/freebsd-10-stable/contrib/ldns/ |
H A D | dnssec_zone.c | 117 ldns_dnssec_rrsets_free_internal(ldns_dnssec_rrsets *rrsets, int deep) argument 119 if (rrsets) { 120 if (rrsets->rrs) { 121 ldns_dnssec_rrs_free_internal(rrsets->rrs, deep); 123 if (rrsets->next) { 124 ldns_dnssec_rrsets_free_internal(rrsets->next, deep); 126 if (rrsets->signatures) { 127 ldns_dnssec_rrs_free_internal(rrsets->signatures, deep); 129 LDNS_FREE(rrsets); 134 ldns_dnssec_rrsets_free(ldns_dnssec_rrsets *rrsets) argument 140 ldns_dnssec_rrsets_deep_free(ldns_dnssec_rrsets *rrsets) argument 146 ldns_dnssec_rrsets_type(ldns_dnssec_rrsets *rrsets) argument 156 ldns_dnssec_rrsets_set_type(ldns_dnssec_rrsets *rrsets, ldns_rr_type type) argument 193 ldns_dnssec_rrsets_add_rr(ldns_dnssec_rrsets *rrsets, ldns_rr *rr) argument 273 ldns_dnssec_rrsets_print_soa_fmt(FILE *out, const ldns_output_format *fmt, ldns_dnssec_rrsets *rrsets, bool follow, bool show_soa) argument 302 ldns_dnssec_rrsets_print_fmt(FILE *out, const ldns_output_format *fmt, ldns_dnssec_rrsets *rrsets, bool follow) argument 310 ldns_dnssec_rrsets_print(FILE *out, ldns_dnssec_rrsets *rrsets, bool follow) argument [all...] |
H A D | dnssec_sign.c | 532 * Pushes all rrs from the rrsets of type A and AAAA on gluelist. 615 name->rrsets, LDNS_RR_TYPE_SOA)) { 619 name->rrsets, glue_list); 636 name->rrsets, LDNS_RR_TYPE_NS) 638 name->rrsets, LDNS_RR_TYPE_SOA)) { 643 name->rrsets, glue_list); 649 name->rrsets, LDNS_RR_TYPE_DNAME)) { 848 if (!current_name->rrsets) { 1096 cur_name->rrsets, LDNS_RR_TYPE_NS) 1098 cur_name->rrsets, LDNS_RR_TYPE_SO [all...] |
H A D | dnssec.c | 767 ldns_dnssec_rrsets_contains_type(ldns_dnssec_rrsets *rrsets, argument 770 ldns_dnssec_rrsets *cur_rrset = rrsets; 801 from->rrsets, LDNS_RR_TYPE_NS) 803 from->rrsets, LDNS_RR_TYPE_SOA); 805 cur_rrsets = from->rrsets; 807 /* Do not include non-authoritative rrsets on the delegation point 875 from->rrsets, LDNS_RR_TYPE_NS) 877 from->rrsets, LDNS_RR_TYPE_SOA); 878 cur_rrsets = from->rrsets; 880 /* Do not include non-authoritative rrsets o [all...] |
/freebsd-10-stable/contrib/unbound/validator/ |
H A D | val_utils.c | 79 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA) 81 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_DS) 83 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS) 91 ntohs(rep->rrsets[0]->rk.type) == LDNS_RR_TYPE_NS && 92 query_dname_compare(rep->rrsets[0]->rk.dname, 119 ntohs(rep->rrsets[i]->rk.type) == qinf->qtype) 121 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_CNAME) 224 rep->rrsets[i]->rk.dname) == 0) { 225 val_find_rrset_signer(rep->rrsets[i], 235 val_find_rrset_signer(rep->rrsets[ [all...] |
H A D | val_nsec.c | 240 /* verify NSEC rrsets in auth section */ 243 if(rep->rrsets[i]->rk.type != htons(LDNS_RR_TYPE_NSEC)) 245 if(!nsec_verify_rrset(env, ve, rep->rrsets[i], kkey, reason)) { 250 if(nsec_proves_nodata(rep->rrsets[i], qinfo, &wc)) { 253 *proof_ttl = rrset_get_ttl(rep->rrsets[i]); 254 if(wc && dname_is_wild(rep->rrsets[i]->rk.dname)) 255 wc_nsec = rep->rrsets[i]; 258 if(val_nsec_proves_name_error(rep->rrsets[i], qinfo->qname)) { 260 rep->rrsets[i]); 581 if(htons(rep->rrsets[ [all...] |
H A D | validator.c | 231 vq->chase_reply->rrsets = regional_alloc_init(qstate->region, 232 vq->orig_msg->rep->rrsets, sizeof(struct ub_packed_rrset_key*) 234 if(!vq->chase_reply->rrsets) 435 * Validate if the ANSWER and AUTHORITY sections contain valid rrsets. 437 * Tries to validate ADDITIONAL rrsets as well, but only to check them. 451 * @return false if any of the rrsets in the an or ns sections of the message 468 s = chase_reply->rrsets[i]; 513 s = chase_reply->rrsets[i]; 529 /* attempt to validate the ADDITIONAL section rrsets */ 534 s = chase_reply->rrsets[ [all...] |
H A D | val_neg.c | 329 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NSEC) { 330 d = rep->rrsets[i]->rk.dname; 331 len = rep->rrsets[i]->rk.dname_len; 569 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA) 570 return rep->rrsets[i]; 583 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NSEC) { 584 d = (struct packed_rrset_data*)rep->rrsets[i]-> 878 if(ntohs(rep->rrsets[i]->rk.type) != LDNS_RR_TYPE_NSEC) 880 if(!dname_subdomain_c(rep->rrsets[i]->rk.dname, 883 neg_insert_data(neg, zone, rep->rrsets[ [all...] |
/freebsd-10-stable/contrib/ldns/ldns/ |
H A D | dnssec_zone.h | 61 * The rrsets for this name 63 ldns_dnssec_rrsets *rrsets; member in struct:ldns_struct_dnssec_name 76 * Names that contain other occluded rrsets and records with glue on 163 * Frees the list of rrsets and their rrs, but *not* the ldns_rr 166 * \param[in] rrsets the data structure to free 168 void ldns_dnssec_rrsets_free(ldns_dnssec_rrsets *rrsets); 171 * Frees the list of rrsets and their rrs, and the ldns_rr 174 * \param[in] rrsets the data structure to free 176 void ldns_dnssec_rrsets_deep_free(ldns_dnssec_rrsets *rrsets); 181 * \param[in] rrsets th [all...] |
H A D | dnssec.h | 215 * returns whether a rrset of the given type is found in the rrsets. 217 * \param[in] rrsets the rrsets to be tested 222 ldns_dnssec_rrsets_contains_type (ldns_dnssec_rrsets *rrsets, ldns_rr_type type);
|
/freebsd-10-stable/contrib/unbound/services/cache/ |
H A D | dns.c | 55 /** store rrsets in the rrset cache. 57 * @param rep: contains list of rrsets to store. 60 * This makes rrsets (other than type NS) timeout sooner so they get 66 * @param qrep: update rrsets here if cache is better 77 rep->ref[i].key = rep->rrsets[i]; 78 rep->ref[i].id = rep->rrsets[i]->id; 97 qrep->rrsets[i] = ck; 102 rep->rrsets[i] = rep->ref[i].key; 118 rep->ref[i].key = rep->rrsets[i]; 119 rep->ref[i].id = rep->rrsets[ [all...] |
/freebsd-10-stable/contrib/unbound/util/data/ |
H A D | msgreply.c | 56 /** MAX TTL default for messages and rrsets */ 58 /** MIN TTL default for messages and rrsets */ 111 rep->rrsets = (struct ub_packed_rrset_key**)&(rep->ref[0]); 112 else rep->rrsets = (struct ub_packed_rrset_key**)&(rep->ref[total]); 114 memset( rep->rrsets, 0, sizeof(struct ub_packed_rrset_key*) * total); 141 rep->rrsets[i] = (struct ub_packed_rrset_key*) 144 if(rep->rrsets[i]) { 145 memset(rep->rrsets[i], 0, 147 rep->rrsets[i]->entry.key = rep->rrsets[ [all...] |
H A D | msgreply.h | 158 * List of pointers (only) to the rrsets in the order in which 164 struct ub_packed_rrset_key** rrsets; member in struct:reply_info 207 * @return the reply_info base struct with the array for putting the rrsets 247 * Allocate and decompress parsed message and rrsets. 267 * @param rep: reply info. rrsets must be filled in. 273 * @param rep: reply info. rrsets must be filled in. 281 * hashtables.). Returns rrsets to the alloc cache. 323 * Copy reply_info and all rrsets in it and allocate.
|
H A D | msgencode.c | 543 if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i], 556 if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i], 567 if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i], 607 if(ntohs(rep->rrsets[i]->rk.type) == qtype) { 613 if(ntohs(rep->rrsets[i]->rk.type) == 615 ntohs(rep->rrsets[i]->rk.type) ==
|
/freebsd-10-stable/contrib/unbound/iterator/ |
H A D | iter_resptype.c | 72 struct ub_packed_rrset_key* s = msg->rep->rrsets[i]; 125 s = msg->rep->rrsets[i]; 156 s = msg->rep->rrsets[i]; 211 s = msg->rep->rrsets[i]; 229 s = msg->rep->rrsets[i];
|
H A D | iter_utils.c | 639 if(((struct packed_rrset_data*)msg->rep->rrsets[i]-> 667 struct ub_packed_rrset_key* s = msg->rep->rrsets[i]; 696 * check equality of two rrsets 750 if(!rrset_equal(p->rrsets[i], q->rrsets[i])) { 751 if(!rrset_canonical_equal(region, p->rrsets[i], 752 q->rrsets[i])) { 782 struct ub_packed_rrset_key* s = rep->rrsets[i]; 790 rep->rrsets[i]=rep->rrsets[re [all...] |
H A D | iterator.c | 349 verbose(VERB_ALGO, "prepending %d rrsets", (int)num_an + (int)num_ns); 361 memcpy(sets+num_an, msg->rep->rrsets, msg->rep->an_numrrsets * 368 msg->rep->rrsets+msg->rep->an_numrrsets, 374 msg->rep->rrsets + msg->rep->an_numrrsets, 383 msg->rep->rrsets = sets; 460 /* Iterate over the ANSWER rrsets in order, looking for CNAMEs and 463 struct ub_packed_rrset_key* r = msg->rep->rrsets[i]; 483 /* Other rrsets in the section are ignored. */ 485 /* add authority rrsets to authority prepend, for wildcarded CNAMEs */ 488 struct ub_packed_rrset_key* r = msg->rep->rrsets[ [all...] |
H A D | iter_delegpt.c | 326 if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS) 327 return rep->rrsets[i]; 365 struct ub_packed_rrset_key* s = msg->rep->rrsets[i];
|
/freebsd-10-stable/contrib/unbound/dns64/ |
H A D | dns64.c | 422 rep->rrsets[i] = (struct ub_packed_rrset_key*) 425 if(rep->rrsets[i]) { 426 memset(rep->rrsets[i], 0, 428 rep->rrsets[i]->entry.key = rep->rrsets[i]; 431 else return 0;/* rep->rrsets[i] = alloc_special_obtain(alloc);*/ 432 if(!rep->rrsets[i]) 434 rep->rrsets[i]->entry.data = NULL; 715 fk = rep->rrsets[i]; 716 dk = cp->rrsets[ [all...] |
/freebsd-10-stable/contrib/unbound/services/ |
H A D | localzone.h | 141 /** the data rrsets, with different types, linked list. 143 struct local_rrset* rrsets; member in struct:local_data
|
H A D | localzone.c | 280 for(p = data->rrsets; p; p = p->next) { 312 rrset->next = node->rrsets; 313 node->rrsets = rrset; 892 for(p = d->rrsets; p; p = p->next) { 967 rep.rrsets = &rrset; 1072 if(ld && ld->rrsets) { 1297 while(d && d->rrsets == NULL && is_terminal(d)) { 1331 d->rrsets = NULL;
|
/freebsd-10-stable/contrib/unbound/daemon/ |
H A D | cachedump.c | 184 /* rrsets have timed out or do not exist */ 210 if(!dump_msg_ref(ssl, d->rrsets[i])) { 234 (*d)->rrsets = (struct ub_packed_rrset_key**)(void *)( 656 log_warn("error too many rrsets"); 663 rep.rrsets = (struct ub_packed_rrset_key**)regional_alloc_zero( 668 if(!load_ref(ssl, buf, worker, region, &rep.rrsets[i], 793 struct ub_packed_rrset_key* k = msg->rep->rrsets[i];
|
H A D | worker.c | 93 * seconds to add to prefetch leeway. This is a TTL that expires old rrsets 96 * the message to be updated(and replaced), that rrsets with up to this much 422 s = ((struct packed_rrset_data*)rep->rrsets[i]->entry.data) 429 s = ((struct packed_rrset_data*)rep->rrsets[i]->entry.data) 446 s = ((struct packed_rrset_data*)rep->rrsets[i]->entry.data) 449 memmove(rep->rrsets+i, rep->rrsets+i+1, 472 * so that iterator can prime and validator can verify rrsets. 492 /* some rrsets have not been verified yet, go and 497 /* some rrsets ar [all...] |
H A D | remote.c | 1266 /** number of rrsets removed */ 1341 /** callback to delete rrsets in a zone */ 1390 /** remove all rrsets and keys from zone from cache */ 1424 (void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages " 1429 /** callback to delete bogus rrsets */ 1468 /** remove all bogus rrsets, msgs and keys from cache */ 1491 (void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages " 1496 /** callback to delete negative and servfail rrsets */ 1504 /* delete the parentside negative cache rrsets, 1505 * these are namerserver rrsets tha [all...] |
/freebsd-10-stable/contrib/unbound/libunbound/ |
H A D | libworker.c | 489 (struct packed_rrset_data*)rep->rrsets[j]->
|