/bionic/libc/netbsd/resolv/ |
res_query.c | 131 int anslen) /* size of answer buffer */ 153 n = res_nopt(statp, n, buf, sizeof(buf), anslen); 163 n = res_nsend(statp, buf, n, answer, anslen); 225 int anslen) /* size of answer */ 248 return (res_nquery(statp, cp, class, type, answer, anslen)); 258 answer, anslen); 286 answer, anslen); 342 answer, anslen); 373 int anslen) /* size of answer */ 409 return (res_nquery(statp, longname, class, type, answer, anslen)); [all...] |
res_data.c | 203 int anslen) /* size of answer buffer */ 209 return (res_nquery(&_nres, name, class, type, answer, anslen)); 272 int anslen) /* size of answer */ 279 return (res_nsearch(&_nres, name, class, type, answer, anslen)); 287 int anslen) /* size of answer */ 296 answer, anslen));
|
res_mkquery.c | 235 int anslen) /* UDP answer buffer size */ 257 ns_put16(anslen & 0xffff, cp); /* CLASS = UDP payload size */
|
res_send.c | 394 int anslen = 0; local 397 ans, anssiz, &anslen); 400 return anslen; [all...] |
/external/ipsec-tools/src/racoon/ |
getcertsbyname.c | 209 int buflen, anslen, len; local 239 anslen = res_query(name, C_IN, T_CERT, answer, buflen); 240 if (anslen == -1) 243 } while (buflen < anslen); 246 printf("get a DNS packet len=%d\n", anslen); 250 eom = answer + anslen;
|
/bionic/libc/netbsd/net/ |
getaddrinfo.c | 212 int anslen; /* size of answer buffer */ member in struct:res_target 2177 int anslen; local [all...] |
/bionic/libc/netbsd/ |
gethnamaddr.c | 177 getanswer(const querybuf *answer, int anslen, const char *qname, int qtype, 198 eom = answer->buf + anslen; [all...] |