/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/IN/ |
DHCID.py | 16 import dns.exception namespace 18 class DHCID(dns.rdata.Rdata): 22 DNS is concerned) 33 return dns.rdata._base64ify(self.data) 42 raise dns.exception.SyntaxError
|
APL.py | 19 import dns.exception namespace 20 import dns.inet namespace 21 import dns.rdata namespace 22 import dns.tokenizer namespace 53 address = dns.inet.inet_pton(dns.inet.AF_INET, self.address) 55 address = dns.inet.inet_pton(dns.inet.AF_INET6, self.address) 75 class APL(dns.rdata.Rdata): 122 raise dns.exception.FormErro [all...] |
SRV.py | 18 import dns.exception namespace 19 import dns.rdata namespace 20 import dns.name namespace 22 class SRV(dns.rdata.Rdata): 32 @type target: dns.name.Name object 70 (target, cused) = dns.name.from_wire(wire[: current + rdlen], 73 raise dns.exception.FormError
|
PX.py | 18 import dns.exception namespace 19 import dns.rdata namespace 20 import dns.name namespace 22 class PX(dns.rdata.Rdata): 28 @type map822: dns.name.Name object 30 @type mapx400: dns.name.Name object 67 (map822, cused) = dns.name.from_wire(wire[: current + rdlen], 70 raise dns.exception.FormError 75 (mapx400, cused) = dns.name.from_wire(wire[: current + rdlen], 78 raise dns.exception.FormErro [all...] |
WKS.py | 19 import dns.ipv4 namespace 20 import dns.rdata namespace 25 class WKS(dns.rdata.Rdata): 82 bitmap = dns.rdata._truncate_bitmap(bitmap) 88 file.write(dns.ipv4.inet_aton(self.address)) 94 address = dns.ipv4.inet_ntoa(wire[current : current + 4]) 104 sa = dns.ipv4.inet_aton(self.address) 105 oa = dns.ipv4.inet_aton(other.address)
|
NAPTR.py | 18 import dns.exception namespace 19 import dns.name namespace 20 import dns.rdata namespace 29 class NAPTR(dns.rdata.Rdata): 43 @type replacement: dns.name.Name object 63 dns.rdata._escapify(self.flags), 64 dns.rdata._escapify(self.service), 65 dns.rdata._escapify(self.regexp), 100 raise dns.exception.FormError 105 (replacement, cused) = dns.name.from_wire(wire[: current + rdlen] [all...] |
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/ |
node.py | 16 """DNS nodes. A node is a set of rdatasets.""" 20 import dns.rdataset namespace 21 import dns.rdatatype namespace 22 import dns.renderer namespace 25 """A DNS node. 30 @type rdatasets: list of dns.rdataset.Rdataset objects""" 35 """Initialize a DNS node. 46 @type name: dns.name.Name object 56 return '<DNS node ' + str(id(self)) + '>' 83 def find_rdataset(self, rdclass, rdtype, covers=dns.rdatatype.NONE [all...] |
renderer.py | 16 """Help for building DNS wire format messages""" 23 import dns.exception namespace 24 import dns.tsig namespace 32 """Helper class for building DNS wire-format messages. 34 Most applications can use the higher-level L{dns.message.Message} 41 r = dns.renderer.Renderer(id=1, flags=0x80, max_size=512) 43 r.add_rrset(dns.renderer.ANSWER, rrset_1) 44 r.add_rrset(dns.renderer.ANSWER, rrset_2) 45 r.add_rrset(dns.renderer.AUTHORITY, ns_rrset) 47 r.add_rrset(dns.renderer.ADDTIONAL, ad_rrset_1 [all...] |
ipv6.py | 20 import dns.exception namespace 21 import dns.ipv4 namespace 84 hex = prefix + dns.ipv4.inet_ntoa(address[12:]) 102 @raises dns.exception.SyntaxError: the text was not properly formatted 136 raise dns.exception.SyntaxError 142 raise dns.exception.SyntaxError 149 raise dns.exception.SyntaxError 154 raise dns.exception.SyntaxError 163 raise dns.exception.SyntaxError
|
ttl.py | 16 """DNS TTL conversion.""" 18 import dns.exception namespace 20 class BadTTL(dns.exception.SyntaxError): 30 @raises dns.ttl.BadTTL: the TTL is not well-formed
|
rdata.py | 16 """DNS rdata. 22 default is 'dns.rdtypes'. Changing this value will break the library. 30 import dns.exception namespace 31 import dns.rdataclass namespace 32 import dns.rdatatype namespace 33 import dns.tokenizer namespace 43 @param chunksize: the chunk size. Default is L{dns.rdata._hex_chunksize} 69 L{dns.rdata._base64_chunksize} 126 """Base class for all DNS rdata types. 143 """DNS SIG/RRSIG rdatas apply to a specific type; this type i [all...] |
/external/jmdns/src/javax/jmdns/impl/ |
DNSRecord.java | 28 * DNS record 77 abstract boolean handleQuery(JmDNSImpl dns, long expirationTime); 84 abstract boolean handleResponse(JmDNSImpl dns); 89 abstract DNSOutgoing addAnswer(JmDNSImpl dns, DNSIncoming in, InetAddress addr, int port, DNSOutgoing out) throws IOException; 330 boolean handleQuery(JmDNSImpl dns, long expirationTime) { 331 if (dns.getLocalHost().conflictWithRecord(this)) { 332 DNSRecord.Address localAddress = dns.getLocalHost().getDNSAddressRecord(this.getRecordType(), this.isUnique(), DNSConstants.DNS_TTL); 346 if (dns.isProbing() && comparison > 0) { 348 dns.getLocalHost().incrementHostName(); 349 dns.getCache().clear() [all...] |
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/ |
keybase.py | 18 import dns.exception namespace 19 import dns.dnssec namespace 20 import dns.rdata namespace 65 class KEYBase(dns.rdata.Rdata): 88 dns.rdata._base64ify(self.key)) 100 raise dns.exception.SyntaxError('unknown flag %s' % flag) 109 raise dns.exception.SyntaxError('unknown protocol %s' % protocol) 111 algorithm = dns.dnssec.algorithm_from_text(tok.get_string()) 118 raise dns.exception.SyntaxError 133 raise dns.exception.FormErro [all...] |
nsbase.py | 20 import dns.exception namespace 21 import dns.rdata namespace 22 import dns.name namespace 24 class NSBase(dns.rdata.Rdata): 28 @type target: dns.name.Name object""" 55 (target, cused) = dns.name.from_wire(wire[: current + rdlen], 58 raise dns.exception.FormError 73 is not compressed when convert to DNS wire format, and whose
|
sigbase.py | 20 import dns.dnssec namespace 21 import dns.exception namespace 22 import dns.rdata namespace 23 import dns.rdatatype namespace 25 class BadSigTime(dns.exception.DNSException): 44 class SIGBase(dns.rdata.Rdata): 62 @type signer: dns.name.Name object 89 dns.rdatatype.to_text(self.type_covered), 97 dns.rdata._base64ify(self.signature) 101 type_covered = dns.rdatatype.from_text(tok.get_string() [all...] |
dsbase.py | 18 import dns.rdata namespace 19 import dns.rdatatype namespace 21 class DSBase(dns.rdata.Rdata): 47 dns.rdata._hexify(self.digest, 60 raise dns.exception.SyntaxError
|
/system/connectivity/shill/mobile_operator_db/ |
serviceproviders.prototxt | 42 dns : "194.170.1.6" 43 dns : "194.170.1.7" 252 dns : "172.25.7.6" 253 dns : "172.25.7.7" 277 dns : "170.51.255.100" 278 dns : "170.51.242.18" 341 dns : "172.25.7.6" 342 dns : "172.25.7.7" 373 dns : "194.48.124.202" 374 dns : "194.48.124.200 [all...] |
/system/netd/tests/ |
netd_test.cpp | 226 std::vector<std::unique_ptr<test::DNSResponder>>* dns, 230 dns->resize(num_servers); 234 auto& d = (*dns)[i]; 247 void ShutdownDNSServers(std::vector<std::unique_ptr<test::DNSResponder>>* dns) const { 248 for (const auto& d : *dns) { 252 dns->clear(); 343 size_t GetNumQueries(const test::DNSResponder& dns, const char* name) const { 344 auto queries = dns.queries(); 354 size_t GetNumQueriesForType(const test::DNSResponder& dns, ns_type type, 356 auto queries = dns.queries() 369 std::vector<std::unique_ptr<test::DNSResponder>> dns; local 462 std::vector<std::unique_ptr<test::DNSResponder>> dns; local 810 std::vector<std::unique_ptr<test::DNSResponder>> dns; local [all...] |
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/rdtypes/ANY/ |
NSEC.py | 18 import dns.exception namespace 19 import dns.rdata namespace 20 import dns.rdatatype namespace 21 import dns.name namespace 23 class NSEC(dns.rdata.Rdata): 27 @type next: dns.name.Name object 47 bits.append(dns.rdatatype.to_text(window * 256 + \ 60 nrdtype = dns.rdatatype.from_text(token.value) 62 raise dns.exception.SyntaxError("NSEC with bit 0") 64 raise dns.exception.SyntaxError("NSEC with bit > 65535" [all...] |
RP.py | 16 import dns.exception namespace 17 import dns.rdata namespace 18 import dns.name namespace 20 class RP(dns.rdata.Rdata): 24 @type mbox: dns.name.Name object 27 @type txt: dns.name.Name object 61 (mbox, cused) = dns.name.from_wire(wire[: current + rdlen], 66 raise dns.exception.FormError 67 (txt, cused) = dns.name.from_wire(wire[: current + rdlen], 70 raise dns.exception.FormErro [all...] |
SSHFP.py | 18 import dns.rdata namespace 19 import dns.rdatatype namespace 21 class SSHFP(dns.rdata.Rdata): 30 @see: draft-ietf-secsh-dns-05.txt""" 44 dns.rdata._hexify(self.fingerprint,
|
NSEC3.py | 21 import dns.exception namespace 22 import dns.rdata namespace 23 import dns.rdatatype namespace 36 class NSEC3(dns.rdata.Rdata): 77 bits.append(dns.rdatatype.to_text(window * 256 + \ 99 nrdtype = dns.rdatatype.from_text(token.value) 101 raise dns.exception.SyntaxError("NSEC3 with bit 0") 103 raise dns.exception.SyntaxError("NSEC3 with bit > 65535") 160 raise dns.exception.FormError("NSEC3 too short") 164 raise dns.exception.FormError("bad NSEC3 octets" [all...] |
GPOS.py | 16 import dns.exception namespace 17 import dns.rdata namespace 18 import dns.tokenizer namespace 27 raise dns.exception.FormError 29 raise dns.exception.FormError 31 raise dns.exception.FormError 33 class GPOS(dns.rdata.Rdata): 101 raise dns.exception.FormError 109 raise dns.exception.FormError 117 raise dns.exception.FormErro [all...] |
/external/autotest/client/cros/cellular/ |
labconfig_write_stanzas | 32 self.dns = io.StringIO() 37 self.dns.write(u'%(address)s\t%(name)s\n' % d) 60 print f.dns.getvalue()
|
/external/autotest/client/cros/netprotos/ |
cros_p2p.py | 108 ts = self._zeroconf.send_request([(self._p2p_domain, dpkt.dns.DNS_PTR)]) 115 self._p2p_domain, dpkt.dns.DNS_PTR, ts) 118 queries.append((p2p_peer, dpkt.dns.DNS_ANY)) 121 p2p_peer, dpkt.dns.DNS_SRV, ts) 125 queries.append((srvname, dpkt.dns.DNS_ANY)) 140 if rrname == self._p2p_domain and rrtype == dpkt.dns.DNS_PTR: 142 queries.append((ptrname, dpkt.dns.DNS_ANY)) 157 self._p2p_domain, dpkt.dns.DNS_PTR, timestamp) 161 p2p_peer, dpkt.dns.DNS_SRV, timestamp) 166 srvname, dpkt.dns.DNS_A, timestamp [all...] |