Home
last modified time | relevance | path

Searched refs:log_default (Results 1 – 25 of 48) sorted by relevance

12

/dports/devel/p5-Log-Agent/Log-Agent-1.005/
H A DAgent.pm209 sub log_default { subroutine
222 &log_default unless defined $Driver;
237 &log_default unless defined $Driver;
252 &log_default unless defined $Driver;
267 &log_default unless defined $Driver;
281 &log_default unless defined $Driver;
294 &log_default unless defined $Driver;
308 &log_default unless defined $Driver;
321 &log_default unless defined $Driver;
334 &log_default unless defined $Driver;
[all …]
/dports/net/mDNSResponder/mDNSResponder-1310.140.1/mDNSMacOSX/dnssec_v2/
H A Ddnssec_v2_trust_anchor.c244log_default("[R%u] trust_anchor_can_be_reached? Yes, trust anchor found for original response", re… in trust_anchor_can_be_reached()
250log_default("[R%u] trust_anchor_can_be_reached? Yes, suppressed answer is always trusted", request… in trust_anchor_can_be_reached()
255log_default("[R%u] trust_anchor_can_be_reached? No, did not get any original response", request_id… in trust_anchor_can_be_reached()
261 log_default("[R%u] trust_anchor_can_be_reached? No, zone list is empty", request_id); in trust_anchor_can_be_reached()
269log_default("[R%u] trust_anchor_can_be_reached? No, no trust anchor found in the current root", re… in trust_anchor_can_be_reached()
283log_default("[R%u] trust_anchor_can_be_reached? No, not receiving DS reocrds; qname=" PRI_DM_NAME, in trust_anchor_can_be_reached()
290log_default("[R%u] trust_anchor_can_be_reached? No, DNSKEY Set is not completed; qname=" PRI_DM_NA… in trust_anchor_can_be_reached()
296log_default("[R%u] trust_anchor_can_be_reached? No, DNSKEY Set does not have any RRSIG; qname=" PR… in trust_anchor_can_be_reached()
303log_default("[R%u] trust_anchor_can_be_reached? No, DS Set is not completed; qname=" PRI_DM_NAME, in trust_anchor_can_be_reached()
309log_default("[R%u] trust_anchor_can_be_reached? No, DS Set does not have any RRSIG; qname=" PRI_DM… in trust_anchor_can_be_reached()
[all …]
H A Ddnssec_v2_validation.c885 log_default("nsec3 list is empty")); in validate_nsec3_response()
888 log_default("NSEC3s with different algorithm, salt or iteration in the same response")); in validate_nsec3_response()
906 validation_result = dnssec_validation_bogus;log_default("Cannot find closest encloser;")); in validate_nsec3_response()
2214 log_default("Unsupported or invalid DS digest type; digest_type=%u", ds->digest_type)); in validate_ds()
2235 log_default("Not a DNSSEC DNSKEY in DNSKEY; flags=%x", dnskey->flags)); in validate_dnskey()
2243 log_default("Not a DNSSEC Protocol in DNSKEY; protocol=%u", dnskey->protocol)); in validate_dnskey()
2393 log_default("No enough memory to allocate for signed data;")); in validate_path_from_zsk_to_rr()
2424 log_default("No enough memory to allocate for signed data;")); in validate_path_from_ksk_to_zsk()
2454 log_default("No enough memory to allocate for signed data;")); in validate_path_from_zsk_to_ds()
2563 log_default("The RRSIG does not cover the current record; RRSIG=" PUB_S ", RR=" PUB_S, in check_rrsig_validity_with_dnssec_rr()
[all …]
H A Ddnssec_v2_log.h16 #define log_default(FORMAT, ...) LogRedact(MDNS_LOG_CATEGORY_DNSSEC, MDNS_LOG_DEFAULT, FORMAT, ## _… macro
H A Ddnssec_v2_retrieval.c401 …retrieval_result = dnssec_retrieval_waiting_for_records; log_default("[R%u] still waiting for the … in fetch_necessary_dnssec_records()
1117log_default("[R%u->Q%u] Removing DS record from the zone - hostname: " PRI_DM_NAME, request_id, qu… in update_dnssec_zone_t_from_cache_for_no_error_response()
1158log_default("Ignoring record: name="PRI_DM_NAME ", rr_type=" PUB_S ", original_ttl=%d, remaining_t… in update_dnssec_zone_t_from_cache_for_no_error_response()
1162log_default("[R%u->Q%u] Adding record: name="PRI_DM_NAME ", rr_type=" PUB_S ", original_ttl=%d, re… in update_dnssec_zone_t_from_cache_for_no_error_response()
1301log_default("Ignoring record: name="PRI_DM_NAME ", rr_type=" PUB_S ", original_ttl=%d, remaining_t… in update_original_from_cache_for_no_error_response()
1305log_default("[R%u->Q%u] Adding record: name="PRI_DM_NAME ", rr_type=" PUB_S ", original_ttl=%d, re… in update_original_from_cache_for_no_error_response()
1441log_default("[R%u->Q%u] Adding negative answer verified by NSEC record; name=" PRI_DM_NAME ", rr_t… in update_original_from_cache_for_denial_of_existence_response()
1446log_default("[R%u->Q%u] Adding negative answer verified by NSEC3 record; name=" PRI_DM_NAME ", rr_… in update_original_from_cache_for_denial_of_existence_response()
1471log_default("[R%u->Q%u] Adding denial of existence record: name=" PRI_DM_NAME ", rr_type=" PUB_S "… in update_original_from_cache_for_denial_of_existence_response()
1499log_default("Ignoring record: name="PRI_DM_NAME ", rr_type=" PUB_S ", original_ttl=%d, remaining_t… in update_original_from_cache_for_denial_of_existence_response()
[all …]
H A Ddnssec_v2_crypto.c260 log_default("SecKeyVerifySignature error: %@", CFErrorCopyDescription(cf_error)); in validate_signed_data_with_rrsig_and_dnskey()
670log_default("[R%u] "PRI_DM_NAME ": DNSKEY (alg=%u, tag=%u, length=%u) -----> " PRI_DM_NAME ": " PU… in print_validation_progress()
H A Ddnssec_v2.c335log_default("[R%u] Stopping " PUB_S "DNSSEC request -- hostname: " PRI_DM_NAME ", type: " PUB_S, r… in stop_dnssec()
/dports/net-p2p/bitmark-recorder/bitmarkd-0.13.3/testing/
H A Dgenerate-bitmarkd-configuration76 log_default=error
172 case "${log_default}" in
174 log_default=warn
177 log_default=info
180 log_default=debug
183 log_default=trace
186 log_default=info
284 -v log_default="${log_default}" \
/dports/net-p2p/bitmark-cli/bitmarkd-0.13.3/testing/
H A Dgenerate-bitmarkd-configuration76 log_default=error
172 case "${log_default}" in
174 log_default=warn
177 log_default=info
180 log_default=debug
183 log_default=trace
186 log_default=info
284 -v log_default="${log_default}" \
/dports/net-p2p/bitmark/bitmarkd-0.13.3/testing/
H A Dgenerate-bitmarkd-configuration76 log_default=error
172 case "${log_default}" in
174 log_default=warn
177 log_default=info
180 log_default=debug
183 log_default=trace
186 log_default=info
284 -v log_default="${log_default}" \
/dports/net-p2p/bitmark-daemon/bitmarkd-0.13.3/testing/
H A Dgenerate-bitmarkd-configuration76 log_default=error
172 case "${log_default}" in
174 log_default=warn
177 log_default=info
180 log_default=debug
183 log_default=trace
186 log_default=info
284 -v log_default="${log_default}" \
/dports/irc/srvx/srvx-1.3.1/src/
H A Dlog.c73 static struct log_type *log_default; variable
407 logList_join(&log_default->logs[sev], &target); in log_debug()
542 for (ii=0; ii<log_default->logs[sev].used; ++ii) { in log_audit()
543 struct logDestination *ld = log_default->logs[sev].list[ii]; in log_audit()
557 for (ii=0; ii<log_default->logs[LOG_REPLAY].used; ++ii) { in log_replay()
558 struct logDestination *ld = log_default->logs[LOG_REPLAY].list[ii]; in log_replay()
582 for (ii=0; ii<log_default->logs[sev].used; ++ii) { in log_module()
583 struct logDestination *ld = log_default->logs[sev].list[ii]; in log_module()
999 log_default = log_register_type("*", NULL); in log_init()
/dports/japanese/kterm/kterm-6.2.0.fb6/
H A Dmisc.c608 static char *log_default; local
624 if(log_default == NULL)
625 log_default = log_def_name;
626 mktemp(log_default);
627 if((screen->logfile = malloc((unsigned)strlen(log_default) + 1)) == NULL)
629 strcpy(screen->logfile, log_default);
/dports/net/freeswitch/freeswitch-1.10.3.-release/libs/sofia-sip/libsofia-sip-ua/su/sofia-sip/
H A Dsu_log.h72 unsigned log_default; member
/dports/net/sofia-sip/sofia-sip-1.13.4/libsofia-sip-ua/su/sofia-sip/
H A Dsu_log.h72 unsigned log_default; member
/dports/net-p2p/ncdc/ncdc-1.22.1/src/
H A Dui_logwindow.c277 attr[mask] = UIC(log_default);\ in ui_logwindow_calc_color()
319 attr[mask] = UIC(log_default); in ui_logwindow_calc_color()
H A Dui_colors.c41 C(log_default, "default")\
/dports/net/freeswitch/freeswitch-1.10.3.-release/libs/sofia-sip/libsofia-sip-ua/su/
H A Dsu_log.c177 log->log_level = log->log_default; in su_log_init()
/dports/net/sofia-sip/sofia-sip-1.13.4/libsofia-sip-ua/su/
H A Dsu_log.c177 log->log_level = log->log_default; in su_log_init()
/dports/net/gsk/gsk-1.0.63/src/
H A Dgsklog.c635 log_default (const gchar *log_domain, in log_default() function
658 g_log_set_default_handler (log_default, NULL); in gsk_log_init()
/dports/x11/xterm/xterm-370/
H A Dmisc.c2439 static char *log_default = NULL; in GenerateLogPath() local
2442 if (log_default) in GenerateLogPath()
2443 return (log_default); in GenerateLogPath()
2464 ((log_default = (char *) malloc((sizeof(form) in GenerateLogPath()
2468 (void) sprintf(log_default, in GenerateLogPath()
2476 if ((log_default = x_strdup(log_def_name)) != NULL) { in GenerateLogPath()
2477 mktemp(log_default); in GenerateLogPath()
2481 return (log_default); in GenerateLogPath()
/dports/net/freeswitch/freeswitch-1.10.3.-release/libs/sofia-sip/libsofia-sip-ua/tport/
H A Dtest_tport.c1675 tport_log->log_default = 9; in main()
1677 tport_log->log_default = 1; in main()
/dports/net/sofia-sip/sofia-sip-1.13.4/libsofia-sip-ua/tport/
H A Dtest_tport.c1675 tport_log->log_default = 9; in main()
1677 tport_log->log_default = 1; in main()
/dports/mail/exim-monitor/exim-4.95/src/
H A Dglobals.h692 extern int log_default[]; /* Initialization list for log_selector */
/dports/mail/exim-mysql/exim-4.95/src/
H A Dglobals.h692 extern int log_default[]; /* Initialization list for log_selector */

12