Lines Matching defs:s
88 printf("file if omitted %s is used.\n", CONFIGFILE);
93 printf("Version %s\n", PACKAGE_VERSION);
95 printf("Report bugs to %s\n", PACKAGE_BUGREPORT);
112 printf("%s\n", p);
117 struct config_strlist* s = cfg->auto_trust_anchor_file_list;
118 for(; s; s=s->next) {
119 char *p = fname_after_chroot(s->str, cfg, 1);
121 printf("%s\n", p);
127 fatal_exit("cannot print option '%s'", opt);
144 fatal_exit("bad config during startup for %s module", fb->name);
146 fatal_exit("bad config during init for %s module", fb->name);
171 struct config_strlist* s;
173 for(s=p->addrs; s; s=s->next) {
174 if(str_addr_is_localhost(s->str)) {
175 fprintf(stderr, "unbound-checkconf: warning: forward-addr: '%s' is specified for forward-zone: '%s', but do-not-query-localhost: yes means that the address will not be used for lookups.\n",
176 s->str, p->name);
181 for(s=p->addrs; s; s=s->next) {
182 if(str_addr_is_localhost(s->str)) {
183 fprintf(stderr, "unbound-checkconf: warning: stub-addr: '%s' is specified for stub-zone: '%s', but do-not-query-localhost: yes means that the address will not be used for lookups.\n",
184 s->str, p->name);
220 "address %s %s", acl->str, acl->str2);
225 "access-control-view: %s %s",
236 "address %s", sb->str);
246 "address %s %s %s",
250 fatal_exit("cannot parse tag %s (define-tag it), "
251 "for access-control-tag-actions: %s %s %s",
255 fatal_exit("cannot parse access control action type %s"
256 " for access-control-tag-actions: %s %s %s",
269 fatal_exit("cannot parse access-control-tag-datas address %s %s '%s'",
273 fatal_exit("cannot parse tag %s (define-tag it), "
274 "for access-control-tag-datas: %s %s '%s'",
279 snprintf(buf, sizeof(buf), "%s %s", ".", s3->str3);
283 fatal_exit("cannot parse rr data [char %d] parse error %s, for access-control-tag-datas: %s %s '%s'",
319 struct config_stub* s;
321 for(s=list; s; s=s->next) {
322 for(h=s->hosts; h; h=h->next) {
325 " %s %s: \"%s\" is an IP%s address, "
328 s->name, typ, h->str,
356 fatal_exit("interface: %s present twice, "
363 fatal_exit("could not resolve interface names, for %s",
386 fatal_exit("cannot parse interface address '%s' from the interface specified as '%s'",
389 fatal_exit("cannot parse interface specified as '%s'",
398 snprintf(info1, sizeof(info1), "address %s from interface: %s", resif[i][j], cfg->ifs[i]);
399 else snprintf(info1, sizeof(info1), "interface: %s", cfg->ifs[i]);
401 snprintf(info2, sizeof(info2), "address %s from interface: %s", resif[i2][j2], cfg->ifs[i2]);
402 else snprintf(info2, sizeof(info2), "interface: %s", cfg->ifs[i2]);
403 fatal_exit("%s present twice, cannot bind the same ports twice. The first entry is %s and the second is %s", resif[i][j], info2, info1);
420 "specified as '%s'", cfg->out_ifs[i]);
424 fatal_exit("outgoing-interface: %s present "
446 fatal_exit("interface-automatic-ports: port out of range at position %d in '%s'", (int)(now-ifautomaticports)+1, ifautomaticports);
448 fatal_exit("interface-automatic-ports: parse error at position %d in '%s'", (int)(now-ifautomaticports)+1, ifautomaticports);
464 fatal_exit("cannot parse access control address %s %s",
481 fatal_exit("cannot parse tcp connection limit address %s %s",
494 printf("warning: no search permission for one of the directories in path: %s\n", fname);
501 printf("%s is not a file\n", fname);
514 printf("warning: no search permission for one of the directories in path: %s\n", fname);
521 printf("%s is not a directory\n", fname);
551 fatal_exit("%s: \"%s\" does not exist in "
552 "chrootdir %s", desc, str, chrootdir);
554 fatal_exit("%s: \"%s\" does not exist",
584 char* s = p->str;
587 free(s);
613 const char* s = module_conf;
614 while(*s) {
617 while(*s && isspace((unsigned char)*s))
618 s++;
619 if(!*s) break;
621 if(strncmp(names[i], s, strlen(names[i])) == 0) {
633 if(!s[j] || isspace((unsigned char)s[j])) {
637 n[j] = s[j];
639 fatal_exit("module_conf lists module '%s' but that "
642 s += strlen(names[i]);
677 fatal_exit("chootdir %s has trailing slash '/' please remove.",
731 fatal_exit("disable-edns-do does not allow DNSSEC to work, but the validator module uses a trust anchor %s, turn off disable-edns-do or disable validation", key);
903 fatal_exit("module conf '%s' is not known to work",
910 fatal_exit("user '%s' does not exist.", cfg->username);
923 fatal_exit("control-key-file: \"%s\" does not exist",
926 fatal_exit("control-cert-file: \"%s\" does not exist",
982 log_err("cannot getcwd: %s", strerror(errno));
991 log_err("cannot chdir(%s): %s", oldwd, strerror(errno));
1007 if(!quiet) { printf("unbound-checkconf: no errors in %s\n", cfgfile); }