/netbsd-current/external/bsd/unbound/dist/libunbound/ |
H A D | worker.h | 71 * @param was_ratelimited: it will signal back if the query failed to pass the 81 struct module_qstate* q, int* was_ratelimited); 93 enum sec_status s, char* why_bogus, int was_ratelimited); 97 enum sec_status s, char* why_bogus, int was_ratelimited); 101 enum sec_status s, char* why_bogus, int was_ratelimited); 127 * @param was_ratelimited: it will signal back if the query failed to pass the 137 struct module_qstate* q, int* was_ratelimited);
|
H A D | libworker.c | 555 enum sec_status s, char* why_bogus, int was_ratelimited) 557 q->res->was_ratelimited = was_ratelimited; 581 char* why_bogus, int was_ratelimited) 587 libworker_fillup_fg(q, rcode, buf, s, why_bogus, was_ratelimited); 673 enum sec_status s, char* why_bogus, int was_ratelimited) 696 (buf?(int)sldns_buffer_limit(buf):0), sec, why_bogus, was_ratelimited); 749 int err, char* reason, int was_ratelimited) 763 q->res->was_ratelimited = was_ratelimited; 554 libworker_fillup_fg(struct ctx_query* q, int rcode, sldns_buffer* buf, enum sec_status s, char* why_bogus, int was_ratelimited) argument 580 libworker_fg_done_cb(void* arg, int rcode, sldns_buffer* buf, enum sec_status s, char* why_bogus, int was_ratelimited) argument 672 libworker_event_done_cb(void* arg, int rcode, sldns_buffer* buf, enum sec_status s, char* why_bogus, int was_ratelimited) argument 748 add_bg_result(struct libworker* w, struct ctx_query* q, sldns_buffer* pkt, int err, char* reason, int was_ratelimited) argument 797 libworker_bg_done_cb(void* arg, int rcode, sldns_buffer* buf, enum sec_status s, char* why_bogus, int was_ratelimited) argument 888 libworker_send_query(struct query_info* qinfo, uint16_t flags, int dnssec, int want_dnssec, int nocaps, int check_ratelimit, struct sockaddr_storage* addr, socklen_t addrlen, uint8_t* zone, size_t zonelen, int tcp_upstream, int ssl_upstream, char* tls_auth_name, struct module_qstate* q, int* was_ratelimited) argument [all...] |
H A D | unbound.h | 211 int was_ratelimited; member in struct:ub_result
|
H A D | context.c | 312 * o uint32 was_ratelimited 329 sldns_write_uint32(p+4*sizeof(uint32_t), (uint32_t)q->res->was_ratelimited); 354 q->res->was_ratelimited = (int)sldns_read_uint32(p+4*sizeof(uint32_t));
|
/netbsd-current/external/bsd/unbound/dist/smallapp/ |
H A D | worker_cb.c | 105 int* ATTR_UNUSED(was_ratelimited)) 139 int* ATTR_UNUSED(was_ratelimited)) 162 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited)) 169 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited)) 176 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
|
/netbsd-current/external/bsd/unbound/dist/validator/ |
H A D | autotrust.h | 209 enum sec_status sec, char* errinf, int was_ratelimited);
|
H A D | autotrust.c | 2334 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
|
/netbsd-current/external/bsd/unbound/dist/services/ |
H A D | authzone.h | 694 int was_ratelimited); 698 int was_ratelimited); 778 int was_ratelimited);
|
H A D | mesh.h | 242 * was_ratelimited); 245 enum sec_status, char* why_bogus, int was_ratelimited); 262 * called as cb(cb_arg, rcode, buf, sec_state, why_bogus, was_ratelimited);
|
H A D | outside_network.h | 654 * @param was_ratelimited: it will signal back if the query failed to pass the 665 struct sldns_buffer* buff, struct module_env* env, int* was_ratelimited);
|
H A D | mesh.c | 882 mstate->s.was_ratelimited = 0; 1166 int was_ratelimited = m->s.was_ratelimited; local 1192 was_ratelimited); 1217 reason, was_ratelimited);
|
H A D | outside_network.c | 3395 sldns_buffer* buff, struct module_env* env, int* was_ratelimited) 3455 *was_ratelimited = 1; 3389 outnet_serviced_query(struct outside_network* outnet, struct query_info* qinfo, uint16_t flags, int dnssec, int want_dnssec, int nocaps, int check_ratelimit, int tcp_upstream, int ssl_upstream, char* tls_auth_name, struct sockaddr_storage* addr, socklen_t addrlen, uint8_t* zone, size_t zonelen, struct module_qstate* qstate, comm_point_callback_type* callback, void* callback_arg, sldns_buffer* buff, struct module_env* env, int* was_ratelimited) argument
|
H A D | authzone.c | 5666 int ATTR_UNUSED(was_ratelimited)) 6729 int ATTR_UNUSED(was_ratelimited)) 8224 enum sec_status sec, char* why_bogus, int ATTR_UNUSED(was_ratelimited))
|
/netbsd-current/external/bsd/unbound/dist/util/ |
H A D | fptr_wlist.h | 217 int* was_ratelimited));
|
H A D | module.h | 372 * @param was_ratelimited: it will signal back if the query failed to pass the 384 char* tls_auth_name, struct module_qstate* q, int* was_ratelimited); 673 int was_ratelimited; member in struct:module_qstate
|
H A D | module.c | 410 /* Overwrite super's was_ratelimited only when it was not set */ 411 if(!super->was_ratelimited) { 412 super->was_ratelimited = qstate->was_ratelimited;
|
H A D | fptr_wlist.c | 345 int* was_ratelimited)) 340 fptr_whitelist_modenv_send_query(struct outbound_entry* (*fptr)( struct query_info* qinfo, uint16_t flags, int dnssec, int want_dnssec, int nocaps, int check_ratelimit, struct sockaddr_storage* addr, socklen_t addrlen, uint8_t* zone, size_t zonelen, int tcp_upstream, int ssl_upstream, char* tls_auth_name, struct module_qstate* q, int* was_ratelimited)) argument
|
/netbsd-current/external/bsd/unbound/dist/testdata/pylib.tdir/ |
H A D | pylib.lookup.py | 41 data['was_ratelimited'] = result.was_ratelimited 94 if bool(cb_data.get('was_ratelimited')) ^ bool(cb_data2.get('was_ratelimited')):
|
/netbsd-current/external/bsd/unbound/dist/dnstap/ |
H A D | unbound-dnstap-socket.c | 1438 struct module_qstate* ATTR_UNUSED(q), int* ATTR_UNUSED(was_ratelimited)) 1472 struct module_qstate* ATTR_UNUSED(q), int* ATTR_UNUSED(was_ratelimited)) 1495 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited)) 1502 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited)) 1509 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
|
/netbsd-current/external/bsd/unbound/dist/daemon/ |
H A D | worker.c | 2387 struct module_qstate* q, int* was_ratelimited) 2399 was_ratelimited); 2448 struct module_qstate* ATTR_UNUSED(q), int* ATTR_UNUSED(was_ratelimited)) 2471 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited)) 2478 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited)) 2485 char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited)) 2383 worker_send_query(struct query_info* qinfo, uint16_t flags, int dnssec, int want_dnssec, int nocaps, int check_ratelimit, struct sockaddr_storage* addr, socklen_t addrlen, uint8_t* zone, size_t zonelen, int tcp_upstream, int ssl_upstream, char* tls_auth_name, struct module_qstate* q, int* was_ratelimited) argument
|
/netbsd-current/external/bsd/unbound/dist/testcode/ |
H A D | fake_event.c | 1185 struct module_env* env, int* ATTR_UNUSED(was_ratelimited))
|
/netbsd-current/external/bsd/unbound/dist/pythonmod/ |
H A D | interface.i | 732 char* tls_auth_name, struct module_qstate* q, int* was_ratelimited);
|
/netbsd-current/external/bsd/unbound/dist/iterator/ |
H A D | iterator.c | 2927 qstate->was_ratelimited = 1;
|