mirror of
https://git.kernel.org/pub/scm/bluetooth/bluez.git
synced 2024-12-15 23:14:38 +08:00
b8779d2202
This reverts commit 8a03376544
.
The patch needs to be split up and the gdbus/ changes were bogus
compared to the original commit message.
Conflicts:
Makefile.am
Makefile.obexd
profiles/cyclingspeed/cyclingspeed.c
profiles/heartrate/heartrate.c
src/error.c
2296 lines
50 KiB
C
2296 lines
50 KiB
C
/*
|
|
*
|
|
* BlueZ - Bluetooth protocol stack for Linux
|
|
*
|
|
* Copyright (C) 2011-2012 Intel Corporation
|
|
* Copyright (C) 2004-2010 Marcel Holtmann <marcel@holtmann.org>
|
|
*
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <inttypes.h>
|
|
|
|
#include <bluetooth/bluetooth.h>
|
|
|
|
#include "bt.h"
|
|
#include "packet.h"
|
|
#include "display.h"
|
|
#include "l2cap.h"
|
|
#include "uuid.h"
|
|
#include "sdp.h"
|
|
|
|
#define MAX_CHAN 64
|
|
|
|
struct chan_data {
|
|
uint16_t index;
|
|
uint16_t handle;
|
|
uint16_t scid;
|
|
uint16_t dcid;
|
|
uint16_t psm;
|
|
uint8_t ctrlid;
|
|
uint8_t mode;
|
|
};
|
|
|
|
static struct chan_data chan_list[MAX_CHAN];
|
|
|
|
static void assign_scid(const struct l2cap_frame *frame,
|
|
uint16_t scid, uint16_t psm, uint8_t ctrlid)
|
|
{
|
|
int i, n = -1;
|
|
|
|
for (i = 0; i < MAX_CHAN; i++) {
|
|
if (n < 0 && chan_list[i].handle == 0x0000)
|
|
n = i;
|
|
|
|
if (chan_list[i].index != frame->index)
|
|
continue;
|
|
|
|
if (chan_list[i].handle != frame->handle)
|
|
continue;
|
|
|
|
if (frame->in) {
|
|
if (chan_list[i].dcid == scid) {
|
|
n = i;
|
|
break;
|
|
}
|
|
} else {
|
|
if (chan_list[i].scid == scid) {
|
|
n = i;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (n < 0)
|
|
return;
|
|
|
|
memset(&chan_list[n], 0, sizeof(chan_list[n]));
|
|
chan_list[n].index = frame->index;
|
|
chan_list[n].handle = frame->handle;
|
|
|
|
if (frame->in)
|
|
chan_list[n].dcid = scid;
|
|
else
|
|
chan_list[n].scid = scid;
|
|
|
|
chan_list[n].psm = psm;
|
|
chan_list[n].ctrlid = ctrlid;
|
|
chan_list[n].mode = 0;
|
|
}
|
|
|
|
static void release_scid(const struct l2cap_frame *frame, uint16_t scid)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < MAX_CHAN; i++) {
|
|
if (chan_list[i].index != frame->index)
|
|
continue;
|
|
|
|
if (chan_list[i].handle != frame->handle)
|
|
continue;
|
|
|
|
if (frame->in) {
|
|
if (chan_list[i].scid == scid) {
|
|
chan_list[i].handle = 0;
|
|
break;
|
|
}
|
|
} else {
|
|
if (chan_list[i].dcid == scid) {
|
|
chan_list[i].handle = 0;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static void assign_dcid(const struct l2cap_frame *frame,
|
|
uint16_t dcid, uint16_t scid)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < MAX_CHAN; i++) {
|
|
if (chan_list[i].index != frame->index)
|
|
continue;
|
|
|
|
if (chan_list[i].handle != frame->handle)
|
|
continue;
|
|
|
|
if (frame->in) {
|
|
if (chan_list[i].scid == scid) {
|
|
chan_list[i].dcid = dcid;
|
|
break;
|
|
}
|
|
} else {
|
|
if (chan_list[i].dcid == scid) {
|
|
chan_list[i].scid = dcid;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static void assign_mode(const struct l2cap_frame *frame,
|
|
uint8_t mode, uint16_t dcid)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < MAX_CHAN; i++) {
|
|
if (chan_list[i].index != frame->index)
|
|
continue;
|
|
|
|
if (chan_list[i].handle != frame->handle)
|
|
continue;
|
|
|
|
if (frame->in) {
|
|
if (chan_list[i].scid == dcid) {
|
|
chan_list[i].mode = mode;
|
|
break;
|
|
}
|
|
} else {
|
|
if (chan_list[i].dcid == dcid) {
|
|
chan_list[i].mode = mode;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static uint16_t get_psm(const struct l2cap_frame *frame)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < MAX_CHAN; i++) {
|
|
if (chan_list[i].index != frame->index &&
|
|
chan_list[i].ctrlid == 0)
|
|
continue;
|
|
|
|
if (chan_list[i].handle != frame->handle &&
|
|
chan_list[i].ctrlid != frame->index)
|
|
continue;
|
|
|
|
if (frame->in) {
|
|
if (chan_list[i].scid == frame->cid)
|
|
return chan_list[i].psm;
|
|
} else {
|
|
if (chan_list[i].dcid == frame->cid)
|
|
return chan_list[i].psm;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static uint8_t get_mode(const struct l2cap_frame *frame)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < MAX_CHAN; i++) {
|
|
if (chan_list[i].index != frame->index &&
|
|
chan_list[i].ctrlid == 0)
|
|
continue;
|
|
|
|
if (chan_list[i].handle != frame->handle &&
|
|
chan_list[i].ctrlid != frame->index)
|
|
continue;
|
|
|
|
if (frame->in) {
|
|
if (chan_list[i].scid == frame->cid)
|
|
return chan_list[i].mode;
|
|
} else {
|
|
if (chan_list[i].dcid == frame->cid)
|
|
return chan_list[i].mode;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static uint16_t get_chan(const struct l2cap_frame *frame)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < MAX_CHAN; i++) {
|
|
if (chan_list[i].index != frame->index &&
|
|
chan_list[i].ctrlid == 0)
|
|
continue;
|
|
|
|
if (chan_list[i].handle != frame->handle &&
|
|
chan_list[i].ctrlid != frame->index)
|
|
continue;
|
|
|
|
if (frame->in) {
|
|
if (chan_list[i].scid == frame->cid)
|
|
return i;
|
|
} else {
|
|
if (chan_list[i].dcid == frame->cid)
|
|
return i;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
#define MAX_INDEX 16
|
|
|
|
struct index_data {
|
|
void *frag_buf;
|
|
uint16_t frag_pos;
|
|
uint16_t frag_len;
|
|
uint16_t frag_cid;
|
|
};
|
|
|
|
static struct index_data index_list[MAX_INDEX];
|
|
|
|
static void clear_fragment_buffer(uint16_t index)
|
|
{
|
|
free(index_list[index].frag_buf);
|
|
index_list[index].frag_buf = NULL;
|
|
index_list[index].frag_pos = 0;
|
|
index_list[index].frag_len = 0;
|
|
}
|
|
|
|
static void print_psm(uint16_t psm)
|
|
{
|
|
print_field("PSM: %d (0x%4.4x)", btohs(psm), btohs(psm));
|
|
}
|
|
|
|
static void print_cid(const char *type, uint16_t cid)
|
|
{
|
|
print_field("%s CID: %d", type, btohs(cid));
|
|
}
|
|
|
|
static void print_reject_reason(uint16_t reason)
|
|
{
|
|
const char *str;
|
|
|
|
switch (btohs(reason)) {
|
|
case 0x0000:
|
|
str = "Command not understood";
|
|
break;
|
|
case 0x0001:
|
|
str = "Signaling MTU exceeded";
|
|
break;
|
|
case 0x0002:
|
|
str = "Invalid CID in request";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Reason: %s (0x%4.4x)", str, btohs(reason));
|
|
}
|
|
|
|
static void print_conn_result(uint16_t result)
|
|
{
|
|
const char *str;
|
|
|
|
switch (btohs(result)) {
|
|
case 0x0000:
|
|
str = "Connection successful";
|
|
break;
|
|
case 0x0001:
|
|
str = "Connection pending";
|
|
break;
|
|
case 0x0002:
|
|
str = "Connection refused - PSM not supported";
|
|
break;
|
|
case 0x0003:
|
|
str = "Connection refused - security block";
|
|
break;
|
|
case 0x0004:
|
|
str = "Connection refused - no resources available";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Result: %s (0x%4.4x)", str, btohs(result));
|
|
}
|
|
|
|
static void print_conn_status(uint16_t status)
|
|
{
|
|
const char *str;
|
|
|
|
switch (btohs(status)) {
|
|
case 0x0000:
|
|
str = "No further information available";
|
|
break;
|
|
case 0x0001:
|
|
str = "Authentication pending";
|
|
break;
|
|
case 0x0002:
|
|
str = "Authorization pending";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Status: %s (0x%4.4x)", str, btohs(status));
|
|
}
|
|
|
|
static void print_config_flags(uint16_t flags)
|
|
{
|
|
const char *str;
|
|
|
|
if (btohs(flags) & 0x0001)
|
|
str = " (continuation)";
|
|
else
|
|
str = "";
|
|
|
|
print_field("Flags: 0x%4.4x%s", btohs(flags), str);
|
|
}
|
|
|
|
static void print_config_result(uint16_t result)
|
|
{
|
|
const char *str;
|
|
|
|
switch (btohs(result)) {
|
|
case 0x0000:
|
|
str = "Success";
|
|
break;
|
|
case 0x0001:
|
|
str = "Failure - unacceptable parameters";
|
|
break;
|
|
case 0x0002:
|
|
str = "Failure - rejected";
|
|
break;
|
|
case 0x0003:
|
|
str = "Failure - unknown options";
|
|
break;
|
|
case 0x0004:
|
|
str = "Pending";
|
|
break;
|
|
case 0x0005:
|
|
str = "Failure - flow spec rejected";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Result: %s (0x%4.4x)", str, btohs(result));
|
|
}
|
|
|
|
static struct {
|
|
uint8_t type;
|
|
uint8_t len;
|
|
const char *str;
|
|
} options_table[] = {
|
|
{ 0x01, 2, "Maximum Transmission Unit" },
|
|
{ 0x02, 2, "Flush Timeout" },
|
|
{ 0x03, 22, "Quality of Service" },
|
|
{ 0x04, 9, "Retransmission and Flow Control" },
|
|
{ 0x05, 1, "Frame Check Sequence" },
|
|
{ 0x06, 16, "Extended Flow Specification" },
|
|
{ 0x07, 2, "Extended Window Size" },
|
|
{ }
|
|
};
|
|
|
|
static void print_config_options(const struct l2cap_frame *frame,
|
|
uint8_t offset, uint16_t dcid, bool response)
|
|
{
|
|
const uint8_t *data = frame->data + offset;
|
|
uint16_t size = frame->size - offset;
|
|
uint16_t consumed = 0;
|
|
|
|
while (consumed < size - 2) {
|
|
const char *str = "Unknown";
|
|
uint8_t type = data[consumed];
|
|
uint8_t len = data[consumed + 1];
|
|
uint8_t expect_len = 0;
|
|
int i;
|
|
|
|
for (i = 0; options_table[i].str; i++) {
|
|
if (options_table[i].type == type) {
|
|
str = options_table[i].str;
|
|
expect_len = options_table[i].len;
|
|
break;
|
|
}
|
|
}
|
|
|
|
print_field("Option: %s (0x%2.2x)", str, type);
|
|
|
|
if (len != expect_len) {
|
|
print_text(COLOR_ERROR, "wrong option size (%d != %d)",
|
|
len, expect_len);
|
|
break;
|
|
}
|
|
|
|
switch (type) {
|
|
case 0x01:
|
|
print_field(" MTU: %d",
|
|
bt_get_le16(data + consumed + 2));
|
|
break;
|
|
case 0x02:
|
|
print_field(" Flush timeout: %d",
|
|
bt_get_le16(data + consumed + 2));
|
|
break;
|
|
case 0x03:
|
|
switch (data[consumed + 3]) {
|
|
case 0x00:
|
|
str = "No Traffic";
|
|
break;
|
|
case 0x01:
|
|
str = "Best Effort";
|
|
break;
|
|
case 0x02:
|
|
str = "Guaranteed";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
print_field(" Flags: 0x%2.2x", data[consumed + 2]);
|
|
print_field(" Service type: %s (0x%2.2x)",
|
|
str, data[consumed + 3]);
|
|
print_field(" Token rate: 0x%8.8x",
|
|
bt_get_le32(data + consumed + 4));
|
|
print_field(" Token bucket size: 0x%8.8x",
|
|
bt_get_le32(data + consumed + 8));
|
|
print_field(" Peak bandwidth: 0x%8.8x",
|
|
bt_get_le32(data + consumed + 12));
|
|
print_field(" Latency: 0x%8.8x",
|
|
bt_get_le32(data + consumed + 16));
|
|
print_field(" Delay variation: 0x%8.8x",
|
|
bt_get_le32(data + consumed + 20));
|
|
break;
|
|
case 0x04:
|
|
if (response)
|
|
assign_mode(frame, data[consumed + 2], dcid);
|
|
|
|
switch (data[consumed + 2]) {
|
|
case 0x00:
|
|
str = "Basic";
|
|
break;
|
|
case 0x01:
|
|
str = "Retransmission";
|
|
break;
|
|
case 0x02:
|
|
str = "Flow control";
|
|
break;
|
|
case 0x03:
|
|
str = "Enhanced retransmission";
|
|
break;
|
|
case 0x04:
|
|
str = "Streaming";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
print_field(" Mode: %s (0x%2.2x)",
|
|
str, data[consumed + 2]);
|
|
print_field(" TX window size: %d", data[consumed + 3]);
|
|
print_field(" Max transmit: %d", data[consumed + 4]);
|
|
print_field(" Retransmission timeout: %d",
|
|
bt_get_le16(data + consumed + 5));
|
|
print_field(" Monitor timeout: %d",
|
|
bt_get_le16(data + consumed + 7));
|
|
print_field(" Maximum PDU size: %d",
|
|
bt_get_le16(data + consumed + 9));
|
|
break;
|
|
case 0x05:
|
|
switch (data[consumed + 2]) {
|
|
case 0x00:
|
|
str = "No FCS";
|
|
break;
|
|
case 0x01:
|
|
str = "16-bit FCS";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
print_field(" FCS: %s (0x%2.2d)",
|
|
str, data[consumed + 2]);
|
|
break;
|
|
case 0x06:
|
|
switch (data[consumed + 3]) {
|
|
case 0x00:
|
|
str = "No traffic";
|
|
break;
|
|
case 0x01:
|
|
str = "Best effort";
|
|
break;
|
|
case 0x02:
|
|
str = "Guaranteed";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
print_field(" Identifier: 0x%2.2x",
|
|
data[consumed + 2]);
|
|
print_field(" Service type: %s (0x%2.2x)",
|
|
str, data[consumed + 3]);
|
|
print_field(" Maximum SDU size: 0x%4.4x",
|
|
bt_get_le16(data + consumed + 4));
|
|
print_field(" SDU inter-arrival time: 0x%8.8x",
|
|
bt_get_le32(data + consumed + 6));
|
|
print_field(" Access latency: 0x%8.8x",
|
|
bt_get_le32(data + consumed + 10));
|
|
print_field(" Flush timeout: 0x%8.8x",
|
|
bt_get_le32(data + consumed + 14));
|
|
break;
|
|
case 0x07:
|
|
print_field(" Max window size: %d",
|
|
bt_get_le16(data + consumed + 2));
|
|
break;
|
|
default:
|
|
packet_hexdump(data + consumed + 2, len);
|
|
break;
|
|
}
|
|
|
|
consumed += len + 2;
|
|
}
|
|
|
|
if (consumed < size)
|
|
packet_hexdump(data + consumed, size - consumed);
|
|
}
|
|
|
|
static void print_info_type(uint16_t type)
|
|
{
|
|
const char *str;
|
|
|
|
switch (btohs(type)) {
|
|
case 0x0001:
|
|
str = "Connectionless MTU";
|
|
break;
|
|
case 0x0002:
|
|
str = "Extended features supported";
|
|
break;
|
|
case 0x0003:
|
|
str = "Fixed channels supported";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Type: %s (0x%4.4x)", str, btohs(type));
|
|
}
|
|
|
|
static void print_info_result(uint16_t result)
|
|
{
|
|
const char *str;
|
|
|
|
switch (btohs(result)) {
|
|
case 0x0000:
|
|
str = "Success";
|
|
break;
|
|
case 0x0001:
|
|
str = "Not supported";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Result: %s (0x%4.4x)", str, btohs(result));
|
|
}
|
|
|
|
static struct {
|
|
uint8_t bit;
|
|
const char *str;
|
|
} features_table[] = {
|
|
{ 0, "Flow control mode" },
|
|
{ 1, "Retransmission mode" },
|
|
{ 2, "Bi-directional QoS" },
|
|
{ 3, "Enhanced Retransmission Mode" },
|
|
{ 4, "Streaming Mode" },
|
|
{ 5, "FCS Option" },
|
|
{ 6, "Extended Flow Specification for BR/EDR" },
|
|
{ 7, "Fixed Channels" },
|
|
{ 8, "Extended Window Size" },
|
|
{ 9, "Unicast Connectionless Data Reception" },
|
|
{ 31, "Reserved for feature mask extension" },
|
|
{ }
|
|
};
|
|
|
|
static void print_features(uint32_t features)
|
|
{
|
|
uint32_t mask = features;
|
|
int i;
|
|
|
|
print_field("Features: 0x%8.8x", features);
|
|
|
|
for (i = 0; features_table[i].str; i++) {
|
|
if (features & (1 << features_table[i].bit)) {
|
|
print_field(" %s", features_table[i].str);
|
|
mask &= ~(1 << features_table[i].bit);
|
|
}
|
|
}
|
|
|
|
if (mask)
|
|
print_field(" Unknown features (0x%8.8x)", mask);
|
|
}
|
|
|
|
static struct {
|
|
uint16_t cid;
|
|
const char *str;
|
|
} channels_table[] = {
|
|
{ 0x0000, "Null identifier" },
|
|
{ 0x0001, "L2CAP Signaling (BR/EDR)" },
|
|
{ 0x0002, "Connectionless reception" },
|
|
{ 0x0003, "AMP Manager Protocol" },
|
|
{ 0x0004, "Attribute Protocol" },
|
|
{ 0x0005, "L2CAP Signaling (LE)" },
|
|
{ 0x0006, "Security Manager" },
|
|
{ 0x003f, "AMP Test Manager" },
|
|
{ }
|
|
};
|
|
|
|
static void print_channels(uint64_t channels)
|
|
{
|
|
uint64_t mask = channels;
|
|
int i;
|
|
|
|
print_field("Channels: 0x%16.16" PRIx64, channels);
|
|
|
|
for (i = 0; channels_table[i].str; i++) {
|
|
if (channels & (1 << channels_table[i].cid)) {
|
|
print_field(" %s", channels_table[i].str);
|
|
mask &= ~(1 << channels_table[i].cid);
|
|
}
|
|
}
|
|
|
|
if (mask)
|
|
print_field(" Unknown channels (0x%8.8" PRIx64 ")", mask);
|
|
}
|
|
|
|
static void print_move_result(uint16_t result)
|
|
{
|
|
const char *str;
|
|
|
|
switch (btohs(result)) {
|
|
case 0x0000:
|
|
str = "Move success";
|
|
break;
|
|
case 0x0001:
|
|
str = "Move pending";
|
|
break;
|
|
case 0x0002:
|
|
str = "Move refused - Controller ID not supported";
|
|
break;
|
|
case 0x0003:
|
|
str = "Move refused - new Controller ID is same";
|
|
break;
|
|
case 0x0004:
|
|
str = "Move refused - Configuration not supported";
|
|
break;
|
|
case 0x0005:
|
|
str = "Move refused - Move Channel collision";
|
|
break;
|
|
case 0x0006:
|
|
str = "Move refused - Channel not allowed to be moved";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Result: %s (0x%4.4x)", str, btohs(result));
|
|
}
|
|
|
|
static void print_move_cfm_result(uint16_t result)
|
|
{
|
|
const char *str;
|
|
|
|
switch (btohs(result)) {
|
|
case 0x0000:
|
|
str = "Move success - both sides succeed";
|
|
break;
|
|
case 0x0001:
|
|
str = "Move failure - one or both sides refuse";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Result: %s (0x%4.4x)", str, btohs(result));
|
|
}
|
|
|
|
static void print_conn_param_result(uint16_t result)
|
|
{
|
|
const char *str;
|
|
|
|
switch (btohs(result)) {
|
|
case 0x0000:
|
|
str = "Connection Parameters accepted";
|
|
break;
|
|
case 0x0001:
|
|
str = "Connection Parameters rejected";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Result: %s (0x%4.4x)", str, btohs(result));
|
|
}
|
|
|
|
static void sig_cmd_reject(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_cmd_reject *pdu = frame->data;
|
|
const void *data = frame->data;
|
|
uint16_t size = frame->size;
|
|
uint16_t scid, dcid;
|
|
|
|
print_reject_reason(pdu->reason);
|
|
|
|
data += sizeof(*pdu);
|
|
size -= sizeof(*pdu);
|
|
|
|
switch (btohs(pdu->reason)) {
|
|
case 0x0000:
|
|
if (size != 0) {
|
|
print_text(COLOR_ERROR, "invalid data size");
|
|
packet_hexdump(data, size);
|
|
break;
|
|
}
|
|
break;
|
|
case 0x0001:
|
|
if (size != 2) {
|
|
print_text(COLOR_ERROR, "invalid data size");
|
|
packet_hexdump(data, size);
|
|
break;
|
|
}
|
|
print_field("MTU: %d", bt_get_le16(data));
|
|
break;
|
|
case 0x0002:
|
|
if (size != 4) {
|
|
print_text(COLOR_ERROR, "invalid data size");
|
|
packet_hexdump(data, size);
|
|
break;
|
|
}
|
|
dcid = bt_get_le16(data);
|
|
scid = bt_get_le16(data + 2);
|
|
print_cid("Destination", htobs(dcid));
|
|
print_cid("Source", htobs(scid));
|
|
break;
|
|
default:
|
|
packet_hexdump(data, size);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void sig_conn_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_conn_req *pdu = frame->data;
|
|
|
|
print_psm(pdu->psm);
|
|
print_cid("Source", pdu->scid);
|
|
|
|
assign_scid(frame, btohs(pdu->scid), btohs(pdu->psm), 0);
|
|
}
|
|
|
|
static void sig_conn_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_conn_rsp *pdu = frame->data;
|
|
|
|
print_cid("Destination", pdu->dcid);
|
|
print_cid("Source", pdu->scid);
|
|
print_conn_result(pdu->result);
|
|
print_conn_status(pdu->status);
|
|
|
|
assign_dcid(frame, btohs(pdu->dcid), btohs(pdu->scid));
|
|
}
|
|
|
|
static void sig_config_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_config_rsp *pdu = frame->data;
|
|
|
|
print_cid("Destination", pdu->dcid);
|
|
print_config_flags(pdu->flags);
|
|
print_config_options(frame, 4, btohs(pdu->dcid), false);
|
|
}
|
|
|
|
static void sig_config_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_config_rsp *pdu = frame->data;
|
|
|
|
print_cid("Destination", pdu->dcid);
|
|
print_config_flags(pdu->flags);
|
|
print_config_result(pdu->result);
|
|
print_config_options(frame, 6, btohs(pdu->dcid), true);
|
|
}
|
|
|
|
static void sig_disconn_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_disconn_req *pdu = frame->data;
|
|
|
|
print_cid("Destination", pdu->dcid);
|
|
print_cid("Source", pdu->scid);
|
|
}
|
|
|
|
static void sig_disconn_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_disconn_rsp *pdu = frame->data;
|
|
|
|
print_cid("Destination", pdu->dcid);
|
|
print_cid("Source", pdu->scid);
|
|
|
|
release_scid(frame, btohs(pdu->scid));
|
|
}
|
|
|
|
static void sig_echo_req(const struct l2cap_frame *frame)
|
|
{
|
|
packet_hexdump(frame->data, frame->size);
|
|
}
|
|
|
|
static void sig_echo_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
packet_hexdump(frame->data, frame->size);
|
|
}
|
|
|
|
static void sig_info_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_info_req *pdu = frame->data;
|
|
|
|
print_info_type(pdu->type);
|
|
}
|
|
|
|
static void sig_info_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_info_rsp *pdu = frame->data;
|
|
const void *data = frame->data;
|
|
uint16_t size = frame->size;
|
|
|
|
print_info_type(pdu->type);
|
|
print_info_result(pdu->result);
|
|
|
|
data += sizeof(*pdu);
|
|
size -= sizeof(*pdu);
|
|
|
|
switch (btohs(pdu->type)) {
|
|
case 0x0001:
|
|
if (size != 2) {
|
|
print_text(COLOR_ERROR, "invalid data size");
|
|
packet_hexdump(data, size);
|
|
break;
|
|
}
|
|
print_field("MTU: %d", bt_get_le16(data));
|
|
break;
|
|
case 0x0002:
|
|
if (size != 4) {
|
|
print_text(COLOR_ERROR, "invalid data size");
|
|
packet_hexdump(data, size);
|
|
break;
|
|
}
|
|
print_features(bt_get_le32(data));
|
|
break;
|
|
case 0x0003:
|
|
if (size != 8) {
|
|
print_text(COLOR_ERROR, "invalid data size");
|
|
packet_hexdump(data, size);
|
|
break;
|
|
}
|
|
print_channels(bt_get_le64(data));
|
|
break;
|
|
default:
|
|
packet_hexdump(data, size);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void sig_create_chan_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_create_chan_req *pdu = frame->data;
|
|
|
|
print_psm(pdu->psm);
|
|
print_cid("Source", pdu->scid);
|
|
print_field("Controller ID: %d", pdu->ctrlid);
|
|
|
|
assign_scid(frame, btohs(pdu->scid), btohs(pdu->psm), pdu->ctrlid);
|
|
}
|
|
|
|
static void sig_create_chan_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_create_chan_rsp *pdu = frame->data;
|
|
|
|
print_cid("Destination", pdu->dcid);
|
|
print_cid("Source", pdu->scid);
|
|
print_conn_result(pdu->result);
|
|
print_conn_status(pdu->status);
|
|
|
|
assign_dcid(frame, btohs(pdu->dcid), btohs(pdu->scid));
|
|
}
|
|
|
|
static void sig_move_chan_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_move_chan_req *pdu = frame->data;
|
|
|
|
print_cid("Initiator", pdu->icid);
|
|
print_field("Controller ID: %d", pdu->ctrlid);
|
|
}
|
|
|
|
static void sig_move_chan_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_move_chan_rsp *pdu = frame->data;
|
|
|
|
print_cid("Initiator", pdu->icid);
|
|
print_move_result(pdu->result);
|
|
}
|
|
|
|
static void sig_move_chan_cfm(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_move_chan_cfm *pdu = frame->data;
|
|
|
|
print_cid("Initiator", pdu->icid);
|
|
print_move_cfm_result(pdu->result);
|
|
}
|
|
|
|
static void sig_move_chan_cfm_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_move_chan_cfm_rsp *pdu = frame->data;
|
|
|
|
print_cid("Initiator", pdu->icid);
|
|
}
|
|
|
|
static void sig_conn_param_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_conn_param_req *pdu = frame->data;
|
|
|
|
print_field("Min interval: %d", btohs(pdu->min_interval));
|
|
print_field("Max interval: %d", btohs(pdu->max_interval));
|
|
print_field("Slave latency: %d", btohs(pdu->latency));
|
|
print_field("Timeout multiplier: %d", btohs(pdu->timeout));
|
|
}
|
|
|
|
static void sig_conn_param_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_pdu_conn_param_rsp *pdu = frame->data;
|
|
|
|
print_conn_param_result(pdu->result);
|
|
}
|
|
|
|
struct sig_opcode_data {
|
|
uint8_t opcode;
|
|
const char *str;
|
|
void (*func) (const struct l2cap_frame *frame);
|
|
uint16_t size;
|
|
bool fixed;
|
|
};
|
|
|
|
static const struct sig_opcode_data sig_opcode_table[] = {
|
|
{ 0x01, "Command Reject",
|
|
sig_cmd_reject, 2, false },
|
|
{ 0x02, "Connection Request",
|
|
sig_conn_req, 4, true },
|
|
{ 0x03, "Connection Response",
|
|
sig_conn_rsp, 8, true },
|
|
{ 0x04, "Configure Request",
|
|
sig_config_req, 4, false },
|
|
{ 0x05, "Configure Response",
|
|
sig_config_rsp, 6, false },
|
|
{ 0x06, "Disconnection Request",
|
|
sig_disconn_req, 4, true },
|
|
{ 0x07, "Disconnection Response",
|
|
sig_disconn_rsp, 4, true },
|
|
{ 0x08, "Echo Request",
|
|
sig_echo_req, 0, false },
|
|
{ 0x09, "Echo Response",
|
|
sig_echo_rsp, 0, false },
|
|
{ 0x0a, "Information Request",
|
|
sig_info_req, 2, true },
|
|
{ 0x0b, "Information Response",
|
|
sig_info_rsp, 4, false },
|
|
{ 0x0c, "Create Channel Request",
|
|
sig_create_chan_req, 5, true },
|
|
{ 0x0d, "Create Channel Response",
|
|
sig_create_chan_rsp, 8, true },
|
|
{ 0x0e, "Move Channel Request",
|
|
sig_move_chan_req, 3, true },
|
|
{ 0x0f, "Move Channel Response",
|
|
sig_move_chan_rsp, 4, true },
|
|
{ 0x10, "Move Channel Confirmation",
|
|
sig_move_chan_cfm, 4, true },
|
|
{ 0x11, "Move Channel Confirmation Response",
|
|
sig_move_chan_cfm_rsp, 2, true },
|
|
{ 0x12, "Connection Parameter Update Request",
|
|
sig_conn_param_req, 8, true },
|
|
{ 0x13, "Connection Parameter Update Response",
|
|
sig_conn_param_rsp, 2, true },
|
|
{ },
|
|
};
|
|
|
|
static void sig_packet(uint16_t index, bool in, uint16_t handle,
|
|
uint16_t cid, const void *data, uint16_t size)
|
|
{
|
|
struct l2cap_frame frame;
|
|
|
|
while (size > 0) {
|
|
uint16_t len;
|
|
const struct bt_l2cap_hdr_sig *hdr = data;
|
|
const struct sig_opcode_data *opcode_data = NULL;
|
|
const char *opcode_color, *opcode_str;
|
|
int i;
|
|
|
|
if (size < 4) {
|
|
print_text(COLOR_ERROR, "malformed signal packet");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
len = btohs(hdr->len);
|
|
|
|
data += 4;
|
|
size -= 4;
|
|
|
|
if (size < len) {
|
|
print_text(COLOR_ERROR, "invalid signal packet size");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
for (i = 0; sig_opcode_table[i].str; i++) {
|
|
if (sig_opcode_table[i].opcode == hdr->code) {
|
|
opcode_data = &sig_opcode_table[i];
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (opcode_data) {
|
|
if (opcode_data->func) {
|
|
if (in)
|
|
opcode_color = COLOR_MAGENTA;
|
|
else
|
|
opcode_color = COLOR_BLUE;
|
|
} else
|
|
opcode_color = COLOR_WHITE_BG;
|
|
opcode_str = opcode_data->str;
|
|
} else {
|
|
opcode_color = COLOR_WHITE_BG;
|
|
opcode_str = "Unknown";
|
|
}
|
|
|
|
print_indent(6, opcode_color, "L2CAP: ", opcode_str,
|
|
COLOR_OFF,
|
|
" (0x%2.2x) ident %d len %d",
|
|
hdr->code, hdr->ident, len);
|
|
|
|
if (!opcode_data || !opcode_data->func) {
|
|
packet_hexdump(data, len);
|
|
data += len;
|
|
size -= len;
|
|
return;
|
|
}
|
|
|
|
if (opcode_data->fixed) {
|
|
if (len != opcode_data->size) {
|
|
print_text(COLOR_ERROR, "invalid size");
|
|
packet_hexdump(data, len);
|
|
data += len;
|
|
size -= len;
|
|
continue;
|
|
}
|
|
} else {
|
|
if (len < opcode_data->size) {
|
|
print_text(COLOR_ERROR, "too short packet");
|
|
packet_hexdump(data, size);
|
|
data += len;
|
|
size -= len;
|
|
continue;
|
|
}
|
|
}
|
|
|
|
l2cap_frame_init(&frame, index, in, handle, cid, data, len);
|
|
opcode_data->func(&frame);
|
|
|
|
data += len;
|
|
size -= len;
|
|
}
|
|
|
|
packet_hexdump(data, size);
|
|
}
|
|
|
|
static void print_controller_list(const uint8_t *data, uint16_t size)
|
|
{
|
|
while (size > 2) {
|
|
const char *str;
|
|
|
|
print_field("Controller ID: %d", data[0]);
|
|
|
|
switch (data[1]) {
|
|
case 0x00:
|
|
str = "Primary BR/EDR Controller";
|
|
break;
|
|
case 0x01:
|
|
str = "802.11 AMP Controller";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field(" Type: %s (0x%2.2x)", str, data[1]);
|
|
|
|
switch (data[2]) {
|
|
case 0x00:
|
|
str = "Present";
|
|
break;
|
|
case 0x01:
|
|
str = "Bluetooth only";
|
|
break;
|
|
case 0x02:
|
|
str = "No capacity";
|
|
break;
|
|
case 0x03:
|
|
str = "Low capacity";
|
|
break;
|
|
case 0x04:
|
|
str = "Medium capacity";
|
|
break;
|
|
case 0x05:
|
|
str = "High capacity";
|
|
break;
|
|
case 0x06:
|
|
str = "Full capacity";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field(" Status: %s (0x%2.2x)", str, data[2]);
|
|
|
|
data += 3;
|
|
size -= 3;
|
|
}
|
|
|
|
packet_hexdump(data, size);
|
|
}
|
|
|
|
static void amp_cmd_reject(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_amp_cmd_reject *pdu = frame->data;
|
|
|
|
print_field("Reason: 0x%4.4x", btohs(pdu->reason));
|
|
}
|
|
|
|
static void amp_discover_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_amp_discover_req *pdu = frame->data;
|
|
|
|
print_field("MTU/MPS size: %d", btohs(pdu->size));
|
|
print_field("Extended feature mask: 0x%4.4x", btohs(pdu->features));
|
|
}
|
|
|
|
static void amp_discover_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_amp_discover_rsp *pdu = frame->data;
|
|
|
|
print_field("MTU/MPS size: %d", btohs(pdu->size));
|
|
print_field("Extended feature mask: 0x%4.4x", btohs(pdu->features));
|
|
|
|
print_controller_list(frame->data + 4, frame->size - 4);
|
|
}
|
|
|
|
static void amp_change_notify(const struct l2cap_frame *frame)
|
|
{
|
|
print_controller_list(frame->data, frame->size);
|
|
}
|
|
|
|
static void amp_change_response(const struct l2cap_frame *frame)
|
|
{
|
|
}
|
|
|
|
static void amp_get_info_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_amp_get_info_req *pdu = frame->data;
|
|
|
|
print_field("Controller ID: %d", pdu->ctrlid);
|
|
}
|
|
|
|
static void amp_get_info_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_amp_get_info_rsp *pdu = frame->data;
|
|
const char *str;
|
|
|
|
print_field("Controller ID: %d", pdu->ctrlid);
|
|
|
|
switch (pdu->status) {
|
|
case 0x00:
|
|
str = "Success";
|
|
break;
|
|
case 0x01:
|
|
str = "Invalid Controller ID";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Status: %s (0x%2.2x)", str, pdu->status);
|
|
|
|
print_field("Total bandwidth: %d kbps", btohl(pdu->total_bw));
|
|
print_field("Max guaranteed bandwidth: %d kbps", btohl(pdu->max_bw));
|
|
print_field("Min latency: %d", btohl(pdu->min_latency));
|
|
|
|
print_field("PAL capabilities: 0x%4.4x", btohs(pdu->pal_cap));
|
|
print_field("Max ASSOC length: %d", btohs(pdu->max_assoc_len));
|
|
}
|
|
|
|
static void amp_get_assoc_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_amp_get_assoc_req *pdu = frame->data;
|
|
|
|
print_field("Controller ID: %d", pdu->ctrlid);
|
|
}
|
|
|
|
static void amp_get_assoc_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_amp_get_assoc_rsp *pdu = frame->data;
|
|
const char *str;
|
|
|
|
print_field("Controller ID: %d", pdu->ctrlid);
|
|
|
|
switch (pdu->status) {
|
|
case 0x00:
|
|
str = "Success";
|
|
break;
|
|
case 0x01:
|
|
str = "Invalid Controller ID";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Status: %s (0x%2.2x)", str, pdu->status);
|
|
|
|
packet_hexdump(frame->data + 2, frame->size - 2);
|
|
}
|
|
|
|
static void amp_create_phy_link_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_amp_create_phy_link_req *pdu = frame->data;
|
|
|
|
print_field("Local controller ID: %d", pdu->local_ctrlid);
|
|
print_field("Remote controller ID: %d", pdu->remote_ctrlid);
|
|
|
|
packet_hexdump(frame->data + 2, frame->size - 2);
|
|
}
|
|
|
|
static void amp_create_phy_link_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_amp_create_phy_link_rsp *pdu = frame->data;
|
|
const char *str;
|
|
|
|
print_field("Local controller ID: %d", pdu->local_ctrlid);
|
|
print_field("Remote controller ID: %d", pdu->remote_ctrlid);
|
|
|
|
switch (pdu->status) {
|
|
case 0x00:
|
|
str = "Success";
|
|
break;
|
|
case 0x01:
|
|
str = "Invalid Controller ID";
|
|
break;
|
|
case 0x02:
|
|
str = "Failed - Unable to start link creation";
|
|
break;
|
|
case 0x03:
|
|
str = "Failed - Collision occurred";
|
|
break;
|
|
case 0x04:
|
|
str = "Failed - Disconnected link packet received";
|
|
break;
|
|
case 0x05:
|
|
str = "Failed - Link already exists";
|
|
break;
|
|
case 0x06:
|
|
str = "Failed - Security violation";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Status: %s (0x%2.2x)", str, pdu->status);
|
|
}
|
|
|
|
static void amp_disconn_phy_link_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_amp_disconn_phy_link_req *pdu = frame->data;
|
|
|
|
print_field("Local controller ID: %d", pdu->local_ctrlid);
|
|
print_field("Remote controller ID: %d", pdu->remote_ctrlid);
|
|
}
|
|
|
|
static void amp_disconn_phy_link_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_amp_disconn_phy_link_rsp *pdu = frame->data;
|
|
const char *str;
|
|
|
|
print_field("Local controller ID: %d", pdu->local_ctrlid);
|
|
print_field("Remote controller ID: %d", pdu->remote_ctrlid);
|
|
|
|
switch (pdu->status) {
|
|
case 0x00:
|
|
str = "Success";
|
|
break;
|
|
case 0x01:
|
|
str = "Invalid Controller ID";
|
|
break;
|
|
case 0x02:
|
|
str = "Failed - No link exists";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Status: %s (0x%2.2x)", str, pdu->status);
|
|
}
|
|
|
|
struct amp_opcode_data {
|
|
uint8_t opcode;
|
|
const char *str;
|
|
void (*func) (const struct l2cap_frame *frame);
|
|
uint16_t size;
|
|
bool fixed;
|
|
};
|
|
|
|
static const struct amp_opcode_data amp_opcode_table[] = {
|
|
{ 0x01, "Command Reject",
|
|
amp_cmd_reject, 2, false },
|
|
{ 0x02, "Discover Request",
|
|
amp_discover_req, 4, true },
|
|
{ 0x03, "Discover Response",
|
|
amp_discover_rsp, 7, false },
|
|
{ 0x04, "Change Notify",
|
|
amp_change_notify, 3, false },
|
|
{ 0x05, "Change Response",
|
|
amp_change_response, 0, true },
|
|
{ 0x06, "Get Info Request",
|
|
amp_get_info_req, 1, true },
|
|
{ 0x07, "Get Info Response",
|
|
amp_get_info_rsp, 18, true },
|
|
{ 0x08, "Get Assoc Request",
|
|
amp_get_assoc_req, 1, true },
|
|
{ 0x09, "Get Assoc Response",
|
|
amp_get_assoc_rsp, 2, false },
|
|
{ 0x0a, "Create Physical Link Request",
|
|
amp_create_phy_link_req, 2, false },
|
|
{ 0x0b, "Create Physical Link Response",
|
|
amp_create_phy_link_rsp, 3, true },
|
|
{ 0x0c, "Disconnect Physical Link Request",
|
|
amp_disconn_phy_link_req, 2, true },
|
|
{ 0x0d, "Disconnect Physical Link Response",
|
|
amp_disconn_phy_link_rsp, 3, true },
|
|
{ },
|
|
};
|
|
|
|
static void amp_packet(uint16_t index, bool in, uint16_t handle,
|
|
uint16_t cid, const void *data, uint16_t size)
|
|
{
|
|
struct l2cap_frame frame;
|
|
uint16_t control, fcs, len;
|
|
uint8_t opcode, ident;
|
|
const struct amp_opcode_data *opcode_data = NULL;
|
|
const char *opcode_color, *opcode_str;
|
|
int i;
|
|
|
|
if (size < 4) {
|
|
print_text(COLOR_ERROR, "malformed info frame packet");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
control = bt_get_le16(data);
|
|
fcs = bt_get_le16(data + size - 2);
|
|
|
|
print_indent(6, COLOR_CYAN, "Channel:", "", COLOR_OFF,
|
|
" %d dlen %d control 0x%4.4x fcs 0x%4.4x",
|
|
3, size, control, fcs);
|
|
|
|
if (control & 0x01)
|
|
return;
|
|
|
|
if (size < 8) {
|
|
print_text(COLOR_ERROR, "malformed manager packet");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
opcode = *((const uint8_t *) (data + 2));
|
|
ident = *((const uint8_t *) (data + 3));
|
|
len = bt_get_le16(data + 4);
|
|
|
|
if (len != size - 8) {
|
|
print_text(COLOR_ERROR, "invalid manager packet size");
|
|
packet_hexdump(data + 2, size - 4);
|
|
return;
|
|
}
|
|
|
|
for (i = 0; amp_opcode_table[i].str; i++) {
|
|
if (amp_opcode_table[i].opcode == opcode) {
|
|
opcode_data = &_opcode_table[i];
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (opcode_data) {
|
|
if (opcode_data->func) {
|
|
if (in)
|
|
opcode_color = COLOR_MAGENTA;
|
|
else
|
|
opcode_color = COLOR_BLUE;
|
|
} else
|
|
opcode_color = COLOR_WHITE_BG;
|
|
opcode_str = opcode_data->str;
|
|
} else {
|
|
opcode_color = COLOR_WHITE_BG;
|
|
opcode_str = "Unknown";
|
|
}
|
|
|
|
print_indent(6, opcode_color, "AMP: ", opcode_str, COLOR_OFF,
|
|
" (0x%2.2x) ident %d len %d", opcode, ident, len);
|
|
|
|
if (!opcode_data || !opcode_data->func) {
|
|
packet_hexdump(data + 6, size - 8);
|
|
return;
|
|
}
|
|
|
|
if (opcode_data->fixed) {
|
|
if (len != opcode_data->size) {
|
|
print_text(COLOR_ERROR, "invalid size");
|
|
packet_hexdump(data + 6, size - 8);
|
|
return;
|
|
}
|
|
} else {
|
|
if (len < opcode_data->size) {
|
|
print_text(COLOR_ERROR, "too short packet");
|
|
packet_hexdump(data + 6, size - 8);
|
|
return;
|
|
}
|
|
}
|
|
|
|
l2cap_frame_init(&frame, index, in, handle, cid, data + 6, len);
|
|
opcode_data->func(&frame);
|
|
}
|
|
|
|
static void print_hex_field(const char *label, const uint8_t *data,
|
|
uint8_t len)
|
|
{
|
|
char str[len * 2 + 1];
|
|
uint8_t i;
|
|
|
|
for (i = 0; i < len; i++)
|
|
sprintf(str + (i * 2), "%2.2x", data[i]);
|
|
|
|
print_field("%s: %s", label, str);
|
|
}
|
|
|
|
static void print_uuid(const char *label, const void *data, uint16_t size)
|
|
{
|
|
const char *str;
|
|
|
|
switch (size) {
|
|
case 2:
|
|
str = uuid16_to_str(bt_get_le16(data));
|
|
print_field("%s: %s (0x%4.4x)", label, str, bt_get_le16(data));
|
|
break;
|
|
default:
|
|
packet_hexdump(data, size);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void print_handle_range(const char *label, const void *data)
|
|
{
|
|
print_field("%s: 0x%4.4x-0x%4.4x", label,
|
|
bt_get_le16(data), bt_get_le16(data + 2));
|
|
}
|
|
|
|
static void print_data_list(const char *label, uint8_t length,
|
|
const void *data, uint16_t size)
|
|
{
|
|
while (size > length) {
|
|
print_handle_range("Handle", data);
|
|
print_hex_field(" Data", data + 4, length - 4);
|
|
|
|
data += length;
|
|
size -= length;
|
|
}
|
|
|
|
packet_hexdump(data, size);
|
|
}
|
|
|
|
static const char *att_opcode_to_str(uint8_t opcode);
|
|
|
|
static void att_error_response(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_att_error_response *pdu = frame->data;
|
|
const char *str;
|
|
|
|
switch (pdu->error) {
|
|
case 0x01:
|
|
str = "Invalid Handle";
|
|
break;
|
|
case 0x02:
|
|
str = "Read Not Permitted";
|
|
break;
|
|
case 0x03:
|
|
str = "Write Not Permitted";
|
|
break;
|
|
case 0x04:
|
|
str = "Invalid PDU";
|
|
break;
|
|
case 0x05:
|
|
str = "Insufficient Authentication";
|
|
break;
|
|
case 0x06:
|
|
str = "Request Not Supported";
|
|
break;
|
|
case 0x07:
|
|
str = "Invalid Offset";
|
|
break;
|
|
case 0x08:
|
|
str = "Insufficient Authorization";
|
|
break;
|
|
case 0x09:
|
|
str = "Prepare Queue Full";
|
|
break;
|
|
case 0x0a:
|
|
str = "Attribute Not Found";
|
|
break;
|
|
case 0x0b:
|
|
str = "Attribute Not Long";
|
|
break;
|
|
case 0x0c:
|
|
str = "Insufficient Encryption Key Size";
|
|
break;
|
|
case 0x0d:
|
|
str = "Invalid Attribute Value Length";
|
|
break;
|
|
case 0x0e:
|
|
str = "Unlikely Error";
|
|
break;
|
|
case 0x0f:
|
|
str = "Insufficient Encryption";
|
|
break;
|
|
case 0x10:
|
|
str = "Unsupported Group Type";
|
|
break;
|
|
case 0x11:
|
|
str = "Insufficient Resources";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("%s (0x%2.2x)", att_opcode_to_str(pdu->request),
|
|
pdu->request);
|
|
print_field("Handle: 0x%4.4x", btohs(pdu->handle));
|
|
print_field("Error: %s (0x%2.2x)", str, pdu->error);
|
|
}
|
|
|
|
static void att_exchange_mtu_req(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_att_exchange_mtu_req *pdu = frame->data;
|
|
|
|
print_field("Client RX MTU: %d", btohs(pdu->mtu));
|
|
}
|
|
|
|
static void att_exchange_mtu_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_att_exchange_mtu_rsp *pdu = frame->data;
|
|
|
|
print_field("Server RX MTU: %d", btohs(pdu->mtu));
|
|
}
|
|
|
|
static void att_read_type_req(const struct l2cap_frame *frame)
|
|
{
|
|
print_handle_range("Handle range", frame->data);
|
|
print_uuid("Attribute group type", frame->data + 4, frame->size - 4);
|
|
}
|
|
|
|
static void att_read_type_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_att_read_group_type_rsp *pdu = frame->data;
|
|
|
|
print_field("Attribute data length: %d", pdu->length);
|
|
print_data_list("Attribute data list", pdu->length,
|
|
frame->data + 1, frame->size - 1);
|
|
}
|
|
|
|
static void att_read_group_type_req(const struct l2cap_frame *frame)
|
|
{
|
|
print_handle_range("Handle range", frame->data);
|
|
print_uuid("Attribute group type", frame->data + 4, frame->size - 4);
|
|
}
|
|
|
|
static void att_read_group_type_rsp(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_att_read_group_type_rsp *pdu = frame->data;
|
|
|
|
print_field("Attribute data length: %d", pdu->length);
|
|
print_data_list("Attribute data list", pdu->length,
|
|
frame->data + 1, frame->size - 1);
|
|
}
|
|
|
|
struct att_opcode_data {
|
|
uint8_t opcode;
|
|
const char *str;
|
|
void (*func) (const struct l2cap_frame *frame);
|
|
uint8_t size;
|
|
bool fixed;
|
|
};
|
|
|
|
static const struct att_opcode_data att_opcode_table[] = {
|
|
{ 0x01, "Error Response",
|
|
att_error_response, 4, true },
|
|
{ 0x02, "Exchange MTU Request",
|
|
att_exchange_mtu_req, 2, true },
|
|
{ 0x03, "Exchange MTU Response",
|
|
att_exchange_mtu_rsp, 2, true },
|
|
{ 0x04, "Find Information Request" },
|
|
{ 0x05, "Find Information Response" },
|
|
{ 0x06, "Find By Type Value Request" },
|
|
{ 0x07, "Find By Type Value Response" },
|
|
{ 0x08, "Read By Type Request",
|
|
att_read_type_req, 6, false },
|
|
{ 0x09, "Read By Type Response",
|
|
att_read_type_rsp, 4, false },
|
|
{ 0x0a, "Read Request" },
|
|
{ 0x0b, "Read Response" },
|
|
{ 0x0c, "Read Blob Request" },
|
|
{ 0x0d, "Read Blob Response" },
|
|
{ 0x0e, "Read Multiple Request" },
|
|
{ 0x0f, "Read Multiple Response" },
|
|
{ 0x10, "Read By Group Type Request",
|
|
att_read_group_type_req, 6, false },
|
|
{ 0x11, "Read By Group Type Response",
|
|
att_read_group_type_rsp, 4, false },
|
|
{ 0x12, "Write Request" },
|
|
{ 0x13, "Write Response" },
|
|
{ 0x16, "Prepare Write Request" },
|
|
{ 0x17, "Prepare Write Response" },
|
|
{ 0x18, "Execute Write Request" },
|
|
{ 0x19, "Execute Write Response" },
|
|
{ 0x1b, "Handle Value Notification" },
|
|
{ 0x1d, "Handle Value Indication" },
|
|
{ 0x1e, "Handle Value Confirmation" },
|
|
{ 0x52, "Write Command" },
|
|
{ 0xd2, "Signed Write Command" },
|
|
{ }
|
|
};
|
|
|
|
static const char *att_opcode_to_str(uint8_t opcode)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; att_opcode_table[i].str; i++) {
|
|
if (att_opcode_table[i].opcode == opcode)
|
|
return att_opcode_table[i].str;
|
|
}
|
|
|
|
return "Unknown";
|
|
}
|
|
|
|
static void att_packet(uint16_t index, bool in, uint16_t handle,
|
|
uint16_t cid, const void *data, uint16_t size)
|
|
{
|
|
struct l2cap_frame frame;
|
|
uint8_t opcode = *((const uint8_t *) data);
|
|
const struct att_opcode_data *opcode_data = NULL;
|
|
const char *opcode_color, *opcode_str;
|
|
int i;
|
|
|
|
if (size < 1) {
|
|
print_text(COLOR_ERROR, "malformed attribute packet");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
for (i = 0; att_opcode_table[i].str; i++) {
|
|
if (att_opcode_table[i].opcode == opcode) {
|
|
opcode_data = &att_opcode_table[i];
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (opcode_data) {
|
|
if (opcode_data->func) {
|
|
if (in)
|
|
opcode_color = COLOR_MAGENTA;
|
|
else
|
|
opcode_color = COLOR_BLUE;
|
|
} else
|
|
opcode_color = COLOR_WHITE_BG;
|
|
opcode_str = opcode_data->str;
|
|
} else {
|
|
opcode_color = COLOR_WHITE_BG;
|
|
opcode_str = "Unknown";
|
|
}
|
|
|
|
print_indent(6, opcode_color, "ATT: ", opcode_str, COLOR_OFF,
|
|
" (0x%2.2x) len %d", opcode, size - 1);
|
|
|
|
if (!opcode_data || !opcode_data->func) {
|
|
packet_hexdump(data + 1, size - 1);
|
|
return;
|
|
}
|
|
|
|
if (opcode_data->fixed) {
|
|
if (size - 1 != opcode_data->size) {
|
|
print_text(COLOR_ERROR, "invalid size");
|
|
packet_hexdump(data + 1, size - 1);
|
|
return;
|
|
}
|
|
} else {
|
|
if (size - 1 < opcode_data->size) {
|
|
print_text(COLOR_ERROR, "too short packet");
|
|
packet_hexdump(data + 1, size - 1);
|
|
return;
|
|
}
|
|
}
|
|
|
|
l2cap_frame_init(&frame, index, in, handle, cid, data + 1, size - 1);
|
|
opcode_data->func(&frame);
|
|
}
|
|
|
|
static void print_addr(const uint8_t *addr, uint8_t addr_type)
|
|
{
|
|
const char *str;
|
|
|
|
switch (addr_type) {
|
|
case 0x00:
|
|
print_field("Address: %2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X",
|
|
addr[5], addr[4], addr[3],
|
|
addr[2], addr[1], addr[0]);
|
|
break;
|
|
case 0x01:
|
|
switch ((addr[5] & 0xc0) >> 6) {
|
|
case 0x00:
|
|
str = "Non-Resolvable";
|
|
break;
|
|
case 0x01:
|
|
str = "Resolvable";
|
|
break;
|
|
case 0x03:
|
|
str = "Static";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Address: %2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X"
|
|
" (%s)", addr[5], addr[4], addr[3],
|
|
addr[2], addr[1], addr[0], str);
|
|
break;
|
|
default:
|
|
print_field("Address: %2.2X-%2.2X-%2.2X-%2.2X-%2.2X-%2.2X",
|
|
addr[5], addr[4], addr[3],
|
|
addr[2], addr[1], addr[0]);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void print_addr_type(uint8_t addr_type)
|
|
{
|
|
const char *str;
|
|
|
|
switch (addr_type) {
|
|
case 0x00:
|
|
str = "Public";
|
|
break;
|
|
case 0x01:
|
|
str = "Random";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Address type: %s (0x%2.2x)", str, addr_type);
|
|
}
|
|
|
|
static void print_smp_io_capa(uint8_t io_capa)
|
|
{
|
|
const char *str;
|
|
|
|
switch (io_capa) {
|
|
case 0x00:
|
|
str = "DisplayOnly";
|
|
break;
|
|
case 0x01:
|
|
str = "DisplayYesNo";
|
|
break;
|
|
case 0x02:
|
|
str = "KeyboardOnly";
|
|
break;
|
|
case 0x03:
|
|
str = "NoInputNoOutput";
|
|
break;
|
|
case 0x04:
|
|
str = "KeyboardDisplay";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("IO capability: %s (0x%2.2x)", str, io_capa);
|
|
}
|
|
|
|
static void print_smp_oob_data(uint8_t oob_data)
|
|
{
|
|
const char *str;
|
|
|
|
switch (oob_data) {
|
|
case 0x00:
|
|
str = "Authentication data not present";
|
|
break;
|
|
case 0x01:
|
|
str = "Authentication data from remote device present";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("OOB data: %s (0x%2.2x)", str, oob_data);
|
|
}
|
|
|
|
static void print_smp_auth_req(uint8_t auth_req)
|
|
{
|
|
const char *str;
|
|
|
|
switch (auth_req & 0x03) {
|
|
case 0x00:
|
|
str = "No bonding";
|
|
break;
|
|
case 0x01:
|
|
str = "Bonding";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Authentication requirement: %s - %s (0x%2.2x)",
|
|
str, (auth_req & 0x04) ? "MITM" : "No MITM", auth_req);
|
|
}
|
|
|
|
static void smp_pairing_request(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_smp_pairing_request *pdu = frame->data;
|
|
|
|
print_smp_io_capa(pdu->io_capa);
|
|
print_smp_oob_data(pdu->oob_data);
|
|
print_smp_auth_req(pdu->auth_req);
|
|
|
|
print_field("Max encryption key size: %d", pdu->max_key_size);
|
|
print_field("Initiator key distribution: 0x%2.2x", pdu->init_key_dist);
|
|
print_field("Responder key distribution: 0x%2.2x", pdu->resp_key_dist);
|
|
}
|
|
|
|
static void smp_pairing_response(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_smp_pairing_response *pdu = frame->data;
|
|
|
|
print_smp_io_capa(pdu->io_capa);
|
|
print_smp_oob_data(pdu->oob_data);
|
|
print_smp_auth_req(pdu->auth_req);
|
|
|
|
print_field("Max encryption key size: %d", pdu->max_key_size);
|
|
print_field("Initiator key distribution: 0x%2.2x", pdu->init_key_dist);
|
|
print_field("Responder key distribution: 0x%2.2x", pdu->resp_key_dist);
|
|
}
|
|
|
|
static void smp_pairing_confirm(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_smp_pairing_confirm *pdu = frame->data;
|
|
|
|
print_hex_field("Confim value", pdu->value, 16);
|
|
}
|
|
|
|
static void smp_pairing_random(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_smp_pairing_random *pdu = frame->data;
|
|
|
|
print_hex_field("Random value", pdu->value, 16);
|
|
}
|
|
|
|
static void smp_pairing_failed(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_smp_pairing_failed *pdu = frame->data;
|
|
const char *str;
|
|
|
|
switch (pdu->reason) {
|
|
case 0x01:
|
|
str = "Passkey entry failed";
|
|
break;
|
|
case 0x02:
|
|
str = "OOB not available";
|
|
break;
|
|
case 0x03:
|
|
str = "Authentication requirements";
|
|
break;
|
|
case 0x04:
|
|
str = "Confirm value failed";
|
|
break;
|
|
case 0x05:
|
|
str = "Pairing not supported";
|
|
break;
|
|
case 0x06:
|
|
str = "Encryption key size";
|
|
break;
|
|
case 0x07:
|
|
str = "Command not supported";
|
|
break;
|
|
case 0x08:
|
|
str = "Unspecified reason";
|
|
break;
|
|
case 0x09:
|
|
str = "Repeated attempts";
|
|
break;
|
|
case 0x0a:
|
|
str = "Invalid parameters";
|
|
break;
|
|
default:
|
|
str = "Reserved";
|
|
break;
|
|
}
|
|
|
|
print_field("Reason: %s (0x%2.2x)", str, pdu->reason);
|
|
}
|
|
|
|
static void smp_encrypt_info(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_smp_encrypt_info *pdu = frame->data;
|
|
|
|
print_hex_field("Long term key", pdu->ltk, 16);
|
|
}
|
|
|
|
static void smp_master_ident(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_smp_master_ident *pdu = frame->data;
|
|
|
|
print_field("EDIV: 0x%4.4x", btohs(pdu->ediv));
|
|
print_field("Rand: 0x%16.16" PRIx64, btohll(pdu->rand));
|
|
}
|
|
|
|
static void smp_ident_info(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_smp_ident_info *pdu = frame->data;
|
|
|
|
print_hex_field("Identity resolving key", pdu->irk, 16);
|
|
}
|
|
|
|
static void smp_ident_addr_info(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_smp_ident_addr_info *pdu = frame->data;
|
|
|
|
print_addr_type(pdu->addr_type);
|
|
print_addr(pdu->addr, pdu->addr_type);
|
|
}
|
|
|
|
static void smp_signing_info(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_smp_signing_info *pdu = frame->data;
|
|
|
|
print_hex_field("Signature key", pdu->csrk, 16);
|
|
}
|
|
|
|
static void smp_security_request(const struct l2cap_frame *frame)
|
|
{
|
|
const struct bt_l2cap_smp_security_request *pdu = frame->data;
|
|
|
|
print_smp_auth_req(pdu->auth_req);
|
|
}
|
|
|
|
struct smp_opcode_data {
|
|
uint8_t opcode;
|
|
const char *str;
|
|
void (*func) (const struct l2cap_frame *frame);
|
|
uint8_t size;
|
|
bool fixed;
|
|
};
|
|
|
|
static const struct smp_opcode_data smp_opcode_table[] = {
|
|
{ 0x01, "Pairing Request",
|
|
smp_pairing_request, 6, true },
|
|
{ 0x02, "Pairing Response",
|
|
smp_pairing_response, 6, true },
|
|
{ 0x03, "Pairing Confirm",
|
|
smp_pairing_confirm, 16, true },
|
|
{ 0x04, "Pairing Random",
|
|
smp_pairing_random, 16, true },
|
|
{ 0x05, "Pairing Failed",
|
|
smp_pairing_failed, 1, true },
|
|
{ 0x06, "Encryption Information",
|
|
smp_encrypt_info, 16, true },
|
|
{ 0x07, "Master Identification",
|
|
smp_master_ident, 10, true },
|
|
{ 0x08, "Identity Information",
|
|
smp_ident_info, 16, true },
|
|
{ 0x09, "Identity Address Information",
|
|
smp_ident_addr_info, 7, true },
|
|
{ 0x0a, "Signing Information",
|
|
smp_signing_info, 16, true },
|
|
{ 0x0b, "Security Request",
|
|
smp_security_request, 1, true },
|
|
{ }
|
|
};
|
|
|
|
static void smp_packet(uint16_t index, bool in, uint16_t handle,
|
|
uint16_t cid, const void *data, uint16_t size)
|
|
{
|
|
struct l2cap_frame frame;
|
|
uint8_t opcode = *((const uint8_t *) data);
|
|
const struct smp_opcode_data *opcode_data = NULL;
|
|
const char *opcode_color, *opcode_str;
|
|
int i;
|
|
|
|
if (size < 1) {
|
|
print_text(COLOR_ERROR, "malformed attribute packet");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
for (i = 0; smp_opcode_table[i].str; i++) {
|
|
if (smp_opcode_table[i].opcode == opcode) {
|
|
opcode_data = &smp_opcode_table[i];
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (opcode_data) {
|
|
if (opcode_data->func) {
|
|
if (in)
|
|
opcode_color = COLOR_MAGENTA;
|
|
else
|
|
opcode_color = COLOR_BLUE;
|
|
} else
|
|
opcode_color = COLOR_WHITE_BG;
|
|
opcode_str = opcode_data->str;
|
|
} else {
|
|
opcode_color = COLOR_WHITE_BG;
|
|
opcode_str = "Unknown";
|
|
}
|
|
|
|
print_indent(6, opcode_color, "SMP: ", opcode_str, COLOR_OFF,
|
|
" (0x%2.2x) len %d", opcode, size - 1);
|
|
|
|
if (!opcode_data || !opcode_data->func) {
|
|
packet_hexdump(data + 1, size - 1);
|
|
return;
|
|
}
|
|
|
|
if (opcode_data->fixed) {
|
|
if (size - 1 != opcode_data->size) {
|
|
print_text(COLOR_ERROR, "invalid size");
|
|
packet_hexdump(data + 1, size - 1);
|
|
return;
|
|
}
|
|
} else {
|
|
if (size - 1 < opcode_data->size) {
|
|
print_text(COLOR_ERROR, "too short packet");
|
|
packet_hexdump(data + 1, size - 1);
|
|
return;
|
|
}
|
|
}
|
|
|
|
l2cap_frame_init(&frame, index, in, handle, cid, data + 1, size - 1);
|
|
opcode_data->func(&frame);
|
|
}
|
|
|
|
static void l2cap_frame(uint16_t index, bool in, uint16_t handle,
|
|
uint16_t cid, const void *data, uint16_t size)
|
|
{
|
|
struct l2cap_frame frame;
|
|
uint16_t psm, chan;
|
|
uint8_t mode;
|
|
|
|
switch (cid) {
|
|
case 0x0001:
|
|
case 0x0005:
|
|
sig_packet(index, in, handle, cid, data, size);
|
|
break;
|
|
case 0x0003:
|
|
amp_packet(index, in, handle, cid, data, size);
|
|
break;
|
|
case 0x0004:
|
|
att_packet(index, in, handle, cid, data, size);
|
|
break;
|
|
case 0x0006:
|
|
smp_packet(index, in, handle, cid, data, size);
|
|
break;
|
|
default:
|
|
l2cap_frame_init(&frame, index, in, handle, cid, data, size);
|
|
psm = get_psm(&frame);
|
|
mode = get_mode(&frame);
|
|
chan = get_chan(&frame);
|
|
|
|
print_indent(6, COLOR_CYAN, "Channel:", "", COLOR_OFF,
|
|
" %d len %d [PSM %d mode %d] {chan %d}",
|
|
cid, size, psm, mode, chan);
|
|
|
|
switch (psm) {
|
|
case 0x0001:
|
|
sdp_packet(&frame, chan);
|
|
break;
|
|
default:
|
|
packet_hexdump(data, size);
|
|
break;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
void l2cap_packet(uint16_t index, bool in, uint16_t handle, uint8_t flags,
|
|
const void *data, uint16_t size)
|
|
{
|
|
const struct bt_l2cap_hdr *hdr = data;
|
|
uint16_t len, cid;
|
|
|
|
if (index > MAX_INDEX - 1) {
|
|
print_text(COLOR_ERROR, "controller index too large");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
switch (flags) {
|
|
case 0x00: /* start of a non-automatically-flushable PDU */
|
|
case 0x02: /* start of an automatically-flushable PDU */
|
|
if (index_list[index].frag_len) {
|
|
print_text(COLOR_ERROR, "unexpected start frame");
|
|
packet_hexdump(data, size);
|
|
clear_fragment_buffer(index);
|
|
return;
|
|
}
|
|
|
|
if (size < sizeof(*hdr)) {
|
|
print_text(COLOR_ERROR, "frame too short");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
len = btohs(hdr->len);
|
|
cid = btohs(hdr->cid);
|
|
|
|
data += sizeof(*hdr);
|
|
size -= sizeof(*hdr);
|
|
|
|
if (len == size) {
|
|
/* complete frame */
|
|
l2cap_frame(index, in, handle, cid, data, len);
|
|
return;
|
|
}
|
|
|
|
if (size > len) {
|
|
print_text(COLOR_ERROR, "frame too long");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
index_list[index].frag_buf = malloc(len);
|
|
if (!index_list[index].frag_buf) {
|
|
print_text(COLOR_ERROR, "failed buffer allocation");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
memcpy(index_list[index].frag_buf, data, size);
|
|
index_list[index].frag_pos = size;
|
|
index_list[index].frag_len = len - size;
|
|
index_list[index].frag_cid = cid;
|
|
break;
|
|
|
|
case 0x01: /* continuing fragment */
|
|
if (!index_list[index].frag_len) {
|
|
print_text(COLOR_ERROR, "unexpected continuation");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
if (size > index_list[index].frag_len) {
|
|
print_text(COLOR_ERROR, "fragment too long");
|
|
packet_hexdump(data, size);
|
|
clear_fragment_buffer(index);
|
|
return;
|
|
}
|
|
|
|
memcpy(index_list[index].frag_buf +
|
|
index_list[index].frag_pos, data, size);
|
|
index_list[index].frag_pos += size;
|
|
index_list[index].frag_len -= size;
|
|
|
|
if (!index_list[index].frag_len) {
|
|
/* complete frame */
|
|
l2cap_frame(index, in, handle,
|
|
index_list[index].frag_cid,
|
|
data, index_list[index].frag_pos);
|
|
clear_fragment_buffer(index);
|
|
return;
|
|
}
|
|
break;
|
|
|
|
case 0x03: /* complete automatically-flushable PDU */
|
|
if (index_list[index].frag_len) {
|
|
print_text(COLOR_ERROR, "unexpected complete frame");
|
|
packet_hexdump(data, size);
|
|
clear_fragment_buffer(index);
|
|
return;
|
|
}
|
|
|
|
if (size < sizeof(*hdr)) {
|
|
print_text(COLOR_ERROR, "frame too short");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
len = btohs(hdr->len);
|
|
cid = btohs(hdr->cid);
|
|
|
|
data += sizeof(*hdr);
|
|
size -= sizeof(*hdr);
|
|
|
|
if (len != size) {
|
|
print_text(COLOR_ERROR, "wrong frame size");
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
|
|
/* complete frame */
|
|
l2cap_frame(index, in, handle, cid, data, len);
|
|
break;
|
|
|
|
default:
|
|
print_text(COLOR_ERROR, "invalid packet flags (0x%2.2x)",
|
|
flags);
|
|
packet_hexdump(data, size);
|
|
return;
|
|
}
|
|
}
|