Searched refs:was_ratelimited (Results 1 - 23 of 23) sorted by relevance

/netbsd-current/external/bsd/unbound/dist/libunbound/
H A Dworker.h71 * @param was_ratelimited: it will signal back if the query failed to pass the
81 struct module_qstate* q, int* was_ratelimited);
93 enum sec_status s, char* why_bogus, int was_ratelimited);
97 enum sec_status s, char* why_bogus, int was_ratelimited);
101 enum sec_status s, char* why_bogus, int was_ratelimited);
127 * @param was_ratelimited: it will signal back if the query failed to pass the
137 struct module_qstate* q, int* was_ratelimited);
H A Dlibworker.c555 enum sec_status s, char* why_bogus, int was_ratelimited)
557 q->res->was_ratelimited = was_ratelimited;
581 char* why_bogus, int was_ratelimited)
587 libworker_fillup_fg(q, rcode, buf, s, why_bogus, was_ratelimited);
673 enum sec_status s, char* why_bogus, int was_ratelimited)
696 (buf?(int)sldns_buffer_limit(buf):0), sec, why_bogus, was_ratelimited);
749 int err, char* reason, int was_ratelimited)
763 q->res->was_ratelimited = was_ratelimited;
554 libworker_fillup_fg(struct ctx_query* q, int rcode, sldns_buffer* buf, enum sec_status s, char* why_bogus, int was_ratelimited) argument
580 libworker_fg_done_cb(void* arg, int rcode, sldns_buffer* buf, enum sec_status s, char* why_bogus, int was_ratelimited) argument
672 libworker_event_done_cb(void* arg, int rcode, sldns_buffer* buf, enum sec_status s, char* why_bogus, int was_ratelimited) argument
748 add_bg_result(struct libworker* w, struct ctx_query* q, sldns_buffer* pkt, int err, char* reason, int was_ratelimited) argument
797 libworker_bg_done_cb(void* arg, int rcode, sldns_buffer* buf, enum sec_status s, char* why_bogus, int was_ratelimited) argument
888 libworker_send_query(struct query_info* qinfo, uint16_t flags, int dnssec, int want_dnssec, int nocaps, int check_ratelimit, struct sockaddr_storage* addr, socklen_t addrlen, uint8_t* zone, size_t zonelen, int tcp_upstream, int ssl_upstream, char* tls_auth_name, struct module_qstate* q, int* was_ratelimited) argument
[all...]
H A Dunbound.h211 int was_ratelimited; member in struct:ub_result
H A Dcontext.c312 * o uint32 was_ratelimited
329 sldns_write_uint32(p+4*sizeof(uint32_t), (uint32_t)q->res->was_ratelimited);
354 q->res->was_ratelimited = (int)sldns_read_uint32(p+4*sizeof(uint32_t));
/netbsd-current/external/bsd/unbound/dist/smallapp/
H A Dworker_cb.c105 int* ATTR_UNUSED(was_ratelimited))
139 int* ATTR_UNUSED(was_ratelimited))
162 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
169 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
176 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
/netbsd-current/external/bsd/unbound/dist/validator/
H A Dautotrust.h209 enum sec_status sec, char* errinf, int was_ratelimited);
H A Dautotrust.c2334 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
/netbsd-current/external/bsd/unbound/dist/services/
H A Dauthzone.h694 int was_ratelimited);
698 int was_ratelimited);
778 int was_ratelimited);
H A Dmesh.h242 * was_ratelimited);
245 enum sec_status, char* why_bogus, int was_ratelimited);
262 * called as cb(cb_arg, rcode, buf, sec_state, why_bogus, was_ratelimited);
H A Doutside_network.h654 * @param was_ratelimited: it will signal back if the query failed to pass the
665 struct sldns_buffer* buff, struct module_env* env, int* was_ratelimited);
H A Dmesh.c882 mstate->s.was_ratelimited = 0;
1166 int was_ratelimited = m->s.was_ratelimited; local
1192 was_ratelimited);
1217 reason, was_ratelimited);
H A Doutside_network.c3395 sldns_buffer* buff, struct module_env* env, int* was_ratelimited)
3455 *was_ratelimited = 1;
3389 outnet_serviced_query(struct outside_network* outnet, struct query_info* qinfo, uint16_t flags, int dnssec, int want_dnssec, int nocaps, int check_ratelimit, int tcp_upstream, int ssl_upstream, char* tls_auth_name, struct sockaddr_storage* addr, socklen_t addrlen, uint8_t* zone, size_t zonelen, struct module_qstate* qstate, comm_point_callback_type* callback, void* callback_arg, sldns_buffer* buff, struct module_env* env, int* was_ratelimited) argument
H A Dauthzone.c5666 int ATTR_UNUSED(was_ratelimited))
6729 int ATTR_UNUSED(was_ratelimited))
8224 enum sec_status sec, char* why_bogus, int ATTR_UNUSED(was_ratelimited))
/netbsd-current/external/bsd/unbound/dist/util/
H A Dfptr_wlist.h217 int* was_ratelimited));
H A Dmodule.h372 * @param was_ratelimited: it will signal back if the query failed to pass the
384 char* tls_auth_name, struct module_qstate* q, int* was_ratelimited);
673 int was_ratelimited; member in struct:module_qstate
H A Dmodule.c410 /* Overwrite super's was_ratelimited only when it was not set */
411 if(!super->was_ratelimited) {
412 super->was_ratelimited = qstate->was_ratelimited;
H A Dfptr_wlist.c345 int* was_ratelimited))
340 fptr_whitelist_modenv_send_query(struct outbound_entry* (*fptr)( struct query_info* qinfo, uint16_t flags, int dnssec, int want_dnssec, int nocaps, int check_ratelimit, struct sockaddr_storage* addr, socklen_t addrlen, uint8_t* zone, size_t zonelen, int tcp_upstream, int ssl_upstream, char* tls_auth_name, struct module_qstate* q, int* was_ratelimited)) argument
/netbsd-current/external/bsd/unbound/dist/testdata/pylib.tdir/
H A Dpylib.lookup.py41 data['was_ratelimited'] = result.was_ratelimited
94 if bool(cb_data.get('was_ratelimited')) ^ bool(cb_data2.get('was_ratelimited')):
/netbsd-current/external/bsd/unbound/dist/dnstap/
H A Dunbound-dnstap-socket.c1438 struct module_qstate* ATTR_UNUSED(q), int* ATTR_UNUSED(was_ratelimited))
1472 struct module_qstate* ATTR_UNUSED(q), int* ATTR_UNUSED(was_ratelimited))
1495 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
1502 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
1509 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
/netbsd-current/external/bsd/unbound/dist/daemon/
H A Dworker.c2387 struct module_qstate* q, int* was_ratelimited)
2399 was_ratelimited);
2448 struct module_qstate* ATTR_UNUSED(q), int* ATTR_UNUSED(was_ratelimited))
2471 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
2478 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
2485 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
2383 worker_send_query(struct query_info* qinfo, uint16_t flags, int dnssec, int want_dnssec, int nocaps, int check_ratelimit, struct sockaddr_storage* addr, socklen_t addrlen, uint8_t* zone, size_t zonelen, int tcp_upstream, int ssl_upstream, char* tls_auth_name, struct module_qstate* q, int* was_ratelimited) argument
/netbsd-current/external/bsd/unbound/dist/testcode/
H A Dfake_event.c1185 struct module_env* env, int* ATTR_UNUSED(was_ratelimited))
/netbsd-current/external/bsd/unbound/dist/pythonmod/
H A Dinterface.i732 char* tls_auth_name, struct module_qstate* q, int* was_ratelimited);
/netbsd-current/external/bsd/unbound/dist/iterator/
H A Diterator.c2927 qstate->was_ratelimited = 1;

Completed in 379 milliseconds