Hi Scott, > >> So it turns out that the Mac isn't doing anything special either; it's > >> doing ordinary 2.0 authentication. But the twist is an L2CAP > >> connection and configuration request/response before authentication is > >> requested, this seems to enable the keyboard sending a Vendor Event > >> every time a key is pressed during authentication. > > > > that is what I thought. Get your Packet Logger in OS X running and hope > > that it decodes a bit more. However getting this integrated into BlueZ > > might be a lot trickier. This is nasty stuff. > > > Right now it looks like it's just making a connection to the HID > Interrupt PSM (0x13), and while that connection is open, seeing the > keypresses. > > Is there an L2CAP debugger on the Linux side, so I can make sure I'm > replicating what it's doing packetwise? hcidump can record binary logfiles with -w. If you use hcidump 2.x then it automatically record into BTSnoop format. Supported by Wireshark as well. You can also use -R to see the raw data packets. Regards Marcel -- To unsubscribe from this list: send the line "unsubscribe linux-bluetooth" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html