Searched refs:errinf (Results 1 – 7 of 7) sorted by relevance
| /src/contrib/unbound/util/ |
| H A D | module.c | 78 void errinf(struct module_qstate* qstate, const char* str) in errinf() function 104 if(qstate->errinf) { in errinf_ede() 105 struct errinf_strlist* q = qstate->errinf; in errinf_ede() 109 } else qstate->errinf = p; in errinf_ede() 128 errinf(qstate, buf); in errinf_origin() 145 if(!qstate->errinf) in errinf_to_str_bogus() 147 else for(s=qstate->errinf; s; s=s->next) { in errinf_to_str_bogus() 165 for(s=qstate->errinf; s; s=s->next) { in errinf_to_reason_bogus() 188 if(!qstate->errinf) in errinf_to_str_servfail() 190 else for(s=qstate->errinf; s; s=s->next) { in errinf_to_str_servfail() [all …]
|
| H A D | module.h | 656 struct errinf_strlist* errinf; member 832 void errinf(struct module_qstate* qstate, const char* str);
|
| /src/contrib/unbound/iterator/ |
| H A D | iterator.c | 644 errinf(qstate, frm); in errinf_reply() 648 errinf(qstate, "upstream response failed scrub"); in errinf_reply() 650 errinf(qstate, "could not parse upstream response"); in errinf_reply() 652 errinf(qstate, "upstream server timeout"); in errinf_reply() 654 errinf(qstate, "no server to query"); in errinf_reply() 657 errinf(qstate, "no addresses for nameservers"); in errinf_reply() 658 else errinf(qstate, "nameserver addresses not usable"); in errinf_reply() 660 errinf(qstate, "have no nameserver names"); in errinf_reply() 662 errinf(qstate, "NS record was dnssec bogus"); in errinf_reply() 672 errinf(qstate, rcode); in errinf_reply() [all …]
|
| /src/contrib/unbound/ipsecmod/ |
| H A D | ipsecmod.c | 422 errinf(qstate, "ipsecmod: bogus IPSECKEY"); in ipsecmod_handle_query() 430 errinf(qstate, "ipsecmod: ipsecmod-hook failed"); in ipsecmod_handle_query() 503 errinf(qstate, "ipsecmod: could not generate subquery."); in ipsecmod_handle_response() 527 errinf(qstate, "ipsecmod: could not ipsecmod_new"); in ipsecmod_operate() 550 errinf(qstate, "ipsecmod: got called with event error"); in ipsecmod_operate() 561 errinf(qstate, "ipsecmod: operate got bad event"); in ipsecmod_operate()
|
| /src/contrib/unbound/validator/ |
| H A D | validator.c | 734 errinf(qstate, "for CNAME"); in validate_msg_signatures() 736 errinf(qstate, "for DNAME"); in validate_msg_signatures() 855 errinf(qstate, "max validation suspends reached, " in validate_suspend_setup_timer() 1965 errinf(qstate, "because of a previous"); in processInit() 1966 errinf(qstate, key_entry_get_reason(vq->key_entry)); in processInit() 2256 qstate->errinf = NULL; in processValidate() 2381 errinf(qstate, "wildcard"); in processValidate() 2382 else errinf(qstate, val_classification_to_string(subtype)); in processValidate() 2383 errinf(qstate, "proof failed"); in processValidate() 2485 qstate->errinf = NULL; in processFinished() [all …]
|
| H A D | autotrust.h | 209 enum sec_status sec, char* errinf, int was_ratelimited);
|
| /src/contrib/unbound/doc/ |
| H A D | Changelog | 9543 Also the errinf is public in module_qstate (for other modules).
|