6 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
8 * Copyright (c) 2006 Maksim Yevmenkin <m_evmenkin@yahoo.com>
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * $Id: server.c,v 1.9 2006/09/07 21:06:53 max Exp $
36 #include <sys/queue.h>
38 #define L2CAP_SOCKET_CHECKED
39 #include <bluetooth.h>
40 #include <dev/vkbd/vkbd_var.h>
49 #include "bthid_config.h"
54 #define max(x, y) (((x) > (y))? (x) : (y))
56 static int32_t server_accept (bthid_server_p srv, int32_t fd);
57 static int32_t server_process(bthid_server_p srv, int32_t fd);
64 server_init(bthid_server_p srv)
66 struct sockaddr_l2cap l2addr;
70 srv->ctrl = srv->intr = -1;
71 FD_ZERO(&srv->rfdset);
72 FD_ZERO(&srv->wfdset);
73 LIST_INIT(&srv->sessions);
75 /* Open /dev/consolectl */
76 srv->cons = open("/dev/consolectl", O_RDWR);
78 syslog(LOG_ERR, "Could not open /dev/consolectl. %s (%d)",
79 strerror(errno), errno);
83 /* Create control socket */
84 srv->ctrl = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
86 syslog(LOG_ERR, "Could not create control L2CAP socket. " \
87 "%s (%d)", strerror(errno), errno);
92 l2addr.l2cap_len = sizeof(l2addr);
93 l2addr.l2cap_family = AF_BLUETOOTH;
94 memcpy(&l2addr.l2cap_bdaddr, &srv->bdaddr, sizeof(l2addr.l2cap_bdaddr));
95 l2addr.l2cap_psm = htole16(0x11);
96 l2addr.l2cap_bdaddr_type = BDADDR_BREDR;
99 if (bind(srv->ctrl, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) {
100 syslog(LOG_ERR, "Could not bind control L2CAP socket. " \
101 "%s (%d)", strerror(errno), errno);
107 if (listen(srv->ctrl, 10) < 0) {
108 syslog(LOG_ERR, "Could not listen on control L2CAP socket. " \
109 "%s (%d)", strerror(errno), errno);
115 /* Create intrrupt socket */
116 srv->intr = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BLUETOOTH_PROTO_L2CAP);
118 syslog(LOG_ERR, "Could not create interrupt L2CAP socket. " \
119 "%s (%d)", strerror(errno), errno);
125 l2addr.l2cap_psm = htole16(0x13);
127 if (bind(srv->intr, (struct sockaddr *) &l2addr, sizeof(l2addr)) < 0) {
128 syslog(LOG_ERR, "Could not bind interrupt L2CAP socket. " \
129 "%s (%d)", strerror(errno), errno);
136 if (listen(srv->intr, 10) < 0) {
137 syslog(LOG_ERR, "Could not listen on interrupt L2CAP socket. "\
138 "%s (%d)", strerror(errno), errno);
145 FD_SET(srv->ctrl, &srv->rfdset);
146 FD_SET(srv->intr, &srv->rfdset);
147 srv->maxfd = max(srv->ctrl, srv->intr);
157 server_shutdown(bthid_server_p srv)
165 while (!LIST_EMPTY(&srv->sessions))
166 session_close(LIST_FIRST(&srv->sessions));
168 memset(srv, 0, sizeof(*srv));
172 * Do one server iteration
176 server_do(bthid_server_p srv)
179 fd_set rfdset, wfdset;
187 /* Copy cached version of the fd sets and call select */
188 memcpy(&rfdset, &srv->rfdset, sizeof(rfdset));
189 memcpy(&wfdset, &srv->wfdset, sizeof(wfdset));
191 n = select(srv->maxfd + 1, &rfdset, &wfdset, NULL, &tv);
196 syslog(LOG_ERR, "Could not select(%d, %p, %p). %s (%d)",
197 srv->maxfd + 1, &rfdset, &wfdset, strerror(errno), errno);
202 /* Process descriptors (if any) */
203 for (fd = 0; fd < srv->maxfd + 1 && n > 0; fd ++) {
204 if (FD_ISSET(fd, &rfdset)) {
207 if (fd == srv->ctrl || fd == srv->intr)
208 server_accept(srv, fd);
210 server_process(srv, fd);
211 } else if (FD_ISSET(fd, &wfdset)) {
214 client_connect(srv, fd);
222 * Accept new connection
226 server_accept(bthid_server_p srv, int32_t fd)
230 struct sockaddr_l2cap l2addr;
234 len = sizeof(l2addr);
235 if ((new_fd = accept(fd, (struct sockaddr *) &l2addr, &len)) < 0) {
236 syslog(LOG_ERR, "Could not accept %s connection. %s (%d)",
237 (fd == srv->ctrl)? "control" : "interrupt",
238 strerror(errno), errno);
242 /* Is device configured? */
243 if ((d = get_hid_device(&l2addr.l2cap_bdaddr)) == NULL) {
244 syslog(LOG_ERR, "Rejecting %s connection from %s. " \
245 "Device not configured",
246 (fd == srv->ctrl)? "control" : "interrupt",
247 bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
252 /* Check if we have session for the device */
253 if ((s = session_by_bdaddr(srv, &l2addr.l2cap_bdaddr)) == NULL) {
254 d->new_device = 0; /* reset new device flag */
257 /* Create new inbound session */
258 if ((s = session_open(srv, d)) == NULL) {
259 syslog(LOG_CRIT, "Could not open inbound session "
260 "for %s", bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
266 /* Update descriptors */
267 if (fd == srv->ctrl) {
268 assert(s->ctrl == -1);
270 s->state = (s->intr == -1)? W4INTR : OPEN;
272 assert(s->intr == -1);
274 s->state = (s->ctrl == -1)? W4CTRL : OPEN;
277 FD_SET(new_fd, &srv->rfdset);
278 if (new_fd > srv->maxfd)
281 syslog(LOG_NOTICE, "Accepted %s connection from %s",
282 (fd == srv->ctrl)? "control" : "interrupt",
283 bt_ntoa(&l2addr.l2cap_bdaddr, NULL));
285 /* Register session's vkbd descriptor (if needed) for read */
286 if (s->state == OPEN && d->keyboard) {
287 assert(s->vkbd != -1);
289 FD_SET(s->vkbd, &srv->rfdset);
290 if (s->vkbd > srv->maxfd)
291 srv->maxfd = s->vkbd;
294 /* Pass device for probing after both channels are established */
295 if (s->state == OPEN)
302 * Process data on the connection
306 server_process(bthid_server_p srv, int32_t fd)
308 bthid_session_p s = session_by_fd(srv, fd);
309 int32_t len, to_read;
310 int32_t (*cb)(bthid_session_p, uint8_t *, int32_t);
317 return (0); /* can happen on device disconnect */
322 to_read = sizeof(data.b);
323 } else if (fd == s->intr) {
325 to_read = sizeof(data.b);
327 assert(fd == s->vkbd);
329 cb = kbd_status_changed;
330 to_read = sizeof(data.s);
334 len = read(fd, &data, to_read);
335 } while (len < 0 && errno == EINTR);
338 syslog(LOG_ERR, "Could not read data from %s (%s). %s (%d)",
339 bt_ntoa(&s->bdaddr, NULL),
340 (fd == s->ctrl)? "control" : "interrupt",
341 strerror(errno), errno);
347 syslog(LOG_NOTICE, "Remote device %s has closed %s connection",
348 bt_ntoa(&s->bdaddr, NULL),
349 (fd == s->ctrl)? "control" : "interrupt");
354 (*cb)(s, (uint8_t *) &data, len);