HomeSort by: relevance | last modified time | path
    Searched refs:authority (Results 1 - 13 of 13) sorted by relevancy

  /src/external/bsd/unbound/dist/testcode/
dohclient.c 68 const char* authority; member in struct:http2_session
193 headers[3].name = (uint8_t*)":authority";
194 headers[3].value = (uint8_t*)h2_session->authority;
506 fd = open_svr(h2_session->authority, port);
591 h2_session->authority = "127.0.0.1";
619 h2_session->authority = optarg;
  /src/external/bsd/libpcap/dist/
pcap.c 1789 char *authority; local
1807 * hier-part = "//" authority path-abempty
1812 * authority = [ userinfo "@" ] host [ ":" port ]
1840 * hier-part = "//" authority path-abempty, not
1925 * OK, now start parsing the authority.
1930 authority = get_substring(colonp + 3, authority_len, ebuf);
1931 if (authority == NULL) {
1941 * Now carve the authority field into its components.
1943 parsep = authority;
1961 free(authority);
    [all...]
  /src/external/bsd/nsd/dist/doc/
differences.tex 242 \subsubsection{b-soattl - BIND sets SOA TTL in authority section to 0 for SOA queries}
251 ;; flags: rd ; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
263 ;; flags: qr aa rd ; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
269 ;; AUTHORITY SECTION:
287 ;; flags: qr aa rd ; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
293 ;; AUTHORITY SECTION:
326 ;; flags: ; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
337 ;; flags: qr aa ; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
343 ;; AUTHORITY SECTION:
360 ;; flags: qr ; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL:
    [all...]
  /src/external/bsd/unbound/dist/pythonmod/
interface.i 1317 PyObject* question, PyObject* answer, PyObject* authority, PyObject* additional)
1330 if ((!checkList(question)) || (!checkList(answer)) || (!checkList(authority)) || (!checkList(additional)))
1366 if(res && !pushRRList(qb, authority, default_ttl, 0, LDNS_NSCOUNT_OFF))
1380 PyObject* question, PyObject* answer, PyObject* authority, PyObject* additional);
1393 self.authority = []
1400 self.question, self.answer, self.authority, self.additional)
  /src/external/bsd/libevent/dist/
evdns.c 293 int n_authority; /* how many authority RRs have been set? */
297 struct server_reply_item *authority; /* linked list of authority RRs */ member in struct:server_request
1045 u16 trans_id, questions, answers, authority, additional, datalength; local
1058 GET16(authority);
1060 (void) authority; /* suppress "unused variable" warnings. */
1193 for (i = 0; i < authority; ++i) {
1244 u16 trans_id, flags, questions, answers, authority, additional; local
1254 GET16(authority);
1258 (void)authority;
    [all...]
http.c 4818 /* 2. Optionally, "//" then an 'authority' part. */
4820 char *authority; local
4822 authority = readp;
4824 if (parse_authority(uri, authority, path) < 0)
4855 /* If you didn't get an authority, the path can't begin with "//" */
4858 /* If you did get an authority, the path must begin with "/" or be
  /src/external/bsd/ntp/dist/sntp/libevent/
evdns.c 291 int n_authority; /* how many authority RRs have been set? */
295 struct server_reply_item *authority; /* linked list of authority RRs */ member in struct:server_request
1043 u16 trans_id, questions, answers, authority, additional, datalength; local
1056 GET16(authority);
1058 (void) authority; /* suppress "unused variable" warnings. */
1191 for (i = 0; i < authority; ++i) {
1242 u16 trans_id, flags, questions, answers, authority, additional; local
1252 GET16(authority);
1256 (void)authority;
    [all...]
http.c 4816 /* 2. Optionally, "//" then an 'authority' part. */
4818 char *authority; local
4820 authority = readp;
4822 if (parse_authority(uri, authority, path) < 0)
4853 /* If you didn't get an authority, the path can't begin with "//" */
4856 /* If you did get an authority, the path must begin with "/" or be
  /src/external/apache2/mDNSResponder/dist/ServiceRegistration/
fromwire.c 700 FREE(nscount, authority);
757 PARSE(nscount, authority, "authority", true);
dns-msg.h 189 dns_rr_t *NULLABLE authority; member in struct:dns_message
273 #define dns_rrtype_soa 6 // [RFC1035] marks the start of a zone of authority
302 #define dns_rrtype_naptr 35 // [RFC2915] [RFC2168] [RFC3403] Naming Authority Pointer
351 #define dns_rrtype_caa 257 // Certification Authority Restriction [RFC6844]
wireutils.c 735 case 2: count = message->nscount; rrs = message->authority; break;
srp-parse.c 346 // Scan over the authority RRs; do the delete consistency check. We can't do other consistency checks
350 dns_rr_t *rr = &message->authority[i];
372 // We can't have more keys than there are authority records left, plus
dnssd-proxy.c 2219 // with authority records.
2340 SECTION_CASE(2, nscount, authority);
3261 // our authority records, rather than waiting for the query to time out.

Completed in 76 milliseconds