Return-Path: Subject: RE: [Bluez-devel] Service level security for RFCOMM From: Marcel Holtmann To: Bhatt Abhi-ABHATT Cc: Stephen Crane , BlueZ Mailing List In-Reply-To: <5987A7CB1694D811A04D0002B32C289601BF3C01@il93exb05.corp.mot.com> References: <5987A7CB1694D811A04D0002B32C289601BF3C01@il93exb05.corp.mot.com> Content-Type: text/plain Message-Id: <1099069376.10164.75.camel@pegasus> Mime-Version: 1.0 Sender: bluez-devel-admin@lists.sourceforge.net Errors-To: bluez-devel-admin@lists.sourceforge.net List-Unsubscribe: , List-Id: List-Post: List-Help: List-Subscribe: , List-Archive: Date: Fri, 29 Oct 2004 19:02:56 +0200 Hi Abhi, > > Marcel is right here. You can try and kludge it by trying to enforce the > > security requirements _after_ the connection has been accepted but this > > is pretty horrible (and it's hard to prevent acceptAndOpen() returning a > > connection which is immediately closed). > > Sorry for the confusion but I wasn't referring to user space at all. I was thinking of having the rfcomm service level security implemented in almost the same way as the l2cap service level security(incoming connection). The service level security options could be set using setsockopt(..) in rfcomm. This in turn could be used to set the service level settings for the l2cap socket it uses. I can draw a sequence diagram(function calls) to show how i > picture the design. I'll do that. not needed, because it won't work this way. The L2CAP layer has nothing to do with it, you must interface with the HCI layer. Regards Marcel ------------------------------------------------------- This SF.Net email is sponsored by: Sybase ASE Linux Express Edition - download now for FREE LinuxWorld Reader's Choice Award Winner for best database on Linux. http://ads.osdn.com/?ad_id=5588&alloc_id=12065&op=click _______________________________________________ Bluez-devel mailing list Bluez-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bluez-devel