mirror of
https://git.kernel.org/pub/scm/bluetooth/bluez.git
synced 2024-11-30 07:34:27 +08:00
882 lines
19 KiB
C
882 lines
19 KiB
C
/*
|
|
*
|
|
* BlueZ - Bluetooth protocol stack for Linux
|
|
*
|
|
* Copyright (C) 2000-2001 Qualcomm Incorporated
|
|
* Copyright (C) 2002-2003 Maxim Krasnyansky <maxk@qualcomm.com>
|
|
* Copyright (C) 2002-2006 Marcel Holtmann <marcel@holtmann.org>
|
|
*
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <errno.h>
|
|
#include <ctype.h>
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <malloc.h>
|
|
#include <string.h>
|
|
#include <signal.h>
|
|
#include <syslog.h>
|
|
#include <time.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/socket.h>
|
|
|
|
#include <bluetooth/bluetooth.h>
|
|
#include <bluetooth/hci.h>
|
|
#include <bluetooth/hci_lib.h>
|
|
|
|
#include "glib-ectomy.h"
|
|
|
|
#include "hcid.h"
|
|
#include "lib.h"
|
|
|
|
static GIOChannel *io_chan[HCI_MAX_DEV];
|
|
|
|
static int pairing;
|
|
|
|
void toggle_pairing(int enable)
|
|
{
|
|
if (enable)
|
|
pairing = hcid.pairing;
|
|
else
|
|
pairing = 0;
|
|
|
|
syslog(LOG_INFO, "Pairing %s", pairing ? "enabled" : "disabled");
|
|
}
|
|
|
|
static inline int get_bdaddr(int dev, bdaddr_t *sba, uint16_t handle, bdaddr_t *dba)
|
|
{
|
|
struct hci_conn_list_req *cl;
|
|
struct hci_conn_info *ci;
|
|
char addr[18];
|
|
int i;
|
|
|
|
cl = malloc(10 * sizeof(*ci) + sizeof(*cl));
|
|
if (!cl)
|
|
return -ENOMEM;
|
|
|
|
ba2str(sba, addr);
|
|
cl->dev_id = hci_devid(addr);
|
|
cl->conn_num = 10;
|
|
ci = cl->conn_info;
|
|
|
|
if (ioctl(dev, HCIGETCONNLIST, (void *) cl) < 0) {
|
|
free(cl);
|
|
return -EIO;
|
|
}
|
|
|
|
for (i = 0; i < cl->conn_num; i++, ci++)
|
|
if (ci->handle == handle) {
|
|
bacpy(dba, &ci->bdaddr);
|
|
free(cl);
|
|
return 0;
|
|
}
|
|
|
|
free(cl);
|
|
return -ENOENT;
|
|
}
|
|
|
|
/* Link Key handling */
|
|
|
|
/* This function is not reentrable */
|
|
static struct link_key *__get_link_key(int f, bdaddr_t *sba, bdaddr_t *dba)
|
|
{
|
|
static struct link_key k;
|
|
struct link_key *key = NULL;
|
|
int r;
|
|
|
|
while ((r = read_n(f, &k, sizeof(k)))) {
|
|
if (r < 0) {
|
|
syslog(LOG_ERR, "Link key database read failed: %s (%d)",
|
|
strerror(errno), errno);
|
|
break;
|
|
}
|
|
|
|
if (!bacmp(&k.sba, sba) && !bacmp(&k.dba, dba)) {
|
|
key = &k;
|
|
break;
|
|
}
|
|
}
|
|
|
|
return key;
|
|
}
|
|
|
|
static struct link_key *get_link_key(bdaddr_t *sba, bdaddr_t *dba)
|
|
{
|
|
struct link_key *key = NULL;
|
|
int f;
|
|
|
|
f = open(hcid.key_file, O_RDONLY);
|
|
if (f >= 0)
|
|
key = __get_link_key(f, sba, dba);
|
|
else if (errno != ENOENT)
|
|
syslog(LOG_ERR, "Link key database open failed: %s (%d)",
|
|
strerror(errno), errno);
|
|
|
|
close(f);
|
|
|
|
return key;
|
|
}
|
|
|
|
static void link_key_request(int dev, bdaddr_t *sba, bdaddr_t *dba)
|
|
{
|
|
unsigned char key[16];
|
|
char sa[18], da[18];
|
|
int err;
|
|
|
|
ba2str(sba, sa); ba2str(dba, da);
|
|
syslog(LOG_INFO, "link_key_request (sba=%s, dba=%s)", sa, da);
|
|
|
|
err = read_link_key(sba, dba, key);
|
|
if (err < 0) {
|
|
struct link_key *linkkey = get_link_key(sba, dba);
|
|
if (linkkey) {
|
|
memcpy(key, linkkey->key, 16);
|
|
linkkey->time = time(0);
|
|
err = 0;
|
|
}
|
|
}
|
|
|
|
if (err < 0) {
|
|
/* Link key not found */
|
|
hci_send_cmd(dev, OGF_LINK_CTL, OCF_LINK_KEY_NEG_REPLY, 6, dba);
|
|
} else {
|
|
/* Link key found */
|
|
link_key_reply_cp lr;
|
|
memcpy(lr.link_key, key, 16);
|
|
bacpy(&lr.bdaddr, dba);
|
|
hci_send_cmd(dev, OGF_LINK_CTL, OCF_LINK_KEY_REPLY,
|
|
LINK_KEY_REPLY_CP_SIZE, &lr);
|
|
}
|
|
}
|
|
|
|
#if 0
|
|
static void save_link_key(struct link_key *key)
|
|
{
|
|
struct link_key *exist;
|
|
char sa[18], da[18];
|
|
int f, err;
|
|
|
|
f = open(hcid.key_file, O_RDWR | O_CREAT, S_IRUSR | S_IWUSR);
|
|
if (f < 0) {
|
|
syslog(LOG_ERR, "Link key database open failed: %s (%d)",
|
|
strerror(errno), errno);
|
|
return;
|
|
}
|
|
|
|
/* Check if key already exist */
|
|
exist = __get_link_key(f, &key->sba, &key->dba);
|
|
|
|
err = 0;
|
|
|
|
if (exist) {
|
|
off_t o = lseek(f, 0, SEEK_CUR);
|
|
err = lseek(f, o - sizeof(*key), SEEK_SET);
|
|
} else
|
|
err = fcntl(f, F_SETFL, O_APPEND);
|
|
|
|
if (err < 0) {
|
|
syslog(LOG_ERR, "Link key database seek failed: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto failed;
|
|
}
|
|
|
|
if (write_n(f, key, sizeof(*key)) < 0) {
|
|
syslog(LOG_ERR, "Link key database write failed: %s (%d)",
|
|
strerror(errno), errno);
|
|
}
|
|
|
|
ba2str(&key->sba, sa); ba2str(&key->dba, da);
|
|
syslog(LOG_INFO, "%s link key %s %s", exist ? "Replacing" : "Saving", sa, da);
|
|
|
|
failed:
|
|
close(f);
|
|
}
|
|
#endif
|
|
|
|
static void link_key_notify(int dev, bdaddr_t *sba, void *ptr)
|
|
{
|
|
evt_link_key_notify *evt = ptr;
|
|
bdaddr_t *dba = &evt->bdaddr;
|
|
struct link_key key;
|
|
char sa[18], da[18];
|
|
|
|
ba2str(sba, sa); ba2str(dba, da);
|
|
syslog(LOG_INFO, "link_key_notify (sba=%s, dba=%s)", sa, da);
|
|
|
|
memcpy(key.key, evt->link_key, 16);
|
|
bacpy(&key.sba, sba);
|
|
bacpy(&key.dba, dba);
|
|
key.type = evt->key_type;
|
|
key.time = time(0);
|
|
|
|
#if 0
|
|
save_link_key(&key);
|
|
#endif
|
|
|
|
write_link_key(sba, dba, evt->link_key, evt->key_type);
|
|
}
|
|
|
|
static void return_link_keys(int dev, bdaddr_t *sba, void *ptr)
|
|
{
|
|
evt_return_link_keys *evt = ptr;
|
|
uint8_t num = evt->num_keys;
|
|
unsigned char key[16];
|
|
char sa[18], da[18];
|
|
bdaddr_t dba;
|
|
int i;
|
|
|
|
ba2str(sba, sa);
|
|
ptr++;
|
|
|
|
for (i = 0; i < num; i++) {
|
|
bacpy(&dba, ptr); ba2str(&dba, da);
|
|
memcpy(key, ptr + 6, 16);
|
|
|
|
syslog(LOG_INFO, "return_link_keys (sba=%s, dba=%s)", sa, da);
|
|
|
|
ptr += 22;
|
|
}
|
|
}
|
|
|
|
/* PIN code handling */
|
|
|
|
static int read_default_pin_code(void)
|
|
{
|
|
char buf[17];
|
|
FILE *f;
|
|
int len;
|
|
|
|
if (!(f = fopen(hcid.pin_file, "r"))) {
|
|
syslog(LOG_ERR, "Can't open PIN file %s: %s (%d)",
|
|
hcid.pin_file, strerror(errno), errno);
|
|
return -1;
|
|
}
|
|
|
|
if (fgets(buf, sizeof(buf), f)) {
|
|
strtok(buf, "\n\r");
|
|
len = strlen(buf);
|
|
memcpy(hcid.pin_code, buf, len);
|
|
hcid.pin_len = len;
|
|
} else {
|
|
syslog(LOG_ERR, "Can't read PIN file %s: %s (%d)",
|
|
hcid.pin_file, strerror(errno), errno);
|
|
len = -1;
|
|
}
|
|
|
|
fclose(f);
|
|
|
|
return len;
|
|
}
|
|
|
|
/*
|
|
PIN helper is an external app that asks user for a PIN. It can
|
|
implement its own PIN code generation policy and methods like
|
|
PIN look up in some database, etc.
|
|
HCId expects following output from PIN helper:
|
|
PIN:12345678 - PIN code
|
|
ERR - No PIN available
|
|
*/
|
|
|
|
static void call_pin_helper(int dev, bdaddr_t *sba, struct hci_conn_info *ci)
|
|
{
|
|
pin_code_reply_cp pr;
|
|
struct sigaction sa;
|
|
char addr[18], str[512], *pin, name[249], tmp[497], *ptr;
|
|
FILE *pipe;
|
|
int i, ret, len;
|
|
|
|
/* Run PIN helper in the separate process */
|
|
switch (fork()) {
|
|
case 0:
|
|
break;
|
|
case -1:
|
|
syslog(LOG_ERR, "Can't fork PIN helper: %s (%d)",
|
|
strerror(errno), errno);
|
|
default:
|
|
return;
|
|
}
|
|
|
|
if (access(hcid.pin_helper, R_OK | X_OK)) {
|
|
syslog(LOG_ERR, "Can't exec PIN helper %s: %s (%d)",
|
|
hcid.pin_helper, strerror(errno), errno);
|
|
goto reject;
|
|
}
|
|
|
|
memset(name, 0, sizeof(name));
|
|
read_device_name(sba, &ci->bdaddr, name);
|
|
//hci_remote_name(dev, &ci->bdaddr, sizeof(name), name, 0);
|
|
|
|
memset(tmp, 0, sizeof(tmp));
|
|
ptr = tmp;
|
|
|
|
for (i = 0; i < 248 && name[i]; i++)
|
|
if (isprint(name[i])) {
|
|
switch (name[i]) {
|
|
case '"':
|
|
case '`':
|
|
case '$':
|
|
case '|':
|
|
case '>':
|
|
case '<':
|
|
case '&':
|
|
case ';':
|
|
case '\\':
|
|
*ptr++ = '\\';
|
|
}
|
|
*ptr++ = name[i];
|
|
} else {
|
|
name[i] = '.';
|
|
*ptr++ = '.';
|
|
}
|
|
|
|
ba2str(&ci->bdaddr, addr);
|
|
snprintf(str, sizeof(str), "%s %s %s \"%s\"", hcid.pin_helper,
|
|
ci->out ? "out" : "in", addr, tmp);
|
|
|
|
setenv("PATH", "/bin:/usr/bin:/usr/local/bin", 1);
|
|
|
|
memset(&sa, 0, sizeof(sa));
|
|
sa.sa_flags = SA_NOCLDSTOP;
|
|
sa.sa_handler = SIG_DFL;
|
|
sigaction(SIGCHLD, &sa, NULL);
|
|
|
|
pipe = popen(str, "r");
|
|
if (!pipe) {
|
|
syslog(LOG_ERR, "Can't exec PIN helper: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto reject;
|
|
}
|
|
|
|
pin = fgets(str, sizeof(str), pipe);
|
|
ret = pclose(pipe);
|
|
|
|
if (!pin || strlen(pin) < 5)
|
|
goto nopin;
|
|
|
|
strtok(pin, "\n\r");
|
|
|
|
if (strncmp("PIN:", pin, 4))
|
|
goto nopin;
|
|
|
|
pin += 4;
|
|
len = strlen(pin);
|
|
|
|
memset(&pr, 0, sizeof(pr));
|
|
bacpy(&pr.bdaddr, &ci->bdaddr);
|
|
memcpy(pr.pin_code, pin, len);
|
|
pr.pin_len = len;
|
|
hci_send_cmd(dev, OGF_LINK_CTL, OCF_PIN_CODE_REPLY,
|
|
PIN_CODE_REPLY_CP_SIZE, &pr);
|
|
exit(0);
|
|
|
|
nopin:
|
|
if (!pin || strncmp("ERR", pin, 3))
|
|
syslog(LOG_ERR, "PIN helper exited abnormally with code %d", ret);
|
|
|
|
reject:
|
|
hci_send_cmd(dev, OGF_LINK_CTL, OCF_PIN_CODE_NEG_REPLY, 6, &ci->bdaddr);
|
|
exit(0);
|
|
}
|
|
|
|
static void request_pin(int dev, bdaddr_t *sba, struct hci_conn_info *ci)
|
|
{
|
|
#ifdef ENABLE_DBUS
|
|
if (hcid.dbus_pin_helper) {
|
|
hcid_dbus_request_pin(dev, ci);
|
|
return;
|
|
}
|
|
#endif
|
|
call_pin_helper(dev, sba, ci);
|
|
}
|
|
|
|
static void pin_code_request(int dev, bdaddr_t *sba, bdaddr_t *dba)
|
|
{
|
|
pin_code_reply_cp pr;
|
|
struct hci_conn_info_req *cr;
|
|
struct hci_conn_info *ci;
|
|
char sa[18], da[18], pin[17];
|
|
int pinlen;
|
|
|
|
memset(&pr, 0, sizeof(pr));
|
|
bacpy(&pr.bdaddr, dba);
|
|
|
|
ba2str(sba, sa); ba2str(dba, da);
|
|
syslog(LOG_INFO, "pin_code_request (sba=%s, dba=%s)", sa, da);
|
|
|
|
cr = malloc(sizeof(*cr) + sizeof(*ci));
|
|
if (!cr)
|
|
return;
|
|
|
|
bacpy(&cr->bdaddr, dba);
|
|
cr->type = ACL_LINK;
|
|
if (ioctl(dev, HCIGETCONNINFO, (unsigned long) cr) < 0) {
|
|
syslog(LOG_ERR, "Can't get conn info: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto reject;
|
|
}
|
|
ci = cr->conn_info;
|
|
|
|
memset(pin, 0, sizeof(pin));
|
|
pinlen = read_pin_code(sba, dba, pin);
|
|
|
|
if (pairing == HCID_PAIRING_ONCE) {
|
|
struct link_key *key = get_link_key(sba, dba);
|
|
if (key) {
|
|
ba2str(dba, da);
|
|
syslog(LOG_WARNING, "PIN code request for already paired device %s", da);
|
|
goto reject;
|
|
}
|
|
} else if (pairing == HCID_PAIRING_NONE)
|
|
goto reject;
|
|
|
|
if (hcid.security == HCID_SEC_AUTO) {
|
|
if (!ci->out) {
|
|
/* Incomming connection */
|
|
memcpy(pr.pin_code, hcid.pin_code, hcid.pin_len);
|
|
pr.pin_len = hcid.pin_len;
|
|
hci_send_cmd(dev, OGF_LINK_CTL, OCF_PIN_CODE_REPLY,
|
|
PIN_CODE_REPLY_CP_SIZE, &pr);
|
|
} else {
|
|
/* Outgoing connection */
|
|
if (pinlen > 0) {
|
|
memcpy(pr.pin_code, pin, pinlen);
|
|
pr.pin_len = pinlen;
|
|
hci_send_cmd(dev, OGF_LINK_CTL, OCF_PIN_CODE_REPLY,
|
|
PIN_CODE_REPLY_CP_SIZE, &pr);
|
|
} else {
|
|
/* Let PIN helper handle that */
|
|
request_pin(dev, sba, ci);
|
|
}
|
|
}
|
|
} else {
|
|
/* Let PIN helper handle that */
|
|
request_pin(dev, sba, ci);
|
|
}
|
|
free(cr);
|
|
return;
|
|
|
|
reject:
|
|
hci_send_cmd(dev, OGF_LINK_CTL, OCF_PIN_CODE_NEG_REPLY, 6, dba);
|
|
free(cr);
|
|
return;
|
|
}
|
|
|
|
static inline void cmd_status(int dev, bdaddr_t *sba, void *ptr)
|
|
{
|
|
evt_cmd_status *evt = ptr;
|
|
|
|
if (evt->status)
|
|
return;
|
|
|
|
if (evt->opcode == cmd_opcode_pack(OGF_LINK_CTL, OCF_INQUIRY))
|
|
hcid_dbus_inquiry_start(sba);
|
|
}
|
|
|
|
static inline void cmd_complete(int dev, bdaddr_t *sba, void *ptr)
|
|
{
|
|
evt_cmd_complete *evt = ptr;
|
|
switch (evt->opcode) {
|
|
case cmd_opcode_pack(OGF_LINK_CTL, OCF_INQUIRY_CANCEL):
|
|
hcid_dbus_inquiry_complete(sba);
|
|
break;
|
|
case cmd_opcode_pack(OGF_HOST_CTL, OCF_CHANGE_LOCAL_NAME):
|
|
hcid_dbus_setname_complete(sba);
|
|
break;
|
|
case cmd_opcode_pack(OGF_HOST_CTL, OCF_WRITE_SCAN_ENABLE):
|
|
hcid_dbus_setscan_enable_complete(sba);
|
|
break;
|
|
};
|
|
}
|
|
|
|
static inline void remote_name_information(int dev, bdaddr_t *sba, void *ptr)
|
|
{
|
|
evt_remote_name_req_complete *evt = ptr;
|
|
bdaddr_t dba;
|
|
|
|
bacpy(&dba, &evt->bdaddr);
|
|
|
|
if (!evt->status) {
|
|
char name[249];
|
|
memset(name, 0, sizeof(name));
|
|
memcpy(name, evt->name, 248);
|
|
write_device_name(sba, &dba, name);
|
|
hcid_dbus_remote_name(sba, &dba, name);
|
|
} else
|
|
hcid_dbus_remote_name_failed(sba, &dba, evt->status);
|
|
}
|
|
|
|
static inline void remote_version_information(int dev, bdaddr_t *sba, void *ptr)
|
|
{
|
|
evt_read_remote_version_complete *evt = ptr;
|
|
bdaddr_t dba;
|
|
|
|
if (evt->status)
|
|
return;
|
|
|
|
if (get_bdaddr(dev, sba, btohs(evt->handle), &dba) < 0)
|
|
return;
|
|
|
|
write_version_info(sba, &dba, btohs(evt->manufacturer),
|
|
evt->lmp_ver, btohs(evt->lmp_subver));
|
|
}
|
|
|
|
static inline void inquiry_complete(int dev, bdaddr_t *sba, void *ptr)
|
|
{
|
|
hcid_dbus_inquiry_complete(sba);
|
|
}
|
|
|
|
static inline void inquiry_result(int dev, bdaddr_t *sba, int plen, void *ptr)
|
|
{
|
|
uint8_t num = *(uint8_t *) ptr++;
|
|
int i;
|
|
|
|
for (i = 0; i < num; i++) {
|
|
inquiry_info *info = ptr;
|
|
uint32_t class = info->dev_class[0]
|
|
| (info->dev_class[1] << 8)
|
|
| (info->dev_class[2] << 16);
|
|
|
|
hcid_dbus_inquiry_result(sba, &info->bdaddr, class, 0);
|
|
|
|
ptr += INQUIRY_INFO_SIZE;
|
|
}
|
|
}
|
|
|
|
static inline void inquiry_result_with_rssi(int dev, bdaddr_t *sba, int plen, void *ptr)
|
|
{
|
|
uint8_t num = *(uint8_t *) ptr++;
|
|
int i;
|
|
|
|
if (!num)
|
|
return;
|
|
|
|
if ((plen - 1) / num == INQUIRY_INFO_WITH_RSSI_AND_PSCAN_MODE_SIZE) {
|
|
for (i = 0; i < num; i++) {
|
|
inquiry_info_with_rssi_and_pscan_mode *info = ptr;
|
|
uint32_t class = info->dev_class[0]
|
|
| (info->dev_class[1] << 8)
|
|
| (info->dev_class[2] << 16);
|
|
|
|
hcid_dbus_inquiry_result(sba, &info->bdaddr,
|
|
class, info->rssi);
|
|
|
|
ptr += INQUIRY_INFO_WITH_RSSI_AND_PSCAN_MODE_SIZE;
|
|
}
|
|
} else {
|
|
for (i = 0; i < num; i++) {
|
|
inquiry_info_with_rssi *info = ptr;
|
|
uint32_t class = info->dev_class[0]
|
|
| (info->dev_class[1] << 8)
|
|
| (info->dev_class[2] << 16);
|
|
|
|
hcid_dbus_inquiry_result(sba, &info->bdaddr,
|
|
class, info->rssi);
|
|
|
|
ptr += INQUIRY_INFO_WITH_RSSI_SIZE;
|
|
}
|
|
}
|
|
}
|
|
|
|
static inline void extended_inquiry_result(int dev, bdaddr_t *sba, int plen, void *ptr)
|
|
{
|
|
uint8_t num = *(uint8_t *) ptr++;
|
|
int i;
|
|
|
|
for (i = 0; i < num; i++) {
|
|
extended_inquiry_info *info = ptr;
|
|
uint32_t class = info->dev_class[0]
|
|
| (info->dev_class[1] << 8)
|
|
| (info->dev_class[2] << 16);
|
|
|
|
hcid_dbus_inquiry_result(sba, &info->bdaddr, class, info->rssi);
|
|
|
|
ptr += EXTENDED_INQUIRY_INFO_SIZE;
|
|
}
|
|
}
|
|
|
|
static inline void remote_features_information(int dev, bdaddr_t *sba, void *ptr)
|
|
{
|
|
evt_read_remote_features_complete *evt = ptr;
|
|
bdaddr_t dba;
|
|
|
|
if (evt->status)
|
|
return;
|
|
|
|
if (get_bdaddr(dev, sba, btohs(evt->handle), &dba) < 0)
|
|
return;
|
|
|
|
write_features_info(sba, &dba, evt->features);
|
|
}
|
|
|
|
static inline void conn_complete(int dev, bdaddr_t *sba, void *ptr)
|
|
{
|
|
evt_conn_complete *evt = ptr;
|
|
|
|
if (evt->status)
|
|
return;
|
|
|
|
hcid_dbus_conn_complete(sba, &evt->bdaddr);
|
|
}
|
|
|
|
static inline void disconn_complete(int dev, bdaddr_t *sba, void *ptr)
|
|
{
|
|
evt_disconn_complete *evt = ptr;
|
|
bdaddr_t dba;
|
|
|
|
if (evt->status)
|
|
return;
|
|
|
|
bacpy(&dba, BDADDR_ANY);
|
|
|
|
hcid_dbus_disconn_complete(sba, &dba, evt->reason);
|
|
}
|
|
|
|
static inline void auth_complete(int dev, bdaddr_t *sba, void *ptr)
|
|
{
|
|
evt_auth_complete *evt = ptr;
|
|
bdaddr_t dba;
|
|
|
|
if (get_bdaddr(dev, sba, evt->handle, &dba) < 0)
|
|
return;
|
|
|
|
hcid_dbus_auth_complete(sba, &dba, evt->status);
|
|
}
|
|
|
|
|
|
static gboolean io_security_event(GIOChannel *chan, GIOCondition cond, gpointer data)
|
|
{
|
|
unsigned char buf[HCI_MAX_EVENT_SIZE], *ptr = buf;
|
|
struct hci_dev_info *di = (void *) data;
|
|
int type, dev;
|
|
size_t len;
|
|
hci_event_hdr *eh;
|
|
GIOError err;
|
|
|
|
if (cond & (G_IO_NVAL | G_IO_HUP | G_IO_ERR)) {
|
|
g_io_channel_close(chan);
|
|
free(data);
|
|
return FALSE;
|
|
}
|
|
|
|
if ((err = g_io_channel_read(chan, (gchar *) buf, sizeof(buf), &len))) {
|
|
if (err == G_IO_ERROR_AGAIN)
|
|
return TRUE;
|
|
g_io_channel_close(chan);
|
|
free(data);
|
|
return FALSE;
|
|
}
|
|
|
|
type = *ptr++;
|
|
|
|
if (type != HCI_EVENT_PKT)
|
|
return TRUE;
|
|
|
|
eh = (hci_event_hdr *) ptr;
|
|
ptr += HCI_EVENT_HDR_SIZE;
|
|
|
|
dev = g_io_channel_unix_get_fd(chan);
|
|
|
|
ioctl(dev, HCIGETDEVINFO, (void *) di);
|
|
|
|
if (hci_test_bit(HCI_RAW, &di->flags))
|
|
return TRUE;
|
|
|
|
switch (eh->evt) {
|
|
case EVT_CMD_STATUS:
|
|
cmd_status(dev, &di->bdaddr, ptr);
|
|
break;
|
|
|
|
case EVT_CMD_COMPLETE:
|
|
cmd_complete(dev, &di->bdaddr, ptr);
|
|
break;
|
|
|
|
case EVT_REMOTE_NAME_REQ_COMPLETE:
|
|
remote_name_information(dev, &di->bdaddr, ptr);
|
|
break;
|
|
|
|
case EVT_READ_REMOTE_VERSION_COMPLETE:
|
|
remote_version_information(dev, &di->bdaddr, ptr);
|
|
break;
|
|
|
|
case EVT_READ_REMOTE_FEATURES_COMPLETE:
|
|
remote_features_information(dev, &di->bdaddr, ptr);
|
|
break;
|
|
|
|
case EVT_INQUIRY_COMPLETE:
|
|
inquiry_complete(dev, &di->bdaddr, ptr);
|
|
break;
|
|
|
|
case EVT_INQUIRY_RESULT:
|
|
inquiry_result(dev, &di->bdaddr, eh->plen, ptr);
|
|
break;
|
|
|
|
case EVT_INQUIRY_RESULT_WITH_RSSI:
|
|
inquiry_result_with_rssi(dev, &di->bdaddr, eh->plen, ptr);
|
|
break;
|
|
|
|
case EVT_EXTENDED_INQUIRY_RESULT:
|
|
extended_inquiry_result(dev, &di->bdaddr, eh->plen, ptr);
|
|
break;
|
|
|
|
case EVT_CONN_COMPLETE:
|
|
conn_complete(dev, &di->bdaddr, ptr);
|
|
break;
|
|
|
|
case EVT_DISCONN_COMPLETE:
|
|
disconn_complete(dev, &di->bdaddr, ptr);
|
|
break;
|
|
|
|
case EVT_AUTH_COMPLETE:
|
|
auth_complete(dev, &di->bdaddr, ptr);
|
|
break;
|
|
}
|
|
|
|
if (hci_test_bit(HCI_SECMGR, &di->flags))
|
|
return TRUE;
|
|
|
|
switch (eh->evt) {
|
|
case EVT_PIN_CODE_REQ:
|
|
pin_code_request(dev, &di->bdaddr, (bdaddr_t *) ptr);
|
|
break;
|
|
|
|
case EVT_LINK_KEY_REQ:
|
|
link_key_request(dev, &di->bdaddr, (bdaddr_t *) ptr);
|
|
break;
|
|
|
|
case EVT_LINK_KEY_NOTIFY:
|
|
link_key_notify(dev, &di->bdaddr, ptr);
|
|
break;
|
|
|
|
case EVT_RETURN_LINK_KEYS:
|
|
return_link_keys(dev, &di->bdaddr, ptr);
|
|
break;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
void start_security_manager(int hdev)
|
|
{
|
|
GIOChannel *chan = io_chan[hdev];
|
|
struct hci_dev_info *di;
|
|
struct hci_filter flt;
|
|
read_stored_link_key_cp cp;
|
|
int dev;
|
|
|
|
if (chan)
|
|
return;
|
|
|
|
syslog(LOG_INFO, "Starting security manager %d", hdev);
|
|
|
|
if ((dev = hci_open_dev(hdev)) < 0) {
|
|
syslog(LOG_ERR, "Can't open device hci%d: %s (%d)",
|
|
hdev, strerror(errno), errno);
|
|
return;
|
|
}
|
|
|
|
/* Set filter */
|
|
hci_filter_clear(&flt);
|
|
hci_filter_set_ptype(HCI_EVENT_PKT, &flt);
|
|
hci_filter_set_event(EVT_CMD_STATUS, &flt);
|
|
hci_filter_set_event(EVT_CMD_COMPLETE, &flt);
|
|
hci_filter_set_event(EVT_PIN_CODE_REQ, &flt);
|
|
hci_filter_set_event(EVT_LINK_KEY_REQ, &flt);
|
|
hci_filter_set_event(EVT_LINK_KEY_NOTIFY, &flt);
|
|
hci_filter_set_event(EVT_RETURN_LINK_KEYS, &flt);
|
|
hci_filter_set_event(EVT_REMOTE_NAME_REQ_COMPLETE, &flt);
|
|
hci_filter_set_event(EVT_READ_REMOTE_VERSION_COMPLETE, &flt);
|
|
hci_filter_set_event(EVT_READ_REMOTE_FEATURES_COMPLETE, &flt);
|
|
hci_filter_set_event(EVT_INQUIRY_COMPLETE, &flt);
|
|
hci_filter_set_event(EVT_INQUIRY_RESULT, &flt);
|
|
hci_filter_set_event(EVT_INQUIRY_RESULT_WITH_RSSI, &flt);
|
|
hci_filter_set_event(EVT_EXTENDED_INQUIRY_RESULT, &flt);
|
|
hci_filter_set_event(EVT_CONN_COMPLETE, &flt);
|
|
hci_filter_set_event(EVT_DISCONN_COMPLETE, &flt);
|
|
hci_filter_set_event(EVT_AUTH_COMPLETE, &flt);
|
|
if (setsockopt(dev, SOL_HCI, HCI_FILTER, &flt, sizeof(flt)) < 0) {
|
|
syslog(LOG_ERR, "Can't set filter on hci%d: %s (%d)",
|
|
hdev, strerror(errno), errno);
|
|
close(dev);
|
|
return;
|
|
}
|
|
|
|
di = malloc(sizeof(*di));
|
|
if (!di) {
|
|
syslog(LOG_ERR, "Can't allocate device info buffer: %s (%d)",
|
|
strerror(errno), errno);
|
|
close(dev);
|
|
return;
|
|
}
|
|
|
|
di->dev_id = hdev;
|
|
if (ioctl(dev, HCIGETDEVINFO, (void *)di)) {
|
|
syslog(LOG_ERR, "Can't get device info: %s (%d)",
|
|
strerror(errno), errno);
|
|
close(dev);
|
|
return;
|
|
}
|
|
|
|
chan = g_io_channel_unix_new(dev);
|
|
g_io_add_watch(chan, G_IO_IN | G_IO_NVAL | G_IO_HUP | G_IO_ERR,
|
|
io_security_event, (void *) di);
|
|
|
|
io_chan[hdev] = chan;
|
|
|
|
if (hci_test_bit(HCI_RAW, &di->flags))
|
|
return;
|
|
|
|
bacpy(&cp.bdaddr, BDADDR_ANY);
|
|
cp.read_all = 1;
|
|
|
|
hci_send_cmd(dev, OGF_HOST_CTL, OCF_READ_STORED_LINK_KEY,
|
|
READ_STORED_LINK_KEY_CP_SIZE, (void *) &cp);
|
|
}
|
|
|
|
void stop_security_manager(int hdev)
|
|
{
|
|
GIOChannel *chan = io_chan[hdev];
|
|
|
|
if (!chan)
|
|
return;
|
|
|
|
syslog(LOG_INFO, "Stoping security manager %d", hdev);
|
|
|
|
/* this is a bit sneaky. closing the fd will cause the event
|
|
loop to call us right back with G_IO_NVAL set, at which
|
|
point we will see it and clean things up */
|
|
close(g_io_channel_unix_get_fd(chan));
|
|
io_chan[hdev] = NULL;
|
|
}
|
|
|
|
void init_security_data(void)
|
|
{
|
|
/* Set local PIN code */
|
|
if (read_default_pin_code() < 0) {
|
|
strcpy((char *) hcid.pin_code, "BlueZ");
|
|
hcid.pin_len = 5;
|
|
}
|
|
|
|
pairing = hcid.pairing;
|
|
}
|