| /openbsd-src/usr.sbin/nsd/ |
| H A D | axfr.c | 22 query_axfr(struct nsd *nsd, struct query *query, int wstats) in query_axfr() argument 30 if (query->axfr_is_done) in query_axfr() 33 if (query->maxlen > AXFR_MAX_MESSAGE_LEN) in query_axfr() 34 query->maxlen = AXFR_MAX_MESSAGE_LEN; in query_axfr() 36 assert(!query_overflow(query)); in query_axfr() 38 query->tsig_prepare_it = 0; in query_axfr() 39 query->tsig_update_it = 1; in query_axfr() 40 if(query->tsig_sign_it) { in query_axfr() 42 query->tsig_prepare_it = 1; in query_axfr() 43 query->tsig_sign_it = 0; in query_axfr() [all …]
|
| H A D | rrl.c | 150 static uint64_t rrl_get_source(query_type* query, uint16_t* c2) in rrl_get_source() argument 156 if( ((struct sockaddr_in*)&query->client_addr)->sin_family == AF_INET) { in rrl_get_source() 158 return ((struct sockaddr_in*)&query->client_addr)-> in rrl_get_source() 163 memmove(&s, &((struct sockaddr_in6*)&query->client_addr)->sin6_addr, in rrl_get_source() 169 return query->client_addr.sin_addr.s_addr & htonl(0xffffffff << (32-rrl_ipv4_prefixlen)); in rrl_get_source() 242 static uint16_t rrl_classify(query_type* query, const uint8_t** d, in rrl_classify() argument 245 if(RCODE(query->packet) == RCODE_NXDOMAIN) { in rrl_classify() 246 if(query->zone && query->zone->apex) { in rrl_classify() 247 *d = dname_name(domain_dname(query->zone->apex)); in rrl_classify() 248 *d_len = domain_dname(query->zone->apex)->name_size; in rrl_classify() [all …]
|
| H A D | query.c | 46 static int answer_needs_ns(struct query *query); 48 static int add_rrset(struct query *query, 55 struct query *q, 63 static void answer_lookup_zone(struct nsd *nsd, struct query *q, 70 query_put_dname_offset(struct query *q, domain_type *domain, uint16_t offset) in query_put_dname_offset() 87 query_clear_dname_offsets(struct query *q, size_t max_offset) in query_clear_dname_offsets() 99 query_clear_compression_tables(struct query *q) in query_clear_compression_tables() 111 query_add_compression_domain(struct query *q, domain_type *domain, uint16_t offset) in query_add_compression_domain() 129 query_error (struct query *q, nsd_rc_type rcode) in query_error() 167 query_formerr (struct query *query, nsd_type* nsd) in query_formerr() argument [all …]
|
| H A D | query.h | 31 typedef struct query query_type; 32 struct query { struct 159 static inline int query_overflow(struct query *q); argument 165 void query_put_dname_offset(struct query *query, 174 uint16_t query_get_dname_offset(struct query *query, domain_type *domain) in query_get_dname_offset() argument 176 return query->compressed_dname_offsets[domain->number]; in query_get_dname_offset() 185 void query_clear_dname_offsets(struct query *query, size_t max_offset); 190 void query_clear_compression_tables(struct query *query); 196 void query_add_compression_domain(struct query *query, 213 void query_reset(query_type *query, size_t maxlen, int is_tcp);
|
| H A D | nsec3.c | 861 nsec3_add_rrset(struct query* query, struct answer* answer, in nsec3_add_rrset() argument 865 rrset_type* rrset = domain_find_rrset(domain, query->zone, TYPE_NSEC3); in nsec3_add_rrset() 873 nsec3_add_nonexist_proof(struct query* query, struct answer* answer, in nsec3_add_nonexist_proof() argument 882 to_prove = dname_partial_copy(query->region, qname, in nsec3_add_nonexist_proof() 885 nsec3_hash_and_store(query->zone, to_prove, hash); in nsec3_add_nonexist_proof() 886 if(nsec3_find_cover(query->zone, hash, sizeof(hash), &cover)) in nsec3_add_nonexist_proof() 894 walk = query->zone->apex; in nsec3_add_nonexist_proof() 917 RCODE_SET(query->packet, RCODE_SERVFAIL); in nsec3_add_nonexist_proof() 920 ASSIGN_EDE_CODE_AND_STRING_LITERAL(query->edns.ede, in nsec3_add_nonexist_proof() 927 nsec3_add_rrset(query, answer, AUTHORITY_SECTION, cover); in nsec3_add_nonexist_proof() [all …]
|
| H A D | ixfr.c | 263 static int ixfr_write_rr_pkt(struct query* query, struct buffer* packet, in ixfr_write_rr_pkt() argument 276 size_t oldmaxlen = query->maxlen; in ixfr_write_rr_pkt() 278 query->maxlen = (query->tcp?TCP_MAX_MESSAGE_LEN:UDP_MAX_MESSAGE_LEN); in ixfr_write_rr_pkt() 279 if(query_overflow(query)) { in ixfr_write_rr_pkt() 280 query->maxlen = oldmaxlen; in ixfr_write_rr_pkt() 283 query->maxlen = oldmaxlen; in ixfr_write_rr_pkt() 286 || query_overflow(query)) { in ixfr_write_rr_pkt() 417 size_t oldmaxlen = query->maxlen; in ixfr_write_rr_pkt() 418 query->maxlen = (query->tcp?TCP_MAX_MESSAGE_LEN:UDP_MAX_MESSAGE_LEN); in ixfr_write_rr_pkt() 419 if(query_overflow(query)) { in ixfr_write_rr_pkt() [all …]
|
| H A D | nsec3.h | 19 struct query; 47 void nsec3_answer_wildcard(struct query* query, struct answer* answer, 54 void nsec3_answer_nodata(struct query *query, struct answer *answer, 60 void nsec3_answer_delegation(struct query *query, struct answer *answer); 66 void nsec3_answer_authoritative(struct domain** match, struct query *query,
|
| H A D | server.c | 203 static struct query *queries[NUM_RECV_PER_SELECT]; 235 query_type* query; member 3048 server_process_query(struct nsd *nsd, struct query *query, uint32_t *now_p) in server_process_query() argument 3050 return query_process(query, nsd, now_p); in server_process_query() 3054 server_process_query_udp(struct nsd *nsd, struct query *query, uint32_t *now_p) in server_process_query_udp() argument 3057 if(query_process(query, nsd, now_p) != QUERY_DISCARDED) { in server_process_query_udp() 3058 if(query->edns.cookie_status != COOKIE_VALID in server_process_query_udp() 3059 && query->edns.cookie_status != COOKIE_VALID_REUSE in server_process_query_udp() 3060 && rrl_process_query(query)) in server_process_query_udp() 3061 return rrl_slip(query); in server_process_query_udp() [all …]
|
| H A D | packet.c | 111 packet_encode_rrset(query_type *query, in packet_encode_rrset() argument 138 query->qtype != TYPE_AXFR && query->qtype != TYPE_IXFR); in packet_encode_rrset() 144 truncation_mark = buffer_position(query->packet); in packet_encode_rrset() 150 if (packet_encode_rr(query, owner, &rrset->rrs[i], in packet_encode_rrset() 160 if (packet_encode_rr(query, owner, &rrset->rrs[i], in packet_encode_rrset() 170 query->edns.dnssec_ok && in packet_encode_rrset() 179 if (packet_encode_rr(query, owner, in packet_encode_rrset() 193 if ((!all_added || buffer_position(query->packet) > minimal_respsize) in packet_encode_rrset() 194 && !query->tcp && minimize_response) { in packet_encode_rrset() 196 buffer_set_position(query->packet, truncation_mark); in packet_encode_rrset() [all …]
|
| H A D | axfr.h | 22 query_state_type answer_axfr_ixfr(struct nsd *nsd, struct query *q); 23 query_state_type query_axfr(struct nsd *nsd, struct query *query, int wstats);
|
| H A D | edns.h | 15 struct query; 93 struct query* q, struct nsd* nsd); 103 void cookie_verify(struct query *q, struct nsd* nsd, uint32_t *now_p); 104 void cookie_create(struct query *q, struct nsd* nsd, uint32_t *now_p);
|
| H A D | packet.h | 18 struct query; 155 int packet_encode_rr(struct query *query, 166 int packet_encode_rrset(struct query *query,
|
| H A D | rrl.h | 67 int rrl_process_query(query_type* query); 73 query_state_type rrl_slip(query_type* query); 81 uint32_t rrl_update(query_type* query, uint32_t hash, uint64_t source,
|
| /openbsd-src/usr.bin/dig/ |
| H A D | dighost.c | 177 (*dighost_printmessage)(dig_query_t *query, dns_message_t *msg, 181 (*dighost_received)(unsigned int bytes, struct sockaddr_storage *from, dig_query_t *query); 198 send_udp(dig_query_t *query); 204 launch_next_query(dig_query_t *query, int include_question); 407 * This is little more than a linked list of servers to query in hopes 634 * linked lists: the server list (servers to query) and the query list 755 * the query list, since it will be regenerated by the setup_lookup() 1398 * Clear out a query when we're done with it. WARNING: This routine 1399 * WILL invalidate the query pointe 1401 clear_query(dig_query_t * query) clear_query() argument 1585 followup_lookup(dns_message_t * msg,dig_query_t * query,dns_section_t section) followup_lookup() argument 1904 dig_query_t *query; setup_lookup() local 2354 dig_query_t *query, *next; send_done() local 2399 dig_query_t *query, *next; cancel_lookup() local 2419 bringup_timer(dig_query_t * query,unsigned int default_timeout) bringup_timer() argument 2451 force_timeout(dig_query_t * query) force_timeout() argument 2483 send_tcp_connect(dig_query_t * query) send_tcp_connect() argument 2592 send_udp(dig_query_t * query) send_udp() argument 2664 dig_query_t *query = NULL, *cq; connect_timeout() local 2733 dig_query_t *query = NULL; tcp_length_done() local 2815 launch_next_query(dig_query_t * query,int include_question) launch_next_query() argument 2882 dig_query_t *query = NULL, *next; connect_done() local 2968 check_for_more_data(dig_query_t * query,dns_message_t * msg,isc_socketevent_t * sevent) check_for_more_data() argument 3209 dig_query_t *query = NULL; recv_done() local 3736 dig_query_t *query; do_lookup() local [all...] |
| H A D | dig.c | 175 received(unsigned int bytes, struct sockaddr_storage *from, dig_query_t *query) { in received() argument 183 if (query->lookup->stats && !short_form) { in received() 186 uelapsed(&query->time_recv, &query->time_sent)); in received() 189 uelapsed(&query->time_recv, &query->time_sent) / in received() 191 printf(";; SERVER: %s(%s)\n", fromtext, query->servname); in received() 198 if (query->lookup->doing_xfr) { in received() 201 query->rr_count, query in received() 251 say_message(dns_rdata_t * rdata,dig_query_t * query,isc_buffer_t * buf) say_message() argument 294 short_answer(dns_message_t * msg,dns_messagetextflag_t flags,isc_buffer_t * buf,dig_query_t * query) short_answer() argument 364 printmessage(dig_query_t * query,dns_message_t * msg,int headers) printmessage() argument [all...] |
| H A D | host.c | 146 received(unsigned int bytes, struct sockaddr_storage *from, dig_query_t *query) { in received() argument 154 bytes, fromtext, uelapsed(&now, &query->time_sent)/1000); in received() 168 dig_query_t *query) in say_message() argument 188 if (query->lookup->identify_previous_line) { in say_message() 190 query->servname); in say_message() 194 if (query->lookup->identify) { in say_message() 195 printf(" on server %s", query->servname); in say_message() 203 dig_query_t *query) in printsection() argument 243 if (query->lookup->rdtype == dns_rdatatype_axfr && in printsection() 287 &rdata, query); in printsection() [all …]
|
| H A D | nslookup.c | 220 printsection(dig_query_t *query, dns_message_t *msg, int headers, in printsection() argument 228 UNUSED(query); in printsection() 286 detailsection(dig_query_t *query, dns_message_t *msg, int headers, in detailsection() argument 294 UNUSED(query); in detailsection() 372 received(unsigned int bytes, struct sockaddr_storage *from, dig_query_t *query) in received() argument 376 UNUSED(query); in received() 386 printmessage(dig_query_t *query, dns_message_t *msg, int headers) { in printmessage() argument 394 isc_sockaddr_format(&query->sockaddr, servtext, sizeof(servtext)); in printmessage() 395 printf("Server:\t\t%s\n", query->userarg); in printmessage() 403 detailsection(query, msg, 1, DNS_SECTION_QUESTION); in printmessage() [all …]
|
| /openbsd-src/usr.sbin/ntpd/ |
| H A D | client.c | 54 p->query.fd = -1; in client_peer_init() 55 p->query.msg.status = MODE_CLIENT | (NTP_VERSION << 3); in client_peer_init() 56 p->query.xmttime = 0; in client_peer_init() 93 p->query.fd = -1; in client_addr_init() 102 if (p->query.fd != -1) { in client_nextaddr() 103 close(p->query.fd); in client_nextaddr() 104 p->query.fd = -1; in client_nextaddr() 150 if (p->query.fd == -1) { in client_query() 155 if ((p->query.fd = socket(p->addr->ss.ss_family, SOCK_DGRAM, in client_query() 160 if (bind(p->query.fd, qa4, SA_LEN(qa4)) == -1) in client_query() [all …]
|
| H A D | server.c | 158 struct ntp_msg query, reply; in server_dispatch() local 175 if (ntp_getmsg((struct sockaddr *)&fsa, buf, size, &query) == -1) in server_dispatch() 183 reply.status |= (query.status & VERSIONMASK); in server_dispatch() 184 if ((query.status & MODEMASK) == MODE_CLIENT) in server_dispatch() 186 else if ((query.status & MODEMASK) == MODE_SYM_ACT) in server_dispatch() 192 reply.ppoll = query.ppoll; in server_dispatch() 197 reply.orgtime = query.xmttime; in server_dispatch()
|
| /openbsd-src/sys/dev/pci/drm/i915/ |
| H A D | i915_query.c | 134 struct drm_i915_query_engine_info query; in query_engine_info() local 148 ret = copy_query_item(&query, sizeof(query), len, query_item); in query_engine_info() 152 if (query.num_engines || query.rsvd[0] || query.rsvd[1] || in query_engine_info() 153 query.rsvd[2]) in query_engine_info() 168 query.num_engines++; in query_engine_info() 172 if (copy_to_user(query_ptr, &query, sizeof(query))) in query_engine_info() 479 struct drm_i915_query_memory_regions query; query_memregion_info() local [all...] |
| /openbsd-src/gnu/usr.bin/perl/t/op/ |
| H A D | die_exit.t | 64 my($bang, $query, $code) = @$test; 67 system(qq{$^X -e "\$! = $bang; \$? = $query; $code"}); 78 is($exit, (($bang || ($query >> 8) || 255) << 8), 79 sprintf "exit = 0x%04x bang = 0x%04x query = 0x%04x", $exit, $bang, $query);
|
| /openbsd-src/usr.bin/vi/docs/internals/ |
| H A D | cscope.NOTES | 5 per query. It will hopefully support ctags programs that create databases 58 and switches to the first location resulting from the query, if 59 the query returned at least one result. 72 locations per tag query. 84 Move to the next tag resulting from a query. 88 Return to the previous tag resulting from a query. 105 " Tab+letter performs a C-Scope query on the current word. 106 " C-Scope 12.9 has a text-string query (type t). 107 " C-Scope 13.3 replaces it with an assignment query; hence a==t.
|
| /openbsd-src/sys/dev/pci/drm/amd/display/modules/hdcp/ |
| H A D | hdcp.c | 485 uint8_t index, struct mod_hdcp_display_query *query) in mod_hdcp_query_display() argument 498 query->link = &hdcp->connection.link; in mod_hdcp_query_display() 499 query->display = display; in mod_hdcp_query_display() 500 query->trace = &hdcp->connection.trace; in mod_hdcp_query_display() 501 query->encryption_status = MOD_HDCP_ENCRYPTION_STATUS_HDCP_OFF; in mod_hdcp_query_display() 505 query->encryption_status = MOD_HDCP_ENCRYPTION_STATUS_HDCP1_ON; in mod_hdcp_query_display() 507 if (query->link->adjust.hdcp2.force_type == MOD_HDCP_FORCE_TYPE_0) in mod_hdcp_query_display() 508 query->encryption_status = MOD_HDCP_ENCRYPTION_STATUS_HDCP2_TYPE0_ON; in mod_hdcp_query_display() 509 else if (query->link->adjust.hdcp2.force_type == MOD_HDCP_FORCE_TYPE_1) in mod_hdcp_query_display() 510 query->encryption_status = MOD_HDCP_ENCRYPTION_STATUS_HDCP2_TYPE1_ON; in mod_hdcp_query_display() [all …]
|
| /openbsd-src/usr.sbin/nsd/dnstap/ |
| H A D | dnstap.proto | 28 // "NSID" (RFC 5001) query. 34 // "version.bind" query. 76 // | | query | | query | | 108 // AUTH_QUERY is a DNS query message received from a resolver by an 118 // RESOLVER_QUERY is a DNS query message sent from a resolver to an 129 // CLIENT_QUERY is a DNS query message sent from a client to a DNS 143 // FORWARDER_QUERY is a DNS query message sent from a downstream DNS 154 // STUB_QUERY is a DNS query message sent from a stub resolver to a DNS 190 // The time at which the DNS query message was sent or received, depending 195 // The time at which the DNS query message was sent or received. [all …]
|
| /openbsd-src/usr.sbin/unbound/dnstap/ |
| H A D | dnstap.proto | 28 // "NSID" (RFC 5001) query. 34 // "version.bind" query. 77 QNAME = 1; // Name in question section of query 125 // | | query | | query | | 157 // AUTH_QUERY is a DNS query message received from a resolver by an 167 // RESOLVER_QUERY is a DNS query message sent from a resolver to an 178 // CLIENT_QUERY is a DNS query message sent from a client to a DNS 192 // FORWARDER_QUERY is a DNS query message sent from a downstream DNS 203 // STUB_QUERY is a DNS query message sent from a stub resolver to a DNS 211 // TOOL_QUERY is a DNS query message sent from a DNS software tool to a [all …]
|