/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | tsget | 151 REQUEST: foreach (@ARGV) { 166 or warn("$input: could not open input file: $!\n"), next REQUEST; 169 or warn("$input: could not close input file: $!\n"), next REQUEST; 188 or warn("$output: could not open output file: $!\n"), next REQUEST; 191 or warn("$output: could not close output file: $!\n"), next REQUEST;
|
/netbsd-6-1-5-RELEASE/usr.bin/rump_dhcpclient/ |
H A D | dhcp.c | 38 #define REQUEST (1 << 0) macro 52 #define IPV4R IPV4 | REQUEST 68 { 1, IPV4 | REQUEST, "subnet_mask" }, 74 { 33, IPV4 | ARRAY | REQUEST, "static_routes" }, 75 { 3, IPV4 | ARRAY | REQUEST, "routers" }, 101 { 28, IPV4 | REQUEST, "broadcast_address" }, 123 { 51, UINT32 | REQUEST, "dhcp_lease_time" }, 130 { 58, UINT32 | REQUEST, "dhcp_renewal_time" }, 131 { 59, UINT32 | REQUEST, "dhcp_rebinding_time" }, 720 if (!(opt->type & REQUEST || [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/VMS/ |
H A D | openssl_utils.com | 20 $! REQ could conflict with REQUEST.
|
/netbsd-6-1-5-RELEASE/libexec/httpd/ |
H A D | bozohttpd.h | 174 #define BOZOHOST(HTTPD,REQUEST) ((REQUEST)->hr_virthostname ? \ 175 (REQUEST)->hr_virthostname : \
|
/netbsd-6-1-5-RELEASE/external/bsd/dhcpcd/dist/ |
H A D | dhcp.c | 40 #define REQUEST (1 << 0) macro 55 #define IPV4R IPV4 | REQUEST 71 { 1, IPV4 | REQUEST, "subnet_mask" }, 77 { 33, IPV4 | ARRAY | REQUEST, "static_routes" }, 78 { 3, IPV4 | ARRAY | REQUEST, "routers" }, 104 { 28, IPV4 | REQUEST, "broadcast_address" }, 126 { 51, UINT32 | REQUEST, "dhcp_lease_time" }, 133 { 58, UINT32 | REQUEST, "dhcp_renewal_time" }, 134 { 59, UINT32 | REQUEST, "dhcp_rebinding_time" }, 1087 if (!(opt->type & REQUEST || [all...] |
/netbsd-6-1-5-RELEASE/dist/dhcp/includes/ |
H A D | dhctoken.h | 99 REQUEST = 299, enumerator in enum:dhcp_token
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 457 SM_STATE(BE_AUTH, REQUEST) 459 SM_ENTRY_MA(BE_AUTH, REQUEST, be_auth); 552 SM_ENTER(BE_AUTH, REQUEST); 561 SM_ENTER(BE_AUTH, REQUEST); 585 SM_ENTER(BE_AUTH, REQUEST); 593 SM_ENTER(BE_AUTH, REQUEST);
|
/netbsd-6-1-5-RELEASE/sys/dev/isa/ |
H A D | wt.c | 110 REQUEST, /* request command */ member in struct:wtregs 886 sc->regs.REQUEST | sc->regs.ONLINE); 1111 sc->regs.REQUEST | sc->regs.ONLINE); 1136 sc->regs.REQUEST | sc->regs.ONLINE);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 480 SM_STATE(SUPP_BE, REQUEST) 482 SM_ENTRY(SUPP_BE, REQUEST); 561 * IEEE Std 802.1X-2004 has transitions from REQUEST to FAIL 575 wpa_printf(MSG_DEBUG, "EAPOL: SUPP_BE REQUEST: both " 603 SM_ENTER(SUPP_BE, REQUEST); 612 SM_ENTER(SUPP_BE, REQUEST); 957 return "REQUEST";
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/ |
H A D | wpa_auth.c | 661 enum { PAIRWISE_2, PAIRWISE_4, GROUP_2, REQUEST, enumerator in enum:__anon2349 720 msg = REQUEST; 734 if (msg == REQUEST || msg == PAIRWISE_2 || msg == PAIRWISE_4 || 880 case REQUEST:
|
/netbsd-6-1-5-RELEASE/external/gpl2/xcvs/dist/src/ |
H A D | sanity.sh | 30387 BEGIN AUTH REQUEST 30391 END AUTH REQUEST 30399 echo "BEGIN AUTH REQUEST" >garbageinput 30423 BEGIN AUTH REQUEST 30427 END AUTH REQUEST 30435 BEGIN AUTH REQUEST 30439 END AUTH REQUEST 30446 BEGIN AUTH REQUEST 30450 END AUTH REQUEST 30459 BEGIN AUTH REQUEST [all...] |
/netbsd-6-1-5-RELEASE/dist/dhcp/client/ |
H A D | clparse.c | 228 REQUEST option-list | 411 case REQUEST:
|
/netbsd-6-1-5-RELEASE/dist/dhcp/common/ |
H A D | conflex.c | 953 return REQUEST;
|
H A D | parse.c | 3792 case REQUEST:
|