/freebsd-11-stable/contrib/ldns/ |
H A D | rr_functions.c | 379 ldns_rr_soa_increment(ldns_rr *soa) argument 381 ldns_rr_soa_increment_func_data(soa, ldns_soa_serial_increment, NULL); 385 ldns_rr_soa_increment_func(ldns_rr *soa, ldns_soa_serial_increment_func_t f) argument 387 ldns_rr_soa_increment_func_data(soa, f, NULL); 391 ldns_rr_soa_increment_func_data(ldns_rr *soa, argument 395 if ( !soa || !f || ldns_rr_get_type(soa) != LDNS_RR_TYPE_SOA 396 || !ldns_rr_rdf(soa, 2)) { 400 soa 404 ldns_rr_rdf(soa, 414 ldns_rr_soa_increment_func_int(ldns_rr *soa, ldns_soa_serial_increment_func_t f, int data) argument [all...] |
H A D | dnssec_sign.c | 708 ldns_dnssec_rrsets *soa; local 713 soa = ldns_dnssec_name_find_rrset(zone->soa, LDNS_RR_TYPE_SOA); 718 if (soa && soa->rrs && soa->rrs->rr 719 && (ldns_rr_rdf(soa->rrs->rr, 6) != NULL)) { 720 nsec_ttl = ldns_rdf2native_int32(ldns_rr_rdf(soa->rrs->rr, 6)); 797 ldns_dnssec_rrsets *soa; local 807 soa [all...] |
H A D | dnssec_zone.c | 573 zone->soa = NULL; 928 zone->soa = cur_name; 963 if (zone->soa) { 967 zone->soa)); 972 zone->soa, 1009 if (zone->soa && zone->soa->name) { 1010 soa_label_count = ldns_dname_label_count(zone->soa->name); 1100 if (ldns_dnssec_name_find_rrset(zone->soa, LDNS_RR_TYPE_NSEC3PARAM)) {
|
H A D | zone.c | 29 ldns_zone_set_soa(ldns_zone *z, ldns_rr *soa) argument 31 z->_soa = soa; 203 bool soa_seen = false; /* 2 soa are an error */ 241 /* set origin to soa if not specified */
|
H A D | packet.c | 976 ldns_rr_class rr_class, uint16_t flags, ldns_rr *soa) 978 ldns_rr* authsoa_rr = soa; 1043 uint16_t flags, ldns_rr* soa) 1045 ldns_rr* authsoa_rr = soa; 975 ldns_pkt_ixfr_request_new_frm_str(ldns_pkt **p, const char *name, ldns_rr_class rr_class, uint16_t flags, ldns_rr *soa) argument 1042 ldns_pkt_ixfr_request_new(ldns_rdf *rr_name, ldns_rr_class rr_class, uint16_t flags, ldns_rr* soa) argument
|
/freebsd-11-stable/contrib/ldns/ldns/ |
H A D | rr_functions.h | 269 * Function to be used with dns_rr_soa_increment_func_int, to set the soa 277 * Function to be used with dns_rr_soa_increment_func, to increment the soa 285 * Function to be used with dns_rr_soa_increment_func_int, to increment the soa 294 * ldns_rr_soa_increment_func_int to set the soa serial to the number of 307 * ldns_rr_soa_increment_func_int to set the soa serial to the current date 320 * \param[in] soa The soa rr to be incremented 323 ldns_rr *soa); 329 * \param[in] soa The soa r [all...] |
H A D | zone.h | 44 /** the soa defines a zone */ 59 * Return the soa record of a zone 61 * \return the soa record in the zone 73 * Set the zone's soa record 74 * \param[in] z the zone to put the new soa in 75 * \param[in] soa the soa to set 77 void ldns_zone_set_soa(ldns_zone *z, ldns_rr *soa); 90 * \param[in] z the zone to put the new soa in 160 * Frees the allocated memory for the zone, the soa r [all...] |
H A D | dnssec_zone.h | 93 ldns_dnssec_name *soa; member in struct:ldns_struct_dnssec_zone
|
H A D | packet.h | 780 * \param[in] soa soa record to be added to the authority section 783 ldns_status ldns_pkt_ixfr_request_new_frm_str(ldns_pkt **p, const char *rr_name, ldns_rr_class rr_class, uint16_t flags, ldns_rr* soa); 801 * \param[in] soa soa record to be added to the authority section 804 ldns_pkt *ldns_pkt_ixfr_request_new(ldns_rdf *rr_name, ldns_rr_class rr_class, uint16_t flags, ldns_rr* soa);
|
/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_neg.c | 881 struct ub_packed_rrset_key* soa; local 890 if((soa = reply_find_soa(rep))) { 891 dname = soa->rk.dname; 892 dname_len = soa->rk.dname_len; 893 rrset_class = ntohs(soa->rk.rrset_class); 1324 /* capacity=3: ce + nc + soa(if needed) */ 1350 struct ub_packed_rrset_key* soa; local 1364 soa = rrset_cache_lookup(rrset_cache, nm, nmlen, LDNS_RR_TYPE_SOA, 1366 if(!soa) 1368 if(!dns_msg_authadd(msg, region, soa, no [all...] |
/freebsd-11-stable/contrib/unbound/services/ |
H A D | localzone.h | 160 struct ub_packed_rrset_key* soa; member in struct:local_zone
|
H A D | authzone.c | 1707 struct auth_rrset* soa = az_domain_rrset(n, LDNS_RR_TYPE_SOA); local 1708 if(soa) { 1709 if(!auth_zone_write_rrset(z, n, soa, out)) 1768 struct auth_rrset* soa; local 1772 soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA); 1773 if(!soa || soa->data->count==0) 1775 if(soa->data->rr_len[0] < 2+4*5) return 0; /* SOA too short */ 1776 d = soa->data; 1781 /** Find auth_zone SOA and populate the values in xfr(soa value 1786 struct auth_rrset* soa; local 2337 struct auth_rrset* soa; local [all...] |
H A D | localzone.c | 485 z->soa = soa_rrset; 1595 if(z->soa && z->soa_negative) 1652 if(z->soa && z->soa_negative) 2089 /* did we delete the soa record ? */ 2091 z->soa = NULL;
|
/freebsd-11-stable/sys/kern/ |
H A D | uipc_usrreq.c | 2283 struct socket *soa; local 2318 TAILQ_FOREACH(soa, &so->so_comp, so_list) { 2319 if ((sotounpcb(soa)->unp_gcflag & UNPGC_IGNORE_RIGHTS) != 0) 2321 SOCKBUF_LOCK(&soa->so_rcv); 2322 unp_scan(soa->so_rcv.sb_mb, unp_accessable); 2323 SOCKBUF_UNLOCK(&soa->so_rcv);
|
/freebsd-11-stable/crypto/heimdal/lib/roken/ |
H A D | resolve.c | 65 DECL(soa),
|