Home
last modified time | relevance | path

Searched refs:rcode (Results 1 – 25 of 31) sorted by relevance

12

/external/toybox/toys/pending/
Dhost.c71 i, j, ret, sec, count, rcode, qlen, alen, pllen = 0, in host_main() local
138 rcode = abuf[3] & 15; in host_main()
142 rcode, rct[rcode], 256*abuf[6] + abuf[7]); in host_main()
146 if (rcode) error_exit("Host not found."); in host_main()
219 toys.exitval = rcode; in host_main()
/external/rust/crates/grpcio-sys/grpc/third_party/cares/cares/
Dares_query.c151 int rcode; in qcallback() local
158 rcode = DNS_HEADER_RCODE(abuf); in qcallback()
162 switch (rcode) in qcallback()
Dares_process.c573 int tc, rcode, packetsz; in process_answer() local
587 rcode = DNS_HEADER_RCODE(abuf); in process_answer()
618 if (rcode == NOTIMP || rcode == FORMERR || rcode == SERVFAIL) in process_answer()
659 if (rcode == SERVFAIL || rcode == NOTIMP || rcode == REFUSED) in process_answer()
Dadig.c400 int id, qr, opcode, aa, tc, rd, ra, rcode; in callback() local
432 rcode = DNS_HEADER_RCODE(abuf); in callback()
447 printf("rcode: %s\n", rcodes[rcode]); in callback()
/external/dnsmasq/src/
Dforward.c357 if (header->opcode != QUERY || (header->rcode != NOERROR && header->rcode != NXDOMAIN)) in process_reply()
361 if (!header->ra && header->rcode == NOERROR && ntohs(header->ancount) == 0 && server && in process_reply()
368 if (daemon->bogus_addr && header->rcode != NXDOMAIN && in process_reply()
371 header->rcode = NXDOMAIN; in process_reply()
374 if (header->rcode == NXDOMAIN && extract_request(header, n, daemon->namebuff, NULL) && in process_reply()
381 header->rcode = NOERROR; in process_reply()
440 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) && !(daemon->options & OPT_ORDER) && in reply_query()
464 if (header->rcode == SERVFAIL || header->rcode == REFUSED) in reply_query()
486 (header->rcode != REFUSED && header->rcode != SERVFAIL)) { in reply_query()
Dnameser.h295 unsigned rcode : 4; /* response code */ member
305 unsigned rcode : 4; /* response code */ member
Drfc1035.c540 int flags = header->rcode == NXDOMAIN ? F_NXDOMAIN : 0; in extract_addresses()
744 header->rcode = SERVFAIL; /* couldn't get memory */ in setup_reply()
746 header->rcode = NOERROR; /* empty domain */ in setup_reply()
748 header->rcode = NXDOMAIN; in setup_reply()
750 header->rcode = NOERROR; in setup_reply()
758 header->rcode = NOERROR; in setup_reply()
766 header->rcode = REFUSED; in setup_reply()
1354 header->rcode = NXDOMAIN; in answer_request()
1356 header->rcode = NOERROR; /* no error */ in answer_request()
/external/kernel-headers/original/uapi/linux/
Dfirewire-cdev.h119 __u32 rcode; member
356 __u32 rcode; member
534 __u32 rcode; member
/external/rust/crates/grpcio-sys/grpc/third_party/cares/cares/test/
Ddns-proto.h22 std::string RcodeToString(int rcode);
218 DNSPacket& set_rcode(ns_rcode rcode) { rcode_ = rcode; return *this; } in set_rcode()
Ddns-proto.cc64 std::string RcodeToString(int rcode) { in RcodeToString() argument
65 switch (rcode) { in RcodeToString()
/external/llvm-project/llvm/test/Transforms/Inline/
Ddevirtualize-3.ll29 define internal void @quit(%struct.cont_t* %cont, i32 %rcode) nounwind ssp {
31 call void @exit(i32 %rcode) noreturn
/external/llvm/test/Transforms/Inline/
Ddevirtualize-3.ll28 define internal void @quit(%struct.cont_t* %cont, i32 %rcode) nounwind ssp {
30 call void @exit(i32 %rcode) noreturn
/external/curl/lib/vquic/
Dquiche.c457 ssize_t rcode; in h3_stream_recv() local
510 rcode = quiche_h3_recv_body(qs->h3c, qs->conn, s, (unsigned char *)buf, in h3_stream_recv()
512 if(rcode <= 0) { in h3_stream_recv()
516 recvd += rcode; in h3_stream_recv()
/external/autotest/site_utils/
Dgs_offloader.py614 rcode = int(returncode)
615 if rcode < 0 or rcode > 255:
616 rcode = -1
617 metrics.Counter(m_gs_returncode).increment(fields={'return_code': rcode})
/external/mdnsresponder/mDNSShared/
Ddnsextd.c1748 mDNSu8 rcode; in AnswerQuestion() local
1788 rcode = (mDNSu8)(reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask); in AnswerQuestion()
1789 …if (rcode && rcode != kDNSFlag1_RC_NXDomain) { Log("AnswerQuestion: %##s type %d - non-zero rcode … in AnswerQuestion()
2385 …Authorized( DaemonInfo * d, PktMsg * pkt, DomainAuthInfo ** key, mDNSu16 * rcode, mDNSu16 * tcode ) in IsAuthorized() argument
2467 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized()
2487 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized()
2501 ok = DNSDigest_VerifyMessage( &pkt->msg, ( mDNSu8* ) lastPtr, &lcr, (*key), rcode, tcode ); in IsAuthorized()
2569 mDNSu16 rcode; in RecvUDPMessage() local
2602 else if ( IsAuthorized( context->d, &context->pkt, &key, &rcode, &tcode ) ) in RecvUDPMessage()
2712 mDNSu16 rcode; in RecvTCPMessage() local
[all …]
/external/autotest/client/cros/netprotos/
Dzeroconf_unittest.py129 rcode = dpkt.dns.DNS_RCODE_NOERR,
Dzeroconf.py222 rcode = dpkt.dns.DNS_RCODE_NOERR,
/external/curl/lib/
Ddoh.c613 unsigned char rcode; in doh_decode() local
627 rcode = doh[3] & 0x0f; in doh_decode()
628 if(rcode) in doh_decode()
/external/mdnsresponder/mDNSCore/
DDNSDigest.c1431 … *msg, mDNSu8 *end, LargeCacheRecord * lcr, DomainAuthInfo *info, mDNSu16 * rcode, mDNSu16 * tcode) in DNSDigest_VerifyMessage() argument
1454 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage()
1468 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage()
1494 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage()
1562 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage()
DuDNS.c802 mDNSlocal void recvSetupResponse(mDNS *const m, mDNSu8 rcode, DNSQuestion *const q, const LLQOptDat… in recvSetupResponse() argument
804 if (rcode && rcode != kDNSFlag1_RC_NXDomain) in recvSetupResponse()
2479 …teResult(mDNS *const m, const domainname *const displayname, const mDNSu8 rcode, const DNSMessage … in checkUpdateResult() argument
2482 if (!rcode) return mStatus_NoError; in checkUpdateResult()
2483 else if (rcode == kDNSFlag1_RC_YXDomain) in checkUpdateResult()
2488 else if (rcode == kDNSFlag1_RC_Refused) in checkUpdateResult()
2493 else if (rcode == kDNSFlag1_RC_NXRRSet) in checkUpdateResult()
2498 else if (rcode == kDNSFlag1_RC_NotAuth) in checkUpdateResult()
2509 else if (rcode == kDNSFlag1_RC_FormErr) in checkUpdateResult()
2521 LogMsg("Update %##s failed with rcode %d", displayname->c, rcode); in checkUpdateResult()
[all …]
/external/tcpdump/
Dprint-smb.c1104 int name_trn_id, response, opcode, nm_flags, rcode; in nbt_udp137_print() local
1114 rcode = data[3] & 0xF; in nbt_udp137_print()
1129 ND_PRINT((ndo, "; %s", rcode ? "NEGATIVE" : "POSITIVE")); in nbt_udp137_print()
1138 name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount, in nbt_udp137_print()
/external/wpa_supplicant_8/src/rsn_supp/
Dtdls.c534 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument
546 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + in wpa_tdls_key_mic_teardown()
560 WPA_PUT_LE16(pos, rcode); in wpa_tdls_key_mic_teardown()
561 pos += sizeof(rcode); in wpa_tdls_key_mic_teardown()
611 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, in wpa_supplicant_verify_tdls_mic_teardown() argument
617 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown()
/external/scapy/scapy/layers/
Ddns.py769 return r.getlayer(DNS).rcode
791 return r.getlayer(DNS).rcode
/external/deqp-deps/SPIRV-Tools/source/val/
Dvalidate_cfg.cpp346 if (spv_result_t rcode = ASSERT_FUNC(_, TARGET)) return rcode
/external/angle/third_party/vulkan-deps/spirv-tools/src/source/val/
Dvalidate_cfg.cpp346 if (spv_result_t rcode = ASSERT_FUNC(_, TARGET)) return rcode

12