Searched refs:rrsets (Results 1 - 24 of 24) sorted by relevance

/freebsd-10-stable/contrib/ldns/
H A Ddnssec_zone.c117 ldns_dnssec_rrsets_free_internal(ldns_dnssec_rrsets *rrsets, int deep) argument
119 if (rrsets) {
120 if (rrsets->rrs) {
121 ldns_dnssec_rrs_free_internal(rrsets->rrs, deep);
123 if (rrsets->next) {
124 ldns_dnssec_rrsets_free_internal(rrsets->next, deep);
126 if (rrsets->signatures) {
127 ldns_dnssec_rrs_free_internal(rrsets->signatures, deep);
129 LDNS_FREE(rrsets);
134 ldns_dnssec_rrsets_free(ldns_dnssec_rrsets *rrsets) argument
140 ldns_dnssec_rrsets_deep_free(ldns_dnssec_rrsets *rrsets) argument
146 ldns_dnssec_rrsets_type(ldns_dnssec_rrsets *rrsets) argument
156 ldns_dnssec_rrsets_set_type(ldns_dnssec_rrsets *rrsets, ldns_rr_type type) argument
193 ldns_dnssec_rrsets_add_rr(ldns_dnssec_rrsets *rrsets, ldns_rr *rr) argument
273 ldns_dnssec_rrsets_print_soa_fmt(FILE *out, const ldns_output_format *fmt, ldns_dnssec_rrsets *rrsets, bool follow, bool show_soa) argument
302 ldns_dnssec_rrsets_print_fmt(FILE *out, const ldns_output_format *fmt, ldns_dnssec_rrsets *rrsets, bool follow) argument
310 ldns_dnssec_rrsets_print(FILE *out, ldns_dnssec_rrsets *rrsets, bool follow) argument
[all...]
H A Ddnssec_sign.c532 * Pushes all rrs from the rrsets of type A and AAAA on gluelist.
615 name->rrsets, LDNS_RR_TYPE_SOA)) {
619 name->rrsets, glue_list);
636 name->rrsets, LDNS_RR_TYPE_NS)
638 name->rrsets, LDNS_RR_TYPE_SOA)) {
643 name->rrsets, glue_list);
649 name->rrsets, LDNS_RR_TYPE_DNAME)) {
848 if (!current_name->rrsets) {
1096 cur_name->rrsets, LDNS_RR_TYPE_NS)
1098 cur_name->rrsets, LDNS_RR_TYPE_SO
[all...]
H A Ddnssec.c767 ldns_dnssec_rrsets_contains_type(ldns_dnssec_rrsets *rrsets, argument
770 ldns_dnssec_rrsets *cur_rrset = rrsets;
801 from->rrsets, LDNS_RR_TYPE_NS)
803 from->rrsets, LDNS_RR_TYPE_SOA);
805 cur_rrsets = from->rrsets;
807 /* Do not include non-authoritative rrsets on the delegation point
875 from->rrsets, LDNS_RR_TYPE_NS)
877 from->rrsets, LDNS_RR_TYPE_SOA);
878 cur_rrsets = from->rrsets;
880 /* Do not include non-authoritative rrsets o
[all...]
/freebsd-10-stable/contrib/unbound/validator/
H A Dval_utils.c79 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA)
81 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_DS)
83 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS)
91 ntohs(rep->rrsets[0]->rk.type) == LDNS_RR_TYPE_NS &&
92 query_dname_compare(rep->rrsets[0]->rk.dname,
119 ntohs(rep->rrsets[i]->rk.type) == qinf->qtype)
121 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_CNAME)
224 rep->rrsets[i]->rk.dname) == 0) {
225 val_find_rrset_signer(rep->rrsets[i],
235 val_find_rrset_signer(rep->rrsets[
[all...]
H A Dval_nsec.c240 /* verify NSEC rrsets in auth section */
243 if(rep->rrsets[i]->rk.type != htons(LDNS_RR_TYPE_NSEC))
245 if(!nsec_verify_rrset(env, ve, rep->rrsets[i], kkey, reason)) {
250 if(nsec_proves_nodata(rep->rrsets[i], qinfo, &wc)) {
253 *proof_ttl = rrset_get_ttl(rep->rrsets[i]);
254 if(wc && dname_is_wild(rep->rrsets[i]->rk.dname))
255 wc_nsec = rep->rrsets[i];
258 if(val_nsec_proves_name_error(rep->rrsets[i], qinfo->qname)) {
260 rep->rrsets[i]);
581 if(htons(rep->rrsets[
[all...]
H A Dvalidator.c231 vq->chase_reply->rrsets = regional_alloc_init(qstate->region,
232 vq->orig_msg->rep->rrsets, sizeof(struct ub_packed_rrset_key*)
234 if(!vq->chase_reply->rrsets)
435 * Validate if the ANSWER and AUTHORITY sections contain valid rrsets.
437 * Tries to validate ADDITIONAL rrsets as well, but only to check them.
451 * @return false if any of the rrsets in the an or ns sections of the message
468 s = chase_reply->rrsets[i];
513 s = chase_reply->rrsets[i];
529 /* attempt to validate the ADDITIONAL section rrsets */
534 s = chase_reply->rrsets[
[all...]
H A Dval_neg.c329 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NSEC) {
330 d = rep->rrsets[i]->rk.dname;
331 len = rep->rrsets[i]->rk.dname_len;
569 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA)
570 return rep->rrsets[i];
583 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NSEC) {
584 d = (struct packed_rrset_data*)rep->rrsets[i]->
878 if(ntohs(rep->rrsets[i]->rk.type) != LDNS_RR_TYPE_NSEC)
880 if(!dname_subdomain_c(rep->rrsets[i]->rk.dname,
883 neg_insert_data(neg, zone, rep->rrsets[
[all...]
/freebsd-10-stable/contrib/ldns/ldns/
H A Ddnssec_zone.h61 * The rrsets for this name
63 ldns_dnssec_rrsets *rrsets; member in struct:ldns_struct_dnssec_name
76 * Names that contain other occluded rrsets and records with glue on
163 * Frees the list of rrsets and their rrs, but *not* the ldns_rr
166 * \param[in] rrsets the data structure to free
168 void ldns_dnssec_rrsets_free(ldns_dnssec_rrsets *rrsets);
171 * Frees the list of rrsets and their rrs, and the ldns_rr
174 * \param[in] rrsets the data structure to free
176 void ldns_dnssec_rrsets_deep_free(ldns_dnssec_rrsets *rrsets);
181 * \param[in] rrsets th
[all...]
H A Ddnssec.h215 * returns whether a rrset of the given type is found in the rrsets.
217 * \param[in] rrsets the rrsets to be tested
222 ldns_dnssec_rrsets_contains_type (ldns_dnssec_rrsets *rrsets, ldns_rr_type type);
/freebsd-10-stable/contrib/unbound/services/cache/
H A Ddns.c55 /** store rrsets in the rrset cache.
57 * @param rep: contains list of rrsets to store.
60 * This makes rrsets (other than type NS) timeout sooner so they get
66 * @param qrep: update rrsets here if cache is better
77 rep->ref[i].key = rep->rrsets[i];
78 rep->ref[i].id = rep->rrsets[i]->id;
97 qrep->rrsets[i] = ck;
102 rep->rrsets[i] = rep->ref[i].key;
118 rep->ref[i].key = rep->rrsets[i];
119 rep->ref[i].id = rep->rrsets[
[all...]
/freebsd-10-stable/contrib/unbound/util/data/
H A Dmsgreply.c56 /** MAX TTL default for messages and rrsets */
58 /** MIN TTL default for messages and rrsets */
111 rep->rrsets = (struct ub_packed_rrset_key**)&(rep->ref[0]);
112 else rep->rrsets = (struct ub_packed_rrset_key**)&(rep->ref[total]);
114 memset( rep->rrsets, 0, sizeof(struct ub_packed_rrset_key*) * total);
141 rep->rrsets[i] = (struct ub_packed_rrset_key*)
144 if(rep->rrsets[i]) {
145 memset(rep->rrsets[i], 0,
147 rep->rrsets[i]->entry.key = rep->rrsets[
[all...]
H A Dmsgreply.h158 * List of pointers (only) to the rrsets in the order in which
164 struct ub_packed_rrset_key** rrsets; member in struct:reply_info
207 * @return the reply_info base struct with the array for putting the rrsets
247 * Allocate and decompress parsed message and rrsets.
267 * @param rep: reply info. rrsets must be filled in.
273 * @param rep: reply info. rrsets must be filled in.
281 * hashtables.). Returns rrsets to the alloc cache.
323 * Copy reply_info and all rrsets in it and allocate.
H A Dmsgencode.c543 if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i],
556 if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i],
567 if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i],
607 if(ntohs(rep->rrsets[i]->rk.type) == qtype) {
613 if(ntohs(rep->rrsets[i]->rk.type) ==
615 ntohs(rep->rrsets[i]->rk.type) ==
/freebsd-10-stable/contrib/unbound/iterator/
H A Diter_resptype.c72 struct ub_packed_rrset_key* s = msg->rep->rrsets[i];
125 s = msg->rep->rrsets[i];
156 s = msg->rep->rrsets[i];
211 s = msg->rep->rrsets[i];
229 s = msg->rep->rrsets[i];
H A Diter_utils.c639 if(((struct packed_rrset_data*)msg->rep->rrsets[i]->
667 struct ub_packed_rrset_key* s = msg->rep->rrsets[i];
696 * check equality of two rrsets
750 if(!rrset_equal(p->rrsets[i], q->rrsets[i])) {
751 if(!rrset_canonical_equal(region, p->rrsets[i],
752 q->rrsets[i])) {
782 struct ub_packed_rrset_key* s = rep->rrsets[i];
790 rep->rrsets[i]=rep->rrsets[re
[all...]
H A Diterator.c349 verbose(VERB_ALGO, "prepending %d rrsets", (int)num_an + (int)num_ns);
361 memcpy(sets+num_an, msg->rep->rrsets, msg->rep->an_numrrsets *
368 msg->rep->rrsets+msg->rep->an_numrrsets,
374 msg->rep->rrsets + msg->rep->an_numrrsets,
383 msg->rep->rrsets = sets;
460 /* Iterate over the ANSWER rrsets in order, looking for CNAMEs and
463 struct ub_packed_rrset_key* r = msg->rep->rrsets[i];
483 /* Other rrsets in the section are ignored. */
485 /* add authority rrsets to authority prepend, for wildcarded CNAMEs */
488 struct ub_packed_rrset_key* r = msg->rep->rrsets[
[all...]
H A Diter_delegpt.c326 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS)
327 return rep->rrsets[i];
365 struct ub_packed_rrset_key* s = msg->rep->rrsets[i];
/freebsd-10-stable/contrib/unbound/dns64/
H A Ddns64.c422 rep->rrsets[i] = (struct ub_packed_rrset_key*)
425 if(rep->rrsets[i]) {
426 memset(rep->rrsets[i], 0,
428 rep->rrsets[i]->entry.key = rep->rrsets[i];
431 else return 0;/* rep->rrsets[i] = alloc_special_obtain(alloc);*/
432 if(!rep->rrsets[i])
434 rep->rrsets[i]->entry.data = NULL;
715 fk = rep->rrsets[i];
716 dk = cp->rrsets[
[all...]
/freebsd-10-stable/contrib/unbound/services/
H A Dlocalzone.h141 /** the data rrsets, with different types, linked list.
143 struct local_rrset* rrsets; member in struct:local_data
H A Dlocalzone.c280 for(p = data->rrsets; p; p = p->next) {
312 rrset->next = node->rrsets;
313 node->rrsets = rrset;
892 for(p = d->rrsets; p; p = p->next) {
967 rep.rrsets = &rrset;
1072 if(ld && ld->rrsets) {
1297 while(d && d->rrsets == NULL && is_terminal(d)) {
1331 d->rrsets = NULL;
/freebsd-10-stable/contrib/unbound/daemon/
H A Dcachedump.c184 /* rrsets have timed out or do not exist */
210 if(!dump_msg_ref(ssl, d->rrsets[i])) {
234 (*d)->rrsets = (struct ub_packed_rrset_key**)(void *)(
656 log_warn("error too many rrsets");
663 rep.rrsets = (struct ub_packed_rrset_key**)regional_alloc_zero(
668 if(!load_ref(ssl, buf, worker, region, &rep.rrsets[i],
793 struct ub_packed_rrset_key* k = msg->rep->rrsets[i];
H A Dworker.c93 * seconds to add to prefetch leeway. This is a TTL that expires old rrsets
96 * the message to be updated(and replaced), that rrsets with up to this much
422 s = ((struct packed_rrset_data*)rep->rrsets[i]->entry.data)
429 s = ((struct packed_rrset_data*)rep->rrsets[i]->entry.data)
446 s = ((struct packed_rrset_data*)rep->rrsets[i]->entry.data)
449 memmove(rep->rrsets+i, rep->rrsets+i+1,
472 * so that iterator can prime and validator can verify rrsets.
492 /* some rrsets have not been verified yet, go and
497 /* some rrsets ar
[all...]
H A Dremote.c1266 /** number of rrsets removed */
1341 /** callback to delete rrsets in a zone */
1390 /** remove all rrsets and keys from zone from cache */
1424 (void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
1429 /** callback to delete bogus rrsets */
1468 /** remove all bogus rrsets, msgs and keys from cache */
1491 (void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
1496 /** callback to delete negative and servfail rrsets */
1504 /* delete the parentside negative cache rrsets,
1505 * these are namerserver rrsets tha
[all...]
/freebsd-10-stable/contrib/unbound/libunbound/
H A Dlibworker.c489 (struct packed_rrset_data*)rep->rrsets[j]->

Completed in 294 milliseconds