On Mon, Jan 9, 2012 at 11:54 AM, Marcel Holtmann <marcel@xxxxxxxxxxxx> wrote: >> So it turns out that the Mac isn't doing anything special either; it's >> doing ordinary 2.0 authentication. But the twist is an L2CAP >> connection and configuration request/response before authentication is >> requested, this seems to enable the keyboard sending a Vendor Event >> every time a key is pressed during authentication. > > that is what I thought. Get your Packet Logger in OS X running and hope > that it decodes a bit more. However getting this integrated into BlueZ > might be a lot trickier. This is nasty stuff. > Right now it looks like it's just making a connection to the HID Interrupt PSM (0x13), and while that connection is open, seeing the keypresses. Is there an L2CAP debugger on the Linux side, so I can make sure I'm replicating what it's doing packetwise? Scott -- Scott James Remnant | Chrome OS Systems | keybuk@xxxxxxxxxx | Google -- To unsubscribe from this list: send the line "unsubscribe linux-bluetooth" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html