/third_party/NuttX/drivers/usbdev/gadget/ |
H A D | rndis_std.h | 132 uint32_t msgtype; /* MessageType */ member 139 uint32_t msgtype; /* MessageType */ member 203 uint32_t msgtype; /* MessageType */ member 213 uint32_t msgtype; /* MessageType */ member
|
H A D | rndis.c | 847 msg->msgtype = RNDIS_PACKET_MSG; in rndis_fillrequest() 1031 if (msg->msgtype == RNDIS_PACKET_MSG) in rndis_recvpacket() 1067 usb_err("Unknown RNDIS message type %u\n", msg->msgtype); in rndis_recvpacket() 1154 hdr->msgtype = request_hdr->msgtype | RNDIS_MSG_COMPLETE; in rndis_prepare_response() 1218 switch (cmd_hdr->msgtype) in rndis_handle_control_message() 1447 usb_err("Unsupported RNDIS control message: %u\n", cmd_hdr->msgtype); in rndis_handle_control_message()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | fils_hlp.c | 159 u8 msgtype = 0; in fils_dhcp_handler() local 216 msgtype = pos[0]; in fils_dhcp_handler() 230 msgtype, rapid_commit, MAC2STR_SEC(dhcp->hw_addr)); in fils_dhcp_handler() 240 if (hapd->conf->dhcp_rapid_commit_proxy && msgtype == DHCPOFFER && in fils_dhcp_handler() 247 } else if (msgtype != DHCPACK) { in fils_dhcp_handler() 275 if (hapd->conf->dhcp_rapid_commit_proxy && msgtype == DHCPACK && in fils_dhcp_handler() 332 u8 msgtype = 0; in fils_process_hlp_dhcp() local 374 msgtype = pos[0]; in fils_process_hlp_dhcp() 383 wpa_printf(MSG_DEBUG, "FILS: HLP - DHCP message type %u", msgtype); in fils_process_hlp_dhcp() 384 if (msgtype ! in fils_process_hlp_dhcp() [all...] |
H A D | dhcp_snoop.c | 40 int res, msgtype = 0, prefixlen = 32; in handle_dhcp() local 84 msgtype = opt[2]; in handle_dhcp() 102 if (msgtype == DHCPACK) { in handle_dhcp()
|
H A D | wpa_auth_ft.c | 1027 const char *msgtype, int no_defer) in wpa_ft_rrb_seq_chk() 1036 RRB_GET_AUTH(FT_RRB_SEQ, seq, msgtype, sizeof(*msg_both)); in wpa_ft_rrb_seq_chk() 1082 MACSTR_SEC, msgtype, MAC2STR_SEC(src_addr)); in wpa_ft_rrb_seq_chk() 1087 msgtype, MAC2STR_SEC(src_addr)); in wpa_ft_rrb_seq_chk() 1097 const char *msgtype) in wpa_ft_rrb_seq_accept() 1106 RRB_GET_AUTH(FT_RRB_SEQ, seq, msgtype, sizeof(*msg_both)); in wpa_ft_rrb_seq_accept() 3807 const char *msgtype = "pull request"; in wpa_ft_rrb_rx_pull() local 3825 RRB_GET_AUTH(FT_RRB_R0KH_ID, r0kh_id, msgtype, -1); in wpa_ft_rrb_rx_pull() 3833 RRB_GET_AUTH(FT_RRB_R1KH_ID, r1kh_id, msgtype, FT_R1KH_ID_LEN); in wpa_ft_rrb_rx_pull() 3854 auth, auth_len, msgtype, no_defe in wpa_ft_rrb_rx_pull() 1024 wpa_ft_rrb_seq_chk(struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, int no_defer) wpa_ft_rrb_seq_chk() argument 1094 wpa_ft_rrb_seq_accept(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *auth, size_t auth_len, const char *msgtype) wpa_ft_rrb_seq_accept() argument 3958 wpa_ft_rrb_rx_r1(struct wpa_authenticator *wpa_auth, const u8 *src_addr, u8 type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, u8 *s1kh_id_out, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) wpa_ft_rrb_rx_r1() argument 4194 const char *msgtype = "pull response"; wpa_ft_rrb_rx_resp() local 4247 const char *msgtype = "push"; wpa_ft_rrb_rx_push() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | fils_hlp.c | 159 u8 msgtype = 0; in fils_dhcp_handler() local 216 msgtype = pos[0]; in fils_dhcp_handler() 230 msgtype, rapid_commit, MAC2STR(dhcp->hw_addr)); in fils_dhcp_handler() 240 if (hapd->conf->dhcp_rapid_commit_proxy && msgtype == DHCPOFFER && in fils_dhcp_handler() 247 } else if (msgtype != DHCPACK) { in fils_dhcp_handler() 275 if (hapd->conf->dhcp_rapid_commit_proxy && msgtype == DHCPACK && in fils_dhcp_handler() 332 u8 msgtype = 0; in fils_process_hlp_dhcp() local 374 msgtype = pos[0]; in fils_process_hlp_dhcp() 383 wpa_printf(MSG_DEBUG, "FILS: HLP - DHCP message type %u", msgtype); in fils_process_hlp_dhcp() 384 if (msgtype ! in fils_process_hlp_dhcp() [all...] |
H A D | dhcp_snoop.c | 40 int res, msgtype = 0, prefixlen = 32; in handle_dhcp() local 84 msgtype = opt[2]; in handle_dhcp() 100 if (msgtype == DHCPACK) { in handle_dhcp()
|
H A D | wpa_auth_ft.c | 1025 const char *msgtype, int no_defer) in wpa_ft_rrb_seq_chk() 1034 RRB_GET_AUTH(FT_RRB_SEQ, seq, msgtype, sizeof(*msg_both)); in wpa_ft_rrb_seq_chk() 1080 MACSTR, msgtype, MAC2STR(src_addr)); in wpa_ft_rrb_seq_chk() 1085 msgtype, MAC2STR(src_addr)); in wpa_ft_rrb_seq_chk() 1095 const char *msgtype) in wpa_ft_rrb_seq_accept() 1104 RRB_GET_AUTH(FT_RRB_SEQ, seq, msgtype, sizeof(*msg_both)); in wpa_ft_rrb_seq_accept() 3583 const char *msgtype = "pull request"; in wpa_ft_rrb_rx_pull() local 3601 RRB_GET_AUTH(FT_RRB_R0KH_ID, r0kh_id, msgtype, -1); in wpa_ft_rrb_rx_pull() 3609 RRB_GET_AUTH(FT_RRB_R1KH_ID, r1kh_id, msgtype, FT_R1KH_ID_LEN); in wpa_ft_rrb_rx_pull() 3630 auth, auth_len, msgtype, no_defe in wpa_ft_rrb_rx_pull() 1022 wpa_ft_rrb_seq_chk(struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, int no_defer) wpa_ft_rrb_seq_chk() argument 1092 wpa_ft_rrb_seq_accept(struct wpa_authenticator *wpa_auth, struct ft_remote_seq *rkh_seq, const u8 *src_addr, const u8 *auth, size_t auth_len, const char *msgtype) wpa_ft_rrb_seq_accept() argument 3730 wpa_ft_rrb_rx_r1(struct wpa_authenticator *wpa_auth, const u8 *src_addr, u8 type, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, const char *msgtype, u8 *s1kh_id_out, int (*cb)(struct wpa_authenticator *wpa_auth, const u8 *src_addr, const u8 *enc, size_t enc_len, const u8 *auth, size_t auth_len, int no_defer)) wpa_ft_rrb_rx_r1() argument 3966 const char *msgtype = "pull response"; wpa_ft_rrb_rx_resp() local 4019 const char *msgtype = "push"; wpa_ft_rrb_rx_push() local [all...] |
/third_party/toybox/toys/pending/ |
H A D | dhcp6.c | 98 uint8_t msgtype, transaction_id[3], options[524]; member 283 mesg.msgtype = type; in send_msg() 302 uint8_t *get_msg_ptr(uint8_t *data, int data_length, int msgtype) in get_msg_ptr() argument 307 if (type == msgtype) return data; in get_msg_ptr() 309 while (type != msgtype) { in get_msg_ptr() 315 if (type == msgtype) return data; in get_msg_ptr() 620 if (mymsg->dhcp6.msgtype == DHCP6ADVERTISE ) { in dhcp6_main() 641 if (mymsg->dhcp6.msgtype == DHCP6REPLY) { in dhcp6_main()
|
H A D | dhcpd.c | 157 uint8_t msgtype; member 971 if (gstate.rcvd.rcvd_pkt6.msgtype < 1) { in read_packet6() 1030 gstate.send.send_pkt6.msgtype = opt; in prepare_send_pkt6() 1609 uint8_t *optptr, msgtype = 0; in dhcpd_main() local 1681 msgtype = 0; in dhcpd_main() 1742 memcpy(&gstate.rqcode, &gstate.rcvd.rcvd_pkt6.msgtype, sizeof(uint8_t)); in dhcpd_main() 2003 msgtype = DHCPOFFER; in dhcpd_main() 2015 msgtype = DHCPNAK; in dhcpd_main() 2016 optptr = set_optval(optptr, DHCP_OPT_MESSAGE_TYPE, &msgtype, 1); in dhcpd_main() 2023 optptr = set_optval(optptr, DHCP_OPT_MESSAGE_TYPE, &msgtype, in dhcpd_main() [all...] |
H A D | dhcp.c | 985 static int dhcpc_sendmsg(int msgtype) in dhcpc_sendmsg() argument 1003 pend = dhcpc_addmsgtype(pend, msgtype); in dhcpc_sendmsg() 1007 switch (msgtype) { in dhcpc_sendmsg()
|
/third_party/openssl/test/ |
H A D | tls13ccstest.c | 94 unsigned int rectype, recvers, msgtype, expectedrecvers; in watchccs_write() local 116 if (!PACKET_get_1(&msg, &msgtype) in watchccs_write() 119 if (msgtype == SSL3_MT_CLIENT_HELLO) { in watchccs_write() 148 } else if (msgtype == SSL3_MT_SERVER_HELLO) { in watchccs_write()
|
H A D | asynciotest.c | 151 unsigned int msgtype = 0, negversion = 0; in async_write() local 164 && !PACKET_get_1(&wholebody, &msgtype)) in async_write() 167 if (msgtype == SSL3_MT_SERVER_HELLO) { in async_write() 233 && msgtype == SSL3_MT_SERVER_HELLO)) { in async_write()
|
/third_party/lwip/src/include/lwip/prot/ |
H A D | dhcp6.h | 60 PACK_STRUCT_FLD_8(u8_t msgtype);
|
/third_party/lwip/src/core/ipv6/ |
H A D | dhcp6.c | 406 msg_out->msgtype = message_type; in dhcp6_create_msg() 690 msg_in->msgtype, op, len, q, val_offset); in dhcp6_parse_reply() 746 msg_type = reply_msg->msgtype; in dhcp6_recv()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | d1_lib.c | 465 unsigned int rectype, versmajor, msgseq, msgtype, clientvers, cookielen; in DTLSv1_listen() local 603 if (!PACKET_get_1(&msgpkt, &msgtype) in DTLSv1_listen() 614 if (msgtype != SSL3_MT_CLIENT_HELLO) { in DTLSv1_listen()
|
/third_party/openssl/ssl/ |
H A D | d1_lib.c | 448 unsigned int rectype, versmajor, msgseq, msgtype, clientvers, cookielen; in DTLSv1_listen() local 586 if (!PACKET_get_1(&msgpkt, &msgtype) in DTLSv1_listen() 597 if (msgtype != SSL3_MT_CLIENT_HELLO) { in DTLSv1_listen()
|
/third_party/libcoap/examples/ |
H A D | coap-client.c | 102 unsigned char msgtype = COAP_MESSAGE_CON; /* usually, requests are sent confirmable */ variable 271 if (!(pdu = coap_new_pdu(msgtype, m, session))) { in coap_new_request() 1669 msgtype = COAP_MESSAGE_NON; in main() 1948 coap_cancel_observe(session, tracked_tokens[i].token, msgtype); in main()
|
/third_party/rust/crates/libc/src/unix/haiku/ |
H A D | mod.rs | 1861 msgtype: ::c_long, in msgrcv()
|