/external/avahi/tests/ |
fuzz-mdns.py | 6 sendp(Ether(type=0x800, dst="ff:ff:ff:ff:ff:ff")/IP(dst="224.0.0.251")/fuzz(UDP(dport = 5353, sport = 5353)/DNS(qd = fuzz(DNSQR()))),loop=1, iface="realtek0")
|
/external/dnsmasq/contrib/Suse/ |
dnsmasq-suse.spec | 11 Group: Productivity/Networking/DNS/Servers 24 Dnsmasq is lightweight, easy to configure DNS forwarder and DHCP server. It 25 is designed to provide DNS and, optionally, DHCP, to a small network. It can 26 serve the names of local machines which are not in the global DNS. The DHCP 27 server integrates with the DNS server and allows machines with DHCP-allocated 28 addresses to appear in the DNS with names configured either in each host or
|
/external/autotest/client/cros/netprotos/ |
zeroconf_unittest.py | 30 @return a list of dpkt.dns.DNS.RR objects, one for each matching record. 32 q = dpkt.dns.DNS.Q(name=name, type=dpkt.dns.DNS_A) 45 q_srv = dpkt.dns.DNS.Q(name=fq_name, type=dpkt.dns.DNS_SRV) 46 q_txt = dpkt.dns.DNS.Q(name=fq_name, type=dpkt.dns.DNS_TXT [all...] |
zeroconf.py | 29 """Returns whether the two dpkt.dns.DNS.RR objects are equal.""" 32 dpkt.dns.DNS.RR.__slots__) 34 # packed string depends on other RR and Q elements on the same DNS/mDNS 56 This class implements part of the Multicast DNS RFC 6762 able to simulate 81 # For example: _peer_records['somehost.local'][dpkt.dns.DNS_A] \ 136 # Parse the mDNS request using dpkt's DNS module. 137 mdns = dpkt.dns.DNS(data [all...] |
/external/mdnsresponder/mDNSShared/ |
dnsextd.conf | 6 // the "options" section below. The dnsextd daemon will receive DNS packets 10 // dynamic zone that will be accepting Wide-Area Bonjour DNS updates. 31 // you could choose to allow anyone with a DNS key on your server to
|
/external/chromium-libpac/test/js-unittest/ |
dns_fail.js | 1 // This script should be run in an environment where all DNS resolution are
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/addlhelp/ |
naming.py | 28 Bucket names must conform to standard DNS naming conventions. This is 29 because a bucket name can appear in a DNS record as part of a CNAME 30 redirect. In addition to meeting DNS naming requirements, Google Cloud 48 - For DNS compliance, you should not have a period adjacent to another 86 - If the name is a syntactically valid DNS name ending with a 103 3. Adding a DNS TXT record to a domain's DNS configuration. 106 are probably adequate for most situations. DNS TXT record verification is 109 a site creates a DNS TXT record to verify ownership of a domain, it takes 112 "example.com." If they complete the DNS TXT record verification, only the [all...] |
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.microsoft | 42 ATTRIBUTE MS-Primary-DNS-Server 28 ipaddr Microsoft 43 ATTRIBUTE MS-Secondary-DNS-Server 29 ipaddr Microsoft
|
dictionary.ascend | 29 ATTRIBUTE Ascend-Client-Primary-DNS 135 ipaddr 30 ATTRIBUTE Ascend-Client-Secondary-DNS 136 ipaddr 31 ATTRIBUTE Ascend-Client-Assign-DNS 137 integer 284 VALUE Ascend-Client-Assign-DNS DNS-Assign-No 0 285 VALUE Ascend-Client-Assign-DNS DNS-Assign-Yes 1
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpcsvc/ |
nis_object.x | 106 DNS = 4, /* Domain Name Service */ 151 nstype do_type; /* one of NIS, DNS, IVY, YP, or X.500 */
|
nis.h | 113 DNS = 4,
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpcsvc/ |
nis_object.x | 132 DNS = 4, /* Domain Name Service */ 177 nstype do_type; /* one of NIS, DNS, IVY, YP, or X.500 */
|
nis.h | 114 DNS = 4,
|
/external/mdnsresponder/mDNSCore/ |
DNSCommon.h | 38 #pragma mark - DNS Protocol Constants 182 #pragma mark - DNS Message Creation Functions 227 #pragma mark - DNS Message Parsing Functions
|
mDNSEmbeddedAPI.h | 18 If you're building an application that uses DNS Service Discovery 39 independent client processes communicate their DNS Service Discovery 126 #pragma mark - DNS Resource Record class and type constants 135 kDNSClass_NONE = 254, // Used in DNS UPDATE [RFC 2136] 137 kDNSClass_Mask = 0x7FFF,// Multicast DNS uses the bottom 15 bits to identify the record class... 140 kDNSQClass_ANY = 255, // Not a DNS class, but a DNS query class, meaning "all classes" 212 kDNSQType_ANY // Not a DNS type, but a DNS query type, meaning "all types" 379 // The longest legal textual form of a DNS name is 1009 bytes, including the C-string terminating NULL at the end [all...] |
/external/curl/tests/ |
stunnel.pem | 11 subjectAltName = DNS:localhost 88 DNS:localhost
|
/external/netperf/src/ |
netperf.c | 94 /* The DNS tests have been removed from netperf2. Those wanting to do 98 #error DNS tests have been removed from netperf. Use netperf4 instead 263 "DNS tests can now be found in netperf4.\n");
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
tmschema.h | 868 TM_STATE(1,DNS,NORMAL) 869 TM_STATE(2,DNS,HOT) 870 TM_STATE(3,DNS,PRESSED) 871 TM_STATE(4,DNS,DISABLED)
|
/system/extras/tests/net_test/ |
net_test.py | 74 UDP_PAYLOAD = str(scapy.DNS(rd=1,
|
/external/nanohttpd/ |
README.md | 241 keytool -genkey -keyalg RSA -alias selfsigned -keystore keystore.jks -storepass password -validity 360 -keysize 2048 -ext SAN=DNS:localhost,IP:127.0.0.1 -validity 9999
|
/external/nanohttpd/src/site/markdown/ |
index.md | 237 keytool -genkey -keyalg RSA -alias selfsigned -keystore keystore.jks -storepass password -validity 360 -keysize 2048 -ext SAN=DNS:localhost,IP:127.0.0.1 -validity 9999
|
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/ |
replay.py | 96 """Forward DNS traffic.""" 235 shaping_key: one of 'dummynet', 'dns', 'http'. 245 if ((self.shaping_type == 'proxy' and shaping_key in ('dns', 'http')) or 273 self.shaping_dns = self._ShapingKeywordArgs('dns') 333 # compute the ip/host used for the DNS server and traffic shaping 446 'This only changes the primary DNS nameserver to use the given IP.') 449 help='Run replay DNS & http proxies, and trafficshaping on --port ' 450 'without changing the primary DNS nameserver. ' 452 'or by pointing their DNS to this server.') 482 help='Don\'t forward DNS requests that resolve to private network [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/rds2/ |
layer1.py | 629 with a publicly resolvable DNS name, which resolves to a public IP 630 address. A value of false specifies an internal instance with a DNS 783 with a publicly resolvable DNS name, which resolves to a public I [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/ |
libhttplib2.tex | 200 the DNS server on the proxy should be used. The \var{proxy_user} and
|
/bionic/libc/ |
Android.mk | 774 # libc_dns.a - modified NetBSD DNS code 780 $(call all-c-files-under,dns) \ 796 $(LOCAL_PATH)/dns/include \ [all...] |