HomeSort by: relevance | last modified time | path
    Searched defs:soa (Results 1 - 25 of 37) sorted by relevancy

1 2

  /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/objs/
dns_obj_rr_soa.c 31 // MARK: - DNSSEC SOA Resource Record Kind Definition
38 DNS_OBJECT_SUBKIND_DEFINE_ABSTRUCT(rr, soa,
44 // MARK: - DNSSEC SOA Resource Record Public Methods
51 dns_obj_rr_soa_t soa = NULL; local
64 soa = obj;
73 return soa;
  /src/external/mpl/bind/dist/lib/dns/
soa.c 1 /* $NetBSD: soa.c,v 1.7 2025/01/26 16:25:25 christos Exp $ */
26 #include <dns/soa.h>
46 * Locate the field within the SOA RDATA based
65 dns_rdata_soa_t soa; local
74 soa.common.rdtype = dns_rdatatype_soa;
75 soa.common.rdclass = rdclass;
76 soa.mctx = NULL;
77 soa.serial = serial;
78 soa.refresh = refresh;
79 soa.retry = retry
    [all...]
nsec.c 347 bool soa; local
389 soa = dns_nsec_typepresent(&rdata, dns_rdatatype_soa);
390 if (ns && !soa) {
401 } else if (atparent && ns && soa) {
nsec3.c 137 * 1) We have a SOA or DS then we need to set
1903 bool soa; local
2050 soa = dns_nsec3_typepresent(&rdata, dns_rdatatype_soa);
2051 if (ns && !soa) {
2063 } else if (atparent && ns && soa) {
update.c 52 #include <dns/soa.h>
1346 * update, including the SOA serial update but excluding the RRSIG & NSEC
1426 dns_rdata_soa_t soa; local
1478 * Calculate the NSEC/NSEC3 TTL as a minimum of the SOA TTL and
1488 CHECK(dns_rdata_tostruct(&rdata, &soa, NULL));
1489 state->nsecttl = ISC_MIN(rdataset.ttl, soa.minimum);
catz.c 78 dns_rdata_t soa; member in struct:dns_catz_zone
1817 dns_rdata_soa_t soa; local
1840 result = dns_rdata_tostruct(&rdata, &soa, NULL);
1844 * xxxwpk TODO do we want to save something from SOA?
1846 dns_rdata_freestruct(&soa);
2295 /* A zone without SOA record?!? */
2298 "catz: zone '%s' has no SOA record (%s)", bname,
  /src/external/mpl/dhcp/bind/dist/lib/dns/
soa.c 1 /* $NetBSD: soa.c,v 1.1 2024/02/18 20:57:34 christos Exp $ */
26 #include <dns/soa.h>
46 * Locate the field within the SOA RDATA based
65 dns_rdata_soa_t soa; local
74 soa.common.rdtype = dns_rdatatype_soa;
75 soa.common.rdclass = rdclass;
76 soa.mctx = NULL;
77 soa.serial = serial;
78 soa.refresh = refresh;
79 soa.retry = retry
    [all...]
nsec.c 324 bool soa; local
356 soa = dns_nsec_typepresent(&rdata, dns_rdatatype_soa);
357 if (ns && !soa) {
368 } else if (atparent && ns && soa) {
nsec3.c 144 * 1) We have a SOA or DS then we need to set
1918 bool soa; local
2065 soa = dns_nsec3_typepresent(&rdata, dns_rdatatype_soa);
2066 if (ns && !soa) {
2078 } else if (atparent && ns && soa) {
catz.c 62 dns_rdata_t soa; member in struct:dns_catz_zone
1458 dns_rdata_soa_t soa; local
1474 result = dns_rdata_tostruct(&rdata, &soa, NULL);
1478 * xxxwpk TODO do we want to save something from SOA?
1881 /* A zone without SOA record?!? */
1884 "catz: zone '%s' has no SOA record (%s)", bname,
client.c 2096 dns_rdata_soa_t soa; local
2106 result = dns_rdata_tostruct(&soarr, &soa, NULL);
2112 dns_name_clone(&soa.origin, &primary);
2147 dns_rdata_freestruct(&soa);
2199 /* Retry SOA request without TSIG */
update.c 55 #include <dns/soa.h>
1460 * update, including the SOA serial update but excluding the RRSIG & NSEC
1534 dns_rdata_soa_t soa; local
1594 * Calculate the NSEC/NSEC3 TTL as a minimum of the SOA TTL and
1604 CHECK(dns_rdata_tostruct(&rdata, &soa, NULL));
1605 state->nsecttl = ISC_MIN(rdataset.ttl, soa.minimum);
  /src/external/mpl/bind/dist/bin/tests/system/ixfr_nonminimal/ans2/
ans.py 42 def soa(serial: int, *, owner: str = "nil.") -> dns.rrset.RRset: function
45 dns.rdatatype.SOA,
79 return qctx.qtype == dns.rdatatype.SOA
84 qctx.response.answer.append(soa(self._serial))
134 (soa(1),),
141 (soa(1),),
147 soa(1),
152 soa(1),
165 change (the SOA serial bump + TXT addition).
169 soa(2)
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/ixfr_nonminimal/ans4/
ans.py 42 def soa(serial: int, *, owner: str = "nil.") -> dns.rrset.RRset: function
45 dns.rdatatype.SOA,
79 return qctx.qtype == dns.rdatatype.SOA
84 qctx.response.answer.append(soa(self._serial))
134 (soa(1),),
140 (soa(1),),
146 soa(1),
150 soa(1),
163 SOA serial bump.
167 soa(2)
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/ixfr/ans2/
ans.py 42 def soa(serial: int, *, owner: str = "nil.") -> dns.rrset.RRset: function
45 dns.rdatatype.SOA,
79 return qctx.qtype == dns.rdatatype.SOA
84 qctx.response.answer.append(soa(self._serial))
134 (soa(1),),
141 (soa(1),),
147 soa(3),
148 soa(1),
151 soa(2),
154 soa(2)
    [all...]
  /src/external/mpl/bind/dist/lib/dns/rdata/generic/
soa_6.c 286 dns_rdata_soa_t *soa = source; local
290 REQUIRE(soa != NULL);
291 REQUIRE(soa->common.rdtype == type);
292 REQUIRE(soa->common.rdclass == rdclass);
297 dns_name_toregion(&soa->origin, &region);
299 dns_name_toregion(&soa->contact, &region);
301 RETERR(uint32_tobuffer(soa->serial, target));
302 RETERR(uint32_tobuffer(soa->refresh, target));
303 RETERR(uint32_tobuffer(soa->retry, target));
304 RETERR(uint32_tobuffer(soa->expire, target))
311 dns_rdata_soa_t *soa = target; local
353 dns_rdata_soa_t *soa = source; local
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/
soa_6.c 282 dns_rdata_soa_t *soa = source; local
286 REQUIRE(soa != NULL);
287 REQUIRE(soa->common.rdtype == type);
288 REQUIRE(soa->common.rdclass == rdclass);
293 dns_name_toregion(&soa->origin, &region);
295 dns_name_toregion(&soa->contact, &region);
297 RETERR(uint32_tobuffer(soa->serial, target));
298 RETERR(uint32_tobuffer(soa->refresh, target));
299 RETERR(uint32_tobuffer(soa->retry, target));
300 RETERR(uint32_tobuffer(soa->expire, target))
307 dns_rdata_soa_t *soa = target; local
361 dns_rdata_soa_t *soa = source; local
    [all...]
  /src/external/bsd/unbound/dist/services/
localzone.h 163 /** if data contains zone apex SOA data, this is a ptr to it. */
164 struct ub_packed_rrset_key* soa; member in struct:local_zone
165 /** if data contains zone apex SOA data, this is a ptr to an
166 * artificial negative SOA rrset (TTL is the minimum of the TTL and the
167 * SOA.MINIMUM). */
rpz.c 147 * DNSSEC RRs at the apex, and SOA and NS are ignored.
1088 /* this rpz action is not valid, eg. this is the SOA or NS RR */
1577 /* this rpz action is not valid, eg. this is the SOA or NS RR */
1819 /** allocate SOA record ubrrsetkey in region */
1821 make_soa_ubrrset(struct auth_zone* auth_zone, struct auth_rrset* soa,
1825 if(!soa)
1836 csoa.entry.data = soa->data;
1880 struct auth_rrset* soa = NULL; local
1881 soa = auth_zone_get_soa_rrset(auth_zone);
1882 if(soa) {
1925 struct auth_rrset* soa = NULL; local
    [all...]
  /src/external/mpl/bind/dist/bin/dig/
nslookup.c 79 "soa = ", /* 6 */
138 dns_rdata_soa_t soa; local
142 result = dns_rdata_tostruct(rdata, &soa, NULL);
145 dns_name_format(&soa.origin, namebuf, sizeof(namebuf));
147 dns_name_format(&soa.contact, namebuf, sizeof(namebuf));
149 printf("\tserial = %u\n", soa.serial);
150 printf("\trefresh = %u\n", soa.refresh);
151 printf("\tretry = %u\n", soa.retry);
152 printf("\texpire = %u\n", soa.expire);
153 printf("\tminimum = %u\n", soa.minimum)
    [all...]
dighost.c 2080 * Insert an SOA record into the sendmessage in a lookup. Used for
2086 dns_rdata_soa_t soa; local
2093 soa.mctx = mctx;
2094 soa.serial = lookup->ixfr_serial;
2095 soa.refresh = 0;
2096 soa.retry = 0;
2097 soa.expire = 0;
2098 soa.minimum = 0;
2099 soa.common.rdclass = lookup->rdclass;
2100 soa.common.rdtype = dns_rdatatype_soa
3724 dns_rdata_soa_t soa; local
    [all...]
  /src/external/bsd/unbound/dist/validator/
val_neg.c 565 /** find zone name of message, returns the SOA record */
882 struct ub_packed_rrset_key* soa; local
891 if((soa = reply_find_soa(rep))) {
892 dname = soa->rk.dname;
893 dname_len = soa->rk.dname_len;
894 rrset_class = ntohs(soa->rk.rrset_class);
897 /* No SOA in positive (wildcard) answer. Use signer from the
977 /* no SOA in this message, find RRSIG over NSEC's signer name.
1288 /* need: -SOA, -DS, +NS */
1326 /* capacity=3: ce + nc + soa(if needed) *
1352 struct ub_packed_rrset_key* soa; local
    [all...]
  /src/external/bsd/nsd/dist/
ixfr.c 442 /* we must have a SOA in the authority section */
453 /* skip over the authority section RRs until we find the SOA */
455 /* is this the SOA record? */
482 /* get serial from SOA rdata */
490 /* get serial from SOA RR */
679 /* Add first SOA */
681 /* the new SOA is added from the end_data segment, it is
682 * the final SOA of the result of the IXFR */
695 /* Add second SOA */
708 /* Add del data, with deleted RRs and a SOA */
1001 uint8_t* soa; local
    [all...]
xfrd.c 2 * xfrd.c - XFR (transfer) Daemon source file. Coordinates SOA updates.
75 /* handle incoming notification message. soa can be NULL. true if transfer needed. */
77 xfrd_soa_type* soa);
79 /* call with buffer just after the soa dname. returns 0 on error. */
80 static int xfrd_parse_soa_info(buffer_type* packet, xfrd_soa_type* soa);
640 "\'%s\': invalid SOA resource record",
695 xfrd_soa_type soa; local
696 xfrd_soa_type* soa_ptr = &soa;
725 /* read the soa info */
726 memset(&soa, 0, sizeof(soa))
2462 xfrd_soa_type soa; local
2765 xfrd_soa_type soa; local
2868 xfrd_soa_type soa; local
    [all...]
  /src/external/apache2/mDNSResponder/dist/ServiceRegistration/
dns-msg.h 171 dns_rdata_soa_t soa; member in union:dns_rr::__anon5986

Completed in 65 milliseconds

1 2