| /src/external/bsd/nsd/dist/ |
| zonec.c | 211 rrset->rrs = region_alloc(state->database->region, sizeof(rr_type*)); 237 struct rr **rrs; local 241 if (type != TYPE_RRSIG && ttl != rrset->rrs[0]->ttl) { 243 domain_to_string(domain), ttl, rrset->rrs[0]->ttl, 249 if (!equal_rr_rdata(descriptor, rr, rrset->rrs[i])) 271 rrs = rrset->rrs; 272 rrset->rrs = region_alloc_array( 273 state->database->region, rrset->rr_count + 1, sizeof(*rrs)); 274 memcpy(rrset->rrs, rrs, rrset->rr_count * sizeof(*rrs)) [all...] |
| packet.c | 133 if (packet_encode_rr(query, owner, rrset->rrs[i], 134 rrset->rrs[i]->ttl)) { 143 if (packet_encode_rr(query, owner, rrset->rrs[i], 144 rrset->rrs[i]->ttl)) { 159 if (rr_rrsig_type_covered(rrsig->rrs[i]) 163 rrsig->rrs[i], 164 rrset_rrtype(rrset)==TYPE_SOA?rrset->rrs[0]->ttl:rrsig->rrs[i]->ttl)) 341 /* count of further RRs after question section */ 353 /* skip all question RRs */ [all...] |
| axfr.c | 85 query->axfr_zone->soa_rrset->rrs[0], 86 query->axfr_zone->soa_rrset->rrs[0]->ttl); 103 /* Add zone RRs until answer is full. */ 126 query->axfr_current_rrset->rrs[query->axfr_current_rr], 127 query->axfr_current_rrset->rrs[query->axfr_current_rr]->ttl); 157 query->axfr_zone->soa_rrset->rrs[0], 158 query->axfr_zone->soa_rrset->rrs[0]->ttl);
|
| difffile.c | 318 if(rr_rrsig_type_covered(rrset->rrs[i])==TYPE_DNSKEY) { 326 add_rr_to_recyclebin(db, rrset->rrs[i]); 328 region_recycle(db->region, rrset->rrs, sizeof(rr_type*) * rrset->rr_count); 454 if (rrset->rrs[i]->type != type) { 457 dname_to_string(domain_dname(rrset->rrs[i]->owner),0), 459 rrtype_to_string(rrset->rrs[i]->type)); 462 if (rrset->rrs[i]->klass != klass) { 465 dname_to_string(domain_dname(rrset->rrs[i]->owner),0), 468 rrset->rrs[i]->klass); 471 if (rrset->rrs[i]->rdlength != rr->rdlength) [all...] |
| namedb.h | 112 uint32_t usage; /* number of ptrs to this from RRs(in rdata) and 165 * very likely to improve performance when importing zones and writing RRs out 181 * An RRset consists of at least one RR. All RRs are from the same 193 * The rr_type pointers for the rrs are stored after the struct rrset, 199 * the space used by the rr_type** rrs array pointer. 200 * The rr pointers can then be accessed through the rrs[] member and, 203 rr_type** rrs; member in struct:rrset 207 rr_type* rrs[]; /* c99 flexible array */ member in struct:rrset 415 return rrset->rrs[0]->type; 423 return rrset->rrs[0]->klass [all...] |
| query.c | 722 master_rrset->rrs[i], rdata_offset); 870 answer->rrsets[j]->rrs[0]->type == TYPE_CNAME && 871 dname_compare(domain_dname(answer->rrsets[j]->rrs[0]->owner), from_name) == 0 && 872 answer->rrsets[j]->rrs[0]->rdlength >= 1 && 873 dname_compare(domain_dname(rdata_domain_ref(answer->rrsets[j]->rrs[0])), to_name) == 0) { 938 rrset->rrs = (rr_type**) region_alloc(q->region, sizeof(rr_type*)); 940 rrset->rrs[0] = (rr_type*) region_alloc(q->region, 942 memset(rrset->rrs[0], 0, sizeof(rr_type)); 943 rrset->rrs[0]->owner = cname_domain; 944 rrset->rrs[0]->ttl = ttl [all...] |
| ixfr.c | 40 /* initial space in rrs data for storing records */ 453 /* skip over the authority section RRs until we find the SOA */ 503 return soa_rr_get_serial(zone->soa_rrset->rrs[0]); 670 /* Copy RRs into packet until packet full, return number RRs added */ 676 /* Copy RRs into the packet until the answer is full, 708 /* Add del data, with deleted RRs and a SOA */ 724 /* Add add data, with added RRs and a SOA */ 807 zone->soa_rrset->rrs[0], 808 zone->soa_rrset->rrs[0]->ttl)) [all...] |
| nsec3.c | 227 if(nsec3_has_soa(nsec3_rrset->rrs[j])) { 229 return nsec3_rrset->rrs[j]; 278 if(rrset->rrs[i] == avoid_rr) continue; 279 if(rrset->rrs[i]->rdlength < 5) continue; /* require salt field */ 280 if(rrset->rrs[i]->rdata[0] == NSEC3_SHA1_HASH && 281 rrset->rrs[i]->rdata[1] == 0) { 283 z->nsec3_param = rrset->rrs[i]; 294 nsec3param_to_str(rrset->rrs[i], str, 299 return rrset->rrs[i]; 342 if(nsec3_rr_uses_params(rrset->rrs[i], zone) [all...] |
| xfrd-catalog-zones.c | 549 if(rrset->rrs[i]->rdlength == 2 && 550 rrset->rrs[i]->rdata[0] == 1 /* TXT string length */ && 551 rrset->rrs[i]->rdata[1] == '2') { 604 member_domain = rdata_domain_ref(rrset->rrs[0]); 624 if(rrset->rrs[i]->rdlength < 1 625 || rrset->rrs[i]->rdlength != 626 ((uint16_t)rrset->rrs[i]->rdata[0])+1 629 || rrset->rrs[i]->rdata[0] < 1) 633 , rrset->rrs[i]->rdata+1 634 , rrset->rrs[i]->rdata[0 [all...] |
| dbcreate.c | 42 if(!print_rr(out, state, zone->soa_rrset->rrs[i], 62 if(!print_rr(out, state, rrset->rrs[i],
|
| ixfrcreate.c | 79 if(!spool_u16(out, rrset->rrs[0]->type)) 81 if(!spool_u16(out, rrset->rrs[0]->klass)) 86 if(!spool_rr_data(out, rrset->rrs[i])) 337 if(rrset->rrs[i]->ttl != ttl) 339 if(rdata_match(rrset->rrs[i], rdata, rdlen)) { 364 /* read RRs from file and see if they are added, deleted or in both */ 411 /* now that we are done, see if RRs in the rrset are not marked, 412 * and thus are new rrs that are added */ 422 if(!ixfr_store_addrr_rdatas(store, rrset->rrs[i])) { 435 /* read the RRs from file and add to del list. * [all...] |
| dbaccess.c | 125 /* RRs and UDB and NSEC3 and so on must be already deleted */ 142 region_recycle(db->region, zone->soa_nx_rrset->rrs[0], 143 sizeof(rr_type)+zone->soa_nx_rrset->rrs[0]->rdlength); 145 region_recycle(db->region, zone->soa_nx_rrset->rrs,
|
| /src/external/mpl/bind/dist/bin/tests/system/nsec3/ |
| common.py | 59 rrs = [] 62 rrs.append(rrset) 66 assert len(rrs) != 0, "no NSEC records found in authority section" 71 rrs = [] 76 rrs.append(rrset) 81 assert len(rrs) != 0, "no NSEC3 records found in authority section" 85 rrs = [] 97 rrs.append(rrset) 103 assert len(rrs) != 0
|
| /src/external/bsd/unbound/dist/testcode/ |
| signit.c | 161 /** read list of rrs from the file */ 196 /** sign the rrs with the keys */ 198 signit(ldns_rr_list* rrs, ldns_key_list* keys) 203 while(ldns_rr_list_rr_count(rrs) > 0) { 204 rrset = ldns_rr_list_pop_rrset(rrs); 220 ldns_rr_list* rrs; local 227 rrs = read_rrs(stdin); 228 signit(rrs, keys); 230 ldns_rr_list_deep_free(rrs);
|
| /src/external/apache2/mDNSResponder/dist/mDNSShared/dns_objects/objs/ |
| dns_obj_rr.c | 210 dns_obj_rrs_set_comparison_attributes(dns_obj_rr_t * const rrs, const size_t rr_count, const uint32_t original_ttl, 214 dns_obj_rr_set_comparison_attributes(rrs[i], original_ttl, rrsig_labels); 221 dns_obj_rrs_clear_comparison_attributes(dns_obj_rr_t * const rrs, const size_t rr_count) 224 dns_obj_rr_clear_comparison_attributes(rrs[i]); 261 dns_obj_rrs_belong_to_one_rrset(dns_obj_rr_t * const rrs, const size_t count) 265 const uint16_t class = dns_obj_rr_get_class(rrs[0]); 266 const uint16_t type = dns_obj_rr_get_type(rrs[0]); 267 const dns_obj_domain_name_t name = dns_obj_rr_get_name(rrs[0]); 270 const dns_obj_rr_t rr = rrs[i]; 317 // For the purposes of DNS security, RRs with the same owner name, class, and type are sorted by treating th [all...] |
| /src/external/ibm-public/postfix/dist/src/tls/ |
| tls_dane.c | 119 /* synthetic DANE TLSA RRs (fingerprint or "tafile"). 568 DNS_RR *rrs = 0; local 576 ret = dns_lookup(tlsa_fqdn, T_TLSA, RES_USE_DNSSEC, &rrs, 0, why); 580 if (TLS_DANE_CACHE_TTL_MIN && rrs->ttl < TLS_DANE_CACHE_TTL_MIN) 581 rrs->ttl = TLS_DANE_CACHE_TTL_MIN; 582 if (TLS_DANE_CACHE_TTL_MAX && rrs->ttl > TLS_DANE_CACHE_TTL_MAX) 583 rrs->ttl = TLS_DANE_CACHE_TTL_MAX; 586 dane->expires = 1 + event_time() + rrs->ttl; 588 if (rrs->dnssec_valid) { 591 for (rr = rrs; rr != 0; rr = rr->next 644 DNS_RR *rrs; local [all...] |
| /src/distrib/notes/ |
| Makefile.inc | 143 rm -f [Ee]rrs mklog core *.core ${TARGS} ${TOCS} \
|
| /src/share/mk/ |
| bsd.hostlib.mk | 46 CLEANFILES+= a.out [Ee]rrs mklog core *.core lib${HOSTLIB}.a ${OBJS}
|
| /src/external/mpl/bind/dist/bin/tests/system/tsig/ |
| tests_tsig_hypothesis.py | 126 rrs = dns.rrset.from_rdata(keyname, 0, tsig) 127 msg.additional.append(rrs)
|
| /src/external/mpl/bind/dist/bin/tests/system/rpz/testlib/ |
| test-data.h | 101 trpz_rr_t *rrs; member in struct:__anon9017
|
| test-data.c | 498 trpz_rr_t *rptr = &(node->rrs[n]); 512 node->rrs = realloc(node->rrs, node->nrrs * sizeof(*(node->rrs))); 513 if (node->rrs == NULL) { 518 memset(&(node->rrs[node->nrrs - 1]), 0, sizeof(node->rrs[0])); 519 node->rrs[node->nrrs - 1] = nrec; 1082 if (res->rrs[m].rdata != NULL) { 1083 free(res->rrs[m].rdata) [all...] |
| /src/external/bsd/unbound/dist/validator/ |
| val_sigcrypt.c | 86 /** return number of rrs in an rrset */ 770 * RR entries in a canonical sorted tree of RRs 811 /* loop while there are rdata bytes available for both rrs, 923 * Compare two RRs in the same RRset and determine their relative 1022 * Sort RRs for rrset in canonical order. 1028 * @param rrs: rr storage. 1032 rbtree_type* sortree, struct canon_rr* rrs) 1037 rrs[i].node.key = &rrs[i]; 1038 rrs[i].rrset = rrset 1276 struct canon_rr* rrs; local 1345 struct canon_rr* rrs; local [all...] |
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| wireutils.c | 592 // There's no reason to compare invalid RRs, but if we do, they are all equally invalid. 657 // There's no reason to compare invalid RRs, but if we do, they are all equally invalid. 731 dns_rr_t *rrs = NULL; local 733 case 0: count = message->qdcount; rrs = message->questions; break; 734 case 1: count = message->ancount; rrs = message->answers; break; 735 case 2: count = message->nscount; rrs = message->authority; break; 736 case 3: count = message->arcount; rrs = message->additional; break; 740 dns_rr_t *rr = &rrs[j];
|
| /src/sys/arch/atari/include/ |
| bus_funcs.h | 190 __abs_nonsingle(rrs,1,(t),(h),(o),(a),(c)) 192 __abs_nonsingle(rrs,2,(t),(h),(o),(a),(c)) 194 __abs_nonsingle(rrs,4,(t),(h),(o),(a),(c)) 196 __abs_nonsingle(rrs,8,(t),(h),(o),(a),(c))
|
| /src/sys/arch/evbsh3/include/ |
| bus_funcs.h | 195 __bs_nonsingle(rrs,1,uint8_t,(t),(h),(o),(a),(c)) 197 __bs_nonsingle(rrs,2,uint16_t,(t),(h),(o),(a),(c)) 199 __bs_nonsingle(rrs,4,uint32_t,(t),(h),(o),(a),(c)) 201 __bs_nonsingle(rrs,8,uint64_t,(t),(h),(o),(a),(c))
|