Lines Matching defs:server

89         dns_server_unref(t->server);
300 "DNS_SERVER=%s", dns_server_string(t->server),
301 "DNS_SERVER_FEATURE_LEVEL=%s", dns_server_feature_level_to_string(t->server->possible_feature_level),
371 DnsServer *server;
376 server = dns_scope_get_dns_server(t->scope);
377 if (!server)
380 t->current_feature_level = dns_server_possible_feature_level(server);
382 if (server == t->server)
385 dns_server_unref(t->server);
386 t->server = dns_server_ref(server);
398 /* Before we try again, switch to a new server. */
411 if (!t->server)
414 if (t->current_feature_level <= dns_server_possible_feature_level(t->server))
417 /* The server's current feature level is lower than when we sent the original query. We learnt something from
454 dns_server_packet_lost(t->server, IPPROTO_TCP, t->current_feature_level, usec - t->start_usec);
503 if (!dns_server_dnssec_supported(t->server) && dns_type_is_dnssec(t->key->type))
506 r = dns_server_adjust_opt(t->server, t->sent, t->current_feature_level);
510 fd = dns_scope_socket_tcp(t->scope, AF_UNSPEC, NULL, t->server, 53);
581 * the assumption that a locally running DNS server would
702 * server is bad, refuse operation. */
717 dns_server_warn_downgrade(t->server);
763 * CNAME/DNAME chain. This way, we uniformly handle CNAME/DNAME chains, regardless if the DNS server
764 * incorrectly implements RCODE, whether DNSSEC is in use, or whether the DNS server only supplied us with an
874 assert(t->server);
881 dns_server_packet_failed(t->server, t->current_feature_level);
885 dns_server_packet_truncated(t->server, t->current_feature_level);
916 /* Tried to ask for DNSSEC RRs, on a server that doesn't do DNSSEC */
926 /* On DNS, couldn't send? Try immediately again, with a new server */
941 if (t->server) {
943 dns_server_packet_bad_opt(t->server, t->current_feature_level);
945 dns_server_packet_received(t->server, p->ipproto, t->current_feature_level, ts - t->start_usec, p->size);
1029 dns_server_packet_lost(t->server, IPPROTO_UDP, t->current_feature_level, usec - t->start_usec);
1073 if (!dns_server_dnssec_supported(t->server) && dns_type_is_dnssec(t->key->type))
1081 fd = dns_scope_socket_udp(t->scope, t->server, 53);
1095 r = dns_server_adjust_opt(t->server, t->sent, t->current_feature_level);
1117 /* Timeout reached? Increase the timeout for the server used */
1121 assert(t->server);
1122 dns_server_packet_lost(t->server, t->stream ? IPPROTO_TCP : IPPROTO_UDP, t->current_feature_level, usec - t->start_usec);
1151 assert(t->server);
1152 return t->server->resend_timeout;
1238 * them, and the DNS server won't tell
1269 * server to use. Should this cause a change of server this
1510 log_debug("Sending query via TCP since server doesn't support UDP.");
1521 /* Tried to ask for DNSSEC RRs, on a server that doesn't do DNSSEC */
1535 /* Couldn't send? Try immediately again, with a new server */
1750 /* Checks whether our transaction's DNS server is assumed to be compatible with DNSSEC. Returns false as soon
1751 * as we changed our mind about a server, and now believe it is incompatible with DNSSEC. */
1756 /* If we have picked no server, then we are working from the cache or some other source, and DNSSEC might well
1758 if (!t->server)
1764 return dns_server_dnssec_supported(t->server);
2460 * not to be signed, there's a problem with the DNS server */
2580 /* The server does not support DNSSEC, or doesn't augment responses with RRSIGs. */
2582 log_debug("Not validating response for %" PRIu16 ", server lacks DNSSEC support.", t->id);
2756 * the server is not attaching RRSIGs, hence complain. */
2758 dns_server_packet_rrsig_missing(t->server, t->current_feature_level);