Searched refs:protocol (Results 301 - 325 of 347) sorted by relevance

<<11121314

/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/roken/
H A Dresolve.c271 rr->u.key->protocol = p[2];
814 rr->u.key->protocol = pRec->Data.KEY.chProtocol;
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/
H A Dnamed.conf532 * notify the NOTIFY protocol
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/clients/tools/
H A Dldapmodify.c147 fprintf( stderr, _(" -P version protocol version (default: 3)\n"));
170 if( protocol == LDAP_VERSION2 ) {
172 prog, protocol );
/netbsd-6-1-5-RELEASE/sys/compat/linux/arch/amd64/
H A Dlinux_syscallargs.h189 syscallarg(int) protocol; member in struct:linux_sys_socket_args
269 syscallarg(int) protocol; member in struct:linux_sys_socketpair_args
/netbsd-6-1-5-RELEASE/external/bsd/libevent/dist/
H A Dhttp.c475 * if the protocol is 1.0; and the connection was keep-alive
1215 char *protocol; local
1219 protocol = strsep(&line, " ");
1227 if (strcmp(protocol, "HTTP/1.0") == 0) {
1230 } else if (strcmp(protocol, "HTTP/1.1") == 0) {
1234 event_debug(("%s: bad protocol \"%s\"",
1235 __func__, protocol));
1812 /* Set the protocol version if it is not supplied */
/netbsd-6-1-5-RELEASE/dist/pppd/pppd/
H A Dpppd.h396 * for a particular protocol.
399 u_short protocol; /* PPP protocol number */ member in struct:protent
404 /* Process a received protocol-reject */
410 /* Open the protocol */
412 /* Close the protocol */
420 bool enabled_flag; /* 0 iff protocol is disabled */
421 char *name; /* Text name of protocol */
422 char *data_name; /* Text name of corresponding data protocol */
540 void np_up __P((int, int)); /* a network protocol ha
[all...]
H A Dlcp.c146 "Disable protocol field compression",
149 "Disable protocol field compression",
269 "LCP" /* String name of protocol */
367 f->protocol = PPP_LCP;
452 * Don't use A/C or protocol compression on transmission,
453 * but accept A/C and protocol compressed packets
454 * if we are going to ask for A/C and protocol compression.
564 * Figure out which protocol is rejected and inform it.
599 if (protp->protocol == prot && protp->enabled_flag) {
610 warn("Protocol-Reject for unsupported protocol
[all...]
H A Dipv6cp.c225 NULL, /* Called to handle protocol-specific codes */
226 "IPV6CP" /* String name of protocol */
433 f->protocol = PPP_IPV6CP;
/netbsd-6-1-5-RELEASE/external/bsd/am-utils/dist/conf/transp/
H A Dtransp_tli.c303 u_long protocol, struct netconfig *ncp)
301 amu_svc_register(SVCXPRT *xprt, u_long prognum, u_long versnum, void (*dispatch)(struct svc_req *rqstp, SVCXPRT *xprt), u_long protocol, struct netconfig *ncp) argument
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/servers/slapd/back-ldap/
H A Dbind.c526 int protocol,
546 if ( protocol == 0 ) {
548 (void *)&protocol );
551 if ( protocol < LDAP_VERSION3 ) {
554 *text = "invalid protocol version";
2041 /* don't proxyAuthz if protocol is not LDAPv3 */
2667 /* don't add controls if protocol is not LDAPv3 */
524 ldap_back_start_tls( LDAP *ld, int protocol, int *is_tls, const char *url, unsigned flags, int retries, const char **text ) argument
/netbsd-6-1-5-RELEASE/external/cddl/osnet/dist/uts/common/fs/zfs/
H A Dzfs_fm.c34 #include <sys/fm/protocol.h>
/netbsd-6-1-5-RELEASE/external/cddl/osnet/sys/kern/
H A Dfm.c34 * The embodiment of an FMA protocol element (event, fmri or authority) is a
71 #include <sys/fm/protocol.h>
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/tls/
H A Dtls_misc.c100 /* If "plist" contains invalid protocol names, TLS_PROTOCOL_INVALID is
673 TLScontext->protocol = 0;
/netbsd-6-1-5-RELEASE/usr.sbin/isdn/isdnd/
H A Disdnd.h528 int protocol; /* ISDN D-channel protocol */ member in struct:isdn_ctrl_state
H A Drc_config.c852 DBGL(DL_RCCF, (logit(LL_DBG, "controller %d: protocol = %s", cur_ctrl->isdnif, yylval.str)));
854 cur_ctrl->protocol = PROTOCOL_DSS1;
856 cur_ctrl->protocol = PROTOCOL_D64S;
859 logit(LL_ERR, "ERROR parsing config file: unknown parameter for keyword \"protocol\" at line %d!", lineno);
1546 fprintf(PFILE, "b1protocol = %s\n", cep->b1protocol ? "hdlc\t\t# B-channel layer 1 protocol is HDLC" : "raw\t\t# No B-channel layer 1 protocol used");
1638 fprintf(PFILE, "ppp-expect-auth = %s\t\t# the auth protocol we expect to receive on dial-in (none,pap,chap)\n", s);
1663 fprintf(PFILE, "ppp-send-auth = %s\t\t# the auth protocol we use when dialing out (none,pap,chap)\n", s);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dssh.c14 * incompatible with the protocol description in the RFC file, it must be
306 options.protocol = SSH_PROTO_1;
309 options.protocol = SSH_PROTO_2;
/netbsd-6-1-5-RELEASE/dist/ipf/
H A DHISTORY650 protocol handler was doing both v4 & v6, make a seperate function for each.
756 allow a trailing protocol name for map rules as well as rdr ones
764 add matching on IP protocol to ipnat map rules
797 ipfilter about how much data needs to be pulled up for a protocol to be
1211 record nat protocol in all nat log records
1216 lookup the protocol for NAT log information in ipmon and pass that to
1398 update addresses used in NAT mappings for 0/32 rules for any protocol but TCP
1781 fixup fwtk patches and add protocol field for SIOCGNATL.
1785 * rdr matched all packets of a given protocol (ignored ports).
2165 protocol (tc
[all...]
/netbsd-6-1-5-RELEASE/external/apache2/mDNSResponder/dist/Clients/
H A Ddns-sd.c697 static void DNSSD_API port_mapping_create_reply(DNSServiceRef sdref, DNSServiceFlags flags, uint32_t ifIndex, DNSServiceErrorType errorCode, uint32_t publicAddress, uint32_t protocol, uint16_t privatePort, uint16_t publicPort, uint32_t ttl, void *context) argument
712 printf("%-4d %-20s %-15d %-15d %-15d %-6d%s\n", ifIndex, addr, protocol, ntohs(privatePort), ntohs(publicPort), ttl, errorCode == kDNSServiceErr_DoubleNAT ? " Double NAT" : "");
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/ntpq/
H A Dntpq-opts.def156 Note that since NTP is a UDP protocol
/netbsd-6-1-5-RELEASE/sys/compat/linux/arch/alpha/
H A Dlinux_syscallargs.h232 syscallarg(int) protocol; member in struct:linux_sys_socket_args
392 syscallarg(int) protocol; member in struct:linux_sys_socketpair_args
/netbsd-6-1-5-RELEASE/usr.sbin/pppd/pppd/
H A Dsys-bsd.c1414 npi.protocol = proto;
1434 npi.protocol = PPP_IP;
/netbsd-6-1-5-RELEASE/sys/kern/
H A Duipc_syscalls.c100 syscallarg(int) protocol;
105 SCARG(uap, protocol), l, &fd);
442 syscallarg(int) protocol;
452 int proto = SCARG(uap, protocol);
/netbsd-6-1-5-RELEASE/sys/rump/librump/rumpkern/
H A Drump_syscalls.c1519 rump___sysimpl_socketpair(int domain, int type, int protocol, int * rsv)
1528 SPARG(&callarg, protocol) = protocol;
3524 rump___sysimpl_socket30(int domain, int type, int protocol)
3533 SPARG(&callarg, protocol) = protocol;
/netbsd-6-1-5-RELEASE/lib/librumphijack/
H A Dhijack.c1114 __socket30(int domain, int type, int protocol) argument
1126 fd = op_socket(domain, type, protocol);
/netbsd-6-1-5-RELEASE/sys/dev/pci/n8/common/api/commands/
H A Dn8_cb_ea.c2663 * @param protocol RO: The protocol (N8_TLS_CERT or N8_TLS_FINISH).
2697 N8_HashProtocol_t protocol,
2758 if (protocol == N8_TLS_FINISH)
2696 cb_ea_TLSHandshakeHash(API_Request_t *req_p, N8_HashProtocol_t protocol, uint32_t resMD5_a, uint32_t hashMsgMD5_a, N8_HashObject_t *hashMsgMD5_p, int md5Length, uint32_t resSHA1_a, uint32_t hashMsgSHA1_a, N8_HashObject_t *hashMsgSHA1_p, int sha1Length, uint32_t resMD5PRF_a, uint32_t resSHA1PRF_a, const N8_Buffer_t *key_p, int keyLength, uint32_t roleStr_a) argument

Completed in 404 milliseconds

<<11121314