/macosx-10.10.1/curl-83.1.2/curl/lib/ |
H A D | hostcheck.c | 127 char *hostp; local 135 hostp = strdup(hostname); 136 if(hostp) { 137 if(hostmatch(hostp, matchp) == CURL_HOST_MATCH) 139 free(hostp);
|
H A D | hostip.c | 768 struct curl_slist *hostp; local 773 for(hostp = data->change.resolve; hostp; hostp = hostp->next ) { 774 if(!hostp->data) 776 if(hostp->data[0] == '-') { 779 else if(3 == sscanf(hostp->data, "%255[^:]:%d:%255s", hostname, &port, 788 infof(data, "Resolve %s found illegal!\n", hostp->data);
|
/macosx-10.10.1/xnu-2782.1.97/osfmk/kern/ |
H A D | exception.c | 470 host_priv_t hostp; local 475 hostp = host_priv_self(); /* Get the host privileged ports */ 481 xport = hostp->exc_actions[EXC_RPC_ALERT].port; 497 hostp->exc_actions, 498 &hostp->lock);
|
/macosx-10.10.1/remote_cmds-47/telnet.tproj/ |
H A D | commands.c | 2196 char *cmd, *hostp = 0, *portp = 0, *user = 0; 2240 if (hostp == 0) { 2241 hostp = *argv++; 2255 if (hostp == 0) 2282 if (hostp[0] == '/') { 2285 if (strlen(hostp) >= sizeof(su.sun_path)) { 2287 hostp); 2292 strncpy(su.sun_path, hostp, sizeof su.sun_path); 2293 printf("Trying %s...\n", hostp); 2305 } else if (hostp[ 2188 char *cmd, *hostp = 0, *portp = 0, *user = 0; local [all...] |
/macosx-10.10.1/Heimdal-398.1.2/appl/telnet/telnet/ |
H A D | commands.c | 2064 char *cmd, *hostp = 0, *portp = 0; 2100 if (hostp == 0) { 2101 hostp = *argv++; 2114 if (hostp == 0) 2117 strlcpy (_hostname, hostp, sizeof(_hostname)); 2118 hostp = _hostname; 2119 if (hostp[0] == '@' || hostp[0] == '!') { 2122 for (p = hostp + 1; *p; p++) { 2127 fprintf(stderr, "%s: bad source route specification\n", hostp); 2056 char *cmd, *hostp = 0, *portp = 0; local [all...] |
/macosx-10.10.1/remote_cmds-47/revnetgroup.tproj/ |
H A D | parse_netgroup.c | 125 __getnetgrent(char **hostp, char **userp, char **domp) argument 128 *hostp = nextgrp->ng_str[NG_HOST];
|
/macosx-10.10.1/ruby-106/ruby/ext/socket/ |
H A D | raddrinfo.c | 354 char *hostp, *portp; local 359 hostp = host_str(host, hbuf, sizeof(hbuf), &additional_flags); 367 error = rb_getaddrinfo(hostp, portp, hints, &res); 369 if (hostp && hostp[strlen(hostp)-1] == '\n') { 492 const char* hostp; local 497 hostp = addr->ai_canonname; 500 hostp = host_str(host, hbuf, sizeof(hbuf), NULL); 502 rb_ary_push(ary, rb_str_new2(hostp)); [all...] |
/macosx-10.10.1/BerkeleyDB-21/db/examples_c/ex_rep/base/ |
H A D | rep_net.c | 191 machtab_getinfo(machtab, eid, hostp, portp) 194 u_int32_t *hostp; 209 *hostp = member->hostaddr;
|
/macosx-10.10.1/OpenSSH-189/openssh/ |
H A D | sshconnect.c | 727 char hostline[1000], *hostp, *fp, *ra; local 910 hostp = hostline; 926 hostp = host; 934 "list of known hosts.", hostp, type);
|
/macosx-10.10.1/postfix-255/postfix/src/smtp/ |
H A D | smtp_connect.c | 331 char **hostp, unsigned *portp) 347 if ((err = host_port(buf, hostp, (char *) 0, &service, def_service)) != 0) 330 smtp_parse_destination(char *destination, char *def_service, char **hostp, unsigned *portp) argument
|
/macosx-10.10.1/apache-793/httpd/modules/proxy/ |
H A D | mod_proxy.h | 547 char **passwordp, char **hostp, apr_port_t *port);
|
H A D | proxy_util.c | 310 char **passwordp, char **hostp, apr_port_t *port) 374 *hostp = addr; 309 ap_proxy_canon_netloc(apr_pool_t *p, char **const urlp, char **userp, char **passwordp, char **hostp, apr_port_t *port) argument
|
/macosx-10.10.1/postfix-255/postfix/src/posttls-finger/ |
H A D | posttls-finger.c | 1226 char **hostp, unsigned *portp) 1242 if ((err = host_port(buf, hostp, (char *) 0, &service, def_service)) != 0) 1225 parse_destination(char *destination, char *def_service, char **hostp, unsigned *portp) argument
|