/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | x509v3.h | 41 char *dns; /* dNSName */ member
|
/foundation/communication/netmanager_base/services/netconnmanager/src/ |
H A D | network.cpp | 46 constexpr const char *ERROR_MSG_UPDATE_NET_DNSES_FAILED = "Update netlink dns failed,dns list is empty"; 410 for (const auto &dns : netLinkInfo.dnsList_) { in UpdateDns() 411 servers.emplace_back(dns.address_); in UpdateDns() 412 domains.emplace_back(dns.hostName_); in UpdateDns() 413 ss << '[' << CommonUtils::ToAnonymousIp(dns.address_).c_str() << ']'; in UpdateDns() 415 NETMGR_LOG_I("update dns server: %{public}s", ss.str().c_str()); in UpdateDns() 416 // Call netsys to set dns, use default timeout and retry in UpdateDns()
|
/foundation/communication/netmanager_ext/test/netfirewallmanager/unittest/netfirewallmanager_test/ |
H A D | netfirewall_service_test.cpp | 126 rule->dns.primaryDns = "192.168.1.245";
in GetNetFirewallRuleSptr() 127 rule->dns.standbyDns = "192.168.1.1";
in GetNetFirewallRuleSptr() 175 rule->dns.primaryDns = "192.168.1.245";
in GetNetFirewallRuleSptrTypeDns() 176 rule->dns.standbyDns = "192.168.1.1";
in GetNetFirewallRuleSptrTypeDns()
|
H A D | netfirewall_client_test.cpp | 168 rule->dns.primaryDns = "192.168.1.245";
in GetNetFirewallRuleSptr() 169 rule->dns.standbyDns = "192.168.1.1";
in GetNetFirewallRuleSptr()
|
/third_party/nghttp2/integration-tests/ |
H A D | server_tester.go | 104 var backendTLS, dns, externalDNS, acceptProxyProtocol, redirectIfNotTLS, affinityCookie, alpnH1 bool 110 case "--dns": 111 dns = true 112 case "--external-dns": 113 dns = true 167 if dns { 168 b += ";dns"
|
/third_party/node/src/ |
H A D | cares_wrap.h | 249 TRACING_CATEGORY_NODE2(dns, native), trace_name_, this, in AresQuery() 267 TRACING_CATEGORY_NODE2(dns, native), trace_name_, this, in ParseError() 376 TRACING_CATEGORY_NODE2(dns, native), trace_name_, this); in CallOnComplete()
|
H A D | cares_wrap.cc | 1373 TRACING_CATEGORY_NODE2(dns, native), "reverse", wrap, in Send() 1496 TRACING_CATEGORY_NODE2(dns, native), "lookup", req_wrap.get(), in AfterGetAddrInfo() 1530 TRACING_CATEGORY_NODE2(dns, native), "lookupService", req_wrap.get(), in AfterGetNameInfo() 1597 TRACE_EVENT_NESTABLE_ASYNC_BEGIN2(TRACING_CATEGORY_NODE2(dns, native), in GetAddrInfo() 1634 TRACING_CATEGORY_NODE2(dns, native), "lookupService", req_wrap.get(), in GetNameInfo() 1836 TRACE_EVENT_INSTANT0(TRACING_CATEGORY_NODE2(dns, native), in Cancel()
|
/third_party/node/lib/ |
H A D | net.js | 134 let dns; 1318 if (dns === undefined) dns = require('dns'); 1328 dnsopts.hints = dns.ADDRCONFIG; 1332 debug('connect: dns options', dnsopts); 1334 const lookup = options.lookup || dns.lookup; 2008 if (dns === undefined) dns = require('dns'); [all...] |
/foundation/communication/netstack/frameworks/cj/http/include/ |
H A D | net_http_request_context.h | 166 void ParseDnsServers(CArrString dns);
|
/foundation/communication/netmanager_base/interfaces/kits/c/netconnclient/src/ |
H A D | net_connection_adapter.cpp | 185 for (const auto &dns : infoObj.dnsList_) { in Conv2NetLinkInfo() 190 ret = Conv2INetAddr(dns, &(prop->dnsList[i++])); in Conv2NetLinkInfo()
|
/foundation/communication/netmanager_ext/services/ethernetmanager/src/ |
H A D | dev_interface_state.cpp | 341 for (auto dns : config->dnsServers_) { in UpdateLinkInfo() 342 linkInfo_->dnsList_.push_back(dns); in UpdateLinkInfo()
|
/third_party/lwip/src/netif/ppp/ |
H A D | ipcp.c | 188 { "ms-dns", 1, (void *)setdnsaddr, 367 * setdnsaddr - set the dns address(es) 373 u32_t dns; local 376 dns = inet_addr(*argv); 377 if (dns == (u32_t) -1) { 379 option_error("invalid address parameter '%s' for ms-dns option", 383 dns = *(u32_t *)hp->h_addr; 390 ipcp_allowoptions[0].dnsaddr[0] = dns; 395 ipcp_allowoptions[0].dnsaddr[1] = dns; 1241 * If they want us to ask for ms-dns, w in ipcp_nakci() [all...] |
/third_party/nghttp2/src/ |
H A D | shrpx_config.cc | 961 bool dns; member 1094 } else if (util::strieq_l("dns", param)) { in parse_downstream_params() 1095 out.dns = true; in parse_downstream_params() 1196 if (addr.host_unix && params.dns) { in parse_mapping() 1197 LOG(ERROR) << "backend: dns: cannot be used for UNIX domain socket"; in parse_mapping() 1216 addr.dns = params.dns; in parse_mapping() 1970 if (util::strieq_l("dns-max-tr", name, 10)) { in option_lookup_token() 2173 if (util::strieq_l("dns-cache-timeou", name, 16)) { in option_lookup_token() 2200 if (util::strieq_l("dns in option_lookup_token() [all...] |
H A D | shrpx_worker.h | 142 bool dns; member
|
H A D | shrpx_dns_resolver.cc | 153 auto &dnsconf = get_config()->dns; in resolve()
|
H A D | shrpx_worker.cc | 122 std::get<11>(*p) = a.dns; in create_downstream_key() 319 dst_addr.dns = src_addr.dns; in replace_downstream_config()
|
H A D | shrpx_config.h | 322 StringRef::from_lit("dns-cache-timeout"); 324 StringRef::from_lit("dns-lookup-timeout"); 325 constexpr auto SHRPX_OPT_DNS_MAX_TRY = StringRef::from_lit("dns-max-try"); 526 // Resolved address if |dns| is false 556 bool dns; member 1093 dns{}, 1134 DNSConfig dns; member
|
H A D | shrpx.cc | 2179 auto &dnsconf = config->dns; in fill_default_config() 2308 "affinity=<METHOD>", "dns", "redirect-if-not-tls", in print_help() 2394 at start up, or reloading configuration. If "dns" in print_help() 2397 frequently. If "dns" is given, name resolution of in print_help() 3401 --dns-cache-timeout=<DURATION> in print_help() 3405 << util::duration_str(config->dns.timeout.cache) << R"( in print_help() 3406 --dns-lookup-timeout=<DURATION> in print_help() 3412 << util::duration_str(config->dns.timeout.lookup) << R"( in print_help() 3413 --dns-max-try=<N> in print_help() 3417 << config->dns in print_help() [all...] |
/foundation/communication/netmanager_base/test/netconnmanager/unittest/net_conn_add_test/ |
H A D | netfirewall_client_test.cpp | 168 rule->dns.primaryDns = "192.168.1.245"; in GetNetFirewallRuleSptr() 169 rule->dns.standbyDns = "192.168.1.1"; in GetNetFirewallRuleSptr()
|
/foundation/communication/netmanager_base/test/netconnmanager/unittest/net_conn_multi_test/ |
H A D | native_net_conn_test.cpp | 114 sptr<INetAddr> dns = GetINetAddrSample(); in GetNetLinkInfoSample() local 115 netLinkInfo->dnsList_.push_back(*dns); in GetNetLinkInfoSample()
|
/third_party/curl/lib/ |
H A D | setopt.c | 2265 if(data->dns.hostcachetype == HCACHE_SHARED) { in Curl_vsetopt() 2266 data->dns.hostcache = NULL; in Curl_vsetopt() 2267 data->dns.hostcachetype = HCACHE_NONE; in Curl_vsetopt() 2305 data->dns.hostcache = &data->share->hostcache; in Curl_vsetopt() 2306 data->dns.hostcachetype = HCACHE_SHARED; in Curl_vsetopt()
|
H A D | conncache.c | 548 connc->closure_handle->dns.hostcache); in Curl_conncache_close_all_connections()
|
/foundation/communication/netmanager_base/interfaces/innerkits/netmanagernative/include/ |
H A D | netfirewall_parcel.h | 61 const std::string NET_FIREWALL_DNS = "dns";
228 NetFirewallDnsParam dns; // DNS, optional
member
|
/third_party/lwip/src/ |
H A D | Filelists.mk | 35 $(LWIPDIR)/core/dns.c \
|
/third_party/rust/crates/rust-openssl/openssl/src/x509/ |
H A D | tests.rs | 338 .dns("example.com") in x509_builder() 394 .dns("example.com,DNS:example2.com") in x509_extension_to_der() 451 .dns("example.com") in x509_req_builder()
|