/external/nanopb-c/examples/using_union_messages/ |
D | encode.c | 48 int msgtype = atoi(argv[1]); in main() local 49 if (msgtype == 1) in main() 55 else if (msgtype == 2) in main() 61 else if (msgtype == 3) in main() 69 fprintf(stderr, "Unknown message type: %d\n", msgtype); in main()
|
/external/scapy/scapy/layers/ |
D | dhcp6.py | 1193 msgtype = 1 variable in DHCP6_Solicit 1207 msgtype = 2 variable in DHCP6_Advertise 1212 other.msgtype == 1 and 1235 msgtype = 3 variable in DHCP6_Request 1248 msgtype = 4 variable in DHCP6_Confirm 1270 msgtype = 5 variable in DHCP6_Renew 1281 msgtype = 6 variable in DHCP6_Rebind 1309 msgtype = 7 variable in DHCP6_Reply 1329 msgtype = 8 variable in DHCP6_Release 1344 msgtype = 9 variable in DHCP6_Decline [all …]
|
/external/libnl/lib/ |
D | cache_mngt.c | 111 static struct nl_cache_ops *__cache_ops_associate(int protocol, int msgtype) in __cache_ops_associate() argument 121 if (ops->co_msgtypes[i].mt_id == msgtype) in __cache_ops_associate() 140 struct nl_cache_ops *nl_cache_ops_associate(int protocol, int msgtype) in nl_cache_ops_associate() argument 145 ops = __cache_ops_associate(protocol, msgtype); in nl_cache_ops_associate() 164 struct nl_cache_ops *nl_cache_ops_associate_safe(int protocol, int msgtype) in nl_cache_ops_associate_safe() argument 169 if ((ops = __cache_ops_associate(protocol, msgtype))) in nl_cache_ops_associate_safe() 189 struct nl_msgtype *nl_msgtype_lookup(struct nl_cache_ops *ops, int msgtype) in nl_msgtype_lookup() argument 194 if (ops->co_msgtypes[i].mt_id == msgtype) in nl_msgtype_lookup()
|
/external/tcpdump/tests/ |
D | someip1.out | 1 …, service 65535, event 256, len 64, client 0, session 0, pver 1, iver 1, msgtype NOTIFICATION, ret… 3 …, service 65535, event 256, len 48, client 0, session 0, pver 1, iver 1, msgtype NOTIFICATION, ret… 5 …, service 65535, event 256, len 48, client 0, session 0, pver 1, iver 1, msgtype NOTIFICATION, ret…
|
D | someip2.out | 1 …SOMEIP, service 1, method 2, len 8, client 8, session 5, pver 1, iver 1, msgtype REQUEST_NO_RETURN…
|
/external/selinux/python/sepolgen/tests/test_data/ |
D | httpd.log | 1 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=… 2 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=… 3 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=… 4 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=… 5 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=… 6 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=… 7 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=… 8 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=… 9 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=signal interface=… 10 …ubj=staff_u:staff_r:staff_dbusd_t:s0 msg='avc: denied { send_msg } for msgtype=method_call inter… [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | fils_hlp.c | 159 u8 msgtype = 0; in fils_dhcp_handler() local 216 msgtype = pos[0]; in fils_dhcp_handler() 230 msgtype, rapid_commit, MAC2STR(dhcp->hw_addr)); in fils_dhcp_handler() 240 if (hapd->conf->dhcp_rapid_commit_proxy && msgtype == DHCPOFFER && in fils_dhcp_handler() 247 } else if (msgtype != DHCPACK) { in fils_dhcp_handler() 275 if (hapd->conf->dhcp_rapid_commit_proxy && msgtype == DHCPACK && in fils_dhcp_handler() 332 u8 msgtype = 0; in fils_process_hlp_dhcp() local 374 msgtype = pos[0]; in fils_process_hlp_dhcp() 383 wpa_printf(MSG_DEBUG, "FILS: HLP - DHCP message type %u", msgtype); in fils_process_hlp_dhcp() 384 if (msgtype != DHCPDISCOVER) in fils_process_hlp_dhcp()
|
D | dhcp_snoop.c | 40 int res, msgtype = 0, prefixlen = 32; in handle_dhcp() local 84 msgtype = opt[2]; in handle_dhcp() 102 if (msgtype == DHCPACK) { in handle_dhcp()
|
D | wpa_auth_ft.c | 1061 const char *msgtype, int no_defer) in wpa_ft_rrb_seq_chk() argument 1070 RRB_GET_AUTH(FT_RRB_SEQ, seq, msgtype, sizeof(*msg_both)); in wpa_ft_rrb_seq_chk() 1116 MACSTR, msgtype, MAC2STR(src_addr)); in wpa_ft_rrb_seq_chk() 1121 msgtype, MAC2STR(src_addr)); in wpa_ft_rrb_seq_chk() 1131 const char *msgtype) in wpa_ft_rrb_seq_accept() argument 1140 RRB_GET_AUTH(FT_RRB_SEQ, seq, msgtype, sizeof(*msg_both)); in wpa_ft_rrb_seq_accept() 3978 const char *msgtype = "pull request"; in wpa_ft_rrb_rx_pull() local 3996 RRB_GET_AUTH(FT_RRB_R0KH_ID, r0kh_id, msgtype, -1); in wpa_ft_rrb_rx_pull() 4004 RRB_GET_AUTH(FT_RRB_R1KH_ID, r1kh_id, msgtype, FT_R1KH_ID_LEN); in wpa_ft_rrb_rx_pull() 4025 auth, auth_len, msgtype, no_defer); in wpa_ft_rrb_rx_pull() [all …]
|
/external/kernel-headers/original/uapi/scsi/ |
D | scsi_netlink.h | 32 __u16 msgtype; member 104 (hdr)->msgtype = mtype; \
|
/external/tcpdump/ |
D | print-dhcp6.c | 103 nd_uint8_t msgtype; member 863 uint8_t msgtype; in dhcp6_print() local 878 msgtype = GET_U_1(dh6->dh6_msgtypexid.msgtype); in dhcp6_print() 879 name = tok2str(dh6_msgtype_str, "msgtype-%u", msgtype); in dhcp6_print() 889 if (msgtype != DH6_RELAY_FORW && msgtype != DH6_RELAY_REPLY) { in dhcp6_print()
|
D | print-fr.c | 817 u_int msgtype; in q933_print() local 868 msgtype = GET_U_1(p); in q933_print() 946 "unknown message", msgtype), in q933_print() 947 msgtype, in q933_print() 952 "unknown message 0x%02x", msgtype)); in q933_print()
|
/external/toybox/toys/pending/ |
D | dhcp6.c | 98 uint8_t msgtype, transaction_id[3], options[524]; member 283 mesg.msgtype = type; in send_msg() 302 uint8_t *get_msg_ptr(uint8_t *data, int data_length, int msgtype) in get_msg_ptr() argument 307 if (type == msgtype) return data; in get_msg_ptr() 309 while (type != msgtype) { in get_msg_ptr() 315 if (type == msgtype) return data; in get_msg_ptr() 620 if (mymsg->dhcp6.msgtype == DHCP6ADVERTISE ) { in dhcp6_main() 641 if (mymsg->dhcp6.msgtype == DHCP6REPLY) { in dhcp6_main()
|
D | dhcpd.c | 148 char msgtype, transaction_id[3], options[524]; member 950 if (gstate.rcvd.rcvd_pkt6.msgtype < 1) { in read_packet6() 1009 gstate.send.send_pkt6.msgtype = opt; in prepare_send_pkt6() 1588 char *optptr, msgtype = 0, *hstname = 0, transactionid[3] = {0}; in dhcpd_main() local 1657 msgtype = 0; in dhcpd_main() 1718 memcpy(&gstate.rqcode, &gstate.rcvd.rcvd_pkt6.msgtype, sizeof(uint8_t)); in dhcpd_main() 1979 msgtype = DHCPOFFER; in dhcpd_main() 1991 msgtype = DHCPNAK; in dhcpd_main() 1992 optptr = set_optval(optptr, DHCP_OPT_MESSAGE_TYPE, &msgtype, 1); in dhcpd_main() 1999 optptr = set_optval(optptr, DHCP_OPT_MESSAGE_TYPE, &msgtype, 1); in dhcpd_main() [all …]
|
D | dhcp.c | 986 static int dhcpc_sendmsg(int msgtype) in dhcpc_sendmsg() argument 1004 pend = dhcpc_addmsgtype(pend, msgtype); in dhcpc_sendmsg() 1008 switch (msgtype) { in dhcpc_sendmsg()
|
/external/scapy/scapy/layers/tls/ |
D | extensions.py | 834 cls = _tls_ext_keyshare_hrr_cls.get(pkt.msgtype, TLS_Ext_Unknown) # noqa: E501 836 cls = _tls_ext_keyshare_cls.get(pkt.msgtype, TLS_Ext_Unknown) # noqa: E501 839 cls = _tls_ext_presharedkey_cls.get(pkt.msgtype, TLS_Ext_Unknown) # noqa: E501 841 cls = _tls_ext_supported_version_cls.get(pkt.msgtype, TLS_Ext_Unknown) # noqa: E501 843 cls = _tls_ext_early_data_cls.get(pkt.msgtype, TLS_Ext_Unknown)
|
D | record_sslv2.py | 39 msgtype = orb(m[0]) 40 cls = _sslv2_handshake_cls.get(msgtype, Raw)
|
D | record.py | 87 msgtype = orb(m[0]) 98 cls = _tls13_handshake_cls.get(msgtype, Raw) 100 cls = _tls_handshake_cls.get(msgtype, Raw)
|
/external/scapy/test/scapy/layers/tls/ |
D | sslv2.uts | 50 assert ch.msgtype == 1 62 assert sh.msgtype == 4 97 assert mk.msgtype == 2 126 assert sv.msgtype == 5 133 assert cf.msgtype == 3 140 assert rc.msgtype == 7 148 assert cc.msgtype == 8 162 assert sf.msgtype == 6 256 ch_pkt.msgtype = 'client_hello'
|
D | tls13.uts | 113 assert ch.msgtype == 1 235 assert t.msg[0].msgtype == 1 368 assert m[0].msgtype == 8 387 assert m[1].msgtype == 11 416 assert m[2].msgtype == 15 432 assert m[3].msgtype == 20 566 assert m.msgtype == 4 712 assert t.msg[0].msgtype == 1 768 assert t.msg[0].msgtype == 2 834 assert t.msg[0].msgtype == 1
|
D | tls.uts | 803 assert ch.msgtype == 1 950 ccs.msgtype == 1 972 assert tick.msgtype == 4 1267 ch.msgtype = 'client_hello' 1660 assert packets[8].getlayer(TLS, 3).msg[0].msgtype == 20 1662 assert packets[10].getlayer(TLS, 3).msg[0].msgtype == 20
|
/external/scapy/test/scapy/layers/ |
D | dhcp6.uts | 512 a.optcode == 19 and a.optlen == 1 and a.msgtype == 11 515 raw(DHCP6OptReconfMsg(optlen=4, msgtype=5)) == b'\x00\x13\x00\x04\x05' 519 a.optcode == 19 and a.optlen == 4 and a.msgtype == 5 1322 a.msgtype == 1 and a.trid == 0 1376 a.msgtype == 3 and a.trid == 0 1392 a.msgtype == 4 and a.trid == 0 1408 a.msgtype == 5 and a.trid == 0 1424 a.msgtype == 6 and a.trid == 0 1440 a.msgtype == 7 and a.trid == 0 1461 a.msgtype == 8 and a.trid == 0 [all …]
|
/external/ethtool/shell-completion/bash/ |
D | ethtool | 159 # Unsigned integer or msgtype 198 local msgtype 199 for msgtype in "${!msgtypes[@]}"; do 200 if [ "${msgtypes[$msgtype]}" = notseen ]; then 201 comp_words+=( "$msgtype" )
|
/external/scapy/test/ |
D | answering_machines.uts | 209 req = IPv6(dst="::1")/UDP()/DHCP6(msgtype=1)/DHCP6OptClientId(duid=DUID_LLT()) 220 req = IPv6(dst="::1")/UDP()/DHCP6(msgtype=11)/DHCP6OptClientId(duid=DUID_LLT()) 230 req = IPv6(dst="::1")/UDP()/DHCP6(msgtype=3)/DHCP6OptClientId(duid=DUID_LLT())/DHCP6OptServerId(dui…
|
/external/autotest/server/ |
D | server_job.py | 1178 timestamp, msgtype, msg = line.split('\t', 2) 1181 if self.warning_manager.is_valid(timestamp, msgtype):
|