Lines Matching refs:ssl_printf

200 static int ssl_printf(RES* res, const char* format, ...)
768 ssl_printf(RES* ssl, const char* format, ...) in ssl_printf() function
845 (void)ssl_printf(ssl, "ok\n"); in send_ok()
861 (void)ssl_printf(ssl, "error cannot parse zone name '%s'\n", arg); in get_zone_arg()
868 (void)ssl_printf(ssl, "error zone %s not configured\n", arg); in get_zone_arg()
935 (void)ssl_printf(ssl, "error zone does not have notify\n"); in do_notify()
961 (void)ssl_printf(ssl, "error zone not slave\n"); in do_transfer()
967 (void)ssl_printf(ssl, "ok, %lu zones\n", (unsigned long)xfrd->zones->count); in do_transfer()
1002 (void)ssl_printf(ssl, "error zone not slave\n"); in do_force_transfer()
1008 (void)ssl_printf(ssl, "ok, %lu zones\n", (unsigned long)xfrd->zones->count); in do_force_transfer()
1016 if(!ssl_printf(ssl, " %s: \"%u since %s\"\n", str, in print_soa_status()
1020 if(!ssl_printf(ssl, " %s: none\n", str)) in print_soa_status()
1034 if(!ssl_printf(ssl, "zone: %s\n", zo->name)) in print_zonestatus()
1037 if(!ssl_printf(ssl, " pattern: %s\n", zo->pattern->pname)) in print_zonestatus()
1042 if(!ssl_printf(ssl, " notify: \"waiting-for-fd\"\n")) in print_zonestatus()
1046 if(!ssl_printf(ssl, " notify: \"send")) in print_zonestatus()
1050 if(!ssl_printf(ssl, " %s", in print_zonestatus()
1054 if(!ssl_printf(ssl, " with serial %u\"\n", in print_zonestatus()
1060 if(!ssl_printf(ssl, " state: master\n")) in print_zonestatus()
1064 if(!ssl_printf(ssl, " state: %s\n", in print_zonestatus()
1079 if(!ssl_printf(ssl, "\twait: \"%lu sec between attempts\"\n", in print_zonestatus()
1086 if(!ssl_printf(ssl, " transfer: \"waiting-for-UDP-fd\"\n")) in print_zonestatus()
1089 if(!ssl_printf(ssl, " transfer: \"sent UDP to %s\"\n", in print_zonestatus()
1096 if(!ssl_printf(ssl, " transfer: \"waiting-for-TCP-fd\"\n")) in print_zonestatus()
1099 if(!ssl_printf(ssl, " transfer: \"TCP connected to %s\"\n", in print_zonestatus()
1130 (void)ssl_printf(ssl, "verbosity %d\n", verbosity); in do_verbosity()
1134 (void)ssl_printf(ssl, "error in verbosity number syntax: %s\n", str); in do_verbosity()
1158 (void)ssl_printf(ssl, "error could not find next argument " in find_arg2()
1190 if(!ssl_printf(ssl, "version: %s\n", PACKAGE_VERSION)) in do_status()
1192 if(!ssl_printf(ssl, "verbosity: %d\n", verbosity)) in do_status()
1195 if(!ssl_printf(ssl, "ratelimit: %d\n", in do_status()
1211 (void)ssl_printf(ssl, "error no stats enabled at compile time\n"); in do_stats()
1249 (void)ssl_printf(ssl, "error pattern %s does not exist\n", in perform_changezone()
1256 (void)ssl_printf(ssl, "error cannot parse zone name\n"); in perform_changezone()
1263 (void)ssl_printf(ssl, "error zone defined in nsd.conf, " in perform_changezone()
1287 (void)ssl_printf(ssl, "zone %s did not exist, creating", arg); in perform_changezone()
1296 (void)ssl_printf(ssl, "error could not add zonelist entry\n"); in perform_changezone()
1334 (void)ssl_printf(ssl, "error pattern %s does not exist\n", in perform_addzone()
1341 (void)ssl_printf(ssl, "error cannot parse zone name\n"); in perform_addzone()
1349 (void)ssl_printf(ssl, "zone %s already exists\n", arg); in perform_addzone()
1359 (void)ssl_printf(ssl, "error could not add zonelist entry\n"); in perform_addzone()
1386 (void)ssl_printf(ssl, "error cannot parse zone name\n"); in perform_delzone()
1396 (void)ssl_printf(ssl, "warning zone %s not present\n", arg); in perform_delzone()
1404 (void)ssl_printf(ssl, "error zone defined in nsd.conf, " in perform_delzone()
1463 if(!ssl_printf(ssl, "error for input line '%s'\n", in do_addzones()
1467 if(!ssl_printf(ssl, "added: %s\n", buf)) in do_addzones()
1472 (void)ssl_printf(ssl, "added %d zones\n", num); in do_addzones()
1485 if(!ssl_printf(ssl, "error for input line '%s'\n", in do_delzones()
1489 if(!ssl_printf(ssl, "removed: %s\n", buf)) in do_delzones()
1494 (void)ssl_printf(ssl, "deleted %d zones\n", num); in do_delzones()
1857 if(!ssl_printf(*ssl, "%s", str)) in print_ssl_cfg_err()
1875 (void)ssl_printf(ssl, "error %s is not relative to %s: " in do_repattern()
1884 (void)ssl_printf(ssl, "reconfig start, read %s\n", cfgfile); in do_repattern()
1905 (void)ssl_printf(ssl, "%u\n", (unsigned)xfrd->reload_pid); in do_serverpid()
1915 …if(!ssl_printf(ssl, "key: name: \"%s\" secret: \"%s\" algorithm: %s\n", key->name, key->secret, ke… in do_print_tsig()
1922 (void)ssl_printf(ssl, "error: no such key with name: %s\n", arg); in do_print_tsig()
1925 …(void)ssl_printf(ssl, "key: name: \"%s\" secret: \"%s\" algorithm: %s\n", arg, key_opts->secret, k… in do_print_tsig()
1940 (void)ssl_printf(ssl, "error: missing argument (keyname)\n"); in do_update_tsig()
1944 (void)ssl_printf(ssl, "error: missing argument (secret)\n"); in do_update_tsig()
1949 (void)ssl_printf(ssl, "error: no such key with name: %s\n", arg); in do_update_tsig()
1954 (void)ssl_printf(ssl, "error: the secret: %s is not in b64 format\n", arg2); in do_update_tsig()
1994 (void)ssl_printf(ssl, "error: missing argument (keyname)\n"); in do_add_tsig()
2003 (void)ssl_printf(ssl, "error: missing argument (secret)\n"); in do_add_tsig()
2007 (void)ssl_printf(ssl, "error: key %s already exists\n", arg); in do_add_tsig()
2012 (void)ssl_printf(ssl, "error: the secret: %s is not in b64 format\n", arg2); in do_add_tsig()
2019 (void)ssl_printf(ssl, "error: could not parse key name: %s\n", arg); in do_add_tsig()
2024 (void)ssl_printf(ssl, "error: unknown algorithm: %s\n", algo); in do_add_tsig()
2070 (void)ssl_printf(ssl, "error: missing argument (zonename)\n"); in do_assoc_tsig()
2074 (void)ssl_printf(ssl, "error: missing argument (keyname)\n"); in do_assoc_tsig()
2081 (void)ssl_printf(ssl, "error: missing argument (zone)\n"); in do_assoc_tsig()
2086 (void)ssl_printf(ssl, "error: key: %s does not exist\n", arg2); in do_assoc_tsig()
2127 (void)ssl_printf(ssl, "error: missing argument (keyname)\n"); in do_del_tsig()
2132 (void)ssl_printf(ssl, "key %s does not exist, nothing to be deleted\n", arg); in do_del_tsig()
2142 if(!ssl_printf(ssl, "zone %s uses key %s\n", in do_del_tsig()
2151 (void)ssl_printf(ssl, "error: key: %s is in use and cannot be deleted\n", arg); in do_del_tsig()
2172 (void)ssl_printf(ssl, "unable to open cookie secret file %s: %s", in cookie_secret_file_dump()
2196 (void)ssl_printf(ssl, "error: no staging cookie secret to activate\n"); in do_activate_cookie_secret()
2200 (void)ssl_printf(ssl, "error: no cookie secret file configured\n"); in do_activate_cookie_secret()
2204 (void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n", in do_activate_cookie_secret()
2222 (void)ssl_printf(ssl, "error: can not drop the currently active cookie secret\n"); in do_drop_cookie_secret()
2226 (void)ssl_printf(ssl, "error: no cookie secret file configured\n"); in do_drop_cookie_secret()
2230 (void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n", in do_drop_cookie_secret()
2248 (void)ssl_printf(ssl, "error: missing argument (cookie_secret)\n"); in do_add_cookie_secret()
2253 (void)ssl_printf(ssl, "invalid cookie secret: invalid argument length\n"); in do_add_cookie_secret()
2254 (void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n"); in do_add_cookie_secret()
2260 (void)ssl_printf(ssl, "invalid cookie secret: parse error\n"); in do_add_cookie_secret()
2261 (void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n"); in do_add_cookie_secret()
2267 (void)ssl_printf(ssl, "error: no cookie secret file configured\n"); in do_add_cookie_secret()
2273 (void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n", in do_add_cookie_secret()
2303 (void)ssl_printf(ssl, "active : %s\n", secret_hex); in do_print_cookie_secrets()
2305 (void)ssl_printf(ssl, "staging: %s\n", secret_hex); in do_print_cookie_secrets()
2307 (void)ssl_printf(ssl, "staging[%d]: %s\n", i, secret_hex); in do_print_cookie_secrets()
2384 (void)ssl_printf(ssl, "error unknown command '%s'\n", p); in execute_cmd()
2442 (void)ssl_printf(res, "error version mismatch\n"); in handle_req()
2578 return ssl_printf(ssl, "%s%lu%6.6lu\n", desc, in print_longnum()
2581 return ssl_printf(ssl, "%s%lu\n", desc, (unsigned long)x); in print_longnum()
2599 if(!ssl_printf(ssl, "%s%snum.type.%s=%lu\n", n, d, in print_stat_block()
2608 if(!ssl_printf(ssl, "%s%snum.opcode.%s=%lu\n", n, d, in print_stat_block()
2617 if(!ssl_printf(ssl, "%s%snum.class.%s=%lu\n", n, d, in print_stat_block()
2627 if(!ssl_printf(ssl, "%s%snum.rcode.%s=%lu\n", n, d, rcstr[i], in print_stat_block()
2633 if(!ssl_printf(ssl, "%s%snum.edns=%lu\n", n, d, (unsigned long)st->edns)) in print_stat_block()
2637 if(!ssl_printf(ssl, "%s%snum.ednserr=%lu\n", n, d, in print_stat_block()
2642 if(!ssl_printf(ssl, "%s%snum.udp=%lu\n", n, d, (unsigned long)st->qudp)) in print_stat_block()
2645 if(!ssl_printf(ssl, "%s%snum.udp6=%lu\n", n, d, (unsigned long)st->qudp6)) in print_stat_block()
2648 if(!ssl_printf(ssl, "%s%snum.tcp=%lu\n", n, d, (unsigned long)st->ctcp)) in print_stat_block()
2651 if(!ssl_printf(ssl, "%s%snum.tcp6=%lu\n", n, d, (unsigned long)st->ctcp6)) in print_stat_block()
2654 if(!ssl_printf(ssl, "%s%snum.tls=%lu\n", n, d, (unsigned long)st->ctls)) in print_stat_block()
2657 if(!ssl_printf(ssl, "%s%snum.tls6=%lu\n", n, d, (unsigned long)st->ctls6)) in print_stat_block()
2661 if(!ssl_printf(ssl, "%s%snum.answer_wo_aa=%lu\n", n, d, in print_stat_block()
2666 if(!ssl_printf(ssl, "%s%snum.rxerr=%lu\n", n, d, (unsigned long)st->rxerr)) in print_stat_block()
2670 if(!ssl_printf(ssl, "%s%snum.txerr=%lu\n", n, d, (unsigned long)st->txerr)) in print_stat_block()
2674 if(!ssl_printf(ssl, "%s%snum.raxfr=%lu\n", n, d, (unsigned long)st->raxfr)) in print_stat_block()
2678 if(!ssl_printf(ssl, "%s%snum.rixfr=%lu\n", n, d, (unsigned long)st->rixfr)) in print_stat_block()
2682 if(!ssl_printf(ssl, "%s%snum.truncated=%lu\n", n, d, in print_stat_block()
2687 if(!ssl_printf(ssl, "%s%snum.dropped=%lu\n", n, d, in print_stat_block()
2749 if(!ssl_printf(ssl, "%s%snum.queries=%lu\n", name, ".", in zonestat_print()
2768 if(!ssl_printf(ssl, "server%d.queries=%lu\n", (int)i, in print_stats()
2773 if(!ssl_printf(ssl, "num.queries=%lu\n", (unsigned long)total)) in print_stats()
2779 if(!ssl_printf(ssl, "time.boot=%lu.%6.6lu\n", in print_stats()
2782 if(!ssl_printf(ssl, "time.elapsed=%lu.%6.6lu\n", in print_stats()
2802 if(!ssl_printf(ssl, "zone.master=%lu\n", in print_stats()
2805 if(!ssl_printf(ssl, "zone.slave=%lu\n", (unsigned long)xfrd->zones->count)) in print_stats()