summaryrefslogtreecommitdiffstats
path: root/libc/netbsd/resolv
Commit message (Collapse)AuthorAgeFilesLines
* Fix spurious DNS lookups in the C library.David 'Digit' Turner2010-03-082-3/+5
| | | | | | | | | | | | | | | | | | | | | | | The problem was that the 'defdname' field of res_state structure was not properly initialized in __res_vinit(). This field is used to store the default domain name, which is normally build from calling gethostname() (see line 549 of res_init.c). Unfortunately, in the typical Android case, gethostname() returns an error (the hostname is configured) and a random stack string is used later to build the DNS search list (see lines 556+ in res_init.c) For the sake of illustration, let's say the search list is set to a random value like 'xWLK'. The end result is that when trying to result an unknown domain name (e.g. 'www.ptn'), the query fails then the resolver tries to make a new query with the DNS search list path(s) appended (e.g. 'www.ptn.xWLK'). The patch simply initializes 'defdname' to an empty string to avoid this when the net.dns.search system property is not set. Also contains whitespace/formatting fixes
* am 3773d35e: Make the DNS resolver accept domain names with an underscore.David 'Digit' Turner2009-07-281-1/+8
|\ | | | | | | | | | | | | Merge commit '3773d35eb98e22b5edab4d82fb72bdf86ff80494' * commit '3773d35eb98e22b5edab4d82fb72bdf86ff80494': Make the DNS resolver accept domain names with an underscore.
| * Make the DNS resolver accept domain names with an underscore.David 'Digit' Turner2009-07-271-1/+8
| | | | | | | | | | | | | | More precisely, this accepts domain labels with an underscore in the middle (i.e. not at the start or the end of the label). This is needed to perform complex CNAME chain resolution in certain VPN networks.
* | Make IPv6 definitions comply with RFC 3493:Lorenzo Colitti2009-06-161-1/+0
|/ | | | | - Add some definitions to netinet/in6.h - Include netinet/in6.h from netinet/in.h
* Add the domain search list for VPN connection.Chung-yih Wang2009-04-131-0/+37
| | | | | | | | | | | | The current solution is to read the net.dns.search property, and expand the list during the resolve initialization. In the future, we could implement search list per process. Update: refine the code accordingly. Update: remove unnecessary code. Update: remove the unused variable.
* auto import from //depot/cupcake/@135843The Android Open Source Project2009-03-0317-0/+6794
|
* auto import from //depot/cupcake/@135843The Android Open Source Project2009-03-0317-6794/+0
|
* auto import from //branches/cupcake/...@132276The Android Open Source Project2009-02-193-276/+1227
|
* Initial Contributionandroid-1.0The Android Open Source Project2008-10-2117-0/+5843