LDNS_RR_TYPE_SOA
if(ntohs(s->rk.type) == LDNS_RR_TYPE_SOA &&
if(rrset->type == LDNS_RR_TYPE_SOA &&
if(tp == LDNS_RR_TYPE_SOA || tp == LDNS_RR_TYPE_NS ||
if(ntohs(s->rk.type) == LDNS_RR_TYPE_SOA) {
if(ntohs(s->rk.type) == LDNS_RR_TYPE_SOA) {
LDNS_RR_TYPE_SOA, dclass) ||
LDNS_RR_TYPE_SOA, dclass))
struct auth_rrset* soa = az_domain_rrset(n, LDNS_RR_TYPE_SOA);
r->type == LDNS_RR_TYPE_SOA)
soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
if((rrset=az_domain_rrset(node, LDNS_RR_TYPE_SOA)) != NULL) {
if(sldns_buffer_read_u16(pkt) != LDNS_RR_TYPE_SOA) return 0;
qinfo.qtype = LDNS_RR_TYPE_SOA;
sldns_buffer_write_u16(buf, LDNS_RR_TYPE_SOA);
if(rr_type != LDNS_RR_TYPE_SOA) {
if(rr_counter == 0 && rr_type != LDNS_RR_TYPE_SOA)
if(rr_counter == 1 && rr_type != LDNS_RR_TYPE_SOA) {
if(rr_type == LDNS_RR_TYPE_SOA) {
if(rr_type == LDNS_RR_TYPE_SOA) {
tp != LDNS_RR_TYPE_SOA) {
tp != LDNS_RR_TYPE_SOA) {
if(tp == LDNS_RR_TYPE_SOA) {
if(check_packet_ok(c->buffer, LDNS_RR_TYPE_SOA, xfr,
soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
LDNS_RR_TYPE_MX, LDNS_RR_TYPE_SOA, LDNS_RR_TYPE_NS,
if(rrtype == LDNS_RR_TYPE_SOA &&
case LDNS_RR_TYPE_SOA:
csoa.rk.type = htons(LDNS_RR_TYPE_SOA);
case LDNS_RR_TYPE_SOA:
if(rrtype == LDNS_RR_TYPE_SOA || rrtype == LDNS_RR_TYPE_NS ||
{LDNS_RR_TYPE_SOA, "SOA", 7, 7, type_soa_wireformat, LDNS_RDF_TYPE_NONE, LDNS_RR_COMPRESS, 2 },
} else if(rr_type == LDNS_RR_TYPE_SOA) {
if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA)
} else if(type == LDNS_RR_TYPE_SOA && sec == LDNS_SECTION_AUTHORITY) {
if(!*rrset_prev && covtype == LDNS_RR_TYPE_SOA) {
if(type == LDNS_RR_TYPE_SOA && section == LDNS_SECTION_AUTHORITY) {
if(nsec3_has_type(ce_rrset, 0, LDNS_RR_TYPE_SOA) ||
soa = rrset_cache_lookup(rrset_cache, nm, nmlen, LDNS_RR_TYPE_SOA,
if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA)
dname, LDNS_RR_TYPE_SOA, rrset_class);
if(nsec_has_type(nsec, LDNS_RR_TYPE_SOA) && qinfo->qname_len != 1) {
!nsec_has_type(nsec, LDNS_RR_TYPE_SOA)) {
!nsec_has_type(nsec, LDNS_RR_TYPE_SOA)) {
nsec_has_type(nsec, LDNS_RR_TYPE_SOA) &&
&& !nsec_has_type(nsec, LDNS_RR_TYPE_SOA))
!nsec_has_type(nsec, LDNS_RR_TYPE_SOA)) {
!nsec3_has_type(ce->ce_rrset, ce->ce_rr, LDNS_RR_TYPE_SOA)) {
&& nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA) &&
!nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA)) {
&& nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA)) {
!nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA)) {
if(nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA) &&
case LDNS_RR_TYPE_SOA:
case LDNS_RR_TYPE_SOA:
if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA)
if(t == LDNS_RR_TYPE_SOA)
do_cache_remove(w, nm, nmlen, LDNS_RR_TYPE_SOA, LDNS_RR_CLASS_IN, pc);
if(ntohs(s->rk.type) == LDNS_RR_TYPE_SOA &&
if(rrset->type == LDNS_RR_TYPE_SOA &&
if(tp == LDNS_RR_TYPE_SOA || tp == LDNS_RR_TYPE_NS ||
if(ntohs(s->rk.type) == LDNS_RR_TYPE_SOA) {
if(ntohs(s->rk.type) == LDNS_RR_TYPE_SOA) {
LDNS_RR_TYPE_SOA, dclass) ||
LDNS_RR_TYPE_SOA, dclass))
struct auth_rrset* soa = az_domain_rrset(n, LDNS_RR_TYPE_SOA);
r->type == LDNS_RR_TYPE_SOA)
soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
if((rrset=az_domain_rrset(node, LDNS_RR_TYPE_SOA)) != NULL) {
if(sldns_buffer_read_u16(pkt) != LDNS_RR_TYPE_SOA) return 0;
qinfo.qtype = LDNS_RR_TYPE_SOA;
sldns_buffer_write_u16(buf, LDNS_RR_TYPE_SOA);
if(rr_type != LDNS_RR_TYPE_SOA) {
if(rr_counter == 0 && rr_type != LDNS_RR_TYPE_SOA)
if(rr_counter == 1 && rr_type != LDNS_RR_TYPE_SOA) {
if(rr_type == LDNS_RR_TYPE_SOA) {
if(rr_type == LDNS_RR_TYPE_SOA) {
tp != LDNS_RR_TYPE_SOA) {
tp != LDNS_RR_TYPE_SOA) {
if(tp == LDNS_RR_TYPE_SOA) {
if(check_packet_ok(c->buffer, LDNS_RR_TYPE_SOA, xfr,
soa = az_domain_rrset(apex, LDNS_RR_TYPE_SOA);
LDNS_RR_TYPE_MX, LDNS_RR_TYPE_SOA, LDNS_RR_TYPE_NS,
if(rrtype == LDNS_RR_TYPE_SOA &&
case LDNS_RR_TYPE_SOA:
csoa.rk.type = htons(LDNS_RR_TYPE_SOA);
case LDNS_RR_TYPE_SOA:
if(rrtype == LDNS_RR_TYPE_SOA || rrtype == LDNS_RR_TYPE_NS ||
{LDNS_RR_TYPE_SOA, "SOA", 7, 7, type_soa_wireformat, LDNS_RDF_TYPE_NONE, LDNS_RR_COMPRESS, 2 },
} else if(rr_type == LDNS_RR_TYPE_SOA) {
sldns_buffer_write_u16(buf, LDNS_RR_TYPE_SOA);
qinfo.qtype = LDNS_RR_TYPE_SOA;
qinfo.qtype = LDNS_RR_TYPE_SOA;
if(dlen >= 2 && sldns_read_uint16(dstart) == LDNS_RR_TYPE_SOA) {
if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA)
} else if(type == LDNS_RR_TYPE_SOA && sec == LDNS_SECTION_AUTHORITY) {
if(!*rrset_prev && covtype == LDNS_RR_TYPE_SOA) {
if(type == LDNS_RR_TYPE_SOA && section == LDNS_SECTION_AUTHORITY) {
if(nsec3_has_type(ce_rrset, 0, LDNS_RR_TYPE_SOA) ||
soa = rrset_cache_lookup(rrset_cache, nm, nmlen, LDNS_RR_TYPE_SOA,
if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA)
dname, LDNS_RR_TYPE_SOA, rrset_class);
if(nsec_has_type(nsec, LDNS_RR_TYPE_SOA) && qinfo->qname_len != 1) {
!nsec_has_type(nsec, LDNS_RR_TYPE_SOA)) {
!nsec_has_type(nsec, LDNS_RR_TYPE_SOA)) {
nsec_has_type(nsec, LDNS_RR_TYPE_SOA) &&
&& !nsec_has_type(nsec, LDNS_RR_TYPE_SOA))
!nsec_has_type(nsec, LDNS_RR_TYPE_SOA)) {
!nsec3_has_type(ce->ce_rrset, ce->ce_rr, LDNS_RR_TYPE_SOA)) {
&& nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA) &&
!nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA)) {
&& nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA)) {
!nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA)) {
if(nsec3_has_type(rrset, rr, LDNS_RR_TYPE_SOA) &&
case LDNS_RR_TYPE_SOA:
case LDNS_RR_TYPE_SOA:
if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_SOA)