3 * Copyright (c) 2015 Samsung Electronics Co., Ltd.
5 * Licensed under the Apache License, Version 2.0 (the License);
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
19 * @file message-port.cpp
20 * @brief This is the implementation file for the MessagePort.
24 #include <sys/socket.h>
30 #include <openssl/md5.h>
32 #include <bundle_internal.h>
33 #include <pkgmgr-info.h>
36 #include <gio/gunixfdlist.h>
38 #include "message-port.h"
39 #include "message-port-log.h"
41 #define MAX_PACKAGE_STR_SIZE 512
42 #define MESSAGEPORT_BUS_NAME_PREFIX "org.tizen.messageport._"
43 #define MESSAGEPORT_OBJECT_PATH "/org/tizen/messageport"
44 #define MESSAGEPORT_INTERFACE_PREFIX "org.tizen.messageport._"
46 #define DBUS_SERVICE_DBUS "org.freedesktop.DBus"
47 #define DBUS_PATH_DBUS "/org/freedesktop/DBus"
48 #define DBUS_INTERFACE_DBUS "org.freedesktop.DBus"
50 #define DBUS_RELEASE_NAME_REPLY_RELEASED 1 /* *< Service was released from the given name */
51 #define DBUS_RELEASE_NAME_REPLY_NON_EXISTENT 2 /* *< The given name does not exist on the bus */
52 #define DBUS_RELEASE_NAME_REPLY_NOT_OWNER 3 /* *< Service is not an owner of the given name */
54 #define MAX_RETRY_CNT 10
55 #define SOCK_PAIR_SENDER 0
56 #define SOCK_PAIR_RECEIVER 1
59 #define retvm_if(expr, val, fmt, arg...) do { \
62 _LOGE("(%s) -> %s() return", #expr, __func__); \
67 #define retv_if(expr, val) do { \
69 _LOGE("(%s) -> %s() return", #expr, __func__); \
74 #define FREE_AND_NULL(ptr) do { \
81 static bool _initialized = false;
82 static GDBusConnection *__gdbus_conn;
83 static char *__app_id;
84 static GHashTable *__local_port_info;
85 static GHashTable *__remote_app_info;
86 static GHashTable *__sender_appid_hash;
87 static GHashTable *__trusted_app_list_hash;
88 static GHashTable *__callback_info_hash;
89 static const int MAX_MESSAGE_SIZE = 16 * 1024;
91 enum __certificate_info_type {
94 CERTIFICATE_NOT_MATCH,
97 typedef struct message_port_pkt {
98 int remote_port_name_len;
99 char *remote_port_name;
104 } message_port_pkt_s;
106 typedef struct message_port_callback_info {
107 messageport_message_cb callback;
110 GIOChannel *gio_read;
112 } message_port_callback_info_s;
114 typedef struct message_port_local_port_info {
115 messageport_message_cb callback;
119 } message_port_local_port_info_s;
121 typedef struct message_port_remote_port_info {
124 int certificate_info;
126 } message_port_remote_app_info_s;
128 typedef struct port_list_info {
130 char *encoded_bus_name;
135 GIOChannel *gio_read;
139 static void __callback_info_free(gpointer data)
141 message_port_callback_info_s *callback_info = (message_port_callback_info_s *)data;
142 GError *error = NULL;
143 if (callback_info == NULL)
146 if (callback_info->remote_app_id)
147 FREE_AND_NULL(callback_info->remote_app_id);
149 if (callback_info->gio_read != NULL) {
150 g_io_channel_shutdown(callback_info->gio_read, TRUE, &error);
152 _LOGE("g_io_channel_shutdown error : %s", error->message);
155 g_io_channel_unref(callback_info->gio_read);
156 callback_info->gio_read = NULL;
159 if (callback_info->g_src_id != 0) {
160 g_source_remove(callback_info->g_src_id);
161 callback_info->g_src_id = 0;
164 FREE_AND_NULL(callback_info);
167 static void __callback_info_free_by_info(message_port_callback_info_s *callback_info)
169 GList *callback_info_list = g_hash_table_lookup(__callback_info_hash, GUINT_TO_POINTER(callback_info->local_id));
172 if (callback_info_list == NULL)
175 find_list = g_list_find(callback_info_list, callback_info);
176 if (find_list == NULL)
179 callback_info_list = g_list_remove_link(callback_info_list, find_list);
180 __callback_info_free(callback_info);
181 g_list_free(find_list);
184 static void __hash_destroy_callback_info(gpointer data)
187 GList *callback_list = (GList *)data;
188 if (callback_list != NULL)
189 g_list_free_full(callback_list, __callback_info_free);
192 static char *__get_encoded_name(const char *remote_app_id, const char *port_name, bool is_trusted)
195 int prefix_len = strlen(MESSAGEPORT_BUS_NAME_PREFIX);
197 char *postfix = is_trusted ? "1" : "0";
199 unsigned char c[MD5_DIGEST_LENGTH] = {0};
200 char *md5_interface = NULL;
204 int encoded_bus_name_len = prefix_len + postfix_len + (MD5_DIGEST_LENGTH * 2) + 2;
205 int bus_name_len = strlen(remote_app_id) + strlen(port_name) + 2;
206 char *bus_name = (char *)calloc(bus_name_len, sizeof(char));
207 if (bus_name == NULL) {
208 _LOGE("bus_name calloc failed");
212 snprintf(bus_name, bus_name_len, "%s_%s", remote_app_id, port_name);
214 MD5_Init(&mdContext);
215 MD5_Update(&mdContext, bus_name, bus_name_len);
216 MD5_Final(c, &mdContext);
218 md5_interface = (char *)calloc(encoded_bus_name_len , sizeof(char));
219 if (md5_interface == NULL) {
223 _LOGE("md5_interface calloc failed!!");
227 snprintf(md5_interface, encoded_bus_name_len, "%s", MESSAGEPORT_BUS_NAME_PREFIX);
228 temp = md5_interface;
231 for (index = 0; index < MD5_DIGEST_LENGTH; index++) {
232 snprintf(temp, 3, "%02x", c[index]);
236 if (postfix && postfix_len > 0)
237 snprintf(temp, encoded_bus_name_len - (temp - md5_interface), "%s", postfix);
241 _LOGI("encoded_bus_name : %s ", md5_interface);
243 return md5_interface;
246 static int __remote_port_compare_cb(gconstpointer a, gconstpointer b)
248 port_list_info_s *key1 = (port_list_info_s *)a;
249 port_list_info_s *key2 = (port_list_info_s *)b;
251 if (key1->is_trusted == key2->is_trusted)
252 return strcmp(key1->port_name, key2->port_name);
258 static bool __is_preloaded(const char *local_appid, const char *remote_appid)
260 _LOGI("IsPreloaded");
262 bool preload_local = false;
263 bool preload_remote = false;
265 pkgmgrinfo_appinfo_h handle = NULL;
266 int ret = pkgmgrinfo_appinfo_get_usr_appinfo(local_appid, getuid(), &handle);
267 if (ret != PMINFO_R_OK) {
268 _LOGE("Failed to get the appinfo. %d", ret);
269 pkgmgrinfo_appinfo_destroy_appinfo(handle);
272 ret = pkgmgrinfo_appinfo_is_preload(handle, &preload_local);
273 if (ret != PMINFO_R_OK) {
274 _LOGE("Failed to check the preloaded application. %d", ret);
275 pkgmgrinfo_appinfo_destroy_appinfo(handle);
278 pkgmgrinfo_appinfo_destroy_appinfo(handle);
280 ret = pkgmgrinfo_appinfo_get_usr_appinfo(remote_appid, getuid(), &handle);
281 if (ret != PMINFO_R_OK) {
282 _LOGE("Failed to get the appinfo. %d", ret);
283 pkgmgrinfo_appinfo_destroy_appinfo(handle);
286 ret = pkgmgrinfo_appinfo_is_preload(handle, &preload_remote);
287 if (ret != PMINFO_R_OK) {
288 _LOGE("Failed to check the preloaded application. %d", ret);
289 pkgmgrinfo_appinfo_destroy_appinfo(handle);
293 if (preload_local && preload_remote) {
294 pkgmgrinfo_appinfo_destroy_appinfo(handle);
297 pkgmgrinfo_appinfo_destroy_appinfo(handle);
301 static int __check_certificate(const char *local_appid, const char *remote_appid)
303 _LOGI("CheckCertificate");
305 pkgmgrinfo_cert_compare_result_type_e res;
306 int ret = pkgmgrinfo_pkginfo_compare_usr_app_cert_info(local_appid, remote_appid, getuid(), &res);
308 _LOGE(":CheckCertificate() Failed");
309 return MESSAGEPORT_ERROR_IO_ERROR;
311 if (res != PMINFO_CERT_COMPARE_MATCH) {
312 _LOGE("CheckCertificate() Failed : MESSAGEPORT_ERROR_CERTIFICATE_NOT_MATCH");
313 return MESSAGEPORT_ERROR_CERTIFICATE_NOT_MATCH;
316 return MESSAGEPORT_ERROR_NONE;
319 static void on_name_appeared(GDBusConnection *connection,
321 const gchar *name_owner,
324 _LOGI("name appeared : %s %s", __app_id, name);
327 static void on_name_vanished(GDBusConnection *connection,
331 _LOGI("name vanished : %s", name);
332 port_list_info_s *pli = (port_list_info_s *)user_data;
334 LOGE("NULL port info");
338 _LOGI("watcher_id :%d", pli->watcher_id);
339 if (pli->watcher_id > 0)
340 g_bus_unwatch_name(pli->watcher_id);
342 _LOGE("Invalid watcher_id %d", pli->watcher_id);
346 _LOGI("name vanished socket : %d", pli->send_sock_fd);
347 if (pli->send_sock_fd > 0) {
348 close(pli->send_sock_fd);
349 pli->send_sock_fd = 0;
353 static int __get_local_port_info(int id, message_port_local_port_info_s **info)
355 message_port_local_port_info_s *mi = (message_port_local_port_info_s *)g_hash_table_lookup(__local_port_info, GINT_TO_POINTER(id));
358 return MESSAGEPORT_ERROR_INVALID_PARAMETER;
361 return MESSAGEPORT_ERROR_NONE;
364 static port_list_info_s *__set_remote_port_info(const char *remote_app_id, const char *remote_port, bool is_trusted)
366 int ret_val = MESSAGEPORT_ERROR_NONE;
367 port_list_info_s *port_info = (port_list_info_s *)calloc(1, sizeof(port_list_info_s));
370 ret_val = MESSAGEPORT_ERROR_OUT_OF_MEMORY;
373 port_info->port_name = strdup(remote_port);
374 if (!port_info->port_name) {
375 ret_val = MESSAGEPORT_ERROR_OUT_OF_MEMORY;
378 port_info->is_trusted = is_trusted;
379 port_info->encoded_bus_name = __get_encoded_name(remote_app_id, remote_port, is_trusted);
380 if (port_info->encoded_bus_name == NULL) {
381 ret_val = MESSAGEPORT_ERROR_OUT_OF_MEMORY;
384 port_info->send_sock_fd = 0;
386 if (ret_val != MESSAGEPORT_ERROR_NONE) {
388 FREE_AND_NULL(port_info->port_name);
389 FREE_AND_NULL(port_info->encoded_bus_name);
397 static message_port_remote_app_info_s *__set_remote_app_info(const char *remote_app_id, const char *remote_port, bool is_trusted)
399 message_port_remote_app_info_s *remote_app_info = NULL;
400 int ret_val = MESSAGEPORT_ERROR_NONE;
402 remote_app_info = (message_port_remote_app_info_s *)calloc(1, sizeof(message_port_remote_app_info_s));
403 if (!remote_app_info) {
404 ret_val = MESSAGEPORT_ERROR_OUT_OF_MEMORY;
408 remote_app_info->remote_app_id = strdup(remote_app_id);
409 if (remote_app_info->remote_app_id == NULL) {
410 ret_val = MESSAGEPORT_ERROR_OUT_OF_MEMORY;;
415 if (ret_val != MESSAGEPORT_ERROR_NONE) {
416 if (remote_app_info) {
417 FREE_AND_NULL(remote_app_info->remote_app_id);
418 FREE_AND_NULL(remote_app_info);
422 return remote_app_info;
425 static void __clear_disconnect_socket(port_list_info_s *port_info)
427 GError *error = NULL;
429 if (port_info == NULL)
431 _LOGI("__clear_disconnect_socket : fd [%d]", port_info->send_sock_fd);
433 if (port_info->gio_read != NULL) {
434 g_io_channel_shutdown(port_info->gio_read, TRUE, &error);
436 _LOGE("g_io_channel_shutdown error : %s", error->message);
439 g_io_channel_unref(port_info->gio_read);
440 port_info->gio_read = NULL;
443 if (port_info->g_src_id != 0) {
444 g_source_remove(port_info->g_src_id);
445 port_info->g_src_id = 0;
447 port_info->send_sock_fd = 0;
450 static gboolean __socket_disconnect_handler(GIOChannel *gio,
454 /* It's sender socket's gio channel so, only EOF can be received */
455 port_list_info_s *port_info = (port_list_info_s *)data;
456 _LOGI("__socket_disconnect_handler %d", cond);
457 __clear_disconnect_socket(port_info);
461 static void __watch_remote_port_info(port_list_info_s *port_info)
463 if (port_info == NULL)
466 if (port_info->watcher_id < 1) {
467 port_info->watcher_id = g_bus_watch_name_on_connection(
469 port_info->encoded_bus_name,
470 G_BUS_NAME_WATCHER_FLAGS_NONE,
476 LOGI("Already watched port info");
481 static int __get_remote_port_info(const char *remote_app_id, const char *remote_port, bool is_trusted,
482 message_port_remote_app_info_s **mri, port_list_info_s **pli)
484 message_port_remote_app_info_s *remote_app_info = NULL;
485 port_list_info_s port_info;
486 GList *cb_list = NULL;
487 int ret_val = MESSAGEPORT_ERROR_NONE;
489 remote_app_info = (message_port_remote_app_info_s *)g_hash_table_lookup(__remote_app_info, remote_app_id);
491 if (remote_app_info == NULL) {
492 remote_app_info = __set_remote_app_info(remote_app_id, remote_port, is_trusted);
494 if (remote_app_info == NULL) {
495 ret_val = MESSAGEPORT_ERROR_OUT_OF_MEMORY;
498 g_hash_table_insert(__remote_app_info, remote_app_info->remote_app_id, remote_app_info);
500 *mri = remote_app_info;
502 port_info.port_name = strdup(remote_port);
503 port_info.is_trusted = is_trusted;
504 cb_list = g_list_find_custom(remote_app_info->port_list, &port_info,
505 (GCompareFunc)__remote_port_compare_cb);
506 if (port_info.port_name)
507 free(port_info.port_name);
508 if (cb_list == NULL) {
509 port_list_info_s *tmp = __set_remote_port_info(remote_app_id, remote_port, is_trusted);
511 ret_val = MESSAGEPORT_ERROR_OUT_OF_MEMORY;
514 remote_app_info->port_list = g_list_append(remote_app_info->port_list, tmp);
517 *pli = (port_list_info_s *)cb_list->data;
524 static bool __is_local_port_registed(const char *local_port, bool trusted, int *local_id, message_port_local_port_info_s **lpi)
529 g_hash_table_iter_init(&iter, __local_port_info);
530 while (g_hash_table_iter_next(&iter, &key, &value)) {
531 message_port_local_port_info_s *mi = (message_port_local_port_info_s *)value;
533 if ((mi->is_trusted == trusted) && strcmp(mi->port_name, local_port) == 0) {
534 *local_id = mi->local_id;
543 static int __get_sender_pid(GDBusConnection *conn, const char *sender_name)
545 GDBusMessage *msg = NULL;
546 GDBusMessage *reply = NULL;
551 msg = g_dbus_message_new_method_call("org.freedesktop.DBus", "/org/freedesktop/DBus",
552 "org.freedesktop.DBus", "GetConnectionUnixProcessID");
554 _LOGE("Can't allocate new method call");
558 g_dbus_message_set_body(msg, g_variant_new("(s)", sender_name));
559 reply = g_dbus_connection_send_message_with_reply_sync(conn, msg,
560 G_DBUS_SEND_MESSAGE_FLAGS_NONE, -1, NULL, NULL, &err);
564 _LOGE("Failed to get pid [%s]", err->message);
570 body = g_dbus_message_get_body(reply);
571 g_variant_get(body, "(u)", &pid);
577 g_object_unref(reply);
582 static int __write_socket(int fd,
585 unsigned int *bytes_write)
587 unsigned int left = nbytes;
592 while (left && (retry_cnt < MAX_RETRY_CNT)) {
593 nb = write(fd, buffer, left);
595 if (errno == EINTR) {
596 LOGE("__write_socket: EINTR error continue ...");
600 LOGE("__write_socket: ...error fd %d: errno %d\n", fd, errno);
601 return MESSAGEPORT_ERROR_IO_ERROR;
609 return MESSAGEPORT_ERROR_NONE;
612 static int __write_string_to_socket(int fd, const char *buffer, int string_len)
615 if (__write_socket(fd, (char *)&string_len, sizeof(string_len), &nb) != MESSAGEPORT_ERROR_NONE) {
616 _LOGE("write string_len fail");
617 return MESSAGEPORT_ERROR_IO_ERROR;
620 if (string_len > 0) {
621 if (__write_socket(fd, buffer, string_len, &nb) != MESSAGEPORT_ERROR_NONE) {
622 _LOGE("wirte buffer fail");
623 return MESSAGEPORT_ERROR_IO_ERROR;
626 return MESSAGEPORT_ERROR_NONE;
629 static int __read_socket(int fd,
632 unsigned int *bytes_read)
634 unsigned int left = nbytes;
637 const struct timespec TRY_SLEEP_TIME = { 0, 500 * 1000 * 1000 };
640 while (left && (retry_cnt < MAX_RETRY_CNT)) {
641 nb = read(fd, buffer, left);
643 LOGE("__read_socket: ...read EOF, socket closed %d: nb %d\n", fd, nb);
644 return MESSAGEPORT_ERROR_IO_ERROR;
645 } else if (nb == -1) {
646 /* wrt(nodejs) could change socket to none-blocking socket :-( */
647 if (errno == EINTR || errno == EAGAIN || errno == EWOULDBLOCK) {
648 LOGE("__read_socket: %d errno, sleep and retry ...", errno);
650 nanosleep(&TRY_SLEEP_TIME, 0);
653 LOGE("__read_socket: ...error fd %d: errno %d\n", fd, errno);
654 return MESSAGEPORT_ERROR_IO_ERROR;
662 return MESSAGEPORT_ERROR_NONE;
665 static int __read_string_from_socket(int fd, char **buffer, int *string_len)
668 if (__read_socket(fd, (char *)string_len, sizeof(*string_len), &nb) != MESSAGEPORT_ERROR_NONE) {
669 LOGE("read socket fail");
670 return MESSAGEPORT_ERROR_IO_ERROR;
672 if (*string_len > 0 && *string_len < MAX_MESSAGE_SIZE) {
673 *buffer = (char *)calloc(*string_len, sizeof(char));
674 if (*buffer == NULL) {
675 LOGE("Out of memory.");
676 return MESSAGEPORT_ERROR_IO_ERROR;
678 if (__read_socket(fd, *buffer, *string_len, &nb) != MESSAGEPORT_ERROR_NONE) {
679 LOGE("read socket fail");
680 return MESSAGEPORT_ERROR_IO_ERROR;
683 LOGE("Invalid string len %d", *string_len);
684 return MESSAGEPORT_ERROR_IO_ERROR;
686 return MESSAGEPORT_ERROR_NONE;
689 message_port_pkt_s *__message_port_recv_raw(int fd)
691 message_port_pkt_s *pkt = NULL;
694 pkt = (message_port_pkt_s *)calloc(sizeof(message_port_pkt_s), 1);
700 if (__read_string_from_socket(fd, (char **)&pkt->remote_port_name, &pkt->remote_port_name_len) != MESSAGEPORT_ERROR_NONE) {
701 LOGE("read socket fail: port_name");
702 free(pkt->remote_port_name);
707 if (__read_socket(fd, (char *)&pkt->is_bidirection, sizeof(pkt->is_bidirection), &nb) != MESSAGEPORT_ERROR_NONE) {
708 LOGE("read socket fail: is_bidirection");
709 free(pkt->remote_port_name);
714 if (__read_socket(fd, (char *)&pkt->is_trusted, sizeof(pkt->is_trusted), &nb) != MESSAGEPORT_ERROR_NONE) {
715 LOGE("read socket fail: is_trusted");
716 free(pkt->remote_port_name);
721 if (__read_string_from_socket(fd, (char **)&pkt->data, &pkt->data_len) != MESSAGEPORT_ERROR_NONE) {
722 LOGE("read socket fail: data");
723 free(pkt->remote_port_name);
731 static gboolean __socket_request_handler(GIOChannel *gio,
736 message_port_callback_info_s *mi;
737 message_port_pkt_s *pkt;
739 GError *error = NULL;
741 mi = (message_port_callback_info_s *)data;
744 g_io_channel_shutdown(gio, TRUE, &error);
746 _LOGE("g_io_channel_shutdown error : %s", error->message);
749 g_io_channel_unref(gio);
753 if (cond == G_IO_HUP) {
755 _LOGI("socket G_IO_HUP");
756 __callback_info_free_by_info(mi);
761 if ((fd = g_io_channel_unix_get_fd(gio)) < 0) {
762 _LOGE("fail to get fd from io channel");
763 __callback_info_free_by_info(mi);
767 if ((pkt = __message_port_recv_raw(fd)) == NULL) {
768 _LOGE("recv error on SOCKET");
769 __callback_info_free_by_info(mi);
773 kb = bundle_decode(pkt->data, pkt->data_len);
774 if (pkt->is_bidirection)
775 mi->callback(mi->local_id, mi->remote_app_id, pkt->remote_port_name, pkt->is_trusted, kb, NULL);
777 mi->callback(mi->local_id, mi->remote_app_id, NULL, pkt->is_trusted, kb, NULL);
781 if (pkt->remote_port_name)
782 free(pkt->remote_port_name);
792 static bool send_message(GVariant *parameters, GDBusMethodInvocation *invocation)
794 char *local_port = NULL;
795 char *local_appid = NULL;
796 char *remote_appid = NULL;
797 char *remote_port = NULL;
798 gboolean local_trusted = false;
799 gboolean remote_trusted = false;
800 gboolean bi_dir = false;
804 bundle_raw *raw = NULL;
805 message_port_local_port_info_s *mi;
806 int local_reg_id = 0;
807 message_port_callback_info_s *callback_info;
808 message_port_callback_info_s *head_callback_info;
809 GList *callback_info_list = NULL;
813 GUnixFDList *fd_list;
815 int *returned_fds = NULL;
818 g_variant_get(parameters, "(&s&sbb&s&sbu&s)", &local_appid, &local_port, &local_trusted, &bi_dir,
819 &remote_appid, &remote_port, &remote_trusted, &len, &raw);
822 _LOGE("Invalid argument : remote_port is NULL");
826 _LOGE("Invalid argument : remote_appid is NULL");
829 if (!__is_local_port_registed(remote_port, remote_trusted, &local_reg_id, &mi)) {
830 _LOGE("Invalid argument : remote_port:(%s) trusted(%d)", remote_port, remote_trusted);
834 _LOGE("Invalid argument : local_appid");
838 _LOGE("Invalid argument : local_port");
841 if (strcmp(remote_appid, __app_id) != 0) {
842 _LOGE("Invalid argument : remote_appid (%s)", remote_appid);
845 if (strcmp(remote_port, mi->port_name) != 0) {
846 _LOGE("Invalid argument : remote_port (%s)", remote_port);
850 _LOGE("Invalid argument : data_len");
853 if (remote_trusted) {
854 if (g_hash_table_lookup(__trusted_app_list_hash, (gpointer)local_appid) == NULL) {
855 if (!__is_preloaded(local_appid, remote_appid)) {
856 int ret = __check_certificate(local_appid, remote_appid);
857 if (ret == MESSAGEPORT_ERROR_NONE)
858 g_hash_table_insert(__trusted_app_list_hash, local_appid, "TRUE");
860 _LOGE("The application (%s) is not signed with the same certificate",
868 callback_info = (message_port_callback_info_s *)calloc(1, sizeof(message_port_callback_info_s));
869 if (callback_info == NULL)
872 callback_info->local_id = mi->local_id;
873 callback_info->remote_app_id = strdup(local_appid);
874 callback_info->callback = mi->callback;
876 msg = g_dbus_method_invocation_get_message(invocation);
877 fd_list = g_dbus_message_get_unix_fd_list(msg);
879 /* When application send message to self fd_list is NULL */
880 if (fd_list != NULL) {
881 returned_fds = g_unix_fd_list_steal_fds(fd_list, &fd_len);
882 if (returned_fds == NULL) {
883 _LOGE("fail to get fds");
884 __callback_info_free(callback_info);
887 fd = returned_fds[0];
889 LOGI("g_unix_fd_list_get %d fd: [%d]", fd_len, fd);
892 callback_info->gio_read = g_io_channel_unix_new(fd);
893 if (!callback_info->gio_read) {
894 _LOGE("Error is %s\n", strerror_r(errno, buf, sizeof(buf)));
895 __callback_info_free(callback_info);
899 callback_info->g_src_id = g_io_add_watch(callback_info->gio_read, G_IO_IN | G_IO_HUP,
900 __socket_request_handler, (gpointer)callback_info);
901 if (callback_info->g_src_id == 0) {
902 _LOGE("fail to add watch on socket");
903 __callback_info_free(callback_info);
907 callback_info_list = g_hash_table_lookup(__callback_info_hash, GUINT_TO_POINTER(mi->local_id));
908 if (callback_info_list == NULL) {
909 head_callback_info = (message_port_callback_info_s *)calloc(1, sizeof(message_port_callback_info_s));
910 if (head_callback_info == NULL) {
911 _LOGE("fail to alloc head_callback_info");
912 __callback_info_free(callback_info);
915 head_callback_info->local_id = 0;
916 head_callback_info->remote_app_id = NULL;
917 head_callback_info->callback = NULL;
918 head_callback_info->gio_read = NULL;
919 head_callback_info->g_src_id = 0;
920 callback_info_list = g_list_append(callback_info_list, head_callback_info);
921 callback_info_list = g_list_append(callback_info_list, callback_info);
922 g_hash_table_insert(__callback_info_hash, GUINT_TO_POINTER(mi->local_id), callback_info_list);
924 callback_info_list = g_list_append(callback_info_list, callback_info);
929 data = bundle_decode(raw, len);
931 _LOGE("Invalid argument : message");
935 LOGI("call calback %s", local_appid);
937 mi->callback(mi->local_id, local_appid, local_port, local_trusted, data, NULL);
939 mi->callback(mi->local_id, local_appid, NULL, false, data, NULL);
948 static int __check_remote_port(const char *remote_app_id, const char *remote_port, bool is_trusted, bool *exist)
950 _LOGI("Check a remote port : [%s:%s]", remote_app_id, remote_port);
952 GVariant *result = NULL;
954 int ret_val = MESSAGEPORT_ERROR_NONE;
955 char *bus_name = NULL;
956 message_port_remote_app_info_s *remote_app_info = NULL;
957 port_list_info_s *port_info = NULL;
958 int local_reg_id = 0;
959 message_port_local_port_info_s *mi = NULL;
960 gboolean name_exist = false;
962 _LOGI("remote_app_id, app_id :[%s : %s] ", remote_app_id, __app_id);
964 ret_val = __get_remote_port_info(remote_app_id, remote_port, is_trusted, &remote_app_info, &port_info);
965 if (ret_val != MESSAGEPORT_ERROR_NONE)
969 if (strcmp(remote_app_id, __app_id) == 0) {
971 _LOGI("__is_local_port_registed ");
972 if (!__is_local_port_registed(remote_port, is_trusted, &local_reg_id, &mi))
977 _LOGI("__is_local_port_registed : %d ", *exist);
978 return MESSAGEPORT_ERROR_NONE;
981 port_info->exist = false;
982 bus_name = port_info->encoded_bus_name;
984 result = g_dbus_connection_call_sync(
990 g_variant_new("(s)", bus_name),
991 G_VARIANT_TYPE("(b)"),
992 G_DBUS_CALL_FLAGS_NONE,
997 if (err || (result == NULL)) {
999 _LOGE("No reply. error = %s", err->message);
1002 ret_val = MESSAGEPORT_ERROR_RESOURCE_UNAVAILABLE;
1004 g_variant_get(result, "(b)", &name_exist);
1007 LOGE("Name not exist %s", bus_name);
1009 ret_val = MESSAGEPORT_ERROR_NONE;
1013 if (remote_app_info->certificate_info != CERTIFICATE_MATCH) {
1014 if (!__is_preloaded(__app_id, remote_app_id)) {
1015 if (__check_certificate(__app_id, remote_app_id) != MESSAGEPORT_ERROR_NONE) {
1016 ret_val = MESSAGEPORT_ERROR_CERTIFICATE_NOT_MATCH;
1020 remote_app_info->certificate_info = CERTIFICATE_MATCH;
1023 port_info->exist = true;
1025 ret_val = MESSAGEPORT_ERROR_NONE;
1026 __watch_remote_port_info(port_info);
1031 g_variant_unref(result);
1036 static void __on_sender_name_appeared(GDBusConnection *connection,
1038 const gchar *name_owner,
1041 _LOGI("sender name appeared : %s", name);
1044 static void __on_sender_name_vanished(GDBusConnection *connection,
1048 gboolean remove_result = FALSE;
1049 int *watcher_id = (int *)user_data;
1050 remove_result = g_hash_table_remove(__sender_appid_hash, (gpointer)name);
1052 _LOGE("Fail to remove sender appid from hash : %s", name);
1055 if (*watcher_id > 0)
1056 g_bus_unwatch_name(*watcher_id);
1058 LOGE("Invalid watcher_id %d", *watcher_id);
1061 LOGE("watcher_id is NULL");
1065 static bool __check_sender_validation(GVariant *parameters, const char *sender, GDBusConnection *conn)
1068 char buffer[MAX_PACKAGE_STR_SIZE] = {0, };
1069 char *local_appid = NULL;
1070 int pid = __get_sender_pid(conn, sender);
1071 int *watcher_id = (int *)calloc(1, sizeof(int));
1073 ret = aul_app_get_appid_bypid(pid, buffer, sizeof(buffer));
1074 if (ret != AUL_R_OK) {
1075 _LOGE("Failed to get the sender ID: (%s) (%d)", sender, pid);
1080 g_variant_get_child(parameters, 0, "&s", &local_appid);
1081 if (local_appid == NULL) {
1082 _LOGE("appid is NULL : (%s) (%d)", sender, pid);
1087 if (strncmp(buffer, local_appid, MAX_PACKAGE_STR_SIZE) == 0) {
1088 _LOGI("insert sender !!!!! %s", sender);
1089 g_hash_table_insert(__sender_appid_hash, (gpointer)strdup(sender), GINT_TO_POINTER(pid));
1090 *watcher_id = g_bus_watch_name_on_connection(
1093 G_BUS_NAME_WATCHER_FLAGS_NONE,
1094 __on_sender_name_appeared,
1095 __on_sender_name_vanished,
1105 static void __dbus_method_call_handler(GDBusConnection *conn,
1106 const gchar *sender, const gchar *object_path,
1107 const gchar *iface_name, const gchar *method_name,
1108 GVariant *parameters, GDBusMethodInvocation *invocation,
1111 _LOGI("method_name: %s, sender: %s", method_name, sender);
1112 gpointer sender_pid = g_hash_table_lookup(__sender_appid_hash, sender);
1113 if (sender_pid == NULL) {
1114 if (!__check_sender_validation(parameters, sender, conn))
1117 if (g_strcmp0(method_name, "send_message") == 0)
1118 send_message(parameters, invocation);
1120 g_dbus_method_invocation_return_value(invocation, NULL);
1123 static const GDBusInterfaceVTable interface_vtable = {
1124 __dbus_method_call_handler,
1129 static int __dbus_init(void)
1132 GError *error = NULL;
1134 __gdbus_conn = g_bus_get_sync(G_BUS_TYPE_SESSION, NULL, &error);
1135 if (__gdbus_conn == NULL) {
1136 if (error != NULL) {
1137 _LOGE("Failed to get dbus [%s]", error->message);
1138 g_error_free(error);
1147 g_object_unref(__gdbus_conn);
1153 int __register_dbus_interface(const char *port_name, bool is_trusted)
1156 GDBusNodeInfo *introspection_data = NULL;
1157 int registration_id = 0;
1159 static gchar introspection_prefix[] =
1161 " <interface name='";
1163 static gchar introspection_postfix[] =
1165 " <method name='send_message'>"
1166 " <arg type='s' name='local_appid' direction='in'/>"
1167 " <arg type='s' name='local_port' direction='in'/>"
1168 " <arg type='b' name='local_trusted' direction='in'/>"
1169 " <arg type='b' name='bi_dir' direction='in'/>"
1170 " <arg type='s' name='remote_appid' direction='in'/>"
1171 " <arg type='s' name='remote_port' direction='in'/>"
1172 " <arg type='b' name='remote_trusted' direction='in'/>"
1173 " <arg type='u' name='data_len' direction='in'/>"
1174 " <arg type='s' name='data' direction='in'/>"
1179 char *introspection_xml = NULL;
1180 int introspection_xml_len = 0;
1184 GError *error = NULL;
1185 char *bus_name = NULL;
1186 char *interface_name = NULL;
1187 GVariant *result = NULL;
1189 bus_name = __get_encoded_name(__app_id, port_name, is_trusted);
1191 _LOGE("Fail to get bus name");
1194 interface_name = bus_name;
1196 introspection_xml_len = strlen(introspection_prefix) + strlen(interface_name) +
1197 strlen(introspection_postfix) + 1;
1199 introspection_xml = (char *)calloc(introspection_xml_len, sizeof(char));
1200 if (!introspection_xml) {
1201 _LOGE("out of memory");
1206 result = g_dbus_connection_call_sync(
1210 DBUS_INTERFACE_DBUS,
1212 g_variant_new("(su)", bus_name, G_BUS_NAME_OWNER_FLAGS_NONE),
1213 G_VARIANT_TYPE("(u)"),
1214 G_DBUS_CALL_FLAGS_NONE,
1219 _LOGE("RequestName fail : %s", error->message);
1220 g_error_free(error);
1223 if (result == NULL) {
1224 _LOGE("fail to get name NULL");
1227 g_variant_get(result, "(u)", &owner_id);
1228 if (owner_id == 0) {
1229 _LOGE("Acquiring the own name is failed");
1233 _LOGI("Acquiring the own name : %d", owner_id);
1235 snprintf(introspection_xml, introspection_xml_len, "%s%s%s", introspection_prefix, interface_name, introspection_postfix);
1237 introspection_data = g_dbus_node_info_new_for_xml(introspection_xml, NULL);
1238 if (!introspection_data) {
1239 _LOGE("g_dbus_node_info_new_for_xml() is failed.");
1243 registration_id = g_dbus_connection_register_object(__gdbus_conn,
1244 MESSAGEPORT_OBJECT_PATH, introspection_data->interfaces[0],
1245 &interface_vtable, NULL, NULL, NULL);
1247 _LOGI("registration_id %d", registration_id);
1249 if (registration_id == 0) {
1250 _LOGE("Failed to g_dbus_connection_register_object");
1255 if (introspection_data)
1256 g_dbus_node_info_unref(introspection_data);
1257 if (introspection_xml)
1258 free(introspection_xml);
1262 g_variant_unref(result);
1265 return registration_id;
1268 /* LCOV_EXCL_START */
1269 void __list_free_port_list(gpointer data)
1271 port_list_info_s *n = (port_list_info_s *)data;
1273 FREE_AND_NULL(n->encoded_bus_name);
1274 FREE_AND_NULL(n->port_name);
1277 /* LCOV_EXCL_STOP */
1279 /* LCOV_EXCL_START */
1280 static void __hash_destory_local_value(gpointer data)
1282 message_port_local_port_info_s *mli = (message_port_local_port_info_s *)data;
1285 free(mli->port_name);
1289 /* LCOV_EXCL_STOP */
1291 /* LCOV_EXCL_START */
1292 static void __hash_destory_remote_value(gpointer data)
1294 message_port_remote_app_info_s *mri = (message_port_remote_app_info_s *)data;
1296 FREE_AND_NULL(mri->sender_id);
1297 FREE_AND_NULL(mri->remote_app_id);
1299 g_list_free_full(mri->port_list, __list_free_port_list);
1304 /* LCOV_EXCL_STOP */
1306 static bool __initialize(void)
1309 #if !GLIB_CHECK_VERSION(2, 35, 0)
1315 char buffer[MAX_PACKAGE_STR_SIZE] = {0, };
1317 _LOGI("initialize");
1318 ret = aul_app_get_appid_bypid(pid, buffer, sizeof(buffer));
1319 retvm_if(ret != AUL_R_OK, false, "Failed to get the application ID: %d", ret);
1321 __app_id = strdup(buffer);
1322 retvm_if(!__app_id, false, "Malloc failed");
1323 _LOGI("init : %s", __app_id);
1325 if (__local_port_info == NULL) {
1326 __local_port_info = g_hash_table_new_full(g_direct_hash, g_direct_equal, NULL, __hash_destory_local_value);
1327 retvm_if(!__local_port_info, false, "fail to create __local_port_info");
1330 if (__remote_app_info == NULL) {
1331 __remote_app_info = g_hash_table_new_full(g_str_hash, g_str_equal, NULL, __hash_destory_remote_value);
1332 retvm_if(!__remote_app_info, false, "fail to create __remote_app_info");
1335 if (__sender_appid_hash == NULL) {
1336 __sender_appid_hash = g_hash_table_new_full(g_str_hash, g_str_equal, free, NULL);
1337 retvm_if(!__sender_appid_hash, false, "fail to create __sender_appid_hash");
1340 if (__trusted_app_list_hash == NULL) {
1341 __trusted_app_list_hash = g_hash_table_new(g_str_hash, g_str_equal);
1342 retvm_if(!__trusted_app_list_hash, false, "fail to create __trusted_app_list_hash");
1345 if (__callback_info_hash == NULL) {
1346 __callback_info_hash = g_hash_table_new_full(g_direct_hash, g_direct_equal, NULL, __hash_destroy_callback_info);
1347 retvm_if(!__trusted_app_list_hash, false, "fail to create __trusted_app_list_hash");
1352 _initialized = true;
1358 static bool __message_port_register_port(const int local_id, const char *local_port, bool is_trusted, messageport_message_cb callback)
1360 message_port_local_port_info_s *mi = (message_port_local_port_info_s *)calloc(1, sizeof(message_port_local_port_info_s));
1361 retvm_if(!mi, false, "Malloc failed");
1363 mi->callback = callback;
1364 mi->is_trusted = is_trusted;
1365 mi->port_name = strdup(local_port);
1366 if (mi->port_name == NULL) {
1367 _LOGE("Malloc failed (%s)", local_port);
1371 mi->local_id = local_id;
1373 g_hash_table_insert(__local_port_info, GINT_TO_POINTER(mi->local_id), mi);
1377 static int __register_message_port(const char *local_port, bool is_trusted, messageport_message_cb callback)
1379 _SECURE_LOGI("Register a message port : [%s:%s]", __app_id, local_port);
1383 /* Check the message port is already registed */
1384 if (__is_local_port_registed(local_port, is_trusted, &local_id, NULL))
1387 local_id = __register_dbus_interface(local_port, is_trusted);
1389 _LOGE("register_dbus_interface fail !!");
1390 return MESSAGEPORT_ERROR_OUT_OF_MEMORY;
1393 if (!__message_port_register_port(local_id, local_port, is_trusted, callback))
1394 return MESSAGEPORT_ERROR_OUT_OF_MEMORY;
1399 int __message_port_send_async(int sockfd, bundle *kb, const char *local_port,
1400 bool local_trusted, bool is_bidirection)
1404 int local_port_len = 0;
1406 bundle_raw *kb_data = NULL;
1408 bundle_encode(kb, &kb_data, &data_len);
1409 if (kb_data == NULL) {
1410 _LOGE("bundle encode fail");
1411 ret = MESSAGEPORT_ERROR_IO_ERROR;
1415 if (data_len > MAX_MESSAGE_SIZE) {
1416 _LOGE("bigger than max size\n");
1417 ret = MESSAGEPORT_ERROR_MAX_EXCEEDED;
1421 if (local_port != NULL)
1422 local_port_len = strlen(local_port) + 1;
1424 if (__write_string_to_socket(sockfd, local_port, local_port_len) != MESSAGEPORT_ERROR_NONE) {
1425 _LOGE("write local_port fail");
1426 ret = MESSAGEPORT_ERROR_IO_ERROR;
1430 if (__write_socket(sockfd, (char *)&is_bidirection, sizeof(is_bidirection), &nb) != MESSAGEPORT_ERROR_NONE) {
1431 _LOGE("write is_bidirection fail");
1432 ret = MESSAGEPORT_ERROR_IO_ERROR;
1436 if (__write_socket(sockfd, (char *)&local_trusted, sizeof(local_trusted), &nb) != MESSAGEPORT_ERROR_NONE) {
1437 _LOGE("write local_trusted fail");
1438 ret = MESSAGEPORT_ERROR_IO_ERROR;
1442 if (__write_string_to_socket(sockfd, (void *)kb_data, data_len) != MESSAGEPORT_ERROR_NONE) {
1443 _LOGE("write kb_data fail");
1444 ret = MESSAGEPORT_ERROR_IO_ERROR;
1454 static int __message_port_send_message(const char *remote_appid, const char *remote_port,
1455 const char *local_port, bool trusted_message, bool local_trusted, bool bi_dir, bundle *message)
1458 int ret = MESSAGEPORT_ERROR_NONE;
1459 GUnixFDList *fd_list = NULL;
1462 bundle_raw *raw = NULL;
1463 char *bus_name = NULL;
1464 char *interface_name = NULL;
1466 message_port_remote_app_info_s *remote_app_info = NULL;
1467 port_list_info_s *port_info = NULL;
1468 GDBusMessage *msg = NULL;
1470 GVariant *body = NULL;
1471 int sock_pair[2] = {0,};
1474 ret = __get_remote_port_info(remote_appid, remote_port, trusted_message, &remote_app_info, &port_info);
1475 if (ret != MESSAGEPORT_ERROR_NONE)
1478 if (port_info->exist == false) {
1480 _LOGI("port exist check !!");
1481 ret = __check_remote_port(remote_appid, remote_port, trusted_message, &exist);
1482 if (ret != MESSAGEPORT_ERROR_NONE) {
1484 } else if (!exist) {
1485 ret = MESSAGEPORT_ERROR_MESSAGEPORT_NOT_FOUND;
1490 if (port_info->send_sock_fd > 0) {
1491 ret = __message_port_send_async(port_info->send_sock_fd, message,
1492 (local_port) ? local_port : "", local_trusted, bi_dir);
1495 bus_name = port_info->encoded_bus_name;
1496 interface_name = bus_name;
1498 if (bundle_encode(message, &raw, &len) != BUNDLE_ERROR_NONE) {
1499 ret = MESSAGEPORT_ERROR_INVALID_PARAMETER;
1503 if (MAX_MESSAGE_SIZE < len) {
1504 _LOGE("The size of message (%d) has exceeded the maximum limit.", len);
1505 ret = MESSAGEPORT_ERROR_MAX_EXCEEDED;
1509 body = g_variant_new("(ssbbssbus)", __app_id, (local_port) ? local_port : "", local_trusted, bi_dir,
1510 remote_appid, remote_port, trusted_message, len, raw);
1511 if (strcmp(remote_appid, __app_id) != 0) { /* self send */
1513 /* if message-port fail to get socket pair, communicate using GDBus */
1514 if (aul_request_message_port_socket_pair(sock_pair) != AUL_R_OK) {
1515 _LOGE("error create socket pair");
1518 _LOGI("sock pair : %d, %d",
1519 sock_pair[SOCK_PAIR_SENDER], sock_pair[SOCK_PAIR_RECEIVER]);
1520 fd_list = g_unix_fd_list_new();
1521 g_unix_fd_list_append(fd_list, sock_pair[SOCK_PAIR_RECEIVER], &err);
1523 _LOGE("g_unix_fd_list_append [%s]", err->message);
1524 ret = MESSAGEPORT_ERROR_IO_ERROR;
1529 port_info->send_sock_fd = sock_pair[SOCK_PAIR_SENDER];
1530 close(sock_pair[SOCK_PAIR_RECEIVER]);
1531 sock_pair[SOCK_PAIR_RECEIVER] = 0;
1533 port_info->gio_read = g_io_channel_unix_new(port_info->send_sock_fd);
1534 if (!port_info->gio_read) {
1535 _LOGE("Error is %s\n", strerror_r(errno, buf, sizeof(buf)));
1536 ret = MESSAGEPORT_ERROR_IO_ERROR;
1540 port_info->g_src_id = g_io_add_watch(port_info->gio_read, G_IO_IN | G_IO_HUP,
1541 __socket_disconnect_handler, (gpointer)port_info);
1542 if (port_info->g_src_id == 0) {
1543 _LOGE("fail to add watch on socket");
1544 ret = MESSAGEPORT_ERROR_IO_ERROR;
1551 msg = g_dbus_message_new_method_call(bus_name, MESSAGEPORT_OBJECT_PATH, interface_name, "send_message");
1553 _LOGE("Can't allocate new method call");
1554 ret = MESSAGEPORT_ERROR_OUT_OF_MEMORY;
1558 g_dbus_message_set_unix_fd_list(msg, fd_list);
1559 g_dbus_message_set_body(msg, body);
1560 g_dbus_connection_send_message(__gdbus_conn, msg, G_DBUS_SEND_MESSAGE_FLAGS_NONE, NULL, &err);
1562 _LOGE("No reply. error = %s", err->message);
1564 ret = MESSAGEPORT_ERROR_IO_ERROR;
1567 __watch_remote_port_info(port_info);
1573 g_object_unref(msg);
1575 bundle_free_encoded_rawdata(&raw);
1577 g_object_unref(fd_list);
1579 if (ret != MESSAGEPORT_ERROR_NONE) {
1580 __clear_disconnect_socket(port_info);
1581 if (sock_pair[SOCK_PAIR_SENDER])
1582 close(sock_pair[SOCK_PAIR_SENDER]);
1583 if (sock_pair[SOCK_PAIR_RECEIVER])
1584 close(sock_pair[SOCK_PAIR_RECEIVER]);
1590 int __message_send_bidirectional_message(int id, const char *remote_app_id, const char *remote_port, bool trusted_message, bundle *message)
1592 message_port_local_port_info_s *local_info;
1593 int ret = __get_local_port_info(id, &local_info);
1594 if (ret != MESSAGEPORT_ERROR_NONE)
1597 _LOGI("bidirectional_message %s", local_info->port_name);
1598 return __message_port_send_message(remote_app_id, remote_port,
1599 local_info->port_name, trusted_message, local_info->is_trusted, true, message);
1602 int messageport_unregister_local_port(int local_port_id, bool trusted_port)
1606 char *bus_name = NULL;
1610 _LOGI("unregister : %d", local_port_id);
1612 message_port_local_port_info_s *mi =
1613 (message_port_local_port_info_s *)
1614 g_hash_table_lookup(__local_port_info, GINT_TO_POINTER(local_port_id));
1616 return MESSAGEPORT_ERROR_MESSAGEPORT_NOT_FOUND;
1618 if (mi->is_trusted != trusted_port)
1619 return MESSAGEPORT_ERROR_INVALID_PARAMETER;
1621 g_hash_table_remove(__callback_info_hash, GUINT_TO_POINTER(local_port_id));
1623 bus_name = __get_encoded_name(__app_id, mi->port_name, mi->is_trusted);
1624 if (bus_name == NULL)
1625 return MESSAGEPORT_ERROR_OUT_OF_MEMORY;
1627 g_dbus_connection_unregister_object(__gdbus_conn, local_port_id);
1629 result = g_dbus_connection_call_sync(
1633 DBUS_INTERFACE_DBUS,
1635 g_variant_new("(s)", bus_name),
1636 G_VARIANT_TYPE("(u)"),
1637 G_DBUS_CALL_FLAGS_NONE,
1646 _LOGE("RequestName fail : %s", err->message);
1648 return MESSAGEPORT_ERROR_MESSAGEPORT_NOT_FOUND;
1650 g_variant_get(result, "(u)", &ret);
1653 g_variant_unref(result);
1655 if (ret != DBUS_RELEASE_NAME_REPLY_RELEASED) {
1657 if (ret == DBUS_RELEASE_NAME_REPLY_NON_EXISTENT) {
1658 _LOGE("Port Not exist");
1659 return MESSAGEPORT_ERROR_MESSAGEPORT_NOT_FOUND;
1660 } else if (ret == DBUS_RELEASE_NAME_REPLY_NOT_OWNER) {
1661 _LOGE("Try to release not owned name. MESSAGEPORT_ERROR_INVALID_PARAMETER");
1662 return MESSAGEPORT_ERROR_INVALID_PARAMETER;
1667 g_hash_table_remove(__local_port_info, GINT_TO_POINTER(local_port_id));
1669 return MESSAGEPORT_ERROR_NONE;
1672 int messageport_register_local_port(const char *local_port, messageport_message_cb callback)
1674 if (!_initialized) {
1675 if (!__initialize())
1676 return MESSAGEPORT_ERROR_IO_ERROR;
1679 return __register_message_port(local_port, false, callback);
1682 int messageport_register_trusted_local_port(const char *local_port, messageport_message_cb callback)
1684 if (!_initialized) {
1685 if (!__initialize())
1686 return MESSAGEPORT_ERROR_IO_ERROR;
1689 return __register_message_port(local_port, true, callback);
1693 int messageport_check_remote_port(const char *remote_app_id, const char *remote_port, bool *exist)
1695 if (!_initialized) {
1696 if (!__initialize())
1697 return MESSAGEPORT_ERROR_IO_ERROR;
1700 int ret = __check_remote_port(remote_app_id, remote_port, false, exist);
1701 if (ret == MESSAGEPORT_ERROR_MESSAGEPORT_NOT_FOUND) {
1703 ret = MESSAGEPORT_ERROR_NONE;
1709 int messageport_check_trusted_remote_port(const char *remote_app_id, const char *remote_port, bool *exist)
1711 if (!_initialized) {
1712 if (!__initialize())
1713 return MESSAGEPORT_ERROR_IO_ERROR;
1716 int ret = __check_remote_port(remote_app_id, remote_port, true, exist);
1717 if (ret == MESSAGEPORT_ERROR_MESSAGEPORT_NOT_FOUND) {
1719 ret = MESSAGEPORT_ERROR_NONE;
1725 int messageport_send_message(const char *remote_app_id, const char *remote_port, bundle *message)
1727 if (!_initialized) {
1728 if (!__initialize())
1729 return MESSAGEPORT_ERROR_IO_ERROR;
1732 return __message_port_send_message(remote_app_id, remote_port, NULL, false, false, false, message);
1735 int messageport_send_trusted_message(const char *remote_app_id, const char *remote_port, bundle *message)
1737 if (!_initialized) {
1738 if (!__initialize())
1739 return MESSAGEPORT_ERROR_IO_ERROR;
1742 return __message_port_send_message(remote_app_id, remote_port, NULL, true, false, false, message);
1745 int messageport_send_bidirectional_message(int id, const char *remote_app_id, const char *remote_port,
1748 if (!_initialized) {
1749 if (!__initialize())
1750 return MESSAGEPORT_ERROR_IO_ERROR;
1753 return __message_send_bidirectional_message(id, remote_app_id, remote_port, false, message);
1756 int messageport_send_bidirectional_trusted_message(int id, const char *remote_app_id, const char *remote_port,
1759 if (!_initialized) {
1760 if (!__initialize())
1761 return MESSAGEPORT_ERROR_IO_ERROR;
1763 return __message_send_bidirectional_message(id, remote_app_id, remote_port, true, message);