On Mon, Jan 9, 2012 at 12:16 PM, Marcel Holtmann <marcel@xxxxxxxxxxxx> wrote: > > Right now it looks like it's just making a connection to the HID > > Interrupt PSM (0x13), and while that connection is open, seeing the > > keypresses. > > > > Is there an L2CAP debugger on the Linux side, so I can make sure I'm > > replicating what it's doing packetwise? > > hcidump can record binary logfiles with -w. If you use hcidump 2.x then > it automatically record into BTSnoop format. Supported by Wireshark as > well. You can also use -R to see the raw data packets. > Ok, so here's what's happening: When it sees that it's pairing with an Apple keyboard, OS X makes an L2CAP connection to the HID Interrupt PSM (0x13) between the initial connection to the keyboard and the authentication request. This connection receives a notification every time a key is pressed (any key, OS X doesn't care, it moves along to the next). Once authentication is complete, OS X drops this L2CAP connection Scott -- Scott James Remnant | Chrome OS Systems | keybuk@xxxxxxxxxx | Google -- To unsubscribe from this list: send the line "unsubscribe linux-bluetooth" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html