| /src/external/mpl/bind/dist/bin/tests/system/dialup/ |
| tests_dialup_zone_transfer.py | 38 assert response.authority == ns1response.authority
|
| /src/external/mpl/bind/dist/bin/tests/system/glue/ |
| tests_glue.py | 38 ;AUTHORITY 58 isctest.check.rrsets_equal(res.authority, expected_answer.authority) 69 ;AUTHORITY 78 isctest.check.rrsets_equal(res.authority, expected_answer.authority)
|
| /src/external/mpl/bind/dist/bin/tests/system/ttl/ |
| tests_cache_ttl.py | 29 for rr in response.answer + response.authority:
|
| /src/crypto/external/apache2/openssl/dist/crypto/x509/ |
| v3_battcons.c | 39 ASN1_OPT(OSSL_BASIC_ATTR_CONSTRAINTS, authority, ASN1_FBOOLEAN), 50 X509V3_add_value_bool("authority", battcons->authority, &extlist); 70 if (strcmp(val->name, "authority") == 0) { 71 if (!X509V3_get_value_bool(val, &battcons->authority))
|
| /src/external/mpl/bind/dist/bin/tests/system/qmin/ |
| qmin_ans.py | 80 and qctx.response.authority 81 and qctx.response.authority[0].rdtype == dns.rdatatype.SOA
|
| /src/external/mpl/bind/dist/bin/tests/system/bailiwick/ans2/ |
| ans.py | 53 response.authority.append(ns_rrset) 70 response.authority.append(ns_rrset)
|
| /src/external/mpl/bind/dist/bin/tests/system/bailiwick/ans1/ |
| ans.py | 53 response.authority.append(ns_rrset)
|
| /src/external/mpl/bind/dist/bin/tests/system/dnssec/ans10/ |
| ans.py | 54 qctx.response.authority.append(nsec_rrset)
|
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 90-test_store.t | 195 # '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority' 201 '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority', 211 '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority', 215 '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority', 439 my ($file, $isdir, $authority) = @_; 479 return "file://$authority$file" if defined $authority; 490 my ($file, $isdir, $authority) = @_; 493 return to_file_uri(to_abs_file($file), $isdir, $authority);
|
| /src/external/mpl/bind/dist/bin/tests/system/forward/ans6/ |
| ans.py | 64 response_section = qctx.response.authority
|
| /src/external/mpl/bind/dist/bin/tests/system/stub/ |
| tests_stub.py | 47 assert res.authority[0] == dns.rrset.from_text(
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| sdb.h | 85 dns_sdbauthorityfunc_t authority; member in struct:dns_sdbmethods 119 * argument to 'lookup' and 'authority' is an opaque pointer to be passed to 129 * function 'authority' (if non-NULL), which must provide an SOA record 131 * these records. The 'authority' function may be NULL if invoking 151 * If flags includes DNS_SDBFLAG_RELATIVEOWNER, the lookup and authority 206 * This function may optionally be called from the 'authority' callback
|
| sdlz.h | 124 * supply an authority method. This method is called when the DNS 127 * function does not supply authority information for the dns 128 * record. A SDLZ driver does not have to implement an authority 195 * If this function supplies authority information for the DNS record 196 * the authority method is not required. If it does not, the 197 * authority function is required. 283 dns_sdlzauthorityfunc_t authority; member in struct:dns_sdlzmethods 342 * This function may optionally be called from the 'authority'
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 90-test_store.t | 295 # '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority' 301 '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority', 311 '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority', 315 '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority', 564 my ($file, $isdir, $authority) = @_; 604 return "file://$authority$file" if defined $authority; 615 my ($file, $isdir, $authority) = @_; 618 return to_file_uri(to_abs_file($file), $isdir, $authority);
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 90-test_store.t | 280 # '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority' 286 '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority', 296 '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority', 300 '/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority', 549 my ($file, $isdir, $authority) = @_; 589 return "file://$authority$file" if defined $authority; 600 my ($file, $isdir, $authority) = @_; 603 return to_file_uri(to_abs_file($file), $isdir, $authority);
|
| /src/external/mpl/bind/dist/bin/tests/system/cookie/ |
| cookie_ans.py | 108 qctx.response.authority.append(_spoofed_a(qctx)) 110 qctx.response.authority.append(_legit_a(qctx)) 188 qctx.response.authority.append(_soa(qctx))
|
| /src/crypto/external/bsd/openssh/dist/ |
| getrrsetbyname.c | 171 struct dns_rr *authority; member in struct:dns_response 443 /* parse authority section */ 444 resp->authority = parse_dns_rrsection(answer, size, &cp, 446 if (resp->header.nscount && resp->authority == NULL) { 606 free_dns_rr(p->authority);
|
| /src/external/mpl/bind/dist/bin/tests/system/qmin/ans2/ |
| ans.py | 71 response.authority.append(ns_rrset)
|
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| sdlz.h | 123 * supply an authority method. This method is called when the DNS 126 * function does not supply authority information for the dns 127 * record. A SDLZ driver does not have to implement an authority 194 * If this function supplies authority information for the DNS record 195 * the authority method is not required. If it does not, the 196 * authority function is required. 282 dns_sdlzauthorityfunc_t authority; member in struct:dns_sdlzmethods 341 * This function may optionally be called from the 'authority'
|
| /src/external/mpl/bind/dist/bin/tests/system/nsec3/ |
| common.py | 60 for rrset in response.authority: 66 assert len(rrs) != 0, "no NSEC records found in authority section" 73 for rrset in response.authority: 81 assert len(rrs) != 0, "no NSEC3 records found in authority section"
|
| /src/external/bsd/unbound/dist/testcode/ |
| dohclient.c | 68 const char* authority; member in struct:http2_session 193 headers[3].name = (uint8_t*)":authority"; 194 headers[3].value = (uint8_t*)h2_session->authority; 506 fd = open_svr(h2_session->authority, port); 591 h2_session->authority = "127.0.0.1"; 619 h2_session->authority = optarg;
|
| /src/external/mpl/bind/dist/bin/tests/system/chain/ans3/ |
| ans.py | 98 del qctx.response.authority[:]
|
| /src/external/mpl/bind/dist/bin/tests/system/resolver/ans10/ |
| ans.py | 70 r.authority.append(dns.rrset.from_text(qname, 1, IN, SOA, ". . 0 0 0 0 0"))
|
| /src/external/mpl/bind/dist/bin/tests/system/isctest/ |
| check.py | 132 section_equal(res1.authority, res2.authority)
|
| asyncserver.py | 1091 len(response.authority), 1240 qctx.response.authority.append(delegation_rrset) 1248 assert qctx.response.authority[0] 1250 for nameserver in qctx.response.authority[0]: 1251 if not nameserver.target.is_subdomain(qctx.response.authority[0].name): 1274 qctx.response.authority.append(qctx.soa) 1284 qctx.response.authority.append(qctx.soa) 1313 qctx.response.authority.append(qctx.soa)
|