/libbtbb/wireshark/plugins/btbredr/ |
H A D | packet-btlmp.c | 759 dissect_name_req(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_name_req() argument 761 DISSECTOR_ASSERT(len == 2); in dissect_name_req() 768 dissect_name_res(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_name_res() argument 770 DISSECTOR_ASSERT(len == 17); in dissect_name_res() 783 dissect_accepted(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_accepted() argument 785 DISSECTOR_ASSERT(len == 2); in dissect_accepted() 792 dissect_not_accepted(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_not_accepted() argument 794 DISSECTOR_ASSERT(len == 3); in dissect_not_accepted() 804 dissect_clkoffset_req(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_clkoffset_req() argument 806 DISSECTOR_ASSERT(len == 1); in dissect_clkoffset_req() [all …]
|
H A D | packet-btbredr.c | 249 int len; /* payload length indicated by payload header */ in dissect_dm1() local 271 len = dissect_payload_header1(dm1_tree, tvb, offset); in dissect_dm1() 275 if(tvb_reported_length_remaining(tvb, offset) < len + 2) { in dissect_dm1() 282 pld_tvb = tvb_new_subset(tvb, offset, len, len); in dissect_dm1() 287 if (l2len + 4 == len) { in dissect_dm1() 289 pld_tvb = tvb_new_subset(tvb, offset, len, len); in dissect_dm1() 293 proto_tree_add_item(dm1_tree, hf_btbredr_pldbody, tvb, offset, len, ENC_NA); in dissect_dm1() 296 proto_tree_add_item(dm1_tree, hf_btbredr_pldbody, tvb, offset, len, ENC_NA); in dissect_dm1() 298 offset += len; in dissect_dm1()
|
/libbtbb/wireshark/plugins-legacy/btbredr/ |
H A D | packet-btlmp.c | 759 dissect_name_req(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_name_req() argument 761 DISSECTOR_ASSERT(len == 2); in dissect_name_req() 768 dissect_name_res(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_name_res() argument 770 DISSECTOR_ASSERT(len == 17); in dissect_name_res() 783 dissect_accepted(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_accepted() argument 785 DISSECTOR_ASSERT(len == 2); in dissect_accepted() 792 dissect_not_accepted(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_not_accepted() argument 794 DISSECTOR_ASSERT(len == 3); in dissect_not_accepted() 804 dissect_clkoffset_req(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_clkoffset_req() argument 806 DISSECTOR_ASSERT(len == 1); in dissect_clkoffset_req() [all …]
|
H A D | packet-btbredr.c | 249 int len; /* payload length indicated by payload header */ in dissect_dm1() local 271 len = dissect_payload_header1(dm1_tree, tvb, offset); in dissect_dm1() 275 if(tvb_length_remaining(tvb, offset) < len + 2) { in dissect_dm1() 282 pld_tvb = tvb_new_subset(tvb, offset, len, len); in dissect_dm1() 287 if (l2len + 4 == len) { in dissect_dm1() 290 pld_tvb = tvb_new_subset(tvb, offset, len, len); in dissect_dm1() 294 proto_tree_add_item(dm1_tree, hf_btbredr_pldbody, tvb, offset, len, ENC_NA); in dissect_dm1() 297 proto_tree_add_item(dm1_tree, hf_btbredr_pldbody, tvb, offset, len, ENC_NA); in dissect_dm1() 299 offset += len; in dissect_dm1()
|
/libbtbb/wireshark/plugins/btbb/ |
H A D | packet-btbrlmp.c | 759 dissect_name_req(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_name_req() argument 761 DISSECTOR_ASSERT(len == 2); in dissect_name_req() 768 dissect_name_res(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_name_res() argument 770 DISSECTOR_ASSERT(len == 17); in dissect_name_res() 783 dissect_accepted(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_accepted() argument 785 DISSECTOR_ASSERT(len == 2); in dissect_accepted() 792 dissect_not_accepted(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_not_accepted() argument 794 DISSECTOR_ASSERT(len == 3); in dissect_not_accepted() 804 dissect_clkoffset_req(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_clkoffset_req() argument 806 DISSECTOR_ASSERT(len == 1); in dissect_clkoffset_req() [all …]
|
H A D | packet-btbb.c | 225 int len; /* payload length indicated by payload header */ in dissect_dm1() local 244 len = dissect_payload_header1(dm1_tree, tvb, offset); in dissect_dm1() 248 DISSECTOR_ASSERT(tvb_reported_length_remaining(tvb, offset) == len + 2); in dissect_dm1() 252 pld_tvb = tvb_new_subset(tvb, offset, len, len); in dissect_dm1() 257 if (l2len + 4 == len) { in dissect_dm1() 259 pld_tvb = tvb_new_subset(tvb, offset, len, len); in dissect_dm1() 263 proto_tree_add_item(dm1_tree, hf_btbb_pldbody, tvb, offset, len, ENC_NA); in dissect_dm1() 266 proto_tree_add_item(dm1_tree, hf_btbb_pldbody, tvb, offset, len, ENC_NA); in dissect_dm1() 268 offset += len; in dissect_dm1()
|
/libbtbb/wireshark/plugins-legacy/btbb/ |
H A D | packet-btbrlmp.c | 759 dissect_name_req(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_name_req() argument 761 DISSECTOR_ASSERT(len == 2); in dissect_name_req() 768 dissect_name_res(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_name_res() argument 770 DISSECTOR_ASSERT(len == 17); in dissect_name_res() 783 dissect_accepted(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_accepted() argument 785 DISSECTOR_ASSERT(len == 2); in dissect_accepted() 792 dissect_not_accepted(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_not_accepted() argument 794 DISSECTOR_ASSERT(len == 3); in dissect_not_accepted() 804 dissect_clkoffset_req(proto_tree *tree, tvbuff_t *tvb, int offset, int len) in dissect_clkoffset_req() argument 806 DISSECTOR_ASSERT(len == 1); in dissect_clkoffset_req() [all …]
|
H A D | packet-btbb.c | 225 int len; /* payload length indicated by payload header */ in dissect_dm1() local 244 len = dissect_payload_header1(dm1_tree, tvb, offset); in dissect_dm1() 248 DISSECTOR_ASSERT(tvb_length_remaining(tvb, offset) == len + 2); in dissect_dm1() 252 pld_tvb = tvb_new_subset(tvb, offset, len, len); in dissect_dm1() 257 if (l2len + 4 == len) { in dissect_dm1() 260 pld_tvb = tvb_new_subset(tvb, offset, len, len); in dissect_dm1() 264 proto_tree_add_item(dm1_tree, hf_btbb_pldbody, tvb, offset, len, ENC_NA); in dissect_dm1() 267 proto_tree_add_item(dm1_tree, hf_btbb_pldbody, tvb, offset, len, ENC_NA); in dissect_dm1() 269 offset += len; in dissect_dm1()
|
/libbtbb/wireshark/plugins-legacy/btsm/tools/ |
H A D | make-dissector-reg.py | 79 if len(filenames) < 1: 126 print(("Registering %d files, %d cached" % (len(filenames), len(list(cache.keys()))-1))) 175 if len(regs['proto_reg']) < 1: 270 line = " return %d;\n" % len(regs['proto_reg']) 281 line = " return %d;\n" % len(regs['handoff_reg'])
|
/libbtbb/wireshark/plugins-legacy/btle/tools/ |
H A D | make-dissector-reg.py | 79 if len(filenames) < 1: 126 print(("Registering %d files, %d cached" % (len(filenames), len(list(cache.keys()))-1))) 175 if len(regs['proto_reg']) < 1: 270 line = " return %d;\n" % len(regs['proto_reg']) 281 line = " return %d;\n" % len(regs['handoff_reg'])
|
/libbtbb/wireshark/plugins/btbredr/tools/ |
H A D | make-dissector-reg.py | 79 if len(filenames) < 1: 126 print(("Registering %d files, %d cached" % (len(filenames), len(list(cache.keys()))-1))) 175 if len(regs['proto_reg']) < 1: 270 line = " return %d;\n" % len(regs['proto_reg']) 281 line = " return %d;\n" % len(regs['handoff_reg'])
|
/libbtbb/wireshark/plugins/btbb/tools/ |
H A D | make-dissector-reg.py | 79 if len(filenames) < 1: 126 print(("Registering %d files, %d cached" % (len(filenames), len(list(cache.keys()))-1))) 175 if len(regs['proto_reg']) < 1: 270 line = " return %d;\n" % len(regs['proto_reg']) 281 line = " return %d;\n" % len(regs['handoff_reg'])
|
/libbtbb/wireshark/plugins-legacy/btbredr/tools/ |
H A D | make-dissector-reg.py | 79 if len(filenames) < 1: 126 print(("Registering %d files, %d cached" % (len(filenames), len(list(cache.keys()))-1))) 175 if len(regs['proto_reg']) < 1: 270 line = " return %d;\n" % len(regs['proto_reg']) 281 line = " return %d;\n" % len(regs['handoff_reg'])
|
/libbtbb/wireshark/plugins-legacy/btatt/tools/ |
H A D | make-dissector-reg.py | 79 if len(filenames) < 1: 126 print(("Registering %d files, %d cached" % (len(filenames), len(list(cache.keys()))-1))) 175 if len(regs['proto_reg']) < 1: 270 line = " return %d;\n" % len(regs['proto_reg']) 281 line = " return %d;\n" % len(regs['handoff_reg'])
|
/libbtbb/wireshark/plugins-legacy/btbb/tools/ |
H A D | make-dissector-reg.py | 79 if len(filenames) < 1: 126 print(("Registering %d files, %d cached" % (len(filenames), len(list(cache.keys()))-1))) 175 if len(regs['proto_reg']) < 1: 270 line = " return %d;\n" % len(regs['proto_reg']) 281 line = " return %d;\n" % len(regs['handoff_reg'])
|
/libbtbb/python/utils/ |
H A D | le_whitening.py | 8 while not (len(bits) and reg==0x57): 10 channels[reg & 0x3f] = len(bits)
|
/libbtbb/python/pcaptools/ |
H A D | btaptap | 424 packet = chr(len(payload)+1) + "\x00" + DEST_CHANNEL_ID + TRANS_HDR_IN_DATA + payload 439 if len(packet) < 40: 463 if len(packet) < 19: 480 while len(sys.argv) > 1:
|
/libbtbb/python/pcaptools/pcapdump/ |
H A D | pcapdump.py | 166 orig_len = len(packet) 168 plen = len(packet)
|
/libbtbb/lib/src/ |
H A D | bluetooth_le_packet.c | 397 static void _dump_scan_rsp_data(const uint8_t *buf, int len) { in _dump_scan_rsp_data() argument 404 while (pos < len) { in _dump_scan_rsp_data() 407 if (pos + sublen > len) { in _dump_scan_rsp_data() 408 printf("Error: attempt to read past end of buffer (%d + %d > %d)\n", pos, sublen, len); in _dump_scan_rsp_data()
|
H A D | uthash.h | 605 #define HASH_KEYCMP(a,b,len) memcmp(a,b,len) argument
|