/macosx-10.9.5/mDNSResponder-522.92.1/mDNSCore/ |
H A D | nsec3.h | 26 extern CacheRecord *NSEC3RecordIsDelegation(mDNS *const m, domainname *name, mDNSu16 qtype);
|
H A D | dnssec.h | 36 mDNSu16 rrtype; 37 mDNSu16 rrclass; 39 mDNSu16 rdlength; 40 mDNSu16 found; 94 mDNSu16 origType; // Original question type corresponding to origName 95 mDNSu16 currQtype; // Current question type that is being verified 140 extern DNSSECVerifier *AllocateDNSSECVerifier(mDNS *const m, const domainname *name, mDNSu16 rrtype, mDNSInterfaceID InterfaceID, 143 mDNSu16 qtype, mDNSQuestionCallback *callback, void *context);
|
H A D | nsec.h | 30 extern CacheRecord *NSECRecordIsDelegation(mDNS *const m, domainname *name, mDNSu16 qtype);
|
H A D | DNSCommon.h | 113 extern mDNSu16 CompressedDomainNameLength(const domainname *const name, const domainname *parent); 172 extern mDNSu16 GetRDLength(const ResourceRecord *const rr, mDNSBool estimate); 173 extern mDNSBool ValidateRData(const mDNSu16 rrtype, const mDNSu16 rdlength, const RData *const rd); 199 extern mDNSu8 *PutResourceRecordTTLWithLimit(DNSMessage *const msg, mDNSu8 *ptr, mDNSu16 *count, ResourceRecord *rr, mDNSu32 ttl, const mDNSu8 *limit); 216 extern mDNSu8 *putQuestion(DNSMessage *const msg, mDNSu8 *ptr, const mDNSu8 *const limit, const domainname *const name, mDNSu16 rrtype, mDNSu16 rrclass); 221 extern mDNSu8 *putDeleteRRSetWithLimit(DNSMessage *msg, mDNSu8 *ptr, const domainname *name, mDNSu16 rrtype, mDNSu8 *limit); 243 extern void SetNewRData(ResourceRecord *const rr, RData *NewRData, mDNSu16 rdlength); 251 LargeCacheRecord *const largecr, mDNSu16 rdlengt [all...] |
H A D | mDNSEmbeddedAPI.h | 254 typedef unsigned short mDNSu16; typedef 282 typedef union { mDNSu8 b[ 2]; mDNSu16 NotAnInteger; } mDNSOpaque16; 284 typedef packedunion { mDNSu8 b[ 6]; mDNSu16 w[3]; mDNSu32 l[1]; } mDNSOpaque48; 285 typedef union { mDNSu8 b[ 8]; mDNSu16 w[4]; mDNSu32 l[2]; } mDNSOpaque64; 286 typedef union { mDNSu8 b[16]; mDNSu16 w[8]; mDNSu32 l[4]; } mDNSOpaque128; 490 mDNSu16 numQuestions; 491 mDNSu16 numAnswers; 492 mDNSu16 numAuthorities; 493 mDNSu16 numAdditionals; 521 mDNSu16 replyle [all...] |
H A D | DNSCommon.c | 173 mDNSexport char *DNSTypeName(mDNSu16 rrtype) 242 mDNSexport mDNSu16 swap16(mDNSu16 x) 245 return (mDNSu16)((mDNSu16)ptr[0] << 8 | ptr[1]); 659 mDNSu16 l1 = DomainNameLength(d1); 660 mDNSu16 l2 = DomainNameLength(d2); 708 mDNSexport mDNSu16 DomainNameLengthLimit(const domainname *const name, const mDNSu8 *limit) 713 if (*src == 0) return((mDNSu16)(src - name->c + 1)); 728 mDNSexport mDNSu16 CompressedDomainNameLengt [all...] |
H A D | uDNS.h | 143 extern void uDNS_ReceiveNATPacket(mDNS *m, const mDNSInterfaceID InterfaceID, mDNSu8 *pkt, mDNSu16 len); // Called for each received PCP or NAT-PMP packet 144 extern void natTraversalHandleAddressReply(mDNS *const m, mDNSu16 err, mDNSv4Addr ExtAddr); 145 extern void natTraversalHandlePortMapReply(mDNS *const m, NATTraversalInfo *n, const mDNSInterfaceID InterfaceID, mDNSu16 err, mDNSIPPort extport, mDNSu32 lease, NATTProtocol protocol);
|
H A D | dnsproxy.c | 66 mDNSu16 optLen; // Total Length of the EDNS0 option 67 mDNSu16 rcvBufSize; // How much can the client receive ? 86 mDNSu16 rrtype, rrclass; 88 mDNSu16 flag; 97 rrtype = (mDNSu16) ((mDNSu16)ptr[0] << 8 | ptr[1]); 103 rrclass = (mDNSu16) ((mDNSu16)ptr[2] << 8 | ptr[3]); 106 flag = (mDNSu16) ((mDNSu16)pt [all...] |
H A D | dnssec.c | 229 mDNSu16 qtype, mDNSQuestionCallback *callback, void *context) 255 mDNSexport DNSSECVerifier *AllocateDNSSECVerifier(mDNS *const m, const domainname *name, mDNSu16 rrtype, mDNSInterfaceID InterfaceID, 967 mDNSu16 tag; 989 tag = (mDNSu16)keytag((mDNSu8 *)key, keyv->rdlength); 1269 mDNSlocal void PrintVarSignInfo(mDNSu16 rdlen, mDNSu8 *rdata) 1280 for (j = 0; j < sizeof(mDNSu16); j++) 1282 LogMsg("RDLENGTH(%d) %s", sizeof(mDNSu16), buf); 1290 mDNSlocal void PrintVarSignInfo(mDNSu16 rdlen, mDNSu8 *rdata) 1308 mDNSu16 rdlength; 1309 mDNSu16 rrtyp [all...] |
H A D | DNSDigest.c | 40 mDNSlocal mDNSu16 NToH16(mDNSu8 * bytes) 42 return (mDNSu16)((mDNSu16)bytes[0] << 8 | (mDNSu16)bytes[1]); 1322 mDNSexport void DNSDigest_SignMessage(DNSMessage *msg, mDNSu8 **end, DomainAuthInfo *info, mDNSu16 tcode) 1333 mDNSu16 numAdditionals = (mDNSu16)((mDNSu16)countPtr[0] << 8 | countPtr[1]); 1413 tsig.resrec.rdlength = (mDNSu16)(rdata - tsig.resrec.rdata->u.data); 1422 mDNSexport mDNSBool DNSDigest_VerifyMessage(DNSMessage *msg, mDNSu8 *end, LargeCacheRecord * lcr, DomainAuthInfo *info, mDNSu16 * rcod [all...] |
H A D | nsec3.c | 181 CacheRecord **closerEncloser, const domainname **ce, mDNSu16 qtype) 380 const domainname **ce, mDNSu16 qtype) 517 mDNSlocal mDNSBool NSEC3NoDataError(mDNS *const m, CacheRecord *ncr, domainname *name, mDNSu16 qtype, CacheRecord **closestEncloser) 675 mDNSexport CacheRecord *NSEC3RecordIsDelegation(mDNS *const m, domainname *name, mDNSu16 qtype)
|
H A D | nsec.c | 137 mDNSu16 rrtype; 257 mDNSu16 tc = swap16(rrsig->typeCovered); 378 mDNSlocal int NSECNameExists(mDNS *const m, ResourceRecord *rr, domainname *name, mDNSu16 qtype) 610 mDNSlocal mDNSBool NSECNoDataError(mDNS *const m, ResourceRecord *rr, domainname *name, mDNSu16 qtype, domainname **wildcard) 935 mDNSlocal mDNSBool NSECNoWildcard(mDNS *const m, ResourceRecord *rr, domainname *qname, mDNSu16 qtype) 1049 mDNSexport CacheRecord *NSECRecordIsDelegation(mDNS *const m, domainname *name, mDNSu16 qtype)
|
H A D | mDNS.c | 76 mDNSu32 *seq, mDNSu32 *ack, mDNSIPPort *lport, mDNSIPPort *rport, mDNSu16 *win); 271 mDNSu16 namelen = DomainNameLength(rr->name); 1164 mDNSu16 win; 1525 mDNSu16 OldRDLen = rr->resrec.rdlength; 2138 mDNSlocal mDNSu16 CheckSum(const void *const data, mDNSs32 length, mDNSu32 sum) 2140 const mDNSu16 *ptr = data; 2147 mDNSlocal mDNSu16 IPv6CheckSum(const mDNSv6Addr *const src, const mDNSv6Addr *const dst, const mDNSu8 protocol, const void *const data, const mDNSu32 length) 2552 mDNSu16 oldrdlength = rr->resrec.rdlength; 2934 mDNSu16 ucbit = (mDNSu16)(ucas [all...] |
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSShared/ |
H A D | dnsextd.h | 83 mDNSu16 type; 97 mDNSu16 qtype;
|
H A D | dnsextd.c | 209 pkt->msg.h.numQuestions = (mDNSu16)((mDNSu16)ptr[0] << 8 | ptr[1]); 210 pkt->msg.h.numAnswers = (mDNSu16)((mDNSu16)ptr[2] << 8 | ptr[3]); 211 pkt->msg.h.numAuthorities = (mDNSu16)((mDNSu16)ptr[4] << 8 | ptr[5]); 212 pkt->msg.h.numAdditionals = (mDNSu16)((mDNSu16)ptr[6] << 8 | ptr[7]); 218 mDNSu16 numQuestions = pkt->msg.h.numQuestions; 219 mDNSu16 numAnswer [all...] |
H A D | dnsextd_parser.y | 563 d->addr.sin_port = htons( ( mDNSu16 ) info->source_port ); 573 d->ns_addr.sin_port = htons( ( mDNSu16 ) info->server_port );
|
H A D | uds_daemon.c | 190 mDNSu16 txtlen; 654 mDNSu16 type = get_uint16(&request->msgptr, request->msgend); 655 mDNSu16 class = get_uint16(&request->msgptr, request->msgend); 656 mDNSu16 rdlen = get_uint16(&request->msgptr, request->msgend); 1334 mDNSlocal mStatus add_record_to_service(request_state *request, service_instance *instance, mDNSu16 rrtype, mDNSu16 rdlen, const char *rdata, mDNSu32 ttl) 1345 extra->r.rdatastorage.MaxRDLength = (mDNSu16) size; 1379 mDNSu16 rrtype = get_uint16(&request->msgptr, request->msgend); 1380 mDNSu16 rdlen = get_uint16(&request->msgptr, request->msgend); 1412 mDNSlocal void update_callback(mDNS *const m, AuthRecord *const rr, RData *oldrd, mDNSu16 oldrdle [all...] |
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSPosix/ |
H A D | NetMonitor.c | 288 mDNSlocal void SendUnicastQuery(mDNS *const m, HostEntry *entry, domainname *name, mDNSu16 rrtype, mDNSInterfaceID InterfaceID) 397 mDNSlocal void recordstat(HostEntry *entry, const domainname *fqdn, int op, mDNSu16 rrtype) 621 mDNSu16 ucbit = q.qclass & kDNSQClass_UnicastResponse; 784 msg->h.numQuestions = (mDNSu16)((mDNSu16)ptr[0] << 8 | ptr[1]); 785 msg->h.numAnswers = (mDNSu16)((mDNSu16)ptr[2] << 8 | ptr[3]); 786 msg->h.numAuthorities = (mDNSu16)((mDNSu16)ptr[4] << 8 | ptr[5]); 787 msg->h.numAdditionals = (mDNSu16)((mDNSu1 [all...] |
H A D | Identify.c | 197 mDNSlocal mStatus StartQuery(DNSQuestion *q, char *qname, mDNSu16 qtype, const mDNSAddr *target, mDNSQuestionCallback callback) 232 mDNSlocal void DoOneQuery(DNSQuestion *q, char *qname, mDNSu16 qtype, const mDNSAddr *target, mDNSQuestionCallback callback) 244 mDNSlocal int DoQuery(DNSQuestion *q, char *qname, mDNSu16 qtype, const mDNSAddr *target, mDNSQuestionCallback callback)
|
H A D | Responder.c | 239 static mDNSu16 gServiceTextLen = 0; 421 mDNSu16 textLen,
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/ |
H A D | LegacyNATTraversal.c | 79 #define RequestedPortNum(n) (mDNSVal16(mDNSIPPortIsZero((n)->RequestedPort) ? (n)->IntPort : (n)->RequestedPort) + (mDNSu16)(n)->tcpInfo.retries) 123 *port = mDNSOpaque16fromIntVal((mDNSu16)strtol((char*)addrPtr, mDNSNULL, 10)); // store it properly converted 303 mDNSu16 err = NATErr_None; 632 mDNSu16 ReqPortNum = RequestedPortNum(n); 792 mDNSexport void LNT_ConfigureRouterInfo(mDNS *m, const mDNSInterfaceID InterfaceID, const mDNSu8 *const data, const mDNSu16 len)
|
H A D | DNSProxySupport.c | 35 mDNSu16 replyLen; 64 tcpInfo->replyLen = (mDNSu16)((mDNSu16)lenptr[0] << 8 | lenptr[1]);
|
H A D | mDNSMacOSX.c | 238 mDNSlocal void PrintHex(mDNSu8 *data, mDNSu16 len); 255 mDNSu16 type; 261 mDNSlocal mDNSu8 *putVal16(mDNSu8 *ptr, mDNSu16 val) 265 return ptr + sizeof(mDNSu16); 291 mDNSlocal mStatus DNSNameCompressionParseBytes(mDNS *const m, const mDNSu8 *const lhs, const mDNSu16 lhs_len, const mDNSu8 *const rhs, const mDNSu16 rhs_len, AuthRecord *rr) 369 mDNSlocal void PrintHex(mDNSu8 *data, mDNSu16 len) 391 mDNSlocal void PrintHelper(const char *const tag, mDNSu8 *lhs, mDNSu16 lhs_len, mDNSu8 *rhs, mDNSu16 rhs_len) 452 mDNSlocal D2DBrowseListElem ** D2DFindInBrowseList(const domainname *const name, mDNSu16 typ [all...] |
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOS9/ |
H A D | Mac OS Test Responder.c | 77 txtbuffer, (mDNSu16)(1+txtbuffer[0]), // TXT data, length
|
H A D | SubTypeTester.c | 78 txtbuffer, (mDNSu16)(1+txtbuffer[0]), // TXT data, length
|