/dports/devel/p5-Log-Agent/Log-Agent-1.005/ |
H A D | Agent.pm | 209 sub log_default { subroutine 222 &log_default unless defined $Driver; 237 &log_default unless defined $Driver; 252 &log_default unless defined $Driver; 267 &log_default unless defined $Driver; 281 &log_default unless defined $Driver; 294 &log_default unless defined $Driver; 308 &log_default unless defined $Driver; 321 &log_default unless defined $Driver; 334 &log_default unless defined $Driver; [all …]
|
/dports/net/mDNSResponder/mDNSResponder-1310.140.1/mDNSMacOSX/dnssec_v2/ |
H A D | dnssec_v2_trust_anchor.c | 244 …log_default("[R%u] trust_anchor_can_be_reached? Yes, trust anchor found for original response", re… in trust_anchor_can_be_reached() 250 …log_default("[R%u] trust_anchor_can_be_reached? Yes, suppressed answer is always trusted", request… in trust_anchor_can_be_reached() 255 …log_default("[R%u] trust_anchor_can_be_reached? No, did not get any original response", request_id… in trust_anchor_can_be_reached() 261 log_default("[R%u] trust_anchor_can_be_reached? No, zone list is empty", request_id); in trust_anchor_can_be_reached() 269 …log_default("[R%u] trust_anchor_can_be_reached? No, no trust anchor found in the current root", re… in trust_anchor_can_be_reached() 283 … log_default("[R%u] trust_anchor_can_be_reached? No, not receiving DS reocrds; qname=" PRI_DM_NAME, in trust_anchor_can_be_reached() 290 …log_default("[R%u] trust_anchor_can_be_reached? No, DNSKEY Set is not completed; qname=" PRI_DM_NA… in trust_anchor_can_be_reached() 296 …log_default("[R%u] trust_anchor_can_be_reached? No, DNSKEY Set does not have any RRSIG; qname=" PR… in trust_anchor_can_be_reached() 303 … log_default("[R%u] trust_anchor_can_be_reached? No, DS Set is not completed; qname=" PRI_DM_NAME, in trust_anchor_can_be_reached() 309 …log_default("[R%u] trust_anchor_can_be_reached? No, DS Set does not have any RRSIG; qname=" PRI_DM… in trust_anchor_can_be_reached() [all …]
|
H A D | dnssec_v2_validation.c | 885 log_default("nsec3 list is empty")); in validate_nsec3_response() 888 log_default("NSEC3s with different algorithm, salt or iteration in the same response")); in validate_nsec3_response() 906 validation_result = dnssec_validation_bogus;log_default("Cannot find closest encloser;")); in validate_nsec3_response() 2214 log_default("Unsupported or invalid DS digest type; digest_type=%u", ds->digest_type)); in validate_ds() 2235 log_default("Not a DNSSEC DNSKEY in DNSKEY; flags=%x", dnskey->flags)); in validate_dnskey() 2243 log_default("Not a DNSSEC Protocol in DNSKEY; protocol=%u", dnskey->protocol)); in validate_dnskey() 2393 log_default("No enough memory to allocate for signed data;")); in validate_path_from_zsk_to_rr() 2424 log_default("No enough memory to allocate for signed data;")); in validate_path_from_ksk_to_zsk() 2454 log_default("No enough memory to allocate for signed data;")); in validate_path_from_zsk_to_ds() 2563 log_default("The RRSIG does not cover the current record; RRSIG=" PUB_S ", RR=" PUB_S, in check_rrsig_validity_with_dnssec_rr() [all …]
|
H A D | dnssec_v2_log.h | 16 #define log_default(FORMAT, ...) LogRedact(MDNS_LOG_CATEGORY_DNSSEC, MDNS_LOG_DEFAULT, FORMAT, ## _… macro
|
H A D | dnssec_v2_retrieval.c | 401 …retrieval_result = dnssec_retrieval_waiting_for_records; log_default("[R%u] still waiting for the … in fetch_necessary_dnssec_records() 1117 …log_default("[R%u->Q%u] Removing DS record from the zone - hostname: " PRI_DM_NAME, request_id, qu… in update_dnssec_zone_t_from_cache_for_no_error_response() 1158 …log_default("Ignoring record: name="PRI_DM_NAME ", rr_type=" PUB_S ", original_ttl=%d, remaining_t… in update_dnssec_zone_t_from_cache_for_no_error_response() 1162 …log_default("[R%u->Q%u] Adding record: name="PRI_DM_NAME ", rr_type=" PUB_S ", original_ttl=%d, re… in update_dnssec_zone_t_from_cache_for_no_error_response() 1301 …log_default("Ignoring record: name="PRI_DM_NAME ", rr_type=" PUB_S ", original_ttl=%d, remaining_t… in update_original_from_cache_for_no_error_response() 1305 …log_default("[R%u->Q%u] Adding record: name="PRI_DM_NAME ", rr_type=" PUB_S ", original_ttl=%d, re… in update_original_from_cache_for_no_error_response() 1441 …log_default("[R%u->Q%u] Adding negative answer verified by NSEC record; name=" PRI_DM_NAME ", rr_t… in update_original_from_cache_for_denial_of_existence_response() 1446 …log_default("[R%u->Q%u] Adding negative answer verified by NSEC3 record; name=" PRI_DM_NAME ", rr_… in update_original_from_cache_for_denial_of_existence_response() 1471 …log_default("[R%u->Q%u] Adding denial of existence record: name=" PRI_DM_NAME ", rr_type=" PUB_S "… in update_original_from_cache_for_denial_of_existence_response() 1499 …log_default("Ignoring record: name="PRI_DM_NAME ", rr_type=" PUB_S ", original_ttl=%d, remaining_t… in update_original_from_cache_for_denial_of_existence_response() [all …]
|
H A D | dnssec_v2_crypto.c | 260 log_default("SecKeyVerifySignature error: %@", CFErrorCopyDescription(cf_error)); in validate_signed_data_with_rrsig_and_dnskey() 670 …log_default("[R%u] "PRI_DM_NAME ": DNSKEY (alg=%u, tag=%u, length=%u) -----> " PRI_DM_NAME ": " PU… in print_validation_progress()
|
H A D | dnssec_v2.c | 335 …log_default("[R%u] Stopping " PUB_S "DNSSEC request -- hostname: " PRI_DM_NAME ", type: " PUB_S, r… in stop_dnssec()
|
/dports/net-p2p/bitmark-recorder/bitmarkd-0.13.3/testing/ |
H A D | generate-bitmarkd-configuration | 76 log_default=error 172 case "${log_default}" in 174 log_default=warn 177 log_default=info 180 log_default=debug 183 log_default=trace 186 log_default=info 284 -v log_default="${log_default}" \
|
/dports/net-p2p/bitmark-cli/bitmarkd-0.13.3/testing/ |
H A D | generate-bitmarkd-configuration | 76 log_default=error 172 case "${log_default}" in 174 log_default=warn 177 log_default=info 180 log_default=debug 183 log_default=trace 186 log_default=info 284 -v log_default="${log_default}" \
|
/dports/net-p2p/bitmark/bitmarkd-0.13.3/testing/ |
H A D | generate-bitmarkd-configuration | 76 log_default=error 172 case "${log_default}" in 174 log_default=warn 177 log_default=info 180 log_default=debug 183 log_default=trace 186 log_default=info 284 -v log_default="${log_default}" \
|
/dports/net-p2p/bitmark-daemon/bitmarkd-0.13.3/testing/ |
H A D | generate-bitmarkd-configuration | 76 log_default=error 172 case "${log_default}" in 174 log_default=warn 177 log_default=info 180 log_default=debug 183 log_default=trace 186 log_default=info 284 -v log_default="${log_default}" \
|
/dports/irc/srvx/srvx-1.3.1/src/ |
H A D | log.c | 73 static struct log_type *log_default; variable 407 logList_join(&log_default->logs[sev], &target); in log_debug() 542 for (ii=0; ii<log_default->logs[sev].used; ++ii) { in log_audit() 543 struct logDestination *ld = log_default->logs[sev].list[ii]; in log_audit() 557 for (ii=0; ii<log_default->logs[LOG_REPLAY].used; ++ii) { in log_replay() 558 struct logDestination *ld = log_default->logs[LOG_REPLAY].list[ii]; in log_replay() 582 for (ii=0; ii<log_default->logs[sev].used; ++ii) { in log_module() 583 struct logDestination *ld = log_default->logs[sev].list[ii]; in log_module() 999 log_default = log_register_type("*", NULL); in log_init()
|
/dports/japanese/kterm/kterm-6.2.0.fb6/ |
H A D | misc.c | 608 static char *log_default; local 624 if(log_default == NULL) 625 log_default = log_def_name; 626 mktemp(log_default); 627 if((screen->logfile = malloc((unsigned)strlen(log_default) + 1)) == NULL) 629 strcpy(screen->logfile, log_default);
|
/dports/net/freeswitch/freeswitch-1.10.3.-release/libs/sofia-sip/libsofia-sip-ua/su/sofia-sip/ |
H A D | su_log.h | 72 unsigned log_default; member
|
/dports/net/sofia-sip/sofia-sip-1.13.4/libsofia-sip-ua/su/sofia-sip/ |
H A D | su_log.h | 72 unsigned log_default; member
|
/dports/net-p2p/ncdc/ncdc-1.22.1/src/ |
H A D | ui_logwindow.c | 277 attr[mask] = UIC(log_default);\ in ui_logwindow_calc_color() 319 attr[mask] = UIC(log_default); in ui_logwindow_calc_color()
|
H A D | ui_colors.c | 41 C(log_default, "default")\
|
/dports/net/freeswitch/freeswitch-1.10.3.-release/libs/sofia-sip/libsofia-sip-ua/su/ |
H A D | su_log.c | 177 log->log_level = log->log_default; in su_log_init()
|
/dports/net/sofia-sip/sofia-sip-1.13.4/libsofia-sip-ua/su/ |
H A D | su_log.c | 177 log->log_level = log->log_default; in su_log_init()
|
/dports/net/gsk/gsk-1.0.63/src/ |
H A D | gsklog.c | 635 log_default (const gchar *log_domain, in log_default() function 658 g_log_set_default_handler (log_default, NULL); in gsk_log_init()
|
/dports/x11/xterm/xterm-370/ |
H A D | misc.c | 2439 static char *log_default = NULL; in GenerateLogPath() local 2442 if (log_default) in GenerateLogPath() 2443 return (log_default); in GenerateLogPath() 2464 ((log_default = (char *) malloc((sizeof(form) in GenerateLogPath() 2468 (void) sprintf(log_default, in GenerateLogPath() 2476 if ((log_default = x_strdup(log_def_name)) != NULL) { in GenerateLogPath() 2477 mktemp(log_default); in GenerateLogPath() 2481 return (log_default); in GenerateLogPath()
|
/dports/net/freeswitch/freeswitch-1.10.3.-release/libs/sofia-sip/libsofia-sip-ua/tport/ |
H A D | test_tport.c | 1675 tport_log->log_default = 9; in main() 1677 tport_log->log_default = 1; in main()
|
/dports/net/sofia-sip/sofia-sip-1.13.4/libsofia-sip-ua/tport/ |
H A D | test_tport.c | 1675 tport_log->log_default = 9; in main() 1677 tport_log->log_default = 1; in main()
|
/dports/mail/exim-monitor/exim-4.95/src/ |
H A D | globals.h | 692 extern int log_default[]; /* Initialization list for log_selector */
|
/dports/mail/exim-mysql/exim-4.95/src/ |
H A D | globals.h | 692 extern int log_default[]; /* Initialization list for log_selector */
|