Searched refs:nmap (Results 1 – 8 of 8) sorted by relevance
912 const struct attrmap *map, size_t nmap) in ikev1_attrmap_print() argument929 if (map && t < nmap && map[t].type) in ikev1_attrmap_print()1229 size_t nmap; in ikev1_t_print() local1246 nmap = sizeof(ipsec_t_map)/sizeof(ipsec_t_map[0]); in ikev1_t_print()1251 nmap = sizeof(ipsec_t_map)/sizeof(ipsec_t_map[0]); in ikev1_t_print()1261 nmap = 0; in ikev1_t_print()1272 if (map && nmap) in ikev1_t_print()1920 size_t nmap; in ikev2_t_print() local1930 nmap = 0; in ikev2_t_print()1937 nmap = sizeof(encr_t_map)/sizeof(encr_t_map[0]); in ikev2_t_print()[all …]
1 nmap <C-L> :!ld\ -o\ %<\ -L\ /usr/lib/gcc/mips-linux-gnu/4.1.2/crtbegin.o\ %.o\ -lc
284 struct pollfd **nmap; in eloop_sock_table_add_sock() local285 nmap = os_realloc_array(eloop.pollfds_map, new_max_sock + 50, in eloop_sock_table_add_sock()287 if (nmap == NULL) in eloop_sock_table_add_sock()291 eloop.pollfds_map = nmap; in eloop_sock_table_add_sock()
39 nmap <silent> <Leader>f :call DragonFly_Style()<CR>
163 # the case that X is a NAT firewall. While nmap is talking to the
1280 nmap 689/tcp1281 nmap 689/udp
656 complete nmap 'n@-e@`ifconfig -l`@' 'p/*/$hostnames/'
420 # prevents nmap et al. from identifying the TCP/IP stack, but breaks support