Home | History | Annotate | Download | only in mDNSCore

Lines Matching full:debugf

339 		{ debugf("Malformed label (too long)"); return(mDNSfalse); }
362 { debugf("Malformed domain name (more than 256 characters)"); return(mDNSfalse); }
814 if (!len) { debugf("DeconstructServiceName: FQDN empty!"); return(mDNSfalse); }
815 if (len >= 0x40) { debugf("DeconstructServiceName: Instance name too long"); return(mDNSfalse); }
820 if (!len) { debugf("DeconstructServiceName: FQDN contains only one label!"); return(mDNSfalse); }
821 if (len >= 0x40) { debugf("DeconstructServiceName: Application protocol name too long"); return(mDNSfalse); }
822 if (src[1] != '_'){ debugf("DeconstructServiceName: No _ at start of application protocol"); return(mDNSfalse); }
826 if (!len) { debugf("DeconstructServiceName: FQDN contains only two labels!"); return(mDNSfalse); }
828 { debugf("DeconstructServiceName: Transport protocol must be _udp or _tcp"); return(mDNSfalse); }
837 { debugf("DeconstructServiceName: Label in service domain too long"); return(mDNSfalse); }
839 { debugf("DeconstructServiceName: Total service domain too long"); return(mDNSfalse); }
1451 default: debugf("Warning! Don't know how to get length of resource type %d", rr->rrtype);
1653 { debugf("putRData: Illegal length %d for kDNSType_A", rr->rdlength); return(mDNSNULL); }
1708 { debugf("putRData: Illegal length %d for kDNSType_AAAA", rr->rdlength); return(mDNSNULL); }
1788 default: debugf("putRData: Warning! Writing unknown resource type %d as raw data", rr->rrtype);
2042 { debugf("skipDomainName: Illegal ptr not within packet boundaries"); return(mDNSNULL); }
2051 { debugf("skipDomainName: Malformed domain name (overruns packet end)"); return(mDNSNULL); }
2053 { debugf("skipDomainName: Malformed domain name (more than 256 characters)"); return(mDNSNULL); }
2058 case 0x40: debugf("skipDomainName: Extended EDNS0 label types 0x%X not supported", len); return(mDNSNULL);
2059 case 0x80: debugf("skipDomainName: Illegal label length 0x%X", len); return(mDNSNULL);
2074 { debugf("getDomainName: Illegal ptr not within packet boundaries"); return(mDNSNULL); }
2088 { debugf("getDomainName: Malformed domain name (overruns packet end)"); return(mDNSNULL); }
2090 { debugf("getDomainName: Malformed domain name (more than 256 characters)"); return(mDNSNULL); }
2096 case 0x40: debugf("getDomainName: Extended EDNS0 label types 0x%X not supported in name %##s", len, name->c);
2099 case 0x80: debugf("getDomainName: Illegal label length 0x%X in domain name %##s", len, name->c); return(mDNSNULL);
2105 { debugf("getDomainName: Illegal compression pointer not within packet boundaries"); return(mDNSNULL); }
2107 { debugf("getDomainName: Compression pointer must point to real label"); return(mDNSNULL); }
2121 if (!ptr) { debugf("skipResourceRecord: Malformed RR name"); return(mDNSNULL); }
2123 if (ptr + 10 > end) { debugf("skipResourceRecord: Malformed RR -- no type/class/ttl/len!"); return(mDNSNULL); }
2126 if (ptr + pktrdlength > end) { debugf("skipResourceRecord: RDATA exceeds end of packet"); return(mDNSNULL); }
2169 if (!ptr) { debugf("GetLargeResourceRecord: Malformed RR name"); return(mDNSNULL); }
2172 if (ptr + 10 > end) { debugf("GetLargeResourceRecord: Malformed RR -- no type/class/ttl/len!"); return(mDNSNULL); }
2189 if (ptr + pktrdlength > end) { debugf("GetLargeResourceRecord: RDATA exceeds end of packet"); return(mDNSNULL); }
2217 if (ptr != end) { debugf("GetLargeResourceRecord: Malformed CNAME/PTR RDATA name"); goto fail; }
2218 //debugf("%##s PTR %##s rdlen %d", rr->resrec.name.c, rdb->name.c, pktrdlength);
2222 if (!ptr) { debugf("GetLargeResourceRecord: Malformed SOA RDATA mname"); goto fail; }
2224 if (!ptr) { debugf("GetLargeResourceRecord: Malformed SOA RDATA rname"); goto fail; }
2225 if (ptr + 0x14 != end) { debugf("GetLargeResourceRecord: Malformed SOA RDATA"); goto fail; }
2242 debugf("GetLargeResourceRecord: %s rdata size (%d) exceeds storage (%d)",
2256 if (ptr != end) { debugf("GetLargeResourceRecord: Malformed MX name"); goto fail; }
2257 //debugf("%##s SRV %##s rdlen %d", rr->resrec.name.c, rdb->srv.target.c, pktrdlength);
2261 if (!ptr) { debugf("GetLargeResourceRecord: Malformed RP mbox"); goto fail; }
2263 if (ptr != end) { debugf("GetLargeResourceRecord: Malformed RP txt"); goto fail; }
2269 if (!ptr) { debugf("GetLargeResourceRecord: Malformed PX map822"); goto fail; }
2271 if (ptr != end) { debugf("GetLargeResourceRecord: Malformed PX mapx400"); goto fail; }
2284 if (ptr != end) { debugf("GetLargeResourceRecord: Malformed SRV RDATA name"); goto fail; }
2285 //debugf("%##s SRV %##s rdlen %d", rr->resrec.name.c, rdb->srv.target.c, pktrdlength);
2358 if (*ptr++ != 0) { debugf("GetLargeResourceRecord: We only handle block zero NSECs"); goto fail; }
2360 if (i > sizeof(rdataNSEC)) { debugf("GetLargeResourceRecord: invalid block length %d", i); goto fail; }
2363 if (ptr != end) { debugf("GetLargeResourceRecord: Malformed NSEC"); goto fail; }
2369 debugf("GetLargeResourceRecord: rdata %d (%s) size (%d) exceeds storage (%d)",
2373 debugf("GetLargeResourceRecord: Warning! Reading resource type %d (%s) as opaque data",
2404 if (!ptr) { debugf("skipQuestion: Malformed domain name in DNS question section"); return(mDNSNULL); }
2405 if (ptr+4 > end) { debugf("skipQuestion: Malformed DNS question section -- no query type and class!"); return(mDNSNULL); }
2416 if (!ptr) { debugf("Malformed domain name in DNS question section"); return(mDNSNULL); }
2417 if (ptr+4 > end) { debugf("Malformed DNS question section -- no query type and class!"); return(mDNSNULL); }