cfg_strlist_insert
if(!cfg_strlist_insert(&s->addrs, dupl)) {
if(!cfg_strlist_insert(&elem->addrs, a)) {
if(!cfg_strlist_insert(&ctx->env->cfg->local_data,
if(!cfg_strlist_insert(&ctx->env->cfg->trust_anchor_list, dup)) {
if(!cfg_strlist_insert(&ctx->env->cfg->trust_anchor_file_list, dup)) {
if(!cfg_strlist_insert(&ctx->env->cfg->auto_trust_anchor_file_list,
if(!cfg_strlist_insert(&ctx->env->cfg->trusted_keys_file_list, dup)) {
return cfg_strlist_insert(&cfg->local_zones_nodefault,
return cfg_strlist_insert(&cfg->local_zones_ipset,
{ return cfg_strlist_insert(&cfg->var, strdup(val)); }
return cfg_strlist_insert(&cfg->var, strdup(val)); }
return cfg_strlist_insert(&cfg->local_data, ptr);
int cfg_strlist_insert(struct config_strlist** head, char* item);
if(!cfg_strlist_insert(&cfg_parser->cfg->tls_additional_port,
if(!cfg_strlist_insert(&cfg_parser->cfg->root_hints, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->trust_anchor_list, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->domain_insecure, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->caps_whitelist, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->private_address, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->private_domain, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->donotqueryaddrs, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->local_data, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->dns64_ignore_aaaa,
if(!cfg_strlist_insert(&cfg_parser->cfg->ipsecmod_whitelist, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->proxy_protocol_port, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->stubs->hosts, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->stubs->addrs, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->forwards->hosts, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->forwards->addrs, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->auths->masters, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->auths->urls, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->auths->allow_notify,
if(!cfg_strlist_insert(&cfg_parser->cfg->views->
if(!cfg_strlist_insert(&cfg_parser->cfg->views->
if(!cfg_strlist_insert(&cfg_parser->cfg->views->local_data, $2)) {
if(!cfg_strlist_insert(&cfg_parser->cfg->views->
if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_provider_cert, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_provider_cert_rotated, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_secret_key, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->client_subnet, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->client_subnet_zone,
cfg_strlist_insert(&cfg->local_data, strdup(rr));
if(!cfg_strlist_insert(&s->addrs, dupl)) {
if(!cfg_strlist_insert(&elem->addrs, a)) {
if(!cfg_strlist_insert(&ctx->env->cfg->local_data,
if(!cfg_strlist_insert(&ctx->env->cfg->trust_anchor_list, dup)) {
if(!cfg_strlist_insert(&ctx->env->cfg->trust_anchor_file_list, dup)) {
if(!cfg_strlist_insert(&ctx->env->cfg->auto_trust_anchor_file_list,
if(!cfg_strlist_insert(&ctx->env->cfg->trusted_keys_file_list, dup)) {
if(!cfg_strlist_insert(last, strdup(line)))
if(!cfg_strlist_insert(&cfgfiles, strdup(line)))
if(!cfg_strlist_insert(&cfgfiles, strdup(line)))
if(!cfg_strlist_insert(&cfgfiles, strdup(configfile)))
if(!cfg_strlist_insert(&env.cfg->trust_anchor_list,
return cfg_strlist_insert(&cfg->local_zones_nodefault,
return cfg_strlist_insert(&cfg->local_zones_ipset,
{ return cfg_strlist_insert(&cfg->var, strdup(val)); }
return cfg_strlist_insert(&cfg->var, strdup(val)); }
return cfg_strlist_insert(&cfg->local_data, ptr);
int cfg_strlist_insert(struct config_strlist** head, char* item);
if(!cfg_strlist_insert(&cfg_parser->cfg->tls_additional_port,
if(!cfg_strlist_insert(&cfg_parser->cfg->root_hints, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->trust_anchor_list, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->domain_insecure, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->caps_whitelist, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->private_address, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->private_domain, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->donotqueryaddrs, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->local_data, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->
if(!cfg_strlist_insert(&cfg_parser->cfg->dns64_ignore_aaaa,
if(!cfg_strlist_insert(&cfg_parser->cfg->ipsecmod_whitelist, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->proxy_protocol_port, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->stubs->hosts, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->stubs->addrs, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->forwards->hosts, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->forwards->addrs, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->auths->masters, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->auths->urls, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->auths->allow_notify,
if(!cfg_strlist_insert(&cfg_parser->cfg->views->
if(!cfg_strlist_insert(&cfg_parser->cfg->views->
if(!cfg_strlist_insert(&cfg_parser->cfg->views->local_data, $2)) {
if(!cfg_strlist_insert(&cfg_parser->cfg->views->
if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_provider_cert, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_provider_cert_rotated, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->dnscrypt_secret_key, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->client_subnet, $2))
if(!cfg_strlist_insert(&cfg_parser->cfg->client_subnet_zone,