• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.10.1/mDNSResponder-561.1.1/mDNSCore/

Lines Matching defs:qname

62     slot = HashSlot(&q->qname);
63 namehash = DomainNameHashValue(&q->qname);
64 cg = CacheGroupForName(m, slot, namehash, &q->qname);
67 LogDNSSEC("NSECParentForQuestion: Cannot find cg for %##s (%s)", q->qname.c, DNSTypeName(q->qtype));
317 // Empty Non-Terminal (ENT): if the qname is bigger than nsec owner's name and a
318 // subdomain of the nsec's nxt field, then the qname is a empty non-terminal. For
327 mDNSlocal mDNSBool NSECAnswersENT(const ResourceRecord *const rr, domainname *qname)
335 // Is the owner name smaller than qname?
336 ret = DNSSECCanonicalOrder(oname, qname, mDNSNULL);
339 // Is the next domain field a subdomain of qname ?
340 ret = DNSSECCanonicalOrder(nxt, qname, &subdomain);
346 " qname %##s, NSEC %##s", qname->c, rr->name->c);
354 mDNSlocal const domainname *NSECClosestEncloser(ResourceRecord *rr, domainname *qname)
361 match1 = CountLabelsMatch(oname, qname);
362 match2 = CountLabelsMatch(nxt, qname);
528 // 1) We used a wildcard because the qname does not exist, so verify
529 // that the qname does not exist
546 LogMsg("WildcardAnswerProof: Can't find NSEC Parent for %##s (%s)", q.qname.c, DNSTypeName(q.qtype));
577 LogDNSSEC("WildcardAnswerProof: NSEC3 wildcard proof failed for %##s (%s)", q.qname.c, DNSTypeName(q.qtype));
587 LogMsg("WildcardAnswerProof: ERROR!! Closest Encloser NULL for %##s (%s)", q.qname.c, DNSTypeName(q.qtype));
592 LogMsg("WildcardAnswerProof: ERROR!! Closest Encloser %##s does not match wildcard name %##s", q.qname.c, dv->wildcardName->c);
624 // NSEC and another NSEC proving that the qname does not exist. We are called with one
637 LogDNSSEC("NSECNoDataError: Parent side NSEC %s, can't use for child qname %##s (%s)",
646 LogDNSSEC("NSECNoDataError: Child side NSEC %s, can't use for parent qname %##s (%s)",
674 // closest encloser and the qname should be a subdomain i.e if the wildcard
675 // is *.x.example, x.example is the closest encloser and the qname should be
692 LogDNSSEC("NSECNoDataError: Child side wildcard NSEC %s, can't use for parent qname %##s (%s)",
700 LogDNSSEC("NSECNoDataError: Parent side wildcard NSEC %s, can't use for child qname %##s (%s)",
750 LogMsg("NoDataNSECCallback: Can't find NSEC Parent for %##s (%s)", pdv->q.qname.c, DNSTypeName(pdv->q.qtype));
805 LogMsg("NameErrorNSECCallback: Can't find NSEC Parent for %##s (%s)", pdv->q.qname.c, DNSTypeName(pdv->q.qtype));
826 // that qname does not exist.
848 if (NSECNoDataError(m, &cr->resrec, &dv->q.qname, dv->q.qtype, &wildcard))
854 RRDisplayString(m, &(*rp)->resrec), dv->q.qname.c, DNSTypeName(dv->q.qtype));
860 RRDisplayString(m, &(*rp)->resrec), dv->q.qname.c, DNSTypeName(dv->q.qtype));
864 if (!NSECNameExists(m, &cr->resrec, &dv->q.qname, dv->q.qtype))
867 RRDisplayString(m, &(*rp)->resrec), dv->q.qname.c, DNSTypeName(dv->q.qtype));
870 ce = NSECClosestEncloser(&cr->resrec, &dv->q.qname);
879 LogDNSSEC("NoDataProof: No valid NSECs for %##s (%s)", dv->q.qname.c, DNSTypeName(dv->q.qtype));
890 LogMsg("NoDataProof: Cannot prove that the name %##s (%s) does not exist", dv->q.qname.c, DNSTypeName(dv->q.qtype));
935 mDNSlocal mDNSBool NSECNoWildcard(mDNS *const m, ResourceRecord *rr, domainname *qname, mDNSu16 qtype)
952 ce = NSECClosestEncloser(rr, qname);
953 if (!ce) { LogMsg("NSECNoWildcard: No closest encloser for rr %s, qname %##s (%s)", qname->c, DNSTypeName(qtype)); return mDNSfalse; }
960 LogMsg("NSECNoWildcard: ERROR!! Can't append domainname closest encloser name %##s, qname %##s (%s)", ce->c, qname->c, DNSTypeName(qtype));
965 LogDNSSEC("NSECNoWildcard: Wildcard name %##s exists or not valid qname %##s (%s)", wild.c, qname->c, DNSTypeName(qtype));
968 LogDNSSEC("NSECNoWildcard: Wildcard name %##s does not exist for record %s, qname %##s (%s)", wild.c,
969 RRDisplayString(m, rr), qname->c, DNSTypeName(qtype));
974 // that qname does not exist.
982 // NXDOMAIN Error. We need to prove that the qname does not exist and there
991 if (!NSECNameExists(m, &cr->resrec, &dv->q.qname, dv->q.qtype))
994 RRDisplayString(m, &(*rp)->resrec), dv->q.qname.c, DNSTypeName(dv->q.qtype));
1000 if (NSECNoWildcard(m, &cr->resrec, &dv->q.qname, dv->q.qtype))
1005 RRDisplayString(m, &(*rp)->resrec), dv->q.qname.c, DNSTypeName(dv->q.qtype));
1012 LogMsg("NameErrorProof: Proof failed for %##s (%s) noname %p, wild %p", dv->q.qname.c, DNSTypeName(dv->q.qtype), nsec_noname, nsec_wild);
1017 // Sometimes a single NSEC can prove both that the "qname" does not exist and a wildcard
1018 // could not have produced qname. These are a few examples where this can happen.
1115 AssignDomainName(&trigger, &dv->q.qname);
1133 LogDNSSEC("StartInsecureProof: Aborting insecure proof for %##s (%s)", dv->q.qname.c, DNSTypeName(dv->q.qtype));
1138 LogDNSSEC("StartInsecureProof for %##s (%s)", dv->q.qname.c, DNSTypeName(dv->q.qtype));
1172 LogDNSSEC("ValidateWithNSECS: Starting insecure proof: name %##s ac %p, key %p, parent %p", dv->q.qname.c,
1205 LogDNSSEC("ValidateWithNSECS: dv parent set for %##s (%s)", dv->q.qname.c, DNSTypeName(dv->q.qtype));