HomeSort by: relevance | last modified time | path
    Searched defs:tlv (Results 1 - 18 of 18) sorted by relevancy

  /src/external/bsd/libpcap/dist/
pcap-util.c 398 nflog_tlv_t *tlv; local
419 tlv = (nflog_tlv_t *) p;
422 tlv->tlv_type = SWAPSHORT(tlv->tlv_type);
423 tlv->tlv_length = SWAPSHORT(tlv->tlv_length);
425 /* Get the length of the TLV. */
426 size = tlv->tlv_length;
430 /* Is the TLV's length less than the minimum? */
436 /* Do we have enough data for the full TLV? *
    [all...]
  /src/external/bsd/ppp/dist/pppd/plugins/pppol2tp/
openl2tp.c 121 struct openl2tp_event_tlv *tlv; local
140 tlv = (void *) &msg->msg_data[msg->msg_len];
141 tlv->tlv_type = OPENL2TP_TLV_TYPE_TUNNEL_ID;
142 tlv->tlv_len = sizeof(tid);
143 memcpy(&tlv->tlv_value[0], &tid, tlv->tlv_len);
144 msg->msg_len += sizeof(*tlv) + ALIGN32(tlv->tlv_len);
146 tlv = (void *) &msg->msg_data[msg->msg_len];
147 tlv->tlv_type = OPENL2TP_TLV_TYPE_SESSION_ID
182 struct openl2tp_event_tlv *tlv; local
    [all...]
  /src/external/bsd/tcpdump/dist/
print-nflog.c 45 * Structure of an NFLOG header and TLV parts, as described at
50 * The TLV length and type are in host byte order. The value is either
64 nd_uint16_t tlv_length; /* tlv length */
65 nd_uint16_t tlv_type; /* tlv type */
89 * TLV types.
178 const nflog_tlv_t *tlv; local
180 /* We have some data. Do we have enough for the TLV header? */
184 tlv = (const nflog_tlv_t *) p;
185 ND_TCHECK_SIZE(tlv);
186 size = GET_HE_U_2(tlv->tlv_length)
    [all...]
print-hncp.c 275 const uint8_t *tlv, *value; local
282 tlv = cp + i;
283 type = GET_U_1(tlv);
284 optlen = GET_U_1(tlv + 1);
285 value = tlv + 2;
327 const u_char *tlv, *value; local
334 tlv = cp + i;
335 type = GET_BE_U_2(tlv);
336 optlen = GET_BE_U_2(tlv + 2);
337 value = tlv + 4
418 const uint8_t *tlv, *value; local
    [all...]
print-slow.c 99 { SLOW_OAM_INFO_TYPE_END_OF_TLV, "End of TLV marker" },
142 { SLOW_OAM_LINK_EVENT_END_OF_TLV, "End of TLV marker" },
362 /* is the packet big enough to include the tlv header ? */
365 /* did we capture enough for fully decoding the tlv header ? */
370 ND_PRINT("\n\t%s TLV (0x%02x), length %u",
379 * This TLV has a length of zero, and means there are no
392 /* is the packet big enough to include the tlv ? */
395 /* did we capture enough for fully decoding the tlv ? */
513 } tlv; local
545 * As IEEE Std 802.3-2015 says for the End of TLV Marker
    [all...]
print-forces.c 188 {F_LFB_RSVD, "Invalid TLV"},
195 /* https://www.iana.org/assignments/forces/forces.xhtml#oper-tlv-types */
351 {F_TLV_RSVD, "Invalid TLV"},
352 {F_TLV_REDR, "REDIRECT TLV"},
353 {F_TLV_ASRS, "ASResult TLV"},
354 {F_TLV_ASRT, "ASTreason TLV"},
355 {F_TLV_LFBS, "LFBselect TLV"},
356 {F_TLV_PDAT, "PATH-DATA TLV"},
357 {F_TLV_KEYI, "KEYINFO TLV"},
358 {F_TLV_FULD, "FULLDATA TLV"},
656 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; local
696 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; local
771 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; local
800 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; local
1406 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; local
    [all...]
print-lldp.c 43 * TLV type codes
1182 uint16_t tlv; local
1204 while (tlen >= sizeof(tlv)) {
1206 ND_TCHECK_LEN(tptr, sizeof(tlv));
1208 tlv = GET_BE_U_2(tptr);
1210 tlv_type = LLDP_EXTRACT_TYPE(tlv);
1211 tlv_len = LLDP_EXTRACT_LEN(tlv);
1214 tlen -= sizeof(tlv);
1215 tptr += sizeof(tlv);
1227 /* decode every tlv */
1454 uint16_t tlv, cap, ena_cap; local
    [all...]
  /src/sys/net/lagg/
if_lagg_lacp.h 69 struct tlv { struct
  /src/usr.sbin/ldpd/
tlv.h 1 /* $NetBSD: tlv.h,v 1.5 2022/02/07 02:35:09 rillig Exp $ */
35 /* TLV messages */
60 /* General TLV structure */
61 struct tlv { struct
67 /* Common Hello TLV structure */
75 /* Hello TLV structure */
84 /* Transport address TLV */
98 /* Initialization TLV structure */
116 /* Keepalive TLV */
123 /* Notification TLV */
    [all...]
  /src/sys/netinet/
sctp_asconf.c 151 uint8_t *tlv; local
184 tlv = (uint8_t *)(error + 1);
185 memcpy(tlv, error_tlv, tlv_length);
1231 /* invalid included TLV length */
1234 printf("asconf_process_error: included TLV too long\n");
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_fast.c 542 wpa_printf(MSG_DEBUG, "EAP-FAST: Add %sResult TLV(status=%d)",
565 wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)");
588 "Payload TLV (len=%lu)",
596 "EAP Payload TLV");
619 wpa_printf(MSG_DEBUG, "EAP-FAST: Crypto-Binding TLV: Version %d "
631 "Crypto-Binding TLV: Version %d "
658 wpa_printf(MSG_DEBUG, "EAP-FAST: Reply Crypto-Binding TLV: Version %d "
783 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound "
891 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV overrun "
905 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV does not include
1195 struct eap_fast_tlv_parse tlv; local
1412 u8 *tlv; local
    [all...]
eap_teap.c 507 "EAP-TEAP: Add NAK TLV (Vendor-Id %u NAK-Type %u)",
531 wpa_printf(MSG_DEBUG, "EAP-TEAP: Add PAC TLV (ack)");
546 struct wpabuf *tlv; local
548 tlv = eap_teap_tlv_identity_type(sm->use_machine_cred ?
551 return wpabuf_concat(msg, tlv);
566 "EAP-TEAP: too short EAP Payload TLV (len=%lu)",
574 "EAP-TEAP: EAP packet overflow in EAP Payload TLV");
635 /* Assume this succeeds so that Result TLV(Success) from the server can
653 "EAP-TEAP: Crypto-Binding TLV: Version %u Received Version %u Flags %u Sub-Type %u",
667 "EAP-TEAP: Invalid Version/Flags/Sub-Type in Crypto-Binding TLV: Version %u Received Version %u Flags %u Sub-Type %u"
1251 struct eap_teap_tlv_parse tlv; local
1587 u8 *tlv; local
    [all...]
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_fast.c 25 /* Private PAC-Opaque TLV types */
114 /* TODO: send Result TLV(FAILURE) */
606 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Intermediate-Result TLV "
617 /* Result TLV */
618 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Result TLV "
627 /* Crypto-Binding TLV */
653 * Compound-MAC = HMAC-SHA1( CMK, Crypto-Binding TLV )
660 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Crypto-Binding TLV: Version %d "
751 /* Result TLV */
752 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Result TLV (status=SUCCESS)")
1242 struct eap_tlv_pac_type_tlv *tlv; local
1259 struct eap_fast_tlv_parse tlv; local
    [all...]
eap_server_teap.c 23 /* Private PAC-Opaque TLV types */
487 /* RFC 7170, Section 4.2.2: Authority-ID TLV */
640 "EAP-TEAP: Add Intermediate-Result TLV (status=SUCCESS)");
649 /* Result TLV */
651 "EAP-TEAP: Add Result TLV (status=SUCCESS)");
659 /* Crypto-Binding TLV */
667 * Crypto-Binding TLV is used with Basic-Password-Auth */
702 "EAP-TEAP: Add Crypto-Binding TLV: Version %u Received Version %u Flags %u Sub-Type %u",
800 /* Result TLV */
801 wpa_printf(MSG_DEBUG, "EAP-TEAP: Add Result TLV (status=SUCCESS)")
1518 struct teap_attr_pac_type *tlv; local
1535 struct eap_teap_tlv_parse tlv; local
    [all...]
  /src/external/bsd/wpa/dist/src/crypto/
crypto_module_tests.c 1074 u8 tlv[] = { local
1143 os_memset(tlv + sizeof(tlv) - 20, 0, 20);
1144 if (hmac_sha1(cmk, 20, tlv, sizeof(tlv), tlv + sizeof(tlv) - 20) < 0 ||
1145 os_memcmp(tlv + sizeof(tlv) - 20, compound_mac,
  /src/external/bsd/wpa/dist/wpa_supplicant/dbus/
dbus_new_handlers_p2p.c 2896 struct wpabuf *tlv = NULL; local
2924 } else if (os_strcmp(entry.key, "tlv") == 0) {
2928 wpabuf_free(tlv);
2929 tlv = wpabuf_alloc_copy(entry.bytearray_value,
2953 if (tlv == NULL)
2955 ref = wpas_p2p_sd_request(wpa_s, addr, tlv);
2967 wpabuf_free(tlv);
2987 struct wpabuf *tlv = NULL; local
3015 wpabuf_free(tlv);
3016 tlv = wpabuf_alloc_copy(entry.bytearray_value
    [all...]
  /src/sys/dev/pci/
if_iwn.c 5883 * Extract text and data sections from a TLV firmware image.
5890 const struct iwn_fw_tlv *tlv; local
5923 while (ptr + sizeof (*tlv) <= end) {
5924 tlv = (const struct iwn_fw_tlv *)ptr;
5925 len = le32toh(tlv->len);
5927 ptr += sizeof (*tlv);
5934 if (tlv->alt != 0 && tlv->alt != htole16(alt))
5937 switch (le16toh(tlv->type)) {
5961 "TLV type %d has invalid size %u\n"
    [all...]
if_iwm.c 752 struct iwm_ucode_tlv tlv; local
804 while (len >= sizeof(tlv)) {
808 memcpy(&tlv, data, sizeof(tlv));
809 tlv_len = le32toh(tlv.length);
810 tlv_type = le32toh(tlv.type);
812 len -= sizeof(tlv);
813 data += sizeof(tlv);
7435 * Enable LAR only if it is supported by the FW (TLV) &&

Completed in 48 milliseconds