| /src/external/mpl/bind/dist/bin/tests/system/bailiwick/ans1/ |
| ans.py | 34 qname = "trigger." variable in class:SiblingNsSpoofer 42 qctx.qname,
|
| /src/external/mpl/bind/dist/bin/tests/system/idna/ |
| tests.sh | 31 # NXDOMAIN. The server will return the qname sent, which "dig" will display 33 # the qname originally sent. 62 # Function for extracting the qname from the response 69 qname() { function 102 actual=$(qname dig.out.$n) 145 # sends the qname "localhost", a change in behavior from earlier versions. 148 # not interested in IDNA. For this reason, after "dig" passes the input qname 150 # result. If the two are the same, "dig" can conclude that the qname is 152 # as the qname. 231 # +noidnout: The string is sent as-is to the server and the returned qname [all...] |
| /src/external/bsd/unbound/dist/testdata/pylib.tdir/ |
| pylib.lookup.py | 11 qname = "www.example.com" variable 50 status, result = ctx.resolve(qname, qtype, qclass) 63 retval, async_id = ctx.resolve_async(qname, cb_data, callback, qtype, qclass) 87 retval, async_id = ctx.resolve_async(qname, cb_data, callback, qtype, qclass)
|
| /src/external/ibm-public/postfix/dist/src/dns/ |
| dns_sec.c | 84 char *qname; local 116 if ((qname = split_at(saved_dnssec_probe, ':')) == 0 || *qname == 0 118 msg_fatal("malformed %s value: %s format is qtype:qname", 122 dns_status = dns_lookup(qname, qtype, rflags, &rrlist, (VSTRING *) 0, why);
|
| /src/external/mpl/bind/dist/bin/tests/system/bailiwick/ans2/ |
| ans.py | 34 qname = "trigger.victim." variable in class:UnsolicitedNsSpoofer 42 qctx.qname, 60 qname = "trigger.victim." variable in class:ParentGlueSpoofer 82 qname = "trigger.victim." variable in class:DnameSpoofer 90 qctx.qname,
|
| /src/external/mpl/bind/dist/bin/tests/system/bailiwick/ |
| bailiwick_ans.py | 48 def qname(self) -> str: member in class:ResponseSpoofer 53 qctx.qname == dns.name.from_text(self.qname)
|
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| dnsrps.h | 44 * the qname or the node with the SOA for the zone containing the rewritten 58 const dns_name_t *qname; member in struct:dns_rpsdb 110 dns_rpz_zones_t *rpzs, const dns_name_t *qname,
|
| /src/external/mpl/bind/dist/tests/include/tests/ |
| ns.h | 100 const char *qname; member in struct:ns_test_qctx_create_params 108 * with given QNAME, QTYPE and flags was received from a client. Recursion is
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| dnsrps.h | 45 * the qname or the node with the SOA for the zone containing the rewritten 58 const dns_name_t *qname; member in struct:rpsdb 110 dns_rpz_zones_t *rpzs, const dns_name_t *qname,
|
| /src/dist/pf/libexec/tftp-proxy/ |
| filter.c | 60 static char *qname; variable 170 qname = opt_qname; 295 * (max 1) [queue qname] 305 if (qname != NULL) 306 strlcpy(pfr.rule.qname, qname, sizeof pfr.rule.qname);
|
| /src/external/gpl3/binutils/dist/gprofng/src/ |
| Emsg.h | 98 char *qname; member in class:Emsgqueue
|
| /src/external/gpl3/binutils.old/dist/gprofng/src/ |
| Emsg.h | 98 char *qname; member in class:Emsgqueue
|
| /src/dist/pf/usr.sbin/ftp-proxy/ |
| filter.c | 71 static char *qname, *tagname; variable 197 qname = opt_qname; 319 * (max 1) [queue qname] 328 if (qname != NULL) 329 strlcpy(pfr.rule.qname, qname, sizeof pfr.rule.qname);
|
| /src/usr.sbin/altq/altqstat/ |
| altqstat.c | 98 char device[64], qname[64], input[32]; local 164 qtype = ifname2qdisc(interface, qname); 168 qdisc_name = qname;
|
| /src/external/bsd/unbound/dist/util/data/ |
| msgreply.h | 73 * Salient data on the query: qname, in wireformat. 77 uint8_t* qname; member in struct:query_info 78 /** length of qname (including last 0 octet) */ 85 * Alias local answer(s) for the qname. If 'qname' is an alias defined 372 /** calculate hash value of query_info, lowercases the qname, 805 * Swallow copy the local_alias into the given qname and qname_len. 807 * @param qname: the qname to copy to. 811 int local_alias_shallow_copy_qname(struct local_rrset* local_alias, uint8_t** qname, [all...] |
| msgparse.h | 128 uint8_t* qname; member in struct:msg_parse
|
| /src/external/ibm-public/postfix/dist/src/smtp/ |
| smtp_tlsrpt.c | 141 VSTRING *qname = vstring_alloc(100); local 170 vstring_sprintf(qname, "_smtp._tls.%s", adomain); 171 dns_status = dns_lookup(STR(qname), T_TXT, res_opt, &rr_list, 173 vstring_free(qname);
|
| /src/external/mpl/bind/dist/bin/tests/system/nsec3-answer/ |
| tests_nsec3.py | 61 qname: dns.name.Name, qtype: dns.rdatatype.RdataType, server: str, named_port: int 63 query = dns.message.make_query(qname, qtype, use_edns=True, want_dnssec=True) 74 qname=sampled_from( variable 78 def test_nodata(server: str, qname: dns.name.Name, named_port: int) -> None: 80 _, nsec3check = do_test_query(qname, dns.rdatatype.HINFO, server, named_port) 81 check_nodata(qname, nsec3check) 86 qname=dns_names( 90 def test_nodata_ds(server: str, qname: dns.name.Name, named_port: int) -> None: 92 response, nsec3check = do_test_query(qname, dns.rdatatype.HINFO, server, named_port) 101 # DS RR does not exist so we must prove it by having NSEC3 with QNAME [all...] |
| /src/tests/lib/libc/net/ |
| h_dns_server.c | 70 const char *qname; /* Wire-encode question name */ member in struct:dns_data 247 p = buf + 12; /* Point to QNAME */ 248 int n = name_eq(p, (const unsigned char *) dp->qname); 252 name2str(dp->qname, buf2, sizeof(buf2))); 257 p += n; /* Skip QNAME */ 281 memcpy(p, dp->qname, dp->qname_size);
|
| /src/external/apache2/mDNSResponder/dist/mDNSShared/ |
| ClientRequests.h | 33 domainname * qname; // Name of the original record. member in struct:__anon6128 59 mDNSu8 resolverUUID[UUID_SIZE];// Resolver UUID to use with original QNAME.
|
| /src/external/bsd/nsd/dist/ |
| query.h | 92 const dname_type *qname; member in struct:query
|
| /src/external/bsd/unbound/dist/ipset/ |
| ipset.c | 226 struct ub_packed_rrset_key *rrset, const char *qname, int qlen, 244 if (qname[qlen - 1] == '.') { 259 if (qlen == plen || (qlen > plen && qname[qlen - plen - 1] == '.' )) { 260 qs = qname + (qlen - plen); 279 static char qname[BUFF_LEN]; local 294 qlen = sldns_wire2str_dname_buf(qinfo.qname, qinfo.qname_len, 295 qname, BUFF_LEN); 315 if(ipset_check_zones_for_rrset(env, ie, rrset, qname,
|
| /src/external/bsd/unbound/dist/testcode/ |
| unitverify.c | 148 if(qinfo->qname_len > 6 && memcmp(qinfo->qname+1, "bogus", 5)==0) 276 if(strncmp((char*)qinfo.qname, "\003yes", 4) == 0) { 281 } else if (strncmp((char*)qinfo.qname, "\002no", 3) == 0) { 288 fatal_exit("Bad qname in DS unit test, yes or no"); 437 uint8_t* qname; local 448 qname = regional_alloc_init(region, qinfo.qname, qinfo.qname_len); 450 unit_assert(nsec3 && answer && qname); 456 ret = nsec3_hash_name(ct, region, buf, nsec3_region, 0, qname, 481 * The qname is hashed [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/pipelined/ |
| pipequeries.c | 125 dns_name_t *qname = NULL; local 155 dns_message_gettempname(message, &qname); 159 dns_name_clone(dns_fixedname_name(&queryname), qname); local 162 ISC_LIST_APPEND(qname->list, qrdataset, link); 163 dns_message_addname(message, qname, DNS_SECTION_QUESTION);
|
| /src/external/mpl/bind/dist/tests/libtest/ |
| ns.c | 250 * Synthesize a DNS message based on supplied QNAME, QTYPE and flags, then 259 dns_name_t *qname = NULL; local 287 dns_message_gettempname(message, &qname); 294 result = dns_name_fromstring(qname, qnamestr, dns_rootname, 0, mctx); 299 ISC_LIST_APPEND(qname->list, qrdataset, link); 300 dns_message_addname(message, qname, DNS_SECTION_QUESTION); 334 dns_message_puttempname(message, &qname); 426 REQUIRE(params->qname != NULL); 446 * Synthesize a DNS query using given QNAME, QTYPE and flags, storing 449 result = attach_query_msg_to_client(client, params->qname, [all...] |