3 * BlueZ - Bluetooth protocol stack for Linux
5 * Copyright (C) 2000-2001 Qualcomm Incorporated
6 * Copyright (C) 2002-2003 Maxim Krasnyansky <maxk@qualcomm.com>
7 * Copyright (C) 2002-2010 Marcel Holtmann <marcel@holtmann.org>
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
42 #include <sys/ioctl.h>
43 #include <sys/socket.h>
45 #include "lib/bluetooth.h"
47 #include "lib/hci_lib.h"
48 #include "lib/l2cap.h"
50 #include "src/shared/util.h"
52 #define NIBBLE_TO_ASCII(c) ((c) < 0x0a ? (c) + 0x30 : (c) + 0x57)
54 #define BREDR_DEFAULT_PSM 0x1011
55 #define LE_DEFAULT_PSM 0x0080
72 #ifdef __TIZEN_PATCH__
78 #ifdef __TIZEN_PATCH__
79 #define L2CAP_DEFAULT_RETRANS_TO 2000 /* 2 seconds */
80 #define L2CAP_DEFAULT_MONITOR_TO 12000 /* 12 seconds */
83 static unsigned char *buf;
86 static int imtu = 672;
89 /* Default FCS option */
90 static int fcs = 0x01;
92 /* Default Transmission Window */
93 static int txwin_size = 63;
95 /* Default Max Transmission */
96 static int max_transmit = 3;
98 /* Default data size */
99 static long data_size = -1;
100 static long buffer_size = 2048;
102 /* Default addr and psm and cid */
103 static bdaddr_t bdaddr;
104 static unsigned short psm = 0;
105 static unsigned short cid = 0;
106 #ifdef __TIZEN_PATCH__
107 static uint16_t dcid = 0x0000;
110 /* Default number of frames to send (-1 = infinite) */
111 static int num_frames = -1;
113 /* Default number of consecutive frames before the delay */
114 static int count = 1;
116 /* Default delay after sending count number of frames */
117 static unsigned long send_delay = 0;
119 /* Default delay before receiving */
120 static unsigned long recv_delay = 0;
122 /* Default delay before disconnecting */
123 static unsigned long disc_delay = 0;
125 /* Initial sequence value when sending frames */
126 static int seq_start = 0;
128 static const char *filename = NULL;
130 static int rfcmode = 0;
131 static int master = 0;
134 static int secure = 0;
135 static int socktype = SOCK_SEQPACKET;
136 static int linger = 0;
137 static int reliable = 0;
138 static int timestamp = 0;
139 static int defer_setup = 0;
140 static int priority = -1;
141 static int rcvbuf = 0;
142 static int chan_policy = -1;
143 static int bdaddr_type = 0;
145 struct lookup_table {
150 static struct lookup_table l2cap_modes[] = {
151 { "basic", L2CAP_MODE_BASIC },
153 { "flowctl", L2CAP_MODE_FLOWCTL },
154 { "retrans", L2CAP_MODE_RETRANS },
156 { "ertm", L2CAP_MODE_ERTM },
157 { "streaming", L2CAP_MODE_STREAMING },
161 static struct lookup_table chan_policies[] = {
162 { "bredr", BT_CHANNEL_POLICY_BREDR_ONLY },
163 { "bredr_pref", BT_CHANNEL_POLICY_BREDR_PREFERRED },
164 { "amp_pref", BT_CHANNEL_POLICY_AMP_PREFERRED },
168 static struct lookup_table bdaddr_types[] = {
169 { "bredr", BDADDR_BREDR },
170 { "le_public", BDADDR_LE_PUBLIC },
171 { "le_random", BDADDR_LE_RANDOM },
175 static int get_lookup_flag(struct lookup_table *table, char *name)
179 for (i = 0; table[i].name; i++)
180 if (!strcasecmp(table[i].name, name))
181 return table[i].flag;
186 static const char *get_lookup_str(struct lookup_table *table, int flag)
190 for (i = 0; table[i].name; i++)
191 if (table[i].flag == flag)
192 return table[i].name;
197 static void print_lookup_values(struct lookup_table *table, char *header)
201 printf("%s\n", header);
203 for (i = 0; table[i].name; i++)
204 printf("\t%s\n", table[i].name);
207 static float tv2fl(struct timeval tv)
209 return (float)tv.tv_sec + (float)(tv.tv_usec/1000000.0);
212 static char *ltoh(unsigned long c, char *s)
216 c1 = (c >> 28) & 0x0f;
217 *(s++) = NIBBLE_TO_ASCII (c1);
218 c1 = (c >> 24) & 0x0f;
219 *(s++) = NIBBLE_TO_ASCII (c1);
220 c1 = (c >> 20) & 0x0f;
221 *(s++) = NIBBLE_TO_ASCII (c1);
222 c1 = (c >> 16) & 0x0f;
223 *(s++) = NIBBLE_TO_ASCII (c1);
224 c1 = (c >> 12) & 0x0f;
225 *(s++) = NIBBLE_TO_ASCII (c1);
226 c1 = (c >> 8) & 0x0f;
227 *(s++) = NIBBLE_TO_ASCII (c1);
228 c1 = (c >> 4) & 0x0f;
229 *(s++) = NIBBLE_TO_ASCII (c1);
231 *(s++) = NIBBLE_TO_ASCII (c1);
236 static char *ctoh(char c, char *s)
240 c1 = (c >> 4) & 0x0f;
241 *(s++) = NIBBLE_TO_ASCII (c1);
243 *(s++) = NIBBLE_TO_ASCII (c1);
248 static void hexdump(unsigned char *s, unsigned long l)
252 unsigned long i, n = 0;
262 for (i = 0; i < 16; i++) {
267 pb = ctoh (*(s + i), pb);
271 for (i = 0; i < 16; i++) {
275 *(pb++) = (isprint (*(s + i)) ? *(s + i) : '.');
284 static int getopts(int sk, struct l2cap_options *opts, bool connected)
289 memset(opts, 0, sizeof(*opts));
291 if (bdaddr_type == BDADDR_BREDR) {
292 optlen = sizeof(*opts);
293 return getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, opts, &optlen);
296 optlen = sizeof(opts->imtu);
297 err = getsockopt(sk, SOL_BLUETOOTH, BT_RCVMTU, &opts->imtu, &optlen);
298 if (err < 0 || !connected)
301 optlen = sizeof(opts->omtu);
302 return getsockopt(sk, SOL_BLUETOOTH, BT_SNDMTU, &opts->omtu, &optlen);
305 static int setopts(int sk, struct l2cap_options *opts)
307 if (bdaddr_type == BDADDR_BREDR)
308 return setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, opts,
311 return setsockopt(sk, SOL_BLUETOOTH, BT_RCVMTU, &opts->imtu,
315 static int do_connect(char *svr)
317 struct sockaddr_l2 addr;
318 struct l2cap_options opts;
319 struct l2cap_conninfo conn;
325 sk = socket(PF_BLUETOOTH, socktype, BTPROTO_L2CAP);
327 syslog(LOG_ERR, "Can't create socket: %s (%d)",
328 strerror(errno), errno);
332 /* Bind to local address */
333 memset(&addr, 0, sizeof(addr));
334 addr.l2_family = AF_BLUETOOTH;
335 bacpy(&addr.l2_bdaddr, &bdaddr);
336 addr.l2_bdaddr_type = bdaddr_type;
338 addr.l2_cid = htobs(cid);
340 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
341 syslog(LOG_ERR, "Can't bind socket: %s (%d)",
342 strerror(errno), errno);
346 /* Get default options */
347 if (getopts(sk, &opts, false) < 0) {
348 syslog(LOG_ERR, "Can't get default L2CAP options: %s (%d)",
349 strerror(errno), errno);
353 /* Set new options */
359 opts.txwin_size = txwin_size;
360 opts.max_tx = max_transmit;
362 if (setopts(sk, &opts) < 0) {
363 syslog(LOG_ERR, "Can't set L2CAP options: %s (%d)",
364 strerror(errno), errno);
369 /* Enable SO_TIMESTAMP */
373 if (setsockopt(sk, SOL_SOCKET, SO_TIMESTAMP, &t, sizeof(t)) < 0) {
374 syslog(LOG_ERR, "Can't enable SO_TIMESTAMP: %s (%d)",
375 strerror(errno), errno);
381 if (chan_policy != -1) {
382 if (setsockopt(sk, SOL_BLUETOOTH, BT_CHANNEL_POLICY,
383 &chan_policy, sizeof(chan_policy)) < 0) {
384 syslog(LOG_ERR, "Can't enable chan policy : %s (%d)",
385 strerror(errno), errno);
390 /* Enable SO_LINGER */
392 struct linger l = { .l_onoff = 1, .l_linger = linger };
394 if (setsockopt(sk, SOL_SOCKET, SO_LINGER, &l, sizeof(l)) < 0) {
395 syslog(LOG_ERR, "Can't enable SO_LINGER: %s (%d)",
396 strerror(errno), errno);
404 opt |= L2CAP_LM_RELIABLE;
406 opt |= L2CAP_LM_MASTER;
408 opt |= L2CAP_LM_AUTH;
410 opt |= L2CAP_LM_ENCRYPT;
412 opt |= L2CAP_LM_SECURE;
414 if (setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) {
415 syslog(LOG_ERR, "Can't set L2CAP link mode: %s (%d)",
416 strerror(errno), errno);
420 /* Set receive buffer size */
421 if (rcvbuf && setsockopt(sk, SOL_SOCKET, SO_RCVBUF,
422 &rcvbuf, sizeof(rcvbuf)) < 0) {
423 syslog(LOG_ERR, "Can't set socket rcv buf size: %s (%d)",
424 strerror(errno), errno);
428 optlen = sizeof(rcvbuf);
429 if (getsockopt(sk, SOL_SOCKET, SO_RCVBUF, &rcvbuf, &optlen) < 0) {
430 syslog(LOG_ERR, "Can't get socket rcv buf size: %s (%d)",
431 strerror(errno), errno);
435 /* Connect to remote device */
436 memset(&addr, 0, sizeof(addr));
437 addr.l2_family = AF_BLUETOOTH;
438 str2ba(svr, &addr.l2_bdaddr);
439 addr.l2_bdaddr_type = bdaddr_type;
441 addr.l2_cid = htobs(cid);
443 addr.l2_psm = htobs(psm);
447 if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) {
448 syslog(LOG_ERR, "Can't connect: %s (%d)",
449 strerror(errno), errno);
453 /* Get current options */
454 if (getopts(sk, &opts, true) < 0) {
455 syslog(LOG_ERR, "Can't get L2CAP options: %s (%d)",
456 strerror(errno), errno);
460 /* Get connection information */
461 memset(&conn, 0, sizeof(conn));
462 optlen = sizeof(conn);
464 if (getsockopt(sk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &optlen) < 0) {
465 syslog(LOG_ERR, "Can't get L2CAP connection information: %s (%d)",
466 strerror(errno), errno);
470 if (priority > 0 && setsockopt(sk, SOL_SOCKET, SO_PRIORITY, &priority,
471 sizeof(priority)) < 0) {
472 syslog(LOG_ERR, "Can't set socket priority: %s (%d)",
473 strerror(errno), errno);
477 if (getsockopt(sk, SOL_SOCKET, SO_PRIORITY, &opt, &optlen) < 0) {
478 syslog(LOG_ERR, "Can't get socket priority: %s (%d)",
479 strerror(errno), errno);
483 /* Check for remote address */
484 memset(&addr, 0, sizeof(addr));
485 optlen = sizeof(addr);
487 if (getpeername(sk, (struct sockaddr *) &addr, &optlen) < 0) {
488 syslog(LOG_ERR, "Can't get socket name: %s (%d)",
489 strerror(errno), errno);
493 ba2str(&addr.l2_bdaddr, ba);
494 syslog(LOG_INFO, "Connected to %s (%s, psm %d, scid %d)", ba,
495 get_lookup_str(bdaddr_types, addr.l2_bdaddr_type),
496 addr.l2_psm, addr.l2_cid);
498 /* Check for socket address */
499 memset(&addr, 0, sizeof(addr));
500 optlen = sizeof(addr);
502 if (getsockname(sk, (struct sockaddr *) &addr, &optlen) < 0) {
503 syslog(LOG_ERR, "Can't get socket name: %s (%d)",
504 strerror(errno), errno);
508 ba2str(&addr.l2_bdaddr, ba);
509 syslog(LOG_INFO, "Local device %s (%s, psm %d, scid %d)", ba,
510 get_lookup_str(bdaddr_types, addr.l2_bdaddr_type),
511 addr.l2_psm, addr.l2_cid);
513 syslog(LOG_INFO, "Options [imtu %d, omtu %d, flush_to %d, "
514 "mode %d, handle %d, class 0x%02x%02x%02x, priority %d, rcvbuf %d]",
515 opts.imtu, opts.omtu, opts.flush_to, opts.mode, conn.hci_handle,
516 conn.dev_class[2], conn.dev_class[1], conn.dev_class[0], opt,
519 omtu = (opts.omtu > buffer_size) ? buffer_size : opts.omtu;
520 imtu = (opts.imtu > buffer_size) ? buffer_size : opts.imtu;
529 static void do_listen(void (*handler)(int sk))
531 struct sockaddr_l2 addr;
532 struct l2cap_options opts;
533 struct l2cap_conninfo conn;
539 sk = socket(PF_BLUETOOTH, socktype, BTPROTO_L2CAP);
541 syslog(LOG_ERR, "Can't create socket: %s (%d)",
542 strerror(errno), errno);
546 /* Bind to local address */
547 memset(&addr, 0, sizeof(addr));
548 addr.l2_family = AF_BLUETOOTH;
549 bacpy(&addr.l2_bdaddr, &bdaddr);
550 addr.l2_bdaddr_type = bdaddr_type;
552 addr.l2_cid = htobs(cid);
554 addr.l2_psm = htobs(psm);
556 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
557 syslog(LOG_ERR, "Can't bind socket: %s (%d)",
558 strerror(errno), errno);
565 opt |= L2CAP_LM_RELIABLE;
567 opt |= L2CAP_LM_MASTER;
569 opt |= L2CAP_LM_AUTH;
571 opt |= L2CAP_LM_ENCRYPT;
573 opt |= L2CAP_LM_SECURE;
575 if (opt && setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) {
576 syslog(LOG_ERR, "Can't set L2CAP link mode: %s (%d)",
577 strerror(errno), errno);
581 /* Get default options */
582 if (getopts(sk, &opts, false) < 0) {
583 syslog(LOG_ERR, "Can't get default L2CAP options: %s (%d)",
584 strerror(errno), errno);
588 /* Set new options */
595 opts.txwin_size = txwin_size;
596 opts.max_tx = max_transmit;
598 if (setopts(sk, &opts) < 0) {
599 syslog(LOG_ERR, "Can't set L2CAP options: %s (%d)",
600 strerror(errno), errno);
604 if (socktype == SOCK_DGRAM) {
610 /* Enable deferred setup */
613 if (opt && setsockopt(sk, SOL_BLUETOOTH, BT_DEFER_SETUP,
614 &opt, sizeof(opt)) < 0) {
615 syslog(LOG_ERR, "Can't enable deferred setup : %s (%d)",
616 strerror(errno), errno);
621 /* Listen for connections */
622 if (listen(sk, 10)) {
623 syslog(LOG_ERR, "Can not listen on the socket: %s (%d)",
624 strerror(errno), errno);
628 /* Check for socket address */
629 memset(&addr, 0, sizeof(addr));
630 optlen = sizeof(addr);
632 if (getsockname(sk, (struct sockaddr *) &addr, &optlen) < 0) {
633 syslog(LOG_ERR, "Can't get socket name: %s (%d)",
634 strerror(errno), errno);
638 psm = btohs(addr.l2_psm);
639 cid = btohs(addr.l2_cid);
641 syslog(LOG_INFO, "Waiting for connection on psm %d ...", psm);
644 memset(&addr, 0, sizeof(addr));
645 optlen = sizeof(addr);
647 nsk = accept(sk, (struct sockaddr *) &addr, &optlen);
649 syslog(LOG_ERR, "Accept failed: %s (%d)",
650 strerror(errno), errno);
660 /* Set receive buffer size */
661 if (rcvbuf && setsockopt(nsk, SOL_SOCKET, SO_RCVBUF, &rcvbuf,
662 sizeof(rcvbuf)) < 0) {
663 syslog(LOG_ERR, "Can't set rcv buf size: %s (%d)",
664 strerror(errno), errno);
668 optlen = sizeof(rcvbuf);
669 if (getsockopt(nsk, SOL_SOCKET, SO_RCVBUF, &rcvbuf, &optlen)
671 syslog(LOG_ERR, "Can't get rcv buf size: %s (%d)",
672 strerror(errno), errno);
676 /* Get current options */
677 if (getopts(nsk, &opts, true) < 0) {
678 syslog(LOG_ERR, "Can't get L2CAP options: %s (%d)",
679 strerror(errno), errno);
686 /* Get connection information */
687 memset(&conn, 0, sizeof(conn));
688 optlen = sizeof(conn);
690 if (getsockopt(nsk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &optlen) < 0) {
691 syslog(LOG_ERR, "Can't get L2CAP connection information: %s (%d)",
692 strerror(errno), errno);
699 if (priority > 0 && setsockopt(nsk, SOL_SOCKET, SO_PRIORITY,
700 &priority, sizeof(priority)) < 0) {
701 syslog(LOG_ERR, "Can't set socket priority: %s (%d)",
702 strerror(errno), errno);
707 optlen = sizeof(priority);
708 if (getsockopt(nsk, SOL_SOCKET, SO_PRIORITY, &opt, &optlen) < 0) {
709 syslog(LOG_ERR, "Can't get socket priority: %s (%d)",
710 strerror(errno), errno);
714 ba2str(&addr.l2_bdaddr, ba);
715 syslog(LOG_INFO, "Connect from %s (%s, psm %d, dcid %d)", ba,
716 get_lookup_str(bdaddr_types, addr.l2_bdaddr_type),
717 addr.l2_psm, addr.l2_cid);
719 /* Check for socket address */
720 memset(&addr, 0, sizeof(addr));
721 optlen = sizeof(addr);
723 if (getsockname(nsk, (struct sockaddr *) &addr, &optlen) < 0) {
724 syslog(LOG_ERR, "Can't get socket name: %s (%d)",
725 strerror(errno), errno);
729 ba2str(&addr.l2_bdaddr, ba);
730 syslog(LOG_INFO, "Local device %s (%s, psm %d, scid %d)", ba,
731 get_lookup_str(bdaddr_types, addr.l2_bdaddr_type),
732 addr.l2_psm, addr.l2_cid);
734 syslog(LOG_INFO, "Options [imtu %d, omtu %d, "
735 "flush_to %d, mode %d, handle %d, "
736 "class 0x%02x%02x%02x, priority %d, rcvbuf %d]",
737 opts.imtu, opts.omtu, opts.flush_to,
738 opts.mode, conn.hci_handle, conn.dev_class[2],
739 conn.dev_class[1], conn.dev_class[0], opt,
742 omtu = (opts.omtu > buffer_size) ? buffer_size : opts.omtu;
743 imtu = (opts.imtu > buffer_size) ? buffer_size : opts.imtu;
746 /* Enable SO_TIMESTAMP */
750 if (setsockopt(nsk, SOL_SOCKET, SO_TIMESTAMP, &t, sizeof(t)) < 0) {
751 syslog(LOG_ERR, "Can't enable SO_TIMESTAMP: %s (%d)",
752 strerror(errno), errno);
758 /* Enable SO_LINGER */
760 struct linger l = { .l_onoff = 1, .l_linger = linger };
762 if (setsockopt(nsk, SOL_SOCKET, SO_LINGER, &l, sizeof(l)) < 0) {
763 syslog(LOG_ERR, "Can't enable SO_LINGER: %s (%d)",
764 strerror(errno), errno);
770 /* Handle deferred setup */
772 syslog(LOG_INFO, "Waiting for %d seconds",
773 abs(defer_setup) - 1);
774 sleep(abs(defer_setup) - 1);
776 if (defer_setup < 0) {
785 syslog(LOG_INFO, "Disconnect: %m");
794 static void dump_mode(int sk)
803 len = read(sk, buf, data_size);
805 syslog(LOG_ERR, "Initial read error: %s (%d)",
806 strerror(errno), errno);
808 syslog(LOG_INFO, "Initial bytes %d", len);
811 syslog(LOG_INFO, "Receiving ...");
818 if (select(sk + 1, &rset, NULL, NULL, NULL) < 0)
821 if (!FD_ISSET(sk, &rset))
824 len = read(sk, buf, data_size);
827 if (reliable && (errno == ECOMM)) {
828 syslog(LOG_INFO, "L2CAP Error ECOMM - clearing error and continuing.");
829 optlen = sizeof(opt);
830 if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) {
831 syslog(LOG_ERR, "Couldn't getsockopt(SO_ERROR): %s (%d)",
832 strerror(errno), errno);
837 syslog(LOG_ERR, "Read error: %s(%d)",
838 strerror(errno), errno);
844 syslog(LOG_INFO, "Recevied %d bytes", len);
849 static void recv_mode(int sk)
851 struct timeval tv_beg, tv_end, tv_diff;
863 len = read(sk, buf, data_size);
865 syslog(LOG_ERR, "Initial read error: %s (%d)",
866 strerror(errno), errno);
868 syslog(LOG_INFO, "Initial bytes %d", len);
874 syslog(LOG_INFO, "Receiving ...");
876 memset(ts, 0, sizeof(ts));
879 p.events = POLLIN | POLLERR | POLLHUP;
883 gettimeofday(&tv_beg, NULL);
885 while (total < data_size) {
891 if (poll(&p, 1, -1) <= 0)
894 if (p.revents & (POLLERR | POLLHUP))
897 len = recv(sk, buf, data_size, 0);
899 if (reliable && (errno == ECOMM)) {
900 syslog(LOG_INFO, "L2CAP Error ECOMM - clearing error and continuing.\n");
901 optlen = sizeof(opt);
902 if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) {
903 syslog(LOG_ERR, "Couldn't getsockopt(SO_ERROR): %s (%d)",
904 strerror(errno), errno);
909 syslog(LOG_ERR, "Read failed: %s (%d)",
910 strerror(errno), errno);
920 if (ioctl(sk, SIOCGSTAMP, &tv) < 0) {
922 memset(ts, 0, sizeof(ts));
924 sprintf(ts, "[%ld.%ld] ",
925 tv.tv_sec, tv.tv_usec);
932 syslog(LOG_INFO, "seq missmatch: %d -> %d", seq, sq);
938 l = get_le16(buf + 4);
940 syslog(LOG_INFO, "size missmatch: %d -> %d", len, l);
945 for (i = 6; i < len; i++) {
947 syslog(LOG_INFO, "data missmatch: byte %d 0x%2.2x", i, buf[i]);
952 gettimeofday(&tv_end, NULL);
954 timersub(&tv_end, &tv_beg, &tv_diff);
956 syslog(LOG_INFO,"%s%ld bytes in %.2f sec, %.2f kB/s", ts, total,
957 tv2fl(tv_diff), (float)(total / tv2fl(tv_diff) ) / 1024.0);
961 static void do_send(int sk)
964 int i, fd, len, buflen, size, sent;
966 syslog(LOG_INFO, "Sending ...");
972 fd = open(filename, O_RDONLY);
974 syslog(LOG_ERR, "Open failed: %s (%d)",
975 strerror(errno), errno);
980 size = read(fd, buf, data_size);
982 buflen = (size > omtu) ? omtu : size;
984 len = send(sk, buf + sent, buflen, 0);
993 for (i = 6; i < data_size; i++)
997 if (!count && send_delay)
1001 while ((num_frames == -1) || (num_frames-- > 0)) {
1003 put_le16(data_size, buf + 4);
1010 buflen = (size > omtu) ? omtu : size;
1012 len = send(sk, buf, buflen, 0);
1013 if (len < 0 || len != buflen) {
1014 syslog(LOG_ERR, "Send failed: %s (%d)",
1015 strerror(errno), errno);
1023 if (num_frames && send_delay && count &&
1024 !(seq % (count + seq_start)))
1029 static void send_mode(int sk)
1036 syslog(LOG_INFO, "Closing channel ...");
1037 if (shutdown(sk, SHUT_RDWR) < 0)
1038 syslog(LOG_INFO, "Close failed: %m");
1040 syslog(LOG_INFO, "Done");
1043 static void senddump_mode(int sk)
1050 static void send_and_recv_mode(int sk)
1054 if ((flags = fcntl(sk, F_GETFL, 0)) < 0)
1056 fcntl(sk, F_SETFL, flags | O_NONBLOCK);
1058 /* fork for duplex channel */
1066 static void reconnect_mode(char *svr)
1069 int sk = do_connect(svr);
1074 static void connect_mode(char *svr)
1079 if ((sk = do_connect(svr)) < 0)
1083 p.events = POLLERR | POLLHUP;
1087 if (poll(&p, 1, 500))
1091 syslog(LOG_INFO, "Disconnected");
1096 static void multi_connect_mode(int argc, char *argv[])
1101 for (n = 0; n < argc; n++) {
1102 for (i = 0; i < count; i++) {
1107 sk = do_connect(argv[n]);
1117 #ifdef __TIZEN_PATCH__
1118 static void l2cap_add_conf_opt(void **ptr, uint8_t type, uint8_t len, unsigned long val)
1120 l2cap_conf_opt *opt = *ptr;
1122 printf("type 0x%2.2x len %u val 0x%lx \n", type, len, val);
1123 opt->type = htobs(type);
1124 opt->len = htobs(len);
1128 *((uint8_t *) opt->val) = val;
1131 bt_put_le16(val, opt->val);
1134 bt_put_le32(val, opt->val);
1137 memcpy(opt->val, (void *) val, len);
1141 *ptr += L2CAP_CONF_OPT_SIZE + len;
1144 static int l2cap_build_conf_req(void *data)
1146 l2cap_conf_req *req = data;
1148 void *ptr = req->data;
1150 req->dcid = htobs(dcid);
1151 req->flags = htobs(0x0000);
1154 case L2CAP_MODE_BASIC:
1155 rfc.mode = htobs(L2CAP_MODE_BASIC);
1156 rfc.txwin_size = htobs(0);
1157 rfc.max_transmit = htobs(0);
1158 rfc.retrans_timeout = htobs(0);
1159 rfc.monitor_timeout = htobs(0);
1160 rfc.max_pdu_size = htobs(0);
1162 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC, sizeof(rfc),
1163 (unsigned long) &rfc);
1167 case L2CAP_MODE_ERTM:
1168 rfc.mode = htobs(L2CAP_MODE_ERTM);
1169 rfc.txwin_size = htobs(txwin_size);
1170 rfc.max_transmit = htobs(max_transmit);
1171 rfc.retrans_timeout = htobs(L2CAP_DEFAULT_RETRANS_TO);
1172 rfc.monitor_timeout = htobs(L2CAP_DEFAULT_MONITOR_TO);
1173 rfc.max_pdu_size = htobs(imtu);
1175 /* TODO: Enable FCS, FOC options if required */
1176 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC, sizeof(rfc),
1177 (unsigned long) &rfc);
1180 case L2CAP_MODE_STREAMING:
1181 rfc.mode = htobs(L2CAP_MODE_STREAMING);
1182 rfc.txwin_size = htobs(txwin_size);
1183 rfc.max_transmit = htobs(max_transmit);
1184 rfc.retrans_timeout = htobs(L2CAP_DEFAULT_RETRANS_TO);
1185 rfc.monitor_timeout = htobs(L2CAP_DEFAULT_MONITOR_TO);
1186 rfc.max_pdu_size = htobs(imtu);
1188 /* TODO: Enable FCS, FOC options if required */
1189 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC, sizeof(rfc),
1190 (unsigned long) &rfc);
1194 return L2CAP_CONF_REQ_SIZE;
1199 static void config_request(char *svr)
1201 unsigned char buf[48];
1202 l2cap_cmd_hdr *cmd = (l2cap_cmd_hdr *) buf;
1203 uint8_t *req_buf = (uint8_t *) (buf + L2CAP_CMD_HDR_SIZE);
1204 #ifndef __TIZEN_PATCH__
1206 uint32_t channels, mask = 0x0000;
1208 struct sockaddr_l2 addr;
1209 #ifndef __TIZEN_PATCH__
1216 sk = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_L2CAP);
1218 perror("Can't create socket");
1222 memset(&addr, 0, sizeof(addr));
1223 addr.l2_family = AF_BLUETOOTH;
1224 bacpy(&addr.l2_bdaddr, &bdaddr);
1225 addr.l2_bdaddr_type = bdaddr_type;
1227 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
1228 perror("Can't bind socket");
1232 memset(&addr, 0, sizeof(addr));
1233 addr.l2_family = AF_BLUETOOTH;
1234 str2ba(svr, &addr.l2_bdaddr);
1235 addr.l2_bdaddr_type = bdaddr_type;
1237 if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) {
1238 perror("Can't connect socket");
1242 memset(buf, 0, sizeof(buf));
1243 cmd->code = L2CAP_CONF_REQ;
1245 data_len = l2cap_build_conf_req(req_buf);
1246 cmd->len = htobs(data_len);
1248 if (send(sk, buf, L2CAP_CMD_HDR_SIZE + data_len, 0) < 0) {
1249 perror("Can't send info request");
1257 static void info_request(char *svr)
1259 unsigned char buf[48];
1260 l2cap_cmd_hdr *cmd = (l2cap_cmd_hdr *) buf;
1261 l2cap_info_req *req = (l2cap_info_req *) (buf + L2CAP_CMD_HDR_SIZE);
1262 l2cap_info_rsp *rsp = (l2cap_info_rsp *) (buf + L2CAP_CMD_HDR_SIZE);
1264 uint32_t channels, mask = 0x0000;
1265 struct sockaddr_l2 addr;
1268 sk = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_L2CAP);
1270 perror("Can't create socket");
1274 memset(&addr, 0, sizeof(addr));
1275 addr.l2_family = AF_BLUETOOTH;
1276 bacpy(&addr.l2_bdaddr, &bdaddr);
1277 addr.l2_bdaddr_type = bdaddr_type;
1279 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
1280 perror("Can't bind socket");
1284 memset(&addr, 0, sizeof(addr));
1285 addr.l2_family = AF_BLUETOOTH;
1286 str2ba(svr, &addr.l2_bdaddr);
1287 addr.l2_bdaddr_type = bdaddr_type;
1289 if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) {
1290 perror("Can't connect socket");
1294 memset(buf, 0, sizeof(buf));
1295 cmd->code = L2CAP_INFO_REQ;
1297 cmd->len = htobs(2);
1298 req->type = htobs(0x0001);
1300 if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) {
1301 perror("Can't send info request");
1305 err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 2, 0);
1307 perror("Can't receive info response");
1311 switch (btohs(rsp->result)) {
1313 memcpy(&mtu, rsp->data, sizeof(mtu));
1314 printf("Connectionless MTU size is %d\n", btohs(mtu));
1317 printf("Connectionless MTU is not supported\n");
1321 memset(buf, 0, sizeof(buf));
1322 cmd->code = L2CAP_INFO_REQ;
1324 cmd->len = htobs(2);
1325 req->type = htobs(0x0002);
1327 if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) {
1328 perror("Can't send info request");
1332 err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 4, 0);
1334 perror("Can't receive info response");
1338 switch (btohs(rsp->result)) {
1340 memcpy(&mask, rsp->data, sizeof(mask));
1341 printf("Extended feature mask is 0x%04x\n", btohl(mask));
1342 if (mask & L2CAP_FEAT_FLOWCTL)
1343 printf(" Flow control mode\n");
1344 if (mask & L2CAP_FEAT_RETRANS)
1345 printf(" Retransmission mode\n");
1346 if (mask & L2CAP_FEAT_BIDIR_QOS)
1347 printf(" Bi-directional QoS\n");
1348 if (mask & L2CAP_FEAT_ERTM)
1349 printf(" Enhanced Retransmission mode\n");
1350 if (mask & L2CAP_FEAT_STREAMING)
1351 printf(" Streaming mode\n");
1352 if (mask & L2CAP_FEAT_FCS)
1353 printf(" FCS Option\n");
1354 if (mask & L2CAP_FEAT_EXT_FLOW)
1355 printf(" Extended Flow Specification\n");
1356 if (mask & L2CAP_FEAT_FIXED_CHAN)
1357 printf(" Fixed Channels\n");
1358 if (mask & L2CAP_FEAT_EXT_WINDOW)
1359 printf(" Extended Window Size\n");
1360 if (mask & L2CAP_FEAT_UCD)
1361 printf(" Unicast Connectionless Data Reception\n");
1364 printf("Extended feature mask is not supported\n");
1371 memset(buf, 0, sizeof(buf));
1372 cmd->code = L2CAP_INFO_REQ;
1374 cmd->len = htobs(2);
1375 req->type = htobs(0x0003);
1377 if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) {
1378 perror("Can't send info request");
1382 err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 8, 0);
1384 perror("Can't receive info response");
1388 switch (btohs(rsp->result)) {
1390 memcpy(&channels, rsp->data, sizeof(channels));
1391 printf("Fixed channels list is 0x%04x\n", btohl(channels));
1394 printf("Fixed channels list is not supported\n");
1402 static void do_pairing(char *svr)
1404 struct sockaddr_l2 addr;
1407 sk = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_L2CAP);
1409 perror("Can't create socket");
1413 memset(&addr, 0, sizeof(addr));
1414 addr.l2_family = AF_BLUETOOTH;
1415 bacpy(&addr.l2_bdaddr, &bdaddr);
1416 addr.l2_bdaddr_type = bdaddr_type;
1418 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
1419 perror("Can't bind socket");
1424 opt = L2CAP_LM_SECURE;
1426 opt = L2CAP_LM_ENCRYPT;
1428 if (setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) {
1429 perror("Can't set link mode");
1433 memset(&addr, 0, sizeof(addr));
1434 addr.l2_family = AF_BLUETOOTH;
1435 str2ba(svr, &addr.l2_bdaddr);
1436 addr.l2_bdaddr_type = bdaddr_type;
1438 if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) {
1439 perror("Can't connect socket");
1443 printf("Pairing successful\n");
1449 static void usage(void)
1451 printf("l2test - L2CAP testing\n"
1453 printf("\tl2test <mode> [options] [bdaddr]\n");
1455 "\t-r listen and receive\n"
1456 "\t-w listen and send\n"
1457 "\t-d listen and dump incoming data\n"
1458 "\t-x listen, then send, then dump incoming data\n"
1459 "\t-t listen, then send and receive at the same time\n"
1460 "\t-q connect, then send and receive at the same time\n"
1461 "\t-s connect and send\n"
1462 "\t-u connect and receive\n"
1463 "\t-n connect and be silent\n"
1464 "\t-y connect, then send, then dump incoming data\n"
1465 "\t-c connect, disconnect, connect, ...\n"
1466 "\t-m multiple connects\n"
1467 "\t-p trigger dedicated bonding\n"
1468 #ifdef __TIZEN_PATCH__
1469 "\t-o configuration request\n"
1471 "\t-z information request\n");
1474 "\t[-b bytes] [-i device] [-P psm] [-J cid]\n"
1475 "\t[-I imtu] [-O omtu]\n"
1476 "\t[-L seconds] enable SO_LINGER\n"
1477 "\t[-W seconds] enable deferred setup\n"
1478 "\t[-B filename] use data packets from file\n"
1479 "\t[-N num] send num frames (default = infinite)\n"
1480 "\t[-C num] send num frames before delay (default = 1)\n"
1481 "\t[-D milliseconds] delay after sending num frames (default = 0)\n"
1482 "\t[-K milliseconds] delay before receiving (default = 0)\n"
1483 "\t[-g milliseconds] delay before disconnecting (default = 0)\n"
1484 "\t[-X mode] l2cap mode (help for list, default = basic)\n"
1485 "\t[-a policy] chan policy (help for list, default = bredr)\n"
1486 "\t[-F fcs] use CRC16 check (default = 1)\n"
1487 "\t[-Q num] Max Transmit value (default = 3)\n"
1488 "\t[-Z size] Transmission Window size (default = 63)\n"
1489 "\t[-Y priority] socket priority\n"
1490 "\t[-H size] Maximum receive buffer size\n"
1491 "\t[-R] reliable mode\n"
1492 "\t[-G] use connectionless channel (datagram)\n"
1493 "\t[-U] use sock stream\n"
1494 "\t[-A] request authentication\n"
1495 "\t[-E] request encryption\n"
1496 "\t[-S] secure connection\n"
1497 "\t[-M] become master\n"
1498 "\t[-T] enable timestamps\n"
1499 "\t[-V type] address type (help for list, default = bredr)\n"
1500 #ifdef __TIZEN_PATCH__
1501 "\t[-f DCID] destination CID\n"
1503 "\t[-e seq] initial sequence value (default = 0)\n");
1506 int main(int argc, char *argv[])
1508 struct sigaction sa;
1509 int opt, sk, mode = RECV, need_addr = 0;
1511 bacpy(&bdaddr, BDADDR_ANY);
1513 #ifdef __TIZEN_PATCH__
1514 while ((opt = getopt(argc, argv, "a:b:cde:f:g:i:mnopqrstuwxyz"
1515 "AB:C:D:EF:GH:I:J:K:L:MN:O:P:Q:RSTUV:W:X:Y:Z:")) != EOF) {
1517 while ((opt = getopt(argc, argv, "a:b:cde:g:i:mnpqrstuwxyz"
1518 "AB:C:D:EF:GH:I:J:K:L:MN:O:P:Q:RSTUV:W:X:Y:Z:")) != EOF) {
1548 #ifdef __TIZEN_PATCH__
1593 data_size = atoi(optarg);
1597 if (!strncasecmp(optarg, "hci", 3))
1598 hci_devba(atoi(optarg + 3), &bdaddr);
1600 str2ba(optarg, &bdaddr);
1608 imtu = atoi(optarg);
1612 omtu = atoi(optarg);
1616 linger = atoi(optarg);
1620 defer_setup = atoi(optarg);
1628 num_frames = atoi(optarg);
1632 count = atoi(optarg);
1636 send_delay = atoi(optarg) * 1000;
1640 recv_delay = atoi(optarg) * 1000;
1644 rfcmode = get_lookup_flag(l2cap_modes, optarg);
1646 if (rfcmode == -1) {
1647 print_lookup_values(l2cap_modes,
1648 "List L2CAP modes:");
1655 chan_policy = get_lookup_flag(chan_policies, optarg);
1657 if (chan_policy == -1) {
1658 print_lookup_values(chan_policies,
1659 "List L2CAP chan policies:");
1666 priority = atoi(optarg);
1694 socktype = SOCK_DGRAM;
1698 socktype = SOCK_STREAM;
1706 max_transmit = atoi(optarg);
1710 txwin_size = atoi(optarg);
1718 rcvbuf = atoi(optarg);
1722 bdaddr_type = get_lookup_flag(bdaddr_types, optarg);
1724 if (bdaddr_type == -1) {
1725 print_lookup_values(bdaddr_types,
1726 "List Address types:");
1732 #ifdef __TIZEN_PATCH__
1734 dcid = atoi(optarg);
1735 printf("dcid %d", dcid);
1740 seq_start = atoi(optarg);
1744 disc_delay = atoi(optarg) * 1000;
1754 if (bdaddr_type == BDADDR_BREDR)
1755 psm = BREDR_DEFAULT_PSM;
1757 psm = LE_DEFAULT_PSM;
1760 if (need_addr && !(argc - optind)) {
1766 buffer_size = (omtu > imtu) ? omtu : imtu;
1768 buffer_size = data_size;
1770 if (!(buf = malloc(buffer_size))) {
1771 perror("Can't allocate data buffer");
1775 memset(&sa, 0, sizeof(sa));
1776 sa.sa_handler = SIG_IGN;
1777 sa.sa_flags = SA_NOCLDSTOP;
1778 sigaction(SIGCHLD, &sa, NULL);
1780 openlog("l2test", LOG_PERROR | LOG_PID, LOG_LOCAL0);
1784 do_listen(recv_mode);
1788 sk = do_connect(argv[optind]);
1795 do_listen(dump_mode);
1799 sk = do_connect(argv[optind]);
1806 do_listen(send_mode);
1810 reconnect_mode(argv[optind]);
1814 multi_connect_mode(argc - optind, argv + optind);
1818 connect_mode(argv[optind]);
1822 sk = do_connect(argv[optind]);
1829 do_listen(senddump_mode);
1833 do_listen(send_and_recv_mode);
1837 sk = do_connect(argv[optind]);
1841 send_and_recv_mode(sk);
1845 info_request(argv[optind]);
1848 #ifdef __TIZEN_PATCH__
1850 config_request(argv[optind]);
1855 do_pairing(argv[optind]);
1859 syslog(LOG_INFO, "Exit");