/btstack/test/mesh/ |
H A D | simulator.py | 130 def emit_command_complete(self, opcode, result): argument 132 …rite(self.fd, '\x04\x0e' + chr(3 + len(result)) + chr(1) + chr(opcode & 255) + chr(opcode >> 8) +… 163 opcode = little_endian_read_16(packet, 0) 165 if opcode == 0x0c03: 166 self.emit_command_complete(opcode, '\x00') 168 if opcode == 0x1001: 169 self.emit_command_complete(opcode, '\x00\x10\x00\x06\x86\x1d\x06\x0a\x00\x86\x1d') 171 if opcode == 0x0c14: 172 self.emit_command_complete(opcode, '\x00' + self.name) 174 if opcode == 0x1002: [all …]
|
H A D | mock.c | 134 if (cmd->opcode == hci_le_encrypt.opcode){ in hci_send_cmd() 150 if (cmd->opcode == hci_le_rand.opcode){ in hci_send_cmd()
|
H A D | dump_mesh_pklg.py | 269 self.opcode = self.data[0] & 0x7f 270 self.add_property('opcode', self.opcode) 375 self.opcode = data[0] 378 self.opcode = read_net_16(data[0:2]) 381 self.opcode = read_net_24(data[0:3]) 383 self.add_property('opcode', self.opcode) 386 if self.opcode in access_messages: 387 self.summary = access_messages[self.opcode] 472 control_pdu.opcode = control_pdu.data[0] 473 control_pdu.add_property('opcode', control_pdu.opcode)
|
/btstack/chipset/cinnamon/ |
H A D | controller.c | 82 static void send_command_complete(uint16_t opcode, uint8_t status, const uint8_t * result, uint16_t… in send_command_complete() argument 84 &hci_event_command_complete, /* num commands */ 1, opcode, status, len, result); in send_command_complete() 89 static void fake_command_complete(uint16_t opcode){ in fake_command_complete() argument 91 &hci_event_command_complete, /* num commands */ 1, opcode, ERROR_CODE_SUCCESS, 0, NULL); in fake_command_complete() 104 uint16_t opcode = little_endian_read_16(packet, 0); in controller_handle_hci_command() local 105 switch (opcode){ in controller_handle_hci_command() 107 fake_command_complete(opcode); in controller_handle_hci_command() 111 send_command_complete(opcode, 0, local_supported_features, 8); in controller_handle_hci_command() 114 send_command_complete(opcode, 0, read_buffer_size_result, 8); in controller_handle_hci_command() 126 send_command_complete(opcode, status, NULL, 0); in controller_handle_hci_command() [all …]
|
/btstack/test/gap/ |
H A D | hci_test.cpp | 114 CHECK_EQUAL(expected_hci_command->opcode, actual_opcode); in CHECK_HCI_COMMAND() 582 static void simulate_hci_command_complete(uint16_t opcode, uint8_t status, uint8_t variant) { in simulate_hci_command_complete() argument 587 little_endian_store_16(packet, 3, opcode); in simulate_hci_command_complete() 589 switch (opcode) { in simulate_hci_command_complete() 614 uint16_t opcode; in TEST() member 618 {.opcode = HCI_OPCODE_HCI_READ_LOCAL_NAME, .status = ERROR_CODE_SUCCESS}, in TEST() 619 {.opcode = HCI_OPCODE_HCI_READ_LOCAL_NAME, .status = ERROR_CODE_UNKNOWN_HCI_COMMAND }, in TEST() 620 {.opcode = HCI_OPCODE_HCI_READ_BUFFER_SIZE, .status = ERROR_CODE_SUCCESS}, in TEST() 621 {.opcode = HCI_OPCODE_HCI_READ_RSSI, .status = ERROR_CODE_SUCCESS}, in TEST() 622 {.opcode = HCI_OPCODE_HCI_READ_RSSI, .status = ERROR_CODE_UNKNOWN_HCI_COMMAND}, in TEST() [all …]
|
/btstack/src/mesh/ |
H A D | mesh_access.c | 64 …st mesh_operation_t * mesh_model_lookup_operation_by_opcode(mesh_model_t * model, uint32_t opcode); 212 static void mesh_access_acknowledged_received(uint16_t rx_src, uint32_t opcode){ in mesh_access_acknowledged_received() argument 222 if (((mesh_upper_transport_pdu_t *) tx_pdu)->ack_opcode != opcode) continue; in mesh_access_acknowledged_received() 499 static int mesh_access_get_opcode(uint8_t * buffer, uint16_t buffer_size, uint32_t * opcode, uint16… in mesh_access_get_opcode() argument 504 *opcode = buffer[0]; in mesh_access_get_opcode() 509 *opcode = big_endian_read_16(buffer, 0); in mesh_access_get_opcode() 514 *opcode = (buffer[0] << 16) | little_endian_read_16(buffer, 1); in mesh_access_get_opcode() 522 int mesh_access_pdu_get_opcode(mesh_pdu_t * pdu, uint32_t * opcode, uint16_t * opcode_size){ in mesh_access_pdu_get_opcode() argument 524 …mesh_access_get_opcode(((mesh_access_pdu_t *) pdu)->data, ((mesh_access_pdu_t *) pdu)->len, opcode, in mesh_access_pdu_get_opcode() 539 int ok = mesh_access_get_opcode(state->data, state->len, &state->opcode, &opcode_size); in mesh_access_parser_init() [all …]
|
H A D | mesh_access.h | 115 uint32_t opcode; member 121 uint32_t opcode; member 236 int mesh_access_pdu_get_opcode(mesh_pdu_t * pdu, uint32_t * opcode, uint16_t * opcode_size); 251 void mesh_access_message_init(mesh_upper_transport_builder_t * builder, uint32_t opcode);
|
H A D | mesh_proxy.c | 349 mesh_proxy_configuration_message_opcode_t opcode; in proxy_configuration_message_handler() local 358 opcode = network_pdu_data[0]; in proxy_configuration_message_handler() 359 switch (opcode){ in proxy_configuration_message_handler() 395 printf("proxy config not implemented, opcode %d\n", opcode); in proxy_configuration_message_handler()
|
H A D | mesh_upper_transport.h | 158 …u_t * network_pdu, uint16_t netkey_index, uint8_t ttl, uint16_t src, uint16_t dest, uint8_t opcode, 171 …du_t * upper_pdu, uint16_t netkey_index, uint8_t ttl, uint16_t src, uint16_t dest, uint8_t opcode);
|
/btstack/src/classic/ |
H A D | obex_parser.c | 55 static uint16_t obex_parser_param_size_for_request(uint8_t opcode){ in obex_parser_param_size_for_request() argument 56 switch (opcode) { in obex_parser_param_size_for_request() 66 static uint16_t obex_parser_param_size_for_response(uint8_t opcode){ in obex_parser_param_size_for_response() argument 67 switch (opcode) { in obex_parser_param_size_for_response() 87 void obex_parser_init_for_response(obex_parser_t * obex_parser, uint8_t opcode, obex_parser_callbac… in obex_parser_init_for_response() argument 90 obex_parser->opcode = opcode; in obex_parser_init_for_response() 99 obex_parser->opcode = *data_buffer; in obex_parser_process_data() 101 obex_parser->item_len = obex_parser_param_size_for_request(obex_parser->opcode); in obex_parser_process_data() 107 obex_parser->item_len = obex_parser_param_size_for_response(obex_parser->opcode); in obex_parser_process_data() 231 obex_operation_info->opcode = obex_parser->opcode; in obex_parser_get_operation_info() [all …]
|
H A D | obex_parser.h | 93 uint8_t opcode; member 108 uint8_t opcode; member 175 void obex_parser_init_for_response(obex_parser_t * obex_parser, uint8_t opcode, obex_parser_callbac…
|
/btstack/port/stm32-wb55xx-nucleo-freertos/Middlewares/STM32_WPAN/interface/patterns/ble_thread/tl/ |
H A D | hci_tl.c | 58 static void SendCmd(uint16_t opcode, uint8_t plen, void *param); 145 uint16_t opcode; in hci_send_req() local 154 opcode = ((p_cmd->ocf) & 0x03ff) | ((p_cmd->ogf) << 10); in hci_send_req() 155 SendCmd(opcode, p_cmd->clen, p_cmd->cparam); in hci_send_req() 171 if(pcommand_status_event->cmdcode == opcode) in hci_send_req() 185 if(pcommand_complete_event->cmdcode == opcode) in hci_send_req() 233 static void SendCmd(uint16_t opcode, uint8_t plen, void *param) in SendCmd() argument 235 pCmdBuffer->cmdserial.cmd.cmdcode = opcode; in SendCmd()
|
/btstack/tool/ |
H A D | dump_gatt.py | 85 opcode = pdu[0] 86 if opcode == 0x01: 88 elif opcode == 0x02: 91 elif opcode == 0x03: 94 elif opcode == 0x08: 98 elif opcode == 0x09: 113 elif opcode == 0x10: 117 elif opcode == 0x11: 172 opcode = pdu[0] 173 remote_server = ((opcode & 1) == 1) == direction_in
|
H A D | btstack_parser.py | 115 (opcode, daemon_ocf) = definition.groups() 117 opcodes[opcode] = ('OGF_BTSTACK', daemon_ocf) 120 (opcode, ogf, ocf) = definition.groups() 122 opcodes[opcode] = (ogf, ocf) 164 (opcode, format) = definition.groups() 172 (ogf, ocf) = opcodes[opcode]
|
H A D | dump_keys.py | 64 opcode = struct.unpack_from("<H", packet, 0)[0]; 65 if opcode == 0x201a: 70 elif opcode == 0x2019: 75 elif opcode == 0x040b:
|
/btstack/chipset/realtek/ |
H A D | btstack_chipset_realtek.c | 79 #define HCI_CMD_SET_OPCODE(buf, opcode) little_endian_store_16(buf, 0, opcode) argument 119 uint8_t opcode; member 125 uint32_t opcode; member 395 uint16_t opcode = hci_event_command_complete_get_command_opcode(packet); in hci_packet_handler() local 397 switch (opcode) { in hci_packet_handler() 542 uint8_t opcode; in rtk_get_fw_project_id() local 547 opcode = *p_buf; in rtk_get_fw_project_id() 549 if (opcode == 0x00) { in rtk_get_fw_project_id() 554 opcode, len, data); in rtk_get_fw_project_id() 604 uint32_t opcode, uint32_t *patch_len, uint8_t *sec_flag) in insert_patch() argument [all …]
|
/btstack/3rd-party/lwip/core/src/apps/tftp/ |
H A D | tftp.c | 121 init_packet(u16_t opcode, u16_t extra, size_t size) in init_packet() argument 128 payload[0] = PP_HTONS(opcode); in init_packet() 136 send_request(const ip_addr_t *addr, u16_t port, u16_t opcode, const char* fname, const char* mode) in send_request() argument 140 struct pbuf* p = init_packet(opcode, 0, fname_length + mode_length - 2); in send_request() 246 int opcode; in recv() local 258 opcode = sbuf[0]; in recv() 263 switch (opcode) { in recv() 300 tftp_state.handle = tftp_state.ctx->open(filename, mode, opcode == PP_HTONS(TFTP_WRQ)); in recv() 308 …LWIP_DEBUGF(TFTP_DEBUG | LWIP_DBG_STATE, ("tftp: %s request from ", (opcode == PP_HTONS(TFTP_WRQ))… in recv() 315 if (opcode == PP_HTONS(TFTP_WRQ)) { in recv()
|
/btstack/chipset/cc256x/ |
H A D | convert_bts_init_scripts.py | 156 opcode = (action_data[2] << 8) | action_data[1] 157 if opcode == 0xFF36: 159 if opcode == 0xFD0C: 161 if opcode == 0xFD82: 169 if opcode == 0xFD80:
|
/btstack/chipset/sx128x/SMTC_Drivers/sx1280-driver-c/ |
H A D | sx1280-hal.h | 56 void SX1280HalWriteCommand( RadioCommands_t opcode, uint8_t *buffer, uint16_t size ); 65 void SX1280HalReadCommand( RadioCommands_t opcode, uint8_t *buffer, uint16_t size );
|
H A D | radio.h | 55 void ( *WriteCommand )( RadioCommands_t opcode, uint8_t *buffer, uint16_t size ); 64 void ( *ReadCommand )( RadioCommands_t opcode, uint8_t *buffer, uint16_t size );
|
/btstack/test/security_manager/ |
H A D | mock.c | 108 …ket[] = {HCI_EVENT_COMMAND_COMPLETE, 4, 1, (uint8_t) cmd->opcode & 0xff, (uint8_t) cmd->opcode >> … in mock_simulate_command_complete() 245 if (cmd->opcode == hci_le_encrypt.opcode){ in hci_send_cmd()
|
/btstack/test/crypto/ |
H A D | mock.c | 51 if (cmd->opcode == hci_le_encrypt.opcode){ in hci_send_cmd()
|
/btstack/test/gatt_client/ |
H A D | mock.c | 33 …t[] = {HCI_EVENT_COMMAND_COMPLETE, 4, 1, (uint8_t) (cmd->opcode & 0xff), (uint8_t) (cmd->opcode >>… in mock_simulate_command_complete() 203 void sm_cmac_signed_write_start(const sm_key_t key, uint8_t opcode, uint16_t attribute_handle, uint… in sm_cmac_signed_write_start() argument
|
/btstack/test/obex/ |
H A D | obex_parser_test.cpp | 50 void parse_response(uint8_t opcode){ in TEST_GROUP() 51 obex_parser_init_for_response(&parser, opcode, &parser_callback, NULL); in TEST_GROUP() 95 CHECK_EQUAL(OBEX_OPCODE_CONNECT, op_info.opcode); in TEST()
|
/btstack/test/gatt_server/ |
H A D | mock.c | 31 …t[] = {HCI_EVENT_COMMAND_COMPLETE, 4, 1, (uint8_t) (cmd->opcode & 0xff), (uint8_t) (cmd->opcode >>… in mock_simulate_command_complete() 221 void sm_cmac_signed_write_start(const sm_key_t key, uint8_t opcode, uint16_t attribute_handle, uint… in sm_cmac_signed_write_start() argument
|