Lines Matching +full:0 +full:x0300
36 #define RTL_PROTOCOL_OFFSET 0 /* Protocol and possibly other data - 1 byte */
38 #define RTL_PROTOCOL_RRCP 0x01 /* RRCP */
39 #define RTL_PROTOCOL_REP 0x02 /* REP */
40 #define RTL_PROTOCOL_RLDP 0x03 /* RLDP */
41 #define RTL_PROTOCOL_RLDP2 0x23 /* also RLDP */
42 #define RTL_PROTOCOL_XXX_DSA 0x04 /* DSA protocol for some chip(s) */
54 #define RTL_PROTOCOL_8306_DSA 0x90 /* RTL8306 DSA protocol */
55 #define RTL_PROTOCOL_8366RB_DSA 0xA0 /* RTL8366RB DSA protocol */
59 #define RRCP_OPCODE_MASK 0x7F /* 0x00 = hello, 0x01 = get, 0x02 = set */
60 #define RRCP_ISREPLY 0x80 /* 0 = request to switch, 0x80 = reply from switch */
62 #define RRCP_OPCODE_HELLO 0x00
63 #define RRCP_OPCODE_GET_CONFIGURATION 0x01
64 #define RRCP_OPCODE_SET_CONFIGURATION 0x02
66 #define RRCP_AUTHKEY_OFFSET 2 /* authorization key - 2 bytes, 0x2379 by default */
85 { 0, NULL }
115 tok2str(opcode_values,"unknown opcode (0x%02x)",rrcp_opcode)); in rrcp_print()
118 ND_PRINT(" addr=0x%04x, data=0x%08x", in rrcp_print()
122 ND_PRINT(", auth=0x%04x", in rrcp_print()
134 ND_PRINT(", cookie=0x%08x%08x ", in rrcp_print()
169 * big-endian) field containing the value 0x0300, followed by what is
170 * presumably a 16-bit big-endian field the upper 12 bits of which are 0
180 * after 0x0300 are zero.
188 * except that the first value is 0x2300, not 0x0300.
191 * the packet is 0x23, and that's followed by 6 unknown octets (a MAC
196 * the Ethernet header there), followed by unknown stuff (0x0d followed by
197 * zeroes for all such packets in one capture, 0x01 followed by zeroes for
198 * all such packets in another capture, 0x07 followed by 0x20's for all
201 * similar to the last of those, but with 0x02 instead of 0x07. Or is that
240 else if ((rtl_proto & 0xF0) == RTL_PROTOCOL_8306_DSA) in rtl_print()
242 else if ((rtl_proto & 0xF0) == RTL_PROTOCOL_8366RB_DSA) in rtl_print()
245 ND_PRINT("Realtek unknown type 0x%02x", rtl_proto); in rtl_print()