Home
last modified time | relevance | path

Searched refs:errinf (Results 1 – 7 of 7) sorted by relevance

/src/contrib/unbound/util/
H A Dmodule.c78 void errinf(struct module_qstate* qstate, const char* str) in errinf() function
104 if(qstate->errinf) { in errinf_ede()
105 struct errinf_strlist* q = qstate->errinf; in errinf_ede()
109 } else qstate->errinf = p; in errinf_ede()
128 errinf(qstate, buf); in errinf_origin()
145 if(!qstate->errinf) in errinf_to_str_bogus()
147 else for(s=qstate->errinf; s; s=s->next) { in errinf_to_str_bogus()
165 for(s=qstate->errinf; s; s=s->next) { in errinf_to_reason_bogus()
188 if(!qstate->errinf) in errinf_to_str_servfail()
190 else for(s=qstate->errinf; s; s=s->next) { in errinf_to_str_servfail()
[all …]
H A Dmodule.h656 struct errinf_strlist* errinf; member
832 void errinf(struct module_qstate* qstate, const char* str);
/src/contrib/unbound/iterator/
H A Diterator.c644 errinf(qstate, frm); in errinf_reply()
648 errinf(qstate, "upstream response failed scrub"); in errinf_reply()
650 errinf(qstate, "could not parse upstream response"); in errinf_reply()
652 errinf(qstate, "upstream server timeout"); in errinf_reply()
654 errinf(qstate, "no server to query"); in errinf_reply()
657 errinf(qstate, "no addresses for nameservers"); in errinf_reply()
658 else errinf(qstate, "nameserver addresses not usable"); in errinf_reply()
660 errinf(qstate, "have no nameserver names"); in errinf_reply()
662 errinf(qstate, "NS record was dnssec bogus"); in errinf_reply()
672 errinf(qstate, rcode); in errinf_reply()
[all …]
/src/contrib/unbound/ipsecmod/
H A Dipsecmod.c422 errinf(qstate, "ipsecmod: bogus IPSECKEY"); in ipsecmod_handle_query()
430 errinf(qstate, "ipsecmod: ipsecmod-hook failed"); in ipsecmod_handle_query()
503 errinf(qstate, "ipsecmod: could not generate subquery."); in ipsecmod_handle_response()
527 errinf(qstate, "ipsecmod: could not ipsecmod_new"); in ipsecmod_operate()
550 errinf(qstate, "ipsecmod: got called with event error"); in ipsecmod_operate()
561 errinf(qstate, "ipsecmod: operate got bad event"); in ipsecmod_operate()
/src/contrib/unbound/validator/
H A Dvalidator.c734 errinf(qstate, "for CNAME"); in validate_msg_signatures()
736 errinf(qstate, "for DNAME"); in validate_msg_signatures()
855 errinf(qstate, "max validation suspends reached, " in validate_suspend_setup_timer()
1965 errinf(qstate, "because of a previous"); in processInit()
1966 errinf(qstate, key_entry_get_reason(vq->key_entry)); in processInit()
2256 qstate->errinf = NULL; in processValidate()
2381 errinf(qstate, "wildcard"); in processValidate()
2382 else errinf(qstate, val_classification_to_string(subtype)); in processValidate()
2383 errinf(qstate, "proof failed"); in processValidate()
2485 qstate->errinf = NULL; in processFinished()
[all …]
H A Dautotrust.h209 enum sec_status sec, char* errinf, int was_ratelimited);
/src/contrib/unbound/doc/
H A DChangelog9543 Also the errinf is public in module_qstate (for other modules).