/macosx-10.10/postfix-255/postfix/src/smtp/ |
H A D | smtp_unalias.c | 68 VSTRING *fqdn; local 83 * Look up the fqdn. If none is found use the query name instead, so that 87 fqdn = vstring_alloc(10); 88 if (dns_lookup_l(name, smtp_unalias_flags, (DNS_RR **) 0, fqdn, 94 vstring_strcpy(fqdn, name); 95 htable_enter(cache, name, result = vstring_export(fqdn)); 105 const char *fqdn; local 110 fqdn = smtp_unalias_name(at + 1); 112 vstring_strcat(result, fqdn);
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecSharedCredential.h | 58 @param fqdn The fully qualified domain name of the website requiring the password. 66 void SecAddSharedWebCredential(CFStringRef fqdn, CFStringRef account, CFStringRef password, 73 @param fqdn (Optional) Fully qualified domain name of the website for which passwords are being requested. If NULL is passed in this argument, the domain name(s) listed in the calling application's 'com.apple.developer.associated-domains' entitlement are searched implicitly. 76 @discussion This function requests one or more shared passwords for a given website, depending on whether the optional account parameter is supplied. To obtain results, the website specified in the fqdn parameter must be one which matches an entry in the calling application's 'com.apple.developer.associated-domains' entitlement. 88 void SecRequestSharedWebCredential(CFStringRef fqdn, CFStringRef account,
|
H A D | SecSharedCredential.c | 36 OSStatus SecAddSharedWebCredentialSync(CFStringRef fqdn, CFStringRef account, CFStringRef password, CFErrorRef *error); 37 OSStatus SecCopySharedWebCredentialSync(CFStringRef fqdn, CFStringRef account, CFArrayRef *credentials, CFErrorRef *error); 40 OSStatus SecAddSharedWebCredentialSync(CFStringRef fqdn, argument 49 if (fqdn) { 50 CFDictionaryAddValue(args, kSecAttrServer, fqdn); 90 void SecAddSharedWebCredential(CFStringRef fqdn, argument 101 if (!fqdn || CFGetTypeID(fqdn) != CFStringGetTypeID() || !CFStringGetLength(fqdn) || 103 errStr = CFSTR("fqdn o 144 SecCopySharedWebCredentialSync(CFStringRef fqdn, CFStringRef account, CFArrayRef *credentials, CFErrorRef *error) argument 191 SecRequestSharedWebCredential(CFStringRef fqdn, CFStringRef account, void (^completionHandler)(CFArrayRef credentials, CFErrorRef error)) argument [all...] |
/macosx-10.10/dcerpc-61/dcerpc/include/dce/ |
H A D | schannel.idl | 104 unsigned_char_p_t fqdn;
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-76-shared-credentials.c | 40 CFStringRef fqdn = CFSTR("localhost"); local 50 // should get denied if we request a fqdn which is not in our entitlement 54 is(status == errSecItemNotFound || expected_failure(status), true, "fqdn not entitled"); 62 SecAddSharedWebCredential(fqdn, acct1, cred, ^void (CFErrorRef error) { 72 SecAddSharedWebCredential(fqdn, acct2, cred, ^void (CFErrorRef error) { 83 SecRequestSharedWebCredential(fqdn, acct1, ^void (CFArrayRef credentials, CFErrorRef error) { 103 SecRequestSharedWebCredential(fqdn, NULL, ^void (CFArrayRef credentials, CFErrorRef error) { 124 SecAddSharedWebCredential(fqdn, acct1, NULL, ^void (CFErrorRef error) { 134 SecAddSharedWebCredential(fqdn, acct2, NULL, ^void (CFErrorRef error) { 145 SecRequestSharedWebCredential(fqdn, NUL [all...] |
/macosx-10.10/postfix-255/postfix/src/dns/ |
H A D | dns.h | 217 #define dns_lookup(name, type, rflags, list, fqdn, why) \ 218 dns_lookup_r((name), (type), (rflags), (list), (fqdn), (why), (int *) 0) 219 #define dns_lookup_l(name, rflags, list, fqdn, why, lflags, ...) \ 220 dns_lookup_rl((name), (rflags), (list), (fqdn), (why), (int *) 0, \ 222 #define dns_lookup_v(name, rflags, list, fqdn, why, lflags, ltype) \ 223 dns_lookup_rv((name), (rflags), (list), (fqdn), (why), (int *) 0, \
|
H A D | test_dns_lookup.c | 103 VSTRING *fqdn = vstring_alloc(100); local 121 switch (dns_lookup_rv(name, RES_DEBUG | RES_USE_DNSSEC, &rr, fqdn, why, 126 printf("%s: fqdn: %s\n", name, vstring_str(fqdn));
|
H A D | dns_lookup.c | 9 /* int dns_lookup(name, type, rflags, list, fqdn, why) 14 /* VSTRING *fqdn; 17 /* int dns_lookup_l(name, rflags, list, fqdn, why, lflags, ltype, ...) 21 /* VSTRING *fqdn; 26 /* int dns_lookup_v(name, rflags, list, fqdn, why, lflags, ltype) 30 /* VSTRING *fqdn; 35 /* int dns_lookup_r(name, type, rflags, list, fqdn, why, rcode) 40 /* VSTRING *fqdn; 44 /* int dns_lookup_rl(name, rflags, list, fqdn, why, rcode, lflags, 49 /* VSTRING *fqdn; 538 dns_get_answer(const char *orig_name, DNS_REPLY *reply, int type, DNS_RR **rrlist, VSTRING *fqdn, char *cname, int c_len, int *maybe_secure) argument 647 dns_lookup_r(const char *name, unsigned type, unsigned flags, DNS_RR **rrlist, VSTRING *fqdn, VSTRING *why, int *rcode) argument 737 dns_lookup_rl(const char *name, unsigned flags, DNS_RR **rrlist, VSTRING *fqdn, VSTRING *why, int *rcode, int lflags,...) argument 777 dns_lookup_rv(const char *name, unsigned flags, DNS_RR **rrlist, VSTRING *fqdn, VSTRING *why, int *rcode, int lflags, unsigned *types) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/securityd/ |
H A D | SecItemServer.c | 905 _SecAppDomainApprovalStatus(CFStringRef appID, CFStringRef fqdn, CFErrorRef *error) 911 CFRetainSafe(fqdn); 914 if (0 == SWCCheckService(kSecSharedWebCredentialsService, appID, fqdn, 918 CFReleaseSafe(fqdn); 930 CFReleaseSafe(fqdn); 944 SecError(errSecAuthFailed, error, CFSTR("Approval is pending for \"%@\", try later"), fqdn); 946 SecError(errSecAuthFailed, error, CFSTR("\"%@\" failed to approve \"%@\""), fqdn, appID); 953 SecError(errSecAuthFailed, error, CFSTR("User denied access to \"%@\" by \"%@\""), fqdn, appID); 989 _SecAddNegativeWebCredential(CFStringRef fqdn, CFStringRef appID, bool forSafari) 992 if (!fqdn) { retur [all...] |
/macosx-10.10/mDNSResponder-561.1.1/mDNSMacOSX/ |
H A D | helper.h | 73 extern void mDNSConfigureServer(int updown, const char *const prefix, const domainname *const fqdn); 76 v6addr_t remote_outer, short remote_port, const char *const prefix, const domainname *const fqdn);
|
H A D | helper-stubs.c | 256 void mDNSConfigureServer(int updown, const char *const prefix, const domainname *const fqdn) argument 266 if (fqdn) 269 ConvertDomainNameToCString(fqdn, name.fqdnStr + mDNSPlatformStrLen(prefix)); 290 v6addr_t remote_outer, short remote_port, const char* const prefix, const domainname *const fqdn) 295 if (fqdn) 298 ConvertDomainNameToCString(fqdn, fqdnStr + mDNSPlatformStrLen(prefix)); 288 mDNSAutoTunnelSetKeys(int replacedelete, v6addr_t local_inner, v6addr_t local_outer, short local_port, v6addr_t remote_inner, v6addr_t remote_outer, short remote_port, const char* const prefix, const domainname *const fqdn) argument
|
/macosx-10.10/dcerpc-61/dcerpc/ncklib/ |
H A D | schnauth.c | 207 schnauth_info->sec_ctx.fqdn = rpc_stralloc(auth_info->fqdn); 208 if (schnauth_info->sec_ctx.fqdn == NULL) { 327 if (schnauth_info->sec_ctx.fqdn) 329 rpc_string_free(&schnauth_info->sec_ctx.fqdn, &tst);
|
/macosx-10.10/cups-408/cups/cups/ |
H A D | http-support.c | 2143 fqdn[256]; /* FQDN of the .local name */ local 2265 snprintf(fqdn, sizeof(fqdn), "%d", ntohs(port)); 2266 if ((addrlist = httpAddrGetList(hostTarget, AF_UNSPEC, fqdn)) != NULL) 2270 int error = getnameinfo(&(addr->addr.addr), (socklen_t)httpAddrLength(&(addr->addr)), fqdn, sizeof(fqdn), NULL, 0, NI_NAMEREQD); 2274 DEBUG_printf(("8http_resolve_cb: Found \"%s\".", fqdn)); 2276 if ((hostptr = fqdn + strlen(fqdn) - 6) <= fqdn || 2358 fqdn[256]; /* FQDN of the .local name */ local [all...] |
/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/ |
H A D | uds_daemon.h | 73 extern void external_start_resolving_service(mDNSInterfaceID InterfaceID, const domainname *const fqdn, DNSServiceFlags flags); 74 extern void external_stop_resolving_service(mDNSInterfaceID InterfaceID, const domainname *const fqdn, DNSServiceFlags flags);
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | util-int.c | 735 char* fqdn = NULL; local 745 fqdn = LDAP_MALLOC(CFStringGetLength(hostString) + 1); 746 if ( fqdn != NULL) { 747 if ( !CFStringGetCString(hostString, fqdn, CFStringGetLength(hostString) + 1 , kCFStringEncodingUTF8)) { 748 LDAP_FREE(fqdn); 749 fqdn = NULL; 757 return fqdn; 763 char *fqdn, *ha_buf; local 781 fqdn = LDAP_STRDUP( name ); 783 fqdn [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/SharedWebCredential/ |
H A D | swcagent_client.h | 89 void (^add_negative_entry)(CFStringRef fqdn));
|
H A D | swcagent_client.c | 178 void (^add_negative_entry)(CFStringRef fqdn)) 197 CFStringRef fqdn = CFDictionaryGetValue(query, sSWCASecAttrServer); local 198 add_negative_entry(fqdn); 174 swca_confirm_operation(enum SWCAXPCOperation op, const audit_token_t *auditToken, CFTypeRef query, CFErrorRef *error, void (^add_negative_entry)(CFStringRef fqdn)) argument
|
/macosx-10.10/KerberosHelper-151/Source/ |
H A D | DeconstructServiceName.c | 172 static Boolean DeconstructServiceName(const domainname *const fqdn, domainlabel *const name, domainname *const type, domainname *const domain) { argument 174 const UInt8 *src = fqdn->c; 175 const UInt8 *max = fqdn->c + MAX_DOMAIN_NAME;
|
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | ad.c | 434 const char *fqdn, 446 if (fqdn) 449 fqdn, pn); 590 const char *fqdn; local 610 fqdn = get_fqdn(context->context, entry->principal); 616 if (ad_find_entry(context, fqdn, p, NULL) == 0) { 639 if (fqdn) { 641 asprintf(&samname, "%s$", fqdn); 678 asprintf(&dn, "cn=%s, cn=Computers, %s", fqdn, CTX2BASE(context)); 710 dnsvals[0] = (char *)fqdn; 433 ad_find_entry(kadm5_ad_context *context, const char *fqdn, const char *pn, char **name) argument 810 const char *fqdn; local [all...] |
/macosx-10.10/postfix-255/postfix/src/xsasl/ |
H A D | xsasl_cyrus_client.c | 110 #define SASL_CLIENT_NEW(srv, fqdn, lport, rport, prompt, secflags, pconn) \ 111 sasl_client_new(srv, fqdn, prompt, secflags, pconn) 122 #define SASL_CLIENT_NEW(srv, fqdn, lport, rport, prompt, secflags, pconn) \ 123 sasl_client_new(srv, fqdn, lport, rport, prompt, secflags, pconn)
|
H A D | xsasl_cyrus_server.c | 107 #define SASL_SERVER_NEW(srv, fqdn, rlm, lport, rport, cb, secflags, pconn) \ 108 sasl_server_new(srv, fqdn, rlm, cb, secflags, pconn) 124 #define SASL_SERVER_NEW(srv, fqdn, rlm, lport, rport, cb, secflags, pconn) \ 125 sasl_server_new(srv, fqdn, rlm, lport, rport, cb, secflags, pconn)
|
/macosx-10.10/tcl-105/tcl_ext/tclsoap/tclsoap/ |
H A D | SOAP-CGI.tcl | 285 } fqdn]} { 291 set msg [interp eval $interp $fqdn $argValues] 413 } fqdn]} { 414 dtrace "method not found: $fqdn" 421 set msg [interp eval $interp $fqdn $argValues]
|
/macosx-10.10/sudo-73/src/ |
H A D | def_data.in | 77 fqdn
|
/macosx-10.10/libresolv-57/ |
H A D | dns.c | 1473 _sdns_send(sdns_handle_t *sdns, const char *name, uint32_t class, uint32_t type, uint32_t fqdn, char *buf, uint32_t len, struct sockaddr *from, uint32_t *fromlen, int *min) argument 1493 asprintf(&qname, "%s%s", name, (fqdn == 0) ? "." : ""); 1524 _sdns_search(sdns_handle_t *sdns, const char *name, uint32_t class, uint32_t type, uint32_t fqdn, uint32_t recurse, char *buf, uint32_t len, struct sockaddr *from, uint32_t *fromlen, int *min) argument 1568 if ((fqdn == 0) && (dot != NULL) && (*(dot + 1) == '\0')) fqdn = 1; 1574 if ((n >= ndots) || (fqdn == 1) || (type == ns_t_ptr)) 1577 status = _sdns_send(sdns, name, class, type, fqdn, buf, len, from, fromlen, &tmin); 1585 if ((fqdn == 1) || (type == ns_t_ptr) || (recurse == 0) || (primary == NULL)) 1604 status = _sdns_search(sdns, qname, class, type, fqdn, 0, buf, len, from, fromlen, &tmin);
|
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/sample/ |
H A D | sample-client.c | 454 *fqdn = "", local 614 fqdn = optarg; 788 fqdn,
|