Home
last modified time | relevance | path

Searched refs:dns (Results 76 - 100 of 109) sorted by relevance

12345

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dx509v3.h41 char *dns; /* dNSName */ member
/foundation/communication/netmanager_base/services/netconnmanager/src/
H A Dnetwork.cpp46 constexpr const char *ERROR_MSG_UPDATE_NET_DNSES_FAILED = "Update netlink dns failed,dns list is empty";
410 for (const auto &dns : netLinkInfo.dnsList_) { in UpdateDns()
411 servers.emplace_back(dns.address_); in UpdateDns()
412 domains.emplace_back(dns.hostName_); in UpdateDns()
413 ss << '[' << CommonUtils::ToAnonymousIp(dns.address_).c_str() << ']'; in UpdateDns()
415 NETMGR_LOG_I("update dns server: %{public}s", ss.str().c_str()); in UpdateDns()
416 // Call netsys to set dns, use default timeout and retry in UpdateDns()
/foundation/communication/netmanager_ext/test/netfirewallmanager/unittest/netfirewallmanager_test/
H A Dnetfirewall_service_test.cpp126 rule->dns.primaryDns = "192.168.1.245"; in GetNetFirewallRuleSptr()
127 rule->dns.standbyDns = "192.168.1.1"; in GetNetFirewallRuleSptr()
175 rule->dns.primaryDns = "192.168.1.245"; in GetNetFirewallRuleSptrTypeDns()
176 rule->dns.standbyDns = "192.168.1.1"; in GetNetFirewallRuleSptrTypeDns()
H A Dnetfirewall_client_test.cpp168 rule->dns.primaryDns = "192.168.1.245"; in GetNetFirewallRuleSptr()
169 rule->dns.standbyDns = "192.168.1.1"; in GetNetFirewallRuleSptr()
/third_party/nghttp2/integration-tests/
H A Dserver_tester.go104 var backendTLS, dns, externalDNS, acceptProxyProtocol, redirectIfNotTLS, affinityCookie, alpnH1 bool
110 case "--dns":
111 dns = true
112 case "--external-dns":
113 dns = true
167 if dns {
168 b += ";dns"
/third_party/node/src/
H A Dcares_wrap.h249 TRACING_CATEGORY_NODE2(dns, native), trace_name_, this, in AresQuery()
267 TRACING_CATEGORY_NODE2(dns, native), trace_name_, this, in ParseError()
376 TRACING_CATEGORY_NODE2(dns, native), trace_name_, this); in CallOnComplete()
H A Dcares_wrap.cc1373 TRACING_CATEGORY_NODE2(dns, native), "reverse", wrap, in Send()
1496 TRACING_CATEGORY_NODE2(dns, native), "lookup", req_wrap.get(), in AfterGetAddrInfo()
1530 TRACING_CATEGORY_NODE2(dns, native), "lookupService", req_wrap.get(), in AfterGetNameInfo()
1597 TRACE_EVENT_NESTABLE_ASYNC_BEGIN2(TRACING_CATEGORY_NODE2(dns, native), in GetAddrInfo()
1634 TRACING_CATEGORY_NODE2(dns, native), "lookupService", req_wrap.get(), in GetNameInfo()
1836 TRACE_EVENT_INSTANT0(TRACING_CATEGORY_NODE2(dns, native), in Cancel()
/third_party/node/lib/
H A Dnet.js134 let dns;
1318 if (dns === undefined) dns = require('dns');
1328 dnsopts.hints = dns.ADDRCONFIG;
1332 debug('connect: dns options', dnsopts);
1334 const lookup = options.lookup || dns.lookup;
2008 if (dns === undefined) dns = require('dns');
[all...]
/foundation/communication/netstack/frameworks/cj/http/include/
H A Dnet_http_request_context.h166 void ParseDnsServers(CArrString dns);
/foundation/communication/netmanager_base/interfaces/kits/c/netconnclient/src/
H A Dnet_connection_adapter.cpp185 for (const auto &dns : infoObj.dnsList_) { in Conv2NetLinkInfo()
190 ret = Conv2INetAddr(dns, &(prop->dnsList[i++])); in Conv2NetLinkInfo()
/foundation/communication/netmanager_ext/services/ethernetmanager/src/
H A Ddev_interface_state.cpp341 for (auto dns : config->dnsServers_) { in UpdateLinkInfo()
342 linkInfo_->dnsList_.push_back(dns); in UpdateLinkInfo()
/third_party/lwip/src/netif/ppp/
H A Dipcp.c188 { "ms-dns", 1, (void *)setdnsaddr,
367 * setdnsaddr - set the dns address(es)
373 u32_t dns; local
376 dns = inet_addr(*argv);
377 if (dns == (u32_t) -1) {
379 option_error("invalid address parameter '%s' for ms-dns option",
383 dns = *(u32_t *)hp->h_addr;
390 ipcp_allowoptions[0].dnsaddr[0] = dns;
395 ipcp_allowoptions[0].dnsaddr[1] = dns;
1241 * If they want us to ask for ms-dns, w in ipcp_nakci()
[all...]
/third_party/nghttp2/src/
H A Dshrpx_config.cc961 bool dns; member
1094 } else if (util::strieq_l("dns", param)) { in parse_downstream_params()
1095 out.dns = true; in parse_downstream_params()
1196 if (addr.host_unix && params.dns) { in parse_mapping()
1197 LOG(ERROR) << "backend: dns: cannot be used for UNIX domain socket"; in parse_mapping()
1216 addr.dns = params.dns; in parse_mapping()
1970 if (util::strieq_l("dns-max-tr", name, 10)) { in option_lookup_token()
2173 if (util::strieq_l("dns-cache-timeou", name, 16)) { in option_lookup_token()
2200 if (util::strieq_l("dns in option_lookup_token()
[all...]
H A Dshrpx_worker.h142 bool dns; member
H A Dshrpx_dns_resolver.cc153 auto &dnsconf = get_config()->dns; in resolve()
H A Dshrpx_worker.cc122 std::get<11>(*p) = a.dns; in create_downstream_key()
319 dst_addr.dns = src_addr.dns; in replace_downstream_config()
H A Dshrpx_config.h322 StringRef::from_lit("dns-cache-timeout");
324 StringRef::from_lit("dns-lookup-timeout");
325 constexpr auto SHRPX_OPT_DNS_MAX_TRY = StringRef::from_lit("dns-max-try");
526 // Resolved address if |dns| is false
556 bool dns; member
1093 dns{},
1134 DNSConfig dns; member
H A Dshrpx.cc2179 auto &dnsconf = config->dns; in fill_default_config()
2308 "affinity=<METHOD>", "dns", "redirect-if-not-tls", in print_help()
2394 at start up, or reloading configuration. If "dns" in print_help()
2397 frequently. If "dns" is given, name resolution of in print_help()
3401 --dns-cache-timeout=<DURATION> in print_help()
3405 << util::duration_str(config->dns.timeout.cache) << R"( in print_help()
3406 --dns-lookup-timeout=<DURATION> in print_help()
3412 << util::duration_str(config->dns.timeout.lookup) << R"( in print_help()
3413 --dns-max-try=<N> in print_help()
3417 << config->dns in print_help()
[all...]
/foundation/communication/netmanager_base/test/netconnmanager/unittest/net_conn_add_test/
H A Dnetfirewall_client_test.cpp168 rule->dns.primaryDns = "192.168.1.245"; in GetNetFirewallRuleSptr()
169 rule->dns.standbyDns = "192.168.1.1"; in GetNetFirewallRuleSptr()
/foundation/communication/netmanager_base/test/netconnmanager/unittest/net_conn_multi_test/
H A Dnative_net_conn_test.cpp114 sptr<INetAddr> dns = GetINetAddrSample(); in GetNetLinkInfoSample() local
115 netLinkInfo->dnsList_.push_back(*dns); in GetNetLinkInfoSample()
/third_party/curl/lib/
H A Dsetopt.c2265 if(data->dns.hostcachetype == HCACHE_SHARED) { in Curl_vsetopt()
2266 data->dns.hostcache = NULL; in Curl_vsetopt()
2267 data->dns.hostcachetype = HCACHE_NONE; in Curl_vsetopt()
2305 data->dns.hostcache = &data->share->hostcache; in Curl_vsetopt()
2306 data->dns.hostcachetype = HCACHE_SHARED; in Curl_vsetopt()
H A Dconncache.c548 connc->closure_handle->dns.hostcache); in Curl_conncache_close_all_connections()
/foundation/communication/netmanager_base/interfaces/innerkits/netmanagernative/include/
H A Dnetfirewall_parcel.h61 const std::string NET_FIREWALL_DNS = "dns";
228 NetFirewallDnsParam dns; // DNS, optional member
/third_party/lwip/src/
H A DFilelists.mk35 $(LWIPDIR)/core/dns.c \
/third_party/rust/crates/rust-openssl/openssl/src/x509/
H A Dtests.rs338 .dns("example.com") in x509_builder()
394 .dns("example.com,DNS:example2.com") in x509_extension_to_der()
451 .dns("example.com") in x509_req_builder()

Completed in 36 milliseconds

12345