void XGPacketBuilder::on_data_change() { if (updating_fields) return; pkt.data.clear(); Glib::ustring str = tv_data.get_buffer()->get_text(); if (hex_data.get_active()) { for (int i = 0; i < str.size(); i++) { int k, num; uint8_t b; if (sscanf(str.c_str()+i, "%2x%n", &k, &num) > 0) { i += num-1; b = k; pkt.data.push_back(b); } } } else { for (int i = 0; i < str.size(); i++) { pkt.data.push_back(str[i]); } } update_packet(); }
void packet_handler(uint8_t packet_type, uint16_t channel, uint8_t *packet, uint16_t size){ bd_addr_t event_addr; uint16_t handle; uint16_t psm; uint16_t local_cid; char pin[20]; int i; switch (packet_type) { case L2CAP_DATA_PACKET: // measure data rate break; case HCI_EVENT_PACKET: switch (packet[0]) { case BTSTACK_EVENT_POWERON_FAILED: printf("HCI Init failed - make sure you have turned off Bluetooth in the System Settings\n"); exit(1); break; case BTSTACK_EVENT_STATE: // bt stack activated, get started if (packet[2] == HCI_STATE_WORKING) { if (serverMode) { printf("Waiting for incoming L2CAP connection on PSM %04x...\n", PSM_TEST); timer.process = timer_handler; run_loop_set_timer(&timer, 3000); // run_loop_add_timer(&timer); } else { bt_send_cmd(&hci_write_authentication_enable, 0); } } break; case HCI_EVENT_COMMAND_COMPLETE: // use pairing yes/no if ( COMMAND_COMPLETE_EVENT(packet, hci_write_authentication_enable) ) { bt_send_cmd(&hci_write_class_of_device, 0x38010c); } if ( COMMAND_COMPLETE_EVENT(packet, hci_write_class_of_device) ) { bt_send_cmd(&l2cap_create_channel_mtu, addr, PSM_TEST, PACKET_SIZE); } break; case L2CAP_EVENT_INCOMING_CONNECTION: // data: event(8), len(8), address(48), handle (16), psm (16), source cid(16) dest cid(16) bt_flip_addr(event_addr, &packet[2]); handle = READ_BT_16(packet, 8); psm = READ_BT_16(packet, 10); local_cid = READ_BT_16(packet, 12); // remote_cid = READ_BT_16(packet, 14); printf("L2CAP_EVENT_INCOMING_CONNECTION %s, handle 0x%02x, psm 0x%02x, local cid 0x%02x\n", bd_addr_to_str(event_addr), handle, psm, local_cid); // accept bt_send_cmd(&l2cap_accept_connection, local_cid); break; case HCI_EVENT_LINK_KEY_REQUEST: // link key request bt_flip_addr(event_addr, &packet[2]); bt_send_cmd(&hci_link_key_request_negative_reply, &event_addr); break; case HCI_EVENT_PIN_CODE_REQUEST: // inform about pin code request printf("Please enter PIN here: "); fgets(pin, 20, stdin); i = strlen(pin); if( pin[i-1] == '\n' || pin[i-1] == '\r') { pin[i-1] = '\0'; i--; } printf("PIN (%u)= '%s'\n", i, pin); bt_flip_addr(event_addr, &packet[2]); bt_send_cmd(&hci_pin_code_request_reply, &event_addr, i, pin); break; case L2CAP_EVENT_CHANNEL_OPENED: // inform about new l2cap connection bt_flip_addr(event_addr, &packet[3]); psm = READ_BT_16(packet, 11); local_cid = READ_BT_16(packet, 13); handle = READ_BT_16(packet, 9); if (packet[2] == 0) { printf("Channel successfully opened: %s, handle 0x%02x, psm 0x%02x, local cid 0x%02x, remote cid 0x%02x\n", bd_addr_to_str(event_addr), handle, psm, local_cid, READ_BT_16(packet, 15)); } else { printf("L2CAP connection to device %s failed. status code %u\n", bd_addr_to_str(event_addr), packet[2]); } break; case HCI_EVENT_DISCONNECTION_COMPLETE: printf("Basebank connection closed\n"); break; case L2CAP_EVENT_CREDITS: if (!serverMode) { // can send! (assuming single credits are handet out) update_packet(); local_cid = READ_BT_16(packet, 2); bt_send_l2cap( local_cid, packet, PACKET_SIZE); } break; default: // other event break; } break; default: // other packet type break; } }