/freebsd-current/contrib/bmake/unit-tests/ |
H A D | ternary.exp | 1 The answer is unknown 2 The answer is unknown 3 The answer is empty 4 The answer is known 5 The answer is 6 The answer is empty 7 The answer is known 8 The answer is 42 9 The answer is 42
|
H A D | var-readonly.mk | 3 # the answer
|
/freebsd-current/sbin/ping/ |
H A D | utils.c | 52 u_short answer; local 82 answer = ~sum; /* truncate to 16 bits */ 83 return(answer);
|
/freebsd-current/contrib/telnet/libtelnet/ |
H A D | getent.c | 62 char *answer, *tempid; local 65 retval = cgetstr(area, tempid, &answer); 67 return((retval > 0) ? answer : NULL);
|
/freebsd-current/libexec/talkd/ |
H A D | process.c | 67 rp->answer = BADVERSION; 75 rp->answer = BADADDR; 82 rp->answer = BADCTLADDR; 88 rp->answer = FAILED; 104 rp->answer = SUCCESS; 115 rp->answer = SUCCESS; 117 rp->answer = NOT_HERE; 121 rp->answer = delete_invite(mp->id_num); 125 rp->answer = UNKNOWN_REQUEST; 142 rp->answer [all...] |
H A D | print.c | 77 if (rp->answer > NANSWERS) { 78 (void)snprintf(abuf, sizeof(abuf), "answer %d", rp->answer); 81 ap = answers[rp->answer];
|
/freebsd-current/include/protocols/ |
H A D | talkd.h | 68 u_char answer; /* not used */ member in struct:__anon54 87 u_char answer; /* respose to request message, see below */ member in struct:__anon55 101 /* answer values */
|
/freebsd-current/crypto/openssh/openbsd-compat/ |
H A D | getrrsetbyname.c | 173 struct dns_rr *answer; member in struct:dns_response 203 u_char answer[ANSWER_BUFFER_SIZE]; local 241 answer, sizeof(answer)); 257 response = parse_dns_response(answer, length); 276 rrset->rri_ttl = response->answer->ttl; 285 /* copy name from answer section */ 286 rrset->rri_name = strdup(response->answer->name); 293 rrset->rri_nrdatas = count_dns_rr(response->answer, rrset->rri_rdclass, 295 rrset->rri_nsigs = count_dns_rr(response->answer, rrse 388 parse_dns_response(const u_char *answer, int size) argument 456 parse_dns_qsection(const u_char *answer, int size, const u_char **cp, int count) argument 514 parse_dns_rrsection(const u_char *answer, int size, const u_char **cp, int count) argument [all...] |
/freebsd-current/crypto/heimdal/kdc/ |
H A D | digest-service.c | 131 struct ntlm_buf infotarget, answer; local 133 answer.length = ntq.ntChallengeResponce.length; 134 answer.data = ntq.ntChallengeResponce.data; 142 &answer, 153 struct ntlm_buf answer; local 174 ntq.lmchallenge.data, &answer); 178 if (ntq.ntChallengeResponce.length != answer.length || 179 memcmp(ntq.ntChallengeResponce.data, answer.data, answer.length) != 0) { 180 free(answer [all...] |
/freebsd-current/lib/libc/resolv/ |
H A D | res_update.c | 56 * nameservers for that zone, and await answer. 95 u_char answer[PACKETSZ]; local 176 answer, sizeof answer); 179 n = res_nsend(statp, packet, n, answer, sizeof answer); 185 if (((HEADER *)answer)->rcode == NOERROR)
|
H A D | res_query.c | 96 * Formulate a normal query, send, and await answer. 97 * Returned answer is placed in supplied buffer "answer". 98 * Perform preliminary check of answer, returning success only 99 * if no error is indicated and the answer count is nonzero. 103 * Caller must parse answer and determine whether it answers the question. 109 u_char *answer, /*%< buffer to put answer */ 110 int anslen) /*%< size of answer buffer */ 113 HEADER *hp = (HEADER *) answer; 106 res_nquery(res_state statp, const char *name, int class, int type, u_char *answer, int anslen) argument 207 res_nsearch(res_state statp, const char *name, int class, int type, u_char *answer, int anslen) argument 401 res_nquerydomain(res_state statp, const char *name, const char *domain, int class, int type, u_char *answer, int anslen) argument [all...] |
H A D | res_data.c | 162 u_char *answer, /*!< buffer to put answer */ 163 int anslen) /*!< size of answer buffer */ 170 return (res_nquery(statp, name, class, type, answer, anslen)); 235 u_char *answer, /*!< buffer to put answer */ 236 int anslen) /*!< size of answer */ 244 return (res_nsearch(statp, name, class, type, answer, anslen)); 251 u_char *answer, /*!< buffer to put answer */ 160 res_query(const char *name, int class, int type, u_char *answer, int anslen) argument 233 res_search(const char *name, int class, int type, u_char *answer, int anslen) argument 248 res_querydomain(const char *name, const char *domain, int class, int type, u_char *answer, int anslen) argument [all...] |
/freebsd-current/contrib/sendmail/contrib/ |
H A D | bitdomain.c | 215 querybuf answer; local 234 &answer, sizeof(answer)); 268 hp = (HEADER *) &answer; 269 ap = (u_char *) &answer + sizeof(HEADER); 270 eom = (u_char *) &answer + ret; 283 n = dn_expand((u_char *) &answer, eom, ap, 299 if ((ret = dn_expand((u_char *)&answer,
|
/freebsd-current/contrib/unbound/testdata/ip_ratelimit.tdir/ |
H A D | ip_ratelimit.conf | 17 answer-cookie: yes
|
/freebsd-current/contrib/unbound/testdata/stat_values.tdir/ |
H A D | stat_values_downstream_cookies.conf | 21 answer-cookie: yes
|
/freebsd-current/usr.bin/talk/ |
H A D | invite.c | 130 "answer #0", /* SUCCESS */ 153 if (response.answer != SUCCESS) { 154 if (response.answer < NANSWERS) 155 message(answers[response.answer]); 174 * and don't wait for an answer
|
H A D | look_up.c | 103 switch (rp->answer) {
|
/freebsd-current/contrib/libxo/tests/xo/ |
H A D | xo_02.sh | 36 ${XOP} --open answer 39 ${XOP} --close answer
|
/freebsd-current/crypto/heimdal/lib/ntlm/ |
H A D | test_ntlm.c | 190 struct ntlm_buf infotarget, infotarget2, answer, key; local 203 answer.length = 0; 204 answer.data = NULL; 215 &answer); 225 &answer, 241 free(answer.data);
|
H A D | ntlm.c | 1017 unsigned char *answer) 1036 EVP_Cipher(ctx, answer, challenge, 8); 1094 * @param answer calculated answer, should be freed with heim_ntlm_free_buf(). 1105 struct ntlm_buf *answer) 1116 answer->data = malloc(24); 1117 if (answer->data == NULL) 1119 answer->length = 24; 1121 ret = splitandenc(&res[0], challenge, ((unsigned char *)answer->data) + 0); 1124 ret = splitandenc(&res[7], challenge, ((unsigned char *)answer 1015 splitandenc(unsigned char *hash, unsigned char *challenge, unsigned char *answer) argument 1103 heim_ntlm_calculate_ntlm1(void *key, size_t len, unsigned char challenge[8], struct ntlm_buf *answer) argument 1458 heim_ntlm_calculate_lm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], unsigned char ntlmv2[16], struct ntlm_buf *answer) argument 1510 heim_ntlm_calculate_ntlm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], const struct ntlm_buf *infotarget, unsigned char ntlmv2[16], struct ntlm_buf *answer) argument 1611 heim_ntlm_verify_ntlm2(const void *key, size_t len, const char *username, const char *target, time_t now, const unsigned char serverchallenge[8], const struct ntlm_buf *answer, struct ntlm_buf *infotarget, unsigned char ntlmv2[16]) argument [all...] |
/freebsd-current/lib/libc/net/ |
H A D | gethostbydns.c | 135 gethostanswer(const querybuf *answer, int anslen, const char *qname, int qtype, argument 152 eom = answer->buf + anslen; 166 * find first satisfactory answer 168 hp = &answer->hdr; 173 cp = answer->buf; 179 n = dn_expand(answer->buf, eom, cp, bp, ep - bp); 210 n = dn_expand(answer->buf, eom, cp, bp, ep - bp); 236 n = dn_expand(answer->buf, eom, cp, tbuf, sizeof tbuf); 266 n = dn_expand(answer->buf, eom, cp, tbuf, sizeof tbuf); 307 n = dn_expand(answer 431 __dns_getanswer(const char *answer, int anslen, const char *qname, int qtype) argument [all...] |
H A D | getnetbydns.c | 152 getnetanswer(querybuf *answer, int anslen, int net_i, struct netent *ne, argument 166 * find first satisfactory answer 168 * answer --> +------------+ ( MESSAGE ) 179 eom = answer->buf + anslen; 180 hp = &answer->hdr; 181 ancount = ntohs(hp->ancount); /* #/records in the answer section */ 185 cp = answer->buf + HFIXEDSZ; 200 n = dn_expand(answer->buf, eom, cp, bp, ep - bp); 212 n = dn_expand(answer->buf, eom, cp, bp, ep - bp);
|
/freebsd-current/contrib/sendmail/src/ |
H A D | domain.c | 878 querybuf answer; local 972 hp = (HEADER *)&answer; 973 n = (*resfunc)(host, C_IN, T_MX, (unsigned char *) &answer, 974 sizeof(answer)); 1036 if (n > sizeof(answer)) 1037 n = sizeof(answer); 1039 /* find first satisfactory answer */ 1040 cp = (unsigned char *)&answer + HFIXEDSZ; 1041 eom = (unsigned char *)&answer + n; 1061 if ((n = dn_expand((unsigned char *)&answer, eo 1628 querybuf answer; local [all...] |
/freebsd-current/crypto/heimdal/kuser/ |
H A D | kdigest.c | 278 struct ntlm_buf answer; local 302 ret = heim_ntlm_calculate_ntlm1(hmd, sizeof(hmd), md, &answer); 306 hex_encode(answer.data, answer.length, &h); 319 EVP_DigestUpdate(ctx, answer.data, answer.length); 343 EVP_DigestUpdate(ctx, answer.data, answer.length); 347 free(answer.data);
|
/freebsd-current/contrib/less/ |
H A D | edit.c | 434 int answer; local 584 answer = query("\"%s\" may be a binary file. See it anyway? ", 586 if (answer != 'y' && answer != 'Y') 935 int answer; local 961 answer = 'O'; 968 answer = query("Warning: \"%s\" exists; "OVERWRITE_OPTIONS" ", &parg); 972 switch (answer) 1001 answer = query(OVERWRITE_OPTIONS" (Type \"O\", \"A\", \"D\" or \"Q\") ", NULL_PARG);
|