HomeSort by: relevance | last modified time | path
    Searched refs:rrs (Results 1 - 25 of 43) sorted by relevancy

1 2

  /src/external/bsd/nsd/dist/
zonec.c 211 rrset->rrs = region_alloc(state->database->region, sizeof(rr_type*));
237 struct rr **rrs; local
241 if (type != TYPE_RRSIG && ttl != rrset->rrs[0]->ttl) {
243 domain_to_string(domain), ttl, rrset->rrs[0]->ttl,
249 if (!equal_rr_rdata(descriptor, rr, rrset->rrs[i]))
271 rrs = rrset->rrs;
272 rrset->rrs = region_alloc_array(
273 state->database->region, rrset->rr_count + 1, sizeof(*rrs));
274 memcpy(rrset->rrs, rrs, rrset->rr_count * sizeof(*rrs))
    [all...]
packet.c 133 if (packet_encode_rr(query, owner, rrset->rrs[i],
134 rrset->rrs[i]->ttl)) {
143 if (packet_encode_rr(query, owner, rrset->rrs[i],
144 rrset->rrs[i]->ttl)) {
159 if (rr_rrsig_type_covered(rrsig->rrs[i])
163 rrsig->rrs[i],
164 rrset_rrtype(rrset)==TYPE_SOA?rrset->rrs[0]->ttl:rrsig->rrs[i]->ttl))
341 /* count of further RRs after question section */
353 /* skip all question RRs */
    [all...]
axfr.c 85 query->axfr_zone->soa_rrset->rrs[0],
86 query->axfr_zone->soa_rrset->rrs[0]->ttl);
103 /* Add zone RRs until answer is full. */
126 query->axfr_current_rrset->rrs[query->axfr_current_rr],
127 query->axfr_current_rrset->rrs[query->axfr_current_rr]->ttl);
157 query->axfr_zone->soa_rrset->rrs[0],
158 query->axfr_zone->soa_rrset->rrs[0]->ttl);
difffile.c 318 if(rr_rrsig_type_covered(rrset->rrs[i])==TYPE_DNSKEY) {
326 add_rr_to_recyclebin(db, rrset->rrs[i]);
328 region_recycle(db->region, rrset->rrs, sizeof(rr_type*) * rrset->rr_count);
454 if (rrset->rrs[i]->type != type) {
457 dname_to_string(domain_dname(rrset->rrs[i]->owner),0),
459 rrtype_to_string(rrset->rrs[i]->type));
462 if (rrset->rrs[i]->klass != klass) {
465 dname_to_string(domain_dname(rrset->rrs[i]->owner),0),
468 rrset->rrs[i]->klass);
471 if (rrset->rrs[i]->rdlength != rr->rdlength)
    [all...]
namedb.h 112 uint32_t usage; /* number of ptrs to this from RRs(in rdata) and
165 * very likely to improve performance when importing zones and writing RRs out
181 * An RRset consists of at least one RR. All RRs are from the same
193 * The rr_type pointers for the rrs are stored after the struct rrset,
199 * the space used by the rr_type** rrs array pointer.
200 * The rr pointers can then be accessed through the rrs[] member and,
203 rr_type** rrs; member in struct:rrset
207 rr_type* rrs[]; /* c99 flexible array */ member in struct:rrset
415 return rrset->rrs[0]->type;
423 return rrset->rrs[0]->klass
    [all...]
query.c 722 master_rrset->rrs[i], rdata_offset);
870 answer->rrsets[j]->rrs[0]->type == TYPE_CNAME &&
871 dname_compare(domain_dname(answer->rrsets[j]->rrs[0]->owner), from_name) == 0 &&
872 answer->rrsets[j]->rrs[0]->rdlength >= 1 &&
873 dname_compare(domain_dname(rdata_domain_ref(answer->rrsets[j]->rrs[0])), to_name) == 0) {
938 rrset->rrs = (rr_type**) region_alloc(q->region, sizeof(rr_type*));
940 rrset->rrs[0] = (rr_type*) region_alloc(q->region,
942 memset(rrset->rrs[0], 0, sizeof(rr_type));
943 rrset->rrs[0]->owner = cname_domain;
944 rrset->rrs[0]->ttl = ttl
    [all...]
ixfr.c 40 /* initial space in rrs data for storing records */
453 /* skip over the authority section RRs until we find the SOA */
503 return soa_rr_get_serial(zone->soa_rrset->rrs[0]);
670 /* Copy RRs into packet until packet full, return number RRs added */
676 /* Copy RRs into the packet until the answer is full,
708 /* Add del data, with deleted RRs and a SOA */
724 /* Add add data, with added RRs and a SOA */
807 zone->soa_rrset->rrs[0],
808 zone->soa_rrset->rrs[0]->ttl))
    [all...]
nsec3.c 227 if(nsec3_has_soa(nsec3_rrset->rrs[j])) {
229 return nsec3_rrset->rrs[j];
278 if(rrset->rrs[i] == avoid_rr) continue;
279 if(rrset->rrs[i]->rdlength < 5) continue; /* require salt field */
280 if(rrset->rrs[i]->rdata[0] == NSEC3_SHA1_HASH &&
281 rrset->rrs[i]->rdata[1] == 0) {
283 z->nsec3_param = rrset->rrs[i];
294 nsec3param_to_str(rrset->rrs[i], str,
299 return rrset->rrs[i];
342 if(nsec3_rr_uses_params(rrset->rrs[i], zone)
    [all...]
xfrd-catalog-zones.c 549 if(rrset->rrs[i]->rdlength == 2 &&
550 rrset->rrs[i]->rdata[0] == 1 /* TXT string length */ &&
551 rrset->rrs[i]->rdata[1] == '2') {
604 member_domain = rdata_domain_ref(rrset->rrs[0]);
624 if(rrset->rrs[i]->rdlength < 1
625 || rrset->rrs[i]->rdlength !=
626 ((uint16_t)rrset->rrs[i]->rdata[0])+1
629 || rrset->rrs[i]->rdata[0] < 1)
633 , rrset->rrs[i]->rdata+1
634 , rrset->rrs[i]->rdata[0
    [all...]
dbcreate.c 42 if(!print_rr(out, state, zone->soa_rrset->rrs[i],
62 if(!print_rr(out, state, rrset->rrs[i],
ixfrcreate.c 79 if(!spool_u16(out, rrset->rrs[0]->type))
81 if(!spool_u16(out, rrset->rrs[0]->klass))
86 if(!spool_rr_data(out, rrset->rrs[i]))
337 if(rrset->rrs[i]->ttl != ttl)
339 if(rdata_match(rrset->rrs[i], rdata, rdlen)) {
364 /* read RRs from file and see if they are added, deleted or in both */
411 /* now that we are done, see if RRs in the rrset are not marked,
412 * and thus are new rrs that are added */
422 if(!ixfr_store_addrr_rdatas(store, rrset->rrs[i])) {
435 /* read the RRs from file and add to del list. *
    [all...]
dbaccess.c 125 /* RRs and UDB and NSEC3 and so on must be already deleted */
142 region_recycle(db->region, zone->soa_nx_rrset->rrs[0],
143 sizeof(rr_type)+zone->soa_nx_rrset->rrs[0]->rdlength);
145 region_recycle(db->region, zone->soa_nx_rrset->rrs,
  /src/external/mpl/bind/dist/bin/tests/system/nsec3/
common.py 59 rrs = []
62 rrs.append(rrset)
66 assert len(rrs) != 0, "no NSEC records found in authority section"
71 rrs = []
76 rrs.append(rrset)
81 assert len(rrs) != 0, "no NSEC3 records found in authority section"
85 rrs = []
97 rrs.append(rrset)
103 assert len(rrs) != 0
  /src/external/bsd/unbound/dist/testcode/
signit.c 161 /** read list of rrs from the file */
196 /** sign the rrs with the keys */
198 signit(ldns_rr_list* rrs, ldns_key_list* keys)
203 while(ldns_rr_list_rr_count(rrs) > 0) {
204 rrset = ldns_rr_list_pop_rrset(rrs);
220 ldns_rr_list* rrs; local
227 rrs = read_rrs(stdin);
228 signit(rrs, keys);
230 ldns_rr_list_deep_free(rrs);
  /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/objs/
dns_obj_rr.c 210 dns_obj_rrs_set_comparison_attributes(dns_obj_rr_t * const rrs, const size_t rr_count, const uint32_t original_ttl,
214 dns_obj_rr_set_comparison_attributes(rrs[i], original_ttl, rrsig_labels);
221 dns_obj_rrs_clear_comparison_attributes(dns_obj_rr_t * const rrs, const size_t rr_count)
224 dns_obj_rr_clear_comparison_attributes(rrs[i]);
261 dns_obj_rrs_belong_to_one_rrset(dns_obj_rr_t * const rrs, const size_t count)
265 const uint16_t class = dns_obj_rr_get_class(rrs[0]);
266 const uint16_t type = dns_obj_rr_get_type(rrs[0]);
267 const dns_obj_domain_name_t name = dns_obj_rr_get_name(rrs[0]);
270 const dns_obj_rr_t rr = rrs[i];
317 // For the purposes of DNS security, RRs with the same owner name, class, and type are sorted by treating th
    [all...]
  /src/external/ibm-public/postfix/dist/src/tls/
tls_dane.c 119 /* synthetic DANE TLSA RRs (fingerprint or "tafile").
568 DNS_RR *rrs = 0; local
576 ret = dns_lookup(tlsa_fqdn, T_TLSA, RES_USE_DNSSEC, &rrs, 0, why);
580 if (TLS_DANE_CACHE_TTL_MIN && rrs->ttl < TLS_DANE_CACHE_TTL_MIN)
581 rrs->ttl = TLS_DANE_CACHE_TTL_MIN;
582 if (TLS_DANE_CACHE_TTL_MAX && rrs->ttl > TLS_DANE_CACHE_TTL_MAX)
583 rrs->ttl = TLS_DANE_CACHE_TTL_MAX;
586 dane->expires = 1 + event_time() + rrs->ttl;
588 if (rrs->dnssec_valid) {
591 for (rr = rrs; rr != 0; rr = rr->next
644 DNS_RR *rrs; local
    [all...]
  /src/distrib/notes/
Makefile.inc 143 rm -f [Ee]rrs mklog core *.core ${TARGS} ${TOCS} \
  /src/share/mk/
bsd.hostlib.mk 46 CLEANFILES+= a.out [Ee]rrs mklog core *.core lib${HOSTLIB}.a ${OBJS}
  /src/external/mpl/bind/dist/bin/tests/system/tsig/
tests_tsig_hypothesis.py 126 rrs = dns.rrset.from_rdata(keyname, 0, tsig)
127 msg.additional.append(rrs)
  /src/external/mpl/bind/dist/bin/tests/system/rpz/testlib/
test-data.h 101 trpz_rr_t *rrs; member in struct:__anon9017
test-data.c 498 trpz_rr_t *rptr = &(node->rrs[n]);
512 node->rrs = realloc(node->rrs, node->nrrs * sizeof(*(node->rrs)));
513 if (node->rrs == NULL) {
518 memset(&(node->rrs[node->nrrs - 1]), 0, sizeof(node->rrs[0]));
519 node->rrs[node->nrrs - 1] = nrec;
1082 if (res->rrs[m].rdata != NULL) {
1083 free(res->rrs[m].rdata)
    [all...]
  /src/external/bsd/unbound/dist/validator/
val_sigcrypt.c 86 /** return number of rrs in an rrset */
770 * RR entries in a canonical sorted tree of RRs
811 /* loop while there are rdata bytes available for both rrs,
923 * Compare two RRs in the same RRset and determine their relative
1022 * Sort RRs for rrset in canonical order.
1028 * @param rrs: rr storage.
1032 rbtree_type* sortree, struct canon_rr* rrs)
1037 rrs[i].node.key = &rrs[i];
1038 rrs[i].rrset = rrset
1276 struct canon_rr* rrs; local
1345 struct canon_rr* rrs; local
    [all...]
  /src/external/apache2/mDNSResponder/dist/ServiceRegistration/
wireutils.c 592 // There's no reason to compare invalid RRs, but if we do, they are all equally invalid.
657 // There's no reason to compare invalid RRs, but if we do, they are all equally invalid.
731 dns_rr_t *rrs = NULL; local
733 case 0: count = message->qdcount; rrs = message->questions; break;
734 case 1: count = message->ancount; rrs = message->answers; break;
735 case 2: count = message->nscount; rrs = message->authority; break;
736 case 3: count = message->arcount; rrs = message->additional; break;
740 dns_rr_t *rr = &rrs[j];
  /src/sys/arch/atari/include/
bus_funcs.h 190 __abs_nonsingle(rrs,1,(t),(h),(o),(a),(c))
192 __abs_nonsingle(rrs,2,(t),(h),(o),(a),(c))
194 __abs_nonsingle(rrs,4,(t),(h),(o),(a),(c))
196 __abs_nonsingle(rrs,8,(t),(h),(o),(a),(c))
  /src/sys/arch/evbsh3/include/
bus_funcs.h 195 __bs_nonsingle(rrs,1,uint8_t,(t),(h),(o),(a),(c))
197 __bs_nonsingle(rrs,2,uint16_t,(t),(h),(o),(a),(c))
199 __bs_nonsingle(rrs,4,uint32_t,(t),(h),(o),(a),(c))
201 __bs_nonsingle(rrs,8,uint64_t,(t),(h),(o),(a),(c))

Completed in 63 milliseconds

1 2