/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | robust_av.c | 32 wpabuf_put_u8(buf, robust_av->request_type); in wpas_populate_mscs_descriptor_ie() 37 if (robust_av->request_type != SCS_REQ_REMOVE) { in wpas_populate_mscs_descriptor_ie() 126 wpabuf_put_u8(buf, desc_elem->request_type); in wpas_populate_scs_descriptor_ie() 127 if (desc_elem->request_type == SCS_REQ_REMOVE) in wpas_populate_scs_descriptor_ie() 282 wpa_s->robust_av.request_type != SCS_REQ_ADD) { in wpas_send_mscs_req() 428 if (desc_elem->request_type == SCS_REQ_REMOVE) in allocate_scs_buf() 589 if (desc_elem->request_type != SCS_REQ_ADD) in wpas_send_scs_req() 657 if (desc_data->request_type == SCS_REQ_REMOVE || in free_up_scs_desc() 694 robust_av.request_type = *pos++; in wpas_parse_mscs_resp() 696 switch (robust_av.request_type) { in wpas_parse_mscs_resp() [all …]
|
H A D | wpa_supplicant_i.h | 522 enum scs_request_type request_type; member 636 enum scs_request_type request_type; member
|
H A D | ctrl_iface.c | 11110 robust_av->request_type = SCS_REQ_ADD; in wpas_ctrl_iface_configure_mscs() 11112 robust_av->request_type = SCS_REQ_REMOVE; in wpas_ctrl_iface_configure_mscs() 11116 robust_av->request_type = SCS_REQ_CHANGE; in wpas_ctrl_iface_configure_mscs() 11669 desc_elem.request_type = SCS_REQ_ADD; in wpas_ctrl_iface_configure_scs() 11676 desc_elem.request_type = SCS_REQ_REMOVE; in wpas_ctrl_iface_configure_scs() 11684 desc_elem.request_type = SCS_REQ_CHANGE; in wpas_ctrl_iface_configure_scs()
|
/freebsd/contrib/wpa/src/wps/ |
H A D | wps.c | 111 } else if (attr.request_type == NULL) { in wps_init() 117 *attr.request_type); in wps_init() 118 data->request_type = *attr.request_type; in wps_init()
|
H A D | wps_validate.c | 59 static int wps_validate_request_type(const u8 *request_type, int mandatory) in wps_validate_request_type() argument 61 if (request_type == NULL) { in wps_validate_request_type() 69 if (*request_type > 0x03) { in wps_validate_request_type() 71 "attribute value 0x%x", *request_type); in wps_validate_request_type() 1198 wps_validate_request_type(attr.request_type, 1) || in wps_validate_probe_req() 1245 wps_validate_request_type(attr.request_type, 1) || in wps_validate_assoc_req()
|
H A D | wps_attr_parse.h | 51 const u8 *request_type; /* 1 octet */ member
|
H A D | wps_i.h | 84 u8 request_type; member
|
H A D | wps_attr_parse.c | 449 attr->request_type = pos; in wps_set_attr()
|
H A D | wps.h | 349 u16 dev_password_id, u8 request_type,
|
H A D | wps_registrar.c | 161 u16 dev_password_id, u8 request_type, 1173 attr.primary_dev_type && attr.request_type && !p2p_wildcard) { in wps_registrar_probe_req_rx() 1186 *attr.request_type, dev_name); in wps_registrar_probe_req_rx()
|
/freebsd/crypto/openssh/ |
H A D | clientloop.c | 180 const char *request_type; member 836 cr->request_type, c->self); in client_status_confirm() 840 "%s request failed\r\n", cr->request_type); in client_status_confirm() 844 cr->request_type, c->self); in client_status_confirm() 855 cr->request_type); in client_status_confirm() 890 cr->request_type = request; in client_expect_confirm() 1705 client_request_forwarded_tcpip(struct ssh *ssh, const char *request_type, in client_request_forwarded_tcpip() 1743 (r = sshbuf_put_cstring(b, request_type)) != 0 || in client_request_forwarded_tcpip() 1766 const char *request_type, int rchan) in client_request_forwarded_streamlocal() 1787 client_request_x11(struct ssh *ssh, const char *request_type, in in client_request_x11() 1704 client_request_forwarded_tcpip(struct ssh * ssh,const char * request_type,int rchan,u_int rwindow,u_int rmaxpack) client_request_forwarded_tcpip() argument 1765 client_request_forwarded_streamlocal(struct ssh * ssh,const char * request_type,int rchan) client_request_forwarded_streamlocal() argument 1786 client_request_x11(struct ssh * ssh,const char * request_type,int rchan) client_request_x11() argument 1824 client_request_agent(struct ssh * ssh,const char * request_type,int rchan) client_request_agent() argument [all...] |
/freebsd/sys/dev/xen/xenstore/ |
H A D | xenstore.c | 814 xs_talkv(struct xs_transaction t, enum xsd_sockmsg_type request_type, in xs_talkv() argument 824 msg.type = request_type; in xs_talkv() 858 KASSERT(msg.type == request_type, ("bad xenstore message type")); in xs_talkv() 885 xs_single(struct xs_transaction t, enum xsd_sockmsg_type request_type, in xs_single() argument 893 return (xs_talkv(t, request_type, &iovec, 1, len, result)); in xs_single()
|
/freebsd/contrib/libpcap/ |
H A D | pcap-rpcap.c | 175 static int rpcap_check_msg_type(PCAP_SOCKET sock, SSL *, uint8 request_type, struct rpcap_header *h… 176 static int rpcap_process_msg_header(PCAP_SOCKET sock, SSL *, uint8 ver, uint8 request_type, struct … 3357 static int rpcap_check_msg_type(PCAP_SOCKET sock, SSL *ssl, uint8 request_type, struct rpcap_header… in rpcap_check_msg_type() argument 3382 if (header->type != (request_type | RPCAP_MSG_IS_REPLY)) in rpcap_check_msg_type() 3397 request_type_string = rpcap_msg_type_string(request_type); in rpcap_check_msg_type() 3406 request_type); in rpcap_check_msg_type() 3427 …cess_msg_header(PCAP_SOCKET sock, SSL *ssl, uint8 expected_ver, uint8 request_type, struct rpcap_h… in rpcap_process_msg_header() argument 3446 return rpcap_check_msg_type(sock, ssl, request_type, header, in rpcap_process_msg_header()
|
/freebsd/contrib/ntp/sntp/libevent/ |
H A D | evdns.c | 174 u8 request_type; /* TYPE_PTR or TYPE_A or TYPE_AAAA */ member 780 u8 request_type; member 794 switch (cb->request_type) { in reply_run_callback() 846 d->request_type = req->request_type; in reply_schedule_callback() 950 req->request_type != TYPE_PTR) { in reply_handle() 1081 reply.type = req->request_type; in reply_parse() 1127 if (req->request_type != TYPE_A) { in reply_parse() 1145 if (req->request_type != TYPE_PTR) { in reply_parse() 1165 if (req->request_type != TYPE_AAAA) { in reply_parse() 2840 req->request_type = type; in request_new() [all …]
|
/freebsd/contrib/libevent/ |
H A D | evdns.c | 174 u8 request_type; /* TYPE_PTR or TYPE_A or TYPE_AAAA */ member 780 u8 request_type; member 794 switch (cb->request_type) { in reply_run_callback() 846 d->request_type = req->request_type; in reply_schedule_callback() 950 req->request_type != TYPE_PTR) { in reply_handle() 1081 reply.type = req->request_type; in reply_parse() 1127 if (req->request_type != TYPE_A) { in reply_parse() 1145 if (req->request_type != TYPE_PTR) { in reply_parse() 1165 if (req->request_type != TYPE_AAAA) { in reply_parse() 2840 req->request_type = type; in request_new() [all …]
|
/freebsd/contrib/wpa/src/ap/ |
H A D | wps_hostapd.c | 255 u16 dev_password_id, u8 request_type, in hostapd_wps_enrollee_seen_cb() argument 270 config_methods, dev_password_id, request_type, dev_name); in hostapd_wps_enrollee_seen_cb()
|
/freebsd/sys/contrib/dev/athk/ath10k/ |
H A D | wmi-tlv.h | 2205 __le32 request_type; member
|
H A D | wmi-tlv.c | 3255 cmd->request_type = __cpu_to_le32(type); in ath10k_wmi_tlv_op_gen_request_peer_stats_info()
|