Searched refs:state (Results 1 – 9 of 9) sorted by relevance
/smoltcp-0.9.1/src/socket/ |
D | dhcpv4.rs | 137 state: ClientState, field 182 state: ClientState::Discovering(DiscoverState { in new() 268 let t = match &self.state { in poll_at() 269 ClientState::Discovering(state) => state.retry_at, in poll_at() 270 ClientState::Requesting(state) => state.retry_at, in poll_at() 271 ClientState::Renewing(state) => state.renew_at.min(state.expires_at), in poll_at() 338 match (&mut self.state, dhcp_repr.message_type) { in process() 345 self.state = ClientState::Requesting(RequestState { in process() 355 (ClientState::Requesting(state), DhcpMessageType::Ack) => { in process() 357 Self::parse_ack(cx.now(), &dhcp_repr, self.max_lease_duration, state.server) in process() [all …]
|
D | tcp.rs | 354 state: State, field 448 state: State::Closed, in new() 661 pub fn state(&self) -> State { in state() method 662 self.state in state() 669 self.state = State::Closed; in reset() 834 match self.state { in close() 872 match self.state { in is_listening() 888 match self.state { in is_open() 909 match self.state { in is_active() 928 match self.state { in may_send() [all …]
|
D | dns.rs | 55 state: State, field 62 fn set_state(&mut self, state: State) { in set_state() 63 self.state = state; in set_state() 266 state: State::Pending(PendingQuery { in start_query_raw() 295 match &mut q.state { in get_query_result() 391 if let State::Pending(pq) = &mut q.state { in process() 510 if let State::Pending(pq) = &mut q.state { in dispatch() 621 .filter_map(|q| match &q.state { in poll_at()
|
/smoltcp-0.9.1/src/phy/ |
D | fault_injector.rs | 6 fn xorshift32(state: &mut u32) -> u32 { in xorshift32() 7 let mut x = *state; in xorshift32() 11 *state = x; in xorshift32() 96 state: State, field 106 state: State { in new() 191 self.state.refilled_at = Instant::from_millis(0); in set_bucket_interval() 228 if self.state.maybe(self.config.drop_pct) { in receive() 233 if !self.state.maybe_receive(&self.config, timestamp) { in receive() 238 if self.state.maybe(self.config.corrupt_pct) { in receive() 240 self.state.corrupt(&mut buf[..]); in receive() [all …]
|
/smoltcp-0.9.1/src/ |
D | rand.rs | 6 state: u64, field 11 Self { state: seed } in new() 20 let s = self.state.wrapping_mul(M).wrapping_add(A); in rand_u32() 21 self.state = s; in rand_u32()
|
/smoltcp-0.9.1/examples/ |
D | httpclient.rs | 72 let mut state = State::Connect; in main() localVariable 81 state = match state { in main() 115 _ => state, in main()
|
/smoltcp-0.9.1/ |
D | CHANGELOG.md | 97 …- Fix crash when receiving a FIN in SYN_SENT state ([#538](https://github.com/smoltcp-rs/smoltcp/p… 98 …- Fix overflow crash when receiving a wrong ACK seq in SYN_RECEIVED state ([#538](https://github.c… 101 …- Reply with RST to invalid packets in SynReceived state. ([#542](https://github.com/smoltcp-rs/s… 172 …t for attaching async/await Wakers to sockets. Wakers are woken on socket state changes. ([394](ht… 186 - tcp: Accept data packets in FIN_WAIT_2 state. ([350](https://github.com/smoltcp-rs/smoltcp/pull/3… 188 - tcp: allow sending ACKs in FinWait2 state. ([388](https://github.com/smoltcp-rs/smoltcp/pull/388)) 191 - tcp: Return RST to unexpected ACK in SYN-SENT state. ([367](https://github.com/smoltcp-rs/smoltcp…
|
D | README.md | 169 the [log crate][log]. Normal events (e.g. buffer level or TCP state changes) are emitted with
|
/smoltcp-0.9.1/src/wire/ |
D | ipv6.rs | 274 let mut state = State::Head; in fmt() localVariable 276 state = match (*word, &state) { in fmt() 300 state in fmt()
|