/netbsd-src/external/bsd/nsd/dist/contrib/ |
H A D | nsd_munin_ | 74 nsd_munin_by_type - incoming queries by type 75 nsd_munin_by_class - incoming queries by class 76 nsd_munin_by_opcode - incoming queries by opcode 225 for x in server0.queries server1.queries server2.queries \ 226 server3.queries server4.queries server5.queries \ 227 server6.queries server7.queries server8.queries \ 228 server9.queries server10.queries server11.queries \ 229 server12.queries server13.queries server14.queries \ 230 server15.queries ; do 358 for x in server0.queries server1.queries server2.queries \ [all …]
|
/netbsd-src/external/bsd/unbound/dist/testdata/ratelimit.tdir/ |
H A D | ratelimit.test | 19 echo "> Three parallel queries" 20 # For this test we send three parallel queries and we expect only one of them 44 echo "Number of ratelimited queries OK for three parallel queries" 46 echo "Number of ratelimited queries not OK for three parallel queries" 50 echo "Number of ratelimited queries not OK for three parallel queries" 63 echo "> Three parallel queries with ratelimit-factor" 64 # For this test we send three parallel queries and we expect at least two of 110 echo "> Three parallel queries with backoff" 111 # For this test we send three parallel queries. The ratelimit should be reached 113 # queries and we expect none of them to be allowed through because of the [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ |
H A D | property_test.c | 415 } queries[] = { in test_property() local 449 for (i = 0; i < OSSL_NELEM(queries); i++) { in test_property() 454 queries[i].nid, queries[i].prop, in test_property() 456 || !TEST_str_eq((char *)result, queries[i].expected)) { in test_property() 466 for (i = 0; i < OSSL_NELEM(queries); i++) { in test_property() 470 if (queries[i].prov == &fake_prov1) { in test_property() 472 queries[i].nid, in test_property() 473 queries[i].prop, in test_property() 476 || !TEST_str_eq((char *)result, queries[i].expected)) { in test_property() 483 queries[i].nid, in test_property() [all …]
|
/netbsd-src/external/bsd/nsd/dist/doc/ |
H A D | differences.tex | 32 BIND 8.4.7 and BIND 9.3.2. Differences in answers to captured queries from 50 Our method uses a set of queries captured from production name servers. 51 These queries are sent over UDP to a name server set up to serve a 78 and played the queries against the authoritative name servers. 104 \subsection{Comparison of responses to root queries} 145 \subsection{Comparison of responses to NL TLD queries} 184 NSD clears the DO bit in answers to queries with the DO bit. BIND copies the 199 NSD clears the CD bit in answers to queries with the CD bit. BIND copies the 206 by recursive servers. BIND copies the CD bit for some formerr queries. 233 Some update, ixfr request, notify, gss-tsig TKEY sequence queries could [all …]
|
/netbsd-src/external/mpl/bind/dist/bin/tests/system/rpzrecurse/ |
H A D | README | 22 zone data file and so will generate SERVFAILs for any queries to it. 28 to craft 'ip', 'nsdname', and 'nsip' rules that matched the queries. 30 Each test is intended to be fed a number of queries constructed as 53 2 queries, q01 is expected to skip recursion, q02 is expected to 66 so each of the first 32 queries should match a different zone) 67 33 queries, the first 32 of which are expected to skip recursion 88 2 queries, the first should not recurse and the second should recurse 93 2 queries, the first should not recurse and the second should recurse 97 2 queries, the first should not recurse and the second should recurse 111 33 queries per test, where the number expected to skip recursion [all …]
|
/netbsd-src/external/bsd/unbound/dist/testdata/ip_ratelimit.tdir/ |
H A D | ip_ratelimit.test | 45 echo "> Three parallel queries with backoff and cookie" 46 # For this test we send three parallel queries. The ratelimit should be reached 48 # Then for the next second we again send three parallel queries and we expect 93 echo "Three parallel queries with backoff and cookie OK" 95 echo "Three parallel queries with backoff and cookie NOT OK" 99 echo "Three parallel queries with backoff and cookie NOT OK" 112 echo "> Three parallel queries with backoff and cookie with ip-ratelimit-cookie" 155 echo "Three parallel queries with backoff and cookie with ip-ratelimit-cookie OK" 157 echo "Three parallel queries with backoff and cookie with ip-ratelimit-cookie NOT OK" 161 echo "Three parallel queries with backoff and cookie with ip-ratelimit-cookie NOT OK"
|
/netbsd-src/usr.bin/xlint/lint1/ |
H A D | err.c | 732 static const char *queries[] = { 733 "", /* unused, to make queries 1-based */ 761 // queries are enabled. Function calls in message details don't need to be 764 bool is_query_enabled[sizeof(queries) / sizeof(queries[0])]; 778 (void)vfprintf(out, queries[query_id], ap); in enable_queries() 792 id >= sizeof(queries) / sizeof(queries[0]) || 793 queries[id][0] == '\0') 727 static const char *queries[] = { global() variable
|
H A D | makeman | 56 queries="$(list_messages "$2" "Q")" 116 $queries
|
/netbsd-src/external/mpl/bind/dist/doc/arm/ |
H A D | config-resolve.inc.rst | 17 Resolvers handle :ref:`recursive user queries <recursive_query>` and provide 18 complete answers; that is, they issue one or more :ref:`iterative queries 24 information results in a new series of queries to the DNS hierarchy. 48 queries<iterative_query>` (2) to the DNS hierarchy to obtain the answer. The 87 .. Attention:: While the diagram above shows **recursive user queries** 90 IPs that can send such queries, the resolver is termed an **open resolver**. 133 Resolvers are configured to send :ref:`iterative queries<iterative_query>` to 139 queries (mapping an IP address to a name). If the private IP addresses are not 151 Mail systems in particular perform reverse DNS queries as a first-line spam 190 // Two corporate subnets we wish to allow queries from [all …]
|
H A D | logging-categories.inc.rst | 37 Log queries that have been forced to use plain DNS due to timeouts. This is often due to the remote servers not being :rfc:`1034`-compliant (not always returning FORMERR or similar to EDNS queries and other extensions to the DNS when they are not understood). In other words, this is targeted at servers that fail to respond to DNS queries that they don't understand. 58 ``queries`` 59 The locations where queries should be logged. 61 At startup, specifying the category ``queries`` also enables query logging unless the :any:`querylog` option has been specified. 73 Information about queries that resulted in some failure.
|
/netbsd-src/external/bsd/unbound/dist/testdata/04-checkconf.tdir/ |
H A D | good.all | 22 # specify the interfaces to answer queries from by ip-address. 29 # port to answer queries from 61 # the number of queries that a thread gets to service. 62 num-queries-per-thread: 1024 126 # enable to not answer id.server and hostname.bind queries. 129 # enable to not answer version.server and version.bind queries. 151 # Harden against unseemly large queries. 152 harden-large-queries: yes 157 # Do not query the following addresses. No DNS queries are sent there. 229 # Create entries like below, to make all queries for 'example.com' and [all …]
|
/netbsd-src/external/bsd/unbound/dist/testdata/stat_values.tdir/ |
H A D | stat_values.test | 186 total.num.queries=1 222 total.num.queries=1 251 total.num.queries=1 277 total.num.queries=1 316 total.num.queries=1 342 total.num.queries=1 367 total.num.queries=1 392 total.num.queries=1 417 total.num.queries=1 447 total.num.queries=1 [all …]
|
/netbsd-src/external/bsd/unbound/dist/doc/ |
H A D | requirements.txt | 17 structure for queries. 30 fingerprints on data sets, the Iterator that sends queries to the 32 data from previous queries. The networking and query management code 100 additional section'). And will then be used for sending queries to. It 103 cache. Since A and AAAA queries are not synthesized by the unbound cache, 116 then be used to send queries to. And fake answers may be returned. 179 o the access control denies queries before any other processing. 180 This denies queries that are not authoritative, or version.bind, or any. 182 queries and get answers from the cache). 211 If many queries are made, and they are made to names for which the [all …]
|
H A D | example.conf.in | 49 # specify the interfaces to answer queries from by ip-address. 60 # enable this feature to copy the source address of queries to reply. 68 # port to answer queries from 71 # specify the interfaces to send outgoing queries to authoritative 79 # upstream queries. Uses freebind option (Linux). 92 # num-queries-per-thread, or, use as many as the OS will allow you. 96 # making outgoing queries, using an outgoing interface. 100 # making outgoing queries, using an outgoing interface. 122 # use SO_REUSEPORT to distribute queries over threads. 165 # the number of queries that a thread gets to service. [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/property/ |
H A D | README.md | 22 * ... property queries are very common. These must be fast. 24 * Property queries come from a small set and are reused many times typically. 25 I.e. an application tends to use the same set of queries over and over, 26 rather than spanning a wide variety of queries. 28 * Property queries can never add new property definitions. 32 * That definition is uncommon and queries are very common, we can treat 79 against a definition and merging two queries into a single larger query.
|
/netbsd-src/external/bsd/unbound/dist/testdata/tcp_reuse.tdir/ |
H A D | tcp_reuse.conf2 | 1 # this is the upstream server that has pipelining and responds to queries. 15 log-queries: yes 36 # if queries escape, send them to localhost
|
/netbsd-src/external/mpl/bind/dist/bin/dig/ |
H A D | host.rst | 69 …t :iscman:`named` should check consistency, meaning that :program:`host` queries the SOA records f… 104 making non-recursive queries, and expecting to receive answers to 105 those queries that can be referrals to other name servers. 109 This option specifies the number of retries for UDP queries. If ``number`` is negative or zero, 126 records. If the :option:`-C` option is given, queries are made for SOA 128 colon-delimited IPv6 address, :program:`host` queries for PTR records. 136 This option specifies TCP or UDP. By default, :program:`host` uses UDP when making queries; the 138 server. TCP is automatically selected for queries that require 139 it, such as zone transfer (AXFR) requests. Type ``ANY`` queries default
|
/netbsd-src/external/mpl/bind/dist/bin/tests/system/chain/ans4/ |
H A D | README.anspy | 16 authoritative server to DNS queries. It opens a UDP socket on 10.53.0.4 17 and fd92:7065:b8e:ffff::8, port 5300 (or PORT) (these are for DNS queries) 24 "ans.py" will respond to queries as follows: TBD
|
/netbsd-src/external/bsd/unbound/dist/testdata/tls_reuse.tdir/ |
H A D | tls_reuse.conf2 | 1 # this is the upstream server that has pipelining and responds to queries. 18 log-queries: yes 39 # if queries escape, send them to localhost
|
/netbsd-src/external/mpl/bind/dist/doc/notes/ |
H A D | notes-9.18.2.rst |
|
/netbsd-src/external/bsd/unbound/dist/testdata/fwd_waitudp.tdir/ |
H A D | fwd_waitudp.test | 11 # so that all three queries get timeouts during the later test. 26 echo "> do three queries" 47 echo "> check answers for three queries"
|
/netbsd-src/external/mpl/bind/dist/bin/tests/system/autosign/ns2/ |
H A D | bar.db.in | 29 ; Used for testing ANY queries 33 ; Used for testing CNAME queries 40 ; Used for testing DNAME queries
|
/netbsd-src/external/bsd/unbound/dist/contrib/ |
H A D | unbound_munin_ | 81 unbound_munin_by_type - incoming queries by type 82 unbound_munin_by_class - incoming queries by class 83 unbound_munin_by_opcode - incoming queries by opcode 85 unbound_munin_by_flags - incoming queries by flags 454 sed -e 's/=.*//'` total.num.queries \ 457 num.query.ipv6 unwanted.queries \
|
/netbsd-src/external/bsd/unbound/dist/libunbound/ |
H A D | context.c | 137 while(rbtree_search(&ctx->queries, &ctx->next_querynum)) { in find_id() 182 (void)rbtree_insert(&ctx->queries, &q->node); in context_new() 281 (void)rbtree_insert(&ctx->queries, &q->node); in context_deserialize_new_query() 295 q = (struct ctx_query*)rbtree_search(&ctx->queries, &querynum); in context_lookup_new_query() 350 q = (struct ctx_query*)rbtree_search(&ctx->queries, &id); in context_deserialize_answer() 404 q = (struct ctx_query*)rbtree_search(&ctx->queries, &id); in context_deserialize_cancel()
|
/netbsd-src/external/bsd/unbound/dist/testdata/ |
H A D | fwd_droptoomany.rpl | 3 num-queries-per-thread: 1 8 SCENARIO_BEGIN Test too many queries asked, last is dropped. 89 ; * no more pending queries outstanding.
|