Lines Matching refs:qinfo

67 	struct query_info* qinfo, struct sock_list* origin);
210 vq->orig_msg->qinfo = qstate->qinfo;
222 vq->qchase = qstate->qinfo;
323 if(qstate->qinfo.qtype == LDNS_RR_TYPE_RRSIG &&
1319 qstate->query_flags, &qstate->qinfo, &vq->qchase,
1395 qstate->qinfo.qtype == LDNS_RR_TYPE_DNSKEY &&
1396 query_dname_compare(lookup_name, qstate->qinfo.qname) == 0) {
1613 msg, &msg->qinfo, NULL);
1700 subtype = val_classify_response(qstate->query_flags, &qstate->qinfo,
1972 qstate->query_flags, &qstate->qinfo, &vq->qchase,
2040 &qstate->qinfo);
2071 &qstate->qinfo);
2087 if(!dns_cache_store(qstate->env, &vq->orig_msg->qinfo,
2095 if(!dns_cache_store(qstate->env, &vq->orig_msg->qinfo,
2270 &qstate->qinfo);
2271 if(vq && qstate->qinfo.qname != vq->qchase.qname)
2300 if(qstate->qinfo.qclass == LDNS_RR_CLASS_ANY) {
2429 * @param qinfo: from the sub query state, query info.
2439 int id, int rcode, struct dns_msg* msg, struct query_info* qinfo,
2456 subtype = val_classify_response(BIT_RD, qinfo, qinfo, msg->rep, 0);
2460 ds = reply_find_answer_rrset(qinfo, msg->rep);
2486 qinfo->qname, qinfo->qname_len, qinfo->qclass,
2492 log_query_info(VERB_DETAIL, "validated DS", qinfo);
2494 qinfo->qname, qinfo->qname_len, qinfo->qclass, ds,
2518 qstate->env, ve, qinfo, msg->rep, vq->key_entry,
2525 qinfo->qname, qinfo->qname_len,
2526 qinfo->qclass, proof_ttl,
2547 msg->rep->ns_numrrsets, qinfo, vq->key_entry, &reason);
2557 qinfo->qname, qinfo->qname_len,
2558 qinfo->qclass, proof_ttl,
2590 cname = reply_find_rrset_section_an(msg->rep, qinfo->qname,
2591 qinfo->qname_len, LDNS_RR_TYPE_CNAME, qinfo->qclass);
2634 *ke = key_entry_create_bad(qstate->region, qinfo->qname,
2635 qinfo->qname_len, qinfo->qclass,
2652 * @param qinfo: from the sub query state, query info.
2657 int id, int rcode, struct dns_msg* msg, struct query_info* qinfo,
2663 if(!ds_response_to_ke(qstate, vq, id, rcode, msg, qinfo, &dske)) {
2671 qinfo->qname, qinfo->qname_len);
2678 vq->empty_DS_len = qinfo->qname_len;
2701 errinf_dname(qstate, "for DS", qinfo->qname);
2725 * @param qinfo: from the sub query state, query info.
2730 int id, int rcode, struct dns_msg* msg, struct query_info* qinfo,
2740 dnskey = reply_find_answer_rrset(qinfo, msg->rep);
2754 qinfo->qname, qinfo->qname_len, qinfo->qclass,
2762 errinf_dname(qstate, "for key", qinfo->qname);
2797 errinf_dname(qstate, "for key", qinfo->qname);
2810 log_query_info(VERB_DETAIL, "validated DNSKEY", qinfo);
2896 * @param qinfo: from the sub query state, query info.
2900 int id, int rcode, struct dns_msg* msg, struct query_info* qinfo)
2922 ntohs(msg->rep->rrsets[0]->rk.rrset_class) == qinfo->qclass &&
2963 if(!val_nsec_check_dlv(qinfo, msg->rep, &vq->dlv_lookup_name,
2990 &qstate->qinfo);
2991 log_query_info(VERB_ALGO, "super is", &super->qinfo);
3002 if(qstate->qinfo.qtype == LDNS_RR_TYPE_DS) {
3004 qstate->return_msg, &qstate->qinfo,
3007 } else if(qstate->qinfo.qtype == LDNS_RR_TYPE_DNSKEY) {
3009 qstate->return_msg, &qstate->qinfo,
3012 } else if(qstate->qinfo.qtype == LDNS_RR_TYPE_DLV) {
3014 qstate->return_msg, &qstate->qinfo);