Searched refs:protocol (Results 176 - 200 of 347) sorted by relevance

1234567891011>>

/netbsd-6-1-5-RELEASE/sys/arch/alpha/alpha/
H A Ddec_eb66.c195 diskboot = (strcasecmp(b->protocol, "SCSI") == 0);
196 netboot = (strcasecmp(b->protocol, "BOOTP") == 0) ||
197 (strcasecmp(b->protocol, "MOP") == 0);
H A Ddec_kn20aa.c197 diskboot = (strcasecmp(b->protocol, "SCSI") == 0);
198 netboot = (strcasecmp(b->protocol, "BOOTP") == 0) ||
199 (strcasecmp(b->protocol, "MOP") == 0);
H A Ddec_kn300.c235 diskboot = (strcasecmp(b->protocol, "SCSI") == 0) ||
236 (strcasecmp(b->protocol, "RAID") == 0);
237 netboot = (strcasecmp(b->protocol, "BOOTP") == 0) ||
238 (strcasecmp(b->protocol, "MOP") == 0);
240 printf("proto:%s bus:%d slot:%d chan:%d", b->protocol,
H A Ddec_kn8ae.c129 diskboot = (strcasecmp(b->protocol, "SCSI") == 0);
130 netboot = (strcasecmp(b->protocol, "BOOTP") == 0) ||
131 (strcasecmp(b->protocol, "MOP") == 0);
133 printf("proto:%s bus:%d slot:%d chan:%d", b->protocol,
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/roken/
H A Dsocket_wrapper.c220 int protocol; member in struct:socket_info
681 unsigned char protocol; member in struct:swrap_packet::__anon240::__anon241
792 unsigned char protocol = 0, icmp_protocol = 0; local
798 protocol = 0x06; /* TCP */
804 protocol = 0x11; /* UDP */
811 icmp_protocol = protocol;
812 protocol = 0x01; /* ICMP */
843 packet->ip.hdr.protocol = protocol;
863 packet->ip.hdr.protocol
1212 swrap_socket(int family, int type, int protocol) argument
[all...]
H A Dresolve.h143 unsigned protocol; member in struct:rk_key_record
/netbsd-6-1-5-RELEASE/dist/pppd/pppd/
H A Dauth.c726 if (protp->protocol != PPP_LCP && protp->lowerdown != NULL)
728 if (protp->protocol < 0xC000 && protp->close != NULL)
755 if (protp->protocol != PPP_LCP && protp->enabled_flag
890 if ((protp->protocol == PPP_ECP || protp->protocol == PPP_CCP)
914 if (protp->protocol < 0xC000
915 && protp->protocol != PPP_CCP && protp->protocol != PPP_ECP
927 * The peer has failed to authenticate himself using `protocol'.
930 auth_peer_fail(unit, protocol)
[all...]
/netbsd-6-1-5-RELEASE/sys/dev/ic/
H A Disic_l1fsm.c228 if(((struct isdn_l3_driver*)sc->sc_l3token)->protocol != PROTOCOL_D64S)
287 if(((struct isdn_l3_driver*)sc->sc_l3token)->protocol != PROTOCOL_D64S)
314 if(((struct isdn_l3_driver*)sc->sc_l3token)->protocol != PROTOCOL_D64S)
359 if(((struct isdn_l3_driver*)sc->sc_l3token)->protocol != PROTOCOL_D64S)
382 if(((struct isdn_l3_driver*)sc->sc_l3token)->protocol != PROTOCOL_D64S)
/netbsd-6-1-5-RELEASE/sys/net/
H A Dif_ppp.c589 * Found a handler for the protocol - try to allocate
634 switch (npi->protocol) {
838 int protocol, address, control; local
866 protocol = PPP_IP;
882 protocol = PPP_IPV6;
899 protocol = PPP_PROTOCOL(dst->sa_data);
932 *cp++ = protocol >> 8;
933 *cp++ = protocol & 0xff;
942 if ((protocol & 0x8000) == 0) {
1078 * protocol fiel
1085 int address, control, protocol; local
[all...]
H A Dif_ppp.h52 #define SC_COMP_PROT 0x00000001 /* protocol compression (output) */
92 int protocol; /* PPP procotol, e.g. PPP_IP */ member in struct:npioctl
/netbsd-6-1-5-RELEASE/dist/dhcp/dst/
H A Ddst_api.c77 const u_int32_t flags, const int protocol,
162 * protocol: the dns protocol of the key
170 const int protocol, const int bits)
183 new_key->dk_proto = protocol;
490 * domain.name [ttl] [IN] KEY <flags> <protocol> <algorithm> <key>
770 const int protocol, /* dns protocol */
782 dkey = dst_s_get_key_struct(key_name, alg, flags, protocol, -1);
938 * protocol
169 dst_s_get_key_struct(const char *name, const int alg, const u_int32_t flags, const int protocol, const int bits) argument
767 dst_buffer_to_key(const char *key_name, const int alg, const unsigned flags, const int protocol, const u_char *key_buf, const unsigned key_len) argument
954 dst_generate_key(const char *name, const int bits, const int exp, const unsigned flags, const int protocol, const int alg) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/libbind/dist/dst/
H A Ddst_api.c80 const int flags, const int protocol,
156 * protocol: the dns protocol of the key
164 const int protocol, const int bits)
181 new_key->dk_proto = protocol;
486 * domain.name [ttl] [IN] KEY &lt;flags&gt; &lt;protocol&gt; &lt;algorithm&gt; &lt;key&gt;
762 const int protocol, /*!< dns protocol */
776 dkey = dst_s_get_key_struct(key_name, alg, flags, protocol, -1);
937 *\par protocol
163 dst_s_get_key_struct(const char *name, const int alg, const int flags, const int protocol, const int bits) argument
759 dst_buffer_to_key(const char *key_name, const int alg, const int flags, const int protocol, const u_char *key_buf, const int key_len) argument
953 dst_generate_key(const char *name, const int bits, const int exp, const int flags, const int protocol, const int alg) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/
H A Ddst_api.c96 unsigned int protocol,
113 unsigned int protocol,
666 unsigned int flags, unsigned int protocol,
675 result = frombuffer(name, alg, flags, protocol, rdclass, source,
769 unsigned int protocol, dns_rdataclass_t rdclass,
783 key = get_key_struct(name, alg, flags, protocol, bits, rdclass,
802 unsigned int protocol, dns_rdataclass_t rdclass,
817 key = get_key_struct(name, alg, flags, protocol, 0, rdclass, 0, mctx);
845 unsigned int flags, unsigned int protocol,
849 return (dst_key_generate2(name, alg, bits, param, flags, protocol,
665 dst_key_frombuffer(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_buffer_t *source, isc_mem_t *mctx, dst_key_t **keyp) argument
767 dst_key_buildinternal(dns_name_t *name, unsigned int alg, unsigned int bits, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, void *data, isc_mem_t *mctx, dst_key_t **keyp) argument
801 dst_key_fromlabel(dns_name_t *name, int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, const char *engine, const char *label, const char *pin, isc_mem_t *mctx, dst_key_t **keyp) argument
843 dst_key_generate(dns_name_t *name, unsigned int alg, unsigned int bits, unsigned int param, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_mem_t *mctx, dst_key_t **keyp) argument
854 dst_key_generate2(dns_name_t *name, unsigned int alg, unsigned int bits, unsigned int param, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_mem_t *mctx, dst_key_t **keyp, void (*callback)(int)) argument
1258 dst_key_restore(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_mem_t *mctx, const char *keystr, dst_key_t **keyp) argument
1295 get_key_struct(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, unsigned int bits, dns_rdataclass_t rdclass, dns_ttl_t ttl, isc_mem_t *mctx) argument
1721 frombuffer(dns_name_t *name, unsigned int alg, unsigned int flags, unsigned int protocol, dns_rdataclass_t rdclass, isc_buffer_t *source, isc_mem_t *mctx, dst_key_t **keyp) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/dnssec/
H A Ddnssec-keygen.c133 fprintf(stderr, " -p <protocol>: (default: 3 [dnssec])\n");
217 int protocol = -1, size = -1, signatory = 0; local
360 protocol = strtol(isc_commandline_argument, &endp, 10);
361 if (*endp != '\0' || protocol < 0 || protocol > 255)
827 if (protocol == -1)
828 protocol = DNS_KEYPROTO_DNSSEC;
830 protocol != DNS_KEYPROTO_DNSSEC)
831 fatal("invalid DNSKEY protocol: %d", protocol);
[all...]
/netbsd-6-1-5-RELEASE/dist/ipf/tools/
H A Dipmon_y.y64 %type <opt> protocol result rule srcip srcport logtag matching
105 | protocol { $$ = $1; }
175 protocol: label
270 { "protocol", IPM_PROTOCOL },
/netbsd-6-1-5-RELEASE/external/apache2/mDNSResponder/dist/mDNSShared/
H A Ddns_sd.h887 * regtype: The service type followed by the protocol, separated by a dot
890 * The transport protocol must be "_tcp" or "_udp". New service types
1166 * regtype: The service type being browsed for followed by the protocol, separated by a
1167 * dot (e.g. "_ftp._tcp"). The transport protocol must be "_tcp" or "_udp".
1228 * fullname: The full service domain name, in the form <servicename>.<protocol>.<domain>.
1520 * protocol: Pass in kDNSServiceProtocol_IPv4 to look up IPv4 addresses, or kDNSServiceProtocol_IPv6
1553 DNSServiceProtocol protocol,
1813 * protocol: Will be kDNSServiceProtocol_UDP or kDNSServiceProtocol_TCP or both.
1838 DNSServiceProtocol protocol,
1858 * protocol
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/clients/tools/
H A Dldappasswd.c96 if( protocol == LDAP_VERSION2 ) {
98 prog, protocol );
188 protocol = LDAP_VERSION3;
/netbsd-6-1-5-RELEASE/usr.sbin/isdn/isdnd/
H A Dcontroller.c125 ctrl->protocol = PROTOCOL_DSS1;
238 mpi.protocol = ctrl->protocol;
248 * init controller D-channel ISDN protocol
/netbsd-6-1-5-RELEASE/sys/netiso/xebec/
H A Dmain.c43 char protocol[50]; variable
79 fprintf(stderr, "\t\t\t [event,old_state] that produce protocol errors\n");
334 fprintf(eventfile_h, "\n#define %s_NEVENTS 0x%x\n", protocol, Nevents);
378 fprintf(statefile, "\n#define %s_NSTATES 0x%x\n", protocol, Nstates);
H A Dxebec.c38 strcpy(protocol, llattr->llabase[3].ID.address);
39 openfiles(protocol);
52 llattr->llabase[7].pcb.address,protocol, PCBNAME);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/
H A Dconnect.c68 * add `family, port, protocol' to the list with duplicate suppresion.
73 int family, int port, const char *protocol)
78 if(strcmp(protocol, "udp") == 0)
80 else if(strcmp(protocol, "tcp") == 0)
107 const char *protocol)
109 port = krb5_getportbyname (context, service, protocol, port);
110 add_port (context, family, port, protocol);
120 int family, const char *str, const char *protocol)
125 sp = roken_getservbyname (str, protocol);
135 add_port (context, family, port, protocol);
72 add_port(krb5_context context, int family, int port, const char *protocol) argument
105 add_port_service(krb5_context context, int family, const char *service, int port, const char *protocol) argument
119 add_port_string(krb5_context context, int family, const char *str, const char *protocol) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dservconf.h13 * incompatible with the protocol description in the RFC file, it must be
92 int protocol; /* Supported protocol versions. */ member in struct:__anon408
/netbsd-6-1-5-RELEASE/external/mit/xorg/server/xorg-server/dix/
H A DMakefile33 FILES= protocol.txt
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/postscreen/
H A Dpostscreen_state.c66 /* polite "try again" SMTP replies. The protocol member is set
164 state->protocol = MAIL_PROTO_SMTP;
/netbsd-6-1-5-RELEASE/sys/dev/pci/n8/include_public/
H A Dn8_pub_hash.h139 const N8_HashProtocol_t protocol,

Completed in 185 milliseconds

1234567891011>>