Searched refs:rcode (Results 1 - 25 of 26) sorted by relevance

12

/external/dnsmasq/src/
H A Dforward.c413 if (header->opcode != QUERY || (header->rcode != NOERROR && header->rcode != NXDOMAIN))
417 if (!header->ra && header->rcode == NOERROR && ntohs(header->ancount) == 0 &&
426 if (daemon->bogus_addr && header->rcode != NXDOMAIN &&
430 header->rcode = NXDOMAIN;
435 if (header->rcode == NXDOMAIN &&
444 header->rcode = NOERROR;
508 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) &&
536 if (header->rcode
[all...]
H A Dnameser.h297 unsigned rcode :4; /* response code */ member in struct:__anon20435
307 unsigned rcode :4; /* response code */ member in struct:__anon20435
H A Drfc1035.c662 int flags = header->rcode == NXDOMAIN ? F_NXDOMAIN : 0;
913 header->rcode = SERVFAIL; /* couldn't get memory */
915 header->rcode = NOERROR; /* empty domain */
917 header->rcode = NXDOMAIN;
920 header->rcode = NOERROR;
928 header->rcode = NOERROR;
935 header->rcode = REFUSED;
1592 header->rcode = NXDOMAIN;
1594 header->rcode = NOERROR; /* no error */
/external/libpcap/Win32/Include/arpa/
H A Dnameser.h265 unsigned rcode :4; /* response code */ member in struct:__anon24572
275 unsigned rcode :4; /* response code */ member in struct:__anon24572
/external/chromium_org/net/dns/
H A Ddns_response.h131 uint16 flags() const; // excluding rcode
132 uint8 rcode() const;
H A Ddns_transaction_unittest.cc92 void AddRcode(int rcode, IoMode mode) { argument
99 header->flags |= base::HostToNet16(dns_protocol::kFlagResponse | rcode);
412 // no answer and RCODE set to |rcode|. The id will be generated randomly.
415 int rcode,
418 CHECK_NE(dns_protocol::kRcodeNOERROR, rcode);
422 data->AddRcode(rcode, mode);
426 void AddAsyncQueryAndRcode(const char* dotted_name, uint16 qtype, int rcode) { argument
427 AddQueryAndRcode(dotted_name, qtype, rcode, ASYNC, false);
430 void AddSyncQueryAndRcode(const char* dotted_name, uint16 qtype, int rcode) { argument
431 AddQueryAndRcode(dotted_name, qtype, rcode, SYNCHRONOU
413 AddQueryAndRcode(const char* dotted_name, uint16 qtype, int rcode, IoMode mode, bool use_tcp) argument
[all...]
H A Ddns_response_unittest.cc231 EXPECT_EQ(0x0, resp.rcode());
259 EXPECT_EQ(0x0, resp.rcode());
307 EXPECT_EQ(0x0, resp.rcode());
365 EXPECT_EQ(0x0, resp.rcode());
H A Ddns_transaction.cc104 dict->SetInteger("rcode", GetResponse()->rcode());
268 if (response_->rcode() == dns_protocol::kRcodeNXDOMAIN)
270 if (response_->rcode() != dns_protocol::kRcodeNOERROR)
501 if (response_->rcode() == dns_protocol::kRcodeNXDOMAIN)
503 if (response_->rcode() != dns_protocol::kRcodeNOERROR)
H A Ddns_response.cc224 uint8 DnsResponse::rcode() const { function in class:net::DnsResponse
/external/kernel-headers/original/uapi/linux/
H A Dfirewire-cdev.h102 * @rcode: Response code returned by the remote node
114 * packets. @rcode indicates success or failure of such transmissions.
119 __u32 rcode; member in struct:fw_cdev_event_response
336 * @rcode: %RCODE_..., indicates success or failure of transmission
342 * ping time in 49.152MHz clocks if @rcode is %RCODE_COMPLETE.
350 __u32 rcode; member in struct:fw_cdev_event_phy_packet
516 * @rcode: Response code as determined by the userspace handler
528 __u32 rcode; member in struct:fw_cdev_send_response
/external/smack/src/org/xbill/DNS/
H A DCache.java601 int rcode = in.getHeader().getRcode();
608 if ((rcode != Rcode.NOERROR && rcode != Rcode.NXDOMAIN) ||
675 int cachetype = (rcode == Rcode.NXDOMAIN) ? 0 : qtype;
676 if (rcode == Rcode.NXDOMAIN || soa != null || ns == null) {
685 if (rcode == Rcode.NXDOMAIN)
702 } else if (rcode == Rcode.NOERROR && ns != null) {
H A DLookup.java477 int rcode = response.getHeader().getRcode();
478 if (rcode != Rcode.NOERROR && rcode != Rcode.NXDOMAIN) {
482 badresponse_error = Rcode.string(rcode);
H A DZoneTransferIn.java546 int rcode = response.getRcode();
547 if (rcode != Rcode.NOERROR) {
549 rcode == Rcode.NOTIMP)
555 fail(Rcode.string(rcode));
H A DMessage.java315 * Returns the message's rcode (error code). This incorporates the EDNS
316 * extended rcode.
320 int rcode = header.getRcode();
323 rcode += (opt.getExtendedRcode() << 4);
324 return rcode;
/external/openssl/crypto/conf/
H A Dconf_mod.c234 char rcode[DECIMAL_SIZE(ret)+1]; local
236 BIO_snprintf(rcode, sizeof rcode, "%-8d", ret);
237 ERR_add_error_data(6, "module=", name, ", value=", value, ", retcode=", rcode);
/external/valgrind/main/VEX/priv/
H A Dmain_main.c238 HInstrArray* rcode; local
895 rcode = doRegisterAllocation ( vcode, available_real_regs,
908 for (i = 0; i < rcode->arr_used; i++) {
910 ppInstr(rcode->arr[i], mode64);
931 for (i = 0; i < rcode->arr_used; i++) {
932 HInstr* hi = rcode->arr[i];
/external/tcpdump/
H A Dprint-smb.c1093 int name_trn_id, response, opcode, nm_flags, rcode; local
1104 rcode = data[3] & 0xF;
1131 if (rcode)
1151 name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount,
/external/mdnsresponder/mDNSShared/
H A Ddnsextd.c770 if ((reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask)) { vlogmsg = "Reply contains non-zero rcode"; goto failure; }
992 Log("SRV record registration failed with rcode %d", reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask);
1330 Log("Expiration update failed with rcode %d", reply ? reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask : -1);
1748 mDNSu8 rcode; local
1788 rcode = (mDNSu8)(reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask);
1789 if (rcode && rcode != kDNSFlag1_RC_NXDomain) { Log("AnswerQuestion: %##s type %d - non-zero rcode %d from server", e->name.c, e->type, rcode); goto end; }
2385 mDNSlocal mDNSBool IsAuthorized( DaemonInfo * d, PktMsg * pkt, DomainAuthInfo ** key, mDNSu16 * rcode, mDNSu1 argument
2569 mDNSu16 rcode; local
2712 mDNSu16 rcode; local
[all...]
/external/mdnsresponder/mDNSCore/
H A DDNSDigest.c1429 mDNSexport mDNSBool DNSDigest_VerifyMessage(DNSMessage *msg, mDNSu8 *end, LargeCacheRecord * lcr, DomainAuthInfo *info, mDNSu16 * rcode, mDNSu16 * tcode) argument
1452 *rcode = kDNSFlag1_RC_NotAuth;
1466 *rcode = kDNSFlag1_RC_NotAuth;
1492 *rcode = kDNSFlag1_RC_NotAuth;
1560 *rcode = kDNSFlag1_RC_NotAuth;
H A DuDNS.c802 mDNSlocal void recvSetupResponse(mDNS *const m, mDNSu8 rcode, DNSQuestion *const q, const LLQOptData *const llq) argument
804 if (rcode && rcode != kDNSFlag1_RC_NXDomain)
805 { LogMsg("ERROR: recvSetupResponse %##s (%s) - rcode && rcode != kDNSFlag1_RC_NXDomain", q->qname.c, DNSTypeName(q->qtype)); return; }
2479 mDNSlocal mStatus checkUpdateResult(mDNS *const m, const domainname *const displayname, const mDNSu8 rcode, const DNSMessage *const msg, const mDNSu8 *const end) argument
2482 if (!rcode) return mStatus_NoError;
2483 else if (rcode == kDNSFlag1_RC_YXDomain)
2488 else if (rcode == kDNSFlag1_RC_Refused)
2493 else if (rcode
3503 mDNSu8 rcode = (mDNSu8)(msg->h.flags.b[1] & kDNSFlag1_RC_Mask); local
[all...]
H A DmDNSEmbeddedAPI.h2506 extern mDNSBool DNSDigest_VerifyMessage(DNSMessage *msg, mDNSu8 *end, LargeCacheRecord *tsig, DomainAuthInfo *info, mDNSu16 *rcode, mDNSu16 *tcode);
H A DmDNS.c6532 mDNSu8 rcode = (mDNSu8)(response->h.flags.b[1] & kDNSFlag1_RC_Mask); local
6533 mDNSBool failure = !(rcode == kDNSFlag1_RC_NoErr || rcode == kDNSFlag1_RC_NXDomain || rcode == kDNSFlag1_RC_NotAuth);
6566 LogInfo("mDNSCoreReceiveResponse: Server %p responded with code %d to query %##s (%s)", qptr->qDNSServer, rcode, q.qname.c, DNSTypeName(q.qtype));
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dtdls.c505 * @rcode: Reason code for Teardown
513 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
525 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) +
539 WPA_PUT_LE16(pos, rcode);
540 pos += sizeof(rcode);
590 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer,
596 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode,
589 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dtdls.c505 * @rcode: Reason code for Teardown
513 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
525 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) +
539 WPA_PUT_LE16(pos, rcode);
540 pos += sizeof(rcode);
590 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer,
596 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode,
589 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dtdls.c505 * @rcode: Reason code for Teardown
513 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
525 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) +
539 WPA_PUT_LE16(pos, rcode);
540 pos += sizeof(rcode);
590 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer,
596 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode,
589 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument

Completed in 2098 milliseconds

12