Searched refs:protocol (Results 251 - 275 of 347) sorted by relevance

<<11121314

/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dreadconf.c12 * incompatible with the protocol description in the RFC file, it must be
209 { "protocol", oProtocol },
812 fatal("%.200s line %d: Bad protocol 2 host key algorithms '%s'.",
819 intptr = &options->protocol;
825 fatal("%.200s line %d: Bad protocol spec '%s'.",
1252 options->protocol = SSH_PROTO_UNKNOWN;
1385 if (options->protocol == SSH_PROTO_UNKNOWN)
1386 options->protocol = SSH_PROTO_2;
1388 if (options->protocol & SSH_PROTO_1) {
1395 if (options->protocol
[all...]
H A Dservconf.c10 * incompatible with the protocol description in the RFC file, it must be
157 options->protocol = SSH_PROTO_UNKNOWN;
200 if (options->protocol == SSH_PROTO_UNKNOWN)
201 options->protocol = SSH_PROTO_2;
204 if (options->protocol & SSH_PROTO_1)
207 if (options->protocol & SSH_PROTO_2) {
542 { "protocol", sProtocol, SSHCFG_GLOBAL },
1319 intptr = &options->protocol;
1325 fatal("%s line %d: Bad protocol spec '%s'.",
1958 dump_cfg_fmtint(sProtocol, o->protocol);
[all...]
/netbsd-6-1-5-RELEASE/dist/dhcp/omapip/
H A Dmrtrace.c341 int trace_mr_socket (int domain, int type, int protocol) argument
346 return socket (domain, type, protocol);
/netbsd-6-1-5-RELEASE/external/apache2/mDNSResponder/dist/mDNSShared/
H A Ddnssd_clientstub.c1296 uint32_t protocol,
1315 len += sizeof(uint32_t); // protocol
1323 put_uint32(protocol, &ptr);
1803 uint8_t protocol = 0; local
1815 protocol = *data++;
1824 else ((DNSServiceNATPortMappingReply)sdr->AppCallback)(sdr, cbh->cb_flags, cbh->cb_interface, cbh->cb_err, addr.l, protocol, internalPort.s, externalPort.s, ttl, sdr->AppContext);
1833 uint32_t protocol, /* TCP and/or UDP */
1852 len += sizeof(protocol);
1862 put_uint32(protocol, &ptr);
1291 DNSServiceGetAddrInfo( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, uint32_t protocol, const char *hostname, DNSServiceGetAddrInfoReply callBack, void *context ) argument
1828 DNSServiceNATPortMappingCreate( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, uint32_t protocol, uint16_t internalPortInNetworkByteOrder, uint16_t externalPortInNetworkByteOrder, uint32_t ttl, DNSServiceNATPortMappingReply callBack, void *context ) argument
H A Duds_daemon.c712 <rdar://problem/4837929> Should allow "udp" or "tcp" for protocol command-line arg
1028 mDNSu32 protocol; member in struct:request_state::__anon1041::__anon1044
3298 replyLen += sizeof(mDNSu8); // protocol
3335 mDNSu8 protocol = get_uint32(&request->msgptr, request->msgend); local
3351 if (protocol == 0) // If protocol == 0 (i.e. just request public address) then IntPort, ExtPort, ttl must be zero too
3358 if (!(protocol & (kDNSServiceProtocol_UDP | kDNSServiceProtocol_TCP))) return(mStatus_BadParamErr);
3361 request->u.pm.NATinfo.Protocol = !protocol ? NATOp_AddrRequest : (protocol == kDNSServiceProtocol_UDP) ? NATOp_MapUDP : NATOp_MapTCP;
3369 protocol, mDNSVal1
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/rdata/generic/
H A Dkeydata_65533.c68 /* protocol */
134 /* protocol */
260 RETERR(uint8_tobuffer(keydata->protocol, target));
311 keydata->protocol = uint8_fromregion(&sr);
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/sim/testsuite/lib/
H A Dsim-defs.exp121 if { [board_info target sim,protocol] == "sid" } {
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/tls/
H A Dtls_client.c71 /* .IP TLScontext->protocol
72 /* the protocol name (SSLv2, SSLv3, TLSv1),
381 * Protocol selection is destination dependent, so we delay the protocol
471 * Allocate an application context, and populate with mandatory protocol
741 * First make sure we have valid protocol and cipher parameters
744 * repeatedly reset if necessary, but the protocol restrictions will be
745 * is applied to the SSL connection, because protocol restrictions in the
750 * OpenSSL will ignore cached sessions that use the wrong protocol. So we
751 * do not need to filter out cached sessions with the "wrong" protocol,
754 * Still, we salt the session lookup key with the protocol lis
[all...]
H A Dtls_server.c51 /* .IP TLScontext->protocol
52 /* the protocol name (SSLv2, SSLv3, TLSv1),
321 msg_warn("Invalid TLS protocol list \"%s\": disabling TLS support",
376 * the protocol level, we can add an option to not use SSLv2/v3/TLSv1
398 * Global protocol selection.
778 * Finally, collect information about protocol and cipher for logging
780 TLScontext->protocol = SSL_get_version(TLScontext->con);
802 TLScontext->namaddr, TLScontext->protocol, TLScontext->cipher_name,
/netbsd-6-1-5-RELEASE/usr.sbin/moused/
H A Dmoused.c92 /* Logitech PS2++ protocol */
357 mousemode_t mode; /* protocol information */
1132 rodent.mode.protocol = MOUSE_PROTO_UNKNOWN;
1139 if (rodent.mode.protocol == MOUSE_PROTO_UNKNOWN) {
1155 rodent.mode.protocol = t->val;
1158 rodent.mode.protocol = MOUSE_PROTO_UNKNOWN;
1160 if (rodent.mode.protocol == MOUSE_PROTO_INPORT)
1161 rodent.mode.protocol = MOUSE_PROTO_BUS;
1164 if (rodent.mode.protocol != MOUSE_PROTO_UNKNOWN) {
1165 if (rodent.mode.protocol !
[all...]
H A Dmouse.h127 int protocol; /* MOUSE_PROTO_XXX */ member in struct:mousemode
136 /* protocol */
144 * PS/2 mouse protocol:
199 /* Logitech MouseMan data packet (M+ protocol) */
202 /* ALPS GlidePoint extension (variant of M+ protocol) */
206 /* Kinsington Thinking Mouse extension (variant of M+ protocol) */
253 /* Logitech MouseMan+ (PS/2) data packet (PS/2++ protocol) */
260 /* IBM ScrollPoint (PS/2) also uses PS/2++ protocol */
309 * /dev/sysmouse sends data in two formats, depending on the protocol
/netbsd-6-1-5-RELEASE/dist/dhcp/common/
H A Dalloc.c278 struct protocol *new_protocol (file, line)
282 struct protocol *rval = dmalloc (sizeof (struct protocol), file, line);
362 struct protocol *ptr;
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/irs/
H A Ddnsconf.c96 "protocol"));
114 keystruct.protocol = (isc_uint8_t)proto;
/netbsd-6-1-5-RELEASE/external/bsd/libpcap/dist/msdos/
H A Dpkt_rx0.asm51 protocol dw 0 ; packet protocol number define
/netbsd-6-1-5-RELEASE/external/bsd/libpcap/dist/
H A Dpcap-int.h403 unsigned short protocol; member in struct:pcap_sf_patched_pkthdr
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/clients/tools/
H A Dldapexop.c86 protocol = LDAP_VERSION3;
/netbsd-6-1-5-RELEASE/external/mit/xorg/server/xorg-server/include/
H A DMakefile38 protocol-versions.h \
/netbsd-6-1-5-RELEASE/sys/compat/netbsd32/
H A Dnetbsd32_compat_30.c228 syscallarg(int) protocol;
234 NETBSD32TO64_UAP(protocol);
/netbsd-6-1-5-RELEASE/sys/dev/pci/
H A Dicp_pci.c250 u_int8_t protocol; local
340 printk("illegal protocol version\n");
414 printk("illegal protocol version\n");
501 protocol = (u_int8_t)bus_space_read_4(dpmemt, dpmemh,
505 if (protocol != ICP_PROTOCOL_VERSION) {
506 aprint_error("unsupported protocol %d\n", protocol);
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtpd/
H A Dsmtpd_milter.c20 /* internal protocol errors.
128 return (IF_ENCRYPTED(state->tls_context->protocol));
/netbsd-6-1-5-RELEASE/sys/netisdn/
H A Di4b_ioctl.h71 #define PROTOCOL_D64S 1 /* 64k leased line, no protocol */
92 * B channel protocol
94 #define BPROT_NONE 0 /* no protocol at all, raw data */
455 int bprot; /* b channel protocol */
481 int bprot; /* B chan protocol */
495 cause_t cause; /* protocol independent cause */
577 * set ISDN protocol used by a controller
581 int protocol; /* ISDN D-channel protocol type */ member in struct:__anon9370
/netbsd-6-1-5-RELEASE/sys/dev/pci/n8/common/api/commands/
H A Dn8_cb_ea.h336 N8_HashProtocol_t protocol,
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/milter/
H A Dmilter8.c7 /* MTA-side Sendmail 8 Milter protocol
12 /* protocol, def_action, parent)
17 /* const char *protocol;
25 /* filter protocol.
29 /* protocol. These virtual functions are then invoked via the
30 /* milter(3) interface. The *timeout, protocol and def_action
44 /* milter8_protocol, protocol version and extensions
102 * Use our own protocol definitions, so that Postfix can be built even when
104 * protocol version in main.cf, and that we must send only the commands that
105 * are supported for that protocol versio
354 char *protocol; /* protocol version/extension */ member in struct:__anon2448
2801 milter8_alloc(const char *name, int conn_timeout, int cmd_timeout, int msg_timeout, const char *protocol, const char *def_action, MILTERS *parent) argument
2851 milter8_create(const char *name, int conn_timeout, int cmd_timeout, int msg_timeout, const char *protocol, const char *def_action, MILTERS *parent) argument
[all...]
/netbsd-6-1-5-RELEASE/dist/pppd/pppd/
H A Dipxcp.c120 NULL, /* Called to handle protocol-specific codes */
121 "IPXCP" /* String name of protocol */
222 #define CILEN_PROTOCOL 4 /* Minimum length of routing protocol */
224 #define CILEN_COMPRESS 4 /* Minimum length of compression protocol */
397 f->protocol = PPP_IPXCP;
587 /* Always specify a routing protocol unless it was REJected. */
862 * Do not permit the peer to force a router protocol which we do not
1151 * The routing protocol is a bitmask of various types. Any combination
1153 * routing protocol must be specified only once.
1183 /* Finally do not allow a router protocol whic
1187 int protocol; local
[all...]
/netbsd-6-1-5-RELEASE/dist/dhcp/includes/
H A Ddhcpd.h691 TIME retry_interval; /* If the protocol failed to produce
693 try the protocol again after this
822 struct protocol { struct
823 struct protocol *next;
825 void (*handler) PROTO ((struct protocol *));
1447 struct protocol *new_protocol PROTO ((const char *, int));
1462 void free_protocol PROTO ((struct protocol *, const char *, int));
1726 extern struct protocol *protocols;
1783 struct protocol *add_protocol PROTO ((const char *, int,
1784 void (*) PROTO ((struct protocol *)),
[all...]

Completed in 264 milliseconds

<<11121314