| /src/external/mpl/bind/dist/bin/tests/system/resolver/ans2/ |
| ans.pl | 59 my $qname = $questions[0]->qname; 62 if ($qname eq "com" && $qtype eq "NS") { 65 } elsif ($qname eq "example.com" && $qtype eq "NS") { 68 } elsif ($qname eq "cname1.example.com") { 72 } elsif ($qname eq "cname2.example.com") { 76 } elsif ($qname =~ /redirect\.com/) { 79 } elsif ($qname =~ /\.tld1/) { 82 } elsif ($qname =~ /\.tld2/) { 85 } elsif ($qname eq "org" && $qtype eq "NS") [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/resolver/ans3/ |
| ans.pl | 67 my $qname = $questions[0]->qname; 70 if ($qname eq "example.net" && $qtype eq "NS") { 71 $packet->push("answer", new Net::DNS::RR($qname . " 300 NS ns.example.net")); 73 } elsif ($qname eq "ns.example.net") { 74 $packet->push("answer", new Net::DNS::RR($qname . " 300 A 10.53.0.3")); 75 } elsif ($qname eq "nodata.example.net") { 77 } elsif ($qname eq "noresponse.example.net") { 81 } elsif ($qname eq "nxdomain.example.net") { 84 } elsif ($qname eq "www.example.net") [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/reclimit/ans4/ |
| ans.pl | 62 my ($qname, $qclass, $qtype) = @_; 65 print ("request: $qname/$qtype\n"); 71 if ($qname eq "count" ) { 74 my $rr = new Net::DNS::RR("$qname $ttl $qclass $qtype $rdata"); 79 } elsif ($qname eq "reset" ) { 85 } elsif ($qname eq "direct.example.org" ) { 88 my $rr = new Net::DNS::RR("$qname $ttl $qclass $qtype $rdata"); 90 print ("\twait=$wait ans: $qname $ttl $qclass $qtype $rdata\n"); 93 } elsif ($qname eq "indirect1.example.org" || 94 $qname eq "indirect2.example.org" | [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/include-multiplecfg/ |
| tests_include_multiplecfg.py | 21 "qname", 28 def test_include_multiplecfg(qname): 29 msg = isctest.query.create(qname, "A") 34 assert res.answer[0] == dns.rrset.from_text(qname, 86400, "IN", "A", "10.53.0.1")
|
| /src/external/mpl/bind/dist/bin/tests/system/reclimit/ans2/ |
| ans.pl | 62 my ($qname, $qclass, $qtype) = @_; 65 print ("request: $qname/$qtype\n"); 71 if ($qname eq "count" ) { 74 my $rr = new Net::DNS::RR("$qname $ttl $qclass $qtype $rdata"); 79 } elsif ($qname eq "reset" ) { 85 } elsif ($qname eq "direct.example.org" ) { 88 my $rr = new Net::DNS::RR("$qname $ttl $qclass $qtype $rdata"); 92 } elsif ($qname eq "indirect1.example.org" || 93 $qname eq "indirect2.example.org" || 94 $qname eq "indirect3.example.org" | [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/ttl/ |
| tests_cache_ttl.py | 18 "qname,rdtype,expected_ttl", 26 def test_cache_ttl(qname, rdtype, expected_ttl): 27 msg = isctest.query.create(qname, rdtype)
|
| /src/external/mpl/bind/dist/bin/tests/system/nsec3-answer/ |
| tests_nsec3.py | 61 qname: dns.name.Name, qtype: dns.rdatatype.RdataType, server: str, named_port: int 63 query = dns.message.make_query(qname, qtype, use_edns=True, want_dnssec=True) 74 qname=sampled_from( variable 78 def test_nodata(server: str, qname: dns.name.Name, named_port: int) -> None: 80 _, nsec3check = do_test_query(qname, dns.rdatatype.HINFO, server, named_port) 81 check_nodata(qname, nsec3check) 86 qname=dns_names( 90 def test_nodata_ds(server: str, qname: dns.name.Name, named_port: int) -> None: 92 response, nsec3check = do_test_query(qname, dns.rdatatype.HINFO, server, named_port) 101 # DS RR does not exist so we must prove it by having NSEC3 with QNAME [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/reclimit/ans7/ |
| ans.pl | 42 my ($qname, $qclass, $qtype, $peerhost, $query, $conn) = @_; 45 print ("request: $qname/$qtype\n"); 50 if ($qname eq "count" ) { 53 my $rr = new Net::DNS::RR("$qname $ttl $qclass $qtype $rdata"); 58 } elsif ($qname eq "reset") {
|
| /src/external/bsd/unbound/dist/validator/ |
| val_nsec.h | 109 * must still be provided proof that qname did not directly exist and that 117 * nextcloser of qname. 125 * qname. 128 * @param qname: what was queried. 132 uint8_t* qname); 148 * @param qname: the name queried for. 152 uint8_t* nsec_closest_encloser(uint8_t* qname, 159 * @param qname: the name queried for. 160 * @param qnamelen: length of qname. 163 int val_nsec_proves_no_wc(struct ub_packed_rrset_key* nsec, uint8_t* qname, [all...] |
| val_nsec.c | 209 rep, qinfo->qname, qinfo->qname_len, LDNS_RR_TYPE_NSEC, 246 /* Otherwise, there is no NSEC at qname. This could be an ENT. 270 if(val_nsec_proves_name_error(rep->rrsets[i], qinfo->qname)) { 271 ce = nsec_closest_encloser(qinfo->qname, 302 if(query_dname_compare(nsec->rk.dname, qinfo->qname) != 0) { 310 /* If the nsec is proving that qname is an ENT, the nsec owner 311 * will be less than qname, and the next name will be a child 312 * domain of the qname. */ 315 if(dname_strict_subdomain_c(nm, qinfo->qname) && 317 qinfo->qname) < 0) [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/serve-stale/ans2/ |
| ans.pl | 79 my ($qname, $qclass, $qtype) = @_; 82 print ("request: $qname/$qtype\n"); 87 if ($qname eq "enable" ) { 90 my $rr = new Net::DNS::RR("$qname 0 $qclass TXT \"$send_response\""); 95 } elsif ($qname eq "disable" ) { 98 my $rr = new Net::DNS::RR("$qname 0 $qclass TXT \"$send_response\""); 103 } elsif ($qname eq "slowdown" ) { 107 my $rr = new Net::DNS::RR("$qname 0 $qclass TXT \"$send_response\""); 117 if (index($qname, "latency") == 0) { 124 if ($qname eq "ns.example" ) [all...] |
| /src/external/ibm-public/postfix/dist/src/dns/ |
| dns_sec.c | 84 char *qname; local 116 if ((qname = split_at(saved_dnssec_probe, ':')) == 0 || *qname == 0 118 msg_fatal("malformed %s value: %s format is qtype:qname", 122 dns_status = dns_lookup(qname, qtype, rflags, &rrlist, (VSTRING *) 0, why);
|
| /src/external/mpl/bind/dist/bin/tests/system/filters/ |
| common.py | 28 def check_filtertype_only(dest, source, qname, ftype, expected, adflag): 29 qname = dns.name.from_text(qname) 31 msg = isctest.query.create(qname, ftype) 39 a_record = res.get_rrset(res.answer, qname, rdataclass.IN, rdatatype.A) 40 aaaa_record = res.get_rrset(res.answer, qname, rdataclass.IN, rdatatype.AAAA) 55 def check_any(dest, source, qname, expected4, expected6, do): 56 qname = dns.name.from_text(qname) 57 msg = isctest.query.create(qname, "any", dnssec=do [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/digdelv/ans5/ |
| ans.pl | 25 # based on the QNAME found in the incoming query. 81 my ($response_type, $qname) = @_; 87 Net::DNS::RR->new("$qname 300 IN SOA . . 0 0 0 0 300"), 88 Net::DNS::RR->new("$qname NS ."), 92 Net::DNS::RR->new("$qname 300 IN SOA . . 0 0 0 0 300"), 93 Net::DNS::RR->new("$qname NS ."), 94 Net::DNS::RR->new("$qname 300 IN SOA . . 0 0 0 0 300"), 119 my $qname = $questions[0]->qname; 124 my $packet = new Net::DNS::Packet($qname, $qtype, $qclass) [all...] |
| /src/usr.sbin/altq/altqstat/ |
| qdisc_conf.c | 75 ifname2qdisc(const char *ifname, char *qname) 82 if (qname != NULL) 83 strlcpy(qname, "cdnr", 64); 99 if (qname != NULL) { 105 strlcpy(qname, st->qdisc_name, 64);
|
| /src/external/mpl/bind/dist/bin/tests/system/resolver/ans8/ |
| ans.pl | 61 my $qname = $questions[0]->qname; 66 my $response = new Net::DNS::Packet($qname, $qtype, $qclass); 74 if ($qname eq "no-questions" && $qtype eq "NS") { 75 $response->push("answer", new Net::DNS::RR($qname . " 300 NS ns.no-questions")); 78 } elsif ($qname eq "ns.no-questions") { 79 $response->push("answer", new Net::DNS::RR($qname . " 300 A 10.53.0.8")) 82 } elsif ($qname =~ /\.formerr-to-all$/) { 90 if ($qname eq "truncated.no-questions") { 93 } elsif ($qname eq "tcpalso.no-questions") [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/resolver/ans10/ |
| ans.py | 30 def logquery(type, qname): 32 f.write("%s %s\n", type, qname) 46 qname = m.question[0].name.to_text() 51 f.write("%s %s\n" % (typename, qname)) 52 print("%s %s" % (typename, qname), end=" ") 64 r.answer.append(dns.rrset.from_text(qname, 1, IN, A, "10.53.0.10")) 66 r.answer.append(dns.rrset.from_text(qname, 1, IN, NS, ".")) 68 r.answer.append(dns.rrset.from_text(qname, 1, IN, SOA, ". . 0 0 0 0 0")) 70 r.authority.append(dns.rrset.from_text(qname, 1, IN, SOA, ". . 0 0 0 0 0"))
|
| /src/external/mpl/bind/dist/bin/tests/system/bailiwick/ns4/ |
| named.conf.j2 | 24 qname-minimization off;
|
| /src/external/mpl/bind/dist/lib/dns/include/dns/ |
| dnsrps.h | 44 * the qname or the node with the SOA for the zone containing the rewritten 58 const dns_name_t *qname; member in struct:dns_rpsdb 110 dns_rpz_zones_t *rpzs, const dns_name_t *qname,
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| dnsrps.h | 45 * the qname or the node with the SOA for the zone containing the rewritten 58 const dns_name_t *qname; member in struct:rpsdb 110 dns_rpz_zones_t *rpzs, const dns_name_t *qname,
|
| /src/external/bsd/unbound/dist/edns-subnet/ |
| subnet-whitelist.h | 95 * @param qname: dname in query 101 struct sockaddr_storage* addr, socklen_t addrlen, uint8_t* qname,
|
| /src/external/mpl/bind/dist/bin/tests/system/forward/ans6/ |
| ans.py | 36 copied from the QNAME sent by the client: 49 if qctx.qname == ns1_sld_tld and qctx.qtype == dns.rdatatype.A: 53 elif qctx.qname == ns1_sld_tld and qctx.qtype == dns.rdatatype.AAAA: 57 elif qctx.qname.is_subdomain(sld_tld) and qctx.qtype == dns.rdatatype.NS: 69 qctx.qname, 300, qctx.qclass, response_type, response_rdata
|
| /src/external/mpl/bind/dist/bin/tests/system/digdelv/ans7/ |
| ans.pl | 60 my $qname = $questions[0]->qname; 62 $packet->push("update", rr_del("$qname SOA"));
|
| /src/external/bsd/unbound/dist/services/cache/ |
| dns.h | 132 * @param qname: query name. 133 * @param qnamelen: length of qname. 149 uint8_t* qname, size_t qnamelen, uint16_t qtype, uint16_t qclass, 157 * @param q: query info, contains qname that will make up the dns message. 158 * @param r: reply info that, together with qname, will make up the dns message. 182 * @param qname: query name. 183 * @param qnamelen: length of qname. 198 uint8_t* qname, size_t qnamelen, uint16_t qtype, uint16_t qclass, 217 * @param qname: query section name 218 * @param qnamelen: len of qname [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/bailiwick/ans2/ |
| ans.py | 34 qname = "trigger.victim." variable in class:UnsolicitedNsSpoofer 42 qctx.qname, 60 qname = "trigger.victim." variable in class:ParentGlueSpoofer 82 qname = "trigger.victim." variable in class:DnameSpoofer 90 qctx.qname,
|