/macosx-10.10.1/ruby-106/ruby/lib/ |
H A D | resolv.rb | 1279 @authority = [] 1284 attr_reader :question, :answer, :authority, :additional 1297 @authority == other.authority && 1322 @authority << [Name.create(name), ttl, data] 1326 @authority.each {|name, ttl, data| 1360 @authority.length, 1367 [@answer, @authority, @additional].each {|rr|
|
/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | server.h | 46 #include "authority.h" 54 // The authority itself. You will usually only have one of these. 131 static Authority &authority() { return active().mAuthority; } function in class:Server 223 // busy state for primary state authority
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | policyengine.cpp | 210 // no applicable authority (but signed, perhaps temporarily). Deny by default 240 if (matchFlags == 0) { // playback; consult authority table for matches 255 "SELECT flags FROM authority " 547 // no applicable authority. Deny by default 657 CFMutableDictionaryRef authority = CFMutableDictionaryRef(CFDictionaryGetValue(parent, kSecAssessmentAssessmentAuthority)); local 658 assert(authority); 659 CFDictionaryAddValue(authority, key, value); 742 "INSERT INTO authority (type, allow, requirement, priority, label, expires, filter_unsigned, remarks, flags)" 758 SQLite::Statement bi(*this, "INSERT INTO bookmarkhints (bookmark, authority) VALUES (:bookmark, :authority)"); 957 recordOutcome(SecStaticCodeRef code, bool allow, AuthorityType type, double expires, SQLite::int64 authority) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | policyengine.cpp | 210 // no applicable authority (but signed, perhaps temporarily). Deny by default 240 if (matchFlags == 0) { // playback; consult authority table for matches 255 "SELECT flags FROM authority " 547 // no applicable authority. Deny by default 657 CFMutableDictionaryRef authority = CFMutableDictionaryRef(CFDictionaryGetValue(parent, kSecAssessmentAssessmentAuthority)); local 658 assert(authority); 659 CFDictionaryAddValue(authority, key, value); 742 "INSERT INTO authority (type, allow, requirement, priority, label, expires, filter_unsigned, remarks, flags)" 758 SQLite::Statement bi(*this, "INSERT INTO bookmarkhints (bookmark, authority) VALUES (:bookmark, :authority)"); 957 recordOutcome(SecStaticCodeRef code, bool allow, AuthorityType type, double expires, SQLite::int64 authority) argument [all...] |
/macosx-10.10.1/libresolv-57/ |
H A D | dns_util.c | 852 r->authority = (dns_resource_record_t **)calloc(h->nscount, size); 855 r->authority[i] = _dns_parse_resource_record_internal(p, &x, &remaining); 856 if (r->authority[i] == NULL) 1052 for (i = 0; i < r->header->nscount; i++) dns_free_resource_record(r->authority[i]); 1060 if (r->authority != NULL) free(r->authority); 1200 _dns_append_resource_record(dnsr->authority[i], &s, rl); 1914 _dns_print_resource_record_lock(r->authority[i], f, 0);
|
/macosx-10.10.1/ruby-106/ruby/lib/uri/ |
H A D | generic.rb | 761 # authority = server | reg_name 1210 authority = rel.userinfo || rel.host || rel.port 1213 if (rel.path.nil? || rel.path.empty?) && !authority && !rel.query 1222 if !authority
|
H A D | common.rb | 136 # net_path = "//" authority [ abs_path ] 138 # authority = server | reg_name 168 # net_path = "//" authority [ abs_path ] 172 # authority = server | reg_name 427 # authority = server | reg_name 428 authority = "(?:#{server}|#{reg_name})" 441 # net_path = "//" authority [ abs_path ] 442 ret[:NET_PATH] = net_path = "//#{authority}(?:#{abs_path})?"
|
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/ |
H A D | sdlz.c | 552 dns_sdlzauthorityfunc_t authority; local 620 if (isorigin && sdlz->dlzimp->methods->authority != NULL) { 622 authority = sdlz->dlzimp->methods->authority; 623 result = (*authority)(zonestr, sdlz->dlzimp->driverarg,
|
H A D | sdb.c | 796 isorigin && imp->methods->authority != NULL)) 802 if (isorigin && imp->methods->authority != NULL) { 804 result = imp->methods->authority(sdb->zone, sdb->dbdata, node);
|
/macosx-10.10.1/CPANInternal-159.1/IO-Socket-SSL/ |
H A D | SSL.pm | 1118 $dispatcher{authority} = $dispatcher{issuer}; 1550 return IO::Socket::SSL->error("Invalid certificate authority locations"); 1927 certificate authority, then you should use this option to locate the file 2005 by the signing authority, set this value to true. OpenSSL will search 2165 =item authority (alias issuer) 2167 The certificate authority which signed the certificate.
|
/macosx-10.10.1/CPANInternal-159.1/HTTP-Proxy-0.25/lib/HTTP/ |
H A D | Proxy.pm | 729 return 0 if ( $self->{request}->uri->authority || '' ) !~ $host; 854 host - the URI authority (host:port)
|
/macosx-10.10.1/CPANInternal-159.1/HTTP-Proxy-0.300/lib/HTTP/ |
H A D | Proxy.pm | 729 return 0 if ( $self->{request}->uri->authority || '' ) !~ $host; 854 host - the URI authority (host:port)
|
/macosx-10.10.1/Heimdal-398.1.2/lib/sqlite/ |
H A D | sqlite3.c | 3029 ** authority, then it must be either an empty string or the string 3030 ** "localhost". ^If the authority is not an empty string or "localhost", an 3037 ** with a '/' (meaning that the authority section is omitted from the URI) 3095 ** An error. "darkstar" is not a recognized authority. [all...] |