| /src/external/bsd/libpcap/dist/ |
| pcap-util.c | 398 nflog_tlv_t *tlv; local 419 tlv = (nflog_tlv_t *) p; 422 tlv->tlv_type = SWAPSHORT(tlv->tlv_type); 423 tlv->tlv_length = SWAPSHORT(tlv->tlv_length); 425 /* Get the length of the TLV. */ 426 size = tlv->tlv_length; 430 /* Is the TLV's length less than the minimum? */ 436 /* Do we have enough data for the full TLV? * [all...] |
| /src/external/bsd/ppp/dist/pppd/plugins/pppol2tp/ |
| openl2tp.c | 121 struct openl2tp_event_tlv *tlv; local 140 tlv = (void *) &msg->msg_data[msg->msg_len]; 141 tlv->tlv_type = OPENL2TP_TLV_TYPE_TUNNEL_ID; 142 tlv->tlv_len = sizeof(tid); 143 memcpy(&tlv->tlv_value[0], &tid, tlv->tlv_len); 144 msg->msg_len += sizeof(*tlv) + ALIGN32(tlv->tlv_len); 146 tlv = (void *) &msg->msg_data[msg->msg_len]; 147 tlv->tlv_type = OPENL2TP_TLV_TYPE_SESSION_ID 182 struct openl2tp_event_tlv *tlv; local [all...] |
| /src/external/bsd/tcpdump/dist/ |
| print-nflog.c | 45 * Structure of an NFLOG header and TLV parts, as described at 50 * The TLV length and type are in host byte order. The value is either 64 nd_uint16_t tlv_length; /* tlv length */ 65 nd_uint16_t tlv_type; /* tlv type */ 89 * TLV types. 178 const nflog_tlv_t *tlv; local 180 /* We have some data. Do we have enough for the TLV header? */ 184 tlv = (const nflog_tlv_t *) p; 185 ND_TCHECK_SIZE(tlv); 186 size = GET_HE_U_2(tlv->tlv_length) [all...] |
| print-hncp.c | 275 const uint8_t *tlv, *value; local 282 tlv = cp + i; 283 type = GET_U_1(tlv); 284 optlen = GET_U_1(tlv + 1); 285 value = tlv + 2; 327 const u_char *tlv, *value; local 334 tlv = cp + i; 335 type = GET_BE_U_2(tlv); 336 optlen = GET_BE_U_2(tlv + 2); 337 value = tlv + 4 418 const uint8_t *tlv, *value; local [all...] |
| print-slow.c | 99 { SLOW_OAM_INFO_TYPE_END_OF_TLV, "End of TLV marker" }, 142 { SLOW_OAM_LINK_EVENT_END_OF_TLV, "End of TLV marker" }, 362 /* is the packet big enough to include the tlv header ? */ 365 /* did we capture enough for fully decoding the tlv header ? */ 370 ND_PRINT("\n\t%s TLV (0x%02x), length %u", 379 * This TLV has a length of zero, and means there are no 392 /* is the packet big enough to include the tlv ? */ 395 /* did we capture enough for fully decoding the tlv ? */ 513 } tlv; local 545 * As IEEE Std 802.3-2015 says for the End of TLV Marker [all...] |
| print-forces.c | 188 {F_LFB_RSVD, "Invalid TLV"}, 195 /* https://www.iana.org/assignments/forces/forces.xhtml#oper-tlv-types */ 351 {F_TLV_RSVD, "Invalid TLV"}, 352 {F_TLV_REDR, "REDIRECT TLV"}, 353 {F_TLV_ASRS, "ASResult TLV"}, 354 {F_TLV_ASRT, "ASTreason TLV"}, 355 {F_TLV_LFBS, "LFBselect TLV"}, 356 {F_TLV_PDAT, "PATH-DATA TLV"}, 357 {F_TLV_KEYI, "KEYINFO TLV"}, 358 {F_TLV_FULD, "FULLDATA TLV"}, 656 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; local 696 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; local 771 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; local 800 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; local 1406 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; local [all...] |
| print-lldp.c | 43 * TLV type codes 1182 uint16_t tlv; local 1204 while (tlen >= sizeof(tlv)) { 1206 ND_TCHECK_LEN(tptr, sizeof(tlv)); 1208 tlv = GET_BE_U_2(tptr); 1210 tlv_type = LLDP_EXTRACT_TYPE(tlv); 1211 tlv_len = LLDP_EXTRACT_LEN(tlv); 1214 tlen -= sizeof(tlv); 1215 tptr += sizeof(tlv); 1227 /* decode every tlv */ 1454 uint16_t tlv, cap, ena_cap; local [all...] |
| /src/sys/net/lagg/ |
| if_lagg_lacp.h | 69 struct tlv { struct
|
| /src/usr.sbin/ldpd/ |
| tlv.h | 1 /* $NetBSD: tlv.h,v 1.5 2022/02/07 02:35:09 rillig Exp $ */ 35 /* TLV messages */ 60 /* General TLV structure */ 61 struct tlv { struct 67 /* Common Hello TLV structure */ 75 /* Hello TLV structure */ 84 /* Transport address TLV */ 98 /* Initialization TLV structure */ 116 /* Keepalive TLV */ 123 /* Notification TLV */ [all...] |
| /src/sys/netinet/ |
| sctp_asconf.c | 151 uint8_t *tlv; local 184 tlv = (uint8_t *)(error + 1); 185 memcpy(tlv, error_tlv, tlv_length); 1231 /* invalid included TLV length */ 1234 printf("asconf_process_error: included TLV too long\n");
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_fast.c | 542 wpa_printf(MSG_DEBUG, "EAP-FAST: Add %sResult TLV(status=%d)", 565 wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)"); 588 "Payload TLV (len=%lu)", 596 "EAP Payload TLV"); 619 wpa_printf(MSG_DEBUG, "EAP-FAST: Crypto-Binding TLV: Version %d " 631 "Crypto-Binding TLV: Version %d " 658 wpa_printf(MSG_DEBUG, "EAP-FAST: Reply Crypto-Binding TLV: Version %d " 783 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound " 891 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV overrun " 905 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV does not include 1195 struct eap_fast_tlv_parse tlv; local 1412 u8 *tlv; local [all...] |
| eap_teap.c | 507 "EAP-TEAP: Add NAK TLV (Vendor-Id %u NAK-Type %u)", 531 wpa_printf(MSG_DEBUG, "EAP-TEAP: Add PAC TLV (ack)"); 546 struct wpabuf *tlv; local 548 tlv = eap_teap_tlv_identity_type(sm->use_machine_cred ? 551 return wpabuf_concat(msg, tlv); 566 "EAP-TEAP: too short EAP Payload TLV (len=%lu)", 574 "EAP-TEAP: EAP packet overflow in EAP Payload TLV"); 635 /* Assume this succeeds so that Result TLV(Success) from the server can 653 "EAP-TEAP: Crypto-Binding TLV: Version %u Received Version %u Flags %u Sub-Type %u", 667 "EAP-TEAP: Invalid Version/Flags/Sub-Type in Crypto-Binding TLV: Version %u Received Version %u Flags %u Sub-Type %u" 1251 struct eap_teap_tlv_parse tlv; local 1587 u8 *tlv; local [all...] |
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_fast.c | 25 /* Private PAC-Opaque TLV types */ 114 /* TODO: send Result TLV(FAILURE) */ 606 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Intermediate-Result TLV " 617 /* Result TLV */ 618 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Result TLV " 627 /* Crypto-Binding TLV */ 653 * Compound-MAC = HMAC-SHA1( CMK, Crypto-Binding TLV ) 660 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Crypto-Binding TLV: Version %d " 751 /* Result TLV */ 752 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Result TLV (status=SUCCESS)") 1242 struct eap_tlv_pac_type_tlv *tlv; local 1259 struct eap_fast_tlv_parse tlv; local [all...] |
| eap_server_teap.c | 23 /* Private PAC-Opaque TLV types */ 487 /* RFC 7170, Section 4.2.2: Authority-ID TLV */ 640 "EAP-TEAP: Add Intermediate-Result TLV (status=SUCCESS)"); 649 /* Result TLV */ 651 "EAP-TEAP: Add Result TLV (status=SUCCESS)"); 659 /* Crypto-Binding TLV */ 667 * Crypto-Binding TLV is used with Basic-Password-Auth */ 702 "EAP-TEAP: Add Crypto-Binding TLV: Version %u Received Version %u Flags %u Sub-Type %u", 800 /* Result TLV */ 801 wpa_printf(MSG_DEBUG, "EAP-TEAP: Add Result TLV (status=SUCCESS)") 1518 struct teap_attr_pac_type *tlv; local 1535 struct eap_teap_tlv_parse tlv; local [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| crypto_module_tests.c | 1074 u8 tlv[] = { local 1143 os_memset(tlv + sizeof(tlv) - 20, 0, 20); 1144 if (hmac_sha1(cmk, 20, tlv, sizeof(tlv), tlv + sizeof(tlv) - 20) < 0 || 1145 os_memcmp(tlv + sizeof(tlv) - 20, compound_mac,
|
| /src/external/bsd/wpa/dist/wpa_supplicant/dbus/ |
| dbus_new_handlers_p2p.c | 2896 struct wpabuf *tlv = NULL; local 2924 } else if (os_strcmp(entry.key, "tlv") == 0) { 2928 wpabuf_free(tlv); 2929 tlv = wpabuf_alloc_copy(entry.bytearray_value, 2953 if (tlv == NULL) 2955 ref = wpas_p2p_sd_request(wpa_s, addr, tlv); 2967 wpabuf_free(tlv); 2987 struct wpabuf *tlv = NULL; local 3015 wpabuf_free(tlv); 3016 tlv = wpabuf_alloc_copy(entry.bytearray_value [all...] |
| /src/sys/dev/pci/ |
| if_iwn.c | 5883 * Extract text and data sections from a TLV firmware image. 5890 const struct iwn_fw_tlv *tlv; local 5923 while (ptr + sizeof (*tlv) <= end) { 5924 tlv = (const struct iwn_fw_tlv *)ptr; 5925 len = le32toh(tlv->len); 5927 ptr += sizeof (*tlv); 5934 if (tlv->alt != 0 && tlv->alt != htole16(alt)) 5937 switch (le16toh(tlv->type)) { 5961 "TLV type %d has invalid size %u\n" [all...] |
| if_iwm.c | 752 struct iwm_ucode_tlv tlv; local 804 while (len >= sizeof(tlv)) { 808 memcpy(&tlv, data, sizeof(tlv)); 809 tlv_len = le32toh(tlv.length); 810 tlv_type = le32toh(tlv.type); 812 len -= sizeof(tlv); 813 data += sizeof(tlv); 7435 * Enable LAR only if it is supported by the FW (TLV) &&
|