/external/dnsmasq/contrib/try-all-ns/ |
D | dnsmasq-2.47_no_nxdomain_until_end.patch | 9 + if ( (header->rcode == NXDOMAIN) && ((daemon->options & OPT_ORDER) != 0) && (server->next != NUL… 10 + header->rcode = SERVFAIL; 12 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) &&
|
D | dnsmasq-2.35-try-all-ns.patch | 21 + && header->rcode == NXDOMAIN ) header->rcode = SERVFAIL; 23 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) && forward->forwardall == 0)
|
/external/dnsmasq/src/ |
D | forward.c | 401 if (header->opcode != QUERY || (header->rcode != NOERROR && header->rcode != NXDOMAIN)) in process_reply() 405 if (!header->ra && header->rcode == NOERROR && ntohs(header->ancount) == 0 && in process_reply() 414 if (daemon->bogus_addr && header->rcode != NXDOMAIN && in process_reply() 418 header->rcode = NXDOMAIN; in process_reply() 423 if (header->rcode == NXDOMAIN && in process_reply() 432 header->rcode = NOERROR; in process_reply() 496 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) && in reply_query() 524 if (header->rcode == SERVFAIL || header->rcode == REFUSED) in reply_query() 548 (header->rcode != REFUSED && header->rcode != SERVFAIL)) in reply_query()
|
D | nameser.h | 297 unsigned rcode :4; /* response code */ member 307 unsigned rcode :4; /* response code */ member
|
D | rfc1035.c | 662 int flags = header->rcode == NXDOMAIN ? F_NXDOMAIN : 0; in extract_addresses() 913 header->rcode = SERVFAIL; /* couldn't get memory */ in setup_reply() 915 header->rcode = NOERROR; /* empty domain */ in setup_reply() 917 header->rcode = NXDOMAIN; in setup_reply() 920 header->rcode = NOERROR; in setup_reply() 928 header->rcode = NOERROR; in setup_reply() 935 header->rcode = REFUSED; in setup_reply() 1592 header->rcode = NXDOMAIN; in answer_request() 1594 header->rcode = NOERROR; /* no error */ in answer_request()
|
/external/openssl/crypto/conf/ |
D | conf_mod.c | 234 char rcode[DECIMAL_SIZE(ret)+1]; in module_run() local 236 BIO_snprintf(rcode, sizeof rcode, "%-8d", ret); in module_run() 237 ERR_add_error_data(6, "module=", name, ", value=", value, ", retcode=", rcode); in module_run()
|
/external/valgrind/main/VEX/priv/ |
D | main_main.c | 198 HInstrArray* rcode; in LibVEX_Translate() local 676 rcode = doRegisterAllocation ( vcode, available_real_regs, in LibVEX_Translate() 689 for (i = 0; i < rcode->arr_used; i++) { in LibVEX_Translate() 691 ppInstr(rcode->arr[i], mode64); in LibVEX_Translate() 712 for (i = 0; i < rcode->arr_used; i++) { in LibVEX_Translate() 714 ppInstr(rcode->arr[i], mode64); in LibVEX_Translate() 717 j = (*emit)( insn_bytes, sizeof insn_bytes, rcode->arr[i], mode64, in LibVEX_Translate()
|
/external/llvm/test/Transforms/Inline/ |
D | devirtualize-3.ll | 28 define internal void @quit(%struct.cont_t* %cont, i32 %rcode) nounwind ssp { 30 call void @exit(i32 %rcode) noreturn
|
/external/mdnsresponder/mDNSShared/ |
D | dnsextd.c | 1748 mDNSu8 rcode; in AnswerQuestion() local 1788 rcode = (mDNSu8)(reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask); in AnswerQuestion() 1789 …if (rcode && rcode != kDNSFlag1_RC_NXDomain) { Log("AnswerQuestion: %##s type %d - non-zero rcode … in AnswerQuestion() 2385 …Authorized( DaemonInfo * d, PktMsg * pkt, DomainAuthInfo ** key, mDNSu16 * rcode, mDNSu16 * tcode ) in IsAuthorized() argument 2467 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized() 2487 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized() 2501 ok = DNSDigest_VerifyMessage( &pkt->msg, ( mDNSu8* ) lastPtr, &lcr, (*key), rcode, tcode ); in IsAuthorized() 2569 mDNSu16 rcode; in RecvUDPMessage() local 2602 else if ( IsAuthorized( context->d, &context->pkt, &key, &rcode, &tcode ) ) in RecvUDPMessage() 2712 mDNSu16 rcode; in RecvTCPMessage() local [all …]
|
/external/tcpdump/ |
D | print-smb.c | 1093 int name_trn_id, response, opcode, nm_flags, rcode; in nbt_udp137_print() local 1104 rcode = data[3] & 0xF; in nbt_udp137_print() 1131 if (rcode) in nbt_udp137_print() 1151 name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount, in nbt_udp137_print()
|
/external/mdnsresponder/mDNSCore/ |
D | DNSDigest.c | 1429 … *msg, mDNSu8 *end, LargeCacheRecord * lcr, DomainAuthInfo *info, mDNSu16 * rcode, mDNSu16 * tcode) in DNSDigest_VerifyMessage() argument 1452 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1466 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1492 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1560 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage()
|
D | uDNS.c | 802 mDNSlocal void recvSetupResponse(mDNS *const m, mDNSu8 rcode, DNSQuestion *const q, const LLQOptDat… in recvSetupResponse() argument 804 if (rcode && rcode != kDNSFlag1_RC_NXDomain) in recvSetupResponse() 2479 …teResult(mDNS *const m, const domainname *const displayname, const mDNSu8 rcode, const DNSMessage … in checkUpdateResult() argument 2482 if (!rcode) return mStatus_NoError; in checkUpdateResult() 2483 else if (rcode == kDNSFlag1_RC_YXDomain) in checkUpdateResult() 2488 else if (rcode == kDNSFlag1_RC_Refused) in checkUpdateResult() 2493 else if (rcode == kDNSFlag1_RC_NXRRSet) in checkUpdateResult() 2498 else if (rcode == kDNSFlag1_RC_NotAuth) in checkUpdateResult() 2509 else if (rcode == kDNSFlag1_RC_FormErr) in checkUpdateResult() 2521 LogMsg("Update %##s failed with rcode %d", displayname->c, rcode); in checkUpdateResult() [all …]
|
D | mDNSEmbeddedAPI.h | 2506 …e *msg, mDNSu8 *end, LargeCacheRecord *tsig, DomainAuthInfo *info, mDNSu16 *rcode, mDNSu16 *tcode);
|
D | mDNS.c | 6532 mDNSu8 rcode = (mDNSu8)(response->h.flags.b[1] & kDNSFlag1_RC_Mask); in mDNSCoreReceiveResponse() local 6533 …mDNSBool failure = !(rcode == kDNSFlag1_RC_NoErr || rcode == kDNSFlag1_RC_NXDomain || rcode == kDN… in mDNSCoreReceiveResponse() 6566 …: Server %p responded with code %d to query %##s (%s)", qptr->qDNSServer, rcode, q.qname.c, DNSTyp… in mDNSCoreReceiveResponse()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 480 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument 492 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + in wpa_tdls_key_mic_teardown() 506 WPA_PUT_LE16(pos, rcode); in wpa_tdls_key_mic_teardown() 507 pos += sizeof(rcode); in wpa_tdls_key_mic_teardown() 557 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, in wpa_supplicant_verify_tdls_mic_teardown() argument 563 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown()
|
/external/libppp/src/ |
D | ip.c | 95 unsigned rcode : 4; member
|