/macosx-10.10.1/ppp-786.1.1/Drivers/L2TP/L2TP-extension/ |
H A D | l2tp_proto.h | 28 #include <sys/domain.h> 30 int l2tp_add(struct domain *domain); 31 int l2tp_remove(struct domain *domain);
|
/macosx-10.10.1/ppp-786.1.1/Drivers/PPPoE/PPPoE-extension/ |
H A D | pppoe_proto.h | 28 #include <sys/domain.h> 30 int pppoe_add(struct domain *domain); 31 int pppoe_remove(struct domain *domain);
|
/macosx-10.10.1/ppp-786.1.1/Drivers/PPTP/PPTP-extension/ |
H A D | pptp_proto.h | 28 #include <sys/domain.h> 30 int pptp_add(struct domain *domain); 31 int pptp_remove(struct domain *domain);
|
/macosx-10.10.1/postfix-255/postfix/src/smtpd/ |
H A D | smtpd_check.in4 | 11 mail rejecttext@bad.domain 12 mail filter@filter.domain 13 mail filtertext@filter.domain 14 mail filtertexttext@filter.domain 15 mail hold@hold.domain 16 mail holdtext@hold.domain 17 mail discard@hold.domain 18 mail discardtext@hold.domain 19 mail dunnotext@dunno.domain
|
H A D | smtpd_acl.in | 19 # Test check_namadr_access(), domain part 46 mail reject@dunno.domain 48 mail ok@dunno.domain 50 mail anyone@dunno.domain 52 mail bad-sender@dunno.domain 54 # Again, with a domain that rejects by default 57 mail reject@reject.domain 59 mail ok@reject.domain 61 mail anyone@reject.domain 63 mail good-sender@reject.domain [all...] |
H A D | smtpd_check.in2 | 16 client random.bad.domain 123.123.123.123 17 client friend.bad.domain 123.123.123.123 18 client bad.domain 123.123.123.123 33 helo random.bad.domain 34 helo friend.bad.domain 47 mail foo@bad.domain 49 mail bad-sender@any.domain 50 mail bad-sender@good.domain 53 mail foo@bad.domain 54 mail foo@Bad.domain [all...] |
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSPosix/ |
H A D | nss_mdns.conf | 4 domain local 5 domain 254.169.in-addr.arpa 6 domain 8.e.f.ip6.int 7 domain 9.e.f.ip6.int 8 domain a.e.f.ip6.int 9 domain b.e.f.ip6.int 10 domain 8.e.f.ip6.arpa 11 domain 9.e.f.ip6.arpa 12 domain a.e.f.ip6.arpa 13 domain [all...] |
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSShared/Java/ |
H A D | DomainListener.java | 31 The active domain enumerator. 36 Specifies the interface on which the domain exists. (The index for a given 39 @param domain 40 The name of the domain. 42 void domainFound( DNSSDService domainEnum, int flags, int ifIndex, String domain); argument 44 /** Called to report that a domain has disappeared.<P> 47 The active domain enumerator. 52 Specifies the interface on which the domain exists. (The index for a given 55 @param domain 56 The name of the domain 58 domainLost( DNSSDService domainEnum, int flags, int ifIndex, String domain) argument [all...] |
H A D | BrowseListener.java | 44 @param domain 45 The domain in which the service was discovered. 48 String serviceName, String regType, String domain); 67 @param domain 68 The domain in which the service was discovered. 71 String serviceName, String regType, String domain); 47 serviceFound( DNSSDService browser, int flags, int ifIndex, String serviceName, String regType, String domain) argument 70 serviceLost( DNSSDService browser, int flags, int ifIndex, String serviceName, String regType, String domain) argument
|
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSShared/ |
H A D | PlatformCommon.h | 18 extern void ReadDDNSSettingsFromConfFile(mDNS *const m, const char *const filename, domainname *const hostname, domainname *const domain, mDNSBool *DomainDiscoveryDisabled);
|
/macosx-10.10.1/Heimdal-398.1.2/lib/roken/ |
H A D | innetgr.c | 40 const char *user, const char *domain) 39 innetgr(const char *netgroup, const char *machine, const char *user, const char *domain) argument
|
/macosx-10.10.1/CPANInternal-159.1/Perl4-CoreLibs-0.003/lib/ |
H A D | abbrev.pl | 20 local(*domain) = @_; 34 $domain{$abbrev} = $name; 37 $domain{$abbrev} = $name;
|
/macosx-10.10.1/xnu-2782.1.97/bsd/kern/ |
H A D | sys_domain.c | 35 #include <sys/domain.h> 40 struct domain *systemdomain = NULL; 42 /* domain init function */ 43 static void systemdomain_init(struct domain *); 45 struct domain systemdomain_s = { 52 CTLFLAG_RW|CTLFLAG_LOCKED, 0, "System domain"); 56 systemdomain_init(struct domain *dp) 63 /* add system domain built in protocol initializers here */
|
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/ |
H A D | SCDKeys.c | 68 CFStringRef domain, 74 domain, 82 CFStringRef domain) 87 domain, 94 CFStringRef domain, 102 domain, 110 domain, 120 CFStringRef domain, 128 domain, 136 domain, 67 SCDynamicStoreKeyCreateNetworkGlobalEntity(CFAllocatorRef allocator, CFStringRef domain, CFStringRef entity) argument 81 SCDynamicStoreKeyCreateNetworkInterface(CFAllocatorRef allocator, CFStringRef domain) argument 93 SCDynamicStoreKeyCreateNetworkInterfaceEntity(CFAllocatorRef allocator, CFStringRef domain, CFStringRef ifname, CFStringRef entity) argument 119 SCDynamicStoreKeyCreateNetworkServiceEntity(CFAllocatorRef allocator, CFStringRef domain, CFStringRef serviceID, CFStringRef entity) argument [all...] |
/macosx-10.10.1/xnu-2782.1.97/bsd/sys/ |
H A D | domain.h | 62 * @(#)domain.h 8.1 (Berkeley) 6/2/93 63 * $FreeBSD: src/sys/sys/domain.h,v 1.14 1999/12/29 04:24:40 peter Exp $ 75 * Structure per communications domain. 87 * Legacy domain. 92 * routines. Internally, domains are stored in the private variant of domain 97 struct domain { 101 void (*dom_init)(void); /* initialize domain data structures */ 111 struct domain *dom_next; 119 lck_mtx_t *dom_mtx; /* domain global mutex */ 128 * Internal, private and extendable representation of domain 130 struct domain { struct [all...] |
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | dnssrv.c | 49 struct berval domain = BER_BVNULL; local 74 if( domain.bv_len == 0 ) { 75 ndomain = LDAP_REALLOC( domain.bv_val, 82 domain.bv_val = ndomain; 84 AC_MEMCPY( domain.bv_val, ava->la_value.bv_val, 87 domain.bv_len = ava->la_value.bv_len; 88 domain.bv_val[domain.bv_len] = '\0'; 91 ndomain = LDAP_REALLOC( domain.bv_val, 92 ava->la_value.bv_len + sizeof(".") + domain 131 char *domain, *s, *tok_r, *dn, *dntmp; local 181 ldap_domain2hostlist( LDAP_CONST char *domain, char **list ) argument [all...] |
/macosx-10.10.1/libutil-38/ |
H A D | trimdomain.c | 42 * Trim the current domain name from fullhost, but only if the result 49 * trimdomain("abcde.my.domain", 5) -> "abcde" 50 * trimdomain("abcde.my.domain", 4) -> "abcde.my.domain" 51 * trimdomain("abcde.my.domain:0.0", 9) -> "abcde:0.0" 52 * trimdomain("abcde.my.domain:0.0", 8) -> "abcde.my.domain:0.0" 59 static char domain[MAXHOSTNAMELEN]; local 64 /* XXX: Should we assume that our domain is this persistent ? */ 66 if (gethostname(domain, sizeo [all...] |
/macosx-10.10.1/bind9-45.101/bind9/contrib/zkt/ |
H A D | nscomm.h | 49 extern int dyn_update_freeze (const char *domain, const zconf_t *z, int freeze); 50 extern int reload_zone (const char *domain, const zconf_t *z);
|
/macosx-10.10.1/xnu-2782.1.97/libsyscall/wrappers/legacy/ |
H A D | socketpair.c | 47 socketpair(int domain, int type, int protocol, int socket_vector[2]) argument 49 int ret = __socketpair(domain, type, protocol, socket_vector);
|
/macosx-10.10.1/Libc-1044.1.2/stdio/ |
H A D | xprintf_all_in_one.c | 32 asxprintf(char ** __restrict ret, printf_domain_t __restrict domain, argument 39 iret = _vasprintf(NULL, domain, ret, loc, format, ap); 45 dxprintf(int fd, printf_domain_t __restrict domain, locale_t __restrict loc, argument 52 ret = _vdprintf(NULL, domain, fd, loc, format, ap); 58 fxprintf(FILE * __restrict stream, printf_domain_t __restrict domain, argument 65 ret = __xvprintf(NULL, domain, stream, loc, format, ap); 71 sxprintf(char * __restrict str, size_t size, printf_domain_t __restrict domain, argument 78 ret = _vsnprintf(NULL, domain, str, size, loc, format, ap); 84 xprintf(printf_domain_t __restrict domain, locale_t __restrict loc, argument 91 ret = __xvprintf(NULL, domain, stdou 97 vasxprintf(char ** __restrict ret, printf_domain_t __restrict domain, locale_t __restrict loc, const char * __restrict format, va_list ap) argument 104 vdxprintf(int fd, printf_domain_t __restrict domain, locale_t __restrict loc, const char * __restrict format, va_list ap) argument 111 vfxprintf(FILE * __restrict stream, printf_domain_t __restrict domain, locale_t __restrict loc, const char * __restrict format, va_list ap) argument 118 vsxprintf(char * __restrict str, size_t size, printf_domain_t __restrict domain, locale_t __restrict loc, const char * __restrict format, va_list ap) argument 125 vxprintf(printf_domain_t __restrict domain, locale_t __restrict loc, const char * __restrict format, va_list ap) argument [all...] |
/macosx-10.10.1/Heimdal-398.1.2/po/ |
H A D | gen-po.in | 7 domain=$1 10 outdir=${top_srcdir}/po/${domain} 11 outfile=${outdir}/${domain}.pot 19 --default-domain=${domain} \
|
/macosx-10.10.1/SmartCardServices-55111/installPhase/scripts/ |
H A D | sc_auth | 35 Usage: $(basename $0) accept [-v] [-u user] [-d domain] [-k keyname] # by key on inserted card(s) 36 $(basename $0) accept [-v] [-u user] [-d domain] -h hash # by known pubkey hash 37 $(basename $0) remove [-v] [-u user] [-d domain] # remove all public keys for this user 39 $(basename $0) list [-v] [-u user] [-d domain] # list pubkey hashes that can authenticate this user 53 domain="." 56 d) domain="$OPTARG";; 111 dscl "$domain" -append "/Users/$user" AuthenticationAuthority ";pubkeyhash;$hash" 115 set -- $(dscl "$domain" -read "/Users/$user" AuthenticationAuthority) 120 dscl "$domain" -delete "/Users/$user" AuthenticationAuthority "$1" 129 set -- $(dscl "$domain" [all...] |
/macosx-10.10.1/apr-32/apr/apr/user/win32/ |
H A D | groupinfo.c | 33 char *domain; 40 domain = apr_pstrndup(p, groupname, pos - groupname); 44 domain = apr_pstrndup(p, groupname, pos - groupname); 48 domain = NULL; 52 rv = LookupAccountName(domain, groupname, domain, &sidlen, 59 rv = LookupAccountName(domain, groupname, *gid, &sidlen, 75 char name[MAX_PATH], domain[MAX_PATH]; 76 DWORD cbname = sizeof(name), cbdomain = sizeof(domain); 79 if (!LookupAccountSid(NULL, groupid, name, &cbname, domain, [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecTrustSettings.h | 58 * to make changes to this domain. 214 * Specify user, local administrator, or system domain Trust Settings. 227 * for a given domain. When evaluating Trust Settings for a root cert in 228 * a given domain, *and* no matching explicit Trust Settings exists for the 230 * in that domain which matches the evaluation condition, then the 235 * of the root certs in the (immutable) system domain for a specific policy. 251 SecTrustSettingsDomain domain, 256 * already has Trust Settings in the specified domain, they will 264 SecTrustSettingsDomain domain, 273 SecTrustSettingsDomain domain); [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecTrustSettings.h | 58 * to make changes to this domain. 214 * Specify user, local administrator, or system domain Trust Settings. 227 * for a given domain. When evaluating Trust Settings for a root cert in 228 * a given domain, *and* no matching explicit Trust Settings exists for the 230 * in that domain which matches the evaluation condition, then the 235 * of the root certs in the (immutable) system domain for a specific policy. 251 SecTrustSettingsDomain domain, 256 * already has Trust Settings in the specified domain, they will 264 SecTrustSettingsDomain domain, 273 SecTrustSettingsDomain domain); [all...] |