Lines Matching +defs:string +defs:match

6   * network numbers) and daemon process names. When a match is found the
47 #include <string.h>
167 /* table_match - match table entries with (daemon, client) pair */
176 int match = NO;
189 while (match == NO && xgets(sv_list, sizeof(sv_list), fp) != 0) {
201 match = list_match(sv_list, request, server_match)
208 if (match) {
222 return (match);
225 /* list_match - match a request against a list of patterns with exceptions */
238 * a match, look for an "EXCEPT" list and recurse to determine whether
239 * the match is affected by any exceptions.
260 /* server_match - match server information */
275 /* client_match - match client information */
290 /* host_match - match host name and/or address against pattern */
303 * patterns are satisfied when either the address OR the name match.
340 int match = NO;
344 while (fscanf(fp, "%511s", tok) == 1 && !(match = host_match(tok, host)))
350 return (match);
353 /* rbl_match() - match host by looking up in RBL domain */
391 /* string_match - match string against pattern */
394 string_match(char *tok, char *string)
399 n = strlen(string) - strlen(tok);
400 return (n > 0 && STR_EQ(tok, string + n));
401 } else if (STR_EQ(tok, "ALL")) { /* all: match any */
404 return (STR_NE(string, unknown));
406 return (STRN_EQ(tok, string, n));
407 } else { /* exact match */
408 return (STR_EQ(tok, string));
412 /* masked_match - match address against netnumber/netmask */
415 masked_match(char *net_tok, char *mask_tok, char *string)
418 return masked_match4(net_tok, mask_tok, string);
427 dot_quad_addr(string, NULL) != -1) {
428 return masked_match4(net_tok, mask_tok, string);
430 return masked_match6(net_tok, mask_tok, string);
435 masked_match4(char *net_tok, char *mask_tok, char *string)
447 if (dot_quad_addr(string, &addr) != 0)
463 masked_match6(char *net_tok, char *mask_tok, char *string)
540 if (getaddrinfo(string, "0", &hints, &res) == 0) {