/third_party/python/Lib/ |
D | netrc.py | 27 self.hosts = {} 72 self.hosts[entryname] = {} 78 self.hosts[entryname] = (login, account, password) 119 if host in self.hosts: 120 return self.hosts[host] 121 elif 'default' in self.hosts: 122 return self.hosts['default'] 129 for host in self.hosts.keys(): 130 attrs = self.hosts[host]
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
D | x509_vpm.c | 54 sk_OPENSSL_STRING_pop_free(vpm->hosts, str_free); in int_x509_param_set_hosts() 55 vpm->hosts = NULL; in int_x509_param_set_hosts() 64 if (vpm->hosts == NULL && in int_x509_param_set_hosts() 65 (vpm->hosts = sk_OPENSSL_STRING_new_null()) == NULL) { in int_x509_param_set_hosts() 70 if (!sk_OPENSSL_STRING_push(vpm->hosts, copy)) { in int_x509_param_set_hosts() 72 if (sk_OPENSSL_STRING_num(vpm->hosts) == 0) { in int_x509_param_set_hosts() 73 sk_OPENSSL_STRING_free(vpm->hosts); in int_x509_param_set_hosts() 74 vpm->hosts = NULL; in int_x509_param_set_hosts() 103 sk_OPENSSL_STRING_pop_free(param->hosts, str_free); in X509_VERIFY_PARAM_free() 197 if (test_x509_verify_param_copy(hosts, NULL)) { in X509_VERIFY_PARAM_inherit() [all …]
|
/third_party/openssl/crypto/x509/ |
D | x509_vpm.c | 54 sk_OPENSSL_STRING_pop_free(vpm->hosts, str_free); in int_x509_param_set_hosts() 55 vpm->hosts = NULL; in int_x509_param_set_hosts() 64 if (vpm->hosts == NULL && in int_x509_param_set_hosts() 65 (vpm->hosts = sk_OPENSSL_STRING_new_null()) == NULL) { in int_x509_param_set_hosts() 70 if (!sk_OPENSSL_STRING_push(vpm->hosts, copy)) { in int_x509_param_set_hosts() 72 if (sk_OPENSSL_STRING_num(vpm->hosts) == 0) { in int_x509_param_set_hosts() 73 sk_OPENSSL_STRING_free(vpm->hosts); in int_x509_param_set_hosts() 74 vpm->hosts = NULL; in int_x509_param_set_hosts() 103 sk_OPENSSL_STRING_pop_free(param->hosts, str_free); in X509_VERIFY_PARAM_free() 197 if (test_x509_verify_param_copy(hosts, NULL)) { in X509_VERIFY_PARAM_inherit() [all …]
|
/third_party/python/Lib/test/ |
D | test_netrc.py | 24 self.assertEqual(nrc.hosts['host1.domain.com'], 26 self.assertEqual(nrc.hosts['default'], ('log2', None, 'pass2')) 29 self.assertEqual(nrc.hosts, nrc2.hosts) 46 self.assertEqual(nrc.hosts['host.domain.com'], ('log', 'acct', passwd)) 65 self.assertEqual(nrc.hosts['foo.domain.com'], ('bar', None, passwd)) 66 self.assertEqual(nrc.hosts['bar.domain.com'], ('foo', None, 'pass')) 123 self.assertEqual(nrc.hosts['foo.domain.com'],
|
D | test_ipaddress.py | 1412 hosts = list(self.ipv4_network.hosts()) 1413 self.assertEqual(254, len(hosts)) 1414 self.assertEqual(ipaddress.IPv4Address('1.2.3.1'), hosts[0]) 1415 self.assertEqual(ipaddress.IPv4Address('1.2.3.254'), hosts[-1]) 1418 hosts = list(ipv6_network.hosts()) 1419 self.assertEqual(255, len(hosts)) 1420 self.assertEqual(ipaddress.IPv6Address('2001:658:22a:cafe::1'), hosts[0]) 1421 self.assertEqual(ipaddress.IPv6Address('2001:658:22a:cafe::ff'), hosts[-1]) 1424 hosts = list(ipv6_scoped_network.hosts()) 1425 self.assertEqual(255, len(hosts)) [all …]
|
/third_party/node/deps/cares/src/lib/ |
D | ares__hosts_file.c | 98 ares__llist_t *hosts; member 263 ares__llist_destroy(entry->hosts); in ares__hosts_entry_destroy() 344 while ((node = ares__llist_node_first(entry->hosts)) != NULL) { in ares__hosts_file_merge_entry() 352 ares__llist_node_move_parent_last(node, existing->hosts); in ares__hosts_file_merge_entry() 375 for (node = ares__llist_node_first(entry->hosts); node != NULL; in ares__hosts_file_match() 388 static ares_status_t ares__hosts_file_add(ares_hosts_file_t *hosts, in ares__hosts_file_add() argument 400 num_hostnames = ares__llist_len(entry->hosts); in ares__hosts_file_add() 402 matchtype = ares__hosts_file_match(hosts, entry, &match); in ares__hosts_file_add() 405 status = ares__hosts_file_merge_entry(hosts, match, entry, matchtype); in ares__hosts_file_add() 417 if (!ares__htable_strvp_get(hosts->iphash, ipaddr, NULL)) { in ares__hosts_file_add() [all …]
|
/third_party/node/deps/npm/node_modules/hosted-git-info/lib/ |
D | hosts.js | 37 const hosts = {} constant 38 hosts.github = { 74 hosts.bitbucket = { 102 hosts.gitlab = { 133 hosts.gist = { 191 hosts.sourcehut = { 223 for (const [name, host] of Object.entries(hosts)) { 224 hosts[name] = Object.assign({}, defaults, host) 227 module.exports = hosts
|
D | index.js | 4 const hosts = require('./hosts.js') constant 175 for (const [name, host] of Object.entries(hosts)) {
|
/third_party/node/test/parallel/ |
D | test-net-autoselectfamily-commandline-option.js | 26 const hosts = replies 31 return cb(null, hosts); 34 return cb(null, hosts[0].address, hosts[0].family);
|
D | test-net-autoselectfamily-ipv4first.js | 24 const hosts = replies 28 return cb(null, hosts); 31 return cb(null, hosts[0].address, hosts[0].family);
|
D | test-http-autoselectfamily.js | 25 const hosts = replies 30 return cb(null, hosts); 33 return cb(null, hosts[0].address, hosts[0].family);
|
D | test-net-autoselectfamilydefault.js | 27 const hosts = replies 32 return cb(null, hosts); 35 return cb(null, hosts[0].address, hosts[0].family);
|
D | test-https-autoselectfamily.js | 39 const hosts = replies 44 return cb(null, hosts); 47 return cb(null, hosts[0].address, hosts[0].family);
|
D | test-net-autoselectfamily.js | 27 const hosts = replies 32 return cb(null, hosts); 35 return cb(null, hosts[0].address, hosts[0].family);
|
/third_party/curl/docs/libcurl/opts/ |
D | CURLOPT_UNRESTRICTED_AUTH.md | 17 CURLOPT_UNRESTRICTED_AUTH - send credentials to other hosts too 37 to other hosts than the one used for the initial URL. 47 again and again as the following hosts can keep redirecting to new hosts.
|
D | CURLOPT_USERPWD.md | 47 requests to possibly different hosts. libcurl only sends this user and 48 password information to hosts using the initial hostname (unless 50 hosts, it does not send the user and password to those. This is enforced to
|
D | CURLMOPT_PIPELINING_SITE_BL.md | 22 char **hosts); 29 Pass a **hosts** array of char *, ending with a NULL entry. This is a list
|
D | CURLOPT_SSH_KNOWNHOSTS.md | 14 CURLOPT_SSH_KNOWNHOSTS - filename holding the SSH known hosts 29 accepts connections with hosts that are known and present in that file, with a
|
D | CURLOPT_NOPROXY.md | 15 CURLOPT_NOPROXY - disable proxy use for specific hosts 30 which matches all hosts, and effectively disables the proxy. Each name in this
|
/third_party/skia/third_party/externals/microhttpd/src/testcurl/https/ |
D | test_https_sni.c | 55 static struct Hosts *hosts; variable 73 host->next = hosts; in load_keys() 74 hosts = host; in load_keys() 155 for (host = hosts; NULL != host; host = host->next) in sni_callback()
|
/third_party/curl/docs/cmdline-opts/ |
D | noproxy.md | 6 Help: List of hosts which do not use proxy 18 Comma-separated list of hosts for which not to use a proxy, if one is 20 hosts, and effectively disables the proxy. Each name in this list is matched
|
D | location-trusted.md | 5 Help: Like --location, and send auth to other hosts 18 Like --location, but allows sending the name + password to all hosts that the
|
/third_party/cups/ |
D | backport-CVE-2023-34241.patch | 58 "Connection from %s refused by /etc/hosts.allow and " 59 "/etc/hosts.deny rules.", httpGetHostname(con->http, NULL, 0));
|
/third_party/alsa-utils/seq/aseqnet/ |
D | README.aseqnet | 10 network. Suppose two hosts (hostA and hostB) connected by network. 11 You need to run ALSA system on both hosts. Then, start aseqnet as a
|
/third_party/python/Doc/library/ |
D | ipaddress.rst | 18 hosts are on the same subnet, iterating over all hosts in a particular 558 .. method:: hosts() 560 Returns an iterator over the usable hosts in the network. The usable 561 hosts are all the IP addresses that belong to the network, except the 567 >>> list(ip_network('192.0.2.0/29').hosts()) #doctest: +NORMALIZE_WHITESPACE 571 >>> list(ip_network('192.0.2.0/31').hosts()) 573 >>> list(ip_network('192.0.2.1/32').hosts()) 730 .. method:: hosts() 732 Returns an iterator over the usable hosts in the network. The usable 733 hosts are all the IP addresses that belong to the network, except the [all …]
|