sbin/unwind/libunbound/daemon/remote.h
325
int ssl_printf(RES* ssl, const char* format, ...)
usr.sbin/nsd/remote.c
1007
(void)ssl_printf(ssl, "error zone not secondary\n");
usr.sbin/nsd/remote.c
1013
(void)ssl_printf(ssl, "ok, %lu zones\n", (unsigned long)xfrd->zones->count);
usr.sbin/nsd/remote.c
1021
if(!ssl_printf(ssl, " %s: \"%u since %s\"\n", str,
usr.sbin/nsd/remote.c
1025
if(!ssl_printf(ssl, " %s: none\n", str))
usr.sbin/nsd/remote.c
1039
if(!ssl_printf(ssl, "zone: %s\n", zo->name))
usr.sbin/nsd/remote.c
1042
if(!ssl_printf(ssl, " pattern: %s\n", zo->pattern->pname))
usr.sbin/nsd/remote.c
1054
if(!ssl_printf(ssl, " catalog: consumer"))
usr.sbin/nsd/remote.c
1062
if(!ssl_printf(ssl, " (serial: %u, # members: %zu)\n",
usr.sbin/nsd/remote.c
1068
} else if(!ssl_printf(ssl, "\n"))
usr.sbin/nsd/remote.c
1071
if(!ssl_printf(ssl, " catalog-invalid: %s\n",
usr.sbin/nsd/remote.c
1081
if(!ssl_printf(ssl, " catalog: producer"))
usr.sbin/nsd/remote.c
1084
if(!ssl_printf(ssl, " (serial: %u, # members: %zu)\n",
usr.sbin/nsd/remote.c
1088
} else if(!ssl_printf(ssl, "\n"))
usr.sbin/nsd/remote.c
1091
if(!ssl_printf(ssl, " catalog-invalid: a catalog "
usr.sbin/nsd/remote.c
1097
if(!ssl_printf(ssl, " catalog-member-id: %s\n",
usr.sbin/nsd/remote.c
1105
if(!ssl_printf(ssl, " notify: \"waiting-for-fd\"\n"))
usr.sbin/nsd/remote.c
1109
if(!ssl_printf(ssl, " notify: \"send"))
usr.sbin/nsd/remote.c
1113
if(!ssl_printf(ssl, " %s",
usr.sbin/nsd/remote.c
1117
if(!ssl_printf(ssl, " with serial %u\"\n",
usr.sbin/nsd/remote.c
1123
if(!ssl_printf(ssl, " state: primary\n"))
usr.sbin/nsd/remote.c
1127
if(!ssl_printf(ssl, " state: %s\n",
usr.sbin/nsd/remote.c
1147
if(!ssl_printf(ssl, "\twait: \"%lu sec between attempts\"\n",
usr.sbin/nsd/remote.c
1154
if(!ssl_printf(ssl, " transfer: \"waiting-for-UDP-fd\"\n"))
usr.sbin/nsd/remote.c
1157
if(!ssl_printf(ssl, " transfer: \"sent UDP to %s\"\n",
usr.sbin/nsd/remote.c
1164
if(!ssl_printf(ssl, " transfer: \"waiting-for-TCP-fd\"\n"))
usr.sbin/nsd/remote.c
1167
if(!ssl_printf(ssl, " transfer: \"TCP connected to %s\"\n",
usr.sbin/nsd/remote.c
1198
(void)ssl_printf(ssl, "verbosity %d\n", verbosity);
usr.sbin/nsd/remote.c
1202
(void)ssl_printf(ssl, "error in verbosity number syntax: %s\n", str);
usr.sbin/nsd/remote.c
1226
(void)ssl_printf(ssl, "error could not find next argument "
usr.sbin/nsd/remote.c
1258
if(!ssl_printf(ssl, "version: %s\n", PACKAGE_VERSION))
usr.sbin/nsd/remote.c
1260
if(!ssl_printf(ssl, "verbosity: %d\n", verbosity))
usr.sbin/nsd/remote.c
1263
if(!ssl_printf(ssl, "ratelimit: %d\n",
usr.sbin/nsd/remote.c
1279
(void)ssl_printf(ssl, "error no stats enabled at compile time\n");
usr.sbin/nsd/remote.c
1317
(void)ssl_printf(ssl, "error pattern %s does not exist\n",
usr.sbin/nsd/remote.c
1324
(void)ssl_printf(ssl, "error cannot parse zone name\n");
usr.sbin/nsd/remote.c
1331
(void)ssl_printf(ssl, "error zone defined in nsd.conf, "
usr.sbin/nsd/remote.c
1339
(void)ssl_printf(ssl, "Error: Zone is a catalog "
usr.sbin/nsd/remote.c
1368
(void)ssl_printf(ssl, "zone %s did not exist, creating", arg);
usr.sbin/nsd/remote.c
1378
(void)ssl_printf(ssl, "error could not add zonelist entry\n");
usr.sbin/nsd/remote.c
1420
(void)ssl_printf(ssl, "error pattern %s does not exist\n",
usr.sbin/nsd/remote.c
1427
(void)ssl_printf(ssl, "error cannot parse zone name\n");
usr.sbin/nsd/remote.c
1435
(void)ssl_printf(ssl, "zone %s already exists\n", arg);
usr.sbin/nsd/remote.c
1446
(void)ssl_printf(ssl, "error could not add zonelist entry\n");
usr.sbin/nsd/remote.c
1479
(void)ssl_printf(ssl, "error cannot parse zone name\n");
usr.sbin/nsd/remote.c
1489
(void)ssl_printf(ssl, "warning zone %s not present\n", arg);
usr.sbin/nsd/remote.c
1497
(void)ssl_printf(ssl, "error zone defined in nsd.conf, "
usr.sbin/nsd/remote.c
1504
(void)ssl_printf(ssl, "Error: Zone is a catalog consumer "
usr.sbin/nsd/remote.c
1574
if(!ssl_printf(ssl, "error for input line '%s'\n",
usr.sbin/nsd/remote.c
1578
if(!ssl_printf(ssl, "added: %s\n", buf))
usr.sbin/nsd/remote.c
1583
(void)ssl_printf(ssl, "added %d zones\n", num);
usr.sbin/nsd/remote.c
1596
if(!ssl_printf(ssl, "error for input line '%s'\n",
usr.sbin/nsd/remote.c
1600
if(!ssl_printf(ssl, "removed: %s\n", buf))
usr.sbin/nsd/remote.c
1605
(void)ssl_printf(ssl, "deleted %d zones\n", num);
usr.sbin/nsd/remote.c
2148
if(!ssl_printf(*ssl, "%s", str))
usr.sbin/nsd/remote.c
2167
(void)ssl_printf(ssl, "error %s is not relative to %s: "
usr.sbin/nsd/remote.c
2176
(void)ssl_printf(ssl, "reconfig start, read %s\n", cfgfile);
usr.sbin/nsd/remote.c
2193
(void)ssl_printf(ssl, "reconfig completed: no changes detected\n");
usr.sbin/nsd/remote.c
2195
(void)ssl_printf(ssl, "reconfig completed: changes applied\n");
usr.sbin/nsd/remote.c
2247
(void)ssl_printf(ssl, "%u\n", (unsigned)xfrd->reload_pid);
usr.sbin/nsd/remote.c
2257
if(!ssl_printf(ssl, "key: name: \"%s\" secret: \"%s\" algorithm: %s\n", key->name, key->secret, key->algorithm))
usr.sbin/nsd/remote.c
2264
(void)ssl_printf(ssl, "error: no such key with name: %s\n", arg);
usr.sbin/nsd/remote.c
2267
(void)ssl_printf(ssl, "key: name: \"%s\" secret: \"%s\" algorithm: %s\n", arg, key_opts->secret, key_opts->algorithm);
usr.sbin/nsd/remote.c
2282
(void)ssl_printf(ssl, "error: missing argument (keyname)\n");
usr.sbin/nsd/remote.c
2286
(void)ssl_printf(ssl, "error: missing argument (secret)\n");
usr.sbin/nsd/remote.c
2291
(void)ssl_printf(ssl, "error: no such key with name: %s\n", arg);
usr.sbin/nsd/remote.c
2296
(void)ssl_printf(ssl, "error: the secret: %s is not in b64 format\n", arg2);
usr.sbin/nsd/remote.c
2336
(void)ssl_printf(ssl, "error: missing argument (keyname)\n");
usr.sbin/nsd/remote.c
2345
(void)ssl_printf(ssl, "error: missing argument (secret)\n");
usr.sbin/nsd/remote.c
2349
(void)ssl_printf(ssl, "error: key %s already exists\n", arg);
usr.sbin/nsd/remote.c
2354
(void)ssl_printf(ssl, "error: the secret: %s is not in b64 format\n", arg2);
usr.sbin/nsd/remote.c
2361
(void)ssl_printf(ssl, "error: could not parse key name: %s\n", arg);
usr.sbin/nsd/remote.c
2366
(void)ssl_printf(ssl, "error: unknown algorithm: %s\n", algo);
usr.sbin/nsd/remote.c
2412
(void)ssl_printf(ssl, "error: missing argument (zonename)\n");
usr.sbin/nsd/remote.c
2416
(void)ssl_printf(ssl, "error: missing argument (keyname)\n");
usr.sbin/nsd/remote.c
2423
(void)ssl_printf(ssl, "error: missing argument (zone)\n");
usr.sbin/nsd/remote.c
2428
(void)ssl_printf(ssl, "error: key: %s does not exist\n", arg2);
usr.sbin/nsd/remote.c
2469
(void)ssl_printf(ssl, "error: missing argument (keyname)\n");
usr.sbin/nsd/remote.c
2474
(void)ssl_printf(ssl, "key %s does not exist, nothing to be deleted\n", arg);
usr.sbin/nsd/remote.c
2484
if(!ssl_printf(ssl, "zone %s uses key %s\n",
usr.sbin/nsd/remote.c
2493
(void)ssl_printf(ssl, "error: key: %s is in use and cannot be deleted\n", arg);
usr.sbin/nsd/remote.c
2508
(void)ssl_printf(ssl, "error: empty cookie-secret-file\n");
usr.sbin/nsd/remote.c
2511
(void)ssl_printf(ssl, "error: cookie secrets are already "
usr.sbin/nsd/remote.c
2531
(void)ssl_printf(ssl, "cookie-secret-file empty\n");
usr.sbin/nsd/remote.c
2535
(void)ssl_printf( ssl
usr.sbin/nsd/remote.c
2573
(void)ssl_printf(ssl, "error: no staging cookie secret to activate\n");
usr.sbin/nsd/remote.c
2599
(void)ssl_printf(ssl, "error: can not drop the currently active cookie secret\n");
usr.sbin/nsd/remote.c
2625
(void)ssl_printf(ssl, "error: missing argument (cookie_secret)\n");
usr.sbin/nsd/remote.c
2630
(void)ssl_printf(ssl, "invalid cookie secret: invalid argument length\n");
usr.sbin/nsd/remote.c
2631
(void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
usr.sbin/nsd/remote.c
2637
(void)ssl_printf(ssl, "invalid cookie secret: parse error\n");
usr.sbin/nsd/remote.c
2638
(void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
usr.sbin/nsd/remote.c
2654
(void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n"
usr.sbin/nsd/remote.c
2674
if(!ssl_printf(ssl, "source : random generated\n"))
usr.sbin/nsd/remote.c
2678
if(!ssl_printf( ssl, "source : \"%s\"\n"
usr.sbin/nsd/remote.c
2683
if(!ssl_printf(ssl, "source : configuration\n"))
usr.sbin/nsd/remote.c
2687
if(!ssl_printf(ssl, "source : unknown\n"))
usr.sbin/nsd/remote.c
2699
(void)ssl_printf(ssl, "active : %s\n", secret_hex);
usr.sbin/nsd/remote.c
2701
(void)ssl_printf(ssl, "staging: %s\n", secret_hex);
usr.sbin/nsd/remote.c
2703
(void)ssl_printf(ssl, "staging[%d]: %s\n", i, secret_hex);
usr.sbin/nsd/remote.c
2780
(void)ssl_printf(ssl, "error unknown command '%s'\n", p);
usr.sbin/nsd/remote.c
2838
(void)ssl_printf(res, "error version mismatch\n");
usr.sbin/nsd/remote.c
2982
return ssl_printf(ssl, "%s%lu%6.6lu\n", desc,
usr.sbin/nsd/remote.c
2985
return ssl_printf(ssl, "%s%lu\n", desc, (unsigned long)x);
usr.sbin/nsd/remote.c
3003
if(!ssl_printf(ssl, "%s%snum.type.%s=%lu\n", n, d,
usr.sbin/nsd/remote.c
3012
if(!ssl_printf(ssl, "%s%snum.opcode.%s=%lu\n", n, d,
usr.sbin/nsd/remote.c
3021
if(!ssl_printf(ssl, "%s%snum.class.%s=%lu\n", n, d,
usr.sbin/nsd/remote.c
3031
if(!ssl_printf(ssl, "%s%snum.rcode.%s=%lu\n", n, d, rcstr[i],
usr.sbin/nsd/remote.c
3037
if(!ssl_printf(ssl, "%s%snum.edns=%lu\n", n, d, (unsigned long)st->edns))
usr.sbin/nsd/remote.c
3041
if(!ssl_printf(ssl, "%s%snum.ednserr=%lu\n", n, d,
usr.sbin/nsd/remote.c
3046
if(!ssl_printf(ssl, "%s%snum.udp=%lu\n", n, d, (unsigned long)st->qudp))
usr.sbin/nsd/remote.c
3049
if(!ssl_printf(ssl, "%s%snum.udp6=%lu\n", n, d, (unsigned long)st->qudp6))
usr.sbin/nsd/remote.c
3052
if(!ssl_printf(ssl, "%s%snum.tcp=%lu\n", n, d, (unsigned long)st->ctcp))
usr.sbin/nsd/remote.c
3055
if(!ssl_printf(ssl, "%s%snum.tcp6=%lu\n", n, d, (unsigned long)st->ctcp6))
usr.sbin/nsd/remote.c
3058
if(!ssl_printf(ssl, "%s%snum.tls=%lu\n", n, d, (unsigned long)st->ctls))
usr.sbin/nsd/remote.c
3061
if(!ssl_printf(ssl, "%s%snum.tls6=%lu\n", n, d, (unsigned long)st->ctls6))
usr.sbin/nsd/remote.c
3065
if(!ssl_printf(ssl, "%s%snum.answer_wo_aa=%lu\n", n, d,
usr.sbin/nsd/remote.c
3070
if(!ssl_printf(ssl, "%s%snum.rxerr=%lu\n", n, d, (unsigned long)st->rxerr))
usr.sbin/nsd/remote.c
3074
if(!ssl_printf(ssl, "%s%snum.txerr=%lu\n", n, d, (unsigned long)st->txerr))
usr.sbin/nsd/remote.c
3078
if(!ssl_printf(ssl, "%s%snum.raxfr=%lu\n", n, d, (unsigned long)st->raxfr))
usr.sbin/nsd/remote.c
3082
if(!ssl_printf(ssl, "%s%snum.rixfr=%lu\n", n, d, (unsigned long)st->rixfr))
usr.sbin/nsd/remote.c
3086
if(!ssl_printf(ssl, "%s%snum.truncated=%lu\n", n, d,
usr.sbin/nsd/remote.c
3091
if(!ssl_printf(ssl, "%s%snum.dropped=%lu\n", n, d,
usr.sbin/nsd/remote.c
3154
if(!ssl_printf(ssl, "%s%snum.queries=%lu\n", name, ".",
usr.sbin/nsd/remote.c
3182
if(!ssl_printf(ssl, "server%d.queries=%lu\n", (int)i,
usr.sbin/nsd/remote.c
3187
if(!ssl_printf(ssl, "num.queries=%lu\n", (unsigned long)total))
usr.sbin/nsd/remote.c
3193
if(!ssl_printf(ssl, "time.boot=%lu.%6.6lu\n",
usr.sbin/nsd/remote.c
3196
if(!ssl_printf(ssl, "time.elapsed=%lu.%6.6lu\n",
usr.sbin/nsd/remote.c
3216
if(!ssl_printf(ssl, "zone.primary=%lu\n",
usr.sbin/nsd/remote.c
3219
if(!ssl_printf(ssl, "zone.secondary=%lu\n", (unsigned long)xfrd->zones->count))
usr.sbin/nsd/remote.c
3221
if(!ssl_printf(ssl, "zone.master=%lu\n",
usr.sbin/nsd/remote.c
3224
if(!ssl_printf(ssl, "zone.slave=%lu\n", (unsigned long)xfrd->zones->count))
usr.sbin/nsd/remote.c
850
(void)ssl_printf(ssl, "ok\n");
usr.sbin/nsd/remote.c
866
(void)ssl_printf(ssl, "error cannot parse zone name '%s'\n", arg);
usr.sbin/nsd/remote.c
873
(void)ssl_printf(ssl, "error zone %s not configured\n", arg);
usr.sbin/nsd/remote.c
940
(void)ssl_printf(ssl, "error zone does not have notify\n");
usr.sbin/nsd/remote.c
966
(void)ssl_printf(ssl, "error zone not secondary\n");
usr.sbin/nsd/remote.c
972
(void)ssl_printf(ssl, "ok, %lu zones\n", (unsigned long)xfrd->zones->count);
usr.sbin/unbound/daemon/cachedump.c
1001
return ssl_printf(ssl, "no delegation from "
usr.sbin/unbound/daemon/cachedump.c
1011
if(!ssl_printf(ssl, "cache delegation was "
usr.sbin/unbound/daemon/cachedump.c
1016
return ssl_printf(ssl, "no delegation from "
usr.sbin/unbound/daemon/cachedump.c
1024
if(!ssl_printf(ssl, "going up, lookup %s\n", b))
usr.sbin/unbound/daemon/cachedump.c
1033
if(!ssl_printf(ssl, "The noprime stub servers "
usr.sbin/unbound/daemon/cachedump.c
1039
if(!ssl_printf(ssl, "The stub is primed "
usr.sbin/unbound/daemon/cachedump.c
139
if(!ssl_printf(ssl, "%s", s->str))
usr.sbin/unbound/daemon/cachedump.c
281
if(!ssl_printf(ssl, "START_RRSET_CACHE\n")) return 0;
usr.sbin/unbound/daemon/cachedump.c
284
return ssl_printf(ssl, "END_RRSET_CACHE\n");
usr.sbin/unbound/daemon/cachedump.c
412
if(!ssl_printf(ssl, "START_MSG_CACHE\n")) return 0;
usr.sbin/unbound/daemon/cachedump.c
416
return ssl_printf(ssl, "END_MSG_CACHE\n");
usr.sbin/unbound/daemon/cachedump.c
426
return ssl_printf(ssl, "EOF\n");
usr.sbin/unbound/daemon/cachedump.c
862
if(!ssl_printf(ssl, "%-16s\t", buf))
usr.sbin/unbound/daemon/cachedump.c
865
if(!ssl_printf(ssl, "Address is BOGUS. "))
usr.sbin/unbound/daemon/cachedump.c
874
if(!ssl_printf(ssl, "expired, rto %d msec, tA %d "
usr.sbin/unbound/daemon/cachedump.c
881
if(!ssl_printf(ssl, "not in infra cache.\n"))
usr.sbin/unbound/daemon/cachedump.c
892
if(!ssl_printf(ssl, "not in infra cache.\n"))
usr.sbin/unbound/daemon/cachedump.c
896
if(!ssl_printf(ssl, "%s%s%s%srto %d msec, ttl " ARG_LL "d, "
usr.sbin/unbound/daemon/cachedump.c
905
if(!ssl_printf(ssl, ", probedelay %d", delay))
usr.sbin/unbound/daemon/cachedump.c
911
if(!ssl_printf(ssl, ", noEDNS%s.",
usr.sbin/unbound/daemon/cachedump.c
915
if(!ssl_printf(ssl, ", EDNS %d%s.", edns_vs,
usr.sbin/unbound/daemon/cachedump.c
920
if(!ssl_printf(ssl, "\n"))
usr.sbin/unbound/daemon/cachedump.c
940
if(!ssl_printf(ssl, "Address is BOGUS:\n"))
usr.sbin/unbound/daemon/cachedump.c
953
if(!ssl_printf(ssl, "Delegation with %d names, of which %d "
usr.sbin/unbound/daemon/cachedump.c
980
if(!ssl_printf(ssl, "The following name servers are used for lookup "
usr.sbin/unbound/daemon/cachedump.c
986
if(!ssl_printf(ssl, "forwarding request:\n")) {
usr.sbin/unbound/daemon/remote.c
1006
if(!ssl_printf(ssl,
usr.sbin/unbound/daemon/remote.c
1049
if(!ssl_printf(ssl, "num.query.type.%s"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1053
if(!ssl_printf(ssl, "num.query.type.other"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1066
if(!ssl_printf(ssl, "num.query.class.%s"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1070
if(!ssl_printf(ssl, "num.query.class.other"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1083
if(!ssl_printf(ssl, "num.query.opcode.%s"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1087
if(!ssl_printf(ssl, "num.query.tcp"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1089
if(!ssl_printf(ssl, "num.query.tcpout"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1091
if(!ssl_printf(ssl, "num.query.udpout"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1093
if(!ssl_printf(ssl, "num.query.tls"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1095
if(!ssl_printf(ssl, "num.query.tls.resume"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1097
if(!ssl_printf(ssl, "num.query.ipv6"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1099
if(!ssl_printf(ssl, "num.query.https"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1102
if(!ssl_printf(ssl, "num.query.quic"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1106
if(!ssl_printf(ssl, "num.query.flags.QR"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1108
if(!ssl_printf(ssl, "num.query.flags.AA"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1110
if(!ssl_printf(ssl, "num.query.flags.TC"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1112
if(!ssl_printf(ssl, "num.query.flags.RD"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1114
if(!ssl_printf(ssl, "num.query.flags.RA"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1116
if(!ssl_printf(ssl, "num.query.flags.Z"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1118
if(!ssl_printf(ssl, "num.query.flags.AD"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1120
if(!ssl_printf(ssl, "num.query.flags.CD"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1122
if(!ssl_printf(ssl, "num.query.edns.present"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1124
if(!ssl_printf(ssl, "num.query.edns.DO"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1138
if(!ssl_printf(ssl, "num.answer.rcode.%s"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1142
if(!ssl_printf(ssl, "num.answer.rcode.nodata"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1146
if(!ssl_printf(ssl, "num.query.ratelimited"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1149
if(!ssl_printf(ssl, "num.answer.secure"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1151
if(!ssl_printf(ssl, "num.answer.bogus"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1153
if(!ssl_printf(ssl, "num.rrset.bogus"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1155
if(!ssl_printf(ssl, "num.valops"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1157
if(!ssl_printf(ssl, "num.query.aggressive.NOERROR"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1159
if(!ssl_printf(ssl, "num.query.aggressive.NXDOMAIN"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1162
if(!ssl_printf(ssl, "unwanted.queries"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1164
if(!ssl_printf(ssl, "unwanted.replies"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1167
if(!ssl_printf(ssl, "msg.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1169
if(!ssl_printf(ssl, "rrset.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1171
if(!ssl_printf(ssl, "infra.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1173
if(!ssl_printf(ssl, "key.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1176
if(!ssl_printf(ssl, "msg.cache.max_collisions"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1178
if(!ssl_printf(ssl, "rrset.cache.max_collisions"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1186
if(!ssl_printf(ssl, "num.rpz.action.%s"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1191
if(!ssl_printf(ssl, "dnscrypt_shared_secret.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1193
if(!ssl_printf(ssl, "dnscrypt_nonce.cache.count"SQ"%u\n",
usr.sbin/unbound/daemon/remote.c
1195
if(!ssl_printf(ssl, "num.query.dnscrypt.shared_secret.cachemiss"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1197
if(!ssl_printf(ssl, "num.query.dnscrypt.replay"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1200
if(!ssl_printf(ssl, "num.query.authzone.up"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1202
if(!ssl_printf(ssl, "num.query.authzone.down"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1205
if(!ssl_printf(ssl, "num.query.subnet"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1207
if(!ssl_printf(ssl, "num.query.subnet_cache"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1211
if(!ssl_printf(ssl, "num.query.cachedb"SQ"%lu\n",
usr.sbin/unbound/daemon/remote.c
1263
ssl_printf(ssl, "error: this option requires a domain name\n");
usr.sbin/unbound/daemon/remote.c
1268
ssl_printf(ssl, "error cannot parse name %s at %d: %s\n", str,
usr.sbin/unbound/daemon/remote.c
1275
ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
1300
ssl_printf(ssl, "error could not find next argument "
usr.sbin/unbound/daemon/remote.c
1322
ssl_printf(ssl, "error not a zone type. %s\n", arg2);
usr.sbin/unbound/daemon/remote.c
1340
ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
1375
if(!ssl_printf(ssl, "error for input line: %s\n",
usr.sbin/unbound/daemon/remote.c
1381
(void)ssl_printf(ssl, "added %d zones\n", num);
usr.sbin/unbound/daemon/remote.c
1433
if(!ssl_printf(ssl, "error for input line: %s\n",
usr.sbin/unbound/daemon/remote.c
1439
(void)ssl_printf(ssl, "removed %d zones\n", num);
usr.sbin/unbound/daemon/remote.c
1455
if(!ssl_printf(ssl, "error parsing local-data at %sposition %d '%s': %s\n",
usr.sbin/unbound/daemon/remote.c
1472
ssl_printf(ssl,"error in syntax or out of memory, %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1509
(void)ssl_printf(ssl, "added %d datas\n", num);
usr.sbin/unbound/daemon/remote.c
1555
if(!ssl_printf(ssl, "error for input line: %s\n",
usr.sbin/unbound/daemon/remote.c
1561
(void)ssl_printf(ssl, "removed %d datas\n", num);
usr.sbin/unbound/daemon/remote.c
1574
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1580
ssl_printf(ssl,"error out of memory\n");
usr.sbin/unbound/daemon/remote.c
1606
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1628
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1634
ssl_printf(ssl,"error out of memory\n");
usr.sbin/unbound/daemon/remote.c
1653
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1659
ssl_printf(ssl,"error out of memory\n");
usr.sbin/unbound/daemon/remote.c
1681
(void)ssl_printf(ssl, "added %d datas\n", num);
usr.sbin/unbound/daemon/remote.c
1694
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1717
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
1722
ssl_printf(ssl, "removed 0 datas\n");
usr.sbin/unbound/daemon/remote.c
1739
if(!ssl_printf(ssl, "error for input line: %s\n",
usr.sbin/unbound/daemon/remote.c
1746
(void)ssl_printf(ssl, "removed %d datas\n", num);
usr.sbin/unbound/daemon/remote.c
1804
if(!ssl_printf(inf->ssl, "subnet %s/%d%s %s %s %s " ARG_LL "d\n", astr,
usr.sbin/unbound/daemon/remote.c
1810
ssl_printf(inf->ssl,
usr.sbin/unbound/daemon/remote.c
1828
ssl_printf(inf->ssl, "BADRR\n");
usr.sbin/unbound/daemon/remote.c
1830
ssl_printf(inf->ssl, "%s", s);
usr.sbin/unbound/daemon/remote.c
1835
ssl_printf(inf->ssl, "\n");
usr.sbin/unbound/daemon/remote.c
1928
ssl_printf(inf->ssl, "BADRR\n");
usr.sbin/unbound/daemon/remote.c
1931
ssl_printf(inf->ssl, "%s", s);
usr.sbin/unbound/daemon/remote.c
1933
ssl_printf(inf->ssl, "\n");
usr.sbin/unbound/daemon/remote.c
1967
ssl_printf(inf->ssl,
usr.sbin/unbound/daemon/remote.c
1986
ssl_printf(inf->ssl, "BADRR\n");
usr.sbin/unbound/daemon/remote.c
1989
ssl_printf(inf->ssl, "%s", s);
usr.sbin/unbound/daemon/remote.c
1993
ssl_printf(inf->ssl, "\n");
usr.sbin/unbound/daemon/remote.c
2061
ssl_printf(ssl, "error cannot parse name %s at %d: %s\n", s,
usr.sbin/unbound/daemon/remote.c
2067
ssl_printf(ssl, "error name too short: '%s'. Need example.com. or longer, short names take very long, use +t to allow them.\n", s);
usr.sbin/unbound/daemon/remote.c
2156
(void)ssl_printf(ssl, "error parsing RRset type: '%s'\n", arg2);
usr.sbin/unbound/daemon/remote.c
2236
(void)ssl_printf(ssl, "error parsing ip addr: '%s'\n", arg);
usr.sbin/unbound/daemon/remote.c
2359
(void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
usr.sbin/unbound/daemon/remote.c
2437
(void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
usr.sbin/unbound/daemon/remote.c
2525
(void)ssl_printf(ssl, "ok removed %lu rrsets, %lu messages "
usr.sbin/unbound/daemon/remote.c
2571
if(!ssl_printf(ssl, "%s %s %s ", buf, (c?c:"CLASS??"), str)) {
usr.sbin/unbound/daemon/remote.c
2579
if(!ssl_printf(ssl, "%s%s", (f?" ":""), buf))
usr.sbin/unbound/daemon/remote.c
2585
if(!ssl_printf(ssl, "%s%s", (f?" ":""), buf))
usr.sbin/unbound/daemon/remote.c
2589
return ssl_printf(ssl, "\n");
usr.sbin/unbound/daemon/remote.c
2601
return ssl_printf(ssl, "off (using root hints)\n");
usr.sbin/unbound/daemon/remote.c
2625
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2641
(void)ssl_printf(ssl, "error cannot parse"
usr.sbin/unbound/daemon/remote.c
2652
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2666
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2684
(void)ssl_printf(ssl, "error: structure not allocated\n");
usr.sbin/unbound/daemon/remote.c
2702
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2729
(void)ssl_printf(ssl, "error: unknown option %s\n", args);
usr.sbin/unbound/daemon/remote.c
2774
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2782
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2833
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2845
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2852
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2904
(void)ssl_printf(ssl, "error out of memory\n");
usr.sbin/unbound/daemon/remote.c
2938
ssl_printf(ssl, "%s\n", buf);
usr.sbin/unbound/daemon/remote.c
2950
if(!ssl_printf(ssl, "version: %s\n", PACKAGE_VERSION))
usr.sbin/unbound/daemon/remote.c
2952
if(!ssl_printf(ssl, "verbosity: %d\n", verbosity))
usr.sbin/unbound/daemon/remote.c
2954
if(!ssl_printf(ssl, "threads: %d\n", worker->daemon->num))
usr.sbin/unbound/daemon/remote.c
2956
if(!ssl_printf(ssl, "modules: %d [", worker->daemon->mods.num))
usr.sbin/unbound/daemon/remote.c
2959
if(!ssl_printf(ssl, " %s", worker->daemon->mods.mod[i]->name))
usr.sbin/unbound/daemon/remote.c
2962
if(!ssl_printf(ssl, " ]\n"))
usr.sbin/unbound/daemon/remote.c
2965
if(!ssl_printf(ssl, "uptime: " ARG_LL "d seconds\n", (long long)uptime))
usr.sbin/unbound/daemon/remote.c
2967
if(!ssl_printf(ssl, "options:%s%s%s%s\n" ,
usr.sbin/unbound/daemon/remote.c
2974
if(!ssl_printf(ssl, "unbound (pid %d) is running...\n",
usr.sbin/unbound/daemon/remote.c
3062
if(!ssl_printf(ssl, "thread #%d\n", worker->thread_num))
usr.sbin/unbound/daemon/remote.c
3064
if(!ssl_printf(ssl, "# type cl name seconds module status\n"))
usr.sbin/unbound/daemon/remote.c
3075
if(!ssl_printf(ssl, "%3d %4s %2s %s %s %s\n",
usr.sbin/unbound/daemon/remote.c
3123
if(!ssl_printf(a->ssl, "%s %s expired rto %d\n", ip_str,
usr.sbin/unbound/daemon/remote.c
3131
if(!ssl_printf(a->ssl, "%s %s ttl %lu ping %d var %d rtt %d rto %d "
usr.sbin/unbound/daemon/remote.c
3197
(void)ssl_printf(ssl, "error no auth-zone %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3205
(void)ssl_printf(ssl, "error failed to read %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3216
(void)ssl_printf(ssl, "zone %s has no contents\n", arg);
usr.sbin/unbound/daemon/remote.c
3221
(void)ssl_printf(ssl, "error: no SOA in zone after read %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3236
(void)ssl_printf(ssl, "error zonemd for %s failed: %s\n",
usr.sbin/unbound/daemon/remote.c
3242
(void)ssl_printf(ssl, "%s: %s\n", arg, reason);
usr.sbin/unbound/daemon/remote.c
3261
(void)ssl_printf(ssl, "error zone xfr task not found %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3277
(void)ssl_printf(ssl, "error setting option\n");
usr.sbin/unbound/daemon/remote.c
3295
(void)ssl_printf(ssl, "%s\n", line);
usr.sbin/unbound/daemon/remote.c
3305
(void)ssl_printf(ssl, "error unknown option\n");
usr.sbin/unbound/daemon/remote.c
3418
if(!ssl_printf(ssl, "%s\t%s%s\n", buf, buf2, buf3)) {
usr.sbin/unbound/daemon/remote.c
3437
if(!ssl_printf(ssl, "%s %s\n", buf,
usr.sbin/unbound/daemon/remote.c
3469
if(!ssl_printf(ssl, "BADRR\n")) {
usr.sbin/unbound/daemon/remote.c
3475
if(!ssl_printf(ssl, "%s\n", s)) {
usr.sbin/unbound/daemon/remote.c
3495
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3511
ssl_printf(ssl,"no view with name: %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3551
ssl_printf(a->ssl, "%s %d limit %d\n", buf, max, lim);
usr.sbin/unbound/daemon/remote.c
3569
ssl_printf(a->ssl, "%s %d limit %d\n", ip, max, lim);
usr.sbin/unbound/daemon/remote.c
3630
(void) ssl_printf(ssl, "error no auth-zone %s\n", arg);
usr.sbin/unbound/daemon/remote.c
3634
(void) ssl_printf(ssl, "error auth-zone %s not RPZ\n", arg);
usr.sbin/unbound/daemon/remote.c
3671
(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
usr.sbin/unbound/daemon/remote.c
3678
(void)ssl_printf(ssl, "unable to open cookie secret file %s: %s",
usr.sbin/unbound/daemon/remote.c
3711
(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
usr.sbin/unbound/daemon/remote.c
3715
(void)ssl_printf(ssl, "error: there are no cookie_secrets.");
usr.sbin/unbound/daemon/remote.c
3722
(void)ssl_printf(ssl, "error: no staging cookie secret to activate\n");
usr.sbin/unbound/daemon/remote.c
3728
(void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
usr.sbin/unbound/daemon/remote.c
3746
(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
usr.sbin/unbound/daemon/remote.c
3750
(void)ssl_printf(ssl, "error: there are no cookie_secrets.");
usr.sbin/unbound/daemon/remote.c
3757
(void)ssl_printf(ssl, "error: can not drop the currently active cookie secret\n");
usr.sbin/unbound/daemon/remote.c
3763
(void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
usr.sbin/unbound/daemon/remote.c
3782
(void)ssl_printf(ssl, "error: no cookie secret file configured\n");
usr.sbin/unbound/daemon/remote.c
3788
(void)ssl_printf(ssl, "error: out of memory");
usr.sbin/unbound/daemon/remote.c
3797
(void)ssl_printf(ssl, "error: missing argument (cookie_secret)\n");
usr.sbin/unbound/daemon/remote.c
3803
(void)ssl_printf(ssl, "invalid cookie secret: invalid argument length\n");
usr.sbin/unbound/daemon/remote.c
3804
(void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
usr.sbin/unbound/daemon/remote.c
3812
(void)ssl_printf(ssl, "invalid cookie secret: parse error\n");
usr.sbin/unbound/daemon/remote.c
3813
(void)ssl_printf(ssl, "please provide a 128bit hex encoded secret\n");
usr.sbin/unbound/daemon/remote.c
3821
(void)ssl_printf(ssl, "error: writing to cookie secret file: \"%s\"\n",
usr.sbin/unbound/daemon/remote.c
3854
(void)ssl_printf(ssl, "active : %s\n", secret_hex);
usr.sbin/unbound/daemon/remote.c
3856
(void)ssl_printf(ssl, "staging: %s\n", secret_hex);
usr.sbin/unbound/daemon/remote.c
3858
(void)ssl_printf(ssl, "staging[%d]: %s\n", i,
usr.sbin/unbound/daemon/remote.c
3882
(void)ssl_printf(ssl, "error command %s takes no arguments,"
usr.sbin/unbound/daemon/remote.c
3941
(void)ssl_printf(ssl, "dump_cache/load_cache is not "
usr.sbin/unbound/daemon/remote.c
4153
(void)ssl_printf(ssl, "error unknown command '%s'\n", p);
usr.sbin/unbound/daemon/remote.c
4226
ssl_printf(res, "error version mismatch\n");
usr.sbin/unbound/daemon/remote.c
674
(void)ssl_printf(ssl, "ok\n");
usr.sbin/unbound/daemon/remote.c
690
(void)ssl_printf(ssl, "error could not distribute cmd\n");
usr.sbin/unbound/daemon/remote.c
732
if(!ssl_printf(ssl,
usr.sbin/unbound/daemon/remote.c
743
if(!ssl_printf(ssl, "error: unknown option '%s'\n", argp))
usr.sbin/unbound/daemon/remote.c
756
if(!ssl_printf(ssl, "error: no threads for fast_reload, compiled without threads.\n"))
usr.sbin/unbound/daemon/remote.c
766
if(!ssl_printf(ssl, "start fast_reload\n"))
usr.sbin/unbound/daemon/remote.c
780
ssl_printf(ssl, "error in verbosity number syntax: %s\n", str);
usr.sbin/unbound/daemon/remote.c
792
if(!ssl_printf(ssl, "%s.num.queries"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
794
if(!ssl_printf(ssl, "%s.num.queries_ip_ratelimited"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
796
if(!ssl_printf(ssl, "%s.num.queries_cookie_valid"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
798
if(!ssl_printf(ssl, "%s.num.queries_cookie_client"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
800
if(!ssl_printf(ssl, "%s.num.queries_cookie_invalid"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
802
if(!ssl_printf(ssl, "%s.num.queries_discard_timeout"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
804
if(!ssl_printf(ssl, "%s.num.queries_wait_limit"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
806
if(!ssl_printf(ssl, "%s.num.cachehits"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
809
if(!ssl_printf(ssl, "%s.num.cachemiss"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
811
if(!ssl_printf(ssl, "%s.num.prefetch"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
813
if(!ssl_printf(ssl, "%s.num.queries_timed_out"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
815
if(!ssl_printf(ssl, "%s.query.queue_time_us.max"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
817
if(!ssl_printf(ssl, "%s.num.expired"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
8171
if(!ssl_printf(ssl, "error could not setup thread\n"))
usr.sbin/unbound/daemon/remote.c
819
if(!ssl_printf(ssl, "%s.num.recursivereplies"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
8193
if(!ssl_printf(ssl, "error out of memory\n"))
usr.sbin/unbound/daemon/remote.c
8200
if(!ssl_printf(ssl, "error out of memory adding service event\n"))
usr.sbin/unbound/daemon/remote.c
822
if(!ssl_printf(ssl, "%s.num.dnscrypt.crypted"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
8220
if(!ssl_printf(ssl, "error out of memory create printq\n"))
usr.sbin/unbound/daemon/remote.c
824
if(!ssl_printf(ssl, "%s.num.dnscrypt.cert"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
826
if(!ssl_printf(ssl, "%s.num.dnscrypt.cleartext"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
828
if(!ssl_printf(ssl, "%s.num.dnscrypt.malformed"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
831
if(!ssl_printf(ssl, "%s.num.dns_error_reports"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
833
if(!ssl_printf(ssl, "%s.requestlist.avg"SQ"%g\n", nm,
usr.sbin/unbound/daemon/remote.c
838
if(!ssl_printf(ssl, "%s.requestlist.max"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
840
if(!ssl_printf(ssl, "%s.requestlist.overwritten"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
842
if(!ssl_printf(ssl, "%s.requestlist.exceeded"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
844
if(!ssl_printf(ssl, "%s.requestlist.current.all"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
846
if(!ssl_printf(ssl, "%s.requestlist.current.user"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
853
if(!ssl_printf(ssl, "%s.recursion.time.avg"SQ ARG_LL "d.%6.6d\n", nm,
usr.sbin/unbound/daemon/remote.c
855
if(!ssl_printf(ssl, "%s.recursion.time.median"SQ"%g\n", nm,
usr.sbin/unbound/daemon/remote.c
857
if(!ssl_printf(ssl, "%s.tcpusage"SQ"%lu\n", nm,
usr.sbin/unbound/daemon/remote.c
880
return ssl_printf(ssl, "%s%u%6.6u\n", desc,
usr.sbin/unbound/daemon/remote.c
883
return ssl_printf(ssl, "%s%lu\n", desc, (unsigned long)x);
usr.sbin/unbound/daemon/remote.c
984
if(!ssl_printf(ssl, "time.now"SQ ARG_LL "d.%6.6d\n",
usr.sbin/unbound/daemon/remote.c
986
if(!ssl_printf(ssl, "time.up"SQ ARG_LL "d.%6.6d\n",
usr.sbin/unbound/daemon/remote.c
988
if(!ssl_printf(ssl, "time.elapsed"SQ ARG_LL "d.%6.6d\n",
usr.sbin/unbound/daemon/remote.h
325
int ssl_printf(RES* ssl, const char* format, ...)