Searched refs:rcode (Results 1 - 9 of 9) sorted by relevance

/external/dnsmasq/src/
H A Dforward.c401 if (header->opcode != QUERY || (header->rcode != NOERROR && header->rcode != NXDOMAIN))
405 if (!header->ra && header->rcode == NOERROR && ntohs(header->ancount) == 0 &&
414 if (daemon->bogus_addr && header->rcode != NXDOMAIN &&
418 header->rcode = NXDOMAIN;
423 if (header->rcode == NXDOMAIN &&
432 header->rcode = NOERROR;
496 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) &&
524 if (header->rcode
[all...]
H A Dnameser.h297 unsigned rcode :4; /* response code */ member in struct:__anon4047
307 unsigned rcode :4; /* response code */ member in struct:__anon4047
H A Drfc1035.c662 int flags = header->rcode == NXDOMAIN ? F_NXDOMAIN : 0;
913 header->rcode = SERVFAIL; /* couldn't get memory */
915 header->rcode = NOERROR; /* empty domain */
917 header->rcode = NXDOMAIN;
920 header->rcode = NOERROR;
928 header->rcode = NOERROR;
935 header->rcode = REFUSED;
1592 header->rcode = NXDOMAIN;
1594 header->rcode = NOERROR; /* no error */
/external/openssl/crypto/conf/
H A Dconf_mod.c234 char rcode[DECIMAL_SIZE(ret)+1]; local
236 BIO_snprintf(rcode, sizeof rcode, "%-8d", ret);
237 ERR_add_error_data(6, "module=", name, ", value=", value, ", retcode=", rcode);
/external/valgrind/main/VEX/priv/
H A Dmain_main.c195 HInstrArray* rcode; local
609 rcode = doRegisterAllocation ( vcode, available_real_regs,
622 for (i = 0; i < rcode->arr_used; i++) {
624 ppInstr(rcode->arr[i], mode64);
642 for (i = 0; i < rcode->arr_used; i++) {
644 ppInstr(rcode->arr[i], mode64);
647 j = (*emit)( insn_bytes, 32, rcode->arr[i], mode64, vta->dispatch );
/external/tcpdump/
H A Dprint-smb.c1093 int name_trn_id, response, opcode, nm_flags, rcode; local
1104 rcode = data[3] & 0xF;
1131 if (rcode)
1151 name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount,
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dtdls.c452 * @rcode: Reason code for Teardown
460 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
472 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) +
486 WPA_PUT_LE16(pos, rcode);
487 pos += sizeof(rcode);
537 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer,
543 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode,
536 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dtdls.c452 * @rcode: Reason code for Teardown
460 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
472 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) +
486 WPA_PUT_LE16(pos, rcode);
487 pos += sizeof(rcode);
537 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer,
543 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode,
536 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dtdls.c452 * @rcode: Reason code for Teardown
460 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
472 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) +
486 WPA_PUT_LE16(pos, rcode);
487 pos += sizeof(rcode);
537 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer,
543 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode,
536 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument

Completed in 675 milliseconds