answer            315 lib/zlib/contrib/minizip/miniunz.c                     char answer[128];
answer            319 lib/zlib/contrib/minizip/miniunz.c                     ret = scanf("%1s",answer);
answer            324 lib/zlib/contrib/minizip/miniunz.c                     rep = answer[0] ;
answer            280 lib/zlib/contrib/minizip/minizip.c                     char answer[128];
answer            283 lib/zlib/contrib/minizip/minizip.c                     ret = scanf("%1s",answer);
answer            288 lib/zlib/contrib/minizip/minizip.c                     rep = answer[0] ;
answer            788 source4/heimdal/kdc/digest.c 	    struct ntlm_buf answer;
answer            873 source4/heimdal/kdc/digest.c 					    challange, &answer);
answer            879 source4/heimdal/kdc/digest.c 	    hex_encode(answer.data, answer.length, &mdx);
answer            881 source4/heimdal/kdc/digest.c 		free(answer.data);
answer            915 source4/heimdal/kdc/digest.c 		SHA1_Update(&ctx, answer.data, answer.length);
answer            927 source4/heimdal/kdc/digest.c 		    free(answer.data);
answer            935 source4/heimdal/kdc/digest.c 		    free(answer.data);
answer            944 source4/heimdal/kdc/digest.c 		SHA1_Update(&ctx, answer.data, answer.length);
answer            948 source4/heimdal/kdc/digest.c 		free(answer.data);
answer           1185 source4/heimdal/kdc/digest.c 	    struct ntlm_buf infotarget, answer;
answer           1202 source4/heimdal/kdc/digest.c 	    answer.length = ireq.u.ntlmRequest.ntlm.length;
answer           1203 source4/heimdal/kdc/digest.c 	    answer.data = ireq.u.ntlmRequest.ntlm.data;
answer           1211 source4/heimdal/kdc/digest.c 					 &answer,
answer           1226 source4/heimdal/kdc/digest.c 	    struct ntlm_buf answer;
answer           1261 source4/heimdal/kdc/digest.c 					    challange, &answer);
answer           1267 source4/heimdal/kdc/digest.c 	    if (ireq.u.ntlmRequest.ntlm.length != answer.length ||
answer           1268 source4/heimdal/kdc/digest.c 		memcmp(ireq.u.ntlmRequest.ntlm.data, answer.data, answer.length) != 0)
answer           1270 source4/heimdal/kdc/digest.c 		    free(answer.data);
answer           1275 source4/heimdal/kdc/digest.c 	    free(answer.data);
answer            875 source4/heimdal/lib/ntlm/ntlm.c 	    unsigned char *answer)
answer            891 source4/heimdal/lib/ntlm/ntlm.c     DES_ecb_encrypt((DES_cblock *)challange, (DES_cblock *)answer, &sched, 1);
answer            949 source4/heimdal/lib/ntlm/ntlm.c 			  struct ntlm_buf *answer)
answer            959 source4/heimdal/lib/ntlm/ntlm.c     answer->data = malloc(24);
answer            960 source4/heimdal/lib/ntlm/ntlm.c     if (answer->data == NULL)
answer            962 source4/heimdal/lib/ntlm/ntlm.c     answer->length = 24;
answer            964 source4/heimdal/lib/ntlm/ntlm.c     splitandenc(&res[0],  challange, ((unsigned char *)answer->data) + 0);
answer            965 source4/heimdal/lib/ntlm/ntlm.c     splitandenc(&res[7],  challange, ((unsigned char *)answer->data) + 8);
answer            966 source4/heimdal/lib/ntlm/ntlm.c     splitandenc(&res[14], challange, ((unsigned char *)answer->data) + 16);
answer           1123 source4/heimdal/lib/ntlm/ntlm.c 			  struct ntlm_buf *answer)
answer           1188 source4/heimdal/lib/ntlm/ntlm.c     answer->data = data.data;
answer           1189 source4/heimdal/lib/ntlm/ntlm.c     answer->length = data.length;
answer           1225 source4/heimdal/lib/ntlm/ntlm.c 		       const struct ntlm_buf *answer,
answer           1243 source4/heimdal/lib/ntlm/ntlm.c     if (answer->length < 16)
answer           1255 source4/heimdal/lib/ntlm/ntlm.c     sp = krb5_storage_from_readonly_mem(answer->data, answer->length);
answer           1285 source4/heimdal/lib/ntlm/ntlm.c     infotarget->length = answer->length - krb5_storage_seek(sp, 0, SEEK_CUR);
answer           1300 source4/heimdal/lib/ntlm/ntlm.c     HMAC_Update(&c, ((unsigned char *)answer->data) + 16, answer->length - 16);