/netbsd/sys/arch/alpha/alpha/ |
H A D | dec_3000_500.c | 178 scsiboot = (strcmp(b->protocol, "SCSI") == 0); in dec_3000_500_device_register() 179 netboot = (strcmp(b->protocol, "BOOTP") == 0) || in dec_3000_500_device_register() 180 (strcmp(b->protocol, "MOP") == 0); in dec_3000_500_device_register()
|
H A D | dec_eb64plus.c | 198 diskboot = (strcasecmp(b->protocol, "SCSI") == 0); in dec_eb64plus_device_register() 199 netboot = (strcasecmp(b->protocol, "BOOTP") == 0) || in dec_eb64plus_device_register() 200 (strcasecmp(b->protocol, "MOP") == 0); in dec_eb64plus_device_register()
|
H A D | dec_eb66.c | 190 diskboot = (strcasecmp(b->protocol, "SCSI") == 0); in dec_eb66_device_register() 191 netboot = (strcasecmp(b->protocol, "BOOTP") == 0) || in dec_eb66_device_register() 192 (strcasecmp(b->protocol, "MOP") == 0); in dec_eb66_device_register()
|
H A D | dec_alphabook1.c | 190 diskboot = (strcasecmp(b->protocol, "SCSI") == 0); in dec_alphabook1_device_register() 191 netboot = (strcasecmp(b->protocol, "BOOTP") == 0) || in dec_alphabook1_device_register() 192 (strcasecmp(b->protocol, "MOP") == 0); in dec_alphabook1_device_register()
|
H A D | dec_kn300.c | 234 diskboot = (strcasecmp(b->protocol, "SCSI") == 0) || in dec_kn300_device_register() 235 (strcasecmp(b->protocol, "RAID") == 0); in dec_kn300_device_register() 236 netboot = (strcasecmp(b->protocol, "BOOTP") == 0) || in dec_kn300_device_register() 237 (strcasecmp(b->protocol, "MOP") == 0); in dec_kn300_device_register() 239 printf("proto:%s bus:%d slot:%d chan:%d", b->protocol, in dec_kn300_device_register()
|
/netbsd/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | SSL_CIPHER_get_name.pod | 60 SSL_CIPHER_get_version() returns string which indicates the SSL/TLS protocol 107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given 125 =item <protocol version> 127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>. 128 Note that this is not always the same as the protocol version in which the 130 with earlier protocol versions. 181 protocol-specific ID. 191 correct protocol string in OpenSSL 1.1.0.
|
/netbsd/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | SSL_CIPHER_get_name.pod | 60 SSL_CIPHER_get_version() returns string which indicates the SSL/TLS protocol 107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given 125 =item <protocol version> 127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>. 128 Note that this is not always the same as the protocol version in which the 130 with earlier protocol versions. 181 protocol-specific ID. 191 correct protocol string in OpenSSL 1.1.0.
|
/netbsd/external/mpl/bind/dist/lib/dns/ |
H A D | zonekey.c | 49 if (key.protocol != DNS_KEYPROTO_DNSSEC && in dns_zonekey_iszonekey() 50 key.protocol != DNS_KEYPROTO_ANY) in dns_zonekey_iszonekey()
|
/netbsd/external/gpl3/gdb/dist/gdbsupport/ |
H A D | filestuff.cc | 367 gdb_socketpair_cloexec (int domain, int style, int protocol, in gdb_socketpair_cloexec() argument 371 int result = socketpair (domain, style | SOCK_CLOEXEC, protocol, filedes); in gdb_socketpair_cloexec() 388 gdb_socket_cloexec (int domain, int style, int protocol) in gdb_socket_cloexec() argument 390 int result = socket (domain, style | SOCK_CLOEXEC, protocol); in gdb_socket_cloexec()
|
H A D | filestuff.h | 102 extern int gdb_socketpair_cloexec (int domain, int style, int protocol, 108 extern int gdb_socket_cloexec (int domain, int style, int protocol);
|
/netbsd/external/bsd/openldap/dist/clients/tools/ |
H A D | ldapmodrdn.c | 113 if( protocol == LDAP_VERSION2 ) { in handle_private_option() 143 if( protocol == LDAP_VERSION2 ) { in handle_private_option() 145 prog, protocol ); in handle_private_option() 149 protocol = LDAP_VERSION3; in handle_private_option()
|
H A D | ldapwhoami.c | 80 if( protocol == LDAP_VERSION2 ) { in handle_private_option() 82 prog, protocol ); in handle_private_option() 128 protocol = LDAP_VERSION3; in main()
|
/netbsd/external/gpl3/gdb.old/dist/gdbsupport/ |
H A D | filestuff.cc | 367 gdb_socketpair_cloexec (int domain, int style, int protocol, in gdb_socketpair_cloexec() argument 371 int result = socketpair (domain, style | SOCK_CLOEXEC, protocol, filedes); in gdb_socketpair_cloexec() 388 gdb_socket_cloexec (int domain, int style, int protocol) in gdb_socket_cloexec() argument 390 int result = socket (domain, style | SOCK_CLOEXEC, protocol); in gdb_socket_cloexec()
|
H A D | filestuff.h | 102 extern int gdb_socketpair_cloexec (int domain, int style, int protocol, 108 extern int gdb_socket_cloexec (int domain, int style, int protocol);
|
/netbsd/external/bsd/wpa/dist/src/l2_packet/ |
H A D | l2_packet_linux.c | 269 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument 290 htons(protocol)); in l2_packet_init() 311 ll.sll_protocol = htons(protocol); in l2_packet_init() 337 unsigned short protocol, in l2_packet_init_bridge() argument 348 BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, protocol, 0, 1), in l2_packet_init_bridge() 361 l2 = l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
|
H A D | l2_packet_privsep.c | 129 const char *ifname, const u8 *own_addr, unsigned short protocol, in l2_packet_init() argument 183 reg_cmd[0] = protocol; in l2_packet_init() 236 unsigned short protocol, in l2_packet_init_bridge() argument 241 return l2_packet_init(br_ifname, own_addr, protocol, rx_callback, in l2_packet_init_bridge()
|
/netbsd/external/ibm-public/postfix/dist/src/util/ |
H A D | find_inet.c | 96 int find_inet_port(const char *service, const char *protocol) in find_inet_port() argument 107 if ((sp = getservbyname(service, protocol)) == 0) in find_inet_port() 108 msg_fatal("unknown service: %s/%s", service, protocol); in find_inet_port()
|
/netbsd/external/bsd/file/dist/magic/magdir/ |
H A D | diamond | 11 #0 string <list>\n<protocol\ bbn-multimedia-format> Diamond Multimedia Document 12 0 string =<list>\n<protocol\ bbn-m Diamond Multimedia Document
|
H A D | epoc | 51 >4 lelong 0x1000004A comms protocol library 57 >4 lelong 0x100000E5 file transfer protocol 58 >4 lelong 0x100000E5 file transfer protocol
|
/netbsd/external/mpl/bind/dist/lib/dns/include/dst/ |
H A D | dst.h | 515 unsigned int protocol, dns_rdataclass_t rdclass, 610 unsigned int protocol, dns_rdataclass_t rdclass, 616 unsigned int protocol, dns_rdataclass_t rdclass, 622 unsigned int param, unsigned int flags, unsigned int protocol, 1073 unsigned int protocol, dns_rdataclass_t rdclass,
|
/netbsd/external/mpl/bind/dist/bin/dnssec/ |
H A D | dnssec-keygen.c | 92 int protocol; member 608 if (ctx->protocol == -1) { in keygen() 609 ctx->protocol = DNS_KEYPROTO_DNSSEC; in keygen() 611 ctx->protocol != DNS_KEYPROTO_DNSSEC) in keygen() 613 fatal("invalid DNSKEY protocol: %d", ctx->protocol); in keygen() 663 flags, ctx->protocol, in keygen() 670 flags, ctx->protocol, in keygen() 882 .protocol = -1, in main() 1009 ctx.protocol = strtol(isc_commandline_argument, &endp, in main() 1011 if (*endp != '\0' || ctx.protocol < 0 || in main() [all …]
|
/netbsd/usr.sbin/mopd/common/ |
H A D | pf-linux2.c | 89 pfInit(char *interface, int mode, u_short protocol, int typ) in pfInit() argument 99 prot = ((typ == TRANS_8023) ? htons(ETH_P_802_2) : htons(protocol)); in pfInit() 115 if (setup_pf(s, protocol, typ) < 0) in pfInit()
|
H A D | pf.c | 71 pfInit(const char *interface, int mode, u_short protocol, int typ) in pfInit() argument 134 insns[1].k = protocol; in pfInit() 135 insns[3].k = protocol; in pfInit()
|
/netbsd/external/ibm-public/postfix/dist/src/smtpd/ |
H A D | smtpd_state.c | 111 state->protocol = mystrdup(MAIL_PROTO_SMTP); in smtpd_state_init() 214 if (state->protocol) in smtpd_state_reset() 215 myfree(state->protocol); in smtpd_state_reset()
|
/netbsd/sys/kern/ |
H A D | uipc_mbufdebug.c | 89 uint16_t protocol; member 358 uint16_t protocol; in m_examine_ppp() local 373 protocol = ntohs(h.protocol); in m_examine_ppp() 379 (*pr)("SPPP: Protocol = %d(", protocol); in m_examine_ppp() 380 switch (protocol) { in m_examine_ppp() 416 (*pr)("SPPP: Protocol = %d(", protocol); in m_examine_ppp() 417 switch (protocol) { in m_examine_ppp() 439 (*pr)("No parser for address %d, protocol %d\n", h.address, protocol); in m_examine_ppp()
|