mirror of
https://git.kernel.org/pub/scm/bluetooth/bluez.git
synced 2024-11-26 13:44:23 +08:00
918 lines
22 KiB
C
918 lines
22 KiB
C
/*
|
|
*
|
|
* BlueZ - Bluetooth protocol stack for Linux
|
|
*
|
|
* Copyright (C) 2004-2007 Marcel Holtmann <marcel@holtmann.org>
|
|
*
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <errno.h>
|
|
#include <sys/socket.h>
|
|
|
|
#include <bluetooth/bluetooth.h>
|
|
#include <bluetooth/bnep.h>
|
|
#include <bluetooth/l2cap.h>
|
|
#include <bluetooth/sdp.h>
|
|
#include <bluetooth/sdp_lib.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <glib.h>
|
|
|
|
#include "logging.h"
|
|
#include "dbus.h"
|
|
#include "error.h"
|
|
|
|
#define NETWORK_SERVER_INTERFACE "org.bluez.network.Server"
|
|
|
|
#include "common.h"
|
|
#include "server.h"
|
|
|
|
/* Pending Authorization */
|
|
struct pending_auth {
|
|
char *addr; /* Bluetooth Address */
|
|
GIOChannel *io; /* BNEP connection setup io channel */
|
|
};
|
|
|
|
/* Main server structure */
|
|
struct network_server {
|
|
char *iface; /* Routing interface */
|
|
char *name; /* Server service name */
|
|
char *path; /* D-Bus path */
|
|
dbus_bool_t secure;
|
|
uint32_t record_id; /* Service record id */
|
|
uint16_t id; /* Service class identifier */
|
|
GIOChannel *io; /* GIOChannel when listening */
|
|
DBusConnection *conn; /* D-Bus connection */
|
|
struct pending_auth *pauth; /* Pending incomming connection/authorization */
|
|
};
|
|
|
|
static char netdev[16] = "bnep%d";
|
|
|
|
static void pending_auth_free(struct pending_auth *pauth)
|
|
{
|
|
if (!pauth)
|
|
return;
|
|
if (pauth->addr)
|
|
g_free(pauth->addr);
|
|
/* FIXME: Is it necessary close the BNEP socket? */
|
|
if (pauth->io)
|
|
g_io_channel_unref(pauth->io);
|
|
g_free(pauth);
|
|
}
|
|
|
|
static void add_lang_attr(sdp_record_t *r)
|
|
{
|
|
sdp_lang_attr_t base_lang;
|
|
sdp_list_t *langs = 0;
|
|
|
|
/* UTF-8 MIBenum (http://www.iana.org/assignments/character-sets) */
|
|
base_lang.code_ISO639 = (0x65 << 8) | 0x6e;
|
|
base_lang.encoding = 106;
|
|
base_lang.base_offset = SDP_PRIMARY_LANG_BASE;
|
|
langs = sdp_list_append(0, &base_lang);
|
|
sdp_set_lang_attr(r, langs);
|
|
sdp_list_free(langs, 0);
|
|
}
|
|
|
|
static int create_server_record(sdp_buf_t *buf, uint16_t id)
|
|
{
|
|
sdp_list_t *svclass, *pfseq, *apseq, *root, *aproto;
|
|
uuid_t root_uuid, pan, l2cap, bnep;
|
|
sdp_profile_desc_t profile[1];
|
|
sdp_list_t *proto[2];
|
|
sdp_data_t *v, *p;
|
|
uint16_t psm = BNEP_PSM, version = 0x0100;
|
|
uint16_t security_desc = 0;
|
|
uint16_t net_access_type = 0xfffe;
|
|
uint32_t max_net_access_rate = 0;
|
|
const char *name = "BlueZ PAN";
|
|
const char *desc = "BlueZ PAN Service";
|
|
sdp_record_t record;
|
|
int ret;
|
|
|
|
/* FIXME: service name must be configurable */
|
|
|
|
memset(&record, 0, sizeof(sdp_record_t));
|
|
|
|
sdp_uuid16_create(&root_uuid, PUBLIC_BROWSE_GROUP);
|
|
root = sdp_list_append(NULL, &root_uuid);
|
|
sdp_set_browse_groups(&record, root);
|
|
|
|
sdp_uuid16_create(&l2cap, L2CAP_UUID);
|
|
proto[0] = sdp_list_append(NULL, &l2cap);
|
|
p = sdp_data_alloc(SDP_UINT16, &psm);
|
|
proto[0] = sdp_list_append(proto[0], p);
|
|
apseq = sdp_list_append(NULL, proto[0]);
|
|
|
|
sdp_uuid16_create(&bnep, BNEP_UUID);
|
|
proto[1] = sdp_list_append(NULL, &bnep);
|
|
v = sdp_data_alloc(SDP_UINT16, &version);
|
|
proto[1] = sdp_list_append(proto[1], v);
|
|
|
|
/* Supported protocols */
|
|
{
|
|
uint16_t ptype[] = {
|
|
0x0800, /* IPv4 */
|
|
0x0806, /* ARP */
|
|
};
|
|
sdp_data_t *head, *pseq;
|
|
int p;
|
|
|
|
for (p = 0, head = NULL; p < 2; p++) {
|
|
sdp_data_t *data = sdp_data_alloc(SDP_UINT16, &ptype[p]);
|
|
if (head)
|
|
sdp_seq_append(head, data);
|
|
else
|
|
head = data;
|
|
}
|
|
pseq = sdp_data_alloc(SDP_SEQ16, head);
|
|
proto[1] = sdp_list_append(proto[1], pseq);
|
|
}
|
|
|
|
apseq = sdp_list_append(apseq, proto[1]);
|
|
|
|
aproto = sdp_list_append(NULL, apseq);
|
|
sdp_set_access_protos(&record, aproto);
|
|
|
|
add_lang_attr(&record);
|
|
|
|
/* FIXME: Missing check the security attribute */
|
|
sdp_attr_add_new(&record, SDP_ATTR_SECURITY_DESC,
|
|
SDP_UINT16, &security_desc);
|
|
|
|
if (id == BNEP_SVC_NAP) {
|
|
sdp_uuid16_create(&pan, NAP_SVCLASS_ID);
|
|
svclass = sdp_list_append(NULL, &pan);
|
|
sdp_set_service_classes(&record, svclass);
|
|
|
|
sdp_uuid16_create(&profile[0].uuid, NAP_PROFILE_ID);
|
|
profile[0].version = 0x0100;
|
|
pfseq = sdp_list_append(NULL, &profile[0]);
|
|
sdp_set_profile_descs(&record, pfseq);
|
|
|
|
sdp_set_info_attr(&record, "Network Access Point", name, desc);
|
|
|
|
sdp_attr_add_new(&record, SDP_ATTR_NET_ACCESS_TYPE,
|
|
SDP_UINT16, &net_access_type);
|
|
sdp_attr_add_new(&record, SDP_ATTR_MAX_NET_ACCESSRATE,
|
|
SDP_UINT32, &max_net_access_rate);
|
|
} else {
|
|
/* BNEP_SVC_GN */
|
|
sdp_uuid16_create(&pan, GN_SVCLASS_ID);
|
|
svclass = sdp_list_append(NULL, &pan);
|
|
sdp_set_service_classes(&record, svclass);
|
|
|
|
sdp_uuid16_create(&profile[0].uuid, GN_PROFILE_ID);
|
|
profile[0].version = 0x0100;
|
|
pfseq = sdp_list_append(NULL, &profile[0]);
|
|
sdp_set_profile_descs(&record, pfseq);
|
|
|
|
sdp_set_info_attr(&record, "Group Network Service", name, desc);
|
|
}
|
|
|
|
if (sdp_gen_record_pdu(&record, buf) < 0)
|
|
ret = -1;
|
|
else
|
|
ret = 0;
|
|
|
|
sdp_data_free(p);
|
|
sdp_data_free(v);
|
|
sdp_list_free(apseq, NULL);
|
|
sdp_list_free(root, NULL);
|
|
sdp_list_free(aproto, NULL);
|
|
sdp_list_free(proto[0], NULL);
|
|
sdp_list_free(proto[1], NULL);
|
|
sdp_list_free(svclass, NULL);
|
|
sdp_list_free(pfseq, NULL);
|
|
sdp_list_free(record.attrlist, (sdp_free_func_t) sdp_data_free);
|
|
sdp_list_free(record.pattern, free);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int send_bnep_ctrl_rsp(GIOChannel *chan, uint16_t response)
|
|
{
|
|
struct bnep_control_rsp rsp;
|
|
GIOError gerr;
|
|
gsize n;
|
|
|
|
rsp.type = BNEP_CONTROL;
|
|
rsp.ctrl = BNEP_SETUP_CONN_RSP;
|
|
rsp.resp = htons(response);
|
|
|
|
gerr = g_io_channel_write(chan, (gchar *)&rsp, sizeof(rsp), &n);
|
|
|
|
return -gerr;
|
|
}
|
|
|
|
static void authorization_callback(DBusPendingCall *pcall, void *data)
|
|
{
|
|
struct network_server *ns = data;
|
|
DBusMessage *reply = dbus_pending_call_steal_reply(pcall);
|
|
DBusError derr;
|
|
uint16_t response;
|
|
|
|
if (!ns->pauth)
|
|
goto failed;
|
|
|
|
dbus_error_init(&derr);
|
|
if (dbus_set_error_from_message(&derr, reply)) {
|
|
error("Access denied: %s", derr.message);
|
|
response = BNEP_CONN_NOT_ALLOWED;
|
|
} else {
|
|
char devname[16];
|
|
int sk;
|
|
|
|
response = BNEP_SUCCESS;
|
|
|
|
memset(devname, 0, 16);
|
|
strncpy(devname, netdev, 16);
|
|
|
|
/* FIXME: Is it the correct order? */
|
|
sk = g_io_channel_unix_get_fd(ns->pauth->io);
|
|
bnep_connadd(sk, BNEP_SVC_PANU, devname);
|
|
|
|
info("Authorization succedded. New connection: %s", devname);
|
|
|
|
/* FIXME: send the D-Bus message to notify the new bnep iface */
|
|
}
|
|
|
|
send_bnep_ctrl_rsp(ns->pauth->io, response);
|
|
|
|
pending_auth_free(ns->pauth);
|
|
ns->pauth = NULL;
|
|
|
|
failed:
|
|
dbus_message_unref(reply);
|
|
dbus_pending_call_unref(pcall);
|
|
}
|
|
|
|
static int authorize_connection(struct network_server *ns)
|
|
{
|
|
DBusMessage *msg;
|
|
DBusPendingCall *pending;
|
|
const char *uuid = ""; /* FIXME: */
|
|
|
|
msg = dbus_message_new_method_call("org.bluez", "/org/bluez",
|
|
"org.bluez.Database", "RequestAuthorization");
|
|
if (!msg) {
|
|
error("Unable to allocat new RequestAuthorization method call");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
debug("Requesting authorization for %s UUID:%s", ns->pauth->addr, uuid);
|
|
|
|
dbus_message_append_args(msg,
|
|
DBUS_TYPE_STRING, &ns->pauth->addr,
|
|
DBUS_TYPE_STRING, &uuid,
|
|
DBUS_TYPE_INVALID);
|
|
|
|
if (dbus_connection_send_with_reply(ns->conn, msg, &pending, -1) == FALSE) {
|
|
error("Sending of authorization request failed");
|
|
return -EACCES;
|
|
}
|
|
|
|
dbus_pending_call_set_notify(pending, authorization_callback, ns, NULL);
|
|
dbus_message_unref(msg);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static gboolean connect_setup_event(GIOChannel *chan,
|
|
GIOCondition cond, gpointer data)
|
|
{
|
|
struct network_server *ns = data;
|
|
struct bnep_setup_conn_req *req;
|
|
unsigned char pkt[BNEP_MTU];
|
|
gsize n;
|
|
GIOError gerr;
|
|
uint8_t *pservice;
|
|
uint16_t role, response;
|
|
|
|
if (cond & G_IO_NVAL)
|
|
return FALSE;
|
|
|
|
if (cond & (G_IO_ERR | G_IO_HUP)) {
|
|
error("Hangup or error on L2CAP socket");
|
|
/* FIXME: Cancel the pending authorization if applied */
|
|
return FALSE;
|
|
}
|
|
|
|
/* FIXME: Missing address setup connection request retries */
|
|
|
|
gerr = g_io_channel_read(chan, (gchar *)pkt, sizeof(pkt) - 1, &n);
|
|
if (gerr != G_IO_ERROR_NONE)
|
|
return FALSE;
|
|
|
|
if (n < sizeof(*req)) {
|
|
error("Invalid BNEP packet size");
|
|
return FALSE;
|
|
}
|
|
|
|
req = (void *)pkt;
|
|
if (req->type != BNEP_CONTROL || req->ctrl != BNEP_SETUP_CONN_REQ) {
|
|
error("Invalid BNEP control packet content");
|
|
return FALSE;
|
|
}
|
|
|
|
/*
|
|
* FIXME: According to BNEP SPEC the UUID size can be
|
|
* 2-16 bytes. Currently only 2 bytes size is supported
|
|
*/
|
|
if (req->uuid_size != 2) {
|
|
response = BNEP_CONN_INVALID_SVC;
|
|
goto reply;
|
|
}
|
|
|
|
pservice = req->service;
|
|
/* Getting destination service: considering 2 bytes size */
|
|
role = ntohs(bt_get_unaligned((uint16_t *) pservice));
|
|
|
|
pservice += req->uuid_size;
|
|
/* Getting source service: considering 2 bytes size */
|
|
role = ntohs(bt_get_unaligned((uint16_t *) pservice));
|
|
|
|
if (role != BNEP_SVC_PANU) {
|
|
response = BNEP_CONN_INVALID_SRC;
|
|
goto reply;
|
|
}
|
|
|
|
/* Wait authorization before reply success */
|
|
if (authorize_connection(ns) < 0) {
|
|
response = BNEP_CONN_NOT_ALLOWED;
|
|
goto reply;
|
|
|
|
}
|
|
|
|
return TRUE;
|
|
reply:
|
|
send_bnep_ctrl_rsp(chan, response);
|
|
return FALSE;
|
|
}
|
|
|
|
static void connect_setup_destroy(gpointer data)
|
|
{
|
|
struct network_server *ns = data;
|
|
|
|
if (ns->pauth) {
|
|
pending_auth_free(ns->pauth);
|
|
ns->pauth = NULL;
|
|
}
|
|
}
|
|
|
|
static gboolean connect_event(GIOChannel *chan,
|
|
GIOCondition cond, gpointer data)
|
|
{
|
|
struct network_server *ns = data;
|
|
struct sockaddr_l2 addr;
|
|
socklen_t addrlen;
|
|
char peer[18];
|
|
bdaddr_t dst;
|
|
unsigned short psm;
|
|
int sk, nsk;
|
|
|
|
if (cond & G_IO_NVAL)
|
|
return FALSE;
|
|
|
|
if (cond & (G_IO_ERR | G_IO_HUP)) {
|
|
error("Hangup or error on L2CAP socket PSM 15");
|
|
/* FIXME: Notify the userspace? */
|
|
return FALSE;
|
|
}
|
|
|
|
sk = g_io_channel_unix_get_fd(chan);
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
addrlen = sizeof(addr);
|
|
|
|
nsk = accept(sk, (struct sockaddr *) &addr, &addrlen);
|
|
if (nsk < 0)
|
|
return TRUE;
|
|
|
|
bacpy(&dst, &addr.l2_bdaddr);
|
|
psm = btohs(addr.l2_psm);
|
|
|
|
/* FIXME: Maybe keep a list of connected devices */
|
|
|
|
ba2str(&dst, peer);
|
|
info("Incoming connection from:%s on PSM %d", peer, psm);
|
|
|
|
/* FIXME: HOW handle multiple incomming connections? */
|
|
|
|
/* Setting the pending incomming connection setup */
|
|
ns->pauth = g_new0(struct pending_auth, 1);
|
|
ns->pauth->addr = g_strdup(peer);
|
|
ns->pauth->io = g_io_channel_unix_new(nsk);
|
|
|
|
g_io_channel_set_close_on_unref(ns->pauth->io, FALSE);
|
|
|
|
/* New watch for BNEP setup */
|
|
g_io_add_watch_full(ns->pauth->io, G_PRIORITY_DEFAULT,
|
|
G_IO_IN | G_IO_HUP | G_IO_ERR | G_IO_NVAL,
|
|
connect_setup_event, ns, &connect_setup_destroy);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static int l2cap_listen(struct network_server *ns)
|
|
{
|
|
struct l2cap_options l2o;
|
|
struct sockaddr_l2 l2a;
|
|
socklen_t olen;
|
|
int sk, lm, err;
|
|
|
|
/* Create L2CAP socket and bind it to PSM BNEP */
|
|
sk = socket(AF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP);
|
|
if (sk < 0) {
|
|
err = errno;
|
|
error("Cannot create L2CAP socket. %s(%d)",
|
|
strerror(err), err);
|
|
return -err;
|
|
}
|
|
|
|
memset(&l2a, 0, sizeof(l2a));
|
|
l2a.l2_family = AF_BLUETOOTH;
|
|
bacpy(&l2a.l2_bdaddr, BDADDR_ANY);
|
|
l2a.l2_psm = htobs(BNEP_PSM);
|
|
|
|
if (bind(sk, (struct sockaddr *) &l2a, sizeof(l2a))) {
|
|
err = errno;
|
|
error("Bind failed. %s(%d)", strerror(err), err);
|
|
goto fail;
|
|
}
|
|
|
|
/* Setup L2CAP options according to BNEP spec */
|
|
memset(&l2o, 0, sizeof(l2o));
|
|
olen = sizeof(l2o);
|
|
if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &l2o, &olen) < 0) {
|
|
err = errno;
|
|
error("Failed to get L2CAP options. %s(%d)",
|
|
strerror(err), err);
|
|
goto fail;
|
|
}
|
|
|
|
l2o.imtu = l2o.omtu = BNEP_MTU;
|
|
if (setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &l2o, sizeof(l2o)) < 0) {
|
|
err = errno;
|
|
error("Failed to set L2CAP options. %s(%d)",
|
|
strerror(err), err);
|
|
goto fail;
|
|
}
|
|
|
|
/* Set link mode */
|
|
lm = (ns->secure ? L2CAP_LM_SECURE : 0);
|
|
if (lm && setsockopt(sk, SOL_L2CAP, L2CAP_LM, &lm, sizeof(lm)) < 0) {
|
|
err = errno;
|
|
error("Failed to set link mode. %s(%d)",
|
|
strerror(err), err);
|
|
goto fail;
|
|
}
|
|
|
|
if (listen(sk, 1) < 0) {
|
|
err = errno;
|
|
error("Listen failed. %s(%d)", strerror(err), err);
|
|
goto fail;
|
|
}
|
|
|
|
ns->io = g_io_channel_unix_new(sk);
|
|
g_io_channel_set_close_on_unref(ns->io, TRUE);
|
|
|
|
g_io_add_watch(ns->io, G_IO_IN | G_IO_HUP | G_IO_ERR | G_IO_NVAL,
|
|
connect_event, ns);
|
|
|
|
return 0;
|
|
fail:
|
|
|
|
close(sk);
|
|
errno = err;
|
|
return -err;
|
|
}
|
|
|
|
static uint32_t add_server_record(DBusConnection *conn, uint16_t id)
|
|
{
|
|
DBusMessage *msg, *reply;
|
|
DBusError derr;
|
|
dbus_uint32_t rec_id;
|
|
sdp_buf_t buf;
|
|
|
|
msg = dbus_message_new_method_call("org.bluez", "/org/bluez",
|
|
"org.bluez.Database", "AddServiceRecord");
|
|
if (!msg) {
|
|
error("Can't allocate new method call");
|
|
return 0;
|
|
}
|
|
|
|
if (create_server_record(&buf, id) < 0) {
|
|
error("Unable to allocate new service record");
|
|
dbus_message_unref(msg);
|
|
return 0;
|
|
}
|
|
|
|
dbus_message_append_args(msg, DBUS_TYPE_ARRAY, DBUS_TYPE_BYTE,
|
|
&buf.data, buf.data_size, DBUS_TYPE_INVALID);
|
|
|
|
dbus_error_init(&derr);
|
|
reply = dbus_connection_send_with_reply_and_block(conn, msg, -1, &derr);
|
|
|
|
free(buf.data);
|
|
dbus_message_unref(msg);
|
|
|
|
if (dbus_error_is_set(&derr) || dbus_set_error_from_message(&derr, reply)) {
|
|
error("Adding service record failed: %s", derr.message);
|
|
dbus_error_free(&derr);
|
|
return 0;
|
|
}
|
|
|
|
dbus_message_get_args(reply, &derr, DBUS_TYPE_UINT32, &rec_id,
|
|
DBUS_TYPE_INVALID);
|
|
|
|
if (dbus_error_is_set(&derr)) {
|
|
error("Invalid arguments to AddServiceRecord reply: %s", derr.message);
|
|
dbus_message_unref(reply);
|
|
dbus_error_free(&derr);
|
|
return 0;
|
|
}
|
|
|
|
dbus_message_unref(reply);
|
|
|
|
debug("add_server_record: got record id 0x%x", rec_id);
|
|
|
|
return rec_id;
|
|
}
|
|
|
|
static int remove_server_record(DBusConnection *conn, uint32_t rec_id)
|
|
{
|
|
DBusMessage *msg, *reply;
|
|
DBusError derr;
|
|
|
|
msg = dbus_message_new_method_call("org.bluez", "/org/bluez",
|
|
"org.bluez.Database", "RemoveServiceRecord");
|
|
if (!msg) {
|
|
error("Can't allocate new method call");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
dbus_message_append_args(msg,
|
|
DBUS_TYPE_UINT32, &rec_id,
|
|
DBUS_TYPE_INVALID);
|
|
|
|
dbus_error_init(&derr);
|
|
reply = dbus_connection_send_with_reply_and_block(conn, msg, -1, &derr);
|
|
|
|
dbus_message_unref(msg);
|
|
|
|
if (dbus_error_is_set(&derr)) {
|
|
error("Removing service record 0x%x failed: %s",
|
|
rec_id, derr.message);
|
|
dbus_error_free(&derr);
|
|
return -1;
|
|
}
|
|
|
|
dbus_message_unref(reply);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static DBusHandlerResult get_uuid(DBusConnection *conn,
|
|
DBusMessage *msg, void *data)
|
|
{
|
|
struct network_server *ns = data;
|
|
DBusMessage *reply;
|
|
const char *uuid;
|
|
|
|
reply = dbus_message_new_method_return(msg);
|
|
if (!reply)
|
|
return DBUS_HANDLER_RESULT_NEED_MEMORY;
|
|
|
|
uuid = bnep_uuid(ns->id);
|
|
dbus_message_append_args(reply,
|
|
DBUS_TYPE_STRING, &uuid,
|
|
DBUS_TYPE_INVALID);
|
|
|
|
return send_message_and_unref(conn, reply);
|
|
}
|
|
|
|
static DBusHandlerResult enable(DBusConnection *conn,
|
|
DBusMessage *msg, void *data)
|
|
{
|
|
struct network_server *ns = data;
|
|
DBusMessage *reply;
|
|
int err;
|
|
|
|
reply = dbus_message_new_method_return(msg);
|
|
if (!reply)
|
|
return DBUS_HANDLER_RESULT_NEED_MEMORY;
|
|
|
|
/* Add the service record */
|
|
ns->record_id = add_server_record(conn, ns->id);
|
|
if (!ns->record_id) {
|
|
error("Unable to register the server(0x%x) service record", ns->id);
|
|
return err_failed(conn, msg, "Unable to register the service record");
|
|
}
|
|
|
|
/* FIXME: Check security */
|
|
|
|
err = l2cap_listen(ns);
|
|
if (err < 0)
|
|
return err_failed(conn, msg, strerror(-err));
|
|
|
|
return send_message_and_unref(conn, reply);
|
|
}
|
|
|
|
static DBusHandlerResult disable(DBusConnection *conn,
|
|
DBusMessage *msg, void *data)
|
|
{
|
|
struct network_server *ns = data;
|
|
DBusMessage *reply;
|
|
|
|
reply = dbus_message_new_method_return(msg);
|
|
if (!reply)
|
|
return DBUS_HANDLER_RESULT_NEED_MEMORY;
|
|
|
|
if (!ns->io)
|
|
return err_failed(conn, msg, "Not enabled");
|
|
|
|
/* Remove the service record */
|
|
if (ns->record_id) {
|
|
remove_server_record(conn, ns->record_id);
|
|
ns->record_id = 0;
|
|
}
|
|
|
|
g_io_channel_unref(ns->io);
|
|
g_io_channel_close(ns->io);
|
|
ns->io = NULL;
|
|
|
|
return send_message_and_unref(conn, reply);
|
|
}
|
|
|
|
static DBusHandlerResult set_name(DBusConnection *conn,
|
|
DBusMessage *msg, void *data)
|
|
{
|
|
struct network_server *ns = data;
|
|
DBusMessage *reply;
|
|
DBusError derr;
|
|
const char *name;
|
|
|
|
reply = dbus_message_new_method_return(msg);
|
|
if (!reply)
|
|
return DBUS_HANDLER_RESULT_NEED_MEMORY;
|
|
|
|
dbus_error_init(&derr);
|
|
if (!dbus_message_get_args(msg, &derr,
|
|
DBUS_TYPE_STRING, &name,
|
|
DBUS_TYPE_INVALID)) {
|
|
err_invalid_args(conn, msg, derr.message);
|
|
dbus_error_free(&derr);
|
|
return DBUS_HANDLER_RESULT_HANDLED;
|
|
}
|
|
|
|
if (!name || (strlen(name) == 0))
|
|
return err_invalid_args(conn, msg, "Invalid name");
|
|
|
|
if (ns->name)
|
|
g_free(ns->name);
|
|
ns->name = g_strdup(name);
|
|
|
|
/* FIXME: Update the service record attribute */
|
|
|
|
return send_message_and_unref(conn, reply);
|
|
}
|
|
|
|
static DBusHandlerResult get_name(DBusConnection *conn,
|
|
DBusMessage *msg, void *data)
|
|
{
|
|
struct network_server *ns = data;
|
|
char name[] = "";
|
|
const char *pname = (ns->name ? ns->name : name);
|
|
DBusMessage *reply;
|
|
|
|
reply = dbus_message_new_method_return(msg);
|
|
if (!reply)
|
|
return DBUS_HANDLER_RESULT_NEED_MEMORY;
|
|
|
|
dbus_message_append_args(reply,
|
|
DBUS_TYPE_STRING, &pname,
|
|
DBUS_TYPE_INVALID);
|
|
|
|
return send_message_and_unref(conn, reply);
|
|
}
|
|
|
|
static DBusHandlerResult set_address_range(DBusConnection *conn,
|
|
DBusMessage *msg, void *data)
|
|
{
|
|
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
|
|
}
|
|
|
|
static DBusHandlerResult set_routing(DBusConnection *conn, DBusMessage *msg,
|
|
void *data)
|
|
{
|
|
struct network_server *ns = data;
|
|
DBusMessage *reply;
|
|
DBusError derr;
|
|
const char *iface;
|
|
|
|
reply = dbus_message_new_method_return(msg);
|
|
if (!reply)
|
|
return DBUS_HANDLER_RESULT_NEED_MEMORY;
|
|
|
|
dbus_error_init(&derr);
|
|
if (!dbus_message_get_args(msg, &derr,
|
|
DBUS_TYPE_STRING, &iface,
|
|
DBUS_TYPE_INVALID)) {
|
|
err_invalid_args(conn, msg, derr.message);
|
|
dbus_error_free(&derr);
|
|
return DBUS_HANDLER_RESULT_HANDLED;
|
|
}
|
|
|
|
/* FIXME: Check if the interface is valid/UP */
|
|
if (!iface || (strlen(iface) == 0))
|
|
return err_invalid_args(conn, msg, "Invalid interface");
|
|
|
|
if (ns->iface)
|
|
g_free(ns->iface);
|
|
ns->iface = g_strdup(iface);
|
|
|
|
return send_message_and_unref(conn, reply);
|
|
}
|
|
|
|
static DBusHandlerResult set_security(DBusConnection *conn,
|
|
DBusMessage *msg, void *data)
|
|
{
|
|
struct network_server *ns = data;
|
|
DBusMessage *reply;
|
|
DBusError derr;
|
|
dbus_bool_t secure;
|
|
|
|
reply = dbus_message_new_method_return(msg);
|
|
if (!reply)
|
|
return DBUS_HANDLER_RESULT_NEED_MEMORY;
|
|
|
|
dbus_error_init(&derr);
|
|
if (!dbus_message_get_args(msg, &derr,
|
|
DBUS_TYPE_BOOLEAN, &secure,
|
|
DBUS_TYPE_INVALID)) {
|
|
err_invalid_args(conn, msg, derr.message);
|
|
dbus_error_free(&derr);
|
|
return DBUS_HANDLER_RESULT_HANDLED;
|
|
}
|
|
|
|
ns->secure = secure;
|
|
|
|
return send_message_and_unref(conn, reply);
|
|
}
|
|
|
|
static DBusHandlerResult get_security(DBusConnection *conn,
|
|
DBusMessage *msg, void *data)
|
|
{
|
|
struct network_server *ns = data;
|
|
DBusMessage *reply;
|
|
|
|
reply = dbus_message_new_method_return(msg);
|
|
if (!reply)
|
|
return DBUS_HANDLER_RESULT_NEED_MEMORY;
|
|
|
|
dbus_message_append_args(reply,
|
|
DBUS_TYPE_BOOLEAN, &ns->secure,
|
|
DBUS_TYPE_INVALID);
|
|
|
|
return send_message_and_unref(conn, reply);
|
|
}
|
|
|
|
static DBusHandlerResult server_message(DBusConnection *conn,
|
|
DBusMessage *msg, void *data)
|
|
{
|
|
const char *iface, *member;
|
|
|
|
iface = dbus_message_get_interface(msg);
|
|
member = dbus_message_get_member(msg);
|
|
|
|
if (strcmp(NETWORK_SERVER_INTERFACE, iface))
|
|
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
|
|
|
|
if (strcmp(member, "GetUUID") == 0)
|
|
return get_uuid(conn, msg, data);
|
|
|
|
if (strcmp(member, "Enable") == 0)
|
|
return enable(conn, msg, data);
|
|
|
|
if (strcmp(member, "Disable") == 0)
|
|
return disable(conn, msg, data);
|
|
|
|
if (strcmp(member, "SetName") == 0)
|
|
return set_name(conn, msg, data);
|
|
|
|
if (strcmp(member, "GetName") == 0)
|
|
return get_name(conn, msg, data);
|
|
|
|
if (strcmp(member, "SetAddressRange") == 0)
|
|
return set_address_range(conn, msg, data);
|
|
|
|
if (strcmp(member, "SetRouting") == 0)
|
|
return set_routing(conn, msg, data);
|
|
|
|
if (strcmp(member, "SetSecurity") == 0)
|
|
return set_security(conn, msg, data);
|
|
|
|
if (strcmp(member, "GetSecurity") == 0)
|
|
return get_security(conn, msg, data);
|
|
|
|
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
|
|
}
|
|
|
|
static void server_free(struct network_server *ns)
|
|
{
|
|
if (!ns)
|
|
return;
|
|
|
|
/* FIXME: Missing release/free all bnepX interfaces */
|
|
if (ns->record_id)
|
|
remove_server_record(ns->conn, ns->record_id);
|
|
|
|
if (ns->iface)
|
|
g_free(ns->iface);
|
|
|
|
if (ns->name)
|
|
g_free(ns->name);
|
|
|
|
if (ns->path)
|
|
g_free(ns->path);
|
|
|
|
if (ns->conn)
|
|
dbus_connection_unref(ns->conn);
|
|
|
|
if (ns->io) {
|
|
g_io_channel_unref(ns->io);
|
|
g_io_channel_close(ns->io);
|
|
}
|
|
|
|
g_free(ns);
|
|
}
|
|
|
|
static void server_unregister(DBusConnection *conn, void *data)
|
|
{
|
|
struct network_server *ns = data;
|
|
|
|
info("Unregistered server path:%s", ns->path);
|
|
|
|
server_free(ns);
|
|
}
|
|
|
|
/* Virtual table to handle server object path hierarchy */
|
|
static const DBusObjectPathVTable server_table = {
|
|
.message_function = server_message,
|
|
.unregister_function = server_unregister,
|
|
};
|
|
|
|
int server_register(DBusConnection *conn, const char *path, uint16_t id)
|
|
{
|
|
struct network_server *ns;
|
|
|
|
if (!conn)
|
|
return -EINVAL;
|
|
|
|
if (!path)
|
|
return -EINVAL;
|
|
|
|
ns = g_new0(struct network_server, 1);
|
|
|
|
/* Register path */
|
|
if (!dbus_connection_register_object_path(conn, path,
|
|
&server_table, ns)) {
|
|
error("D-Bus failed to register %s path", path);
|
|
goto fail;
|
|
}
|
|
|
|
ns->path = g_strdup(path);
|
|
ns->id = id;
|
|
ns->conn = dbus_connection_ref(conn);
|
|
info("Registered server path:%s", ns->path);
|
|
|
|
return 0;
|
|
fail:
|
|
server_free(ns);
|
|
return -1;
|
|
}
|