/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/dnsmasq/src/ |
H A D | forward.c | 289 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : forward->sentto->edns_pktsz, pheader); 483 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : start->edns_pktsz, pheader); 586 if (!is_sign && udpsz > daemon->edns_pktsz) 587 PUTSHORT(daemon->edns_pktsz, psave); 807 server->edns_pktsz = SAFE_PKTSZ; 928 daemon->keyname, forward->class, T_DNSKEY, &server->addr, server->edns_pktsz); 937 daemon->keyname, forward->class, T_DS, &server->addr, server->edns_pktsz); 1165 iov[0].iov_len = daemon->edns_pktsz; 1590 m = dnssec_generate_query(header, ((char *) header) + 65536, name_start, class, T_DS, &server->addr, server->edns_pktsz); 1728 new_status == STAT_NEED_KEY ? T_DNSKEY : T_DS, &server->addr, server->edns_pktsz); [all...] |
H A D | dnsmasq.c | 91 if (daemon->edns_pktsz < PACKETSZ) 92 daemon->edns_pktsz = PACKETSZ; 94 daemon->packet_buff_sz = daemon->edns_pktsz > DNSMASQ_PACKETSZ ? 95 daemon->edns_pktsz : DNSMASQ_PACKETSZ;
|
H A D | dnsmasq.h | 508 int flags, tcpfd, edns_pktsz; member in struct:server 991 unsigned short edns_pktsz; member in struct:daemon 1162 size_t dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz);
|
H A D | network.c | 1406 serv->edns_pktsz = daemon->edns_pktsz;
|
H A D | option.c | 2530 daemon->edns_pktsz = (unsigned short)i; 4450 daemon->edns_pktsz = EDNS_PKTSZ; 4556 tmp->edns_pktsz = daemon->edns_pktsz;
|
H A D | dnssec.c | 2249 int type, union mysockaddr *addr, int edns_pktsz) 2285 PUTSHORT(edns_pktsz, p); 2248 dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/dnsmasq/src/ |
H A D | forward.c | 289 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : forward->sentto->edns_pktsz, pheader); 483 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : start->edns_pktsz, pheader); 586 if (!is_sign && udpsz > daemon->edns_pktsz) 587 PUTSHORT(daemon->edns_pktsz, psave); 807 server->edns_pktsz = SAFE_PKTSZ; 928 daemon->keyname, forward->class, T_DNSKEY, &server->addr, server->edns_pktsz); 937 daemon->keyname, forward->class, T_DS, &server->addr, server->edns_pktsz); 1165 iov[0].iov_len = daemon->edns_pktsz; 1590 m = dnssec_generate_query(header, ((char *) header) + 65536, name_start, class, T_DS, &server->addr, server->edns_pktsz); 1728 new_status == STAT_NEED_KEY ? T_DNSKEY : T_DS, &server->addr, server->edns_pktsz); [all...] |
H A D | dnsmasq.c | 91 if (daemon->edns_pktsz < PACKETSZ) 92 daemon->edns_pktsz = PACKETSZ; 94 daemon->packet_buff_sz = daemon->edns_pktsz > DNSMASQ_PACKETSZ ? 95 daemon->edns_pktsz : DNSMASQ_PACKETSZ;
|
H A D | dnsmasq.h | 508 int flags, tcpfd, edns_pktsz; member in struct:server 991 unsigned short edns_pktsz; member in struct:daemon 1162 size_t dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz);
|
H A D | network.c | 1406 serv->edns_pktsz = daemon->edns_pktsz;
|
H A D | option.c | 2530 daemon->edns_pktsz = (unsigned short)i; 4450 daemon->edns_pktsz = EDNS_PKTSZ; 4556 tmp->edns_pktsz = daemon->edns_pktsz;
|
H A D | dnssec.c | 2249 int type, union mysockaddr *addr, int edns_pktsz) 2285 PUTSHORT(edns_pktsz, p); 2248 dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/dnsmasq/src/ |
H A D | forward.c | 289 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : forward->sentto->edns_pktsz, pheader); 483 PUTSHORT((forward->flags & FREC_TEST_PKTSZ) ? SAFE_PKTSZ : start->edns_pktsz, pheader); 586 if (!is_sign && udpsz > daemon->edns_pktsz) 587 PUTSHORT(daemon->edns_pktsz, psave); 807 server->edns_pktsz = SAFE_PKTSZ; 928 daemon->keyname, forward->class, T_DNSKEY, &server->addr, server->edns_pktsz); 937 daemon->keyname, forward->class, T_DS, &server->addr, server->edns_pktsz); 1165 iov[0].iov_len = daemon->edns_pktsz; 1590 m = dnssec_generate_query(header, ((char *) header) + 65536, name_start, class, T_DS, &server->addr, server->edns_pktsz); 1728 new_status == STAT_NEED_KEY ? T_DNSKEY : T_DS, &server->addr, server->edns_pktsz); [all...] |
H A D | dnsmasq.c | 91 if (daemon->edns_pktsz < PACKETSZ) 92 daemon->edns_pktsz = PACKETSZ; 94 daemon->packet_buff_sz = daemon->edns_pktsz > DNSMASQ_PACKETSZ ? 95 daemon->edns_pktsz : DNSMASQ_PACKETSZ;
|
H A D | dnsmasq.h | 508 int flags, tcpfd, edns_pktsz; member in struct:server 991 unsigned short edns_pktsz; member in struct:daemon 1162 size_t dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz);
|
H A D | network.c | 1406 serv->edns_pktsz = daemon->edns_pktsz;
|
H A D | option.c | 2530 daemon->edns_pktsz = (unsigned short)i; 4450 daemon->edns_pktsz = EDNS_PKTSZ; 4556 tmp->edns_pktsz = daemon->edns_pktsz;
|
H A D | dnssec.c | 2249 int type, union mysockaddr *addr, int edns_pktsz) 2285 PUTSHORT(edns_pktsz, p); 2248 dnssec_generate_query(struct dns_header *header, char *end, char *name, int class, int type, union mysockaddr *addr, int edns_pktsz) argument
|