/external/dnsmasq/contrib/try-all-ns/ |
D | dnsmasq-2.47_no_nxdomain_until_end.patch | 9 + if ( (header->rcode == NXDOMAIN) && ((daemon->options & OPT_ORDER) != 0) && (server->next != NUL… 10 + header->rcode = SERVFAIL; 12 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) &&
|
D | dnsmasq-2.35-try-all-ns.patch | 21 + && header->rcode == NXDOMAIN ) header->rcode = SERVFAIL; 23 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) && forward->forwardall == 0)
|
/external/dnsmasq/src/ |
D | forward.c | 401 if (header->opcode != QUERY || (header->rcode != NOERROR && header->rcode != NXDOMAIN)) in process_reply() 405 if (!header->ra && header->rcode == NOERROR && ntohs(header->ancount) == 0 && in process_reply() 414 if (daemon->bogus_addr && header->rcode != NXDOMAIN && in process_reply() 418 header->rcode = NXDOMAIN; in process_reply() 423 if (header->rcode == NXDOMAIN && in process_reply() 432 header->rcode = NOERROR; in process_reply() 496 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) && in reply_query() 524 if (header->rcode == SERVFAIL || header->rcode == REFUSED) in reply_query() 548 (header->rcode != REFUSED && header->rcode != SERVFAIL)) in reply_query()
|
D | nameser.h | 297 unsigned rcode :4; /* response code */ member 307 unsigned rcode :4; /* response code */ member
|
D | rfc1035.c | 662 int flags = header->rcode == NXDOMAIN ? F_NXDOMAIN : 0; in extract_addresses() 913 header->rcode = SERVFAIL; /* couldn't get memory */ in setup_reply() 915 header->rcode = NOERROR; /* empty domain */ in setup_reply() 917 header->rcode = NXDOMAIN; in setup_reply() 920 header->rcode = NOERROR; in setup_reply() 928 header->rcode = NOERROR; in setup_reply() 935 header->rcode = REFUSED; in setup_reply() 1592 header->rcode = NXDOMAIN; in answer_request() 1594 header->rcode = NOERROR; /* no error */ in answer_request()
|
/external/smack/src/org/xbill/DNS/ |
D | Cache.java | 601 int rcode = in.getHeader().getRcode(); in addMessage() local 608 if ((rcode != Rcode.NOERROR && rcode != Rcode.NXDOMAIN) || in addMessage() 675 int cachetype = (rcode == Rcode.NXDOMAIN) ? 0 : qtype; in addMessage() 676 if (rcode == Rcode.NXDOMAIN || soa != null || ns == null) { in addMessage() 685 if (rcode == Rcode.NXDOMAIN) in addMessage() 702 } else if (rcode == Rcode.NOERROR && ns != null) { in addMessage()
|
D | Lookup.java | 477 int rcode = response.getHeader().getRcode(); in lookup() local 478 if (rcode != Rcode.NOERROR && rcode != Rcode.NXDOMAIN) { in lookup() 482 badresponse_error = Rcode.string(rcode); in lookup()
|
D | ZoneTransferIn.java | 546 int rcode = response.getRcode(); in doxfr() local 547 if (rcode != Rcode.NOERROR) { in doxfr() 549 rcode == Rcode.NOTIMP) in doxfr() 555 fail(Rcode.string(rcode)); in doxfr()
|
D | Message.java | 320 int rcode = header.getRcode(); in getRcode() local 323 rcode += (opt.getExtendedRcode() << 4); in getRcode() 324 return rcode; in getRcode()
|
/external/chromium_org/net/dns/ |
D | dns_transaction_unittest.cc | 93 void AddRcode(int rcode, IoMode mode) { in AddRcode() argument 100 header->flags |= base::HostToNet16(dns_protocol::kFlagResponse | rcode); in AddRcode() 411 int rcode, in AddQueryAndRcode() argument 414 CHECK_NE(dns_protocol::kRcodeNOERROR, rcode); in AddQueryAndRcode() 418 data->AddRcode(rcode, mode); in AddQueryAndRcode() 422 void AddAsyncQueryAndRcode(const char* dotted_name, uint16 qtype, int rcode) { in AddAsyncQueryAndRcode() argument 423 AddQueryAndRcode(dotted_name, qtype, rcode, ASYNC, false); in AddAsyncQueryAndRcode() 426 void AddSyncQueryAndRcode(const char* dotted_name, uint16 qtype, int rcode) { in AddSyncQueryAndRcode() argument 427 AddQueryAndRcode(dotted_name, qtype, rcode, SYNCHRONOUS, false); in AddSyncQueryAndRcode()
|
D | dns_response_unittest.cc | 231 EXPECT_EQ(0x0, resp.rcode()); in TEST() 259 EXPECT_EQ(0x0, resp.rcode()); in TEST() 307 EXPECT_EQ(0x0, resp.rcode()); in TEST() 365 EXPECT_EQ(0x0, resp.rcode()); in TEST()
|
D | dns_transaction.cc | 104 dict->SetInteger("rcode", GetResponse()->rcode()); in NetLogResponseCallback() 268 if (response_->rcode() == dns_protocol::kRcodeNXDOMAIN) in DoReadResponseComplete() 270 if (response_->rcode() != dns_protocol::kRcodeNOERROR) in DoReadResponseComplete() 478 if (response_->rcode() == dns_protocol::kRcodeNXDOMAIN) in DoReadResponse() 480 if (response_->rcode() != dns_protocol::kRcodeNOERROR) in DoReadResponse()
|
D | dns_response.h | 132 uint8 rcode() const;
|
D | dns_response.cc | 224 uint8 DnsResponse::rcode() const { in rcode() function in net::DnsResponse
|
/external/openssl/crypto/conf/ |
D | conf_mod.c | 234 char rcode[DECIMAL_SIZE(ret)+1]; in module_run() local 236 BIO_snprintf(rcode, sizeof rcode, "%-8d", ret); in module_run() 237 ERR_add_error_data(6, "module=", name, ", value=", value, ", retcode=", rcode); in module_run()
|
/external/chromium_org/third_party/openssl/openssl/crypto/conf/ |
D | conf_mod.c | 234 char rcode[DECIMAL_SIZE(ret)+1]; in module_run() local 236 BIO_snprintf(rcode, sizeof rcode, "%-8d", ret); in module_run() 237 ERR_add_error_data(6, "module=", name, ", value=", value, ", retcode=", rcode); in module_run()
|
/external/llvm/test/Transforms/Inline/ |
D | devirtualize-3.ll | 28 define internal void @quit(%struct.cont_t* %cont, i32 %rcode) nounwind ssp { 30 call void @exit(i32 %rcode) noreturn
|
/external/valgrind/main/VEX/priv/ |
D | main_main.c | 215 HInstrArray* rcode; in LibVEX_Translate() local 781 rcode = doRegisterAllocation ( vcode, available_real_regs, in LibVEX_Translate() 794 for (i = 0; i < rcode->arr_used; i++) { in LibVEX_Translate() 796 ppInstr(rcode->arr[i], mode64); in LibVEX_Translate() 817 for (i = 0; i < rcode->arr_used; i++) { in LibVEX_Translate() 818 HInstr* hi = rcode->arr[i]; in LibVEX_Translate()
|
/external/mdnsresponder/mDNSShared/ |
D | dnsextd.c | 1748 mDNSu8 rcode; in AnswerQuestion() local 1788 rcode = (mDNSu8)(reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask); in AnswerQuestion() 1789 …if (rcode && rcode != kDNSFlag1_RC_NXDomain) { Log("AnswerQuestion: %##s type %d - non-zero rcode … in AnswerQuestion() 2385 …Authorized( DaemonInfo * d, PktMsg * pkt, DomainAuthInfo ** key, mDNSu16 * rcode, mDNSu16 * tcode ) in IsAuthorized() argument 2467 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized() 2487 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized() 2501 ok = DNSDigest_VerifyMessage( &pkt->msg, ( mDNSu8* ) lastPtr, &lcr, (*key), rcode, tcode ); in IsAuthorized() 2569 mDNSu16 rcode; in RecvUDPMessage() local 2602 else if ( IsAuthorized( context->d, &context->pkt, &key, &rcode, &tcode ) ) in RecvUDPMessage() 2712 mDNSu16 rcode; in RecvTCPMessage() local [all …]
|
/external/tcpdump/ |
D | print-smb.c | 1093 int name_trn_id, response, opcode, nm_flags, rcode; in nbt_udp137_print() local 1104 rcode = data[3] & 0xF; in nbt_udp137_print() 1131 if (rcode) in nbt_udp137_print() 1151 name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount, in nbt_udp137_print()
|
/external/mdnsresponder/mDNSCore/ |
D | DNSDigest.c | 1429 … *msg, mDNSu8 *end, LargeCacheRecord * lcr, DomainAuthInfo *info, mDNSu16 * rcode, mDNSu16 * tcode) in DNSDigest_VerifyMessage() argument 1452 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1466 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1492 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1560 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage()
|
D | uDNS.c | 802 mDNSlocal void recvSetupResponse(mDNS *const m, mDNSu8 rcode, DNSQuestion *const q, const LLQOptDat… in recvSetupResponse() argument 804 if (rcode && rcode != kDNSFlag1_RC_NXDomain) in recvSetupResponse() 2479 …teResult(mDNS *const m, const domainname *const displayname, const mDNSu8 rcode, const DNSMessage … in checkUpdateResult() argument 2482 if (!rcode) return mStatus_NoError; in checkUpdateResult() 2483 else if (rcode == kDNSFlag1_RC_YXDomain) in checkUpdateResult() 2488 else if (rcode == kDNSFlag1_RC_Refused) in checkUpdateResult() 2493 else if (rcode == kDNSFlag1_RC_NXRRSet) in checkUpdateResult() 2498 else if (rcode == kDNSFlag1_RC_NotAuth) in checkUpdateResult() 2509 else if (rcode == kDNSFlag1_RC_FormErr) in checkUpdateResult() 2521 LogMsg("Update %##s failed with rcode %d", displayname->c, rcode); in checkUpdateResult() [all …]
|
D | mDNSEmbeddedAPI.h | 2506 …e *msg, mDNSu8 *end, LargeCacheRecord *tsig, DomainAuthInfo *info, mDNSu16 *rcode, mDNSu16 *tcode);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 494 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument 506 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + in wpa_tdls_key_mic_teardown() 520 WPA_PUT_LE16(pos, rcode); in wpa_tdls_key_mic_teardown() 521 pos += sizeof(rcode); in wpa_tdls_key_mic_teardown() 571 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, in wpa_supplicant_verify_tdls_mic_teardown() argument 577 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown()
|
/external/libppp/src/ |
D | ip.c | 95 unsigned rcode : 4; member
|