4 * SPDX-License-Identifier: BSD-2-Clause
6 * Copyright (c) 2001-2003 Maksim Yevmenkin <m_evmenkin@yahoo.com>
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * $Id: session.c,v 1.2 2003/09/04 22:12:13 max Exp $
32 #define L2CAP_SOCKET_CHECKED
33 #include <bluetooth.h>
43 sdp_open(bdaddr_t const *l, bdaddr_t const *r)
45 sdp_session_p ss = NULL;
46 struct sockaddr_l2cap sa;
49 if ((ss = calloc(1, sizeof(*ss))) == NULL)
52 if (l == NULL || r == NULL) {
57 ss->s = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
63 sa.l2cap_len = sizeof(sa);
64 sa.l2cap_family = AF_BLUETOOTH;
67 sa.l2cap_bdaddr_type = BDADDR_BREDR;
69 memcpy(&sa.l2cap_bdaddr, l, sizeof(sa.l2cap_bdaddr));
70 if (bind(ss->s, (struct sockaddr *) &sa, sizeof(sa)) < 0) {
75 sa.l2cap_psm = htole16(NG_L2CAP_PSM_SDP);
76 memcpy(&sa.l2cap_bdaddr, r, sizeof(sa.l2cap_bdaddr));
77 if (connect(ss->s, (struct sockaddr *) &sa, sizeof(sa)) < 0) {
82 size = sizeof(ss->omtu);
83 if (getsockopt(ss->s, SOL_L2CAP, SO_L2CAP_OMTU, &ss->omtu, &size) < 0) {
87 if ((ss->req = malloc(ss->omtu)) == NULL) {
91 ss->req_e = ss->req + ss->omtu;
93 size = sizeof(ss->imtu);
94 if (getsockopt(ss->s, SOL_L2CAP, SO_L2CAP_IMTU, &ss->imtu, &size) < 0) {
98 if ((ss->rsp = malloc(ss->imtu)) == NULL) {
102 ss->rsp_e = ss->rsp + ss->imtu;
105 return ((void *) ss);
109 sdp_open_local(char const *control)
111 sdp_session_p ss = NULL;
112 struct sockaddr_un sa;
114 if ((ss = calloc(1, sizeof(*ss))) == NULL)
117 ss->s = socket(PF_UNIX, SOCK_STREAM, 0);
124 control = SDP_LOCAL_PATH;
126 sa.sun_len = sizeof(sa);
127 sa.sun_family = AF_UNIX;
128 strlcpy(sa.sun_path, control, sizeof(sa.sun_path));
130 if (connect(ss->s, (struct sockaddr *) &sa, sizeof(sa)) < 0) {
135 ss->flags |= SDP_SESSION_LOCAL;
136 ss->imtu = ss->omtu = SDP_LOCAL_MTU;
138 if ((ss->req = malloc(ss->omtu)) == NULL) {
142 ss->req_e = ss->req + ss->omtu;
144 if ((ss->rsp = malloc(ss->imtu)) == NULL) {
148 ss->rsp_e = ss->rsp + ss->imtu;
151 return ((void *) ss);
157 sdp_session_p ss = (sdp_session_p) xss;
168 memset(ss, 0, sizeof(*ss));
178 sdp_session_p ss = (sdp_session_p) xss;
180 return ((ss != NULL)? ss->error : EINVAL);
184 sdp_get_lcaddr(void *xss, bdaddr_t *l)
186 sdp_session_p ss = (sdp_session_p) xss;
187 struct sockaddr_l2cap sa;
190 if (l == NULL || ss == NULL || ss->flags & SDP_SESSION_LOCAL) {
196 if (getsockname(ss->s, (struct sockaddr *)&sa, &size) == 0) {
197 bdaddr_copy(l, &sa.l2cap_bdaddr);
202 return ((ss->error == 0) ? 0 : -1);