/macosx-10.10/bootp-298/bootpd.tproj/ |
H A D | bsdpd.h | 56 dhcpol_t * rq_vsopt, bsdp_version_t * client_version, 62 bsdp_version_t client_version, boolean_t is_old_netboot);
|
H A D | macNC.h | 85 u_int * client_version);
|
H A D | bsdpd.c | 1331 dhcpol_t * rq_vsopt, bsdp_version_t * client_version, 1368 *client_version = ntohs(*vers); 1369 switch (*client_version) { 1377 *client_version); 1381 if (client_version == BSDP_VERSION_0_0 1512 bsdp_version_t client_version, boolean_t is_old_netboot) 1850 if (client_version == BSDP_VERSION_1_0) { 1330 is_bsdp_packet(dhcpol_t * rq_options, char * arch, char * sysid, dhcpol_t * rq_vsopt, bsdp_version_t * client_version, boolean_t * is_old_netboot) argument 1510 bsdp_request(request_t * request, dhcp_msgtype_t dhcpmsg, const char * arch, const char * sysid, dhcpol_t * rq_vsopt, bsdp_version_t client_version, boolean_t is_old_netboot) argument
|
H A D | macNC.c | 232 * TRUE and client_version if client version is present in packet 237 u_int * client_version) 256 if (client_version) 257 *client_version = ntohl(*((unsigned long *)vers)); 236 macNC_get_client_info(struct dhcp * pkt, int pkt_size, dhcpol_t * options, u_int * client_version) argument
|
H A D | bootpd.c | 1993 bsdp_version_t client_version; local 1999 &rq_vsopt, &client_version, 2008 arch, sysid, &rq_vsopt, client_version,
|
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | tls1.h | 99 ((s->client_version >> 8) == TLS1_VERSION_MAJOR ? s->client_version : 0)
|
H A D | ssl.h | 1028 int client_version; /* what was passed, used for member in struct:ssl_st
|
/macosx-10.10/OpenSSL098-52/src/ssl/ |
H A D | tls1.h | 99 ((s->client_version >> 8) == TLS1_VERSION_MAJOR ? s->client_version : 0)
|
H A D | s3_srvr.c | 781 s->client_version=(((int)p[0])<<8)|(int)p[1]; 784 if ((s->version == DTLS1_VERSION && s->client_version > s->version) || 785 (s->version != DTLS1_VERSION && s->client_version < s->version)) 788 if ((s->client_version>>8) == SSL3_VERSION_MAJOR) 791 s->version = s->client_version; 1862 s->client_version != DTLS1_BAD_VER) 1889 if ((al == -1) && !((p[0] == (s->client_version>>8)) && (p[1] == (s->client_version & 0xff)))) 1921 p[0] = s->client_version >> 8; 1922 p[1] = s->client_version [all...] |
H A D | s23_clnt.c | 287 s->client_version = version; 508 if (!(s->client_version == SSL2_VERSION))
|
H A D | d1_pkt.c | 587 s->client_version = version; 1080 if (s->client_version == DTLS1_BAD_VER || s->version == DTLS1_BAD_VER) 1113 if (s->client_version == DTLS1_BAD_VER) 1406 if (s->client_version == DTLS1_BAD_VER)
|
H A D | s23_srvr.c | 244 * 9/10 client_version / 325 /* We must look at client_version inside the Client Hello message 350 v[1]=p[10]; /* minor version according to client_version */ 447 /* client_version */ 570 s->client_version=(v[0]<<8)|v[1];
|
H A D | d1_clnt.c | 636 s->client_version=s->version; 815 tmp_buf[0]=s->client_version>>8; 816 tmp_buf[1]=s->client_version&0xff;
|
H A D | d1_srvr.c | 311 if (s->client_version != DTLS1_BAD_VER) 705 if (s->client_version == DTLS1_BAD_VER) 756 if (s->client_version == DTLS1_BAD_VER)
|
H A D | s3_clnt.c | 625 s->client_version=s->version; 1934 tmp_buf[0]=s->client_version>>8; 1935 tmp_buf[1]=s->client_version&0xff; 2064 tmp_buf[0]=s->client_version>>8; 2065 tmp_buf[1]=s->client_version&0xff;
|
H A D | d1_both.c | 362 if (frag_off == 0 && s->client_version != DTLS1_BAD_VER) 986 if (s->client_version == DTLS1_BAD_VER)
|
H A D | t1_enc.c | 719 (ssl->version == DTLS1_VERSION && ssl->client_version != DTLS1_BAD_VER))
|
H A D | t1_lib.c | 137 if (s->client_version == SSL3_VERSION
|
H A D | ssl.h | 1028 int client_version; /* what was passed, used for member in struct:ssl_st
|
H A D | ssl_lib.c | 193 s->client_version=s->version;
|
/macosx-10.10/bootp-298/BSDPClient/ |
H A D | BSDPClient.c | 147 bsdp_version_t client_version; /* network order */ member in struct:BSDPClient_s 850 bsdp_version_t client_version = htons(BSDP_VERSION_1_1); local 936 client->client_version = client_version; 1262 sizeof(client->client_version), 1263 &client->client_version) != dhcpoa_success_e) { 1462 sizeof(client->client_version), 1463 &client->client_version) != dhcpoa_success_e) {
|