| /src/external/bsd/unbound/dist/testcode/ |
| dohclient.c | 68 const char* authority; member in struct:http2_session 193 headers[3].name = (uint8_t*)":authority"; 194 headers[3].value = (uint8_t*)h2_session->authority; 506 fd = open_svr(h2_session->authority, port); 591 h2_session->authority = "127.0.0.1"; 619 h2_session->authority = optarg;
|
| /src/external/bsd/libpcap/dist/ |
| pcap.c | 1789 char *authority; local 1807 * hier-part = "//" authority path-abempty 1812 * authority = [ userinfo "@" ] host [ ":" port ] 1840 * hier-part = "//" authority path-abempty, not 1925 * OK, now start parsing the authority. 1930 authority = get_substring(colonp + 3, authority_len, ebuf); 1931 if (authority == NULL) { 1941 * Now carve the authority field into its components. 1943 parsep = authority; 1961 free(authority); [all...] |
| /src/external/bsd/nsd/dist/doc/ |
| differences.tex | 242 \subsubsection{b-soattl - BIND sets SOA TTL in authority section to 0 for SOA queries} 251 ;; flags: rd ; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0 263 ;; flags: qr aa rd ; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0 269 ;; AUTHORITY SECTION: 287 ;; flags: qr aa rd ; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0 293 ;; AUTHORITY SECTION: 326 ;; flags: ; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0 337 ;; flags: qr aa ; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0 343 ;; AUTHORITY SECTION: 360 ;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: [all...] |
| /src/external/bsd/unbound/dist/pythonmod/ |
| interface.i | 1317 PyObject* question, PyObject* answer, PyObject* authority, PyObject* additional) 1330 if ((!checkList(question)) || (!checkList(answer)) || (!checkList(authority)) || (!checkList(additional))) 1366 if(res && !pushRRList(qb, authority, default_ttl, 0, LDNS_NSCOUNT_OFF)) 1380 PyObject* question, PyObject* answer, PyObject* authority, PyObject* additional); 1393 self.authority = [] 1400 self.question, self.answer, self.authority, self.additional)
|
| /src/external/bsd/libevent/dist/ |
| evdns.c | 293 int n_authority; /* how many authority RRs have been set? */ 297 struct server_reply_item *authority; /* linked list of authority RRs */ member in struct:server_request 1045 u16 trans_id, questions, answers, authority, additional, datalength; local 1058 GET16(authority); 1060 (void) authority; /* suppress "unused variable" warnings. */ 1193 for (i = 0; i < authority; ++i) { 1244 u16 trans_id, flags, questions, answers, authority, additional; local 1254 GET16(authority); 1258 (void)authority; [all...] |
| http.c | 4818 /* 2. Optionally, "//" then an 'authority' part. */ 4820 char *authority; local 4822 authority = readp; 4824 if (parse_authority(uri, authority, path) < 0) 4855 /* If you didn't get an authority, the path can't begin with "//" */ 4858 /* If you did get an authority, the path must begin with "/" or be
|
| /src/external/bsd/ntp/dist/sntp/libevent/ |
| evdns.c | 291 int n_authority; /* how many authority RRs have been set? */ 295 struct server_reply_item *authority; /* linked list of authority RRs */ member in struct:server_request 1043 u16 trans_id, questions, answers, authority, additional, datalength; local 1056 GET16(authority); 1058 (void) authority; /* suppress "unused variable" warnings. */ 1191 for (i = 0; i < authority; ++i) { 1242 u16 trans_id, flags, questions, answers, authority, additional; local 1252 GET16(authority); 1256 (void)authority; [all...] |
| http.c | 4816 /* 2. Optionally, "//" then an 'authority' part. */ 4818 char *authority; local 4820 authority = readp; 4822 if (parse_authority(uri, authority, path) < 0) 4853 /* If you didn't get an authority, the path can't begin with "//" */ 4856 /* If you did get an authority, the path must begin with "/" or be
|
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| fromwire.c | 700 FREE(nscount, authority); 757 PARSE(nscount, authority, "authority", true);
|
| dns-msg.h | 189 dns_rr_t *NULLABLE authority; member in struct:dns_message 273 #define dns_rrtype_soa 6 // [RFC1035] marks the start of a zone of authority 302 #define dns_rrtype_naptr 35 // [RFC2915] [RFC2168] [RFC3403] Naming Authority Pointer 351 #define dns_rrtype_caa 257 // Certification Authority Restriction [RFC6844]
|
| wireutils.c | 735 case 2: count = message->nscount; rrs = message->authority; break;
|
| srp-parse.c | 346 // Scan over the authority RRs; do the delete consistency check. We can't do other consistency checks 350 dns_rr_t *rr = &message->authority[i]; 372 // We can't have more keys than there are authority records left, plus
|
| dnssd-proxy.c | 2219 // with authority records. 2340 SECTION_CASE(2, nscount, authority); 3261 // our authority records, rather than waiting for the query to time out.
|