Searched defs:rcode (Results 1 - 20 of 20) sorted by relevance

/external/c-ares/
H A Dares_query.c148 int rcode; local
155 rcode = DNS_HEADER_RCODE(abuf);
159 switch (rcode)
H A Dadig.c416 int id, qr, opcode, aa, tc, rd, ra, rcode; local
448 rcode = DNS_HEADER_RCODE(abuf);
463 printf("rcode: %s\n", rcodes[rcode]);
H A Dares_process.c539 int tc, rcode; local
553 rcode = DNS_HEADER_RCODE(abuf);
602 if (rcode == SERVFAIL || rcode == NOTIMP || rcode == REFUSED)
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/
H A Ddnsproxy.py26 from third_party.dns import rcode namespace
247 response_message.set_rcode(rcode.NXDOMAIN)
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/
H A Dmessage.py29 import dns.rcode namespace
189 rc = dns.rcode.from_flags(self.flags, self.ednsflags)
190 print >> s, 'rcode %s' % dns.rcode.to_text(rc)
270 if dns.rcode.from_flags(other.flags, other.ednsflags) != \
271 dns.rcode.NOERROR:
521 def rcode(self): member in class:Message
522 """Return the rcode.
525 return dns.rcode.from_flags(self.flags, self.ednsflags)
527 def set_rcode(self, rcode)
[all...]
H A Dresolver.py29 import dns.rcode namespace
640 rcode = response.rcode()
641 if rcode == dns.rcode.NOERROR or \
642 rcode == dns.rcode.NXDOMAIN:
646 # rcode in it. Remove the server from the mix if
647 # the rcode isn't SERVFAIL.
649 if rcode !
[all...]
/external/toybox/toys/pending/
H A Dhost.c71 i, j, ret, sec, count, rcode, qlen, alen, pllen = 0; local
136 rcode = abuf[3] & 15;
139 printf("rcode = %d (%s), ancount = %d\n",
140 rcode, rct[rcode], 256*abuf[6] + abuf[7]);
144 if (rcode) error_exit("Host not found.");
213 toys.exitval = rcode;
/external/libpcap/Win32/Include/arpa/
H A Dnameser.h265 unsigned rcode :4; /* response code */ member in struct:__anon10794
275 unsigned rcode :4; /* response code */ member in struct:__anon10794
/external/tcpdump/
H A Dprint-smb.c1101 int name_trn_id, response, opcode, nm_flags, rcode; local
1111 rcode = data[3] & 0xF;
1126 ND_PRINT((ndo, "; %s", rcode ? "NEGATIVE" : "POSITIVE"));
1135 name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount,
/external/valgrind/VEX/priv/
H A Dmain_main.c351 HInstrArray* rcode; local
1038 rcode = doRegisterAllocation ( vcode, rRegUniv,
1050 for (i = 0; i < rcode->arr_used; i++) {
1052 ppInstr(rcode->arr[i], mode64);
1073 for (i = 0; i < rcode->arr_used; i++) {
1074 HInstr* hi = rcode->arr[i];
/external/dnsmasq/src/
H A Dnameser.h297 unsigned rcode :4; /* response code */ member in struct:__anon4891
307 unsigned rcode :4; /* response code */ member in struct:__anon4891
/external/kernel-headers/original/uapi/linux/
H A Dfirewire-cdev.h102 * @rcode: Response code returned by the remote node
114 * packets. @rcode indicates success or failure of such transmissions.
119 __u32 rcode; member in struct:fw_cdev_event_response
336 * @rcode: %RCODE_..., indicates success or failure of transmission
342 * ping time in 49.152MHz clocks if @rcode is %RCODE_COMPLETE.
350 __u32 rcode; member in struct:fw_cdev_event_phy_packet
516 * @rcode: Response code as determined by the userspace handler
528 __u32 rcode; member in struct:fw_cdev_send_response
/external/mdnsresponder/mDNSCore/
H A DDNSDigest.c1431 mDNSexport mDNSBool DNSDigest_VerifyMessage(DNSMessage *msg, mDNSu8 *end, LargeCacheRecord * lcr, DomainAuthInfo *info, mDNSu16 * rcode, mDNSu16 * tcode) argument
1454 *rcode = kDNSFlag1_RC_NotAuth;
1468 *rcode = kDNSFlag1_RC_NotAuth;
1494 *rcode = kDNSFlag1_RC_NotAuth;
1562 *rcode = kDNSFlag1_RC_NotAuth;
H A DuDNS.c802 mDNSlocal void recvSetupResponse(mDNS *const m, mDNSu8 rcode, DNSQuestion *const q, const LLQOptData *const llq) argument
804 if (rcode && rcode != kDNSFlag1_RC_NXDomain)
805 { LogMsg("ERROR: recvSetupResponse %##s (%s) - rcode && rcode != kDNSFlag1_RC_NXDomain", q->qname.c, DNSTypeName(q->qtype)); return; }
2479 mDNSlocal mStatus checkUpdateResult(mDNS *const m, const domainname *const displayname, const mDNSu8 rcode, const DNSMessage *const msg, const mDNSu8 *const end) argument
2482 if (!rcode) return mStatus_NoError;
2483 else if (rcode == kDNSFlag1_RC_YXDomain)
2488 else if (rcode == kDNSFlag1_RC_Refused)
2493 else if (rcode
3503 mDNSu8 rcode = (mDNSu8)(msg->h.flags.b[1] & kDNSFlag1_RC_Mask); local
[all...]
H A DmDNS.c6532 mDNSu8 rcode = (mDNSu8)(response->h.flags.b[1] & kDNSFlag1_RC_Mask); local
6533 mDNSBool failure = !(rcode == kDNSFlag1_RC_NoErr || rcode == kDNSFlag1_RC_NXDomain || rcode == kDNSFlag1_RC_NotAuth);
6566 LogInfo("mDNSCoreReceiveResponse: Server %p responded with code %d to query %##s (%s)", qptr->qDNSServer, rcode, q.qname.c, DNSTypeName(q.qtype));
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dtdls.c527 * @rcode: Reason code for Teardown
535 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
547 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) +
561 WPA_PUT_LE16(pos, rcode);
562 pos += sizeof(rcode);
612 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer,
618 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode,
611 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dtdls.c527 * @rcode: Reason code for Teardown
535 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
547 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) +
561 WPA_PUT_LE16(pos, rcode);
562 pos += sizeof(rcode);
612 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer,
618 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode,
611 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dtdls.c527 * @rcode: Reason code for Teardown
535 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, argument
547 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) +
561 WPA_PUT_LE16(pos, rcode);
562 pos += sizeof(rcode);
612 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer,
618 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode,
611 wpa_supplicant_verify_tdls_mic_teardown( u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, const u8 *lnkid, const struct wpa_tdls_ftie *ftie) argument
/external/mdnsresponder/mDNSShared/
H A Ddnsextd.c770 if ((reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask)) { vlogmsg = "Reply contains non-zero rcode"; goto failure; }
992 Log("SRV record registration failed with rcode %d", reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask);
1330 Log("Expiration update failed with rcode %d", reply ? reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask : -1);
1748 mDNSu8 rcode; local
1788 rcode = (mDNSu8)(reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask);
1789 if (rcode && rcode != kDNSFlag1_RC_NXDomain) { Log("AnswerQuestion: %##s type %d - non-zero rcode %d from server", e->name.c, e->type, rcode); goto end; }
2385 mDNSlocal mDNSBool IsAuthorized( DaemonInfo * d, PktMsg * pkt, DomainAuthInfo ** key, mDNSu16 * rcode, mDNSu1 argument
2569 mDNSu16 rcode; local
2712 mDNSu16 rcode; local
[all...]
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.ui.forms_3.5.2.r36_v20100702.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...

Completed in 8963 milliseconds