dnsapi: Portability fixes.
diff --git a/dlls/dnsapi/query.c b/dlls/dnsapi/query.c
index 9bdd706..185a21f 100644
--- a/dlls/dnsapi/query.c
+++ b/dlls/dnsapi/query.c
@@ -125,17 +125,17 @@
 {
     switch (error)
     {
-    case NOERROR:  return ERROR_SUCCESS;
-    case FORMERR:  return DNS_ERROR_RCODE_FORMAT_ERROR;
-    case SERVFAIL: return DNS_ERROR_RCODE_SERVER_FAILURE;
-    case NXDOMAIN: return DNS_ERROR_RCODE_NAME_ERROR;
-    case NOTIMP:   return DNS_ERROR_RCODE_NOT_IMPLEMENTED;
-    case REFUSED:  return DNS_ERROR_RCODE_REFUSED;
-    case YXDOMAIN: return DNS_ERROR_RCODE_YXDOMAIN;
-    case YXRRSET:  return DNS_ERROR_RCODE_YXRRSET;
-    case NXRRSET:  return DNS_ERROR_RCODE_NXRRSET;
-    case NOTAUTH:  return DNS_ERROR_RCODE_NOTAUTH;
-    case NOTZONE:  return DNS_ERROR_RCODE_NOTZONE;
+    case ns_r_noerror:  return ERROR_SUCCESS;
+    case ns_r_formerr:  return DNS_ERROR_RCODE_FORMAT_ERROR;
+    case ns_r_servfail: return DNS_ERROR_RCODE_SERVER_FAILURE;
+    case ns_r_nxdomain: return DNS_ERROR_RCODE_NAME_ERROR;
+    case ns_r_notimpl:  return DNS_ERROR_RCODE_NOT_IMPLEMENTED;
+    case ns_r_refused:  return DNS_ERROR_RCODE_REFUSED;
+    case ns_r_yxdomain: return DNS_ERROR_RCODE_YXDOMAIN;
+    case ns_r_yxrrset:  return DNS_ERROR_RCODE_YXRRSET;
+    case ns_r_nxrrset:  return DNS_ERROR_RCODE_NXRRSET;
+    case ns_r_notauth:  return DNS_ERROR_RCODE_NOTAUTH;
+    case ns_r_notzone:  return DNS_ERROR_RCODE_NOTZONE;
     default:
         FIXME( "unmapped error code: %d\n", error );
         return DNS_ERROR_RCODE_NOT_IMPLEMENTED;
@@ -193,23 +193,23 @@
 
     switch (rr->type)
     {
-    case T_KEY:
+    case ns_t_key:
     {
         pos += sizeof(WORD) + sizeof(BYTE) + sizeof(BYTE);
         size += rr->rdata + rr->rdlength - pos - 1;
         break;
     }
-    case T_SIG:
+    case ns_t_sig:
     {
         pos += sizeof(PCHAR) + sizeof(WORD) + 2 * sizeof(BYTE);
         pos += 3 * sizeof(DWORD) + 2 * sizeof(WORD);
         size += rr->rdata + rr->rdlength - pos - 1;
         break;
     }
-    case T_HINFO:
-    case T_ISDN:
-    case T_TXT:
-    case T_X25:
+    case ns_t_hinfo:
+    case ns_t_isdn:
+    case ns_t_txt:
+    case ns_t_x25:
     {
         while (pos[0] && pos < rr->rdata + rr->rdlength)
         {
@@ -219,13 +219,13 @@
         size += (num - 1) * sizeof(PCHAR);
         break;
     }
-    case T_NULL:
+    case ns_t_null:
     {
         size += rr->rdlength - 1;
         break;
     }
-    case T_NXT:
-    case T_WKS:
+    case ns_t_nxt:
+    case ns_t_wks:
     case 0xff01:  /* WINS */
     {
         FIXME( "unhandled type: %s\n", dns_type_to_str( rr->type ) );
@@ -245,13 +245,13 @@
 
     switch (rr->type)
     {
-    case T_A:
+    case ns_t_a:
     {
         r->Data.A.IpAddress = *(DWORD *)pos;
         *dlen = sizeof(DNS_A_DATA);
         break; 
     }
-    case T_AAAA:
+    case ns_t_aaaa:
     {
         for (i = 0; i < sizeof(IP6_ADDRESS)/sizeof(DWORD); i++)
         {
@@ -262,7 +262,7 @@
         *dlen = sizeof(DNS_AAAA_DATA);
         break;
     }
-    case T_KEY:
+    case ns_t_key:
     {
         /* FIXME: byte order? */
         r->Data.KEY.wFlags      = *(WORD *)pos;   pos += sizeof(WORD);
@@ -277,8 +277,8 @@
         *dlen = sizeof(DNS_KEY_DATA) + (size - 1) * sizeof(BYTE);
         break;
     }
-    case T_RP:
-    case T_MINFO:
+    case ns_t_rp:
+    case ns_t_minfo:
     {
         r->Data.MINFO.pNameMailbox = dns_dname_from_msg( msg, pos );
         if (!r->Data.MINFO.pNameMailbox) return ERROR_NOT_ENOUGH_MEMORY;
@@ -296,9 +296,9 @@
         *dlen = sizeof(DNS_MINFO_DATAA);
         break; 
     }
-    case T_AFSDB:
-    case T_RT:
-    case T_MX:
+    case ns_t_afsdb:
+    case ns_t_rt:
+    case ns_t_mx:
     {
         r->Data.MX.wPreference = ntohs( *(WORD *)pos );
         r->Data.MX.pNameExchange = dns_dname_from_msg( msg, pos + sizeof(WORD) );
@@ -307,7 +307,7 @@
         *dlen = sizeof(DNS_MX_DATAA);
         break; 
     }
-    case T_NULL:
+    case ns_t_null:
     {
         r->Data.Null.dwByteCount = rr->rdlength;
         memcpy( r->Data.Null.Data, rr->rdata, rr->rdlength );
@@ -315,14 +315,14 @@
         *dlen = sizeof(DNS_NULL_DATA) + rr->rdlength - 1;
         break;
     }
-    case T_CNAME:
-    case T_NS:
-    case T_MB:
-    case T_MD:
-    case T_MF:
-    case T_MG:
-    case T_MR:
-    case T_PTR:
+    case ns_t_cname:
+    case ns_t_ns:
+    case ns_t_mb:
+    case ns_t_md:
+    case ns_t_mf:
+    case ns_t_mg:
+    case ns_t_mr:
+    case ns_t_ptr:
     {
         r->Data.PTR.pNameHost = dns_dname_from_msg( msg, pos );
         if (!r->Data.PTR.pNameHost) return ERROR_NOT_ENOUGH_MEMORY;
@@ -330,7 +330,7 @@
         *dlen = sizeof(DNS_PTR_DATAA);
         break;
     }
-    case T_SIG:
+    case ns_t_sig:
     {
         r->Data.SIG.pNameSigner = dns_dname_from_msg( msg, pos );
         if (!r->Data.SIG.pNameSigner) return ERROR_NOT_ENOUGH_MEMORY;
@@ -355,7 +355,7 @@
         *dlen = sizeof(DNS_SIG_DATAA) + (size - 1) * sizeof(BYTE);
         break; 
     }
-    case T_SOA:
+    case ns_t_soa:
     {
         r->Data.SOA.pNamePrimaryServer = dns_dname_from_msg( msg, pos );
         if (!r->Data.SOA.pNamePrimaryServer) return ERROR_NOT_ENOUGH_MEMORY;
@@ -382,7 +382,7 @@
         *dlen = sizeof(DNS_SOA_DATAA);
         break; 
     }
-    case T_SRV:
+    case ns_t_srv:
     {
         r->Data.SRV.wPriority = ntohs( *(WORD *)pos ); pos += sizeof(WORD);
         r->Data.SRV.wWeight   = ntohs( *(WORD *)pos ); pos += sizeof(WORD);
@@ -394,10 +394,10 @@
         *dlen = sizeof(DNS_SRV_DATAA);
         break; 
     }
-    case T_HINFO:
-    case T_ISDN:
-    case T_X25:
-    case T_TXT:
+    case ns_t_hinfo:
+    case ns_t_isdn:
+    case ns_t_x25:
+    case ns_t_txt:
     {
         i = 0;
         while (pos[0] && pos < rr->rdata + rr->rdlength)
@@ -416,11 +416,11 @@
         *dlen = sizeof(DNS_TXT_DATAA) + (i - 1) * sizeof(PCHAR);
         break;
     }
-    case T_ATMA:
-    case T_LOC:
-    case T_NXT:
-    case T_TSIG:
-    case T_WKS:
+    case ns_t_atma:
+    case ns_t_loc:
+    case ns_t_nxt:
+    case ns_t_tsig:
+    case ns_t_wks:
     case 0x00f9:  /* TKEY */
     case 0xff01:  /* WINS */
     case 0xff02:  /* WINSR */
@@ -528,7 +528,7 @@
 
     DNS_RRSET_INIT( rrset );
 
-    len = __res_query( name, C_IN, type, answer, sizeof(answer) );
+    len = res_query( name, ns_c_in, type, answer, sizeof(answer) );
     if (len < 0)
     {
         ret = dns_map_h_errno( h_errno );