⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 main.c

📁 bluetooth 开发应用bluez-utils-2.23
💻 C
📖 第 1 页 / 共 2 页
字号:
/* * *  BlueZ - Bluetooth protocol stack for Linux * *  Copyright (C) 2003-2005  Marcel Holtmann <marcel@holtmann.org> * * *  This program is free software; you can redistribute it and/or modify *  it under the terms of the GNU General Public License as published by *  the Free Software Foundation; either version 2 of the License, or *  (at your option) any later version. * *  This program is distributed in the hope that it will be useful, *  but WITHOUT ANY WARRANTY; without even the implied warranty of *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the *  GNU General Public License for more details. * *  You should have received a copy of the GNU General Public License *  along with this program; if not, write to the Free Software *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA * */#ifdef HAVE_CONFIG_H#include <config.h>#endif#include <stdio.h>#include <errno.h>#include <fcntl.h>#include <unistd.h>#include <stdlib.h>#include <malloc.h>#include <syslog.h>#include <signal.h>#include <getopt.h>#include <sys/poll.h>#include <sys/ioctl.h>#include <sys/socket.h>#include <bluetooth/bluetooth.h>#include <bluetooth/hci.h>#include <bluetooth/hci_lib.h>#include <bluetooth/l2cap.h>#include <bluetooth/sdp.h>#include <bluetooth/hidp.h>#include "hidd.h"enum {	NONE,	SHOW,	SERVER,	SEARCH,	CONNECT,	KILL};static volatile sig_atomic_t __io_canceled = 0;static void sig_hup(int sig){}static void sig_term(int sig){	__io_canceled = 1;}static int l2cap_connect(bdaddr_t *src, bdaddr_t *dst, unsigned short psm){	struct sockaddr_l2 addr;	struct l2cap_options opts;	int sk;	if ((sk = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP)) < 0)		return -1;	memset(&addr, 0, sizeof(addr));	addr.l2_family  = AF_BLUETOOTH;	bacpy(&addr.l2_bdaddr, src);	if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {		close(sk);		return -1;	}	memset(&opts, 0, sizeof(opts));	opts.imtu = HIDP_DEFAULT_MTU;	opts.omtu = HIDP_DEFAULT_MTU;	opts.flush_to = 0xffff;	setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts));	memset(&addr, 0, sizeof(addr));	addr.l2_family  = AF_BLUETOOTH;	bacpy(&addr.l2_bdaddr, dst);	addr.l2_psm = htobs(psm);	if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {		close(sk);		return -1;	}	return sk;}static int l2cap_listen(const bdaddr_t *bdaddr, unsigned short psm, int lm, int backlog){	struct sockaddr_l2 addr;	struct l2cap_options opts;	int sk;	if ((sk = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP)) < 0)		return -1;	memset(&addr, 0, sizeof(addr));	addr.l2_family = AF_BLUETOOTH;	bacpy(&addr.l2_bdaddr, bdaddr);	addr.l2_psm = htobs(psm);	if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {		close(sk);		return -1;	}	setsockopt(sk, SOL_L2CAP, L2CAP_LM, &lm, sizeof(lm));	memset(&opts, 0, sizeof(opts));	opts.imtu = HIDP_DEFAULT_MTU;	opts.omtu = HIDP_DEFAULT_MTU;	opts.flush_to = 0xffff;	setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts));	if (listen(sk, backlog) < 0) {		close(sk);		return -1;	}	return sk;}static int l2cap_accept(int sk, bdaddr_t *bdaddr){	struct sockaddr_l2 addr;	socklen_t addrlen;	int nsk;	memset(&addr, 0, sizeof(addr));	addrlen = sizeof(addr);	if ((nsk = accept(sk, (struct sockaddr *) &addr, &addrlen)) < 0)		return -1;	if (bdaddr)		bacpy(bdaddr, &addr.l2_bdaddr);	return nsk;}static int request_authentication(bdaddr_t *src, bdaddr_t *dst){	struct hci_conn_info_req *cr;	char addr[18];	int err, dd, dev_id;	ba2str(src, addr);	dev_id = hci_devid(addr);	if (dev_id < 0)		return dev_id;	dd = hci_open_dev(dev_id);	if (dd < 0)		return dd;	cr = malloc(sizeof(*cr) + sizeof(struct hci_conn_info));	if (!cr)		return -ENOMEM;	bacpy(&cr->bdaddr, dst);	cr->type = ACL_LINK;	err = ioctl(dd, HCIGETCONNINFO, (unsigned long) cr);	if (err < 0) {		free(cr);		hci_close_dev(dd);		return err;	}	err = hci_authenticate_link(dd, htobs(cr->conn_info->handle), 25000);	free(cr);	hci_close_dev(dd);	return err;}static int request_encryption(bdaddr_t *src, bdaddr_t *dst){	struct hci_conn_info_req *cr;	char addr[18];	int err, dd, dev_id;	ba2str(src, addr);	dev_id = hci_devid(addr);	if (dev_id < 0)		return dev_id;	dd = hci_open_dev(dev_id);	if (dd < 0)		return dd;	cr = malloc(sizeof(*cr) + sizeof(struct hci_conn_info));	if (!cr)		return -ENOMEM;	bacpy(&cr->bdaddr, dst);	cr->type = ACL_LINK;	err = ioctl(dd, HCIGETCONNINFO, (unsigned long) cr);	if (err < 0) {		free(cr);		hci_close_dev(dd);		return err;	}	err = hci_encrypt_link(dd, htobs(cr->conn_info->handle), 1, 25000);	free(cr);	hci_close_dev(dd);	return err;}static int create_device(int ctl, int csk, int isk, uint8_t subclass, int nosdp, int nocheck, int encrypt, int timeout){	struct hidp_connadd_req req;	struct sockaddr_l2 addr;	socklen_t addrlen;	bdaddr_t src, dst;	char bda[18];	int err;	memset(&addr, 0, sizeof(addr));	addrlen = sizeof(addr);	if (getsockname(csk, (struct sockaddr *) &addr, &addrlen) < 0)		return -1;	bacpy(&src, &addr.l2_bdaddr);	memset(&addr, 0, sizeof(addr));	addrlen = sizeof(addr);	if (getpeername(csk, (struct sockaddr *) &addr, &addrlen) < 0)		return -1;	bacpy(&dst, &addr.l2_bdaddr);	memset(&req, 0, sizeof(req));	req.ctrl_sock = csk;	req.intr_sock = isk;	req.flags     = 0;	req.idle_to   = timeout * 60;	err = get_stored_device_info(&src, &dst, &req);	if (!err)		goto create;	if (!nocheck)		return -1;	if (!nosdp) {		err = get_sdp_device_info(&src, &dst, &req);		if (err < 0)			goto error;	} else {		struct l2cap_conninfo conn;		socklen_t size;		uint8_t class[3];		memset(&conn, 0, sizeof(conn));		size = sizeof(conn);		if (getsockopt(csk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &size) < 0)			memset(class, 0, 3);		else			memcpy(class, conn.dev_class, 3);		if (class[1] == 0x25 && (class[2] == 0x00 || class[2] == 0x01))			req.subclass = class[0];		else			req.subclass = 0xc0;	}create:	if (subclass != 0x00)		req.subclass = subclass;	ba2str(&dst, bda);	syslog(LOG_INFO, "New HID device %s (%s)", bda, req.name);	if (encrypt && (req.subclass & 0x40)) {		err = request_authentication(&src, &dst);		if (err < 0) {			syslog(LOG_ERR, "Authentication for %s failed", bda);			goto error;		}		err = request_encryption(&src, &dst);		if (err < 0)			syslog(LOG_ERR, "Encryption for %s failed", bda);	}	err = ioctl(ctl, HIDPCONNADD, &req);error:	if (req.rd_data)		free(req.rd_data);	return err;}static void run_server(int ctl, int csk, int isk, uint8_t subclass, int nosdp, int nocheck, int encrypt, int timeout){	struct pollfd p[2];	short events;	int err, ncsk, nisk;	p[0].fd = csk;	p[0].events = POLLIN | POLLERR | POLLHUP;	p[1].fd = isk;	p[1].events = POLLIN | POLLERR | POLLHUP;	while (!__io_canceled) {		p[0].revents = 0;		p[1].revents = 0;		err = poll(p, 2, 100);		if (err <= 0)			continue;		events = p[0].revents | p[1].revents;		if (events & POLLIN) {			ncsk = l2cap_accept(csk, NULL);			nisk = l2cap_accept(isk, NULL);			err = create_device(ctl, ncsk, nisk, subclass, nosdp, nocheck, encrypt, timeout);			if (err < 0)				syslog(LOG_ERR, "HID create error %d (%s)",						errno, strerror(errno));			close(nisk);			sleep(1);			close(ncsk);		}	}}static char *hidp_state[] = {	"unknown",	"connected",	"open",	"bound",	"listening",	"connecting",	"connecting",	"config",	"disconnecting",	"closed"};static char *hidp_flagstostr(uint32_t flags){	static char str[100];	str[0] = 0;	strcat(str, "[");	if (flags & (1 << HIDP_BOOT_PROTOCOL_MODE))		strcat(str, "boot-protocol");	strcat(str, "]");	return str;}static void do_show(int ctl){	struct hidp_connlist_req req;	struct hidp_conninfo ci[16];	char addr[18];	int i;	req.cnum = 16;	req.ci   = ci;	if (ioctl(ctl, HIDPGETCONNLIST, &req) < 0) {		perror("Can't get connection list");

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -