Lines Matching refs:dname

110  * res_findzonecut(res, dname, class, zname, zsize, addrs, naddrs)
111 * find enclosing zone for a <dname,class>, and some server addresses
114 * dname - domain name whose enclosing zone is desired
115 * class - class of dname (and its enclosing zone)
129 * we start by asking for an SOA<dname,class>. if we get one as an
130 * answer, that just means <dname,class> is a zone top, which is fine.
143 * match our dname (since that would have been returned in the answer
144 * section). an authority section SOA has to be "above" our dname.
148 * ripping labels off the front of our dname -- this is known as "doing
162 res_findzonecut(res_state statp, const char *dname, ns_class class, int opts,
175 result = res_findzonecut2(statp, dname, class, opts, zname, zsize,
186 res_findzonecut2(res_state statp, const char *dname, ns_class class, int opts,
195 DPRINTF(("START dname='%s' class=%s, zsize=%ld, naddrs=%d",
196 dname, p_class(class), (long)zsize, naddrs));
204 if ((n = get_soa(statp, dname, class, opts, zname, zsize,
276 get_soa(res_state statp, const char *dname, ns_class class, int opts,
291 /* First canonicalize dname (exactly one unescaped trailing "."). */
292 if (ns_makecanon(dname, tname, sizeof tname) < 0)
294 dname = tname;
299 while (*dname == '.')
300 dname++;
303 n = do_query(statp, dname, class, ns_t_soa, resp, &msg);
306 dname, p_class(class), n));
343 if (ns_samedomain(dname, t) == 0) {
345 dname, t));
351 if (ns_samename(dname, t) == 1 ||
352 ns_samedomain(dname, t) == 0) {
354 dname, t));
385 if (*dname == '\0')
389 while (*dname != '.') {
390 if (*dname == '\\')
391 if (*++dname == '\0') {
395 dname++;
642 find_ns(rrset_ns *nsrrsp, const char *dname) {
646 if (ns_samename(nsrr->name, dname) == 1)
652 do_query(res_state statp, const char *dname, ns_class class, ns_type qtype,
658 n = res_nmkquery(statp, ns_o_query, dname, class, qtype,