Lines Matching refs:rk

448 		if(dname_seen && ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME) {
465 "has failed ANSWER rrset:", s->rk.dname,
466 ntohs(s->rk.type), ntohs(s->rk.rrset_class));
468 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME)
470 else if(ntohs(s->rk.type) == LDNS_RR_TYPE_DNAME)
480 ntohs(s->rk.type) == LDNS_RR_TYPE_DNAME) {
494 "has failed AUTHORITY rrset:", s->rk.dname,
495 ntohs(s->rk.type), ntohs(s->rk.rrset_class));
539 if(ntohs(rep->rrsets[ rep->an_numrrsets ]->rk.type) != LDNS_RR_TYPE_NS)
588 "inconsistent wildcard sigs:", s->rk.dname,
589 ntohs(s->rk.type), ntohs(s->rk.rrset_class));
605 if(wc != NULL && ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC) {
614 if(wc != NULL && ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC3) {
691 if(ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC) {
704 } else if(ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC3) {
776 if(ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC) {
787 } else if(ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC3)
909 s->rk.dname, ntohs(s->rk.type),
910 ntohs(s->rk.rrset_class));
927 if(ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC) {
936 if(ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC3) {
1009 "inconsistent wildcard sigs:", s->rk.dname,
1010 ntohs(s->rk.type), ntohs(s->rk.rrset_class));
1019 ntohs(s->rk.type) == LDNS_RR_TYPE_DNAME && wc) {
1021 "wildcarded DNAME:", s->rk.dname,
1022 ntohs(s->rk.type), ntohs(s->rk.rrset_class));
1030 if (ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME) {
1044 if(wc != NULL && ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC) {
1053 if(wc != NULL && ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC3) {
1125 if(ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC) {
1142 } else if(ntohs(s->rk.type) == LDNS_RR_TYPE_NSEC3) {
1243 rrsets[vq->rrset_skip]->rk.dname;
1245 rrsets[vq->rrset_skip]->rk.dname_len;
1247 rrsets[vq->rrset_skip]->rk.type);
1249 rrsets[vq->rrset_skip]->rk.rrset_class);
1258 ntohs(vq->orig_msg->rep->rrsets[vq->rrset_skip]->rk.type) ==
1261 rk.flags&PACKED_RRSET_NSEC_AT_APEX))) {
1426 if(!generate_request(qstate, id, vq->ds_rrset->rk.dname,
1427 vq->ds_rrset->rk.dname_len, LDNS_RR_TYPE_DNSKEY,
1493 log_nametypeclass(VERB_ALGO, "DS RRset", vq->ds_rrset->rk.dname, LDNS_RR_TYPE_DS, LDNS_RR_CLASS_IN);
1496 if(vq->ds_rrset && query_dname_compare(vq->ds_rrset->rk.dname,
1498 if(!generate_request(qstate, id, vq->ds_rrset->rk.dname,
1499 vq->ds_rrset->rk.dname_len, LDNS_RR_TYPE_DNSKEY,
1507 if(!vq->ds_rrset || query_dname_compare(vq->ds_rrset->rk.dname,
1537 if(!generate_request(qstate, id, vq->ds_rrset->rk.dname,
1538 vq->ds_rrset->rk.dname_len, LDNS_RR_TYPE_DNSKEY,
2044 log_assert(dname_subdomain_c(vq->ds_rrset->rk.dname,
2046 nmlen = vq->ds_rrset->rk.dname_len -
2049 vq->ds_rrset->rk.dname, nmlen);
2056 vq->ds_rrset->rk.dname = nm;
2057 vq->ds_rrset->rk.dname_len = nmlen;
2068 if(!generate_request(qstate, id, vq->ds_rrset->rk.dname,
2069 vq->ds_rrset->rk.dname_len, LDNS_RR_TYPE_DNSKEY,
2500 rrsets[0]->rk.type)==LDNS_RR_TYPE_DNAME) {
2820 ntohs(msg->rep->rrsets[0]->rk.type) == LDNS_RR_TYPE_DLV &&
2821 ntohs(msg->rep->rrsets[0]->rk.rrset_class) == qinfo->qclass &&
2822 query_dname_compare(msg->rep->rrsets[0]->rk.dname,
2833 vq->ds_rrset->rk.dname = (uint8_t*)regional_alloc_init(
2834 qstate->region, vq->ds_rrset->rk.dname,
2835 vq->ds_rrset->rk.dname_len);
2836 if(!vq->ds_rrset->rk.dname) {