bluez/monitor/l2cap.c

2348 lines
52 KiB
C
Raw Normal View History

/*
*
* BlueZ - Bluetooth protocol stack for Linux
*
* Copyright (C) 2011-2012 Intel Corporation
* Copyright (C) 2004-2010 Marcel Holtmann <marcel@holtmann.org>
*
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <stdio.h>
#include <stdlib.h>
#include <inttypes.h>
#include <bluetooth/bluetooth.h>
#include "bt.h"
#include "packet.h"
#include "display.h"
#include "l2cap.h"
#include "uuid.h"
#include "sdp.h"
2012-11-16 07:26:51 +08:00
#define MAX_CHAN 64
struct chan_data {
uint16_t index;
uint16_t handle;
uint16_t scid;
uint16_t dcid;
uint16_t psm;
uint8_t ctrlid;
2012-11-16 08:24:22 +08:00
uint8_t mode;
2012-11-16 07:26:51 +08:00
};
static struct chan_data chan_list[MAX_CHAN];
static void assign_scid(const struct l2cap_frame *frame,
uint16_t scid, uint16_t psm, uint8_t ctrlid)
{
int i, n = -1;
for (i = 0; i < MAX_CHAN; i++) {
if (n < 0 && chan_list[i].handle == 0x0000)
n = i;
if (chan_list[i].index != frame->index)
continue;
if (chan_list[i].handle != frame->handle)
continue;
if (frame->in) {
if (chan_list[i].dcid == scid) {
n = i;
break;
}
} else {
if (chan_list[i].scid == scid) {
n = i;
break;
}
}
2012-11-16 07:26:51 +08:00
}
if (n < 0)
return;
memset(&chan_list[n], 0, sizeof(chan_list[n]));
chan_list[n].index = frame->index;
chan_list[n].handle = frame->handle;
if (frame->in)
chan_list[n].dcid = scid;
else
chan_list[n].scid = scid;
chan_list[n].psm = psm;
chan_list[n].ctrlid = ctrlid;
2012-11-16 08:24:22 +08:00
chan_list[n].mode = 0;
2012-11-16 07:26:51 +08:00
}
static void release_scid(const struct l2cap_frame *frame, uint16_t scid)
{
int i;
for (i = 0; i < MAX_CHAN; i++) {
if (chan_list[i].index != frame->index)
continue;
if (chan_list[i].handle != frame->handle)
continue;
if (frame->in) {
if (chan_list[i].scid == scid) {
chan_list[i].handle = 0;
break;
}
} else {
if (chan_list[i].dcid == scid) {
chan_list[i].handle = 0;
break;
2012-11-16 07:26:51 +08:00
}
}
}
}
static void assign_dcid(const struct l2cap_frame *frame,
uint16_t dcid, uint16_t scid)
{
int i;
for (i = 0; i < MAX_CHAN; i++) {
if (chan_list[i].index != frame->index)
continue;
if (chan_list[i].handle != frame->handle)
continue;
if (frame->in) {
if (chan_list[i].scid == scid) {
chan_list[i].dcid = dcid;
break;
}
} else {
if (chan_list[i].dcid == scid) {
chan_list[i].scid = dcid;
break;
2012-11-16 07:26:51 +08:00
}
}
}
}
2012-11-16 08:24:22 +08:00
static void assign_mode(const struct l2cap_frame *frame,
uint8_t mode, uint16_t dcid)
{
int i;
for (i = 0; i < MAX_CHAN; i++) {
if (chan_list[i].index != frame->index)
continue;
if (chan_list[i].handle != frame->handle)
continue;
if (frame->in) {
if (chan_list[i].scid == dcid) {
chan_list[i].mode = mode;
break;
}
} else {
if (chan_list[i].dcid == dcid) {
chan_list[i].mode = mode;
break;
}
}
}
}
2012-11-16 07:26:51 +08:00
static uint16_t get_psm(const struct l2cap_frame *frame)
{
int i;
for (i = 0; i < MAX_CHAN; i++) {
if (chan_list[i].index != frame->index &&
chan_list[i].ctrlid == 0)
continue;
if (chan_list[i].handle != frame->handle &&
chan_list[i].ctrlid != frame->index)
continue;
if (frame->in) {
if (chan_list[i].scid == frame->cid)
return chan_list[i].psm;
} else {
if (chan_list[i].dcid == frame->cid)
return chan_list[i].psm;
2012-11-16 07:26:51 +08:00
}
}
return 0;
}
2012-11-16 08:24:22 +08:00
static uint8_t get_mode(const struct l2cap_frame *frame)
{
int i;
for (i = 0; i < MAX_CHAN; i++) {
if (chan_list[i].index != frame->index &&
chan_list[i].ctrlid == 0)
continue;
if (chan_list[i].handle != frame->handle &&
chan_list[i].ctrlid != frame->index)
continue;
if (frame->in) {
if (chan_list[i].scid == frame->cid)
return chan_list[i].mode;
} else {
if (chan_list[i].dcid == frame->cid)
return chan_list[i].mode;
}
}
return 0;
}
static uint16_t get_chan(const struct l2cap_frame *frame)
{
int i;
for (i = 0; i < MAX_CHAN; i++) {
if (chan_list[i].index != frame->index &&
chan_list[i].ctrlid == 0)
continue;
if (chan_list[i].handle != frame->handle &&
chan_list[i].ctrlid != frame->index)
continue;
if (frame->in) {
if (chan_list[i].scid == frame->cid)
return i;
} else {
if (chan_list[i].dcid == frame->cid)
return i;
}
}
return 0;
}
#define MAX_INDEX 16
struct index_data {
void *frag_buf;
uint16_t frag_pos;
uint16_t frag_len;
uint16_t frag_cid;
};
static struct index_data index_list[MAX_INDEX];
static void clear_fragment_buffer(uint16_t index)
{
free(index_list[index].frag_buf);
index_list[index].frag_buf = NULL;
index_list[index].frag_pos = 0;
index_list[index].frag_len = 0;
}
static void print_psm(uint16_t psm)
{
print_field("PSM: %d (0x%4.4x)", btohs(psm), btohs(psm));
}
static void print_cid(const char *type, uint16_t cid)
{
print_field("%s CID: %d", type, btohs(cid));
}
static void print_reject_reason(uint16_t reason)
{
const char *str;
switch (btohs(reason)) {
case 0x0000:
str = "Command not understood";
break;
case 0x0001:
str = "Signaling MTU exceeded";
break;
case 0x0002:
str = "Invalid CID in request";
break;
default:
str = "Reserved";
break;
}
print_field("Reason: %s (0x%4.4x)", str, btohs(reason));
}
static void print_conn_result(uint16_t result)
{
const char *str;
switch (btohs(result)) {
case 0x0000:
str = "Connection successful";
break;
case 0x0001:
str = "Connection pending";
break;
case 0x0002:
str = "Connection refused - PSM not supported";
break;
case 0x0003:
str = "Connection refused - security block";
break;
case 0x0004:
str = "Connection refused - no resources available";
break;
default:
str = "Reserved";
break;
}
print_field("Result: %s (0x%4.4x)", str, btohs(result));
}
static void print_conn_status(uint16_t status)
{
const char *str;
switch (btohs(status)) {
case 0x0000:
str = "No further information available";
break;
case 0x0001:
str = "Authentication pending";
break;
case 0x0002:
str = "Authorization pending";
break;
default:
str = "Reserved";
break;
}
print_field("Status: %s (0x%4.4x)", str, btohs(status));
}
static void print_config_flags(uint16_t flags)
{
const char *str;
if (btohs(flags) & 0x0001)
str = " (continuation)";
else
str = "";
print_field("Flags: 0x%4.4x%s", btohs(flags), str);
}
static void print_config_result(uint16_t result)
{
const char *str;
switch (btohs(result)) {
case 0x0000:
str = "Success";
break;
case 0x0001:
str = "Failure - unacceptable parameters";
break;
case 0x0002:
str = "Failure - rejected";
break;
case 0x0003:
str = "Failure - unknown options";
break;
case 0x0004:
str = "Pending";
break;
case 0x0005:
str = "Failure - flow spec rejected";
break;
default:
str = "Reserved";
break;
}
print_field("Result: %s (0x%4.4x)", str, btohs(result));
}
static struct {
uint8_t type;
uint8_t len;
const char *str;
} options_table[] = {
{ 0x01, 2, "Maximum Transmission Unit" },
{ 0x02, 2, "Flush Timeout" },
{ 0x03, 22, "Quality of Service" },
{ 0x04, 9, "Retransmission and Flow Control" },
{ 0x05, 1, "Frame Check Sequence" },
{ 0x06, 16, "Extended Flow Specification" },
{ 0x07, 2, "Extended Window Size" },
{ }
};
2012-11-16 08:24:22 +08:00
static void print_config_options(const struct l2cap_frame *frame,
uint8_t offset, uint16_t dcid, bool response)
{
2012-11-16 08:24:22 +08:00
const uint8_t *data = frame->data + offset;
uint16_t size = frame->size - offset;
uint16_t consumed = 0;
while (consumed < size - 2) {
const char *str = "Unknown";
uint8_t type = data[consumed];
uint8_t len = data[consumed + 1];
uint8_t expect_len = 0;
int i;
for (i = 0; options_table[i].str; i++) {
if (options_table[i].type == type) {
str = options_table[i].str;
expect_len = options_table[i].len;
break;
}
}
print_field("Option: %s (0x%2.2x)", str, type);
if (expect_len == 0) {
consumed += 2;
break;
}
if (len != expect_len) {
print_text(COLOR_ERROR, "wrong option size (%d != %d)",
len, expect_len);
consumed += 2;
break;
}
switch (type) {
case 0x01:
print_field(" MTU: %d",
bt_get_le16(data + consumed + 2));
break;
case 0x02:
print_field(" Flush timeout: %d",
bt_get_le16(data + consumed + 2));
break;
case 0x03:
switch (data[consumed + 3]) {
case 0x00:
str = "No Traffic";
break;
case 0x01:
str = "Best Effort";
break;
case 0x02:
str = "Guaranteed";
break;
default:
str = "Reserved";
break;
}
print_field(" Flags: 0x%2.2x", data[consumed + 2]);
print_field(" Service type: %s (0x%2.2x)",
str, data[consumed + 3]);
print_field(" Token rate: 0x%8.8x",
bt_get_le32(data + consumed + 4));
print_field(" Token bucket size: 0x%8.8x",
bt_get_le32(data + consumed + 8));
print_field(" Peak bandwidth: 0x%8.8x",
bt_get_le32(data + consumed + 12));
print_field(" Latency: 0x%8.8x",
bt_get_le32(data + consumed + 16));
print_field(" Delay variation: 0x%8.8x",
bt_get_le32(data + consumed + 20));
break;
case 0x04:
2012-11-16 08:24:22 +08:00
if (response)
assign_mode(frame, data[consumed + 2], dcid);
switch (data[consumed + 2]) {
case 0x00:
str = "Basic";
break;
case 0x01:
str = "Retransmission";
break;
case 0x02:
str = "Flow control";
break;
case 0x03:
str = "Enhanced retransmission";
break;
case 0x04:
str = "Streaming";
break;
default:
str = "Reserved";
break;
}
print_field(" Mode: %s (0x%2.2x)",
str, data[consumed + 2]);
print_field(" TX window size: %d", data[consumed + 3]);
print_field(" Max transmit: %d", data[consumed + 4]);
print_field(" Retransmission timeout: %d",
bt_get_le16(data + consumed + 5));
print_field(" Monitor timeout: %d",
bt_get_le16(data + consumed + 7));
print_field(" Maximum PDU size: %d",
bt_get_le16(data + consumed + 9));
break;
case 0x05:
switch (data[consumed + 2]) {
case 0x00:
str = "No FCS";
break;
case 0x01:
str = "16-bit FCS";
break;
default:
str = "Reserved";
break;
}
print_field(" FCS: %s (0x%2.2d)",
str, data[consumed + 2]);
break;
case 0x06:
switch (data[consumed + 3]) {
case 0x00:
str = "No traffic";
break;
case 0x01:
str = "Best effort";
break;
case 0x02:
str = "Guaranteed";
break;
default:
str = "Reserved";
break;
}
print_field(" Identifier: 0x%2.2x",
data[consumed + 2]);
print_field(" Service type: %s (0x%2.2x)",
str, data[consumed + 3]);
print_field(" Maximum SDU size: 0x%4.4x",
bt_get_le16(data + consumed + 4));
print_field(" SDU inter-arrival time: 0x%8.8x",
bt_get_le32(data + consumed + 6));
print_field(" Access latency: 0x%8.8x",
bt_get_le32(data + consumed + 10));
print_field(" Flush timeout: 0x%8.8x",
bt_get_le32(data + consumed + 14));
break;
case 0x07:
print_field(" Max window size: %d",
bt_get_le16(data + consumed + 2));
break;
default:
packet_hexdump(data + consumed + 2, len);
break;
}
consumed += len + 2;
}
if (consumed < size)
packet_hexdump(data + consumed, size - consumed);
}
static void print_info_type(uint16_t type)
{
const char *str;
switch (btohs(type)) {
case 0x0001:
str = "Connectionless MTU";
break;
case 0x0002:
str = "Extended features supported";
break;
case 0x0003:
str = "Fixed channels supported";
break;
default:
str = "Reserved";
break;
}
print_field("Type: %s (0x%4.4x)", str, btohs(type));
}
static void print_info_result(uint16_t result)
{
const char *str;
switch (btohs(result)) {
case 0x0000:
str = "Success";
break;
case 0x0001:
str = "Not supported";
break;
default:
str = "Reserved";
break;
}
print_field("Result: %s (0x%4.4x)", str, btohs(result));
}
static struct {
uint8_t bit;
const char *str;
} features_table[] = {
{ 0, "Flow control mode" },
{ 1, "Retransmission mode" },
{ 2, "Bi-directional QoS" },
{ 3, "Enhanced Retransmission Mode" },
{ 4, "Streaming Mode" },
{ 5, "FCS Option" },
{ 6, "Extended Flow Specification for BR/EDR" },
{ 7, "Fixed Channels" },
{ 8, "Extended Window Size" },
{ 9, "Unicast Connectionless Data Reception" },
{ 31, "Reserved for feature mask extension" },
{ }
};
static void print_features(uint32_t features)
{
uint32_t mask = features;
int i;
print_field("Features: 0x%8.8x", features);
for (i = 0; features_table[i].str; i++) {
if (features & (1 << features_table[i].bit)) {
print_field(" %s", features_table[i].str);
mask &= ~(1 << features_table[i].bit);
}
}
if (mask)
print_field(" Unknown features (0x%8.8x)", mask);
}
static struct {
uint16_t cid;
const char *str;
} channels_table[] = {
{ 0x0000, "Null identifier" },
{ 0x0001, "L2CAP Signaling (BR/EDR)" },
{ 0x0002, "Connectionless reception" },
{ 0x0003, "AMP Manager Protocol" },
{ 0x0004, "Attribute Protocol" },
{ 0x0005, "L2CAP Signaling (LE)" },
{ 0x0006, "Security Manager" },
{ 0x003f, "AMP Test Manager" },
{ }
};
static void print_channels(uint64_t channels)
{
uint64_t mask = channels;
int i;
2012-11-11 10:26:07 +08:00
print_field("Channels: 0x%16.16" PRIx64, channels);
for (i = 0; channels_table[i].str; i++) {
if (channels & (1 << channels_table[i].cid)) {
print_field(" %s", channels_table[i].str);
mask &= ~(1 << channels_table[i].cid);
}
}
if (mask)
2012-11-11 10:26:07 +08:00
print_field(" Unknown channels (0x%8.8" PRIx64 ")", mask);
}
static void print_move_result(uint16_t result)
{
const char *str;
switch (btohs(result)) {
case 0x0000:
str = "Move success";
break;
case 0x0001:
str = "Move pending";
break;
case 0x0002:
str = "Move refused - Controller ID not supported";
break;
case 0x0003:
str = "Move refused - new Controller ID is same";
break;
case 0x0004:
str = "Move refused - Configuration not supported";
break;
case 0x0005:
str = "Move refused - Move Channel collision";
break;
case 0x0006:
str = "Move refused - Channel not allowed to be moved";
break;
default:
str = "Reserved";
break;
}
print_field("Result: %s (0x%4.4x)", str, btohs(result));
}
static void print_move_cfm_result(uint16_t result)
{
const char *str;
switch (btohs(result)) {
case 0x0000:
str = "Move success - both sides succeed";
break;
case 0x0001:
str = "Move failure - one or both sides refuse";
break;
default:
str = "Reserved";
break;
}
print_field("Result: %s (0x%4.4x)", str, btohs(result));
}
static void print_conn_param_result(uint16_t result)
{
const char *str;
switch (btohs(result)) {
case 0x0000:
str = "Connection Parameters accepted";
break;
case 0x0001:
str = "Connection Parameters rejected";
break;
default:
str = "Reserved";
break;
}
print_field("Result: %s (0x%4.4x)", str, btohs(result));
}
static void sig_cmd_reject(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_cmd_reject *pdu = frame->data;
const void *data = frame->data;
uint16_t size = frame->size;
uint16_t scid, dcid;
print_reject_reason(pdu->reason);
data += sizeof(*pdu);
size -= sizeof(*pdu);
switch (btohs(pdu->reason)) {
case 0x0000:
if (size != 0) {
print_text(COLOR_ERROR, "invalid data size");
packet_hexdump(data, size);
break;
}
break;
case 0x0001:
if (size != 2) {
print_text(COLOR_ERROR, "invalid data size");
packet_hexdump(data, size);
break;
}
print_field("MTU: %d", bt_get_le16(data));
break;
case 0x0002:
if (size != 4) {
print_text(COLOR_ERROR, "invalid data size");
packet_hexdump(data, size);
break;
}
dcid = bt_get_le16(data);
scid = bt_get_le16(data + 2);
print_cid("Destination", htobs(dcid));
print_cid("Source", htobs(scid));
break;
default:
packet_hexdump(data, size);
break;
}
}
static void sig_conn_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_conn_req *pdu = frame->data;
print_psm(pdu->psm);
print_cid("Source", pdu->scid);
2012-11-16 07:26:51 +08:00
assign_scid(frame, btohs(pdu->scid), btohs(pdu->psm), 0);
}
static void sig_conn_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_conn_rsp *pdu = frame->data;
print_cid("Destination", pdu->dcid);
print_cid("Source", pdu->scid);
print_conn_result(pdu->result);
print_conn_status(pdu->status);
2012-11-16 07:26:51 +08:00
assign_dcid(frame, btohs(pdu->dcid), btohs(pdu->scid));
}
static void sig_config_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_config_rsp *pdu = frame->data;
print_cid("Destination", pdu->dcid);
print_config_flags(pdu->flags);
2012-11-16 08:24:22 +08:00
print_config_options(frame, 4, btohs(pdu->dcid), false);
}
static void sig_config_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_config_rsp *pdu = frame->data;
print_cid("Destination", pdu->dcid);
print_config_flags(pdu->flags);
print_config_result(pdu->result);
2012-11-16 08:24:22 +08:00
print_config_options(frame, 6, btohs(pdu->dcid), true);
}
static void sig_disconn_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_disconn_req *pdu = frame->data;
print_cid("Destination", pdu->dcid);
print_cid("Source", pdu->scid);
}
static void sig_disconn_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_disconn_rsp *pdu = frame->data;
print_cid("Destination", pdu->dcid);
print_cid("Source", pdu->scid);
2012-11-16 07:26:51 +08:00
release_scid(frame, btohs(pdu->scid));
}
static void sig_echo_req(const struct l2cap_frame *frame)
{
packet_hexdump(frame->data, frame->size);
}
static void sig_echo_rsp(const struct l2cap_frame *frame)
{
packet_hexdump(frame->data, frame->size);
}
static void sig_info_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_info_req *pdu = frame->data;
print_info_type(pdu->type);
}
static void sig_info_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_info_rsp *pdu = frame->data;
const void *data = frame->data;
uint16_t size = frame->size;
print_info_type(pdu->type);
print_info_result(pdu->result);
data += sizeof(*pdu);
size -= sizeof(*pdu);
if (btohs(pdu->result) != 0x0000) {
if (size > 0) {
print_text(COLOR_ERROR, "invalid data size");
packet_hexdump(data, size);
}
return;
}
switch (btohs(pdu->type)) {
case 0x0001:
if (size != 2) {
print_text(COLOR_ERROR, "invalid data size");
packet_hexdump(data, size);
break;
}
print_field("MTU: %d", bt_get_le16(data));
break;
case 0x0002:
if (size != 4) {
print_text(COLOR_ERROR, "invalid data size");
packet_hexdump(data, size);
break;
}
print_features(bt_get_le32(data));
break;
case 0x0003:
if (size != 8) {
print_text(COLOR_ERROR, "invalid data size");
packet_hexdump(data, size);
break;
}
print_channels(bt_get_le64(data));
break;
default:
packet_hexdump(data, size);
break;
}
}
static void sig_create_chan_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_create_chan_req *pdu = frame->data;
print_psm(pdu->psm);
print_cid("Source", pdu->scid);
print_field("Controller ID: %d", pdu->ctrlid);
2012-11-16 07:26:51 +08:00
assign_scid(frame, btohs(pdu->scid), btohs(pdu->psm), pdu->ctrlid);
}
static void sig_create_chan_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_create_chan_rsp *pdu = frame->data;
print_cid("Destination", pdu->dcid);
print_cid("Source", pdu->scid);
print_conn_result(pdu->result);
print_conn_status(pdu->status);
2012-11-16 07:26:51 +08:00
assign_dcid(frame, btohs(pdu->dcid), btohs(pdu->scid));
}
static void sig_move_chan_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_move_chan_req *pdu = frame->data;
print_cid("Initiator", pdu->icid);
print_field("Controller ID: %d", pdu->ctrlid);
}
static void sig_move_chan_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_move_chan_rsp *pdu = frame->data;
print_cid("Initiator", pdu->icid);
print_move_result(pdu->result);
}
static void sig_move_chan_cfm(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_move_chan_cfm *pdu = frame->data;
print_cid("Initiator", pdu->icid);
print_move_cfm_result(pdu->result);
}
static void sig_move_chan_cfm_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_move_chan_cfm_rsp *pdu = frame->data;
print_cid("Initiator", pdu->icid);
}
static void sig_conn_param_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_conn_param_req *pdu = frame->data;
print_field("Min interval: %d", btohs(pdu->min_interval));
print_field("Max interval: %d", btohs(pdu->max_interval));
print_field("Slave latency: %d", btohs(pdu->latency));
print_field("Timeout multiplier: %d", btohs(pdu->timeout));
}
static void sig_conn_param_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_pdu_conn_param_rsp *pdu = frame->data;
print_conn_param_result(pdu->result);
}
2012-11-03 19:11:54 +08:00
struct sig_opcode_data {
uint8_t opcode;
const char *str;
void (*func) (const struct l2cap_frame *frame);
2012-11-03 19:11:54 +08:00
uint16_t size;
bool fixed;
};
static const struct sig_opcode_data sig_opcode_table[] = {
{ 0x01, "Command Reject",
sig_cmd_reject, 2, false },
{ 0x02, "Connection Request",
sig_conn_req, 4, true },
{ 0x03, "Connection Response",
sig_conn_rsp, 8, true },
{ 0x04, "Configure Request",
sig_config_req, 4, false },
{ 0x05, "Configure Response",
sig_config_rsp, 6, false },
{ 0x06, "Disconnection Request",
sig_disconn_req, 4, true },
{ 0x07, "Disconnection Response",
sig_disconn_rsp, 4, true },
{ 0x08, "Echo Request",
sig_echo_req, 0, false },
{ 0x09, "Echo Response",
sig_echo_rsp, 0, false },
{ 0x0a, "Information Request",
sig_info_req, 2, true },
{ 0x0b, "Information Response",
sig_info_rsp, 4, false },
{ 0x0c, "Create Channel Request",
sig_create_chan_req, 5, true },
{ 0x0d, "Create Channel Response",
sig_create_chan_rsp, 8, true },
{ 0x0e, "Move Channel Request",
sig_move_chan_req, 3, true },
{ 0x0f, "Move Channel Response",
sig_move_chan_rsp, 4, true },
{ 0x10, "Move Channel Confirmation",
sig_move_chan_cfm, 4, true },
{ 0x11, "Move Channel Confirmation Response",
sig_move_chan_cfm_rsp, 2, true },
{ 0x12, "Connection Parameter Update Request",
sig_conn_param_req, 8, true },
{ 0x13, "Connection Parameter Update Response",
sig_conn_param_rsp, 2, true },
2012-11-03 19:11:54 +08:00
{ },
};
static void sig_packet(uint16_t index, bool in, uint16_t handle,
uint16_t cid, const void *data, uint16_t size)
2012-11-03 19:11:54 +08:00
{
struct l2cap_frame frame;
while (size > 0) {
uint16_t len;
const struct bt_l2cap_hdr_sig *hdr = data;
const struct sig_opcode_data *opcode_data = NULL;
const char *opcode_color, *opcode_str;
int i;
if (size < 4) {
print_text(COLOR_ERROR, "malformed signal packet");
packet_hexdump(data, size);
return;
}
2012-11-03 19:11:54 +08:00
len = btohs(hdr->len);
2012-11-03 19:11:54 +08:00
data += 4;
size -= 4;
2012-11-03 19:11:54 +08:00
if (size < len) {
print_text(COLOR_ERROR, "invalid signal packet size");
packet_hexdump(data, size);
return;
}
2012-11-03 19:11:54 +08:00
for (i = 0; sig_opcode_table[i].str; i++) {
if (sig_opcode_table[i].opcode == hdr->code) {
opcode_data = &sig_opcode_table[i];
break;
}
2012-11-03 19:11:54 +08:00
}
if (opcode_data) {
if (opcode_data->func) {
if (in)
opcode_color = COLOR_MAGENTA;
else
opcode_color = COLOR_BLUE;
} else
opcode_color = COLOR_WHITE_BG;
opcode_str = opcode_data->str;
} else {
opcode_color = COLOR_WHITE_BG;
opcode_str = "Unknown";
}
2012-11-03 19:11:54 +08:00
print_indent(6, opcode_color, "L2CAP: ", opcode_str,
2012-11-10 06:54:36 +08:00
COLOR_OFF,
" (0x%2.2x) ident %d len %d",
hdr->code, hdr->ident, len);
2012-11-03 19:11:54 +08:00
if (!opcode_data || !opcode_data->func) {
packet_hexdump(data, len);
data += len;
size -= len;
return;
}
if (opcode_data->fixed) {
if (len != opcode_data->size) {
print_text(COLOR_ERROR, "invalid size");
packet_hexdump(data, len);
data += len;
size -= len;
continue;
}
} else {
if (len < opcode_data->size) {
print_text(COLOR_ERROR, "too short packet");
packet_hexdump(data, size);
data += len;
size -= len;
continue;
}
}
l2cap_frame_init(&frame, index, in, handle, cid, data, len);
opcode_data->func(&frame);
data += len;
size -= len;
}
packet_hexdump(data, size);
2012-11-03 19:11:54 +08:00
}
static void print_controller_list(const uint8_t *data, uint16_t size)
{
while (size > 2) {
const char *str;
print_field("Controller ID: %d", data[0]);
switch (data[1]) {
case 0x00:
str = "Primary BR/EDR Controller";
break;
case 0x01:
str = "802.11 AMP Controller";
break;
default:
str = "Reserved";
break;
}
print_field(" Type: %s (0x%2.2x)", str, data[1]);
switch (data[2]) {
case 0x00:
str = "Present";
break;
case 0x01:
str = "Bluetooth only";
break;
case 0x02:
str = "No capacity";
break;
case 0x03:
str = "Low capacity";
break;
case 0x04:
str = "Medium capacity";
break;
case 0x05:
str = "High capacity";
break;
case 0x06:
str = "Full capacity";
break;
default:
str = "Reserved";
break;
}
print_field(" Status: %s (0x%2.2x)", str, data[2]);
data += 3;
size -= 3;
}
packet_hexdump(data, size);
}
static void amp_cmd_reject(const struct l2cap_frame *frame)
{
const struct bt_l2cap_amp_cmd_reject *pdu = frame->data;
print_field("Reason: 0x%4.4x", btohs(pdu->reason));
}
static void amp_discover_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_amp_discover_req *pdu = frame->data;
print_field("MTU/MPS size: %d", btohs(pdu->size));
print_field("Extended feature mask: 0x%4.4x", btohs(pdu->features));
}
static void amp_discover_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_amp_discover_rsp *pdu = frame->data;
print_field("MTU/MPS size: %d", btohs(pdu->size));
print_field("Extended feature mask: 0x%4.4x", btohs(pdu->features));
print_controller_list(frame->data + 4, frame->size - 4);
}
static void amp_change_notify(const struct l2cap_frame *frame)
{
print_controller_list(frame->data, frame->size);
}
static void amp_change_response(const struct l2cap_frame *frame)
{
}
static void amp_get_info_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_amp_get_info_req *pdu = frame->data;
print_field("Controller ID: %d", pdu->ctrlid);
}
static void amp_get_info_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_amp_get_info_rsp *pdu = frame->data;
const char *str;
print_field("Controller ID: %d", pdu->ctrlid);
switch (pdu->status) {
case 0x00:
str = "Success";
break;
case 0x01:
str = "Invalid Controller ID";
break;
default:
str = "Reserved";
break;
}
print_field("Status: %s (0x%2.2x)", str, pdu->status);
print_field("Total bandwidth: %d kbps", btohl(pdu->total_bw));
print_field("Max guaranteed bandwidth: %d kbps", btohl(pdu->max_bw));
print_field("Min latency: %d", btohl(pdu->min_latency));
print_field("PAL capabilities: 0x%4.4x", btohs(pdu->pal_cap));
print_field("Max ASSOC length: %d", btohs(pdu->max_assoc_len));
}
static void amp_get_assoc_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_amp_get_assoc_req *pdu = frame->data;
print_field("Controller ID: %d", pdu->ctrlid);
}
static void amp_get_assoc_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_amp_get_assoc_rsp *pdu = frame->data;
const char *str;
print_field("Controller ID: %d", pdu->ctrlid);
switch (pdu->status) {
case 0x00:
str = "Success";
break;
case 0x01:
str = "Invalid Controller ID";
break;
default:
str = "Reserved";
break;
}
print_field("Status: %s (0x%2.2x)", str, pdu->status);
packet_hexdump(frame->data + 2, frame->size - 2);
}
static void amp_create_phy_link_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_amp_create_phy_link_req *pdu = frame->data;
print_field("Local controller ID: %d", pdu->local_ctrlid);
print_field("Remote controller ID: %d", pdu->remote_ctrlid);
packet_hexdump(frame->data + 2, frame->size - 2);
}
static void amp_create_phy_link_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_amp_create_phy_link_rsp *pdu = frame->data;
const char *str;
print_field("Local controller ID: %d", pdu->local_ctrlid);
print_field("Remote controller ID: %d", pdu->remote_ctrlid);
switch (pdu->status) {
case 0x00:
str = "Success";
break;
case 0x01:
str = "Invalid Controller ID";
break;
case 0x02:
str = "Failed - Unable to start link creation";
break;
case 0x03:
str = "Failed - Collision occurred";
break;
case 0x04:
str = "Failed - Disconnected link packet received";
break;
case 0x05:
str = "Failed - Link already exists";
break;
case 0x06:
str = "Failed - Security violation";
break;
default:
str = "Reserved";
break;
}
print_field("Status: %s (0x%2.2x)", str, pdu->status);
}
static void amp_disconn_phy_link_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_amp_disconn_phy_link_req *pdu = frame->data;
print_field("Local controller ID: %d", pdu->local_ctrlid);
print_field("Remote controller ID: %d", pdu->remote_ctrlid);
}
static void amp_disconn_phy_link_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_amp_disconn_phy_link_rsp *pdu = frame->data;
const char *str;
print_field("Local controller ID: %d", pdu->local_ctrlid);
print_field("Remote controller ID: %d", pdu->remote_ctrlid);
switch (pdu->status) {
case 0x00:
str = "Success";
break;
case 0x01:
str = "Invalid Controller ID";
break;
case 0x02:
str = "Failed - No link exists";
break;
default:
str = "Reserved";
break;
}
print_field("Status: %s (0x%2.2x)", str, pdu->status);
}
2012-11-03 18:36:37 +08:00
struct amp_opcode_data {
uint8_t opcode;
const char *str;
void (*func) (const struct l2cap_frame *frame);
2012-11-03 19:11:54 +08:00
uint16_t size;
2012-11-03 18:36:37 +08:00
bool fixed;
};
static const struct amp_opcode_data amp_opcode_table[] = {
{ 0x01, "Command Reject",
amp_cmd_reject, 2, false },
{ 0x02, "Discover Request",
amp_discover_req, 4, true },
{ 0x03, "Discover Response",
amp_discover_rsp, 7, false },
{ 0x04, "Change Notify",
amp_change_notify, 3, false },
{ 0x05, "Change Response",
amp_change_response, 0, true },
{ 0x06, "Get Info Request",
amp_get_info_req, 1, true },
{ 0x07, "Get Info Response",
amp_get_info_rsp, 18, true },
{ 0x08, "Get Assoc Request",
amp_get_assoc_req, 1, true },
{ 0x09, "Get Assoc Response",
amp_get_assoc_rsp, 2, false },
{ 0x0a, "Create Physical Link Request",
amp_create_phy_link_req, 2, false },
{ 0x0b, "Create Physical Link Response",
amp_create_phy_link_rsp, 3, true },
{ 0x0c, "Disconnect Physical Link Request",
amp_disconn_phy_link_req, 2, true },
{ 0x0d, "Disconnect Physical Link Response",
amp_disconn_phy_link_rsp, 3, true },
2012-11-03 18:36:37 +08:00
{ },
};
static void amp_packet(uint16_t index, bool in, uint16_t handle,
uint16_t cid, const void *data, uint16_t size)
2012-11-03 18:36:37 +08:00
{
struct l2cap_frame frame;
2012-11-03 18:36:37 +08:00
uint16_t control, fcs, len;
uint8_t opcode, ident;
const struct amp_opcode_data *opcode_data = NULL;
const char *opcode_color, *opcode_str;
2012-11-03 18:36:37 +08:00
int i;
if (size < 4) {
print_text(COLOR_ERROR, "malformed info frame packet");
2012-11-03 18:36:37 +08:00
packet_hexdump(data, size);
return;
}
control = bt_get_le16(data);
fcs = bt_get_le16(data + size - 2);
print_indent(6, COLOR_CYAN, "Channel:", "", COLOR_OFF,
" %d dlen %d control 0x%4.4x fcs 0x%4.4x",
2012-11-03 18:36:37 +08:00
3, size, control, fcs);
if (control & 0x01)
return;
if (size < 8) {
print_text(COLOR_ERROR, "malformed manager packet");
2012-11-03 18:36:37 +08:00
packet_hexdump(data, size);
return;
}
opcode = *((const uint8_t *) (data + 2));
ident = *((const uint8_t *) (data + 3));
len = bt_get_le16(data + 4);
if (len != size - 8) {
print_text(COLOR_ERROR, "invalid manager packet size");
2012-11-03 18:36:37 +08:00
packet_hexdump(data + 2, size - 4);
return;
}
for (i = 0; amp_opcode_table[i].str; i++) {
if (amp_opcode_table[i].opcode == opcode) {
opcode_data = &amp_opcode_table[i];
break;
}
}
if (opcode_data) {
if (opcode_data->func) {
if (in)
opcode_color = COLOR_MAGENTA;
else
opcode_color = COLOR_BLUE;
} else
opcode_color = COLOR_WHITE_BG;
2012-11-03 18:36:37 +08:00
opcode_str = opcode_data->str;
} else {
opcode_color = COLOR_WHITE_BG;
2012-11-03 18:36:37 +08:00
opcode_str = "Unknown";
}
2012-11-03 18:36:37 +08:00
print_indent(6, opcode_color, "AMP: ", opcode_str, COLOR_OFF,
" (0x%2.2x) ident %d len %d", opcode, ident, len);
2012-11-03 18:36:37 +08:00
if (!opcode_data || !opcode_data->func) {
packet_hexdump(data + 6, size - 8);
return;
}
if (opcode_data->fixed) {
if (len != opcode_data->size) {
print_text(COLOR_ERROR, "invalid size");
packet_hexdump(data + 6, size - 8);
return;
}
} else {
if (len < opcode_data->size) {
print_text(COLOR_ERROR, "too short packet");
packet_hexdump(data + 6, size - 8);
return;
}
}
l2cap_frame_init(&frame, index, in, handle, cid, data + 6, len);
opcode_data->func(&frame);
2012-11-03 18:36:37 +08:00
}
2012-11-17 17:38:24 +08:00
static void print_hex_field(const char *label, const uint8_t *data,
uint8_t len)
{
char str[len * 2 + 1];
uint8_t i;
for (i = 0; i < len; i++)
sprintf(str + (i * 2), "%2.2x", data[i]);
print_field("%s: %s", label, str);
}
static void print_uuid(const char *label, const void *data, uint16_t size)
{
const char *str;
2012-11-17 17:38:24 +08:00
switch (size) {
case 2:
str = uuid16_to_str(bt_get_le16(data));
print_field("%s: %s (0x%4.4x)", label, str, bt_get_le16(data));
2012-11-17 17:38:24 +08:00
break;
default:
packet_hexdump(data, size);
break;
}
}
static void print_handle_range(const char *label, const void *data)
{
print_field("%s: 0x%4.4x-0x%4.4x", label,
bt_get_le16(data), bt_get_le16(data + 2));
}
static void print_data_list(const char *label, uint8_t length,
const void *data, uint16_t size)
{
while (size > length) {
print_handle_range("Handle", data);
print_hex_field(" Data", data + 4, length - 4);
data += length;
size -= length;
}
packet_hexdump(data, size);
}
static const char *att_opcode_to_str(uint8_t opcode);
static void att_error_response(const struct l2cap_frame *frame)
{
const struct bt_l2cap_att_error_response *pdu = frame->data;
const char *str;
switch (pdu->error) {
case 0x01:
str = "Invalid Handle";
break;
case 0x02:
str = "Read Not Permitted";
break;
case 0x03:
str = "Write Not Permitted";
break;
case 0x04:
str = "Invalid PDU";
break;
case 0x05:
str = "Insufficient Authentication";
break;
case 0x06:
str = "Request Not Supported";
break;
case 0x07:
str = "Invalid Offset";
break;
case 0x08:
str = "Insufficient Authorization";
break;
case 0x09:
str = "Prepare Queue Full";
break;
case 0x0a:
str = "Attribute Not Found";
break;
case 0x0b:
str = "Attribute Not Long";
break;
case 0x0c:
str = "Insufficient Encryption Key Size";
break;
case 0x0d:
str = "Invalid Attribute Value Length";
break;
case 0x0e:
str = "Unlikely Error";
break;
case 0x0f:
str = "Insufficient Encryption";
break;
case 0x10:
str = "Unsupported Group Type";
break;
case 0x11:
str = "Insufficient Resources";
break;
default:
str = "Reserved";
break;
}
print_field("%s (0x%2.2x)", att_opcode_to_str(pdu->request),
pdu->request);
print_field("Handle: 0x%4.4x", btohs(pdu->handle));
print_field("Error: %s (0x%2.2x)", str, pdu->error);
}
static void att_exchange_mtu_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_att_exchange_mtu_req *pdu = frame->data;
print_field("Client RX MTU: %d", btohs(pdu->mtu));
}
static void att_exchange_mtu_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_att_exchange_mtu_rsp *pdu = frame->data;
print_field("Server RX MTU: %d", btohs(pdu->mtu));
}
static void att_read_type_req(const struct l2cap_frame *frame)
{
print_handle_range("Handle range", frame->data);
print_uuid("Attribute group type", frame->data + 4, frame->size - 4);
}
static void att_read_type_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_att_read_group_type_rsp *pdu = frame->data;
print_field("Attribute data length: %d", pdu->length);
print_data_list("Attribute data list", pdu->length,
frame->data + 1, frame->size - 1);
}
static void att_read_req(const struct l2cap_frame *frame)
{
const struct bt_l2cap_att_read_req *pdu = frame->data;
print_field("Handle: 0x%4.4x", btohs(pdu->handle));
}
static void att_read_rsp(const struct l2cap_frame *frame)
{
print_hex_field("Value", frame->data, frame->size);
}
2012-11-17 17:38:24 +08:00
static void att_read_group_type_req(const struct l2cap_frame *frame)
{
print_handle_range("Handle range", frame->data);
print_uuid("Attribute group type", frame->data + 4, frame->size - 4);
}
static void att_read_group_type_rsp(const struct l2cap_frame *frame)
{
const struct bt_l2cap_att_read_group_type_rsp *pdu = frame->data;
print_field("Attribute data length: %d", pdu->length);
print_data_list("Attribute data list", pdu->length,
frame->data + 1, frame->size - 1);
}
static void att_handle_value_notify(const struct l2cap_frame *frame)
{
const struct bt_l2cap_att_handle_value_notify *pdu = frame->data;
print_field("Handle: 0x%4.4x", btohs(pdu->handle));
print_hex_field(" Data", frame->data + 2, frame->size - 2);
}
static void att_handle_value_ind(const struct l2cap_frame *frame)
{
const struct bt_l2cap_att_handle_value_ind *pdu = frame->data;
print_field("Handle: 0x%4.4x", btohs(pdu->handle));
print_hex_field(" Data", frame->data + 2, frame->size - 2);
}
static void att_handle_value_conf(const struct l2cap_frame *frame)
{
}
2012-11-03 18:07:22 +08:00
struct att_opcode_data {
uint8_t opcode;
const char *str;
void (*func) (const struct l2cap_frame *frame);
2012-11-03 18:07:22 +08:00
uint8_t size;
bool fixed;
};
static const struct att_opcode_data att_opcode_table[] = {
2012-11-17 17:38:24 +08:00
{ 0x01, "Error Response",
att_error_response, 4, true },
{ 0x02, "Exchange MTU Request",
att_exchange_mtu_req, 2, true },
{ 0x03, "Exchange MTU Response",
att_exchange_mtu_rsp, 2, true },
2012-11-03 18:07:22 +08:00
{ 0x04, "Find Information Request" },
{ 0x05, "Find Information Response" },
{ 0x06, "Find By Type Value Request" },
{ 0x07, "Find By Type Value Response" },
2012-11-17 17:38:24 +08:00
{ 0x08, "Read By Type Request",
att_read_type_req, 6, false },
{ 0x09, "Read By Type Response",
att_read_type_rsp, 3, false },
{ 0x0a, "Read Request",
att_read_req, 2, true },
{ 0x0b, "Read Response",
att_read_rsp, 0, false },
2012-11-03 18:07:22 +08:00
{ 0x0c, "Read Blob Request" },
{ 0x0d, "Read Blob Response" },
{ 0x0e, "Read Multiple Request" },
{ 0x0f, "Read Multiple Response" },
2012-11-17 17:38:24 +08:00
{ 0x10, "Read By Group Type Request",
att_read_group_type_req, 6, false },
{ 0x11, "Read By Group Type Response",
att_read_group_type_rsp, 4, false },
2012-11-03 18:07:22 +08:00
{ 0x12, "Write Request" },
{ 0x13, "Write Response" },
{ 0x16, "Prepare Write Request" },
{ 0x17, "Prepare Write Response" },
{ 0x18, "Execute Write Request" },
{ 0x19, "Execute Write Response" },
{ 0x1b, "Handle Value Notification",
att_handle_value_notify, 2, false },
{ 0x1d, "Handle Value Indication",
att_handle_value_ind, 2, false },
{ 0x1e, "Handle Value Confirmation",
att_handle_value_conf, 0, true },
2012-11-03 18:07:22 +08:00
{ 0x52, "Write Command" },
{ 0xd2, "Signed Write Command" },
{ }
};
2012-11-17 17:38:24 +08:00
static const char *att_opcode_to_str(uint8_t opcode)
{
int i;
for (i = 0; att_opcode_table[i].str; i++) {
if (att_opcode_table[i].opcode == opcode)
return att_opcode_table[i].str;
}
return "Unknown";
}
static void att_packet(uint16_t index, bool in, uint16_t handle,
uint16_t cid, const void *data, uint16_t size)
2012-11-03 18:07:22 +08:00
{
struct l2cap_frame frame;
2012-11-03 18:07:22 +08:00
uint8_t opcode = *((const uint8_t *) data);
const struct att_opcode_data *opcode_data = NULL;
const char *opcode_color, *opcode_str;
2012-11-03 18:07:22 +08:00
int i;
if (size < 1) {
print_text(COLOR_ERROR, "malformed attribute packet");
2012-11-03 18:07:22 +08:00
packet_hexdump(data, size);
return;
}
for (i = 0; att_opcode_table[i].str; i++) {
if (att_opcode_table[i].opcode == opcode) {
opcode_data = &att_opcode_table[i];
break;
}
}
if (opcode_data) {
if (opcode_data->func) {
if (in)
opcode_color = COLOR_MAGENTA;
else
opcode_color = COLOR_BLUE;
} else
opcode_color = COLOR_WHITE_BG;
2012-11-03 18:07:22 +08:00
opcode_str = opcode_data->str;
} else {
opcode_color = COLOR_WHITE_BG;
2012-11-03 18:07:22 +08:00
opcode_str = "Unknown";
}
2012-11-03 18:07:22 +08:00
print_indent(6, opcode_color, "ATT: ", opcode_str, COLOR_OFF,
" (0x%2.2x) len %d", opcode, size - 1);
2012-11-03 19:27:23 +08:00
if (!opcode_data || !opcode_data->func) {
packet_hexdump(data + 1, size - 1);
return;
}
if (opcode_data->fixed) {
if (size - 1 != opcode_data->size) {
print_text(COLOR_ERROR, "invalid size");
packet_hexdump(data + 1, size - 1);
return;
}
} else {
if (size - 1 < opcode_data->size) {
print_text(COLOR_ERROR, "too short packet");
packet_hexdump(data + 1, size - 1);
return;
}
}
l2cap_frame_init(&frame, index, in, handle, cid, data + 1, size - 1);
opcode_data->func(&frame);
2012-11-03 19:27:23 +08:00
}
static void print_addr(const uint8_t *addr, uint8_t addr_type)
{
const char *str;
switch (addr_type) {
case 0x00:
print_field("Address: %2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X",
addr[5], addr[4], addr[3],
addr[2], addr[1], addr[0]);
break;
case 0x01:
switch ((addr[5] & 0xc0) >> 6) {
case 0x00:
str = "Non-Resolvable";
break;
case 0x01:
str = "Resolvable";
break;
case 0x03:
str = "Static";
break;
default:
str = "Reserved";
break;
}
print_field("Address: %2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X"
" (%s)", addr[5], addr[4], addr[3],
addr[2], addr[1], addr[0], str);
break;
default:
print_field("Address: %2.2X-%2.2X-%2.2X-%2.2X-%2.2X-%2.2X",
addr[5], addr[4], addr[3],
addr[2], addr[1], addr[0]);
break;
}
}
static void print_addr_type(uint8_t addr_type)
{
const char *str;
switch (addr_type) {
case 0x00:
str = "Public";
break;
case 0x01:
str = "Random";
break;
default:
str = "Reserved";
break;
}
print_field("Address type: %s (0x%2.2x)", str, addr_type);
}
static void print_smp_io_capa(uint8_t io_capa)
{
const char *str;
switch (io_capa) {
case 0x00:
str = "DisplayOnly";
break;
case 0x01:
str = "DisplayYesNo";
break;
case 0x02:
str = "KeyboardOnly";
break;
case 0x03:
str = "NoInputNoOutput";
break;
case 0x04:
str = "KeyboardDisplay";
break;
default:
str = "Reserved";
break;
}
print_field("IO capability: %s (0x%2.2x)", str, io_capa);
}
static void print_smp_oob_data(uint8_t oob_data)
{
const char *str;
switch (oob_data) {
case 0x00:
str = "Authentication data not present";
break;
case 0x01:
str = "Authentication data from remote device present";
break;
default:
str = "Reserved";
break;
}
print_field("OOB data: %s (0x%2.2x)", str, oob_data);
}
static void print_smp_auth_req(uint8_t auth_req)
{
const char *str;
switch (auth_req & 0x03) {
case 0x00:
str = "No bonding";
break;
case 0x01:
str = "Bonding";
break;
default:
str = "Reserved";
break;
}
print_field("Authentication requirement: %s - %s (0x%2.2x)",
str, (auth_req & 0x04) ? "MITM" : "No MITM", auth_req);
}
static void smp_pairing_request(const struct l2cap_frame *frame)
{
const struct bt_l2cap_smp_pairing_request *pdu = frame->data;
print_smp_io_capa(pdu->io_capa);
print_smp_oob_data(pdu->oob_data);
print_smp_auth_req(pdu->auth_req);
print_field("Max encryption key size: %d", pdu->max_key_size);
print_field("Initiator key distribution: 0x%2.2x", pdu->init_key_dist);
print_field("Responder key distribution: 0x%2.2x", pdu->resp_key_dist);
}
static void smp_pairing_response(const struct l2cap_frame *frame)
{
const struct bt_l2cap_smp_pairing_response *pdu = frame->data;
print_smp_io_capa(pdu->io_capa);
print_smp_oob_data(pdu->oob_data);
print_smp_auth_req(pdu->auth_req);
print_field("Max encryption key size: %d", pdu->max_key_size);
print_field("Initiator key distribution: 0x%2.2x", pdu->init_key_dist);
print_field("Responder key distribution: 0x%2.2x", pdu->resp_key_dist);
}
static void smp_pairing_confirm(const struct l2cap_frame *frame)
{
const struct bt_l2cap_smp_pairing_confirm *pdu = frame->data;
print_hex_field("Confim value", pdu->value, 16);
}
static void smp_pairing_random(const struct l2cap_frame *frame)
{
const struct bt_l2cap_smp_pairing_random *pdu = frame->data;
print_hex_field("Random value", pdu->value, 16);
}
static void smp_pairing_failed(const struct l2cap_frame *frame)
{
const struct bt_l2cap_smp_pairing_failed *pdu = frame->data;
const char *str;
switch (pdu->reason) {
case 0x01:
str = "Passkey entry failed";
break;
case 0x02:
str = "OOB not available";
break;
case 0x03:
str = "Authentication requirements";
break;
case 0x04:
str = "Confirm value failed";
break;
case 0x05:
str = "Pairing not supported";
break;
case 0x06:
str = "Encryption key size";
break;
case 0x07:
str = "Command not supported";
break;
case 0x08:
str = "Unspecified reason";
break;
case 0x09:
str = "Repeated attempts";
break;
case 0x0a:
str = "Invalid parameters";
break;
default:
str = "Reserved";
break;
}
print_field("Reason: %s (0x%2.2x)", str, pdu->reason);
}
static void smp_encrypt_info(const struct l2cap_frame *frame)
{
const struct bt_l2cap_smp_encrypt_info *pdu = frame->data;
print_hex_field("Long term key", pdu->ltk, 16);
}
static void smp_master_ident(const struct l2cap_frame *frame)
{
const struct bt_l2cap_smp_master_ident *pdu = frame->data;
print_field("EDIV: 0x%4.4x", btohs(pdu->ediv));
print_field("Rand: 0x%16.16" PRIx64, btohll(pdu->rand));
}
static void smp_ident_info(const struct l2cap_frame *frame)
{
const struct bt_l2cap_smp_ident_info *pdu = frame->data;
print_hex_field("Identity resolving key", pdu->irk, 16);
}
static void smp_ident_addr_info(const struct l2cap_frame *frame)
{
const struct bt_l2cap_smp_ident_addr_info *pdu = frame->data;
print_addr_type(pdu->addr_type);
print_addr(pdu->addr, pdu->addr_type);
}
static void smp_signing_info(const struct l2cap_frame *frame)
{
const struct bt_l2cap_smp_signing_info *pdu = frame->data;
print_hex_field("Signature key", pdu->csrk, 16);
}
static void smp_security_request(const struct l2cap_frame *frame)
{
const struct bt_l2cap_smp_security_request *pdu = frame->data;
print_smp_auth_req(pdu->auth_req);
}
2012-11-03 19:27:23 +08:00
struct smp_opcode_data {
uint8_t opcode;
const char *str;
void (*func) (const struct l2cap_frame *frame);
2012-11-03 19:27:23 +08:00
uint8_t size;
bool fixed;
};
static const struct smp_opcode_data smp_opcode_table[] = {
{ 0x01, "Pairing Request",
smp_pairing_request, 6, true },
{ 0x02, "Pairing Response",
smp_pairing_response, 6, true },
{ 0x03, "Pairing Confirm",
smp_pairing_confirm, 16, true },
{ 0x04, "Pairing Random",
smp_pairing_random, 16, true },
{ 0x05, "Pairing Failed",
smp_pairing_failed, 1, true },
{ 0x06, "Encryption Information",
smp_encrypt_info, 16, true },
{ 0x07, "Master Identification",
smp_master_ident, 10, true },
{ 0x08, "Identity Information",
smp_ident_info, 16, true },
{ 0x09, "Identity Address Information",
smp_ident_addr_info, 7, true },
{ 0x0a, "Signing Information",
smp_signing_info, 16, true },
{ 0x0b, "Security Request",
smp_security_request, 1, true },
2012-11-03 19:27:23 +08:00
{ }
};
static void smp_packet(uint16_t index, bool in, uint16_t handle,
uint16_t cid, const void *data, uint16_t size)
2012-11-03 19:27:23 +08:00
{
struct l2cap_frame frame;
2012-11-03 19:27:23 +08:00
uint8_t opcode = *((const uint8_t *) data);
const struct smp_opcode_data *opcode_data = NULL;
const char *opcode_color, *opcode_str;
2012-11-03 19:27:23 +08:00
int i;
if (size < 1) {
print_text(COLOR_ERROR, "malformed attribute packet");
2012-11-03 19:27:23 +08:00
packet_hexdump(data, size);
return;
}
for (i = 0; smp_opcode_table[i].str; i++) {
if (smp_opcode_table[i].opcode == opcode) {
opcode_data = &smp_opcode_table[i];
break;
}
}
if (opcode_data) {
if (opcode_data->func) {
if (in)
opcode_color = COLOR_MAGENTA;
else
opcode_color = COLOR_BLUE;
} else
opcode_color = COLOR_WHITE_BG;
2012-11-03 19:27:23 +08:00
opcode_str = opcode_data->str;
} else {
opcode_color = COLOR_WHITE_BG;
2012-11-03 19:27:23 +08:00
opcode_str = "Unknown";
}
2012-11-03 19:27:23 +08:00
print_indent(6, opcode_color, "SMP: ", opcode_str, COLOR_OFF,
" (0x%2.2x) len %d", opcode, size - 1);
2012-11-03 18:07:22 +08:00
if (!opcode_data || !opcode_data->func) {
packet_hexdump(data + 1, size - 1);
return;
}
if (opcode_data->fixed) {
if (size - 1 != opcode_data->size) {
print_text(COLOR_ERROR, "invalid size");
packet_hexdump(data + 1, size - 1);
return;
}
} else {
if (size - 1 < opcode_data->size) {
print_text(COLOR_ERROR, "too short packet");
packet_hexdump(data + 1, size - 1);
return;
}
}
l2cap_frame_init(&frame, index, in, handle, cid, data + 1, size - 1);
opcode_data->func(&frame);
2012-11-03 18:07:22 +08:00
}
static void l2cap_frame(uint16_t index, bool in, uint16_t handle,
uint16_t cid, const void *data, uint16_t size)
{
2012-11-16 07:26:51 +08:00
struct l2cap_frame frame;
uint16_t psm, chan;
2012-11-16 08:24:22 +08:00
uint8_t mode;
2012-11-16 07:26:51 +08:00
switch (cid) {
2012-11-03 19:11:54 +08:00
case 0x0001:
case 0x0005:
sig_packet(index, in, handle, cid, data, size);
2012-11-03 19:11:54 +08:00
break;
2012-11-03 18:36:37 +08:00
case 0x0003:
amp_packet(index, in, handle, cid, data, size);
2012-11-03 18:36:37 +08:00
break;
2012-11-03 18:07:22 +08:00
case 0x0004:
att_packet(index, in, handle, cid, data, size);
2012-11-03 18:07:22 +08:00
break;
2012-11-03 19:27:23 +08:00
case 0x0006:
smp_packet(index, in, handle, cid, data, size);
2012-11-03 19:27:23 +08:00
break;
2012-11-03 18:07:22 +08:00
default:
2012-11-16 07:26:51 +08:00
l2cap_frame_init(&frame, index, in, handle, cid, data, size);
psm = get_psm(&frame);
2012-11-16 08:24:22 +08:00
mode = get_mode(&frame);
chan = get_chan(&frame);
2012-11-16 07:26:51 +08:00
2012-11-10 06:54:36 +08:00
print_indent(6, COLOR_CYAN, "Channel:", "", COLOR_OFF,
" %d len %d [PSM %d mode %d] {chan %d}",
cid, size, psm, mode, chan);
switch (psm) {
case 0x0001:
sdp_packet(&frame, chan);
break;
default:
packet_hexdump(data, size);
break;
}
2012-11-03 18:07:22 +08:00
break;
}
}
void l2cap_packet(uint16_t index, bool in, uint16_t handle, uint8_t flags,
const void *data, uint16_t size)
{
const struct bt_l2cap_hdr *hdr = data;
uint16_t len, cid;
if (index > MAX_INDEX - 1) {
print_text(COLOR_ERROR, "controller index too large");
packet_hexdump(data, size);
return;
}
switch (flags) {
case 0x00: /* start of a non-automatically-flushable PDU */
case 0x02: /* start of an automatically-flushable PDU */
if (index_list[index].frag_len) {
print_text(COLOR_ERROR, "unexpected start frame");
packet_hexdump(data, size);
clear_fragment_buffer(index);
return;
}
if (size < sizeof(*hdr)) {
print_text(COLOR_ERROR, "frame too short");
packet_hexdump(data, size);
return;
}
len = btohs(hdr->len);
cid = btohs(hdr->cid);
data += sizeof(*hdr);
size -= sizeof(*hdr);
if (len == size) {
/* complete frame */
l2cap_frame(index, in, handle, cid, data, len);
return;
}
if (size > len) {
print_text(COLOR_ERROR, "frame too long");
packet_hexdump(data, size);
return;
}
index_list[index].frag_buf = malloc(len);
if (!index_list[index].frag_buf) {
print_text(COLOR_ERROR, "failed buffer allocation");
packet_hexdump(data, size);
return;
}
memcpy(index_list[index].frag_buf, data, size);
index_list[index].frag_pos = size;
index_list[index].frag_len = len - size;
index_list[index].frag_cid = cid;
break;
case 0x01: /* continuing fragment */
if (!index_list[index].frag_len) {
print_text(COLOR_ERROR, "unexpected continuation");
packet_hexdump(data, size);
return;
}
if (size > index_list[index].frag_len) {
print_text(COLOR_ERROR, "fragment too long");
packet_hexdump(data, size);
clear_fragment_buffer(index);
return;
}
memcpy(index_list[index].frag_buf +
index_list[index].frag_pos, data, size);
index_list[index].frag_pos += size;
index_list[index].frag_len -= size;
if (!index_list[index].frag_len) {
/* complete frame */
l2cap_frame(index, in, handle,
index_list[index].frag_cid,
monitor: Fix crash in btmon When retrieving SDP records from keyboard btmon crashes (see below). The tid_list in sdp.c is filled up by SDP Service search request, as Service Search responses are treated as invalid and do not free tid_list entries. This is due to passing last fragment instead of complete frame to l2cap_frame(). < ACL Data TX: Handle 11 flags 0x00 dlen 26 [hci0] 24.082133 Channel: 511 len 22 [PSM 1 mode 0] {chan 0} SDP: Service Search Attribute Request (0x06) tid 14 len 17 Search pattern: [len 5] Sequence (6) with 3 bytes [8 extra bits] len 5 UUID (3) with 2 bytes [0 extra bits] len 3 L2CAP (0x0100) Max record count: 65535 Attribute list: [len 7] Sequence (6) with 5 bytes [8 extra bits] len 7 Unsigned Integer (1) with 4 bytes [0 extra bits] len 5 0x0000ffff Continuation state: 2 00 1d .. > HCI Event: Number of Completed Packets (0x13) plen 5 [hci0] 24.085458 Num handles: 1 Handle: 11 Count: 2 > ACL Data RX: Handle 11 flags 0x02 dlen 27 [hci0] 24.102205 > ACL Data RX: Handle 11 flags 0x01 dlen 14 [hci0] 24.103339 Channel: 64 len 37 [PSM 1 mode 0] {chan 0} invalid frame size 23 03 09 02 04 28 01 09 02 05 09 00 02 00 09 04 #....(.......... 6d 09 02 02 09 b3 01 09 02 03 09 64 00 00 00 00 m..........d.... 00 00 00 00 00 ..... < ACL Data TX: Handle 11 flags 0x00 dlen 24 [hci0] 24.170595 Channel: 511 len 20 [PSM 1 mode 0] {chan 0} SDP: Service Search Attribute Request (0x06) tid 15 len 15 Search pattern: [len 5] Sequence (6) with 3 bytes [8 extra bits] len 5 UUID (3) with 2 bytes [0 extra bits] len 3 PnP Information (0x1200) Max record count: 65535 Attribute list: [len 7] Sequence (6) with 5 bytes [8 extra bits] len 7 Unsigned Integer (1) with 4 bytes [0 extra bits] len 5 0x0000ffff Continuation state: 0 > ACL Data RX: Handle 11 flags 0x02 dlen 27 [hci0] 24.192217 > ACL Data RX: Handle 11 flags 0x01 dlen 25 [hci0] 24.193327 Channel: 64 len 48 [PSM 1 mode 0] {chan 0} invalid frame size 01 35 03 19 12 00 09 00 04 35 0d 35 06 19 01 00 .5.......5.5.... 09 00 01 35 03 19 02 00 32 09 00 64 00 00 00 00 ...5....2..d.... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ < ACL Data TX: Handle 11 flags 0x00 dlen 26 [hci0] 24.205765 Channel: 511 len 22 [PSM 1 mode 0] {chan 0} SDP: Service Search Attribute Request (0x06) tid 16 len 17 Search pattern: [len 5] Sequence (6) with 3 bytes [8 extra bits] len 5 UUID (3) with 2 bytes [0 extra bits] len 3 PnP Information (0x1200) Max record count: 65535 Attribute list: [len 7] Sequence (6) with 5 bytes [8 extra bits] len 7 Unsigned Integer (1) with 4 bytes [0 extra bits] len 5 0x0000ffff Program received signal SIGSEGV, Segmentation fault. __memcpy_ssse3_back () at ../sysdeps/x86_64/multiarch/memcpy-ssse3-back.S:2184 2184 ../sysdeps/x86_64/multiarch/memcpy-ssse3-back.S: No such file or directory. (gdb) bt #0 __memcpy_ssse3_back () at ../sysdeps/x86_64/multiarch/memcpy-ssse3-back.S:2184 #1 0x0000000000418607 in search_attr_req (frame=0x7fffffffdff0, tid=0x0) at /usr/include/x86_64-linux-gnu/bits/string3.h:52 #2 0x0000000000418ebb in sdp_packet (frame=0x7fffffffe0e0, channel=0) at monitor/sdp.c:743 #3 0x000000000041547e in l2cap_frame (index=<optimised out>, in=<optimised out>, handle=<optimised out>, cid=<optimised out>, data=0x6370d0, size=22) at monitor/l2cap.c:2161 #4 0x000000000040f8c4 in packet_hci_acldata (tv=0x7fffffffe330, index=0, in=false, data=0x6370cc, size=26) at monitor/packet.c:4812 #5 0x000000000040fd35 in packet_monitor (tv=0x7fffffffe330, index=0, opcode=<optimised out>, data=0x6370c8, size=<optimised out>) at monitor/packet.c:1839 #6 0x0000000000403da2 in data_callback (user_data=0x6370c0, fd=<optimised out>, events=<optimised out>) at monitor/control.c:599 #7 data_callback (fd=<optimised out>, events=<optimised out>, user_data=0x6370c0) at monitor/control.c:541 #8 0x00000000004021c4 in mainloop_run () at monitor/mainloop.c:142 #9 0x0000000000401c7c in main (argc=1, argv=0x7fffffffe5f8) at monitor/main.c:154
2012-12-19 21:20:01 +08:00
index_list[index].frag_buf,
index_list[index].frag_pos);
clear_fragment_buffer(index);
return;
}
break;
case 0x03: /* complete automatically-flushable PDU */
if (index_list[index].frag_len) {
print_text(COLOR_ERROR, "unexpected complete frame");
packet_hexdump(data, size);
clear_fragment_buffer(index);
return;
}
if (size < sizeof(*hdr)) {
print_text(COLOR_ERROR, "frame too short");
packet_hexdump(data, size);
return;
}
len = btohs(hdr->len);
cid = btohs(hdr->cid);
data += sizeof(*hdr);
size -= sizeof(*hdr);
if (len != size) {
print_text(COLOR_ERROR, "wrong frame size");
packet_hexdump(data, size);
return;
}
/* complete frame */
l2cap_frame(index, in, handle, cid, data, len);
break;
default:
print_text(COLOR_ERROR, "invalid packet flags (0x%2.2x)",
flags);
packet_hexdump(data, size);
return;
}
}