Searched refs:errinf (Results 1 – 7 of 7) sorted by relevance
/freebsd/contrib/unbound/util/ |
H A D | module.c | 78 void errinf(struct module_qstate* qstate, const char* str) in errinf() function 104 if(qstate->errinf) { in errinf_ede() 105 struct errinf_strlist* q = qstate->errinf; in errinf_ede() 109 } else qstate->errinf = p; in errinf_ede() 128 errinf(qstate, buf); in errinf_origin() 145 if(!qstate->errinf) in errinf_to_str_bogus() 147 else for(s=qstate->errinf; s; s=s->next) { in errinf_to_str_bogus() 165 for(s=qstate->errinf; s; s=s->next) { in errinf_to_reason_bogus() 188 if(!qstate->errinf) in errinf_to_str_servfail() 190 else for(s=qstate->errinf; s; s=s->next) { in errinf_to_str_servfail() [all …]
|
H A D | module.h | 651 struct errinf_strlist* errinf; member 827 void errinf(struct module_qstate* qstate, const char* str);
|
/freebsd/contrib/unbound/iterator/ |
H A D | iterator.c | 655 errinf(qstate, frm); in errinf_reply() 659 errinf(qstate, "upstream response failed scrub"); in errinf_reply() 661 errinf(qstate, "could not parse upstream response"); in errinf_reply() 663 errinf(qstate, "upstream server timeout"); in errinf_reply() 665 errinf(qstate, "no server to query"); in errinf_reply() 668 errinf(qstate, "no addresses for nameservers"); in errinf_reply() 669 else errinf(qstate, "nameserver addresses not usable"); in errinf_reply() 671 errinf(qstate, "have no nameserver names"); in errinf_reply() 673 errinf(qstate, "NS record was dnssec bogus"); in errinf_reply() 683 errinf(qstate, rcode); in errinf_reply() [all …]
|
/freebsd/contrib/unbound/ipsecmod/ |
H A D | ipsecmod.c | 422 errinf(qstate, "ipsecmod: bogus IPSECKEY"); in ipsecmod_handle_query() 430 errinf(qstate, "ipsecmod: ipsecmod-hook failed"); in ipsecmod_handle_query() 502 errinf(qstate, "ipsecmod: could not generate subquery."); in ipsecmod_handle_response() 526 errinf(qstate, "ipsecmod: could not ipsecmod_new"); in ipsecmod_operate() 549 errinf(qstate, "ipsecmod: got called with event error"); in ipsecmod_operate() 560 errinf(qstate, "ipsecmod: operate got bad event"); in ipsecmod_operate()
|
/freebsd/contrib/unbound/validator/ |
H A D | validator.c | 696 errinf(qstate, "for CNAME"); in validate_msg_signatures() 698 errinf(qstate, "for DNAME"); in validate_msg_signatures() 817 errinf(qstate, "max validation suspends reached, " in validate_suspend_setup_timer() 1927 errinf(qstate, "because of a previous"); in processInit() 1928 errinf(qstate, key_entry_get_reason(vq->key_entry)); in processInit() 2218 qstate->errinf = NULL; in processValidate() 2343 errinf(qstate, "wildcard"); in processValidate() 2344 else errinf(qstate, val_classification_to_string(subtype)); in processValidate() 2345 errinf(qstate, "proof failed"); in processValidate() 2447 qstate->errinf = NULL; in processFinished() [all …]
|
H A D | autotrust.h | 209 enum sec_status sec, char* errinf, int was_ratelimited);
|
/freebsd/contrib/unbound/doc/ |
H A D | Changelog | 9011 Also the errinf is public in module_qstate (for other modules).
|