Lines Matching refs:rrset

55 import dns.edns, dns.flags, dns.message, dns.rcode, dns.rdataclass, dns.rdatatype, dns.rrset
290 for rrset in rrsets:
291 d += RRsetInfo.rrset_canonicalized_to_wire(rrset, rrset.name, rrset.ttl)
1026 def __init__(self, rrset, ttl_cmp, dname_info=None): argument
1028 self.rrset = rrset
1040 if self.rrset.rdtype == dns.rdatatype.NSEC3:
1041 …'RRset for %s/%s' % (fmt.format_nsec3_name(self.rrset.name).rstrip('.'), dns.rdatatype.to_text(sel…
1043 …return 'RRset for %s/%s' % (fmt.humanize_name(self.rrset.name), dns.rdatatype.to_text(self.rrset.r…
1049 if not (self.rrset == other.rrset and self.dname_info == other.dname_info):
1051 if self.ttl_cmp and self.rrset.ttl != other.rrset.ttl:
1059 def rrset_canonicalized_to_wire(cls, rrset, name, ttl): argument
1063 rdata_list = [RdataWrapper(x) for x in rrset]
1071 stuff = struct.pack(b'!HHIH', rrset.rdtype, rrset.rdclass,
1082 …rrset = response.message.find_rrset(section, self.rrset.name, rdclass, dns.rdatatype.RRSIG, self.r…
1095 … rrsig_info = self.rrsig_info[rrsig] = RDataMeta(self.rrset.name, ttl, dns.rdatatype.RRSIG, rrsig)
1103 if self.rrset.name[0] == b'*':
1105 return len(self.rrset.name) - 1 > rrsig.labels
1109 return dns.name.Name(('*',)+self.rrset.name.labels[-(rrsig.labels+1):])
1110 return self.rrset.name
1116 …self.wildcard_info[wildcard_name] = NegativeResponseInfo(self.rrset.name, self.rrset.rdtype, self.…
1131 …rrset_canonicalized_wire = self.rrset_canonicalized_to_wire(self.rrset, rrset_name, rrsig.original…
1143 if self.rrset.rdtype == dns.rdatatype.NSEC3:
1144 d['name'] = formatter(fmt.format_nsec3_name(self.rrset.name))
1146 d['name'] = formatter(lb2s(self.rrset.name.canonicalize().to_text()))
1147 d['ttl'] = self.rrset.ttl
1148 d['type'] = dns.rdatatype.to_text(self.rrset.rdtype)
1150 rdata_list = [RdataWrapper(x) for x in self.rrset]
1154 if self.rrset.rdtype == dns.rdatatype.NSEC3:
1155 d['rdata'].append(fmt.format_nsec3_rrset_text(self.rrset[0].to_text()))
1195 rrset = dns.rrset.RRset(name, dns.rdataclass.IN, dns.rdatatype.CNAME)
1196 rrset.update_ttl(dname_rrset.ttl)
1197rrset.add(dns.rdtypes.ANY.CNAME.CNAME(dns.rdataclass.IN, dns.rdatatype.CNAME, synthesized_cname))
1198 return rrset
1259 for rrset in rrsets:
1263 assert rrset.name not in self.rrsets
1264 self.rrsets[rrset.name] = RRsetInfo(rrset, self.ttl_cmp)
1266 if rrset.rdtype == dns.rdatatype.NSEC3:
1268 key = (rrset[0].salt, rrset[0].algorithm, rrset[0].iterations)
1271 self.nsec3_params[key].add(rrset.name)
1272 if not self.is_valid_nsec3_name(rrset.name, rrset[0].algorithm):
1273 self.invalid_nsec3_owner.add(rrset.name)
1274 if not self.is_valid_nsec3_hash(rrset[0].next, rrset[0].algorithm):
1275 self.invalid_nsec3_hash.add(rrset.name)
1295 rrset = obj.rrsets[name].rrset
1296 if rrset.rdtype == dns.rdatatype.NSEC3:
1298 key = (rrset[0].salt, rrset[0].algorithm, rrset[0].iterations)
1301 obj.nsec3_params[key].add(rrset.name)
1302 if not obj.is_valid_nsec3_name(rrset.name, rrset[0].algorithm):
1303 obj.invalid_nsec3_owner.add(rrset.name)
1304 if not obj.is_valid_nsec3_hash(rrset[0].next, rrset[0].algorithm):
1305 obj.invalid_nsec3_hash.add(rrset.name)
1359 for (window, bitmap) in self.rrsets[nsec_name].rrset[0].windows:
1374 next_name = self.rrsets[nsec_name].rrset[0].next
1393 next_name = self.rrsets[nsec_name].rrset[0].next