/external/chromium_org/net/dns/ |
H A D | dns_response.cc | 224 uint8 DnsResponse::rcode() const { function in class:net::DnsResponse
|
H A D | dns_transaction_unittest.cc | 92 void AddRcode(int rcode, IoMode mode) { argument 99 header->flags |= base::HostToNet16(dns_protocol::kFlagResponse | rcode); 412 // no answer and RCODE set to |rcode|. The id will be generated randomly. 415 int rcode, 418 CHECK_NE(dns_protocol::kRcodeNOERROR, rcode); 422 data->AddRcode(rcode, mode); 426 void AddAsyncQueryAndRcode(const char* dotted_name, uint16 qtype, int rcode) { argument 427 AddQueryAndRcode(dotted_name, qtype, rcode, ASYNC, false); 430 void AddSyncQueryAndRcode(const char* dotted_name, uint16 qtype, int rcode) { argument 431 AddQueryAndRcode(dotted_name, qtype, rcode, SYNCHRONOU 413 AddQueryAndRcode(const char* dotted_name, uint16 qtype, int rcode, IoMode mode, bool use_tcp) argument [all...] |
/external/openssl/crypto/conf/ |
H A D | conf_mod.c | 234 char rcode[DECIMAL_SIZE(ret)+1]; local 236 BIO_snprintf(rcode, sizeof rcode, "%-8d", ret); 237 ERR_add_error_data(6, "module=", name, ", value=", value, ", retcode=", rcode);
|
/external/libpcap/Win32/Include/arpa/ |
H A D | nameser.h | 265 unsigned rcode :4; /* response code */ member in struct:__anon24572 275 unsigned rcode :4; /* response code */ member in struct:__anon24572
|
/external/tcpdump/ |
H A D | print-smb.c | 1093 int name_trn_id, response, opcode, nm_flags, rcode; local 1104 rcode = data[3] & 0xF; 1131 if (rcode) 1151 name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount,
|
/external/valgrind/main/VEX/priv/ |
H A D | main_main.c | 238 HInstrArray* rcode; local 895 rcode = doRegisterAllocation ( vcode, available_real_regs, 908 for (i = 0; i < rcode->arr_used; i++) { 910 ppInstr(rcode->arr[i], mode64); 931 for (i = 0; i < rcode->arr_used; i++) { 932 HInstr* hi = rcode->arr[i];
|
/external/dnsmasq/src/ |
H A D | nameser.h | 297 unsigned rcode :4; /* response code */ member in struct:__anon20435 307 unsigned rcode :4; /* response code */ member in struct:__anon20435
|
/external/kernel-headers/original/uapi/linux/ |
H A D | firewire-cdev.h | 102 * @rcode: Response code returned by the remote node 114 * packets. @rcode indicates success or failure of such transmissions. 119 __u32 rcode; member in struct:fw_cdev_event_response 336 * @rcode: %RCODE_..., indicates success or failure of transmission 342 * ping time in 49.152MHz clocks if @rcode is %RCODE_COMPLETE. 350 __u32 rcode; member in struct:fw_cdev_event_phy_packet 516 * @rcode: Response code as determined by the userspace handler 528 __u32 rcode; member in struct:fw_cdev_send_response
|
/external/mdnsresponder/mDNSCore/ |
H A D | DNSDigest.c | 1429 mDNSexport mDNSBool DNSDigest_VerifyMessage(DNSMessage *msg, mDNSu8 *end, LargeCacheRecord * lcr, DomainAuthInfo *info, mDNSu16 * rcode, mDNSu16 * tcode) argument 1452 *rcode = kDNSFlag1_RC_NotAuth; 1466 *rcode = kDNSFlag1_RC_NotAuth; 1492 *rcode = kDNSFlag1_RC_NotAuth; 1560 *rcode = kDNSFlag1_RC_NotAuth;
|
H A D | uDNS.c | 802 mDNSlocal void recvSetupResponse(mDNS *const m, mDNSu8 rcode, DNSQuestion *const q, const LLQOptData *const llq) argument 804 if (rcode && rcode != kDNSFlag1_RC_NXDomain) 805 { LogMsg("ERROR: recvSetupResponse %##s (%s) - rcode && rcode != kDNSFlag1_RC_NXDomain", q->qname.c, DNSTypeName(q->qtype)); return; } 2479 mDNSlocal mStatus checkUpdateResult(mDNS *const m, const domainname *const displayname, const mDNSu8 rcode, const DNSMessage *const msg, const mDNSu8 *const end) argument 2482 if (!rcode) return mStatus_NoError; 2483 else if (rcode == kDNSFlag1_RC_YXDomain) 2488 else if (rcode == kDNSFlag1_RC_Refused) 2493 else if (rcode 3503 mDNSu8 rcode = (mDNSu8)(msg->h.flags.b[1] & kDNSFlag1_RC_Mask); local [all...] |
H A D | mDNS.c | 6532 mDNSu8 rcode = (mDNSu8)(response->h.flags.b[1] & kDNSFlag1_RC_Mask); local 6533 mDNSBool failure = !(rcode == kDNSFlag1_RC_NoErr || rcode == kDNSFlag1_RC_NXDomain || rcode == kDNSFlag1_RC_NotAuth); 6566 LogInfo("mDNSCoreReceiveResponse: Server %p responded with code %d to query %##s (%s)", qptr->qDNSServer, rcode, q.qname.c, DNSTypeName(q.qtype));
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 505 * @rcode: Reason code for Teardown 513 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument 525 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + 539 WPA_PUT_LE16(pos, rcode); 540 pos += sizeof(rcode); 590 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, 596 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, 589 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 505 * @rcode: Reason code for Teardown 513 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument 525 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + 539 WPA_PUT_LE16(pos, rcode); 540 pos += sizeof(rcode); 590 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, 596 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, 589 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | tdls.c | 505 * @rcode: Reason code for Teardown 513 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument 525 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + 539 WPA_PUT_LE16(pos, rcode); 540 pos += sizeof(rcode); 590 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, 596 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, 589 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
|
/external/mdnsresponder/mDNSShared/ |
H A D | dnsextd.c | 770 if ((reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask)) { vlogmsg = "Reply contains non-zero rcode"; goto failure; } 992 Log("SRV record registration failed with rcode %d", reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask); 1330 Log("Expiration update failed with rcode %d", reply ? reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask : -1); 1748 mDNSu8 rcode; local 1788 rcode = (mDNSu8)(reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask); 1789 if (rcode && rcode != kDNSFlag1_RC_NXDomain) { Log("AnswerQuestion: %##s type %d - non-zero rcode %d from server", e->name.c, e->type, rcode); goto end; } 2385 mDNSlocal mDNSBool IsAuthorized( DaemonInfo * d, PktMsg * pkt, DomainAuthInfo ** key, mDNSu16 * rcode, mDNSu1 argument 2569 mDNSu16 rcode; local 2712 mDNSu16 rcode; local [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ui.forms_3.5.2.r36_v20100702.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |