/system/bt/hci/include/ |
H A D | packet_fragmenter.h | 25 typedef void (*transmit_finished_cb)(BT_HDR *packet, bool all_fragments_sent); 26 typedef void (*packet_reassembled_cb)(BT_HDR *packet); 27 typedef void (*packet_fragmented_cb)(BT_HDR *packet, bool send_transmit_finished); 30 // Called for every packet fragment. 33 // Called for every completely reassembled packet. 37 // but the packet has not been entirely sent. 48 // Fragments |packet| if necessary and hands off everything to the fragmented callback. 49 void (*fragment_and_dispatch)(BT_HDR *packet); 50 // If |packet| is a complete packet, forward [all...] |
H A D | btsnoop.h | 33 // Capture |packet| and dump it to the btsnoop logs. If |is_received| is 34 // true, the packet is marked as incoming. Otherwise, the packet is marked 36 void (*capture)(const BT_HDR *packet, bool is_received);
|
/system/bt/hci/src/ |
H A D | btsnoop_mem.c | 30 void btsnoop_mem_capture(const BT_HDR *packet) { argument 34 assert(packet); 36 const uint8_t *data = &packet->data[packet->offset]; 37 const uint16_t type = packet->event & BT_EVT_MASK; 42 if (packet->len > 2) 47 if (packet->len > 1) 53 if (packet->len > 3) 59 if (packet->len > 2)
|
H A D | packet_fragmenter.c | 66 static void fragment_and_dispatch(BT_HDR *packet) { argument 67 assert(packet != NULL); 69 uint16_t event = packet->event & MSG_EVT_MASK; 70 uint8_t *stream = packet->data + packet->offset; 74 callbacks->fragmented(packet, true); 79 SUB_EVENT(packet->event) == LOCAL_BR_EDR_CONTROLLER_ID ? 84 uint16_t remaining_length = packet->len; 91 // Make sure we use the right ACL packet size 92 stream = packet 127 reassemble_and_dispatch(UNUSED_ATTR BT_HDR *packet) argument [all...] |
H A D | hci_packet_factory.c | 49 BT_HDR *packet = make_command(HCI_HOST_BUFFER_SIZE, parameter_size, &stream); local 55 return packet; 73 BT_HDR *packet = make_command(HCI_READ_LOCAL_EXT_FEATURES, parameter_size, &stream); local 76 return packet; 82 BT_HDR *packet = make_command(HCI_WRITE_SIMPLE_PAIRING_MODE, parameter_size, &stream); local 85 return packet; 91 BT_HDR *packet = make_command(HCI_WRITE_SECURE_CONNS_SUPPORT, parameter_size, &stream); local 94 return packet; 100 BT_HDR *packet = make_command(HCI_SET_EVENT_MASK, parameter_size, &stream); local 103 return packet; 109 BT_HDR *packet = make_command(HCI_WRITE_LE_HOST_SUPPORT, parameter_size, &stream); local 147 BT_HDR *packet = make_command(HCI_BLE_SET_EVENT_MASK, parameter_size, &stream); local 160 BT_HDR *packet = make_packet(HCI_COMMAND_PREAMBLE_SIZE + parameter_size); local [all...] |
H A D | btsnoop.c | 65 static void btsnoop_write_packet(packet_type_t type, const uint8_t *packet, bool is_received); 198 static void btsnoop_write_packet(packet_type_t type, const uint8_t *packet, bool is_received) { argument 205 length_he = packet[2] + 4; 209 length_he = (packet[3] << 8) + packet[2] + 5; 213 length_he = packet[2] + 4; 217 length_he = packet[1] + 3; 239 btsnoop_write(packet, length_he - 1);
|
/system/bt/hci/test/ |
H A D | packet_fragmenter_test.cpp | 73 BT_HDR *packet = (BT_HDR *)osi_malloc(size + sizeof(BT_HDR)); local 74 packet->len = size; 75 packet->offset = 0; 76 packet->event = event; 77 packet->layer_specific = 0; 78 uint8_t *packet_data = packet->data; 86 return packet; 89 static void expect_packet_fragmented(uint16_t event, int max_acl_data_size, BT_HDR *packet, const char *expected_data, bool send_complete) { argument 90 uint8_t *data = packet->data + packet 142 BT_HDR *packet = (BT_HDR *)osi_malloc(length_to_send + 4 + sizeof(BT_HDR)); local 164 BT_HDR *packet = (BT_HDR *)osi_malloc(data_length + sizeof(BT_HDR)); local 175 expect_packet_reassembled(uint16_t event, BT_HDR *packet, const char *expected_data) argument [all...] |
/system/connectivity/shill/ |
H A D | arp_client_test_helper.cc | 47 bool ArpClientTestHelper::SimulateReceivePacket(ArpPacket* packet, argument 49 packet->set_operation(packet_.operation()); 50 packet->set_local_ip_address(packet_.local_ip_address()); 51 packet->set_local_mac_address(packet_.local_mac_address()); 52 packet->set_remote_ip_address(packet_.remote_ip_address()); 53 packet->set_remote_mac_address(packet_.remote_mac_address());
|
H A D | arp_packet.cc | 47 // Format of an ARP packet (all multi-byte values are big-endian): 67 bool ArpPacket::Parse(const ByteString& packet) { argument 69 if (packet.GetLength() < sizeof(header)) { 70 LOG(ERROR) << "Packet size " << packet.GetLength() 75 memcpy(&header, packet.GetConstData(), sizeof(header)); 114 if (packet.GetLength() < min_packet_size) { 116 << packet.GetLength() 123 local_mac_address_ = packet.GetSubstring(sizeof(header), ETH_ALEN); 124 local_ip_address_ = IPAddress(family, packet.GetSubstring( 126 remote_mac_address_ = packet [all...] |
H A D | mock_arp_client.h | 36 MOCK_CONST_METHOD2(ReceivePacket, bool(ArpPacket* packet, 38 MOCK_CONST_METHOD1(TransmitRequest, bool(const ArpPacket& packet));
|
H A D | arp_client_unittest.cc | 78 void SetupValidPacket(ArpPacket* packet); 116 void ArpClientTest::SetupValidPacket(ArpPacket* packet) { argument 119 packet->set_local_ip_address(local_ip); 122 packet->set_remote_ip_address(remote_ip); 124 packet->set_local_mac_address(local_mac); 126 packet->set_remote_mac_address(remote_mac); 170 HasSubstr("Could not attach packet filter"))).Times(1); 236 HasSubstr("Failed to parse ARP packet"))).Times(1); 239 ArpPacket packet; local 240 SetupValidPacket(&packet); 260 ArpPacket packet; local [all...] |
H A D | arp_client.h | 39 // Create a socket for reception of ARP replies, and packet trasmission. 43 // Create a socket for reception of ARP requests, and packet trasmission. 50 // Receive an ARP request or reply and parse its contents into |packet|. 54 virtual bool ReceivePacket(ArpPacket* packet, ByteString* sender) const; 56 // Send a formatted ARP request from |packet|. Returns true on 58 virtual bool TransmitRequest(const ArpPacket& packet) const; 67 // Offset of the ARP OpCode within a captured ARP packet. 70 // The largest packet we expect to receive as an ARP client.
|
H A D | arp_client_test_helper.h | 42 bool SimulateReceivePacket(ArpPacket* packet, ByteString* sender);
|
H A D | third_party_vpn_adaptor_stub.h | 34 void EmitPacketReceived(const std::vector<uint8_t>& packet) override {}
|
/system/core/libnetutils/ |
H A D | packet.c | 165 } packet; local 171 nread = read(s, &packet, sizeof(packet)); 176 * The raw packet interface gives us all packets received by the 185 } else if (packet.ip.version != IPVERSION || packet.ip.ihl != (sizeof(packet.ip) >> 2)) { 187 ALOGD("Not a valid IP packet"); 189 } else if (nread < ntohs(packet.ip.tot_len)) { 191 ALOGD("Packet was truncated (read %d, needed %d)", nread, ntohs(packet [all...] |
H A D | Android.mk | 8 packet.c
|
/system/bt/tools/hci/ |
H A D | main.c | 32 static bool write_hci_command(hci_packet_t type, const void *packet, size_t length); 41 { "setScoRoute", "(pcm|i2s|uart) - sets the SCO packet route to one of the specified buses.", set_sco_route }, 71 uint8_t packet[] = { 0x1A, 0x0C, 0x01, 0x00 }; local 73 packet[ARRAY_SIZE(packet) - 1] = 0x03; 75 return !write_hci_command(HCI_PACKET_COMMAND, packet, ARRAY_SIZE(packet)); 90 uint8_t packet[251] = { 0x13, 0x0C, 248 }; local 91 memcpy(&packet[3], argv[0], len + 1); 93 if (!write_hci_command(HCI_PACKET_COMMAND, packet, sizeo 118 uint8_t packet[] = { 0x24, 0xFC, 0x01, 0x00 }; local 144 uint8_t packet[] = { 0x1C, 0xFC, 0x05, 0x00, 0x02, 0x00, 0x00, 0x00 }; local 170 write_hci_command(hci_packet_t type, const void *packet, size_t length) argument [all...] |
/system/extras/tests/net_test/ |
H A D | packets.py | 48 def _SetPacketTos(packet, tos): 49 if isinstance(packet, scapy.IPv6): 50 packet.tc = tos 51 elif isinstance(packet, scapy.IP): 52 packet.tos = tos 61 return ("UDPv%d packet" % version, 67 packet = (scapy.IP(src=srcaddr, dst=dstaddr, ttl=39, tos=0x83) / 71 packet = (scapy.IPv6(src=srcaddr, dst=dstaddr, 75 return ("UDPv%d packet with options" % version, packet) [all...] |
/system/bt/vendor_libs/test_vendor_lib/test/ |
H A D | packet_stream_unittest.cc | 20 #include "vendor_libs/test_vendor_lib/include/packet.h" 59 std::vector<uint8_t> packet; local 61 packet.push_back(DATA_TYPE_COMMAND); 62 packet.push_back(opcode); 63 packet.push_back(opcode >> 8); 64 packet.push_back(payload_size); 66 // Set the packet's payload. 68 packet.push_back(payload[i]); 70 // Send the packet to |packet_stream_|. 71 write(socketpair_fds_[1], &packet[ [all...] |
/system/connectivity/shill/net/ |
H A D | generic_netlink_message.cc | 75 bool GenericNetlinkMessage::InitAndStripHeader(NetlinkPacket* packet) { argument 76 if (!packet) { 77 LOG(ERROR) << "NULL packet"; 80 if (!NetlinkMessage::InitAndStripHeader(packet)) { 85 if (!packet->ConsumeData(sizeof(gnlh), &gnlh)) { 110 NetlinkPacket* packet, NetlinkMessage::MessageContext context) { 111 if (!packet) { 112 LOG(ERROR) << "Null |packet| parameter"; 116 if (!InitAndStripHeader(packet)) { 120 return packet 109 InitFromPacket( NetlinkPacket* packet, NetlinkMessage::MessageContext context) argument 139 CreateMessage( const NetlinkPacket& packet) argument [all...] |
H A D | netlink_packet_unittest.cc | 33 // an invalid packet. 40 // A packet that is too short to contain an nlmsghdr should be invalid. 44 // A packet that contains an invalid nlmsg_len (should be at least 49 // Successfully parse a well-formed packet that has no payload. 62 // A packet that contains an nlmsg_len that is larger than the 70 // Retrieve a byte from a well-formed packet. After that byte is 112 NetlinkPacket packet(data, sizeof(data)); 113 EXPECT_EQ(22, packet.GetRemainingLength()); 117 EXPECT_TRUE(packet.ConsumeData(2, &string_piece)); 119 EXPECT_EQ(18, packet [all...] |
H A D | netlink_message.cc | 74 bool NetlinkMessage::InitAndStripHeader(NetlinkPacket* packet) { argument 75 const nlmsghdr& header = packet->GetNlMsgHeader(); 83 bool NetlinkMessage::InitFromPacket(NetlinkPacket* packet, argument 85 if (!packet) { 86 LOG(ERROR) << "Null |packet| parameter"; 89 if (!InitAndStripHeader(packet)) { 118 void NetlinkMessage::PrintPacket(int log_level, const NetlinkPacket& packet) { argument 120 if (!packet.IsValid()) { 125 PrintHeader(log_level, &packet.GetNlMsgHeader()); 126 const ByteString& payload = packet 172 InitFromPacket(NetlinkPacket* packet, NetlinkMessage::MessageContext context) argument 283 CreateMessage( NetlinkPacket* packet, NetlinkMessage::MessageContext context) const argument [all...] |
/system/connectivity/shill/shims/ |
H A D | netfilter_queue_processor.cc | 253 Packet packet; local 254 if (!packet.ParseNetfilterData(netfilter_data)) { 262 if (processor->IsIncomingPacketAllowed(packet, now)) { 267 return nfq_set_verdict(queue_handle, packet.packet_id(), verdict, 0, NULL); 276 Packet packet; local 277 if (!packet.ParseNetfilterData(netfilter_data)) { 284 processor->LogOutgoingPacket(packet, now); 285 return nfq_set_verdict(queue_handle, packet.packet_id(), NF_ACCEPT, 0, NULL); 359 const Packet& packet, time_t now) { 361 VLOG(3) << "Incoming packet i 358 IsIncomingPacketAllowed( const Packet& packet, time_t now) argument 401 LogOutgoingPacket( const Packet& packet, time_t now) argument [all...] |
/system/bt/stack/include/ |
H A D | l2cap_client.h | 31 void (*read_ready)(l2cap_client_t *client, buffer_t *packet, void *context); 69 // Writes data contained in |packet| to a connected |client|. This function returns 70 // true if the packet was successfully queued for delivery, false if the client cannot 73 // |client| nor |packet| may be NULL. 74 bool l2cap_client_write(l2cap_client_t *client, buffer_t *packet);
|
/system/connectivity/shill/wifi/ |
H A D | callback80211_metrics_unittest.cc | 48 // strings represent the raw packet data coming from the kernel. The 159 NetlinkPacket packet(kDisconnectMessage, sizeof(kDisconnectMessage)); 161 &packet, NetlinkMessage::MessageContext())); 168 NetlinkPacket packet(kDeauthenticateMessage, sizeof(kDeauthenticateMessage)); 170 &packet, NetlinkMessage::MessageContext())); 178 NetlinkPacket packet( 181 &packet, NetlinkMessage::MessageContext())); 187 NetlinkPacket packet( 190 &packet, NetlinkMessage::MessageContext())); 197 NetlinkPacket packet(kNewStationMessag [all...] |