Home | History | Annotate | Download | only in netcat

Lines Matching full:what

264    malloc up what I want, rounded up to *4, and pre-zeroed.  Either succeeds
335 and we also check o_verbose for what's appropriate work to do. */
351 What an absolutely horrid paradigm, and to think of all the people who
354 languages wherein a pointer is a pointer, what you put there is your own
434 If o_nflag is on, fill in what we can but skip the getservby??? stuff.
498 some real network calls -- and guess what, we have to *re*-convert at that
605 Examines various global o_blah flags to figure out what-all to do. */
711 this and watching "tcpdump -v" is the best way to understand what's going on.
806 said -p we *know* what port we're listening on. At any rate we won't bother
848 I guess that's what they meant by "connect".
849 Let's try to remember what the "U" is *really* for, eh? */
899 /* find out what address the connection was *to* on our end, in case we're
996 what when. Adapted from dgaudet's original example -- but must be ripping
1124 In this instance, return what might become our exit status. */
1274 oprint (0, zp, rr); /* log what got sent */