• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.9.5/mDNSResponder-522.92.1/mDNSCore/

Lines Matching defs:wildcard

41 // NSEC records are also used for wildcard expanded answer in which case they are cached with the cache record
324 // This function is normally called before checking for wildcard matches. If you
325 // find this NSEC, there is no need to look for a wildcard record
513 // If the answer was result of a wildcard match, then this function proves
514 // that a proper wildcard was used to answer the question and that the
528 // 1) We used a wildcard because the qname does not exist, so verify
531 // 2) Is the wildcard the right one ?
577 LogDNSSEC("WildcardAnswerProof: NSEC3 wildcard proof failed for %##s (%s)", q.qname.c, DNSTypeName(q.qtype));
592 LogMsg("WildcardAnswerProof: ERROR!! Closest Encloser %##s does not match wildcard name %##s", q.qname.c, dv->wildcardName->c);
610 mDNSlocal mDNSBool NSECNoDataError(mDNS *const m, ResourceRecord *rr, domainname *name, mDNSu16 qtype, domainname **wildcard)
614 if (wildcard) *wildcard = mDNSNULL;
622 // section 3.1.3.4 : No exact match for the name but there is a wildcard that could match
623 // the name but not the type. There are two NSECs in this case. One of them is a wildcard
661 // Name does not exist. Before we check for a wildcard match, make sure that
669 // Wildcard check. If this is a wildcard NSEC, then check to see if we could
670 // have answered the question using this wildcard and it should not have the
674 // closest encloser and the qname should be a subdomain i.e if the wildcard
687 LogMsg("NSECNoDataError: ERROR!! qtype %s exists in wildcard %s", DNSTypeName(qtype), RRDisplayString(m, rr));
692 LogDNSSEC("NSECNoDataError: Child side wildcard NSEC %s, can't use for parent qname %##s (%s)",
700 LogDNSSEC("NSECNoDataError: Parent side wildcard NSEC %s, can't use for child qname %##s (%s)",
704 *wildcard = (domainname *)ce;
705 LogDNSSEC("NSECNoDataError: qtype %s does not exist in wildcard %s", DNSTypeName(qtype), RRDisplayString(m, rr));
830 domainname *wildcard = mDNSNULL;
836 // wildcard that matches the name but no type. This is done by NSECNoDataError.
838 // If it is the case of wildcard, there are two NSECs. One is the wildcard NSEC and
841 wildcard = mDNSNULL;
848 if (NSECNoDataError(m, &cr->resrec, &dv->q.qname, dv->q.qtype, &wildcard))
850 if (wildcard)
868 // If we have a wildcard, then we should check to see if the closest
869 // encloser is the same as the wildcard.
885 // If we have a wildcard, then we should have a "ce" which matches the wildcard
886 // If we don't have a wildcard, then we should have proven that the name does not
888 if (wildcard && !ce)
893 if (wildcard && !SameDomainName(wildcard, ce))
895 LogMsg("NoDataProof: wildcard %##s does not match closest encloser %##s", wildcard->c, ce->c);
912 // First verify wildcard NSEC and then when we are done, we
948 // exists, it would return the NSEC at that name. And the wildcard name at the
983 // is no wildcard that can be used to answer the question.
995 // If we have a wildcard, then we should check to see if the closest
996 // encloser is the same as the wildcard.
1004 LogDNSSEC("NameErrorProof: NSEC %s proves wildcard cannot answer question for %##s (%s)",
1016 // First verify wildcard NSEC and then when we are done, we will verify the noname nsec.
1017 // Sometimes a single NSEC can prove both that the "qname" does not exist and a wildcard