4 * Copyright (c) 2001-2003 Maksim Yevmenkin <m_evmenkin@yahoo.com>
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 * $Id: session.c,v 1.2 2003/09/04 22:12:13 max Exp $
31 #define L2CAP_SOCKET_CHECKED
32 #include <bluetooth.h>
42 sdp_open(bdaddr_t const *l, bdaddr_t const *r)
44 sdp_session_p ss = NULL;
45 struct sockaddr_l2cap sa;
48 if ((ss = calloc(1, sizeof(*ss))) == NULL)
51 if (l == NULL || r == NULL) {
56 ss->s = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
62 sa.l2cap_len = sizeof(sa);
63 sa.l2cap_family = AF_BLUETOOTH;
66 sa.l2cap_bdaddr_type = BDADDR_BREDR;
68 memcpy(&sa.l2cap_bdaddr, l, sizeof(sa.l2cap_bdaddr));
69 if (bind(ss->s, (struct sockaddr *) &sa, sizeof(sa)) < 0) {
74 sa.l2cap_psm = htole16(NG_L2CAP_PSM_SDP);
75 memcpy(&sa.l2cap_bdaddr, r, sizeof(sa.l2cap_bdaddr));
76 if (connect(ss->s, (struct sockaddr *) &sa, sizeof(sa)) < 0) {
81 size = sizeof(ss->omtu);
82 if (getsockopt(ss->s, SOL_L2CAP, SO_L2CAP_OMTU, &ss->omtu, &size) < 0) {
86 if ((ss->req = malloc(ss->omtu)) == NULL) {
90 ss->req_e = ss->req + ss->omtu;
92 size = sizeof(ss->imtu);
93 if (getsockopt(ss->s, SOL_L2CAP, SO_L2CAP_IMTU, &ss->imtu, &size) < 0) {
97 if ((ss->rsp = malloc(ss->imtu)) == NULL) {
101 ss->rsp_e = ss->rsp + ss->imtu;
104 return ((void *) ss);
108 sdp_open_local(char const *control)
110 sdp_session_p ss = NULL;
111 struct sockaddr_un sa;
113 if ((ss = calloc(1, sizeof(*ss))) == NULL)
116 ss->s = socket(PF_UNIX, SOCK_STREAM, 0);
123 control = SDP_LOCAL_PATH;
125 sa.sun_len = sizeof(sa);
126 sa.sun_family = AF_UNIX;
127 strlcpy(sa.sun_path, control, sizeof(sa.sun_path));
129 if (connect(ss->s, (struct sockaddr *) &sa, sizeof(sa)) < 0) {
134 ss->flags |= SDP_SESSION_LOCAL;
135 ss->imtu = ss->omtu = SDP_LOCAL_MTU;
137 if ((ss->req = malloc(ss->omtu)) == NULL) {
141 ss->req_e = ss->req + ss->omtu;
143 if ((ss->rsp = malloc(ss->imtu)) == NULL) {
147 ss->rsp_e = ss->rsp + ss->imtu;
150 return ((void *) ss);
156 sdp_session_p ss = (sdp_session_p) xss;
167 memset(ss, 0, sizeof(*ss));
177 sdp_session_p ss = (sdp_session_p) xss;
179 return ((ss != NULL)? ss->error : EINVAL);