/macosx-10.10.1/Libinfo-459/dns.subproj/ |
H A D | res_query.c | 59 _mdns_query(int call, const char *name, int class, int type, u_char *answer, int anslen) argument 81 memcpy(answer, p->dns_packet, MIN(res, anslen)); 89 if (MIN(res, anslen) >= sizeof(HEADER)) { 121 res_query(const char *name, int class, int type, u_char *answer, int anslen) argument 123 return _mdns_query(SI_CALL_DNS_QUERY, name, class, type, answer, anslen); 127 res_search(const char *name, int class, int type, u_char *answer, int anslen) argument 129 return _mdns_query(SI_CALL_DNS_SEARCH, name, class, type, answer, anslen);
|
/macosx-10.10.1/libresolv-57/ |
H A D | res_query.c | 142 size_t anslen; member in struct:res_query_context 172 buflen = context->ansmaxlen - context->anslen; 182 cp = context->answer + context->anslen; 224 context->anslen = (size_t)(cp - context->answer); 298 res_query_mDNSResponder(res_state statp, const char *name, int class, int type, u_char *answer, int anslen, struct sockaddr *from, uint32_t *fromlen) argument 326 context.ansmaxlen = anslen; 327 context.anslen = res_nmkquery(statp, ns_o_query, name, class, type, NULL, 0, NULL, answer, anslen); 328 if (context.anslen <= 0) return 0; 506 if ((ans->ancount == 0) || (cancelled == 1)) context.anslen 588 res_nquery_soa_min(res_state statp, const char *name, int class, int type, u_char *answer, int anslen, struct sockaddr *from, int *fromlen, int *min) argument 680 res_nquery_2(res_state statp, const char *name, int class, int type, u_char *answer, int anslen, struct sockaddr *from, int *fromlen) argument 688 res_nquery(res_state statp, const char *name, int class, int type, u_char *answer, int anslen) argument 703 res_nquerydomain_2(res_state statp, const char *name, const char *domain, int class, int type, u_char *answer, int anslen, struct sockaddr *from, int *fromlen) argument 753 res_nquerydomain(res_state statp, const char *name, const char *domain, int class, int type, u_char *answer, int anslen) argument 770 res_nsearch_2(res_state statp, const char *name, int class, int type, u_char *answer, int anslen, struct sockaddr *from, int *fromlen) argument 901 __res_nsearch_list_2(res_state statp, const char *name, int class, int type, u_char *answer, int anslen, struct sockaddr *from, int *fromlen, int nsearch, char **search) argument 1032 res_nsearch(res_state statp, const char *name, int class, int type, u_char *answer, int anslen) argument [all...] |
H A D | res_sendsigned.c | 37 ns_tsig_key *key, u_char *answer, int anslen) 106 ret = res_nsend(nstatp, newmsg, newmsglen, answer, anslen); 114 anslen = ret; 115 ret = ns_verify(answer, &anslen, dstkey, sig, siglen, 141 return (anslen); 36 res_nsendsigned(res_state statp, const u_char *msg, int msglen, ns_tsig_key *key, u_char *answer, int anslen) argument
|
H A D | res_data.c | 153 res_query(const char *name, int class, int type, u_char *answer, int anslen) argument 166 return (res_nquery(_res_static, name, class, type, answer, anslen)); 258 res_querydomain(const char *name, const char *domain, int class, int type, u_char *answer, int anslen) argument 272 return res_nquerydomain(_res_static, name, domain, class, type, answer, anslen); 276 res_search(const char *name, int class, int type, u_char *answer, int anslen) argument 290 return res_nsearch(_res_static, name, class, type, answer, anslen);
|
H A D | res_mkquery.c | 223 res_nopt(statp, n0, buf, buflen, anslen) 228 int anslen; /* answer buffer length */ 251 putshort(anslen & 0xffff, cp); /* CLASS = UDP payload size */
|
H A D | res_private.h | 97 extern int res_query_mDNSResponder(res_state statp, const char *name, int class, int type, u_char *answer, int anslen, struct sockaddr *from, uint32_t *fromlen);
|
H A D | dns.c | 77 extern int res_nquery_soa_min(res_state statp, const char *name, int class, int type, u_char *answer, int anslen, struct sockaddr *from, int *fromlen, int *min); 78 extern int res_nsearch_2(res_state statp, const char *name, int class, int type, u_char *answer, int anslen, struct sockaddr *from, uint32_t *fromlen); 79 extern int __res_nsearch_list_2(res_state statp, const char *name, int class, int type, u_char *answer, int anslen, struct sockaddr *from, uint32_t *fromlen, int nsearch, char **search);
|
H A D | dns_util.c | 78 extern int __res_nquery(res_state statp, const char *name, int class, int type, u_char *answer, int anslen);
|
/macosx-10.10.1/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | getcertsbyname.c | 205 int buflen, anslen, len; local 235 anslen = res_query(name, C_IN, T_CERT, answer, buflen); 236 if (anslen == -1) 239 } while (buflen < anslen); 242 printf("get a DNS packet len=%d\n", anslen); 246 eom = answer + anslen;
|
/macosx-10.10.1/Libinfo-459/lookup.subproj/ |
H A D | mdns_module.c | 181 static int _mdns_search(const char *name, int class, int type, const char *interface, DNSServiceFlags flags, uint8_t *answer, uint32_t *anslen, mdns_reply_t *reply); 999 size_t anslen; // DNS packet buffer current length member in struct:__anon2863 1017 _mdns_query_start(mdns_query_context_t *ctx, mdns_reply_t *reply, uint8_t *answer, uint32_t *anslen, const char* name, int class, int type, const char *interface, DNSServiceFlags flags, int kq) argument 1029 if (answer && anslen) { 1032 ctx->ansmaxlen = *anslen; 1033 ctx->anslen = _mdns_make_query(name, class, type, answer, ctx->ansmaxlen); 1034 if (ctx->anslen <= 0) return -1; 1146 ctx->anslen = -1; 1275 size_t buflen = context->ansmaxlen - context->anslen; 1281 cp = context->answer + context->anslen; 1389 _mdns_search(const char *name, int class, int type, const char *interface, DNSServiceFlags flags, uint8_t *answer, uint32_t *anslen, mdns_reply_t *reply) argument [all...] |