static void stdin_process(char c){ // passkey input if (ui_digits_for_passkey && c >= '0' && c <= '9'){ printf("%c", c); fflush(stdout); ui_passkey = ui_passkey * 10 + c - '0'; ui_digits_for_passkey--; sm_keypress_notification(connection_handle, SM_KEYPRESS_PASSKEY_DIGIT_ENTERED); if (ui_digits_for_passkey == 0){ printf("\n"); fflush(stdout); sm_keypress_notification(connection_handle, SM_KEYPRESS_PASSKEY_ENTRY_COMPLETED); sm_passkey_input(connection_handle, ui_passkey); } return; } if (ui_oob_confirm){ if (c == ' ') return; ui_oob_nibble = (ui_oob_nibble << 4) | nibble_for_char(c); if ((ui_oob_pos & 1) == 1){ sm_oob_peer_confirm[ui_oob_pos >> 1] = ui_oob_nibble; ui_oob_nibble = 0; } ui_oob_pos++; if (ui_oob_pos == 32){ ui_oob_confirm = 0; printf("PEER_OOB_CONFIRM: "); printf_hexdump(sm_oob_peer_confirm, 16); fflush(stdout); } return; }
int stdin_process(struct data_source *ds){ char buffer; read(ds->fd, &buffer, 1); // passkey input if (ui_digits_for_passkey){ if (buffer < '0' || buffer > '9') return 0; printf("%c", buffer); fflush(stdout); ui_passkey = ui_passkey * 10 + buffer - '0'; ui_digits_for_passkey--; if (ui_digits_for_passkey == 0){ printf("\nSending Passkey '%06x'\n", ui_passkey); sm_passkey_input(master_addr_type, master_address, ui_passkey); } return 0; } switch (buffer){ case 'a': gap_advertisements = 0; update_advertisements(); show_usage(); break; case 'A': gap_advertisements = 1; update_advertisements(); show_usage(); break; case 'b': gap_bondable = 0; sm_set_authentication_requirements(SM_AUTHREQ_NO_BONDING); show_usage(); break; case 'B': gap_bondable = 1; sm_set_authentication_requirements(SM_AUTHREQ_BONDING); show_usage(); break; case 'c': gap_connectable = 0; update_advertisements(); break; case 'C': gap_connectable = 1; update_advertisements(); break; case 'd': gap_discoverable = 0; update_advertisements(); break; case 'D': gap_discoverable = 1; update_advertisements(); break; case 'r': gap_random = 0; update_advertisements(); break; case 'R': gap_random = 1; update_advertisements(); break; case 'x': gap_directed_connectable = 0; update_advertisements(); break; case 'X': gap_directed_connectable = 1; update_advertisements(); break; case 'y': gap_scannable = 0; update_advertisements(); break; case 'Y': gap_scannable = 1; update_advertisements(); break; case '1': case '2': case '3': case '4': case '5': case '6': case '7': case '8': case '9': case '0': advertisement_index = buffer - '0'; update_advertisements(); break; case '+': advertisement_index = 10; update_advertisements(); break; case '-': advertisement_index = 11; update_advertisements(); break; case '&': advertisement_index = 12; update_advertisements(); break; case '=': advertisement_index = 13; update_advertisements(); break; case '/': advertisement_index = 14; update_advertisements(); break; case '#': advertisement_index = 15; update_advertisements(); break; case 's': printf("SM: sending security request\n"); sm_send_security_request(); break; case 'e': sm_io_capabilities = "IO_CAPABILITY_DISPLAY_ONLY"; sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_ONLY); show_usage(); break; case 'f': sm_io_capabilities = "IO_CAPABILITY_DISPLAY_YES_NO"; sm_set_io_capabilities(IO_CAPABILITY_DISPLAY_YES_NO); show_usage(); break; case 'g': sm_io_capabilities = "IO_CAPABILITY_NO_INPUT_NO_OUTPUT"; sm_set_io_capabilities(IO_CAPABILITY_NO_INPUT_NO_OUTPUT); show_usage(); break; case 'h': sm_io_capabilities = "IO_CAPABILITY_KEYBOARD_ONLY"; sm_set_io_capabilities(IO_CAPABILITY_KEYBOARD_ONLY); show_usage(); break; case 'i': sm_io_capabilities = "IO_CAPABILITY_KEYBOARD_DISPLAY"; sm_set_io_capabilities(IO_CAPABILITY_KEYBOARD_DISPLAY); show_usage(); break; case 't': printf("Terminating connection\n"); hci_send_cmd(&hci_disconnect, handle, 0x13); break; case 'z': printf("Sending l2cap connection update parameter request\n"); l2cap_le_request_connection_parameter_update(handle, 50, 120, 0, 550); break; case 'l': att_default_value_long = 0; show_usage(); break; case 'L': att_default_value_long = 1; show_usage(); break; case 'p': gap_privacy = 0; show_usage(); break; case 'P': gap_privacy = 1; show_usage(); break; case 'o': sm_have_oob_data = 0; show_usage(); break; case 'O': sm_have_oob_data = 1; show_usage(); break; case 'k': sm_min_key_size = 7; sm_set_encryption_key_size_range(7, 16); show_usage(); break; case 'K': sm_min_key_size = 16; sm_set_encryption_key_size_range(16, 16); show_usage(); break; case 'm': sm_mitm_protection = 0; update_auth_req(); show_usage(); break; case 'M': sm_mitm_protection = 1; update_auth_req(); show_usage(); break; case 'j': printf("Create L2CAP Connection to %s\n", bd_addr_to_str(tester_address)); hci_send_cmd(&hci_le_create_connection, 1000, // scan interval: 625 ms 1000, // scan interval: 625 ms 0, // don't use whitelist 0, // peer address type: public tester_address, // remote bd addr tester_address_type, // random or public 80, // conn interval min 80, // conn interval max (3200 * 0.625) 0, // conn latency 2000, // supervision timeout 0, // min ce length 1000 // max ce length ); break; default: show_usage(); break; } return 0; }