Searched refs:opcode (Results 1 – 6 of 6) sorted by relevance
/edtt-latest/src/components/ |
D | attdata.py | 103 def encode(self, opcode, *args): argument 108 if ( opcode == ATTOpcode.ATT_EXCH_MTU_REQUEST ): 109 self.data = [ opcode ] + toArray( args[0], 2 ); 114 elif ( opcode == ATTOpcode.ATT_FIND_INFORMATION_REQUEST ): 115 self.data = [ opcode ] + toArray( args[0], 2 ) + toArray( args[1], 2 ); 120 elif ( opcode == ATTOpcode.ATT_FIND_BY_TYPE_VALUE_REQUEST ): 121 … self.data = [ opcode ] + toArray( args[0], 2 ) + toArray( args[1], 2 ) + toArray( args[2], 2 ); 128 elif ( opcode == ATTOpcode.ATT_READ_BY_TYPE_REQUEST ): 129 …self.data = [ opcode ] + toArray( args[0], 2 ) + toArray( args[1], 2 ) + toArray( args[2], 2 if ar… 134 elif ( opcode == ATTOpcode.ATT_READ_REQUEST ): [all …]
|
D | smpdata.py | 98 def encode(self, opcode, *args): argument 103 if ( opcode == SMPOpcode.SMP_PAIRING_REQUEST ): 104 self.data = [ opcode ] + list( args[:6] ); 109 elif ( opcode == SMPOpcode.SMP_PAIRING_RESPONSE ): 110 self.data = [ opcode ] + list( args[:6] ); 115 elif ( opcode == SMPOpcode.SMP_PAIRING_CONFIRM ): 116 self.data = [ opcode ] + toArray( args[0], 16 ); 121 elif ( opcode == SMPOpcode.SMP_PAIRING_RANDOM ): 122 self.data = [ opcode ] + toArray( args[0], 16 ); 127 elif ( opcode == SMPOpcode.SMP_PAIRING_FAILED ): [all …]
|
D | btsnoop.py | 98 def send_monitor_hdr_btmon_socket(self, idx, opcode, data_len): argument 106 ble_monitor_hdr = struct.pack("<HHH", opcode, idx, data_len) 110 def send_monitor_hdr_file(self, idx, opcode, data_len, timestamp): argument 121 flags = (idx << 16) | opcode 126 def send_monitor_hdr(self, idx, opcode, data_len): argument 131 self.send_monitor_hdr_file(idx, opcode, data_len, timestamp) 133 self.send_monitor_hdr_btmon_socket(idx, opcode, data_len) 149 opcode = BleMonitorOpcode.EVENT 151 self.send_monitor_hdr(idx, opcode, eventLen + 2) 159 def send_command_sock(self, opcode, len, data): argument [all …]
|
D | dump.py | 406 opcode = data[0] 407 if opcode in ll_control_pdu_dict: 408 payload_type, func = ll_control_pdu_dict[opcode] 409 payload = Payload(opcode, func(data[1:])) 411 payload_type, payload = PacketType.LL_CONTROL_UNKNOWN_PDU, Payload(opcode, data[1:])
|
D | initiator.py | 243 opcode, status = event.decode()[1:]; 244 if opcode == HCICommands.BT_HCI_OP_DISCONNECT:
|
D | basic_commands.py | 484 def edtt_send_cmd(transport, idx, opcode, payload_fmt, payload_tuple): argument 497 … req = struct.pack('<HH' + payload_fmt, opcode, struct.calcsize('<' + payload_fmt), *payload_tuple) 501 def edtt_wait_cmd_cmpl(transport, idx, opcode, payload_fmt, to): argument 523 if op != opcode:
|