/external/dnsmasq/src/ |
tftp.c | 230 strcpy(daemon->namebuff, "/"); 234 daemon->namebuff[0] = 0; 235 strncat(daemon->namebuff, daemon->tftp_prefix, (MAXDNAME-1) - strlen(daemon->namebuff)); 237 strncat(daemon->namebuff, "/", (MAXDNAME-1) - strlen(daemon->namebuff)); 241 size_t oldlen = strlen(daemon->namebuff); 244 strncat(daemon->namebuff, inet_ntoa(peer.sin_addr), (MAXDNAME-1) - strlen(daemon->namebuff)); 245 strncat(daemon->namebuff, "/", (MAXDNAME-1) - strlen(daemon->namebuff)) 290 char *packet = daemon->packet, *namebuff = daemon->namebuff; local [all...] |
forward.c | 211 unsigned int crc = questions_crc(header, plen, daemon->namebuff); 213 unsigned short gotname = extract_request(header, plen, daemon->namebuff, NULL); 237 flags = search_servers(now, &addrp, gotname, daemon->namebuff, &type, &domain); 337 strcpy(daemon->namebuff, "query"); 339 log_query(F_SERVER | F_IPV4 | F_FORWARD, daemon->namebuff, 343 log_query(F_SERVER | F_IPV6 | F_FORWARD, daemon->namebuff, 408 prettyprint_addr(&server->addr, daemon->namebuff); 409 my_syslog(LOG_WARNING, _("nameserver %s refused to do a recursive query"), daemon->namebuff); 415 check_for_bogus_wildcard(header, n, daemon->namebuff, daemon->bogus_addr, now)) 424 extract_request(header, n, daemon->namebuff, NULL) & [all...] |
network.c | 449 prettyprint_addr(&iface->addr, daemon->namebuff); 451 daemon->namebuff, EC_BADNET); 655 prettyprint_addr(&srv->addr, daemon->namebuff); 658 strcat(daemon->namebuff, " "); 659 strcat(daemon->namebuff, srv->interface); 662 daemon->namebuff, EC_BADNET); 679 port = prettyprint_addr(&new->addr, daemon->namebuff); 694 my_syslog(LOG_WARNING, _("ignoring nameserver %s - local interface"), daemon->namebuff); 706 daemon->namebuff, strerror(errno)); 729 my_syslog(LOG_INFO, _("using nameserver %s#%d for %s %s"), daemon->namebuff, port, s1, s2) [all...] |
rfc2131.c | 350 strcpy(daemon->namebuff, inet_ntoa(context_tmp->start)); 353 ntohl(mess->xid), daemon->namebuff, inet_ntoa(context_tmp->netmask)); 356 ntohl(mess->xid), daemon->namebuff, inet_ntoa(context_tmp->end)); 695 if (sanitise(option_find(mess, sz, OPTION_VENDOR_ID, 1), daemon->namebuff)) 696 my_syslog(MS_DHCP | LOG_INFO, _("%u Vendor class: %s"), ntohl(mess->xid), daemon->namebuff); 697 if (sanitise(option_find(mess, sz, OPTION_USER_CLASS, 1), daemon->namebuff)) 698 my_syslog(MS_DHCP | LOG_INFO, _("%u User class: %s"), ntohl(mess->xid), daemon->namebuff); 907 addrs, print_mac(daemon->namebuff, mac, len)); [all...] |
cache.c | 756 char *token = daemon->namebuff, *domain_suffix = NULL; 1050 strcpy(daemon->namebuff, inet_ntoa(crec->addr.addr.addr.addr4)); 1055 record_source(crec->uid), daemon->namebuff); 1167 char *a, *p = daemon->namebuff; 1208 my_syslog(LOG_DEBUG, daemon->namebuff); [all...] |
lease.c | 76 &ei, daemon->dhcp_buff2, daemon->namebuff, 84 addr.s_addr = inet_addr(daemon->namebuff);
|
dbus.c | 398 char *action_str, *addr, *mac = daemon->namebuff;
|
helper.c | 114 unsigned char *buf = (unsigned char *)daemon->namebuff;
|
dnsmasq.c | 187 prettyprint_addr(&if_tmp->addr, daemon->namebuff); 188 die(_("no interface with address %s"), daemon->namebuff, EC_BADNET); [all...] |
dnsmasq.h | 649 char *namebuff; /* MAXDNAME size buffer */ member in struct:daemon 716 int extract_addresses(HEADER *header, size_t qlen, char *namebuff, time_t now);
|
dhcp.c | 722 char *buff = daemon->namebuff;
|
option.c | [all...] |
rfc1035.c | 1131 char *name = daemon->namebuff; [all...] |