mirror of
https://git.kernel.org/pub/scm/bluetooth/bluez.git
synced 2024-11-29 07:04:19 +08:00
78889501f8
Avoid using C++ style pointer declarations like "char* ptr", as most BlueZ code uses "char *ptr".
1561 lines
32 KiB
C
1561 lines
32 KiB
C
/*
|
|
*
|
|
* BlueZ - Bluetooth protocol stack for Linux
|
|
*
|
|
* Copyright (C) 2000-2001 Qualcomm Incorporated
|
|
* Copyright (C) 2002-2003 Maxim Krasnyansky <maxk@qualcomm.com>
|
|
* Copyright (C) 2002-2010 Marcel Holtmann <marcel@holtmann.org>
|
|
*
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <errno.h>
|
|
#include <ctype.h>
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <getopt.h>
|
|
#include <syslog.h>
|
|
#include <signal.h>
|
|
#include <sys/time.h>
|
|
#include <sys/poll.h>
|
|
#include <sys/ioctl.h>
|
|
#include <sys/socket.h>
|
|
|
|
#include <bluetooth/bluetooth.h>
|
|
#include <bluetooth/hci.h>
|
|
#include <bluetooth/hci_lib.h>
|
|
#include <bluetooth/l2cap.h>
|
|
|
|
#define NIBBLE_TO_ASCII(c) ((c) < 0x0a ? (c) + 0x30 : (c) + 0x57)
|
|
|
|
/* Test modes */
|
|
enum {
|
|
SEND,
|
|
RECV,
|
|
RECONNECT,
|
|
MULTY,
|
|
DUMP,
|
|
CONNECT,
|
|
CRECV,
|
|
LSEND,
|
|
SENDDUMP,
|
|
LSENDDUMP,
|
|
LSENDRECV,
|
|
CSENDRECV,
|
|
INFOREQ,
|
|
PAIRING,
|
|
};
|
|
|
|
static unsigned char *buf;
|
|
|
|
/* Default mtu */
|
|
static int imtu = 672;
|
|
static int omtu = 0;
|
|
|
|
/* Default FCS option */
|
|
static int fcs = 0x01;
|
|
|
|
/* Default Transmission Window */
|
|
static int txwin_size = 63;
|
|
|
|
/* Default Max Transmission */
|
|
static int max_transmit = 3;
|
|
|
|
/* Default data size */
|
|
static long data_size = -1;
|
|
static long buffer_size = 2048;
|
|
|
|
/* Default addr and psm and cid */
|
|
static bdaddr_t bdaddr;
|
|
static unsigned short psm = 0x1011;
|
|
static unsigned short cid = 0;
|
|
|
|
/* Default number of frames to send (-1 = infinite) */
|
|
static int num_frames = -1;
|
|
|
|
/* Default number of consecutive frames before the delay */
|
|
static int count = 1;
|
|
|
|
/* Default delay after sending count number of frames */
|
|
static unsigned long send_delay = 0;
|
|
|
|
/* Default delay before receiving */
|
|
static unsigned long recv_delay = 0;
|
|
|
|
static char *filename = NULL;
|
|
|
|
static int rfcmode = 0;
|
|
static int master = 0;
|
|
static int auth = 0;
|
|
static int encrypt = 0;
|
|
static int secure = 0;
|
|
static int socktype = SOCK_SEQPACKET;
|
|
static int linger = 0;
|
|
static int reliable = 0;
|
|
static int timestamp = 0;
|
|
static int defer_setup = 0;
|
|
static int priority = -1;
|
|
static int rcvbuf = 0;
|
|
static int chan_policy = -1;
|
|
static int bdaddr_type = 0;
|
|
|
|
struct lookup_table {
|
|
char *name;
|
|
int flag;
|
|
};
|
|
|
|
static struct lookup_table l2cap_modes[] = {
|
|
{ "basic", L2CAP_MODE_BASIC },
|
|
/* Not implemented
|
|
{ "flowctl", L2CAP_MODE_FLOWCTL },
|
|
{ "retrans", L2CAP_MODE_RETRANS },
|
|
*/
|
|
{ "ertm", L2CAP_MODE_ERTM },
|
|
{ "streaming", L2CAP_MODE_STREAMING },
|
|
{ 0 }
|
|
};
|
|
|
|
static struct lookup_table chan_policies[] = {
|
|
{ "bredr", BT_CHANNEL_POLICY_BREDR_ONLY },
|
|
{ "bredr_pref", BT_CHANNEL_POLICY_BREDR_PREFERRED },
|
|
{ "amp_pref", BT_CHANNEL_POLICY_AMP_PREFERRED },
|
|
{ NULL, 0 },
|
|
};
|
|
|
|
static struct lookup_table bdaddr_types[] = {
|
|
{ "bredr", BDADDR_BREDR },
|
|
{ "le_public", BDADDR_LE_PUBLIC },
|
|
{ "le_random", BDADDR_LE_RANDOM },
|
|
{ NULL, 0 },
|
|
};
|
|
|
|
static int get_lookup_flag(struct lookup_table *table, char *name)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; table[i].name; i++)
|
|
if (!strcasecmp(table[i].name, name))
|
|
return table[i].flag;
|
|
|
|
return -1;
|
|
}
|
|
|
|
static void print_lookup_values(struct lookup_table *table, char *header)
|
|
{
|
|
int i;
|
|
|
|
printf("%s\n", header);
|
|
|
|
for (i = 0; table[i].name; i++)
|
|
printf("\t%s\n", table[i].name);
|
|
}
|
|
|
|
static float tv2fl(struct timeval tv)
|
|
{
|
|
return (float)tv.tv_sec + (float)(tv.tv_usec/1000000.0);
|
|
}
|
|
|
|
static char *ltoh(unsigned long c, char *s)
|
|
{
|
|
int c1;
|
|
|
|
c1 = (c >> 28) & 0x0f;
|
|
*(s++) = NIBBLE_TO_ASCII (c1);
|
|
c1 = (c >> 24) & 0x0f;
|
|
*(s++) = NIBBLE_TO_ASCII (c1);
|
|
c1 = (c >> 20) & 0x0f;
|
|
*(s++) = NIBBLE_TO_ASCII (c1);
|
|
c1 = (c >> 16) & 0x0f;
|
|
*(s++) = NIBBLE_TO_ASCII (c1);
|
|
c1 = (c >> 12) & 0x0f;
|
|
*(s++) = NIBBLE_TO_ASCII (c1);
|
|
c1 = (c >> 8) & 0x0f;
|
|
*(s++) = NIBBLE_TO_ASCII (c1);
|
|
c1 = (c >> 4) & 0x0f;
|
|
*(s++) = NIBBLE_TO_ASCII (c1);
|
|
c1 = c & 0x0f;
|
|
*(s++) = NIBBLE_TO_ASCII (c1);
|
|
*s = 0;
|
|
return s;
|
|
}
|
|
|
|
static char *ctoh(char c, char *s)
|
|
{
|
|
char c1;
|
|
|
|
c1 = (c >> 4) & 0x0f;
|
|
*(s++) = NIBBLE_TO_ASCII (c1);
|
|
c1 = c & 0x0f;
|
|
*(s++) = NIBBLE_TO_ASCII (c1);
|
|
*s = 0;
|
|
return s;
|
|
}
|
|
|
|
static void hexdump(unsigned char *s, unsigned long l)
|
|
{
|
|
char bfr[80];
|
|
char *pb;
|
|
unsigned long i, n = 0;
|
|
|
|
if (l == 0)
|
|
return;
|
|
|
|
while (n < l) {
|
|
pb = bfr;
|
|
pb = ltoh (n, pb);
|
|
*(pb++) = ':';
|
|
*(pb++) = ' ';
|
|
for (i = 0; i < 16; i++) {
|
|
if (n + i >= l) {
|
|
*(pb++) = ' ';
|
|
*(pb++) = ' ';
|
|
} else
|
|
pb = ctoh (*(s + i), pb);
|
|
*(pb++) = ' ';
|
|
}
|
|
*(pb++) = ' ';
|
|
for (i = 0; i < 16; i++) {
|
|
if (n + i >= l)
|
|
break;
|
|
else
|
|
*(pb++) = (isprint (*(s + i)) ? *(s + i) : '.');
|
|
}
|
|
*pb = 0;
|
|
n += 16;
|
|
s += 16;
|
|
puts(bfr);
|
|
}
|
|
}
|
|
|
|
static int do_connect(char *svr)
|
|
{
|
|
struct sockaddr_l2 addr;
|
|
struct l2cap_options opts;
|
|
struct l2cap_conninfo conn;
|
|
socklen_t optlen;
|
|
int sk, opt;
|
|
|
|
/* Create socket */
|
|
sk = socket(PF_BLUETOOTH, socktype, BTPROTO_L2CAP);
|
|
if (sk < 0) {
|
|
syslog(LOG_ERR, "Can't create socket: %s (%d)",
|
|
strerror(errno), errno);
|
|
return -1;
|
|
}
|
|
|
|
/* Bind to local address */
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.l2_family = AF_BLUETOOTH;
|
|
bacpy(&addr.l2_bdaddr, &bdaddr);
|
|
|
|
if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
|
|
syslog(LOG_ERR, "Can't bind socket: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Get default options */
|
|
memset(&opts, 0, sizeof(opts));
|
|
optlen = sizeof(opts);
|
|
|
|
if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Can't get default L2CAP options: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Set new options */
|
|
opts.omtu = omtu;
|
|
opts.imtu = imtu;
|
|
opts.mode = rfcmode;
|
|
|
|
opts.fcs = fcs;
|
|
opts.txwin_size = txwin_size;
|
|
opts.max_tx = max_transmit;
|
|
|
|
if (setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts)) < 0) {
|
|
syslog(LOG_ERR, "Can't set L2CAP options: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
#if 0
|
|
/* Enable SO_TIMESTAMP */
|
|
if (timestamp) {
|
|
int t = 1;
|
|
|
|
if (setsockopt(sk, SOL_SOCKET, SO_TIMESTAMP, &t, sizeof(t)) < 0) {
|
|
syslog(LOG_ERR, "Can't enable SO_TIMESTAMP: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
if (chan_policy != -1) {
|
|
if (setsockopt(sk, SOL_BLUETOOTH, BT_CHANNEL_POLICY,
|
|
&chan_policy, sizeof(chan_policy)) < 0) {
|
|
syslog(LOG_ERR, "Can't enable chan policy : %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
/* Enable SO_LINGER */
|
|
if (linger) {
|
|
struct linger l = { .l_onoff = 1, .l_linger = linger };
|
|
|
|
if (setsockopt(sk, SOL_SOCKET, SO_LINGER, &l, sizeof(l)) < 0) {
|
|
syslog(LOG_ERR, "Can't enable SO_LINGER: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
/* Set link mode */
|
|
opt = 0;
|
|
if (reliable)
|
|
opt |= L2CAP_LM_RELIABLE;
|
|
if (master)
|
|
opt |= L2CAP_LM_MASTER;
|
|
if (auth)
|
|
opt |= L2CAP_LM_AUTH;
|
|
if (encrypt)
|
|
opt |= L2CAP_LM_ENCRYPT;
|
|
if (secure)
|
|
opt |= L2CAP_LM_SECURE;
|
|
|
|
if (setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) {
|
|
syslog(LOG_ERR, "Can't set L2CAP link mode: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Set receive buffer size */
|
|
if (rcvbuf && setsockopt(sk, SOL_SOCKET, SO_RCVBUF,
|
|
&rcvbuf, sizeof(rcvbuf)) < 0) {
|
|
syslog(LOG_ERR, "Can't set socket rcv buf size: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
optlen = sizeof(rcvbuf);
|
|
if (getsockopt(sk, SOL_SOCKET, SO_RCVBUF, &rcvbuf, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Can't get socket rcv buf size: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Connect to remote device */
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.l2_family = AF_BLUETOOTH;
|
|
str2ba(svr, &addr.l2_bdaddr);
|
|
addr.l2_bdaddr_type = bdaddr_type;
|
|
if (cid)
|
|
addr.l2_cid = htobs(cid);
|
|
else if (psm)
|
|
addr.l2_psm = htobs(psm);
|
|
else
|
|
goto error;
|
|
|
|
if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) {
|
|
syslog(LOG_ERR, "Can't connect: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Get current options */
|
|
memset(&opts, 0, sizeof(opts));
|
|
optlen = sizeof(opts);
|
|
|
|
if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Can't get L2CAP options: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Get connection information */
|
|
memset(&conn, 0, sizeof(conn));
|
|
optlen = sizeof(conn);
|
|
|
|
if (getsockopt(sk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Can't get L2CAP connection information: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
if (priority > 0 && setsockopt(sk, SOL_SOCKET, SO_PRIORITY, &priority,
|
|
sizeof(priority)) < 0) {
|
|
syslog(LOG_ERR, "Can't set socket priority: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
if (getsockopt(sk, SOL_SOCKET, SO_PRIORITY, &opt, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Can't get socket priority: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
syslog(LOG_INFO, "Connected [imtu %d, omtu %d, flush_to %d, "
|
|
"mode %d, handle %d, class 0x%02x%02x%02x, priority %d, rcvbuf %d]",
|
|
opts.imtu, opts.omtu, opts.flush_to, opts.mode, conn.hci_handle,
|
|
conn.dev_class[2], conn.dev_class[1], conn.dev_class[0], opt,
|
|
rcvbuf);
|
|
|
|
omtu = (opts.omtu > buffer_size) ? buffer_size : opts.omtu;
|
|
imtu = (opts.imtu > buffer_size) ? buffer_size : opts.imtu;
|
|
|
|
return sk;
|
|
|
|
error:
|
|
close(sk);
|
|
return -1;
|
|
}
|
|
|
|
static void do_listen(void (*handler)(int sk))
|
|
{
|
|
struct sockaddr_l2 addr;
|
|
struct l2cap_options opts;
|
|
struct l2cap_conninfo conn;
|
|
socklen_t optlen;
|
|
int sk, nsk, opt;
|
|
char ba[18];
|
|
|
|
/* Create socket */
|
|
sk = socket(PF_BLUETOOTH, socktype, BTPROTO_L2CAP);
|
|
if (sk < 0) {
|
|
syslog(LOG_ERR, "Can't create socket: %s (%d)",
|
|
strerror(errno), errno);
|
|
exit(1);
|
|
}
|
|
|
|
/* Bind to local address */
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.l2_family = AF_BLUETOOTH;
|
|
bacpy(&addr.l2_bdaddr, &bdaddr);
|
|
if (cid)
|
|
addr.l2_cid = htobs(cid);
|
|
else if (psm)
|
|
addr.l2_psm = htobs(psm);
|
|
else
|
|
goto error;
|
|
|
|
if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
|
|
syslog(LOG_ERR, "Can't bind socket: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Set link mode */
|
|
opt = 0;
|
|
if (reliable)
|
|
opt |= L2CAP_LM_RELIABLE;
|
|
if (master)
|
|
opt |= L2CAP_LM_MASTER;
|
|
if (auth)
|
|
opt |= L2CAP_LM_AUTH;
|
|
if (encrypt)
|
|
opt |= L2CAP_LM_ENCRYPT;
|
|
if (secure)
|
|
opt |= L2CAP_LM_SECURE;
|
|
|
|
if (opt && setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) {
|
|
syslog(LOG_ERR, "Can't set L2CAP link mode: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Get default options */
|
|
memset(&opts, 0, sizeof(opts));
|
|
optlen = sizeof(opts);
|
|
|
|
if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Can't get default L2CAP options: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Set new options */
|
|
opts.omtu = omtu;
|
|
opts.imtu = imtu;
|
|
if (rfcmode > 0)
|
|
opts.mode = rfcmode;
|
|
|
|
opts.fcs = fcs;
|
|
opts.txwin_size = txwin_size;
|
|
opts.max_tx = max_transmit;
|
|
|
|
if (setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts)) < 0) {
|
|
syslog(LOG_ERR, "Can't set L2CAP options: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
if (socktype == SOCK_DGRAM) {
|
|
handler(sk);
|
|
return;
|
|
}
|
|
|
|
/* Enable deferred setup */
|
|
opt = defer_setup;
|
|
|
|
if (opt && setsockopt(sk, SOL_BLUETOOTH, BT_DEFER_SETUP,
|
|
&opt, sizeof(opt)) < 0) {
|
|
syslog(LOG_ERR, "Can't enable deferred setup : %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
|
|
/* Listen for connections */
|
|
if (listen(sk, 10)) {
|
|
syslog(LOG_ERR, "Can not listen on the socket: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Check for socket address */
|
|
memset(&addr, 0, sizeof(addr));
|
|
optlen = sizeof(addr);
|
|
|
|
if (getsockname(sk, (struct sockaddr *) &addr, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Can't get socket name: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
psm = btohs(addr.l2_psm);
|
|
cid = btohs(addr.l2_cid);
|
|
|
|
syslog(LOG_INFO, "Waiting for connection on psm %d ...", psm);
|
|
|
|
while (1) {
|
|
memset(&addr, 0, sizeof(addr));
|
|
optlen = sizeof(addr);
|
|
|
|
nsk = accept(sk, (struct sockaddr *) &addr, &optlen);
|
|
if (nsk < 0) {
|
|
syslog(LOG_ERR, "Accept failed: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
if (fork()) {
|
|
/* Parent */
|
|
close(nsk);
|
|
continue;
|
|
}
|
|
/* Child */
|
|
close(sk);
|
|
|
|
/* Set receive buffer size */
|
|
if (rcvbuf && setsockopt(nsk, SOL_SOCKET, SO_RCVBUF, &rcvbuf,
|
|
sizeof(rcvbuf)) < 0) {
|
|
syslog(LOG_ERR, "Can't set rcv buf size: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
optlen = sizeof(rcvbuf);
|
|
if (getsockopt(nsk, SOL_SOCKET, SO_RCVBUF, &rcvbuf, &optlen)
|
|
< 0) {
|
|
syslog(LOG_ERR, "Can't get rcv buf size: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Get current options */
|
|
memset(&opts, 0, sizeof(opts));
|
|
optlen = sizeof(opts);
|
|
|
|
if (getsockopt(nsk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Can't get L2CAP options: %s (%d)",
|
|
strerror(errno), errno);
|
|
if (!defer_setup) {
|
|
close(nsk);
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
/* Get connection information */
|
|
memset(&conn, 0, sizeof(conn));
|
|
optlen = sizeof(conn);
|
|
|
|
if (getsockopt(nsk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Can't get L2CAP connection information: %s (%d)",
|
|
strerror(errno), errno);
|
|
if (!defer_setup) {
|
|
close(nsk);
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
if (priority > 0 && setsockopt(sk, SOL_SOCKET, SO_PRIORITY,
|
|
&priority, sizeof(priority)) < 0) {
|
|
syslog(LOG_ERR, "Can't set socket priority: %s (%d)",
|
|
strerror(errno), errno);
|
|
close(nsk);
|
|
goto error;
|
|
}
|
|
|
|
optlen = sizeof(priority);
|
|
if (getsockopt(nsk, SOL_SOCKET, SO_PRIORITY, &opt, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Can't get socket priority: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
|
|
ba2str(&addr.l2_bdaddr, ba);
|
|
syslog(LOG_INFO, "Connect from %s [imtu %d, omtu %d, "
|
|
"flush_to %d, mode %d, handle %d, "
|
|
"class 0x%02x%02x%02x, priority %d, rcvbuf %d]",
|
|
ba, opts.imtu, opts.omtu, opts.flush_to,
|
|
opts.mode, conn.hci_handle, conn.dev_class[2],
|
|
conn.dev_class[1], conn.dev_class[0], opt,
|
|
rcvbuf);
|
|
|
|
omtu = (opts.omtu > buffer_size) ? buffer_size : opts.omtu;
|
|
imtu = (opts.imtu > buffer_size) ? buffer_size : opts.imtu;
|
|
|
|
#if 0
|
|
/* Enable SO_TIMESTAMP */
|
|
if (timestamp) {
|
|
int t = 1;
|
|
|
|
if (setsockopt(nsk, SOL_SOCKET, SO_TIMESTAMP, &t, sizeof(t)) < 0) {
|
|
syslog(LOG_ERR, "Can't enable SO_TIMESTAMP: %s (%d)",
|
|
strerror(errno), errno);
|
|
goto error;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
/* Enable SO_LINGER */
|
|
if (linger) {
|
|
struct linger l = { .l_onoff = 1, .l_linger = linger };
|
|
|
|
if (setsockopt(nsk, SOL_SOCKET, SO_LINGER, &l, sizeof(l)) < 0) {
|
|
syslog(LOG_ERR, "Can't enable SO_LINGER: %s (%d)",
|
|
strerror(errno), errno);
|
|
close(nsk);
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
/* Handle deferred setup */
|
|
if (defer_setup) {
|
|
syslog(LOG_INFO, "Waiting for %d seconds",
|
|
abs(defer_setup) - 1);
|
|
sleep(abs(defer_setup) - 1);
|
|
|
|
if (defer_setup < 0) {
|
|
close(nsk);
|
|
goto error;
|
|
}
|
|
}
|
|
|
|
handler(nsk);
|
|
|
|
syslog(LOG_INFO, "Disconnect: %m");
|
|
exit(0);
|
|
}
|
|
|
|
return;
|
|
|
|
error:
|
|
close(sk);
|
|
exit(1);
|
|
}
|
|
|
|
static void dump_mode(int sk)
|
|
{
|
|
socklen_t optlen;
|
|
int opt, len;
|
|
|
|
if (data_size < 0)
|
|
data_size = imtu;
|
|
|
|
if (defer_setup) {
|
|
len = read(sk, buf, sizeof(buf));
|
|
if (len < 0)
|
|
syslog(LOG_ERR, "Initial read error: %s (%d)",
|
|
strerror(errno), errno);
|
|
else
|
|
syslog(LOG_INFO, "Initial bytes %d", len);
|
|
}
|
|
|
|
syslog(LOG_INFO, "Receiving ...");
|
|
while (1) {
|
|
fd_set rset;
|
|
|
|
FD_ZERO(&rset);
|
|
FD_SET(sk, &rset);
|
|
|
|
if (select(sk + 1, &rset, NULL, NULL, NULL) < 0)
|
|
return;
|
|
|
|
if (!FD_ISSET(sk, &rset))
|
|
continue;
|
|
|
|
len = read(sk, buf, data_size);
|
|
if (len <= 0) {
|
|
if (len < 0) {
|
|
if (reliable && (errno == ECOMM)) {
|
|
syslog(LOG_INFO, "L2CAP Error ECOMM - clearing error and continuing.");
|
|
optlen = sizeof(opt);
|
|
if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Couldn't getsockopt(SO_ERROR): %s (%d)",
|
|
strerror(errno), errno);
|
|
return;
|
|
}
|
|
continue;
|
|
} else {
|
|
syslog(LOG_ERR, "Read error: %s(%d)",
|
|
strerror(errno), errno);
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
|
|
syslog(LOG_INFO, "Recevied %d bytes", len);
|
|
hexdump(buf, len);
|
|
}
|
|
}
|
|
|
|
static void recv_mode(int sk)
|
|
{
|
|
struct timeval tv_beg, tv_end, tv_diff;
|
|
struct pollfd p;
|
|
char ts[30];
|
|
long total;
|
|
uint32_t seq;
|
|
socklen_t optlen;
|
|
int opt, len;
|
|
|
|
if (data_size < 0)
|
|
data_size = imtu;
|
|
|
|
if (defer_setup) {
|
|
len = read(sk, buf, sizeof(buf));
|
|
if (len < 0)
|
|
syslog(LOG_ERR, "Initial read error: %s (%d)",
|
|
strerror(errno), errno);
|
|
else
|
|
syslog(LOG_INFO, "Initial bytes %d", len);
|
|
}
|
|
|
|
if (recv_delay)
|
|
usleep(recv_delay);
|
|
|
|
syslog(LOG_INFO, "Receiving ...");
|
|
|
|
memset(ts, 0, sizeof(ts));
|
|
|
|
p.fd = sk;
|
|
p.events = POLLIN | POLLERR | POLLHUP;
|
|
|
|
seq = 0;
|
|
while (1) {
|
|
gettimeofday(&tv_beg, NULL);
|
|
total = 0;
|
|
while (total < data_size) {
|
|
uint32_t sq;
|
|
uint16_t l;
|
|
int i;
|
|
|
|
p.revents = 0;
|
|
if (poll(&p, 1, -1) <= 0)
|
|
return;
|
|
|
|
if (p.revents & (POLLERR | POLLHUP))
|
|
return;
|
|
|
|
len = recv(sk, buf, data_size, 0);
|
|
if (len < 0) {
|
|
if (reliable && (errno == ECOMM)) {
|
|
syslog(LOG_INFO, "L2CAP Error ECOMM - clearing error and continuing.\n");
|
|
optlen = sizeof(opt);
|
|
if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) {
|
|
syslog(LOG_ERR, "Couldn't getsockopt(SO_ERROR): %s (%d)",
|
|
strerror(errno), errno);
|
|
return;
|
|
}
|
|
continue;
|
|
} else {
|
|
syslog(LOG_ERR, "Read failed: %s (%d)",
|
|
strerror(errno), errno);
|
|
}
|
|
}
|
|
|
|
if (len < 6)
|
|
break;
|
|
|
|
if (timestamp) {
|
|
struct timeval tv;
|
|
|
|
if (ioctl(sk, SIOCGSTAMP, &tv) < 0) {
|
|
timestamp = 0;
|
|
memset(ts, 0, sizeof(ts));
|
|
} else {
|
|
sprintf(ts, "[%ld.%ld] ",
|
|
tv.tv_sec, tv.tv_usec);
|
|
}
|
|
}
|
|
|
|
/* Check sequence */
|
|
sq = btohl(*(uint32_t *) buf);
|
|
if (seq != sq) {
|
|
syslog(LOG_INFO, "seq missmatch: %d -> %d", seq, sq);
|
|
seq = sq;
|
|
}
|
|
seq++;
|
|
|
|
/* Check length */
|
|
l = btohs(*(uint16_t *) (buf + 4));
|
|
if (len != l) {
|
|
syslog(LOG_INFO, "size missmatch: %d -> %d", len, l);
|
|
continue;
|
|
}
|
|
|
|
/* Verify data */
|
|
for (i = 6; i < len; i++) {
|
|
if (buf[i] != 0x7f)
|
|
syslog(LOG_INFO, "data missmatch: byte %d 0x%2.2x", i, buf[i]);
|
|
}
|
|
|
|
total += len;
|
|
}
|
|
gettimeofday(&tv_end, NULL);
|
|
|
|
timersub(&tv_end, &tv_beg, &tv_diff);
|
|
|
|
syslog(LOG_INFO,"%s%ld bytes in %.2f sec, %.2f kB/s", ts, total,
|
|
tv2fl(tv_diff), (float)(total / tv2fl(tv_diff) ) / 1024.0);
|
|
}
|
|
}
|
|
|
|
static void do_send(int sk)
|
|
{
|
|
uint32_t seq;
|
|
int i, fd, len, buflen, size, sent;
|
|
|
|
syslog(LOG_INFO, "Sending ...");
|
|
|
|
if (data_size < 0)
|
|
data_size = omtu;
|
|
|
|
if (filename) {
|
|
fd = open(filename, O_RDONLY);
|
|
if (fd < 0) {
|
|
syslog(LOG_ERR, "Open failed: %s (%d)",
|
|
strerror(errno), errno);
|
|
exit(1);
|
|
}
|
|
|
|
sent = 0;
|
|
size = read(fd, buf, data_size);
|
|
while (size > 0) {
|
|
buflen = (size > omtu) ? omtu : size;
|
|
|
|
len = send(sk, buf + sent, buflen, 0);
|
|
|
|
sent += len;
|
|
size -= len;
|
|
}
|
|
return;
|
|
} else {
|
|
for (i = 6; i < data_size; i++)
|
|
buf[i] = 0x7f;
|
|
}
|
|
|
|
seq = 0;
|
|
while ((num_frames == -1) || (num_frames-- > 0)) {
|
|
*(uint32_t *) buf = htobl(seq);
|
|
*(uint16_t *) (buf + 4) = htobs(data_size);
|
|
seq++;
|
|
|
|
sent = 0;
|
|
size = data_size;
|
|
while (size > 0) {
|
|
buflen = (size > omtu) ? omtu : size;
|
|
|
|
len = send(sk, buf, buflen, 0);
|
|
if (len < 0 || len != buflen) {
|
|
syslog(LOG_ERR, "Send failed: %s (%d)",
|
|
strerror(errno), errno);
|
|
exit(1);
|
|
}
|
|
|
|
sent += len;
|
|
size -= len;
|
|
}
|
|
|
|
if (num_frames && send_delay && count && !(seq % count))
|
|
usleep(send_delay);
|
|
}
|
|
}
|
|
|
|
static void send_mode(int sk)
|
|
{
|
|
do_send(sk);
|
|
|
|
syslog(LOG_INFO, "Closing channel ...");
|
|
if (shutdown(sk, SHUT_RDWR) < 0)
|
|
syslog(LOG_INFO, "Close failed: %m");
|
|
else
|
|
syslog(LOG_INFO, "Done");
|
|
}
|
|
|
|
static void senddump_mode(int sk)
|
|
{
|
|
do_send(sk);
|
|
|
|
dump_mode(sk);
|
|
}
|
|
|
|
static void send_and_recv_mode(int sk)
|
|
{
|
|
int flags;
|
|
|
|
if ((flags = fcntl(sk, F_GETFL, 0)) < 0)
|
|
flags = 0;
|
|
fcntl(sk, F_SETFL, flags | O_NONBLOCK);
|
|
|
|
/* fork for duplex channel */
|
|
if (fork())
|
|
send_mode(sk);
|
|
else
|
|
recv_mode(sk);
|
|
return;
|
|
}
|
|
|
|
static void reconnect_mode(char *svr)
|
|
{
|
|
while (1) {
|
|
int sk = do_connect(svr);
|
|
close(sk);
|
|
}
|
|
}
|
|
|
|
static void connect_mode(char *svr)
|
|
{
|
|
struct pollfd p;
|
|
int sk;
|
|
|
|
if ((sk = do_connect(svr)) < 0)
|
|
exit(1);
|
|
|
|
p.fd = sk;
|
|
p.events = POLLERR | POLLHUP;
|
|
|
|
while (1) {
|
|
p.revents = 0;
|
|
if (poll(&p, 1, 500))
|
|
break;
|
|
}
|
|
|
|
syslog(LOG_INFO, "Disconnected");
|
|
|
|
close(sk);
|
|
}
|
|
|
|
static void multi_connect_mode(int argc, char *argv[])
|
|
{
|
|
int i, n, sk;
|
|
|
|
while (1) {
|
|
for (n = 0; n < argc; n++) {
|
|
for (i = 0; i < count; i++) {
|
|
if (fork())
|
|
continue;
|
|
|
|
/* Child */
|
|
sk = do_connect(argv[n]);
|
|
usleep(500);
|
|
close(sk);
|
|
exit(0);
|
|
}
|
|
}
|
|
sleep(4);
|
|
}
|
|
}
|
|
|
|
static void info_request(char *svr)
|
|
{
|
|
unsigned char buf[48];
|
|
l2cap_cmd_hdr *cmd = (l2cap_cmd_hdr *) buf;
|
|
l2cap_info_req *req = (l2cap_info_req *) (buf + L2CAP_CMD_HDR_SIZE);
|
|
l2cap_info_rsp *rsp = (l2cap_info_rsp *) (buf + L2CAP_CMD_HDR_SIZE);
|
|
uint16_t mtu;
|
|
uint32_t channels, mask = 0x0000;
|
|
struct sockaddr_l2 addr;
|
|
int sk, err;
|
|
|
|
sk = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_L2CAP);
|
|
if (sk < 0) {
|
|
perror("Can't create socket");
|
|
return;
|
|
}
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.l2_family = AF_BLUETOOTH;
|
|
bacpy(&addr.l2_bdaddr, &bdaddr);
|
|
|
|
if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
|
|
perror("Can't bind socket");
|
|
goto failed;
|
|
}
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.l2_family = AF_BLUETOOTH;
|
|
str2ba(svr, &addr.l2_bdaddr);
|
|
addr.l2_bdaddr_type = bdaddr_type;
|
|
|
|
if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) {
|
|
perror("Can't connect socket");
|
|
goto failed;
|
|
}
|
|
|
|
memset(buf, 0, sizeof(buf));
|
|
cmd->code = L2CAP_INFO_REQ;
|
|
cmd->ident = 141;
|
|
cmd->len = htobs(2);
|
|
req->type = htobs(0x0001);
|
|
|
|
if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) {
|
|
perror("Can't send info request");
|
|
goto failed;
|
|
}
|
|
|
|
err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 2, 0);
|
|
if (err < 0) {
|
|
perror("Can't receive info response");
|
|
goto failed;
|
|
}
|
|
|
|
switch (btohs(rsp->result)) {
|
|
case 0x0000:
|
|
memcpy(&mtu, rsp->data, sizeof(mtu));
|
|
printf("Connectionless MTU size is %d\n", btohs(mtu));
|
|
break;
|
|
case 0x0001:
|
|
printf("Connectionless MTU is not supported\n");
|
|
break;
|
|
}
|
|
|
|
memset(buf, 0, sizeof(buf));
|
|
cmd->code = L2CAP_INFO_REQ;
|
|
cmd->ident = 142;
|
|
cmd->len = htobs(2);
|
|
req->type = htobs(0x0002);
|
|
|
|
if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) {
|
|
perror("Can't send info request");
|
|
goto failed;
|
|
}
|
|
|
|
err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 4, 0);
|
|
if (err < 0) {
|
|
perror("Can't receive info response");
|
|
goto failed;
|
|
}
|
|
|
|
switch (btohs(rsp->result)) {
|
|
case 0x0000:
|
|
memcpy(&mask, rsp->data, sizeof(mask));
|
|
printf("Extended feature mask is 0x%04x\n", btohl(mask));
|
|
if (mask & L2CAP_FEAT_FLOWCTL)
|
|
printf(" Flow control mode\n");
|
|
if (mask & L2CAP_FEAT_RETRANS)
|
|
printf(" Retransmission mode\n");
|
|
if (mask & L2CAP_FEAT_BIDIR_QOS)
|
|
printf(" Bi-directional QoS\n");
|
|
if (mask & L2CAP_FEAT_ERTM)
|
|
printf(" Enhanced Retransmission mode\n");
|
|
if (mask & L2CAP_FEAT_STREAMING)
|
|
printf(" Streaming mode\n");
|
|
if (mask & L2CAP_FEAT_FCS)
|
|
printf(" FCS Option\n");
|
|
if (mask & L2CAP_FEAT_EXT_FLOW)
|
|
printf(" Extended Flow Specification\n");
|
|
if (mask & L2CAP_FEAT_FIXED_CHAN)
|
|
printf(" Fixed Channels\n");
|
|
if (mask & L2CAP_FEAT_EXT_WINDOW)
|
|
printf(" Extended Window Size\n");
|
|
if (mask & L2CAP_FEAT_UCD)
|
|
printf(" Unicast Connectionless Data Reception\n");
|
|
break;
|
|
case 0x0001:
|
|
printf("Extended feature mask is not supported\n");
|
|
break;
|
|
}
|
|
|
|
if (!(mask & 0x80))
|
|
goto failed;
|
|
|
|
memset(buf, 0, sizeof(buf));
|
|
cmd->code = L2CAP_INFO_REQ;
|
|
cmd->ident = 143;
|
|
cmd->len = htobs(2);
|
|
req->type = htobs(0x0003);
|
|
|
|
if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) {
|
|
perror("Can't send info request");
|
|
goto failed;
|
|
}
|
|
|
|
err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 8, 0);
|
|
if (err < 0) {
|
|
perror("Can't receive info response");
|
|
goto failed;
|
|
}
|
|
|
|
switch (btohs(rsp->result)) {
|
|
case 0x0000:
|
|
memcpy(&channels, rsp->data, sizeof(channels));
|
|
printf("Fixed channels list is 0x%04x\n", btohl(channels));
|
|
break;
|
|
case 0x0001:
|
|
printf("Fixed channels list is not supported\n");
|
|
break;
|
|
}
|
|
|
|
failed:
|
|
close(sk);
|
|
}
|
|
|
|
static void do_pairing(char *svr)
|
|
{
|
|
struct sockaddr_l2 addr;
|
|
int sk, opt;
|
|
|
|
sk = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_L2CAP);
|
|
if (sk < 0) {
|
|
perror("Can't create socket");
|
|
return;
|
|
}
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.l2_family = AF_BLUETOOTH;
|
|
bacpy(&addr.l2_bdaddr, &bdaddr);
|
|
|
|
if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
|
|
perror("Can't bind socket");
|
|
goto failed;
|
|
}
|
|
|
|
if (secure)
|
|
opt = L2CAP_LM_SECURE;
|
|
else
|
|
opt = L2CAP_LM_ENCRYPT;
|
|
|
|
if (setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) {
|
|
perror("Can't set link mode");
|
|
goto failed;
|
|
}
|
|
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.l2_family = AF_BLUETOOTH;
|
|
str2ba(svr, &addr.l2_bdaddr);
|
|
addr.l2_bdaddr_type = bdaddr_type;
|
|
|
|
if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) {
|
|
perror("Can't connect socket");
|
|
goto failed;
|
|
}
|
|
|
|
printf("Pairing successful\n");
|
|
|
|
failed:
|
|
close(sk);
|
|
}
|
|
|
|
static void usage(void)
|
|
{
|
|
printf("l2test - L2CAP testing\n"
|
|
"Usage:\n");
|
|
printf("\tl2test <mode> [options] [bdaddr]\n");
|
|
printf("Modes:\n"
|
|
"\t-r listen and receive\n"
|
|
"\t-w listen and send\n"
|
|
"\t-d listen and dump incoming data\n"
|
|
"\t-x listen, then send, then dump incoming data\n"
|
|
"\t-t listen, then send and receive at the same time\n"
|
|
"\t-q connect, then send and receive at the same time\n"
|
|
"\t-s connect and send\n"
|
|
"\t-u connect and receive\n"
|
|
"\t-n connect and be silent\n"
|
|
"\t-y connect, then send, then dump incoming data\n"
|
|
"\t-c connect, disconnect, connect, ...\n"
|
|
"\t-m multiple connects\n"
|
|
"\t-p trigger dedicated bonding\n"
|
|
"\t-z information request\n");
|
|
|
|
printf("Options:\n"
|
|
"\t[-b bytes] [-i device] [-P psm] [-J cid]\n"
|
|
"\t[-I imtu] [-O omtu]\n"
|
|
"\t[-L seconds] enable SO_LINGER\n"
|
|
"\t[-W seconds] enable deferred setup\n"
|
|
"\t[-B filename] use data packets from file\n"
|
|
"\t[-N num] send num frames (default = infinite)\n"
|
|
"\t[-C num] send num frames before delay (default = 1)\n"
|
|
"\t[-D milliseconds] delay after sending num frames (default = 0)\n"
|
|
"\t[-K milliseconds] delay before receiving (default = 0)\n"
|
|
"\t[-X mode] l2cap mode (help for list, default = basic)\n"
|
|
"\t[-a policy] chan policy (help for list, default = bredr)\n"
|
|
"\t[-F fcs] use CRC16 check (default = 1)\n"
|
|
"\t[-Q num] Max Transmit value (default = 3)\n"
|
|
"\t[-Z size] Transmission Window size (default = 63)\n"
|
|
"\t[-Y priority] socket priority\n"
|
|
"\t[-H size] Maximum receive buffer size\n"
|
|
"\t[-R] reliable mode\n"
|
|
"\t[-G] use connectionless channel (datagram)\n"
|
|
"\t[-U] use sock stream\n"
|
|
"\t[-A] request authentication\n"
|
|
"\t[-E] request encryption\n"
|
|
"\t[-S] secure connection\n"
|
|
"\t[-M] become master\n"
|
|
"\t[-T] enable timestamps\n"
|
|
"\t[-V type] address type (help for list, default = bredr)\n");
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
struct sigaction sa;
|
|
int opt, sk, mode = RECV, need_addr = 0;
|
|
|
|
bacpy(&bdaddr, BDADDR_ANY);
|
|
|
|
while ((opt = getopt(argc, argv, "rdscuwmntqxyzpb:a:"
|
|
"i:P:I:O:J:B:N:L:W:C:D:X:F:Q:Z:Y:H:K:V:RUGAESMT")) != EOF) {
|
|
switch (opt) {
|
|
case 'r':
|
|
mode = RECV;
|
|
break;
|
|
|
|
case 's':
|
|
mode = SEND;
|
|
need_addr = 1;
|
|
break;
|
|
|
|
case 'w':
|
|
mode = LSEND;
|
|
break;
|
|
|
|
case 'u':
|
|
mode = CRECV;
|
|
need_addr = 1;
|
|
break;
|
|
|
|
case 'd':
|
|
mode = DUMP;
|
|
break;
|
|
|
|
case 'c':
|
|
mode = RECONNECT;
|
|
need_addr = 1;
|
|
break;
|
|
|
|
case 'n':
|
|
mode = CONNECT;
|
|
need_addr = 1;
|
|
break;
|
|
|
|
case 'm':
|
|
mode = MULTY;
|
|
need_addr = 1;
|
|
break;
|
|
|
|
case 't':
|
|
mode = LSENDRECV;
|
|
break;
|
|
|
|
case 'q':
|
|
mode = CSENDRECV;
|
|
need_addr = 1;
|
|
break;
|
|
|
|
case 'x':
|
|
mode = LSENDDUMP;
|
|
break;
|
|
|
|
case 'y':
|
|
mode = SENDDUMP;
|
|
break;
|
|
|
|
case 'z':
|
|
mode = INFOREQ;
|
|
need_addr = 1;
|
|
break;
|
|
|
|
case 'p':
|
|
mode = PAIRING;
|
|
need_addr = 1;
|
|
break;
|
|
|
|
case 'b':
|
|
data_size = atoi(optarg);
|
|
break;
|
|
|
|
case 'i':
|
|
if (!strncasecmp(optarg, "hci", 3))
|
|
hci_devba(atoi(optarg + 3), &bdaddr);
|
|
else
|
|
str2ba(optarg, &bdaddr);
|
|
break;
|
|
|
|
case 'P':
|
|
psm = atoi(optarg);
|
|
break;
|
|
|
|
case 'I':
|
|
imtu = atoi(optarg);
|
|
break;
|
|
|
|
case 'O':
|
|
omtu = atoi(optarg);
|
|
break;
|
|
|
|
case 'L':
|
|
linger = atoi(optarg);
|
|
break;
|
|
|
|
case 'W':
|
|
defer_setup = atoi(optarg);
|
|
break;
|
|
|
|
case 'B':
|
|
filename = strdup(optarg);
|
|
break;
|
|
|
|
case 'N':
|
|
num_frames = atoi(optarg);
|
|
break;
|
|
|
|
case 'C':
|
|
count = atoi(optarg);
|
|
break;
|
|
|
|
case 'D':
|
|
send_delay = atoi(optarg) * 1000;
|
|
break;
|
|
|
|
case 'K':
|
|
recv_delay = atoi(optarg) * 1000;
|
|
break;
|
|
|
|
case 'X':
|
|
rfcmode = get_lookup_flag(l2cap_modes, optarg);
|
|
|
|
if (rfcmode == -1) {
|
|
print_lookup_values(l2cap_modes,
|
|
"List L2CAP modes:");
|
|
exit(1);
|
|
}
|
|
|
|
break;
|
|
|
|
case 'a':
|
|
chan_policy = get_lookup_flag(chan_policies, optarg);
|
|
|
|
if (chan_policy == -1) {
|
|
print_lookup_values(chan_policies,
|
|
"List L2CAP chan policies:");
|
|
exit(1);
|
|
}
|
|
|
|
break;
|
|
|
|
case 'Y':
|
|
priority = atoi(optarg);
|
|
break;
|
|
|
|
case 'F':
|
|
fcs = atoi(optarg);
|
|
break;
|
|
|
|
case 'R':
|
|
reliable = 1;
|
|
break;
|
|
|
|
case 'M':
|
|
master = 1;
|
|
break;
|
|
|
|
case 'A':
|
|
auth = 1;
|
|
break;
|
|
|
|
case 'E':
|
|
encrypt = 1;
|
|
break;
|
|
|
|
case 'S':
|
|
secure = 1;
|
|
break;
|
|
|
|
case 'G':
|
|
socktype = SOCK_DGRAM;
|
|
break;
|
|
|
|
case 'U':
|
|
socktype = SOCK_STREAM;
|
|
break;
|
|
|
|
case 'T':
|
|
timestamp = 1;
|
|
break;
|
|
|
|
case 'Q':
|
|
max_transmit = atoi(optarg);
|
|
break;
|
|
|
|
case 'Z':
|
|
txwin_size = atoi(optarg);
|
|
break;
|
|
|
|
case 'J':
|
|
cid = atoi(optarg);
|
|
break;
|
|
|
|
case 'H':
|
|
rcvbuf = atoi(optarg);
|
|
break;
|
|
|
|
case 'V':
|
|
bdaddr_type = get_lookup_flag(bdaddr_types, optarg);
|
|
|
|
if (bdaddr_type == -1) {
|
|
print_lookup_values(bdaddr_types,
|
|
"List Address types:");
|
|
exit(1);
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
usage();
|
|
exit(1);
|
|
}
|
|
}
|
|
|
|
if (need_addr && !(argc - optind)) {
|
|
usage();
|
|
exit(1);
|
|
}
|
|
|
|
if (data_size < 0)
|
|
buffer_size = (omtu > imtu) ? omtu : imtu;
|
|
else
|
|
buffer_size = data_size;
|
|
|
|
if (!(buf = malloc(buffer_size))) {
|
|
perror("Can't allocate data buffer");
|
|
exit(1);
|
|
}
|
|
|
|
memset(&sa, 0, sizeof(sa));
|
|
sa.sa_handler = SIG_IGN;
|
|
sa.sa_flags = SA_NOCLDSTOP;
|
|
sigaction(SIGCHLD, &sa, NULL);
|
|
|
|
openlog("l2test", LOG_PERROR | LOG_PID, LOG_LOCAL0);
|
|
|
|
switch (mode) {
|
|
case RECV:
|
|
do_listen(recv_mode);
|
|
break;
|
|
|
|
case CRECV:
|
|
sk = do_connect(argv[optind]);
|
|
if (sk < 0)
|
|
exit(1);
|
|
recv_mode(sk);
|
|
break;
|
|
|
|
case DUMP:
|
|
do_listen(dump_mode);
|
|
break;
|
|
|
|
case SEND:
|
|
sk = do_connect(argv[optind]);
|
|
if (sk < 0)
|
|
exit(1);
|
|
send_mode(sk);
|
|
break;
|
|
|
|
case LSEND:
|
|
do_listen(send_mode);
|
|
break;
|
|
|
|
case RECONNECT:
|
|
reconnect_mode(argv[optind]);
|
|
break;
|
|
|
|
case MULTY:
|
|
multi_connect_mode(argc - optind, argv + optind);
|
|
break;
|
|
|
|
case CONNECT:
|
|
connect_mode(argv[optind]);
|
|
break;
|
|
|
|
case SENDDUMP:
|
|
sk = do_connect(argv[optind]);
|
|
if (sk < 0)
|
|
exit(1);
|
|
senddump_mode(sk);
|
|
break;
|
|
|
|
case LSENDDUMP:
|
|
do_listen(senddump_mode);
|
|
break;
|
|
|
|
case LSENDRECV:
|
|
do_listen(send_and_recv_mode);
|
|
break;
|
|
|
|
case CSENDRECV:
|
|
sk = do_connect(argv[optind]);
|
|
if (sk < 0)
|
|
exit(1);
|
|
|
|
send_and_recv_mode(sk);
|
|
break;
|
|
|
|
case INFOREQ:
|
|
info_request(argv[optind]);
|
|
exit(0);
|
|
|
|
case PAIRING:
|
|
do_pairing(argv[optind]);
|
|
exit(0);
|
|
}
|
|
|
|
syslog(LOG_INFO, "Exit");
|
|
|
|
closelog();
|
|
|
|
return 0;
|
|
}
|