Searched refs:answer (Results 1 - 25 of 62) sorted by relevance

123

/freebsd-current/contrib/bmake/unit-tests/
H A Dternary.exp1 The answer is unknown
2 The answer is unknown
3 The answer is empty
4 The answer is known
5 The answer is
6 The answer is empty
7 The answer is known
8 The answer is 42
9 The answer is 42
H A Dvar-readonly.mk3 # the answer
/freebsd-current/sbin/ping/
H A Dutils.c52 u_short answer; local
82 answer = ~sum; /* truncate to 16 bits */
83 return(answer);
/freebsd-current/contrib/telnet/libtelnet/
H A Dgetent.c62 char *answer, *tempid; local
65 retval = cgetstr(area, tempid, &answer);
67 return((retval > 0) ? answer : NULL);
/freebsd-current/libexec/talkd/
H A Dprocess.c67 rp->answer = BADVERSION;
75 rp->answer = BADADDR;
82 rp->answer = BADCTLADDR;
88 rp->answer = FAILED;
104 rp->answer = SUCCESS;
115 rp->answer = SUCCESS;
117 rp->answer = NOT_HERE;
121 rp->answer = delete_invite(mp->id_num);
125 rp->answer = UNKNOWN_REQUEST;
142 rp->answer
[all...]
H A Dprint.c77 if (rp->answer > NANSWERS) {
78 (void)snprintf(abuf, sizeof(abuf), "answer %d", rp->answer);
81 ap = answers[rp->answer];
/freebsd-current/include/protocols/
H A Dtalkd.h68 u_char answer; /* not used */ member in struct:__anon54
87 u_char answer; /* respose to request message, see below */ member in struct:__anon55
101 /* answer values */
/freebsd-current/crypto/openssh/openbsd-compat/
H A Dgetrrsetbyname.c173 struct dns_rr *answer; member in struct:dns_response
203 u_char answer[ANSWER_BUFFER_SIZE]; local
241 answer, sizeof(answer));
257 response = parse_dns_response(answer, length);
276 rrset->rri_ttl = response->answer->ttl;
285 /* copy name from answer section */
286 rrset->rri_name = strdup(response->answer->name);
293 rrset->rri_nrdatas = count_dns_rr(response->answer, rrset->rri_rdclass,
295 rrset->rri_nsigs = count_dns_rr(response->answer, rrse
388 parse_dns_response(const u_char *answer, int size) argument
456 parse_dns_qsection(const u_char *answer, int size, const u_char **cp, int count) argument
514 parse_dns_rrsection(const u_char *answer, int size, const u_char **cp, int count) argument
[all...]
/freebsd-current/crypto/heimdal/kdc/
H A Ddigest-service.c131 struct ntlm_buf infotarget, answer; local
133 answer.length = ntq.ntChallengeResponce.length;
134 answer.data = ntq.ntChallengeResponce.data;
142 &answer,
153 struct ntlm_buf answer; local
174 ntq.lmchallenge.data, &answer);
178 if (ntq.ntChallengeResponce.length != answer.length ||
179 memcmp(ntq.ntChallengeResponce.data, answer.data, answer.length) != 0) {
180 free(answer
[all...]
/freebsd-current/lib/libc/resolv/
H A Dres_update.c56 * nameservers for that zone, and await answer.
95 u_char answer[PACKETSZ]; local
176 answer, sizeof answer);
179 n = res_nsend(statp, packet, n, answer, sizeof answer);
185 if (((HEADER *)answer)->rcode == NOERROR)
H A Dres_query.c96 * Formulate a normal query, send, and await answer.
97 * Returned answer is placed in supplied buffer "answer".
98 * Perform preliminary check of answer, returning success only
99 * if no error is indicated and the answer count is nonzero.
103 * Caller must parse answer and determine whether it answers the question.
109 u_char *answer, /*%< buffer to put answer */
110 int anslen) /*%< size of answer buffer */
113 HEADER *hp = (HEADER *) answer;
106 res_nquery(res_state statp, const char *name, int class, int type, u_char *answer, int anslen) argument
207 res_nsearch(res_state statp, const char *name, int class, int type, u_char *answer, int anslen) argument
401 res_nquerydomain(res_state statp, const char *name, const char *domain, int class, int type, u_char *answer, int anslen) argument
[all...]
H A Dres_data.c162 u_char *answer, /*!< buffer to put answer */
163 int anslen) /*!< size of answer buffer */
170 return (res_nquery(statp, name, class, type, answer, anslen));
235 u_char *answer, /*!< buffer to put answer */
236 int anslen) /*!< size of answer */
244 return (res_nsearch(statp, name, class, type, answer, anslen));
251 u_char *answer, /*!< buffer to put answer */
160 res_query(const char *name, int class, int type, u_char *answer, int anslen) argument
233 res_search(const char *name, int class, int type, u_char *answer, int anslen) argument
248 res_querydomain(const char *name, const char *domain, int class, int type, u_char *answer, int anslen) argument
[all...]
/freebsd-current/contrib/sendmail/contrib/
H A Dbitdomain.c215 querybuf answer; local
234 &answer, sizeof(answer));
268 hp = (HEADER *) &answer;
269 ap = (u_char *) &answer + sizeof(HEADER);
270 eom = (u_char *) &answer + ret;
283 n = dn_expand((u_char *) &answer, eom, ap,
299 if ((ret = dn_expand((u_char *)&answer,
/freebsd-current/contrib/unbound/testdata/ip_ratelimit.tdir/
H A Dip_ratelimit.conf17 answer-cookie: yes
/freebsd-current/contrib/unbound/testdata/stat_values.tdir/
H A Dstat_values_downstream_cookies.conf21 answer-cookie: yes
/freebsd-current/usr.bin/talk/
H A Dinvite.c130 "answer #0", /* SUCCESS */
153 if (response.answer != SUCCESS) {
154 if (response.answer < NANSWERS)
155 message(answers[response.answer]);
174 * and don't wait for an answer
H A Dlook_up.c103 switch (rp->answer) {
/freebsd-current/contrib/libxo/tests/xo/
H A Dxo_02.sh36 ${XOP} --open answer
39 ${XOP} --close answer
/freebsd-current/crypto/heimdal/lib/ntlm/
H A Dtest_ntlm.c190 struct ntlm_buf infotarget, infotarget2, answer, key; local
203 answer.length = 0;
204 answer.data = NULL;
215 &answer);
225 &answer,
241 free(answer.data);
H A Dntlm.c1017 unsigned char *answer)
1036 EVP_Cipher(ctx, answer, challenge, 8);
1094 * @param answer calculated answer, should be freed with heim_ntlm_free_buf().
1105 struct ntlm_buf *answer)
1116 answer->data = malloc(24);
1117 if (answer->data == NULL)
1119 answer->length = 24;
1121 ret = splitandenc(&res[0], challenge, ((unsigned char *)answer->data) + 0);
1124 ret = splitandenc(&res[7], challenge, ((unsigned char *)answer
1015 splitandenc(unsigned char *hash, unsigned char *challenge, unsigned char *answer) argument
1103 heim_ntlm_calculate_ntlm1(void *key, size_t len, unsigned char challenge[8], struct ntlm_buf *answer) argument
1458 heim_ntlm_calculate_lm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], unsigned char ntlmv2[16], struct ntlm_buf *answer) argument
1510 heim_ntlm_calculate_ntlm2(const void *key, size_t len, const char *username, const char *target, const unsigned char serverchallenge[8], const struct ntlm_buf *infotarget, unsigned char ntlmv2[16], struct ntlm_buf *answer) argument
1611 heim_ntlm_verify_ntlm2(const void *key, size_t len, const char *username, const char *target, time_t now, const unsigned char serverchallenge[8], const struct ntlm_buf *answer, struct ntlm_buf *infotarget, unsigned char ntlmv2[16]) argument
[all...]
/freebsd-current/lib/libc/net/
H A Dgethostbydns.c135 gethostanswer(const querybuf *answer, int anslen, const char *qname, int qtype, argument
152 eom = answer->buf + anslen;
166 * find first satisfactory answer
168 hp = &answer->hdr;
173 cp = answer->buf;
179 n = dn_expand(answer->buf, eom, cp, bp, ep - bp);
210 n = dn_expand(answer->buf, eom, cp, bp, ep - bp);
236 n = dn_expand(answer->buf, eom, cp, tbuf, sizeof tbuf);
266 n = dn_expand(answer->buf, eom, cp, tbuf, sizeof tbuf);
307 n = dn_expand(answer
431 __dns_getanswer(const char *answer, int anslen, const char *qname, int qtype) argument
[all...]
H A Dgetnetbydns.c152 getnetanswer(querybuf *answer, int anslen, int net_i, struct netent *ne, argument
166 * find first satisfactory answer
168 * answer --> +------------+ ( MESSAGE )
179 eom = answer->buf + anslen;
180 hp = &answer->hdr;
181 ancount = ntohs(hp->ancount); /* #/records in the answer section */
185 cp = answer->buf + HFIXEDSZ;
200 n = dn_expand(answer->buf, eom, cp, bp, ep - bp);
212 n = dn_expand(answer->buf, eom, cp, bp, ep - bp);
/freebsd-current/contrib/sendmail/src/
H A Ddomain.c878 querybuf answer; local
972 hp = (HEADER *)&answer;
973 n = (*resfunc)(host, C_IN, T_MX, (unsigned char *) &answer,
974 sizeof(answer));
1036 if (n > sizeof(answer))
1037 n = sizeof(answer);
1039 /* find first satisfactory answer */
1040 cp = (unsigned char *)&answer + HFIXEDSZ;
1041 eom = (unsigned char *)&answer + n;
1061 if ((n = dn_expand((unsigned char *)&answer, eo
1628 querybuf answer; local
[all...]
/freebsd-current/crypto/heimdal/kuser/
H A Dkdigest.c278 struct ntlm_buf answer; local
302 ret = heim_ntlm_calculate_ntlm1(hmd, sizeof(hmd), md, &answer);
306 hex_encode(answer.data, answer.length, &h);
319 EVP_DigestUpdate(ctx, answer.data, answer.length);
343 EVP_DigestUpdate(ctx, answer.data, answer.length);
347 free(answer.data);
/freebsd-current/contrib/less/
H A Dedit.c434 int answer; local
584 answer = query("\"%s\" may be a binary file. See it anyway? ",
586 if (answer != 'y' && answer != 'Y')
935 int answer; local
961 answer = 'O';
968 answer = query("Warning: \"%s\" exists; "OVERWRITE_OPTIONS" ", &parg);
972 switch (answer)
1001 answer = query(OVERWRITE_OPTIONS" (Type \"O\", \"A\", \"D\" or \"Q\") ", NULL_PARG);

Completed in 365 milliseconds

123