/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | siginfoUtils.cpp | 46 Dictionary *pd = Dictionary::CreateDictionary(kMSCompatibilityDomain, Dictionary::US_User, false); local 47 if(pd == NULL) { 48 pd = Dictionary::CreateDictionary(kMSCompatibilityDomain, Dictionary::US_System, false); 50 if(pd != NULL) { 55 if(pd->getValue(kMSCompatibilityMode)) { 56 msCompat = pd->getBoolValue(kMSCompatibilityMode); 58 delete pd;
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/ |
H A D | siginfoUtils.cpp | 46 Dictionary *pd = Dictionary::CreateDictionary(kMSCompatibilityDomain, Dictionary::US_User, false); local 47 if(pd == NULL) { 48 pd = Dictionary::CreateDictionary(kMSCompatibilityDomain, Dictionary::US_System, false); 50 if(pd != NULL) { 55 if(pd->getValue(kMSCompatibilityMode)) { 56 msCompat = pd->getBoolValue(kMSCompatibilityMode); 58 delete pd;
|
/macosx-10.9.5/CPANInternal-140/Perl4-CoreLibs-0.003/lib/ |
H A D | pwd.pl | 27 local($pd,$pi) = stat($ENV{'PWD'}); 28 if (!defined $dd or !defined $pd or $di != $pi or $dd != $pd) { 36 local($pd,$pi) = stat($2); 38 if (defined $pd and defined $dd and $di == $pi and $dd == $pd) {
|
/macosx-10.9.5/ruby-104/ruby/ext/tk/sample/tkextlib/iwidgets/sample/ |
H A D | promptdialog.rb | 9 pd = Tk::Iwidgets::Promptdialog.new(:modality=>:global, :title=>'Password', 11 pd.hide('Apply') 13 if TkComm.bool(pd.activate) 14 puts "Password entered: #{pd.get}"
|
/macosx-10.9.5/libpcap-42/libpcap/tests/ |
H A D | reactivatetest.c | 41 pcap_t *pd; local 44 pd = pcap_open_live("lo0", 65535, 0, 1000, ebuf); 45 if (pd == NULL) { 46 pd = pcap_open_live("lo", 65535, 0, 1000, ebuf); 47 if (pd == NULL) { 53 status = pcap_activate(pd); 59 pcap_geterr(pd));
|
H A D | opentest.c | 56 pcap_t *pd; local 122 pd = pcap_create(device, ebuf); 123 if (pd == NULL) 125 status = pcap_set_snaplen(pd, snaplen); 130 status = pcap_set_promisc(pd, 1); 136 status = pcap_set_rfmon(pd, 1); 141 status = pcap_set_timeout(pd, 1000); 146 status = pcap_set_buffer_size(pd, bufsize); 151 status = pcap_activate(pd); 157 pcap_statustostr(status), pcap_geterr(pd)); [all...] |
H A D | nonblocktest.c | 48 static pcap_t *pd; variable 91 pd = pcap_open_live(device, 65535, 0, 1000, ebuf); 92 if (pd == NULL) 103 if (pcap_compile(pd, &fcode, cmdbuf, 1, netmask) < 0) 104 error("%s", pcap_geterr(pd)); 106 if (pcap_setfilter(pd, &fcode) < 0) 107 error("%s", pcap_geterr(pd)); 108 if (pcap_setnonblock(pd, 1, ebuf) == -1) 113 status = pcap_dispatch(pd, -1, countme, 136 program_name, pcap_geterr(pd)); [all...] |
H A D | selpolltest.c | 48 static pcap_t *pd; variable 121 pd = pcap_open_live(device, 65535, 0, 1000, ebuf); 122 if (pd == NULL) 133 if (pcap_compile(pd, &fcode, cmdbuf, 1, netmask) < 0) 134 error("%s", pcap_geterr(pd)); 136 if (pcap_setfilter(pd, &fcode) < 0) 137 error("%s", pcap_geterr(pd)); 138 if (pcap_get_selectable_fd(pd) == -1) 141 if (pcap_setnonblock(pd, 1, ebuf) == -1) 144 selectable_fd = pcap_get_selectable_fd(pd); [all...] |
H A D | filtertest.c | 171 pcap_t *pd; local 246 pd = pcap_open_dead(dlt, snaplen); 247 if (pd == NULL) 250 if (pcap_compile(pd, &fcode, cmdbuf, Oflag, netmask) < 0) 251 error("%s", pcap_geterr(pd)); 253 pcap_close(pd);
|
/macosx-10.9.5/tcpdump-56/tcpdump/ |
H A D | decode_prefix.h | 38 extern int decode_prefix6(const u_char *pd, u_int itemlen, char *buf, u_int buflen);
|
H A D | tcpdump.c | 136 static void show_dlts_and_exit(const char *device, pcap_t *pd) __attribute__((noreturn)); 395 static pcap_t *pd; variable 442 show_tstamp_types_and_exit(const char *device, pcap_t *pd) argument 449 n_tstamp_types = pcap_list_tstamp_types(pd, &tstamp_types); 451 error("%s", pcap_geterr(pd)); 475 show_dlts_and_exit(const char *device, pcap_t *pd) argument 481 n_dlts = pcap_list_datalinks(pd, &dlts); 483 error("%s", pcap_geterr(pd)); 1256 pd = pcap_ng_open_offline(RFileName, ebuf); 1257 if (pd ! [all...] |
/macosx-10.9.5/xnu-2422.115.4/bsd/net/ |
H A D | pf.c | 345 pf_lazy_makewritable(struct pf_pdesc *pd, struct mbuf *m, int len) argument 347 if (pd->lmw < 0) 350 VERIFY(m == pd->mp); 352 if (len > pd->lmw) { 355 pd->lmw = len; 356 if (len >= 0 && m != pd->mp) { 357 pd->mp = m; 358 pd->pf_mtag = pf_find_mtag(m); 360 switch (pd->af) { 363 pd 2321 pf_modulate_sack(struct mbuf *m, int off, struct pf_pdesc *pd, struct tcphdr *th, struct pf_state_peer *dst) argument 2806 pf_tag_packet(struct mbuf *m, struct pf_mtag *pf_mtag, int tag, unsigned int rtableid, struct pf_pdesc *pd) argument 3207 pf_get_sport(struct pf_pdesc *pd, struct pfi_kif *kif, struct pf_rule *r, struct pf_addr *saddr, union pf_state_xport *sxport, struct pf_addr *daddr, union pf_state_xport *dxport, struct pf_addr *naddr, union pf_state_xport *nxport, struct pf_src_node **sn) argument 3375 pf_match_translation(struct pf_pdesc *pd, struct mbuf *m, int off, int direction, struct pfi_kif *kif, struct pf_addr *saddr, union pf_state_xport *sxport, struct pf_addr *daddr, union pf_state_xport *dxport, int rs_num) argument 3472 pf_get_translation_aux(struct pf_pdesc *pd, struct mbuf *m, int off, int direction, struct pfi_kif *kif, struct pf_src_node **sn, struct pf_addr *saddr, union pf_state_xport *sxport, struct pf_addr *daddr, union pf_state_xport *dxport, struct pf_addr *naddr, union pf_state_xport *nxport) argument 3685 pf_socket_lookup(int direction, struct pf_pdesc *pd) argument 4020 pf_tcp_iss(struct pf_pdesc *pd) argument 4049 pf_test_rule(struct pf_rule **rm, struct pf_state **sm, int direction, struct pfi_kif *kif, struct mbuf *m, int off, void *h, struct pf_pdesc *pd, struct pf_rule **am, struct pf_ruleset **rsm, struct ifqueue *ifq) argument 5142 pf_test_dummynet(struct pf_rule **rm, int direction, struct pfi_kif *kif, struct mbuf **m0, struct pf_pdesc *pd, struct ip_fw_args *fwa) argument 5404 pf_test_fragment(struct pf_rule **rm, int direction, struct pfi_kif *kif, struct mbuf *m, void *h, struct pf_pdesc *pd, struct pf_rule **am, struct pf_ruleset **rsm) argument 5499 pf_pptp_handler(struct pf_state *s, int direction, int off, struct pf_pdesc *pd, struct pfi_kif *kif) argument 5845 pf_test_state_tcp(struct pf_state **state, int direction, struct pfi_kif *kif, struct mbuf *m, int off, void *h, struct pf_pdesc *pd, u_short *reason) argument 6373 pf_test_state_udp(struct pf_state **state, int direction, struct pfi_kif *kif, struct mbuf *m, int off, void *h, struct pf_pdesc *pd, u_short *reason) argument 6523 pf_test_state_icmp(struct pf_state **state, int direction, struct pfi_kif *kif, struct mbuf *m, int off, void *h, struct pf_pdesc *pd, u_short *reason) argument 7197 pf_test_state_grev1(struct pf_state **state, int direction, struct pfi_kif *kif, int off, struct pf_pdesc *pd) argument 7298 pf_test_state_esp(struct pf_state **state, int direction, struct pfi_kif *kif, int off, struct pf_pdesc *pd) argument 7461 pf_test_state_other(struct pf_state **state, int direction, struct pfi_kif *kif, struct pf_pdesc *pd) argument 7687 pf_route(struct mbuf **m, struct pf_rule *r, int dir, struct ifnet *oifp, struct pf_state *s, struct pf_pdesc *pd) argument 7861 pf_route6(struct mbuf **m, struct pf_rule *r, int dir, struct ifnet *oifp, struct pf_state *s, struct pf_pdesc *pd) argument 8096 struct pf_pdesc pd; local 8627 struct pf_pdesc pd; local [all...] |
/macosx-10.9.5/llvmCore-3425.0.33/lib/Support/ |
H A D | ThreadLocal.cpp | 30 void **pd = reinterpret_cast<void**>(&data); local 31 *pd = const_cast<void*>(d); 34 void **pd = reinterpret_cast<void**>(&data); local 35 return *pd;
|
/macosx-10.9.5/Security-55471.14.18/include/security_cryptkit/ |
H A D | giantPort_i486.h | 119 #define VectorMultiply(pd, cv, cl, pv) vectorMult_x86(pd, cv, cl, pv)
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cryptkit/lib/ |
H A D | giantPort_i486.h | 119 #define VectorMultiply(pd, cv, cl, pv) vectorMult_x86(pd, cv, cl, pv)
|
/macosx-10.9.5/postfix-252/postfix/src/util/ |
H A D | match_ops.c | 152 const char *pd; local 203 pd = name + strlen(name) - strlen(pattern); 204 if (pd > name && pd[-1] == '.' && strcasecmp(pd, pattern) == 0) 207 pd = name + strlen(name) - strlen(pattern); 208 if (pd > name && strcasecmp(pd, pattern) == 0)
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | policy.h | 94 #define KEY_SETSECSPIDX(_dir, s, d, ps, pd, ulp, _priority, idx) \ 99 (idx)->prefd = (pd); \ 106 #define KEY_SETSECSPIDX(_dir, s, d, ps, pd, ulp, idx) \ 111 (idx)->prefd = (pd); \
|
/macosx-10.9.5/BerkeleyDB-21/db/examples_java/src/persist/txn/ |
H A D | StoreWriter.java | 65 PayloadDataEntity pd = new PayloadDataEntity(); 68 pd.setID(i + j); 72 pd.setThreadName(getName()); 77 pd.setDoubleData(generator.nextDouble()); 80 pdKey.put(txn, pd);
|
/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | hprop.c | 94 struct prop_data *pd = appdata; local 119 ret = krb5_write_message(context, &pd->sock, &data); 121 ret = krb5_write_priv_message(context, pd->auth_context, 122 &pd->sock, &data); 230 struct prop_data *pd) 236 ret = hdb_mit_dump(context, database_name, v5_prop, pd); 241 ret = hdb_foreach(context, db, HDB_F_DECRYPT, v5_prop, pd); 256 struct prop_data pd; local 259 pd.context = context; 260 pd 226 iterate(krb5_context context, const char *database_name, HDB *db, int type, struct prop_data *pd) argument 287 struct prop_data pd; local [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | TrustRevocation.cpp | 235 Dictionary* pd = Dictionary::CreateDictionary(kSecRevocationDomain, Dictionary::US_User, true); local 236 if (pd) 238 if (!pd->dict()) { 239 delete pd; 240 pd = NULL; 244 if(pd == NULL) 246 pd = Dictionary::CreateDictionary(kSecRevocationDomain, Dictionary::US_System, true); 247 if (!pd->dict()) { 248 delete pd; 249 pd 509 Dictionary* pd = Dictionary::CreateDictionary(kSecRevocationDomain, Dictionary::US_User, true); local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | TrustRevocation.cpp | 235 Dictionary* pd = Dictionary::CreateDictionary(kSecRevocationDomain, Dictionary::US_User, true); local 236 if (pd) 238 if (!pd->dict()) { 239 delete pd; 240 pd = NULL; 244 if(pd == NULL) 246 pd = Dictionary::CreateDictionary(kSecRevocationDomain, Dictionary::US_System, true); 247 if (!pd->dict()) { 248 delete pd; 249 pd 509 Dictionary* pd = Dictionary::CreateDictionary(kSecRevocationDomain, Dictionary::US_User, true); local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | TrustRevocation.cpp | 235 Dictionary* pd = Dictionary::CreateDictionary(kSecRevocationDomain, Dictionary::US_User, true); local 236 if (pd) 238 if (!pd->dict()) { 239 delete pd; 240 pd = NULL; 244 if(pd == NULL) 246 pd = Dictionary::CreateDictionary(kSecRevocationDomain, Dictionary::US_System, true); 247 if (!pd->dict()) { 248 delete pd; 249 pd 509 Dictionary* pd = Dictionary::CreateDictionary(kSecRevocationDomain, Dictionary::US_User, true); local [all...] |
/macosx-10.9.5/bind9-45.100/bind9/contrib/dlz/drivers/ |
H A D | dlz_bdb_driver.c | 128 bdb_parse_data(char *in, parsed_data_t *pd) { argument 144 pd->zone = tmp; 158 pd->host = tmp; 172 pd->type = tmp; 200 pd->data = tmp; 203 pd->ttl = strtol(ttlStr, &endp, 10); 204 if (*endp != '\0' || pd->ttl < 0) { 298 parsed_data_t pd; local 333 if (bdb_parse_data(tmp, &pd) != ISC_R_SUCCESS) 336 result = dns_sdlz_putnamedrr(allnodes, pd 465 parsed_data_t pd; local [all...] |
/macosx-10.9.5/BerkeleyDB-21/db/clib/ |
H A D | qsort.c | 107 char *pa, *pb, *pc, *pd, *pl, *pm, *pn; local 134 pc = pd = (char *)a + (n - 1) * es; 147 swap(pc, pd); 148 pd -= es; 170 r = min((int)(pd - pc), (int)(pn - pd - es)); 174 if ((r = (int)(pd - pc)) > (int)es) {
|
/macosx-10.9.5/Heimdal-323.92.1/lib/roken/ |
H A D | qsort.c | 119 char *pa, *pb, *pc, *pd, *pl, *pm, *pn; local 149 pc = pd = (char *)a + (n - 1) * es; 162 swap(pc, pd); 163 pd -= es; 186 r = min(pd - pc, pn - pd - es); 194 if ((r = pd - pc) > es) {
|