Hi,
I just got my Ericsson k700i to work with hidd 2.24 (Ubuntu Dapper) and
would like to share what i needed to do:
If you never paired the phone with your computer before:
* edit /etc/bluetooth/pin, remember the number
If you did pair it before, but it's failing now (was the case after a
firmware upgrade in my case), remove the old pairing information in
/var/lib/bluetooth/<deviveId>
* edit /etc/default/bluez-utils
------------
HIDD_ENABLED=1
# -D (nosdp) special hack for k700i (and similar Ericsson phones afaik)
# -Z (nocheck) also needed in the setup procedure
HIDD_OPTIONS="--master --server -D -Z"
------------
* sudo /etc/init.d/bluez-utils restart
Now you should be able to connect from your phone's remote control menu-
enjoy!
Thanks to everybody who made this possible!
--
Gabriel Wicke
-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems? Stop! Download the new AJAX search engine that makes
searching your log files as easy as surfing the web. DOWNLOAD SPLUNK!
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=103432&bid=230486&dat=121642
_______________________________________________
Bluez-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/bluez-users
Still doesn't work for me with a K750i :/
rm all in /var/lib/bluetooth/
no device in the phone
# /usr/local/sbin/hcidump -X -V
HCI sniffer - Bluetooth packet analyzer ver 1.29
device: hci0 snap_len: 1028 filter: 0xffffffff
> HCI Event: Connect Request (0x04) plen 10
bdaddr 00:16:20:2E:4F:08 class 0x520204 type ACL
< HCI Command: Accept Connection Request (0x01|0x0009) plen 7
bdaddr 00:16:20:2E:4F:08 role 0x00
Role: Master
> HCI Event: Command Status (0x0f) plen 4
Accept Connection Request (0x01|0x0009) status 0x00 ncmd 1
> HCI Event: Role Change (0x12) plen 8
status 0x00 bdaddr 00:16:20:2E:4F:08 role 0x00
Role: Master
> HCI Event: PIN Code Request (0x16) plen 6
bdaddr 00:16:20:2E:4F:08
< HCI Command: PIN Code Request Reply (0x01|0x000d) plen 23
bdaddr 00:16:20:2E:4F:08 len 4 pin '1010'
> HCI Event: Command Complete (0x0e) plen 10
PIN Code Request Reply (0x01|0x000d) ncmd 1
status 0x00 bdaddr 00:16:20:2E:4F:08
> HCI Event: Link Key Notification (0x18) plen 23
bdaddr 00:16:20:2E:4F:08 key 7D2DBC19D998316AE9DB5D9645707E08 type 0
> HCI Event: Connect Complete (0x03) plen 11
status 0x00 handle 42 bdaddr 00:16:20:2E:4F:08 type ACL encrypt 0x01
< HCI Command: Write Link Policy Settings (0x02|0x000d) plen 4
handle 42 policy 0x0f
Link policy: RSWITCH HOLD SNIFF PARK
> HCI Event: Page Scan Repetition Mode Change (0x20) plen 7
bdaddr 00:16:20:2E:4F:08 mode 1
> HCI Event: Command Complete (0x0e) plen 6
Write Link Policy Settings (0x02|0x000d) ncmd 1
status 0x00 handle 42
< HCI Command: Change Connection Packet Type (0x01|0x000f) plen 4
handle 42 ptype 0xcc18
Packet type: DM1 DM3 DM5 DH1 DH3 DH5
> HCI Event: Command Status (0x0f) plen 4
Change Connection Packet Type (0x01|0x000f) status 0x00 ncmd 1
> HCI Event: Connection Packet Type Changed (0x1d) plen 5
status 0x00 handle 42 ptype 0xff1e
Packet type: DM1 DM3 DM5 DH1 DH3 DH5 2-DH1 2-DH3 2-DH5 3-DH1 3-DH3 3-DH5
> HCI Event: Max Slots Change (0x1b) plen 3
handle 42 slots 5
> ACL data: handle 42 flags 0x02 dlen 12
L2CAP(s): Connect req: psm 17 scid 0x0040
< ACL data: handle 42 flags 0x02 dlen 16
L2CAP(s): Connect rsp: dcid 0x0040 scid 0x0040 result 0 status 0
Connection successful
> HCI Event: Number of Completed Packets (0x13) plen 5
handle 42 packets 1
> ACL data: handle 42 flags 0x02 dlen 36
L2CAP(s): Config req: dcid 0x0040 flags 0x00 clen 24
QoS 0x01 (Best effort)
< ACL data: handle 42 flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0040 flags 0x00 result 0 clen 0
Success
< ACL data: handle 42 flags 0x02 dlen 16
L2CAP(s): Config req: dcid 0x0040 flags 0x00 clen 4
MTU 48
> HCI Event: Number of Completed Packets (0x13) plen 5
handle 42 packets 1
> HCI Event: Number of Completed Packets (0x13) plen 5
handle 42 packets 1
> ACL data: handle 42 flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0040 flags 0x00 result 0 clen 0
Success
> ACL data: handle 42 flags 0x02 dlen 12
L2CAP(s): Connect req: psm 19 scid 0x0041
< ACL data: handle 42 flags 0x02 dlen 16
L2CAP(s): Connect rsp: dcid 0x0041 scid 0x0041 result 0 status 0
Connection successful
> HCI Event: Number of Completed Packets (0x13) plen 5
handle 42 packets 1
> ACL data: handle 42 flags 0x02 dlen 36
L2CAP(s): Config req: dcid 0x0041 flags 0x00 clen 24
QoS 0x02 (Guaranteed)
< ACL data: handle 42 flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0041 flags 0x00 result 0 clen 0
Success
< ACL data: handle 42 flags 0x02 dlen 16
L2CAP(s): Config req: dcid 0x0041 flags 0x00 clen 4
MTU 48
> HCI Event: Number of Completed Packets (0x13) plen 5
handle 42 packets 1
> HCI Event: Number of Completed Packets (0x13) plen 5
handle 42 packets 1
> ACL data: handle 42 flags 0x02 dlen 14
L2CAP(s): Config rsp: scid 0x0041 flags 0x00 result 0 clen 0
Success
< ACL data: handle 42 flags 0x02 dlen 5
L2CAP(d): cid 0x0040 len 1 [psm 17]
HIDP: Set protocol: Boot protocol
< ACL data: handle 42 flags 0x02 dlen 7
L2CAP(d): cid 0x0041 len 3 [psm 19]
HIDP: Data: Output report
0000: 01 00 ..
> HCI Event: Number of Completed Packets (0x13) plen 5
handle 42 packets 1
> ACL data: handle 42 flags 0x02 dlen 5
L2CAP(d): cid 0x0040 len 1 [psm 17]
HIDP: Handshake: Successful
> HCI Event: Number of Completed Packets (0x13) plen 5
handle 42 packets 1
> ACL data: handle 42 flags 0x02 dlen 9
L2CAP(d): cid 0x0041 len 5 [psm 19]
HIDP: Data: Input report
0000: 02 00 f6 00 ....
> ACL data: handle 42 flags 0x02 dlen 9
L2CAP(d): cid 0x0041 len 5 [psm 19]
HIDP: Data: Input report
0000: 02 00 f6 00 ....
> ACL data: handle 42 flags 0x02 dlen 9
L2CAP(d): cid 0x0041 len 5 [psm 19]
HIDP: Data: Input report
0000: 02 00 f6 00 ....
> ACL data: handle 42 flags 0x02 dlen 9
L2CAP(d): cid 0x0041 len 5 [psm 19]
HIDP: Data: Input report
0000: 02 00 00 00 ....
> ACL data: handle 42 flags 0x02 dlen 9
L2CAP(d): cid 0x0041 len 5 [psm 19]
HIDP: Data: Input report
0000: 02 00 0a 00 ....
> ACL data: handle 42 flags 0x02 dlen 9
L2CAP(d): cid 0x0041 len 5 [psm 19]
HIDP: Data: Input report
0000: 02 00 0a 00 ....
> ACL data: handle 42 flags 0x02 dlen 9
L2CAP(d): cid 0x0041 len 5 [psm 19]
HIDP: Data: Input report
0000: 02 00 0a 00 ....
> ACL data: handle 42 flags 0x02 dlen 9
L2CAP(d): cid 0x0041 len 5 [psm 19]
HIDP: Data: Input report
0000: 02 00 00 00 ....
> ACL data: handle 42 flags 0x02 dlen 9
L2CAP(d): cid 0x0041 len 5 [psm 19]
HIDP: Data: Input report
0000: 02 00 00 00 ....
> ACL data: handle 42 flags 0x02 dlen 14
L2CAP(d): cid 0x0041 len 10 [psm 19]
HIDP: Data: Input report
0000: 01 00 00 00 00 00 00 00 00 .........
> ACL data: handle 42 flags 0x02 dlen 12
L2CAP(s): Disconn req: dcid 0x0041 scid 0x0041
< ACL data: handle 42 flags 0x02 dlen 12
L2CAP(s): Disconn rsp: dcid 0x0041 scid 0x0041
> HCI Event: Number of Completed Packets (0x13) plen 5
handle 42 packets 1
> ACL data: handle 42 flags 0x02 dlen 12
L2CAP(s): Disconn req: dcid 0x0040 scid 0x0040
< ACL data: handle 42 flags 0x02 dlen 12
L2CAP(s): Disconn rsp: dcid 0x0040 scid 0x0040
> HCI Event: Number of Completed Packets (0x13) plen 5
handle 42 packets 1
> HCI Event: Disconn Complete (0x05) plen 4
status 0x00 handle 42 reason 0x13
Reason: Remote User Terminated Connection
All works fine :)
But now the device is registred in the phone and the "local" device is in
/var/lib/bluetooth
I try again and :
# /usr/local/sbin/hcidump -X -V
HCI sniffer - Bluetooth packet analyzer ver 1.29
device: hci0 snap_len: 1028 filter: 0xffffffff
> HCI Event: Connect Request (0x04) plen 10
bdaddr 00:16:20:2E:4F:08 class 0x520204 type ACL
< HCI Command: Accept Connection Request (0x01|0x0009) plen 7
bdaddr 00:16:20:2E:4F:08 role 0x00
Role: Master
> HCI Event: Command Status (0x0f) plen 4
Accept Connection Request (0x01|0x0009) status 0x00 ncmd 1
> HCI Event: Role Change (0x12) plen 8
status 0x00 bdaddr 00:16:20:2E:4F:08 role 0x00
Role: Master
> HCI Event: Link Key Request (0x17) plen 6
bdaddr 00:16:20:2E:4F:08
< HCI Command: Link Key Request Reply (0x01|0x000b) plen 22
bdaddr 00:16:20:2E:4F:08 key 7D2DBC19D998316AE9DB5D9645707E08
> HCI Event: Command Complete (0x0e) plen 10
Link Key Request Reply (0x01|0x000b) ncmd 1
status 0x00 bdaddr 00:16:20:2E:4F:08
> HCI Event: Connect Complete (0x03) plen 11
status 0x00 handle 42 bdaddr 00:16:20:2E:4F:08 type ACL encrypt 0x01
< HCI Command: Write Link Policy Settings (0x02|0x000d) plen 4
handle 42 policy 0x0f
Link policy: RSWITCH HOLD SNIFF PARK
> HCI Event: Page Scan Repetition Mode Change (0x20) plen 7
bdaddr 00:16:20:2E:4F:08 mode 1
> HCI Event: Command Complete (0x0e) plen 6
Write Link Policy Settings (0x02|0x000d) ncmd 1
status 0x00 handle 42
< HCI Command: Change Connection Packet Type (0x01|0x000f) plen 4
handle 42 ptype 0xcc18
Packet type: DM1 DM3 DM5 DH1 DH3 DH5
> HCI Event: Command Status (0x0f) plen 4
Change Connection Packet Type (0x01|0x000f) status 0x00 ncmd 1
> HCI Event: Connection Packet Type Changed (0x1d) plen 5
status 0x00 handle 42 ptype 0xff1e
Packet type: DM1 DM3 DM5 DH1 DH3 DH5 2-DH1 2-DH3 2-DH5 3-DH1 3-DH3 3-DH5
> HCI Event: Max Slots Change (0x1b) plen 3
handle 42 slots 5
> HCI Event: Disconn Complete (0x05) plen 4
status 0x00 handle 42 reason 0x13
Reason: Remote User Terminated Connection
:/
The phone display "Connection failed"
Any idea ?
2006/1/30, Gabriel Wicke <[email protected]>:
>
> Hi,
>
> I just got my Ericsson k700i to work with hidd 2.24 (Ubuntu Dapper) and
> would like to share what i needed to do:
>
> If you never paired the phone with your computer before:
> * edit /etc/bluetooth/pin, remember the number
> If you did pair it before, but it's failing now (was the case after a
> firmware upgrade in my case), remove the old pairing information in
> /var/lib/bluetooth/<deviveId>
>
> * edit /etc/default/bluez-utils
> ------------
> HIDD_ENABLED=1
>
> # -D (nosdp) special hack for k700i (and similar Ericsson phones afaik)
> # -Z (nocheck) also needed in the setup procedure
> HIDD_OPTIONS="--master --server -D -Z"
> ------------
> * sudo /etc/init.d/bluez-utils restart
>
> Now you should be able to connect from your phone's remote control menu-
> enjoy!
>
> Thanks to everybody who made this possible!
> --
> Gabriel Wicke
>
>
>
>
> -------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc. Do you grep through log
> files
> for problems? Stop! Download the new AJAX search engine that makes
> searching your log files as easy as surfing the web. DOWNLOAD SPLUNK!
> http://sel.as-us.falkag.net/sel?cmd=lnk&kid=103432&bid=230486&dat=121642
> _______________________________________________
> Bluez-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/bluez-users
>
--
libert? - partage - respect
freedom - share - respect