/bind-9.11.3/lib/dns/ |
H A D | dns64.c | 205 isc_boolean_t answer = ISC_FALSE; local 247 answer = ISC_TRUE; 270 answer = ISC_TRUE; 292 return (found ? answer : ISC_TRUE);
|
H A D | nsec.c | 237 isc_boolean_t *answer) 244 REQUIRE(answer != NULL); 257 *answer = ISC_FALSE; 277 *answer = ISC_TRUE; 279 *answer = ISC_FALSE; 236 dns_nsec_nseconly(dns_db_t *db, dns_dbversion_t *version, isc_boolean_t *answer) argument
|
H A D | badcache.c | 228 isc_boolean_t answer = ISC_FALSE; local 273 answer = ISC_TRUE; 292 return (answer);
|
H A D | nta.c | 436 isc_boolean_t answer = ISC_FALSE; local 460 answer = ISC_TF(nta->expiry > now); 464 if (result == ISC_R_SUCCESS && !answer) { 496 return (answer);
|
H A D | nsec3.c | 1676 isc_boolean_t complete, isc_boolean_t *answer) 1678 return (dns_nsec3_activex(db, version, complete, 0, answer)); 1684 isc_boolean_t *answer) 1691 REQUIRE(answer != NULL); 1725 *answer = ISC_TRUE; 1729 *answer = ISC_FALSE; 1733 *answer = ISC_FALSE; 1741 *answer = ISC_FALSE; 1766 *answer = ISC_TRUE; 1770 *answer 1675 dns_nsec3_active(dns_db_t *db, dns_dbversion_t *version, isc_boolean_t complete, isc_boolean_t *answer) argument 1682 dns_nsec3_activex(dns_db_t *db, dns_dbversion_t *version, isc_boolean_t complete, dns_rdatatype_t privatetype, isc_boolean_t *answer) argument 1859 isc_result_t answer = ISC_R_IGNORE; local [all...] |
H A D | request.c | 71 isc_buffer_t *answer; member in struct:dns_request 473 request->answer = NULL; 1282 REQUIRE(request->answer != NULL); 1293 result = dns_message_parse(message, request->answer, options); 1297 result = dns_tsig_verify(request->answer, message, NULL, NULL); 1454 result = isc_buffer_allocate(request->mctx, &request->answer, 1458 result = isc_buffer_copyregion(request->answer, &r); 1460 isc_buffer_free(&request->answer); 1531 if (request->answer != NULL) 1532 isc_buffer_free(&request->answer); [all...] |
H A D | cache.c | 1208 isc_result_t result, answer = ISC_R_SUCCESS; local 1249 if (result != ISC_R_SUCCESS && answer == ISC_R_SUCCESS) 1250 answer = result; 1258 if (result != ISC_R_SUCCESS && answer == ISC_R_SUCCESS) 1259 answer = result; 1267 return (answer);
|
H A D | validator.c | 46 * validator_start -> validate -> nsecvalidate (secure wildcard answer) 70 * proveunsecure: attempts to prove the answer comes from a unsecure zone. 170 * Mark the RRsets as a answer. 174 validator_log(val, ISC_LOG_DEBUG(3), "marking as answer (%s)", where); 1330 * we have a key of trust answer but a DS/DLV 1427 isc_boolean_t answer = ISC_FALSE; local 1436 return (answer); 1477 answer = ISC_TRUE; 1483 return (answer); 2677 * would return a negative answer, whic [all...] |
H A D | client.c | 926 * Add the CNAME to the answer list. 960 * Add the DNAME to the answer list. 1088 * to which we've got the answer. 1945 dns_message_t *answer = NULL; local 1964 &answer); 1968 result = dns_request_getresponse(request, answer, 1970 if (result == ISC_R_SUCCESS && answer->rcode != dns_rcode_noerror) 1971 result = rcode2result(answer->rcode); 1974 if (answer != NULL) 1975 dns_message_destroy(&answer); [all...] |
H A D | rbtdb.c | 3239 * this is the best answer and the search should 3480 isc_boolean_t answer = ISC_FALSE; local 3516 answer = ISC_TRUE; 3517 return (answer); 3536 isc_boolean_t answer = ISC_FALSE; local 3623 answer = ISC_TRUE; 3632 return (answer); 4364 * Glue is not OK, but any answer we 4394 * We've found the answer! 5172 * We've found the answer [all...] |
H A D | zone.c | 2744 isc_boolean_t answer = ISC_TRUE; local 2816 answer = (zone->checkns)(zone, name, owner, 2822 return (answer); 2852 /* answer = ISC_FALSE; */ 2858 /* answer = ISC_FALSE; */ 2865 /* answer = ISC_FALSE; */ 2872 return (answer); 2881 isc_boolean_t answer = ISC_TRUE; local 2922 answer = ISC_FALSE; 2930 return (answer); 4406 isc_boolean_t answer = ISC_FALSE; local 5167 isc_result_t answer = ISC_R_SUCCESS; local 7240 need_nsec_chain(dns_db_t *db, dns_dbversion_t *ver, const dns_rdata_nsec3param_t *param, isc_boolean_t *answer) argument 8977 isc_boolean_t answer = ISC_FALSE; local [all...] |
/bind-9.11.3/lib/isc/win32/ |
H A D | file.c | 851 isc_boolean_t answer = ISC_FALSE; local 854 return (answer); 865 return (answer); 869 return (answer); 874 return (answer); 885 return (answer); 915 answer = ISC_TF(result); 922 return (answer);
|
/bind-9.11.3/bin/check/ |
H A D | check-tool.c | 189 isc_boolean_t answer = ISC_TRUE; local 201 return (answer); 239 /* answer = ISC_FALSE; */ 293 /* answer = ISC_FALSE; */ 323 /* answer = ISC_FALSE; */ 369 /* answer = ISC_FALSE; */ 377 return (answer); 391 isc_boolean_t answer = ISC_TRUE; local 435 answer = ISC_FALSE; 439 return (answer); 477 isc_boolean_t answer = ISC_TRUE; local [all...] |
/bind-9.11.3/bin/named/ |
H A D | update.c | 215 dns_message_t *answer; member in struct:update_event 3400 forward_callback(void *arg, isc_result_t result, dns_message_t *answer) { argument 3406 INSIST(answer == NULL); 3413 uev->answer = answer; 3429 ns_client_sendraw(client, uev->answer); 3430 dns_message_destroy(&uev->answer);
|
H A D | query.c | 70 /*% Partial answer? */ 239 * answer counter, preventing double-counting. 263 dns_section_t answer = DNS_SECTION_ANSWER; local 264 if (ISC_LIST_EMPTY(client->message->sections[answer])) { 930 * Find a zone database to answer the query. 1133 * Find a cache database to answer the query. 2384 * To the current response for 'client', add the answer RRset 2463 * as this provides a easy way to see if the answer was signed. 2694 * To the current response for 'client', add the answer RRset 3388 * If the answer i [all...] |
/bind-9.11.3/bin/nsupdate/ |
H A D | nsupdate.c | 189 static dns_message_t *answer = NULL; variable 2147 if (strcasecmp(word, "answer") == 0) { 2148 if (answer != NULL) 2149 show_message(stdout, answer, "Answer:"); 2186 "answer (show the answer to the last request)\n" 2349 result = dns_message_create(gmctx, DNS_MESSAGE_INTENTPARSE, &answer); 2351 result = dns_request_getresponse(request, answer, 2355 if (answer->verify_attempted) 2365 if (usegsstsig && answer [all...] |
/bind-9.11.3/bin/dnssec/ |
H A D | dnssec-signzone.c | 3663 isc_boolean_t answer; local 3668 result = dns_nsec_nseconly(gdb, gversion, &answer); 3675 else if (answer)
|