Home
last modified time | relevance | path

Searched refs:state (Results 1 – 9 of 9) sorted by relevance

/smoltcp-0.9.1/src/socket/
Ddhcpv4.rs137 state: ClientState, field
182 state: ClientState::Discovering(DiscoverState { in new()
268 let t = match &self.state { in poll_at()
269 ClientState::Discovering(state) => state.retry_at, in poll_at()
270 ClientState::Requesting(state) => state.retry_at, in poll_at()
271 ClientState::Renewing(state) => state.renew_at.min(state.expires_at), in poll_at()
338 match (&mut self.state, dhcp_repr.message_type) { in process()
345 self.state = ClientState::Requesting(RequestState { in process()
355 (ClientState::Requesting(state), DhcpMessageType::Ack) => { in process()
357 Self::parse_ack(cx.now(), &dhcp_repr, self.max_lease_duration, state.server) in process()
[all …]
Dtcp.rs354 state: State, field
448 state: State::Closed, in new()
661 pub fn state(&self) -> State { in state() method
662 self.state in state()
669 self.state = State::Closed; in reset()
834 match self.state { in close()
872 match self.state { in is_listening()
888 match self.state { in is_open()
909 match self.state { in is_active()
928 match self.state { in may_send()
[all …]
Ddns.rs55 state: State, field
62 fn set_state(&mut self, state: State) { in set_state()
63 self.state = state; in set_state()
266 state: State::Pending(PendingQuery { in start_query_raw()
295 match &mut q.state { in get_query_result()
391 if let State::Pending(pq) = &mut q.state { in process()
510 if let State::Pending(pq) = &mut q.state { in dispatch()
621 .filter_map(|q| match &q.state { in poll_at()
/smoltcp-0.9.1/src/phy/
Dfault_injector.rs6 fn xorshift32(state: &mut u32) -> u32 { in xorshift32()
7 let mut x = *state; in xorshift32()
11 *state = x; in xorshift32()
96 state: State, field
106 state: State { in new()
191 self.state.refilled_at = Instant::from_millis(0); in set_bucket_interval()
228 if self.state.maybe(self.config.drop_pct) { in receive()
233 if !self.state.maybe_receive(&self.config, timestamp) { in receive()
238 if self.state.maybe(self.config.corrupt_pct) { in receive()
240 self.state.corrupt(&mut buf[..]); in receive()
[all …]
/smoltcp-0.9.1/src/
Drand.rs6 state: u64, field
11 Self { state: seed } in new()
20 let s = self.state.wrapping_mul(M).wrapping_add(A); in rand_u32()
21 self.state = s; in rand_u32()
/smoltcp-0.9.1/examples/
Dhttpclient.rs72 let mut state = State::Connect; in main() localVariable
81 state = match state { in main()
115 _ => state, in main()
/smoltcp-0.9.1/
DCHANGELOG.md97 …- Fix crash when receiving a FIN in SYN_SENT state ([#538](https://github.com/smoltcp-rs/smoltcp/p…
98 …- Fix overflow crash when receiving a wrong ACK seq in SYN_RECEIVED state ([#538](https://github.c…
101 …- Reply with RST to invalid packets in SynReceived state. ([#542](https://github.com/smoltcp-rs/s…
172 …t for attaching async/await Wakers to sockets. Wakers are woken on socket state changes. ([394](ht…
186 - tcp: Accept data packets in FIN_WAIT_2 state. ([350](https://github.com/smoltcp-rs/smoltcp/pull/3…
188 - tcp: allow sending ACKs in FinWait2 state. ([388](https://github.com/smoltcp-rs/smoltcp/pull/388))
191 - tcp: Return RST to unexpected ACK in SYN-SENT state. ([367](https://github.com/smoltcp-rs/smoltcp…
DREADME.md169 the [log crate][log]. Normal events (e.g. buffer level or TCP state changes) are emitted with
/smoltcp-0.9.1/src/wire/
Dipv6.rs274 let mut state = State::Head; in fmt() localVariable
276 state = match (*word, &state) { in fmt()
300 state in fmt()