/macosx-10.10.1/BerkeleyDB-21/db/examples_cxx/excxx_repquote/ |
H A D | RepConfigInfo.cpp | 38 void RepConfigInfo::addOtherHost(char* host, int port, bool peer) argument 42 newinfo->host = host;
|
/macosx-10.10.1/OpenSSH-189/openssh/ |
H A D | auth-rhosts.c | 60 char buf[1024]; /* Must not be larger than host, user, dummy below. */ 84 char hostbuf[1024], userbuf[1024], dummy[1024], *host, *user, *cp; local 113 /* Got both host and user name. */ 123 host = hostbuf; 127 /* Process negated host names, or positive netgroups. */ 128 if (host[0] == '-') { 130 host++; 131 } else if (host[0] == '+') 132 host++; 140 /* Check for empty host/use [all...] |
/macosx-10.10.1/WebInspectorUI-7600.1.17/UserInterface/Base/ |
H A D | URLUtilities.js | 64 return {scheme: null, host: null, port: null}; 67 var host = match[2].toLowerCase(); variable 70 return {scheme: scheme, host: host, port: port}; 79 return {scheme: null, host: null, port: null, path: null, queryString: null, fragment: null, lastPathComponent: null}; 82 var host = match[2].toLowerCase(); variable 109 return {scheme: scheme, host: host, port: port, path: path, queryString: queryString, fragment: fragment, lastPathComponent: lastPathComponent}; 138 // The path can be null for URLs that have just a scheme and host (like "http://apple.com"). So make the path be "/". 143 var baseURLPrefix = baseURLComponents.scheme + "://" + baseURLComponents.host [all...] |
/macosx-10.10.1/postfix-255/postfix/src/util/ |
H A D | myaddrinfo.h | 171 #define hostname_to_sockaddr(host, serv, sock, res) \ 172 hostname_to_sockaddr_pf((host), PF_UNSPEC, (serv), (sock), (res)) 178 #define HOSTNAME_TO_SOCKADDR_PF(host, pf, serv, sock, res) \ 181 _aierr = hostname_to_sockaddr_pf((host), (pf), (serv), (sock), (res)); \ 186 #define HOSTNAME_TO_SOCKADDR(host, serv, sock, res) \ 187 HOSTNAME_TO_SOCKADDR_PF((host), PF_UNSPEC, (serv), (sock), (res)) 189 #define HOSTADDR_TO_SOCKADDR(host, serv, sock, res) \ 192 _aierr = hostaddr_to_sockaddr((host), (serv), (sock), (res)); \ 197 #define SOCKADDR_TO_HOSTADDR(sa, salen, host, port, sock) \ 200 _aierr = sockaddr_to_hostaddr((sa), (salen), (host), (por [all...] |
/macosx-10.10.1/ruby-106/ruby/ext/socket/ |
H A D | tcpsocket.c | 44 * Lookups host information by _hostname_. 51 tcp_s_gethostbyname(VALUE obj, VALUE host) argument 54 return rsock_make_hostent(host, rsock_addrinfo(host, Qnil, SOCK_STREAM, AI_CANONNAME),
|
H A D | sockssocket.c | 16 * SOCKSSocket.new(host, serv) => socket 18 * Opens a SOCKS connection to +host+ via the SOCKS server +serv+. 22 socks_init(VALUE sock, VALUE host, VALUE serv) argument 31 return rsock_init_inetsock(sock, host, serv, Qnil, Qnil, INET_SOCKS);
|
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/examples/ftp/ |
H A D | ftpvalid | 45 set fdc [ftp::Open $current(host) anonymous enteryourname@here.com] 47 puts stderr [format "error 1: unable to open %s\n" $current(host)] 56 puts stderr [format "error 2: unable to enter directory %s:%s\n" $current(host) $ftp_dir] 61 puts stderr [format "error 3: failure to enter %s:%s\n" $current(host) $ftp_dir] 68 puts stderr [format "error 4: no match for ${ftp_file}*\n" $current(host) $ftp_dir] 72 puts stderr [format "error 5: no match for ${ftp_file}*\n" $current(host) $ftp_dir]
|
/macosx-10.10.1/BerkeleyDB-21/db/repmgr/ |
H A D | repmgr_stub.c | 53 __repmgr_add_remote_site(dbenv, host, port, eidp, flags) 55 const char *host; 60 COMPQUIET(host, NULL); 102 __repmgr_set_local_site(dbenv, host, port, flags) 104 const char *host; 108 COMPQUIET(host, NULL);
|
/macosx-10.10.1/Heimdal-398.1.2/tests/apple/ |
H A D | check-apple-od.in | 66 # --client-name='smbtest@\targetname' --password='smbtest' service@host || \ 75 host=$(hostname) 76 if expr "$host" : '.*\.apple\.com' > /dev/null ; then 80 ${winmount} ${testbase}/apple/coswin7-od.plist ${host} || { cat ${logfile}; exit 1; }
|
/macosx-10.10.1/Heimdal-398.1.2/tests/gss/ |
H A D | check-ntlm.in | 72 GSSAPI_SPNEGO_NAME=host@host.test.h5l.se 89 ${kadmin} add -p p1 --use-defaults host/host.test.h5l.se@${R} || exit 1 90 ${kadmin} ext -k ${keytab} host/host.test.h5l.se@${R} || exit 1 140 host@host.test.h5l.se 2> /dev/null && \ 151 host@host [all...] |
/macosx-10.10.1/cxxfilt-11/cxxfilt/binutils/testsuite/binutils-all/ |
H A D | size.exp | 23 if ![is_remote host] { 37 if [is_remote host] { 38 set testfile [remote_download host tmpdir/bintest.o]
|
/macosx-10.10.1/OpenSSH-189/openssh/regress/ |
H A D | keyscan.sh | 7 rm -f ${OBJ}/host.dsa
|
/macosx-10.10.1/WebInspectorUI-7600.1.17/UserInterface/Views/ |
H A D | CookieStorageTreeElement.js | 30 WebInspector.StorageTreeElement.call(this, WebInspector.CookieStorageTreeElement.CookieIconStyleClassName, WebInspector.displayNameForHost(representedObject.host), representedObject); 42 return this.representedObject.host;
|
/macosx-10.10.1/WebKit-7600.1.25/mac/Misc/ |
H A D | WebKitSystemBits.m | 46 mach_port_t host; 49 host = mach_host_self(); 51 r = host_info(host, HOST_BASIC_INFO, (host_info_t) &gHostBasicInfo, &count); 52 mach_port_deallocate(mach_task_self(), host);
|
/macosx-10.10.1/WebKit2-7600.1.25/UIProcess/Authentication/ |
H A D | WebProtectionSpace.cpp | 38 const String& WebProtectionSpace::host() const function in class:WebKit::WebProtectionSpace 40 return m_coreProtectionSpace.host();
|
/macosx-10.10.1/autofs-246/automountd/ |
H A D | replica.c | 65 if (list[i].host) 66 free(list[i].host); 107 * under "host part". 117 list[*count-1].host = strdup(proot); 118 if (!list[*count-1].host) 138 * If "v6addr" is set, unset it, and since the "host 150 list[*count-1].host = strdup(proot); 151 if (!list[*count-1].host) 170 * under "host part". 183 list[*count-1].host [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | krbhst.c | 550 append_host_hostinfo(struct krb5_krbhst_data *kd, struct krb5_krbhst_info *host) argument 556 for(h = kd->hosts; h && host; h = h->next) { 557 if(h->proto == host->proto && 558 h->port == host->port && 559 strcasecmp(h->hostname, host->hostname) == 0) 561 _krb5_free_krbhst_info(host); 562 host = NULL; 566 if (host) { 567 *kd->end = host; 568 kd->end = &host 575 append_host_string(krb5_context context, struct krb5_krbhst_data *kd, const char *host, int def_port, int port) argument 593 krb5_krbhst_format_string(krb5_context context, const krb5_krbhst_info *host, char *hostname, size_t hostlen) argument 644 krb5_krbhst_get_addrinfo(krb5_context context, krb5_krbhst_info *host, struct addrinfo **ai) argument 696 get_next(struct krb5_krbhst_data *kd, krb5_krbhst_info **host) argument 820 char *host = NULL; local 890 add_plugin_host(struct krb5_krbhst_data *kd, const char *host, const char *port, int portnum, int proto) argument 926 char host[NI_MAXHOST], port[NI_MAXSERV]; local 1024 kdc_get_next(krb5_context context, struct krb5_krbhst_data *kd, krb5_krbhst_info **host) argument 1101 admin_get_next(krb5_context context, struct krb5_krbhst_data *kd, krb5_krbhst_info **host) argument 1155 kpasswd_get_next(krb5_context context, struct krb5_krbhst_data *kd, krb5_krbhst_info **host) argument 1328 krb5_krbhst_next(krb5_context context, krb5_krbhst_handle handle, krb5_krbhst_info **host) argument 1345 krb5_krbhst_info *host = ctx; local 1399 _krb5_krbhst_async(krb5_context context, krb5_krbhst_handle handle, heim_queue_t queue, void *userctx, void (*callback)(void *userctx, krb5_krbhst_info *host)) argument 1442 krb5_krbhst_info *host; local 1491 char host[MAXHOSTNAMELEN]; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | Code.cpp | 41 SecCode::SecCode(SecCode *host) argument 42 : mHost(host), mIdentified(false) 44 CODESIGN_DYNAMIC_CREATE(this, host); 83 // Yield the host Code 85 SecCode *SecCode::host() const function in class:Security::CodeSigning::SecCode 108 // Yield the CodeDirectory hash as presented by our host. 118 return mCDHash; // can be NULL (host has no dynamic identity for guest) 130 return this->host()->getGuestStatus(this); 138 this->host()->changeGuestStatus(this, operation, arguments); 152 // By default, we self-identify by asking our host t [all...] |
H A D | csgeneric.cpp | 42 #define CALL(host, name, args...) \ 44 if (cshosting_client_ ## name (host, mig_get_reply_port(), &result, args)) \ 52 GenericCode::GenericCode(SecCode *host, SecGuestRef guestRef) argument 53 : SecCode(host), mGuestRef(guestRef) 60 // This uses cshosting RPCs to ask the host (or its proxy). 64 if (Port host = hostingPort()) { 75 CALL(host, findGuest, guestRef(), attrPtr, (mach_msg_type_number_t)attrLength, 89 // This uses cshosting RPCs to ask the host (or its proxy). 120 if (Port host = hostingPort()) { 125 CALL(host, identifyGues [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | Code.cpp | 41 SecCode::SecCode(SecCode *host) argument 42 : mHost(host), mIdentified(false) 44 CODESIGN_DYNAMIC_CREATE(this, host); 83 // Yield the host Code 85 SecCode *SecCode::host() const function in class:Security::CodeSigning::SecCode 108 // Yield the CodeDirectory hash as presented by our host. 118 return mCDHash; // can be NULL (host has no dynamic identity for guest) 130 return this->host()->getGuestStatus(this); 138 this->host()->changeGuestStatus(this, operation, arguments); 152 // By default, we self-identify by asking our host t [all...] |
H A D | csgeneric.cpp | 42 #define CALL(host, name, args...) \ 44 if (cshosting_client_ ## name (host, mig_get_reply_port(), &result, args)) \ 52 GenericCode::GenericCode(SecCode *host, SecGuestRef guestRef) argument 53 : SecCode(host), mGuestRef(guestRef) 60 // This uses cshosting RPCs to ask the host (or its proxy). 64 if (Port host = hostingPort()) { 75 CALL(host, findGuest, guestRef(), attrPtr, (mach_msg_type_number_t)attrLength, 89 // This uses cshosting RPCs to ask the host (or its proxy). 120 if (Port host = hostingPort()) { 125 CALL(host, identifyGues [all...] |
/macosx-10.10.1/rsync-45/rsync/ |
H A D | access.c | 24 static int match_hostname(char *host, char *tok) argument 26 if (!host || !*host) 28 return wildmatch(tok, host); 214 static int access_match(char *list, char *addr, char *host) argument 223 if (host) 224 strlower(host); 227 if (match_hostname(host, tok) || match_address(addr, tok)) { 237 int allow_access(char *addr, char *host, char *allow_list, char *deny_list) argument 246 if (access_match(allow_list, addr, host)) [all...] |
/macosx-10.10.1/bind9-45.101/bind9/bin/dig/win32/ |
H A D | host.mak | 1 # Microsoft Developer Studio Generated NMAKE File, Based on host.dsp
3 CFG=host - Win32 Debug
4 !MESSAGE No configuration specified. Defaulting to host - Win32 Debug.
7 !IF "$(CFG)" != "host - Win32 Release" && "$(CFG)" != "host - Win32 Debug"
12 !MESSAGE NMAKE /f "host.mak" CFG="host - Win32 Debug"
16 !MESSAGE "host - Win32 Release" (based on "Win32 (x86) Console Application")
17 !MESSAGE "host - Win32 Debug" (based on "Win32 (x86) Console Application")
31 !IF "$(CFG)" == "host [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/urlPageGrab/ |
H A D | urlPageGrab.cpp | 41 /* return nonzero if specified host is in nonSslSites */ 43 const char *host) 47 if(!strcmp(*nss, host)) { 76 const char *host; member in struct:__anon5285 102 const char *host, 107 printf("https://%s%s", host, path); 110 printf("http://%s%s", host, path); 119 const char *host, 138 sprintf(url, "%s%s%s", scheme, host, path); 196 params->ortn = fetchUrl(params->host, 42 isHostNonSsl( const char *host) argument 101 printUrl( const char *host, const char *path, int isSsl) argument 118 fetchUrl( const char *host, const char *path, bool isSsl, bool useCfNet, int singleThread, unsigned *bytesRead, CFDataRef *cfData) argument 213 fetchImages( CFDataRef cfData, const char *host, const char *origPath, int isSsl, bool useCfNet, int singleThread, int quiet) argument 444 char *host; local [all...] |
/macosx-10.10.1/emacs-93/emacs/lisp/net/ |
H A D | tramp.el | 34 ;; the local and the remote host, whereas tramp.el uses a combination 144 ;; UNC file names like "//host/share/localname". 203 name prefix \(multi-method, method, user, host\) of file. 222 \(multi-method, method, user, host\) of file. 249 "*Use this program for encoding and decoding commands on the local host. 251 local host, so if you want to use `~' in those commands, you should 266 use for the remote host." 555 This specifies the function to use to connect to the remote host. 560 This specifies the Bourne shell to use on the remote host. This 568 remote host [all...] |