1/* 2 * 3 * BlueZ - Bluetooth protocol stack for Linux 4 * 5 * Copyright (C) 2000-2001 Qualcomm Incorporated 6 * Copyright (C) 2002-2003 Maxim Krasnyansky <maxk@qualcomm.com> 7 * Copyright (C) 2002-2010 Marcel Holtmann <marcel@holtmann.org> 8 * 9 * 10 * This program is free software; you can redistribute it and/or modify 11 * it under the terms of the GNU General Public License as published by 12 * the Free Software Foundation; either version 2 of the License, or 13 * (at your option) any later version. 14 * 15 * This program is distributed in the hope that it will be useful, 16 * but WITHOUT ANY WARRANTY; without even the implied warranty of 17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 18 * GNU General Public License for more details. 19 * 20 * You should have received a copy of the GNU General Public License 21 * along with this program; if not, write to the Free Software 22 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA 23 * 24 */ 25 26#ifdef HAVE_CONFIG_H 27#include <config.h> 28#endif 29 30#include <stdio.h> 31#include <errno.h> 32#include <ctype.h> 33#include <fcntl.h> 34#include <unistd.h> 35#include <stdlib.h> 36#include <getopt.h> 37#include <syslog.h> 38#include <signal.h> 39#include <sys/time.h> 40#include <sys/poll.h> 41#include <sys/ioctl.h> 42#include <sys/socket.h> 43 44#include <bluetooth/bluetooth.h> 45#include <bluetooth/hci.h> 46#include <bluetooth/hci_lib.h> 47#include <bluetooth/l2cap.h> 48 49#define NIBBLE_TO_ASCII(c) ((c) < 0x0a ? (c) + 0x30 : (c) + 0x57) 50 51/* Test modes */ 52enum { 53 SEND, 54 RECV, 55 RECONNECT, 56 MULTY, 57 DUMP, 58 CONNECT, 59 CRECV, 60 LSEND, 61 SENDDUMP, 62 LSENDDUMP, 63 LSENDRECV, 64 CSENDRECV, 65 INFOREQ, 66 PAIRING, 67}; 68 69static unsigned char *buf; 70 71/* Default mtu */ 72static int imtu = 672; 73static int omtu = 0; 74 75/* Default FCS option */ 76static int fcs = 0x01; 77 78/* Default Transmission Window */ 79static int txwin_size = 63; 80 81/* Default Max Transmission */ 82static int max_transmit = 3; 83 84/* Default data size */ 85static long data_size = -1; 86static long buffer_size = 2048; 87 88/* Default addr and psm and cid */ 89static bdaddr_t bdaddr; 90static unsigned short psm = 0x1011; 91static unsigned short cid = 0; 92 93/* Default number of frames to send (-1 = infinite) */ 94static int num_frames = -1; 95 96/* Default number of consecutive frames before the delay */ 97static int count = 1; 98 99/* Default delay after sending count number of frames */ 100static unsigned long delay = 0; 101 102static char *filename = NULL; 103 104static int rfcmode = 0; 105static int master = 0; 106static int auth = 0; 107static int encrypt = 0; 108static int secure = 0; 109static int socktype = SOCK_SEQPACKET; 110static int linger = 0; 111static int reliable = 0; 112static int timestamp = 0; 113static int defer_setup = 0; 114 115static float tv2fl(struct timeval tv) 116{ 117 return (float)tv.tv_sec + (float)(tv.tv_usec/1000000.0); 118} 119 120static char *ltoh(unsigned long c, char* s) 121{ 122 int c1; 123 124 c1 = (c >> 28) & 0x0f; 125 *(s++) = NIBBLE_TO_ASCII (c1); 126 c1 = (c >> 24) & 0x0f; 127 *(s++) = NIBBLE_TO_ASCII (c1); 128 c1 = (c >> 20) & 0x0f; 129 *(s++) = NIBBLE_TO_ASCII (c1); 130 c1 = (c >> 16) & 0x0f; 131 *(s++) = NIBBLE_TO_ASCII (c1); 132 c1 = (c >> 12) & 0x0f; 133 *(s++) = NIBBLE_TO_ASCII (c1); 134 c1 = (c >> 8) & 0x0f; 135 *(s++) = NIBBLE_TO_ASCII (c1); 136 c1 = (c >> 4) & 0x0f; 137 *(s++) = NIBBLE_TO_ASCII (c1); 138 c1 = c & 0x0f; 139 *(s++) = NIBBLE_TO_ASCII (c1); 140 *s = 0; 141 return s; 142} 143 144static char *ctoh(char c, char* s) 145{ 146 char c1; 147 148 c1 = (c >> 4) & 0x0f; 149 *(s++) = NIBBLE_TO_ASCII (c1); 150 c1 = c & 0x0f; 151 *(s++) = NIBBLE_TO_ASCII (c1); 152 *s = 0; 153 return s; 154} 155 156static void hexdump(unsigned char *s, unsigned long l) 157{ 158 char bfr[80]; 159 char *pb; 160 unsigned long i, n = 0; 161 162 if (l == 0) 163 return; 164 165 while (n < l) { 166 pb = bfr; 167 pb = ltoh (n, pb); 168 *(pb++) = ':'; 169 *(pb++) = ' '; 170 for (i = 0; i < 16; i++) { 171 if (n + i >= l) { 172 *(pb++) = ' '; 173 *(pb++) = ' '; 174 } else 175 pb = ctoh (*(s + i), pb); 176 *(pb++) = ' '; 177 } 178 *(pb++) = ' '; 179 for (i = 0; i < 16; i++) { 180 if (n + i >= l) 181 break; 182 else 183 *(pb++) = (isprint (*(s + i)) ? *(s + i) : '.'); 184 } 185 *pb = 0; 186 n += 16; 187 s += 16; 188 puts(bfr); 189 } 190} 191 192static int do_connect(char *svr) 193{ 194 struct sockaddr_l2 addr; 195 struct l2cap_options opts; 196 struct l2cap_conninfo conn; 197 socklen_t optlen; 198 int sk, opt; 199 200 /* Create socket */ 201 sk = socket(PF_BLUETOOTH, socktype, BTPROTO_L2CAP); 202 if (sk < 0) { 203 syslog(LOG_ERR, "Can't create socket: %s (%d)", 204 strerror(errno), errno); 205 return -1; 206 } 207 208 /* Bind to local address */ 209 memset(&addr, 0, sizeof(addr)); 210 addr.l2_family = AF_BLUETOOTH; 211 bacpy(&addr.l2_bdaddr, &bdaddr); 212 213 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 214 syslog(LOG_ERR, "Can't bind socket: %s (%d)", 215 strerror(errno), errno); 216 goto error; 217 } 218 219 /* Get default options */ 220 memset(&opts, 0, sizeof(opts)); 221 optlen = sizeof(opts); 222 223 if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { 224 syslog(LOG_ERR, "Can't get default L2CAP options: %s (%d)", 225 strerror(errno), errno); 226 goto error; 227 } 228 229 /* Set new options */ 230 opts.omtu = omtu; 231 opts.imtu = imtu; 232 opts.mode = rfcmode; 233 234 opts.fcs = fcs; 235 opts.txwin_size = txwin_size; 236 opts.max_tx = max_transmit; 237 238 if (setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts)) < 0) { 239 syslog(LOG_ERR, "Can't set L2CAP options: %s (%d)", 240 strerror(errno), errno); 241 goto error; 242 } 243 244#if 0 245 /* Enable SO_TIMESTAMP */ 246 if (timestamp) { 247 int t = 1; 248 249 if (setsockopt(sk, SOL_SOCKET, SO_TIMESTAMP, &t, sizeof(t)) < 0) { 250 syslog(LOG_ERR, "Can't enable SO_TIMESTAMP: %s (%d)", 251 strerror(errno), errno); 252 goto error; 253 } 254 } 255#endif 256 257 /* Enable SO_LINGER */ 258 if (linger) { 259 struct linger l = { .l_onoff = 1, .l_linger = linger }; 260 261 if (setsockopt(sk, SOL_SOCKET, SO_LINGER, &l, sizeof(l)) < 0) { 262 syslog(LOG_ERR, "Can't enable SO_LINGER: %s (%d)", 263 strerror(errno), errno); 264 goto error; 265 } 266 } 267 268 /* Set link mode */ 269 opt = 0; 270 if (reliable) 271 opt |= L2CAP_LM_RELIABLE; 272 if (master) 273 opt |= L2CAP_LM_MASTER; 274 if (auth) 275 opt |= L2CAP_LM_AUTH; 276 if (encrypt) 277 opt |= L2CAP_LM_ENCRYPT; 278 if (secure) 279 opt |= L2CAP_LM_SECURE; 280 281 if (setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) { 282 syslog(LOG_ERR, "Can't set L2CAP link mode: %s (%d)", 283 strerror(errno), errno); 284 goto error; 285 } 286 287 /* Connect to remote device */ 288 memset(&addr, 0, sizeof(addr)); 289 addr.l2_family = AF_BLUETOOTH; 290 str2ba(svr, &addr.l2_bdaddr); 291 if (cid) 292 addr.l2_cid = htobs(cid); 293 else if (psm) 294 addr.l2_psm = htobs(psm); 295 else 296 goto error; 297 298 if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) { 299 syslog(LOG_ERR, "Can't connect: %s (%d)", 300 strerror(errno), errno); 301 goto error; 302 } 303 304 /* Get current options */ 305 memset(&opts, 0, sizeof(opts)); 306 optlen = sizeof(opts); 307 308 if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { 309 syslog(LOG_ERR, "Can't get L2CAP options: %s (%d)", 310 strerror(errno), errno); 311 goto error; 312 } 313 314 /* Get connection information */ 315 memset(&conn, 0, sizeof(conn)); 316 optlen = sizeof(conn); 317 318 if (getsockopt(sk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &optlen) < 0) { 319 syslog(LOG_ERR, "Can't get L2CAP connection information: %s (%d)", 320 strerror(errno), errno); 321 goto error; 322 } 323 324 syslog(LOG_INFO, "Connected [imtu %d, omtu %d, flush_to %d, " 325 "mode %d, handle %d, class 0x%02x%02x%02x]", 326 opts.imtu, opts.omtu, opts.flush_to, opts.mode, conn.hci_handle, 327 conn.dev_class[2], conn.dev_class[1], conn.dev_class[0]); 328 329 omtu = (opts.omtu > buffer_size) ? buffer_size : opts.omtu; 330 imtu = (opts.imtu > buffer_size) ? buffer_size : opts.imtu; 331 332 return sk; 333 334error: 335 close(sk); 336 return -1; 337} 338 339static void do_listen(void (*handler)(int sk)) 340{ 341 struct sockaddr_l2 addr; 342 struct l2cap_options opts; 343 struct l2cap_conninfo conn; 344 socklen_t optlen; 345 int sk, nsk, opt; 346 char ba[18]; 347 348 /* Create socket */ 349 sk = socket(PF_BLUETOOTH, socktype, BTPROTO_L2CAP); 350 if (sk < 0) { 351 syslog(LOG_ERR, "Can't create socket: %s (%d)", 352 strerror(errno), errno); 353 exit(1); 354 } 355 356 /* Bind to local address */ 357 memset(&addr, 0, sizeof(addr)); 358 addr.l2_family = AF_BLUETOOTH; 359 bacpy(&addr.l2_bdaddr, &bdaddr); 360 if (cid) 361 addr.l2_cid = htobs(cid); 362 else if (psm) 363 addr.l2_psm = htobs(psm); 364 else 365 goto error; 366 367 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 368 syslog(LOG_ERR, "Can't bind socket: %s (%d)", 369 strerror(errno), errno); 370 goto error; 371 } 372 373 /* Set link mode */ 374 opt = 0; 375 if (reliable) 376 opt |= L2CAP_LM_RELIABLE; 377 if (master) 378 opt |= L2CAP_LM_MASTER; 379 if (auth) 380 opt |= L2CAP_LM_AUTH; 381 if (encrypt) 382 opt |= L2CAP_LM_ENCRYPT; 383 if (secure) 384 opt |= L2CAP_LM_SECURE; 385 386 if (opt && setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) { 387 syslog(LOG_ERR, "Can't set L2CAP link mode: %s (%d)", 388 strerror(errno), errno); 389 goto error; 390 } 391 392 /* Get default options */ 393 memset(&opts, 0, sizeof(opts)); 394 optlen = sizeof(opts); 395 396 if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { 397 syslog(LOG_ERR, "Can't get default L2CAP options: %s (%d)", 398 strerror(errno), errno); 399 goto error; 400 } 401 402 /* Set new options */ 403 opts.omtu = omtu; 404 opts.imtu = imtu; 405 if (rfcmode > 0) 406 opts.mode = rfcmode; 407 408 opts.fcs = fcs; 409 opts.txwin_size = txwin_size; 410 opts.max_tx = max_transmit; 411 412 if (setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts)) < 0) { 413 syslog(LOG_ERR, "Can't set L2CAP options: %s (%d)", 414 strerror(errno), errno); 415 goto error; 416 } 417 418 if (socktype == SOCK_DGRAM) { 419 handler(sk); 420 return; 421 } 422 423 /* Enable deferred setup */ 424 opt = defer_setup; 425 426 if (opt && setsockopt(sk, SOL_BLUETOOTH, BT_DEFER_SETUP, 427 &opt, sizeof(opt)) < 0) { 428 syslog(LOG_ERR, "Can't enable deferred setup : %s (%d)", 429 strerror(errno), errno); 430 goto error; 431 } 432 433 /* Listen for connections */ 434 if (listen(sk, 10)) { 435 syslog(LOG_ERR, "Can not listen on the socket: %s (%d)", 436 strerror(errno), errno); 437 goto error; 438 } 439 440 /* Check for socket address */ 441 memset(&addr, 0, sizeof(addr)); 442 optlen = sizeof(addr); 443 444 if (getsockname(sk, (struct sockaddr *) &addr, &optlen) < 0) { 445 syslog(LOG_ERR, "Can't get socket name: %s (%d)", 446 strerror(errno), errno); 447 goto error; 448 } 449 450 psm = btohs(addr.l2_psm); 451 cid = btohs(addr.l2_cid); 452 453 syslog(LOG_INFO, "Waiting for connection on psm %d ...", psm); 454 455 while (1) { 456 memset(&addr, 0, sizeof(addr)); 457 optlen = sizeof(addr); 458 459 nsk = accept(sk, (struct sockaddr *) &addr, &optlen); 460 if (nsk < 0) { 461 syslog(LOG_ERR, "Accept failed: %s (%d)", 462 strerror(errno), errno); 463 goto error; 464 } 465 if (fork()) { 466 /* Parent */ 467 close(nsk); 468 continue; 469 } 470 /* Child */ 471 close(sk); 472 473 /* Get current options */ 474 memset(&opts, 0, sizeof(opts)); 475 optlen = sizeof(opts); 476 477 if (getsockopt(nsk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { 478 syslog(LOG_ERR, "Can't get L2CAP options: %s (%d)", 479 strerror(errno), errno); 480 if (!defer_setup) { 481 close(nsk); 482 goto error; 483 } 484 } 485 486 /* Get connection information */ 487 memset(&conn, 0, sizeof(conn)); 488 optlen = sizeof(conn); 489 490 if (getsockopt(nsk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &optlen) < 0) { 491 syslog(LOG_ERR, "Can't get L2CAP connection information: %s (%d)", 492 strerror(errno), errno); 493 if (!defer_setup) { 494 close(nsk); 495 goto error; 496 } 497 } 498 499 ba2str(&addr.l2_bdaddr, ba); 500 syslog(LOG_INFO, "Connect from %s [imtu %d, omtu %d, flush_to %d, " 501 "mode %d, handle %d, class 0x%02x%02x%02x]", 502 ba, opts.imtu, opts.omtu, opts.flush_to, opts.mode, conn.hci_handle, 503 conn.dev_class[2], conn.dev_class[1], conn.dev_class[0]); 504 505 omtu = (opts.omtu > buffer_size) ? buffer_size : opts.omtu; 506 imtu = (opts.imtu > buffer_size) ? buffer_size : opts.imtu; 507 508#if 0 509 /* Enable SO_TIMESTAMP */ 510 if (timestamp) { 511 int t = 1; 512 513 if (setsockopt(nsk, SOL_SOCKET, SO_TIMESTAMP, &t, sizeof(t)) < 0) { 514 syslog(LOG_ERR, "Can't enable SO_TIMESTAMP: %s (%d)", 515 strerror(errno), errno); 516 goto error; 517 } 518 } 519#endif 520 521 /* Enable SO_LINGER */ 522 if (linger) { 523 struct linger l = { .l_onoff = 1, .l_linger = linger }; 524 525 if (setsockopt(nsk, SOL_SOCKET, SO_LINGER, &l, sizeof(l)) < 0) { 526 syslog(LOG_ERR, "Can't enable SO_LINGER: %s (%d)", 527 strerror(errno), errno); 528 close(nsk); 529 goto error; 530 } 531 } 532 533 /* Handle deferred setup */ 534 if (defer_setup) { 535 syslog(LOG_INFO, "Waiting for %d seconds", 536 abs(defer_setup) - 1); 537 sleep(abs(defer_setup) - 1); 538 539 if (defer_setup < 0) { 540 close(nsk); 541 goto error; 542 } 543 } 544 545 handler(nsk); 546 547 syslog(LOG_INFO, "Disconnect: %m"); 548 exit(0); 549 } 550 551 return; 552 553error: 554 close(sk); 555 exit(1); 556} 557 558static void dump_mode(int sk) 559{ 560 socklen_t optlen; 561 int opt, len; 562 563 if (data_size < 0) 564 data_size = imtu; 565 566 if (defer_setup) { 567 len = read(sk, buf, sizeof(buf)); 568 if (len < 0) 569 syslog(LOG_ERR, "Initial read error: %s (%d)", 570 strerror(errno), errno); 571 else 572 syslog(LOG_INFO, "Initial bytes %d", len); 573 } 574 575 syslog(LOG_INFO, "Receiving ..."); 576 while (1) { 577 fd_set rset; 578 579 FD_ZERO(&rset); 580 FD_SET(sk, &rset); 581 582 if (select(sk + 1, &rset, NULL, NULL, NULL) < 0) 583 return; 584 585 if (!FD_ISSET(sk, &rset)) 586 continue; 587 588 len = read(sk, buf, data_size); 589 if (len <= 0) { 590 if (len < 0) { 591 if (reliable && (errno == ECOMM)) { 592 syslog(LOG_INFO, "L2CAP Error ECOMM - clearing error and continuing."); 593 optlen = sizeof(opt); 594 if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) { 595 syslog(LOG_ERR, "Couldn't getsockopt(SO_ERROR): %s (%d)", 596 strerror(errno), errno); 597 return; 598 } 599 continue; 600 } else { 601 syslog(LOG_ERR, "Read error: %s(%d)", 602 strerror(errno), errno); 603 } 604 } 605 return; 606 } 607 608 syslog(LOG_INFO, "Recevied %d bytes", len); 609 hexdump(buf, len); 610 } 611} 612 613static void recv_mode(int sk) 614{ 615 struct timeval tv_beg, tv_end, tv_diff; 616 struct pollfd p; 617 char ts[30]; 618 long total; 619 uint32_t seq; 620 socklen_t optlen; 621 int opt, len; 622 623 if (data_size < 0) 624 data_size = imtu; 625 626 if (defer_setup) { 627 len = read(sk, buf, sizeof(buf)); 628 if (len < 0) 629 syslog(LOG_ERR, "Initial read error: %s (%d)", 630 strerror(errno), errno); 631 else 632 syslog(LOG_INFO, "Initial bytes %d", len); 633 } 634 635 syslog(LOG_INFO, "Receiving ..."); 636 637 memset(ts, 0, sizeof(ts)); 638 639 p.fd = sk; 640 p.events = POLLIN | POLLERR | POLLHUP; 641 642 seq = 0; 643 while (1) { 644 gettimeofday(&tv_beg, NULL); 645 total = 0; 646 while (total < data_size) { 647 uint32_t sq; 648 uint16_t l; 649 int i; 650 651 p.revents = 0; 652 if (poll(&p, 1, -1) <= 0) 653 return; 654 655 if (p.revents & (POLLERR | POLLHUP)) 656 return; 657 658 len = recv(sk, buf, data_size, 0); 659 if (len < 0) { 660 if (reliable && (errno == ECOMM)) { 661 syslog(LOG_INFO, "L2CAP Error ECOMM - clearing error and continuing.\n"); 662 optlen = sizeof(opt); 663 if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) { 664 syslog(LOG_ERR, "Couldn't getsockopt(SO_ERROR): %s (%d)", 665 strerror(errno), errno); 666 return; 667 } 668 continue; 669 } else { 670 syslog(LOG_ERR, "Read failed: %s (%d)", 671 strerror(errno), errno); 672 } 673 } 674 675 if (len < 6) 676 break; 677 678 if (timestamp) { 679 struct timeval tv; 680 681 if (ioctl(sk, SIOCGSTAMP, &tv) < 0) { 682 timestamp = 0; 683 memset(ts, 0, sizeof(ts)); 684 } else { 685 sprintf(ts, "[%ld.%ld] ", 686 tv.tv_sec, tv.tv_usec); 687 } 688 } 689 690 /* Check sequence */ 691 sq = btohl(*(uint32_t *) buf); 692 if (seq != sq) { 693 syslog(LOG_INFO, "seq missmatch: %d -> %d", seq, sq); 694 seq = sq; 695 } 696 seq++; 697 698 /* Check length */ 699 l = btohs(*(uint16_t *) (buf + 4)); 700 if (len != l) { 701 syslog(LOG_INFO, "size missmatch: %d -> %d", len, l); 702 continue; 703 } 704 705 /* Verify data */ 706 for (i = 6; i < len; i++) { 707 if (buf[i] != 0x7f) 708 syslog(LOG_INFO, "data missmatch: byte %d 0x%2.2x", i, buf[i]); 709 } 710 711 total += len; 712 } 713 gettimeofday(&tv_end, NULL); 714 715 timersub(&tv_end, &tv_beg, &tv_diff); 716 717 syslog(LOG_INFO,"%s%ld bytes in %.2f sec, %.2f kB/s", ts, total, 718 tv2fl(tv_diff), (float)(total / tv2fl(tv_diff) ) / 1024.0); 719 } 720} 721 722static void do_send(int sk) 723{ 724 uint32_t seq; 725 int i, fd, len, buflen, size, sent; 726 727 syslog(LOG_INFO, "Sending ..."); 728 729 if (data_size < 0) 730 data_size = omtu; 731 732 if (filename) { 733 fd = open(filename, O_RDONLY); 734 if (fd < 0) { 735 syslog(LOG_ERR, "Open failed: %s (%d)", 736 strerror(errno), errno); 737 exit(1); 738 } 739 740 sent = 0; 741 size = read(fd, buf, data_size); 742 while (size > 0) { 743 buflen = (size > omtu) ? omtu : size; 744 745 len = send(sk, buf + sent, buflen, 0); 746 747 sent += len; 748 size -= len; 749 } 750 return; 751 } else { 752 for (i = 6; i < data_size; i++) 753 buf[i] = 0x7f; 754 } 755 756 seq = 0; 757 while ((num_frames == -1) || (num_frames-- > 0)) { 758 *(uint32_t *) buf = htobl(seq); 759 *(uint16_t *) (buf + 4) = htobs(data_size); 760 seq++; 761 762 sent = 0; 763 size = data_size; 764 while (size > 0) { 765 buflen = (size > omtu) ? omtu : size; 766 767 len = send(sk, buf, buflen, 0); 768 if (len < 0 || len != buflen) { 769 syslog(LOG_ERR, "Send failed: %s (%d)", 770 strerror(errno), errno); 771 exit(1); 772 } 773 774 sent += len; 775 size -= len; 776 } 777 778 if (num_frames && delay && count && !(seq % count)) 779 usleep(delay); 780 } 781} 782 783static void send_mode(int sk) 784{ 785 do_send(sk); 786 787 syslog(LOG_INFO, "Closing channel ..."); 788 if (shutdown(sk, SHUT_RDWR) < 0) 789 syslog(LOG_INFO, "Close failed: %m"); 790 else 791 syslog(LOG_INFO, "Done"); 792} 793 794static void senddump_mode(int sk) 795{ 796 do_send(sk); 797 798 dump_mode(sk); 799} 800 801static void send_and_recv_mode(int sk) 802{ 803 int flags; 804 805 if ((flags = fcntl(sk, F_GETFL, 0)) < 0) 806 flags = 0; 807 fcntl(sk, F_SETFL, flags | O_NONBLOCK); 808 809 /* fork for duplex channel */ 810 if (fork()) 811 send_mode(sk); 812 else 813 recv_mode(sk); 814 return; 815} 816 817static void reconnect_mode(char *svr) 818{ 819 while (1) { 820 int sk = do_connect(svr); 821 close(sk); 822 } 823} 824 825static void connect_mode(char *svr) 826{ 827 struct pollfd p; 828 int sk; 829 830 if ((sk = do_connect(svr)) < 0) 831 exit(1); 832 833 p.fd = sk; 834 p.events = POLLERR | POLLHUP; 835 836 while (1) { 837 p.revents = 0; 838 if (poll(&p, 1, 500)) 839 break; 840 } 841 842 syslog(LOG_INFO, "Disconnected"); 843 844 close(sk); 845} 846 847static void multi_connect_mode(int argc, char *argv[]) 848{ 849 int i, n, sk; 850 851 while (1) { 852 for (n = 0; n < argc; n++) { 853 for (i = 0; i < count; i++) { 854 if (fork()) 855 continue; 856 857 /* Child */ 858 sk = do_connect(argv[n]); 859 usleep(500); 860 close(sk); 861 exit(0); 862 } 863 } 864 sleep(4); 865 } 866} 867 868static void info_request(char *svr) 869{ 870 unsigned char buf[48]; 871 l2cap_cmd_hdr *cmd = (l2cap_cmd_hdr *) buf; 872 l2cap_info_req *req = (l2cap_info_req *) (buf + L2CAP_CMD_HDR_SIZE); 873 l2cap_info_rsp *rsp = (l2cap_info_rsp *) (buf + L2CAP_CMD_HDR_SIZE); 874 uint16_t mtu; 875 uint32_t channels, mask = 0x0000; 876 struct sockaddr_l2 addr; 877 int sk, err; 878 879 sk = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_L2CAP); 880 if (sk < 0) { 881 perror("Can't create socket"); 882 return; 883 } 884 885 memset(&addr, 0, sizeof(addr)); 886 addr.l2_family = AF_BLUETOOTH; 887 bacpy(&addr.l2_bdaddr, &bdaddr); 888 889 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 890 perror("Can't bind socket"); 891 goto failed; 892 } 893 894 memset(&addr, 0, sizeof(addr)); 895 addr.l2_family = AF_BLUETOOTH; 896 str2ba(svr, &addr.l2_bdaddr); 897 898 if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) { 899 perror("Can't connect socket"); 900 goto failed; 901 } 902 903 memset(buf, 0, sizeof(buf)); 904 cmd->code = L2CAP_INFO_REQ; 905 cmd->ident = 141; 906 cmd->len = htobs(2); 907 req->type = htobs(0x0001); 908 909 if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) { 910 perror("Can't send info request"); 911 goto failed; 912 } 913 914 err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 2, 0); 915 if (err < 0) { 916 perror("Can't receive info response"); 917 goto failed; 918 } 919 920 switch (btohs(rsp->result)) { 921 case 0x0000: 922 memcpy(&mtu, rsp->data, sizeof(mtu)); 923 printf("Connectionless MTU size is %d\n", btohs(mtu)); 924 break; 925 case 0x0001: 926 printf("Connectionless MTU is not supported\n"); 927 break; 928 } 929 930 memset(buf, 0, sizeof(buf)); 931 cmd->code = L2CAP_INFO_REQ; 932 cmd->ident = 142; 933 cmd->len = htobs(2); 934 req->type = htobs(0x0002); 935 936 if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) { 937 perror("Can't send info request"); 938 goto failed; 939 } 940 941 err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 4, 0); 942 if (err < 0) { 943 perror("Can't receive info response"); 944 goto failed; 945 } 946 947 switch (btohs(rsp->result)) { 948 case 0x0000: 949 memcpy(&mask, rsp->data, sizeof(mask)); 950 printf("Extended feature mask is 0x%04x\n", btohl(mask)); 951 if (mask & 0x01) 952 printf(" Flow control mode\n"); 953 if (mask & 0x02) 954 printf(" Retransmission mode\n"); 955 if (mask & 0x04) 956 printf(" Bi-directional QoS\n"); 957 if (mask & 0x08) 958 printf(" Enhanced Retransmission mode\n"); 959 if (mask & 0x10) 960 printf(" Streaming mode\n"); 961 if (mask & 0x20) 962 printf(" FCS Option\n"); 963 if (mask & 0x40) 964 printf(" Extended Flow Specification\n"); 965 if (mask & 0x80) 966 printf(" Fixed Channels\n"); 967 if (mask & 0x0100) 968 printf(" Extended Window Size\n"); 969 if (mask & 0x0200) 970 printf(" Unicast Connectionless Data Reception\n"); 971 break; 972 case 0x0001: 973 printf("Extended feature mask is not supported\n"); 974 break; 975 } 976 977 if (!(mask & 0x80)) 978 goto failed; 979 980 memset(buf, 0, sizeof(buf)); 981 cmd->code = L2CAP_INFO_REQ; 982 cmd->ident = 143; 983 cmd->len = htobs(2); 984 req->type = htobs(0x0003); 985 986 if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) { 987 perror("Can't send info request"); 988 goto failed; 989 } 990 991 err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 8, 0); 992 if (err < 0) { 993 perror("Can't receive info response"); 994 goto failed; 995 } 996 997 switch (btohs(rsp->result)) { 998 case 0x0000: 999 memcpy(&channels, rsp->data, sizeof(channels)); 1000 printf("Fixed channels list is 0x%04x\n", btohl(channels)); 1001 break; 1002 case 0x0001: 1003 printf("Fixed channels list is not supported\n"); 1004 break; 1005 } 1006 1007failed: 1008 close(sk); 1009} 1010 1011static void do_pairing(char *svr) 1012{ 1013 struct sockaddr_l2 addr; 1014 int sk, opt; 1015 1016 sk = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_L2CAP); 1017 if (sk < 0) { 1018 perror("Can't create socket"); 1019 return; 1020 } 1021 1022 memset(&addr, 0, sizeof(addr)); 1023 addr.l2_family = AF_BLUETOOTH; 1024 bacpy(&addr.l2_bdaddr, &bdaddr); 1025 1026 if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { 1027 perror("Can't bind socket"); 1028 goto failed; 1029 } 1030 1031 if (secure) 1032 opt = L2CAP_LM_SECURE; 1033 else 1034 opt = L2CAP_LM_ENCRYPT; 1035 1036 if (setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) { 1037 perror("Can't set link mode"); 1038 goto failed; 1039 } 1040 1041 memset(&addr, 0, sizeof(addr)); 1042 addr.l2_family = AF_BLUETOOTH; 1043 str2ba(svr, &addr.l2_bdaddr); 1044 1045 if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) { 1046 perror("Can't connect socket"); 1047 goto failed; 1048 } 1049 1050 printf("Pairing successful\n"); 1051 1052failed: 1053 close(sk); 1054} 1055 1056static void usage(void) 1057{ 1058 printf("l2test - L2CAP testing\n" 1059 "Usage:\n"); 1060 printf("\tl2test <mode> [options] [bdaddr]\n"); 1061 printf("Modes:\n" 1062 "\t-r listen and receive\n" 1063 "\t-w listen and send\n" 1064 "\t-d listen and dump incoming data\n" 1065 "\t-x listen, then send, then dump incoming data\n" 1066 "\t-t listen, then send and receive at the same time\n" 1067 "\t-q connect, then send and receive at the same time\n" 1068 "\t-s connect and send\n" 1069 "\t-u connect and receive\n" 1070 "\t-n connect and be silent\n" 1071 "\t-y connect, then send, then dump incoming data\n" 1072 "\t-c connect, disconnect, connect, ...\n" 1073 "\t-m multiple connects\n" 1074 "\t-p trigger dedicated bonding\n" 1075 "\t-z information request\n"); 1076 1077 printf("Options:\n" 1078 "\t[-b bytes] [-i device] [-P psm] [-J cid]\n" 1079 "\t[-I imtu] [-O omtu]\n" 1080 "\t[-L seconds] enable SO_LINGER\n" 1081 "\t[-W seconds] enable deferred setup\n" 1082 "\t[-B filename] use data packets from file\n" 1083 "\t[-N num] send num frames (default = infinite)\n" 1084 "\t[-C num] send num frames before delay (default = 1)\n" 1085 "\t[-D milliseconds] delay after sending num frames (default = 0)\n" 1086 "\t[-X mode] select retransmission/flow-control mode\n" 1087 "\t[-F fcs] use CRC16 check (default = 1)\n" 1088 "\t[-Q num] Max Transmit value (default = 3)\n" 1089 "\t[-Z size] Transmission Window size (default = 63)\n" 1090 "\t[-R] reliable mode\n" 1091 "\t[-G] use connectionless channel (datagram)\n" 1092 "\t[-U] use sock stream\n" 1093 "\t[-A] request authentication\n" 1094 "\t[-E] request encryption\n" 1095 "\t[-S] secure connection\n" 1096 "\t[-M] become master\n" 1097 "\t[-T] enable timestamps\n"); 1098} 1099 1100int main(int argc, char *argv[]) 1101{ 1102 struct sigaction sa; 1103 int opt, sk, mode = RECV, need_addr = 0; 1104 1105 bacpy(&bdaddr, BDADDR_ANY); 1106 1107 while ((opt=getopt(argc,argv,"rdscuwmntqxyzpb:i:P:I:O:J:B:N:L:W:C:D:X:F:Q:Z:RUGAESMT")) != EOF) { 1108 switch(opt) { 1109 case 'r': 1110 mode = RECV; 1111 break; 1112 1113 case 's': 1114 mode = SEND; 1115 need_addr = 1; 1116 break; 1117 1118 case 'w': 1119 mode = LSEND; 1120 break; 1121 1122 case 'u': 1123 mode = CRECV; 1124 need_addr = 1; 1125 break; 1126 1127 case 'd': 1128 mode = DUMP; 1129 break; 1130 1131 case 'c': 1132 mode = RECONNECT; 1133 need_addr = 1; 1134 break; 1135 1136 case 'n': 1137 mode = CONNECT; 1138 need_addr = 1; 1139 break; 1140 1141 case 'm': 1142 mode = MULTY; 1143 need_addr = 1; 1144 break; 1145 1146 case 't': 1147 mode = LSENDRECV; 1148 break; 1149 1150 case 'q': 1151 mode = CSENDRECV; 1152 need_addr = 1; 1153 break; 1154 1155 case 'x': 1156 mode = LSENDDUMP; 1157 break; 1158 1159 case 'y': 1160 mode = SENDDUMP; 1161 break; 1162 1163 case 'z': 1164 mode = INFOREQ; 1165 need_addr = 1; 1166 break; 1167 1168 case 'p': 1169 mode = PAIRING; 1170 need_addr = 1; 1171 break; 1172 1173 case 'b': 1174 data_size = atoi(optarg); 1175 break; 1176 1177 case 'i': 1178 if (!strncasecmp(optarg, "hci", 3)) 1179 hci_devba(atoi(optarg + 3), &bdaddr); 1180 else 1181 str2ba(optarg, &bdaddr); 1182 break; 1183 1184 case 'P': 1185 psm = atoi(optarg); 1186 break; 1187 1188 case 'I': 1189 imtu = atoi(optarg); 1190 break; 1191 1192 case 'O': 1193 omtu = atoi(optarg); 1194 break; 1195 1196 case 'L': 1197 linger = atoi(optarg); 1198 break; 1199 1200 case 'W': 1201 defer_setup = atoi(optarg); 1202 break; 1203 1204 case 'B': 1205 filename = strdup(optarg); 1206 break; 1207 1208 case 'N': 1209 num_frames = atoi(optarg); 1210 break; 1211 1212 case 'C': 1213 count = atoi(optarg); 1214 break; 1215 1216 case 'D': 1217 delay = atoi(optarg) * 1000; 1218 break; 1219 1220 case 'X': 1221 if (strcasecmp(optarg, "ertm") == 0) 1222 rfcmode = L2CAP_MODE_ERTM; 1223 else 1224 rfcmode = atoi(optarg); 1225 break; 1226 1227 case 'F': 1228 fcs = atoi(optarg); 1229 break; 1230 1231 case 'R': 1232 reliable = 1; 1233 break; 1234 1235 case 'M': 1236 master = 1; 1237 break; 1238 1239 case 'A': 1240 auth = 1; 1241 break; 1242 1243 case 'E': 1244 encrypt = 1; 1245 break; 1246 1247 case 'S': 1248 secure = 1; 1249 break; 1250 1251 case 'G': 1252 socktype = SOCK_DGRAM; 1253 break; 1254 1255 case 'U': 1256 socktype = SOCK_STREAM; 1257 break; 1258 1259 case 'T': 1260 timestamp = 1; 1261 break; 1262 1263 case 'Q': 1264 max_transmit = atoi(optarg); 1265 break; 1266 1267 case 'Z': 1268 txwin_size = atoi(optarg); 1269 break; 1270 1271 case 'J': 1272 cid = atoi(optarg); 1273 break; 1274 1275 default: 1276 usage(); 1277 exit(1); 1278 } 1279 } 1280 1281 if (need_addr && !(argc - optind)) { 1282 usage(); 1283 exit(1); 1284 } 1285 1286 if (data_size < 0) 1287 buffer_size = (omtu > imtu) ? omtu : imtu; 1288 else 1289 buffer_size = data_size; 1290 1291 if (!(buf = malloc(buffer_size))) { 1292 perror("Can't allocate data buffer"); 1293 exit(1); 1294 } 1295 1296 memset(&sa, 0, sizeof(sa)); 1297 sa.sa_handler = SIG_IGN; 1298 sa.sa_flags = SA_NOCLDSTOP; 1299 sigaction(SIGCHLD, &sa, NULL); 1300 1301 openlog("l2test", LOG_PERROR | LOG_PID, LOG_LOCAL0); 1302 1303 switch (mode) { 1304 case RECV: 1305 do_listen(recv_mode); 1306 break; 1307 1308 case CRECV: 1309 sk = do_connect(argv[optind]); 1310 if (sk < 0) 1311 exit(1); 1312 recv_mode(sk); 1313 break; 1314 1315 case DUMP: 1316 do_listen(dump_mode); 1317 break; 1318 1319 case SEND: 1320 sk = do_connect(argv[optind]); 1321 if (sk < 0) 1322 exit(1); 1323 send_mode(sk); 1324 break; 1325 1326 case LSEND: 1327 do_listen(send_mode); 1328 break; 1329 1330 case RECONNECT: 1331 reconnect_mode(argv[optind]); 1332 break; 1333 1334 case MULTY: 1335 multi_connect_mode(argc - optind, argv + optind); 1336 break; 1337 1338 case CONNECT: 1339 connect_mode(argv[optind]); 1340 break; 1341 1342 case SENDDUMP: 1343 sk = do_connect(argv[optind]); 1344 if (sk < 0) 1345 exit(1); 1346 senddump_mode(sk); 1347 break; 1348 1349 case LSENDDUMP: 1350 do_listen(senddump_mode); 1351 break; 1352 1353 case LSENDRECV: 1354 do_listen(send_and_recv_mode); 1355 break; 1356 1357 case CSENDRECV: 1358 sk = do_connect(argv[optind]); 1359 if (sk < 0) 1360 exit(1); 1361 1362 send_and_recv_mode(sk); 1363 break; 1364 1365 case INFOREQ: 1366 info_request(argv[optind]); 1367 exit(0); 1368 1369 case PAIRING: 1370 do_pairing(argv[optind]); 1371 exit(0); 1372 } 1373 1374 syslog(LOG_INFO, "Exit"); 1375 1376 closelog(); 1377 1378 return 0; 1379} 1380