/external/toybox/toys/pending/ |
D | host.c | 71 i, j, ret, sec, count, rcode, qlen, alen, pllen = 0; in host_main() local 136 rcode = abuf[3] & 15; in host_main() 140 rcode, rct[rcode], 256*abuf[6] + abuf[7]); in host_main() 144 if (rcode) error_exit("Host not found."); in host_main() 213 toys.exitval = rcode; in host_main()
|
/external/dnsmasq/src/ |
D | forward.c | 413 if (header->opcode != QUERY || (header->rcode != NOERROR && header->rcode != NXDOMAIN)) in process_reply() 417 if (!header->ra && header->rcode == NOERROR && ntohs(header->ancount) == 0 && in process_reply() 426 if (daemon->bogus_addr && header->rcode != NXDOMAIN && in process_reply() 430 header->rcode = NXDOMAIN; in process_reply() 435 if (header->rcode == NXDOMAIN && in process_reply() 444 header->rcode = NOERROR; in process_reply() 508 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) && in reply_query() 536 if (header->rcode == SERVFAIL || header->rcode == REFUSED) in reply_query() 560 (header->rcode != REFUSED && header->rcode != SERVFAIL)) in reply_query()
|
D | nameser.h | 297 unsigned rcode :4; /* response code */ member 307 unsigned rcode :4; /* response code */ member
|
D | rfc1035.c | 664 int flags = header->rcode == NXDOMAIN ? F_NXDOMAIN : 0; in extract_addresses() 918 header->rcode = SERVFAIL; /* couldn't get memory */ in setup_reply() 920 header->rcode = NOERROR; /* empty domain */ in setup_reply() 922 header->rcode = NXDOMAIN; in setup_reply() 925 header->rcode = NOERROR; in setup_reply() 933 header->rcode = NOERROR; in setup_reply() 940 header->rcode = REFUSED; in setup_reply() 1600 header->rcode = NXDOMAIN; in answer_request() 1602 header->rcode = NOERROR; /* no error */ in answer_request()
|
/external/kernel-headers/original/uapi/linux/ |
D | firewire-cdev.h | 119 __u32 rcode; member 350 __u32 rcode; member 528 __u32 rcode; member
|
/external/curl/tests/python_dependencies/impacket/ |
D | nmb.py | 287 self.rcode = 0 # Result codes of request. 308 self.rcode = ord(data[3]) & 0x0f 323 def set_rcode(self, rcode): argument 324 self.rcode = rcode 331 return self.rcode 347 secondWord |= self.rcode
|
/external/autotest/site_utils/ |
D | gs_offloader.py | 506 rcode = int(returncode) 507 if rcode < 0 or rcode > 255: 508 rcode = -1 509 metrics.Counter(m_gs_returncode).increment(fields={'return_code': rcode})
|
/external/swiftshader/third_party/LLVM/test/Transforms/Inline/ |
D | devirtualize-3.ll | 28 define internal void @quit(%struct.cont_t* %cont, i32 %rcode) nounwind ssp { 30 call void @exit(i32 %rcode) noreturn
|
/external/llvm/test/Transforms/Inline/ |
D | devirtualize-3.ll | 28 define internal void @quit(%struct.cont_t* %cont, i32 %rcode) nounwind ssp { 30 call void @exit(i32 %rcode) noreturn
|
/external/mdnsresponder/mDNSShared/ |
D | dnsextd.c | 1748 mDNSu8 rcode; in AnswerQuestion() local 1788 rcode = (mDNSu8)(reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask); in AnswerQuestion() 1789 …if (rcode && rcode != kDNSFlag1_RC_NXDomain) { Log("AnswerQuestion: %##s type %d - non-zero rcode … in AnswerQuestion() 2385 …Authorized( DaemonInfo * d, PktMsg * pkt, DomainAuthInfo ** key, mDNSu16 * rcode, mDNSu16 * tcode ) in IsAuthorized() argument 2467 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized() 2487 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized() 2501 ok = DNSDigest_VerifyMessage( &pkt->msg, ( mDNSu8* ) lastPtr, &lcr, (*key), rcode, tcode ); in IsAuthorized() 2569 mDNSu16 rcode; in RecvUDPMessage() local 2602 else if ( IsAuthorized( context->d, &context->pkt, &key, &rcode, &tcode ) ) in RecvUDPMessage() 2712 mDNSu16 rcode; in RecvTCPMessage() local [all …]
|
/external/valgrind/VEX/priv/ |
D | main_main.c | 737 HInstrArray* rcode; in libvex_BackEnd() local 1071 rcode = doRegisterAllocation ( vcode, rRegUniv, in libvex_BackEnd() 1083 for (i = 0; i < rcode->arr_used; i++) { in libvex_BackEnd() 1085 ppInstr(rcode->arr[i], mode64); in libvex_BackEnd() 1106 for (i = 0; i < rcode->arr_used; i++) { in libvex_BackEnd() 1107 HInstr* hi = rcode->arr[i]; in libvex_BackEnd()
|
/external/mdnsresponder/mDNSCore/ |
D | DNSDigest.c | 1431 … *msg, mDNSu8 *end, LargeCacheRecord * lcr, DomainAuthInfo *info, mDNSu16 * rcode, mDNSu16 * tcode) in DNSDigest_VerifyMessage() argument 1454 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1468 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1494 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1562 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage()
|
D | uDNS.c | 802 mDNSlocal void recvSetupResponse(mDNS *const m, mDNSu8 rcode, DNSQuestion *const q, const LLQOptDat… in recvSetupResponse() argument 804 if (rcode && rcode != kDNSFlag1_RC_NXDomain) in recvSetupResponse() 2479 …teResult(mDNS *const m, const domainname *const displayname, const mDNSu8 rcode, const DNSMessage … in checkUpdateResult() argument 2482 if (!rcode) return mStatus_NoError; in checkUpdateResult() 2483 else if (rcode == kDNSFlag1_RC_YXDomain) in checkUpdateResult() 2488 else if (rcode == kDNSFlag1_RC_Refused) in checkUpdateResult() 2493 else if (rcode == kDNSFlag1_RC_NXRRSet) in checkUpdateResult() 2498 else if (rcode == kDNSFlag1_RC_NotAuth) in checkUpdateResult() 2509 else if (rcode == kDNSFlag1_RC_FormErr) in checkUpdateResult() 2521 LogMsg("Update %##s failed with rcode %d", displayname->c, rcode); in checkUpdateResult() [all …]
|
D | mDNSEmbeddedAPI.h | 2517 …e *msg, mDNSu8 *end, LargeCacheRecord *tsig, DomainAuthInfo *info, mDNSu16 *rcode, mDNSu16 *tcode);
|
D | mDNS.c | 6532 mDNSu8 rcode = (mDNSu8)(response->h.flags.b[1] & kDNSFlag1_RC_Mask); in mDNSCoreReceiveResponse() local 6533 …mDNSBool failure = !(rcode == kDNSFlag1_RC_NoErr || rcode == kDNSFlag1_RC_NXDomain || rcode == kDN… in mDNSCoreReceiveResponse() 6566 …: Server %p responded with code %d to query %##s (%s)", qptr->qDNSServer, rcode, q.qname.c, DNSTyp… in mDNSCoreReceiveResponse()
|
/external/tcpdump/ |
D | print-smb.c | 1104 int name_trn_id, response, opcode, nm_flags, rcode; in nbt_udp137_print() local 1114 rcode = data[3] & 0xF; in nbt_udp137_print() 1129 ND_PRINT((ndo, "; %s", rcode ? "NEGATIVE" : "POSITIVE")); in nbt_udp137_print() 1138 name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount, in nbt_udp137_print()
|
/external/autotest/client/cros/netprotos/ |
D | zeroconf_unittest.py | 129 rcode = dpkt.dns.DNS_RCODE_NOERR,
|
D | zeroconf.py | 222 rcode = dpkt.dns.DNS_RCODE_NOERR,
|
/external/syslinux/gpxe/src/drivers/net/phantom/ |
D | nxhal_nic_interface.h | 240 nx_rcode_t rcode; member
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 532 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument 544 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + in wpa_tdls_key_mic_teardown() 558 WPA_PUT_LE16(pos, rcode); in wpa_tdls_key_mic_teardown() 559 pos += sizeof(rcode); in wpa_tdls_key_mic_teardown() 609 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, in wpa_supplicant_verify_tdls_mic_teardown() argument 615 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown()
|
/external/scapy/scapy/layers/ |
D | dns.py | 769 return r.getlayer(DNS).rcode 791 return r.getlayer(DNS).rcode
|
/external/pcre/dist2/src/ |
D | pcre2_compile.c | 8806 PCRE2_UCHAR *rcode; in pcre2_compile() local 8812 for (rcode = (PCRE2_UCHAR *)find_recurse(codestart, utf); in pcre2_compile() 8813 rcode != NULL; in pcre2_compile() 8814 rcode = (PCRE2_UCHAR *)find_recurse(rcode + 1 + LINK_SIZE, utf)) in pcre2_compile() 8818 recno = (int)GET(rcode, 1); in pcre2_compile() 8853 PUT(rcode, 1, rgroup - codestart); in pcre2_compile()
|
/external/scapy/doc/notebooks/ |
D | Scapy in 15 minutes.ipynb | 437 …a |<DNS id=0 qr=0L opcode=QUERY aa=0L tc=0L rd=1L ra=0L z=0L ad=0L cd=0L rcode=ok qdcount=1 ancou… 469 …9 |<DNS id=0 qr=0L opcode=QUERY aa=0L tc=0L rd=1L ra=0L z=0L ad=0L cd=0L rcode=ok qdcount=1 ancou… 573 …"<DNS id=0 qr=1L opcode=QUERY aa=0L tc=0L rd=1L ra=1L z=0L ad=0L cd=0L rcode=ok qdcount=1 ancount… 787 " rcode = ok\n", 998 …ns=<DNS id=0 qr=0L opcode=QUERY aa=0L tc=0L rd=0L ra=0L z=0L ad=0L cd=0L rcode=ok qdcount=0 ancou… 1036 …ns=<DNS id=0 qr=1L opcode=QUERY aa=0L tc=0L rd=1L ra=1L z=0L ad=0L cd=0L rcode=ok qdcount=1 ancou…
|
/external/scapy/doc/scapy/ |
D | usage.rst | 326 |<DNS id=0 qr=1L opcode=QUERY aa=0L tc=0L rd=1L ra=1L z=0L rcode=ok qdcount=1 ancount=1
|
/external/scapy/test/ |
D | regression.uts | 5582 assert pkt.rcode == 0
|