2 * Portions Copyright (C) 2004, 2005, 2008, 2009 Internet Systems Consortium, Inc. ("ISC")
3 * Portions Copyright (C) 1996-2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and/or distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
20 * The Regents of the University of California. All rights reserved.
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
25 * 1. Redistributions of source code must retain the above copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 4. Neither the name of the University nor the names of its contributors
31 * may be used to endorse or promote products derived from this software
32 * without specific prior written permission.
34 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
35 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
36 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
37 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
38 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
39 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
40 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
41 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
42 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
43 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
48 * Portions Copyright (c) 1993 by Digital Equipment Corporation.
50 * Permission to use, copy, modify, and distribute this software for any
51 * purpose with or without fee is hereby granted, provided that the above
52 * copyright notice and this permission notice appear in all copies, and that
53 * the name of Digital Equipment Corporation not be used in advertising or
54 * publicity pertaining to distribution of the document or software without
55 * specific, written prior permission.
57 * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
58 * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
59 * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT
60 * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
61 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
62 * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
63 * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
68 * Portions Copyright (c) 1995 by International Business Machines, Inc.
70 * International Business Machines, Inc. (hereinafter called IBM) grants
71 * permission under its copyrights to use, copy, modify, and distribute this
72 * Software with or without fee, provided that the above copyright notice and
73 * all paragraphs of this notice appear in all copies, and that the name of IBM
74 * not be used in connection with the marketing of any product incorporating
75 * the Software or modifications thereof, without specific, written prior
78 * To the extent it has a right to do so, IBM grants an immunity from suit
79 * under its patents, if any, for the use, sale or manufacture of products to
80 * the extent that such products are used for performing Domain Name System
81 * dynamic updates in TCP/IP networks by means of the Software. No immunity is
82 * granted for any product per se or for any other function of any product.
84 * THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES,
85 * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
86 * PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL,
87 * DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER ARISING
88 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE, EVEN
89 * IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES.
92 #if defined(LIBC_SCCS) && !defined(lint)
93 static const char sccsid[] = "@(#)res_debug.c 8.1 (Berkeley) 6/4/93";
94 static const char rcsid[] = "$Id: res_debug.c,v 1.19 2009/02/26 11:20:20 tbox Exp $";
95 #endif /* LIBC_SCCS and not lint */
96 #include <sys/cdefs.h>
97 __FBSDID("$FreeBSD$");
99 #include "port_before.h"
101 #include <sys/types.h>
102 #include <sys/param.h>
103 #include <sys/socket.h>
105 #include <netinet/in.h>
106 #include <arpa/inet.h>
107 #include <arpa/nameser.h>
114 #include <resolv_mt.h>
120 #include "port_after.h"
123 # define SPRINTF(x) strlen(sprintf/**/x)
125 # define SPRINTF(x) sprintf x
128 extern const char *_res_opcodes[];
129 extern const char *_res_sectioncodes[];
132 * Print the current options.
135 fp_resstat(const res_state statp, FILE *file) {
138 fprintf(file, ";; res options:");
139 for (mask = 1; mask != 0U; mask <<= 1)
140 if (statp->options & mask)
141 fprintf(file, " %s", p_option(mask));
146 do_section(const res_state statp,
147 ns_msg *handle, ns_sect section,
148 int pflag, FILE *file)
151 static int buflen = 2048;
157 * Print answer records.
159 sflag = (statp->pfcode & pflag);
160 if (statp->pfcode && !sflag)
163 buf = malloc(buflen);
165 fprintf(file, ";; memory allocation failure\n");
169 opcode = (ns_opcode) ns_msg_getflag(*handle, ns_f_opcode);
172 if (ns_parserr(handle, section, rrnum, &rr)) {
174 fprintf(file, ";; ns_parserr: %s\n",
176 else if (rrnum > 0 && sflag != 0 &&
177 (statp->pfcode & RES_PRF_HEAD1))
181 if (rrnum == 0 && sflag != 0 && (statp->pfcode & RES_PRF_HEAD1))
182 fprintf(file, ";; %s SECTION:\n",
183 p_section(section, opcode));
184 if (section == ns_s_qd)
185 fprintf(file, ";;\t%s, type = %s, class = %s\n",
187 p_type(ns_rr_type(rr)),
188 p_class(ns_rr_class(rr)));
189 else if (section == ns_s_ar && ns_rr_type(rr) == ns_t_opt) {
190 u_int16_t optcode, optlen, rdatalen = ns_rr_rdlen(rr);
191 u_int32_t ttl = ns_rr_ttl(rr);
194 "; EDNS: version: %u, udp=%u, flags=%04x\n",
195 (ttl>>16)&0xff, ns_rr_class(rr), ttl&0xffff);
197 while (rdatalen >= 4) {
198 const u_char *cp = ns_rr_rdata(rr);
201 GETSHORT(optcode, cp);
202 GETSHORT(optlen, cp);
204 if (optcode == NS_OPT_NSID) {
205 fputs("; NSID: ", file);
207 fputs("; NSID\n", file);
209 fputs("; NSID: ", file);
210 for (i = 0; i < optlen; i++)
211 fprintf(file, "%02x ",
214 for (i = 0; i < optlen; i++)
222 fprintf(file, "; OPT=%u\n",
225 fprintf(file, "; OPT=%u: ",
227 for (i = 0; i < optlen; i++)
228 fprintf(file, "%02x ",
231 for (i = 0; i < optlen; i++)
238 rdatalen -= 4 + optlen;
241 n = ns_sprintrr(handle, &rr, NULL, NULL,
244 if (errno == ENOSPC) {
248 buf = malloc(buflen += 1024);
251 ";; memory allocation failure\n");
256 fprintf(file, ";; ns_sprintrr: %s\n",
271 * Print the contents of a query.
272 * This is intended to be primarily a debugging routine.
275 res_pquery(const res_state statp, const u_char *msg, int len, FILE *file) {
277 int qdcount, ancount, nscount, arcount;
278 u_int opcode, rcode, id;
280 if (ns_initparse(msg, len, &handle) < 0) {
281 fprintf(file, ";; ns_initparse: %s\n", strerror(errno));
284 opcode = ns_msg_getflag(handle, ns_f_opcode);
285 rcode = ns_msg_getflag(handle, ns_f_rcode);
286 id = ns_msg_id(handle);
287 qdcount = ns_msg_count(handle, ns_s_qd);
288 ancount = ns_msg_count(handle, ns_s_an);
289 nscount = ns_msg_count(handle, ns_s_ns);
290 arcount = ns_msg_count(handle, ns_s_ar);
293 * Print header fields.
295 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEADX) || rcode)
297 ";; ->>HEADER<<- opcode: %s, status: %s, id: %d\n",
298 _res_opcodes[opcode], p_rcode(rcode), id);
299 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEADX))
301 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEAD2)) {
302 fprintf(file, "; flags:");
303 if (ns_msg_getflag(handle, ns_f_qr))
304 fprintf(file, " qr");
305 if (ns_msg_getflag(handle, ns_f_aa))
306 fprintf(file, " aa");
307 if (ns_msg_getflag(handle, ns_f_tc))
308 fprintf(file, " tc");
309 if (ns_msg_getflag(handle, ns_f_rd))
310 fprintf(file, " rd");
311 if (ns_msg_getflag(handle, ns_f_ra))
312 fprintf(file, " ra");
313 if (ns_msg_getflag(handle, ns_f_z))
314 fprintf(file, " ??");
315 if (ns_msg_getflag(handle, ns_f_ad))
316 fprintf(file, " ad");
317 if (ns_msg_getflag(handle, ns_f_cd))
318 fprintf(file, " cd");
320 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEAD1)) {
321 fprintf(file, "; %s: %d",
322 p_section(ns_s_qd, opcode), qdcount);
323 fprintf(file, ", %s: %d",
324 p_section(ns_s_an, opcode), ancount);
325 fprintf(file, ", %s: %d",
326 p_section(ns_s_ns, opcode), nscount);
327 fprintf(file, ", %s: %d",
328 p_section(ns_s_ar, opcode), arcount);
330 if ((!statp->pfcode) || (statp->pfcode &
331 (RES_PRF_HEADX | RES_PRF_HEAD2 | RES_PRF_HEAD1))) {
335 * Print the various sections.
337 do_section(statp, &handle, ns_s_qd, RES_PRF_QUES, file);
338 do_section(statp, &handle, ns_s_an, RES_PRF_ANS, file);
339 do_section(statp, &handle, ns_s_ns, RES_PRF_AUTH, file);
340 do_section(statp, &handle, ns_s_ar, RES_PRF_ADD, file);
341 if (qdcount == 0 && ancount == 0 &&
342 nscount == 0 && arcount == 0)
347 p_cdnname(const u_char *cp, const u_char *msg, int len, FILE *file) {
351 if ((n = dn_expand(msg, msg + len, cp, name, sizeof name)) < 0)
361 p_cdname(const u_char *cp, const u_char *msg, FILE *file) {
362 return (p_cdnname(cp, msg, PACKETSZ, file));
366 * Return a fully-qualified domain name from a compressed name (with
370 p_fqnname(cp, msg, msglen, name, namelen)
371 const u_char *cp, *msg;
378 if ((n = dn_expand(msg, cp + msglen, cp, name, namelen)) < 0)
380 newlen = strlen(name);
381 if (newlen == 0 || name[newlen - 1] != '.') {
382 if (newlen + 1 >= namelen) /*%< Lack space for final dot */
385 strcpy(name + newlen, ".");
390 /* XXX: the rest of these functions need to become length-limited, too. */
393 p_fqname(const u_char *cp, const u_char *msg, FILE *file) {
397 n = p_fqnname(cp, msg, MAXCDNAME, name, sizeof name);
405 * Names of RR classes and qclasses. Classes and qclasses are the same, except
406 * that C_ANY is a qclass but not a class. (You can ask for records of class
407 * C_ANY, but you can't have any records of that class in the database.)
409 const struct res_sym __p_class_syms[] = {
410 {C_IN, "IN", (char *)0},
411 {C_CHAOS, "CH", (char *)0},
412 {C_CHAOS, "CHAOS", (char *)0},
413 {C_HS, "HS", (char *)0},
414 {C_HS, "HESIOD", (char *)0},
415 {C_ANY, "ANY", (char *)0},
416 {C_NONE, "NONE", (char *)0},
417 {C_IN, (char *)0, (char *)0}
421 * Names of message sections.
423 static const struct res_sym __p_default_section_syms[] = {
424 {ns_s_qd, "QUERY", (char *)0},
425 {ns_s_an, "ANSWER", (char *)0},
426 {ns_s_ns, "AUTHORITY", (char *)0},
427 {ns_s_ar, "ADDITIONAL", (char *)0},
428 {0, (char *)0, (char *)0}
431 static const struct res_sym __p_update_section_syms[] = {
432 {S_ZONE, "ZONE", (char *)0},
433 {S_PREREQ, "PREREQUISITE", (char *)0},
434 {S_UPDATE, "UPDATE", (char *)0},
435 {S_ADDT, "ADDITIONAL", (char *)0},
436 {0, (char *)0, (char *)0}
439 const struct res_sym __p_key_syms[] = {
440 {NS_ALG_MD5RSA, "RSA", "RSA KEY with MD5 hash"},
441 {NS_ALG_DH, "DH", "Diffie Hellman"},
442 {NS_ALG_DSA, "DSA", "Digital Signature Algorithm"},
443 {NS_ALG_EXPIRE_ONLY, "EXPIREONLY", "No algorithm"},
444 {NS_ALG_PRIVATE_OID, "PRIVATE", "Algorithm obtained from OID"},
448 const struct res_sym __p_cert_syms[] = {
449 {cert_t_pkix, "PKIX", "PKIX (X.509v3) Certificate"},
450 {cert_t_spki, "SPKI", "SPKI certificate"},
451 {cert_t_pgp, "PGP", "PGP certificate"},
452 {cert_t_url, "URL", "URL Private"},
453 {cert_t_oid, "OID", "OID Private"},
458 * Names of RR types and qtypes. Types and qtypes are the same, except
459 * that T_ANY is a qtype but not a type. (You can ask for records of type
460 * T_ANY, but you can't have any records of that type in the database.)
462 const struct res_sym __p_type_syms[] = {
463 {ns_t_a, "A", "address"},
464 {ns_t_ns, "NS", "name server"},
465 {ns_t_md, "MD", "mail destination (deprecated)"},
466 {ns_t_mf, "MF", "mail forwarder (deprecated)"},
467 {ns_t_cname, "CNAME", "canonical name"},
468 {ns_t_soa, "SOA", "start of authority"},
469 {ns_t_mb, "MB", "mailbox"},
470 {ns_t_mg, "MG", "mail group member"},
471 {ns_t_mr, "MR", "mail rename"},
472 {ns_t_null, "NULL", "null"},
473 {ns_t_wks, "WKS", "well-known service (deprecated)"},
474 {ns_t_ptr, "PTR", "domain name pointer"},
475 {ns_t_hinfo, "HINFO", "host information"},
476 {ns_t_minfo, "MINFO", "mailbox information"},
477 {ns_t_mx, "MX", "mail exchanger"},
478 {ns_t_txt, "TXT", "text"},
479 {ns_t_rp, "RP", "responsible person"},
480 {ns_t_afsdb, "AFSDB", "DCE or AFS server"},
481 {ns_t_x25, "X25", "X25 address"},
482 {ns_t_isdn, "ISDN", "ISDN address"},
483 {ns_t_rt, "RT", "router"},
484 {ns_t_nsap, "NSAP", "nsap address"},
485 {ns_t_nsap_ptr, "NSAP_PTR", "domain name pointer"},
486 {ns_t_sig, "SIG", "signature"},
487 {ns_t_key, "KEY", "key"},
488 {ns_t_px, "PX", "mapping information"},
489 {ns_t_gpos, "GPOS", "geographical position (withdrawn)"},
490 {ns_t_aaaa, "AAAA", "IPv6 address"},
491 {ns_t_loc, "LOC", "location"},
492 {ns_t_nxt, "NXT", "next valid name (unimplemented)"},
493 {ns_t_eid, "EID", "endpoint identifier (unimplemented)"},
494 {ns_t_nimloc, "NIMLOC", "NIMROD locator (unimplemented)"},
495 {ns_t_srv, "SRV", "server selection"},
496 {ns_t_atma, "ATMA", "ATM address (unimplemented)"},
497 {ns_t_naptr, "NAPTR", "naptr"},
498 {ns_t_kx, "KX", "key exchange"},
499 {ns_t_cert, "CERT", "certificate"},
500 {ns_t_a6, "A", "IPv6 address (experminental)"},
501 {ns_t_dname, "DNAME", "non-terminal redirection"},
502 {ns_t_opt, "OPT", "opt"},
503 {ns_t_apl, "apl", "apl"},
504 {ns_t_ds, "DS", "delegation signer"},
505 {ns_t_sshfp, "SSFP", "SSH fingerprint"},
506 {ns_t_ipseckey, "IPSECKEY", "IPSEC key"},
507 {ns_t_rrsig, "RRSIG", "rrsig"},
508 {ns_t_nsec, "NSEC", "nsec"},
509 {ns_t_dnskey, "DNSKEY", "DNS key"},
510 {ns_t_dhcid, "DHCID", "dynamic host configuration identifier"},
511 {ns_t_nsec3, "NSEC3", "nsec3"},
512 {ns_t_nsec3param, "NSEC3PARAM", "NSEC3 parameters"},
513 {ns_t_hip, "HIP", "host identity protocol"},
514 {ns_t_spf, "SPF", "sender policy framework"},
515 {ns_t_tkey, "TKEY", "tkey"},
516 {ns_t_tsig, "TSIG", "transaction signature"},
517 {ns_t_ixfr, "IXFR", "incremental zone transfer"},
518 {ns_t_axfr, "AXFR", "zone transfer"},
519 {ns_t_zxfr, "ZXFR", "compressed zone transfer"},
520 {ns_t_mailb, "MAILB", "mailbox-related data (deprecated)"},
521 {ns_t_maila, "MAILA", "mail agent (deprecated)"},
522 {ns_t_naptr, "NAPTR", "URN Naming Authority"},
523 {ns_t_kx, "KX", "Key Exchange"},
524 {ns_t_cert, "CERT", "Certificate"},
525 {ns_t_a6, "A6", "IPv6 Address"},
526 {ns_t_dname, "DNAME", "dname"},
527 {ns_t_sink, "SINK", "Kitchen Sink (experimental)"},
528 {ns_t_opt, "OPT", "EDNS Options"},
529 {ns_t_any, "ANY", "\"any\""},
530 {ns_t_dlv, "DLV", "DNSSEC look-aside validation"},
535 * Names of DNS rcodes.
537 const struct res_sym __p_rcode_syms[] = {
538 {ns_r_noerror, "NOERROR", "no error"},
539 {ns_r_formerr, "FORMERR", "format error"},
540 {ns_r_servfail, "SERVFAIL", "server failed"},
541 {ns_r_nxdomain, "NXDOMAIN", "no such domain name"},
542 {ns_r_notimpl, "NOTIMP", "not implemented"},
543 {ns_r_refused, "REFUSED", "refused"},
544 {ns_r_yxdomain, "YXDOMAIN", "domain name exists"},
545 {ns_r_yxrrset, "YXRRSET", "rrset exists"},
546 {ns_r_nxrrset, "NXRRSET", "rrset doesn't exist"},
547 {ns_r_notauth, "NOTAUTH", "not authoritative"},
548 {ns_r_notzone, "NOTZONE", "Not in zone"},
550 {ns_r_badsig, "BADSIG", "bad signature"},
551 {ns_r_badkey, "BADKEY", "bad key"},
552 {ns_r_badtime, "BADTIME", "bad time"},
557 sym_ston(const struct res_sym *syms, const char *name, int *success) {
558 for ((void)NULL; syms->name != 0; syms++) {
559 if (strcasecmp (name, syms->name) == 0) {
562 return (syms->number);
567 return (syms->number); /*%< The default value. */
571 sym_ntos(const struct res_sym *syms, int number, int *success) {
572 char *unname = sym_ntos_unname;
574 for ((void)NULL; syms->name != 0; syms++) {
575 if (number == syms->number) {
582 sprintf(unname, "%d", number); /*%< XXX nonreentrant */
589 sym_ntop(const struct res_sym *syms, int number, int *success) {
590 char *unname = sym_ntop_unname;
592 for ((void)NULL; syms->name != 0; syms++) {
593 if (number == syms->number) {
596 return (syms->humanname);
599 sprintf(unname, "%d", number); /*%< XXX nonreentrant */
606 * Return a string for the type.
612 static char typebuf[20];
614 result = sym_ntos(__p_type_syms, type, &success);
617 if (type < 0 || type > 0xffff)
619 sprintf(typebuf, "TYPE%d", type);
624 * Return a string for the type.
627 p_section(int section, int opcode) {
628 const struct res_sym *symbols;
632 symbols = __p_update_section_syms;
635 symbols = __p_default_section_syms;
638 return (sym_ntos(symbols, section, (int *)0));
642 * Return a mnemonic for class.
648 static char classbuf[20];
650 result = sym_ntos(__p_class_syms, class, &success);
653 if (class < 0 || class > 0xffff)
655 sprintf(classbuf, "CLASS%d", class);
660 * Return a mnemonic for an option
663 p_option(u_long option) {
664 char *nbuf = p_option_nbuf;
667 case RES_INIT: return "init";
668 case RES_DEBUG: return "debug";
669 case RES_AAONLY: return "aaonly(unimpl)";
670 case RES_USEVC: return "usevc";
671 case RES_PRIMARY: return "primry(unimpl)";
672 case RES_IGNTC: return "igntc";
673 case RES_RECURSE: return "recurs";
674 case RES_DEFNAMES: return "defnam";
675 case RES_STAYOPEN: return "styopn";
676 case RES_DNSRCH: return "dnsrch";
677 case RES_INSECURE1: return "insecure1";
678 case RES_INSECURE2: return "insecure2";
679 case RES_NOALIASES: return "noaliases";
680 case RES_USE_INET6: return "inet6";
681 #ifdef RES_USE_EDNS0 /*%< KAME extension */
682 case RES_USE_EDNS0: return "edns0";
683 case RES_NSID: return "nsid";
686 case RES_USE_DNAME: return "dname";
688 #ifdef RES_USE_DNSSEC
689 case RES_USE_DNSSEC: return "dnssec";
691 #ifdef RES_NOTLDQUERY
692 case RES_NOTLDQUERY: return "no-tld-query";
694 #ifdef RES_NO_NIBBLE2
695 case RES_NO_NIBBLE2: return "no-nibble2";
697 /* XXX nonreentrant */
698 default: sprintf(nbuf, "?0x%lx?", (u_long)option);
704 * Return a mnemonic for a time to live.
707 p_time(u_int32_t value) {
708 char *nbuf = p_time_nbuf;
710 if (ns_format_ttl(value, nbuf, sizeof nbuf) < 0)
711 sprintf(nbuf, "%u", value);
716 * Return a string for the rcode.
720 return (sym_ntos(__p_rcode_syms, rcode, (int *)0));
724 * Return a string for a res_sockaddr_union.
727 p_sockun(union res_sockaddr_union u, char *buf, size_t size) {
728 char ret[sizeof "ffff:ffff:ffff:ffff:ffff:ffff:123.123.123.123"];
730 switch (u.sin.sin_family) {
732 inet_ntop(AF_INET, &u.sin.sin_addr, ret, sizeof ret);
734 #ifdef HAS_INET6_STRUCTS
736 inet_ntop(AF_INET6, &u.sin6.sin6_addr, ret, sizeof ret);
740 sprintf(ret, "[af%d]", u.sin.sin_family);
744 strncpy(buf, ret, size - 1);
751 * routines to convert between on-the-wire RR format and zone file format.
752 * Does not contain conversion to/from decimal degrees; divide or multiply
753 * by 60*60*1000 for that.
756 static unsigned int poweroften[10] = {1, 10, 100, 1000, 10000, 100000,
757 1000000,10000000,100000000,1000000000};
759 /*% takes an XeY precision/size value, returns a string representation. */
764 char *retbuf = precsize_ntoa_retbuf;
766 int mantissa, exponent;
768 mantissa = (int)((prec >> 4) & 0x0f) % 10;
769 exponent = (int)((prec >> 0) & 0x0f) % 10;
771 val = mantissa * poweroften[exponent];
773 (void) sprintf(retbuf, "%lu.%.2lu", val/100, val%100);
777 /*% converts ascii size/precision X * 10**Y(cm) to 0xXY. moves pointer. */
779 precsize_aton(const char **strptr) {
780 unsigned int mval = 0, cmval = 0;
788 while (isdigit((unsigned char)*cp))
789 mval = mval * 10 + (*cp++ - '0');
791 if (*cp == '.') { /*%< centimeters */
793 if (isdigit((unsigned char)*cp)) {
794 cmval = (*cp++ - '0') * 10;
795 if (isdigit((unsigned char)*cp)) {
796 cmval += (*cp++ - '0');
800 cmval = (mval * 100) + cmval;
802 for (exponent = 0; exponent < 9; exponent++)
803 if (cmval < poweroften[exponent+1])
806 mantissa = cmval / poweroften[exponent];
810 retval = (mantissa << 4) | exponent;
817 /*% converts ascii lat/lon to unsigned encoded 32-bit number. moves pointer. */
819 latlon2ul(const char **latlonstrptr, int *which) {
822 int deg = 0, min = 0, secs = 0, secsfrac = 0;
826 while (isdigit((unsigned char)*cp))
827 deg = deg * 10 + (*cp++ - '0');
829 while (isspace((unsigned char)*cp))
832 if (!(isdigit((unsigned char)*cp)))
835 while (isdigit((unsigned char)*cp))
836 min = min * 10 + (*cp++ - '0');
838 while (isspace((unsigned char)*cp))
841 if (!(isdigit((unsigned char)*cp)))
844 while (isdigit((unsigned char)*cp))
845 secs = secs * 10 + (*cp++ - '0');
847 if (*cp == '.') { /*%< decimal seconds */
849 if (isdigit((unsigned char)*cp)) {
850 secsfrac = (*cp++ - '0') * 100;
851 if (isdigit((unsigned char)*cp)) {
852 secsfrac += (*cp++ - '0') * 10;
853 if (isdigit((unsigned char)*cp)) {
854 secsfrac += (*cp++ - '0');
860 while (!isspace((unsigned char)*cp)) /*%< if any trailing garbage */
863 while (isspace((unsigned char)*cp))
870 retval = ((unsigned)1<<31)
871 + (((((deg * 60) + min) * 60) + secs) * 1000)
876 retval = ((unsigned)1<<31)
877 - (((((deg * 60) + min) * 60) + secs) * 1000)
881 retval = 0; /*%< invalid value -- indicates error */
888 *which = 1; /*%< latitude */
892 *which = 2; /*%< longitude */
895 *which = 0; /*%< error */
899 cp++; /*%< skip the hemisphere */
900 while (!isspace((unsigned char)*cp)) /*%< if any trailing garbage */
903 while (isspace((unsigned char)*cp)) /*%< move to next field */
912 * converts a zone file representation in a string to an RDATA on-the-wire
915 loc_aton(ascii, binary)
919 const char *cp, *maxcp;
922 u_int32_t latit = 0, longit = 0, alt = 0;
923 u_int32_t lltemp1 = 0, lltemp2 = 0;
924 int altmeters = 0, altfrac = 0, altsign = 1;
925 u_int8_t hp = 0x16; /*%< default = 1e6 cm = 10000.00m = 10km */
926 u_int8_t vp = 0x13; /*%< default = 1e3 cm = 10.00m */
927 u_int8_t siz = 0x12; /*%< default = 1e2 cm = 1.00m */
928 int which1 = 0, which2 = 0;
931 maxcp = cp + strlen(ascii);
933 lltemp1 = latlon2ul(&cp, &which1);
935 lltemp2 = latlon2ul(&cp, &which2);
937 switch (which1 + which2) {
938 case 3: /*%< 1 + 2, the only valid combination */
939 if ((which1 == 1) && (which2 == 2)) { /*%< normal case */
942 } else if ((which1 == 2) && (which2 == 1)) { /*%< reversed */
945 } else { /*%< some kind of brokenness */
949 default: /*%< we didn't get one of each */
962 while (isdigit((unsigned char)*cp))
963 altmeters = altmeters * 10 + (*cp++ - '0');
965 if (*cp == '.') { /*%< decimal meters */
967 if (isdigit((unsigned char)*cp)) {
968 altfrac = (*cp++ - '0') * 10;
969 if (isdigit((unsigned char)*cp)) {
970 altfrac += (*cp++ - '0');
975 alt = (10000000 + (altsign * (altmeters * 100 + altfrac)));
977 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
980 while (isspace((unsigned char)*cp) && (cp < maxcp))
986 siz = precsize_aton(&cp);
988 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
991 while (isspace((unsigned char)*cp) && (cp < maxcp))
997 hp = precsize_aton(&cp);
999 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
1002 while (isspace((unsigned char)*cp) && (cp < maxcp))
1008 vp = precsize_aton(&cp);
1013 *bcp++ = (u_int8_t) 0; /*%< version byte */
1018 PUTLONG(longit,bcp);
1021 return (16); /*%< size of RR in octets */
1024 /*% takes an on-the-wire LOC RR and formats it in a human readable format. */
1026 loc_ntoa(binary, ascii)
1027 const u_char *binary;
1030 static const char *error = "?";
1031 static char tmpbuf[sizeof
1032 "1000 60 60.000 N 1000 60 60.000 W -12345678.00m 90000000.00m 90000000.00m 90000000.00m"];
1033 const u_char *cp = binary;
1035 int latdeg, latmin, latsec, latsecfrac;
1036 int longdeg, longmin, longsec, longsecfrac;
1037 char northsouth, eastwest;
1038 const char *altsign;
1039 int altmeters, altfrac;
1041 const u_int32_t referencealt = 100000 * 100;
1043 int32_t latval, longval, altval;
1045 u_int8_t sizeval, hpval, vpval, versionval;
1047 char *sizestr, *hpstr, *vpstr;
1055 (void) sprintf(ascii, "; error: unknown LOC RR version");
1065 latval = (templ - ((unsigned)1<<31));
1068 longval = (templ - ((unsigned)1<<31));
1071 if (templ < referencealt) { /*%< below WGS 84 spheroid */
1072 altval = referencealt - templ;
1075 altval = templ - referencealt;
1085 latsecfrac = latval % 1000;
1086 latval = latval / 1000;
1087 latsec = latval % 60;
1088 latval = latval / 60;
1089 latmin = latval % 60;
1090 latval = latval / 60;
1099 longsecfrac = longval % 1000;
1100 longval = longval / 1000;
1101 longsec = longval % 60;
1102 longval = longval / 60;
1103 longmin = longval % 60;
1104 longval = longval / 60;
1107 altfrac = altval % 100;
1108 altmeters = (altval / 100);
1110 sizestr = strdup(precsize_ntoa(sizeval));
1111 hpstr = strdup(precsize_ntoa(hpval));
1112 vpstr = strdup(precsize_ntoa(vpval));
1115 "%d %.2d %.2d.%.3d %c %d %.2d %.2d.%.3d %c %s%d.%.2dm %sm %sm %sm",
1116 latdeg, latmin, latsec, latsecfrac, northsouth,
1117 longdeg, longmin, longsec, longsecfrac, eastwest,
1118 altsign, altmeters, altfrac,
1119 (sizestr != NULL) ? sizestr : error,
1120 (hpstr != NULL) ? hpstr : error,
1121 (vpstr != NULL) ? vpstr : error);
1123 if (sizestr != NULL)
1134 /*% Return the number of DNS hierarchy levels in the name. */
1136 dn_count_labels(const char *name) {
1140 for (i = 0, count = 0; i < len; i++) {
1141 /* XXX need to check for \. or use named's nlabels(). */
1146 /* don't count initial wildcard */
1151 /* don't count the null label for root. */
1152 /* if terminating '.' not found, must adjust */
1153 /* count to include last label */
1154 if (len > 0 && name[len-1] != '.')
1160 * Make dates expressed in seconds-since-Jan-1-1970 easy to read.
1161 * SIG records are required to be printed like this, by the Secure DNS RFC.
1164 p_secstodate (u_long secs) {
1165 char *output = p_secstodate_output;
1166 time_t clock = secs;
1171 time = gmtime_r(&clock, &res);
1173 time = gmtime(&clock);
1175 time->tm_year += 1900;
1177 sprintf(output, "%04d%02d%02d%02d%02d%02d",
1178 time->tm_year, time->tm_mon, time->tm_mday,
1179 time->tm_hour, time->tm_min, time->tm_sec);
1184 res_nametoclass(const char *buf, int *successp) {
1185 unsigned long result;
1189 result = sym_ston(__p_class_syms, buf, &success);
1193 if (strncasecmp(buf, "CLASS", 5) != 0 ||
1194 !isdigit((unsigned char)buf[5]))
1197 result = strtoul(buf + 5, &endptr, 10);
1198 if (errno == 0 && *endptr == '\0' && result <= 0xffffU)
1202 *successp = success;
1207 res_nametotype(const char *buf, int *successp) {
1208 unsigned long result;
1212 result = sym_ston(__p_type_syms, buf, &success);
1216 if (strncasecmp(buf, "type", 4) != 0 ||
1217 !isdigit((unsigned char)buf[4]))
1220 result = strtoul(buf + 4, &endptr, 10);
1221 if (errno == 0 && *endptr == '\0' && result <= 0xffffU)
1225 *successp = success;
1230 * Weak aliases for applications that use certain private entry points,
1231 * and fail to include <resolv.h>.
1234 __weak_reference(__fp_resstat, fp_resstat);
1236 __weak_reference(__p_fqnname, p_fqnname);
1238 __weak_reference(__sym_ston, sym_ston);
1240 __weak_reference(__sym_ntos, sym_ntos);
1242 __weak_reference(__sym_ntop, sym_ntop);
1243 #undef dn_count_labels
1244 __weak_reference(__dn_count_labels, dn_count_labels);
1246 __weak_reference(__p_secstodate, p_secstodate);