Home
last modified time | relevance | path

Searched full:dns (Results 1 – 25 of 890) sorted by relevance

12345678910>>...36

/freebsd/contrib/unbound/dnstap/
H A Ddnstap.proto1 // dnstap: flexible, structured event replication format for DNS software
4 // replication format for DNS software.
25 // DNS server identity.
26 // If enabled, this is the identity string of the DNS server which generated
31 // DNS server version.
32 // If enabled, this is the version string of the DNS server which generated
59 // SocketProtocol: the protocol used to transport a DNS message.
61 UDP = 1; // DNS over UDP transport (RFC 1035 section 4.2.1)
62 TCP = 2; // DNS over TCP transport (RFC 1035 section 4.2.2)
63 DOT = 3; // DNS over TLS (RFC 7858)
[all …]
/freebsd/crypto/openssh/
H A DREADME.dns1 How to verify host keys using OpenSSH and DNS
4 OpenSSH contains support for verifying host keys using DNS as described
6 instructions on how to use this feature. Configuring DNS is out of the
10 (1) Server: Generate and publish the DNS RR
12 To create a DNS resource record (RR) containing a fingerprint of the
22 generic DNS RR format parsable by most modern name server
26 To publish the fingerprint using the DNS you must add the generated RR
27 to your DNS zone file and sign your zone.
30 (2) Client: Enable ssh to verify host keys using DNS
32 To enable the ssh client to verify host keys using DNS, you have to
[all …]
H A Ddns.c1 /* $OpenBSD: dns.c,v 1.44 2023/03/10 04:06:21 dtucker Exp $ */
42 #include "dns.h"
172 * and return -1 which stops DNS key fingerprint processing. in is_numeric_hostname()
192 * Verify the given hostname, address and host key using DNS.
219 debug("skipped DNS lookup for numerical hostname"); in verify_host_key_dns()
226 verbose("DNS lookup error: %s", dns_result_totext(result)); in verify_host_key_dns()
232 debug("found %d secure fingerprints in DNS", in verify_host_key_dns()
235 debug("found %d insecure fingerprints in DNS", in verify_host_key_dns()
251 verbose("Error parsing fingerprint from DNS."); in verify_host_key_dns()
292 debug("matching host key fingerprint found in DNS"); in verify_host_key_dns()
[all …]
/freebsd/contrib/ntp/sntp/libevent/test/
H A Dregress_dns.c66 #include "event2/dns.h"
207 struct evdns_base *dns = evdns_base_new(base, EVDNS_BASE_INITIALIZE_NAMESERVERS); in dns_resolve_reverse() local
211 tt_assert(dns); in dns_resolve_reverse()
216 dns, &in, 0, dns_gethostbyname_cb, base); in dns_resolve_reverse()
224 if (dns) in dns_resolve_reverse()
225 evdns_base_free(dns, 0); in dns_resolve_reverse()
544 struct evdns_base *dns = NULL; in dns_search_test_impl() local
559 dns = evdns_base_new(base, 0); in dns_search_test_impl()
560 tt_assert(!evdns_base_nameserver_ip_add(dns, buf)); in dns_search_test_impl()
562 evdns_base_search_add(dns, "a.example.com"); in dns_search_test_impl()
[all …]
/freebsd/contrib/libevent/test/
H A Dregress_dns.c66 #include "event2/dns.h"
207 struct evdns_base *dns = evdns_base_new(base, EVDNS_BASE_INITIALIZE_NAMESERVERS); in dns_resolve_reverse() local
211 tt_assert(dns); in dns_resolve_reverse()
216 dns, &in, 0, dns_gethostbyname_cb, base); in dns_resolve_reverse()
224 if (dns) in dns_resolve_reverse()
225 evdns_base_free(dns, 0); in dns_resolve_reverse()
544 struct evdns_base *dns = NULL; in dns_search_test_impl() local
559 dns = evdns_base_new(base, 0); in dns_search_test_impl()
560 tt_assert(!evdns_base_nameserver_ip_add(dns, buf)); in dns_search_test_impl()
562 evdns_base_search_add(dns, "a.example.com"); in dns_search_test_impl()
[all …]
/freebsd/lib/libcasper/services/cap_dns/
H A Dcap_dns.387 .Nm system.dns
138 means that reverse DNS lookups are allowed with
163 .Nm system.dns
185 /* Use Casper capability to create capability to the system.dns service. */
186 capdns = cap_service_open(capcas, "system.dns");
188 err(1, "Unable to open system.dns service");
193 /* Limit system.dns to reserve IPv4 addresses */
196 err(1, "Unable to limit access to the system.dns service");
206 /* Limit system.dns to reverse DNS lookups. */
208 err(1, "Unable to limit access to the system.dns service");
/freebsd/crypto/openssl/test/certs/
H A Dsetup.sh265 NC="permitted;DNS:www.good.org, permitted;DNS:good.com,"
274 NC="excluded;DNS:www.bad.org, excluded;DNS:bad.com,"
286 NC="permitted;DNS:www.good.net, permitted;DNS:ok.good.com, "
287 NC="$NC excluded;DNS:bad.ok.good.com"
296 "DNS.1 = www.good.org" "DNS.2 = any.good.com" \
300 # all DNS-like CNs allowed by CA1, no DNS SANs.
304 "3.CN=not..dns" "4.CN=not@dns" "5.CN=not-.dns" "6.CN=not.dns." | \
308 # all DNS-like CNs allowed by CA1, no SANs
314 # Some DNS-like CNs not permitted by CA1, no DNS SANs.
325 "DNS.1 = www.anything.org" "DNS.2 = any.other.com" \
[all …]
/freebsd/crypto/heimdal/lib/wind/
H A Drfc3490.txt40 required in existing protocols like DNS, so that IDNs can be
54 3.2.1. DNS resource records................................ 8
68 6. Implications for typical applications using DNS............... 13
71 6.3 DNS servers............................................... 15
90 does not depend on any changes to DNS servers, resolvers, or protocol
91 elements, because the ASCII name service provided by the existing DNS
106 and DNS servers being updated in order for a user to use an
109 applications only; no changes are needed to the DNS protocol or any
110 DNS servers or the resolvers on user's computers.
125 IDNA does not extend the service offered by DNS to the applications.
[all …]
/freebsd/contrib/unbound/contrib/
H A Dunbound-querycachedb.py10 import dns.message
11 import dns.name
12 import dns.rdataclass
13 import dns.rdatatype
18 hobj.update(dns.name.from_text(qname).to_wire())
20 socket.htons(dns.rdatatype.from_text(qtype)),
21 socket.htons(dns.rdataclass.from_text(qclass))))
43 print(dns.message.from_wire(value[:-16]))
H A Dunbound_munin_57 unbound_munin_ - Munin plugin to monitor the Unbound DNS resolver.
242 echo "graph_title Unbound DNS traffic and cache hits"
246 echo "graph_category dns"
264 …echo "graph_info DNS queries to the recursive resolver. The unwanted replies could be innocent dup…
271 echo "graph_category dns"
282 echo "graph_category dns"
294 echo "graph_title Unbound DNS queries by type"
298 echo "graph_category dns"
303 echo "graph_info queries by DNS RR type queried for"
306 echo "graph_title Unbound DNS queries by class"
[all …]
/freebsd/contrib/ntp/sntp/libevent/include/event2/
H A Ddns.h29 * The original DNS code is due to Adam Langley with heavy
30 * modifications by Nick Mathewson. Adam put his DNS software in the
50 /** @file event2/dns.h
54 * Async DNS lookups are really a whole lot harder than they should be,
87 * although many DNS queries may be generated from a single call to
167 /** The request was canceled because the DNS subsystem was shut down. */
171 /** There were no answers and no error condition in the DNS packet.
237 * exiting when we have no active dns requests. */
245 Initialize the asynchronous DNS library.
251 @param event_base the event base to associate the dns client with
[all …]
/freebsd/contrib/libevent/include/event2/
H A Ddns.h29 * The original DNS code is due to Adam Langley with heavy
30 * modifications by Nick Mathewson. Adam put his DNS software in the
50 /** @file event2/dns.h
54 * Async DNS lookups are really a whole lot harder than they should be,
87 * although many DNS queries may be generated from a single call to
167 /** The request was canceled because the DNS subsystem was shut down. */
171 /** There were no answers and no error condition in the DNS packet.
237 * exiting when we have no active dns requests. */
245 Initialize the asynchronous DNS library.
251 @param event_base the event base to associate the dns client with
[all …]
/freebsd/contrib/netbsd-tests/lib/libc/net/
H A Dt_hostent.sh47 # Hijack DNS traffic using a single rump server instance and a DNS
167 atf_set "descr" "Checks DNS name lookup for AF_INET"
172 atf_check -o inline:"$ans4" -x "$HIJACK_DNS ${dir}/h_hostent ${res} -t dns -4 $n4"
182 atf_set "descr" "Checks DNS name lookup for AF_INET6"
187 atf_check -o inline:"$ans6" -x "$HIJACK_DNS ${dir}/h_hostent ${res} -t dns -6 $n6"
197 atf_set "descr" "Checks DNS address lookup for AF_INET"
202 atf_check -o inline:"$ans4" -x "$HIJACK_DNS ${dir}/h_hostent ${res} -t dns -4 -a $a4"
212 atf_set "descr" "Checks dns address lookup for AF_INET6"
217 atf_check -o inline:"$ans6" -x "$HIJACK_DNS ${dir}/h_hostent ${res} -t dns -6 -a $a6"
/freebsd/contrib/llvm-project/llvm/lib/Target/AMDGPU/
H A DMIMGInstructions.td194 class MIMG_Base <dag outs, string dns = "">
207 let DecoderNamespace = dns;
208 let isAsmParserOnly = !eq(dns, "");
211 class MIMG <dag outs, string dns = "">
212 : MIMG_Base <outs, dns> {
227 class VIMAGE <dag outs, string dns = ""> : MIMG<outs, dns> {
232 class VSAMPLE <dag outs, string dns = ""> : MIMG<outs, dns> {
290 class MIMG_gfx6789<bits<8> op, dag outs, string dns = "">
291 : MIMG<outs, dns>, MIMGe_gfx6789<op> {
301 class MIMG_gfx90a<bits<8> op, dag outs, string dns = "">
[all …]
/freebsd/usr.sbin/ppp/
H A Dipcp.c148 { 129, "PRIDNS" }, /* 129: Primary DNS Server Address */ in protoname()
150 { 131, "SECDNS" }, /* 131: Secondary DNS Server Address */ in protoname()
179 ipcp->ns.dns[0].s_addr = ipcp->ns.dns[1].s_addr = INADDR_NONE; in ipcp_LoadDNS()
252 if (n < 2 && inet_aton(cp, ipcp->ns.dns)) in ipcp_LoadDNS()
269 if (n == 2 && ipcp->ns.dns[0].s_addr == INADDR_ANY) { in ipcp_LoadDNS()
270 ipcp->ns.dns[0].s_addr = ipcp->ns.dns[1].s_addr; in ipcp_LoadDNS()
271 ipcp->ns.dns[1].s_addr = INADDR_ANY; in ipcp_LoadDNS()
290 if (ipcp->ns.dns[0].s_addr == INADDR_ANY && in ipcp_WriteDNS()
291 ipcp->ns.dns[1].s_addr == INADDR_ANY) { in ipcp_WriteDNS()
297 if (ipcp->ns.dns[0].s_addr == INADDR_ANY) { in ipcp_WriteDNS()
[all …]
/freebsd/contrib/unbound/services/cache/
H A Ddns.h2 * services/cache/dns.h - Cache services for DNS using msg and rrset caches.
39 * This file contains the DNS cache.
55 /** Allow caching a DNS message with a zero TTL. */
69 * Allocate a dns_msg with malloc/alloc structure and store in dns cache.
71 * @param env: environment, with alloc structure and dns cache.
108 * @param env: module environment with the DNS cache.
131 * @param env: module environment with the DNS cache.
155 * @param env: module environment with the DNS cache. NULL if the LRU from cache
157 * @param q: query info, contains qname that will make up the dns messag
[all...]
/freebsd/sys/contrib/device-tree/Bindings/arm/marvell/
H A Dmarvell,kirkwood.txt32 "dlink,dns-320"
33 "dlink,dns-320-a1"
34 "dlink,dns-325"
35 "dlink,dns-325-a1"
36 "dlink,dns-kirkwood"
/freebsd/sys/netpfil/ipfilter/netinet/
H A Dip_dns_pxy.c12 * map ... proxy port dns/udp 53 { block .cnn.com; }
70 RWLOCK_INIT(&softd->ipf_p_dns_rwlock, "ipf dns rwlock"); in ipf_p_dns_soft_create()
182 * No real DNS packet is smaller than that. in ipf_p_dns_new()
194 MUTEX_INIT(&di->dnsi_lock, "dns lock"); in ipf_p_dns_new()
317 ipf_dns_hdr_t *dns; in ipf_p_dns_inout() local
322 if (fin->fin_dlen < sizeof(*dns)) in ipf_p_dns_inout()
325 dns = (ipf_dns_hdr_t *)((char *)fin->fin_dp + sizeof(udphdr_t)); in ipf_p_dns_inout()
327 q = dns->dns_qdcount; in ipf_p_dns_inout()
329 data = (char *)(dns + 1); in ipf_p_dns_inout()
330 dlen = fin->fin_dlen - sizeof(*dns) - sizeof(udphdr_t); in ipf_p_dns_inout()
/freebsd/libexec/bootpd/
H A DProblems21 timeouts on failed DNS lookup operations. If this is the
22 problem, find the client names for which DNS lookup fails
31 If your DNS lookups work but are just slow, consider either
32 running bootpd on the same machine as the DNS server or
33 running a caching DNS server on the host running bootpd.
/freebsd/release/packages/ucl/
H A Dlocal-unbound-all.ucl19 comment = "NLnet Labs Unbound DNS resolver"
22 Unbound is a caching, DNSSEC-validating DNS resolver developed by NLnet Labs.
23 This version of Unbound, called local-unbound, is intended to service DNS
28 as "dns/unbound".
/freebsd/sys/contrib/device-tree/src/arm/marvell/
H A Dkirkwood-dns320.dts7 model = "D-Link DNS-320 NAS (Rev A1)";
8 …compatible = "dlink,dns-320-a1", "dlink,dns-320", "dlink,dns-kirkwood", "marvell,kirkwood-88f6281"…
H A Dkirkwood-dns325.dts7 model = "D-Link DNS-325 NAS (Rev A1)";
8 …compatible = "dlink,dns-325-a1", "dlink,dns-325", "dlink,dns-kirkwood", "marvell,kirkwood-88f6281"…
/freebsd/usr.sbin/ypserv/
H A Dyp_dnslookup.c37 * Do standard and reverse DNS lookups using the resolver library.
155 yp_error("failed to malloc() circleq dns entry"); in yp_malloc_dnsent()
276 yp_error("sending dns reply to %s (%lu)", in yp_send_dns_reply()
338 * Data is pending on the DNS socket; check for valid replies
353 yp_error("running dns queue"); in yp_run_dnsq()
381 yp_error("got dns reply from %s", inet_ntoa(sin.sin_addr)); in yp_run_dnsq()
405 * Queue and transmit an asynchronous DNS hostname lookup.
443 yp_error("DNS query failed"); in yp_async_lookup_name()
453 yp_error("queueing async DNS name lookup (%lu)", q->id); in yp_async_lookup_name()
460 * Queue and transmit an asynchronous DNS IP address lookup.
[all …]
/freebsd/contrib/unbound/doc/
H A Dlibunbound.347 \- Unbound DNS validating resolver 1.23.1 functions.
154 is an implementation of a DNS resolver, that does caching and
159 and obtain other information from the DNS. The library performs public\-key
217 Set machine to forward DNS queries to, the caching resolver to use.
218 IP4 or IP6 address. Forwards all DNS requests to that machine, which
226 Set a stub zone, authoritative dns servers to use for a particular zone.
235 Enable DNS over TLS (DoT) for machines set with
338 The rrtype and rrclass are DNS type and class codes.
386 The result of the DNS resolution and validation is returned as
H A Dunbound.conf.5158 also https or dns over tls port numbers by putting them in the list as well.
227 not set higher than that value. Default is 1232 which is the DNS Flag Day 2020
251 for 64 Kb packets, the maximum DNS message size. No message larger than this
253 for DNS data, such as for huge resource records, will result in a SERVFAIL
321 that sent the query with a valid DNS cookie. Since the cookie validates
334 The wait limit for the netblock, when the query has a DNS cookie.
471 IPv6 transport for sending DNS traffic, it does not impact the contents of
472 the DNS traffic, which may have ip4 and ip6 addresses in it.
475 If enabled, prefer IPv4 transport for sending DNS queries to internet
482 If enabled, prefer IPv6 transport for sending DNS queries to internet
[all …]

12345678910>>...36