static void sdpc_trysend() { uint8_t buf[128]; if (state != SENDING) return; if (!l2cap_cid) return; if (!l2cap_can_send_packet_now(l2cap_cid)) return; buf[0] = SDP_ServiceSearchAttributeRequest; net_store_16(buf, 1, transitionid++); uint8_t *param = &buf[5]; de_create_sequence(param); de_add_number(param, DE_UUID, DE_SIZE_16, serviceids[current_server]); uint16_t size = de_get_len(param); net_store_16(param, size, 30); // max length is 30 bytes size+=2; de_create_sequence(param + size); //de_add_number(param + size, DE_UINT, DE_SIZE_16, SDP_ServiceClassIDList); de_add_number(param + size, DE_UINT, DE_SIZE_16, SDP_ProtocolDescriptorList); size += de_get_len(param + size); param[size++] = 0; net_store_16(buf, 3, size); hexdump(buf, size + 5); int err = l2cap_send_internal(l2cap_cid, buf, size + 5); if (!err) { state = RECV; log_info("sdp request sent.\n"); } else { log_info("sdpc_trysend l2cap_send_internal error: %d\n", err); } }
int stdin_process(struct data_source *ds){ char buffer; read(ds->fd, &buffer, 1); switch (buffer){ case 'c': printf("Creating L2CAP Connection to %s, PSM SDP\n", bd_addr_to_str(remote)); l2cap_create_channel_internal(NULL, packet_handler, remote, PSM_SDP, 100); break; case 's': printf("Send L2CAP Data\n"); l2cap_send_internal(local_cid, (uint8_t *) "0123456789", 10); break; case 'e': printf("Send L2CAP ECHO Request\n"); l2cap_send_echo_request(handle, (uint8_t *) "Hello World!", 13); break; case 'd': printf("L2CAP Channel Closed\n"); l2cap_disconnect_internal(local_cid, 0); break; case '\n': case '\r': break; default: show_usage(); break; } return 0; }
static void sdp_try_respond(void) { if (!sdp_response_size ) return; if (!l2cap_cid) return; if (!l2cap_can_send_packet_now(l2cap_cid)) return; // update state before sending packet (avoid getting called when new l2cap credit gets emitted) uint16_t size = sdp_response_size; sdp_response_size = 0; l2cap_send_internal(l2cap_cid, sdp_response_buffer, size); }
static int daemon_client_handler(connection_t *connection, uint16_t packet_type, uint16_t channel, uint8_t *data, uint16_t length){ int err = 0; client_state_t * client; switch (packet_type){ case HCI_COMMAND_DATA_PACKET: if (READ_CMD_OGF(data) != OGF_BTSTACK) { // HCI Command hci_send_cmd_packet(data, length); } else { // BTstack command btstack_command_handler(connection, data, length); } break; case HCI_ACL_DATA_PACKET: err = hci_send_acl_packet(data, length); break; case L2CAP_DATA_PACKET: // process l2cap packet... err = l2cap_send_internal(channel, data, length); if (err == BTSTACK_ACL_BUFFERS_FULL) { l2cap_block_new_credits(1); } break; case RFCOMM_DATA_PACKET: // process l2cap packet... err = rfcomm_send_internal(channel, data, length); break; case DAEMON_EVENT_PACKET: switch (data[0]) { case DAEMON_EVENT_CONNECTION_OPENED: log_info("DAEMON_EVENT_CONNECTION_OPENED %p\n",connection); client = malloc(sizeof(client_state_t)); if (!client) break; // fail client->connection = connection; client->power_mode = HCI_POWER_OFF; client->discoverable = 0; linked_list_add(&clients, (linked_item_t *) client); break; case DAEMON_EVENT_CONNECTION_CLOSED: log_info("DAEMON_EVENT_CONNECTION_CLOSED %p\n",connection); sdp_unregister_services_for_connection(connection); rfcomm_close_connection(connection); l2cap_close_connection(connection); client = client_for_connection(connection); if (!client) break; linked_list_remove(&clients, (linked_item_t *) client); free(client); // update discoverable mode hci_discoverable_control(clients_require_discoverable()); // start power off, if last active client if (!clients_require_power_on()){ start_power_off_timer(); } break; case DAEMON_NR_CONNECTIONS_CHANGED: log_info("Nr Connections changed, new %u\n",data[1]); break; default: break; } break; } if (err) { log_info("Daemon Handler: err %d\n", err); } return err; }
int stdin_process(struct data_source *ds){ char buffer; read(ds->fd, &buffer, 1); // passkey input if (ui_digits_for_passkey){ if (buffer < '0' || buffer > '9') return 0; printf("%c", buffer); fflush(stdout); ui_passkey = ui_passkey * 10 + buffer - '0'; ui_digits_for_passkey--; if (ui_digits_for_passkey == 0){ printf("\nSending Passkey '%06u'\n", ui_passkey); hci_send_cmd(&hci_user_passkey_request_reply, remote, ui_passkey); } return 0; } if (ui_chars_for_pin){ printf("%c", buffer); fflush(stdout); if (buffer == '\n'){ printf("\nSending Pin '%s'\n", ui_pin); hci_send_cmd(&hci_pin_code_request_reply, remote, ui_pin_offset, ui_pin); } else { ui_pin[ui_pin_offset++] = buffer; } return 0; } switch (buffer){ case 'c': gap_connectable = 0; hci_connectable_control(0); show_usage(); break; case 'C': gap_connectable = 1; hci_connectable_control(1); show_usage(); break; case 'd': gap_discoverable = 0; hci_discoverable_control(0); show_usage(); break; case 'D': gap_discoverable = 1; hci_discoverable_control(1); show_usage(); break; case 'b': gap_bondable = 0; // gap_set_bondable_mode(0); update_auth_req(); show_usage(); break; case 'B': gap_bondable = 1; // gap_set_bondable_mode(1); update_auth_req(); show_usage(); break; case 'm': gap_mitm_protection = 0; update_auth_req(); show_usage(); break; case 'M': gap_mitm_protection = 1; update_auth_req(); show_usage(); break; case '<': gap_dedicated_bonding_mode = 0; update_auth_req(); show_usage(); break; case '>': gap_dedicated_bonding_mode = 1; update_auth_req(); show_usage(); break; case 'e': gap_io_capabilities = "IO_CAPABILITY_DISPLAY_ONLY"; hci_ssp_set_io_capability(IO_CAPABILITY_DISPLAY_ONLY); show_usage(); break; case 'f': gap_io_capabilities = "IO_CAPABILITY_DISPLAY_YES_NO"; hci_ssp_set_io_capability(IO_CAPABILITY_DISPLAY_YES_NO); show_usage(); break; case 'g': gap_io_capabilities = "IO_CAPABILITY_NO_INPUT_NO_OUTPUT"; hci_ssp_set_io_capability(IO_CAPABILITY_NO_INPUT_NO_OUTPUT); show_usage(); break; case 'h': gap_io_capabilities = "IO_CAPABILITY_KEYBOARD_ONLY"; hci_ssp_set_io_capability(IO_CAPABILITY_KEYBOARD_ONLY); show_usage(); break; case 'i': start_scan(); break; case 'j': printf("Start dedicated bonding to %s using MITM %u\n", bd_addr_to_str(remote), gap_mitm_protection); gap_dedicated_bonding(remote, gap_mitm_protection); break; case 'z': printf("Start dedicated bonding to %s using legacy pairing\n", bd_addr_to_str(remote)); gap_dedicated_bonding(remote, gap_mitm_protection); break; case 'y': printf("Disabling SSP for this session\n"); hci_send_cmd(&hci_write_simple_pairing_mode, 0); break; case 'k': printf("Start SDP query for SPP service\n"); sdp_query_rfcomm_channel_and_name_for_uuid(remote_rfcomm, 0x1101); break; case 't': printf("Terminate connection with handle 0x%04x\n", handle); hci_send_cmd(&hci_disconnect, handle, 0x13); // remote closed connection break; case 'p': printf("Creating HCI Connection to %s\n", bd_addr_to_str(remote)); hci_send_cmd(&hci_create_connection, remote, hci_usable_acl_packet_types(), 0, 0, 0, 1); break; // printf("Creating L2CAP Connection to %s, PSM SDP\n", bd_addr_to_str(remote)); // l2cap_create_channel_internal(NULL, packet_handler, remote, PSM_SDP, 100); // break; // case 'u': // printf("Creating L2CAP Connection to %s, PSM 3\n", bd_addr_to_str(remote)); // l2cap_create_channel_internal(NULL, packet_handler, remote, 3, 100); // break; case 'q': printf("Send L2CAP Data\n"); l2cap_send_internal(local_cid, (uint8_t *) "0123456789", 10); break; case 'r': printf("Send L2CAP ECHO Request\n"); l2cap_send_echo_request(handle, (uint8_t *) "Hello World!", 13); break; case 's': printf("L2CAP Channel Closed\n"); l2cap_disconnect_internal(local_cid, 0); break; case 'x': printf("Outgoing L2CAP Channels to SDP will also require SSP\n"); l2cap_require_security_level_2_for_outgoing_sdp(); break; case 'l': printf("Creating RFCOMM Channel to %s #%u\n", bd_addr_to_str(remote_rfcomm), rfcomm_channel_nr); rfcomm_create_channel_internal(NULL, remote_rfcomm, rfcomm_channel_nr); break; case 'n': printf("Send RFCOMM Data\n"); // mtu < 60 rfcomm_send_internal(rfcomm_channel_id, (uint8_t *) "012345678901234567890123456789012345678901234567890123456789", mtu); break; case 'u': printf("Sending RLS indicating framing error\n"); // mtu < 60 rfcomm_send_local_line_status(rfcomm_channel_id, 9); break; case 'v': printf("Sending RPN CMD to select 115200 baud\n"); // mtu < 60 rfcomm_send_port_configuration(rfcomm_channel_id, RPN_BAUD_115200, RPN_DATA_BITS_8, RPN_STOP_BITS_1_0, RPN_PARITY_NONE, 0); break; case 'w': printf("Sending RPN REQ to query remote port settings\n"); // mtu < 60 rfcomm_query_port_configuration(rfcomm_channel_id); break; case 'o': printf("RFCOMM Channel Closed\n"); rfcomm_disconnect_internal(rfcomm_channel_id); rfcomm_channel_id = 0; break; case '+': printf("Initiate SSP on current connection\n"); gap_request_security_level(handle, LEVEL_2); break; case '*': printf("Sending SSP User Confirmation for %s\n", bd_addr_to_str(remote)); hci_send_cmd(&hci_user_confirmation_request_reply, remote); break; case '=': printf("Deleting Link Key for %s\n", bd_addr_to_str(remote)); hci_drop_link_key_for_bd_addr(remote); break; case 'U': printf("Sending UCD data on handle 0x%04x\n", handle); send_ucd_packet(); break; case 'Q': printf("Closing HCI Connection to handle 0x%04x\n", handle); gap_disconnect(handle); break; default: show_usage(); break; } return 0; }