/external/curl/docs/cmdline-opts/ |
dns-interface.d | 1 Long: dns-interface 3 Help: Interface to use for DNS requests 4 Protocols: DNS 5 See-also: dns-ipv4-addr dns-ipv6-addr 9 Tell curl to send outgoing DNS requests through <interface>. This option is a 10 counterpart to --interface (which does not affect DNS). The supplied string
|
dns-ipv4-addr.d | 1 Long: dns-ipv4-addr 3 Help: IPv4 address to use for DNS requests 4 Protocols: DNS 5 See-also: dns-interface dns-ipv6-addr 9 Tell curl to bind to <ip-address> when making IPv4 DNS requests, so that 10 the DNS requests originate from this address. The argument should be a
|
dns-ipv6-addr.d | 1 Long: dns-ipv6-addr 3 Help: IPv6 address to use for DNS requests 4 Protocols: DNS 5 See-also: dns-interface dns-ipv4-addr 9 Tell curl to bind to <ip-address> when making IPv6 DNS requests, so that 10 the DNS requests originate from this address. The argument should be a
|
dns-servers.d | 1 Long: dns-servers 3 Help: DNS server addrs to use 7 Set the list of DNS servers to be used instead of the system default.
|
doh-url.d | 6 Specifies which DNS-over-HTTPS (DOH) server to use to resolve hostnames,
|
/external/autotest/client/cros/netprotos/ |
zeroconf_unittest.py | 30 @return a list of dpkt.dns.DNS.RR objects, one for each matching record. 32 q = dpkt.dns.DNS.Q(name=name, type=dpkt.dns.DNS_A) 45 q_srv = dpkt.dns.DNS.Q(name=fq_name, type=dpkt.dns.DNS_SRV) 46 q_txt = dpkt.dns.DNS.Q(name=fq_name, type=dpkt.dns.DNS_TXT [all...] |
zeroconf.py | 29 """Returns whether the two dpkt.dns.DNS.RR objects are equal.""" 32 dpkt.dns.DNS.RR.__slots__) 34 # packed string depends on other RR and Q elements on the same DNS/mDNS 56 This class implements part of the Multicast DNS RFC 6762 able to simulate 81 # For example: _peer_records['somehost.local'][dpkt.dns.DNS_A] \ 136 # Parse the mDNS request using dpkt's DNS module. 137 mdns = dpkt.dns.DNS(data [all...] |
/external/mdnsresponder/mDNSShared/ |
dnsextd.conf | 6 // the "options" section below. The dnsextd daemon will receive DNS packets 10 // dynamic zone that will be accepting Wide-Area Bonjour DNS updates. 31 // you could choose to allow anyone with a DNS key on your server to
|
/external/chromium-libpac/test/js-unittest/ |
dns_fail.js | 1 // This script should be run in an environment where all DNS resolution are
|
/external/grpc-grpc-java/testing/src/main/resources/certs/ |
openssl.cnf | 355 DNS.1 = *.test.google.fr 356 DNS.2 = waterzooi.test.google.be 357 DNS.3 = *.test.youtube.com
|
/external/bcc/examples/lua/ |
sock-parse-dns.lua | 17 -- Simple parsing example of UDP/DNS that counts frequency of QTYPEs. 29 local udp = ip.udp -- Only messages >12 octets (DNS header)
|
/external/scapy/scapy/layers/ |
dns.py | 7 DNS: Domain Name System. 68 raise Scapy_Exception("DNS message can't be compressed at this point!") 104 warning("DNS RR prematured end (ofs=%i, len=%i)"%(p,len(s))) 112 warning("DNS incomplete jump token at (ofs=%i)" % p) 116 warning("DNS decompression loop detected") 166 warning("wrong value: DNS.%s=%i", self.countfld, c) 215 warning("DNS RR TXT prematured end of character-string (size=%i, remaining bytes=%i)" % (tmp_len, len(tmp_s))) 265 class DNS(Packet): 266 name = "DNS" 295 return (isinstance(other, DNS) [all...] |
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.microsoft | 42 ATTRIBUTE MS-Primary-DNS-Server 28 ipaddr Microsoft 43 ATTRIBUTE MS-Secondary-DNS-Server 29 ipaddr Microsoft
|
dictionary.ascend | 29 ATTRIBUTE Ascend-Client-Primary-DNS 135 ipaddr 30 ATTRIBUTE Ascend-Client-Secondary-DNS 136 ipaddr 31 ATTRIBUTE Ascend-Client-Assign-DNS 137 integer 284 VALUE Ascend-Client-Assign-DNS DNS-Assign-No 0 285 VALUE Ascend-Client-Assign-DNS DNS-Assign-Yes 1
|
/external/grpc-grpc/tools/internal_ci/helper_scripts/ |
prepare_build_windows.bat | 27 @rem Update DNS settings to: 30 netsh interface ip set dns "Local Area Connection 8" static 169.254.169.254 primary
|
/external/python/apitools/samples/dns_sample/dns_v1/ |
dns_v1_messages.py | 1 """Generated message classes for dns version v1. 3 The Google Cloud DNS API provides services for configuring and serving 4 authoritative DNS records. 11 package = 'dns' 27 "dns#change". 46 kind = _messages.StringField(4, default=u'dns#change') 70 kind = _messages.StringField(2, default=u'dns#changesListResponse') 236 """A zone is a subtree of the DNS namespace under one administrative 237 responsibility. A ManagedZone is a resource that represents a DNS zone 238 hosted by the Cloud DNS service [all...] |
/external/mdnsresponder/mDNSCore/ |
DNSCommon.h | 38 #pragma mark - DNS Protocol Constants 182 #pragma mark - DNS Message Creation Functions 227 #pragma mark - DNS Message Parsing Functions
|
/external/scapy/test/ |
pipetool.uts | 539 s.send(IP(src="127.0.0.1")/UDP()/DNS()) 540 s2.send(DNS()) 545 assert DNS in res[0] and res[0][UDP].sport == 1234
|
/external/curl/tests/ |
stunnel.pem | 11 subjectAltName = DNS:localhost 103 DNS:localhost
|
/external/u-boot/cmd/ |
net.c | 397 printf("dns error: hostname too long\n"); 408 if (net_loop(DNS) < 0) { 409 printf("dns lookup of %s failed, check setup\n", argv[1]); 417 dns, 3, 1, do_dns,
|
/external/syzkaller/vendor/cloud.google.com/go/compute/metadata/ |
metadata.go | 229 // Wait for either the DNS or metadata server probe to 248 // either a DNS lookup or an HTTP request to a blackholed IP
|
/external/u-boot/include/ |
net.h | 538 BOOTP, RARP, ARP, TFTPGET, DHCP, PING, DNS, NFS, CDP, NETCONS, SNTP,
|
/external/nanohttpd/ |
README.md | 241 keytool -genkey -keyalg RSA -alias selfsigned -keystore keystore.jks -storepass password -validity 360 -keysize 2048 -ext SAN=DNS:localhost,IP:127.0.0.1 -validity 9999
|
/external/nanohttpd/src/site/markdown/ |
index.md | 237 keytool -genkey -keyalg RSA -alias selfsigned -keystore keystore.jks -storepass password -validity 360 -keysize 2048 -ext SAN=DNS:localhost,IP:127.0.0.1 -validity 9999
|
/external/u-boot/net/ |
net.c | 108 #include "dns.h" 127 /* Our DNS IP address */ 130 /* Our 2nd DNS IP address */ 520 case DNS: 1331 case DNS: 1333 puts("*** ERROR: DNS server address not given\n"); [all...] |