Home
last modified time | relevance | path

Searched refs:hostnames (Results 1 – 25 of 51) sorted by relevance

123

/src/contrib/ldns/drill/
H A Ddnssec.c36 ldns_rr_list *hostnames; in drill_pkt_print() local
43 hostnames = ldns_get_rr_list_name_by_addr(r, ldns_pkt_answerfrom(p), 0, 0); in drill_pkt_print()
55 if (hostnames) { in drill_pkt_print()
57 ldns_rr_rdf(ldns_rr_list_rr(hostnames, 0), 0)); in drill_pkt_print()
58 ldns_rr_list_deep_free(hostnames); in drill_pkt_print()
72 ldns_rr_list *hostnames; in drill_pkt_print_footer() local
79 hostnames = ldns_get_rr_list_name_by_addr(r, ldns_pkt_answerfrom(p), 0, 0); in drill_pkt_print_footer()
86 if (hostnames) { in drill_pkt_print_footer()
88 ldns_rr_rdf(ldns_rr_list_rr(hostnames, 0), 0)); in drill_pkt_print_footer()
89 ldns_rr_list_deep_free(hostnames); in drill_pkt_print_footer()
/src/crypto/openssl/doc/internal/man3/
H A Dossl_punycode_decode.pod20 representation of hostnames in ASCII-only format. Some specifications,
21 such as RFC 8398, require comparison of hostnames encoded in UTF-8 charset.
/src/crypto/openssl/doc/man3/
H A DSSL_set1_host.pod23 clearing any previously specified IP address and hostnames.
34 that can match the peer's certificate. Any previous hostnames
38 When an IP address and/or multiple hostnames are configured,
/src/contrib/ntp/scripts/ntpsweep/
H A Dinvoke-ntpsweep.texi55 -s, --strip=str Strip this string from hostnames
97 This is the ``strip this string from hostnames'' option.
H A Dntpsweep-opts.def45 descrip = 'Strip this string from hostnames';
H A Dntpsweep-opts53 -s, --strip=str Strip this string from hostnames
/src/contrib/ntp/scripts/ntptrace/
H A Dinvoke-ntptrace.texi68 -n, --numeric Print IP addresses instead of hostnames
83 This is the ``print ip addresses instead of hostnames'' option.
H A Dntptrace-opts46 -n, --numeric Print IP addresses instead of hostnames
H A Dntptrace-opts.def19 descrip = 'Print IP addresses instead of hostnames';
/src/usr.sbin/bootparamd/bootparamd/
H A DREADME28 This program was written with the need to keep short hostnames in the
/src/share/doc/psd/21.ipc/
H A Dspell.ok196 hostnames
/src/crypto/heimdal/doc/
H A Dkerberos4.texi42 name to append, or you have to have a list of possible hostnames. In the
141 it has no way of knowing which hostnames are valid and which are not, it
/src/crypto/openssh/regress/unittests/hostkeys/testdata/
H A Dknown_hosts7 # Plain host keys, hostnames + addresses
/src/lib/libwrap/
H A Dhosts.allow63 # (IP addresses rather than hostnames *MUST* be used here)
/src/contrib/ntp/ntpdc/
H A Dntpdc.c96 static void hostnames (struct parse *, FILE *);
130 { "hostnames", hostnames, { OPT|NTP_STR, NO, NO, NO },
1832 hostnames( in hostnames() function
H A Dntpdc-opts.def269 .It Ic hostnames Op Cm yes | Cm no
360 .Ic hostnames
/src/contrib/sendmail/contrib/
H A Dbsdi.mc128 # If this machine should be accepting mail as local for other hostnames
129 # that are MXed to this hostname then add those hostnames below using
/src/contrib/tcp_wrappers/
H A DCHANGES160 useful for sites that don't care about internet hostnames anyway.
324 - With AIX 3.2, hostnames longer than 32 would be truncated. This
/src/contrib/ntp/ntpq/
H A Dntpq.c213 static void hostnames (struct parse *, FILE *);
286 { "hostnames", hostnames, { OPT|NTP_STR, NO, NO, NO },
2716 hostnames( in hostnames() function
H A Dntpq.texi155 @item @anchor{hostnames} @code{hostnames [yes | no]}
/src/libexec/bootpd/
H A DChanges98 Fix prs_inetaddr() so it allows '_' in hostnames.
/src/contrib/sendmail/cf/m4/
H A Dproto.m4917 # hostnames ending in class P are always canonical
919 dnl apply the next rule only for hostnames not in class P
937 # add a trailing dot to qualified hostnames so other rules will work
940 dnl this should only apply to unqualified hostnames
943 # look up unqualified hostnames
947 dnl but add a trailing dot to qualified hostnames so other rules will work
1946 # handle non-DNS hostnames (*.bitnet, *.decnet, *.uucp, etc)
/src/crypto/openssl/doc/man7/
H A Dossl-guide-tls-client-block.pod263 important because it is common for multiple hostnames to be fronted by a single
265 have multiple hostnames associated with it and it is important to indicate which
/src/crypto/openssh/
H A DPROTOCOL.certkeys178 certificate is valid; hostnames for SSH_CERT_TYPE_HOST certificates and
/src/contrib/sendmail/cf/cf/
H A Dsubmit.cf710 # hostnames ending in class P are always canonical
1077 # handle non-DNS hostnames (*.bitnet, *.decnet, *.uucp, etc)

123