l2test.c 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665
  1. // SPDX-License-Identifier: GPL-2.0-or-later
  2. /*
  3. *
  4. * BlueZ - Bluetooth protocol stack for Linux
  5. *
  6. * Copyright (C) 2000-2001 Qualcomm Incorporated
  7. * Copyright (C) 2002-2003 Maxim Krasnyansky <maxk@qualcomm.com>
  8. * Copyright (C) 2002-2010 Marcel Holtmann <marcel@holtmann.org>
  9. *
  10. *
  11. */
  12. #ifdef HAVE_CONFIG_H
  13. #include <config.h>
  14. #endif
  15. #define _GNU_SOURCE
  16. #include <stdio.h>
  17. #include <stdbool.h>
  18. #include <errno.h>
  19. #include <ctype.h>
  20. #include <fcntl.h>
  21. #include <unistd.h>
  22. #include <stdlib.h>
  23. #include <getopt.h>
  24. #include <syslog.h>
  25. #include <signal.h>
  26. #include <sys/time.h>
  27. #include <poll.h>
  28. #include <sys/ioctl.h>
  29. #include <sys/socket.h>
  30. #include "lib/bluetooth.h"
  31. #include "lib/hci.h"
  32. #include "lib/hci_lib.h"
  33. #include "lib/l2cap.h"
  34. #include "src/shared/util.h"
  35. #include "monitor/display.h"
  36. #define NIBBLE_TO_ASCII(c) ((c) < 0x0a ? (c) + 0x30 : (c) + 0x57)
  37. #define BREDR_DEFAULT_PSM 0x1011
  38. #define LE_DEFAULT_PSM 0x0080
  39. #ifndef SIOCGSTAMP_OLD
  40. #define SIOCGSTAMP_OLD SIOCGSTAMP
  41. #endif
  42. /* Test modes */
  43. enum {
  44. SEND,
  45. RECV,
  46. RECONNECT,
  47. MULTY,
  48. DUMP,
  49. CONNECT,
  50. CRECV,
  51. LSEND,
  52. SENDDUMP,
  53. LSENDDUMP,
  54. LSENDRECV,
  55. CSENDRECV,
  56. INFOREQ,
  57. PAIRING,
  58. };
  59. static unsigned char *buf;
  60. /* Default mtu */
  61. static int imtu = 672;
  62. static int omtu = 0;
  63. /* Default FCS option */
  64. static int fcs = 0x01;
  65. /* Default Transmission Window */
  66. static int txwin_size = 63;
  67. /* Default Max Transmission */
  68. static int max_transmit = 3;
  69. /* Default data size */
  70. static long data_size = -1;
  71. static long buffer_size = 2048;
  72. /* Default addr and psm and cid */
  73. static bdaddr_t bdaddr;
  74. static unsigned short psm = 0;
  75. static unsigned short cid = 0;
  76. /* Default number of frames to send (-1 = infinite) */
  77. static int num_frames = -1;
  78. /* Default number of consecutive frames before the delay */
  79. static int count = 1;
  80. /* Default delay after sending count number of frames */
  81. static unsigned long send_delay = 0;
  82. /* Default delay before receiving */
  83. static unsigned long recv_delay = 0;
  84. /* Default delay before disconnecting */
  85. static unsigned long disc_delay = 0;
  86. /* Initial sequence value when sending frames */
  87. static int seq_start = 0;
  88. static const char *filename = NULL;
  89. static int rfcmode = 0;
  90. static int central = 0;
  91. static int auth = 0;
  92. static int encr = 0;
  93. static int secure = 0;
  94. static int socktype = SOCK_SEQPACKET;
  95. static int linger = 0;
  96. static int reliable = 0;
  97. static int timestamp = 0;
  98. static int defer_setup = 0;
  99. static int priority = -1;
  100. static int rcvbuf = 0;
  101. static int chan_policy = -1;
  102. static int bdaddr_type = 0;
  103. struct lookup_table {
  104. const char *name;
  105. int flag;
  106. };
  107. static struct lookup_table l2cap_modes[] = {
  108. { "basic", BT_MODE_BASIC },
  109. /* Not implemented
  110. { "flowctl", BT_MODE_FLOWCTL },
  111. { "retrans", BT_MODE_RETRANS },
  112. */
  113. { "ertm", BT_MODE_ERTM },
  114. { "streaming", BT_MODE_STREAMING },
  115. { "ext-flowctl",BT_MODE_EXT_FLOWCTL },
  116. { 0 }
  117. };
  118. static struct lookup_table chan_policies[] = {
  119. { "bredr", BT_CHANNEL_POLICY_BREDR_ONLY },
  120. { "bredr_pref", BT_CHANNEL_POLICY_BREDR_PREFERRED },
  121. { "amp_pref", BT_CHANNEL_POLICY_AMP_PREFERRED },
  122. { NULL, 0 },
  123. };
  124. static struct lookup_table bdaddr_types[] = {
  125. { "bredr", BDADDR_BREDR },
  126. { "le_public", BDADDR_LE_PUBLIC },
  127. { "le_random", BDADDR_LE_RANDOM },
  128. { NULL, 0 },
  129. };
  130. static int get_lookup_flag(struct lookup_table *table, char *name)
  131. {
  132. int i;
  133. for (i = 0; table[i].name; i++)
  134. if (!strcasecmp(table[i].name, name))
  135. return table[i].flag;
  136. return -1;
  137. }
  138. static const char *get_lookup_str(struct lookup_table *table, int flag)
  139. {
  140. int i;
  141. for (i = 0; table[i].name; i++)
  142. if (table[i].flag == flag)
  143. return table[i].name;
  144. return NULL;
  145. }
  146. static void print_lookup_values(struct lookup_table *table, char *header)
  147. {
  148. int i;
  149. printf("%s\n", header);
  150. for (i = 0; table[i].name; i++)
  151. printf("\t%s\n", table[i].name);
  152. }
  153. static float tv2fl(struct timeval tv)
  154. {
  155. return (float)tv.tv_sec + (float)(tv.tv_usec/1000000.0);
  156. }
  157. static char *ltoh(unsigned long c, char *s)
  158. {
  159. int c1;
  160. c1 = (c >> 28) & 0x0f;
  161. *(s++) = NIBBLE_TO_ASCII (c1);
  162. c1 = (c >> 24) & 0x0f;
  163. *(s++) = NIBBLE_TO_ASCII (c1);
  164. c1 = (c >> 20) & 0x0f;
  165. *(s++) = NIBBLE_TO_ASCII (c1);
  166. c1 = (c >> 16) & 0x0f;
  167. *(s++) = NIBBLE_TO_ASCII (c1);
  168. c1 = (c >> 12) & 0x0f;
  169. *(s++) = NIBBLE_TO_ASCII (c1);
  170. c1 = (c >> 8) & 0x0f;
  171. *(s++) = NIBBLE_TO_ASCII (c1);
  172. c1 = (c >> 4) & 0x0f;
  173. *(s++) = NIBBLE_TO_ASCII (c1);
  174. c1 = c & 0x0f;
  175. *(s++) = NIBBLE_TO_ASCII (c1);
  176. *s = 0;
  177. return s;
  178. }
  179. static char *ctoh(char c, char *s)
  180. {
  181. char c1;
  182. c1 = (c >> 4) & 0x0f;
  183. *(s++) = NIBBLE_TO_ASCII (c1);
  184. c1 = c & 0x0f;
  185. *(s++) = NIBBLE_TO_ASCII (c1);
  186. *s = 0;
  187. return s;
  188. }
  189. static void hexdump(unsigned char *s, unsigned long l)
  190. {
  191. char bfr[80];
  192. char *pb;
  193. unsigned long i, n = 0;
  194. if (l == 0)
  195. return;
  196. while (n < l) {
  197. pb = bfr;
  198. pb = ltoh (n, pb);
  199. *(pb++) = ':';
  200. *(pb++) = ' ';
  201. for (i = 0; i < 16; i++) {
  202. if (n + i >= l) {
  203. *(pb++) = ' ';
  204. *(pb++) = ' ';
  205. } else
  206. pb = ctoh (*(s + i), pb);
  207. *(pb++) = ' ';
  208. }
  209. *(pb++) = ' ';
  210. for (i = 0; i < 16; i++) {
  211. if (n + i >= l)
  212. break;
  213. else
  214. *(pb++) = (isprint (*(s + i)) ? *(s + i) : '.');
  215. }
  216. *pb = 0;
  217. n += 16;
  218. s += 16;
  219. puts(bfr);
  220. }
  221. }
  222. static int getopts(int sk, struct l2cap_options *opts, bool connected)
  223. {
  224. socklen_t optlen;
  225. int err;
  226. memset(opts, 0, sizeof(*opts));
  227. if (bdaddr_type == BDADDR_BREDR || rfcmode) {
  228. optlen = sizeof(*opts);
  229. return getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, opts, &optlen);
  230. }
  231. optlen = sizeof(opts->imtu);
  232. err = getsockopt(sk, SOL_BLUETOOTH, BT_RCVMTU, &opts->imtu, &optlen);
  233. if (err < 0 || !connected)
  234. return err;
  235. optlen = sizeof(opts->omtu);
  236. return getsockopt(sk, SOL_BLUETOOTH, BT_SNDMTU, &opts->omtu, &optlen);
  237. }
  238. static int setopts(int sk, struct l2cap_options *opts)
  239. {
  240. if (bdaddr_type == BDADDR_BREDR)
  241. return setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, opts,
  242. sizeof(*opts));
  243. if (opts->mode) {
  244. if (setsockopt(sk, SOL_BLUETOOTH, BT_MODE, &opts->mode,
  245. sizeof(opts->mode)) < 0) {
  246. return -errno;
  247. }
  248. }
  249. return setsockopt(sk, SOL_BLUETOOTH, BT_RCVMTU, &opts->imtu,
  250. sizeof(opts->imtu));
  251. }
  252. bool use_color(void)
  253. {
  254. return false;
  255. }
  256. static const struct bitfield_data phy_table[] = {
  257. { 0, "BR1M1SLOT" },
  258. { 1, "BR1M3SLOT" },
  259. { 2, "BR1M5SLOT" },
  260. { 3, "EDR2M1SLOT" },
  261. { 4, "EDR2M3SLOT" },
  262. { 5, "EDR2M5SLOT" },
  263. { 6, "EDR3M1SLOT" },
  264. { 7, "EDR3M3SLOT" },
  265. { 8, "EDR3M5SLOT" },
  266. { 9, "LE1MTX" },
  267. { 10, "LE1MRX" },
  268. { 11, "LE2MTX" },
  269. { 12, "LE2MRX" },
  270. { 13, "LECODEDTX" },
  271. { 14, "LECODEDRX" },
  272. {},
  273. };
  274. static int print_info(int sk, struct l2cap_options *opts)
  275. {
  276. struct sockaddr_l2 addr;
  277. socklen_t optlen;
  278. struct l2cap_conninfo conn;
  279. int prio, phy;
  280. char ba[18];
  281. /* Get connection information */
  282. memset(&conn, 0, sizeof(conn));
  283. optlen = sizeof(conn);
  284. if (getsockopt(sk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &optlen) < 0) {
  285. syslog(LOG_ERR, "Can't get L2CAP connection information: "
  286. "%s (%d)", strerror(errno), errno);
  287. return -errno;
  288. }
  289. if (getsockopt(sk, SOL_SOCKET, SO_PRIORITY, &prio, &optlen) < 0) {
  290. syslog(LOG_ERR, "Can't get socket priority: %s (%d)",
  291. strerror(errno), errno);
  292. return -errno;
  293. }
  294. /* Check for remote address */
  295. memset(&addr, 0, sizeof(addr));
  296. optlen = sizeof(addr);
  297. if (getpeername(sk, (struct sockaddr *) &addr, &optlen) < 0) {
  298. syslog(LOG_ERR, "Can't get socket name: %s (%d)",
  299. strerror(errno), errno);
  300. return -errno;
  301. }
  302. ba2str(&addr.l2_bdaddr, ba);
  303. syslog(LOG_INFO, "Connected to %s (%s, psm %d, dcid %d)", ba,
  304. get_lookup_str(bdaddr_types, addr.l2_bdaddr_type),
  305. addr.l2_psm, addr.l2_cid);
  306. /* Check for socket address */
  307. memset(&addr, 0, sizeof(addr));
  308. optlen = sizeof(addr);
  309. if (getsockname(sk, (struct sockaddr *) &addr, &optlen) < 0) {
  310. syslog(LOG_ERR, "Can't get socket name: %s (%d)",
  311. strerror(errno), errno);
  312. return -errno;
  313. }
  314. ba2str(&addr.l2_bdaddr, ba);
  315. syslog(LOG_INFO, "Local device %s (%s, psm %d, scid %d)", ba,
  316. get_lookup_str(bdaddr_types, addr.l2_bdaddr_type),
  317. addr.l2_psm, addr.l2_cid);
  318. syslog(LOG_INFO, "Options [imtu %d, omtu %d, flush_to %d, mode %d, "
  319. "handle %d, class 0x%02x%02x%02x, priority %d, rcvbuf %d]",
  320. opts->imtu, opts->omtu, opts->flush_to, opts->mode,
  321. conn.hci_handle, conn.dev_class[2], conn.dev_class[1],
  322. conn.dev_class[0], prio, rcvbuf);
  323. if (!getsockopt(sk, SOL_BLUETOOTH, BT_PHY, &phy, &optlen)) {
  324. syslog(LOG_INFO, "Supported PHY: 0x%08x", phy);
  325. print_bitfield(2, phy, phy_table);
  326. }
  327. return 0;
  328. }
  329. static int do_connect(char *svr)
  330. {
  331. struct sockaddr_l2 addr;
  332. struct l2cap_options opts;
  333. socklen_t optlen;
  334. int sk, opt;
  335. /* Create socket */
  336. sk = socket(PF_BLUETOOTH, socktype, BTPROTO_L2CAP);
  337. if (sk < 0) {
  338. syslog(LOG_ERR, "Can't create socket: %s (%d)",
  339. strerror(errno), errno);
  340. return -1;
  341. }
  342. /* Bind to local address */
  343. memset(&addr, 0, sizeof(addr));
  344. addr.l2_family = AF_BLUETOOTH;
  345. bacpy(&addr.l2_bdaddr, &bdaddr);
  346. addr.l2_bdaddr_type = bdaddr_type;
  347. if (cid)
  348. addr.l2_cid = htobs(cid);
  349. if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
  350. syslog(LOG_ERR, "Can't bind socket: %s (%d)",
  351. strerror(errno), errno);
  352. goto error;
  353. }
  354. /* Get default options */
  355. if (getopts(sk, &opts, false) < 0) {
  356. syslog(LOG_ERR, "Can't get default L2CAP options: %s (%d)",
  357. strerror(errno), errno);
  358. goto error;
  359. }
  360. /* Set new options */
  361. opts.omtu = omtu;
  362. opts.imtu = imtu;
  363. opts.mode = rfcmode;
  364. opts.fcs = fcs;
  365. opts.txwin_size = txwin_size;
  366. opts.max_tx = max_transmit;
  367. if (setopts(sk, &opts) < 0) {
  368. syslog(LOG_ERR, "Can't set L2CAP options: %s (%d)",
  369. strerror(errno), errno);
  370. goto error;
  371. }
  372. #if 0
  373. /* Enable SO_TIMESTAMP */
  374. if (timestamp) {
  375. int t = 1;
  376. if (setsockopt(sk, SOL_SOCKET, SO_TIMESTAMP, &t, sizeof(t)) < 0) {
  377. syslog(LOG_ERR, "Can't enable SO_TIMESTAMP: %s (%d)",
  378. strerror(errno), errno);
  379. goto error;
  380. }
  381. }
  382. #endif
  383. if (chan_policy != -1) {
  384. if (setsockopt(sk, SOL_BLUETOOTH, BT_CHANNEL_POLICY,
  385. &chan_policy, sizeof(chan_policy)) < 0) {
  386. syslog(LOG_ERR, "Can't enable chan policy : %s (%d)",
  387. strerror(errno), errno);
  388. goto error;
  389. }
  390. }
  391. /* Enable SO_LINGER */
  392. if (linger) {
  393. struct linger l = { .l_onoff = 1, .l_linger = linger };
  394. if (setsockopt(sk, SOL_SOCKET, SO_LINGER, &l, sizeof(l)) < 0) {
  395. syslog(LOG_ERR, "Can't enable SO_LINGER: %s (%d)",
  396. strerror(errno), errno);
  397. goto error;
  398. }
  399. }
  400. /* Set link mode */
  401. opt = 0;
  402. if (reliable)
  403. opt |= L2CAP_LM_RELIABLE;
  404. if (central)
  405. opt |= L2CAP_LM_MASTER;
  406. if (auth)
  407. opt |= L2CAP_LM_AUTH;
  408. if (encr)
  409. opt |= L2CAP_LM_ENCRYPT;
  410. if (secure)
  411. opt |= L2CAP_LM_SECURE;
  412. if (setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) {
  413. syslog(LOG_ERR, "Can't set L2CAP link mode: %s (%d)",
  414. strerror(errno), errno);
  415. goto error;
  416. }
  417. /* Set receive buffer size */
  418. if (rcvbuf && setsockopt(sk, SOL_SOCKET, SO_RCVBUF,
  419. &rcvbuf, sizeof(rcvbuf)) < 0) {
  420. syslog(LOG_ERR, "Can't set socket rcv buf size: %s (%d)",
  421. strerror(errno), errno);
  422. goto error;
  423. }
  424. optlen = sizeof(rcvbuf);
  425. if (getsockopt(sk, SOL_SOCKET, SO_RCVBUF, &rcvbuf, &optlen) < 0) {
  426. syslog(LOG_ERR, "Can't get socket rcv buf size: %s (%d)",
  427. strerror(errno), errno);
  428. goto error;
  429. }
  430. /* Connect to remote device */
  431. memset(&addr, 0, sizeof(addr));
  432. addr.l2_family = AF_BLUETOOTH;
  433. str2ba(svr, &addr.l2_bdaddr);
  434. addr.l2_bdaddr_type = bdaddr_type;
  435. if (cid)
  436. addr.l2_cid = htobs(cid);
  437. else if (psm)
  438. addr.l2_psm = htobs(psm);
  439. else
  440. goto error;
  441. if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) {
  442. syslog(LOG_ERR, "Can't connect: %s (%d)",
  443. strerror(errno), errno);
  444. goto error;
  445. }
  446. /* Get current options */
  447. if (getopts(sk, &opts, true) < 0) {
  448. syslog(LOG_ERR, "Can't get L2CAP options: %s (%d)",
  449. strerror(errno), errno);
  450. goto error;
  451. }
  452. if (print_info(sk, &opts) < 0)
  453. goto error;
  454. omtu = (opts.omtu > buffer_size) ? buffer_size : opts.omtu;
  455. imtu = (opts.imtu > buffer_size) ? buffer_size : opts.imtu;
  456. return sk;
  457. error:
  458. close(sk);
  459. return -1;
  460. }
  461. static void do_listen(void (*handler)(int sk))
  462. {
  463. struct sockaddr_l2 addr;
  464. struct l2cap_options opts;
  465. socklen_t optlen;
  466. int sk, nsk, opt;
  467. /* Create socket */
  468. sk = socket(PF_BLUETOOTH, socktype, BTPROTO_L2CAP);
  469. if (sk < 0) {
  470. syslog(LOG_ERR, "Can't create socket: %s (%d)",
  471. strerror(errno), errno);
  472. exit(1);
  473. }
  474. /* Bind to local address */
  475. memset(&addr, 0, sizeof(addr));
  476. addr.l2_family = AF_BLUETOOTH;
  477. bacpy(&addr.l2_bdaddr, &bdaddr);
  478. addr.l2_bdaddr_type = bdaddr_type;
  479. if (cid)
  480. addr.l2_cid = htobs(cid);
  481. else if (psm)
  482. addr.l2_psm = htobs(psm);
  483. if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
  484. syslog(LOG_ERR, "Can't bind socket: %s (%d)",
  485. strerror(errno), errno);
  486. goto error;
  487. }
  488. /* Set link mode */
  489. opt = 0;
  490. if (reliable)
  491. opt |= L2CAP_LM_RELIABLE;
  492. if (central)
  493. opt |= L2CAP_LM_MASTER;
  494. if (auth)
  495. opt |= L2CAP_LM_AUTH;
  496. if (encr)
  497. opt |= L2CAP_LM_ENCRYPT;
  498. if (secure)
  499. opt |= L2CAP_LM_SECURE;
  500. if (opt && setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) {
  501. syslog(LOG_ERR, "Can't set L2CAP link mode: %s (%d)",
  502. strerror(errno), errno);
  503. goto error;
  504. }
  505. /* Get default options */
  506. if (getopts(sk, &opts, false) < 0) {
  507. syslog(LOG_ERR, "Can't get default L2CAP options: %s (%d)",
  508. strerror(errno), errno);
  509. goto error;
  510. }
  511. /* Set new options */
  512. opts.omtu = omtu;
  513. opts.imtu = imtu;
  514. if (rfcmode > 0)
  515. opts.mode = rfcmode;
  516. opts.fcs = fcs;
  517. opts.txwin_size = txwin_size;
  518. opts.max_tx = max_transmit;
  519. if (setopts(sk, &opts) < 0) {
  520. syslog(LOG_ERR, "Can't set L2CAP options: %s (%d)",
  521. strerror(errno), errno);
  522. goto error;
  523. }
  524. if (socktype == SOCK_DGRAM) {
  525. handler(sk);
  526. close(sk);
  527. return;
  528. }
  529. /* Enable deferred setup */
  530. opt = defer_setup;
  531. if (opt && setsockopt(sk, SOL_BLUETOOTH, BT_DEFER_SETUP,
  532. &opt, sizeof(opt)) < 0) {
  533. syslog(LOG_ERR, "Can't enable deferred setup : %s (%d)",
  534. strerror(errno), errno);
  535. goto error;
  536. }
  537. /* Listen for connections */
  538. if (listen(sk, 10)) {
  539. syslog(LOG_ERR, "Can not listen on the socket: %s (%d)",
  540. strerror(errno), errno);
  541. goto error;
  542. }
  543. /* Check for socket address */
  544. memset(&addr, 0, sizeof(addr));
  545. optlen = sizeof(addr);
  546. if (getsockname(sk, (struct sockaddr *) &addr, &optlen) < 0) {
  547. syslog(LOG_ERR, "Can't get socket name: %s (%d)",
  548. strerror(errno), errno);
  549. goto error;
  550. }
  551. psm = btohs(addr.l2_psm);
  552. cid = btohs(addr.l2_cid);
  553. syslog(LOG_INFO, "Waiting for connection on psm %d ...", psm);
  554. while (1) {
  555. memset(&addr, 0, sizeof(addr));
  556. optlen = sizeof(addr);
  557. nsk = accept(sk, (struct sockaddr *) &addr, &optlen);
  558. if (nsk < 0) {
  559. syslog(LOG_ERR, "Accept failed: %s (%d)",
  560. strerror(errno), errno);
  561. goto error;
  562. }
  563. if (fork()) {
  564. /* Parent */
  565. close(nsk);
  566. continue;
  567. }
  568. /* Child */
  569. /* Set receive buffer size */
  570. if (rcvbuf && setsockopt(nsk, SOL_SOCKET, SO_RCVBUF, &rcvbuf,
  571. sizeof(rcvbuf)) < 0) {
  572. syslog(LOG_ERR, "Can't set rcv buf size: %s (%d)",
  573. strerror(errno), errno);
  574. goto error;
  575. }
  576. optlen = sizeof(rcvbuf);
  577. if (getsockopt(nsk, SOL_SOCKET, SO_RCVBUF, &rcvbuf, &optlen)
  578. < 0) {
  579. syslog(LOG_ERR, "Can't get rcv buf size: %s (%d)",
  580. strerror(errno), errno);
  581. goto error;
  582. }
  583. /* Get current options */
  584. if (getopts(nsk, &opts, true) < 0) {
  585. syslog(LOG_ERR, "Can't get L2CAP options: %s (%d)",
  586. strerror(errno), errno);
  587. if (!defer_setup) {
  588. close(nsk);
  589. goto error;
  590. }
  591. }
  592. if (print_info(nsk, &opts) < 0) {
  593. close(nsk);
  594. goto error;
  595. }
  596. omtu = (opts.omtu > buffer_size) ? buffer_size : opts.omtu;
  597. imtu = (opts.imtu > buffer_size) ? buffer_size : opts.imtu;
  598. #if 0
  599. /* Enable SO_TIMESTAMP */
  600. if (timestamp) {
  601. int t = 1;
  602. if (setsockopt(nsk, SOL_SOCKET, SO_TIMESTAMP, &t, sizeof(t)) < 0) {
  603. syslog(LOG_ERR, "Can't enable SO_TIMESTAMP: %s (%d)",
  604. strerror(errno), errno);
  605. goto error;
  606. }
  607. }
  608. #endif
  609. /* Enable SO_LINGER */
  610. if (linger) {
  611. struct linger l = { .l_onoff = 1, .l_linger = linger };
  612. if (setsockopt(nsk, SOL_SOCKET, SO_LINGER, &l, sizeof(l)) < 0) {
  613. syslog(LOG_ERR, "Can't enable SO_LINGER: %s (%d)",
  614. strerror(errno), errno);
  615. close(nsk);
  616. goto error;
  617. }
  618. }
  619. /* Handle deferred setup */
  620. if (defer_setup) {
  621. syslog(LOG_INFO, "Waiting for %d seconds",
  622. abs(defer_setup) - 1);
  623. sleep(abs(defer_setup) - 1);
  624. if (defer_setup < 0) {
  625. close(nsk);
  626. goto error;
  627. }
  628. }
  629. handler(nsk);
  630. close(sk);
  631. syslog(LOG_INFO, "Disconnect: %m");
  632. exit(0);
  633. }
  634. error:
  635. close(sk);
  636. exit(1);
  637. }
  638. static void dump_mode(int sk)
  639. {
  640. socklen_t optlen;
  641. int opt, len;
  642. if (data_size < 0)
  643. data_size = imtu;
  644. if (defer_setup) {
  645. len = read(sk, buf, data_size);
  646. if (len < 0)
  647. syslog(LOG_ERR, "Initial read error: %s (%d)",
  648. strerror(errno), errno);
  649. else
  650. syslog(LOG_INFO, "Initial bytes %d", len);
  651. }
  652. syslog(LOG_INFO, "Receiving ...");
  653. while (1) {
  654. fd_set rset;
  655. FD_ZERO(&rset);
  656. FD_SET(sk, &rset);
  657. if (select(sk + 1, &rset, NULL, NULL, NULL) < 0)
  658. return;
  659. if (!FD_ISSET(sk, &rset))
  660. continue;
  661. len = read(sk, buf, data_size);
  662. if (len <= 0) {
  663. if (len < 0) {
  664. if (reliable && (errno == ECOMM)) {
  665. syslog(LOG_INFO, "L2CAP Error ECOMM - clearing error and continuing.");
  666. optlen = sizeof(opt);
  667. if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) {
  668. syslog(LOG_ERR, "Couldn't getsockopt(SO_ERROR): %s (%d)",
  669. strerror(errno), errno);
  670. return;
  671. }
  672. continue;
  673. } else {
  674. syslog(LOG_ERR, "Read error: %s(%d)",
  675. strerror(errno), errno);
  676. }
  677. }
  678. return;
  679. }
  680. syslog(LOG_INFO, "Received %d bytes", len);
  681. hexdump(buf, len);
  682. }
  683. }
  684. static void recv_mode(int sk)
  685. {
  686. struct timeval tv_beg, tv_end, tv_diff;
  687. struct pollfd p;
  688. char ts[30];
  689. long total;
  690. uint32_t seq;
  691. socklen_t optlen;
  692. int opt, len;
  693. if (data_size < 0)
  694. data_size = imtu;
  695. if (defer_setup) {
  696. len = read(sk, buf, data_size);
  697. if (len < 0)
  698. syslog(LOG_ERR, "Initial read error: %s (%d)",
  699. strerror(errno), errno);
  700. else
  701. syslog(LOG_INFO, "Initial bytes %d", len);
  702. }
  703. if (recv_delay)
  704. usleep(recv_delay);
  705. syslog(LOG_INFO, "Receiving ...");
  706. memset(ts, 0, sizeof(ts));
  707. p.fd = sk;
  708. p.events = POLLIN | POLLERR | POLLHUP;
  709. seq = 0;
  710. while (1) {
  711. gettimeofday(&tv_beg, NULL);
  712. total = 0;
  713. while (total < data_size) {
  714. uint32_t sq;
  715. uint16_t l;
  716. int i;
  717. p.revents = 0;
  718. if (poll(&p, 1, -1) <= 0)
  719. return;
  720. if (p.revents & (POLLERR | POLLHUP))
  721. return;
  722. len = recv(sk, buf, data_size, 0);
  723. if (len < 0) {
  724. if (reliable && (errno == ECOMM)) {
  725. syslog(LOG_INFO, "L2CAP Error ECOMM - clearing error and continuing.\n");
  726. optlen = sizeof(opt);
  727. if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) {
  728. syslog(LOG_ERR, "Couldn't getsockopt(SO_ERROR): %s (%d)",
  729. strerror(errno), errno);
  730. return;
  731. }
  732. continue;
  733. } else {
  734. syslog(LOG_ERR, "Read failed: %s (%d)",
  735. strerror(errno), errno);
  736. }
  737. }
  738. if (len < 6)
  739. break;
  740. if (timestamp) {
  741. struct timeval tv;
  742. if (ioctl(sk, SIOCGSTAMP_OLD, &tv) < 0) {
  743. timestamp = 0;
  744. memset(ts, 0, sizeof(ts));
  745. } else {
  746. sprintf(ts, "[%ld.%ld] ",
  747. tv.tv_sec, tv.tv_usec);
  748. }
  749. }
  750. /* Check sequence */
  751. sq = get_le32(buf);
  752. if (seq != sq) {
  753. syslog(LOG_INFO, "seq missmatch: %d -> %d", seq, sq);
  754. seq = sq;
  755. }
  756. seq++;
  757. /* Check length */
  758. l = get_le16(buf + 4);
  759. if (len != l) {
  760. syslog(LOG_INFO, "size missmatch: %d -> %d", len, l);
  761. continue;
  762. }
  763. /* Verify data */
  764. for (i = 6; i < len; i++) {
  765. if (buf[i] != 0x7f)
  766. syslog(LOG_INFO, "data missmatch: byte %d 0x%2.2x", i, buf[i]);
  767. }
  768. total += len;
  769. }
  770. gettimeofday(&tv_end, NULL);
  771. timersub(&tv_end, &tv_beg, &tv_diff);
  772. syslog(LOG_INFO,"%s%ld bytes in %.2f sec, %.2f kB/s", ts, total,
  773. tv2fl(tv_diff), (float)(total / tv2fl(tv_diff) ) / 1024.0);
  774. }
  775. }
  776. static void do_send(int sk)
  777. {
  778. uint32_t seq;
  779. int i, fd, len, buflen, size, sent;
  780. syslog(LOG_INFO, "Sending ...");
  781. if (data_size < 0)
  782. data_size = omtu;
  783. if (filename) {
  784. fd = open(filename, O_RDONLY);
  785. if (fd < 0) {
  786. syslog(LOG_ERR, "Open failed: %s (%d)",
  787. strerror(errno), errno);
  788. exit(1);
  789. }
  790. sent = 0;
  791. size = read(fd, buf, data_size);
  792. while (size > 0) {
  793. buflen = (size > omtu) ? omtu : size;
  794. len = send(sk, buf + sent, buflen, 0);
  795. sent += len;
  796. size -= len;
  797. }
  798. close(fd);
  799. return;
  800. } else {
  801. for (i = 6; i < data_size; i++)
  802. buf[i] = 0x7f;
  803. }
  804. if (!count && send_delay)
  805. usleep(send_delay);
  806. seq = seq_start;
  807. while ((num_frames == -1) || (num_frames-- > 0)) {
  808. put_le32(seq, buf);
  809. put_le16(data_size, buf + 4);
  810. seq++;
  811. sent = 0;
  812. size = data_size;
  813. while (size > 0) {
  814. buflen = (size > omtu) ? omtu : size;
  815. len = send(sk, buf, buflen, 0);
  816. if (len < 0 || len != buflen) {
  817. syslog(LOG_ERR, "Send failed: %s (%d)",
  818. strerror(errno), errno);
  819. exit(1);
  820. }
  821. sent += len;
  822. size -= len;
  823. }
  824. if (num_frames && send_delay && count &&
  825. !(seq % (count + seq_start)))
  826. usleep(send_delay);
  827. }
  828. }
  829. static void send_mode(int sk)
  830. {
  831. do_send(sk);
  832. if (disc_delay)
  833. usleep(disc_delay);
  834. syslog(LOG_INFO, "Closing channel ...");
  835. if (shutdown(sk, SHUT_RDWR) < 0)
  836. syslog(LOG_INFO, "Close failed: %m");
  837. else
  838. syslog(LOG_INFO, "Done");
  839. }
  840. static void senddump_mode(int sk)
  841. {
  842. do_send(sk);
  843. dump_mode(sk);
  844. }
  845. static void send_and_recv_mode(int sk)
  846. {
  847. int flags;
  848. if ((flags = fcntl(sk, F_GETFL, 0)) < 0)
  849. flags = 0;
  850. fcntl(sk, F_SETFL, flags | O_NONBLOCK);
  851. /* fork for duplex channel */
  852. if (fork())
  853. send_mode(sk);
  854. else
  855. recv_mode(sk);
  856. return;
  857. }
  858. static void reconnect_mode(char *svr)
  859. {
  860. while (1) {
  861. int sk = do_connect(svr);
  862. close(sk);
  863. }
  864. }
  865. static void connect_mode(char *svr)
  866. {
  867. struct pollfd p;
  868. int sk;
  869. if ((sk = do_connect(svr)) < 0)
  870. exit(1);
  871. p.fd = sk;
  872. p.events = POLLERR | POLLHUP;
  873. while (1) {
  874. p.revents = 0;
  875. if (poll(&p, 1, 500))
  876. break;
  877. }
  878. syslog(LOG_INFO, "Disconnected");
  879. close(sk);
  880. }
  881. static void multi_connect_mode(int argc, char *argv[])
  882. {
  883. int i, n, sk;
  884. while (1) {
  885. for (n = 0; n < argc; n++) {
  886. for (i = 0; i < count; i++) {
  887. if (fork())
  888. continue;
  889. /* Child */
  890. sk = do_connect(argv[n]);
  891. usleep(500);
  892. close(sk);
  893. exit(0);
  894. }
  895. }
  896. sleep(4);
  897. }
  898. }
  899. static void info_request(char *svr)
  900. {
  901. unsigned char buf[48];
  902. l2cap_cmd_hdr *cmd = (l2cap_cmd_hdr *) buf;
  903. l2cap_info_req *req = (l2cap_info_req *) (buf + L2CAP_CMD_HDR_SIZE);
  904. l2cap_info_rsp *rsp = (l2cap_info_rsp *) (buf + L2CAP_CMD_HDR_SIZE);
  905. uint16_t mtu;
  906. uint32_t channels, mask = 0x0000;
  907. struct sockaddr_l2 addr;
  908. int sk, err;
  909. sk = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_L2CAP);
  910. if (sk < 0) {
  911. perror("Can't create socket");
  912. return;
  913. }
  914. memset(&addr, 0, sizeof(addr));
  915. addr.l2_family = AF_BLUETOOTH;
  916. bacpy(&addr.l2_bdaddr, &bdaddr);
  917. addr.l2_bdaddr_type = bdaddr_type;
  918. if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
  919. perror("Can't bind socket");
  920. goto failed;
  921. }
  922. memset(&addr, 0, sizeof(addr));
  923. addr.l2_family = AF_BLUETOOTH;
  924. str2ba(svr, &addr.l2_bdaddr);
  925. addr.l2_bdaddr_type = bdaddr_type;
  926. if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) {
  927. perror("Can't connect socket");
  928. goto failed;
  929. }
  930. memset(buf, 0, sizeof(buf));
  931. cmd->code = L2CAP_INFO_REQ;
  932. cmd->ident = 141;
  933. cmd->len = htobs(2);
  934. req->type = htobs(0x0001);
  935. if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) {
  936. perror("Can't send info request");
  937. goto failed;
  938. }
  939. err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 2, 0);
  940. if (err < 0) {
  941. perror("Can't receive info response");
  942. goto failed;
  943. }
  944. switch (btohs(rsp->result)) {
  945. case 0x0000:
  946. memcpy(&mtu, rsp->data, sizeof(mtu));
  947. printf("Connectionless MTU size is %d\n", btohs(mtu));
  948. break;
  949. case 0x0001:
  950. printf("Connectionless MTU is not supported\n");
  951. break;
  952. }
  953. memset(buf, 0, sizeof(buf));
  954. cmd->code = L2CAP_INFO_REQ;
  955. cmd->ident = 142;
  956. cmd->len = htobs(2);
  957. req->type = htobs(0x0002);
  958. if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) {
  959. perror("Can't send info request");
  960. goto failed;
  961. }
  962. err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 4, 0);
  963. if (err < 0) {
  964. perror("Can't receive info response");
  965. goto failed;
  966. }
  967. switch (btohs(rsp->result)) {
  968. case 0x0000:
  969. memcpy(&mask, rsp->data, sizeof(mask));
  970. printf("Extended feature mask is 0x%04x\n", btohl(mask));
  971. if (mask & L2CAP_FEAT_FLOWCTL)
  972. printf(" Flow control mode\n");
  973. if (mask & L2CAP_FEAT_RETRANS)
  974. printf(" Retransmission mode\n");
  975. if (mask & L2CAP_FEAT_BIDIR_QOS)
  976. printf(" Bi-directional QoS\n");
  977. if (mask & L2CAP_FEAT_ERTM)
  978. printf(" Enhanced Retransmission mode\n");
  979. if (mask & L2CAP_FEAT_STREAMING)
  980. printf(" Streaming mode\n");
  981. if (mask & L2CAP_FEAT_FCS)
  982. printf(" FCS Option\n");
  983. if (mask & L2CAP_FEAT_EXT_FLOW)
  984. printf(" Extended Flow Specification\n");
  985. if (mask & L2CAP_FEAT_FIXED_CHAN)
  986. printf(" Fixed Channels\n");
  987. if (mask & L2CAP_FEAT_EXT_WINDOW)
  988. printf(" Extended Window Size\n");
  989. if (mask & L2CAP_FEAT_UCD)
  990. printf(" Unicast Connectionless Data Reception\n");
  991. break;
  992. case 0x0001:
  993. printf("Extended feature mask is not supported\n");
  994. break;
  995. }
  996. if (!(mask & 0x80))
  997. goto failed;
  998. memset(buf, 0, sizeof(buf));
  999. cmd->code = L2CAP_INFO_REQ;
  1000. cmd->ident = 143;
  1001. cmd->len = htobs(2);
  1002. req->type = htobs(0x0003);
  1003. if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) {
  1004. perror("Can't send info request");
  1005. goto failed;
  1006. }
  1007. err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 8, 0);
  1008. if (err < 0) {
  1009. perror("Can't receive info response");
  1010. goto failed;
  1011. }
  1012. switch (btohs(rsp->result)) {
  1013. case 0x0000:
  1014. memcpy(&channels, rsp->data, sizeof(channels));
  1015. printf("Fixed channels list is 0x%04x\n", btohl(channels));
  1016. break;
  1017. case 0x0001:
  1018. printf("Fixed channels list is not supported\n");
  1019. break;
  1020. }
  1021. failed:
  1022. close(sk);
  1023. }
  1024. static void do_pairing(char *svr)
  1025. {
  1026. struct sockaddr_l2 addr;
  1027. int sk, opt;
  1028. sk = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_L2CAP);
  1029. if (sk < 0) {
  1030. perror("Can't create socket");
  1031. return;
  1032. }
  1033. memset(&addr, 0, sizeof(addr));
  1034. addr.l2_family = AF_BLUETOOTH;
  1035. bacpy(&addr.l2_bdaddr, &bdaddr);
  1036. addr.l2_bdaddr_type = bdaddr_type;
  1037. if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
  1038. perror("Can't bind socket");
  1039. goto failed;
  1040. }
  1041. if (secure)
  1042. opt = L2CAP_LM_SECURE;
  1043. else
  1044. opt = L2CAP_LM_ENCRYPT;
  1045. if (setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) {
  1046. perror("Can't set link mode");
  1047. goto failed;
  1048. }
  1049. memset(&addr, 0, sizeof(addr));
  1050. addr.l2_family = AF_BLUETOOTH;
  1051. str2ba(svr, &addr.l2_bdaddr);
  1052. addr.l2_bdaddr_type = bdaddr_type;
  1053. if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) {
  1054. perror("Can't connect socket");
  1055. goto failed;
  1056. }
  1057. printf("Pairing successful\n");
  1058. failed:
  1059. close(sk);
  1060. }
  1061. static void usage(void)
  1062. {
  1063. printf("l2test - L2CAP testing\n"
  1064. "Usage:\n");
  1065. printf("\tl2test <mode> [options] [bdaddr]\n");
  1066. printf("Modes:\n"
  1067. "\t-r listen and receive\n"
  1068. "\t-w listen and send\n"
  1069. "\t-d listen and dump incoming data\n"
  1070. "\t-x listen, then send, then dump incoming data\n"
  1071. "\t-t listen, then send and receive at the same time\n"
  1072. "\t-q connect, then send and receive at the same time\n"
  1073. "\t-s connect and send\n"
  1074. "\t-u connect and receive\n"
  1075. "\t-n connect and be silent\n"
  1076. "\t-y connect, then send, then dump incoming data\n"
  1077. "\t-c connect, disconnect, connect, ...\n"
  1078. "\t-m multiple connects\n"
  1079. "\t-p trigger dedicated bonding\n"
  1080. "\t-z information request\n");
  1081. printf("Options:\n"
  1082. "\t[-b bytes] [-i device] [-P psm] [-J cid]\n"
  1083. "\t[-I imtu] [-O omtu]\n"
  1084. "\t[-L seconds] enable SO_LINGER\n"
  1085. "\t[-W seconds] enable deferred setup\n"
  1086. "\t[-B filename] use data packets from file\n"
  1087. "\t[-N num] send num frames (default = infinite)\n"
  1088. "\t[-C num] send num frames before delay (default = 1)\n"
  1089. "\t[-D milliseconds] delay after sending num frames (default = 0)\n"
  1090. "\t[-K milliseconds] delay before receiving (default = 0)\n"
  1091. "\t[-g milliseconds] delay before disconnecting (default = 0)\n"
  1092. "\t[-X mode] l2cap mode (help for list, default = basic)\n"
  1093. "\t[-a policy] chan policy (help for list, default = bredr)\n"
  1094. "\t[-F fcs] use CRC16 check (default = 1)\n"
  1095. "\t[-Q num] Max Transmit value (default = 3)\n"
  1096. "\t[-Z size] Transmission Window size (default = 63)\n"
  1097. "\t[-Y priority] socket priority\n"
  1098. "\t[-H size] Maximum receive buffer size\n"
  1099. "\t[-R] reliable mode\n"
  1100. "\t[-G] use connectionless channel (datagram)\n"
  1101. "\t[-U] use sock stream\n"
  1102. "\t[-A] request authentication\n"
  1103. "\t[-E] request encryption\n"
  1104. "\t[-S] secure connection\n"
  1105. "\t[-M] become central\n"
  1106. "\t[-T] enable timestamps\n"
  1107. "\t[-V type] address type (help for list, default = bredr)\n"
  1108. "\t[-e seq] initial sequence value (default = 0)\n");
  1109. }
  1110. int main(int argc, char *argv[])
  1111. {
  1112. struct sigaction sa;
  1113. int opt, sk, mode = RECV, need_addr = 0;
  1114. bacpy(&bdaddr, BDADDR_ANY);
  1115. while ((opt = getopt(argc, argv, "a:b:cde:g:i:mnpqrstuwxyz"
  1116. "AB:C:D:EF:GH:I:J:K:L:MN:O:P:Q:RSTUV:W:X:Y:Z:")) != EOF) {
  1117. switch (opt) {
  1118. case 'r':
  1119. mode = RECV;
  1120. break;
  1121. case 's':
  1122. mode = SEND;
  1123. need_addr = 1;
  1124. break;
  1125. case 'w':
  1126. mode = LSEND;
  1127. break;
  1128. case 'u':
  1129. mode = CRECV;
  1130. need_addr = 1;
  1131. break;
  1132. case 'd':
  1133. mode = DUMP;
  1134. break;
  1135. case 'c':
  1136. mode = RECONNECT;
  1137. need_addr = 1;
  1138. break;
  1139. case 'n':
  1140. mode = CONNECT;
  1141. need_addr = 1;
  1142. break;
  1143. case 'm':
  1144. mode = MULTY;
  1145. need_addr = 1;
  1146. break;
  1147. case 't':
  1148. mode = LSENDRECV;
  1149. break;
  1150. case 'q':
  1151. mode = CSENDRECV;
  1152. need_addr = 1;
  1153. break;
  1154. case 'x':
  1155. mode = LSENDDUMP;
  1156. break;
  1157. case 'y':
  1158. mode = SENDDUMP;
  1159. break;
  1160. case 'z':
  1161. mode = INFOREQ;
  1162. need_addr = 1;
  1163. break;
  1164. case 'p':
  1165. mode = PAIRING;
  1166. need_addr = 1;
  1167. break;
  1168. case 'b':
  1169. data_size = atoi(optarg);
  1170. break;
  1171. case 'i':
  1172. if (!strncasecmp(optarg, "hci", 3))
  1173. hci_devba(atoi(optarg + 3), &bdaddr);
  1174. else
  1175. str2ba(optarg, &bdaddr);
  1176. break;
  1177. case 'P':
  1178. psm = atoi(optarg);
  1179. break;
  1180. case 'I':
  1181. imtu = atoi(optarg);
  1182. break;
  1183. case 'O':
  1184. omtu = atoi(optarg);
  1185. break;
  1186. case 'L':
  1187. linger = atoi(optarg);
  1188. break;
  1189. case 'W':
  1190. defer_setup = atoi(optarg);
  1191. break;
  1192. case 'B':
  1193. filename = optarg;
  1194. break;
  1195. case 'N':
  1196. num_frames = atoi(optarg);
  1197. break;
  1198. case 'C':
  1199. count = atoi(optarg);
  1200. break;
  1201. case 'D':
  1202. send_delay = atoi(optarg) * 1000;
  1203. break;
  1204. case 'K':
  1205. recv_delay = atoi(optarg) * 1000;
  1206. break;
  1207. case 'X':
  1208. rfcmode = get_lookup_flag(l2cap_modes, optarg);
  1209. if (rfcmode == -1) {
  1210. print_lookup_values(l2cap_modes,
  1211. "List L2CAP modes:");
  1212. exit(1);
  1213. }
  1214. break;
  1215. case 'a':
  1216. chan_policy = get_lookup_flag(chan_policies, optarg);
  1217. if (chan_policy == -1) {
  1218. print_lookup_values(chan_policies,
  1219. "List L2CAP chan policies:");
  1220. exit(1);
  1221. }
  1222. break;
  1223. case 'Y':
  1224. priority = atoi(optarg);
  1225. break;
  1226. case 'F':
  1227. fcs = atoi(optarg);
  1228. break;
  1229. case 'R':
  1230. reliable = 1;
  1231. break;
  1232. case 'M':
  1233. central = 1;
  1234. break;
  1235. case 'A':
  1236. auth = 1;
  1237. break;
  1238. case 'E':
  1239. encr = 1;
  1240. break;
  1241. case 'S':
  1242. secure = 1;
  1243. break;
  1244. case 'G':
  1245. socktype = SOCK_DGRAM;
  1246. break;
  1247. case 'U':
  1248. socktype = SOCK_STREAM;
  1249. break;
  1250. case 'T':
  1251. timestamp = 1;
  1252. break;
  1253. case 'Q':
  1254. max_transmit = atoi(optarg);
  1255. break;
  1256. case 'Z':
  1257. txwin_size = atoi(optarg);
  1258. break;
  1259. case 'J':
  1260. cid = atoi(optarg);
  1261. break;
  1262. case 'H':
  1263. rcvbuf = atoi(optarg);
  1264. break;
  1265. case 'V':
  1266. bdaddr_type = get_lookup_flag(bdaddr_types, optarg);
  1267. if (bdaddr_type == -1) {
  1268. print_lookup_values(bdaddr_types,
  1269. "List Address types:");
  1270. exit(1);
  1271. }
  1272. break;
  1273. case 'e':
  1274. seq_start = atoi(optarg);
  1275. break;
  1276. case 'g':
  1277. disc_delay = atoi(optarg) * 1000;
  1278. break;
  1279. default:
  1280. usage();
  1281. exit(1);
  1282. }
  1283. }
  1284. if (!psm) {
  1285. if (bdaddr_type == BDADDR_BREDR)
  1286. psm = BREDR_DEFAULT_PSM;
  1287. else
  1288. psm = LE_DEFAULT_PSM;
  1289. }
  1290. if (need_addr && !(argc - optind)) {
  1291. usage();
  1292. exit(1);
  1293. }
  1294. if (data_size < 0)
  1295. buffer_size = (omtu > imtu) ? omtu : imtu;
  1296. else
  1297. buffer_size = data_size;
  1298. if (!(buf = malloc(buffer_size))) {
  1299. perror("Can't allocate data buffer");
  1300. exit(1);
  1301. }
  1302. memset(&sa, 0, sizeof(sa));
  1303. sa.sa_handler = SIG_IGN;
  1304. sa.sa_flags = SA_NOCLDSTOP;
  1305. sigaction(SIGCHLD, &sa, NULL);
  1306. openlog("l2test", LOG_PERROR | LOG_PID, LOG_LOCAL0);
  1307. switch (mode) {
  1308. case RECV:
  1309. do_listen(recv_mode);
  1310. break;
  1311. case CRECV:
  1312. sk = do_connect(argv[optind]);
  1313. if (sk < 0)
  1314. exit(1);
  1315. recv_mode(sk);
  1316. break;
  1317. case DUMP:
  1318. do_listen(dump_mode);
  1319. break;
  1320. case SEND:
  1321. sk = do_connect(argv[optind]);
  1322. if (sk < 0)
  1323. exit(1);
  1324. send_mode(sk);
  1325. break;
  1326. case LSEND:
  1327. do_listen(send_mode);
  1328. break;
  1329. case RECONNECT:
  1330. reconnect_mode(argv[optind]);
  1331. break;
  1332. case MULTY:
  1333. multi_connect_mode(argc - optind, argv + optind);
  1334. break;
  1335. case CONNECT:
  1336. connect_mode(argv[optind]);
  1337. break;
  1338. case SENDDUMP:
  1339. sk = do_connect(argv[optind]);
  1340. if (sk < 0)
  1341. exit(1);
  1342. senddump_mode(sk);
  1343. break;
  1344. case LSENDDUMP:
  1345. do_listen(senddump_mode);
  1346. break;
  1347. case LSENDRECV:
  1348. do_listen(send_and_recv_mode);
  1349. break;
  1350. case CSENDRECV:
  1351. sk = do_connect(argv[optind]);
  1352. if (sk < 0)
  1353. exit(1);
  1354. send_and_recv_mode(sk);
  1355. break;
  1356. case INFOREQ:
  1357. info_request(argv[optind]);
  1358. exit(0);
  1359. case PAIRING:
  1360. do_pairing(argv[optind]);
  1361. exit(0);
  1362. }
  1363. syslog(LOG_INFO, "Exit");
  1364. closelog();
  1365. return 0;
  1366. }