/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | kex.h | 139 Buffer peer; member in struct:Kex
|
/macosx-10.9.5/vim-53/runtime/syntax/ |
H A D | asterisk.vim | 43 syn match asteriskType "^\zstype=\ze\<\(peer\|user\|friend\)\>$" contains=asteriskTypeType 44 syn match asteriskTypeType "\<\(peer\|user\|friend\)\>" contained
|
/macosx-10.9.5/ntp-88/ntpd/ |
H A D | ntp_config.c | 79 { "peer", NLOG_OPEER }, 498 struct peer_node *peer = NULL; local 792 peer = list_ptr; 793 addr = peer->addr; 794 fprintf(df, "%s", keyword(peer->host_mode)); 800 "# unknown peer family %d for:\n" 801 "peer", addr->type); 817 if (peer->minpoll != 0) 818 fprintf(df, " minpoll %d", peer->minpoll); 820 if (peer 3491 struct peer *peer; local [all...] |
/macosx-10.9.5/postfix-252/postfix/src/tls/ |
H A D | tls_verify.c | 5 /* peer name and peer certificate verification 30 /* tls_peer_CN() returns the text CommonName for the peer 36 /* tls_issuer_CN() returns the text CommonName for the peer 63 /* peer's certificate. After all, we would have sent or received 68 /* passwords), while peer certificates are optional. In this 70 /* peer certificate. Only when peer certificates are required, 152 /* tls_verify_certificate_callback - verify peer certificate info */ 171 * the peer certificat 475 tls_issuer_CN(X509 *peer, const TLS_SESS_STATE *TLScontext) argument [all...] |
/macosx-10.9.5/remote_cmds-41.90.1/yppush.tproj/ |
H A D | yppush.c | 148 request.map_parms.peer=master; 160 request.map_parms.peer,
|
/macosx-10.9.5/tcl-102/tcl_ext/tklib/tklib/modules/chatwidget/ |
H A D | chatwidget.tcl | 78 peer { 498 set peer [$chat peer create $upper.text -borderwidth 0 -relief flat \ 500 set peervs [ttk::scrollbar $upper.vs -command [list $peer yview]] 501 $peer configure -height 0 \ 503 grid $peer $peervs -sticky news 511 set state(chat_peer_widget) $peer 536 bind $peer <Map> [list [namespace origin PaneMap] %W $peers 0]
|
/macosx-10.9.5/cups-372.4/cups/cups/ |
H A D | http-addrlist.c | 68 http_addr_t peer; /* Peer address */ local 264 len = sizeof(peer); 265 if (!getpeername(*sock, (struct sockaddr *)&peer, &len)) 268 httpAddrString(&peer, temp, sizeof(temp)), 269 httpAddrPort(&peer)));
|
/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSAccount.c | 1572 SOSCircleForEachPeer(circle, ^(SOSPeerInfoRef peer) { 1573 if (!CFEqual(SOSPeerInfoGetPeerID(my_peer), SOSPeerInfoGetPeerID(peer))) 1576 if (!SOSAccountSyncWithPeer(account, circle, peer, &local_didSync, error)) 1708 SOSCircleForEachRetiredPeer(circle, ^(SOSPeerInfoRef peer) { 1709 CFStringRef key = SOSRetirementKeyCreateWithCircleAndPeer(circle, SOSPeerInfoGetPeerID(peer)); 1711 CFDataRef value = SOSPeerInfoCopyEncodedData(peer, NULL, NULL); 1714 SOSAccountCleanupAfterPeer(account, RETIREMENT_FINALIZATION_SECONDS, circle, peer, error); 1888 SOSCircleForEachPeer(circle, ^(SOSPeerInfoRef peer) { 1889 if (!CFEqualSafe(my_peer_id, SOSPeerInfoGetPeerID(peer))) { 1890 CFStringRef peer_name = SOSPeerInfoGetPeerID(peer); 2619 for_each_applicant_in_each_circle(SOSAccountRef account, CFArrayRef peer_infos, void (^action)(SOSCircleRef circle, SOSFullPeerInfoRef myCirclePeer, SOSPeerInfoRef peer)) argument [all...] |
/macosx-10.9.5/CPANInternal-140/IO-Socket-SSL/t/ |
H A D | core.t | 251 ($client, $peer) = $server->accept; 259 print "not " unless defined $peer; 260 &ok("Accept returning peer address check.");
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/ |
H A D | NTMakefile | 67 $(OBJ)\peer.obj \ 104 $(SRCDIR)\peer.c \
|
H A D | cms.c | 1152 * default or the peer determined algorithm. 1154 * @param peer info about the peer the message to send the message to, 1173 hx509_peer_info peer, 1192 digest_alg, certs, peer, anchors, pool, 1205 hx509_peer_info peer; member in struct:sigctx 1242 sigctx->peer, &digest); 1373 _hx509_cert_private_key(cert), sigctx->peer, 1466 hx509_peer_info peer, 1487 sigctx.peer 1167 hx509_cms_create_signed_1(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_cert cert, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument 1460 hx509_cms_create_signed(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_certs certs, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument [all...] |
/macosx-10.9.5/ppp-727.90.1/Drivers/L2TP/L2TP-plugin/ |
H A D | l2tp.h | 216 int l2tp_change_peeraddress(int fd, struct sockaddr *peer);
|
H A D | main.c | 192 static int peer_route_set = 0; /* has a route to the peer been set ? */ 748 // bind racoon control socket to the peer address to receive only pertinent messages 1189 /* build the peer address */ 1233 /* get the source address that will be used to reach the peer */ 1245 /* set our peer address */ 1254 /* install IPSec filters for our address and peer address */ 1430 /* get the source address that will be used to reach the peer */ 1534 // log incoming call from l2tp_change_peeraddress() because that's when we know the peer address 1576 /* set the peer address of the data socket */ 1617 don't send them if the peer requeste 1716 l2tp_change_peeraddress(int fd, struct sockaddr *peer) argument [all...] |
/macosx-10.9.5/BerkeleyDB-21/db/repmgr/ |
H A D | repmgr_method.c | 219 db_rep->peer = DB_EID_INVALID; 436 db_rep->peer = eid;
|
/macosx-10.9.5/Heimdal-323.92.1/lib/kadm5/ |
H A D | ad.c | 126 struct tsasl_peer *peer = NULL; local 135 "ldap", host, &peer); 157 ret = tsasl_find_best_mech(peer, vals, &mech); 165 ret = tsasl_select_mech(peer, mech); 175 ret = tsasl_request(peer, &in, &out); 214 LBER_SBIOD_LEVEL_APPLICATION, peer); 217 } else if (peer != NULL) 218 tsasl_peer_free(peer);
|
/macosx-10.9.5/files-638.1.4/private/etc/ |
H A D | protocols | 120 compaq-peer 110 Compaq-Peer # Compaq Peer Protocol
|
/macosx-10.9.5/libresolv-54/ |
H A D | res_send.c | 540 struct sockaddr_storage peer; local 559 peerlen = sizeof(peer); 560 if (getsockname(EXT(statp).nssocks[ns], (struct sockaddr *)&peer, &peerlen) < 0) 566 if (!sock_eq((struct sockaddr *)&peer, get_nsaddr(statp, ns))) 908 struct sockaddr_storage peer; local 909 ISC_SOCKLEN_T size = sizeof peer; 911 if (getpeername(statp->_vcsock, (struct sockaddr *)&peer, &size) < 0 || !sock_eq((struct sockaddr *)&peer, nsap))
|
/macosx-10.9.5/remote_cmds-41.90.1/ypserv.tproj/ |
H A D | ypserv_xdr.c | 140 if (!xdr_peername(xdrs, &objp->peer)) { 247 if (!xdr_peername(xdrs, &objp->peer)) {
|
H A D | ypv1.h | 102 #define ypget_req_owner yp_reqbody.yp_req_map_parmstype.peer 165 #define yppoll_resp_owner yp_respbody.yp_resp_map_parmstype.peer
|
/macosx-10.9.5/syslog-217.1.4/aslmanager.tproj/ |
H A D | aslmanager.c | 1345 accept_connection(xpc_connection_t peer) argument 1347 xpc_connection_set_event_handler(peer, ^(xpc_object_t request) { 1350 uid_t uid = xpc_connection_get_euid(peer); 1354 xpc_connection_send_message(peer, reply); 1371 xpc_connection_resume(peer); 1389 xpc_connection_set_event_handler(listener, ^(xpc_object_t peer) { 1390 if (xpc_get_type(peer) == XPC_TYPE_CONNECTION) accept_connection(peer);
|
/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | pkinit.c | 68 hx509_peer_info peer; member in struct:pk_client_params 198 if (cp->peer) 199 hx509_peer_info_free(cp->peer); 876 &cp->peer); 884 cp->peer, 893 hx509_peer_info_add_cms_alg(context->hx509ctx, cp->peer, 895 hx509_peer_info_add_cms_alg(context->hx509ctx, cp->peer, 897 hx509_peer_info_add_cms_alg(context->hx509ctx, cp->peer, 1073 cp->peer, 1229 cp->peer, [all...] |
/macosx-10.9.5/emacs-92/emacs/lisp/erc/ |
H A D | erc-dcc.el | 80 ((:nick \"nick!user@host\" :type GET :peer proc :parent proc :size size :file file) 81 (:nick \"nick!user@host\" :type CHAT :peer proc :parent proc) 82 (:nick \"nick\" :type SEND :peer server-proc :parent parent-proc :file 85 :nick - a user or userhost for the peer. combine with :parent to reach them 89 the DCC chat, look at :peer 91 :peer - the other end of the DCC connection. In the case of outgoing DCCs, 104 (defun erc-dcc-list-add (type nick peer parent &rest args) 109 (append (list :nick nick :type type :peer peer :parent parent) args) 341 (let ((elt (erc-dcc-member :peer serve [all...] |
/macosx-10.9.5/postfix-252/postfix/src/qmgr/ |
H A D | qmgr_message.c | 1290 QMGR_PEER *peer = 0; local 1315 peer = 0; 1319 * Lookup or instantiate job peer if necessary. 1321 if (peer == 0 || queue != peer->queue) 1322 peer = qmgr_peer_obtain(job, queue); 1328 entry = peer->entry_list.prev; 1331 entry = qmgr_entry_create(peer, message);
|
/macosx-10.9.5/xnu-2422.115.4/bsd/net/pktsched/ |
H A D | pktsched_rmclass.c | 245 struct rm_class *peer; local 404 if ((peer = ifd->active_[pri]) != NULL) { 406 cl->peer_ = peer; 407 while (peer->peer_ != ifd->active_[pri]) 408 peer = peer->peer_; 409 peer->peer_ = cl; 652 * Delete class from class priority peer list.
|
/macosx-10.9.5/CPANInternal-140/Perl-Ldap/lib/Net/ |
H A D | LDAP.pm | 237 my ($ldap, $peer, $arg) = @_; 239 $peer = $ENV{LDAPI_SOCK} || "/var/run/ldapi" 240 unless length $peer; 245 Peer => $peer, 252 $ldap->{net_ldap_peer} = $peer;
|