| /freebsd-src/contrib/wpa/src/wps/ |
| H A D | wps.c | 111 } else if (attr.request_type == NULL) { in wps_init() 117 *attr.request_type); in wps_init() 118 data->request_type = *attr.request_type; in wps_init()
|
| H A D | wps_validate.c | 59 static int wps_validate_request_type(const u8 *request_type, int mandatory) in wps_validate_request_type() argument 61 if (request_type == NULL) { in wps_validate_request_type() 69 if (*request_type > 0x03) { in wps_validate_request_type() 71 "attribute value 0x%x", *request_type); in wps_validate_request_type() 1198 wps_validate_request_type(attr.request_type, 1) || in wps_validate_probe_req() 1245 wps_validate_request_type(attr.request_type, 1) || in wps_validate_assoc_req()
|
| H A D | wps_attr_parse.h | 51 const u8 *request_type; /* 1 octet */ member
|
| H A D | wps_i.h | 82 * request_type - Request Type attribute from (Re)AssocReq 84 u8 request_type; member
|
| H A D | wps_attr_parse.c | 449 attr->request_type = pos; in wps_set_attr()
|
| H A D | wps.h | 344 * @request_type: Request Type 349 u16 dev_password_id, u8 request_type,
|
| H A D | wps_registrar.c | 161 u16 dev_password_id, u8 request_type, 1173 attr.primary_dev_type && attr.request_type && !p2p_wildcard) { in wps_registrar_probe_req_rx() 1186 *attr.request_type, dev_name); in wps_registrar_probe_req_rx()
|
| /freebsd-src/contrib/wpa/wpa_supplicant/ |
| H A D | robust_av.c | 32 wpabuf_put_u8(buf, robust_av->request_type); in wpas_populate_mscs_descriptor_ie() 37 if (robust_av->request_type != SCS_REQ_REMOVE) { in wpas_populate_mscs_descriptor_ie() 126 wpabuf_put_u8(buf, desc_elem->request_type); in wpas_populate_scs_descriptor_ie() 127 if (desc_elem->request_type == SCS_REQ_REMOVE) in wpas_populate_scs_descriptor_ie() 282 wpa_s->robust_av.request_type != SCS_REQ_ADD) { in allocate_scs_buf() 428 if (desc_elem->request_type == SCS_REQ_REMOVE) in wpas_send_scs_req() 589 if (desc_elem->request_type != SCS_REQ_ADD) in wpas_handle_assoc_resp_qos_mgmt() 657 if (desc_data->request_type == SCS_REQ_REMOVE || in wpas_handle_robust_av_scs_recv_action() 694 robust_av.request_type = *pos++; in wpas_clear_active_scs_ids() 696 switch (robust_av.request_type) { [all...] |
| H A D | wpa_supplicant_i.h | 522 enum scs_request_type request_type; 636 enum scs_request_type request_type; 519 enum scs_request_type request_type; global() member 654 enum scs_request_type request_type; global() member
|
| H A D | ctrl_iface.c | 11110 robust_av->request_type = SCS_REQ_ADD; in set_type10_frame_classifier() 11112 robust_av->request_type = SCS_REQ_REMOVE; in set_type10_frame_classifier() 11116 robust_av->request_type = SCS_REQ_CHANGE; in set_type10_frame_classifier() 11669 desc_elem.request_type = SCS_REQ_ADD; in wpa_supplicant_ctrl_iface_process() 11676 desc_elem.request_type = SCS_REQ_REMOVE; in wpa_supplicant_ctrl_iface_process() 11684 desc_elem.request_type = SCS_REQ_CHANGE; in wpa_supplicant_ctrl_iface_process()
|
| /freebsd-src/crypto/openssh/ |
| H A D | clientloop.c | 180 const char *request_type; member 836 cr->request_type, c->self); in client_status_confirm() 840 "%s request failed\r\n", cr->request_type); in client_status_confirm() 844 cr->request_type, c->self); in client_status_confirm() 855 cr->request_type); in client_status_confirm() 890 cr->request_type = request; in client_expect_confirm() 1705 client_request_forwarded_tcpip(struct ssh *ssh, const char *request_type, in client_request_forwarded_tcpip() argument 1743 (r = sshbuf_put_cstring(b, request_type)) != 0 || in client_request_forwarded_tcpip() 1766 const char *request_type, int rchan) in client_request_forwarded_streamlocal() argument 1787 client_request_x11(struct ssh *ssh, const char *request_type, int rchan) in client_request_x11() argument [all …]
|
| /freebsd-src/sys/dev/xen/xenstore/ |
| H A D | xenstore.c | 801 * \param request_type The type of message to send. 814 xs_talkv(struct xs_transaction t, enum xsd_sockmsg_type request_type, in xs_talkv() argument 824 msg.type = request_type; in xs_talkv() 858 KASSERT(msg.type == request_type, ("bad xenstore message type")); in xs_talkv() 873 * \param request_type The type of message to send. 885 xs_single(struct xs_transaction t, enum xsd_sockmsg_type request_type, in xs_single() argument 893 return (xs_talkv(t, request_type, &iovec, 1, len, result)); in xs_single()
|
| /freebsd-src/contrib/libpcap/ |
| H A D | pcap-rpcap.c | 175 static int rpcap_check_msg_type(PCAP_SOCKET sock, SSL *, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf); 176 static int rpcap_process_msg_header(PCAP_SOCKET sock, SSL *, uint8 ver, uint8 request_type, struct rpcap_header *header, char *errbuf); 3357 static int rpcap_check_msg_type(PCAP_SOCKET sock, SSL *ssl, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf) in rpcap_check_msg_type() 3382 if (header->type != (request_type | RPCAP_MSG_IS_REPLY)) in rpcap_check_msg_type() 3397 request_type_string = rpcap_msg_type_string(request_type); in rpcap_check_msg_type() 3406 request_type); in rpcap_check_msg_type() 3427 static int rpcap_process_msg_header(PCAP_SOCKET sock, SSL *ssl, uint8 expected_ver, uint8 request_type, struct rpcap_header *header, char *errbuf) in rpcap_process_msg_header() 3446 return rpcap_check_msg_type(sock, ssl, request_type, header, 3354 rpcap_check_msg_type(SOCKET sock,SSL * ssl,uint8 request_type,struct rpcap_header * header,uint16 * errcode,char * errbuf) rpcap_check_msg_type() argument 3424 rpcap_process_msg_header(SOCKET sock,SSL * ssl,uint8 expected_ver,uint8 request_type,struct rpcap_header * header,char * errbuf) rpcap_process_msg_header() argument
|
| /freebsd-src/contrib/libevent/ |
| H A D | evdns.c | 174 u8 request_type; /* TYPE_PTR or TYPE_A or TYPE_AAAA */ member 780 u8 request_type; member 794 switch (cb->request_type) { in reply_run_callback() 846 d->request_type = req->request_type; in reply_schedule_callback() 950 req->request_type != TYPE_PTR) { in reply_handle() 1081 reply.type = req->request_type; in reply_parse() 1127 if (req->request_type != TYPE_A) { in reply_parse() 1145 if (req->request_type != TYPE_PTR) { in reply_parse() 1165 if (req->request_type != TYPE_AAAA) { in reply_parse() 2840 req->request_type = type; in request_new() [all …]
|
| /freebsd-src/contrib/ntp/sntp/libevent/ |
| H A D | evdns.c | 174 u8 request_type; /* TYPE_PTR or TYPE_A or TYPE_AAAA */ member 780 u8 request_type; member 794 switch (cb->request_type) { in reply_run_callback() 846 d->request_type = req->request_type; in reply_schedule_callback() 950 req->request_type != TYPE_PTR) { in reply_handle() 1081 reply.type = req->request_type; in reply_parse() 1127 if (req->request_type != TYPE_A) { in reply_parse() 1145 if (req->request_type != TYPE_PTR) { in reply_parse() 1165 if (req->request_type != TYPE_AAAA) { in reply_parse() 2840 req->request_type = type; in request_new() [all …]
|
| /freebsd-src/contrib/wpa/src/ap/ |
| H A D | wps_hostapd.c | 255 u16 dev_password_id, u8 request_type, in hostapd_wps_enrollee_seen_cb() argument 270 config_methods, dev_password_id, request_type, dev_name); in hostapd_wps_enrollee_seen_cb()
|
| /freebsd-src/sys/contrib/dev/athk/ath10k/ |
| H A D | wmi-tlv.h | 2205 __le32 request_type; member
|
| H A D | wmi-tlv.c | 3255 cmd->request_type = __cpu_to_le32(type); in ath10k_wmi_tlv_op_gen_request_peer_stats_info()
|