/macosx-10.10.1/mDNSResponder-561.1.1/mDNSMacOSX/Private/ |
H A D | xpc_services.c | 32 LogMsg("----- Active XPC Clients -----"); 34 LogMsg("DNSProxy->Client[%d]: InputIntfs[%d, %d, %d, %d, %d] Output[%d]", dps_client_pid, m->dp_ipintf[0], 88 LogMsg("handle_dps_request: A Client is already using DNS Proxy and your request cannot be handled at this time"); 99 LogMsg("handle_dps_request: Reply Dictionary could not be created"); 118 LogMsg("handle_dps_request: Response Dictionary could not be created"); 155 LogMsg("IsEntitled: Client Entitlement is NULL"); 168 LogMsg("accept_dps_client: DNSProxyService Client Pid[%d] is missing Entitlement or is not root!", (int) xpc_connection_get_pid(conn)); 203 LogMsg("init_dnsproxy_service: Error Creating XPC Listener for DNSProxyService !!"); 221 LogMsg("init_dnsproxy_service: XPCError: %s", xpc_dictionary_get_string(eventmsg, XPC_ERROR_KEY_DESCRIPTION)); 226 LogMsg("init_dnsproxy_servic [all...] |
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSPosix/ |
H A D | PosixDaemon.c | 93 LogMsg("Unable to parse DNS server list. Unicast DNS-SD unavailable"); 113 if (result != 0) { LogMsg("Could not run as daemon - exiting"); exit(result); } 115 LogMsg("The POSIX mdnsd should only be used on OS X for testing - exiting"); 124 LogMsg("---- BEGIN STATE LOG ----"); 126 LogMsg("---- END STATE LOG ----"); 165 if (sigismember(&signals, SIGPIPE)) LogMsg("Received SIGPIPE - ignoring"); 177 LogMsg("%s starting", mDNSResponderVersionString); 194 LogMsg("WARNING: mdnsd continuing as root because user \"nobody\" does not exist"); 200 LogMsg("%s stopping", mDNSResponderVersionString); 205 LogMsg("ExitCallbac [all...] |
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSMacOS9/ |
H A D | mDNSLibrary.c | 48 LogMsg("mDNS/DNS-SD with Macsbug breaks -- do not ship this version to customers"); 60 LogMsg("mDNS_CFMTerm");
|
H A D | mDNSMacOS9.c | 98 // MacsBug breaks for *anything*, not even for the serious LogMsg messages that on OS X would be written to syslog 99 mDNSexport void LogMsg(const char *format, ...) { (void)format; } function 101 mDNSexport void LogMsg(const char *format, ...) function 282 if (err) LogMsg("OTOptionManagement failed %d", err); 301 if (result) { LogMsg("T_OPENCOMPLETE failed %d", result); mDNSinitComplete(m, result); return; } 307 if (err) { LogMsg("OTInetGetInterfaceInfo failed %d", err); mDNSinitComplete(m, err); return; } 326 LogMsg("Carbon IP_RCVDSTADDR option failed %d; continuing anyway", result); 329 if (result) { LogMsg("T_OPTMGMTCOMPLETE/T_BINDCOMPLETE %d failed %d", m->p->mOTstate, result); mDNSinitComplete(m, result); return; } 330 //LogMsg("T_OPTMGMTCOMPLETE/T_BINDCOMPLETE %d", m->p->mOTstate); 344 default: LogMsg("Unexpecte [all...] |
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSMacOSX/ |
H A D | CryptoSupport.c | 61 LogMsg("enc_create: Unsupported algorithm %d", ctx->alg); 99 LogMsg("enc_add: dispatch_data_create src failed"); 107 LogMsg("enc_add: dispatch_data_create dst failed"); 115 LogMsg("enc_add: Unsupported algorithm %d", ctx->alg); 136 LogMsg("enc_encode: cannot concatenate"); 143 LogMsg("enc_encode: cannot create map %d", ctx->alg); 153 LogMsg("enc_encode: Unsupported algorithm %d", ctx->alg); 174 LogMsg("sha_create: Unsupported algorithm %d", ctx->alg); 196 LogMsg("sha_len: Unsupported algorithm %d", ctx->alg); 212 LogMsg("sha_ad [all...] |
H A D | DNSProxySupport.c | 53 LogMsg("ProxyTCPRead: attempt to read message length failed"); 60 LogMsg("ProxyTCPRead: nread %d, n %d", tcpInfo->nread, n); 67 LogMsg("ProxyTCPRead: Message length too short (%d bytes)", tcpInfo->replyLen); 74 LogMsg("ProxyTCPRead: Memory failure"); 83 LogMsg("ProxyTCPRead: read failure n %d, closed %d", n, closed); 126 LogMsg("ProxyTCPReceive: getsockname(fd=%d) errno %d", s1, errno); 133 LogMsg("ProxyTCPReceive: getpeername(fd=%d) errno %d", s1, errno); 167 LogMsg("ProxyTCPReceive from is unknown address family %d", from.ss_family); 201 LogMsg("ProxyTCPAccept: cannot allocate TCPSocket"); 222 LogMsg("ProxyTCPAccep [all...] |
H A D | DNSSECSupport.c | 110 LogMsg("AddTrustAnchors: Found a duplicate"); 119 LogMsg("AddTrustAnchor: malloc failure ta"); 153 LogMsg("ConvertDigest: digest type %d not supported", digestType); 159 LogMsg("ConvertDigest: malloc failure"); 168 if (l<0 || h<0) { LogMsg("ConvertDigest: Cannot convert digest"); return NULL;} 209 LogMsg("ParseElementChildren: Cannot parse Zone %s", val); 222 LogMsg("ParseElementChildren: KeyTag invalid character %d", *invalid); 235 LogMsg("ParseElementChildren: Algorithm invalid character %c", *invalid); 248 LogMsg("ParseElementChildren: Algorithm invalid character %c", *invalid); 268 LogMsg("ParseElementChildre [all...] |
H A D | mDNSMacOSX.c | 342 { LogMsg("DNSNameCompressionParseBytes: failed to get large RR"); m->rec.r.resrec.RecordType = 0; return mStatus_UnknownErr; } 421 if (!*ptr) { LogMsg("FreeD2DARElemCallback: Could not find in D2DRecords: %s", ARDisplayString(m, rr)); return; } 497 if (!*ptr) { LogMsg("D2DBrowseListRelease: Didn't find %##s %s in list", name->c, DNSTypeName(type)); return; } 523 if ( key == NULL || value == NULL || keySize == 0 || valueSize == 0) { LogMsg("xD2DAddToCache: NULL Byte * passed in or length == 0"); return; } 528 if (ptr == NULL) { LogMsg("xD2DAddToCache: memory allocation failure"); return; } 533 LogMsg("xD2DAddToCache: xD2DParse returned error: %d", err); 541 LogMsg("xD2DAddToCache: mDNS_Register returned error %d for %s", err, ARDisplayString(m, &ptr->ar)); 553 LogMsg("xD2DAddToCache: Unexpected result %d", result); 561 if ( key == NULL || value == NULL || keySize == 0 || valueSize == 0) { LogMsg("xD2DFindInList: NULL Byte * passed in or length == 0"); return NULL; } 564 if (arptr == NULL) { LogMsg("xD2DFindInLis [all...] |
H A D | daemon.c | 224 LogMsg("!!!! %s !!!!", buffer); 327 { LogMsg("malloc( %s : %d ) failed", msg, size); return(NULL); } 330 if (size > 24000) LogMsg("malloc( %s : %lu ) = %p suspiciously large", msg, size, &mem[2]); 331 else if (MACOSX_MDNS_MALLOC_DEBUGGING >= 2) LogMsg("malloc( %s : %lu ) = %p", msg, size, &mem[2]); 344 LogMsg("free( %s @ NULL )!", msg); 348 if (mem[0] != 0xDEAD1234) { LogMsg("free( %s @ %p ) !!!! NOT ALLOCATED !!!!", msg, &mem[2]); return; } 349 if (mem[1] > 24000) LogMsg("free( %s : %ld @ %p) suspiciously large", msg, mem[1], &mem[2]); 350 else if (MACOSX_MDNS_MALLOC_DEBUGGING >= 2) LogMsg("free( %s : %ld @ %p)", msg, mem[1], &mem[2]); 407 LogMsg("%5d: DNSServiceDomainEnumeration(%##s) STOP; WARNING m %p != x %p", ClientMachPort, x->dom.qname.c, m, x); 424 LogMsg(" [all...] |
H A D | LegacyNATTraversal.c | 86 { LogMsg("AllocAndCopy: can't allocate string"); return; } 110 { LogMsg("ParseHttpUrl: can't allocate address string"); return mStatus_NoMemoryErr; } 134 { LogMsg("ParseHttpUrl: can't mDNSPlatformMemAllocate path"); return mStatus_NoMemoryErr; } 292 if (m->UPnPSOAPAddressString == mDNSNULL) LogMsg("handleLNTDeviceDescriptionResponse: UPnPSOAPAddressString is NULL"); 296 if (m->UPnPSOAPURL == mDNSNULL) LogMsg("handleLNTDeviceDescriptionResponse: UPnPSOAPURL is NULL"); 336 LogMsg("handleLNTGetExternalAddressResponse: Router returned bad address %s", ptr); 383 LogMsg("handleLNTPortMappingResponse too many conflict retries %d %d", mDNSVal16(natInfo->IntPort), mDNSVal16(natInfo->RequestedPort)); 392 else if (http_result == HTTPCode_Bad) LogMsg("handleLNTPortMappingResponse got data that was not a valid HTTP response"); 393 else if (http_result == HTTPCode_Other) LogMsg("handleLNTPortMappingResponse got unexpected response code"); 419 LogMsg("tcpConnectionCallbac [all...] |
H A D | helper-stubs.c | 57 LogMsg("dispatch_queue_create: Helper queue NULL"); 68 LogMsg("%s: cannot contact helper", __func__); 93 LogMsg("%s: Mach communication failed: %d %X %s", __func__, kr, kr, mach_error_string(kr)); \ 98 { LogMsg("%s: %d 0x%X (%s)", __func__, (err), (err), mDNSHelperError(err)); goto fin; } 176 LogMsg("mDNSNotify: titleCopy NULL for %s", msg); 188 LogMsg("mDNSNotify: msgCopy NULL for %s", msg); 231 LogMsg("%s: CFDataCreateWithBytesNoCopy failed", __func__); 237 LogMsg("%s: CFPropertyListCreateFromXMLData failed", __func__); 243 LogMsg("%s: Unexpected result type", __func__); 318 LogMsg("mDNSSendWakeupPacke [all...] |
H A D | CUPolicy.c | 29 LogMsg("CUPInit: cellular_usage_policy_create_client failed"); 86 //LogMsg("mDNSPlatformAllowPID: %##s (%s)", q->qname.c, DNSTypeName(q->qtype));
|
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSCore/ |
H A D | CryptoAlg.c | 36 LogMsg("DigestAlgInit: digestType %d exceeds bounds", digestType); 44 LogMsg("DigestAlgInit: digestType %d not supported", digestType); 55 LogMsg("CryptoAlgInit: alg %d exceeds bounds", alg); 63 LogMsg("CryptoAlgInit: alg %d not supported", alg); 75 LogMsg("EncAlgInit: alg %d exceeds bounds", alg); 83 LogMsg("EncAlgInit: alg %d not supported", alg); 150 LogMsg("AlgDestroy: ERROR!! func is NULL"); 176 LogMsg("AlgLength: ERROR!! func is NULL"); 200 LogMsg("AlgAdd: ERROR!! func is NULL"); 224 LogMsg("AlgVerif [all...] |
H A D | mDNSDebug.h | 98 #define LogMsg(... ) LogMsgWithLevel(MDNS_LOG_MSG, __VA_ARGS__) macro 104 #define LogMsg( ARGS... ) LogMsgWithLevel(MDNS_LOG_MSG, ARGS) macro 115 #define LogMsg LogMsg_ macro 143 extern int mDNS_DebugMode; // If non-zero, LogMsg() writes to stderr instead of syslog 149 #define LogMsgNoIdent LogMsg
|
H A D | nsec3.c | 68 LogMsg("NSEC3SameName: ERROR!! namelen %d, nsecLen %d", namelen, nsecLen); 117 LogMsg("NSEC3CoversName: Owner name %s, name %s", &ncr->resrec.name->c[1], b32Name); 118 LogMsg("NSEC3CoversName: Nxt hash name %s, name %s", nxtbuf1, nxtbuf2); 201 LogMsg("NSEC3Find: cr NULL"); 241 LogMsg("NSEC3Find: NSEC3HashName failed for ##s", name->c); 248 LogMsg("NSEC3Find: baseEncode of name %##s failed", name->c); 264 LogMsg("NSEC3Find: SkipLeadingLabel failed for %s, current name %##s", 280 LogMsg("NSEC3Find: NSEC3 %s not a subdomain of %##s, result %d", CRDisplayString(m, cr), 391 LogMsg("NSEC3ClosestEncloserProof: ClosestEncloser %p or CloserEncloser %p ce %p, something is NULL", *closestEncloser, 399 LogMsg("NSEC3ClosestEncloserProo [all...] |
H A D | dnssec.c | 33 #define debugdnssec LogMsg 261 if (!dv) { LogMsg("AllocateDNSSECVerifier: ERROR!! memory alloc failed"); return mDNSNULL; } 301 LogMsg("AuthChainCopy: AuthChain alloc failure"); 498 LogMsg("CopyRRVerifier: memory failure"); 515 LogMsg("AllocateRRVerifier: memory failure"); 536 LogMsg("AllocateRRVerifier: putRData failed"); 576 LogMsg("AddRRSetToVerifier: ERROR!! default case %d", set); 603 LogMsg("ValidateRRSIG: ERROR!! type not valid %d", type); 699 LogMsg("ValidateRRSIG: ERROR!! cannot allocate RRSet"); 715 LogMsg("CheckRRSIGForRRSe [all...] |
H A D | uDNS.c | 120 LogMsg("mDNS_AddDNSServer: DNS server limit of %d reached, not adding this server", MAX_UNICAST_DNS_SERVERS); 176 LogMsg("Error: mDNS_AddDNSServer - malloc"); 267 LogMsg("PenalizeDNSServer: ERROR!! GetServerForQuestion returned the same server %#a:%d", &new->addr, 399 if (!info || !b64keydata) { LogMsg("mDNS_SetSecretForDomain: ERROR: info %p b64keydata %p", info, b64keydata); return(mStatus_BadParamErr); } 418 LogMsg("mDNS_SetSecretForDomain: ERROR: Could not convert shared secret from base64: domain %##s key %##s %s", domain->c, keyname->c, mDNS_LoggingEnabled ? b64keydata : ""); 494 LogMsg("uDNS_RequestAddress: LNT_GetExternalAddress returned error %d", lnterr); 537 LogMsg("uDNS_SendNATMsg called unexpectedly with NULL info"); 639 LogMsg("uDNS_SendNATMsg: LNT_MapPort returned error %d", lnterr); 686 if (err != last_err) LogMsg("Error getting external address %d", err); 693 LogMsg("Doubl [all...] |
H A D | nsec.c | 88 LogMsg("VerifyNSECCCallback: ERROR!! no parent DV\n"); 169 LogMsg("VerifyNSEC: mDNSPlatformMemAlloc failed"); 177 LogMsg("VerifyNSEC: ERROR!! AddRRSetToVerifier failed to add NSEC"); 194 LogMsg("VerifyNSEC: ERROR!! AddRRSetToVerifier missing rrset"); 239 LogMsg("AddNSECSForCacheRecord: Addings nsecs for rcode %d", rcode); 250 LogMsg("AddNSECSForCacheRecord: ERROR!! Adding Wrong record %s", CRDisplayString(m, cr)); 260 LogMsg("AddNSECSForCacheRecord:ERROR!! Adding RRSIG with Wrong type %s", CRDisplayString(m, cr)); 345 LogMsg("NSECAnswersENT: ERROR!! DNSSECCanonicalOrder subdomain set " 546 LogMsg("WildcardAnswerProof: Can't find NSEC Parent for %##s (%s)", q.qname.c, DNSTypeName(q.qtype)); 587 LogMsg("WildcardAnswerProo [all...] |
H A D | mDNS.c | 190 LogMsg("ReleaseAuthGroup: Releasing AuthGroup %##s", (*cp)->name->c); 192 LogMsg("ERROR: (*cp)->members == mDNSNULL but (*cp)->rrauth_tail != &(*cp)->members)"); 203 if (r->rrauth_lock) { LogMsg("GetFreeCacheRR ERROR! Cache already locked!"); return(mDNSNULL); } 273 if (!ag) { LogMsg("GetAuthGroup: Failed to allocate memory for %##s", rr->name->c); return(mDNSNULL); } 285 LogMsg("GetAuthGroup: Failed to allocate name storage for %##s", rr->name->c); 291 if (AuthGroupForRecord(r, slot, rr)) LogMsg("GetAuthGroup: Already have AuthGroup for %##s", rr->name->c); 293 if (AuthGroupForRecord(r, slot, rr) != ag) LogMsg("GetAuthGroup: Not finding AuthGroup for %##s", rr->name->c); 322 if (!a) { LogMsg("RemoveAuthRecord: ERROR!! AuthGroup not found for %s", ARDisplayString(m, rr)); return mDNSNULL; } 447 if (!m->CurrentQuestion) { LogMsg("GenerateNegativeResponse: ERROR!! CurrentQuestion not set"); return; } 469 LogMsg("AnswerQuestionByFollowingCNAM [all...] |
H A D | DNSCommon.c | 278 LogMsg("baseEncode: AlgCreate failed\n"); 305 LogMsg("PrintTypeBitmap: malformed bitmap, bitmaplen %d short", bitmaplen); 797 if (*cstr == '.') { LogMsg("AppendDNSNameString: Illegal empty label in name \"%s\"", cstring); return(mDNSNULL); } 1021 name = (domainlabel*)""; // Set this up to be non-null, to avoid errors if we have to call LogMsg() below 1027 LogMsg("Bad service type in %#s.%##s%##s Application protocol name must be underscore plus 1-15 characters. " 1081 LogMsg("ConstructServiceName: %s: %#s.%##s%##s", errormsg, name->c, type->c, domain->c); 1144 LogMsg("DNSNameToLowerCase: ERROR!! Malformed Domain name"); 1174 LogMsg("NSEC3HashName: ERROR!! DNSNameToLowerCase failed"); 1188 LogMsg("NSEC3HashName: ERROR!! Cannot allocate context"); 1366 LogMsg("mDNS_SetupResourceRecor [all...] |
H A D | anonymous.c | 66 LogMsg("InitializeNSEC3Record: NSEC3HashName failed for ##s", rr->name->c); 71 LogMsg("InitializeNSEC3Record: hlen wrong %d", hlen); 88 LogMsg("ConstructNSEC3Record: StandardAuthRDSize %d smaller than MCAST_NSEC3_RDLENGTH %d", StandardAuthRDSize, MCAST_NSEC3_RDLENGTH); 127 LogMsg("CopyNSEC3ResourceRecord: rdlength %d smaller than MCAST_NSEC3_RDLENGTH %d", rr->rdlength, MCAST_NSEC3_RDLENGTH); 223 LogMsg("SetAnonData: question %##s(%p), rr %##s(%p), NULL", q->qname.c, q->AnonInfo, rr->name->c, rr->AnonInfo); 388 LogMsg("AnonInfoAnswersQuestion: NSEC3HashName failed for ##s", nsec3RR->name->c); 393 LogMsg("AnonInfoAnswersQuestion: hlen wrong %d", hlen); 401 LogMsg("AnonInfoAnswersQuestion: ERROR!! hlen %d not same as nxtLength %d", hlen, nxtLength);
|
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSShared/ |
H A D | PlatformCommon.c | 68 { LogMsg("mDNSPlatformSourceAddrForDest: connect %#a failed errno %d (%s)", dst, errno, strerror(errno)); goto exit; } 71 { LogMsg("mDNSPlatformSourceAddrForDest: getsockname failed errno %d (%s)", errno, strerror(errno)); goto exit; } 85 if (len + 1 + MAX_ESCAPED_DOMAIN_NAME > sizeof(buf)-1) { LogMsg("GetConfigOption: option %s too long", option); return mDNSfalse; } 124 if (errno != ENOENT) LogMsg("ERROR: Config file exists, but cannot be opened."); 133 if (err) LogMsg("ERROR: mDNS_SetSecretForDomain returned %d for domain %##s", err, domain->c); 139 LogMsg("ERROR: malformatted config file");
|
H A D | uds_daemon.c | 321 LogMsg("%s: %s", errmsg, dnssd_strerror(dnssd_errno)); 334 // hack to search-replace perror's to LogMsg's 337 LogMsg("%s: %d (%s)", errmsg, dnssd_errno, dnssd_strerror(dnssd_errno)); 473 { LogMsg("abort_request: ERROR: Attempt to abort operation %p with req->terminate %p", req, req->terminate); return; } 481 { LogMsg("abort_request: ERROR: Attempt to abort operation %p with invalid fd %d", req, req->sd); return; } 517 else LogMsg("AbortUnlinkAndFree: ERROR: Attempt to abort operation %p not in list", req); 526 LogMsg("ERROR: create_reply - data length less than length of required fields"); 666 if (str_err) { LogMsg("ERROR: read_rr_from_ipc_msg - get_string"); return NULL; } 668 if (!request->msgptr) { LogMsg("Error reading Resource Record from client"); return NULL; } 674 LogMsg("ERRO [all...] |
H A D | dnsextd_parser.y | 206 LogMsg("ERROR: memory allocation failure"); 227 LogMsg("ERROR: memory allocation failure"); 249 LogMsg("ERROR: memory allocation failure"); 336 LogMsg("ERROR: memory allocation failure");
|
H A D | uds_daemon.h | 40 #define LogMcast (mDNS_McastLoggingEnabled == 0) ? ((void)0) : LogMsg
|