Home
last modified time | relevance | path

Searched refs:opcode (Results 1 – 25 of 63) sorted by relevance

123

/btstack/test/mesh/
H A Dsimulator.py130 def emit_command_complete(self, opcode, result): argument
132 …rite(self.fd, '\x04\x0e' + chr(3 + len(result)) + chr(1) + chr(opcode & 255) + chr(opcode >> 8) +…
163 opcode = little_endian_read_16(packet, 0)
165 if opcode == 0x0c03:
166 self.emit_command_complete(opcode, '\x00')
168 if opcode == 0x1001:
169 self.emit_command_complete(opcode, '\x00\x10\x00\x06\x86\x1d\x06\x0a\x00\x86\x1d')
171 if opcode == 0x0c14:
172 self.emit_command_complete(opcode, '\x00' + self.name)
174 if opcode == 0x1002:
[all …]
H A Dmock.c134 if (cmd->opcode == hci_le_encrypt.opcode){ in hci_send_cmd()
150 if (cmd->opcode == hci_le_rand.opcode){ in hci_send_cmd()
H A Ddump_mesh_pklg.py269 self.opcode = self.data[0] & 0x7f
270 self.add_property('opcode', self.opcode)
375 self.opcode = data[0]
378 self.opcode = read_net_16(data[0:2])
381 self.opcode = read_net_24(data[0:3])
383 self.add_property('opcode', self.opcode)
386 if self.opcode in access_messages:
387 self.summary = access_messages[self.opcode]
472 control_pdu.opcode = control_pdu.data[0]
473 control_pdu.add_property('opcode', control_pdu.opcode)
/btstack/chipset/cinnamon/
H A Dcontroller.c82 static void send_command_complete(uint16_t opcode, uint8_t status, const uint8_t * result, uint16_t… in send_command_complete() argument
84 &hci_event_command_complete, /* num commands */ 1, opcode, status, len, result); in send_command_complete()
89 static void fake_command_complete(uint16_t opcode){ in fake_command_complete() argument
91 &hci_event_command_complete, /* num commands */ 1, opcode, ERROR_CODE_SUCCESS, 0, NULL); in fake_command_complete()
104 uint16_t opcode = little_endian_read_16(packet, 0); in controller_handle_hci_command() local
105 switch (opcode){ in controller_handle_hci_command()
107 fake_command_complete(opcode); in controller_handle_hci_command()
111 send_command_complete(opcode, 0, local_supported_features, 8); in controller_handle_hci_command()
114 send_command_complete(opcode, 0, read_buffer_size_result, 8); in controller_handle_hci_command()
126 send_command_complete(opcode, status, NULL, 0); in controller_handle_hci_command()
[all …]
/btstack/test/gap/
H A Dhci_test.cpp114 CHECK_EQUAL(expected_hci_command->opcode, actual_opcode); in CHECK_HCI_COMMAND()
582 static void simulate_hci_command_complete(uint16_t opcode, uint8_t status, uint8_t variant) { in simulate_hci_command_complete() argument
587 little_endian_store_16(packet, 3, opcode); in simulate_hci_command_complete()
589 switch (opcode) { in simulate_hci_command_complete()
614 uint16_t opcode; in TEST() member
618 {.opcode = HCI_OPCODE_HCI_READ_LOCAL_NAME, .status = ERROR_CODE_SUCCESS}, in TEST()
619 {.opcode = HCI_OPCODE_HCI_READ_LOCAL_NAME, .status = ERROR_CODE_UNKNOWN_HCI_COMMAND }, in TEST()
620 {.opcode = HCI_OPCODE_HCI_READ_BUFFER_SIZE, .status = ERROR_CODE_SUCCESS}, in TEST()
621 {.opcode = HCI_OPCODE_HCI_READ_RSSI, .status = ERROR_CODE_SUCCESS}, in TEST()
622 {.opcode = HCI_OPCODE_HCI_READ_RSSI, .status = ERROR_CODE_UNKNOWN_HCI_COMMAND}, in TEST()
[all …]
/btstack/src/mesh/
H A Dmesh_access.c64 …st mesh_operation_t * mesh_model_lookup_operation_by_opcode(mesh_model_t * model, uint32_t opcode);
212 static void mesh_access_acknowledged_received(uint16_t rx_src, uint32_t opcode){ in mesh_access_acknowledged_received() argument
222 if (((mesh_upper_transport_pdu_t *) tx_pdu)->ack_opcode != opcode) continue; in mesh_access_acknowledged_received()
499 static int mesh_access_get_opcode(uint8_t * buffer, uint16_t buffer_size, uint32_t * opcode, uint16… in mesh_access_get_opcode() argument
504 *opcode = buffer[0]; in mesh_access_get_opcode()
509 *opcode = big_endian_read_16(buffer, 0); in mesh_access_get_opcode()
514 *opcode = (buffer[0] << 16) | little_endian_read_16(buffer, 1); in mesh_access_get_opcode()
522 int mesh_access_pdu_get_opcode(mesh_pdu_t * pdu, uint32_t * opcode, uint16_t * opcode_size){ in mesh_access_pdu_get_opcode() argument
524 …mesh_access_get_opcode(((mesh_access_pdu_t *) pdu)->data, ((mesh_access_pdu_t *) pdu)->len, opcode, in mesh_access_pdu_get_opcode()
539 int ok = mesh_access_get_opcode(state->data, state->len, &state->opcode, &opcode_size); in mesh_access_parser_init()
[all …]
H A Dmesh_access.h115 uint32_t opcode; member
121 uint32_t opcode; member
236 int mesh_access_pdu_get_opcode(mesh_pdu_t * pdu, uint32_t * opcode, uint16_t * opcode_size);
251 void mesh_access_message_init(mesh_upper_transport_builder_t * builder, uint32_t opcode);
H A Dmesh_proxy.c349 mesh_proxy_configuration_message_opcode_t opcode; in proxy_configuration_message_handler() local
358 opcode = network_pdu_data[0]; in proxy_configuration_message_handler()
359 switch (opcode){ in proxy_configuration_message_handler()
395 printf("proxy config not implemented, opcode %d\n", opcode); in proxy_configuration_message_handler()
H A Dmesh_upper_transport.h158 …u_t * network_pdu, uint16_t netkey_index, uint8_t ttl, uint16_t src, uint16_t dest, uint8_t opcode,
171 …du_t * upper_pdu, uint16_t netkey_index, uint8_t ttl, uint16_t src, uint16_t dest, uint8_t opcode);
/btstack/src/classic/
H A Dobex_parser.c55 static uint16_t obex_parser_param_size_for_request(uint8_t opcode){ in obex_parser_param_size_for_request() argument
56 switch (opcode) { in obex_parser_param_size_for_request()
66 static uint16_t obex_parser_param_size_for_response(uint8_t opcode){ in obex_parser_param_size_for_response() argument
67 switch (opcode) { in obex_parser_param_size_for_response()
87 void obex_parser_init_for_response(obex_parser_t * obex_parser, uint8_t opcode, obex_parser_callbac… in obex_parser_init_for_response() argument
90 obex_parser->opcode = opcode; in obex_parser_init_for_response()
99 obex_parser->opcode = *data_buffer; in obex_parser_process_data()
101 obex_parser->item_len = obex_parser_param_size_for_request(obex_parser->opcode); in obex_parser_process_data()
107 obex_parser->item_len = obex_parser_param_size_for_response(obex_parser->opcode); in obex_parser_process_data()
231 obex_operation_info->opcode = obex_parser->opcode; in obex_parser_get_operation_info()
[all …]
H A Dobex_parser.h93 uint8_t opcode; member
108 uint8_t opcode; member
175 void obex_parser_init_for_response(obex_parser_t * obex_parser, uint8_t opcode, obex_parser_callbac…
/btstack/port/stm32-wb55xx-nucleo-freertos/Middlewares/STM32_WPAN/interface/patterns/ble_thread/tl/
H A Dhci_tl.c58 static void SendCmd(uint16_t opcode, uint8_t plen, void *param);
145 uint16_t opcode; in hci_send_req() local
154 opcode = ((p_cmd->ocf) & 0x03ff) | ((p_cmd->ogf) << 10); in hci_send_req()
155 SendCmd(opcode, p_cmd->clen, p_cmd->cparam); in hci_send_req()
171 if(pcommand_status_event->cmdcode == opcode) in hci_send_req()
185 if(pcommand_complete_event->cmdcode == opcode) in hci_send_req()
233 static void SendCmd(uint16_t opcode, uint8_t plen, void *param) in SendCmd() argument
235 pCmdBuffer->cmdserial.cmd.cmdcode = opcode; in SendCmd()
/btstack/tool/
H A Ddump_gatt.py85 opcode = pdu[0]
86 if opcode == 0x01:
88 elif opcode == 0x02:
91 elif opcode == 0x03:
94 elif opcode == 0x08:
98 elif opcode == 0x09:
113 elif opcode == 0x10:
117 elif opcode == 0x11:
172 opcode = pdu[0]
173 remote_server = ((opcode & 1) == 1) == direction_in
H A Dbtstack_parser.py115 (opcode, daemon_ocf) = definition.groups()
117 opcodes[opcode] = ('OGF_BTSTACK', daemon_ocf)
120 (opcode, ogf, ocf) = definition.groups()
122 opcodes[opcode] = (ogf, ocf)
164 (opcode, format) = definition.groups()
172 (ogf, ocf) = opcodes[opcode]
H A Ddump_keys.py64 opcode = struct.unpack_from("<H", packet, 0)[0];
65 if opcode == 0x201a:
70 elif opcode == 0x2019:
75 elif opcode == 0x040b:
/btstack/chipset/realtek/
H A Dbtstack_chipset_realtek.c79 #define HCI_CMD_SET_OPCODE(buf, opcode) little_endian_store_16(buf, 0, opcode) argument
119 uint8_t opcode; member
125 uint32_t opcode; member
395 uint16_t opcode = hci_event_command_complete_get_command_opcode(packet); in hci_packet_handler() local
397 switch (opcode) { in hci_packet_handler()
542 uint8_t opcode; in rtk_get_fw_project_id() local
547 opcode = *p_buf; in rtk_get_fw_project_id()
549 if (opcode == 0x00) { in rtk_get_fw_project_id()
554 opcode, len, data); in rtk_get_fw_project_id()
604 uint32_t opcode, uint32_t *patch_len, uint8_t *sec_flag) in insert_patch() argument
[all …]
/btstack/3rd-party/lwip/core/src/apps/tftp/
H A Dtftp.c121 init_packet(u16_t opcode, u16_t extra, size_t size) in init_packet() argument
128 payload[0] = PP_HTONS(opcode); in init_packet()
136 send_request(const ip_addr_t *addr, u16_t port, u16_t opcode, const char* fname, const char* mode) in send_request() argument
140 struct pbuf* p = init_packet(opcode, 0, fname_length + mode_length - 2); in send_request()
246 int opcode; in recv() local
258 opcode = sbuf[0]; in recv()
263 switch (opcode) { in recv()
300 tftp_state.handle = tftp_state.ctx->open(filename, mode, opcode == PP_HTONS(TFTP_WRQ)); in recv()
308 …LWIP_DEBUGF(TFTP_DEBUG | LWIP_DBG_STATE, ("tftp: %s request from ", (opcode == PP_HTONS(TFTP_WRQ))… in recv()
315 if (opcode == PP_HTONS(TFTP_WRQ)) { in recv()
/btstack/chipset/cc256x/
H A Dconvert_bts_init_scripts.py156 opcode = (action_data[2] << 8) | action_data[1]
157 if opcode == 0xFF36:
159 if opcode == 0xFD0C:
161 if opcode == 0xFD82:
169 if opcode == 0xFD80:
/btstack/chipset/sx128x/SMTC_Drivers/sx1280-driver-c/
H A Dsx1280-hal.h56 void SX1280HalWriteCommand( RadioCommands_t opcode, uint8_t *buffer, uint16_t size );
65 void SX1280HalReadCommand( RadioCommands_t opcode, uint8_t *buffer, uint16_t size );
H A Dradio.h55 void ( *WriteCommand )( RadioCommands_t opcode, uint8_t *buffer, uint16_t size );
64 void ( *ReadCommand )( RadioCommands_t opcode, uint8_t *buffer, uint16_t size );
/btstack/test/security_manager/
H A Dmock.c108 …ket[] = {HCI_EVENT_COMMAND_COMPLETE, 4, 1, (uint8_t) cmd->opcode & 0xff, (uint8_t) cmd->opcode >> … in mock_simulate_command_complete()
245 if (cmd->opcode == hci_le_encrypt.opcode){ in hci_send_cmd()
/btstack/test/crypto/
H A Dmock.c51 if (cmd->opcode == hci_le_encrypt.opcode){ in hci_send_cmd()
/btstack/test/gatt_client/
H A Dmock.c33 …t[] = {HCI_EVENT_COMMAND_COMPLETE, 4, 1, (uint8_t) (cmd->opcode & 0xff), (uint8_t) (cmd->opcode >>… in mock_simulate_command_complete()
203 void sm_cmac_signed_write_start(const sm_key_t key, uint8_t opcode, uint16_t attribute_handle, uint… in sm_cmac_signed_write_start() argument
/btstack/test/obex/
H A Dobex_parser_test.cpp50 void parse_response(uint8_t opcode){ in TEST_GROUP()
51 obex_parser_init_for_response(&parser, opcode, &parser_callback, NULL); in TEST_GROUP()
95 CHECK_EQUAL(OBEX_OPCODE_CONNECT, op_info.opcode); in TEST()
/btstack/test/gatt_server/
H A Dmock.c31 …t[] = {HCI_EVENT_COMMAND_COMPLETE, 4, 1, (uint8_t) (cmd->opcode & 0xff), (uint8_t) (cmd->opcode >>… in mock_simulate_command_complete()
221 void sm_cmac_signed_write_start(const sm_key_t key, uint8_t opcode, uint16_t attribute_handle, uint… in sm_cmac_signed_write_start() argument

123