Lines Matching refs:soa
1712 struct auth_rrset* soa = az_domain_rrset(n, LDNS_RR_TYPE_SOA);
1713 if(soa) {
1714 if(!auth_zone_write_rrset(z, n, soa, out))
1987 struct auth_rrset* soa;
1990 soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
1991 return soa;
1999 struct auth_rrset* soa;
2003 soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
2004 if(!soa || soa->data->count==0)
2006 if(soa->data->rr_len[0] < 2+4*5) return 0; /* SOA too short */
2007 d = soa->data;
2012 /** Find auth_zone SOA and populate the values in xfr(soa values). */
2017 struct auth_rrset* soa;
2021 soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
2022 if(!soa || soa->data->count==0)
2024 if(soa->data->rr_len[0] < 2+4*5) return 0; /* SOA too short */
2027 d = soa->data;
2033 /* soa minimum at d->rr_len[0]-4 */
2039 * This populates the have_zone, soa values, and so on times.
2581 struct auth_rrset* soa;
2584 soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
2585 if(!soa) return 0;
2590 if(!msg_add_rrset_ns(z, region, msg, apex, soa)) return 0;
3673 if(rdlen < 22) return 0; /* bad soa length */
4364 if(!pkt_dname_len(pkt)) /* soa name */
4368 if(!pkt_dname_len(pkt)) /* soa name */
4941 * just before the soa, it gets deleted and added too
5972 /* if not first soa, if serial==firstserial, the
6446 verbose(VERB_ALGO, "failed to send soa probe for %s to %s",
6454 verbose(VERB_ALGO, "auth zone %s soa probe sent to %s", zname,
6484 verbose(VERB_ALGO, "auth zone %s soa probe timeout", zname);
6532 verbose(VERB_ALGO, "auth zone %s: soa probe "
6561 verbose(VERB_ALGO, "auth_zone master reports unchanged soa serial");
6571 verbose(VERB_ALGO, "auth zone %s: bad reply to soa probe", buf);
6578 verbose(VERB_ALGO, "auth zone %s: soa probe failed", buf);
6739 verbose(VERB_ALGO, "auth zone %s soa probe failed, wait to retry", zname);
7124 * This populates the have_zone, soa values, and so on times.
7956 struct auth_rrset* soa;
7961 soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
7962 if(!soa) {
7966 if(!zonemd_dnssec_verify_rrset(z, env, mods, dnskey, apex, soa,