Lines Matching defs:flags

466                                 DNSSECDigestName(nsec3->alg), nsec3->flags, swap16(nsec3->iterations));
522 length += mDNS_snprintf(buffer+length, RemSpc, "\t%d %d %s %u ", swap16(rrkey->flags), rrkey->proto,
1460 q->flags = 0;
2092 mDNSexport void InitializeDNSMessage(DNSMessageHeader *h, mDNSOpaque16 id, mDNSOpaque16 flags)
2095 h->flags = flags;
2442 #define IsUnicastUpdate(X) (!mDNSOpaque16IsZero((X)->h.id) && ((X)->h.flags.b[0] & kDNSFlag0_OP_Mask) == kDNSFlag0_OP_Update)
3081 // Variable length: flags, service, regexp, domainname
3087 // Parse flags, Service and Regexp
3093 LogInfo("SetRData: Malformed NAPTR flags");
3491 if (ptr[2] & (kDNSClass_UniqueRRSet >> 8) || (!InterfaceID && !(msg->h.flags.b[0] & kDNSFlag0_TC)))
3677 mDNSBool IsUpdate = ((msg->h.flags.b[0] & kDNSFlag0_OP_Mask) == kDNSFlag0_OP_Update);
3689 LogMsg("-- %s %s DNS %s%s (flags %02X%02X) RCODE: %s (%d) %s%s%s%s%s%sID: %d %d bytes from %s%d%s%s --",
3691 DNS_OP_Name(msg->h.flags.b[0] & kDNSFlag0_OP_Mask),
3692 msg->h.flags.b[0] & kDNSFlag0_QR_Response ? "Response" : "Query",
3693 msg->h.flags.b[0], msg->h.flags.b[1],
3694 DNS_RC_Name(msg->h.flags.b[1] & kDNSFlag1_RC_Mask),
3695 msg->h.flags.b[1] & kDNSFlag1_RC_Mask,
3696 msg->h.flags.b[0] & kDNSFlag0_AA ? "AA " : "",
3697 msg->h.flags.b[0] & kDNSFlag0_TC ? "TC " : "",
3698 msg->h.flags.b[0] & kDNSFlag0_RD ? "RD " : "",
3699 msg->h.flags.b[1] & kDNSFlag1_RA ? "RA " : "",
3700 msg->h.flags.b[1] & kDNSFlag1_AD ? "AD " : "",
3701 msg->h.flags.b[1] & kDNSFlag1_CD ? "CD " : "",
3705 (msg->h.flags.b[0] & kDNSFlag0_TC) ? " (truncated)" : ""
3726 // Stub definition of TCPSocket_struct so we can access flags field. (Rest of TCPSocket_struct is platform-dependent.)
3727 struct TCPSocket_struct { TCPSocketFlags flags; /* ... */ };
3825 (sock->flags & kTCPSocketFlags_UseTLS) ?
4075 while (1) // decode flags