/macosx-10.9.5/Security-55471.14.18/include/security_utilities/ |
H A D | socks++5.h | 112 Message(Command cmd, const char *hostname, IPPort port); // type 3 request
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_utilities/lib/ |
H A D | socks++5.h | 112 Message(Command cmd, const char *hostname, IPPort port); // type 3 request
|
/macosx-10.9.5/WebCore-7537.78.1/platform/network/qt/ |
H A D | CookieJarQt.cpp | 140 void deleteCookiesForHostname(const NetworkStorageSession& session, const String& hostname) argument 145 jar->deleteCookiesForHostname(hostname); 198 void SharedCookieJarQt::deleteCookiesForHostname(const String& hostname) argument 209 if (it->domain() == QString(hostname)) {
|
/macosx-10.9.5/WebCore-7537.78.1/platform/network/win/ |
H A D | CookieJarWin.cpp | 96 void deleteCookiesForHostname(const NetworkStorageSession&, const String& hostname) argument
|
/macosx-10.9.5/adv_cmds-153/whois/ |
H A D | whois.c | 276 whois(const char *query, const char *hostname, int flags) argument 284 hostres = gethostinfo(hostname, 1); 301 if (strcmp(hostname, GERMNICHOST) == 0) { 336 } else if (strcmp(hostname, ANICHOST) == 0) { 360 "usage: whois [-aAbdgiIlmQrR6] [-c country-code | -h hostname] "
|
/macosx-10.9.5/apache-786.1/httpd/modules/proxy/ |
H A D | mod_proxy_connect.c | 122 "proxy: CONNECT: connecting %s to %s:%d", url, uri.hostname, uri.port); 125 err = apr_sockaddr_info_get(&uri_addr, uri.hostname, APR_UNSPEC, uri.port, 130 uri.hostname, NULL)); 140 connectname = uri.hostname;
|
H A D | proxy_util.c | 39 const char *target_host; /* Target hostname */ 533 if (r->hostname != NULL) { 534 return r->hostname; 550 r->hostname = host; 724 "2)IP-NoMatch: hostname=%s msg=Host not found", host); 914 "proxy: checking remote machine [%s] against [%s]", uri_addr->hostname, npent[j].name); 915 if ((npent[j].name && ap_strstr_c(uri_addr->hostname, npent[j].name)) 918 "proxy: connect to remote machine %s blocked: name %s matched", uri_addr->hostname, npent[j].name); 932 "proxy: connect to remote machine %s blocked: IP %s matched", uri_addr->hostname, conf_ip); 1063 * after the hostname [all...] |
/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/include/ |
H A D | apr_uri.h | 94 /** hostname from URI (or from Host: header) */ 95 char *hostname; member in struct:apr_uri_t
|
/macosx-10.9.5/apache-786.1/httpd/srclib/apr-util/include/private/ |
H A D | apu_internal.h | 49 int (*init)(apr_pool_t *pool, LDAP **ldap, const char *hostname,
|
/macosx-10.9.5/apr-30/apr-util/apr-util/include/ |
H A D | apr_uri.h | 94 /** hostname from URI (or from Host: header) */ 95 char *hostname; member in struct:apr_uri_t
|
/macosx-10.9.5/bootp-268.1/bootplib/ |
H A D | hostlist.h | 43 char * hostname; /* host name (and suffix) */ member in struct:hosts
|
/macosx-10.9.5/cups-372.4/cups/cups/ |
H A D | sspi-private.h | 62 const CHAR *hostname);
|
/macosx-10.9.5/man-16/man/man2html/scripts/cgi-bin/man/ |
H A D | mansec | 105 "hostname" | getline hostname; 107 print hostname " (" date ")" > cache_tmp;
|
H A D | manwhatis | 95 "hostname" | getline hostname; 97 print hostname " (" date ")" > cache_tmp;
|
/macosx-10.9.5/remote_cmds-41.90.1/timed.tproj/timed.tproj/ |
H A D | acksend.c | 60 (void)strcpy(msg.tsp_name, hostname);
|
H A D | timed.c | 206 if (gethostname(hostname, sizeof(hostname) - 1) < 0) 216 add_good_host(hostname,1); 481 (void)strcpy(msg.tsp_name, hostname); 499 (void)strcpy(resp.tsp_name, hostname); 572 (void)strcpy(conflict.tsp_name, hostname); 803 if (!innetgr(goodgroup, &hostname[0], 0,0)) { 806 &hostname[0], goodgroup); 811 &hostname[0], goodgroup); 848 if (!strcasecmp(name,hostname)) /* trus [all...] |
/macosx-10.9.5/remote_cmds-41.90.1/wall.tproj/ |
H A D | wall.c | 243 char *p, hostname[MAXHOSTNAMELEN], lbuf[256], tmpname[64]; local 260 (void)gethostname(hostname, sizeof(hostname)); 274 whom, hostname);
|
/macosx-10.9.5/tcl-102/tcl_ext/expect/expect/ |
H A D | pty_unicos.c | 78 static char hostname[MAXHOSTNAMELEN]; variable 191 (void) gethostname(hostname,sizeof(hostname)); 327 strncpy(utmp.ut_host,hostname,sizeof(utmp.ut_host));
|
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | get_for_creds.c | 85 * Forward credentials for client to host hostname , making them 87 * in out_data. If hostname == NULL, pick it from server. 91 * @param hostname the host to forward the tickets too. 106 const char *hostname, 123 if (hostname == NULL && 132 hostname = host; 153 hostname, 160 * Gets tickets forwarded to hostname. If the tickets that are 164 * If the ticket have any address, hostname will be used for figure 176 * @param hostname th 104 krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, const char *hostname, krb5_principal client, krb5_principal server, krb5_ccache ccache, int forwardable, krb5_data *out_data) argument 187 krb5_get_forwarded_creds(krb5_context context, krb5_auth_context auth_context, krb5_ccache ccache, krb5_flags flags, const char *hostname, krb5_creds *in_creds, krb5_data *out_data) argument [all...] |
/macosx-10.9.5/remote_cmds-41.90.1/tftp.tproj/ |
H A D | main.c | 228 char hostname[MAXHOSTNAMELEN]; variable 303 (void) strlcpy(hostname, res->ai_canonname, 304 sizeof(hostname)); 306 (void) strlcpy(hostname, host, sizeof(hostname)); 468 cp, hostname, targ, mode); 485 argv[n], hostname, targ, mode); 556 hostname, src, cp, mode); 568 hostname, src, cp, mode); 670 printf("Connected to %s.\n", hostname); [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | SecPolicy.cpp | 218 SecPolicyCreateSSL(Boolean server, CFStringRef hostname) argument 220 // return a SecPolicyRef object for the SSL policy, given hostname and client options 231 if (hostname) { 232 hostnamestr = CFStringGetCStringPtr(hostname, kCFStringEncodingUTF8); 234 CFIndex maxLen = CFStringGetMaximumSizeForEncoding(CFStringGetLength(hostname), kCFStringEncodingUTF8) + 1; 236 if (CFStringGetCString(hostname, strbuf, maxLen, kCFStringEncodingUTF8)) {
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecPolicy.cpp | 218 SecPolicyCreateSSL(Boolean server, CFStringRef hostname) argument 220 // return a SecPolicyRef object for the SSL policy, given hostname and client options 231 if (hostname) { 232 hostnamestr = CFStringGetCStringPtr(hostname, kCFStringEncodingUTF8); 234 CFIndex maxLen = CFStringGetMaximumSizeForEncoding(CFStringGetLength(hostname), kCFStringEncodingUTF8) + 1; 236 if (CFStringGetCString(hostname, strbuf, maxLen, kCFStringEncodingUTF8)) {
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecPolicy.cpp | 218 SecPolicyCreateSSL(Boolean server, CFStringRef hostname) argument 220 // return a SecPolicyRef object for the SSL policy, given hostname and client options 231 if (hostname) { 232 hostnamestr = CFStringGetCStringPtr(hostname, kCFStringEncodingUTF8); 234 CFIndex maxLen = CFStringGetMaximumSizeForEncoding(CFStringGetLength(hostname), kCFStringEncodingUTF8) + 1; 236 if (CFStringGetCString(hostname, strbuf, maxLen, kCFStringEncodingUTF8)) {
|
/macosx-10.9.5/autofs-234/automountd/ |
H A D | autod_nfs.c | 985 clnt_create_vers_timed(const char *hostname, const rpcprog_t prog, argument 995 clnt = clnt_create_timeout(hostname, prog, vers_high, proto, tp); 1028 clnt = clnt_create_timeout(hostname, prog, v_high, proto, tp); 1187 const char *hostname = hostpart; local 1192 if (path != NULL && strcmp(hostname, "nfs") == 0 && 1220 sport = strchr(hostname, ':'); 1230 hostname = hostcopy; 1262 switch (cache_check(hostname, versp, proto)) { 1287 hostname, versmax, versmin); 1300 if ((cl = clnt_create_service_timed(hostname, "nf [all...] |
/macosx-10.9.5/cups-372.4/cups/test/ |
H A D | xmltotest.c | 301 hostname[256], /* Hostname */ local 309 userpass, sizeof(userpass), hostname, sizeof(hostname), 347 if ((http = httpConnectEncrypt(hostname, port, encryption)) == NULL) 349 fprintf(stderr, "xmltotest: Unable to connect to \"%s\": %s\n", hostname,
|