Lines Matching defs:in

7  * copyright notice and this permission notice appear in all copies.
27 * functions in most applications.
290 * the child name is used for delegation (NS DS responses in AUTHORITY section)
336 * Apply and clear locks at the event level in global task.
433 reverse_octets(const char *in, char **p, char *end) {
434 char *dot = strchr(in, '.');
444 len = dot - in;
446 len = strlen(in);
448 return (append(in, len, p, end));
480 * in-addr.arpa name by blindly reversing
487 if (strict && inet_pton(AF_INET, value, &addr.type.in) != 1)
492 /* Append .in-addr.arpa. and a terminating NUL. */
493 result = append(".in-addr.arpa.", 15, &p, end);
545 * This is little more than a linked list of servers to query in hopes
557 fatal("memory allocation failure in %s:%d",
717 fatal("memory allocation failure in %s:%d",
866 * queued for processing. If servers are not cloned in the requeue, they
868 * completion of the event may result in the next entry on the lookup
910 fatal("memory allocation failure in %s:%d",
1000 fatal("memory allocation failure in %s:%d",
1400 * If we can, start the next lookup in the queue running.
1535 * based on the supplied message and section. This is used in trace and
1537 * NS records in a reply. Returns the number of followup lookups made.
1703 * list, read in setup_system().
1762 * Insert an SOA record into the sendmessage in a lookup. Used for
1894 * we have if there's one in the struct already. If it's NULL,
1895 * take the first entry in the searchlist iff either usesearch
1896 * is TRUE or we got a domain line in the resolv.conf file.
1952 fatal("'%s' is not in legal name syntax (%s)",
1971 fatal("'%s' is not in legal name syntax (%s)",
2130 fatal("memory allocation failure in %s:%d",
2410 fatal("memory allocation failure in %s:%d",
2636 * For transfers that involve multiple recvs (XFR's in particular),
2685 debug("sending a request in launch_next_query");
2728 debug("in cancel handler");
2810 * By the time we're in this routine, we know we're doing
2814 * rr's in the message, acting as necessary whenever we hit
2997 debug("in recv cancel handler");
3190 printf(";; Truncated, retrying in TCP mode.\n");
3261 * Once we are in the XFR message, increase
3306 debug("in TRACE code");
3323 debug("in NSSEARCH code");
3349 fatal("Memory allocation failure in %s:%d",
3356 fatal("dns_message_create in %s:%d",
3375 fatal("Memory allocation failure in %s:%d",
3460 * used in looking up server names, etc... and needs to use system-supplied
3530 * Start everything in action upon task startup.
3782 * Copy the converted contents in 'tmp1' back to 'buffer'.
4021 printf("Error in the queried type: %d\n", querytype);
4437 * take a DNSKEY RRset and the RRSIG RRset corresponding in parameter
4475 printf(";; Ok, find a Trusted Key in the "
4647 " in the RRset\n");
4689 * take a pointer on a rdataset in parameter and try to resolv it.
4694 * ISC_R_NOTFOUND: we do not found the rrset in cache
4757 " in authority section:");
4761 printf("no response and no delegation in "
4883 printf("\n;; We are in a Grand Father Problem:"
4884 " See 2.2.1 in RFC 3568\n");
5346 printf(";; ERROR no DS validates a DNSKEY in the"
5455 printf(";; nothing in authority section : impossible to"
5468 printf("There is a NSEC for this zone in the"
5484 printf(";; no RRSIG NSEC in authority section:"
5579 printf(";; nothing in authority section : impossible to"