/external/dnsmasq/src/ |
H A D | forward.c | 401 if (header->opcode != QUERY || (header->rcode != NOERROR && header->rcode != NXDOMAIN)) 405 if (!header->ra && header->rcode == NOERROR && ntohs(header->ancount) == 0 && 414 if (daemon->bogus_addr && header->rcode != NXDOMAIN && 418 header->rcode = NXDOMAIN; 423 if (header->rcode == NXDOMAIN && 432 header->rcode = NOERROR; 496 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) && 524 if (header->rcode [all...] |
H A D | nameser.h | 297 unsigned rcode :4; /* response code */ member in struct:__anon4047 307 unsigned rcode :4; /* response code */ member in struct:__anon4047
|
H A D | rfc1035.c | 662 int flags = header->rcode == NXDOMAIN ? F_NXDOMAIN : 0; 913 header->rcode = SERVFAIL; /* couldn't get memory */ 915 header->rcode = NOERROR; /* empty domain */ 917 header->rcode = NXDOMAIN; 920 header->rcode = NOERROR; 928 header->rcode = NOERROR; 935 header->rcode = REFUSED; 1592 header->rcode = NXDOMAIN; 1594 header->rcode = NOERROR; /* no error */
|
/external/openssl/crypto/conf/ |
H A D | conf_mod.c | 234 char rcode[DECIMAL_SIZE(ret)+1]; local 236 BIO_snprintf(rcode, sizeof rcode, "%-8d", ret); 237 ERR_add_error_data(6, "module=", name, ", value=", value, ", retcode=", rcode);
|
/external/valgrind/main/VEX/priv/ |
H A D | main_main.c | 195 HInstrArray* rcode; local 609 rcode = doRegisterAllocation ( vcode, available_real_regs, 622 for (i = 0; i < rcode->arr_used; i++) { 624 ppInstr(rcode->arr[i], mode64); 642 for (i = 0; i < rcode->arr_used; i++) { 644 ppInstr(rcode->arr[i], mode64); 647 j = (*emit)( insn_bytes, 32, rcode->arr[i], mode64, vta->dispatch );
|
/external/tcpdump/ |
H A D | print-smb.c | 1093 int name_trn_id, response, opcode, nm_flags, rcode; local 1104 rcode = data[3] & 0xF; 1131 if (rcode) 1151 name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount,
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 452 * @rcode: Reason code for Teardown 460 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument 472 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + 486 WPA_PUT_LE16(pos, rcode); 487 pos += sizeof(rcode); 537 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, 543 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, 536 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 452 * @rcode: Reason code for Teardown 460 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument 472 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + 486 WPA_PUT_LE16(pos, rcode); 487 pos += sizeof(rcode); 537 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, 543 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, 536 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 452 * @rcode: Reason code for Teardown 460 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument 472 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + 486 WPA_PUT_LE16(pos, rcode); 487 pos += sizeof(rcode); 537 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, 543 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, 536 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
|