/netbsd-current/external/bsd/libbind/dist/resolv/ |
H A D | res_sendsigned.c | 32 ns_tsig_key *key, u_char *answer, int anslen) 107 len = res_nsend(nstatp, newmsg, newmsglen, answer, anslen); 126 answer, (anslen > len) ? len : anslen); 162 answer, (anslen > len) ? len : anslen); 31 res_nsendsigned(res_state statp, const u_char *msg, int msglen, ns_tsig_key *key, u_char *answer, int anslen) argument
|
H A D | res_query.c | 117 int anslen) /*%< size of answer buffer */ 139 n = res_nopt(statp, n, buf, sizeof(buf), anslen); 156 n = res_nsend(statp, buf, n, answer, anslen); 218 int anslen) /*%< size of answer */ 240 return (res_nquery(statp, cp, class, type, answer, anslen)); 250 answer, anslen); 278 answer, anslen); 334 answer, anslen); 365 int anslen) /*%< size of answer */ 401 return (res_nquery(statp, longname, class, type, answer, anslen)); 113 res_nquery(res_state statp, const char *name, int class, int type, u_char *answer, int anslen) argument 214 res_nsearch(res_state statp, const char *name, int class, int type, u_char *answer, int anslen) argument 360 res_nquerydomain(res_state statp, const char *name, const char *domain, int class, int type, u_char *answer, int anslen) argument [all...] |
H A D | res_data.c | 181 int anslen) /*!< size of answer buffer */ 187 return (res_nquery(&_res, name, class, type, answer, anslen)); 246 int anslen) /*!< size of answer */ 253 return (res_nsearch(&_res, name, class, type, answer, anslen)); 261 int anslen) /*!< size of answer */ 270 answer, anslen)); 178 res_query(const char *name, int class, int type, u_char *answer, int anslen) argument 243 res_search(const char *name, int class, int type, u_char *answer, int anslen) argument 257 res_querydomain(const char *name, const char *domain, int class, int type, u_char *answer, int anslen) argument
|
H A D | res_mkquery.c | 215 int anslen) /*%< UDP answer buffer size */ 236 ns_put16(anslen & 0xffff, cp); /*%< CLASS = UDP payload size */ 211 res_nopt(res_state statp, int n0, u_char *buf, int buflen, int anslen) argument
|
/netbsd-current/lib/libresolv/ |
H A D | res_sendsigned.c | 33 ns_tsig_key *key, u_char *answer, int anslen) 108 len = res_nsend(nstatp, newmsg, newmsglen, answer, anslen); 127 answer, (anslen > len) ? len : anslen); 163 answer, (anslen > len) ? len : anslen); 32 res_nsendsigned(res_state statp, const u_char *msg, int msglen, ns_tsig_key *key, u_char *answer, int anslen) argument
|
/netbsd-current/lib/libc/resolv/ |
H A D | res_query.c | 149 int anslen) /*%< size of answer buffer */ 171 n = res_nopt(statp, n, buf, (int)sizeof(buf), anslen); 188 n = res_nsend(statp, buf, n, answer, anslen); 250 int anslen) /*%< size of answer */ 272 return (res_nquery(statp, cp, class, type, answer, anslen)); 282 answer, anslen); 310 answer, anslen); 366 answer, anslen); 397 int anslen) /*%< size of answer */ 429 return (res_nquery(statp, longname, class, type, answer, anslen)); 145 res_nquery(res_state statp, const char *name, int class, int type, u_char *answer, int anslen) argument 246 res_nsearch(res_state statp, const char *name, int class, int type, u_char *answer, int anslen) argument 392 res_nquerydomain(res_state statp, const char *name, const char *domain, int class, int type, u_char *answer, int anslen) argument [all...] |
H A D | res_data.c | 223 int anslen) /*!< size of answer buffer */ 229 return (res_nquery(&_nres, name, class, type, answer, anslen)); 292 int anslen) /*!< size of answer */ 299 return (res_nsearch(&_nres, name, class, type, answer, anslen)); 307 int anslen) /*!< size of answer */ 316 answer, anslen)); 220 res_query(const char *name, int class, int type, u_char *answer, int anslen) argument 289 res_search(const char *name, int class, int type, u_char *answer, int anslen) argument 303 res_querydomain(const char *name, const char *domain, int class, int type, u_char *answer, int anslen) argument
|
H A D | res_mkquery.c | 230 int anslen) /*%< UDP answer buffer size */ 251 if (anslen > 0xffff) 252 anslen = 0xffff; 253 ns_put16(anslen, cp); /*%< CLASS = UDP payload size */ 226 res_nopt(res_state statp, int n0, u_char *buf, int buflen, int anslen) argument
|
/netbsd-current/external/bsd/libbind/dist/irs/ |
H A D | dns_nw.c | 94 u_char *ansbuf, int anslen, 246 int anslen; local 255 anslen = res_nsearch(pvt->res, name, C_IN, T_PTR, ansbuf, MAXPACKET); 256 if (anslen < 0) { 260 result = get1101mask(this, get1101answer(this, ansbuf, anslen, by_name, 272 int anslen; local 287 anslen = res_nquery(pvt->res, qbuf, C_IN, T_PTR, ansbuf, MAXPACKET); 288 if (anslen < 0) { 292 result = get1101mask(this, get1101answer(this, ansbuf, anslen, by_addr, 300 u_char *ansbuf, int anslen, enu 299 get1101answer(struct irs_nw *this, u_char *ansbuf, int anslen, enum by_what by_what, int af, const char *name, const u_char *addr, int addrlen) argument 450 int anslen, type, class, ancount, qdcount; local [all...] |
H A D | dns_ho.c | 116 int anslen; /*%< size of answer buffer */ member in struct:dns_res_target 168 const u_char *ansbuf, int anslen, 270 q->anslen = sizeof(q->qbuf); 278 q->anslen = sizeof(q->qbuf); 310 p->answer, p->anslen)) < 0) { 372 q->anslen = sizeof(q->qbuf); 380 q->anslen = sizeof(q->qbuf); 386 q2->anslen = sizeof(q2->qbuf); 472 p->answer, p->anslen)) < 0) { 587 q->anslen 680 gethostans(struct irs_ho *this, const u_char *ansbuf, int anslen, const char *qname, int qtype, int af, int size, struct addrinfo **ret_aip, const struct addrinfo *pai) argument [all...] |
/netbsd-current/crypto/dist/ipsec-tools/src/racoon/ |
H A D | getcertsbyname.c | 209 int buflen, anslen, len; local 239 anslen = res_query(name, C_IN, T_CERT, answer, buflen); 240 if (anslen == -1) 243 } while (buflen < anslen); 246 printf("get a DNS packet len=%d\n", anslen); 250 eom = answer + anslen;
|
/netbsd-current/lib/libc/net/ |
H A D | getnetnamadr.c | 168 getnetanswer(res_state res, querybuf *answer, int anslen, int net_i) argument 197 eom = answer->buf + anslen; 314 int nn, anslen; local 355 anslen = res_nquery(res, qbuf, C_IN, T_PTR, buf->buf, 357 if (anslen < 0) { 366 np = getnetanswer(res, buf, anslen, BYADDR); 450 int anslen; local 467 anslen = res_nsearch(res, qbuf, C_IN, T_PTR, buf->buf, 469 if (anslen < 0) { 478 np = getnetanswer(res, buf, anslen, BYNAM [all...] |
H A D | getaddrinfo.c | 226 int anslen; /* size of answer buffer */ member in struct:res_target 1702 getanswer(res_state res, const querybuf *answer, int anslen, const char *qname, argument 1731 eom = answer->buf + anslen; 2057 q->anslen = sizeof(buf->buf); 2060 q2->anslen = sizeof(buf2->buf); 2568 int anslen; local 2581 anslen = t->anslen; 2592 n = res_nopt(statp, n, buf, (int)sizeof(buf), anslen); 2609 n = res_nsend(statp, buf, n, answer, anslen); [all...] |
H A D | gethnamaddr.c | 214 getanswer(const querybuf *answer, int anslen, const char *qname, int qtype, argument 238 eom = answer->buf + anslen;
|
/netbsd-current/external/ibm-public/postfix/dist/src/dns/ |
H A D | dns_lookup.c | 327 #define DNS_RES_NSEARCH(statp, dname, class, type, answer, anslen) \ 328 res_search((dname), (class), (type), (answer), (anslen)) 329 #define DNS_RES_NSEND(statp, msg, msglen, answer, anslen) \ 330 res_send((msg), (msglen), (answer), (anslen)) 373 unsigned char *answer, int anslen) 410 msg_buf, len, answer, anslen)) < 0) { 442 unsigned char *answer, int anslen, int keep_notfound) 463 memset(answer, 0, anslen); 464 len = DNS_RES_NSEARCH(&dns_res_state, name, class, type, answer, anslen); 470 name, class, type, answer, anslen, le 372 dns_neg_query(const char *name, int class, int type, unsigned char *answer, int anslen) argument 441 dns_neg_search(const char *name, int class, int type, unsigned char *answer, int anslen, int keep_notfound) argument [all...] |