Lines Matching defs:rr

23         // Init rr.
24 strcpy(rr.name, kRrName);
25 rr.type = RR_TYPE_AAAA;
26 rr.clazz = RR_CLASS_IN;
27 rr.rdata = const_cast<uint8_t*>(kRdata);
28 rr.rdlength = sizeof(kRdata);
29 rr.ttl = 42;
34 mdns_rr rr;
46 static bool verify_rr(mdns_rr* rr,
53 ASSERT_STR_EQ(rr->name, name, "rr has incorrect name");
54 ASSERT_EQ(rr->type, type, "rr has incorrect type");
55 ASSERT_EQ(rr->clazz, clazz, "rr has incorrect class");
56 ASSERT_EQ(rr->rdlength, rdlength, "rr has incorrect rdlength");
57 ASSERT_EQ(rr->ttl, ttl, "rr has incorrect ttl");
169 int retval = mdns_add_answer(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
170 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
174 EXPECT_TRUE(verify_rr(t.message.answers, t.rr.name, t.rr.type, t.rr.clazz,
175 t.rr.rdata, t.rr.rdlength, t.rr.ttl));
186 int retval = mdns_add_answer(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
187 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
193 uint8_t other_rdata[] = {t.rr.rdata[0]};
195 uint32_t other_ttl = t.rr.ttl + 1;
201 EXPECT_TRUE(verify_rr(t.message.answers, t.rr.name, t.rr.type, t.rr.clazz,
202 t.rr.rdata, t.rr.rdlength, t.rr.ttl));
218 t.rr.type = (uint16_t)(RR_TYPE_A + 1); // Unsupported record type.
219 int retval = mdns_add_answer(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
220 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
221 EXPECT_EQ(errno, EINVAL, "errno should be EINVAL when given bad rr type");
234 t.rr.clazz = (uint16_t)(RR_CLASS_IN + 1); // Unsupported record class.
235 int retval = mdns_add_answer(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
236 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
237 EXPECT_EQ(errno, EINVAL, "errno should be EINVAL when given bad rr class");
251 int retval = mdns_add_authority(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
252 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
256 EXPECT_TRUE(verify_rr(t.message.authorities, t.rr.name, t.rr.type, t.rr.clazz,
257 t.rr.rdata, t.rr.rdlength, t.rr.ttl));
268 int retval = mdns_add_authority(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
269 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
275 uint8_t other_rdata[] = {t.rr.rdata[0]};
277 uint32_t other_ttl = t.rr.ttl + 1;
283 EXPECT_TRUE(verify_rr(t.message.authorities, t.rr.name, t.rr.type, t.rr.clazz,
284 t.rr.rdata, t.rr.rdlength, t.rr.ttl));
300 t.rr.type = (uint16_t)(RR_TYPE_A + 1); // Unsupported record type.
301 int retval = mdns_add_authority(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
302 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
303 EXPECT_EQ(errno, EINVAL, "errno should be EINVAL when given bad rr type");
316 t.rr.clazz = (uint16_t)(RR_CLASS_IN + 1); // Unsupported record class.
317 int retval = mdns_add_authority(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
318 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
319 EXPECT_EQ(errno, EINVAL, "errno should be EINVAL when given bad rr class");
333 int retval = mdns_add_additional(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
334 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
338 EXPECT_TRUE(verify_rr(t.message.additionals, t.rr.name, t.rr.type, t.rr.clazz,
339 t.rr.rdata, t.rr.rdlength, t.rr.ttl));
350 int retval = mdns_add_additional(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
351 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
357 uint8_t other_rdata[] = {t.rr.rdata[0]};
359 uint32_t other_ttl = t.rr.ttl + 1;
365 EXPECT_TRUE(verify_rr(t.message.additionals, t.rr.name, t.rr.type, t.rr.clazz,
366 t.rr.rdata, t.rr.rdlength, t.rr.ttl));
382 t.rr.type = (uint16_t)(RR_TYPE_A + 1); // Unsupported record type.
383 int retval = mdns_add_additional(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
384 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
385 EXPECT_EQ(errno, EINVAL, "errno should be EINVAL when given bad rr type");
398 t.rr.clazz = (uint16_t)(RR_CLASS_IN + 1); // Unsupported record class.
399 int retval = mdns_add_additional(&t.message, t.rr.name, t.rr.type, t.rr.clazz,
400 t.rr.rdata, t.rr.rdlength, t.rr.ttl);
401 EXPECT_EQ(errno, EINVAL, "errno should be EINVAL when given bad rr class");