Lines Matching defs:ssl_printf

570 int ssl_printf(RES* ssl, const char* format, ...)
641 (void)ssl_printf(ssl, "ok\n");
657 (void)ssl_printf(ssl, "error could not distribute cmd\n");
688 ssl_printf(ssl, "error in verbosity number syntax: %s\n", str);
700 if(!ssl_printf(ssl, "%s.num.queries"SQ"%lu\n", nm,
702 if(!ssl_printf(ssl, "%s.num.queries_ip_ratelimited"SQ"%lu\n", nm,
704 if(!ssl_printf(ssl, "%s.num.queries_cookie_valid"SQ"%lu\n", nm,
706 if(!ssl_printf(ssl, "%s.num.queries_cookie_client"SQ"%lu\n", nm,
708 if(!ssl_printf(ssl, "%s.num.queries_cookie_invalid"SQ"%lu\n", nm,
710 if(!ssl_printf(ssl, "%s.num.cachehits"SQ"%lu\n", nm,
713 if(!ssl_printf(ssl, "%s.num.cachemiss"SQ"%lu\n", nm,
715 if(!ssl_printf(ssl, "%s.num.prefetch"SQ"%lu\n", nm,
717 if(!ssl_printf(ssl, "%s.num.queries_timed_out"SQ"%lu\n", nm,
719 if(!ssl_printf(ssl, "%s.query.queue_time_us.max"SQ"%lu\n", nm,
721 if(!ssl_printf(ssl, "%s.num.expired"SQ"%lu\n", nm,
723 if(!ssl_printf(ssl, "%s.num.recursivereplies"SQ"%lu\n", nm,
726 if(!ssl_printf(ssl, "%s.num.dnscrypt.crypted"SQ"%lu\n", nm,
728 if(!ssl_printf(ssl, "%s.num.dnscrypt.cert"SQ"%lu\n", nm,
730 if(!ssl_printf(ssl, "%s.num.dnscrypt.cleartext"SQ"%lu\n", nm,
732 if(!ssl_printf(ssl, "%s.num.dnscrypt.malformed"SQ"%lu\n", nm,
735 if(!ssl_printf(ssl, "%s.requestlist.avg"SQ"%g\n", nm,
740 if(!ssl_printf(ssl, "%s.requestlist.max"SQ"%lu\n", nm,
742 if(!ssl_printf(ssl, "%s.requestlist.overwritten"SQ"%lu\n", nm,
744 if(!ssl_printf(ssl, "%s.requestlist.exceeded"SQ"%lu\n", nm,
746 if(!ssl_printf(ssl, "%s.requestlist.current.all"SQ"%lu\n", nm,
748 if(!ssl_printf(ssl, "%s.requestlist.current.user"SQ"%lu\n", nm,
755 if(!ssl_printf(ssl, "%s.recursion.time.avg"SQ ARG_LL "d.%6.6d\n", nm,
757 if(!ssl_printf(ssl, "%s.recursion.time.median"SQ"%g\n", nm,
759 if(!ssl_printf(ssl, "%s.tcpusage"SQ"%lu\n", nm,
782 return ssl_printf(ssl, "%s%u%6.6u\n", desc,
785 return ssl_printf(ssl, "%s%lu\n", desc, (unsigned long)x);
882 if(!ssl_printf(ssl, "time.now"SQ ARG_LL "d.%6.6d\n",
884 if(!ssl_printf(ssl, "time.up"SQ ARG_LL "d.%6.6d\n",
886 if(!ssl_printf(ssl, "time.elapsed"SQ ARG_LL "d.%6.6d\n",
904 if(!ssl_printf(ssl,
947 if(!ssl_printf(ssl, "num.query.type.%s"SQ"%lu\n",
951 if(!ssl_printf(ssl, "num.query.type.other"SQ"%lu\n",
964 if(!ssl_printf(ssl, "num.query.class.%s"SQ"%lu\n",
968 if(!ssl_printf(ssl, "num.query.class.other"SQ"%lu\n",
981 if(!ssl_printf(ssl, "num.query.opcode.%s"SQ"%lu\n",
985 if(!ssl_printf(ssl, "num.query.tcp"SQ"%lu\n",
987 if(!ssl_printf(ssl, "num.query.tcpout"SQ"%lu\n",
989 if(!ssl_printf(ssl, "num.query.udpout"SQ"%lu\n",
991 if(!ssl_printf(ssl, "num.query.tls"SQ"%lu\n",
993 if(!ssl_printf(ssl, "num.query.tls.resume"SQ"%lu\n",
995 if(!ssl_printf(ssl, "num.query.ipv6"SQ"%lu\n",
997 if(!ssl_printf(ssl, "num.query.https"SQ"%lu\n",
1000 if(!ssl_printf(ssl, "num.query.flags.QR"SQ"%lu\n",
1002 if(!ssl_printf(ssl, "num.query.flags.AA"SQ"%lu\n",
1004 if(!ssl_printf(ssl, "num.query.flags.TC"SQ"%lu\n",
1006 if(!ssl_printf(ssl, "num.query.flags.RD"SQ"%lu\n",
1008 if(!ssl_printf(ssl, "num.query.flags.RA"SQ"%lu\n",
1010 if(!ssl_printf(ssl, "num.query.flags.Z"SQ"%lu\n",
1012 if(!ssl_printf(ssl, "num.query.flags.AD"SQ"%lu\n",
1014 if(!ssl_printf(ssl, "num.query.flags.CD"SQ"%lu\n",
1016 if(!ssl_printf(ssl, "num.query.edns.present"SQ"%lu\n",
1018 if(!ssl_printf(ssl, "num.query.edns.DO"SQ"%lu\n",
1032 if(!ssl_printf(ssl, "num.answer.rcode.%s"SQ"%lu\n",
1036 if(!ssl_printf(ssl, "num.answer.rcode.nodata"SQ"%lu\n",
1040 if(!ssl_printf(ssl, "num.query.ratelimited"SQ"%lu\n",
1043 if(!ssl_printf(ssl, "num.answer.secure"SQ"%lu\n",
1045 if(!ssl_printf(ssl, "num.answer.bogus"SQ"%lu\n",
1047 if(!ssl_printf(ssl, "num.rrset.bogus"SQ"%lu\n",
1049 if(!ssl_printf(ssl, "num.query.aggressive.NOERROR"SQ"%lu\n",
1051 if(!ssl_printf(ssl, "num.query.aggressive.NXDOMAIN"SQ"%lu\n",
1054 if(!ssl_printf(ssl, "unwanted.queries"SQ"%lu\n",
1056 if(!ssl_printf(ssl, "unwanted.replies"SQ"%lu\n",
1059 if(!ssl_printf(ssl, "msg.cache.count"SQ"%u\n",
1061 if(!ssl_printf(ssl, "rrset.cache.count"SQ"%u\n",
1063 if(!ssl_printf(ssl, "infra.cache.count"SQ"%u\n",
1065 if(!ssl_printf(ssl, "key.cache.count"SQ"%u\n",
1068 if(!ssl_printf(ssl, "msg.cache.max_collisions"SQ"%u\n",
1070 if(!ssl_printf(ssl, "rrset.cache.max_collisions"SQ"%u\n",
1078 if(!ssl_printf(ssl, "num.rpz.action.%s"SQ"%lu\n",
1083 if(!ssl_printf(ssl, "dnscrypt_shared_secret.cache.count"SQ"%u\n",
1085 if(!ssl_printf(ssl, "dnscrypt_nonce.cache.count"SQ"%u\n",
1087 if(!ssl_printf(ssl, "num.query.dnscrypt.shared_secret.cachemiss"SQ"%lu\n",
1089 if(!ssl_printf(ssl, "num.query.dnscrypt.replay"SQ"%lu\n",
1092 if(!ssl_printf(ssl, "num.query.authzone.up"SQ"%lu\n",
1094 if(!ssl_printf(ssl, "num.query.authzone.down"SQ"%lu\n",
1097 if(!ssl_printf(ssl, "num.query.subnet"SQ"%lu\n",
1099 if(!ssl_printf(ssl, "num.query.subnet_cache"SQ"%lu\n",
1103 if(!ssl_printf(ssl, "num.query.cachedb"SQ"%lu\n",
1155 ssl_printf(ssl, "error: this option requires a domain name\n");
1160 ssl_printf(ssl, "error cannot parse name %s at %d: %s\n", str,
1167 ssl_printf(ssl, "error out of memory\n");
1192 ssl_printf(ssl, "error could not find next argument "
1214 ssl_printf(ssl, "error not a zone type. %s\n", arg2);
1232 ssl_printf(ssl, "error out of memory\n");
1267 if(!ssl_printf(ssl, "error for input line: %s\n",
1273 (void)ssl_printf(ssl, "added %d zones\n", num);
1325 if(!ssl_printf(ssl, "error for input line: %s\n",
1331 (void)ssl_printf(ssl, "removed %d zones\n", num);
1347 if(!ssl_printf(ssl, "error parsing local-data at %sposition %d '%s': %s\n",
1364 ssl_printf(ssl,"error in syntax or out of memory, %s\n", arg);
1401 (void)ssl_printf(ssl, "added %d datas\n", num);
1447 if(!ssl_printf(ssl, "error for input line: %s\n",
1453 (void)ssl_printf(ssl, "removed %d datas\n", num);
1467 ssl_printf(ssl,"no view with name: %s\n", arg);
1473 ssl_printf(ssl,"error out of memory\n");
1500 ssl_printf(ssl,"no view with name: %s\n", arg);
1523 ssl_printf(ssl,"no view with name: %s\n", arg);
1529 ssl_printf(ssl,"error out of memory\n");
1549 ssl_printf(ssl,"no view with name: %s\n", arg);
1555 ssl_printf(ssl,"error out of memory\n");
1577 (void)ssl_printf(ssl, "added %d datas\n", num);
1591 ssl_printf(ssl,"no view with name: %s\n", arg);
1615 ssl_printf(ssl,"no view with name: %s\n", arg);
1620 ssl_printf(ssl, "removed 0 datas\n");
1637 if(!ssl_printf(ssl, "error for input line: %s\n",
1644 (void)ssl_printf(ssl, "removed %d datas\n", num);
1726 (void)ssl_printf(ssl, "error parsing RRset type: '%s'\n", arg2);
1806 (void)ssl_printf(ssl, "error parsing ip addr: '%s'\n", arg);
1929 (void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
2005 (void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
2089 (void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
2135 if(!ssl_printf(ssl, "%s %s %s ", buf, (c?c:"CLASS??"), str)) {
2143 if(!ssl_printf(ssl, "%s%s", (f?" ":""), buf))
2149 if(!ssl_printf(ssl, "%s%s", (f?" ":""), buf))
2153 return ssl_printf(ssl, "\n");
2165 return ssl_printf(ssl, "off (using root hints)\n");
2189 (void)ssl_printf(ssl, "error out of memory\n");
2205 (void)ssl_printf(ssl, "error cannot parse"
2216 (void)ssl_printf(ssl, "error out of memory\n");
2230 (void)ssl_printf(ssl, "error out of memory\n");
2248 (void)ssl_printf(ssl, "error: structure not allocated\n");
2266 (void)ssl_printf(ssl, "error out of memory\n");
2293 (void)ssl_printf(ssl, "error: unknown option %s\n", args);
2338 (void)ssl_printf(ssl, "error out of memory\n");
2346 (void)ssl_printf(ssl, "error out of memory\n");
2397 (void)ssl_printf(ssl, "error out of memory\n");
2409 (void)ssl_printf(ssl, "error out of memory\n");
2416 (void)ssl_printf(ssl, "error out of memory\n");
2468 (void)ssl_printf(ssl, "error out of memory\n");
2502 ssl_printf(ssl, "%s\n", buf);
2514 if(!ssl_printf(ssl, "version: %s\n", PACKAGE_VERSION))
2516 if(!ssl_printf(ssl, "verbosity: %d\n", verbosity))
2518 if(!ssl_printf(ssl, "threads: %d\n", worker->daemon->num))
2520 if(!ssl_printf(ssl, "modules: %d [", worker->daemon->mods.num))
2523 if(!ssl_printf(ssl, " %s", worker->daemon->mods.mod[i]->name))
2526 if(!ssl_printf(ssl, " ]\n"))
2529 if(!ssl_printf(ssl, "uptime: " ARG_LL "d seconds\n", (long long)uptime))
2531 if(!ssl_printf(ssl, "options:%s%s%s%s\n" ,
2538 if(!ssl_printf(ssl, "unbound (pid %d) is running...\n",
2626 if(!ssl_printf(ssl, "thread #%d\n", worker->thread_num))
2628 if(!ssl_printf(ssl, "# type cl name seconds module status\n"))
2639 if(!ssl_printf(ssl, "%3d %4s %2s %s %s %s\n",
2687 if(!ssl_printf(a->ssl, "%s %s expired rto %d\n", ip_str,
2695 if(!ssl_printf(a->ssl, "%s %s ttl %lu ping %d var %d rtt %d rto %d "
2761 (void)ssl_printf(ssl, "error no auth-zone %s\n", arg);
2769 (void)ssl_printf(ssl, "error failed to read %s\n", arg);
2780 (void)ssl_printf(ssl, "zone %s has no contents\n", arg);
2785 (void)ssl_printf(ssl, "error: no SOA in zone after read %s\n", arg);
2797 (void)ssl_printf(ssl, "error zonemd for %s failed: %s\n",
2803 (void)ssl_printf(ssl, "%s: %s\n", arg, reason);
2822 (void)ssl_printf(ssl, "error zone xfr task not found %s\n", arg);
2838 (void)ssl_printf(ssl, "error setting option\n");
2856 (void)ssl_printf(ssl, "%s\n", line);
2866 (void)ssl_printf(ssl, "error unknown option\n");
2954 if(!ssl_printf(ssl, "%s\t%s\n", buf, buf2)) {
2975 if(!ssl_printf(ssl, "%s %s\n", buf,
3007 if(!ssl_printf(ssl, "BADRR\n")) {
3013 if(!ssl_printf(ssl, "%s\n", s)) {
3033 ssl_printf(ssl,"no view with name: %s\n", arg);
3049 ssl_printf(ssl,"no view with name: %s\n", arg);
3089 ssl_printf(a->ssl, "%s %d limit %d\n", buf, max, lim);
3107 ssl_printf(a->ssl, "%s %d limit %d\n", ip, max, lim);
3168 (void) ssl_printf(ssl, "error no auth-zone %s\n", arg);
3172 (void) ssl_printf(ssl, "error auth-zone %s not RPZ\n", arg);
3209 (void)ssl_printf(ssl, "error: no cookie secret file configured\n");
3216 (void)ssl_printf(ssl, "unable to open cookie secret file %s: %s",
3249 (void)ssl_printf(ssl, "error: no cookie secret file configured\n");
3253 (void)ssl_printf(ssl, "error: there are no cookie_secrets.");
3260 (void)ssl_printf(ssl, "error: no staging cookie secret to activate\n");
3266 (void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
3284 (void)ssl_printf(ssl, "error: no cookie secret file configured\n");
3288 (void)ssl_printf(ssl, "error: there are no cookie_secrets.");
3295 (void)ssl_printf(ssl, "error: can not drop the currently active cookie secret\n");
3301 (void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
3320 (void)ssl_printf(ssl, "error: no cookie secret file configured\n");
3326 (void)ssl_printf(ssl, "error: out of memory");
3335 (void)ssl_printf(ssl, "error: missing argument (cookie_secret)\n");
3341 (void)ssl_printf(ssl, "invalid cookie secret: invalid argument length\n");
3342 (void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
3350 (void)ssl_printf(ssl, "invalid cookie secret: parse error\n");
3351 (void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
3359 (void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
3392 (void)ssl_printf(ssl, "active : %s\n", secret_hex);
3394 (void)ssl_printf(ssl, "staging: %s\n", secret_hex);
3396 (void)ssl_printf(ssl, "staging[%d]: %s\n", i,
3438 (void)ssl_printf(ssl, "dump_cache/load_cache is not "
3609 (void)ssl_printf(ssl, "error unknown command '%s'\n", p);
3682 ssl_printf(res, "error version mismatch\n");