/netbsd-src/external/ibm-public/postfix/dist/src/util/ |
H A D | dict_random.c | 60 ARGV *replies; /* reply values */ member 72 dict_random->replies->argv[myrand() % dict_random->replies->argc]); in dict_random_lookup() 81 if (dict_random->replies) in dict_random_close() 82 argv_free(dict_random->replies); in dict_random_close() 154 dict_random->replies = 0; in dict_random_open() 164 &dict_random->replies, saved_name, in dict_random_open() 166 || dict_random->replies->argc == 0) { in dict_random_open()
|
/netbsd-src/external/ibm-public/postfix/dist/implementation-notes/ |
H A D | DSN | 5 LMTP/SMTP server replies with Diagnostic-Type: SMTP, with the 13 Other error reports are not in the form of SMTP-style replies. 17 etc.). It generates Diagnostic-Type: SMTP only for replies from
|
/netbsd-src/external/bsd/wpa/dist/src/wps/ |
H A D | wps_upnp_ssdp.c | 454 int replies; in msearchreply_state_machine_start() local 456 replies = dl_list_len(&sm->msearch_replies); in msearchreply_state_machine_start() 458 "outstanding)", replies); in msearchreply_state_machine_start() 459 if (replies >= MAX_MSEARCH) { in msearchreply_state_machine_start()
|
/netbsd-src/crypto/external/bsd/openssh/dist/ |
H A D | PROTOCOL.mux | 15 field. This field is returned in replies as "client request id" to 145 The server replies with: 183 For dynamically allocated listen port the server replies with 286 XXX inject packet (what about replies)
|
/netbsd-src/external/gpl2/lvm2/dist/daemons/clvmd/ |
H A D | clvmd.c | 541 newfd->bits.localsock.replies = NULL; in local_rendezvous_callback() 645 reply = client->bits.localsock.replies; in timedout_callback() 1426 reply->next = client->bits.localsock.replies; in add_reply_to_list() 1427 client->bits.localsock.replies = reply; in add_reply_to_list() 1614 struct node_reply *thisreply = client->bits.localsock.replies; in send_local_reply() 1646 thisreply = client->bits.localsock.replies; in send_local_reply() 1683 client->bits.localsock.replies = NULL; in send_local_reply() 1693 struct node_reply *thisreply = client->bits.localsock.replies; in free_reply() 1702 client->bits.localsock.replies = NULL; in free_reply()
|
H A D | clvmd.h | 47 struct node_reply *replies; member
|
/netbsd-src/external/bsd/nsd/dist/doc/ |
H A D | differences.tex | 318 NSD replies with AA bit cleared. BIND replies with AA bit on and includes a 382 \subsubsection{b-badquery-badanswer - BIND replies with bad answer for 386 BIND replies with an answer packet that cannot be parsed, or does 484 BIND includes the query sent for REFUSED answers. NSD replies with only 490 information. Sending the header makes NSD replies smaller and thus more 523 BIND includes the query sent for FORMERR answers. NSD replies with only 530 information. Sending the header makes NSD replies smaller and thus more 771 \subsection{b8-badquery-ignored - BIND 8 replies normally for some bad queries} 774 BIND8 manages to reply for malformed queries. NSD replies with FORMERR. 785 NSD replies with FORMERR.
|
/netbsd-src/external/bsd/ipf/dist/rules/ |
H A D | example.7 | 6 # allow in ICMP echos and echo-replies.
|
H A D | example.10 | 12 # to block the replies:
|
H A D | tcpstate | 9 # allow nameserver queries and replies to pass through, but no other UDP
|
/netbsd-src/external/bsd/unbound/dist/testdata/tcp_reuse.tdir/ |
H A D | tcp_reuse.conf2 | 16 log-replies: yes
|
/netbsd-src/external/bsd/unbound/dist/doc/ |
H A D | README | 86 o If there are no replies for a forward or stub zone, for a reverse zone, 95 o If you are not receiving the correct source IP address on replies (e.g. 98 source IP address on UDP replies. Listing all IP addresses explicitly in
|
/netbsd-src/external/bsd/unbound/dist/testdata/tls_reuse.tdir/ |
H A D | tls_reuse.conf2 | 19 log-replies: yes
|
/netbsd-src/external/bsd/unbound/dist/testdata/padding.tdir/ |
H A D | padding.conf2 | 18 log-replies: yes
|
/netbsd-src/external/bsd/unbound/dist/testdata/ |
H A D | iter_nat64_prefix48.rpl | 42 ; replies from NS over "NAT64"
|
H A D | iter_nat64.rpl | 41 ; replies from NS over "NAT64"
|
H A D | iter_nat64_prefix.rpl | 43 ; replies from NS over "NAT64"
|
/netbsd-src/usr.sbin/bootp/bootpd/ |
H A D | Announce | 28 Permits extended-length replies with more option data.
|
/netbsd-src/external/gpl2/send-pr/dist/send-pr/ |
H A D | README | 28 automatically replies with an acknowledgement, citing the category and
|
/netbsd-src/external/ibm-public/postfix/dist/ |
H A D | RELEASE_NOTES-3.1 | 91 found" replies, as well as the TTL of DNSWL replies (both "found"
|
H A D | RELEASE_NOTES-2.8 | 269 SMTP replies. For example: 275 # Secret DNSBL name Name in postscreen(8) replies 340 To filter only DNSBL replies containing 127.0.0.4, use:
|
/netbsd-src/external/ibm-public/postfix/dist/proto/ |
H A D | socketmap_table | 47 # The Postfix socketmap client requires that replies are not
|
H A D | tcp_table | 26 # replies are sent as one line of ASCII text, terminated by the
|
/netbsd-src/dist/pf/share/pf/ |
H A D | faq-example2 | 42 # dns_in - DNS replies.
|
/netbsd-src/external/bsd/unbound/dist/pythonmod/doc/examples/ |
H A D | example6.rst | 5 functions are going to be called just before unbound replies back to a client. 307 By issuing a query for a bogus domain unbound replies with SERVFAIL and an
|