/external/dnsmasq/contrib/try-all-ns/ |
D | dnsmasq-2.47_no_nxdomain_until_end.patch | 9 + if ( (header->rcode == NXDOMAIN) && ((daemon->options & OPT_ORDER) != 0) && (server->next != NUL… 10 + header->rcode = SERVFAIL; 12 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) &&
|
D | dnsmasq-2.35-try-all-ns.patch | 21 + && header->rcode == NXDOMAIN ) header->rcode = SERVFAIL; 23 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) && forward->forwardall == 0)
|
/external/toybox/toys/pending/ |
D | host.c | 71 i, j, ret, sec, count, rcode, qlen, alen, pllen = 0; in host_main() local 136 rcode = abuf[3] & 15; in host_main() 140 rcode, rct[rcode], 256*abuf[6] + abuf[7]); in host_main() 144 if (rcode) error_exit("Host not found."); in host_main() 213 toys.exitval = rcode; in host_main()
|
/external/dnsmasq/src/ |
D | forward.c | 413 if (header->opcode != QUERY || (header->rcode != NOERROR && header->rcode != NXDOMAIN)) in process_reply() 417 if (!header->ra && header->rcode == NOERROR && ntohs(header->ancount) == 0 && in process_reply() 426 if (daemon->bogus_addr && header->rcode != NXDOMAIN && in process_reply() 430 header->rcode = NXDOMAIN; in process_reply() 435 if (header->rcode == NXDOMAIN && in process_reply() 444 header->rcode = NOERROR; in process_reply() 508 if ((header->rcode == SERVFAIL || header->rcode == REFUSED) && in reply_query() 536 if (header->rcode == SERVFAIL || header->rcode == REFUSED) in reply_query() 560 (header->rcode != REFUSED && header->rcode != SERVFAIL)) in reply_query()
|
D | nameser.h | 297 unsigned rcode :4; /* response code */ member 307 unsigned rcode :4; /* response code */ member
|
D | rfc1035.c | 662 int flags = header->rcode == NXDOMAIN ? F_NXDOMAIN : 0; in extract_addresses() 913 header->rcode = SERVFAIL; /* couldn't get memory */ in setup_reply() 915 header->rcode = NOERROR; /* empty domain */ in setup_reply() 917 header->rcode = NXDOMAIN; in setup_reply() 920 header->rcode = NOERROR; in setup_reply() 928 header->rcode = NOERROR; in setup_reply() 935 header->rcode = REFUSED; in setup_reply() 1592 header->rcode = NXDOMAIN; in answer_request() 1594 header->rcode = NOERROR; /* no error */ in answer_request()
|
/external/kernel-headers/original/uapi/linux/ |
D | firewire-cdev.h | 119 __u32 rcode; member 350 __u32 rcode; member 528 __u32 rcode; member
|
/external/libpcap/Win32/Include/arpa/ |
D | nameser.h | 265 unsigned rcode :4; /* response code */ member 275 unsigned rcode :4; /* response code */ member
|
/external/llvm/test/Transforms/Inline/ |
D | devirtualize-3.ll | 28 define internal void @quit(%struct.cont_t* %cont, i32 %rcode) nounwind ssp { 30 call void @exit(i32 %rcode) noreturn
|
/external/mdnsresponder/mDNSShared/ |
D | dnsextd.c | 1748 mDNSu8 rcode; in AnswerQuestion() local 1788 rcode = (mDNSu8)(reply->msg.h.flags.b[1] & kDNSFlag1_RC_Mask); in AnswerQuestion() 1789 …if (rcode && rcode != kDNSFlag1_RC_NXDomain) { Log("AnswerQuestion: %##s type %d - non-zero rcode … in AnswerQuestion() 2385 …Authorized( DaemonInfo * d, PktMsg * pkt, DomainAuthInfo ** key, mDNSu16 * rcode, mDNSu16 * tcode ) in IsAuthorized() argument 2467 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized() 2487 *rcode = kDNSFlag1_RC_NotAuth; in IsAuthorized() 2501 ok = DNSDigest_VerifyMessage( &pkt->msg, ( mDNSu8* ) lastPtr, &lcr, (*key), rcode, tcode ); in IsAuthorized() 2569 mDNSu16 rcode; in RecvUDPMessage() local 2602 else if ( IsAuthorized( context->d, &context->pkt, &key, &rcode, &tcode ) ) in RecvUDPMessage() 2712 mDNSu16 rcode; in RecvTCPMessage() local [all …]
|
/external/tcpdump/ |
D | print-smb.c | 1093 int name_trn_id, response, opcode, nm_flags, rcode; in nbt_udp137_print() local 1104 rcode = data[3] & 0xF; in nbt_udp137_print() 1131 if (rcode) in nbt_udp137_print() 1151 name_trn_id, opcode, nm_flags, rcode, qdcount, ancount, nscount, in nbt_udp137_print()
|
/external/valgrind/VEX/priv/ |
D | main_main.c | 351 HInstrArray* rcode; in LibVEX_Translate() local 1038 rcode = doRegisterAllocation ( vcode, rRegUniv, in LibVEX_Translate() 1050 for (i = 0; i < rcode->arr_used; i++) { in LibVEX_Translate() 1052 ppInstr(rcode->arr[i], mode64); in LibVEX_Translate() 1073 for (i = 0; i < rcode->arr_used; i++) { in LibVEX_Translate() 1074 HInstr* hi = rcode->arr[i]; in LibVEX_Translate()
|
/external/mdnsresponder/mDNSCore/ |
D | DNSDigest.c | 1431 … *msg, mDNSu8 *end, LargeCacheRecord * lcr, DomainAuthInfo *info, mDNSu16 * rcode, mDNSu16 * tcode) in DNSDigest_VerifyMessage() argument 1454 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1468 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1494 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage() 1562 *rcode = kDNSFlag1_RC_NotAuth; in DNSDigest_VerifyMessage()
|
D | uDNS.c | 802 mDNSlocal void recvSetupResponse(mDNS *const m, mDNSu8 rcode, DNSQuestion *const q, const LLQOptDat… in recvSetupResponse() argument 804 if (rcode && rcode != kDNSFlag1_RC_NXDomain) in recvSetupResponse() 2479 …teResult(mDNS *const m, const domainname *const displayname, const mDNSu8 rcode, const DNSMessage … in checkUpdateResult() argument 2482 if (!rcode) return mStatus_NoError; in checkUpdateResult() 2483 else if (rcode == kDNSFlag1_RC_YXDomain) in checkUpdateResult() 2488 else if (rcode == kDNSFlag1_RC_Refused) in checkUpdateResult() 2493 else if (rcode == kDNSFlag1_RC_NXRRSet) in checkUpdateResult() 2498 else if (rcode == kDNSFlag1_RC_NotAuth) in checkUpdateResult() 2509 else if (rcode == kDNSFlag1_RC_FormErr) in checkUpdateResult() 2521 LogMsg("Update %##s failed with rcode %d", displayname->c, rcode); in checkUpdateResult() [all …]
|
D | mDNSEmbeddedAPI.h | 2506 …e *msg, mDNSu8 *end, LargeCacheRecord *tsig, DomainAuthInfo *info, mDNSu16 *rcode, mDNSu16 *tcode);
|
D | mDNS.c | 6532 mDNSu8 rcode = (mDNSu8)(response->h.flags.b[1] & kDNSFlag1_RC_Mask); in mDNSCoreReceiveResponse() local 6533 …mDNSBool failure = !(rcode == kDNSFlag1_RC_NoErr || rcode == kDNSFlag1_RC_NXDomain || rcode == kDN… in mDNSCoreReceiveResponse() 6566 …: Server %p responded with code %d to query %##s (%s)", qptr->qDNSServer, rcode, q.qname.c, DNSTyp… in mDNSCoreReceiveResponse()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 516 static int wpa_tdls_key_mic_teardown(const u8 *kck, u8 trans_seq, u16 rcode, in wpa_tdls_key_mic_teardown() argument 528 len = 2 + lnkid[1] + sizeof(rcode) + sizeof(dtoken) + in wpa_tdls_key_mic_teardown() 542 WPA_PUT_LE16(pos, rcode); in wpa_tdls_key_mic_teardown() 543 pos += sizeof(rcode); in wpa_tdls_key_mic_teardown() 593 u8 trans_seq, u16 rcode, u8 dtoken, struct wpa_tdls_peer *peer, in wpa_supplicant_verify_tdls_mic_teardown() argument 599 wpa_tdls_key_mic_teardown(peer->tpk.kck, trans_seq, rcode, in wpa_supplicant_verify_tdls_mic_teardown()
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
D | org.eclipse.ui.forms_3.5.2.r36_v20100702.jar | META-INF/MANIFEST.MF
META-INF/ECLIPSEF.SF
META-INF/ECLIPSEF ... |