Searched defs:zone (Results 1 - 7 of 7) sorted by relevance

/systemd/src/resolve/
H A Dresolved-dns-scope.h30 #include "resolved-dns-zone.h"
51 DnsZone zone; member in struct:DnsScope
68 * the zone probing can't reuse a transaction answered from
69 * the zone or the cache), and the hashmap only tracks the
H A Dresolved-dns-zone.c24 #include "resolved-dns-zone.h"
553 int dns_zone_check_conflicts(DnsZone *zone, DnsResourceRecord *rr) { argument
557 assert(zone);
565 first = hashmap_get(zone->by_name, DNS_RESOURCE_KEY_NAME(rr->key));
570 if (dns_zone_get(zone, rr))
587 int dns_zone_verify_conflicts(DnsZone *zone, DnsResourceKey *key) { argument
591 assert(zone);
596 first = hashmap_get(zone->by_name, DNS_RESOURCE_KEY_NAME(key));
608 void dns_zone_verify_all(DnsZone *zone) { argument
612 assert(zone);
622 dns_zone_dump(DnsZone *zone, FILE *f) argument
651 dns_zone_is_empty(DnsZone *zone) argument
[all...]
H A Dresolved-dns-answer.c321 int dns_answer_contains_zone_nsec3(DnsAnswer *answer, const char *zone) { argument
325 /* Checks whether the specified answer contains at least one NSEC3 RR in the specified zone */
340 r = dns_name_equal(p, zone);
H A Dresolved-dns-dnssec.c43 * Normal RRs are protected via RRSIG RRs in combination with DNSKEY RRs, all in the same zone
44 * DNSKEY RRs are either protected like normal RRs, or via a DS from a zone "higher" up the tree
668 /* Some keys may only appear signed in the zone apex, and are invalid anywhere else. (SOA, NS...) */
679 /* OTOH DS RRs may not appear in the zone apex, but are valid everywhere else. */
1264 /* Ignore NSEC3 RRs that are located anywhere else than one label below the zone */
1271 /* If a second NSEC3 RR is specified, also check if they are from the same zone. */
1305 static int nsec3_hashed_domain_format(const uint8_t *hashed, size_t hashed_size, const char *zone, char **ret) { argument
1311 assert(zone);
1318 j = strjoin(l, ".", zone, NULL);
1326 static int nsec3_hashed_domain_make(DnsResourceRecord *nsec3, const char *domain, const char *zone, cha argument
1354 const char *zone, *p, *pp = NULL, *wildcard; local
1887 dnssec_nsec_test_enclosed(DnsAnswer *answer, uint16_t type, const char *name, const char *zone, bool *authenticated) argument
1980 dnssec_test_positive_wildcard_nsec3( DnsAnswer *answer, const char *name, const char *source, const char *zone, bool *authenticated) argument
2019 dnssec_test_positive_wildcard_nsec( DnsAnswer *answer, const char *name, const char *source, const char *zone, bool *_authenticated) argument
2096 dnssec_test_positive_wildcard( DnsAnswer *answer, const char *name, const char *source, const char *zone, bool *authenticated) argument
2178 dnssec_test_positive_wildcard( DnsAnswer *answer, const char *name, const char *source, const char *zone, bool *authenticated) argument
[all...]
H A Dresolved-dns-rr.c1267 int dns_resource_record_is_signer(DnsResourceRecord *rr, const char *zone) { argument
1277 return dns_name_equal(zone, signer);
/systemd/src/test/
H A Dtest-time.c172 char **zone; local
177 STRV_FOREACH(zone, zones)
178 assert_se(timezone_is_valid(*zone));
/systemd/src/timedate/
H A Dtimedated.c51 char *zone; member in struct:Context
61 free(c->zone);
73 log_warning_errno(r, "/etc/localtime should be a symbolic link to a time zone data file in /usr/share/zoneinfo/.");
77 free(c->zone);
78 c->zone = t;
92 if (isempty(c->zone)) {
99 p = strappend("../usr/share/zoneinfo/", c->zone);
355 return sd_bus_error_setf(error, SD_BUS_ERROR_INVALID_ARGS, "Invalid time zone '%s'", z);
357 if (streq_ptr(z, c->zone))
378 free(c->zone);
[all...]

Completed in 1689 milliseconds