1 /* 2 * rfcomm_sppd.c 3 */ 4 5 /*- 6 * SPDX-License-Identifier: BSD-2-Clause 7 * 8 * Copyright (c) 2003 Maksim Yevmenkin <m_evmenkin@yahoo.com> 9 * All rights reserved. 10 * 11 * Redistribution and use in source and binary forms, with or without 12 * modification, are permitted provided that the following conditions 13 * are met: 14 * 1. Redistributions of source code must retain the above copyright 15 * notice, this list of conditions and the following disclaimer. 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in the 18 * documentation and/or other materials provided with the distribution. 19 * 20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 * 32 * $Id: rfcomm_sppd.c,v 1.4 2003/09/07 18:15:55 max Exp $ 33 */ 34 35 #include <sys/stat.h> 36 #include <sys/types.h> 37 #define L2CAP_SOCKET_CHECKED 38 #include <bluetooth.h> 39 #include <ctype.h> 40 #include <err.h> 41 #include <errno.h> 42 #include <fcntl.h> 43 #include <grp.h> 44 #include <limits.h> 45 #include <paths.h> 46 #include <sdp.h> 47 #include <signal.h> 48 #include <stdarg.h> 49 #include <stdio.h> 50 #include <stdlib.h> 51 #include <string.h> 52 #include <syslog.h> 53 #include <termios.h> 54 #include <unistd.h> 55 #include <libutil.h> 56 57 #define SPPD_IDENT "rfcomm_sppd" 58 #define SPPD_BUFFER_SIZE 1024 59 #define max(a, b) (((a) > (b))? (a) : (b)) 60 61 int rfcomm_channel_lookup (bdaddr_t const *local, 62 bdaddr_t const *remote, 63 int service, int *channel, int *error); 64 65 static int sppd_ttys_open (char **tty, int *amaster, int *aslave); 66 static int sppd_read (int fd, char *buffer, int size); 67 static int sppd_write (int fd, char *buffer, int size); 68 static void sppd_sighandler (int s); 69 static void usage (void); 70 71 static int done; /* are we done? */ 72 73 /* Main */ 74 int 75 main(int argc, char *argv[]) 76 { 77 struct sigaction sa; 78 struct sockaddr_rfcomm ra; 79 bdaddr_t addr; 80 int n, background, channel, service, 81 s, amaster, aslave, fd, doserver, 82 dopty; 83 fd_set rfd; 84 char *tty = NULL, *ep = NULL, buf[SPPD_BUFFER_SIZE]; 85 86 memcpy(&addr, NG_HCI_BDADDR_ANY, sizeof(addr)); 87 background = channel = 0; 88 service = SDP_SERVICE_CLASS_SERIAL_PORT; 89 doserver = 0; 90 dopty = 0; 91 92 /* Parse command line options */ 93 while ((n = getopt(argc, argv, "a:bc:thS")) != -1) { 94 switch (n) { 95 case 'a': /* BDADDR */ 96 if (!bt_aton(optarg, &addr)) { 97 struct hostent *he = NULL; 98 99 if ((he = bt_gethostbyname(optarg)) == NULL) 100 errx(1, "%s: %s", optarg, hstrerror(h_errno)); 101 102 memcpy(&addr, he->h_addr, sizeof(addr)); 103 } 104 break; 105 106 case 'c': /* RFCOMM channel */ 107 channel = strtoul(optarg, &ep, 10); 108 if (*ep != '\0') { 109 channel = 0; 110 switch (tolower(optarg[0])) { 111 case 'd': /* DialUp Networking */ 112 service = SDP_SERVICE_CLASS_DIALUP_NETWORKING; 113 break; 114 115 case 'f': /* Fax */ 116 service = SDP_SERVICE_CLASS_FAX; 117 break; 118 119 case 'l': /* LAN */ 120 service = SDP_SERVICE_CLASS_LAN_ACCESS_USING_PPP; 121 break; 122 123 case 's': /* Serial Port */ 124 service = SDP_SERVICE_CLASS_SERIAL_PORT; 125 break; 126 127 default: 128 errx(1, "Unknown service name: %s", 129 optarg); 130 /* NOT REACHED */ 131 } 132 } 133 break; 134 135 case 'b': /* Run in background */ 136 background = 1; 137 break; 138 139 case 't': /* Open pseudo TTY */ 140 dopty = 1; 141 break; 142 143 case 'S': 144 doserver = 1; 145 break; 146 147 case 'h': 148 default: 149 usage(); 150 /* NOT REACHED */ 151 } 152 } 153 154 /* Check if we have everything we need */ 155 if (!doserver && memcmp(&addr, NG_HCI_BDADDR_ANY, sizeof(addr)) == 0) 156 usage(); 157 /* NOT REACHED */ 158 159 /* Set signal handlers */ 160 memset(&sa, 0, sizeof(sa)); 161 sa.sa_handler = sppd_sighandler; 162 163 if (sigaction(SIGTERM, &sa, NULL) < 0) 164 err(1, "Could not sigaction(SIGTERM)"); 165 166 if (sigaction(SIGHUP, &sa, NULL) < 0) 167 err(1, "Could not sigaction(SIGHUP)"); 168 169 if (sigaction(SIGINT, &sa, NULL) < 0) 170 err(1, "Could not sigaction(SIGINT)"); 171 172 sa.sa_handler = SIG_IGN; 173 sa.sa_flags = SA_NOCLDWAIT; 174 175 if (sigaction(SIGCHLD, &sa, NULL) < 0) 176 err(1, "Could not sigaction(SIGCHLD)"); 177 178 /* Open TTYs */ 179 if (dopty) { 180 if (sppd_ttys_open(&tty, &amaster, &aslave) < 0) 181 exit(1); 182 183 fd = amaster; 184 } else { 185 if (background) 186 usage(); 187 188 amaster = STDIN_FILENO; 189 fd = STDOUT_FILENO; 190 } 191 192 /* Open RFCOMM connection */ 193 194 if (doserver) { 195 struct sockaddr_rfcomm ma; 196 bdaddr_t bt_addr_any; 197 sdp_sp_profile_t sp; 198 void *ss; 199 uint32_t sdp_handle; 200 int acceptsock, aaddrlen; 201 202 acceptsock = socket(PF_BLUETOOTH, SOCK_STREAM, 203 BLUETOOTH_PROTO_RFCOMM); 204 if (acceptsock < 0) 205 err(1, "Could not create socket"); 206 207 memcpy(&bt_addr_any, NG_HCI_BDADDR_ANY, sizeof(bt_addr_any)); 208 209 memset(&ma, 0, sizeof(ma)); 210 ma.rfcomm_len = sizeof(ma); 211 ma.rfcomm_family = AF_BLUETOOTH; 212 memcpy(&ma.rfcomm_bdaddr, &bt_addr_any, sizeof(bt_addr_any)); 213 ma.rfcomm_channel = channel; 214 215 if (bind(acceptsock, (struct sockaddr *)&ma, sizeof(ma)) < 0) 216 err(1, "Could not bind socket on channel %d", channel); 217 if (listen(acceptsock, 10) != 0) 218 err(1, "Could not listen on socket"); 219 220 aaddrlen = sizeof(ma); 221 if (getsockname(acceptsock, (struct sockaddr *)&ma, &aaddrlen) < 0) 222 err(1, "Could not get socket name"); 223 channel = ma.rfcomm_channel; 224 225 ss = sdp_open_local(NULL); 226 if (ss == NULL) 227 errx(1, "Unable to create local SDP session"); 228 if (sdp_error(ss) != 0) 229 errx(1, "Unable to open local SDP session. %s (%d)", 230 strerror(sdp_error(ss)), sdp_error(ss)); 231 memset(&sp, 0, sizeof(sp)); 232 sp.server_channel = channel; 233 234 if (sdp_register_service(ss, SDP_SERVICE_CLASS_SERIAL_PORT, 235 &bt_addr_any, (void *)&sp, sizeof(sp), 236 &sdp_handle) != 0) { 237 errx(1, "Unable to register LAN service with " 238 "local SDP daemon. %s (%d)", 239 strerror(sdp_error(ss)), sdp_error(ss)); 240 } 241 242 s = -1; 243 while (s < 0) { 244 aaddrlen = sizeof(ra); 245 s = accept(acceptsock, (struct sockaddr *)&ra, 246 &aaddrlen); 247 if (s < 0) 248 err(1, "Unable to accept()"); 249 if (memcmp(&addr, NG_HCI_BDADDR_ANY, sizeof(addr)) && 250 memcmp(&addr, &ra.rfcomm_bdaddr, sizeof(addr))) { 251 warnx("Connect from wrong client"); 252 close(s); 253 s = -1; 254 } 255 } 256 sdp_unregister_service(ss, sdp_handle); 257 sdp_close(ss); 258 close(acceptsock); 259 } else { 260 /* Check channel, if was not set then obtain it via SDP */ 261 if (channel == 0 && service != 0) 262 if (rfcomm_channel_lookup(NULL, &addr, 263 service, &channel, &n) != 0) 264 errc(1, n, "Could not obtain RFCOMM channel"); 265 if (channel <= 0 || channel > 30) 266 errx(1, "Invalid RFCOMM channel number %d", channel); 267 268 s = socket(PF_BLUETOOTH, SOCK_STREAM, BLUETOOTH_PROTO_RFCOMM); 269 if (s < 0) 270 err(1, "Could not create socket"); 271 272 memset(&ra, 0, sizeof(ra)); 273 ra.rfcomm_len = sizeof(ra); 274 ra.rfcomm_family = AF_BLUETOOTH; 275 276 if (bind(s, (struct sockaddr *) &ra, sizeof(ra)) < 0) 277 err(1, "Could not bind socket"); 278 279 memcpy(&ra.rfcomm_bdaddr, &addr, sizeof(ra.rfcomm_bdaddr)); 280 ra.rfcomm_channel = channel; 281 282 if (connect(s, (struct sockaddr *) &ra, sizeof(ra)) < 0) 283 err(1, "Could not connect socket"); 284 } 285 286 /* Became daemon if required */ 287 if (background && daemon(0, 0) < 0) 288 err(1, "Could not daemon()"); 289 290 openlog(SPPD_IDENT, LOG_NDELAY|LOG_PERROR|LOG_PID, LOG_DAEMON); 291 syslog(LOG_INFO, "Starting on %s...", (tty != NULL)? tty : "stdin/stdout"); 292 293 /* Print used tty on stdout for wrappers to pick up */ 294 if (!background) 295 fprintf(stdout, "%s\n", tty); 296 297 for (done = 0; !done; ) { 298 FD_ZERO(&rfd); 299 FD_SET(amaster, &rfd); 300 FD_SET(s, &rfd); 301 302 n = select(max(amaster, s) + 1, &rfd, NULL, NULL, NULL); 303 if (n < 0) { 304 if (errno == EINTR) 305 continue; 306 307 syslog(LOG_ERR, "Could not select(). %s", 308 strerror(errno)); 309 exit(1); 310 } 311 312 if (n == 0) 313 continue; 314 315 if (FD_ISSET(amaster, &rfd)) { 316 n = sppd_read(amaster, buf, sizeof(buf)); 317 if (n < 0) { 318 syslog(LOG_ERR, "Could not read master pty, " \ 319 "fd=%d. %s", amaster, strerror(errno)); 320 exit(1); 321 } 322 323 if (n == 0) 324 break; /* XXX */ 325 326 if (sppd_write(s, buf, n) < 0) { 327 syslog(LOG_ERR, "Could not write to socket, " \ 328 "fd=%d, size=%d. %s", 329 s, n, strerror(errno)); 330 exit(1); 331 } 332 } 333 334 if (FD_ISSET(s, &rfd)) { 335 n = sppd_read(s, buf, sizeof(buf)); 336 if (n < 0) { 337 syslog(LOG_ERR, "Could not read socket, " \ 338 "fd=%d. %s", s, strerror(errno)); 339 exit(1); 340 } 341 342 if (n == 0) 343 break; 344 345 if (sppd_write(fd, buf, n) < 0) { 346 syslog(LOG_ERR, "Could not write to master " \ 347 "pty, fd=%d, size=%d. %s", 348 fd, n, strerror(errno)); 349 exit(1); 350 } 351 } 352 } 353 354 syslog(LOG_INFO, "Completed on %s", (tty != NULL)? tty : "stdin/stdout"); 355 closelog(); 356 357 close(s); 358 359 if (tty != NULL) { 360 close(aslave); 361 close(amaster); 362 } 363 364 return (0); 365 } 366 367 /* Open TTYs */ 368 static int 369 sppd_ttys_open(char **tty, int *amaster, int *aslave) 370 { 371 char pty[PATH_MAX]; 372 struct termios tio; 373 374 cfmakeraw(&tio); 375 376 if (openpty(amaster, aslave, pty, &tio, NULL) == -1) { 377 syslog(LOG_ERR, "Could not openpty(). %s", strerror(errno)); 378 return (-1); 379 } 380 381 if ((*tty = strdup(pty)) == NULL) { 382 syslog(LOG_ERR, "Could not strdup(). %s", strerror(errno)); 383 close(*aslave); 384 close(*amaster); 385 return (-1); 386 } 387 388 return (0); 389 } /* sppd_ttys_open */ 390 391 /* Read data */ 392 static int 393 sppd_read(int fd, char *buffer, int size) 394 { 395 int n; 396 397 again: 398 n = read(fd, buffer, size); 399 if (n < 0) { 400 if (errno == EINTR) 401 goto again; 402 403 return (-1); 404 } 405 406 return (n); 407 } /* sppd_read */ 408 409 /* Write data */ 410 static int 411 sppd_write(int fd, char *buffer, int size) 412 { 413 int n, wrote; 414 415 for (wrote = 0; size > 0; ) { 416 n = write(fd, buffer, size); 417 switch (n) { 418 case -1: 419 if (errno != EINTR) 420 return (-1); 421 break; 422 423 case 0: 424 /* XXX can happen? */ 425 break; 426 427 default: 428 wrote += n; 429 buffer += n; 430 size -= n; 431 break; 432 } 433 } 434 435 return (wrote); 436 } /* sppd_write */ 437 438 /* Signal handler */ 439 static void 440 sppd_sighandler(int s) 441 { 442 syslog(LOG_INFO, "Signal %d received. Total %d signals received\n", 443 s, ++ done); 444 } /* sppd_sighandler */ 445 446 /* Display usage and exit */ 447 static void 448 usage(void) 449 { 450 fprintf(stdout, 451 "Usage: %s options\n" \ 452 "Where options are:\n" \ 453 "\t-a address Peer address (required in client mode)\n" \ 454 "\t-b Run in background\n" \ 455 "\t-c channel RFCOMM channel to connect to or listen on\n" \ 456 "\t-t use slave pseudo tty (required in background mode)\n" \ 457 "\t-S Server mode\n" \ 458 "\t-h Display this message\n", SPPD_IDENT); 459 exit(255); 460 } /* usage */ 461 462