Lines Matching defs:flags
2152 mDNSlocal void SendNDP(mDNS *const m, const mDNSu8 op, const mDNSu8 flags, const AuthRecord *const rr,
2206 *ptr++ = flags;
3390 && !((q->flags & kDNSServiceFlagsThresholdFinder) && (q->ThisQInterval == InitialQuestionInterval)))
3649 m->omsg.h.flags.b[0] |= kDNSFlag0_TC;
3725 if ((m->omsg.h.flags.b[0] & kDNSFlag0_TC) && m->omsg.h.numQuestions > 1)
5108 // Make sure we deliver *all* local RMV events, and clear the corresponding rr->AnsweredLocalQ flags, *before*
5817 // initial DNSMessage with h.flags set to zero, and then update it to UpdateReqFlags right before sending the packet.
5889 // if (intf->NextSPSAttempt < 5) m->omsg.h.flags = zeroID; // For simulating packet loss
6813 else { debugf("GenerateUnicastResponse: Ran out of space for answers!"); response->h.flags.b[0] |= kDNSFlag0_TC; }
7274 if (query->h.flags.b[0] & kDNSFlag0_TC)
7284 if (QuestionNeedsMulticastResponse && !(query->h.flags.b[0] & kDNSFlag0_TC))
7295 if (!(query->h.flags.b[0] & kDNSFlag0_TC))
7322 if (!(query->h.flags.b[0] & kDNSFlag0_TC))
7454 // *** 7. Mark the send flags on the records we plan to send
7529 if (query->h.flags.b[0] & kDNSFlag0_TC) delayresponse = mDNSPlatformOneSecond * 20; // Divided by 50 = 400ms
7604 if (!(query->h.flags.b[0] & kDNSFlag0_TC))
8276 qptr->responseFlags = response->h.flags;
8400 m->rec.r.responseFlags = response->h.flags;
8596 rr->responseFlags = response->h.flags;
8795 if (!InterfaceID && (response->h.flags.b[0] & kDNSFlag0_TC)) return;
8805 if (ResponseMCast || LLQType == uDNS_LLQ_Events || (response->h.flags.b[0] & kDNSFlag0_TC))
8812 rcode = (mDNSu8)(response->h.flags.b[1] & kDNSFlag1_RC_Mask);
8883 PenalizeDNSServer(m, qptr, response->h.flags);
9245 rr->responseFlags = response->h.flags;
10000 m->omsg.h.flags.b[1] |= kDNSFlag1_RC_FormErr;
10011 m->omsg.h.flags.b[1] |= kDNSFlag1_RC_Refused;
10038 m->omsg.h.flags.b[1] |= kDNSFlag1_RC_Refused;
10081 if (m->omsg.h.flags.b[1] & kDNSFlag1_RC_Mask)
10262 QR_OP = (mDNSu8)(msg->h.flags.b[0] & kDNSFlag0_QROP_Mask);
10311 msg->h.flags.b[0], msg->h.flags.b[1], srcaddr, mDNSVal16(srcport), dstaddr, mDNSVal16(dstport), end - (mDNSu8 *)pkt, InterfaceID);
10364 #define IsAWDLIncluded(Q) (((Q)->flags & kDNSServiceFlagsIncludeAWDL) != 0)
10492 if (!((*p)->flags & DNSServer_FlagDelete)) LogMsg("Note: Mcast Resolver domain %##s (%p) registered more than once", d->c, interface);
10493 (*p)->flags &= ~DNSServer_FlagDelete;
10511 (*p)->flags = DNSServer_FlagNew;
10703 if (curr->flags & DNSServer_FlagDelete)
10779 if (curr->flags & DNSServer_FlagDelete)
11448 if (question->flags & kDNSServiceFlagsThresholdOne)
11450 else if (question->flags & kDNSServiceFlagsThresholdFinder)
11468 if (!(question->flags & kDNSServiceFlagsServiceIndex))
11503 if (question->flags & kDNSServiceFlagsUnicastResponse)
11509 else if (question->flags & kDNSServiceFlagsThresholdFinder)
11995 const mDNSu8 *anondata, const mDNSInterfaceID InterfaceID, mDNSu32 flags,
12000 question->flags = flags;
12040 const mDNSu8 *anondata, const mDNSInterfaceID InterfaceID, mDNSu32 flags,
12046 status = mDNS_StartBrowse_internal(m, question, srv, domain, anondata, InterfaceID, flags, ForceMCast, useBackgroundTrafficClass, Callback, Context);
12197 query->qSRV.flags = 0;
12225 query->qTXT.flags = 0;
12253 query->qAv4.flags = 0;
12281 query->qAv6.flags = 0;
12345 question->flags = 0;
12989 // If this interface not the active member of its set, update the v4/v6Available flags for the active member
13207 mDNSlocal AuthRecType setAuthRecType(mDNSInterfaceID InterfaceID, mDNSu32 flags)
13215 else if ((InterfaceID == mDNSInterface_Any) && (flags & coreFlagIncludeP2P)
13216 && (flags & coreFlagIncludeAWDL))
13218 else if ((InterfaceID == mDNSInterface_Any) && (flags & coreFlagIncludeP2P))
13220 else if ((InterfaceID == mDNSInterface_Any) && (flags & coreFlagIncludeAWDL))
13241 mDNSInterfaceID InterfaceID, mDNSServiceCallback Callback, void *Context, mDNSu32 flags)
13247 mDNSu8 recordType = (flags & coreFlagKnownUnique) ? kDNSRecordTypeKnownUnique : kDNSRecordTypeUnique;
13256 sr->flags = flags;
13258 artype = setAuthRecType(InterfaceID, flags);
13265 if (flags & coreFlagWakeOnly)
13280 return(mDNS_RegisterNoSuchService(m, &sr->RR_SRV, name, type, domain, mDNSNULL, InterfaceID, NSSCallback, sr, flags));
13375 ExtraResourceRecord *extra, RData *rdata, mDNSu32 ttl, mDNSu32 flags)
13382 artype = setAuthRecType(InterfaceID, flags);
13458 sr->RR_PTR.resrec.InterfaceID, sr->ServiceCallback, sr->ServiceContext, sr->flags);
13544 const mDNSInterfaceID InterfaceID, mDNSRecordCallback Callback, void *Context, mDNSu32 flags)
13548 artype = setAuthRecType(InterfaceID, flags);
13872 wake = ((t->tcp.flags & TH_RST) || (t->tcp.flags & TH_FIN)) ;
13904 if ((t->tcp.flags & TH_ACK) && (data == mDNSfalse) &&
13913 else { LogSPS("mDNSCoreReceiveRawTransportPacket: waking because of RST or FIN th_flags %d", t->tcp.flags); }
13921 wake = (!(t->tcp.flags & TH_RST) && (t->tcp.flags & (TH_FIN|TH_SYN)) != TH_FIN);
13925 if (!mDNSSameIPPort(port, SSHPort) && !(t->tcp.flags & 2)) wake = mDNSfalse;
13929 (t->tcp.flags & 2) ? " SYN" : "",
13930 (t->tcp.flags & 1) ? " FIN" : "",
13931 (t->tcp.flags & 4) ? " RST" : "");
14095 SleepProxyServerCallback, mDNSNULL, 0); // Callback, context, flags
14547 ptr->flags |= DNSServer_FlagDelete;
14553 mr->flags |= McastResolver_FlagDelete;
14561 ptr->flags &= ~DNSServer_FlagDelete;
14564 mr->flags &= ~McastResolver_FlagDelete;
14610 if (((*mres)->flags & DNSServer_FlagDelete) != 0)
14619 (*mres)->flags &= ~McastResolver_FlagNew;
14788 if (((*p)->flags & DNSServer_FlagDelete) != 0)
14844 (*p)->flags &= ~DNSServer_FlagNew;