Home
last modified time | relevance | path

Searched refs:query (Results 1 – 25 of 299) sorted by relevance

12345678910>>...12

/openbsd-src/usr.sbin/nsd/
H A Daxfr.c22 query_axfr(struct nsd *nsd, struct query *query, int wstats) in query_axfr() argument
30 if (query->axfr_is_done) in query_axfr()
33 if (query->maxlen > AXFR_MAX_MESSAGE_LEN) in query_axfr()
34 query->maxlen = AXFR_MAX_MESSAGE_LEN; in query_axfr()
36 assert(!query_overflow(query)); in query_axfr()
38 query->tsig_prepare_it = 0; in query_axfr()
39 query->tsig_update_it = 1; in query_axfr()
40 if(query->tsig_sign_it) { in query_axfr()
42 query->tsig_prepare_it = 1; in query_axfr()
43 query->tsig_sign_it = 0; in query_axfr()
[all …]
H A Drrl.c150 static uint64_t rrl_get_source(query_type* query, uint16_t* c2) in rrl_get_source() argument
156 if( ((struct sockaddr_in*)&query->client_addr)->sin_family == AF_INET) { in rrl_get_source()
158 return ((struct sockaddr_in*)&query->client_addr)-> in rrl_get_source()
163 memmove(&s, &((struct sockaddr_in6*)&query->client_addr)->sin6_addr, in rrl_get_source()
169 return query->client_addr.sin_addr.s_addr & htonl(0xffffffff << (32-rrl_ipv4_prefixlen)); in rrl_get_source()
242 static uint16_t rrl_classify(query_type* query, const uint8_t** d, in rrl_classify() argument
245 if(RCODE(query->packet) == RCODE_NXDOMAIN) { in rrl_classify()
246 if(query->zone && query->zone->apex) { in rrl_classify()
247 *d = dname_name(domain_dname(query->zone->apex)); in rrl_classify()
248 *d_len = domain_dname(query->zone->apex)->name_size; in rrl_classify()
[all …]
H A Dquery.c46 static int answer_needs_ns(struct query *query);
48 static int add_rrset(struct query *query,
55 struct query *q,
63 static void answer_lookup_zone(struct nsd *nsd, struct query *q,
70 query_put_dname_offset(struct query *q, domain_type *domain, uint16_t offset) in query_put_dname_offset()
87 query_clear_dname_offsets(struct query *q, size_t max_offset) in query_clear_dname_offsets()
99 query_clear_compression_tables(struct query *q) in query_clear_compression_tables()
111 query_add_compression_domain(struct query *q, domain_type *domain, uint16_t offset) in query_add_compression_domain()
129 query_error (struct query *q, nsd_rc_type rcode) in query_error()
167 query_formerr (struct query *query, nsd_type* nsd) in query_formerr() argument
[all …]
H A Dquery.h31 typedef struct query query_type;
32 struct query { struct
159 static inline int query_overflow(struct query *q); argument
165 void query_put_dname_offset(struct query *query,
174 uint16_t query_get_dname_offset(struct query *query, domain_type *domain) in query_get_dname_offset() argument
176 return query->compressed_dname_offsets[domain->number]; in query_get_dname_offset()
185 void query_clear_dname_offsets(struct query *query, size_t max_offset);
190 void query_clear_compression_tables(struct query *query);
196 void query_add_compression_domain(struct query *query,
213 void query_reset(query_type *query, size_t maxlen, int is_tcp);
H A Dnsec3.c861 nsec3_add_rrset(struct query* query, struct answer* answer, in nsec3_add_rrset() argument
865 rrset_type* rrset = domain_find_rrset(domain, query->zone, TYPE_NSEC3); in nsec3_add_rrset()
873 nsec3_add_nonexist_proof(struct query* query, struct answer* answer, in nsec3_add_nonexist_proof() argument
882 to_prove = dname_partial_copy(query->region, qname, in nsec3_add_nonexist_proof()
885 nsec3_hash_and_store(query->zone, to_prove, hash); in nsec3_add_nonexist_proof()
886 if(nsec3_find_cover(query->zone, hash, sizeof(hash), &cover)) in nsec3_add_nonexist_proof()
894 walk = query->zone->apex; in nsec3_add_nonexist_proof()
917 RCODE_SET(query->packet, RCODE_SERVFAIL); in nsec3_add_nonexist_proof()
920 ASSIGN_EDE_CODE_AND_STRING_LITERAL(query->edns.ede, in nsec3_add_nonexist_proof()
927 nsec3_add_rrset(query, answer, AUTHORITY_SECTION, cover); in nsec3_add_nonexist_proof()
[all …]
H A Dixfr.c263 static int ixfr_write_rr_pkt(struct query* query, struct buffer* packet, in ixfr_write_rr_pkt() argument
276 size_t oldmaxlen = query->maxlen; in ixfr_write_rr_pkt()
278 query->maxlen = (query->tcp?TCP_MAX_MESSAGE_LEN:UDP_MAX_MESSAGE_LEN); in ixfr_write_rr_pkt()
279 if(query_overflow(query)) { in ixfr_write_rr_pkt()
280 query->maxlen = oldmaxlen; in ixfr_write_rr_pkt()
283 query->maxlen = oldmaxlen; in ixfr_write_rr_pkt()
286 || query_overflow(query)) { in ixfr_write_rr_pkt()
417 size_t oldmaxlen = query->maxlen; in ixfr_write_rr_pkt()
418 query->maxlen = (query->tcp?TCP_MAX_MESSAGE_LEN:UDP_MAX_MESSAGE_LEN); in ixfr_write_rr_pkt()
419 if(query_overflow(query)) { in ixfr_write_rr_pkt()
[all …]
H A Dnsec3.h19 struct query;
47 void nsec3_answer_wildcard(struct query* query, struct answer* answer,
54 void nsec3_answer_nodata(struct query *query, struct answer *answer,
60 void nsec3_answer_delegation(struct query *query, struct answer *answer);
66 void nsec3_answer_authoritative(struct domain** match, struct query *query,
H A Dserver.c203 static struct query *queries[NUM_RECV_PER_SELECT];
235 query_type* query; member
3048 server_process_query(struct nsd *nsd, struct query *query, uint32_t *now_p) in server_process_query() argument
3050 return query_process(query, nsd, now_p); in server_process_query()
3054 server_process_query_udp(struct nsd *nsd, struct query *query, uint32_t *now_p) in server_process_query_udp() argument
3057 if(query_process(query, nsd, now_p) != QUERY_DISCARDED) { in server_process_query_udp()
3058 if(query->edns.cookie_status != COOKIE_VALID in server_process_query_udp()
3059 && query->edns.cookie_status != COOKIE_VALID_REUSE in server_process_query_udp()
3060 && rrl_process_query(query)) in server_process_query_udp()
3061 return rrl_slip(query); in server_process_query_udp()
[all …]
H A Dpacket.c111 packet_encode_rrset(query_type *query, in packet_encode_rrset() argument
138 query->qtype != TYPE_AXFR && query->qtype != TYPE_IXFR); in packet_encode_rrset()
144 truncation_mark = buffer_position(query->packet); in packet_encode_rrset()
150 if (packet_encode_rr(query, owner, &rrset->rrs[i], in packet_encode_rrset()
160 if (packet_encode_rr(query, owner, &rrset->rrs[i], in packet_encode_rrset()
170 query->edns.dnssec_ok && in packet_encode_rrset()
179 if (packet_encode_rr(query, owner, in packet_encode_rrset()
193 if ((!all_added || buffer_position(query->packet) > minimal_respsize) in packet_encode_rrset()
194 && !query->tcp && minimize_response) { in packet_encode_rrset()
196 buffer_set_position(query->packet, truncation_mark); in packet_encode_rrset()
[all …]
H A Daxfr.h22 query_state_type answer_axfr_ixfr(struct nsd *nsd, struct query *q);
23 query_state_type query_axfr(struct nsd *nsd, struct query *query, int wstats);
H A Dedns.h15 struct query;
93 struct query* q, struct nsd* nsd);
103 void cookie_verify(struct query *q, struct nsd* nsd, uint32_t *now_p);
104 void cookie_create(struct query *q, struct nsd* nsd, uint32_t *now_p);
H A Dpacket.h18 struct query;
155 int packet_encode_rr(struct query *query,
166 int packet_encode_rrset(struct query *query,
H A Drrl.h67 int rrl_process_query(query_type* query);
73 query_state_type rrl_slip(query_type* query);
81 uint32_t rrl_update(query_type* query, uint32_t hash, uint64_t source,
/openbsd-src/usr.bin/dig/
H A Ddighost.c177 (*dighost_printmessage)(dig_query_t *query, dns_message_t *msg,
181 (*dighost_received)(unsigned int bytes, struct sockaddr_storage *from, dig_query_t *query);
198 send_udp(dig_query_t *query);
204 launch_next_query(dig_query_t *query, int include_question);
407 * This is little more than a linked list of servers to query in hopes
634 * linked lists: the server list (servers to query) and the query list
755 * the query list, since it will be regenerated by the setup_lookup()
1398 * Clear out a query when we're done with it. WARNING: This routine
1399 * WILL invalidate the query pointe
1401 clear_query(dig_query_t * query) clear_query() argument
1585 followup_lookup(dns_message_t * msg,dig_query_t * query,dns_section_t section) followup_lookup() argument
1904 dig_query_t *query; setup_lookup() local
2354 dig_query_t *query, *next; send_done() local
2399 dig_query_t *query, *next; cancel_lookup() local
2419 bringup_timer(dig_query_t * query,unsigned int default_timeout) bringup_timer() argument
2451 force_timeout(dig_query_t * query) force_timeout() argument
2483 send_tcp_connect(dig_query_t * query) send_tcp_connect() argument
2592 send_udp(dig_query_t * query) send_udp() argument
2664 dig_query_t *query = NULL, *cq; connect_timeout() local
2733 dig_query_t *query = NULL; tcp_length_done() local
2815 launch_next_query(dig_query_t * query,int include_question) launch_next_query() argument
2882 dig_query_t *query = NULL, *next; connect_done() local
2968 check_for_more_data(dig_query_t * query,dns_message_t * msg,isc_socketevent_t * sevent) check_for_more_data() argument
3209 dig_query_t *query = NULL; recv_done() local
3736 dig_query_t *query; do_lookup() local
[all...]
H A Ddig.c175 received(unsigned int bytes, struct sockaddr_storage *from, dig_query_t *query) { in received() argument
183 if (query->lookup->stats && !short_form) { in received()
186 uelapsed(&query->time_recv, &query->time_sent)); in received()
189 uelapsed(&query->time_recv, &query->time_sent) / in received()
191 printf(";; SERVER: %s(%s)\n", fromtext, query->servname); in received()
198 if (query->lookup->doing_xfr) { in received()
201 query->rr_count, query in received()
251 say_message(dns_rdata_t * rdata,dig_query_t * query,isc_buffer_t * buf) say_message() argument
294 short_answer(dns_message_t * msg,dns_messagetextflag_t flags,isc_buffer_t * buf,dig_query_t * query) short_answer() argument
364 printmessage(dig_query_t * query,dns_message_t * msg,int headers) printmessage() argument
[all...]
H A Dhost.c146 received(unsigned int bytes, struct sockaddr_storage *from, dig_query_t *query) { in received() argument
154 bytes, fromtext, uelapsed(&now, &query->time_sent)/1000); in received()
168 dig_query_t *query) in say_message() argument
188 if (query->lookup->identify_previous_line) { in say_message()
190 query->servname); in say_message()
194 if (query->lookup->identify) { in say_message()
195 printf(" on server %s", query->servname); in say_message()
203 dig_query_t *query) in printsection() argument
243 if (query->lookup->rdtype == dns_rdatatype_axfr && in printsection()
287 &rdata, query); in printsection()
[all …]
H A Dnslookup.c220 printsection(dig_query_t *query, dns_message_t *msg, int headers, in printsection() argument
228 UNUSED(query); in printsection()
286 detailsection(dig_query_t *query, dns_message_t *msg, int headers, in detailsection() argument
294 UNUSED(query); in detailsection()
372 received(unsigned int bytes, struct sockaddr_storage *from, dig_query_t *query) in received() argument
376 UNUSED(query); in received()
386 printmessage(dig_query_t *query, dns_message_t *msg, int headers) { in printmessage() argument
394 isc_sockaddr_format(&query->sockaddr, servtext, sizeof(servtext)); in printmessage()
395 printf("Server:\t\t%s\n", query->userarg); in printmessage()
403 detailsection(query, msg, 1, DNS_SECTION_QUESTION); in printmessage()
[all …]
/openbsd-src/usr.sbin/ntpd/
H A Dclient.c54 p->query.fd = -1; in client_peer_init()
55 p->query.msg.status = MODE_CLIENT | (NTP_VERSION << 3); in client_peer_init()
56 p->query.xmttime = 0; in client_peer_init()
93 p->query.fd = -1; in client_addr_init()
102 if (p->query.fd != -1) { in client_nextaddr()
103 close(p->query.fd); in client_nextaddr()
104 p->query.fd = -1; in client_nextaddr()
150 if (p->query.fd == -1) { in client_query()
155 if ((p->query.fd = socket(p->addr->ss.ss_family, SOCK_DGRAM, in client_query()
160 if (bind(p->query.fd, qa4, SA_LEN(qa4)) == -1) in client_query()
[all …]
H A Dserver.c158 struct ntp_msg query, reply; in server_dispatch() local
175 if (ntp_getmsg((struct sockaddr *)&fsa, buf, size, &query) == -1) in server_dispatch()
183 reply.status |= (query.status & VERSIONMASK); in server_dispatch()
184 if ((query.status & MODEMASK) == MODE_CLIENT) in server_dispatch()
186 else if ((query.status & MODEMASK) == MODE_SYM_ACT) in server_dispatch()
192 reply.ppoll = query.ppoll; in server_dispatch()
197 reply.orgtime = query.xmttime; in server_dispatch()
/openbsd-src/sys/dev/pci/drm/i915/
H A Di915_query.c134 struct drm_i915_query_engine_info query; in query_engine_info() local
148 ret = copy_query_item(&query, sizeof(query), len, query_item); in query_engine_info()
152 if (query.num_engines || query.rsvd[0] || query.rsvd[1] || in query_engine_info()
153 query.rsvd[2]) in query_engine_info()
168 query.num_engines++; in query_engine_info()
172 if (copy_to_user(query_ptr, &query, sizeof(query))) in query_engine_info()
479 struct drm_i915_query_memory_regions query; query_memregion_info() local
[all...]
/openbsd-src/gnu/usr.bin/perl/t/op/
H A Ddie_exit.t64 my($bang, $query, $code) = @$test;
67 system(qq{$^X -e "\$! = $bang; \$? = $query; $code"});
78 is($exit, (($bang || ($query >> 8) || 255) << 8),
79 sprintf "exit = 0x%04x bang = 0x%04x query = 0x%04x", $exit, $bang, $query);
/openbsd-src/usr.bin/vi/docs/internals/
H A Dcscope.NOTES5 per query. It will hopefully support ctags programs that create databases
58 and switches to the first location resulting from the query, if
59 the query returned at least one result.
72 locations per tag query.
84 Move to the next tag resulting from a query.
88 Return to the previous tag resulting from a query.
105 " Tab+letter performs a C-Scope query on the current word.
106 " C-Scope 12.9 has a text-string query (type t).
107 " C-Scope 13.3 replaces it with an assignment query; hence a==t.
/openbsd-src/sys/dev/pci/drm/amd/display/modules/hdcp/
H A Dhdcp.c485 uint8_t index, struct mod_hdcp_display_query *query) in mod_hdcp_query_display() argument
498 query->link = &hdcp->connection.link; in mod_hdcp_query_display()
499 query->display = display; in mod_hdcp_query_display()
500 query->trace = &hdcp->connection.trace; in mod_hdcp_query_display()
501 query->encryption_status = MOD_HDCP_ENCRYPTION_STATUS_HDCP_OFF; in mod_hdcp_query_display()
505 query->encryption_status = MOD_HDCP_ENCRYPTION_STATUS_HDCP1_ON; in mod_hdcp_query_display()
507 if (query->link->adjust.hdcp2.force_type == MOD_HDCP_FORCE_TYPE_0) in mod_hdcp_query_display()
508 query->encryption_status = MOD_HDCP_ENCRYPTION_STATUS_HDCP2_TYPE0_ON; in mod_hdcp_query_display()
509 else if (query->link->adjust.hdcp2.force_type == MOD_HDCP_FORCE_TYPE_1) in mod_hdcp_query_display()
510 query->encryption_status = MOD_HDCP_ENCRYPTION_STATUS_HDCP2_TYPE1_ON; in mod_hdcp_query_display()
[all …]
/openbsd-src/usr.sbin/nsd/dnstap/
H A Ddnstap.proto28 // "NSID" (RFC 5001) query.
34 // "version.bind" query.
76 // | | query | | query | |
108 // AUTH_QUERY is a DNS query message received from a resolver by an
118 // RESOLVER_QUERY is a DNS query message sent from a resolver to an
129 // CLIENT_QUERY is a DNS query message sent from a client to a DNS
143 // FORWARDER_QUERY is a DNS query message sent from a downstream DNS
154 // STUB_QUERY is a DNS query message sent from a stub resolver to a DNS
190 // The time at which the DNS query message was sent or received, depending
195 // The time at which the DNS query message was sent or received.
[all …]
/openbsd-src/usr.sbin/unbound/dnstap/
H A Ddnstap.proto28 // "NSID" (RFC 5001) query.
34 // "version.bind" query.
77 QNAME = 1; // Name in question section of query
125 // | | query | | query | |
157 // AUTH_QUERY is a DNS query message received from a resolver by an
167 // RESOLVER_QUERY is a DNS query message sent from a resolver to an
178 // CLIENT_QUERY is a DNS query message sent from a client to a DNS
192 // FORWARDER_QUERY is a DNS query message sent from a downstream DNS
203 // STUB_QUERY is a DNS query message sent from a stub resolver to a DNS
211 // TOOL_QUERY is a DNS query message sent from a DNS software tool to a
[all …]

12345678910>>...12