Searched refs:kDNSType_NSEC (Results 1 – 4 of 4) sorted by relevance
163 #define UNICAST_NSEC(rr) ((rr)->rrtype == kDNSType_NSEC && RRAssertsExistence((rr), kDNSType_NSEC))
188 case kDNSType_NSEC: return("NSEC"); in DNSTypeName()446 case kDNSType_NSEC: { in GetRRDisplayString_rdb()1532 case kDNSType_NSEC: { in RDataHashValue()1605 case kDNSType_NSEC: { in SameRDataBody()1686 if (rr->rrtype != kDNSType_NSEC) return mDNSfalse; in RRAssertsExistence()1699 if (rr->rrtype != kDNSType_NSEC) return mDNSfalse; in RRAssertsNonexistence()1759 if (rr->rrtype == kDNSType_NSEC && DNSSECQuestion(q)) in DNSSECRecordAnswersQuestion()2020 case kDNSType_NSEC: { in GetRDLength()2357 case kDNSType_NSEC: { in putRData()3224 case kDNSType_NSEC: { in SetRData()
222 kDNSType_NSEC, // 47 Denial of Existence enumerator903 #define DNSSECRecordType(rrtype) (((rrtype) == kDNSType_RRSIG) || ((rrtype) == kDNSType_NSEC) || ((…
2701 …mDNS_SetupResourceRecord(&nsec, mDNSNULL, mDNSInterface_Any, kDNSType_NSEC, rr->resrec.rroriginalt… in SendResponses()3940 …if (rr->resrec.RecordType == kDNSRecordTypePacketNegative || (q->qtype != kDNSType_NSEC && RRAsser… in AnswerCurrentQuestionWithResourceRecord()3947 if (q->qtype != kDNSType_NSEC && RRAssertsNonexistence(&rr->resrec, q->qtype)) in AnswerCurrentQuestionWithResourceRecord()7863 if (rr->resrec.rrtype == kDNSType_NSEC) in ExpectingMulticastResponseForRecord()8128 else if (typeCovered == kDNSType_NSEC || typeCovered == kDNSType_NSEC3) in IsResponseAcceptable()8142 if (rr->rrtype == kDNSType_NSEC) in IsResponseAcceptable()9070 if (mDNSOpaque16IsZero(response->h.id) && m->rec.r.resrec.rrtype != kDNSType_NSEC) in mDNSCoreReceiveResponse()