Searched refs:packet (Results 1 - 25 of 63) sorted by relevance

123

/system/bt/hci/include/
H A Dpacket_fragmenter.h25 typedef void (*transmit_finished_cb)(BT_HDR *packet, bool all_fragments_sent);
26 typedef void (*packet_reassembled_cb)(BT_HDR *packet);
27 typedef void (*packet_fragmented_cb)(BT_HDR *packet, bool send_transmit_finished);
30 // Called for every packet fragment.
33 // Called for every completely reassembled packet.
37 // but the packet has not been entirely sent.
48 // Fragments |packet| if necessary and hands off everything to the fragmented callback.
49 void (*fragment_and_dispatch)(BT_HDR *packet);
50 // If |packet| is a complete packet, forward
[all...]
H A Dbtsnoop.h33 // Capture |packet| and dump it to the btsnoop logs. If |is_received| is
34 // true, the packet is marked as incoming. Otherwise, the packet is marked
36 void (*capture)(const BT_HDR *packet, bool is_received);
/system/bt/hci/src/
H A Dbtsnoop_mem.c30 void btsnoop_mem_capture(const BT_HDR *packet) { argument
34 assert(packet);
36 const uint8_t *data = &packet->data[packet->offset];
37 const uint16_t type = packet->event & BT_EVT_MASK;
42 if (packet->len > 2)
47 if (packet->len > 1)
53 if (packet->len > 3)
59 if (packet->len > 2)
H A Dpacket_fragmenter.c66 static void fragment_and_dispatch(BT_HDR *packet) { argument
67 assert(packet != NULL);
69 uint16_t event = packet->event & MSG_EVT_MASK;
70 uint8_t *stream = packet->data + packet->offset;
74 callbacks->fragmented(packet, true);
79 SUB_EVENT(packet->event) == LOCAL_BR_EDR_CONTROLLER_ID ?
84 uint16_t remaining_length = packet->len;
91 // Make sure we use the right ACL packet size
92 stream = packet
127 reassemble_and_dispatch(UNUSED_ATTR BT_HDR *packet) argument
[all...]
H A Dhci_packet_factory.c49 BT_HDR *packet = make_command(HCI_HOST_BUFFER_SIZE, parameter_size, &stream); local
55 return packet;
73 BT_HDR *packet = make_command(HCI_READ_LOCAL_EXT_FEATURES, parameter_size, &stream); local
76 return packet;
82 BT_HDR *packet = make_command(HCI_WRITE_SIMPLE_PAIRING_MODE, parameter_size, &stream); local
85 return packet;
91 BT_HDR *packet = make_command(HCI_WRITE_SECURE_CONNS_SUPPORT, parameter_size, &stream); local
94 return packet;
100 BT_HDR *packet = make_command(HCI_SET_EVENT_MASK, parameter_size, &stream); local
103 return packet;
109 BT_HDR *packet = make_command(HCI_WRITE_LE_HOST_SUPPORT, parameter_size, &stream); local
147 BT_HDR *packet = make_command(HCI_BLE_SET_EVENT_MASK, parameter_size, &stream); local
160 BT_HDR *packet = make_packet(HCI_COMMAND_PREAMBLE_SIZE + parameter_size); local
[all...]
H A Dbtsnoop.c65 static void btsnoop_write_packet(packet_type_t type, const uint8_t *packet, bool is_received);
198 static void btsnoop_write_packet(packet_type_t type, const uint8_t *packet, bool is_received) { argument
205 length_he = packet[2] + 4;
209 length_he = (packet[3] << 8) + packet[2] + 5;
213 length_he = packet[2] + 4;
217 length_he = packet[1] + 3;
239 btsnoop_write(packet, length_he - 1);
/system/bt/hci/test/
H A Dpacket_fragmenter_test.cpp73 BT_HDR *packet = (BT_HDR *)osi_malloc(size + sizeof(BT_HDR)); local
74 packet->len = size;
75 packet->offset = 0;
76 packet->event = event;
77 packet->layer_specific = 0;
78 uint8_t *packet_data = packet->data;
86 return packet;
89 static void expect_packet_fragmented(uint16_t event, int max_acl_data_size, BT_HDR *packet, const char *expected_data, bool send_complete) { argument
90 uint8_t *data = packet->data + packet
142 BT_HDR *packet = (BT_HDR *)osi_malloc(length_to_send + 4 + sizeof(BT_HDR)); local
164 BT_HDR *packet = (BT_HDR *)osi_malloc(data_length + sizeof(BT_HDR)); local
175 expect_packet_reassembled(uint16_t event, BT_HDR *packet, const char *expected_data) argument
[all...]
/system/connectivity/shill/
H A Darp_client_test_helper.cc47 bool ArpClientTestHelper::SimulateReceivePacket(ArpPacket* packet, argument
49 packet->set_operation(packet_.operation());
50 packet->set_local_ip_address(packet_.local_ip_address());
51 packet->set_local_mac_address(packet_.local_mac_address());
52 packet->set_remote_ip_address(packet_.remote_ip_address());
53 packet->set_remote_mac_address(packet_.remote_mac_address());
H A Darp_packet.cc47 // Format of an ARP packet (all multi-byte values are big-endian):
67 bool ArpPacket::Parse(const ByteString& packet) { argument
69 if (packet.GetLength() < sizeof(header)) {
70 LOG(ERROR) << "Packet size " << packet.GetLength()
75 memcpy(&header, packet.GetConstData(), sizeof(header));
114 if (packet.GetLength() < min_packet_size) {
116 << packet.GetLength()
123 local_mac_address_ = packet.GetSubstring(sizeof(header), ETH_ALEN);
124 local_ip_address_ = IPAddress(family, packet.GetSubstring(
126 remote_mac_address_ = packet
[all...]
H A Dmock_arp_client.h36 MOCK_CONST_METHOD2(ReceivePacket, bool(ArpPacket* packet,
38 MOCK_CONST_METHOD1(TransmitRequest, bool(const ArpPacket& packet));
H A Darp_client_unittest.cc78 void SetupValidPacket(ArpPacket* packet);
116 void ArpClientTest::SetupValidPacket(ArpPacket* packet) { argument
119 packet->set_local_ip_address(local_ip);
122 packet->set_remote_ip_address(remote_ip);
124 packet->set_local_mac_address(local_mac);
126 packet->set_remote_mac_address(remote_mac);
170 HasSubstr("Could not attach packet filter"))).Times(1);
236 HasSubstr("Failed to parse ARP packet"))).Times(1);
239 ArpPacket packet; local
240 SetupValidPacket(&packet);
260 ArpPacket packet; local
[all...]
H A Darp_client.h39 // Create a socket for reception of ARP replies, and packet trasmission.
43 // Create a socket for reception of ARP requests, and packet trasmission.
50 // Receive an ARP request or reply and parse its contents into |packet|.
54 virtual bool ReceivePacket(ArpPacket* packet, ByteString* sender) const;
56 // Send a formatted ARP request from |packet|. Returns true on
58 virtual bool TransmitRequest(const ArpPacket& packet) const;
67 // Offset of the ARP OpCode within a captured ARP packet.
70 // The largest packet we expect to receive as an ARP client.
H A Darp_client_test_helper.h42 bool SimulateReceivePacket(ArpPacket* packet, ByteString* sender);
H A Dthird_party_vpn_adaptor_stub.h34 void EmitPacketReceived(const std::vector<uint8_t>& packet) override {}
/system/core/libnetutils/
H A Dpacket.c165 } packet; local
171 nread = read(s, &packet, sizeof(packet));
176 * The raw packet interface gives us all packets received by the
185 } else if (packet.ip.version != IPVERSION || packet.ip.ihl != (sizeof(packet.ip) >> 2)) {
187 ALOGD("Not a valid IP packet");
189 } else if (nread < ntohs(packet.ip.tot_len)) {
191 ALOGD("Packet was truncated (read %d, needed %d)", nread, ntohs(packet
[all...]
H A DAndroid.mk8 packet.c
/system/bt/tools/hci/
H A Dmain.c32 static bool write_hci_command(hci_packet_t type, const void *packet, size_t length);
41 { "setScoRoute", "(pcm|i2s|uart) - sets the SCO packet route to one of the specified buses.", set_sco_route },
71 uint8_t packet[] = { 0x1A, 0x0C, 0x01, 0x00 }; local
73 packet[ARRAY_SIZE(packet) - 1] = 0x03;
75 return !write_hci_command(HCI_PACKET_COMMAND, packet, ARRAY_SIZE(packet));
90 uint8_t packet[251] = { 0x13, 0x0C, 248 }; local
91 memcpy(&packet[3], argv[0], len + 1);
93 if (!write_hci_command(HCI_PACKET_COMMAND, packet, sizeo
118 uint8_t packet[] = { 0x24, 0xFC, 0x01, 0x00 }; local
144 uint8_t packet[] = { 0x1C, 0xFC, 0x05, 0x00, 0x02, 0x00, 0x00, 0x00 }; local
170 write_hci_command(hci_packet_t type, const void *packet, size_t length) argument
[all...]
/system/extras/tests/net_test/
H A Dpackets.py48 def _SetPacketTos(packet, tos):
49 if isinstance(packet, scapy.IPv6):
50 packet.tc = tos
51 elif isinstance(packet, scapy.IP):
52 packet.tos = tos
61 return ("UDPv%d packet" % version,
67 packet = (scapy.IP(src=srcaddr, dst=dstaddr, ttl=39, tos=0x83) /
71 packet = (scapy.IPv6(src=srcaddr, dst=dstaddr,
75 return ("UDPv%d packet with options" % version, packet)
[all...]
/system/bt/vendor_libs/test_vendor_lib/test/
H A Dpacket_stream_unittest.cc20 #include "vendor_libs/test_vendor_lib/include/packet.h"
59 std::vector<uint8_t> packet; local
61 packet.push_back(DATA_TYPE_COMMAND);
62 packet.push_back(opcode);
63 packet.push_back(opcode >> 8);
64 packet.push_back(payload_size);
66 // Set the packet's payload.
68 packet.push_back(payload[i]);
70 // Send the packet to |packet_stream_|.
71 write(socketpair_fds_[1], &packet[
[all...]
/system/connectivity/shill/net/
H A Dgeneric_netlink_message.cc75 bool GenericNetlinkMessage::InitAndStripHeader(NetlinkPacket* packet) { argument
76 if (!packet) {
77 LOG(ERROR) << "NULL packet";
80 if (!NetlinkMessage::InitAndStripHeader(packet)) {
85 if (!packet->ConsumeData(sizeof(gnlh), &gnlh)) {
110 NetlinkPacket* packet, NetlinkMessage::MessageContext context) {
111 if (!packet) {
112 LOG(ERROR) << "Null |packet| parameter";
116 if (!InitAndStripHeader(packet)) {
120 return packet
109 InitFromPacket( NetlinkPacket* packet, NetlinkMessage::MessageContext context) argument
139 CreateMessage( const NetlinkPacket& packet) argument
[all...]
H A Dnetlink_packet_unittest.cc33 // an invalid packet.
40 // A packet that is too short to contain an nlmsghdr should be invalid.
44 // A packet that contains an invalid nlmsg_len (should be at least
49 // Successfully parse a well-formed packet that has no payload.
62 // A packet that contains an nlmsg_len that is larger than the
70 // Retrieve a byte from a well-formed packet. After that byte is
112 NetlinkPacket packet(data, sizeof(data));
113 EXPECT_EQ(22, packet.GetRemainingLength());
117 EXPECT_TRUE(packet.ConsumeData(2, &string_piece));
119 EXPECT_EQ(18, packet
[all...]
H A Dnetlink_message.cc74 bool NetlinkMessage::InitAndStripHeader(NetlinkPacket* packet) { argument
75 const nlmsghdr& header = packet->GetNlMsgHeader();
83 bool NetlinkMessage::InitFromPacket(NetlinkPacket* packet, argument
85 if (!packet) {
86 LOG(ERROR) << "Null |packet| parameter";
89 if (!InitAndStripHeader(packet)) {
118 void NetlinkMessage::PrintPacket(int log_level, const NetlinkPacket& packet) { argument
120 if (!packet.IsValid()) {
125 PrintHeader(log_level, &packet.GetNlMsgHeader());
126 const ByteString& payload = packet
172 InitFromPacket(NetlinkPacket* packet, NetlinkMessage::MessageContext context) argument
283 CreateMessage( NetlinkPacket* packet, NetlinkMessage::MessageContext context) const argument
[all...]
/system/connectivity/shill/shims/
H A Dnetfilter_queue_processor.cc253 Packet packet; local
254 if (!packet.ParseNetfilterData(netfilter_data)) {
262 if (processor->IsIncomingPacketAllowed(packet, now)) {
267 return nfq_set_verdict(queue_handle, packet.packet_id(), verdict, 0, NULL);
276 Packet packet; local
277 if (!packet.ParseNetfilterData(netfilter_data)) {
284 processor->LogOutgoingPacket(packet, now);
285 return nfq_set_verdict(queue_handle, packet.packet_id(), NF_ACCEPT, 0, NULL);
359 const Packet& packet, time_t now) {
361 VLOG(3) << "Incoming packet i
358 IsIncomingPacketAllowed( const Packet& packet, time_t now) argument
401 LogOutgoingPacket( const Packet& packet, time_t now) argument
[all...]
/system/bt/stack/include/
H A Dl2cap_client.h31 void (*read_ready)(l2cap_client_t *client, buffer_t *packet, void *context);
69 // Writes data contained in |packet| to a connected |client|. This function returns
70 // true if the packet was successfully queued for delivery, false if the client cannot
73 // |client| nor |packet| may be NULL.
74 bool l2cap_client_write(l2cap_client_t *client, buffer_t *packet);
/system/connectivity/shill/wifi/
H A Dcallback80211_metrics_unittest.cc48 // strings represent the raw packet data coming from the kernel. The
159 NetlinkPacket packet(kDisconnectMessage, sizeof(kDisconnectMessage));
161 &packet, NetlinkMessage::MessageContext()));
168 NetlinkPacket packet(kDeauthenticateMessage, sizeof(kDeauthenticateMessage));
170 &packet, NetlinkMessage::MessageContext()));
178 NetlinkPacket packet(
181 &packet, NetlinkMessage::MessageContext()));
187 NetlinkPacket packet(
190 &packet, NetlinkMessage::MessageContext()));
197 NetlinkPacket packet(kNewStationMessag
[all...]

Completed in 877 milliseconds

123