Home
last modified time | relevance | path

Searched full:answers (Results 1 – 25 of 228) sorted by relevance

12345678910

/freebsd/crypto/krb5/src/lib/krb5/krb/
H A Dresponse_items.c34 char **answers; member
70 zapfreestr(ri->answers[i]); in k5_response_items_reset()
71 free(ri->answers); in k5_response_items_reset()
72 ri->answers = NULL; in k5_response_items_reset()
132 tmp = realloc(ri->answers, size); in push_question()
135 ri->answers = tmp; in push_question()
136 ri->answers[ri->count] = NULL; in push_question()
137 ri->answers[ri->count + 1] = NULL; in push_question()
208 zapfreestr(ri->answers[i]); in k5_response_items_set_answer()
209 ri->answers[i] = tmp; in k5_response_items_set_answer()
[all …]
H A Dpreauth_pkinit.c32 * and answers. The main body of the PKINIT clpreauth module is in the
136 k5_json_value answers = NULL; in krb5_responder_pkinit_set_answer() local
148 /* Decode the old answers. */ in krb5_responder_pkinit_set_answer()
151 ret = k5_json_decode(old_answer, &answers); in krb5_responder_pkinit_set_answer()
155 if (k5_json_get_tid(answers) != K5_JSON_TID_OBJECT) { in krb5_responder_pkinit_set_answer()
165 ret = k5_json_object_set(answers, identity, jpin); in krb5_responder_pkinit_set_answer()
169 ret = k5_json_object_set(answers, identity, NULL); in krb5_responder_pkinit_set_answer()
175 ret = k5_json_encode(answers, &answer); in krb5_responder_pkinit_set_answer()
184 k5_json_release(answers); in krb5_responder_pkinit_set_answer()
/freebsd/crypto/krb5/src/lib/krb5/os/
H A Ddnssrv.c111 const char *service, struct srv_dns_entry **answers) in k5_make_uri_query() argument
115 *answers = NULL; in k5_make_uri_query()
122 struct srv_dns_entry **answers) in krb5int_make_srv_query_realm() argument
129 *answers = NULL; in krb5int_make_srv_query_realm()
168 *answers = head; in krb5int_make_srv_query_realm()
179 const char *service, struct srv_dns_entry **answers) in k5_make_uri_query() argument
188 *answers = NULL; in k5_make_uri_query()
231 *answers = head; in k5_make_uri_query()
236 * Do DNS SRV query, return results in *answers.
245 struct srv_dns_entry **answers) in krb5int_make_srv_query_realm() argument
[all …]
H A Dlocate_kdc.c606 struct srv_dns_entry *answers, *entry; in locate_uri() local
611 ret = k5_make_uri_query(context, realm, req_service, &answers); in locate_uri()
612 if (ret || answers == NULL) in locate_uri()
615 for (entry = answers; entry != NULL; entry = entry->next) { in locate_uri()
653 krb5int_free_srv_dns_data(answers); in locate_uri()
H A Dos-proto.h164 struct srv_dns_entry **answers);
170 const char *service, struct srv_dns_entry **answers);
/freebsd/contrib/unbound/doc/
H A Dunbound-control.898 domain names below the removed name), NOERROR nodata answers are the
154 Remove all negative data from the cache. This is nxdomain answers,
155 nodata answers and servfail answers. Also removes bad key entries
512 answers waiting to be written back to the clients.
595 The number of answers to queries, from cache or from recursion, that had the
599 The number of answers to queries that had the pseudo return code nodata.
606 Number of answers that were secure. The answer validated correctly.
607 The AD bit might have been set in some of these answers, where the client
612 Number of answers that were bogus. These answers resulted in SERVFAIL
625 delayed duplicates, very late answers, or could be spoofing attempts.
[all …]
H A Dunbound-control.8.in194 so that users keep getting answers for those queries that are currently
253 domain names below the removed name), NOERROR nodata answers are the
316 Remove all negative data from the cache. This is nxdomain answers,
317 nodata answers and servfail answers. Also removes bad key entries
766 answers waiting to be written back to the clients.
861 The number of answers to queries, from cache or from recursion, that had the
865 The number of answers to queries that had the pseudo return code nodata.
872 Number of answers that were secure. The answer validated correctly.
873 The AD bit might have been set in some of these answers, wher
[all...]
H A Drequirements.txt22 looks up data in the DNS for clients and caches previous answers to
116 then be used to send queries to. And fake answers may be returned.
182 queries and get answers from the cache).
240 take large DNS answers.
264 o SOA records in negative cached answers for DS queries.
H A DTODO8 o (option) private TTL feature (always report TTL x in answers).
29 o (option) to make local-data answers be secure for libunbound (default=no)
H A Dunbound.conf.5123 for queries from clients, and answers to clients are given from it.
371 This applies to nxdomain and nodata answers.
954 because they keep sending different answers, like some load balancers.
975 and other denials, using information from previous NXDOMAINs answers.
983 from DNS answers. Additionally, the DNSSEC validator may mark the
984 answers bogus. This protects against so\-called DNS Rebinding, where
1192 return bogus answers to them. Thus, the CD (Checking Disabled) flag
1318 local\-data: to enter data into the local zone. Answers for local zones
1319 are authoritative DNS answers. By default the zones are class IN.
1357 This answers queries for the zone, and all subdomains of the zone
[all …]
/freebsd/libexec/talkd/
H A Dprint.c46 static const char *answers[] = variable
49 #define NANSWERS (sizeof (answers) / sizeof (answers[0]))
81 ap = answers[rp->answer]; in print_response()
/freebsd/contrib/unbound/contrib/
HDunbound_cacti.tar.gz
H A Dunbound_munin_43 # unbound_munin_by_rcode - answers by rcode, validation status
84 unbound_munin_by_rcode - answers by rcode, validation status
330 echo "graph_title Unbound DNS answers by return code"
342 …echo "graph_info answers sorted by return value. rrsets bogus is the number of rrsets marked bogus…
/freebsd/contrib/ldns/drill/
H A Dchasetrace.c158 ldns_rr_list *answers = NULL; in do_trace() local
258 answers = ldns_pkt_rr_list_by_type(p, t, LDNS_SECTION_ANSWER); in do_trace()
259 if (answers && ldns_rr_list_rr_count(answers) > 0) { in do_trace()
260 ldns_rr_list_free(answers); in do_trace()
261 answers = NULL; in do_trace()
264 ldns_rr_list_free(answers); in do_trace()
265 answers = NULL; in do_trace()
/freebsd/contrib/ntp/scripts/deprecated/
H A Dntp-groper13 # dumbo.hp.com answers NTP version 2, stratum: 3, ref: telford.nsa.hp.com
14 # dumbo.hp.com answers NTP version 3, stratum: 3, ref: telford.nsa.hp.com
80 echo "$host answers NTP version $version, stratum: $stratum, ref: $synchost"
/freebsd/usr.bin/talk/
H A Dinvite.c129 static const char *answers[] = { variable
140 #define NANSWERS (sizeof (answers) / sizeof (answers[0]))
155 message(answers[response.answer]); in announce_invite()
/freebsd/crypto/krb5/doc/html/_sources/appdev/refs/types/
H A Dkrb5_responder_context.rst.txt12 A container for a set of preauthentication questions and answers.
14 …5_responder_fn callback. It contains a list of questions and can receive answers. Questions contai…
/freebsd/crypto/krb5/src/tests/
H A Dt_hostrealm.py48 # The profile module gives answers for hostnames equal to or ending in
104 # The test1 module answers with a list of components. Use an IPv4
109 # If no module answers, the default realm is returned. The test2
/freebsd/contrib/ntp/scripts/ntpsweep/
H A Dntpsweep.in115 # got answers ? If so, go on.
139 # got answers ? If so, go on.
196 else { # We did not get answers from this host
/freebsd/contrib/ldns/ldns/
H A Dtsig.h76 …s added to the digest if not NULL (so NULL is for signing queries, not NULL is for signing answers)
89 …s added to the digest if not NULL (so NULL is for signing queries, not NULL is for signing answers)
/freebsd/contrib/unbound/services/
H A Doutside_network.h2 * services/outside_network.h - listen to answers from the network
71 * Send queries to outside servers and wait for answers from servers.
109 /** if udp is delay-closed (delayed answers do not meet closed port)*/
134 /** pending udp answers. sorted by id, addr */
294 * answers to the structure for callback. And also to see if ID
563 * @return: the new structure (with no pending answers) or NULL on error.
815 /** callback for incoming udp answers from the network */
835 /** callback for serviced query UDP answers */
/freebsd/crypto/openssh/openbsd-compat/
H A Dgetrrsetbyname-ldns.c147 debug2("ldns: got %u answers from DNS", rrset->rri_nrdatas); in getrrsetbyname()
176 /* allocate memory for answers */ in getrrsetbyname()
196 /* copy answers & signatures */ in getrrsetbyname()
/freebsd/contrib/unbound/libunbound/
H A Dunbound.h40 * validate the answers. Synchronously and asynchronously.
507 * answers are returned from the asynchronous validating resolver.
767 /** answers with pseudo rcode 'nodata' */
769 /** answers that were secure (AD) */
771 /** answers that were bogus (withheld as SERVFAIL) */
783 /** expired answers served from cache */
823 /** number of queries for unbound's auth_zones, downstream answers */
/freebsd/crypto/krb5/src/kprop/
H A Dkprop.c221 struct addrinfo hints, *res, *answers; in open_connection() local
231 error = getaddrinfo(host, port, &hints, &answers); in open_connection()
239 for (res = answers; res != NULL; res = res->ai_next) { in open_connection()
259 freeaddrinfo(answers); in open_connection()
/freebsd/sys/contrib/openzfs/.github/
H A Dno-response.yml12 to take action. Please reach out if you have or find the answers we need so

12345678910