2 * SPDX-License-Identifier: ISC
4 * Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")
5 * Copyright (c) 1996-1999 by Internet Software Consortium.
7 * Permission to use, copy, modify, and distribute this software for any
8 * purpose with or without fee is hereby granted, provided that the above
9 * copyright notice and this permission notice appear in all copies.
11 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES
12 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
13 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR
14 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
15 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
17 * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
21 static const char rcsid[] = "$Id: ns_print.c,v 1.12 2009/03/03 05:29:58 each Exp $";
23 #include <sys/cdefs.h>
24 __FBSDID("$FreeBSD$");
28 #include "port_before.h"
30 #include <sys/types.h>
31 #include <sys/socket.h>
33 #include <netinet/in.h>
34 #include <arpa/nameser.h>
35 #include <arpa/inet.h>
39 #define INSIST(cond) assert(cond)
41 #include <isc/assertions.h>
49 #include "port_after.h"
52 # define SPRINTF(x) strlen(sprintf/**/x)
54 # define SPRINTF(x) ((size_t)sprintf x)
59 static size_t prune_origin(const char *name, const char *origin);
60 static int charstr(const u_char *rdata, const u_char *edata,
61 char **buf, size_t *buflen);
62 static int addname(const u_char *msg, size_t msglen,
63 const u_char **p, const char *origin,
64 char **buf, size_t *buflen);
65 static void addlen(size_t len, char **buf, size_t *buflen);
66 static int addstr(const char *src, size_t len,
67 char **buf, size_t *buflen);
68 static int addtab(size_t len, size_t target, int spaced,
69 char **buf, size_t *buflen);
79 static const char base32hex[] =
80 "0123456789ABCDEFGHIJKLMNOPQRSTUV=0123456789abcdefghijklmnopqrstuv";
85 * Convert an RR to presentation format.
88 *\li Number of characters written to buf, or -1 (check errno).
91 ns_sprintrr(const ns_msg *handle, const ns_rr *rr,
92 const char *name_ctx, const char *origin,
93 char *buf, size_t buflen)
97 n = ns_sprintrrf(ns_msg_base(*handle), ns_msg_size(*handle),
98 ns_rr_name(*rr), ns_rr_class(*rr), ns_rr_type(*rr),
99 ns_rr_ttl(*rr), ns_rr_rdata(*rr), ns_rr_rdlen(*rr),
100 name_ctx, origin, buf, buflen);
105 * Convert the fields of an RR into presentation format.
108 *\li Number of characters written to buf, or -1 (check errno).
111 ns_sprintrrf(const u_char *msg, size_t msglen,
112 const char *name, ns_class class, ns_type type,
113 u_long ttl, const u_char *rdata, size_t rdlen,
114 const char *name_ctx, const char *origin,
115 char *buf, size_t buflen)
117 const char *obuf = buf;
118 const u_char *edata = rdata + rdlen;
128 if (name_ctx != NULL && ns_samename(name_ctx, name) == 1) {
129 T(addstr("\t\t\t", 3, &buf, &buflen));
131 len = prune_origin(name, origin);
134 } else if (len == 0) {
135 T(addstr("@\t\t\t", 4, &buf, &buflen));
137 T(addstr(name, len, &buf, &buflen));
138 /* Origin not used or not root, and no trailing dot? */
139 if (((origin == NULL || origin[0] == '\0') ||
140 (origin[0] != '.' && origin[1] != '\0' &&
141 name[len] == '\0')) && name[len - 1] != '.') {
143 T(addstr(".", 1, &buf, &buflen));
146 T(spaced = addtab(len, 24, spaced, &buf, &buflen));
153 T(x = ns_format_ttl(ttl, buf, buflen));
154 addlen(x, &buf, &buflen);
155 len = SPRINTF((tmp, " %s %s", p_class(class), p_type(type)));
156 T(addstr(tmp, len, &buf, &buflen));
157 T(spaced = addtab(x + len, 16, spaced, &buf, &buflen));
164 if (rdlen != (size_t)NS_INADDRSZ)
166 (void) inet_ntop(AF_INET, rdata, buf, buflen);
167 addlen(strlen(buf), &buf, &buflen);
177 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
183 T(len = charstr(rdata, edata, &buf, &buflen));
187 T(addstr(" ", 1, &buf, &buflen));
190 /* Second word, optional in ISDN records. */
191 if (type == ns_t_isdn && rdata == edata)
194 T(len = charstr(rdata, edata, &buf, &buflen));
204 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
205 T(addstr(" ", 1, &buf, &buflen));
207 /* Administrator name. */
208 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
209 T(addstr(" (\n", 3, &buf, &buflen));
212 if ((edata - rdata) != 5*NS_INT32SZ)
216 t = ns_get32(rdata); rdata += NS_INT32SZ;
217 T(addstr("\t\t\t\t\t", 5, &buf, &buflen));
218 len = SPRINTF((tmp, "%lu", t));
219 T(addstr(tmp, len, &buf, &buflen));
220 T(spaced = addtab(len, 16, spaced, &buf, &buflen));
221 T(addstr("; serial\n", 9, &buf, &buflen));
224 /* Refresh interval. */
225 t = ns_get32(rdata); rdata += NS_INT32SZ;
226 T(addstr("\t\t\t\t\t", 5, &buf, &buflen));
227 T(len = ns_format_ttl(t, buf, buflen));
228 addlen(len, &buf, &buflen);
229 T(spaced = addtab(len, 16, spaced, &buf, &buflen));
230 T(addstr("; refresh\n", 10, &buf, &buflen));
233 /* Retry interval. */
234 t = ns_get32(rdata); rdata += NS_INT32SZ;
235 T(addstr("\t\t\t\t\t", 5, &buf, &buflen));
236 T(len = ns_format_ttl(t, buf, buflen));
237 addlen(len, &buf, &buflen);
238 T(spaced = addtab(len, 16, spaced, &buf, &buflen));
239 T(addstr("; retry\n", 8, &buf, &buflen));
243 t = ns_get32(rdata); rdata += NS_INT32SZ;
244 T(addstr("\t\t\t\t\t", 5, &buf, &buflen));
245 T(len = ns_format_ttl(t, buf, buflen));
246 addlen(len, &buf, &buflen);
247 T(spaced = addtab(len, 16, spaced, &buf, &buflen));
248 T(addstr("; expiry\n", 9, &buf, &buflen));
252 t = ns_get32(rdata); rdata += NS_INT32SZ;
253 T(addstr("\t\t\t\t\t", 5, &buf, &buflen));
254 T(len = ns_format_ttl(t, buf, buflen));
255 addlen(len, &buf, &buflen);
256 T(addstr(" )", 2, &buf, &buflen));
257 T(spaced = addtab(len, 16, spaced, &buf, &buflen));
258 T(addstr("; minimum\n", 10, &buf, &buflen));
269 if (rdlen < (size_t)NS_INT16SZ)
275 len = SPRINTF((tmp, "%u ", t));
276 T(addstr(tmp, len, &buf, &buflen));
279 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
287 if (rdlen < (size_t)NS_INT16SZ)
293 len = SPRINTF((tmp, "%u ", t));
294 T(addstr(tmp, len, &buf, &buflen));
297 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
298 T(addstr(" ", 1, &buf, &buflen));
301 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
307 T(len = charstr(rdata, edata, &buf, &buflen));
315 while (rdata < edata) {
316 T(len = charstr(rdata, edata, &buf, &buflen));
321 T(addstr(" ", 1, &buf, &buflen));
328 (void) inet_nsap_ntoa(rdlen, rdata, t);
329 T(addstr(t, strlen(t), &buf, &buflen));
334 if (rdlen != (size_t)NS_IN6ADDRSZ)
336 (void) inet_ntop(AF_INET6, rdata, buf, buflen);
337 addlen(strlen(buf), &buf, &buflen);
343 /* XXX protocol format checking? */
344 (void) loc_ntoa(rdata, t);
345 T(addstr(t, strlen(t), &buf, &buflen));
350 u_int order, preference;
353 if (rdlen < 2U*NS_INT16SZ)
356 /* Order, Precedence. */
357 order = ns_get16(rdata); rdata += NS_INT16SZ;
358 preference = ns_get16(rdata); rdata += NS_INT16SZ;
359 len = SPRINTF((t, "%u %u ", order, preference));
360 T(addstr(t, len, &buf, &buflen));
363 T(len = charstr(rdata, edata, &buf, &buflen));
367 T(addstr(" ", 1, &buf, &buflen));
370 T(len = charstr(rdata, edata, &buf, &buflen));
374 T(addstr(" ", 1, &buf, &buflen));
377 T(len = charstr(rdata, edata, &buf, &buflen));
383 T(addstr(" ", 1, &buf, &buflen));
386 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
391 u_int priority, weight, port;
394 if (rdlen < 3U*NS_INT16SZ)
397 /* Priority, Weight, Port. */
398 priority = ns_get16(rdata); rdata += NS_INT16SZ;
399 weight = ns_get16(rdata); rdata += NS_INT16SZ;
400 port = ns_get16(rdata); rdata += NS_INT16SZ;
401 len = SPRINTF((t, "%u %u %u ", priority, weight, port));
402 T(addstr(t, len, &buf, &buflen));
405 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
412 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
413 T(addstr(" ", 1, &buf, &buflen));
416 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
423 if (rdlen < 1U + NS_INT32SZ)
427 (void) inet_ntop(AF_INET, rdata, buf, buflen);
428 addlen(strlen(buf), &buf, &buflen);
429 rdata += NS_INADDRSZ;
432 len = SPRINTF((tmp, " %u ( ", *rdata));
433 T(addstr(tmp, len, &buf, &buflen));
439 while (rdata < edata) {
444 T(addstr("\n\t\t\t\t", 5,
449 len = SPRINTF((tmp, "%d ", n));
450 T(addstr(tmp, len, &buf, &buflen));
456 T(addstr(")", 1, &buf, &buflen));
463 char base64_key[NS_MD5RSA_MAX_BASE64];
464 u_int keyflags, protocol, algorithm, key_id;
468 if (rdlen < 0U + NS_INT16SZ + NS_INT8SZ + NS_INT8SZ)
471 /* Key flags, Protocol, Algorithm. */
473 key_id = dst_s_dns_key_id(rdata, edata-rdata);
477 keyflags = ns_get16(rdata); rdata += NS_INT16SZ;
479 algorithm = *rdata++;
480 len = SPRINTF((tmp, "0x%04x %u %u",
481 keyflags, protocol, algorithm));
482 T(addstr(tmp, len, &buf, &buflen));
484 /* Public key data. */
485 len = b64_ntop(rdata, edata - rdata,
486 base64_key, sizeof base64_key);
490 T(addstr(" (", 2, &buf, &buflen));
495 for (n = 0; n < len; n += 48) {
496 T(addstr(leader, strlen(leader), &buf, &buflen));
497 T(addstr(base64_key + n, MIN(len - n, 48),
501 T(addstr(" )", 2, &buf, &buflen));
502 n = SPRINTF((tmp, " ; key_tag= %u", key_id));
503 T(addstr(tmp, n, &buf, &buflen));
510 char base64_key[NS_MD5RSA_MAX_BASE64];
511 u_int type, algorithm, labels, footprint;
519 /* Type covered, Algorithm, Label count, Original TTL. */
520 type = ns_get16(rdata); rdata += NS_INT16SZ;
521 algorithm = *rdata++;
523 t = ns_get32(rdata); rdata += NS_INT32SZ;
524 len = SPRINTF((tmp, "%s %d %d %lu ",
525 p_type(type), algorithm, labels, t));
526 T(addstr(tmp, len, &buf, &buflen));
527 if (labels > (u_int)dn_count_labels(name))
530 /* Signature expiry. */
531 t = ns_get32(rdata); rdata += NS_INT32SZ;
532 len = SPRINTF((tmp, "%s ", p_secstodate(t)));
533 T(addstr(tmp, len, &buf, &buflen));
536 t = ns_get32(rdata); rdata += NS_INT32SZ;
537 len = SPRINTF((tmp, "%s ", p_secstodate(t)));
538 T(addstr(tmp, len, &buf, &buflen));
540 /* Signature Footprint. */
541 footprint = ns_get16(rdata); rdata += NS_INT16SZ;
542 len = SPRINTF((tmp, "%u ", footprint));
543 T(addstr(tmp, len, &buf, &buflen));
546 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
549 len = b64_ntop(rdata, edata - rdata,
550 base64_key, sizeof base64_key);
552 T(addstr(" (", 2, &buf, &buflen));
559 for (n = 0; n < len; n += 48) {
560 T(addstr(leader, strlen(leader), &buf, &buflen));
561 T(addstr(base64_key + n, MIN(len - n, 48),
565 T(addstr(" )", 2, &buf, &buflen));
572 /* Next domain name. */
573 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
577 for (c = 0; c < n*8; c++)
578 if (NS_NXT_BIT_ISSET(c, rdata)) {
579 len = SPRINTF((tmp, " %s", p_type(c)));
580 T(addstr(tmp, len, &buf, &buflen));
586 u_int c_type, key_tag, alg;
589 char base64_cert[8192], tmp[40];
592 c_type = ns_get16(rdata); rdata += NS_INT16SZ;
593 key_tag = ns_get16(rdata); rdata += NS_INT16SZ;
594 alg = (u_int) *rdata++;
596 len = SPRINTF((tmp, "%d %d %d ", c_type, key_tag, alg));
597 T(addstr(tmp, len, &buf, &buflen));
598 siz = (edata-rdata)*4/3 + 4; /* "+4" accounts for trailing \0 */
599 if (siz > sizeof(base64_cert) * 3/4) {
600 const char *str = "record too long to print";
601 T(addstr(str, strlen(str), &buf, &buflen));
604 len = b64_ntop(rdata, edata-rdata, base64_cert, siz);
609 T(addstr(" (", 2, &buf, &buflen));
616 for (n = 0; n < len; n += 48) {
617 T(addstr(leader, strlen(leader),
619 T(addstr(base64_cert + n, MIN(len - n, 48),
623 T(addstr(" )", 2, &buf, &buflen));
629 /* KJD - need to complete this */
631 int mode, err, keysize;
633 /* Algorithm name. */
634 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
635 T(addstr(" ", 1, &buf, &buflen));
638 t = ns_get32(rdata); rdata += NS_INT32SZ;
639 len = SPRINTF((tmp, "%s ", p_secstodate(t)));
640 T(addstr(tmp, len, &buf, &buflen));
643 t = ns_get32(rdata); rdata += NS_INT32SZ;
644 len = SPRINTF((tmp, "%s ", p_secstodate(t)));
645 T(addstr(tmp, len, &buf, &buflen));
647 /* Mode , Error, Key Size. */
648 /* Priority, Weight, Port. */
649 mode = ns_get16(rdata); rdata += NS_INT16SZ;
650 err = ns_get16(rdata); rdata += NS_INT16SZ;
651 keysize = ns_get16(rdata); rdata += NS_INT16SZ;
652 len = SPRINTF((tmp, "%u %u %u ", mode, err, keysize));
653 T(addstr(tmp, len, &buf, &buflen));
655 /* XXX need to dump key, print otherdata length & other data */
660 /* BEW - need to complete this */
663 T(len = addname(msg, msglen, &rdata, origin, &buf, &buflen));
664 T(addstr(" ", 1, &buf, &buflen));
665 rdata += 8; /*%< time */
666 n = ns_get16(rdata); rdata += INT16SZ;
667 rdata += n; /*%< sig */
668 n = ns_get16(rdata); rdata += INT16SZ; /*%< original id */
669 sprintf(buf, "%d", ns_get16(rdata));
671 addlen(strlen(buf), &buf, &buflen);
680 if (rdlen == 0U) goto formerr;
681 len = SPRINTF((tmp, "%d ", *rdata));
682 T(addstr(tmp, len, &buf, &buflen));
684 if (pbit > 128) goto formerr;
685 pbyte = (pbit & ~7) / 8;
688 /* address suffix: provided only when prefix len != 128 */
690 if (rdata + pbyte >= edata) goto formerr;
691 memset(&a, 0, sizeof(a));
692 memcpy(&a.s6_addr[pbyte], rdata, sizeof(a) - pbyte);
693 (void) inet_ntop(AF_INET6, &a, buf, buflen);
694 addlen(strlen(buf), &buf, &buflen);
695 rdata += sizeof(a) - pbyte;
698 /* prefix name: provided only when prefix len > 0 */
701 if (rdata >= edata) goto formerr;
702 T(addstr(" ", 1, &buf, &buflen));
703 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
709 len = SPRINTF((tmp, "%u bytes", class));
710 T(addstr(tmp, len, &buf, &buflen));
719 if (type == ns_t_ds || type == ns_t_dlv) {
720 if (rdlen < 4U) goto formerr;
723 len = SPRINTF((tmp, "%u ", t));
724 T(addstr(tmp, len, &buf, &buflen));
726 if (rdlen < 2U) goto formerr;
728 len = SPRINTF((tmp, "%u ", *rdata));
729 T(addstr(tmp, len, &buf, &buflen));
732 len = SPRINTF((tmp, "%u ", *rdata));
733 T(addstr(tmp, len, &buf, &buflen));
736 while (rdata < edata) {
737 len = SPRINTF((tmp, "%02X", *rdata));
738 T(addstr(tmp, len, &buf, &buflen));
745 case ns_t_nsec3param: {
746 u_int t, w, l, j, k, c;
748 len = SPRINTF((tmp, "%u ", *rdata));
749 T(addstr(tmp, len, &buf, &buflen));
752 len = SPRINTF((tmp, "%u ", *rdata));
753 T(addstr(tmp, len, &buf, &buflen));
758 len = SPRINTF((tmp, "%u ", t));
759 T(addstr(tmp, len, &buf, &buflen));
763 T(addstr("-", 1, &buf, &buflen));
766 len = SPRINTF((tmp, "%02X", *rdata));
767 T(addstr(tmp, len, &buf, &buflen));
771 if (type == ns_t_nsec3param)
773 T(addstr(" ", 1, &buf, &buflen));
779 tmp[0] = base32hex[((rdata[0]>>3)&0x1f)];
780 tmp[1] = base32hex[((rdata[0]<<2)&0x1c)];
781 tmp[2] = tmp[3] = tmp[4] = '=';
782 tmp[5] = tmp[6] = tmp[7] = '=';
785 tmp[0] = base32hex[((rdata[0]>>3)&0x1f)];
786 tmp[1] = base32hex[((rdata[0]<<2)&0x1c)|
787 ((rdata[1]>>6)&0x03)];
788 tmp[2] = base32hex[((rdata[1]>>1)&0x1f)];
789 tmp[3] = base32hex[((rdata[1]<<4)&0x10)];
790 tmp[4] = tmp[5] = tmp[6] = tmp[7] = '=';
793 tmp[0] = base32hex[((rdata[0]>>3)&0x1f)];
794 tmp[1] = base32hex[((rdata[0]<<2)&0x1c)|
795 ((rdata[1]>>6)&0x03)];
796 tmp[2] = base32hex[((rdata[1]>>1)&0x1f)];
797 tmp[3] = base32hex[((rdata[1]<<4)&0x10)|
798 ((rdata[2]>>4)&0x0f)];
799 tmp[4] = base32hex[((rdata[2]<<1)&0x1e)];
800 tmp[5] = tmp[6] = tmp[7] = '=';
803 tmp[0] = base32hex[((rdata[0]>>3)&0x1f)];
804 tmp[1] = base32hex[((rdata[0]<<2)&0x1c)|
805 ((rdata[1]>>6)&0x03)];
806 tmp[2] = base32hex[((rdata[1]>>1)&0x1f)];
807 tmp[3] = base32hex[((rdata[1]<<4)&0x10)|
808 ((rdata[2]>>4)&0x0f)];
809 tmp[4] = base32hex[((rdata[2]<<1)&0x1e)|
810 ((rdata[3]>>7)&0x01)];
811 tmp[5] = base32hex[((rdata[3]>>2)&0x1f)];
812 tmp[6] = base32hex[(rdata[3]<<3)&0x18];
816 tmp[0] = base32hex[((rdata[0]>>3)&0x1f)];
817 tmp[1] = base32hex[((rdata[0]<<2)&0x1c)|
818 ((rdata[1]>>6)&0x03)];
819 tmp[2] = base32hex[((rdata[1]>>1)&0x1f)];
820 tmp[3] = base32hex[((rdata[1]<<4)&0x10)|
821 ((rdata[2]>>4)&0x0f)];
822 tmp[4] = base32hex[((rdata[2]<<1)&0x1e)|
823 ((rdata[3]>>7)&0x01)];
824 tmp[5] = base32hex[((rdata[3]>>2)&0x1f)];
825 tmp[6] = base32hex[((rdata[3]<<3)&0x18)|
826 ((rdata[4]>>5)&0x07)];
827 tmp[7] = base32hex[(rdata[4]&0x1f)];
830 T(addstr(tmp, 8, &buf, &buflen));
840 while (rdata < edata) {
843 for (j = 0; j < l; j++) {
846 for (k = 0; k < 8; k++) {
847 if ((rdata[j] & (0x80 >> k)) == 0)
849 c = w * 256 + j * 8 + k;
850 len = SPRINTF((tmp, " %s", p_type(c)));
851 T(addstr(tmp, len, &buf, &buflen));
862 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
864 while (rdata < edata) {
867 for (j = 0; j < l; j++) {
870 for (k = 0; k < 8; k++) {
871 if ((rdata[j] & (0x80 >> k)) == 0)
873 c = w * 256 + j * 8 + k;
874 len = SPRINTF((tmp, " %s", p_type(c)));
875 T(addstr(tmp, len, &buf, &buflen));
886 char base64_dhcid[8192];
889 siz = (edata-rdata)*4/3 + 4; /* "+4" accounts for trailing \0 */
890 if (siz > sizeof(base64_dhcid) * 3/4) {
891 const char *str = "record too long to print";
892 T(addstr(str, strlen(str), &buf, &buflen));
894 len = b64_ntop(rdata, edata-rdata, base64_dhcid, siz);
900 T(addstr(" (", 2, &buf, &buflen));
907 for (n = 0; n < len; n += 48) {
908 T(addstr(leader, strlen(leader),
910 T(addstr(base64_dhcid + n, MIN(len - n, 48),
914 T(addstr(" )", 2, &buf, &buflen));
919 case ns_t_ipseckey: {
922 char base64_key[8192];
943 comment = "unknown IPSECKEY gateway type";
947 len = SPRINTF((tmp, "%u ", *rdata));
948 T(addstr(tmp, len, &buf, &buflen));
951 len = SPRINTF((tmp, "%u ", *rdata));
952 T(addstr(tmp, len, &buf, &buflen));
955 len = SPRINTF((tmp, "%u ", *rdata));
956 T(addstr(tmp, len, &buf, &buflen));
961 T(addstr(".", 1, &buf, &buflen));
964 (void) inet_ntop(AF_INET, rdata, buf, buflen);
965 addlen(strlen(buf), &buf, &buflen);
969 (void) inet_ntop(AF_INET6, rdata, buf, buflen);
970 addlen(strlen(buf), &buf, &buflen);
974 T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
981 siz = (edata-rdata)*4/3 + 4; /* "+4" accounts for trailing \0 */
982 if (siz > sizeof(base64_key) * 3/4) {
983 const char *str = "record too long to print";
984 T(addstr(str, strlen(str), &buf, &buflen));
986 len = b64_ntop(rdata, edata-rdata, base64_key, siz);
992 T(addstr(" (", 2, &buf, &buflen));
999 for (n = 0; n < len; n += 48) {
1000 T(addstr(leader, strlen(leader),
1002 T(addstr(base64_key + n, MIN(len - n, 48),
1006 T(addstr(" )", 2, &buf, &buflen));
1011 unsigned int i, hip_len, algorithm, key_len;
1012 char base64_key[NS_MD5RSA_MAX_BASE64];
1014 const char *leader = "\n\t\t\t\t\t";
1017 algorithm = *rdata++;
1018 key_len = ns_get16(rdata);
1019 rdata += NS_INT16SZ;
1021 siz = key_len*4/3 + 4; /* "+4" accounts for trailing \0 */
1022 if (siz > sizeof(base64_key) * 3/4) {
1023 const char *str = "record too long to print";
1024 T(addstr(str, strlen(str), &buf, &buflen));
1026 len = sprintf(tmp, "( %u ", algorithm);
1027 T(addstr(tmp, len, &buf, &buflen));
1029 for (i = 0; i < hip_len; i++) {
1030 len = sprintf(tmp, "%02X", *rdata);
1031 T(addstr(tmp, len, &buf, &buflen));
1034 T(addstr(leader, strlen(leader), &buf, &buflen));
1036 len = b64_ntop(rdata, key_len, base64_key, siz);
1040 T(addstr(base64_key, len, &buf, &buflen));
1043 while (rdata < edata) {
1044 T(addstr(leader, strlen(leader), &buf, &buflen));
1045 T(addname(msg, msglen, &rdata, origin,
1048 T(addstr(" )", 2, &buf, &buflen));
1054 comment = "unknown RR type";
1057 return (buf - obuf);
1059 comment = "RR format error";
1064 len = SPRINTF((tmp, "\\# %u%s\t; %s", (unsigned)(edata - rdata),
1065 rdlen != 0U ? " (" : "", comment));
1066 T(addstr(tmp, len, &buf, &buflen));
1067 while (rdata < edata) {
1069 p += SPRINTF((p, "\n\t"));
1071 n = MIN(16, edata - rdata);
1072 for (m = 0; m < n; m++)
1073 p += SPRINTF((p, "%02x ", rdata[m]));
1074 T(addstr(tmp, p - tmp, &buf, &buflen));
1076 T(addstr(")", 1, &buf, &buflen));
1077 T(addtab(p - tmp + 1, 48, spaced, &buf, &buflen));
1080 p += SPRINTF((p, "; "));
1081 for (m = 0; m < n; m++)
1082 *p++ = (isascii(rdata[m]) && isprint(rdata[m]))
1085 T(addstr(tmp, p - tmp, &buf, &buflen));
1088 return (buf - obuf);
1096 * prune_origin(name, origin)
1097 * Find out if the name is at or under the current origin.
1099 * Number of characters in name before start of origin,
1100 * or length of name if origin does not match.
1102 * This function should share code with samedomain().
1105 prune_origin(const char *name, const char *origin) {
1106 const char *oname = name;
1108 while (*name != '\0') {
1109 if (origin != NULL && ns_samename(name, origin) == 1)
1110 return (name - oname - (name > oname));
1111 while (*name != '\0') {
1112 if (*name == '\\') {
1114 /* XXX need to handle \nnn form. */
1117 } else if (*name == '.') {
1124 return (name - oname);
1129 * charstr(rdata, edata, buf, buflen)
1130 * Format a <character-string> into the presentation buffer.
1132 * Number of rdata octets consumed
1133 * 0 for protocol format error
1134 * -1 for output buffer error
1136 * buffer is advanced on success.
1139 charstr(const u_char *rdata, const u_char *edata, char **buf, size_t *buflen) {
1140 const u_char *odata = rdata;
1141 size_t save_buflen = *buflen;
1142 char *save_buf = *buf;
1144 if (addstr("\"", 1, buf, buflen) < 0)
1146 if (rdata < edata) {
1149 if (rdata + 1 + n <= edata) {
1152 if (strchr("\n\"\\", *rdata) != NULL)
1153 if (addstr("\\", 1, buf, buflen) < 0)
1155 if (addstr((const char *)rdata, 1,
1162 if (addstr("\"", 1, buf, buflen) < 0)
1164 return (rdata - odata);
1168 *buflen = save_buflen;
1173 addname(const u_char *msg, size_t msglen,
1174 const u_char **pp, const char *origin,
1175 char **buf, size_t *buflen)
1177 size_t newlen, save_buflen = *buflen;
1178 char *save_buf = *buf;
1181 n = dn_expand(msg, msg + msglen, *pp, *buf, *buflen);
1183 goto enospc; /*%< Guess. */
1184 newlen = prune_origin(*buf, origin);
1185 if (**buf == '\0') {
1187 } else if (newlen == 0U) {
1188 /* Use "@" instead of name. */
1189 if (newlen + 2 > *buflen)
1190 goto enospc; /* No room for "@\0". */
1191 (*buf)[newlen++] = '@';
1192 (*buf)[newlen] = '\0';
1194 if (((origin == NULL || origin[0] == '\0') ||
1195 (origin[0] != '.' && origin[1] != '\0' &&
1196 (*buf)[newlen] == '\0')) && (*buf)[newlen - 1] != '.') {
1197 /* No trailing dot. */
1199 if (newlen + 2 > *buflen)
1200 goto enospc; /* No room for ".\0". */
1201 (*buf)[newlen++] = '.';
1202 (*buf)[newlen] = '\0';
1206 addlen(newlen, buf, buflen);
1212 *buflen = save_buflen;
1217 addlen(size_t len, char **buf, size_t *buflen) {
1218 INSIST(len <= *buflen);
1224 addstr(const char *src, size_t len, char **buf, size_t *buflen) {
1225 if (len >= *buflen) {
1229 memcpy(*buf, src, len);
1230 addlen(len, buf, buflen);
1236 addtab(size_t len, size_t target, int spaced, char **buf, size_t *buflen) {
1237 size_t save_buflen = *buflen;
1238 char *save_buf = *buf;
1241 if (spaced || len >= target - 1) {
1242 T(addstr(" ", 2, buf, buflen));
1245 for (t = (target - len - 1) / 8; t >= 0; t--)
1246 if (addstr("\t", 1, buf, buflen) < 0) {
1247 *buflen = save_buflen;