| /src/contrib/bmake/unit-tests/ |
| H A D | ternary.exp | 1 The answer is unknown 2 The answer is unknown 3 The answer is empty 4 The answer is known 5 The answer is 6 The answer is empty 7 The answer is known 8 The answer is 42 9 The answer is 42
|
| /src/libexec/talkd/ |
| H A D | process.c | 67 rp->answer = BADVERSION; in process_request() 75 rp->answer = BADADDR; in process_request() 82 rp->answer = BADCTLADDR; in process_request() 88 rp->answer = FAILED; in process_request() 104 rp->answer = SUCCESS; in process_request() 115 rp->answer = SUCCESS; in process_request() 117 rp->answer = NOT_HERE; in process_request() 121 rp->answer = delete_invite(mp->id_num); in process_request() 125 rp->answer = UNKNOWN_REQUEST; in process_request() 142 rp->answer = result; in do_announce() [all …]
|
| H A D | print.c | 77 if (rp->answer > NANSWERS) { in print_response() 78 (void)snprintf(abuf, sizeof(abuf), "answer %d", rp->answer); in print_response() 81 ap = answers[rp->answer]; in print_response()
|
| /src/crypto/openssh/openbsd-compat/ |
| H A D | getrrsetbyname.c | 173 struct dns_rr *answer; member 203 u_char answer[ANSWER_BUFFER_SIZE]; in getrrsetbyname() local 241 answer, sizeof(answer)); in getrrsetbyname() 257 response = parse_dns_response(answer, length); in getrrsetbyname() 276 rrset->rri_ttl = response->answer->ttl; in getrrsetbyname() 286 rrset->rri_name = strdup(response->answer->name); in getrrsetbyname() 293 rrset->rri_nrdatas = count_dns_rr(response->answer, rrset->rri_rdclass, in getrrsetbyname() 295 rrset->rri_nsigs = count_dns_rr(response->answer, rrset->rri_rdclass, in getrrsetbyname() 316 for (rr = response->answer, index_ans = 0, index_sig = 0; in getrrsetbyname() 389 parse_dns_response(const u_char *answer, int size) in parse_dns_response() argument [all …]
|
| /src/crypto/heimdal/kdc/ |
| H A D | digest-service.c | 131 struct ntlm_buf infotarget, answer; in ntlm_service() local 133 answer.length = ntq.ntChallengeResponce.length; in ntlm_service() 134 answer.data = ntq.ntChallengeResponce.data; in ntlm_service() 142 &answer, in ntlm_service() 153 struct ntlm_buf answer; in ntlm_service() local 174 ntq.lmchallenge.data, &answer); in ntlm_service() 178 if (ntq.ntChallengeResponce.length != answer.length || in ntlm_service() 179 memcmp(ntq.ntChallengeResponce.data, answer.data, answer.length) != 0) { in ntlm_service() 180 free(answer.data); in ntlm_service() 184 free(answer.data); in ntlm_service()
|
| H A D | digest.c | 805 struct ntlm_buf answer; in _kdc_do_digest() local 898 challange, &answer); in _kdc_do_digest() 904 hex_encode(answer.data, answer.length, &mdx); in _kdc_do_digest() 906 free(answer.data); in _kdc_do_digest() 942 EVP_DigestUpdate(ctxp, answer.data, answer.length); in _kdc_do_digest() 956 free(answer.data); in _kdc_do_digest() 965 free(answer.data); in _kdc_do_digest() 975 EVP_DigestUpdate(ctxp, answer.data, answer.length); in _kdc_do_digest() 980 free(answer.data); in _kdc_do_digest() 1221 struct ntlm_buf infotarget, answer; in _kdc_do_digest() local [all …]
|
| /src/lib/libc/resolv/ |
| H A D | res_query.c | 104 u_char *answer, /*%< buffer to put answer */ in res_nquery() argument 108 HEADER *hp = (HEADER *) answer; in res_nquery() 144 n = res_nsend(statp, buf, n, answer, anslen); in res_nquery() 205 u_char *answer, /*%< buffer to put answer */ in res_nsearch() argument 209 HEADER *hp = (HEADER *) answer; in res_nsearch() 228 return (res_nquery(statp, cp, class, type, answer, anslen)); in res_nsearch() 238 answer, anslen); in res_nsearch() 284 answer, anslen); in res_nsearch() 369 answer, anslen); in res_nsearch() 400 u_char *answer, /*%< buffer to put answer */ in res_nquerydomain() argument [all …]
|
| H A D | res_update.c | 95 u_char answer[PACKETSZ]; in res_nupdate() local 176 answer, sizeof answer); in res_nupdate() 179 n = res_nsend(statp, packet, n, answer, sizeof answer); in res_nupdate() 185 if (((HEADER *)answer)->rcode == NOERROR) in res_nupdate()
|
| H A D | res_data.c | 162 u_char *answer, /*!< buffer to put answer */ in res_query() argument 170 return (res_nquery(statp, name, class, type, answer, anslen)); in res_query() 235 u_char *answer, /*!< buffer to put answer */ in res_search() argument 244 return (res_nsearch(statp, name, class, type, answer, anslen)); in res_search() 251 u_char *answer, /*!< buffer to put answer */ in res_querydomain() argument 262 answer, anslen)); in res_querydomain()
|
| /src/contrib/sendmail/contrib/ |
| H A D | bitdomain.c | 215 querybuf answer; local 234 &answer, sizeof(answer)); 268 hp = (HEADER *) &answer; 269 ap = (u_char *) &answer + sizeof(HEADER); 270 eom = (u_char *) &answer + ret; 283 n = dn_expand((u_char *) &answer, eom, ap, 299 if ((ret = dn_expand((u_char *)&answer,
|
| /src/contrib/telnet/libtelnet/ |
| H A D | getent.c | 62 char *answer, *tempid; in Getstr() local 65 retval = cgetstr(area, tempid, &answer); in Getstr() 67 return((retval > 0) ? answer : NULL); in Getstr()
|
| /src/sbin/ping/ |
| H A D | utils.c | 52 u_short answer; in in_cksum() local 82 answer = ~sum; /* truncate to 16 bits */ in in_cksum() 83 return(answer); in in_cksum()
|
| /src/crypto/heimdal/lib/ntlm/ |
| H A D | ntlm.c | 1017 unsigned char *answer) in splitandenc() argument 1036 EVP_Cipher(ctx, answer, challenge, 8); in splitandenc() 1105 struct ntlm_buf *answer) in heim_ntlm_calculate_ntlm1() argument 1116 answer->data = malloc(24); in heim_ntlm_calculate_ntlm1() 1117 if (answer->data == NULL) in heim_ntlm_calculate_ntlm1() 1119 answer->length = 24; in heim_ntlm_calculate_ntlm1() 1121 ret = splitandenc(&res[0], challenge, ((unsigned char *)answer->data) + 0); in heim_ntlm_calculate_ntlm1() 1124 ret = splitandenc(&res[7], challenge, ((unsigned char *)answer->data) + 8); in heim_ntlm_calculate_ntlm1() 1127 ret = splitandenc(&res[14], challenge, ((unsigned char *)answer->data) + 16); in heim_ntlm_calculate_ntlm1() 1134 heim_ntlm_free_buf(answer); in heim_ntlm_calculate_ntlm1() [all …]
|
| H A D | test_ntlm.c | 190 struct ntlm_buf infotarget, infotarget2, answer, key; in test_keys() local 203 answer.length = 0; in test_keys() 204 answer.data = NULL; in test_keys() 215 &answer); in test_keys() 225 &answer, in test_keys() 241 free(answer.data); in test_keys()
|
| /src/contrib/sendmail/src/ |
| H A D | domain.c | 878 querybuf answer; local 972 hp = (HEADER *)&answer; 973 n = (*resfunc)(host, C_IN, T_MX, (unsigned char *) &answer, 974 sizeof(answer)); 1036 if (n > sizeof(answer)) 1037 n = sizeof(answer); 1040 cp = (unsigned char *)&answer + HFIXEDSZ; 1041 eom = (unsigned char *)&answer + n; 1061 if ((n = dn_expand((unsigned char *)&answer, eom, cp, 1086 if ((n = dn_expand((unsigned char *)&answer, eom, cp, [all …]
|
| H A D | sm_resolve.c | 831 dnscrtrr(domain, query, qtype, value, rr_type, flags, herr, adp, answer, anslen, anspos) in dnscrtrr() argument 840 unsigned char *answer; 905 rlen = gen_dns_reply(answer, anslen, anspos, 915 rlen = gen_dns_reply(answer, anslen, anspos, 930 rlen = gen_dns_reply(answer, anslen, anspos, 940 rlen = gen_dns_reply(answer, anslen, anspos, 946 rlen = gen_dns_reply(answer, anslen, anspos, 952 anspos = answer + rlen; 982 tstdns_search(domain, class, type, answer, anslen) in tstdns_search() argument 986 unsigned char *answer; [all …]
|
| /src/contrib/unbound/doc/ |
| H A D | unbound.rst | 54 On receiving a DNS query it will ask the root nameservers for an answer and 57 It will then ask that nameserver for an answer. 58 It will recursively continue until an answer is found or no answer is available 60 For performance and efficiency reasons that answer is cached for a certain time 61 (the answer's time-to-live or TTL).
|
| /src/crypto/heimdal/kuser/ |
| H A D | kdigest.c | 278 struct ntlm_buf answer; in client_mschapv2() local 302 ret = heim_ntlm_calculate_ntlm1(hmd, sizeof(hmd), md, &answer); in client_mschapv2() 306 hex_encode(answer.data, answer.length, &h); in client_mschapv2() 319 EVP_DigestUpdate(ctx, answer.data, answer.length); in client_mschapv2() 343 EVP_DigestUpdate(ctx, answer.data, answer.length); in client_mschapv2() 347 free(answer.data); in client_mschapv2()
|
| /src/crypto/krb5/src/lib/krb5/krb/ |
| H A D | preauth_pkinit.c | 134 char *answer = NULL; in krb5_responder_pkinit_set_answer() local 175 ret = k5_json_encode(answers, &answer); in krb5_responder_pkinit_set_answer() 180 answer); in krb5_responder_pkinit_set_answer() 185 free(answer); in krb5_responder_pkinit_set_answer()
|
| /src/lib/libc/net/ |
| H A D | gethostbydns.c | 137 gethostanswer(const querybuf *answer, int anslen, const char *qname, int qtype, in gethostanswer() argument 154 eom = answer->buf + anslen; in gethostanswer() 170 hp = &answer->hdr; in gethostanswer() 175 cp = answer->buf; in gethostanswer() 181 n = dn_expand(answer->buf, eom, cp, bp, ep - bp); in gethostanswer() 212 n = dn_expand(answer->buf, eom, cp, bp, ep - bp); in gethostanswer() 238 n = dn_expand(answer->buf, eom, cp, tbuf, sizeof tbuf); in gethostanswer() 268 n = dn_expand(answer->buf, eom, cp, tbuf, sizeof tbuf); in gethostanswer() 311 n = dn_expand(answer->buf, eom, cp, bp, ep - bp); in gethostanswer() 437 __dns_getanswer(const char *answer, int anslen, const char *qname, int qtype) in __dns_getanswer() argument [all …]
|
| H A D | getnetbydns.c | 152 getnetanswer(querybuf *answer, int anslen, int net_i, struct netent *ne, in getnetanswer() argument 179 eom = answer->buf + anslen; in getnetanswer() 180 hp = &answer->hdr; in getnetanswer() 185 cp = answer->buf + HFIXEDSZ; in getnetanswer() 200 n = dn_expand(answer->buf, eom, cp, bp, ep - bp); in getnetanswer() 212 n = dn_expand(answer->buf, eom, cp, bp, ep - bp); in getnetanswer()
|
| /src/contrib/less/ |
| H A D | edit.c | 436 int answer; in edit_ifile() local 555 answer = query("\"%s\" may be a binary file. See it anyway? ", &parg); in edit_ifile() 556 if (answer != 'y' && answer != 'Y') in edit_ifile() 934 int answer; in use_logfile() local 960 answer = 'O'; in use_logfile() 967 answer = query("Warning: \"%s\" exists; "OVERWRITE_OPTIONS" ", &parg); in use_logfile() 971 switch (answer) in use_logfile() 1000 answer = query(OVERWRITE_OPTIONS" (Type \"O\", \"A\", \"D\" or \"Q\") ", NULL_PARG); in use_logfile()
|
| /src/usr.bin/talk/ |
| H A D | invite.c | 153 if (response.answer != SUCCESS) { in announce_invite() 154 if (response.answer < NANSWERS) in announce_invite() 155 message(answers[response.answer]); in announce_invite()
|
| /src/include/protocols/ |
| H A D | talkd.h | 68 u_char answer; /* not used */ member 87 u_char answer; /* respose to request message, see below */ member
|
| /src/contrib/unbound/testcode/ |
| H A D | doqclient.c | 198 struct sldns_buffer* answer; member 378 sldns_buffer_free(str->answer); in client_stream_free() 394 if(str->answer) { in client_stream_start_setup() 395 sldns_buffer_free(str->answer); in client_stream_start_setup() 396 str->answer = NULL; in client_stream_start_setup() 510 str->answer = sldns_buffer_new(ntohs(str->answer_len)); in client_stream_datalen_complete() 511 if(!str->answer) in client_stream_datalen_complete() 513 sldns_buffer_set_limit(str->answer, ntohs(str->answer_len)); in client_stream_datalen_complete() 564 if(sldns_buffer_limit(str->answer) < LDNS_HEADER_SIZE) { in client_stream_print_short() 571 rcode = LDNS_RCODE_WIRE(sldns_buffer_begin(str->answer)); in client_stream_print_short() [all …]
|