd_status_changed;
321		to_read = sizeof(data.s);
322	}
323
324	do {
325		len = read(fd, &data, to_read);
326	} while (len < 0 && errno == EINTR);
327
328	if (len < 0) {
329		syslog(LOG_ERR, "Could not read data from %s (%s). %s (%d)",
330			bt_ntoa(&s->bdaddr, NULL),
331			(fd == s->ctrl)? "control" : "interrupt",
332			strerror(errno), errno);
333		session_close(s);
334		return (0);
335	}
336
337	if (len == 0) {
338		syslog(LOG_NOTICE, "Remote device %s has closed %s connection",
339			bt_ntoa(&s->bdaddr, NULL),
340			(fd == s->ctrl)? "control" : "interrupt");
341		session_close(s);
342		return (0);
343	}
344
345	(*cb)(s, (uint8_t *) &data, len);
346
347	return (0);
348}
349
350