⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 lwres_buffer.3

📁 bind 源码 最新实现 linux/unix/windows平台
💻 3
字号:
.\" Copyright (C) 2004, 2005 Internet Systems Consortium, Inc. ("ISC").\" Copyright (C) 2000, 2001 Internet Software Consortium..\" .\" Permission to use, copy, modify, and distribute this software for any.\" purpose with or without fee is hereby granted, provided that the above.\" copyright notice and this permission notice appear in all copies..\" .\" THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH.\" REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY.\" AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,.\" INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM.\" LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE.\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR.\" PERFORMANCE OF THIS SOFTWARE..\".\" $Id: lwres_buffer.3,v 1.12.2.1.8.5 2005/10/13 02:33:58 marka Exp $.\".hy 0.ad l.\" ** You probably do not want to edit this file directly **.\" It was generated using the DocBook XSL Stylesheets (version 1.69.1)..\" Instead of manually editing it, you probably should edit the DocBook XML.\" source for it and then use the DocBook XSL Stylesheets to regenerate it..TH "LWRES_BUFFER" "3" "Jun 30, 2000" "BIND9" "BIND9".\" disable hyphenation.nh.\" disable justification (adjust text to left margin only).ad l.SH "NAME"lwres_buffer_init, lwres_buffer_invalidate, lwres_buffer_add, lwres_buffer_subtract, lwres_buffer_clear, lwres_buffer_first, lwres_buffer_forward, lwres_buffer_back, lwres_buffer_getuint8, lwres_buffer_putuint8, lwres_buffer_getuint16, lwres_buffer_putuint16, lwres_buffer_getuint32, lwres_buffer_putuint32, lwres_buffer_putmem, lwres_buffer_getmem \- lightweight resolver buffer management.SH "SYNOPSIS".nf#include <lwres/lwbuffer.h>.fi.HP 23\fBvoid\ \fBlwres_buffer_init\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB, \fR\fBvoid\ *base\fR\fB, \fR\fBunsigned\ int\ length\fR\fB);\fR.HP 29\fBvoid\ \fBlwres_buffer_invalidate\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB);\fR.HP 22\fBvoid\ \fBlwres_buffer_add\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB, \fR\fBunsigned\ int\ n\fR\fB);\fR.HP 27\fBvoid\ \fBlwres_buffer_subtract\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB, \fR\fBunsigned\ int\ n\fR\fB);\fR.HP 24\fBvoid\ \fBlwres_buffer_clear\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB);\fR.HP 24\fBvoid\ \fBlwres_buffer_first\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB);\fR.HP 26\fBvoid\ \fBlwres_buffer_forward\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB, \fR\fBunsigned\ int\ n\fR\fB);\fR.HP 23\fBvoid\ \fBlwres_buffer_back\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB, \fR\fBunsigned\ int\ n\fR\fB);\fR.HP 36\fBlwres_uint8_t\ \fBlwres_buffer_getuint8\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB);\fR.HP 27\fBvoid\ \fBlwres_buffer_putuint8\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB, \fR\fBlwres_uint8_t\ val\fR\fB);\fR.HP 38\fBlwres_uint16_t\ \fBlwres_buffer_getuint16\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB);\fR.HP 28\fBvoid\ \fBlwres_buffer_putuint16\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB, \fR\fBlwres_uint16_t\ val\fR\fB);\fR.HP 38\fBlwres_uint32_t\ \fBlwres_buffer_getuint32\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB);\fR.HP 28\fBvoid\ \fBlwres_buffer_putuint32\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB, \fR\fBlwres_uint32_t\ val\fR\fB);\fR.HP 25\fBvoid\ \fBlwres_buffer_putmem\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB, \fR\fBconst\ unsigned\ char\ *base\fR\fB, \fR\fBunsigned\ int\ length\fR\fB);\fR.HP 25\fBvoid\ \fBlwres_buffer_getmem\fR\fR\fB(\fR\fBlwres_buffer_t\ *b\fR\fB, \fR\fBunsigned\ char\ *base\fR\fB, \fR\fBunsigned\ int\ length\fR\fB);\fR.SH "DESCRIPTION".PPThese functions provide bounds checked access to a region of memory where data is being read or written. They are based on, and similar to, theisc_buffer_functions in the ISC library..PPA buffer is a region of memory, together with a set of related subregions. The\fIused region\fRand the\fIavailable\fRregion are disjoint, and their union is the buffer's region. The used region extends from the beginning of the buffer region to the last used byte. The available region extends from one byte greater than the last used byte to the end of the buffer's region. The size of the used region can be changed using various buffer commands. Initially, the used region is empty..PPThe used region is further subdivided into two disjoint regions: the\fIconsumed region\fRand the\fIremaining region\fR. The union of these two regions is the used region. The consumed region extends from the beginning of the used region to the byte before the\fIcurrent\fRoffset (if any). The\fIremaining\fRregion the current pointer to the end of the used region. The size of the consumed region can be changed using various buffer commands. Initially, the consumed region is empty..PPThe\fIactive region\fRis an (optional) subregion of the remaining region. It extends from the current offset to an offset in the remaining region. Initially, the active region is empty. If the current offset advances beyond the chosen offset, the active region will also be empty..PP.nf   /\-\-\-\-\-\-\-\-\-\-\-\-entire length\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\\\\   /\-\-\-\-\- used region \-\-\-\-\-\\\\/\-\- available \-\-\\\\   +\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-+   | consumed  | remaining |                |   +\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-\-+   a           b     c     d                e  a == base of buffer.  b == current pointer.  Can be anywhere between a and d.  c == active pointer.  Meaningful between b and d.  d == used pointer.  e == length of buffer.  a\-e == entire length of buffer.  a\-d == used region.  a\-b == consumed region.  b\-d == remaining region.  b\-c == optional active region..fi.sp.PP\fBlwres_buffer_init()\fRinitializes the\fBlwres_buffer_t\fR\fI*b\fRand assocates it with the memory region of size\fIlength\fRbytes starting at location\fIbase.\fR.PP\fBlwres_buffer_invalidate()\fRmarks the buffer\fI*b\fRas invalid. Invalidating a buffer after use is not required, but makes it possible to catch its possible accidental use..PPThe functions\fBlwres_buffer_add()\fRand\fBlwres_buffer_subtract()\fRrespectively increase and decrease the used space in buffer\fI*b\fRby\fIn\fRbytes.\fBlwres_buffer_add()\fRchecks for buffer overflow and\fBlwres_buffer_subtract()\fRchecks for underflow. These functions do not allocate or deallocate memory. They just change the value ofused..PPA buffer is re\-initialised by\fBlwres_buffer_clear()\fR. The function setsused,currentandactiveto zero..PP\fBlwres_buffer_first\fRmakes the consumed region of buffer\fI*p\fRempty by settingcurrentto zero (the start of the buffer)..PP\fBlwres_buffer_forward()\fRincreases the consumed region of buffer\fI*b\fRby\fIn\fRbytes, checking for overflow. Similarly,\fBlwres_buffer_back()\fRdecreases buffer\fIb\fR's consumed region by\fIn\fRbytes and checks for underflow..PP\fBlwres_buffer_getuint8()\fRreads an unsigned 8\-bit integer from\fI*b\fRand returns it.\fBlwres_buffer_putuint8()\fRwrites the unsigned 8\-bit integer\fIval\fRto buffer\fI*b\fR..PP\fBlwres_buffer_getuint16()\fRand\fBlwres_buffer_getuint32()\fRare identical to\fBlwres_buffer_putuint8()\fRexcept that they respectively read an unsigned 16\-bit or 32\-bit integer in network byte order from\fIb\fR. Similarly,\fBlwres_buffer_putuint16()\fRand\fBlwres_buffer_putuint32()\fRwrites the unsigned 16\-bit or 32\-bit integer\fIval\fRto buffer\fIb\fR, in network byte order..PPArbitrary amounts of data are read or written from a lightweight resolver buffer with\fBlwres_buffer_getmem()\fRand\fBlwres_buffer_putmem()\fRrespectively.\fBlwres_buffer_putmem()\fRcopies\fIlength\fRbytes of memory at\fIbase\fRto\fIb\fR. Conversely,\fBlwres_buffer_getmem()\fRcopies\fIlength\fRbytes of memory from\fIb\fRto\fIbase\fR.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -