| /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/objs/ |
| dns_obj_rr_soa.c | 31 // MARK: - DNSSEC SOA Resource Record Kind Definition 38 DNS_OBJECT_SUBKIND_DEFINE_ABSTRUCT(rr, soa, 44 // MARK: - DNSSEC SOA Resource Record Public Methods 51 dns_obj_rr_soa_t soa = NULL; local 64 soa = obj; 73 return soa;
|
| /src/external/mpl/bind/dist/lib/dns/ |
| soa.c | 1 /* $NetBSD: soa.c,v 1.7 2025/01/26 16:25:25 christos Exp $ */ 26 #include <dns/soa.h> 46 * Locate the field within the SOA RDATA based 65 dns_rdata_soa_t soa; local 74 soa.common.rdtype = dns_rdatatype_soa; 75 soa.common.rdclass = rdclass; 76 soa.mctx = NULL; 77 soa.serial = serial; 78 soa.refresh = refresh; 79 soa.retry = retry [all...] |
| nsec.c | 347 bool soa; local 389 soa = dns_nsec_typepresent(&rdata, dns_rdatatype_soa); 390 if (ns && !soa) { 401 } else if (atparent && ns && soa) {
|
| nsec3.c | 137 * 1) We have a SOA or DS then we need to set 1903 bool soa; local 2050 soa = dns_nsec3_typepresent(&rdata, dns_rdatatype_soa); 2051 if (ns && !soa) { 2063 } else if (atparent && ns && soa) {
|
| update.c | 52 #include <dns/soa.h> 1346 * update, including the SOA serial update but excluding the RRSIG & NSEC 1426 dns_rdata_soa_t soa; local 1478 * Calculate the NSEC/NSEC3 TTL as a minimum of the SOA TTL and 1488 CHECK(dns_rdata_tostruct(&rdata, &soa, NULL)); 1489 state->nsecttl = ISC_MIN(rdataset.ttl, soa.minimum);
|
| catz.c | 78 dns_rdata_t soa; member in struct:dns_catz_zone 1814 dns_rdata_soa_t soa; local 1837 result = dns_rdata_tostruct(&rdata, &soa, NULL); 1841 * xxxwpk TODO do we want to save something from SOA? 1843 dns_rdata_freestruct(&soa); 2292 /* A zone without SOA record?!? */ 2295 "catz: zone '%s' has no SOA record (%s)", bname,
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| soa.c | 1 /* $NetBSD: soa.c,v 1.1 2024/02/18 20:57:34 christos Exp $ */ 26 #include <dns/soa.h> 46 * Locate the field within the SOA RDATA based 65 dns_rdata_soa_t soa; local 74 soa.common.rdtype = dns_rdatatype_soa; 75 soa.common.rdclass = rdclass; 76 soa.mctx = NULL; 77 soa.serial = serial; 78 soa.refresh = refresh; 79 soa.retry = retry [all...] |
| nsec.c | 324 bool soa; local 356 soa = dns_nsec_typepresent(&rdata, dns_rdatatype_soa); 357 if (ns && !soa) { 368 } else if (atparent && ns && soa) {
|
| nsec3.c | 144 * 1) We have a SOA or DS then we need to set 1918 bool soa; local 2065 soa = dns_nsec3_typepresent(&rdata, dns_rdatatype_soa); 2066 if (ns && !soa) { 2078 } else if (atparent && ns && soa) {
|
| catz.c | 62 dns_rdata_t soa; member in struct:dns_catz_zone 1458 dns_rdata_soa_t soa; local 1474 result = dns_rdata_tostruct(&rdata, &soa, NULL); 1478 * xxxwpk TODO do we want to save something from SOA? 1881 /* A zone without SOA record?!? */ 1884 "catz: zone '%s' has no SOA record (%s)", bname,
|
| client.c | 2096 dns_rdata_soa_t soa; local 2106 result = dns_rdata_tostruct(&soarr, &soa, NULL); 2112 dns_name_clone(&soa.origin, &primary); 2147 dns_rdata_freestruct(&soa); 2199 /* Retry SOA request without TSIG */
|
| update.c | 55 #include <dns/soa.h> 1460 * update, including the SOA serial update but excluding the RRSIG & NSEC 1534 dns_rdata_soa_t soa; local 1594 * Calculate the NSEC/NSEC3 TTL as a minimum of the SOA TTL and 1604 CHECK(dns_rdata_tostruct(&rdata, &soa, NULL)); 1605 state->nsecttl = ISC_MIN(rdataset.ttl, soa.minimum);
|
| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| soa_6.c | 286 dns_rdata_soa_t *soa = source; local 290 REQUIRE(soa != NULL); 291 REQUIRE(soa->common.rdtype == type); 292 REQUIRE(soa->common.rdclass == rdclass); 297 dns_name_toregion(&soa->origin, ®ion); 299 dns_name_toregion(&soa->contact, ®ion); 301 RETERR(uint32_tobuffer(soa->serial, target)); 302 RETERR(uint32_tobuffer(soa->refresh, target)); 303 RETERR(uint32_tobuffer(soa->retry, target)); 304 RETERR(uint32_tobuffer(soa->expire, target)) 311 dns_rdata_soa_t *soa = target; local 353 dns_rdata_soa_t *soa = source; local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| soa_6.c | 282 dns_rdata_soa_t *soa = source; local 286 REQUIRE(soa != NULL); 287 REQUIRE(soa->common.rdtype == type); 288 REQUIRE(soa->common.rdclass == rdclass); 293 dns_name_toregion(&soa->origin, ®ion); 295 dns_name_toregion(&soa->contact, ®ion); 297 RETERR(uint32_tobuffer(soa->serial, target)); 298 RETERR(uint32_tobuffer(soa->refresh, target)); 299 RETERR(uint32_tobuffer(soa->retry, target)); 300 RETERR(uint32_tobuffer(soa->expire, target)) 307 dns_rdata_soa_t *soa = target; local 361 dns_rdata_soa_t *soa = source; local [all...] |
| /src/external/bsd/unbound/dist/services/ |
| localzone.h | 163 /** if data contains zone apex SOA data, this is a ptr to it. */ 164 struct ub_packed_rrset_key* soa; member in struct:local_zone 165 /** if data contains zone apex SOA data, this is a ptr to an 166 * artificial negative SOA rrset (TTL is the minimum of the TTL and the 167 * SOA.MINIMUM). */
|
| rpz.c | 147 * DNSSEC RRs at the apex, and SOA and NS are ignored. 1088 /* this rpz action is not valid, eg. this is the SOA or NS RR */ 1577 /* this rpz action is not valid, eg. this is the SOA or NS RR */ 1819 /** allocate SOA record ubrrsetkey in region */ 1821 make_soa_ubrrset(struct auth_zone* auth_zone, struct auth_rrset* soa, 1825 if(!soa) 1836 csoa.entry.data = soa->data; 1880 struct auth_rrset* soa = NULL; local 1881 soa = auth_zone_get_soa_rrset(auth_zone); 1882 if(soa) { 1925 struct auth_rrset* soa = NULL; local [all...] |
| /src/external/mpl/bind/dist/bin/dig/ |
| nslookup.c | 79 "soa = ", /* 6 */ 138 dns_rdata_soa_t soa; local 142 result = dns_rdata_tostruct(rdata, &soa, NULL); 145 dns_name_format(&soa.origin, namebuf, sizeof(namebuf)); 147 dns_name_format(&soa.contact, namebuf, sizeof(namebuf)); 149 printf("\tserial = %u\n", soa.serial); 150 printf("\trefresh = %u\n", soa.refresh); 151 printf("\tretry = %u\n", soa.retry); 152 printf("\texpire = %u\n", soa.expire); 153 printf("\tminimum = %u\n", soa.minimum) [all...] |
| dighost.c | 2080 * Insert an SOA record into the sendmessage in a lookup. Used for 2086 dns_rdata_soa_t soa; local 2093 soa.mctx = mctx; 2094 soa.serial = lookup->ixfr_serial; 2095 soa.refresh = 0; 2096 soa.retry = 0; 2097 soa.expire = 0; 2098 soa.minimum = 0; 2099 soa.common.rdclass = lookup->rdclass; 2100 soa.common.rdtype = dns_rdatatype_soa 3724 dns_rdata_soa_t soa; local [all...] |
| /src/external/bsd/unbound/dist/validator/ |
| val_neg.c | 565 /** find zone name of message, returns the SOA record */ 882 struct ub_packed_rrset_key* soa; local 891 if((soa = reply_find_soa(rep))) { 892 dname = soa->rk.dname; 893 dname_len = soa->rk.dname_len; 894 rrset_class = ntohs(soa->rk.rrset_class); 897 /* No SOA in positive (wildcard) answer. Use signer from the 977 /* no SOA in this message, find RRSIG over NSEC's signer name. 1288 /* need: -SOA, -DS, +NS */ 1326 /* capacity=3: ce + nc + soa(if needed) * 1352 struct ub_packed_rrset_key* soa; local [all...] |
| /src/external/bsd/nsd/dist/ |
| ixfr.c | 442 /* we must have a SOA in the authority section */ 453 /* skip over the authority section RRs until we find the SOA */ 455 /* is this the SOA record? */ 482 /* get serial from SOA rdata */ 490 /* get serial from SOA RR */ 679 /* Add first SOA */ 681 /* the new SOA is added from the end_data segment, it is 682 * the final SOA of the result of the IXFR */ 695 /* Add second SOA */ 708 /* Add del data, with deleted RRs and a SOA */ 1001 uint8_t* soa; local [all...] |
| xfrd.c | 2 * xfrd.c - XFR (transfer) Daemon source file. Coordinates SOA updates. 75 /* handle incoming notification message. soa can be NULL. true if transfer needed. */ 77 xfrd_soa_type* soa); 79 /* call with buffer just after the soa dname. returns 0 on error. */ 80 static int xfrd_parse_soa_info(buffer_type* packet, xfrd_soa_type* soa); 640 "\'%s\': invalid SOA resource record", 695 xfrd_soa_type soa; local 696 xfrd_soa_type* soa_ptr = &soa; 725 /* read the soa info */ 726 memset(&soa, 0, sizeof(soa)) 2462 xfrd_soa_type soa; local 2765 xfrd_soa_type soa; local 2868 xfrd_soa_type soa; local [all...] |
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| dns-msg.h | 171 dns_rdata_soa_t soa; member in union:dns_rr::__anon5986
|
| /src/external/mpl/bind/dist/bin/nsupdate/ |
| nsupdate.c | 2716 dns_rdata_soa_t soa; local 2769 ddebug("retrying soa request without TSIG"); 2809 show_message(stderr, rcvmsg, "Reply from SOA query:"); 2813 fatal("invalid OPCODE in response to SOA query"); 2819 fatal("response to SOA query was unsuccessful"); 2893 result = dns_rdata_tostruct(&soarr, &soa, NULL); 2897 dns_name_clone(&soa.origin, &primary); 2936 dns_rdata_freestruct(&soa); 2948 dns_rdata_freestruct(&soa);
|
| /src/external/gpl3/binutils/dist/bfd/ |
| mach-o.c | 2466 unsigned int soa, sob; local 2468 soa = bfd_mach_o_primary_symbol_sort_key (sa); 2470 if (soa < sob) 2473 if (soa > sob) 2477 if (soa == 0)
|
| /src/external/gpl3/binutils.old/dist/bfd/ |
| mach-o.c | 2465 unsigned int soa, sob; local 2467 soa = bfd_mach_o_primary_symbol_sort_key (sa); 2469 if (soa < sob) 2472 if (soa > sob) 2476 if (soa == 0)
|