/freebsd-13-stable/contrib/ldns/ |
H A D | rr_functions.c | 387 ldns_rr_soa_increment(ldns_rr *soa) argument 389 ldns_rr_soa_increment_func_data(soa, ldns_soa_serial_increment, NULL); 393 ldns_rr_soa_increment_func(ldns_rr *soa, ldns_soa_serial_increment_func_t f) argument 395 ldns_rr_soa_increment_func_data(soa, f, NULL); 399 ldns_rr_soa_increment_func_data(ldns_rr *soa, argument 403 if ( !soa || !f || ldns_rr_get_type(soa) != LDNS_RR_TYPE_SOA 404 || !ldns_rr_rdf(soa, 2)) { 408 soa 412 ldns_rr_rdf(soa, 422 ldns_rr_soa_increment_func_int(ldns_rr *soa, ldns_soa_serial_increment_func_t f, int data) argument [all...] |
H A D | resolver.c | 1263 ldns_rr* soa = NULL; local 1276 soa = ldns_rr_new(); 1278 if (!soa) { 1283 ldns_rr_free(soa); 1286 ldns_rr_set_owner(soa, owner_rdf); 1287 ldns_rr_set_type(soa, LDNS_RR_TYPE_SOA); 1288 ldns_rr_set_class(soa, c); 1289 ldns_rr_set_question(soa, false); 1291 ldns_rr_free(soa); 1293 } else ldns_rr_push_rdf(soa, mname_rd [all...] |
H A D | dnssec_sign.c | 800 ldns_dnssec_rrsets *soa; local 805 soa = ldns_dnssec_name_find_rrset(zone->soa, LDNS_RR_TYPE_SOA); 810 if (soa && soa->rrs && soa->rrs->rr 811 && (ldns_rr_rdf(soa->rrs->rr, 6) != NULL)) { 812 nsec_ttl = ldns_rdf2native_int32(ldns_rr_rdf(soa->rrs->rr, 6)); 889 ldns_dnssec_rrsets *soa; local 899 soa [all...] |
H A D | dnssec_zone.c | 573 zone->soa = NULL; 975 zone->soa = cur_name; 1010 if (zone->soa) { 1014 zone->soa)); 1019 zone->soa, 1057 if (zone->soa && zone->soa->name) { 1058 soa_label_count = ldns_dname_label_count(zone->soa->name); 1179 if (ldns_dnssec_name_find_rrset(zone->soa, LDNS_RR_TYPE_NSEC3PARAM)) {
|
H A D | zone.c | 29 ldns_zone_set_soa(ldns_zone *z, ldns_rr *soa) argument 31 z->_soa = soa; 202 bool soa_seen = false; /* 2 soa are an error */ 240 /* set origin to soa if not specified */
|
H A D | packet.c | 984 ldns_rr_class rr_class, uint16_t flags, ldns_rr *soa) 986 ldns_rr* authsoa_rr = soa; 1051 uint16_t flags, ldns_rr* soa) 1053 ldns_rr* authsoa_rr = soa; 983 ldns_pkt_ixfr_request_new_frm_str(ldns_pkt **p, const char *name, ldns_rr_class rr_class, uint16_t flags, ldns_rr *soa) argument 1050 ldns_pkt_ixfr_request_new(ldns_rdf *rr_name, ldns_rr_class rr_class, uint16_t flags, ldns_rr* soa) argument
|
/freebsd-13-stable/contrib/ldns/ldns/ |
H A D | rr_functions.h | 269 * Function to be used with dns_rr_soa_increment_func_int, to set the soa 277 * Function to be used with dns_rr_soa_increment_func, to increment the soa 285 * Function to be used with dns_rr_soa_increment_func_int, to increment the soa 294 * ldns_rr_soa_increment_func_int to set the soa serial to the number of 307 * ldns_rr_soa_increment_func_int to set the soa serial to the current date 320 * \param[in] soa The soa rr to be incremented 323 ldns_rr *soa); 329 * \param[in] soa The soa r [all...] |
H A D | zone.h | 44 /** the soa defines a zone */ 59 * Return the soa record of a zone 61 * \return the soa record in the zone 73 * Set the zone's soa record 74 * \param[in] z the zone to put the new soa in 75 * \param[in] soa the soa to set 77 void ldns_zone_set_soa(ldns_zone *z, ldns_rr *soa); 90 * \param[in] z the zone to put the new soa in 160 * Frees the allocated memory for the zone, the soa r [all...] |
H A D | dnssec_zone.h | 93 ldns_dnssec_name *soa; member in struct:ldns_struct_dnssec_zone
|
H A D | packet.h | 782 * \param[in] soa soa record to be added to the authority section (not copied). 785 ldns_status ldns_pkt_ixfr_request_new_frm_str(ldns_pkt **p, const char *rr_name, ldns_rr_class rr_class, uint16_t flags, ldns_rr* soa); 805 * \param[in] soa soa record to be added to the authority section (not copied). 808 ldns_pkt *ldns_pkt_ixfr_request_new(ldns_rdf *rr_name, ldns_rr_class rr_class, uint16_t flags, ldns_rr* soa);
|
/freebsd-13-stable/contrib/unbound/validator/ |
H A D | val_neg.c | 881 struct ub_packed_rrset_key* soa; local 890 if((soa = reply_find_soa(rep))) { 891 dname = soa->rk.dname; 892 dname_len = soa->rk.dname_len; 893 rrset_class = ntohs(soa->rk.rrset_class); 1324 /* capacity=3: ce + nc + soa(if needed) */ 1350 struct ub_packed_rrset_key* soa; local 1364 soa = rrset_cache_lookup(rrset_cache, nm, nmlen, LDNS_RR_TYPE_SOA, 1366 if(!soa) 1368 if(!dns_msg_authadd(msg, region, soa, no [all...] |
/freebsd-13-stable/contrib/unbound/services/ |
H A D | localzone.h | 160 struct ub_packed_rrset_key* soa; member in struct:local_zone
|
H A D | authzone.c | 1707 struct auth_rrset* soa = az_domain_rrset(n, LDNS_RR_TYPE_SOA); local 1708 if(soa) { 1709 if(!auth_zone_write_rrset(z, n, soa, out)) 1768 struct auth_rrset* soa; local 1772 soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA); 1773 if(!soa || soa->data->count==0) 1775 if(soa->data->rr_len[0] < 2+4*5) return 0; /* SOA too short */ 1776 d = soa->data; 1781 /** Find auth_zone SOA and populate the values in xfr(soa value 1786 struct auth_rrset* soa; local 2337 struct auth_rrset* soa; local [all...] |
H A D | localzone.c | 485 z->soa = soa_rrset; 1595 if(z->soa && z->soa_negative) 1652 if(z->soa && z->soa_negative) 2089 /* did we delete the soa record ? */ 2091 z->soa = NULL;
|
/freebsd-13-stable/sys/kern/ |
H A D | uipc_usrreq.c | 2610 struct socket *so, *soa; local 2618 TAILQ_FOREACH(soa, &so->sol_comp, so_list) { 2619 if (sotounpcb(soa)->unp_gcflag & UNPGC_IGNORE_RIGHTS) 2621 SOCKBUF_LOCK(&soa->so_rcv); 2622 unp_scan(soa->so_rcv.sb_mb, op); 2623 SOCKBUF_UNLOCK(&soa->so_rcv);
|
/freebsd-13-stable/crypto/heimdal/lib/roken/ |
H A D | resolve.c | 65 DECL(soa),
|