Home
last modified time | relevance | path

Searched refs:packet_len (Results 1 – 20 of 20) sorted by relevance

/hardware/nxp/uwb/halimpl/hal/sr1xx/
DNxpUwbChipSr1xx.cc49 [&] (size_t packet_len, const uint8_t *packet) mutable in otp_read_data()
172 [&](size_t packet_len, const uint8_t *packet) mutable in sr1xx_do_bind()
174 if (packet_len == UCI_MSG_UWB_ESE_BINDING_LEN) { in sr1xx_do_bind()
185 NXPLOG_UCIHAL_E("UWB_ESE_BINDING_NTF: packet length mismatched %zu", packet_len); in sr1xx_do_bind()
231 auto binding_check_ntf_cb = [&](size_t packet_len, const uint8_t *packet) mutable { in sr1xx_check_binding_status() argument
232 if (packet_len >= UCI_RESPONSE_STATUS_OFFSET) { in sr1xx_check_binding_status()
278 void onDeviceStatusNtf(size_t packet_len, const uint8_t* packet);
279 void onGenericErrorNtf(size_t packet_len, const uint8_t* packet);
280 void onBindingStatusNtf(size_t packet_len, const uint8_t* packet);
299 void NxpUwbChipSr1xx::onDeviceStatusNtf(size_t packet_len, const uint8_t* packet) in onDeviceStatusNtf() argument
[all …]
/hardware/nxp/uwb/halimpl/hal/
DsessionTrack.cc168 void OnSessionInit(size_t packet_len, const uint8_t *packet) in OnSessionInit() argument
170 if (packet_len != UCI_MSG_SESSION_STATE_INIT_CMD_LEN) in OnSessionInit()
178 [this, session_id, session_type](size_t packet_len, const uint8_t *packet) in OnSessionInit()
180 if (packet_len != UCI_MSG_SESSION_STATE_INIT_RSP_LEN ) in OnSessionInit()
264 void OnSessionStart(size_t packet_len, const uint8_t *packet) { in OnSessionStart() argument
265 if (packet_len != UCI_MSG_SESSION_START_CMD_LENGTH) in OnSessionStart()
342 [](size_t packet_len, const uint8_t *packet) { in DeleteUrsk() argument
343 if (packet_len < 5) in DeleteUrsk()
352 [&urskDeleteNtfWait](size_t packet_len, const uint8_t *packet) { in DeleteUrsk() argument
353 if (packet_len < 6) in DeleteUrsk()
[all …]
DphNxpUciHal_ext.cc386 static bool CountryCodeCapsGenTxPowerPacket(uint8_t *packet, size_t packet_len, uint16_t *out_len) in CountryCodeCapsGenTxPowerPacket() argument
396 if (gtx_power.size() > packet_len) in CountryCodeCapsGenTxPowerPacket()
848 uint16_t packet_len = *data_len; in phNxpUciHal_handle_set_app_config() local
849 if (sizeof(uciCmd) < packet_len) { in phNxpUciHal_handle_set_app_config()
850 …AL_E("SESSION_SET_APP_CONFIG_CMD packet size %u is too big to handle, skip patching.", packet_len); in phNxpUciHal_handle_set_app_config()
858 while (i < packet_len) { in phNxpUciHal_handle_set_app_config()
859 if ( (i + 2) >= packet_len) { in phNxpUciHal_handle_set_app_config()
868 if ((i + param_len) > packet_len) { in phNxpUciHal_handle_set_app_config()
878 phNxpUciHal_print_packet(NXP_TML_UCI_CMD_AP_2_UWBS, p_data, packet_len); in phNxpUciHal_handle_set_app_config()
903 phNxpUciHal_print_packet(NXP_TML_UCI_CMD_AP_2_UWBS, p_data, packet_len); in phNxpUciHal_handle_set_app_config()
[all …]
DsessionTrack.h11 void SessionTrack_onSessionInit(size_t packet_len, const uint8_t *packet);
12 void SessionTrack_onSessionStart(size_t packet_len, const uint8_t *packet);
DphNxpUciHal.cc74 std::function<void(size_t packet_len, const uint8_t *packet)> callback;
78 std::function<void(size_t packet_len, const uint8_t *packet)> callback) : in phNxpUciHal_RxHandler()
91 std::function<void(size_t packet_len, const uint8_t *packet)> callback) in phNxpUciHal_rx_handler_add() argument
106 static void phNxpUciHal_rx_handler_check(size_t packet_len, const uint8_t *packet) in phNxpUciHal_rx_handler_check() argument
116 handler->callback(packet_len, packet); in phNxpUciHal_rx_handler_check()
798 auto dev_info_cb = [](size_t packet_len, const uint8_t *packet) mutable { in cacheDevInfoRsp() argument
799 if (packet_len < 5 || packet[UCI_RESPONSE_STATUS_OFFSET] != UWBSTATUS_SUCCESS) { in cacheDevInfoRsp()
803 if (packet_len > sizeof(nxpucihal_ctrl.dev_info_resp)) { in cacheDevInfoRsp()
813 if (packet_len < firaDevInfoRspSize) { in cacheDevInfoRsp()
819 if (packet_len != (firaDevInfoRspSize + vendorSpecificLen)) { in cacheDevInfoRsp()
[all …]
DphNxpUciHal.h249 std::function<void(size_t packet_len, const uint8_t *packet)> callback);
260 std::function<void(size_t packet_len, const uint8_t *packet)> callback) { in UciHalRxHandler() argument
/hardware/google/apf/v7/
Dapf_interpreter_source.c44 u32 program_len, const u8 *packet, u32 packet_len,
47 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument
85 u32 packet_len; // Length of the input packet buffer member
129 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < ctx->packet_len) in do_apf_run()
157 if ((ctx->packet_len >= ETH_HLEN + IPV4_HLEN) in do_apf_run()
172 ctx->packet, ctx->packet_len, ctx->mem.slot, ctx->ram_len); in do_apf_run()
442 ctx->packet_len - udp_payload_offset, in do_apf_run()
552 const u32 packet_len, const u32 filter_age_16384ths) { in apf_runner() argument
573 apf_ctx.packet_len = packet_len; in apf_runner()
577 apf_ctx.mem.named.packet_size = packet_len; in apf_runner()
[all …]
Dapf_interpreter.c590 u32 program_len, const u8 *packet, u32 packet_len,
593 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument
631 u32 packet_len; /* Length of the input packet buffer */ member
675 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < ctx->packet_len) in do_apf_run()
703 if ((ctx->packet_len >= ETH_HLEN + IPV4_HLEN) in do_apf_run()
718 ctx->packet, ctx->packet_len, ctx->mem.slot, ctx->ram_len); in do_apf_run()
988 ctx->packet_len - udp_payload_offset, in do_apf_run()
1098 const u32 packet_len, const u32 filter_age_16384ths) { in apf_runner() argument
1119 apf_ctx.packet_len = packet_len; in apf_runner()
1123 apf_ctx.mem.named.packet_size = packet_len; in apf_runner()
[all …]
Dapf_interpreter.h169 const uint32_t packet_len, const uint32_t filter_age_16384ths);
/hardware/google/apf/
Dapf_interpreter.c26 uint32_t program_len, const uint8_t *packet, uint32_t packet_len,
29 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument
46 const uint8_t* packet, uint32_t packet_len, in accept_packet() argument
51 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < packet_len) in accept_packet()
74 memory[MEMORY_OFFSET_PACKET_SIZE] = packet_len; in accept_packet()
90 APF_TRACE_HOOK(pc, registers, program, program_len, packet, packet_len, memory, ram_len); in accept_packet()
Dapf_interpreter.h59 const uint8_t* packet, uint32_t packet_len,
Dapf_run.c173 uint32_t packet_len = parse_hex(pkt, &packet); in packet_handler() local
179 ret = apf_run(NULL, (uint32_t*)program, program_len, ram_len, packet, packet_len, in packet_handler()
182 ret = accept_packet(program, program_len, ram_len, packet, packet_len, in packet_handler()
192 const uint8_t* packet __unused, uint32_t packet_len __unused, in apf_trace_hook()
/hardware/google/apf/v4/
Dapf_interpreter.c26 uint32_t program_len, const uint8_t *packet, uint32_t packet_len,
29 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument
46 const uint8_t* packet, uint32_t packet_len, in accept_packet() argument
51 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < packet_len) in accept_packet()
74 memory[MEMORY_OFFSET_PACKET_SIZE] = packet_len; in accept_packet()
90 APF_TRACE_HOOK(pc, registers, program, program_len, packet, packet_len, memory, ram_len); in accept_packet()
Dapf_interpreter.h59 const uint8_t* packet, uint32_t packet_len,
/hardware/google/apf/devtools/
Dapf_interpreter.c590 u32 program_len, const u8 *packet, u32 packet_len,
593 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument
631 u32 packet_len; /* Length of the input packet buffer */ member
675 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < ctx->packet_len) in do_apf_run()
703 if ((ctx->packet_len >= ETH_HLEN + IPV4_HLEN) in do_apf_run()
718 ctx->packet, ctx->packet_len, ctx->mem.slot, ctx->ram_len); in do_apf_run()
988 ctx->packet_len - udp_payload_offset, in do_apf_run()
1098 const u32 packet_len, const u32 filter_age_16384ths) { in apf_runner() argument
1119 apf_ctx.packet_len = packet_len; in apf_runner()
1123 apf_ctx.mem.named.packet_size = packet_len; in apf_runner()
[all …]
Dapf_interpreter.h169 const uint32_t packet_len, const uint32_t filter_age_16384ths);
/hardware/google/apf/v6/
Dapf_interpreter.c588 u32 program_len, const u8 *packet, u32 packet_len,
591 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument
629 u32 packet_len; /* Length of the input packet buffer */ member
668 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < ctx->packet_len) in do_apf_run()
696 if ((ctx->packet_len >= ETH_HLEN + IPV4_HLEN) && ((ctx->packet[ETH_HLEN] & 0xf0) == 0x40)) { in do_apf_run()
710 ctx->packet, ctx->packet_len, ctx->mem.slot, ctx->ram_len); in do_apf_run()
978 ctx->packet_len - udp_payload_offset, in do_apf_run()
1088 const u32 packet_len, const u32 filter_age_16384ths) { in apf_runner() argument
1109 apf_ctx.packet_len = packet_len; in apf_runner()
1113 apf_ctx.mem.named.packet_size = packet_len; in apf_runner()
[all …]
Dapf_interpreter.h169 const uint32_t packet_len, const uint32_t filter_age_16384ths);
/hardware/nxp/uwb/halimpl/hal/sr200/
DNxpUwbChipSr200.cc28 void on_binding_status_ntf(size_t packet_len, const uint8_t* packet);
47 void NxpUwbChipSr200::on_binding_status_ntf(size_t packet_len, const uint8_t* packet) in on_binding_status_ntf() argument
49 if (packet_len >= UCI_RESPONSE_STATUS_OFFSET) { in on_binding_status_ntf()
/hardware/google/gfxstream/codegen/generic-apigen/
DREADME29 unsigned int packet_len;
47 14, // sizeof(opcode) + sizeof(packet_len) + sizeof(int) + sizeof(short)