/netbsd-src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
H A D | resolver.h | 414 dns_resolver_dispatchmgr(dns_resolver_t *resolver); 417 dns_resolver_dispatchv4(dns_resolver_t *resolver); 420 dns_resolver_dispatchv6(dns_resolver_t *resolver); 423 dns_resolver_socketmgr(dns_resolver_t *resolver); 426 dns_resolver_taskmgr(dns_resolver_t *resolver); 429 dns_resolver_getlamettl(dns_resolver_t *resolver); 438 dns_resolver_setlamettl(dns_resolver_t *resolver, uint32_t lame_ttl); 447 dns_resolver_addalternate(dns_resolver_t *resolver, const isc_sockaddr_t *alt, 459 dns_resolver_setudpsize(dns_resolver_t *resolver, uint16_t udpsize); 465 dns_resolver_getudpsize(dns_resolver_t *resolver); [all …]
|
/netbsd-src/external/mpl/bind/dist/lib/dns/include/dns/ |
H A D | resolver.h | 1 /* $NetBSD: resolver.h,v 1.10 2025/01/26 16:25:28 christos Exp $ */ 22 /*! \file dns/resolver.h 25 * This is the BIND 9 resolver, the module responsible for resolving DNS 27 * referrals. This is a "full resolver", not to be confused with 28 * the stub resolvers most people associate with the word "resolver". 29 * The full resolver is part of the caching name server or resolver 30 * daemon the stub resolver talks to. 174 * Create a resolver. 178 *\li Generally, applications should not create a resolver directl [all...] |
/netbsd-src/external/mpl/bind/dist/tests/dns/ |
H A D | resolver_test.c | 35 #include <dns/resolver.h> 97 dns_resolver_t *resolver = NULL; in ISC_RUN_TEST_IMPL() 99 mkres(&resolver); in ISC_RUN_TEST_IMPL() 100 destroy_resolver(&resolver); in ISC_RUN_TEST_IMPL() 106 dns_resolver_t *resolver = NULL; in ISC_RUN_TEST_IMPL() 109 mkres(&resolver); in ISC_RUN_TEST_IMPL() 111 timeout = dns_resolver_gettimeout(resolver); in ISC_RUN_TEST_IMPL() 114 destroy_resolver(&resolver); in ISC_RUN_TEST_IMPL() 120 dns_resolver_t *resolver = NULL; in ISC_RUN_TEST_IMPL() 123 mkres(&resolver); in ISC_RUN_TEST_IMPL() 94 dns_resolver_t *resolver = NULL; ISC_RUN_TEST_IMPL() local 104 dns_resolver_t *resolver = NULL; ISC_RUN_TEST_IMPL() local 119 dns_resolver_t *resolver = NULL; ISC_RUN_TEST_IMPL() local 136 dns_resolver_t *resolver = NULL; ISC_RUN_TEST_IMPL() local 158 dns_resolver_t *resolver = NULL; ISC_RUN_TEST_IMPL() local 176 dns_resolver_t *resolver = NULL; ISC_RUN_TEST_IMPL() local [all...] |
/netbsd-src/lib/libc/net/ |
H A D | Makefile.inc | 48 nsdispatch.3 rcmd.3 resolver.3 sockatmark.3 80 MLINKS+=resolver.3 dn_comp.3 \ 81 resolver.3 dn_expand.3 \ 82 resolver.3 fp_nquery.3 \ 83 resolver.3 fp_resstat.3 \ 84 resolver.3 hostalias.3 \ 85 resolver.3 p_query.3 \ 86 resolver.3 res_close.3 \ 87 resolver.3 res_findzonecut.3 \ 88 resolver.3 res_getservers.3 \ [all …]
|
/netbsd-src/external/mpl/bind/dist/bin/tests/system/shutdown/ |
H A D | tests_shutdown.py | 31 "resolver/named.conf", 32 "resolver/named.run", 56 :param resolver_ip: target resolver's IP address 170 cfg_dir = "resolver" 29 do_work(named_proc, resolver, rndc_cmd, kill_method, n_workers, n_queries) global() argument 134 wait_for_named_loaded(resolver, retries=10) global() argument
|
/netbsd-src/external/gpl3/gcc/dist/c++tools/ |
H A D | ChangeLog | 23 * resolver.cc (module_resolver::read_tuple_file): Use unique_ptr 33 * resolver.cc (module_resolver::ModuleCompiledRequest): 35 * resolver.h: Declare handler for ModuleCompiledRequest. 65 * resolver.cc: Likewise. 66 * resolver.h: Likewise. 76 * resolver.h: Do not include std headers directly when 95 * resolver.cc (module_resolver::cmi_response): Remove 118 * resolver.cc: Don't assume mmap, O_CLOEXEC are available. Use 152 * resolver.cc: New. 153 * resolver.h: New.
|
/netbsd-src/external/mpl/bind/dist/doc/arm/ |
H A D | config-resolve.inc.rst | 20 an error), a resolver passes the answer to the user and places it in its cache. 22 resolver's cache until the :term:`TTL` of the cached answer has expired, when 33 .. figure:: resolver-forward.png 38 1. End-user systems are all distributed with a local **stub resolver** as a 42 2. A stub resolver has limited functionality; specifically, it cannot follow 43 :ref:`referrals<referral>`. When a stub resolver receives a request for a 46 a locally configured resolver (5), which may have the answer available in 49 resolver to which the local system sends the user query is configured, for 53 3. Alternatively, the user query can be sent to a **forwarding resolver** (4). 55 appear to be acting as a simple pass-though and, like the stub resolver, [all …]
|
H A D | intro-dns-bind.inc.rst | 123 …all to a minimal function resolution entity called a **stub resolver** (2). The stub resolver (usi… 124 IP addresses) contacts a resolver (a caching name server or full-service resolver) (3), which in tu… 127 is taken from the resolver's cache, removing the need to repeat the name resolution process and use… 128 the stub resolver, the resolver, and the authoritative name servers uses the DNS protocol's query a… 148 The stub resolver sends a **recursive query** message (with the required domain name in the QUESTIO… 149 A **recursive** query simply requests the resolver to find the complete answer. A stub resolver onl… 150 and always needs the service of a resolver. The response to a recursive query can be: 156 The resolver, on receipt of the user's recursive query, either responds immediately, if the ANSWER … 157 the DNS hierarchy to obtain the answer. The resolver always starts with root servers and sends an *… 160 1. The answer to the resolver's QUESTION in the ANSWER section of the query response. [all …]
|
H A D | intro-security.inc.rst | 66 and operational changes both to the authoritative name servers and to any resolver which accesses 70 a stub resolver or operates via a DNS proxy. A stub resolver requires the services of an area 71 or full-service resolver to completely answer user queries. Stub resolvers on the majority of PCs and laptops 74 :ref:`DNS over TLS <dns_over_tls>` may be configured to verify the integrity of the data between the stub resolver and 75 area (or full-service) resolver. However, unless the resolver and the authoritative name server implements DNSSEC, end-to-end integrity (from 76 authoritative name server to stub resolver) cannot be guaranteed.
|
H A D | managed-keys.inc.rst | 25 To configure a validating resolver to use :rfc:`5011` to maintain a trust 38 Any validating resolver which is configured to use the active KSK as an 40 zone's DNSKEY RRset, and stores them for future reference. The resolver 42 still there, the key is accepted by the resolver as a valid 68 anchor by the resolver. However, validation can proceed using the new 69 active key, which was accepted by the resolver when it was a
|
/netbsd-src/external/bsd/libbind/dist/doc/ |
H A D | Makefile.in | 48 LIB_NETWORK_BASE = gethostbyname inet_cidr resolver hesiod getnetent \ 52 resolver.${LIB_NETWORK_EXT} \ 61 resolver.${LIB_NETWORK_MAN_EXT} \ 70 resolver.${LIB_NETWORK_CAT_EXT} \ 82 FORMAT_BASE = resolver irs.conf 83 FORMAT_SRC = resolver.${FORMAT_EXT} \ 85 FORMAT_MAN = resolver.${FORMAT_MAN_EXT} \ 87 FORMAT_CAT = resolver.${FORMAT_CAT_EXT} \
|
/netbsd-src/external/gpl3/gcc/dist/libcody/ |
H A D | server.cc | 49 : resolver (r), direction (READING) in Server() 57 resolver (src.resolver), in Server() 73 resolver = src.resolver; in operator =() 88 resolver->WaitUntilReady (this); in DirectProcess() 115 else if (auto *r = ConnectRequest (this, resolver, words)) in ProcessRequests() 116 resolver = r; in ProcessRequests() 125 (this, resolver, words))) in ProcessRequests() 155 resolver->ErrorResponse (this, std::move (msg)); in ProcessRequests()
|
/netbsd-src/sys/sys/ |
H A D | cdefs_elf.h | 116 #define __ifunc(name, resolver) \ argument 119 _C_LABEL_STRING(#name) " = " _C_LABEL_STRING(#resolver)) 120 #define __hidden_ifunc(name, resolver) \ argument 124 _C_LABEL_STRING(#name) " = " _C_LABEL_STRING(#resolver)) 126 #define __ifunc(name, resolver) \ argument 129 _C_LABEL_STRING(#name) " = " _C_LABEL_STRING(#resolver)) 130 #define __hidden_ifunc(name, resolver) \ argument 134 _C_LABEL_STRING(#name) " = " _C_LABEL_STRING(#resolver))
|
/netbsd-src/external/gpl3/gcc/dist/libsanitizer/hwasan/ |
H A D | hwasan_dynamic_shadow.cpp | 52 const uptr resolver = reinterpret_cast<uptr>(&__hwasan_premap_shadow); in IsPremapShadowAvailable() local 55 return shadow != 0 && shadow != resolver; in IsPremapShadowAvailable() 100 ElfW(Addr) resolver = r->r_addend; in InitShadowGOT() 101 if (resolver == reinterpret_cast<ElfW(Addr)>(&__hwasan_premap_shadow)) { in InitShadowGOT() 102 *offset = reinterpret_cast<ifunc_resolver_t>(resolver)(); in InitShadowGOT()
|
/netbsd-src/external/bsd/pkg_install/dist/create/ |
H A D | build.c | 170 struct archive_entry_linkresolver *resolver, in write_normal_file() argument 215 archive_entry_linkify(resolver, &entry, &sparse_entry); in write_normal_file() 231 struct archive_entry_linkresolver *resolver; in make_dist() local 237 if ((resolver = archive_entry_linkresolver_new()) == NULL) in make_dist() 239 archive_entry_linkresolver_set_strategy(resolver, in make_dist() 298 write_normal_file(p->name, archive, resolver, owner, group); in make_dist() 317 archive_entry_linkify(resolver, &entry, &sparse_entry); in make_dist() 321 archive_entry_linkify(resolver, &entry, &sparse_entry); in make_dist() 324 archive_entry_linkresolver_free(resolver); in make_dist()
|
/netbsd-src/external/bsd/unbound/dist/libunbound/python/examples/ |
H A D | dnssec_test.py | 8 s, r = resolver.resolve(domain) 30 resolver = ub_ctx() variable 31 resolver.add_ta(". IN DS 19036 8 2 49AAC11D7B6F6446702E54A1607371607A1A41855200FD2CE1CDDE32F24E… 32 resolver.add_ta(". IN DS 20326 8 2 E06D44B80B8F1D39A95C0B0D7C65D08458E880409BBC683457104237C7F8…
|
/netbsd-src/external/mpl/dhcp/bind/dist/lib/dns/ |
H A D | resolver.c | 11438 dns_resolver_dispatchmgr(dns_resolver_t *resolver) { in dns_resolver_dispatchmgr() argument 11439 REQUIRE(VALID_RESOLVER(resolver)); in dns_resolver_dispatchmgr() 11440 return (resolver->dispatchmgr); in dns_resolver_dispatchmgr() 11444 dns_resolver_dispatchv4(dns_resolver_t *resolver) { in dns_resolver_dispatchv4() argument 11445 REQUIRE(VALID_RESOLVER(resolver)); in dns_resolver_dispatchv4() 11446 return (dns_dispatchset_get(resolver->dispatches4)); in dns_resolver_dispatchv4() 11450 dns_resolver_dispatchv6(dns_resolver_t *resolver) { in dns_resolver_dispatchv6() argument 11451 REQUIRE(VALID_RESOLVER(resolver)); in dns_resolver_dispatchv6() 11452 return (dns_dispatchset_get(resolver->dispatches6)); in dns_resolver_dispatchv6() 11456 dns_resolver_socketmgr(dns_resolver_t *resolver) { in dns_resolver_socketmgr() argument [all …]
|
H A D | dnstap.proto | 118 // AUTH_QUERY is a DNS query message received from a resolver by an 124 // name server to a resolver, from the perspective of the authoritative 128 // RESOLVER_QUERY is a DNS query message sent from a resolver to an 129 // authoritative name server, from the perspective of the resolver. 135 // authoritative name server by a resolver, from the perspective of 136 // the resolver. 141 // perspective of the DNS server. The client may be a stub resolver or 145 // resolver. 164 // STUB_QUERY is a DNS query message sent from a stub resolver to a DNS 165 // server, from the perspective of the stub resolver. [all …]
|
/netbsd-src/external/mpl/bind/dist/lib/dns/ |
H A D | resolver.c | 1 /* $NetBSD: resolver.c,v 1.21 2025/01/26 16:25:25 christos Exp $ */ 71 #include <dns/resolver.h> 192 * values of 'resolver-query-timeout' less than or equal to 300 are treated as 722 * The structure and functions defined below implement the resolver 725 * When a resolver query is sent and a response is received, the 769 * - If referral, set up the resolver to follow the delegation 944 * Increment resolver-related statistics counters. 2021 * a dispatch for it here. Otherwise we use the resolver's in fctx_setretryinterval() 2350 FCTXTRACE("resquery_send: resolver shutting down"); in add_bad_edns() 3331 * The find may be waiting on a resolver fetc in sort_finds() 11186 dns_resolver_dispatchmgr(dns_resolver_t * resolver) dns_resolver_dispatchmgr() argument 11192 dns_resolver_dispatchv4(dns_resolver_t * resolver) dns_resolver_dispatchv4() argument 11198 dns_resolver_dispatchv6(dns_resolver_t * resolver) dns_resolver_dispatchv6() argument 11204 dns_resolver_taskmgr(dns_resolver_t * resolver) dns_resolver_taskmgr() argument 11210 dns_resolver_getlamettl(dns_resolver_t * resolver) dns_resolver_getlamettl() argument 11216 dns_resolver_setlamettl(dns_resolver_t * resolver,uint32_t lame_ttl) dns_resolver_setlamettl() argument 11222 dns_resolver_addalternate(dns_resolver_t * resolver,const isc_sockaddr_t * alt,const dns_name_t * name,in_port_t port) dns_resolver_addalternate() argument 11245 dns_resolver_setudpsize(dns_resolver_t * resolver,uint16_t udpsize) dns_resolver_setudpsize() argument 11251 dns_resolver_getudpsize(dns_resolver_t * resolver) dns_resolver_getudpsize() argument 11257 dns_resolver_flushbadcache(dns_resolver_t * resolver,const dns_name_t * name) dns_resolver_flushbadcache() argument 11266 dns_resolver_flushbadnames(dns_resolver_t * resolver,const dns_name_t * name) dns_resolver_flushbadnames() argument 11271 dns_resolver_addbadcache(dns_resolver_t * resolver,const dns_name_t * name,dns_rdatatype_t type,isc_time_t * expire) dns_resolver_addbadcache() argument 11283 dns_resolver_getbadcache(dns_resolver_t * resolver,const dns_name_t * name,dns_rdatatype_t type,isc_time_t * now) dns_resolver_getbadcache() argument 11289 dns_resolver_printbadcache(dns_resolver_t * resolver,FILE * fp) dns_resolver_printbadcache() argument 11302 dns_resolver_reset_algorithms(dns_resolver_t * resolver) dns_resolver_reset_algorithms() argument 11311 dns_resolver_disable_algorithm(dns_resolver_t * resolver,const dns_name_t * name,unsigned int alg) dns_resolver_disable_algorithm() argument 11380 dns_resolver_algorithm_supported(dns_resolver_t * resolver,const dns_name_t * name,unsigned int alg) dns_resolver_algorithm_supported() argument 11426 dns_resolver_reset_ds_digests(dns_resolver_t * resolver) dns_resolver_reset_ds_digests() argument 11435 dns_resolver_disable_ds_digest(dns_resolver_t * resolver,const dns_name_t * name,unsigned int digest_type) dns_resolver_disable_ds_digest() argument 11499 dns_resolver_ds_digest_supported(dns_resolver_t * resolver,const dns_name_t * name,unsigned int digest_type) dns_resolver_ds_digest_supported() argument 11530 dns_resolver_resetmustbesecure(dns_resolver_t * resolver) dns_resolver_resetmustbesecure() argument 11541 dns_resolver_setmustbesecure(dns_resolver_t * resolver,const dns_name_t * name,bool value) dns_resolver_setmustbesecure() argument 11561 dns_resolver_getmustbesecure(dns_resolver_t * resolver,const dns_name_t * name) dns_resolver_getmustbesecure() argument 11580 dns_resolver_getclientsperquery(dns_resolver_t * resolver,uint32_t * cur,uint32_t * min,uint32_t * max) dns_resolver_getclientsperquery() argument 11598 dns_resolver_setclientsperquery(dns_resolver_t * resolver,uint32_t min,uint32_t max) dns_resolver_setclientsperquery() argument 11609 dns_resolver_setfetchesperzone(dns_resolver_t * resolver,uint32_t clients) dns_resolver_setfetchesperzone() argument 11616 dns_resolver_getzeronosoattl(dns_resolver_t * resolver) dns_resolver_getzeronosoattl() argument 11623 dns_resolver_setzeronosoattl(dns_resolver_t * resolver,bool state) dns_resolver_setzeronosoattl() argument 11630 dns_resolver_getoptions(dns_resolver_t * resolver) dns_resolver_getoptions() argument 11637 dns_resolver_gettimeout(dns_resolver_t * resolver) dns_resolver_gettimeout() argument 11644 dns_resolver_settimeout(dns_resolver_t * resolver,unsigned int timeout) dns_resolver_settimeout() argument 11665 dns_resolver_setmaxdepth(dns_resolver_t * resolver,unsigned int maxdepth) dns_resolver_setmaxdepth() argument 11671 dns_resolver_getmaxdepth(dns_resolver_t * resolver) dns_resolver_getmaxdepth() argument 11677 dns_resolver_setmaxqueries(dns_resolver_t * resolver,unsigned int queries) dns_resolver_setmaxqueries() argument 11683 dns_resolver_getmaxqueries(dns_resolver_t * resolver) dns_resolver_getmaxqueries() argument 11689 dns_resolver_dumpfetches(dns_resolver_t * resolver,isc_statsformat_t format,FILE * fp) dns_resolver_dumpfetches() argument 11712 dns_resolver_setquotaresponse(dns_resolver_t * resolver,dns_quotatype_t which,isc_result_t resp) dns_resolver_setquotaresponse() argument 11722 dns_resolver_getquotaresponse(dns_resolver_t * resolver,dns_quotatype_t which) dns_resolver_getquotaresponse() argument 11730 dns_resolver_getretryinterval(dns_resolver_t * resolver) dns_resolver_getretryinterval() argument 11737 dns_resolver_setretryinterval(dns_resolver_t * resolver,unsigned int interval) dns_resolver_setretryinterval() argument 11745 dns_resolver_getnonbackofftries(dns_resolver_t * resolver) dns_resolver_getnonbackofftries() argument 11752 dns_resolver_setnonbackofftries(dns_resolver_t * resolver,unsigned int tries) dns_resolver_setnonbackofftries() argument [all...] |
H A D | dnstap.proto | 168 // AUTH_QUERY is a DNS query message received from a resolver by an 174 // name server to a resolver, from the perspective of the authoritative 178 // RESOLVER_QUERY is a DNS query message sent from a resolver to an 179 // authoritative name server, from the perspective of the resolver. 185 // authoritative name server by a resolver, from the perspective of 186 // the resolver. 191 // perspective of the DNS server. The client may be a stub resolver or 195 // resolver. 214 // STUB_QUERY is a DNS query message sent from a stub resolver to a DNS 215 // server, from the perspective of the stub resolver [all...] |
/netbsd-src/external/bsd/unbound/dist/libunbound/python/doc/ |
H A D | intro.rst | 7 `Unbound`_ is an implementation of a DNS resolver, that performs caching and 12 Since the resolver allows to specify the class and type of a query (A record, 23 It is the first Python module which offers thread-safe caching resolver. 38 * Customizable caching validation resolver for synchronous and asynchronous 53 * DNS-based applications performing DNS lookups; the caching resolver can
|
/netbsd-src/external/bsd/unbound/dist/dnstap/ |
H A D | dnstap.proto | 108 // AUTH_QUERY is a DNS query message received from a resolver by an 114 // name server to a resolver, from the perspective of the authoritative 118 // RESOLVER_QUERY is a DNS query message sent from a resolver to an 119 // authoritative name server, from the perspective of the resolver. 125 // authoritative name server by a resolver, from the perspective of 126 // the resolver. 131 // perspective of the DNS server. The client may be a stub resolver or 135 // resolver. 154 // STUB_QUERY is a DNS query message sent from a stub resolver to a DNS 155 // server, from the perspective of the stub resolver. [all …]
|
/netbsd-src/external/bsd/nsd/dist/dnstap/ |
H A D | dnstap.proto | 108 // AUTH_QUERY is a DNS query message received from a resolver by an 114 // name server to a resolver, from the perspective of the authoritative 118 // RESOLVER_QUERY is a DNS query message sent from a resolver to an 119 // authoritative name server, from the perspective of the resolver. 125 // authoritative name server by a resolver, from the perspective of 126 // the resolver. 131 // perspective of the DNS server. The client may be a stub resolver or 135 // resolver. 154 // STUB_QUERY is a DNS query message sent from a stub resolver to a DNS 155 // server, from the perspective of the stub resolver. [all …]
|
/netbsd-src/external/mpl/bind/dist/doc/dnssec-guide/ |
H A D | validation.rst | 24 resolver. A validating resolver performs validation for each remote 73 through that resolver. For the end user, the issue may manifest itself 125 validating resolver yourself. 329 resolver: 425 that process now and see what your validating resolver is doing in more 429 1. The validating resolver queries the ``isc.org`` name servers for the 438 3. The validating resolver queries for the DNSKEY for ``isc.org``. 443 5. The validating resolver queries the parent (``.org``) for the DS 450 7. The validating resolver querie [all...] |
H A D | introduction.rst | 110 servers to smart phones. This includes resolver libraries on different 116 validating resolver, how to sign DNS zone data, and other operational 206 (a.k.a. a *validating resolver*) asks for additional resource 210 validating resolver performs cryptographic computation to verify the 215 the validating resolver reaches a key that it trusts. In the ideal, 231 the validating resolver follows standard DNS protocol to track down 234 resolver, the outgoing query has a bit set indicating it wants 242 3. The validating resolver requires cryptographic keys to be able to verify the 248 resolver can use this information to verify the answers received in 264 5. The validating resolver ask [all...] |