diff options
| author | Marcel Holtmann <marcel@holtmann.org> | 2008-07-26 19:00:53 +0200 | 
|---|---|---|
| committer | Marcel Holtmann <marcel@holtmann.org> | 2008-07-26 19:00:53 +0200 | 
| commit | d6ae1c3f777832f8e32702f81fe64e33a1396928 (patch) | |
| tree | 159a1e59f3929c9d795dbd1f3edd84d9dccba048 /test/l2test.c | |
| parent | b8e5fea8d31fbcd3d1c044385f8217dbf39892bb (diff) | |
| parent | 3382af9114a9b2e657c7ddd0a5511edda6a37a90 (diff) | |
Import bluez-utils-3.36 revision history
Diffstat (limited to 'test/l2test.c')
| -rw-r--r-- | test/l2test.c | 1104 | 
1 files changed, 1104 insertions, 0 deletions
diff --git a/test/l2test.c b/test/l2test.c new file mode 100644 index 00000000..bc57d6b6 --- /dev/null +++ b/test/l2test.c @@ -0,0 +1,1104 @@ +/* + * + *  BlueZ - Bluetooth protocol stack for Linux + * + *  Copyright (C) 2000-2001  Qualcomm Incorporated + *  Copyright (C) 2002-2003  Maxim Krasnyansky <maxk@qualcomm.com> + *  Copyright (C) 2002-2008  Marcel Holtmann <marcel@holtmann.org> + * + * + *  This program is free software; you can redistribute it and/or modify + *  it under the terms of the GNU General Public License as published by + *  the Free Software Foundation; either version 2 of the License, or + *  (at your option) any later version. + * + *  This program is distributed in the hope that it will be useful, + *  but WITHOUT ANY WARRANTY; without even the implied warranty of + *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the + *  GNU General Public License for more details. + * + *  You should have received a copy of the GNU General Public License + *  along with this program; if not, write to the Free Software + *  Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA + * + */ + +#ifdef HAVE_CONFIG_H +#include <config.h> +#endif + +#include <stdio.h> +#include <errno.h> +#include <ctype.h> +#include <fcntl.h> +#include <unistd.h> +#include <stdlib.h> +#include <getopt.h> +#include <syslog.h> +#include <signal.h> +#include <sys/time.h> +#include <sys/poll.h> +#include <sys/ioctl.h> +#include <sys/socket.h> + +#include <bluetooth/bluetooth.h> +#include <bluetooth/hci.h> +#include <bluetooth/hci_lib.h> +#include <bluetooth/l2cap.h> + +#define NIBBLE_TO_ASCII(c)  ((c) < 0x0a ? (c) + 0x30 : (c) + 0x57) + +/* Test modes */ +enum { +	SEND, +	RECV, +	RECONNECT, +	MULTY, +	DUMP, +	CONNECT, +	CRECV, +	LSEND, +	SENDDUMP, +	LSENDDUMP, +	INFOREQ +}; + +static unsigned char *buf; + +/* Default mtu */ +static int imtu = 672; +static int omtu = 0; + +/* Default data size */ +static long data_size = -1; + +/* Default addr and psm */ +static bdaddr_t bdaddr; +static unsigned short psm = 10; + +/* Default number of frames to send (-1 = infinite) */ +static int num_frames = -1; + +/* Default number of consecutive frames before the delay */ +static int count = 1; + +/* Default delay after sending count number of frames */ +static unsigned long delay = 0; + +static char *filename = NULL; + +static int rfcmode = 0; +static int master = 0; +static int auth = 0; +static int encrypt = 0; +static int secure = 0; +static int socktype = SOCK_SEQPACKET; +static int linger = 0; +static int reliable = 0; +static int timestamp = 0; + +static float tv2fl(struct timeval tv) +{ +	return (float)tv.tv_sec + (float)(tv.tv_usec/1000000.0); +} + +static char *ltoh(unsigned long c, char* s) +{ +	int c1; + +	c1     = (c >> 28) & 0x0f; +	*(s++) = NIBBLE_TO_ASCII (c1); +	c1     = (c >> 24) & 0x0f; +	*(s++) = NIBBLE_TO_ASCII (c1); +	c1     = (c >> 20) & 0x0f; +	*(s++) = NIBBLE_TO_ASCII (c1); +	c1     = (c >> 16) & 0x0f; +	*(s++) = NIBBLE_TO_ASCII (c1); +	c1     = (c >> 12) & 0x0f; +	*(s++) = NIBBLE_TO_ASCII (c1); +	c1     = (c >>  8) & 0x0f; +	*(s++) = NIBBLE_TO_ASCII (c1); +	c1     = (c >>  4) & 0x0f; +	*(s++) = NIBBLE_TO_ASCII (c1); +	c1     = c & 0x0f; +	*(s++) = NIBBLE_TO_ASCII (c1); +	*s     = 0; +	return s; +} + +static char *ctoh(char c, char* s) +{ +	char c1; + +	c1     = (c >> 4) & 0x0f; +	*(s++) = NIBBLE_TO_ASCII (c1); +	c1     = c & 0x0f; +	*(s++) = NIBBLE_TO_ASCII (c1); +	*s     = 0; +	return s; +} + +static void hexdump(unsigned char *s, unsigned long l) +{ +	char bfr[80]; +	char *pb; +	unsigned long i, n = 0; + +	if (l == 0) +		return; + +	while (n < l) { +		pb = bfr; +		pb = ltoh (n, pb); +		*(pb++) = ':'; +		*(pb++) = ' '; +		for (i = 0; i < 16; i++) { +			if (n + i >= l) { +				*(pb++) = ' '; +				*(pb++) = ' '; +			} else +				pb = ctoh (*(s + i), pb); +			*(pb++) = ' '; +		} +		*(pb++) = ' '; +		for (i = 0; i < 16; i++) { +			if (n + i >= l) +				break; +			else +				*(pb++) = (isprint (*(s + i)) ? *(s + i) : '.'); +		} +		*pb = 0; +		n += 16; +		s += 16; +		puts(bfr); +	} +} + +static int do_connect(char *svr) +{ +	struct sockaddr_l2 addr; +	struct l2cap_options opts; +	struct l2cap_conninfo conn; +	socklen_t optlen; +	int sk, opt; + +	/* Create socket */ +	sk = socket(PF_BLUETOOTH, socktype, BTPROTO_L2CAP); +	if (sk < 0) { +		syslog(LOG_ERR, "Can't create socket: %s (%d)", +							strerror(errno), errno); +		return -1; +	} + +	/* Bind to local address */ +	memset(&addr, 0, sizeof(addr)); +	addr.l2_family = AF_BLUETOOTH; +	bacpy(&addr.l2_bdaddr, &bdaddr); + +	if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { +		syslog(LOG_ERR, "Can't bind socket: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	/* Get default options */ +	memset(&opts, 0, sizeof(opts)); +	optlen = sizeof(opts); + +	if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { +		syslog(LOG_ERR, "Can't get default L2CAP options: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	/* Set new options */ +	opts.omtu = omtu; +	opts.imtu = imtu; +	if (rfcmode > 0) +		opts.mode = rfcmode; + +	if (setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts)) < 0) { +		syslog(LOG_ERR, "Can't set L2CAP options: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +#if 0 +	/* Enable SO_TIMESTAMP */ +	if (timestamp) { +		int t = 1; + +		if (setsockopt(sk, SOL_SOCKET, SO_TIMESTAMP, &t, sizeof(t)) < 0) { +			syslog(LOG_ERR, "Can't enable SO_TIMESTAMP: %s (%d)", +							strerror(errno), errno); +			goto error; +		} +	} +#endif + +	/* Enable SO_LINGER */ +	if (linger) { +		struct linger l = { .l_onoff = 1, .l_linger = linger }; + +		if (setsockopt(sk, SOL_SOCKET, SO_LINGER, &l, sizeof(l)) < 0) { +			syslog(LOG_ERR, "Can't enable SO_LINGER: %s (%d)", +							strerror(errno), errno); +			goto error; +		} +	} + +	/* Set link mode */ +	opt = 0; +	if (reliable) +		opt |= L2CAP_LM_RELIABLE; +	if (master) +		opt |= L2CAP_LM_MASTER; +	if (auth) +		opt |= L2CAP_LM_AUTH; +	if (encrypt) +		opt |= L2CAP_LM_ENCRYPT; +	if (secure) +		opt |= L2CAP_LM_SECURE; + +	if (setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) { +		syslog(LOG_ERR, "Can't set L2CAP link mode: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	/* Connect to remote device */ +	memset(&addr, 0, sizeof(addr)); +	addr.l2_family = AF_BLUETOOTH; +	str2ba(svr, &addr.l2_bdaddr); +	addr.l2_psm = htobs(psm); + +	if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) { +		syslog(LOG_ERR, "Can't connect: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	/* Get current options */ +	memset(&opts, 0, sizeof(opts)); +	optlen = sizeof(opts); + +	if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { +		syslog(LOG_ERR, "Can't get L2CAP options: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	/* Get connection information */ +	memset(&conn, 0, sizeof(conn)); +	optlen = sizeof(conn); + +	if (getsockopt(sk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &optlen) < 0) { +		syslog(LOG_ERR, "Can't get L2CAP connection information: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	syslog(LOG_INFO, "Connected [imtu %d, omtu %d, flush_to %d, " +				"mode %d, handle %d, class 0x%02x%02x%02x]", +		opts.imtu, opts.omtu, opts.flush_to, opts.mode, conn.hci_handle, +		conn.dev_class[2], conn.dev_class[1], conn.dev_class[0]); + +	if (data_size > opts.omtu) +		data_size = opts.omtu; + +	return sk; + +error: +	close(sk); +	return -1; +} + +static void do_listen(void (*handler)(int sk)) +{ +	struct sockaddr_l2 addr; +	struct l2cap_options opts; +	struct l2cap_conninfo conn; +	socklen_t optlen; +	int sk, nsk, opt; +	char ba[18]; + +	/* Create socket */ +	sk = socket(PF_BLUETOOTH, socktype, BTPROTO_L2CAP); +	if (sk < 0) { +		syslog(LOG_ERR, "Can't create socket: %s (%d)", +							strerror(errno), errno); +		exit(1); +	} + +	/* Bind to local address */ +	addr.l2_family = AF_BLUETOOTH; +	bacpy(&addr.l2_bdaddr, &bdaddr); +	addr.l2_psm = htobs(psm); + +	if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { +		syslog(LOG_ERR, "Can't bind socket: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	/* Set link mode */ +	opt = 0; +	if (reliable) +		opt |= L2CAP_LM_RELIABLE; +	if (master) +		opt |= L2CAP_LM_MASTER; +	if (auth) +		opt |= L2CAP_LM_AUTH; +	if (encrypt) +		opt |= L2CAP_LM_ENCRYPT; +	if (secure) +		opt |= L2CAP_LM_SECURE; + +	if (opt && setsockopt(sk, SOL_L2CAP, L2CAP_LM, &opt, sizeof(opt)) < 0) { +		syslog(LOG_ERR, "Can't set L2CAP link mode: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	/* Get default options */ +	memset(&opts, 0, sizeof(opts)); +	optlen = sizeof(opts); + +	if (getsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { +		syslog(LOG_ERR, "Can't get default L2CAP options: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	/* Set new options */ +	opts.omtu = omtu; +	opts.imtu = imtu; +	if (rfcmode > 0) +		opts.mode = rfcmode; + +	if (setsockopt(sk, SOL_L2CAP, L2CAP_OPTIONS, &opts, sizeof(opts)) < 0) { +		syslog(LOG_ERR, "Can't set L2CAP options: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	if (socktype == SOCK_DGRAM) { +		handler(sk); +		return; +	} + +	/* Listen for connections */ +	if (listen(sk, 10)) { +		syslog(LOG_ERR, "Can not listen on the socket: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	/* Check for socket address */ +	memset(&addr, 0, sizeof(addr)); +	optlen = sizeof(addr); + +	if (getsockname(sk, (struct sockaddr *) &addr, &optlen) < 0) { +		syslog(LOG_ERR, "Can't get socket name: %s (%d)", +							strerror(errno), errno); +		goto error; +	} + +	psm = btohs(addr.l2_psm); + +	syslog(LOG_INFO, "Waiting for connection on psm %d ...", psm); + +	while(1) { +		memset(&addr, 0, sizeof(addr)); +		optlen = sizeof(addr); + +		nsk = accept(sk, (struct sockaddr *) &addr, &optlen); +		if (nsk < 0) { +			syslog(LOG_ERR, "Accept failed: %s (%d)", +							strerror(errno), errno); +			goto error; +		} +		if (fork()) { +			/* Parent */ +			close(nsk); +			continue; +		} +		/* Child */ +		close(sk); + +		/* Get current options */ +		memset(&opts, 0, sizeof(opts)); +		optlen = sizeof(opts); + +		if (getsockopt(nsk, SOL_L2CAP, L2CAP_OPTIONS, &opts, &optlen) < 0) { +			syslog(LOG_ERR, "Can't get L2CAP options: %s (%d)", +							strerror(errno), errno); +			close(nsk); +			goto error; +		} + +		/* Get connection information */ +		memset(&conn, 0, sizeof(conn)); +		optlen = sizeof(conn); + +		if (getsockopt(nsk, SOL_L2CAP, L2CAP_CONNINFO, &conn, &optlen) < 0) { +			syslog(LOG_ERR, "Can't get L2CAP connection information: %s (%d)", +							strerror(errno), errno); +			close(nsk); +			goto error; +		} + +		ba2str(&addr.l2_bdaddr, ba); +		syslog(LOG_INFO, "Connect from %s [imtu %d, omtu %d, flush_to %d, " +					"mode %d, handle %d, class 0x%02x%02x%02x]", +			ba, opts.imtu, opts.omtu, opts.flush_to, opts.mode, conn.hci_handle, +			conn.dev_class[2], conn.dev_class[1], conn.dev_class[0]); + +#if 0 +		/* Enable SO_TIMESTAMP */ +		if (timestamp) { +			int t = 1; + +			if (setsockopt(nsk, SOL_SOCKET, SO_TIMESTAMP, &t, sizeof(t)) < 0) { +				syslog(LOG_ERR, "Can't enable SO_TIMESTAMP: %s (%d)", +							strerror(errno), errno); +				goto error; +			} +		} +#endif + +		/* Enable SO_LINGER */ +		if (linger) { +			struct linger l = { .l_onoff = 1, .l_linger = linger }; + +			if (setsockopt(nsk, SOL_SOCKET, SO_LINGER, &l, sizeof(l)) < 0) { +				syslog(LOG_ERR, "Can't enable SO_LINGER: %s (%d)", +							strerror(errno), errno); +				close(nsk); +				goto error; +			} +		} + +		handler(nsk); + +		syslog(LOG_INFO, "Disconnect: %m"); +		exit(0); +	} + +	return; + +error: +	close(sk); +	exit(1); +} + +static void dump_mode(int sk) +{ +	socklen_t optlen; +	int opt, len; + +	syslog(LOG_INFO, "Receiving ..."); +	while (1) { +		fd_set rset; + +		FD_ZERO(&rset); +		FD_SET(sk, &rset); + +		if (select(sk + 1, &rset, NULL, NULL, NULL) < 0) +			return; + +		if (!FD_ISSET(sk, &rset)) +			continue; + +		len = read(sk, buf, data_size); +		if (len <= 0) { +			if (len < 0) { +				if (reliable && (errno == ECOMM)) { +					syslog(LOG_INFO, "L2CAP Error ECOMM - clearing error and continuing."); +					optlen = sizeof(opt); +					if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) { +						syslog(LOG_ERR, "Couldn't getsockopt(SO_ERROR): %s (%d)", +							strerror(errno), errno); +						return; +					} +					continue; +				} else { +					syslog(LOG_ERR, "Read error: %s(%d)", +							strerror(errno), errno); +				} +			} +			return; +		} + +		syslog(LOG_INFO, "Recevied %d bytes", len); +		hexdump(buf, len); +	} +} + +static void recv_mode(int sk) +{ +	struct timeval tv_beg, tv_end, tv_diff; +	struct pollfd p; +	char ts[30]; +	long total; +	uint32_t seq; +	socklen_t optlen; +	int opt; + +	syslog(LOG_INFO, "Receiving ..."); + +	memset(ts, 0, sizeof(ts)); + +	p.fd = sk; +	p.events = POLLIN | POLLERR | POLLHUP; + +	seq = 0; +	while (1) { +		gettimeofday(&tv_beg, NULL); +		total = 0; +		while (total < data_size) { +			uint32_t sq; +			uint16_t l; +			int i, len; + +			p.revents = 0; +			if (poll(&p, 1, -1) <= 0) +				return; + +			if (p.revents & (POLLERR | POLLHUP)) +				return; + +			len = recv(sk, buf, data_size, 0); +			if (len < 0) { +				if (reliable && (errno == ECOMM)) { +					syslog(LOG_INFO, "L2CAP Error ECOMM - clearing error and continuing.\n"); +					optlen = sizeof(opt); +					if (getsockopt(sk, SOL_SOCKET, SO_ERROR, &opt, &optlen) < 0) { +						syslog(LOG_ERR, "Couldn't getsockopt(SO_ERROR): %s (%d)", +							strerror(errno), errno); +						return; +					} +					continue; +				} else { +					syslog(LOG_ERR, "Read failed: %s (%d)", +						strerror(errno), errno); +				} +			} + +			if (len < 6) +				break; + +			if (timestamp) { +				struct timeval tv; + +				if (ioctl(sk, SIOCGSTAMP, &tv) < 0) { +					timestamp = 0; +					memset(ts, 0, sizeof(ts)); +				} else { +					sprintf(ts, "[%ld.%ld] ", +							tv.tv_sec, tv.tv_usec); +				} +			} + +			/* Check sequence */ +			sq = btohl(*(uint32_t *) buf); +			if (seq != sq) { +				syslog(LOG_INFO, "seq missmatch: %d -> %d", seq, sq); +				seq = sq; +			} +			seq++; + +			/* Check length */ +			l = btohs(*(uint16_t *) (buf + 4)); +			if (len != l) { +				syslog(LOG_INFO, "size missmatch: %d -> %d", len, l); +				continue; +			} + +			/* Verify data */ +			for (i = 6; i < len; i++) { +				if (buf[i] != 0x7f) +					syslog(LOG_INFO, "data missmatch: byte %d 0x%2.2x", i, buf[i]); +			} + +			total += len; +		} +		gettimeofday(&tv_end, NULL); + +		timersub(&tv_end, &tv_beg, &tv_diff); + +		syslog(LOG_INFO,"%s%ld bytes in %.2f sec, %.2f kB/s", ts, total, +			tv2fl(tv_diff), (float)(total / tv2fl(tv_diff) ) / 1024.0); +	} +} + +static void do_send(int sk) +{ +	uint32_t seq; +	int i, fd, len; + +	syslog(LOG_INFO, "Sending ..."); + +	if (filename) { +		fd = open(filename, O_RDONLY); +		if (fd < 0) { +			syslog(LOG_ERR, "Open failed: %s (%d)", +							strerror(errno), errno); +			exit(1); +		} +		len = read(fd, buf, data_size); +		send(sk, buf, len, 0); +		return; +	} else { +		for (i = 6; i < data_size; i++) +			buf[i] = 0x7f; +	} + +	seq = 0; +	while ((num_frames == -1) || (num_frames-- > 0)) { +		*(uint32_t *) buf = htobl(seq); +		*(uint16_t *) (buf + 4) = htobs(data_size); +		seq++; + +		len = send(sk, buf, data_size, 0); +		if (len < 0 || len != data_size) { +			syslog(LOG_ERR, "Send failed: %s (%d)", +							strerror(errno), errno); +			exit(1); +		} + +		if (num_frames && delay && count && !(seq % count)) +			usleep(delay); +	} +} + +static void send_mode(int sk) +{ +	do_send(sk); + +	syslog(LOG_INFO, "Closing channel ..."); +	if (shutdown(sk, SHUT_RDWR) < 0) +		syslog(LOG_INFO, "Close failed: %m"); +	else +		syslog(LOG_INFO, "Done"); +} + +static void senddump_mode(int sk) +{ +	do_send(sk); + +	dump_mode(sk); +} + +static void reconnect_mode(char *svr) +{ +	while (1) { +		int sk = do_connect(svr); +		close(sk); +	} +} + +static void connect_mode(char *svr) +{ +	struct pollfd p; +	int sk; + +	if ((sk = do_connect(svr)) < 0) +		exit(1); + +	p.fd = sk; +	p.events = POLLERR | POLLHUP; + +	while (1) { +		p.revents = 0; +		if (poll(&p, 1, 500)) +			break; +	} + +	syslog(LOG_INFO, "Disconnected"); + +	close(sk); +} + +static void multi_connect_mode(int argc, char *argv[]) +{ +	int i, n, sk; + +	while (1) { +		for (n = 0; n < argc; n++) { +			for (i = 0; i < count; i++) { +				if (fork()) +					continue; + +				/* Child */ +				sk = do_connect(argv[n]); +				usleep(500); +				close(sk); +				exit(0); +			} +		} +		sleep(4); +	} +} + +static void info_request(char *svr) +{ +	unsigned char buf[48]; +	l2cap_cmd_hdr *cmd = (l2cap_cmd_hdr *) buf; +	l2cap_info_req *req = (l2cap_info_req *) (buf + L2CAP_CMD_HDR_SIZE); +	l2cap_info_rsp *rsp = (l2cap_info_rsp *) (buf + L2CAP_CMD_HDR_SIZE); +	uint16_t mtu; +	uint32_t mask; +	struct sockaddr_l2 addr; +	int sk, err; + +	sk = socket(PF_BLUETOOTH, SOCK_RAW, BTPROTO_L2CAP); +	if (sk < 0) { +		perror("Can't create socket"); +		return; +	} + +	memset(&addr, 0, sizeof(addr)); +	addr.l2_family = AF_BLUETOOTH; +	bacpy(&addr.l2_bdaddr, &bdaddr); + +	if (bind(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0) { +		perror("Can't bind socket"); +		goto failed; +	} + +	memset(&addr, 0, sizeof(addr)); +	addr.l2_family = AF_BLUETOOTH; +	str2ba(svr, &addr.l2_bdaddr); + +	if (connect(sk, (struct sockaddr *) &addr, sizeof(addr)) < 0 ) { +		perror("Can't connect socket"); +		goto failed; +	} + +	memset(buf, 0, sizeof(buf)); +	cmd->code  = L2CAP_INFO_REQ; +	cmd->ident = 42; +	cmd->len   = htobs(2); +	req->type  = htobs(0x0001); + +	if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) { +		perror("Can't send info request"); +		goto failed; +	} + +	err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 2, 0); +	if (err < 0) { +		perror("Can't receive info response"); +		goto failed; +	} + +	switch (btohs(rsp->result)) { +	case 0x0000: +		mtu = btohs(bt_get_unaligned((uint16_t *) rsp->data)); +		printf("Connectionless MTU size is %d\n", mtu); +		break; +	case 0x0001: +		printf("Connectionless MTU is not supported\n"); +		break; +	} + +	memset(buf, 0, sizeof(buf)); +	cmd->code  = L2CAP_INFO_REQ; +	cmd->ident = 42; +	cmd->len   = htobs(2); +	req->type  = htobs(0x0002); + +	if (send(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_REQ_SIZE, 0) < 0) { +		perror("Can't send info request"); +		goto failed; +	} + +	err = recv(sk, buf, L2CAP_CMD_HDR_SIZE + L2CAP_INFO_RSP_SIZE + 4, 0); +	if (err < 0) { +		perror("Can't receive info response"); +		goto failed; +	} + +	switch (btohs(rsp->result)) { +	case 0x0000: +		mask = btohl(bt_get_unaligned((uint32_t *) rsp->data)); +		printf("Extended feature mask is 0x%04x\n", mask); +		if (mask & 0x01) +			printf("  Flow control mode\n"); +		if (mask & 0x02) +			printf("  Retransmission mode\n"); +		if (mask & 0x04) +			printf("  Bi-directional QoS\n"); +		break; +	case 0x0001: +		printf("Extended feature mask is not supported\n"); +		break; +	} + +failed: +	close(sk); +} + +static void usage(void) +{ +	printf("l2test - L2CAP testing\n" +		"Usage:\n"); +	printf("\tl2test <mode> [options] [bdaddr]\n"); +	printf("Modes:\n" +		"\t-r listen and receive\n" +		"\t-w listen and send\n" +		"\t-d listen and dump incoming data\n" +		"\t-x listen, then send, then dump incoming data\n" +		"\t-s connect and send\n" +		"\t-u connect and receive\n" +		"\t-n connect and be silent\n" +		"\t-y connect, then send, then dump incoming data\n" +		"\t-c connect, disconnect, connect, ...\n" +		"\t-m multiple connects\n" +		"\t-z information request\n"); + +	printf("Options:\n" +		"\t[-b bytes] [-i device] [-P psm]\n" +		"\t[-I imtu] [-O omtu]\n" +		"\t[-L seconds] enable SO_LINGER\n" +		"\t[-B filename] use data packets from file\n" +		"\t[-N num] send num frames (default = infinite)\n" +		"\t[-C num] send num frames before delay (default = 1)\n" +		"\t[-D milliseconds] delay after sending num frames (default = 0)\n" +		"\t[-X mode] select retransmission/flow-control mode\n" +		"\t[-R] reliable mode\n" +		"\t[-G] use connectionless channel (datagram)\n" +		"\t[-A] request authentication\n" +		"\t[-E] request encryption\n" +		"\t[-S] secure connection\n" +		"\t[-M] become master\n" +		"\t[-T] enable timestamps\n"); +} + +int main(int argc, char *argv[]) +{ +	struct sigaction sa; +	int opt, sk, mode = RECV, need_addr = 0; + +	bacpy(&bdaddr, BDADDR_ANY); + +	while ((opt=getopt(argc,argv,"rdscuwmnxyzb:i:P:I:O:B:N:L:C:D:X:RGAESMT")) != EOF) { +		switch(opt) { +		case 'r': +			mode = RECV; +			break; + +		case 's': +			mode = SEND; +			need_addr = 1; +			break; + +		case 'w': +			mode = LSEND; +			break; + +		case 'u': +			mode = CRECV; +			need_addr = 1; +			break; + +		case 'd': +			mode = DUMP; +			break; + +		case 'c': +			mode = RECONNECT; +			need_addr = 1; +			break; + +		case 'n': +			mode = CONNECT; +			need_addr = 1; +			break; + +		case 'm': +			mode = MULTY; +			need_addr = 1; +			break; + +		case 'x': +			mode = LSENDDUMP; +			break; + +		case 'y': +			mode = SENDDUMP; +			break; + +		case 'z': +			mode = INFOREQ; +			need_addr = 1; +			break; + +		case 'b': +			data_size = atoi(optarg); +			break; + +		case 'i': +			if (!strncasecmp(optarg, "hci", 3)) +				hci_devba(atoi(optarg + 3), &bdaddr); +			else +				str2ba(optarg, &bdaddr); +			break; + +		case 'P': +			psm = atoi(optarg); +			break; + +		case 'I': +			imtu = atoi(optarg); +			break; + +		case 'O': +			omtu = atoi(optarg); +			break; + +		case 'L': +			linger = atoi(optarg); +			break; + +		case 'B': +			filename = strdup(optarg); +			break; + +		case 'N': +			num_frames = atoi(optarg); +			break; + +		case 'C': +			count = atoi(optarg); +			break; + +		case 'D': +			delay = atoi(optarg) * 1000; +			break; + +		case 'X': +			rfcmode = atoi(optarg); +			break; + +		case 'R': +			reliable = 1; +			break; + +		case 'M': +			master = 1; +			break; + +		case 'A': +			auth = 1; +			break; + +		case 'E': +			encrypt = 1; +			break; + +		case 'S': +			secure = 1; +			break; + +		case 'G': +			socktype = SOCK_DGRAM; +			break; + +		case 'T': +			timestamp = 1; +			break; + +		default: +			usage(); +			exit(1); +		} +	} + +	if (need_addr && !(argc - optind)) { +		usage(); +		exit(1); +	} + +	if (data_size < 0) { +		data_size = 48; +		if (imtu > data_size) +			data_size = imtu; +		if (omtu > data_size) +			data_size = omtu; +	} + +	if (!(buf = malloc(data_size))) { +		perror("Can't allocate data buffer"); +		exit(1); +	} + +	memset(&sa, 0, sizeof(sa)); +	sa.sa_handler = SIG_IGN; +	sa.sa_flags   = SA_NOCLDSTOP; +	sigaction(SIGCHLD, &sa, NULL); + +	openlog("l2test", LOG_PERROR | LOG_PID, LOG_LOCAL0); + +	switch (mode) { +		case RECV: +			do_listen(recv_mode); +			break; + +		case CRECV: +			sk = do_connect(argv[optind]); +			if (sk < 0) +				exit(1); +			recv_mode(sk); +			break; + +		case DUMP: +			do_listen(dump_mode); +			break; + +		case SEND: +			sk = do_connect(argv[optind]); +			if (sk < 0) +				exit(1); +			send_mode(sk); +			break; + +		case LSEND: +			do_listen(send_mode); +			break; + +		case RECONNECT: +			reconnect_mode(argv[optind]); +			break; + +		case MULTY: +			multi_connect_mode(argc - optind, argv + optind); +			break; + +		case CONNECT: +			connect_mode(argv[optind]); +			break; + +		case SENDDUMP: +			sk = do_connect(argv[optind]); +			if (sk < 0) +				exit(1); +			senddump_mode(sk); +			break; + +		case LSENDDUMP: +			do_listen(senddump_mode); +			break; + +		case INFOREQ: +			info_request(argv[optind]); +			exit(0); +	} + +	syslog(LOG_INFO, "Exit"); + +	closelog(); + +	return 0; +}  | 
