/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | readconf.c | 12 * incompatible with the protocol description in the RFC file, it must be 209 { "protocol", oProtocol }, 812 fatal("%.200s line %d: Bad protocol 2 host key algorithms '%s'.", 819 intptr = &options->protocol; 825 fatal("%.200s line %d: Bad protocol spec '%s'.", 1252 options->protocol = SSH_PROTO_UNKNOWN; 1385 if (options->protocol == SSH_PROTO_UNKNOWN) 1386 options->protocol = SSH_PROTO_2; 1388 if (options->protocol & SSH_PROTO_1) { 1395 if (options->protocol [all...] |
H A D | servconf.c | 10 * incompatible with the protocol description in the RFC file, it must be 157 options->protocol = SSH_PROTO_UNKNOWN; 200 if (options->protocol == SSH_PROTO_UNKNOWN) 201 options->protocol = SSH_PROTO_2; 204 if (options->protocol & SSH_PROTO_1) 207 if (options->protocol & SSH_PROTO_2) { 542 { "protocol", sProtocol, SSHCFG_GLOBAL }, 1319 intptr = &options->protocol; 1325 fatal("%s line %d: Bad protocol spec '%s'.", 1958 dump_cfg_fmtint(sProtocol, o->protocol); [all...] |
/netbsd-6-1-5-RELEASE/dist/dhcp/omapip/ |
H A D | mrtrace.c | 341 int trace_mr_socket (int domain, int type, int protocol) argument 346 return socket (domain, type, protocol);
|
/netbsd-6-1-5-RELEASE/external/apache2/mDNSResponder/dist/mDNSShared/ |
H A D | dnssd_clientstub.c | 1296 uint32_t protocol, 1315 len += sizeof(uint32_t); // protocol 1323 put_uint32(protocol, &ptr); 1803 uint8_t protocol = 0; local 1815 protocol = *data++; 1824 else ((DNSServiceNATPortMappingReply)sdr->AppCallback)(sdr, cbh->cb_flags, cbh->cb_interface, cbh->cb_err, addr.l, protocol, internalPort.s, externalPort.s, ttl, sdr->AppContext); 1833 uint32_t protocol, /* TCP and/or UDP */ 1852 len += sizeof(protocol); 1862 put_uint32(protocol, &ptr); 1291 DNSServiceGetAddrInfo( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, uint32_t protocol, const char *hostname, DNSServiceGetAddrInfoReply callBack, void *context ) argument 1828 DNSServiceNATPortMappingCreate( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, uint32_t protocol, uint16_t internalPortInNetworkByteOrder, uint16_t externalPortInNetworkByteOrder, uint32_t ttl, DNSServiceNATPortMappingReply callBack, void *context ) argument
|
H A D | uds_daemon.c | 712 <rdar://problem/4837929> Should allow "udp" or "tcp" for protocol command-line arg 1028 mDNSu32 protocol; member in struct:request_state::__anon1041::__anon1044 3298 replyLen += sizeof(mDNSu8); // protocol 3335 mDNSu8 protocol = get_uint32(&request->msgptr, request->msgend); local 3351 if (protocol == 0) // If protocol == 0 (i.e. just request public address) then IntPort, ExtPort, ttl must be zero too 3358 if (!(protocol & (kDNSServiceProtocol_UDP | kDNSServiceProtocol_TCP))) return(mStatus_BadParamErr); 3361 request->u.pm.NATinfo.Protocol = !protocol ? NATOp_AddrRequest : (protocol == kDNSServiceProtocol_UDP) ? NATOp_MapUDP : NATOp_MapTCP; 3369 protocol, mDNSVal1 [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/rdata/generic/ |
H A D | keydata_65533.c | 68 /* protocol */ 134 /* protocol */ 260 RETERR(uint8_tobuffer(keydata->protocol, target)); 311 keydata->protocol = uint8_fromregion(&sr);
|
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/testsuite/lib/ |
H A D | sim-defs.exp | 121 if { [board_info target sim,protocol] == "sid" } {
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/tls/ |
H A D | tls_client.c | 71 /* .IP TLScontext->protocol 72 /* the protocol name (SSLv2, SSLv3, TLSv1), 381 * Protocol selection is destination dependent, so we delay the protocol 471 * Allocate an application context, and populate with mandatory protocol 741 * First make sure we have valid protocol and cipher parameters 744 * repeatedly reset if necessary, but the protocol restrictions will be 745 * is applied to the SSL connection, because protocol restrictions in the 750 * OpenSSL will ignore cached sessions that use the wrong protocol. So we 751 * do not need to filter out cached sessions with the "wrong" protocol, 754 * Still, we salt the session lookup key with the protocol lis [all...] |
H A D | tls_server.c | 51 /* .IP TLScontext->protocol 52 /* the protocol name (SSLv2, SSLv3, TLSv1), 321 msg_warn("Invalid TLS protocol list \"%s\": disabling TLS support", 376 * the protocol level, we can add an option to not use SSLv2/v3/TLSv1 398 * Global protocol selection. 778 * Finally, collect information about protocol and cipher for logging 780 TLScontext->protocol = SSL_get_version(TLScontext->con); 802 TLScontext->namaddr, TLScontext->protocol, TLScontext->cipher_name,
|
/netbsd-6-1-5-RELEASE/usr.sbin/moused/ |
H A D | moused.c | 92 /* Logitech PS2++ protocol */ 357 mousemode_t mode; /* protocol information */ 1132 rodent.mode.protocol = MOUSE_PROTO_UNKNOWN; 1139 if (rodent.mode.protocol == MOUSE_PROTO_UNKNOWN) { 1155 rodent.mode.protocol = t->val; 1158 rodent.mode.protocol = MOUSE_PROTO_UNKNOWN; 1160 if (rodent.mode.protocol == MOUSE_PROTO_INPORT) 1161 rodent.mode.protocol = MOUSE_PROTO_BUS; 1164 if (rodent.mode.protocol != MOUSE_PROTO_UNKNOWN) { 1165 if (rodent.mode.protocol ! [all...] |
H A D | mouse.h | 127 int protocol; /* MOUSE_PROTO_XXX */ member in struct:mousemode 136 /* protocol */ 144 * PS/2 mouse protocol: 199 /* Logitech MouseMan data packet (M+ protocol) */ 202 /* ALPS GlidePoint extension (variant of M+ protocol) */ 206 /* Kinsington Thinking Mouse extension (variant of M+ protocol) */ 253 /* Logitech MouseMan+ (PS/2) data packet (PS/2++ protocol) */ 260 /* IBM ScrollPoint (PS/2) also uses PS/2++ protocol */ 309 * /dev/sysmouse sends data in two formats, depending on the protocol
|
/netbsd-6-1-5-RELEASE/dist/dhcp/common/ |
H A D | alloc.c | 278 struct protocol *new_protocol (file, line) 282 struct protocol *rval = dmalloc (sizeof (struct protocol), file, line); 362 struct protocol *ptr;
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/irs/ |
H A D | dnsconf.c | 96 "protocol")); 114 keystruct.protocol = (isc_uint8_t)proto;
|
/netbsd-6-1-5-RELEASE/external/bsd/libpcap/dist/msdos/ |
H A D | pkt_rx0.asm | 51 protocol dw 0 ; packet protocol number
define
|
/netbsd-6-1-5-RELEASE/external/bsd/libpcap/dist/ |
H A D | pcap-int.h | 403 unsigned short protocol; member in struct:pcap_sf_patched_pkthdr
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/clients/tools/ |
H A D | ldapexop.c | 86 protocol = LDAP_VERSION3;
|
/netbsd-6-1-5-RELEASE/external/mit/xorg/server/xorg-server/include/ |
H A D | Makefile | 38 protocol-versions.h \
|
/netbsd-6-1-5-RELEASE/sys/compat/netbsd32/ |
H A D | netbsd32_compat_30.c | 228 syscallarg(int) protocol; 234 NETBSD32TO64_UAP(protocol);
|
/netbsd-6-1-5-RELEASE/sys/dev/pci/ |
H A D | icp_pci.c | 250 u_int8_t protocol; local 340 printk("illegal protocol version\n"); 414 printk("illegal protocol version\n"); 501 protocol = (u_int8_t)bus_space_read_4(dpmemt, dpmemh, 505 if (protocol != ICP_PROTOCOL_VERSION) { 506 aprint_error("unsupported protocol %d\n", protocol);
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtpd/ |
H A D | smtpd_milter.c | 20 /* internal protocol errors. 128 return (IF_ENCRYPTED(state->tls_context->protocol));
|
/netbsd-6-1-5-RELEASE/sys/netisdn/ |
H A D | i4b_ioctl.h | 71 #define PROTOCOL_D64S 1 /* 64k leased line, no protocol */ 92 * B channel protocol 94 #define BPROT_NONE 0 /* no protocol at all, raw data */ 455 int bprot; /* b channel protocol */ 481 int bprot; /* B chan protocol */ 495 cause_t cause; /* protocol independent cause */ 577 * set ISDN protocol used by a controller 581 int protocol; /* ISDN D-channel protocol type */ member in struct:__anon9370
|
/netbsd-6-1-5-RELEASE/sys/dev/pci/n8/common/api/commands/ |
H A D | n8_cb_ea.h | 336 N8_HashProtocol_t protocol,
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/milter/ |
H A D | milter8.c | 7 /* MTA-side Sendmail 8 Milter protocol 12 /* protocol, def_action, parent) 17 /* const char *protocol; 25 /* filter protocol. 29 /* protocol. These virtual functions are then invoked via the 30 /* milter(3) interface. The *timeout, protocol and def_action 44 /* milter8_protocol, protocol version and extensions 102 * Use our own protocol definitions, so that Postfix can be built even when 104 * protocol version in main.cf, and that we must send only the commands that 105 * are supported for that protocol versio 354 char *protocol; /* protocol version/extension */ member in struct:__anon2448 2801 milter8_alloc(const char *name, int conn_timeout, int cmd_timeout, int msg_timeout, const char *protocol, const char *def_action, MILTERS *parent) argument 2851 milter8_create(const char *name, int conn_timeout, int cmd_timeout, int msg_timeout, const char *protocol, const char *def_action, MILTERS *parent) argument [all...] |
/netbsd-6-1-5-RELEASE/dist/pppd/pppd/ |
H A D | ipxcp.c | 120 NULL, /* Called to handle protocol-specific codes */ 121 "IPXCP" /* String name of protocol */ 222 #define CILEN_PROTOCOL 4 /* Minimum length of routing protocol */ 224 #define CILEN_COMPRESS 4 /* Minimum length of compression protocol */ 397 f->protocol = PPP_IPXCP; 587 /* Always specify a routing protocol unless it was REJected. */ 862 * Do not permit the peer to force a router protocol which we do not 1151 * The routing protocol is a bitmask of various types. Any combination 1153 * routing protocol must be specified only once. 1183 /* Finally do not allow a router protocol whic 1187 int protocol; local [all...] |
/netbsd-6-1-5-RELEASE/dist/dhcp/includes/ |
H A D | dhcpd.h | 691 TIME retry_interval; /* If the protocol failed to produce 693 try the protocol again after this 822 struct protocol { struct 823 struct protocol *next; 825 void (*handler) PROTO ((struct protocol *)); 1447 struct protocol *new_protocol PROTO ((const char *, int)); 1462 void free_protocol PROTO ((struct protocol *, const char *, int)); 1726 extern struct protocol *protocols; 1783 struct protocol *add_protocol PROTO ((const char *, int, 1784 void (*) PROTO ((struct protocol *)), [all...] |