/external/toybox/toys/pending/ |
D | host.c | 71 i, j, ret, sec, count, rcode, qlen, alen, pllen = 0, in host_main() local 138 rcode = abuf[3] & 15; in host_main() 142 rcode, rct[rcode], 256*abuf[6] + abuf[7]); in host_main() 146 if (rcode) error_exit("Host not found."); in host_main() 219 toys.exitval = rcode; in host_main()
|
/external/rust/crates/grpcio-sys/grpc/third_party/cares/cares/ |
D | ares_query.c | 151 int rcode; in qcallback() local 158 rcode = DNS_HEADER_RCODE(abuf); in qcallback() 162 switch (rcode) in qcallback()
|
D | ares_process.c | 573 int tc, rcode, packetsz; in process_answer() local 587 rcode = DNS_HEADER_RCODE(abuf); in process_answer() 618 if (rcode == NOTIMP || rcode == FORMERR || rcode == SERVFAIL) in process_answer() 659 if (rcode == SERVFAIL || rcode == NOTIMP || rcode == REFUSED) in process_answer()
|
D | adig.c | 400 int id, qr, opcode, aa, tc, rd, ra, rcode; in callback() local 432 rcode = DNS_HEADER_RCODE(abuf); in callback() 447 printf("rcode: %s\n", rcodes[rcode]); in callback()
|
/external/dnsmasq/src/ |
D | forward.c | 357 if (header->opcode != QUERY || (header->rcode != NOERROR && header->rcode != NXDOMAIN)) in process_reply() 361 if (!header->ra && header->rcode == NOERROR && ntohs(header->ancount) == 0 && server && in process_reply() 368 if (daemon->bogus_addr && header->rcode != NXDOMAIN && in process_reply() 371 header->rcode = NXDOMAIN; in process_reply() 374 if (header->rcode == NXDOMAIN && extract_request(header, n, daemon->namebuff, NULL) && in process_reply() 381 header->rcode = NOERROR; in process_reply() 440 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) && !(daemon->options & OPT_ORDER) && in reply_query() 464 if (header->rcode == SERVFAIL || header->rcode == REFUSED) in reply_query() 486 (header->rcode != REFUSED && header->rcode != SERVFAIL)) { in reply_query()
|
D | nameser.h | 295 unsigned rcode : 4; /* response code */ member 305 unsigned rcode : 4; /* response code */ member
|
D | rfc1035.c | 540 int flags = header->rcode == NXDOMAIN ? F_NXDOMAIN : 0; in extract_addresses() 744 header->rcode = SERVFAIL; /* couldn't get memory */ in setup_reply() 746 header->rcode = NOERROR; /* empty domain */ in setup_reply() 748 header->rcode = NXDOMAIN; in setup_reply() 750 header->rcode = NOERROR; in setup_reply() 758 header->rcode = NOERROR; in setup_reply() 766 header->rcode = REFUSED; in setup_reply() 1354 header->rcode = NXDOMAIN; in answer_request() 1356 header->rcode = NOERROR; /* no error */ in answer_request()
|
/external/kernel-headers/original/uapi/linux/ |
D | firewire-cdev.h | 119 __u32 rcode; member 356 __u32 rcode; member 534 __u32 rcode; member
|
/external/rust/crates/grpcio-sys/grpc/third_party/cares/cares/test/ |
D | dns-proto.h | 22 std::string RcodeToString(int rcode); 218 DNSPacket& set_rcode(ns_rcode rcode) { rcode_ = rcode; return *this; } in set_rcode()
|
D | dns-proto.cc | 64 std::string RcodeToString(int rcode) { in RcodeToString() argument 65 switch (rcode) { in RcodeToString()
|
/external/llvm-project/llvm/test/Transforms/Inline/ |
D | devirtualize-3.ll | 29 define internal void @quit(%struct.cont_t* %cont, i32 %rcode) nounwind ssp { 31 call void @exit(i32 %rcode) noreturn
|
/external/llvm/test/Transforms/Inline/ |
D | devirtualize-3.ll | 28 define internal void @quit(%struct.cont_t* %cont, i32 %rcode) nounwind ssp { 30 call void @exit(i32 %rcode) noreturn
|
/external/curl/lib/vquic/ |
D | quiche.c | 457 ssize_t rcode; in h3_stream_recv() local 510 rcode = quiche_h3_recv_body(qs->h3c, qs->conn, s, (unsigned char *)buf, in h3_stream_recv() 512 if(rcode <= 0) { in h3_stream_recv() 516 recvd += rcode; in h3_stream_recv()
|
/external/autotest/site_utils/ |
D | gs_offloader.py | 614 rcode = int(returncode) 615 if rcode < 0 or rcode > 255: 616 rcode = -1 617 metrics.Counter(m_gs_returncode).increment(fields={'return_code': rcode})
|
/external/mdnsresponder/mDNSShared/ |
D | dnsextd.c | 1748 mDNSu8 rcode; in AnswerQuestion() local 1788 rcode = (mDNSu8)(reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask); in AnswerQuestion() 1789 …if (rcode && rcode != kDNSFlag1_RC_NXDomain) { Log("AnswerQuestion: %##s type %d - non-zero rcode … in AnswerQuestion() 2385 …Authorized( DaemonInfo * d, PktMsg * pkt, DomainAuthInfo ** key, mDNSu16 * rcode, mDNSu16 * tcode ) in IsAuthorized() argument 2467 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized() 2487 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized() 2501 ok = DNSDigest_VerifyMessage( &pkt->msg, ( mDNSu8* ) lastPtr, &lcr, (*key), rcode, tcode ); in IsAuthorized() 2569 mDNSu16 rcode; in RecvUDPMessage() local 2602 else if ( IsAuthorized( context->d, &context->pkt, &key, &rcode, &tcode ) ) in RecvUDPMessage() 2712 mDNSu16 rcode; in RecvTCPMessage() local [all …]
|
/external/autotest/client/cros/netprotos/ |
D | zeroconf_unittest.py | 129 rcode = dpkt.dns.DNS_RCODE_NOERR,
|
D | zeroconf.py | 222 rcode = dpkt.dns.DNS_RCODE_NOERR,
|
/external/curl/lib/ |
D | doh.c | 613 unsigned char rcode; in doh_decode() local 627 rcode = doh[3] & 0x0f; in doh_decode() 628 if(rcode) in doh_decode()
|
/external/mdnsresponder/mDNSCore/ |
D | DNSDigest.c | 1431 … *msg, mDNSu8 *end, LargeCacheRecord * lcr, DomainAuthInfo *info, mDNSu16 * rcode, mDNSu16 * tcode) in DNSDigest_VerifyMessage() argument 1454 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1468 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1494 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1562 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage()
|
D | uDNS.c | 802 mDNSlocal void recvSetupResponse(mDNS *const m, mDNSu8 rcode, DNSQuestion *const q, const LLQOptDat… in recvSetupResponse() argument 804 if (rcode && rcode != kDNSFlag1_RC_NXDomain) in recvSetupResponse() 2479 …teResult(mDNS *const m, const domainname *const displayname, const mDNSu8 rcode, const DNSMessage … in checkUpdateResult() argument 2482 if (!rcode) return mStatus_NoError; in checkUpdateResult() 2483 else if (rcode == kDNSFlag1_RC_YXDomain) in checkUpdateResult() 2488 else if (rcode == kDNSFlag1_RC_Refused) in checkUpdateResult() 2493 else if (rcode == kDNSFlag1_RC_NXRRSet) in checkUpdateResult() 2498 else if (rcode == kDNSFlag1_RC_NotAuth) in checkUpdateResult() 2509 else if (rcode == kDNSFlag1_RC_FormErr) in checkUpdateResult() 2521 LogMsg("Update %##s failed with rcode %d", displayname->c, rcode); in checkUpdateResult() [all …]
|
/external/tcpdump/ |
D | print-smb.c | 1104 int name_trn_id, response, opcode, nm_flags, rcode; in nbt_udp137_print() local 1114 rcode = data[3] & 0xF; in nbt_udp137_print() 1129 ND_PRINT((ndo, "; %s", rcode ? "NEGATIVE" : "POSITIVE")); in nbt_udp137_print() 1138 name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount, in nbt_udp137_print()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 534 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument 546 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + in wpa_tdls_key_mic_teardown() 560 WPA_PUT_LE16(pos, rcode); in wpa_tdls_key_mic_teardown() 561 pos += sizeof(rcode); in wpa_tdls_key_mic_teardown() 611 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, in wpa_supplicant_verify_tdls_mic_teardown() argument 617 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown()
|
/external/scapy/scapy/layers/ |
D | dns.py | 769 return r.getlayer(DNS).rcode 791 return r.getlayer(DNS).rcode
|
/external/deqp-deps/SPIRV-Tools/source/val/ |
D | validate_cfg.cpp | 346 if (spv_result_t rcode = ASSERT_FUNC(_, TARGET)) return rcode
|
/external/angle/third_party/vulkan-deps/spirv-tools/src/source/val/ |
D | validate_cfg.cpp | 346 if (spv_result_t rcode = ASSERT_FUNC(_, TARGET)) return rcode
|