Lines Matching refs:zone

49 #include <dns/zone.h>
219 dns_zone_t *zone = client->query.authzone;
227 if (zone == NULL)
231 zonestats = dns_zone_getrequeststats(zone);
242 querystats = dns_zone_getrcvquerystats(zone);
423 if (client->query.redirect.zone != NULL)
424 dns_zone_detach(&client->query.redirect.zone);
705 client->query.redirect.zone = NULL;
748 * This is a new zone for this query. Add it to
768 dns_zone_t *zone, dns_db_t *db,
775 REQUIRE(zone != NULL);
779 * This limits our searching to the zone where the first name
790 * Non recursive query to a static-stub zone is prohibited; its
791 * zone content is not public data, but a part of local configuration
794 if (dns_zone_gettype(zone) == dns_zone_staticstub &&
800 * If the zone has an ACL, we'll check it, otherwise
824 queryacl = dns_zone_getqueryacl(zone);
888 queryonacl = dns_zone_getqueryonacl(zone);
922 dns_zone_t *zone = NULL;
930 * Find a zone database to answer the query.
936 &zone);
941 result = dns_zone_getdb(zone, &db);
946 result = query_validatezonedb(client, name, qtype, options, zone, db,
953 *zonep = zone;
961 if (zone != NULL)
962 dns_zone_detach(&zone);
984 * Count both enabled and disabled rewrites for each zone.
1080 * Get a policy rewrite zone database.
1229 dns_zone_t *zone = NULL;
1238 result = query_getzonedb(client, name, qtype, options, &zone,
1241 /* See how many labels are in the zone's name. */
1242 if (result == ISC_R_SUCCESS && zone != NULL)
1243 zonelabels = dns_name_countlabels(dns_zone_getorigin(zone));
1246 * If # zone labels < # name labels, try to find an even better match
1267 * If the previous search returned a zone, detach it.
1269 if (zone != NULL)
1270 dns_zone_detach(&zone);
1296 * We return a null zone, No stats for DLZ zones.
1298 zone = NULL;
1303 /* If successful, Transfer ownership of zone. */
1305 *zonep = zone;
1369 dns_zone_t *zone;
1396 zone = NULL;
1430 * Look for a zone database that might contain authoritative
1434 &zone, &db, &version);
1512 * in a referral, a special search of the zone in which
1516 * the zone where the NS record resides, not the zone it
1782 if (zone != NULL)
1783 dns_zone_detach(&zone);
1815 query_iscachevalid(dns_zone_t *zone, dns_db_t *db, dns_db_t *db0,
1823 result = dns_zone_getdb(zone, &db_current);
1857 dns_zone_t *zone;
1895 zone = NULL;
1929 type, client->view->acache, &zone,
1934 if (zone == NULL) {
1936 "query_addadditional2: auth zone not found");
1941 result = query_iscachevalid(zone, cdb, NULL, cversion);
1946 type, &zone, &cdb, &cversion, &cnode,
1953 * We have a negative cache. We don't have to check the zone
1954 * ACL, since the result (not using this zone) would be same
1961 dns_zone_detach(&zone);
1966 zone, cdb, NULL);
1969 type, &zone, &cdb, &cversion, &cnode,
1985 * Look for a zone database that might contain authoritative
1990 &zone, &db, &version);
2017 type, client->view->acache, zone, db,
2057 * in a referral, a special search of the zone in which
2061 * the zone where the NS record resides, not the zone it
2083 result = query_iscachevalid(zone, cdb, client->query.gluedb, cversion);
2088 type, &zone, &cdb, &cversion, &cnode,
2234 zone, db, version, node,
2321 if (zone != NULL)
2322 dns_zone_detach(&zone);
2837 * This is bad. We tried to get the SOA RR at the zone top
2840 CTRACE(ISC_LOG_ERROR, "unable to find SOA RR at zone apex");
2966 * This is bad. We tried to get the NS rdataset at the zone
3250 dns_zone_t *zone;
3266 zone = NULL;
3277 &zone, &db, &version, &is_zone);
3335 * zone delegation is better.
3342 * have a zone delegation, so use it.
3416 if (zone != NULL)
3417 dns_zone_detach(&zone);
4223 rpz_clean(&st->m.zone, &st->m.db, &st->m.node, &st->m.rdataset);
4262 rpz_clean(&st->q.zone, &st->q.db, &st->q.node, NULL);
4319 * the earliest configured policy zone (rpz->num)
4436 dns_zone_t *zone;
4439 zone = NULL;
4440 result = query_getdb(client, name, type, 0, &zone, dbp,
4446 if (zone != NULL)
4447 dns_zone_detach(&zone);
4450 if (zone != NULL)
4451 dns_zone_detach(&zone);
4500 * Compute a policy owner name, p_name, in a policy zone given the needed
4517 * and policy zone and a prefix that is the longest possible string
4576 * Look in policy zone rpz for a policy of rpz_type by p_name.
4608 * request from the policy zone.
4704 * with a single policy zone when we have no summary database.
4735 SAVE(st->m.zone, *zonep);
4754 * Check this address in every eligible policy zone.
4795 * previously found policy zone.
4828 * policy zone updates.
4852 * both are of the same type and in the same zone.
4866 * policy zone. The radix tree in the policy zone
4881 * and try the next eligible policy zone.
5083 * is only one eligible policy zone so that wildcard triggers
5100 * Check the trigger name in every policy zone that the summary data
5104 * We check the most eligible zone first and so usually check only
5105 * one policy zone.
5125 * Get the next policy zone's record for this trigger name.
5141 * policy zone updates.
5216 * and try the next eligible policy zone.
5259 * Look for response policy zone QNAME, NSIP, and NSDNAME rewriting.
5437 * IP address triggers. If the qname misses the 1st zone,
5439 * 2nd zone matters until after recursing to get the A RRs and
5440 * testing them in the first zone.
5635 st->m.type, st->m.zone, st->p_name,
5652 * See if response policy zone rewriting is allowed by a lack of interest
5758 st->m.type, st->m.zone, st->p_name, fname,
5763 * response policy zone cannot verify.
6263 * Look for the name and type in the redirection zone. If found update
6340 * Lookup the requested data in the redirect zone.
6400 dns_zone_t *zone = NULL;
6461 result = query_getdb(client, redirectname, qtype, options, &zone,
6465 if (zone != NULL)
6466 dns_zone_detach(&zone);
6469 * Lookup the requested data in the redirect zone.
6579 dns_zone_t *zone;
6627 zone = NULL;
6696 RESTORE(zone, rpz_st->q.zone);
6733 RESTORE(zone, client->query.redirect.zone);
6935 &zone, &db, &version, &is_zone);
6943 * authoritative for the child zone.
6957 if (zone != NULL)
6958 dns_zone_detach(&zone);
6962 RESTORE(zone, tzone);
6992 if (zone != NULL &&
6993 dns_zone_gettype(zone) == dns_zone_staticstub)
6999 if (zone != NULL) {
7001 * if is_zone = true, zone = NULL then this is
7002 * a DLZ zone. Don't attempt to attach zone.
7004 dns_zone_attach(zone, &client->query.authzone);
7010 /* Track TCP vs UDP stats per zone */
7238 SAVE(rpz_st->q.zone, zone);
7269 rpz_clean(&zone, &db, &node, NULL);
7282 RESTORE(zone, rpz_st->m.zone);
7293 rpz_st->m.type, zone,
7301 rpz_st->m.type, zone,
7370 * response policy zone cannot verify.
7378 rpz_st->m.type, zone, rpz_st->p_name,
7469 * child zone if the query type is DS.
7496 if (zone != NULL)
7497 dns_zone_detach(&zone);
7501 RESTORE(zone, tzone);
7595 * of a static-stub zone. This needs to be
7597 * the static-stub zone and the cached NS
7600 * static-stub zone.
7934 SAVE(client->query.redirect.zone, zone);
7981 * the containing zone of an arbitrary name with a stub
7989 zone != NULL && dns_zone_getzeronosoattl(zone))
8045 SAVE(client->query.redirect.zone, zone);
8379 * since the synthesized CNAME is NOT in the zone.
8512 * The zone is transitioning from insecure
8829 if (zone != NULL && is_zone && qtype == dns_rdatatype_soa &&
8834 dns_zone_getraw(zone, &raw);
8835 mayberaw = (raw != NULL) ? raw : zone;
8840 dns_zone_getexpiretime(zone, &expiretime);
8960 if (zone != NULL)
8961 dns_zone_detach(&zone);