/hardware/nxp/uwb/halimpl/hal/sr1xx/ |
D | NxpUwbChipSr1xx.cc | 49 [&] (size_t packet_len, const uint8_t *packet) mutable in otp_read_data() 172 [&](size_t packet_len, const uint8_t *packet) mutable in sr1xx_do_bind() 174 if (packet_len == UCI_MSG_UWB_ESE_BINDING_LEN) { in sr1xx_do_bind() 185 NXPLOG_UCIHAL_E("UWB_ESE_BINDING_NTF: packet length mismatched %zu", packet_len); in sr1xx_do_bind() 231 auto binding_check_ntf_cb = [&](size_t packet_len, const uint8_t *packet) mutable { in sr1xx_check_binding_status() argument 232 if (packet_len >= UCI_RESPONSE_STATUS_OFFSET) { in sr1xx_check_binding_status() 278 void onDeviceStatusNtf(size_t packet_len, const uint8_t* packet); 279 void onGenericErrorNtf(size_t packet_len, const uint8_t* packet); 280 void onBindingStatusNtf(size_t packet_len, const uint8_t* packet); 299 void NxpUwbChipSr1xx::onDeviceStatusNtf(size_t packet_len, const uint8_t* packet) in onDeviceStatusNtf() argument [all …]
|
/hardware/nxp/uwb/halimpl/hal/ |
D | sessionTrack.cc | 168 void OnSessionInit(size_t packet_len, const uint8_t *packet) in OnSessionInit() argument 170 if (packet_len != UCI_MSG_SESSION_STATE_INIT_CMD_LEN) in OnSessionInit() 178 [this, session_id, session_type](size_t packet_len, const uint8_t *packet) in OnSessionInit() 180 if (packet_len != UCI_MSG_SESSION_STATE_INIT_RSP_LEN ) in OnSessionInit() 264 void OnSessionStart(size_t packet_len, const uint8_t *packet) { in OnSessionStart() argument 265 if (packet_len != UCI_MSG_SESSION_START_CMD_LENGTH) in OnSessionStart() 342 [](size_t packet_len, const uint8_t *packet) { in DeleteUrsk() argument 343 if (packet_len < 5) in DeleteUrsk() 352 [&urskDeleteNtfWait](size_t packet_len, const uint8_t *packet) { in DeleteUrsk() argument 353 if (packet_len < 6) in DeleteUrsk() [all …]
|
D | phNxpUciHal_ext.cc | 386 static bool CountryCodeCapsGenTxPowerPacket(uint8_t *packet, size_t packet_len, uint16_t *out_len) in CountryCodeCapsGenTxPowerPacket() argument 396 if (gtx_power.size() > packet_len) in CountryCodeCapsGenTxPowerPacket() 848 uint16_t packet_len = *data_len; in phNxpUciHal_handle_set_app_config() local 849 if (sizeof(uciCmd) < packet_len) { in phNxpUciHal_handle_set_app_config() 850 …AL_E("SESSION_SET_APP_CONFIG_CMD packet size %u is too big to handle, skip patching.", packet_len); in phNxpUciHal_handle_set_app_config() 858 while (i < packet_len) { in phNxpUciHal_handle_set_app_config() 859 if ( (i + 2) >= packet_len) { in phNxpUciHal_handle_set_app_config() 868 if ((i + param_len) > packet_len) { in phNxpUciHal_handle_set_app_config() 878 phNxpUciHal_print_packet(NXP_TML_UCI_CMD_AP_2_UWBS, p_data, packet_len); in phNxpUciHal_handle_set_app_config() 903 phNxpUciHal_print_packet(NXP_TML_UCI_CMD_AP_2_UWBS, p_data, packet_len); in phNxpUciHal_handle_set_app_config() [all …]
|
D | sessionTrack.h | 11 void SessionTrack_onSessionInit(size_t packet_len, const uint8_t *packet); 12 void SessionTrack_onSessionStart(size_t packet_len, const uint8_t *packet);
|
D | phNxpUciHal.cc | 74 std::function<void(size_t packet_len, const uint8_t *packet)> callback; 78 std::function<void(size_t packet_len, const uint8_t *packet)> callback) : in phNxpUciHal_RxHandler() 91 std::function<void(size_t packet_len, const uint8_t *packet)> callback) in phNxpUciHal_rx_handler_add() argument 106 static void phNxpUciHal_rx_handler_check(size_t packet_len, const uint8_t *packet) in phNxpUciHal_rx_handler_check() argument 116 handler->callback(packet_len, packet); in phNxpUciHal_rx_handler_check() 798 auto dev_info_cb = [](size_t packet_len, const uint8_t *packet) mutable { in cacheDevInfoRsp() argument 799 if (packet_len < 5 || packet[UCI_RESPONSE_STATUS_OFFSET] != UWBSTATUS_SUCCESS) { in cacheDevInfoRsp() 803 if (packet_len > sizeof(nxpucihal_ctrl.dev_info_resp)) { in cacheDevInfoRsp() 813 if (packet_len < firaDevInfoRspSize) { in cacheDevInfoRsp() 819 if (packet_len != (firaDevInfoRspSize + vendorSpecificLen)) { in cacheDevInfoRsp() [all …]
|
D | phNxpUciHal.h | 249 std::function<void(size_t packet_len, const uint8_t *packet)> callback); 260 std::function<void(size_t packet_len, const uint8_t *packet)> callback) { in UciHalRxHandler() argument
|
/hardware/google/apf/v7/ |
D | apf_interpreter_source.c | 44 u32 program_len, const u8 *packet, u32 packet_len, 47 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument 85 u32 packet_len; // Length of the input packet buffer member 129 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < ctx->packet_len) in do_apf_run() 157 if ((ctx->packet_len >= ETH_HLEN + IPV4_HLEN) in do_apf_run() 172 ctx->packet, ctx->packet_len, ctx->mem.slot, ctx->ram_len); in do_apf_run() 442 ctx->packet_len - udp_payload_offset, in do_apf_run() 552 const u32 packet_len, const u32 filter_age_16384ths) { in apf_runner() argument 573 apf_ctx.packet_len = packet_len; in apf_runner() 577 apf_ctx.mem.named.packet_size = packet_len; in apf_runner() [all …]
|
D | apf_interpreter.c | 590 u32 program_len, const u8 *packet, u32 packet_len, 593 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument 631 u32 packet_len; /* Length of the input packet buffer */ member 675 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < ctx->packet_len) in do_apf_run() 703 if ((ctx->packet_len >= ETH_HLEN + IPV4_HLEN) in do_apf_run() 718 ctx->packet, ctx->packet_len, ctx->mem.slot, ctx->ram_len); in do_apf_run() 988 ctx->packet_len - udp_payload_offset, in do_apf_run() 1098 const u32 packet_len, const u32 filter_age_16384ths) { in apf_runner() argument 1119 apf_ctx.packet_len = packet_len; in apf_runner() 1123 apf_ctx.mem.named.packet_size = packet_len; in apf_runner() [all …]
|
D | apf_interpreter.h | 169 const uint32_t packet_len, const uint32_t filter_age_16384ths);
|
/hardware/google/apf/ |
D | apf_interpreter.c | 26 uint32_t program_len, const uint8_t *packet, uint32_t packet_len, 29 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument 46 const uint8_t* packet, uint32_t packet_len, in accept_packet() argument 51 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < packet_len) in accept_packet() 74 memory[MEMORY_OFFSET_PACKET_SIZE] = packet_len; in accept_packet() 90 APF_TRACE_HOOK(pc, registers, program, program_len, packet, packet_len, memory, ram_len); in accept_packet()
|
D | apf_interpreter.h | 59 const uint8_t* packet, uint32_t packet_len,
|
D | apf_run.c | 173 uint32_t packet_len = parse_hex(pkt, &packet); in packet_handler() local 179 ret = apf_run(NULL, (uint32_t*)program, program_len, ram_len, packet, packet_len, in packet_handler() 182 ret = accept_packet(program, program_len, ram_len, packet, packet_len, in packet_handler() 192 const uint8_t* packet __unused, uint32_t packet_len __unused, in apf_trace_hook()
|
/hardware/google/apf/v4/ |
D | apf_interpreter.c | 26 uint32_t program_len, const uint8_t *packet, uint32_t packet_len, 29 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument 46 const uint8_t* packet, uint32_t packet_len, in accept_packet() argument 51 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < packet_len) in accept_packet() 74 memory[MEMORY_OFFSET_PACKET_SIZE] = packet_len; in accept_packet() 90 APF_TRACE_HOOK(pc, registers, program, program_len, packet, packet_len, memory, ram_len); in accept_packet()
|
D | apf_interpreter.h | 59 const uint8_t* packet, uint32_t packet_len,
|
/hardware/google/apf/devtools/ |
D | apf_interpreter.c | 590 u32 program_len, const u8 *packet, u32 packet_len, 593 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument 631 u32 packet_len; /* Length of the input packet buffer */ member 675 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < ctx->packet_len) in do_apf_run() 703 if ((ctx->packet_len >= ETH_HLEN + IPV4_HLEN) in do_apf_run() 718 ctx->packet, ctx->packet_len, ctx->mem.slot, ctx->ram_len); in do_apf_run() 988 ctx->packet_len - udp_payload_offset, in do_apf_run() 1098 const u32 packet_len, const u32 filter_age_16384ths) { in apf_runner() argument 1119 apf_ctx.packet_len = packet_len; in apf_runner() 1123 apf_ctx.mem.named.packet_size = packet_len; in apf_runner() [all …]
|
D | apf_interpreter.h | 169 const uint32_t packet_len, const uint32_t filter_age_16384ths);
|
/hardware/google/apf/v6/ |
D | apf_interpreter.c | 588 u32 program_len, const u8 *packet, u32 packet_len, 591 #define APF_TRACE_HOOK(pc, regs, program, program_len, packet, packet_len, memory, memory_len) \ argument 629 u32 packet_len; /* Length of the input packet buffer */ member 668 #define IN_PACKET_BOUNDS(p) (ENFORCE_UNSIGNED(p) && (p) < ctx->packet_len) in do_apf_run() 696 if ((ctx->packet_len >= ETH_HLEN + IPV4_HLEN) && ((ctx->packet[ETH_HLEN] & 0xf0) == 0x40)) { in do_apf_run() 710 ctx->packet, ctx->packet_len, ctx->mem.slot, ctx->ram_len); in do_apf_run() 978 ctx->packet_len - udp_payload_offset, in do_apf_run() 1088 const u32 packet_len, const u32 filter_age_16384ths) { in apf_runner() argument 1109 apf_ctx.packet_len = packet_len; in apf_runner() 1113 apf_ctx.mem.named.packet_size = packet_len; in apf_runner() [all …]
|
D | apf_interpreter.h | 169 const uint32_t packet_len, const uint32_t filter_age_16384ths);
|
/hardware/nxp/uwb/halimpl/hal/sr200/ |
D | NxpUwbChipSr200.cc | 28 void on_binding_status_ntf(size_t packet_len, const uint8_t* packet); 47 void NxpUwbChipSr200::on_binding_status_ntf(size_t packet_len, const uint8_t* packet) in on_binding_status_ntf() argument 49 if (packet_len >= UCI_RESPONSE_STATUS_OFFSET) { in on_binding_status_ntf()
|
/hardware/google/gfxstream/codegen/generic-apigen/ |
D | README | 29 unsigned int packet_len; 47 14, // sizeof(opcode) + sizeof(packet_len) + sizeof(int) + sizeof(short)
|