Home
last modified time | relevance | path

Searched refs:opcode (Results 1 – 6 of 6) sorted by relevance

/edtt-latest/src/components/
Dattdata.py103 def encode(self, opcode, *args): argument
108 if ( opcode == ATTOpcode.ATT_EXCH_MTU_REQUEST ):
109 self.data = [ opcode ] + toArray( args[0], 2 );
114 elif ( opcode == ATTOpcode.ATT_FIND_INFORMATION_REQUEST ):
115 self.data = [ opcode ] + toArray( args[0], 2 ) + toArray( args[1], 2 );
120 elif ( opcode == ATTOpcode.ATT_FIND_BY_TYPE_VALUE_REQUEST ):
121 … self.data = [ opcode ] + toArray( args[0], 2 ) + toArray( args[1], 2 ) + toArray( args[2], 2 );
128 elif ( opcode == ATTOpcode.ATT_READ_BY_TYPE_REQUEST ):
129 …self.data = [ opcode ] + toArray( args[0], 2 ) + toArray( args[1], 2 ) + toArray( args[2], 2 if ar…
134 elif ( opcode == ATTOpcode.ATT_READ_REQUEST ):
[all …]
Dsmpdata.py98 def encode(self, opcode, *args): argument
103 if ( opcode == SMPOpcode.SMP_PAIRING_REQUEST ):
104 self.data = [ opcode ] + list( args[:6] );
109 elif ( opcode == SMPOpcode.SMP_PAIRING_RESPONSE ):
110 self.data = [ opcode ] + list( args[:6] );
115 elif ( opcode == SMPOpcode.SMP_PAIRING_CONFIRM ):
116 self.data = [ opcode ] + toArray( args[0], 16 );
121 elif ( opcode == SMPOpcode.SMP_PAIRING_RANDOM ):
122 self.data = [ opcode ] + toArray( args[0], 16 );
127 elif ( opcode == SMPOpcode.SMP_PAIRING_FAILED ):
[all …]
Dbtsnoop.py98 def send_monitor_hdr_btmon_socket(self, idx, opcode, data_len): argument
106 ble_monitor_hdr = struct.pack("<HHH", opcode, idx, data_len)
110 def send_monitor_hdr_file(self, idx, opcode, data_len, timestamp): argument
121 flags = (idx << 16) | opcode
126 def send_monitor_hdr(self, idx, opcode, data_len): argument
131 self.send_monitor_hdr_file(idx, opcode, data_len, timestamp)
133 self.send_monitor_hdr_btmon_socket(idx, opcode, data_len)
149 opcode = BleMonitorOpcode.EVENT
151 self.send_monitor_hdr(idx, opcode, eventLen + 2)
159 def send_command_sock(self, opcode, len, data): argument
[all …]
Ddump.py406 opcode = data[0]
407 if opcode in ll_control_pdu_dict:
408 payload_type, func = ll_control_pdu_dict[opcode]
409 payload = Payload(opcode, func(data[1:]))
411 payload_type, payload = PacketType.LL_CONTROL_UNKNOWN_PDU, Payload(opcode, data[1:])
Dinitiator.py243 opcode, status = event.decode()[1:];
244 if opcode == HCICommands.BT_HCI_OP_DISCONNECT:
Dbasic_commands.py484 def edtt_send_cmd(transport, idx, opcode, payload_fmt, payload_tuple): argument
497 … req = struct.pack('<HH' + payload_fmt, opcode, struct.calcsize('<' + payload_fmt), *payload_tuple)
501 def edtt_wait_cmd_cmpl(transport, idx, opcode, payload_fmt, to): argument
523 if op != opcode: