Lines Matching refs:ssl_printf
562 int ssl_printf(RES* ssl, const char* format, ...) in ssl_printf() function
633 (void)ssl_printf(ssl, "ok\n"); in send_ok()
661 ssl_printf(ssl, "error in verbosity number syntax: %s\n", str); in do_verbosity()
673 if(!ssl_printf(ssl, "%s.num.queries"SQ"%lu\n", nm, in print_stats()
675 if(!ssl_printf(ssl, "%s.num.queries_ip_ratelimited"SQ"%lu\n", nm, in print_stats()
677 if(!ssl_printf(ssl, "%s.num.queries_cookie_valid"SQ"%lu\n", nm, in print_stats()
679 if(!ssl_printf(ssl, "%s.num.queries_cookie_client"SQ"%lu\n", nm, in print_stats()
681 if(!ssl_printf(ssl, "%s.num.queries_cookie_invalid"SQ"%lu\n", nm, in print_stats()
683 if(!ssl_printf(ssl, "%s.num.cachehits"SQ"%lu\n", nm, in print_stats()
686 if(!ssl_printf(ssl, "%s.num.cachemiss"SQ"%lu\n", nm, in print_stats()
688 if(!ssl_printf(ssl, "%s.num.prefetch"SQ"%lu\n", nm, in print_stats()
690 if(!ssl_printf(ssl, "%s.num.queries_timed_out"SQ"%lu\n", nm, in print_stats()
692 if(!ssl_printf(ssl, "%s.query.queue_time_us.max"SQ"%lu\n", nm, in print_stats()
694 if(!ssl_printf(ssl, "%s.num.expired"SQ"%lu\n", nm, in print_stats()
696 if(!ssl_printf(ssl, "%s.num.recursivereplies"SQ"%lu\n", nm, in print_stats()
699 if(!ssl_printf(ssl, "%s.num.dnscrypt.crypted"SQ"%lu\n", nm, in print_stats()
701 if(!ssl_printf(ssl, "%s.num.dnscrypt.cert"SQ"%lu\n", nm, in print_stats()
703 if(!ssl_printf(ssl, "%s.num.dnscrypt.cleartext"SQ"%lu\n", nm, in print_stats()
705 if(!ssl_printf(ssl, "%s.num.dnscrypt.malformed"SQ"%lu\n", nm, in print_stats()
708 if(!ssl_printf(ssl, "%s.requestlist.avg"SQ"%g\n", nm, in print_stats()
713 if(!ssl_printf(ssl, "%s.requestlist.max"SQ"%lu\n", nm, in print_stats()
715 if(!ssl_printf(ssl, "%s.requestlist.overwritten"SQ"%lu\n", nm, in print_stats()
717 if(!ssl_printf(ssl, "%s.requestlist.exceeded"SQ"%lu\n", nm, in print_stats()
719 if(!ssl_printf(ssl, "%s.requestlist.current.all"SQ"%lu\n", nm, in print_stats()
721 if(!ssl_printf(ssl, "%s.requestlist.current.user"SQ"%lu\n", nm, in print_stats()
728 if(!ssl_printf(ssl, "%s.recursion.time.avg"SQ ARG_LL "d.%6.6d\n", nm, in print_stats()
730 if(!ssl_printf(ssl, "%s.recursion.time.median"SQ"%g\n", nm, in print_stats()
732 if(!ssl_printf(ssl, "%s.tcpusage"SQ"%lu\n", nm, in print_stats()
755 return ssl_printf(ssl, "%s%u%6.6u\n", desc, in print_longnum()
758 return ssl_printf(ssl, "%s%lu\n", desc, (unsigned long)x); in print_longnum()
855 if(!ssl_printf(ssl, "time.now"SQ ARG_LL "d.%6.6d\n", in print_uptime()
857 if(!ssl_printf(ssl, "time.up"SQ ARG_LL "d.%6.6d\n", in print_uptime()
859 if(!ssl_printf(ssl, "time.elapsed"SQ ARG_LL "d.%6.6d\n", in print_uptime()
877 if(!ssl_printf(ssl, in print_hist()
920 if(!ssl_printf(ssl, "num.query.type.%s"SQ"%lu\n", in print_ext()
924 if(!ssl_printf(ssl, "num.query.type.other"SQ"%lu\n", in print_ext()
937 if(!ssl_printf(ssl, "num.query.class.%s"SQ"%lu\n", in print_ext()
941 if(!ssl_printf(ssl, "num.query.class.other"SQ"%lu\n", in print_ext()
954 if(!ssl_printf(ssl, "num.query.opcode.%s"SQ"%lu\n", in print_ext()
958 if(!ssl_printf(ssl, "num.query.tcp"SQ"%lu\n", in print_ext()
960 if(!ssl_printf(ssl, "num.query.tcpout"SQ"%lu\n", in print_ext()
962 if(!ssl_printf(ssl, "num.query.udpout"SQ"%lu\n", in print_ext()
964 if(!ssl_printf(ssl, "num.query.tls"SQ"%lu\n", in print_ext()
966 if(!ssl_printf(ssl, "num.query.tls.resume"SQ"%lu\n", in print_ext()
968 if(!ssl_printf(ssl, "num.query.ipv6"SQ"%lu\n", in print_ext()
970 if(!ssl_printf(ssl, "num.query.https"SQ"%lu\n", in print_ext()
973 if(!ssl_printf(ssl, "num.query.flags.QR"SQ"%lu\n", in print_ext()
975 if(!ssl_printf(ssl, "num.query.flags.AA"SQ"%lu\n", in print_ext()
977 if(!ssl_printf(ssl, "num.query.flags.TC"SQ"%lu\n", in print_ext()
979 if(!ssl_printf(ssl, "num.query.flags.RD"SQ"%lu\n", in print_ext()
981 if(!ssl_printf(ssl, "num.query.flags.RA"SQ"%lu\n", in print_ext()
983 if(!ssl_printf(ssl, "num.query.flags.Z"SQ"%lu\n", in print_ext()
985 if(!ssl_printf(ssl, "num.query.flags.AD"SQ"%lu\n", in print_ext()
987 if(!ssl_printf(ssl, "num.query.flags.CD"SQ"%lu\n", in print_ext()
989 if(!ssl_printf(ssl, "num.query.edns.present"SQ"%lu\n", in print_ext()
991 if(!ssl_printf(ssl, "num.query.edns.DO"SQ"%lu\n", in print_ext()
1005 if(!ssl_printf(ssl, "num.answer.rcode.%s"SQ"%lu\n", in print_ext()
1009 if(!ssl_printf(ssl, "num.answer.rcode.nodata"SQ"%lu\n", in print_ext()
1013 if(!ssl_printf(ssl, "num.query.ratelimited"SQ"%lu\n", in print_ext()
1016 if(!ssl_printf(ssl, "num.answer.secure"SQ"%lu\n", in print_ext()
1018 if(!ssl_printf(ssl, "num.answer.bogus"SQ"%lu\n", in print_ext()
1020 if(!ssl_printf(ssl, "num.rrset.bogus"SQ"%lu\n", in print_ext()
1022 if(!ssl_printf(ssl, "num.query.aggressive.NOERROR"SQ"%lu\n", in print_ext()
1024 if(!ssl_printf(ssl, "num.query.aggressive.NXDOMAIN"SQ"%lu\n", in print_ext()
1027 if(!ssl_printf(ssl, "unwanted.queries"SQ"%lu\n", in print_ext()
1029 if(!ssl_printf(ssl, "unwanted.replies"SQ"%lu\n", in print_ext()
1032 if(!ssl_printf(ssl, "msg.cache.count"SQ"%u\n", in print_ext()
1034 if(!ssl_printf(ssl, "rrset.cache.count"SQ"%u\n", in print_ext()
1036 if(!ssl_printf(ssl, "infra.cache.count"SQ"%u\n", in print_ext()
1038 if(!ssl_printf(ssl, "key.cache.count"SQ"%u\n", in print_ext()
1041 if(!ssl_printf(ssl, "msg.cache.max_collisions"SQ"%u\n", in print_ext()
1043 if(!ssl_printf(ssl, "rrset.cache.max_collisions"SQ"%u\n", in print_ext()
1051 if(!ssl_printf(ssl, "num.rpz.action.%s"SQ"%lu\n", in print_ext()
1056 if(!ssl_printf(ssl, "dnscrypt_shared_secret.cache.count"SQ"%u\n", in print_ext()
1058 if(!ssl_printf(ssl, "dnscrypt_nonce.cache.count"SQ"%u\n", in print_ext()
1060 if(!ssl_printf(ssl, "num.query.dnscrypt.shared_secret.cachemiss"SQ"%lu\n", in print_ext()
1062 if(!ssl_printf(ssl, "num.query.dnscrypt.replay"SQ"%lu\n", in print_ext()
1065 if(!ssl_printf(ssl, "num.query.authzone.up"SQ"%lu\n", in print_ext()
1067 if(!ssl_printf(ssl, "num.query.authzone.down"SQ"%lu\n", in print_ext()
1070 if(!ssl_printf(ssl, "num.query.subnet"SQ"%lu\n", in print_ext()
1072 if(!ssl_printf(ssl, "num.query.subnet_cache"SQ"%lu\n", in print_ext()
1076 if(!ssl_printf(ssl, "num.query.cachedb"SQ"%lu\n", in print_ext()
1128 ssl_printf(ssl, "error: this option requires a domain name\n"); in parse_arg_name()
1133 ssl_printf(ssl, "error cannot parse name %s at %d: %s\n", str, in parse_arg_name()
1140 ssl_printf(ssl, "error out of memory\n"); in parse_arg_name()
1165 ssl_printf(ssl, "error could not find next argument " in find_arg2()
1187 ssl_printf(ssl, "error not a zone type. %s\n", arg2); in perform_zone_add()
1205 ssl_printf(ssl, "error out of memory\n"); in perform_zone_add()
1231 if(!ssl_printf(ssl, "error for input line: %s\n", buf)) in do_zones_add()
1237 (void)ssl_printf(ssl, "added %d zones\n", num); in do_zones_add()
1280 if(!ssl_printf(ssl, "error for input line: %s\n", buf)) in do_zones_remove()
1286 (void)ssl_printf(ssl, "removed %d zones\n", num); in do_zones_remove()
1302 if(!ssl_printf(ssl, "error parsing local-data at %sposition %d '%s': %s\n", in check_RR_syntax()
1319 ssl_printf(ssl,"error in syntax or out of memory, %s\n", arg); in perform_data_add()
1347 (void)ssl_printf(ssl, "added %d datas\n", num); in do_datas_add()
1384 if(!ssl_printf(ssl, "error for input line: %s\n", buf)) in do_datas_remove()
1390 (void)ssl_printf(ssl, "removed %d datas\n", num); in do_datas_remove()
1404 ssl_printf(ssl,"no view with name: %s\n", arg); in do_view_zone_add()
1410 ssl_printf(ssl,"error out of memory\n"); in do_view_zone_add()
1437 ssl_printf(ssl,"no view with name: %s\n", arg); in do_view_zone_remove()
1460 ssl_printf(ssl,"no view with name: %s\n", arg); in do_view_data_add()
1466 ssl_printf(ssl,"error out of memory\n"); in do_view_data_add()
1482 ssl_printf(ssl,"no view with name: %s\n", arg); in do_view_datas_add()
1488 ssl_printf(ssl,"error out of memory\n"); in do_view_datas_add()
1507 ssl_printf(ssl,"no view with name: %s\n", arg); in do_view_data_remove()
1527 ssl_printf(ssl,"no view with name: %s\n", arg); in do_view_datas_remove()
1532 ssl_printf(ssl, "removed 0 datas\n"); in do_view_datas_remove()
1669 (void)ssl_printf(ssl, "error parsing ip addr: '%s'\n", arg); in do_flush_infra()
1783 (void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages " in do_flush_zone()
1850 (void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages " in do_flush_bogus()
1925 (void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages " in do_flush_negative()
1968 if(!ssl_printf(ssl, "%s %s %s ", buf, (c?c:"CLASS??"), str)) { in ssl_print_name_dp()
1976 if(!ssl_printf(ssl, "%s%s", (f?" ":""), buf)) in ssl_print_name_dp()
1982 if(!ssl_printf(ssl, "%s%s", (f?" ":""), buf)) in ssl_print_name_dp()
1986 return ssl_printf(ssl, "\n"); in ssl_print_name_dp()
1997 return ssl_printf(ssl, "off (using root hints)\n"); in print_root_fwds()
2015 (void)ssl_printf(ssl, "error out of memory\n"); in parse_delegpt()
2031 (void)ssl_printf(ssl, "error cannot parse" in parse_delegpt()
2042 (void)ssl_printf(ssl, "error out of memory\n"); in parse_delegpt()
2056 (void)ssl_printf(ssl, "error out of memory\n"); in parse_delegpt()
2073 (void)ssl_printf(ssl, "error: structure not allocated\n"); in do_forward()
2091 (void)ssl_printf(ssl, "error out of memory\n"); in do_forward()
2116 (void)ssl_printf(ssl, "error: unknown option %s\n", args); in parse_fs_args()
2155 (void)ssl_printf(ssl, "error out of memory\n"); in do_forward_add()
2162 (void)ssl_printf(ssl, "error out of memory\n"); in do_forward_add()
2200 (void)ssl_printf(ssl, "error out of memory\n"); in do_stub_add()
2210 (void)ssl_printf(ssl, "error out of memory\n"); in do_stub_add()
2216 (void)ssl_printf(ssl, "error out of memory\n"); in do_stub_add()
2258 (void)ssl_printf(ssl, "error out of memory\n"); in do_insecure_add()
2292 ssl_printf(ssl, "%s\n", buf); in do_insecure_list()
2304 if(!ssl_printf(ssl, "version: %s\n", PACKAGE_VERSION)) in do_status()
2306 if(!ssl_printf(ssl, "verbosity: %d\n", verbosity)) in do_status()
2308 if(!ssl_printf(ssl, "threads: %d\n", worker->daemon->num)) in do_status()
2310 if(!ssl_printf(ssl, "modules: %d [", worker->daemon->mods.num)) in do_status()
2313 if(!ssl_printf(ssl, " %s", worker->daemon->mods.mod[i]->name)) in do_status()
2316 if(!ssl_printf(ssl, " ]\n")) in do_status()
2319 if(!ssl_printf(ssl, "uptime: " ARG_LL "d seconds\n", (long long)uptime)) in do_status()
2321 if(!ssl_printf(ssl, "options:%s%s%s%s\n" , in do_status()
2328 if(!ssl_printf(ssl, "unbound (pid %d) is running...\n", in do_status()
2416 if(!ssl_printf(ssl, "thread #%d\n", worker->thread_num)) in do_dump_requestlist()
2418 if(!ssl_printf(ssl, "# type cl name seconds module status\n")) in do_dump_requestlist()
2429 if(!ssl_printf(ssl, "%3d %4s %2s %s %s %s\n", in do_dump_requestlist()
2477 if(!ssl_printf(a->ssl, "%s %s expired rto %d\n", ip_str, in dump_infra_host()
2485 if(!ssl_printf(a->ssl, "%s %s ttl %lu ping %d var %d rtt %d rto %d " in dump_infra_host()
2551 (void)ssl_printf(ssl, "error no auth-zone %s\n", arg); in do_auth_zone_reload()
2559 (void)ssl_printf(ssl, "error failed to read %s\n", arg); in do_auth_zone_reload()
2570 (void)ssl_printf(ssl, "zone %s has no contents\n", arg); in do_auth_zone_reload()
2575 (void)ssl_printf(ssl, "error: no SOA in zone after read %s\n", arg); in do_auth_zone_reload()
2587 (void)ssl_printf(ssl, "error zonemd for %s failed: %s\n", in do_auth_zone_reload()
2593 (void)ssl_printf(ssl, "%s: %s\n", arg, reason); in do_auth_zone_reload()
2612 (void)ssl_printf(ssl, "error zone xfr task not found %s\n", arg); in do_auth_zone_transfer()
2628 (void)ssl_printf(ssl, "error setting option\n"); in do_set_option()
2646 (void)ssl_printf(ssl, "%s\n", line); in remote_get_opt_ssl()
2656 (void)ssl_printf(ssl, "error unknown option\n"); in do_get_option()
2736 if(!ssl_printf(ssl, "%s\t%s\n", buf, buf2)) { in do_list_auth_zones()
2757 if(!ssl_printf(ssl, "%s %s\n", buf, in do_list_local_zones()
2789 if(!ssl_printf(ssl, "BADRR\n")) { in do_list_local_data()
2795 if(!ssl_printf(ssl, "%s\n", s)) { in do_list_local_data()
2815 ssl_printf(ssl,"no view with name: %s\n", arg); in do_view_list_local_zones()
2831 ssl_printf(ssl,"no view with name: %s\n", arg); in do_view_list_local_data()
2871 ssl_printf(a->ssl, "%s %d limit %d\n", buf, max, lim); in rate_list()
2889 ssl_printf(a->ssl, "%s %d limit %d\n", ip, max, lim); in ip_rate_list()
2950 (void) ssl_printf(ssl, "error no auth-zone %s\n", arg); in do_rpz_enable_disable()
2954 (void) ssl_printf(ssl, "error auth-zone %s not RPZ\n", arg); in do_rpz_enable_disable()
2994 ssl_printf(ssl, "error could not distribute cmd\n"); in distribute_cmd()
3189 (void)ssl_printf(ssl, "error unknown command '%s'\n", p); in execute_cmd()
3262 ssl_printf(res, "error version mismatch\n"); in handle_req()