/external/openssh/ |
D | PROTOCOL.mux | 5 This field is returned in replies as "client request id" to facilitate 90 The server replies with: 122 For dynamically allocated listen port the server replies with 217 XXX inject packet (what about replies)
|
D | PROTOCOL.agent | 540 3.4 Generic replies from agent to client
|
/external/ppp/pppd/ |
D | auth.c | 1475 int replies = 0; in PAM_conv() local 1483 for (replies = 0; replies < num_msg; replies++) { in PAM_conv() 1484 switch (msg[replies]->msg_style) { in PAM_conv() 1486 reply[replies].resp_retcode = PAM_SUCCESS; in PAM_conv() 1487 reply[replies].resp = COPY_STRING(PAM_username); in PAM_conv() 1491 reply[replies].resp_retcode = PAM_SUCCESS; in PAM_conv() 1492 reply[replies].resp = COPY_STRING(PAM_password); in PAM_conv() 1499 reply[replies].resp_retcode = PAM_SUCCESS; in PAM_conv() 1500 reply[replies].resp = NULL; in PAM_conv()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_upnp_ssdp.c | 458 int replies; in msearchreply_state_machine_start() local 460 replies = dl_list_len(&sm->msearch_replies); in msearchreply_state_machine_start() 462 "outstanding)", replies); in msearchreply_state_machine_start() 463 if (replies >= MAX_MSEARCH) { in msearchreply_state_machine_start()
|
/external/ipsec-tools/ |
D | setup.c | 173 int replies = 0; in flush() local 182 for (p = NULL; replies < 2 && (p = pfkey_recv(key)) != NULL; free(p)) { in flush() 189 replies += !p->sadb_msg_seq; in flush()
|
/external/chromium/third_party/libevent/ |
D | ChangeLog | 19 o Set truncated flag correctly in evdns server replies. 50 o Match the query in DNS replies to the query in the request; from Vsevolod Stakhov. 60 o Correct handling of trailing headers in chunked replies; from Scott Lamb. 110 o make RPC replies use application/octet-stream as mime type 138 o always generate Date and Content-Length headers for HTTP/1.1 replies 147 o Correctly handle DNS replies with no answers set (Fixes bug 1846282)
|
/external/dnsmasq/contrib/try-all-ns/ |
D | dnsmasq-2.35-try-all-ns.patch | 58 + { " --try-all-ns", gettext_noop("Try all name servers in tandem on NXDOMAIN replies (use with…
|
/external/mdnsresponder/mDNSShared/ |
D | uds_daemon.c | 155 struct reply_state *replies; // corresponding (active) reply list member 329 while (req->replies) // free pending replies in abort_request() 331 reply_state *ptr = req->replies; in abort_request() 332 req->replies = req->replies->next; in abort_request() 390 reply_state **ptr = &r->replies; in append_reply() 949 …if (tmp->replies) LogMsg("connection_termination ERROR How can subordinate req %p %d have r… in connection_termination() 4579 if (req->primary && req->replies) in uds_validatelists() 4581 req, req->sd, req->primary && req->replies); in uds_validatelists() 4590 for (rep = req->replies; rep; rep=rep->next) in uds_validatelists() 4639 reply_state *const rep = req->replies; // Send the first waiting reply in send_msg() [all …]
|
/external/dnsmasq/ |
D | FAQ | 4 A: The high ports that dnsmasq opens are for replies from the upstream 6 from these ports and replies received to them. The reason for doing this is 9 from port 53 the replies would be _to_ port 53 and get blocked. 11 This is not a security hole since dnsmasq will only accept replies to that 12 port: queries are dropped. The replies must be to oustanding queries
|
D | CHANGELOG.archive | 66 of its replies correctly. Older versions would not always 86 /etc/hosts, dnsmasq replies with the dotted-quad address. 199 Extended negative caching to NODATA replies. 228 Clear "truncated" bit in replies we return from upstream. This 372 bit in replies containing names from /etc/hosts or DHCP. 531 address to check, and deal with replies with multiple 1034 Log replies from upstream servers which refuse to do 1157 Log NODATA replies generated as a result of the 1284 Fill in sname, file and siaddr fields in replies to 1287 Don't send NAK replies to DHCPREQUEST packets for disabled [all …]
|
/external/valgrind/main/coregrind/m_gdbserver/ |
D | README_DEVELOPERS | 29 associated replies is the gdb remote serial protocol, which is 138 vgdb reads replies on FIFO /tmp/vgdb-pipe-to-vgdb-from-PID-by-USER-on-HOST
|
/external/dnsmasq/po/ |
D | fi.po | 206 msgid "Force broadcast replies for hosts with tag set." 299 msgid "Specify time-to-live in seconds for replies from /etc/hosts."
|
D | pt_BR.po | 206 msgid "Force broadcast replies for hosts with tag set." 299 msgid "Specify time-to-live in seconds for replies from /etc/hosts."
|
D | it.po | 206 msgid "Force broadcast replies for hosts with tag set." 299 msgid "Specify time-to-live in seconds for replies from /etc/hosts."
|
D | de.po | 242 msgid "Force broadcast replies for hosts with tag set." 335 msgid "Specify time-to-live in seconds for replies from /etc/hosts."
|
D | no.po | 212 msgid "Force broadcast replies for hosts with tag set." 308 msgid "Specify time-to-live in seconds for replies from /etc/hosts."
|
D | ro.po | 210 msgid "Force broadcast replies for hosts with tag set." 306 msgid "Specify time-to-live in seconds for replies from /etc/hosts."
|
D | id.po | 244 msgid "Force broadcast replies for hosts with tag set." 360 msgid "Specify time-to-live in seconds for replies from /etc/hosts."
|
D | es.po | 210 msgid "Force broadcast replies for hosts with tag set." 306 msgid "Specify time-to-live in seconds for replies from /etc/hosts."
|
D | pl.po | 210 msgid "Force broadcast replies for hosts with tag set." 303 msgid "Specify time-to-live in seconds for replies from /etc/hosts."
|
D | fr.po | 208 msgid "Force broadcast replies for hosts with tag set." 304 msgid "Specify time-to-live in seconds for replies from /etc/hosts."
|
/external/ipsec-tools/src/racoon/ |
D | isakmp_xauth.c | 583 int replies = 0; local
|
/external/dbus/ |
D | ChangeLog.pre-1-2 | 1619 for replies - patch by olli.salli at collabora.co.uk 1859 replies per connection was way too low
|
D | ChangeLog.pre-1-0 | 2726 in __main__ are not turned into error replies. 8274 replies, not just receive them. 8392 per-connection limit on pending replies. 9114 * bus/system.conf.in: fix to allow replies, I modified .conf 9149 * bus/driver.c (bus_driver_handle_message): fix check for replies 9256 expiring connections and replies, decided not to use for expiring 9879 change to convert any error replies to DBusError instead of 9891 replies 12801 * dbus/dbus-message.c (dbus_message_new_reply): allow replies to 13501 Remove the name argument. The spec states that replies shouldn't [all …]
|
/external/qemu/ |
D | qemu-options.hx | 913 "-bootp file advertise file in BOOTP replies\n")
|