Searched refs:edns_pktsz (Results 1 - 18 of 18) sorted by relevance

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/dnsmasq/src/
H A Dforward.c289 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : forward->sentto->edns_pktsz, pheader);
483 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : start->edns_pktsz, pheader);
586 if (!is_sign && udpsz > daemon->edns_pktsz)
587 PUTSHORT(daemon->edns_pktsz, psave);
807 server->edns_pktsz = SAFE_PKTSZ;
928 daemon->keyname, forward->class, T_DNSKEY, &server->addr, server->edns_pktsz);
937 daemon->keyname, forward->class, T_DS, &server->addr, server->edns_pktsz);
1165 iov[0].iov_len = daemon->edns_pktsz;
1590 m = dnssec_generate_query(header, ((char *) header) + 65536, name_start, class, T_DS, &server->addr, server->edns_pktsz);
1728 new_status == STAT_NEED_KEY ? T_DNSKEY : T_DS, &server->addr, server->edns_pktsz);
[all...]
H A Ddnsmasq.c91 if (daemon->edns_pktsz < PACKETSZ)
92 daemon->edns_pktsz = PACKETSZ;
94 daemon->packet_buff_sz = daemon->edns_pktsz > DNSMASQ_PACKETSZ ?
95 daemon->edns_pktsz : DNSMASQ_PACKETSZ;
H A Ddnsmasq.h508 int flags, tcpfd, edns_pktsz; member in struct:server
991 unsigned short edns_pktsz; member in struct:daemon
1162 size_t dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz);
H A Dnetwork.c1406 serv->edns_pktsz = daemon->edns_pktsz;
H A Doption.c2530 daemon->edns_pktsz = (unsigned short)i;
4450 daemon->edns_pktsz = EDNS_PKTSZ;
4556 tmp->edns_pktsz = daemon->edns_pktsz;
H A Ddnssec.c2249 int type, union mysockaddr *addr, int edns_pktsz)
2285 PUTSHORT(edns_pktsz, p);
2248 dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/dnsmasq/src/
H A Dforward.c289 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : forward->sentto->edns_pktsz, pheader);
483 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : start->edns_pktsz, pheader);
586 if (!is_sign && udpsz > daemon->edns_pktsz)
587 PUTSHORT(daemon->edns_pktsz, psave);
807 server->edns_pktsz = SAFE_PKTSZ;
928 daemon->keyname, forward->class, T_DNSKEY, &server->addr, server->edns_pktsz);
937 daemon->keyname, forward->class, T_DS, &server->addr, server->edns_pktsz);
1165 iov[0].iov_len = daemon->edns_pktsz;
1590 m = dnssec_generate_query(header, ((char *) header) + 65536, name_start, class, T_DS, &server->addr, server->edns_pktsz);
1728 new_status == STAT_NEED_KEY ? T_DNSKEY : T_DS, &server->addr, server->edns_pktsz);
[all...]
H A Ddnsmasq.c91 if (daemon->edns_pktsz < PACKETSZ)
92 daemon->edns_pktsz = PACKETSZ;
94 daemon->packet_buff_sz = daemon->edns_pktsz > DNSMASQ_PACKETSZ ?
95 daemon->edns_pktsz : DNSMASQ_PACKETSZ;
H A Ddnsmasq.h508 int flags, tcpfd, edns_pktsz; member in struct:server
991 unsigned short edns_pktsz; member in struct:daemon
1162 size_t dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz);
H A Dnetwork.c1406 serv->edns_pktsz = daemon->edns_pktsz;
H A Doption.c2530 daemon->edns_pktsz = (unsigned short)i;
4450 daemon->edns_pktsz = EDNS_PKTSZ;
4556 tmp->edns_pktsz = daemon->edns_pktsz;
H A Ddnssec.c2249 int type, union mysockaddr *addr, int edns_pktsz)
2285 PUTSHORT(edns_pktsz, p);
2248 dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/dnsmasq/src/
H A Dforward.c289 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : forward->sentto->edns_pktsz, pheader);
483 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : start->edns_pktsz, pheader);
586 if (!is_sign && udpsz > daemon->edns_pktsz)
587 PUTSHORT(daemon->edns_pktsz, psave);
807 server->edns_pktsz = SAFE_PKTSZ;
928 daemon->keyname, forward->class, T_DNSKEY, &server->addr, server->edns_pktsz);
937 daemon->keyname, forward->class, T_DS, &server->addr, server->edns_pktsz);
1165 iov[0].iov_len = daemon->edns_pktsz;
1590 m = dnssec_generate_query(header, ((char *) header) + 65536, name_start, class, T_DS, &server->addr, server->edns_pktsz);
1728 new_status == STAT_NEED_KEY ? T_DNSKEY : T_DS, &server->addr, server->edns_pktsz);
[all...]
H A Ddnsmasq.c91 if (daemon->edns_pktsz < PACKETSZ)
92 daemon->edns_pktsz = PACKETSZ;
94 daemon->packet_buff_sz = daemon->edns_pktsz > DNSMASQ_PACKETSZ ?
95 daemon->edns_pktsz : DNSMASQ_PACKETSZ;
H A Ddnsmasq.h508 int flags, tcpfd, edns_pktsz; member in struct:server
991 unsigned short edns_pktsz; member in struct:daemon
1162 size_t dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz);
H A Dnetwork.c1406 serv->edns_pktsz = daemon->edns_pktsz;
H A Doption.c2530 daemon->edns_pktsz = (unsigned short)i;
4450 daemon->edns_pktsz = EDNS_PKTSZ;
4556 tmp->edns_pktsz = daemon->edns_pktsz;
H A Ddnssec.c2249 int type, union mysockaddr *addr, int edns_pktsz)
2285 PUTSHORT(edns_pktsz, p);
2248 dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz) argument

Completed in 367 milliseconds