Lines Matching defs:rrtype

173 mDNSexport char *DNSTypeName(mDNSu16 rrtype)
175 switch (rrtype)
198 mDNS_snprintf(buffer, sizeof(buffer), "TYPE%d", rrtype);
371 mDNSu32 length = mDNS_snprintf(buffer, MaxMsg-1, "%4d %##s %s ", rr->rdlength, rr->name->c, DNSTypeName(rr->rrtype));
373 if (!rr->rdlength && rr->rrtype != kDNSType_OPT) { mDNS_snprintf(buffer+length, RemSpc, "<< ZERO RDATA LENGTH >>"); return(buffer); }
375 switch (rr->rrtype)
1358 mDNSu16 rrtype, mDNSu32 ttl, mDNSu8 RecordType, AuthRecType artype, mDNSRecordCallback Callback, void *Context)
1387 ttl = DefaultTTLforRRType(rrtype);
1393 rr->resrec.rrtype = rrtype;
1498 switch(rr->rrtype)
1559 // r1 has to be a full ResourceRecord including rrtype and rdlength
1560 // r2 is just a bare RDataBody, which MUST be the same rrtype and rdlength as r1
1565 switch(r1->rrtype)
1687 if (rr->rrtype != kDNSType_NSEC) return mDNSfalse;
1700 if (rr->rrtype != kDNSType_NSEC) return mDNSfalse;
1713 if (q->qtype == rr->rrtype)
1725 if ((q->qtype == kDNSType_DS || q->qtype == kDNSType_DNSKEY) && (q->qtype != rr->rrtype))
1727 debugf("DNSSECRecordAnswersQuestion: %d type resource record matched question %##s (%s), ignoring", rr->rrtype,
1738 if (rr->rrtype == kDNSType_RRSIG && q->ValidatingResponse)
1760 if (rr->rrtype == kDNSType_NSEC && DNSSECQuestion(q))
1808 if (rr->rrtype == kDNSType_CNAME && rr->RecordType == kDNSRecordTypePacketNegative && rr->rrtype != q->qtype)
1981 else switch (rr->rrtype)
2031 default: debugf("Warning! Don't know how to get length of resource type %d", rr->rrtype);
2038 mDNSexport mDNSBool ValidateRData(const mDNSu16 rrtype, const mDNSu16 rdlength, const RData *const rd)
2042 switch(rrtype)
2232 switch (rr->rrtype)
2424 if (ptr + rr->rdlength > limit) { LogMsg("putRData: NSEC rdlength beyond limit %##s (%s), ptr %p, rdlength %d, limit %p", rr->name->c, DNSTypeName(rr->rrtype), ptr, rr->rdlength, limit); return(mDNSNULL);}
2432 default: debugf("putRData: Warning! Writing unknown resource type %d as raw data", rr->rrtype);
2446 const DNSMessage *const rdatacompressionbase = (IsUnicastUpdate(msg) && rr->rrtype == kDNSType_SRV) ? mDNSNULL : msg;
2450 LogMsg("PutResourceRecordTTLWithLimit ERROR! Attempt to put kDNSRecordTypeUnregistered %##s (%s)", rr->name->c, DNSTypeName(rr->rrtype));
2456 LogMsg("PutResourceRecordTTLWithLimit ptr is null %##s (%s)", rr->name->c, DNSTypeName(rr->rrtype));
2465 DNSTypeName(rr->rrtype), ptr, limit);
2468 ptr[0] = (mDNSu8)(rr->rrtype >> 8);
2469 ptr[1] = (mDNSu8)(rr->rrtype & 0xFF);
2482 DNSTypeName(rr->rrtype), ptr+10, limit);
2493 else LogMsg("PutResourceRecordTTL: ERROR: No target count to update for %##s (%s)", rr->name->c, DNSTypeName(rr->rrtype));
2501 ptr[0] = (mDNSu8)(rr->resrec.rrtype >> 8); // Put type
2502 ptr[1] = (mDNSu8)(rr->resrec.rrtype & 0xFF);
2511 mDNSexport mDNSu8 *putQuestion(DNSMessage *const msg, mDNSu8 *ptr, const mDNSu8 *const limit, const domainname *const name, mDNSu16 rrtype, mDNSu16 rrclass)
2515 ptr[0] = (mDNSu8)(rrtype >> 8);
2516 ptr[1] = (mDNSu8)(rrtype & 0xFF);
2542 prereq.resrec.rrtype = kDNSQType_ANY;
2569 mDNSexport mDNSu8 *putDeleteRRSetWithLimit(DNSMessage *msg, mDNSu8 *ptr, const domainname *name, mDNSu16 rrtype, mDNSu8 *limit)
2575 ptr[0] = (mDNSu8)(rrtype >> 8);
2576 ptr[1] = (mDNSu8)(rrtype & 0xFF);
2591 mDNSu16 rrtype = kDNSQType_ANY;
2595 ptr[0] = (mDNSu8)(rrtype >> 8);
2596 ptr[1] = (mDNSu8)(rrtype & 0xFF);
2854 switch (rr->resrec.rrtype)
3345 LogInfo("SetRData: Malformed name for TSIG/TKEY type %d", rr->resrec.rrtype);
3388 LogInfo("SetRData: Not enough bytes for signature type %d", rr->resrec.rrtype);
3419 rr->resrec.rrtype, DNSTypeName(rr->resrec.rrtype));
3471 rr->resrec.rrtype = (mDNSu16) ((mDNSu16)ptr[0] << 8 | ptr[1]);
3495 DNSTypeName(rr->resrec.rrtype), pktrdlength, rr->resrec.rdata->MaxRDLength);
3588 ptr[1] == (kDNSType_OPT >> 8 ) && // rrtype OPT