/netbsd-current/external/gpl3/gdb/dist/gdb/testsuite/gdb.dwarf2/ |
H A D | no-gnu-debuglink.exp | 47 set question "Load new symbol table from .*\? .y or n. " 48 gdb_test "file $binfile" "$msg" "file command, again" $question "y"
|
/netbsd-current/external/bsd/libevent/dist/test/ |
H A D | regress_testutils.c | 156 char *question; local 159 TT_DIE(("Only handling one question at a time; got %d", 162 question = req->questions[0]->name; 164 while (tab->q && evutil_ascii_strcasecmp(question, tab->q) && 168 TT_DIE(("Unexpected question: '%s'", question)); 173 strtolower(question); 201 evdns_server_request_add_a_reply(req, question, 1, &in.s_addr, 209 question, 1, &in6.s6_addr, 100);
|
/netbsd-current/external/bsd/ntp/dist/sntp/libevent/test/ |
H A D | regress_testutils.c | 144 const char *question; local 147 TT_DIE(("Only handling one question at a time; got %d", 150 question = req->questions[0]->name; 152 while (tab->q && evutil_ascii_strcasecmp(question, tab->q) && 156 TT_DIE(("Unexpected question: '%s'", question)); 186 evdns_server_request_add_a_reply(req, question, 1, &in.s_addr, 194 question, 1, &in6.s6_addr, 100);
|
/netbsd-current/external/apache2/mDNSResponder/dist/mDNSCore/ |
H A D | mDNS.c | 180 // A, AAAA , CNAME, or PTR. The caller should answer the question with this record and not send out 181 // the question on the wire if LocalOnlyRecordAnswersQuestion() also returns true. 203 // Depending on whether this is a multicast or unicast question we want to set either: 462 LogInfo("GenerateNegativeResponse: Generating negative response for question %##s (%s)", q->qname.c, DNSTypeName(q->qtype)); 469 // b) Append search domains and retry the question 471 // The question may not have set Intermediates in which case we don't deliver negative responses. So, to force 474 if (m->CurrentQuestion == q) { q->ThisQInterval = 0; } // Deactivate this question 475 // Don't touch the question after this 500 // A and B, and when we stop question A, UpdateQuestionDuplicates copies the value of CNAMEReferrals 502 // the target name is still the same), and then when we stop question 3833 DNSQuestion question; local 5669 ActivateUnicastQuery(mDNS *const m, DNSQuestion *const question, mDNSBool ScheduleImmediately) argument 6436 NetWakeResolve(mDNS *const m, DNSQuestion *question, const ResourceRecord *const answer, QC_result AddRecord) argument 8050 ExpectingUnicastResponseForQuestion(const mDNS *const m, const mDNSIPPort port, const mDNSOpaque16 id, const DNSQuestion *const question, mDNSBool tcp) argument 10651 FindDuplicateQuestion(const mDNS *const m, const DNSQuestion *const question) argument 10680 UpdateQuestionDuplicates(mDNS *const m, DNSQuestion *const question) argument 10857 GetTimeoutForMcastQuestion(mDNS *m, DNSQuestion *question) argument 10970 SetValidDNSServers(mDNS *m, DNSQuestion *question) argument 11150 GetServerForQuestion(mDNS *m, DNSQuestion *question) argument 11412 IsQuestionNew(mDNS *const m, DNSQuestion *question) argument 11622 ValidateParameters(mDNS *const m, DNSQuestion *const question) argument 11656 InitDNSConfig(mDNS *const m, DNSQuestion *const question) argument 11711 InitCommonState(mDNS *const m, DNSQuestion *const question) argument 11836 InitWABState(DNSQuestion *const question) argument 11865 InitLLQState(DNSQuestion *const question) argument 11875 InitDNSPNState(DNSQuestion *const question) argument 11883 InitDNSSECProxyState(mDNS *const m, DNSQuestion *const question) argument 11914 FinalizeUnicastQuestion(mDNS *const m, DNSQuestion *question, mDNSBool purge) argument 11965 mDNS_StartQuery_internal(mDNS *const m, DNSQuestion *const question) argument 12097 mDNS_StopQuery_internal(mDNS *const m, DNSQuestion *const question) argument 12305 mDNS_StartQuery(mDNS *const m, DNSQuestion *const question) argument 12314 mDNS_StopQuery(mDNS *const m, DNSQuestion *const question) argument 12327 mDNS_StopQueryWithRemoves(mDNS *const m, DNSQuestion *const question) argument 12377 mDNS_StartBrowse_internal(mDNS *const m, DNSQuestion *const question, const domainname *const srv, const domainname *const domain, const mDNSu8 *anondata, const mDNSInterfaceID InterfaceID, mDNSu32 flags, mDNSBool ForceMCast, mDNSBool useBackgroundTrafficClass, mDNSQuestionCallback *Callback, void *Context) argument 12420 mDNS_StartBrowse(mDNS *const m, DNSQuestion *const question, const domainname *const srv, const domainname *const domain, const mDNSu8 *anondata, const mDNSInterfaceID InterfaceID, mDNSu32 flags, mDNSBool ForceMCast, mDNSBool useBackgroundTrafficClass, mDNSQuestionCallback *Callback, void *Context) argument 12434 mDNS_GetDomains(mDNS *const m, DNSQuestion *const question, mDNS_DomainType DomainType, const domainname *dom, const mDNSInterfaceID InterfaceID, mDNSQuestionCallback *Callback, void *Context) argument 14682 DNSQuestion question; local [all...] |
H A D | dnssec.c | 42 // the answer delivered to the application needs DNSSEC validation. If a question needs DNSSEC 44 // original question, we create another question as part of the verification process (question is part of 45 // DNSSECVerifier). This question sets "ValidatingResponse" to distinguish itself from the original 46 // question. Without this, it will be a duplicate and never sent out. The "core" almost treats both the 48 // are added to the cache, "ValidatingResponse" question gets called back as long as the typeCovered matches 49 // the question's qtype. See the comment in DNSSECRecordAnswersQuestion for the details. The other big 50 // difference is that "ValidationRequired" question kicks off the verification process by calling into 53 // VerifySignature does not retain the original question tha 230 InitializeQuestion(mDNS *const m, DNSQuestion *question, mDNSInterfaceID InterfaceID, const domainname *qname, mDNSu16 qtype, mDNSQuestionCallback *callback, void *context) argument 2327 DNSQuestion question; local 3328 VerifySigCallback(mDNS *const m, DNSQuestion *question, const ResourceRecord *const answer, QC_result AddRecord) argument 3701 ProveInsecureCallback(mDNS *const m, DNSQuestion *question, const ResourceRecord *const answer, QC_result AddRecord) argument 4072 InitializeQuestion(mDNS *const m, DNSQuestion *question, mDNSInterfaceID InterfaceID, const domainname *qname, mDNSu16 qtype, mDNSQuestionCallback *callback, void *context) argument [all...] |
H A D | dnsproxy.c | 36 // for duplicates, before creating DNSProxyClient state and starting a question with the "core" 37 // (mDNS_StartQuery). When the callback for the question happens, it gathers all the necessary 243 // the question 252 // If this is the first time, initialize the header and the question. 272 LogInfo("AddResourceRecords: Answering question with %s", CRDisplayString(m, cr)); 295 // If we are using CNAME to answer a question and CNAME is not the type we 306 // Along with the nsec records, we also cache the SOA record. For non-DNSSEC question, we need 307 // to send the SOA back. Normally we either cache the SOA record (non-DNSSEC question) pointed 308 // to by "cr->soa" or the NSEC/SOA records along with their RRSIGs (DNSSEC question) pointed to 311 // - if we issue a DNSSEC question followe 372 ProxyClientCallback(mDNS *const m, DNSQuestion *question, const ResourceRecord *const answer, QC_result AddRecord) argument 529 IsDuplicateClient(const mDNSAddr *const addr, const mDNSIPPort port, const mDNSOpaque16 id, const DNSQuestion *const question) argument [all...] |
H A D | uDNS.h | 102 extern mStatus mDNS_StartQuery_internal(mDNS *const m, DNSQuestion *const question); 103 extern mStatus mDNS_StopQuery_internal(mDNS *const m, DNSQuestion *const question);
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/reclimit/ans2/ |
H A D | ans.pl | 156 my ($question) = $request->question; 157 my $qname = $question->qname; 158 my $qclass = $question->qclass; 159 my $qtype = $question->qtype;
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/reclimit/ans4/ |
H A D | ans.pl | 160 my ($question) = $request->question; 161 my $qname = $question->qname; 162 my $qclass = $question->qclass; 163 my $qtype = $question->qtype;
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/wildcard/ |
H A D | tests_wildcard.py | 67 assert len(querymsg.question) == 1 102 assert len(querymsg.question) == 1, str(answer) 105 querymsg.question[0].name,
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/digdelv/ans7/ |
H A D | ans.pl | 59 my @questions = $packet->question;
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/ |
H A D | ditch.pl | 75 $packet->push(question => $q);
|
/netbsd-current/external/apache2/mDNSResponder/dist/mDNSShared/ |
H A D | uds_daemon.c | 2054 mDNSlocal void FoundInstance(mDNS *const m, DNSQuestion *question, const ResourceRecord *const answer, QC_result AddRecord) argument 2057 request_state *req = question->QuestionContext; 2064 if (mDNSOpaque16IsZero(question->TargetQID) && (question->BrowseThreshold > 0) && (question->CurrentAnswers >= question->BrowseThreshold)) 2069 // if returning a negative answer, then use question's name in reply 2072 GenerateBrowseReply(&question->qname, answer->InterfaceID, req, &rep, browse_reply_op, flags, kDNSServiceErr_NoSuchRecord); 2094 req->sd, question->qname.c, DNSTypeName(question 2631 resolve_result_callback(mDNS *const m, DNSQuestion *question, const ResourceRecord *const answer, QC_result AddRecord) argument 2872 AppendNewSearchDomain(DNSQuestion *question) argument 2972 ShouldDeliverNegativeResponse(DNSQuestion *question) argument 3122 RetryQuestionWithSearchDomains(DNSQuestion *question, request_state *req, QC_result AddRecord) argument 3170 queryrecord_result_reply(mDNS *const m, request_state *req, DNSQuestion *question, const ResourceRecord *const answer, QC_result AddRecord, DNSServiceErrorType error) argument 3351 queryrecord_result_callback(mDNS *const m, DNSQuestion *question, const ResourceRecord *const answer, QC_result AddRecord) argument 3549 DNSQuestion *question = &request->u.queryrecord.q; local 3574 DNSQuestion *question = request->u.queryrecord.q2; local 3797 enum_result_callback(mDNS *const m, DNSQuestion *const question, const ResourceRecord *const answer, QC_result AddRecord) argument [all...] |
/netbsd-current/sbin/fsck_lfs/ |
H A D | utilities.c | 84 reply(const char *question) argument 91 persevere = !strcmp(question, "CONTINUE"); 94 printf("%s? no\n\n", question); 98 printf("%s? yes\n\n", question); 102 printf("%s? [yn] ", question);
|
/netbsd-current/tests/usr.bin/indent/ |
H A D | lsym_lparen_or_lbracket.c | 254 cond ? (question) : (5); 300 cond ? (question) : (5);
|
/netbsd-current/external/gpl2/gettext/dist/gettext-tools/tests/ |
H A D | lang-pascal | 22 question = '''Your command, please?'', asked the waiter.'; 27 writeln(question); 44 #: prog.question 62 #: prog.question
|
/netbsd-current/external/apache2/llvm/dist/clang/lib/Basic/ |
H A D | OperatorPrecedence.cpp | 53 case tok::question: return prec::Conditional;
|
/netbsd-current/external/apache2/llvm/dist/llvm/utils/ |
H A D | demangle_tree.py | 22 question = line.find('?') 23 if question == -1: 26 open_paren = line.find('(', question) 32 mangled = line[question : open_paren]
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/zero/ans5/ |
H A D | ans.pl | 61 my @questions = $packet->question;
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/digdelv/ans6/ |
H A D | ans.pl | 54 my @questions = $packet->question;
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/rpzrecurse/ans5/ |
H A D | ans.pl | 54 my @questions = $packet->question;
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/fetchlimit/ans4/ |
H A D | ans.pl | 59 my @questions = $packet->question;
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/dnssec/ans10/ |
H A D | ans.py | 45 qname = m.question[0].name.to_text() 46 rrtype = m.question[0].rdtype
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/resolver/ans8/ |
H A D | ans.pl | 60 my @questions = $request->question; 114 my @questions = $request->question; 130 # QR, REFUSED, no question section
|
/netbsd-current/external/mpl/bind/dist/bin/tests/system/resolver/ans10/ |
H A D | ans.py | 46 qname = m.question[0].name.to_text() 47 rrtype = m.question[0].rdtype
|