/*
*
* BlueZ - Bluetooth protocol stack for Linux
*
* Copyright (C) 2004-2008 Marcel Holtmann <marcel@holtmann.org>
*
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <stdio.h>
#include <errno.h>
#include <unistd.h>
#include <stdlib.h>
#include <signal.h>
#include <getopt.h>
#include <string.h>
#include <dbus/dbus.h>
#define INTERFACE "org.bluez.Security"
static volatile sig_atomic_t __io_canceled = 0;
static volatile sig_atomic_t __io_terminated = 0;
static void sig_term(int sig)
{
__io_canceled = 1;
}
static DBusHandlerResult agent_filter(DBusConnection *conn,
DBusMessage *msg, void *data)
{
const char *name, *old, *new;
if (!dbus_message_is_signal(msg, DBUS_INTERFACE_DBUS, "NameOwnerChanged"))
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
if (!dbus_message_get_args(msg, NULL,
DBUS_TYPE_STRING, &name, DBUS_TYPE_STRING, &old,
DBUS_TYPE_STRING, &new, DBUS_TYPE_INVALID)) {
fprintf(stderr, "Invalid arguments for NameOwnerChanged signal");
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}
if (!strcmp(name, "org.bluez") && *new == '\0') {
fprintf(stderr, "Authorization service has been terminated\n");
__io_terminated = 1;
}
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}
static DBusHandlerResult authorize_message(DBusConnection *conn,
DBusMessage *msg, void *data)
{
DBusMessage *reply;
const char *adapter, *address, *service, *string;
if (!dbus_message_get_args(msg, NULL,
DBUS_TYPE_STRING, &adapter, DBUS_TYPE_STRING, &address,
DBUS_TYPE_STRING, &service, DBUS_TYPE_STRING, &string,
DBUS_TYPE_INVALID)) {
fprintf(stderr, "Invalid arguments for passkey Confirm method");
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}
printf("Authorization request for device %s\n", address);
reply = dbus_message_new_method_return(msg);
if (!reply) {
fprintf(stderr, "Can't create reply message\n");
return DBUS_HANDLER_RESULT_NEED_MEMORY;
}
dbus_connection_send(conn, reply, NULL);
dbus_connection_flush(conn);
dbus_message_unref(reply);
return DBUS_HANDLER_RESULT_HANDLED;
}
static DBusHandlerResult cancel_message(DBusConnection *conn,
DBusMessage *msg, void *data)
{
DBusMessage *reply;
const char *adapter, *address, *service, *string;
if (!dbus_message_get_args(msg, NULL,
DBUS_TYPE_STRING, &adapter, DBUS_TYPE_STRING, &address,
DBUS_TYPE_STRING, &service, DBUS_TYPE_STRING, &string,
DBUS_TYPE_INVALID)) {
fprintf(stderr, "Invalid arguments for passkey Confirm method");
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}
printf("Request canceled for device %s\n", address);
reply = dbus_message_new_method_return(msg);
if (!reply) {
fprintf(stderr, "Can't create reply message\n");
return DBUS_HANDLER_RESULT_NEED_MEMORY;
}
dbus_connection_send(conn, reply, NULL);
dbus_connection_flush(conn);
dbus_message_unref(reply);
return DBUS_HANDLER_RESULT_HANDLED;
}
static DBusHandlerResult release_message(DBusConnection *conn,
DBusMessage *msg, void *data)
{
DBusMessage *reply;
if (!dbus_message_get_args(msg, NULL, DBUS_TYPE_INVALID)) {
fprintf(stderr, "Invalid arguments for Release method");
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}
if (!__io_canceled)
fprintf(stderr, "Authorization agent has been released\n");
__io_terminated = 1;
reply = dbus_message_new_method_return(msg);
if (!reply) {
fprintf(stderr, "Can't create reply message\n");
return DBUS_HANDLER_RESULT_NEED_MEMORY;
}
dbus_connection_send(conn, reply, NULL);
dbus_connection_flush(conn);
dbus_message_unref(reply);
return DBUS_HANDLER_RESULT_HANDLED;
}
static DBusHandlerResult auth_message(DBusConnection *conn,
DBusMessage *msg, void *data)
{
if (dbus_message_is_method_call(msg, "org.bluez.AuthorizationAgent", "Authorize"))
return authorize_message(conn, msg, data);
if (dbus_message_is_method_call(msg, "org.bluez.AuthorizationAgent", "Cancel"))
return cancel_message(conn, msg, data);
if (dbus_message_is_method_call(msg, "org.bluez.AuthorizationAgent", "Release"))
return release_message(conn, msg, data);
return DBUS_HANDLER_RESULT_NOT_YET_HANDLED;
}
static const DBusObjectPathVTable auth_table = {
.message_function = auth_message,
};
static int register_auth(DBusConnection *conn, const char *auth_path)
{
DBusMessage *msg, *reply;
DBusError err;
if (!dbus_connection_register_object_path(conn, auth_path,
&auth_table, NULL)) {
fprintf(stderr, "Can't register object path for agent\n");
return -1;
}
msg = dbus_message_new_method_call("org.bluez", "/org/bluez",
INTERFACE, "RegisterDefaultAuthorizationAgent");
if (!msg) {
fprintf(stderr, "Can't allocate new method call\n");
return -1;
}
dbus_message_append_args(msg, DBUS_TYPE_STRING, &auth_path,
DBUS_TYPE_INVALID);
dbus_error_init(&err);
reply = dbus_connection_send_with_reply_and_block(conn, msg, -1, &err);
dbus_message_unref(msg);
if (!reply) {
fprintf(stderr, "Can't register authorization agent\n");
if (dbus_error_is_set(&err)) {
fprintf(stderr, "%s\n", err.message);
dbus_error_free(&err);
}
return -1;
}
dbus_message_unref(reply);
dbus_connection_flush(conn);
return 0;
}
static int unregister_auth(DBusConnection *conn, const char *auth_path)
{
DBusMessage *msg, *reply;
DBusError err;
msg = dbus_message_new_method_call("org.bluez", "/org/bluez",
INTERFACE, "UnregisterDefaultAuthorizationAgent");
if (!msg) {
fprintf(stderr, "Can't allocate new method call\n");
dbus_connection_unref(conn);
exit(1);
}
dbus_message_append_args(msg, DBUS_TYPE_STRING, &auth_path,
DBUS_TYPE_INVALID);
dbus_error_init(&err);
reply = dbus_connection_send_with_reply_and_block(conn, msg, -1, &err);
dbus_message_unref(msg);
if (!reply) {
fprintf(stderr, "Can't unregister authorization agent\n");
if (dbus_error_is_set(&err)) {
fprintf(stderr, "%s\n", err.message);
dbus_error_free(&err);
}
return -1;
}
dbus_message_unref(reply);
dbus_connection_flush(conn);
dbus_connection_unregister_object_path(conn, auth_path);
return 0;
}
static void usage(void)
{
printf("Bluetooth authorization agent ver %s\n\n", VERSION);
printf("Usage:\n"
"\tauth-agent [--path auth-path]\n"
"\n");
}
static struct option main_options[] = {
{ "path", 1, 0, 'p' },
{ "help", 0, 0, 'h' },
{ 0, 0, 0, 0 }
};
int main(int argc, char *argv[])
{
struct sigaction sa;
DBusConnection *conn;
char match_string[128], default_path[128], *auth_path = NULL;
int opt;
snprintf(default_path, sizeof(default_path),
"/org/bluez/auth_agent_%d", getpid());
while ((opt = getopt_long(argc, argv, "+p:h", main_options, NULL)) != EOF) {
switch(opt) {
case 'p':
if (optarg[0] != '/') {
fprintf(stderr, "Invalid path\n");
exit(1);
}
auth_path = strdup(optarg);
break;
case 'h':
usage();
exit(0);
default:
exit(1);
}
}
argc -= optind;
argv += optind;
optind = 0;
if (!auth_path)
auth_path = strdup(default_path);
conn = dbus_bus_get(DBUS_BUS_SYSTEM, NULL);
if (!conn) {
fprintf(stderr, "Can't get on system bus");
exit(1);
}
if (register_auth(conn, auth_path) < 0) {
dbus_connection_unref(conn);
exit(1);
}
if (!dbus_connection_add_filter(conn, agent_filter, NULL, NULL))
fprintf(stderr, "Can't add signal filter");
snprintf(match_string, sizeof(match_string),
"interface=%s,member=NameOwnerChanged,arg0=%s",
DBUS_INTERFACE_DBUS, "org.bluez");
dbus_bus_add_match(conn, match_string, NULL);
memset(&sa, 0, sizeof(sa));
sa.sa_flags = SA_NOCLDSTOP;
sa.sa_handler = sig_term;
sigaction(SIGTERM, &sa, NULL);
sigaction(SIGINT, &sa, NULL);
while (!__io_canceled && !__io_terminated) {
if (dbus_connection_read_write_dispatch(conn, 500) != TRUE)
break;
}
if (!__io_terminated)
unregister_auth(conn, auth_path);
dbus_connection_unref(conn);
return 0;
}