/macosx-10.10.1/pyobjc-45/pyobjc/pyobjc-framework-CFNetwork-2.5.1/PyObjCTest/ |
H A D | test_cfhost.py | 79 def callback(host, typeinfo, error, ctx): 80 lst.append([host, typeinfo, error, ctx]) 82 host = CFHostCreateWithName(None, b"localhost".decode('latin1')) 83 CFHostSetClient(host, callback, ctx) 86 CFHostScheduleWithRunLoop(host, rl, kCFRunLoopDefaultMode) 88 ok, err = CFHostStartInfoResolution(host, kCFHostAddresses, None) 95 CFHostUnscheduleFromRunLoop(host, rl, kCFRunLoopDefaultMode) 104 lst, ok = CFHostGetAddressing(host, None)
|
/macosx-10.10.1/ruby-106/ruby/test/rubygems/ |
H A D | test_bundled_ca.rb | 25 def assert_https(host) 31 http = Net::HTTP.new(host, 443) 37 skip "#{host} seems offline, I can't tell whether ssl would work." 41 flunk "#{host} is not verifiable using the included certificates. Error was: #{e.message}"
|
/macosx-10.10.1/tcl-105/tcl_ext/tls/tls/tests/oldTests/ |
H A D | tlsAuto.tcl | 40 -host localhost 51 #set chan [tls::socket -async -request 0 $opts(-host) $opts(-port)] 52 set chan [tls::socket -request 0 $opts(-host) $opts(-port)]
|
/macosx-10.10.1/Heimdal-398.1.2/tests/kdc/ |
H A D | check-delegation.in | 52 server=host/datan.test4.h5l.se@TEST4.H5L.ORG 89 ${kadmin} add -p foo --use-defaults host/server.test3.h5l.se@${R3} || exit 1 90 ${kadmin} modify --attributes=+ok-as-delegate host/server.test3.h5l.se@${R3} || exit 1 91 ${kadmin} add -p foo --use-defaults host/noserver.test3.h5l.se@${R3} || exit 1 93 ${kadmin} add -p foo --use-defaults host/server.test4.h5l.se@${R4} || exit 1 94 ${kadmin} modify --attributes=+ok-as-delegate host/server.test4.h5l.se@${R4} || exit 1 126 ${kgetcred} host/server.test3.h5l.se@${R3} || { ec=1 ; eval "${testfailed}"; } 127 ${kgetcred} host/server.test4.h5l.se@${R4} || { ec=1 ; eval "${testfailed}"; } 131 ${klist} -v | awk '/Server:.*host.server.test3/{c=8}{if(c-->0){print}}' | grep 'Ticket flags:.*ok-as-delegate' > /dev/null || \ 133 ${klist} -v | awk '/Server:.*host [all...] |
/macosx-10.10.1/NFS-82/showmount/ |
H A D | showmount.h | 87 int do_print(const char *host);
|
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/tests/progs/ |
H A D | slapd-common.h | 35 extern char * tester_uri( char *uri, char *host, int port );
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | SecCodeHost.cpp | 53 OSStatus SecHostCreateGuest(SecGuestRef host, argument 60 CodeSigning::Required(newGuest) = SecurityServer::ClientSession().createGuest(host, 66 OSStatus SecHostRemoveGuest(SecGuestRef host, SecGuestRef guest, SecCSFlags flags) argument 71 SecurityServer::ClientSession().removeGuest(host, guest);
|
H A D | SecCodeHostLib.c | 79 OSStatus SecHostLibCreateGuest(SecGuestRef host, argument 83 return SecHostLibCreateGuest2(host, status, path, "", 0, attributeXML, flags, newGuest); 86 OSStatus SecHostLibCreateGuest2(SecGuestRef host, argument 93 CALL(ucsp_client_createGuest(UCSP_ARGS, host, status, path,
|
H A D | Code.h | 51 SecCode(SecCode *host); 57 SecCode *host() const; 58 bool isRoot() const { return host() == NULL; } 82 CFRef<CFDataRef> mCDHash; // (dynamic) CodeDirectory hash as per host
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | SecCodeHost.cpp | 53 OSStatus SecHostCreateGuest(SecGuestRef host, argument 60 CodeSigning::Required(newGuest) = SecurityServer::ClientSession().createGuest(host, 66 OSStatus SecHostRemoveGuest(SecGuestRef host, SecGuestRef guest, SecCSFlags flags) argument 71 SecurityServer::ClientSession().removeGuest(host, guest);
|
H A D | SecCodeHostLib.c | 79 OSStatus SecHostLibCreateGuest(SecGuestRef host, argument 83 return SecHostLibCreateGuest2(host, status, path, "", 0, attributeXML, flags, newGuest); 86 OSStatus SecHostLibCreateGuest2(SecGuestRef host, argument 93 CALL(ucsp_client_createGuest(UCSP_ARGS, host, status, path,
|
H A D | Code.h | 51 SecCode(SecCode *host); 57 SecCode *host() const; 58 bool isRoot() const { return host() == NULL; } 82 CFRef<CFDataRef> mCDHash; // (dynamic) CodeDirectory hash as per host
|
/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | authhost.h | 41 AuthHostInstance(Session &session, AuthHostType host);
|
/macosx-10.10.1/WebInspectorUI-7600.1.17/UserInterface/Models/ |
H A D | DOMStorageObject.js | 26 WebInspector.DOMStorageObject = function(id, host, isLocalStorage) 29 this._host = host; 35 WebInspector.DOMStorageObject.HostCookieKey = "dom-storage-object-host"; 54 get host() 66 cookie[WebInspector.DOMStorageObject.HostCookieKey] = this.host;
|
/macosx-10.10.1/WebKit-7600.1.25/mac/Misc/ |
H A D | WebUserContentURLPattern.mm | 74 - (NSString *)host 76 return _private->pattern.host();
|
/macosx-10.10.1/bash-94.1.2/bash-3.2/examples/startup-files/apple/ |
H A D | rc | 27 host=$(echo $(hostname) | tr A-Z a-z) 31 export HOST=${host}
|
/macosx-10.10.1/bash-94.1.2/bash-3.2/lib/intl/ |
H A D | config.charset | 111 # The first argument passed to this file is the canonical host specification, 116 host="$1" 117 os=`echo "$host" | sed -e 's/^[^-]*-[^-]*-\(.*\)$/\1/'`
|
/macosx-10.10.1/cxxfilt-11/cxxfilt/config/ |
H A D | multi.m4 | 57 host="$host"
|
/macosx-10.10.1/emacs-93/emacs/lisp/url/ |
H A D | url-nfs.el | 46 (defun url-nfs-unescape (format host port user pass file) 57 (?h (insert host)) 65 (let* ((host (url-host url)) 72 host port user pass file))))
|
/macosx-10.10.1/postfix-255/postfix/src/smtp/ |
H A D | smtp_addr.c | 24 /* DNS lookups are disabled, host address lookup is done with 32 /* is updated when the local MTA is MX host for the specified 44 /* host. The host can be specified as a numerical Internet network 45 /* address, or as a symbolic host name. 116 msg_info("pref %4d host %s/%s", 124 /* smtp_addr_one - address lookup for one host name */ 126 static DNS_RR *smtp_addr_one(DNS_RR *addr_list, const char *host, int res_opt, argument 139 msg_info("%s: host %s", myname, host); 488 smtp_host_addr(const char *host, int misc_flags, DSN_BUF *why) argument [all...] |
/macosx-10.10.1/ruby-106/ruby/sample/openssl/ |
H A D | wget.rb | 13 prx_host = prx_uri.host 17 h = Net::HTTP.new(uri.host, uri.port, prx_host, prx_port)
|
/macosx-10.10.1/xnu-2782.1.97/osfmk/kern/ |
H A D | task_swap.h | 98 #include <kern/host.h> 128 host_priv_t, /* host */
|
/macosx-10.10.1/Heimdal-398.1.2/appl/kx/ |
H A D | context.c | 43 context_set (kx_context *kc, const char *host, const char *user, int port, argument 48 kc->host = host;
|
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | get_host_realm.c | 38 /* To automagically find the correct realm of a host (without 45 * hosts. To find the realm of host a.b.c, it first tries 135 * Try to figure out what realms host in `domain' belong to from the 156 * This function assumes that `host' is a FQDN (and doesn't handle the 157 * special case of host == NULL either). 164 const char *host, 174 for (p = host; p != NULL; p = strchr (p + 1, '.')) { 178 for (q = host; q != NULL; q = strchr(q + 1, '.')) 190 p = strchr(host, '.'); 210 N_("unable to find realm of host 163 _krb5_get_host_realm_int(krb5_context context, const char *host, krb5_boolean use_dns, krb5_realm **realms) argument 232 const char *host; member in struct:host_domain_ctx 287 krb5_get_host_realm(krb5_context context, const char *host, krb5_realm **realms) argument [all...] |
/macosx-10.10.1/Heimdal-398.1.2/tests/gss/ |
H A D | check-gssmask.in | 53 gssmaskn1="${gssmask} -p 8889 --spn=host/n1.test.h5l.se@${R} --logfile=n1.log" 54 gssmaskn2="${gssmask} -p 8890 --spn=host/n2.test.h5l.se@${R} --logfile=n2.log" 55 gssmaskn3="${gssmask} -p 8891 --spn=host/n3.test.h5l.se@${R} --logfile=n3.log" 75 ${kadmin} add -p p1 --use-defaults host/n1.test.h5l.se@${R} || exit 1 76 ${kadmin} add -p p2 --use-defaults host/n2.test.h5l.se@${R} || exit 1 77 ${kadmin} add -p p3 --use-defaults host/n3.test.h5l.se@${R} || exit 1 78 ${kadmin} ext -k ${keytab} host/n1.test.h5l.se@${R} || exit 1 79 ${kadmin} ext -k ${keytab} host/n2.test.h5l.se@${R} || exit 1 80 ${kadmin} ext -k ${keytab} host/n3.test.h5l.se@${R} || exit 1
|