/systemd/src/resolve/ |
H A D | resolved-dns-synthesize.c | 28 * interface, we synthesize the answer for that 30 * only return localhost RRs, we synthesize the answer for 44 * question, even though we are synthesizing the answer 75 static int synthesize_localhost_rr(Manager *m, const DnsResourceKey *key, int ifindex, DnsAnswer **answer) { argument 80 assert(answer); 82 r = dns_answer_reserve(answer, 2); 95 r = dns_answer_add(*answer, rr, dns_synthesize_ifindex(ifindex), DNS_ANSWER_AUTHENTICATED); 109 r = dns_answer_add(*answer, rr, dns_synthesize_ifindex(ifindex), DNS_ANSWER_AUTHENTICATED); 117 static int answer_add_ptr(DnsAnswer **answer, const char *from, const char *to, int ifindex, DnsAnswerFlags flags) { argument 128 return dns_answer_add(*answer, r 131 synthesize_localhost_ptr(Manager *m, const DnsResourceKey *key, int ifindex, DnsAnswer **answer) argument 151 answer_add_addresses_rr( DnsAnswer **answer, const char *name, struct local_address *addresses, unsigned n_addresses) argument 182 answer_add_addresses_ptr( DnsAnswer **answer, const char *name, struct local_address *addresses, unsigned n_addresses, int af, const union in_addr_union *match) argument 223 synthesize_system_hostname_rr(Manager *m, const DnsResourceKey *key, int ifindex, DnsAnswer **answer) argument 264 synthesize_system_hostname_ptr(Manager *m, int af, const union in_addr_union *address, int ifindex, DnsAnswer **answer) argument 307 synthesize_gateway_rr(Manager *m, const DnsResourceKey *key, int ifindex, DnsAnswer **answer) argument 325 synthesize_gateway_ptr(Manager *m, int af, const union in_addr_union *address, int ifindex, DnsAnswer **answer) argument [all...] |
H A D | resolved-etc-hosts.h | 24 #include "resolved-dns-answer.h" 28 int manager_etc_hosts_lookup(Manager *m, DnsQuestion* q, DnsAnswer **answer);
|
H A D | resolved-dns-cache.h | 34 #include "resolved-dns-answer.h" 42 int dns_cache_put(DnsCache *c, DnsResourceKey *key, int rcode, DnsAnswer *answer, bool authenticated, uint32_t nsec_ttl, usec_t timestamp, int owner_family, const union in_addr_union *owner_address); 43 int dns_cache_lookup(DnsCache *c, DnsResourceKey *key, int *rcode, DnsAnswer **answer, bool *authenticated);
|
H A D | resolved-dns-trust-anchor.h | 25 #include "resolved-dns-answer.h" 39 int dns_trust_anchor_lookup_positive(DnsTrustAnchor *d, const DnsResourceKey* key, DnsAnswer **answer);
|
H A D | resolved-dns-dnssec.h | 26 #include "resolved-dns-answer.h" 69 int dnssec_verify_rrset(DnsAnswer *answer, const DnsResourceKey *key, DnsResourceRecord *rrsig, DnsResourceRecord *dnskey, usec_t realtime, DnssecResult *result); 70 int dnssec_verify_rrset_search(DnsAnswer *answer, const DnsResourceKey *key, DnsAnswer *validated_dnskeys, usec_t realtime, DnssecResult *result, DnsResourceRecord **rrsig); 93 int dnssec_nsec_test(DnsAnswer *answer, DnsResourceKey *key, DnssecNsecResult *result, bool *authenticated, uint32_t *ttl);
|
H A D | resolved-dns-query.c | 368 q->answer = dns_answer_unref(q->answer); 598 _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL; 621 &answer); 628 q->answer = answer; 629 answer = NULL; 641 _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL; 652 &answer); 658 q->answer [all...] |
H A D | resolved-dns-scope.c | 598 DnsAnswer *answer, 611 && (!answer || answer->n_rrs <= 0) 641 if (answer) { 642 for (i = 0; i < answer->n_rrs; i++) { 643 r = dns_packet_append_rr(p, answer->items[i].rr, NULL, NULL); 648 DNS_PACKET_HEADER(p)->ancount = htobe16(answer->n_rrs); 676 if (p->answer) 677 for (n = 0; n < p->answer->n_rrs; n++) 678 dns_zone_verify_conflicts(&s->zone, p->answer 593 dns_scope_make_reply_packet( DnsScope *s, uint16_t id, int rcode, DnsQuestion *q, DnsAnswer *answer, DnsAnswer *soa, bool tentative, DnsPacket **ret) argument [all...] |
H A D | resolved-dns-trust-anchor.c | 56 _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL; 85 answer = dns_answer_new(1); 86 if (!answer) 89 r = dns_answer_add(answer, rr, 0, DNS_ANSWER_AUTHENTICATED); 93 r = hashmap_put(d->positive_by_key, rr->key, answer); 97 answer = NULL; 193 _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL; 341 answer = dns_answer_ref(old_answer); 343 r = dns_answer_add_extend(&answer, rr, 0, DNS_ANSWER_AUTHENTICATED); 347 r = hashmap_replace(d->positive_by_key, rr->key, answer); [all...] |
H A D | resolved-dns-cache.c | 22 #include "resolved-dns-answer.h" 560 DnsAnswer *answer) { 573 /* Second, flush all entries matching the answer, unless this 576 DNS_ANSWER_FOREACH_FLAGS(rr, flags, answer) { 613 DnsAnswer *answer, 628 dns_cache_remove_previous(c, key, answer); 630 if (dns_answer_size(answer) <= 0) { 650 cache_keys = dns_answer_size(answer); 661 DNS_ANSWER_FOREACH_FULL(rr, ifindex, flags, answer) { 687 r = dns_answer_match_key(answer, ke 557 dns_cache_remove_previous( DnsCache *c, DnsResourceKey *key, DnsAnswer *answer) argument 609 dns_cache_put( DnsCache *c, DnsResourceKey *key, int rcode, DnsAnswer *answer, bool authenticated, uint32_t nsec_ttl, usec_t timestamp, int owner_family, const union in_addr_union *owner_address) argument [all...] |
H A D | resolved-dns-zone.h | 32 #include "resolved-dns-answer.h" 68 int dns_zone_lookup(DnsZone *z, DnsResourceKey *key, DnsAnswer **answer, DnsAnswer **soa, bool *tentative);
|
H A D | resolved-dns-transaction.c | 39 t->answer = dns_answer_unref(t->answer); 446 /* If the LLMNR/TCP connection failed, the host doesn't support LLMNR, and we cannot answer the 590 t->answer, 738 /* Checks whether the answer is positive, i.e. either a direct 739 * answer to the question, or a CNAME/DNAME for it */ 741 r = dns_answer_match_key(t->answer, t->key, flags); 745 r = dns_answer_find_cname_or_dname(t->answer, t->key, NULL, flags); 966 /* Install the answer as answer t [all...] |
H A D | resolved-etc-hosts.c | 327 int manager_etc_hosts_lookup(Manager *m, DnsQuestion* q, DnsAnswer **answer) { argument 338 assert(answer); 378 r = dns_answer_reserve(answer, strv_length(item->names)); 393 r = dns_answer_add(*answer, rr, 0, DNS_ANSWER_AUTHENTICATED); 406 r = dns_answer_reserve(answer, bn->n_items); 442 r = dns_answer_add(*answer, rr, 0, DNS_ANSWER_AUTHENTICATED);
|
H A D | resolved-dns-query.h | 30 #include "resolved-dns-answer.h" 81 DnsAnswer *answer; member in struct:DnsQuery
|
H A D | resolved-dns-dnssec.c | 1352 static int dnssec_test_nsec3(DnsAnswer *answer, DnsResourceKey *key, DnssecNsecResult *result, bool *authenticated, uint32_t *ttl) { argument 1370 DNS_ANSWER_FOREACH_FLAGS(zone_rr, flags, answer) { 1396 /* Second step, find the closest encloser NSEC3 RR in 'answer' that matches 'key' */ 1409 DNS_ANSWER_FOREACH_FLAGS(enclosure_rr, flags, answer) { 1506 DNS_ANSWER_FOREACH_FLAGS(rr, flags, answer) { 1753 int dnssec_nsec_test(DnsAnswer *answer, DnsResourceKey *key, DnssecNsecResult *result, bool *authenticated, uint32_t *ttl) { argument 1767 DNS_ANSWER_FOREACH_FLAGS(rr, flags, answer) { 1880 return dnssec_test_nsec3(answer, key, result, authenticated, ttl); 1887 static int dnssec_nsec_test_enclosed(DnsAnswer *answer, uint16_t type, const char *name, const char *zone, bool *authenticated) { argument 1898 DNS_ANSWER_FOREACH_FLAGS(rr, flags, answer) { 1980 dnssec_test_positive_wildcard_nsec3( DnsAnswer *answer, const char *name, const char *source, const char *zone, bool *authenticated) argument 2019 dnssec_test_positive_wildcard_nsec( DnsAnswer *answer, const char *name, const char *source, const char *zone, bool *_authenticated) argument 2096 dnssec_test_positive_wildcard( DnsAnswer *answer, const char *name, const char *source, const char *zone, bool *authenticated) argument 2173 dnssec_nsec_test(DnsAnswer *answer, DnsResourceKey *key, DnssecNsecResult *result, bool *authenticated, uint32_t *ttl) argument 2178 dnssec_test_positive_wildcard( DnsAnswer *answer, const char *name, const char *source, const char *zone, bool *authenticated) argument [all...] |
H A D | resolved-dns-zone.c | 286 _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL, *soa = NULL; 357 answer = dns_answer_new(n_answer); 358 if (!answer) 387 r = dns_answer_add(answer, j->rr, 0, DNS_ANSWER_AUTHENTICATED); 413 r = dns_answer_add(answer, j->rr, 0, DNS_ANSWER_AUTHENTICATED); 446 *ret_answer = answer; 447 answer = NULL;
|
H A D | test-dnssec.c | 56 _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL; 113 answer = dns_answer_new(1); 114 assert_se(answer); 115 assert_se(dns_answer_add(answer, nsec, 0, DNS_ANSWER_AUTHENTICATED) >= 0); 118 assert_se(dnssec_verify_rrset(answer, nsec->key, rrsig, dnskey, 1449849318*USEC_PER_SEC, &result) >= 0); 148 _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL; 192 answer = dns_answer_new(1); 193 assert_se(answer); 194 assert_se(dns_answer_add(answer, a, 0, DNS_ANSWER_AUTHENTICATED) >= 0); 197 assert_se(dnssec_verify_rrset(answer, [all...] |
H A D | resolved-dns-transaction.h | 58 #include "resolved-dns-answer.h" 80 DnsAnswer *answer; member in struct:DnsTransaction 87 /* Indicates whether the primary answer is authenticated, 88 * i.e. whether the RRs from answer which directly match the 91 * additional RRs listed in the answer, however they have 94 * that covers more than just the actual primary answer. */
|
H A D | resolved-dns-answer.h | 65 int dns_answer_contains_zone_nsec3(DnsAnswer *answer, const char *zone); 90 void dns_answer_dump(DnsAnswer *answer, FILE *f);
|
H A D | resolved-mdns.c | 93 * While on other protocols, we can ignore every answer that doesn't match a question 97 * Hence, extract the packet here, and try to find a transaction for answer the we got 108 DNS_ANSWER_FOREACH(rr, p->answer) { 123 dns_cache_put(&scope->cache, NULL, DNS_PACKET_RCODE(p), p->answer, false, (uint32_t) -1, 0, p->family, &p->sender);
|
H A D | resolved-dns-answer.c | 22 #include "resolved-dns-answer.h" 321 int dns_answer_contains_zone_nsec3(DnsAnswer *answer, const char *zone) { argument 325 /* Checks whether the specified answer contains at least one NSEC3 RR in the specified zone */ 327 DNS_ANSWER_FOREACH(rr, answer) { 494 *a = dns_answer_unref(*a); /* Return NULL for the empty answer */ 580 *a = dns_answer_unref(*a); /* Return NULL for the empty answer */ 786 void dns_answer_dump(DnsAnswer *answer, FILE *f) { argument 794 DNS_ANSWER_FOREACH_FULL(rr, ifindex, flags, answer) { 829 /* Checks whether the answer contains a DNAME record that indicates that the specified CNAME record is
|
H A D | resolved-bus.c | 171 DNS_ANSWER_FOREACH_IFINDEX(rr, ifindex, q->answer) { 333 DNS_ANSWER_FOREACH_IFINDEX(rr, ifindex, q->answer) { 502 DNS_ANSWER_FOREACH_IFINDEX(rr, ifindex, q->answer) { 641 DNS_ANSWER_FOREACH(zz, aux->answer) { 696 DNS_ANSWER_FOREACH_IFINDEX(zz, ifindex, aux->answer) { 823 DNS_ANSWER_FOREACH(rr, q->answer) { 855 DNS_ANSWER_FOREACH(rr, q->answer) { 991 DNS_ANSWER_FOREACH_IFINDEX(rr, ifindex, q->answer) {
|
H A D | resolved-dns-packet.c | 154 dns_answer_unref(p->answer); 2093 _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL; 2141 answer = dns_answer_new(n); 2142 if (!answer) { 2212 r = dns_answer_add(answer, rr, p->ifindex, 2232 p->answer = answer; 2233 answer = NULL;
|
/systemd/src/journal-remote/ |
H A D | journal-upload.h | 31 char *answer; member in struct:Uploader
|
H A D | journal-upload.c | 91 if (nmemb && !u->answer) { 92 u->answer = strndup(buf, size*nmemb); 93 if (!u->answer) 94 log_warning_errno(ENOMEM, "Failed to store server answer (%zu bytes): %m", 281 free(u->answer); 282 u->answer = 0; 474 free(u->answer); 517 u->url, status, strna(u->answer)); 521 u->url, status, strna(u->answer)); 525 status, strna(u->answer)); [all...] |
/systemd/src/shared/ |
H A D | fstab-util.c | 61 goto answer; 134 answer:
|