Home | History | Annotate | Download | only in mDNSCore

Lines Matching refs:r2

615 mDNSlocal mDNSBool SameResourceRecordNameClassInterface(const AuthRecord *const r1, const AuthRecord *const r2)
618 if (!r2) { LogMsg("SameResourceRecordSignature ERROR: r2 is NULL"); return(mDNSfalse); }
620 r2->resrec.InterfaceID &&
621 r1->resrec.InterfaceID != r2->resrec.InterfaceID) return(mDNSfalse);
623 r1->resrec.rrclass == r2->resrec.rrclass &&
624 r1->resrec.namehash == r2->resrec.namehash &&
625 SameDomainName(r1->resrec.name, r2->resrec.name));
1362 AuthRecord *r2;
1392 for (r2 = m->DuplicateRecords; r2; r2=r2->next) if (RecordIsLocalDuplicate(r2, rr)) r2->ProbeCount = 0xFF;
1587 r2 = m->DuplicateRecords;
1588 while (r2)
1590 if (r2->ProbeCount != 0xFF) r2 = r2->next;
1591 else { mDNS_Deregister_internal(m, r2, mDNS_Dereg_conflict); r2 = m->DuplicateRecords; }
2044 AuthRecord *rr, *r2;
2088 for (r2 = rr; r2; r2=r2->next)
2089 if (r2->AnnounceCount && r2->resrec.InterfaceID == rr->resrec.InterfaceID && mDNSSameEthAddress(&r2->WakeUp.IMAC, &rr->WakeUp.IMAC))
2093 if (r2->AddressProxy.type == mDNSAddrType_IPv6 && r2->AnnounceCount == WakeupCount)
2096 r2->AnnounceCount-3, &r2->WakeUp.HMAC, &r2->WakeUp.IMAC, ARDisplayString(m,r2));
2097 SendNDP(m, NDP_Adv, NDP_Override, r2, &r2->AddressProxy.ip.v6, &r2->WakeUp.IMAC, &AllHosts_v6, &AllHosts_v6_Eth);
2099 r2->LastAPTime = m->timenow;
2101 if (--r2->AnnounceCount <= GoodbyeCount) r2->WakeUp.HMAC = zeroEthAddr;
2153 for (r2=m->ResourceRecords; r2; r2=r2->next) // Scan list of resource records
2154 if (RRTypeIsAddressType(r2->resrec.rrtype) && // For all address records (A/AAAA) ...
2155 ResourceRecordIsValidAnswer(r2) && // ... which are valid for answer ...
2156 rr->LastMCTime - r2->LastMCTime >= 0 && // ... which we have not sent recently ...
2157 rr->resrec.rdatahash == r2->resrec.namehash && // ... whose name is the name of the SRV target
2158 SameDomainName(&rr->resrec.rdata->u.srv.target, r2->resrec.name) &&
2159 (rr->ImmedAnswer == mDNSInterfaceMark || rr->ImmedAnswer == r2->resrec.InterfaceID))
2160 r2->ImmedAdditional = r2->resrec.InterfaceID; // ... then mark this address record for sending too
2183 for (r2 = m->ResourceRecords; r2; r2=r2->next)
2184 if (ResourceRecordIsValidAnswer(r2))
2185 if (r2->ImmedAnswer != mDNSInterfaceMark &&
2186 r2->ImmedAnswer != rr->ImmedAnswer && SameResourceRecordSignature(r2, rr))
2187 r2->ImmedAnswer = !r2->ImmedAnswer ? rr->ImmedAnswer : mDNSInterfaceMark;
2191 for (r2 = m->ResourceRecords; r2; r2=r2->next)
2192 if (ResourceRecordIsValidAnswer(r2))
2193 if (r2->ImmedAdditional != rr->ImmedAdditional && SameResourceRecordSignature(r2, rr))
2194 r2->ImmedAdditional = rr->ImmedAdditional;
2368 for (r2 = m->ResourceRecords; r2; r2=r2->next)
2369 if (ResourceRecordIsValidAnswer(r2) && SameResourceRecordNameClassInterface(r2, rr))
2371 if (r2->resrec.rrtype >= kDNSQType_ANY) { LogMsg("Can't create NSEC for record %s", ARDisplayString(m, r2)); break; }
2372 else nsec.rdatastorage.u.nsec.bitmap[r2->resrec.rrtype >> 3] |= 128 >> (r2->resrec.rrtype & 7);
2375 if (!r2) // If we successfully built our NSEC record, add it to the packet now
2387 for (r2 = rr->next; r2; r2=r2->next)
2388 if (SameResourceRecordNameClassInterface(r2, rr))
2389 if (r2->SendNSECNow == mDNSInterfaceMark || r2->SendNSECNow == intf->InterfaceID)
2390 r2->SendNSECNow = mDNSNULL;
3040 AuthRecord *r2;
3041 for (r2 = m->DuplicateRecords; r2; r2=r2->next)
3042 if (r2->resrec.RecordType == kDNSRecordTypeUnique && RecordIsLocalDuplicate(r2, ar))
3043 r2->ProbeCount = 0;
5525 const AuthRecord *r2 = r1;
5526 while (r2->DependentOn) r2 = r2->DependentOn;
5527 if (r2 == master) return(mDNStrue);
5534 const AuthRecord *r2 = r1;
5535 while (r2->DependentOn) r2 = r2->DependentOn;
5536 if (r2 == master) return(mDNStrue);
6945 CacheRecord *r1 = CacheFlushRecords, *r2;
6964 for (r2 = cg ? cg->members : mDNSNULL; r2; r2=r2->next)
6966 if ((r1->resrec.InterfaceID == r2->resrec.InterfaceID) &&
6967 (r1->resrec.InterfaceID || (r1->resrec.rDNSServer == r2->resrec.rDNSServer)) &&
6968 r1->resrec.rrtype == r2->resrec.rrtype &&
6969 r1->resrec.rrclass == r2->resrec.rrclass)
6973 if (m->timenow - r2->TimeRcvd < mDNSPlatformOneSecond && RRExpireTime(r2) - m->timenow > mDNSPlatformOneSecond)
6986 if (r2->resrec.rroriginalttl != r1->resrec.rroriginalttl && r1->resrec.rroriginalttl > 1)
6988 if (!(r2->resrec.rroriginalttl == 240 && r1->resrec.rroriginalttl == 60 && r2->resrec.rrtype == kDNSType_TXT) &&
6991 r2->resrec.rroriginalttl, r1->resrec.rroriginalttl, CRDisplayString(m, r2));
6992 r2->resrec.rroriginalttl = r1->resrec.rroriginalttl;
6994 r2->TimeRcvd = m->timenow;
6999 verbosedebugf("Cache flush old %p age %d expire in %d %s", r2, m->timenow - r2->TimeRcvd, RRExpireTime(r2) - m->timenow, CRDisplayString(m, r2));
7019 if (r2->TimeRcvd == m->timenow && r2->resrec.rroriginalttl == 1 && r2->UnansweredQueries == MaxUnansweredQueries)
7021 LogInfo("Cache flush for DE record %s", CRDisplayString(m, r2));
7022 r2->resrec.rroriginalttl = 0;
7024 else if (RRExpireTime(r2) - m->timenow > mDNSPlatformOneSecond)
7028 r2->resrec.rroriginalttl = 1;
7029 r2->UnansweredQueries = MaxUnansweredQueries;
7030 r2->TimeRcvd = m->timenow - 1;
7035 SetNextCacheCheckTimeForRecord(m, r2);
10438 AuthRecord *rr, *r2;
10447 for (r2 = m->ResourceRecords; r2; r2=r2->next)
10448 if (r2->resrec.InterfaceID == InterfaceID && mDNSSameEthAddress(&r2->WakeUp.HMAC, &rr->WakeUp.HMAC) &&
10449 r2->resrec.RecordType != kDNSRecordTypeDeregistering &&
10450 r2->resrec.rrtype == kDNSType_SRV && mDNSSameIPPort(r2->resrec.rdata->u.srv.port, port) &&
10451 SameDomainLabel(ThirdLabel(r2->resrec.name)->c, tp))
10453 if (!r2 && mDNSSameIPPort(port, IPSECPort)) r2 = rr; // So that we wake for BTMM IPSEC packets, even without a matching SRV record
10454 if (r2)
10457 InterfaceNameForID(m, rr->resrec.InterfaceID), dst, &rr->WakeUp.HMAC, &rr->WakeUp.IMAC, ARDisplayString(m, r2));