Home | History | Annotate | Download | only in mDNSCore

Lines Matching refs:tcp

935 	if (rr->tcp) { DisposeTCPConn(rr->tcp);       rr->tcp = mDNSNULL; }
1173 rr->tcp = mDNSNULL;
1475 if (rr->tcp) { DisposeTCPConn(rr->tcp); rr->tcp = mDNSNULL; }
1503 if (rr->tcp) { DisposeTCPConn(rr->tcp); rr->tcp = mDNSNULL; }
4615 if (question->tcp) { DisposeTCPConn(question->tcp); question->tcp = mDNSNULL; }
5307 if (!mDNSOpaque16IsZero(q->TargetQID) && q->LongLived && q->ReqLease == 0 && q->tcp)
5317 if (rr->state == regState_Refresh && rr->tcp)
5384 nat, nat->Protocol == NATOp_MapTCP ? "TCP" : "UDP",
6275 mDNSlocal DNSQuestion *ExpectingUnicastResponseForQuestion(const mDNS *const m, const mDNSIPPort port, const mDNSOpaque16 id, const DNSQuestion *const question, mDNSBool tcp)
6280 if (!tcp && !q->LocalSocket) continue;
6281 if (mDNSSameIPPort(tcp ? q->tcpSrcPort : q->LocalSocket->port, port) &&
6295 const mDNSAddr *const srcaddr, const mDNSBool SrcLocal, const mDNSIPPort port, const mDNSOpaque16 id, const CacheRecord *const rr, mDNSBool tcp)
6312 if (!tcp)
6468 // dstaddr NULL tells us we received this over an outgoing TCP connection we made
6506 // mechanism, such as a TCP connection, that will permit larger replies.
6512 // abort our TCP connection, and not complete the operation, and end up with an incomplete RRSet in our cache.
6514 // and not even do the TCP query.
6515 // Accordingly, if we get a uDNS reply with kDNSFlag0_TC set, we bail out and wait for the TCP response containing the entire RRSet.
6588 // All responses received over our outbound TCP connections are acceptable for caching
6638 // For Long Lived queries that are both sent over UDP and Private TCP, LLQType is set.
6648 // For responses that come over TCP (Responses that can't fit within UDP) or TLS (Private queries
7488 mDNSBool TLS = (dstaddr == (mDNSAddr *)1); // For debug logs: dstaddr = 0 means TCP; dstaddr = 1 means TLS
7543 DumpPacket(m, mStatus_NoError, mDNSfalse, TLS ? "TLS" : !dstaddr ? "TCP" : "UDP", srcaddr, srcport, dstaddr, dstport, msg, end);
7675 // q->tcp = question->tcp;
7683 // question->tcp = mDNSNULL;
7695 if (question->tcp) LogInfo("UpdateQuestionDuplicates did not transfer tcp pointer");
8412 question->tcp = mDNSNULL;
8624 if (question->tcp) { DisposeTCPConn(question->tcp); question->tcp = mDNSNULL; }
8649 // If we need need to make a TCP connection to cancel the LLQ, that's going to take a little while.
8650 // We clear the tcp->question backpointer so that when the TCP connection completes, it doesn't
8651 // crash trying to access our cancelled question, but we don't cancel the TCP operation itself --
8653 if (question->tcp)
8655 question->tcp->question = mDNSNULL;
8656 question->tcp = mDNSNULL;
10351 const mDNSIPPort port = (protocol == 0x06) ? t->tcp.dst : (protocol == 0x11) ? t->udp.dst : zeroIPPort;
10367 wake = (!(t->tcp.flags & 4) && (t->tcp.flags & 3) != 1);
10369 // For now, to reduce spurious wakeups, we wake only for TCP SYN,
10371 if (!mDNSSameIPPort(port, SSH) && !(t->tcp.flags & 2)) wake = mDNSfalse;
10373 LogSPS("%s %d-byte TCP from %#a:%d to %#a:%d%s%s%s", XX,
10374 src, mDNSVal16(t->tcp.src), dst, mDNSVal16(port),
10375 (t->tcp.flags & 2) ? " SYN" : "",
10376 (t->tcp.flags & 1) ? " FIN" : "",
10377 (t->tcp.flags & 4) ? " RST" : "");