blob: 41f5e3c0e61b291fab883d9bc586eeac1825c354 [file] [log] [blame]
/*
*
* BlueZ - Bluetooth protocol stack for Linux
*
* Copyright (C) 2004-2010 Marcel Holtmann <marcel@holtmann.org>
*
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <stdlib.h>
#include <errno.h>
#include <fcntl.h>
#include <unistd.h>
#include <sys/ioctl.h>
#include <sys/socket.h>
#include <bluetooth/bluetooth.h>
#include <bluetooth/hci.h>
#include <bluetooth/hci_lib.h>
#include <bluetooth/rfcomm.h>
#include <bluetooth/l2cap.h>
#include <bluetooth/sco.h>
#include <bluetooth/sdp.h>
#include <bluetooth/sdp_lib.h>
#include <glib.h>
#include "glib-helper.h"
/* Number of seconds to keep a sdp_session_t in the cache */
#define CACHE_TIMEOUT 2
struct cached_sdp_session {
bdaddr_t src;
bdaddr_t dst;
sdp_session_t *session;
guint timer;
};
static GSList *cached_sdp_sessions = NULL;
struct hci_cmd_data {
bt_hci_result_t cb;
uint16_t handle;
uint16_t ocf;
gpointer caller_data;
};
static gboolean cached_session_expired(gpointer user_data)
{
struct cached_sdp_session *cached = user_data;
cached_sdp_sessions = g_slist_remove(cached_sdp_sessions, cached);
sdp_close(cached->session);
g_free(cached);
return FALSE;
}
static sdp_session_t *get_sdp_session(const bdaddr_t *src, const bdaddr_t *dst)
{
GSList *l;
for (l = cached_sdp_sessions; l != NULL; l = l->next) {
struct cached_sdp_session *c = l->data;
sdp_session_t *session;
if (bacmp(&c->src, src) || bacmp(&c->dst, dst))
continue;
g_source_remove(c->timer);
session = c->session;
cached_sdp_sessions = g_slist_remove(cached_sdp_sessions, c);
g_free(c);
return session;
}
return sdp_connect(src, dst, SDP_NON_BLOCKING);
}
static void cache_sdp_session(bdaddr_t *src, bdaddr_t *dst,
sdp_session_t *session)
{
struct cached_sdp_session *cached;
cached = g_new0(struct cached_sdp_session, 1);
bacpy(&cached->src, src);
bacpy(&cached->dst, dst);
cached->session = session;
cached_sdp_sessions = g_slist_append(cached_sdp_sessions, cached);
cached->timer = g_timeout_add_seconds(CACHE_TIMEOUT,
cached_session_expired,
cached);
}
int set_nonblocking(int fd)
{
long arg;
arg = fcntl(fd, F_GETFL);
if (arg < 0)
return -errno;
/* Return if already nonblocking */
if (arg & O_NONBLOCK)
return 0;
arg |= O_NONBLOCK;
if (fcntl(fd, F_SETFL, arg) < 0)
return -errno;
return 0;
}
struct search_context {
bdaddr_t src;
bdaddr_t dst;
sdp_session_t *session;
bt_callback_t cb;
bt_destroy_t destroy;
gpointer user_data;
uuid_t uuid;
guint io_id;
};
static GSList *context_list = NULL;
static void search_context_cleanup(struct search_context *ctxt)
{
context_list = g_slist_remove(context_list, ctxt);
if (ctxt->destroy)
ctxt->destroy(ctxt->user_data);
g_free(ctxt);
}
static void search_completed_cb(uint8_t type, uint16_t status,
uint8_t *rsp, size_t size, void *user_data)
{
struct search_context *ctxt = user_data;
sdp_list_t *recs = NULL;
int scanned, seqlen = 0, bytesleft = size;
uint8_t dataType;
int err = 0;
if (status || type != SDP_SVC_SEARCH_ATTR_RSP) {
err = -EPROTO;
goto done;
}
scanned = sdp_extract_seqtype(rsp, bytesleft, &dataType, &seqlen);
if (!scanned || !seqlen)
goto done;
rsp += scanned;
bytesleft -= scanned;
do {
sdp_record_t *rec;
int recsize;
recsize = 0;
rec = sdp_extract_pdu(rsp, bytesleft, &recsize);
if (!rec)
break;
if (!recsize) {
sdp_record_free(rec);
break;
}
scanned += recsize;
rsp += recsize;
bytesleft -= recsize;
recs = sdp_list_append(recs, rec);
} while (scanned < (ssize_t) size && bytesleft > 0);
done:
cache_sdp_session(&ctxt->src, &ctxt->dst, ctxt->session);
if (ctxt->cb)
ctxt->cb(recs, err, ctxt->user_data);
if (recs)
sdp_list_free(recs, (sdp_free_func_t) sdp_record_free);
search_context_cleanup(ctxt);
}
static gboolean search_process_cb(GIOChannel *chan,
GIOCondition cond, void *user_data)
{
struct search_context *ctxt = user_data;
int err = 0;
if (cond & (G_IO_ERR | G_IO_HUP | G_IO_NVAL)) {
err = EIO;
goto failed;
}
if (sdp_process(ctxt->session) < 0)
goto failed;
return TRUE;
failed:
if (err) {
sdp_close(ctxt->session);
ctxt->session = NULL;
if (ctxt->cb)
ctxt->cb(NULL, err, ctxt->user_data);
search_context_cleanup(ctxt);
}
return FALSE;
}
static gboolean connect_watch(GIOChannel *chan, GIOCondition cond, gpointer user_data)
{
struct search_context *ctxt = user_data;
sdp_list_t *search, *attrids;
uint32_t range = 0x0000ffff;
socklen_t len;
int sk, err = 0;
sk = g_io_channel_unix_get_fd(chan);
ctxt->io_id = 0;
len = sizeof(err);
if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &err, &len) < 0) {
err = errno;
goto failed;
}
if (err != 0)
goto failed;
if (sdp_set_notify(ctxt->session, search_completed_cb, ctxt) < 0) {
err = EIO;
goto failed;
}
search = sdp_list_append(NULL, &ctxt->uuid);
attrids = sdp_list_append(NULL, &range);
if (sdp_service_search_attr_async(ctxt->session,
search, SDP_ATTR_REQ_RANGE, attrids) < 0) {
sdp_list_free(attrids, NULL);
sdp_list_free(search, NULL);
err = EIO;
goto failed;
}
sdp_list_free(attrids, NULL);
sdp_list_free(search, NULL);
/* Set callback responsible for update the internal SDP transaction */
ctxt->io_id = g_io_add_watch(chan,
G_IO_IN | G_IO_HUP | G_IO_ERR | G_IO_NVAL,
search_process_cb, ctxt);
return FALSE;
failed:
sdp_close(ctxt->session);
ctxt->session = NULL;
if (ctxt->cb)
ctxt->cb(NULL, -err, ctxt->user_data);
search_context_cleanup(ctxt);
return FALSE;
}
static int create_search_context(struct search_context **ctxt,
const bdaddr_t *src, const bdaddr_t *dst,
uuid_t *uuid)
{
sdp_session_t *s;
GIOChannel *chan;
if (!ctxt)
return -EINVAL;
s = get_sdp_session(src, dst);
if (!s)
return -errno;
*ctxt = g_try_malloc0(sizeof(struct search_context));
if (!*ctxt) {
sdp_close(s);
return -ENOMEM;
}
bacpy(&(*ctxt)->src, src);
bacpy(&(*ctxt)->dst, dst);
(*ctxt)->session = s;
(*ctxt)->uuid = *uuid;
chan = g_io_channel_unix_new(sdp_get_socket(s));
(*ctxt)->io_id = g_io_add_watch(chan,
G_IO_OUT | G_IO_HUP | G_IO_ERR | G_IO_NVAL,
connect_watch, *ctxt);
g_io_channel_unref(chan);
return 0;
}
int bt_search_service(const bdaddr_t *src, const bdaddr_t *dst,
uuid_t *uuid, bt_callback_t cb, void *user_data,
bt_destroy_t destroy)
{
struct search_context *ctxt = NULL;
int err;
if (!cb)
return -EINVAL;
err = create_search_context(&ctxt, src, dst, uuid);
if (err < 0)
return err;
ctxt->cb = cb;
ctxt->destroy = destroy;
ctxt->user_data = user_data;
context_list = g_slist_append(context_list, ctxt);
return 0;
}
int bt_discover_services(const bdaddr_t *src, const bdaddr_t *dst,
bt_callback_t cb, void *user_data, bt_destroy_t destroy)
{
uuid_t uuid;
sdp_uuid16_create(&uuid, PUBLIC_BROWSE_GROUP);
return bt_search_service(src, dst, &uuid, cb, user_data, destroy);
}
static int find_by_bdaddr(const void *data, const void *user_data)
{
const struct search_context *ctxt = data, *search = user_data;
return (bacmp(&ctxt->dst, &search->dst) &&
bacmp(&ctxt->src, &search->src));
}
int bt_cancel_discovery(const bdaddr_t *src, const bdaddr_t *dst)
{
struct search_context search, *ctxt;
GSList *match;
memset(&search, 0, sizeof(search));
bacpy(&search.src, src);
bacpy(&search.dst, dst);
/* Ongoing SDP Discovery */
match = g_slist_find_custom(context_list, &search, find_by_bdaddr);
if (!match)
return -ENODATA;
ctxt = match->data;
if (!ctxt->session)
return -ENOTCONN;
if (ctxt->io_id)
g_source_remove(ctxt->io_id);
if (ctxt->session)
sdp_close(ctxt->session);
search_context_cleanup(ctxt);
return 0;
}
char *bt_uuid2string(uuid_t *uuid)
{
gchar *str;
uuid_t uuid128;
unsigned int data0;
unsigned short data1;
unsigned short data2;
unsigned short data3;
unsigned int data4;
unsigned short data5;
if (!uuid)
return NULL;
switch (uuid->type) {
case SDP_UUID16:
sdp_uuid16_to_uuid128(&uuid128, uuid);
break;
case SDP_UUID32:
sdp_uuid32_to_uuid128(&uuid128, uuid);
break;
case SDP_UUID128:
memcpy(&uuid128, uuid, sizeof(uuid_t));
break;
default:
/* Type of UUID unknown */
return NULL;
}
memcpy(&data0, &uuid128.value.uuid128.data[0], 4);
memcpy(&data1, &uuid128.value.uuid128.data[4], 2);
memcpy(&data2, &uuid128.value.uuid128.data[6], 2);
memcpy(&data3, &uuid128.value.uuid128.data[8], 2);
memcpy(&data4, &uuid128.value.uuid128.data[10], 4);
memcpy(&data5, &uuid128.value.uuid128.data[14], 2);
str = g_try_malloc0(MAX_LEN_UUID_STR);
if (!str)
return NULL;
sprintf(str, "%.8x-%.4x-%.4x-%.4x-%.8x%.4x",
g_ntohl(data0), g_ntohs(data1),
g_ntohs(data2), g_ntohs(data3),
g_ntohl(data4), g_ntohs(data5));
return str;
}
static struct {
const char *name;
uint16_t class;
} bt_services[] = {
{ "vcp", VIDEO_CONF_SVCLASS_ID },
{ "pbap", PBAP_SVCLASS_ID },
{ "sap", SAP_SVCLASS_ID },
{ "ftp", OBEX_FILETRANS_SVCLASS_ID },
{ "bpp", BASIC_PRINTING_SVCLASS_ID },
{ "bip", IMAGING_SVCLASS_ID },
{ "synch", IRMC_SYNC_SVCLASS_ID },
{ "dun", DIALUP_NET_SVCLASS_ID },
{ "opp", OBEX_OBJPUSH_SVCLASS_ID },
{ "fax", FAX_SVCLASS_ID },
{ "spp", SERIAL_PORT_SVCLASS_ID },
{ "hsp", HEADSET_SVCLASS_ID },
{ "hfp", HANDSFREE_SVCLASS_ID },
{ }
};
uint16_t bt_name2class(const char *pattern)
{
int i;
for (i = 0; bt_services[i].name; i++) {
if (strcasecmp(bt_services[i].name, pattern) == 0)
return bt_services[i].class;
}
return 0;
}
static inline gboolean is_uuid128(const char *string)
{
return (strlen(string) == 36 &&
string[8] == '-' &&
string[13] == '-' &&
string[18] == '-' &&
string[23] == '-');
}
char *bt_name2string(const char *pattern)
{
uuid_t uuid;
uint16_t uuid16;
int i;
/* UUID 128 string format */
if (is_uuid128(pattern))
return g_strdup(pattern);
/* Friendly service name format */
uuid16 = bt_name2class(pattern);
if (uuid16)
goto proceed;
/* HEX format */
uuid16 = strtol(pattern, NULL, 16);
for (i = 0; bt_services[i].class; i++) {
if (bt_services[i].class == uuid16)
goto proceed;
}
return NULL;
proceed:
sdp_uuid16_create(&uuid, uuid16);
return bt_uuid2string(&uuid);
}
int bt_string2uuid(uuid_t *uuid, const char *string)
{
uint32_t data0, data4;
uint16_t data1, data2, data3, data5;
if (is_uuid128(string) &&
sscanf(string, "%08x-%04hx-%04hx-%04hx-%08x%04hx",
&data0, &data1, &data2, &data3, &data4, &data5) == 6) {
uint8_t val[16];
data0 = g_htonl(data0);
data1 = g_htons(data1);
data2 = g_htons(data2);
data3 = g_htons(data3);
data4 = g_htonl(data4);
data5 = g_htons(data5);
memcpy(&val[0], &data0, 4);
memcpy(&val[4], &data1, 2);
memcpy(&val[6], &data2, 2);
memcpy(&val[8], &data3, 2);
memcpy(&val[10], &data4, 4);
memcpy(&val[14], &data5, 2);
sdp_uuid128_create(uuid, val);
return 0;
} else {
uint16_t class = bt_name2class(string);
if (class) {
sdp_uuid16_create(uuid, class);
return 0;
}
}
return -1;
}
gchar *bt_list2string(GSList *list)
{
GSList *l;
gchar *str, *tmp;
if (!list)
return NULL;
str = g_strdup((const gchar *) list->data);
for (l = list->next; l; l = l->next) {
tmp = g_strconcat(str, " " , (const gchar *) l->data, NULL);
g_free(str);
str = tmp;
}
return str;
}
GSList *bt_string2list(const gchar *str)
{
GSList *l = NULL;
gchar **uuids;
int i = 0;
if (!str)
return NULL;
/* FIXME: eglib doesn't support g_strsplit */
uuids = g_strsplit(str, " ", 0);
if (!uuids)
return NULL;
while (uuids[i]) {
l = g_slist_append(l, uuids[i]);
i++;
}
g_free(uuids);
return l;
}
static gboolean hci_event_watch(GIOChannel *io,
GIOCondition cond, gpointer user_data)
{
unsigned char buf[HCI_MAX_EVENT_SIZE], *body;
struct hci_cmd_data *cmd = user_data;
evt_cmd_status *evt_status;
evt_auth_complete *evt_auth;
evt_encrypt_change *evt_enc;
hci_event_hdr *hdr;
set_conn_encrypt_cp cp;
int dd;
uint16_t ocf;
uint8_t status = HCI_OE_POWER_OFF;
if (cond & G_IO_NVAL) {
cmd->cb(status, cmd->caller_data);
return FALSE;
}
if (cond & (G_IO_ERR | G_IO_HUP))
goto failed;
dd = g_io_channel_unix_get_fd(io);
if (read(dd, buf, sizeof(buf)) < 0)
goto failed;
hdr = (hci_event_hdr *) (buf + 1);
body = buf + (1 + HCI_EVENT_HDR_SIZE);
switch (hdr->evt) {
case EVT_CMD_STATUS:
evt_status = (evt_cmd_status *) body;
ocf = cmd_opcode_ocf(evt_status->opcode);
if (ocf != cmd->ocf)
return TRUE;
switch (ocf) {
case OCF_AUTH_REQUESTED:
case OCF_SET_CONN_ENCRYPT:
if (evt_status->status != 0) {
/* Baseband rejected command */
status = evt_status->status;
goto failed;
}
break;
default:
return TRUE;
}
/* Wait for the next event */
return TRUE;
case EVT_AUTH_COMPLETE:
evt_auth = (evt_auth_complete *) body;
if (evt_auth->handle != cmd->handle) {
/* Skipping */
return TRUE;
}
if (evt_auth->status != 0x00) {
status = evt_auth->status;
/* Abort encryption */
goto failed;
}
memset(&cp, 0, sizeof(cp));
cp.handle = cmd->handle;
cp.encrypt = 1;
cmd->ocf = OCF_SET_CONN_ENCRYPT;
if (hci_send_cmd(dd, OGF_LINK_CTL, OCF_SET_CONN_ENCRYPT,
SET_CONN_ENCRYPT_CP_SIZE, &cp) < 0) {
status = HCI_COMMAND_DISALLOWED;
goto failed;
}
/* Wait for encrypt change event */
return TRUE;
case EVT_ENCRYPT_CHANGE:
evt_enc = (evt_encrypt_change *) body;
if (evt_enc->handle != cmd->handle)
return TRUE;
/* Procedure finished: reporting status */
status = evt_enc->status;
break;
default:
/* Skipping */
return TRUE;
}
failed:
cmd->cb(status, cmd->caller_data);
g_io_channel_shutdown(io, TRUE, NULL);
return FALSE;
}
int bt_acl_encrypt(const bdaddr_t *src, const bdaddr_t *dst,
bt_hci_result_t cb, gpointer user_data)
{
GIOChannel *io;
struct hci_cmd_data *cmd;
struct hci_conn_info_req *cr;
auth_requested_cp cp;
struct hci_filter nf;
int dd, dev_id, err;
char src_addr[18];
uint32_t link_mode;
uint16_t handle;
ba2str(src, src_addr);
dev_id = hci_devid(src_addr);
if (dev_id < 0)
return -errno;
dd = hci_open_dev(dev_id);
if (dd < 0)
return -errno;
cr = g_malloc0(sizeof(*cr) + sizeof(struct hci_conn_info));
cr->type = ACL_LINK;
bacpy(&cr->bdaddr, dst);
err = ioctl(dd, HCIGETCONNINFO, cr);
link_mode = cr->conn_info->link_mode;
handle = cr->conn_info->handle;
g_free(cr);
if (err < 0) {
err = errno;
goto failed;
}
if (link_mode & HCI_LM_ENCRYPT) {
/* Already encrypted */
err = EALREADY;
goto failed;
}
memset(&cp, 0, sizeof(cp));
cp.handle = htobs(handle);
if (hci_send_cmd(dd, OGF_LINK_CTL, OCF_AUTH_REQUESTED,
AUTH_REQUESTED_CP_SIZE, &cp) < 0) {
err = errno;
goto failed;
}
cmd = g_new0(struct hci_cmd_data, 1);
cmd->handle = handle;
cmd->ocf = OCF_AUTH_REQUESTED;
cmd->cb = cb;
cmd->caller_data = user_data;
hci_filter_clear(&nf);
hci_filter_set_ptype(HCI_EVENT_PKT, &nf);
hci_filter_set_event(EVT_CMD_STATUS, &nf);
hci_filter_set_event(EVT_AUTH_COMPLETE, &nf);
hci_filter_set_event(EVT_ENCRYPT_CHANGE, &nf);
if (setsockopt(dd, SOL_HCI, HCI_FILTER, &nf, sizeof(nf)) < 0) {
err = errno;
g_free(cmd);
goto failed;
}
io = g_io_channel_unix_new(dd);
g_io_channel_set_close_on_unref(io, FALSE);
g_io_add_watch_full(io, G_PRIORITY_DEFAULT,
G_IO_HUP | G_IO_ERR | G_IO_NVAL | G_IO_IN,
hci_event_watch, cmd, g_free);
g_io_channel_unref(io);
return 0;
failed:
close(dd);
return -err;
}