Lines Matching refs:len
75 int len, qdcount, ancount;
85 len = res_nsearch(state, svc_name, C_IN, T_SRV,
87 if (len < 0) {
96 if (len > sizeof (msg.buf)) {
99 len, sizeof (msg.buf));
100 len = sizeof (msg.buf);
106 eom = msg.buf + len;
112 len = ns_skiprr(ptr, eom, ns_s_qd, qdcount);
113 if (len < 0) {
117 ptr += len;
125 len = dn_expand(msg.buf, eom, ptr, namebuf, sizeof (namebuf));
126 if (len < 0) {
175 int len, scnt, maxcnt;
192 len = res_nsearch(state, svc_name, C_IN, T_SRV,
194 if (len < 0) {
208 len = res_nquerydomain(state, svc_name, dname, C_IN, T_SRV,
211 if (len < 0) {
221 if (len > NS_MAXMSG) {
224 len, NS_MAXMSG);
225 len = NS_MAXMSG;
231 cds_res = srv_parse(msg, len, &scnt, &maxcnt);
254 srv_parse(uchar_t *msg, int len, int *scnt, int *maxcnt)
269 eom = msg + len;
280 len = ns_skiprr(ptr, eom, ns_s_qd, qdcount);
281 if (len < 0) {
285 ptr += len;
303 len = dn_expand(msg, eom, ptr, namebuf,
305 if (len < 0) {
309 ptr += len;
327 len = dn_expand(msg, eom, ptr, cds->cds_ds.host,
329 if (len < 0) {
352 len = ns_skiprr(ptr, eom, ns_s_ns, nscount);
353 if (len < 0) {
357 ptr += len;
363 len = dn_expand(msg, eom, ptr, namebuf,
365 if (len < 0) {
369 ptr += len;
470 logger(LOG_ERR, "bad IPv4 addr len");
482 logger(LOG_ERR, "bad IPv6 addr len");