Lines Matching defs:other

341                 /* We need to be careful when notifying other
342 * transactions, as that might destroy other
645 /* We handle DNSSEC failures different from other errors, as we care about the DNSSEC
767 * Or in other words: if we get at least one positive reply in a message we patch NXDOMAIN to become SUCCESS,
805 /* For LLMNR we will not accept any packets from other
827 /* For mDNS we will not accept any packets from other interfaces */
1296 DnsTransaction *other;
1328 LIST_FOREACH(transactions_by_scope, other, t->scope->transactions) {
1331 if (other == t)
1334 if (other->state != DNS_TRANSACTION_PENDING)
1337 if (other->next_attempt_after > ts)
1343 r = dns_packet_append_key(p, other->key, NULL);
1347 * One of the 'other' transactions will fire later and take care of the rest.
1355 r = dns_transaction_prepare(other, ts);
1359 ts += transaction_get_resend_timeout(other);
1362 other->scope->manager->event,
1363 &other->timeout_event_source,
1366 on_transaction_timeout, other);
1372 other->state = DNS_TRANSACTION_PENDING;
1373 other->next_attempt_after = ts;
1377 if (dns_key_is_shared(other->key))
1756 /* If we have picked no server, then we are working from the cache or some other source, and DNSSEC might well
1801 * - For other unsigned RRs we get the matching SOA RR
1803 * - For other queries with no matching response RRs, and no NSEC/NSEC3, the SOA RR
1991 /* For other unsigned RRsets (including
2220 /* Any other kind of RR (including DNSKEY/NSEC/NSEC3). Let's see if our SOA lookup was authenticated */
2361 /* For all other RRs we check the SOA on the same level to see
2643 /* We validate all other RRs only in the ALL phases */