📄 main.c
字号:
/* * * BlueZ - Bluetooth protocol stack for Linux * * Copyright (C) 2003-2005 Marcel Holtmann <marcel@holtmann.org> * * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA * */#ifdef HAVE_CONFIG_H#include <config.h>#endif#include <stdio.h>#include <errno.h>#include <fcntl.h>#include <unistd.h>#include <stdlib.h>#include <malloc.h>#include <syslog.h>#include <signal.h>#include <getopt.h>#include <sys/poll.h>#include <sys/ioctl.h>#include <sys/socket.h>#include <bluetooth/bluetooth.h>#include <bluetooth/hci.h>#include <bluetooth/hci_lib.h>#include <bluetooth/l2cap.h>#include <bluetooth/sdp.h>#include <bluetooth/hidp.h>#include "hidd.h"enum { NONE, SHOW, SERVER, SEARCH, CONNECT, KILL};static volatile sig_atomic_t __io_canceled = 0;static void sig_hup(int sig){}static void sig_term(int sig){ __io_canceled = 1;}static int l2cap_connect(bdaddr_t *src, bdaddr_t *dst, unsigned short psm){ struct sockaddr_l2 addr; struct l2cap_options opts; int sk; if ((sk = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP)) < 0) return -1; memset(&addr, 0, sizeof(addr)); addr.l2_family = AF_BLUETOOTH; bacpy(&addr.l2_bdaddr, src); if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { close(sk); return -1; } memset(&opts, 0, sizeof(opts)); opts.imtu = HIDP_DEFAULT_MTU; opts.omtu = HIDP_DEFAULT_MTU; opts.flush_to = 0xffff; setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts)); memset(&addr, 0, sizeof(addr)); addr.l2_family = AF_BLUETOOTH; bacpy(&addr.l2_bdaddr, dst); addr.l2_psm = htobs(psm); if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { close(sk); return -1; } return sk;}static int l2cap_listen(const bdaddr_t *bdaddr, unsigned short psm, int lm, int backlog){ struct sockaddr_l2 addr; struct l2cap_options opts; int sk; if ((sk = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP)) < 0) return -1; memset(&addr, 0, sizeof(addr)); addr.l2_family = AF_BLUETOOTH; bacpy(&addr.l2_bdaddr, bdaddr); addr.l2_psm = htobs(psm); if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { close(sk); return -1; } setsockopt(sk, SOL_L2CAP, L2CAP_LM, &lm, sizeof(lm)); memset(&opts, 0, sizeof(opts)); opts.imtu = HIDP_DEFAULT_MTU; opts.omtu = HIDP_DEFAULT_MTU; opts.flush_to = 0xffff; setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts)); if (listen(sk, backlog) < 0) { close(sk); return -1; } return sk;}static int l2cap_accept(int sk, bdaddr_t *bdaddr){ struct sockaddr_l2 addr; socklen_t addrlen; int nsk; memset(&addr, 0, sizeof(addr)); addrlen = sizeof(addr); if ((nsk = accept(sk, (struct sockaddr *) &addr, &addrlen)) < 0) return -1; if (bdaddr) bacpy(bdaddr, &addr.l2_bdaddr); return nsk;}static int request_authentication(bdaddr_t *src, bdaddr_t *dst){ struct hci_conn_info_req *cr; char addr[18]; int err, dd, dev_id; ba2str(src, addr); dev_id = hci_devid(addr); if (dev_id < 0) return dev_id; dd = hci_open_dev(dev_id); if (dd < 0) return dd; cr = malloc(sizeof(*cr) + sizeof(struct hci_conn_info)); if (!cr) return -ENOMEM; bacpy(&cr->bdaddr, dst); cr->type = ACL_LINK; err = ioctl(dd, HCIGETCONNINFO, (unsigned long) cr); if (err < 0) { free(cr); hci_close_dev(dd); return err; } err = hci_authenticate_link(dd, htobs(cr->conn_info->handle), 25000); free(cr); hci_close_dev(dd); return err;}static int request_encryption(bdaddr_t *src, bdaddr_t *dst){ struct hci_conn_info_req *cr; char addr[18]; int err, dd, dev_id; ba2str(src, addr); dev_id = hci_devid(addr); if (dev_id < 0) return dev_id; dd = hci_open_dev(dev_id); if (dd < 0) return dd; cr = malloc(sizeof(*cr) + sizeof(struct hci_conn_info)); if (!cr) return -ENOMEM; bacpy(&cr->bdaddr, dst); cr->type = ACL_LINK; err = ioctl(dd, HCIGETCONNINFO, (unsigned long) cr); if (err < 0) { free(cr); hci_close_dev(dd); return err; } err = hci_encrypt_link(dd, htobs(cr->conn_info->handle), 1, 25000); free(cr); hci_close_dev(dd); return err;}static int create_device(int ctl, int csk, int isk, uint8_t subclass, int nosdp, int nocheck, int encrypt, int timeout){ struct hidp_connadd_req req; struct sockaddr_l2 addr; socklen_t addrlen; bdaddr_t src, dst; char bda[18]; int err; memset(&addr, 0, sizeof(addr)); addrlen = sizeof(addr); if (getsockname(csk, (struct sockaddr *) &addr, &addrlen) < 0) return -1; bacpy(&src, &addr.l2_bdaddr); memset(&addr, 0, sizeof(addr)); addrlen = sizeof(addr); if (getpeername(csk, (struct sockaddr *) &addr, &addrlen) < 0) return -1; bacpy(&dst, &addr.l2_bdaddr); memset(&req, 0, sizeof(req)); req.ctrl_sock = csk; req.intr_sock = isk; req.flags = 0; req.idle_to = timeout * 60; err = get_stored_device_info(&src, &dst, &req); if (!err) goto create; if (!nocheck) return -1; if (!nosdp) { err = get_sdp_device_info(&src, &dst, &req); if (err < 0) goto error; } else { struct l2cap_conninfo conn; socklen_t size; uint8_t class[3]; memset(&conn, 0, sizeof(conn)); size = sizeof(conn); if (getsockopt(csk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &size) < 0) memset(class, 0, 3); else memcpy(class, conn.dev_class, 3); if (class[1] == 0x25 && (class[2] == 0x00 || class[2] == 0x01)) req.subclass = class[0]; else req.subclass = 0xc0; }create: if (subclass != 0x00) req.subclass = subclass; ba2str(&dst, bda); syslog(LOG_INFO, "New HID device %s (%s)", bda, req.name); if (encrypt && (req.subclass & 0x40)) { err = request_authentication(&src, &dst); if (err < 0) { syslog(LOG_ERR, "Authentication for %s failed", bda); goto error; } err = request_encryption(&src, &dst); if (err < 0) syslog(LOG_ERR, "Encryption for %s failed", bda); } err = ioctl(ctl, HIDPCONNADD, &req);error: if (req.rd_data) free(req.rd_data); return err;}static void run_server(int ctl, int csk, int isk, uint8_t subclass, int nosdp, int nocheck, int encrypt, int timeout){ struct pollfd p[2]; short events; int err, ncsk, nisk; p[0].fd = csk; p[0].events = POLLIN | POLLERR | POLLHUP; p[1].fd = isk; p[1].events = POLLIN | POLLERR | POLLHUP; while (!__io_canceled) { p[0].revents = 0; p[1].revents = 0; err = poll(p, 2, 100); if (err <= 0) continue; events = p[0].revents | p[1].revents; if (events & POLLIN) { ncsk = l2cap_accept(csk, NULL); nisk = l2cap_accept(isk, NULL); err = create_device(ctl, ncsk, nisk, subclass, nosdp, nocheck, encrypt, timeout); if (err < 0) syslog(LOG_ERR, "HID create error %d (%s)", errno, strerror(errno)); close(nisk); sleep(1); close(ncsk); } }}static char *hidp_state[] = { "unknown", "connected", "open", "bound", "listening", "connecting", "connecting", "config", "disconnecting", "closed"};static char *hidp_flagstostr(uint32_t flags){ static char str[100]; str[0] = 0; strcat(str, "["); if (flags & (1 << HIDP_BOOT_PROTOCOL_MODE)) strcat(str, "boot-protocol"); strcat(str, "]"); return str;}static void do_show(int ctl){ struct hidp_connlist_req req; struct hidp_conninfo ci[16]; char addr[18]; int i; req.cnum = 16; req.ci = ci; if (ioctl(ctl, HIDPGETCONNLIST, &req) < 0) { perror("Can't get connection list");
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -