Home
last modified time | relevance | path

Searched refs:msgtype (Results 1 – 25 of 37) sorted by relevance

12

/external/nanopb-c/examples/using_union_messages/
Dencode.c48 int msgtype = atoi(argv[1]); in main() local
49 if (msgtype == 1) in main()
55 else if (msgtype == 2) in main()
61 else if (msgtype == 3) in main()
69 fprintf(stderr, "Unknown message type: %d\n", msgtype); in main()
/external/scapy/scapy/layers/
Ddhcp6.py1193 msgtype = 1 variable in DHCP6_Solicit
1207 msgtype = 2 variable in DHCP6_Advertise
1212 other.msgtype == 1 and
1235 msgtype = 3 variable in DHCP6_Request
1248 msgtype = 4 variable in DHCP6_Confirm
1270 msgtype = 5 variable in DHCP6_Renew
1281 msgtype = 6 variable in DHCP6_Rebind
1309 msgtype = 7 variable in DHCP6_Reply
1329 msgtype = 8 variable in DHCP6_Release
1344 msgtype = 9 variable in DHCP6_Decline
[all …]
/external/libnl/lib/
Dcache_mngt.c111 static struct nl_cache_ops *__cache_ops_associate(int protocol, int msgtype) in __cache_ops_associate() argument
121 if (ops->co_msgtypes[i].mt_id == msgtype) in __cache_ops_associate()
140 struct nl_cache_ops *nl_cache_ops_associate(int protocol, int msgtype) in nl_cache_ops_associate() argument
145 ops = __cache_ops_associate(protocol, msgtype); in nl_cache_ops_associate()
164 struct nl_cache_ops *nl_cache_ops_associate_safe(int protocol, int msgtype) in nl_cache_ops_associate_safe() argument
169 if ((ops = __cache_ops_associate(protocol, msgtype))) in nl_cache_ops_associate_safe()
189 struct nl_msgtype *nl_msgtype_lookup(struct nl_cache_ops *ops, int msgtype) in nl_msgtype_lookup() argument
194 if (ops->co_msgtypes[i].mt_id == msgtype) in nl_msgtype_lookup()
/external/tcpdump/tests/
Dsomeip1.out1 …, service 65535, event 256, len 64, client 0, session 0, pver 1, iver 1, msgtype NOTIFICATION, ret…
3 …, service 65535, event 256, len 48, client 0, session 0, pver 1, iver 1, msgtype NOTIFICATION, ret…
5 …, service 65535, event 256, len 48, client 0, session 0, pver 1, iver 1, msgtype NOTIFICATION, ret…
Dsomeip2.out1 …SOMEIP, service 1, method 2, len 8, client 8, session 5, pver 1, iver 1, msgtype REQUEST_NO_RETURN…
/external/selinux/python/sepolgen/tests/test_data/
Dhttpd.log1 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=…
2 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=…
3 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=…
4 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=…
5 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=…
6 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=…
7 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=…
8 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=…
9 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=…
10 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call inter…
[all …]
/external/wpa_supplicant_8/src/ap/
Dfils_hlp.c159 u8 msgtype = 0; in fils_dhcp_handler() local
216 msgtype = pos[0]; in fils_dhcp_handler()
230 msgtype, rapid_commit, MAC2STR(dhcp->hw_addr)); in fils_dhcp_handler()
240 if (hapd->conf->dhcp_rapid_commit_proxy && msgtype == DHCPOFFER && in fils_dhcp_handler()
247 } else if (msgtype != DHCPACK) { in fils_dhcp_handler()
275 if (hapd->conf->dhcp_rapid_commit_proxy && msgtype == DHCPACK && in fils_dhcp_handler()
332 u8 msgtype = 0; in fils_process_hlp_dhcp() local
374 msgtype = pos[0]; in fils_process_hlp_dhcp()
383 wpa_printf(MSG_DEBUG, "FILS: HLP - DHCP message type %u", msgtype); in fils_process_hlp_dhcp()
384 if (msgtype != DHCPDISCOVER) in fils_process_hlp_dhcp()
Ddhcp_snoop.c40 int res, msgtype = 0, prefixlen = 32; in handle_dhcp() local
84 msgtype = opt[2]; in handle_dhcp()
102 if (msgtype == DHCPACK) { in handle_dhcp()
Dwpa_auth_ft.c1061 const char *msgtype, int no_defer) in wpa_ft_rrb_seq_chk() argument
1070 RRB_GET_AUTH(FT_RRB_SEQ, seq, msgtype, sizeof(*msg_both)); in wpa_ft_rrb_seq_chk()
1116 MACSTR, msgtype, MAC2STR(src_addr)); in wpa_ft_rrb_seq_chk()
1121 msgtype, MAC2STR(src_addr)); in wpa_ft_rrb_seq_chk()
1131 const char *msgtype) in wpa_ft_rrb_seq_accept() argument
1140 RRB_GET_AUTH(FT_RRB_SEQ, seq, msgtype, sizeof(*msg_both)); in wpa_ft_rrb_seq_accept()
3978 const char *msgtype = "pull request"; in wpa_ft_rrb_rx_pull() local
3996 RRB_GET_AUTH(FT_RRB_R0KH_ID, r0kh_id, msgtype, -1); in wpa_ft_rrb_rx_pull()
4004 RRB_GET_AUTH(FT_RRB_R1KH_ID, r1kh_id, msgtype, FT_R1KH_ID_LEN); in wpa_ft_rrb_rx_pull()
4025 auth, auth_len, msgtype, no_defer); in wpa_ft_rrb_rx_pull()
[all …]
/external/kernel-headers/original/uapi/scsi/
Dscsi_netlink.h32 __u16 msgtype; member
104 (hdr)->msgtype = mtype; \
/external/tcpdump/
Dprint-dhcp6.c103 nd_uint8_t msgtype; member
863 uint8_t msgtype; in dhcp6_print() local
878 msgtype = GET_U_1(dh6->dh6_msgtypexid.msgtype); in dhcp6_print()
879 name = tok2str(dh6_msgtype_str, "msgtype-%u", msgtype); in dhcp6_print()
889 if (msgtype != DH6_RELAY_FORW && msgtype != DH6_RELAY_REPLY) { in dhcp6_print()
Dprint-fr.c817 u_int msgtype; in q933_print() local
868 msgtype = GET_U_1(p); in q933_print()
946 "unknown message", msgtype), in q933_print()
947 msgtype, in q933_print()
952 "unknown message 0x%02x", msgtype)); in q933_print()
/external/toybox/toys/pending/
Ddhcp6.c98 uint8_t msgtype, transaction_id[3], options[524]; member
283 mesg.msgtype = type; in send_msg()
302 uint8_t *get_msg_ptr(uint8_t *data, int data_length, int msgtype) in get_msg_ptr() argument
307 if (type == msgtype) return data; in get_msg_ptr()
309 while (type != msgtype) { in get_msg_ptr()
315 if (type == msgtype) return data; in get_msg_ptr()
620 if (mymsg->dhcp6.msgtype == DHCP6ADVERTISE ) { in dhcp6_main()
641 if (mymsg->dhcp6.msgtype == DHCP6REPLY) { in dhcp6_main()
Ddhcpd.c148 char msgtype, transaction_id[3], options[524]; member
950 if (gstate.rcvd.rcvd_pkt6.msgtype < 1) { in read_packet6()
1009 gstate.send.send_pkt6.msgtype = opt; in prepare_send_pkt6()
1588 char *optptr, msgtype = 0, *hstname = 0, transactionid[3] = {0}; in dhcpd_main() local
1657 msgtype = 0; in dhcpd_main()
1718 memcpy(&gstate.rqcode, &gstate.rcvd.rcvd_pkt6.msgtype, sizeof(uint8_t)); in dhcpd_main()
1979 msgtype = DHCPOFFER; in dhcpd_main()
1991 msgtype = DHCPNAK; in dhcpd_main()
1992 optptr = set_optval(optptr, DHCP_OPT_MESSAGE_TYPE, &msgtype, 1); in dhcpd_main()
1999 optptr = set_optval(optptr, DHCP_OPT_MESSAGE_TYPE, &msgtype, 1); in dhcpd_main()
[all …]
Ddhcp.c986 static int dhcpc_sendmsg(int msgtype) in dhcpc_sendmsg() argument
1004 pend = dhcpc_addmsgtype(pend, msgtype); in dhcpc_sendmsg()
1008 switch (msgtype) { in dhcpc_sendmsg()
/external/scapy/scapy/layers/tls/
Dextensions.py834 cls = _tls_ext_keyshare_hrr_cls.get(pkt.msgtype, TLS_Ext_Unknown) # noqa: E501
836 cls = _tls_ext_keyshare_cls.get(pkt.msgtype, TLS_Ext_Unknown) # noqa: E501
839 cls = _tls_ext_presharedkey_cls.get(pkt.msgtype, TLS_Ext_Unknown) # noqa: E501
841 cls = _tls_ext_supported_version_cls.get(pkt.msgtype, TLS_Ext_Unknown) # noqa: E501
843 cls = _tls_ext_early_data_cls.get(pkt.msgtype, TLS_Ext_Unknown)
Drecord_sslv2.py39 msgtype = orb(m[0])
40 cls = _sslv2_handshake_cls.get(msgtype, Raw)
Drecord.py87 msgtype = orb(m[0])
98 cls = _tls13_handshake_cls.get(msgtype, Raw)
100 cls = _tls_handshake_cls.get(msgtype, Raw)
/external/scapy/test/scapy/layers/tls/
Dsslv2.uts50 assert ch.msgtype == 1
62 assert sh.msgtype == 4
97 assert mk.msgtype == 2
126 assert sv.msgtype == 5
133 assert cf.msgtype == 3
140 assert rc.msgtype == 7
148 assert cc.msgtype == 8
162 assert sf.msgtype == 6
256 ch_pkt.msgtype = 'client_hello'
Dtls13.uts113 assert ch.msgtype == 1
235 assert t.msg[0].msgtype == 1
368 assert m[0].msgtype == 8
387 assert m[1].msgtype == 11
416 assert m[2].msgtype == 15
432 assert m[3].msgtype == 20
566 assert m.msgtype == 4
712 assert t.msg[0].msgtype == 1
768 assert t.msg[0].msgtype == 2
834 assert t.msg[0].msgtype == 1
Dtls.uts803 assert ch.msgtype == 1
950 ccs.msgtype == 1
972 assert tick.msgtype == 4
1267 ch.msgtype = 'client_hello'
1660 assert packets[8].getlayer(TLS, 3).msg[0].msgtype == 20
1662 assert packets[10].getlayer(TLS, 3).msg[0].msgtype == 20
/external/scapy/test/scapy/layers/
Ddhcp6.uts512 a.optcode == 19 and a.optlen == 1 and a.msgtype == 11
515 raw(DHCP6OptReconfMsg(optlen=4, msgtype=5)) == b'\x00\x13\x00\x04\x05'
519 a.optcode == 19 and a.optlen == 4 and a.msgtype == 5
1322 a.msgtype == 1 and a.trid == 0
1376 a.msgtype == 3 and a.trid == 0
1392 a.msgtype == 4 and a.trid == 0
1408 a.msgtype == 5 and a.trid == 0
1424 a.msgtype == 6 and a.trid == 0
1440 a.msgtype == 7 and a.trid == 0
1461 a.msgtype == 8 and a.trid == 0
[all …]
/external/ethtool/shell-completion/bash/
Dethtool159 # Unsigned integer or msgtype
198 local msgtype
199 for msgtype in "${!msgtypes[@]}"; do
200 if [ "${msgtypes[$msgtype]}" = notseen ]; then
201 comp_words+=( "$msgtype" )
/external/scapy/test/
Danswering_machines.uts209 req = IPv6(dst="::1")/UDP()/DHCP6(msgtype=1)/DHCP6OptClientId(duid=DUID_LLT())
220 req = IPv6(dst="::1")/UDP()/DHCP6(msgtype=11)/DHCP6OptClientId(duid=DUID_LLT())
230 req = IPv6(dst="::1")/UDP()/DHCP6(msgtype=3)/DHCP6OptClientId(duid=DUID_LLT())/DHCP6OptServerId(dui…
/external/autotest/server/
Dserver_job.py1178 timestamp, msgtype, msg = line.split('\t', 2)
1181 if self.warning_manager.is_valid(timestamp, msgtype):

12