2 * SPDX-License-Identifier: (ISC AND BSD-3-Clause)
4 * Portions Copyright (C) 2004, 2005, 2008, 2009 Internet Systems Consortium, Inc. ("ISC")
5 * Portions Copyright (C) 1996-2003 Internet Software Consortium.
7 * Permission to use, copy, modify, and/or distribute this software for any
8 * purpose with or without fee is hereby granted, provided that the above
9 * copyright notice and this permission notice appear in all copies.
11 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
12 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
13 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
14 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
15 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
16 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
17 * PERFORMANCE OF THIS SOFTWARE.
22 * The Regents of the University of California. All rights reserved.
24 * Redistribution and use in source and binary forms, with or without
25 * modification, are permitted provided that the following conditions
27 * 1. Redistributions of source code must retain the above copyright
28 * notice, this list of conditions and the following disclaimer.
29 * 2. Redistributions in binary form must reproduce the above copyright
30 * notice, this list of conditions and the following disclaimer in the
31 * documentation and/or other materials provided with the distribution.
32 * 3. Neither the name of the University nor the names of its contributors
33 * may be used to endorse or promote products derived from this software
34 * without specific prior written permission.
36 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
37 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
38 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
39 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
40 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
41 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
42 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
43 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
44 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
45 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50 * Portions Copyright (c) 1993 by Digital Equipment Corporation.
52 * Permission to use, copy, modify, and distribute this software for any
53 * purpose with or without fee is hereby granted, provided that the above
54 * copyright notice and this permission notice appear in all copies, and that
55 * the name of Digital Equipment Corporation not be used in advertising or
56 * publicity pertaining to distribution of the document or software without
57 * specific, written prior permission.
59 * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
60 * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
61 * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT
62 * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
63 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
64 * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
65 * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
70 * Portions Copyright (c) 1995 by International Business Machines, Inc.
72 * International Business Machines, Inc. (hereinafter called IBM) grants
73 * permission under its copyrights to use, copy, modify, and distribute this
74 * Software with or without fee, provided that the above copyright notice and
75 * all paragraphs of this notice appear in all copies, and that the name of IBM
76 * not be used in connection with the marketing of any product incorporating
77 * the Software or modifications thereof, without specific, written prior
80 * To the extent it has a right to do so, IBM grants an immunity from suit
81 * under its patents, if any, for the use, sale or manufacture of products to
82 * the extent that such products are used for performing Domain Name System
83 * dynamic updates in TCP/IP networks by means of the Software. No immunity is
84 * granted for any product per se or for any other function of any product.
86 * THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES,
87 * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
88 * PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL,
89 * DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER ARISING
90 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE, EVEN
91 * IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES.
94 #if defined(LIBC_SCCS) && !defined(lint)
95 static const char sccsid[] = "@(#)res_debug.c 8.1 (Berkeley) 6/4/93";
96 static const char rcsid[] = "$Id: res_debug.c,v 1.19 2009/02/26 11:20:20 tbox Exp $";
97 #endif /* LIBC_SCCS and not lint */
98 #include "port_before.h"
100 #include <sys/param.h>
101 #include <sys/socket.h>
103 #include <netinet/in.h>
104 #include <arpa/inet.h>
105 #include <arpa/nameser.h>
112 #include <resolv_mt.h>
118 #include "port_after.h"
121 # define SPRINTF(x) strlen(sprintf/**/x)
123 # define SPRINTF(x) sprintf x
126 extern const char *_res_opcodes[];
127 extern const char *_res_sectioncodes[];
130 * Print the current options.
133 fp_resstat(const res_state statp, FILE *file) {
136 fprintf(file, ";; res options:");
137 for (mask = 1; mask != 0U; mask <<= 1)
138 if (statp->options & mask)
139 fprintf(file, " %s", p_option(mask));
144 do_section(const res_state statp,
145 ns_msg *handle, ns_sect section,
146 int pflag, FILE *file)
149 static int buflen = 2048;
155 * Print answer records.
157 sflag = (statp->pfcode & pflag);
158 if (statp->pfcode && !sflag)
161 buf = malloc(buflen);
163 fprintf(file, ";; memory allocation failure\n");
167 opcode = (ns_opcode) ns_msg_getflag(*handle, ns_f_opcode);
170 if (ns_parserr(handle, section, rrnum, &rr)) {
172 fprintf(file, ";; ns_parserr: %s\n",
174 else if (rrnum > 0 && sflag != 0 &&
175 (statp->pfcode & RES_PRF_HEAD1))
179 if (rrnum == 0 && sflag != 0 && (statp->pfcode & RES_PRF_HEAD1))
180 fprintf(file, ";; %s SECTION:\n",
181 p_section(section, opcode));
182 if (section == ns_s_qd)
183 fprintf(file, ";;\t%s, type = %s, class = %s\n",
185 p_type(ns_rr_type(rr)),
186 p_class(ns_rr_class(rr)));
187 else if (section == ns_s_ar && ns_rr_type(rr) == ns_t_opt) {
188 u_int16_t optcode, optlen, rdatalen = ns_rr_rdlen(rr);
189 u_int32_t ttl = ns_rr_ttl(rr);
192 "; EDNS: version: %u, udp=%u, flags=%04x\n",
193 (ttl>>16)&0xff, ns_rr_class(rr), ttl&0xffff);
195 while (rdatalen >= 4) {
196 const u_char *cp = ns_rr_rdata(rr);
199 GETSHORT(optcode, cp);
200 GETSHORT(optlen, cp);
202 if (optcode == NS_OPT_NSID) {
203 fputs("; NSID: ", file);
205 fputs("; NSID\n", file);
207 fputs("; NSID: ", file);
208 for (i = 0; i < optlen; i++)
209 fprintf(file, "%02x ",
212 for (i = 0; i < optlen; i++)
220 fprintf(file, "; OPT=%u\n",
223 fprintf(file, "; OPT=%u: ",
225 for (i = 0; i < optlen; i++)
226 fprintf(file, "%02x ",
229 for (i = 0; i < optlen; i++)
236 rdatalen -= 4 + optlen;
239 n = ns_sprintrr(handle, &rr, NULL, NULL,
242 if (errno == ENOSPC) {
246 buf = malloc(buflen += 1024);
249 ";; memory allocation failure\n");
254 fprintf(file, ";; ns_sprintrr: %s\n",
269 * Print the contents of a query.
270 * This is intended to be primarily a debugging routine.
273 res_pquery(const res_state statp, const u_char *msg, int len, FILE *file) {
275 int qdcount, ancount, nscount, arcount;
276 u_int opcode, rcode, id;
278 if (ns_initparse(msg, len, &handle) < 0) {
279 fprintf(file, ";; ns_initparse: %s\n", strerror(errno));
282 opcode = ns_msg_getflag(handle, ns_f_opcode);
283 rcode = ns_msg_getflag(handle, ns_f_rcode);
284 id = ns_msg_id(handle);
285 qdcount = ns_msg_count(handle, ns_s_qd);
286 ancount = ns_msg_count(handle, ns_s_an);
287 nscount = ns_msg_count(handle, ns_s_ns);
288 arcount = ns_msg_count(handle, ns_s_ar);
291 * Print header fields.
293 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEADX) || rcode)
295 ";; ->>HEADER<<- opcode: %s, status: %s, id: %d\n",
296 _res_opcodes[opcode], p_rcode(rcode), id);
297 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEADX))
299 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEAD2)) {
300 fprintf(file, "; flags:");
301 if (ns_msg_getflag(handle, ns_f_qr))
302 fprintf(file, " qr");
303 if (ns_msg_getflag(handle, ns_f_aa))
304 fprintf(file, " aa");
305 if (ns_msg_getflag(handle, ns_f_tc))
306 fprintf(file, " tc");
307 if (ns_msg_getflag(handle, ns_f_rd))
308 fprintf(file, " rd");
309 if (ns_msg_getflag(handle, ns_f_ra))
310 fprintf(file, " ra");
311 if (ns_msg_getflag(handle, ns_f_z))
312 fprintf(file, " ??");
313 if (ns_msg_getflag(handle, ns_f_ad))
314 fprintf(file, " ad");
315 if (ns_msg_getflag(handle, ns_f_cd))
316 fprintf(file, " cd");
318 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEAD1)) {
319 fprintf(file, "; %s: %d",
320 p_section(ns_s_qd, opcode), qdcount);
321 fprintf(file, ", %s: %d",
322 p_section(ns_s_an, opcode), ancount);
323 fprintf(file, ", %s: %d",
324 p_section(ns_s_ns, opcode), nscount);
325 fprintf(file, ", %s: %d",
326 p_section(ns_s_ar, opcode), arcount);
328 if ((!statp->pfcode) || (statp->pfcode &
329 (RES_PRF_HEADX | RES_PRF_HEAD2 | RES_PRF_HEAD1))) {
333 * Print the various sections.
335 do_section(statp, &handle, ns_s_qd, RES_PRF_QUES, file);
336 do_section(statp, &handle, ns_s_an, RES_PRF_ANS, file);
337 do_section(statp, &handle, ns_s_ns, RES_PRF_AUTH, file);
338 do_section(statp, &handle, ns_s_ar, RES_PRF_ADD, file);
339 if (qdcount == 0 && ancount == 0 &&
340 nscount == 0 && arcount == 0)
345 p_cdnname(const u_char *cp, const u_char *msg, int len, FILE *file) {
349 if ((n = dn_expand(msg, msg + len, cp, name, sizeof name)) < 0)
359 p_cdname(const u_char *cp, const u_char *msg, FILE *file) {
360 return (p_cdnname(cp, msg, PACKETSZ, file));
364 * Return a fully-qualified domain name from a compressed name (with
368 p_fqnname(const u_char *cp, const u_char *msg, int msglen, char *name,
373 if ((n = dn_expand(msg, cp + msglen, cp, name, namelen)) < 0)
375 newlen = strlen(name);
376 if (newlen == 0 || name[newlen - 1] != '.') {
377 if (newlen + 1 >= namelen) /*%< Lack space for final dot */
380 strcpy(name + newlen, ".");
385 /* XXX: the rest of these functions need to become length-limited, too. */
388 p_fqname(const u_char *cp, const u_char *msg, FILE *file) {
392 n = p_fqnname(cp, msg, MAXCDNAME, name, sizeof name);
400 * Names of RR classes and qclasses. Classes and qclasses are the same, except
401 * that C_ANY is a qclass but not a class. (You can ask for records of class
402 * C_ANY, but you can't have any records of that class in the database.)
404 const struct res_sym __p_class_syms[] = {
405 {C_IN, "IN", (char *)0},
406 {C_CHAOS, "CH", (char *)0},
407 {C_CHAOS, "CHAOS", (char *)0},
408 {C_HS, "HS", (char *)0},
409 {C_HS, "HESIOD", (char *)0},
410 {C_ANY, "ANY", (char *)0},
411 {C_NONE, "NONE", (char *)0},
412 {C_IN, (char *)0, (char *)0}
416 * Names of message sections.
418 static const struct res_sym __p_default_section_syms[] = {
419 {ns_s_qd, "QUERY", (char *)0},
420 {ns_s_an, "ANSWER", (char *)0},
421 {ns_s_ns, "AUTHORITY", (char *)0},
422 {ns_s_ar, "ADDITIONAL", (char *)0},
423 {0, (char *)0, (char *)0}
426 static const struct res_sym __p_update_section_syms[] = {
427 {S_ZONE, "ZONE", (char *)0},
428 {S_PREREQ, "PREREQUISITE", (char *)0},
429 {S_UPDATE, "UPDATE", (char *)0},
430 {S_ADDT, "ADDITIONAL", (char *)0},
431 {0, (char *)0, (char *)0}
434 const struct res_sym __p_key_syms[] = {
435 {NS_ALG_MD5RSA, "RSA", "RSA KEY with MD5 hash"},
436 {NS_ALG_DH, "DH", "Diffie Hellman"},
437 {NS_ALG_DSA, "DSA", "Digital Signature Algorithm"},
438 {NS_ALG_EXPIRE_ONLY, "EXPIREONLY", "No algorithm"},
439 {NS_ALG_PRIVATE_OID, "PRIVATE", "Algorithm obtained from OID"},
443 const struct res_sym __p_cert_syms[] = {
444 {cert_t_pkix, "PKIX", "PKIX (X.509v3) Certificate"},
445 {cert_t_spki, "SPKI", "SPKI certificate"},
446 {cert_t_pgp, "PGP", "PGP certificate"},
447 {cert_t_url, "URL", "URL Private"},
448 {cert_t_oid, "OID", "OID Private"},
453 * Names of RR types and qtypes. Types and qtypes are the same, except
454 * that T_ANY is a qtype but not a type. (You can ask for records of type
455 * T_ANY, but you can't have any records of that type in the database.)
457 const struct res_sym __p_type_syms[] = {
458 {ns_t_a, "A", "address"},
459 {ns_t_ns, "NS", "name server"},
460 {ns_t_md, "MD", "mail destination (deprecated)"},
461 {ns_t_mf, "MF", "mail forwarder (deprecated)"},
462 {ns_t_cname, "CNAME", "canonical name"},
463 {ns_t_soa, "SOA", "start of authority"},
464 {ns_t_mb, "MB", "mailbox"},
465 {ns_t_mg, "MG", "mail group member"},
466 {ns_t_mr, "MR", "mail rename"},
467 {ns_t_null, "NULL", "null"},
468 {ns_t_wks, "WKS", "well-known service (deprecated)"},
469 {ns_t_ptr, "PTR", "domain name pointer"},
470 {ns_t_hinfo, "HINFO", "host information"},
471 {ns_t_minfo, "MINFO", "mailbox information"},
472 {ns_t_mx, "MX", "mail exchanger"},
473 {ns_t_txt, "TXT", "text"},
474 {ns_t_rp, "RP", "responsible person"},
475 {ns_t_afsdb, "AFSDB", "DCE or AFS server"},
476 {ns_t_x25, "X25", "X25 address"},
477 {ns_t_isdn, "ISDN", "ISDN address"},
478 {ns_t_rt, "RT", "router"},
479 {ns_t_nsap, "NSAP", "nsap address"},
480 {ns_t_nsap_ptr, "NSAP_PTR", "domain name pointer"},
481 {ns_t_sig, "SIG", "signature"},
482 {ns_t_key, "KEY", "key"},
483 {ns_t_px, "PX", "mapping information"},
484 {ns_t_gpos, "GPOS", "geographical position (withdrawn)"},
485 {ns_t_aaaa, "AAAA", "IPv6 address"},
486 {ns_t_loc, "LOC", "location"},
487 {ns_t_nxt, "NXT", "next valid name (unimplemented)"},
488 {ns_t_eid, "EID", "endpoint identifier (unimplemented)"},
489 {ns_t_nimloc, "NIMLOC", "NIMROD locator (unimplemented)"},
490 {ns_t_srv, "SRV", "server selection"},
491 {ns_t_atma, "ATMA", "ATM address (unimplemented)"},
492 {ns_t_naptr, "NAPTR", "naptr"},
493 {ns_t_kx, "KX", "key exchange"},
494 {ns_t_cert, "CERT", "certificate"},
495 {ns_t_a6, "A", "IPv6 address (experminental)"},
496 {ns_t_dname, "DNAME", "non-terminal redirection"},
497 {ns_t_opt, "OPT", "opt"},
498 {ns_t_apl, "apl", "apl"},
499 {ns_t_ds, "DS", "delegation signer"},
500 {ns_t_sshfp, "SSFP", "SSH fingerprint"},
501 {ns_t_ipseckey, "IPSECKEY", "IPSEC key"},
502 {ns_t_rrsig, "RRSIG", "rrsig"},
503 {ns_t_nsec, "NSEC", "nsec"},
504 {ns_t_dnskey, "DNSKEY", "DNS key"},
505 {ns_t_dhcid, "DHCID", "dynamic host configuration identifier"},
506 {ns_t_nsec3, "NSEC3", "nsec3"},
507 {ns_t_nsec3param, "NSEC3PARAM", "NSEC3 parameters"},
508 {ns_t_hip, "HIP", "host identity protocol"},
509 {ns_t_spf, "SPF", "sender policy framework"},
510 {ns_t_tkey, "TKEY", "tkey"},
511 {ns_t_tsig, "TSIG", "transaction signature"},
512 {ns_t_ixfr, "IXFR", "incremental zone transfer"},
513 {ns_t_axfr, "AXFR", "zone transfer"},
514 {ns_t_zxfr, "ZXFR", "compressed zone transfer"},
515 {ns_t_mailb, "MAILB", "mailbox-related data (deprecated)"},
516 {ns_t_maila, "MAILA", "mail agent (deprecated)"},
517 {ns_t_naptr, "NAPTR", "URN Naming Authority"},
518 {ns_t_kx, "KX", "Key Exchange"},
519 {ns_t_cert, "CERT", "Certificate"},
520 {ns_t_a6, "A6", "IPv6 Address"},
521 {ns_t_dname, "DNAME", "dname"},
522 {ns_t_sink, "SINK", "Kitchen Sink (experimental)"},
523 {ns_t_opt, "OPT", "EDNS Options"},
524 {ns_t_any, "ANY", "\"any\""},
525 {ns_t_dlv, "DLV", "DNSSEC look-aside validation"},
530 * Names of DNS rcodes.
532 const struct res_sym __p_rcode_syms[] = {
533 {ns_r_noerror, "NOERROR", "no error"},
534 {ns_r_formerr, "FORMERR", "format error"},
535 {ns_r_servfail, "SERVFAIL", "server failed"},
536 {ns_r_nxdomain, "NXDOMAIN", "no such domain name"},
537 {ns_r_notimpl, "NOTIMP", "not implemented"},
538 {ns_r_refused, "REFUSED", "refused"},
539 {ns_r_yxdomain, "YXDOMAIN", "domain name exists"},
540 {ns_r_yxrrset, "YXRRSET", "rrset exists"},
541 {ns_r_nxrrset, "NXRRSET", "rrset doesn't exist"},
542 {ns_r_notauth, "NOTAUTH", "not authoritative"},
543 {ns_r_notzone, "NOTZONE", "Not in zone"},
545 {ns_r_badsig, "BADSIG", "bad signature"},
546 {ns_r_badkey, "BADKEY", "bad key"},
547 {ns_r_badtime, "BADTIME", "bad time"},
552 sym_ston(const struct res_sym *syms, const char *name, int *success) {
553 for ((void)NULL; syms->name != 0; syms++) {
554 if (strcasecmp (name, syms->name) == 0) {
557 return (syms->number);
562 return (syms->number); /*%< The default value. */
566 sym_ntos(const struct res_sym *syms, int number, int *success) {
567 char *unname = sym_ntos_unname;
569 for ((void)NULL; syms->name != 0; syms++) {
570 if (number == syms->number) {
577 sprintf(unname, "%d", number); /*%< XXX nonreentrant */
584 sym_ntop(const struct res_sym *syms, int number, int *success) {
585 char *unname = sym_ntop_unname;
587 for ((void)NULL; syms->name != 0; syms++) {
588 if (number == syms->number) {
591 return (syms->humanname);
594 sprintf(unname, "%d", number); /*%< XXX nonreentrant */
601 * Return a string for the type.
607 static char typebuf[20];
609 result = sym_ntos(__p_type_syms, type, &success);
612 if (type < 0 || type > 0xffff)
614 sprintf(typebuf, "TYPE%d", type);
619 * Return a string for the type.
622 p_section(int section, int opcode) {
623 const struct res_sym *symbols;
627 symbols = __p_update_section_syms;
630 symbols = __p_default_section_syms;
633 return (sym_ntos(symbols, section, (int *)0));
637 * Return a mnemonic for class.
643 static char classbuf[20];
645 result = sym_ntos(__p_class_syms, class, &success);
648 if (class < 0 || class > 0xffff)
650 sprintf(classbuf, "CLASS%d", class);
655 * Return a mnemonic for an option
658 p_option(u_long option) {
659 char *nbuf = p_option_nbuf;
662 case RES_INIT: return "init";
663 case RES_DEBUG: return "debug";
664 case RES_AAONLY: return "aaonly(unimpl)";
665 case RES_USEVC: return "usevc";
666 case RES_PRIMARY: return "primry(unimpl)";
667 case RES_IGNTC: return "igntc";
668 case RES_RECURSE: return "recurs";
669 case RES_DEFNAMES: return "defnam";
670 case RES_STAYOPEN: return "styopn";
671 case RES_DNSRCH: return "dnsrch";
672 case RES_INSECURE1: return "insecure1";
673 case RES_INSECURE2: return "insecure2";
674 case RES_NOALIASES: return "noaliases";
675 case RES_USE_INET6: return "inet6";
676 #ifdef RES_USE_EDNS0 /*%< KAME extension */
677 case RES_USE_EDNS0: return "edns0";
678 case RES_NSID: return "nsid";
681 case RES_USE_DNAME: return "dname";
683 #ifdef RES_USE_DNSSEC
684 case RES_USE_DNSSEC: return "dnssec";
686 #ifdef RES_NOTLDQUERY
687 case RES_NOTLDQUERY: return "no-tld-query";
689 #ifdef RES_NO_NIBBLE2
690 case RES_NO_NIBBLE2: return "no-nibble2";
692 /* XXX nonreentrant */
693 default: sprintf(nbuf, "?0x%lx?", (u_long)option);
699 * Return a mnemonic for a time to live.
702 p_time(u_int32_t value) {
703 char *nbuf = p_time_nbuf;
705 if (ns_format_ttl(value, nbuf, sizeof nbuf) < 0)
706 sprintf(nbuf, "%u", value);
711 * Return a string for the rcode.
715 return (sym_ntos(__p_rcode_syms, rcode, (int *)0));
719 * Return a string for a res_sockaddr_union.
722 p_sockun(union res_sockaddr_union u, char *buf, size_t size) {
723 char ret[sizeof "ffff:ffff:ffff:ffff:ffff:ffff:123.123.123.123"];
725 switch (u.sin.sin_family) {
727 inet_ntop(AF_INET, &u.sin.sin_addr, ret, sizeof ret);
729 #ifdef HAS_INET6_STRUCTS
731 inet_ntop(AF_INET6, &u.sin6.sin6_addr, ret, sizeof ret);
735 sprintf(ret, "[af%d]", u.sin.sin_family);
739 strncpy(buf, ret, size - 1);
746 * routines to convert between on-the-wire RR format and zone file format.
747 * Does not contain conversion to/from decimal degrees; divide or multiply
748 * by 60*60*1000 for that.
751 static unsigned int poweroften[10] = {1, 10, 100, 1000, 10000, 100000,
752 1000000,10000000,100000000,1000000000};
754 /*% takes an XeY precision/size value, returns a string representation. */
756 precsize_ntoa(u_int8_t prec)
758 char *retbuf = precsize_ntoa_retbuf;
760 int mantissa, exponent;
762 mantissa = (int)((prec >> 4) & 0x0f) % 10;
763 exponent = (int)((prec >> 0) & 0x0f) % 10;
765 val = mantissa * poweroften[exponent];
767 (void) sprintf(retbuf, "%lu.%.2lu", val/100, val%100);
771 /*% converts ascii size/precision X * 10**Y(cm) to 0xXY. moves pointer. */
773 precsize_aton(const char **strptr) {
774 unsigned int mval = 0, cmval = 0;
782 while (isdigit((unsigned char)*cp))
783 mval = mval * 10 + (*cp++ - '0');
785 if (*cp == '.') { /*%< centimeters */
787 if (isdigit((unsigned char)*cp)) {
788 cmval = (*cp++ - '0') * 10;
789 if (isdigit((unsigned char)*cp)) {
790 cmval += (*cp++ - '0');
794 cmval = (mval * 100) + cmval;
796 for (exponent = 0; exponent < 9; exponent++)
797 if (cmval < poweroften[exponent+1])
800 mantissa = cmval / poweroften[exponent];
804 retval = (mantissa << 4) | exponent;
811 /*% converts ascii lat/lon to unsigned encoded 32-bit number. moves pointer. */
813 latlon2ul(const char **latlonstrptr, int *which) {
816 int deg = 0, min = 0, secs = 0, secsfrac = 0;
820 while (isdigit((unsigned char)*cp))
821 deg = deg * 10 + (*cp++ - '0');
823 while (isspace((unsigned char)*cp))
826 if (!(isdigit((unsigned char)*cp)))
829 while (isdigit((unsigned char)*cp))
830 min = min * 10 + (*cp++ - '0');
832 while (isspace((unsigned char)*cp))
835 if (!(isdigit((unsigned char)*cp)))
838 while (isdigit((unsigned char)*cp))
839 secs = secs * 10 + (*cp++ - '0');
841 if (*cp == '.') { /*%< decimal seconds */
843 if (isdigit((unsigned char)*cp)) {
844 secsfrac = (*cp++ - '0') * 100;
845 if (isdigit((unsigned char)*cp)) {
846 secsfrac += (*cp++ - '0') * 10;
847 if (isdigit((unsigned char)*cp)) {
848 secsfrac += (*cp++ - '0');
854 while (!isspace((unsigned char)*cp)) /*%< if any trailing garbage */
857 while (isspace((unsigned char)*cp))
864 retval = ((unsigned)1<<31)
865 + (((((deg * 60) + min) * 60) + secs) * 1000)
870 retval = ((unsigned)1<<31)
871 - (((((deg * 60) + min) * 60) + secs) * 1000)
875 retval = 0; /*%< invalid value -- indicates error */
882 *which = 1; /*%< latitude */
886 *which = 2; /*%< longitude */
889 *which = 0; /*%< error */
893 cp++; /*%< skip the hemisphere */
894 while (!isspace((unsigned char)*cp)) /*%< if any trailing garbage */
897 while (isspace((unsigned char)*cp)) /*%< move to next field */
906 * converts a zone file representation in a string to an RDATA on-the-wire
909 loc_aton(const char *ascii, u_char *binary)
911 const char *cp, *maxcp;
914 u_int32_t latit = 0, longit = 0, alt = 0;
915 u_int32_t lltemp1 = 0, lltemp2 = 0;
916 int altmeters = 0, altfrac = 0, altsign = 1;
917 u_int8_t hp = 0x16; /*%< default = 1e6 cm = 10000.00m = 10km */
918 u_int8_t vp = 0x13; /*%< default = 1e3 cm = 10.00m */
919 u_int8_t siz = 0x12; /*%< default = 1e2 cm = 1.00m */
920 int which1 = 0, which2 = 0;
923 maxcp = cp + strlen(ascii);
925 lltemp1 = latlon2ul(&cp, &which1);
927 lltemp2 = latlon2ul(&cp, &which2);
929 switch (which1 + which2) {
930 case 3: /*%< 1 + 2, the only valid combination */
931 if ((which1 == 1) && (which2 == 2)) { /*%< normal case */
934 } else if ((which1 == 2) && (which2 == 1)) { /*%< reversed */
937 } else { /*%< some kind of brokenness */
941 default: /*%< we didn't get one of each */
954 while (isdigit((unsigned char)*cp))
955 altmeters = altmeters * 10 + (*cp++ - '0');
957 if (*cp == '.') { /*%< decimal meters */
959 if (isdigit((unsigned char)*cp)) {
960 altfrac = (*cp++ - '0') * 10;
961 if (isdigit((unsigned char)*cp)) {
962 altfrac += (*cp++ - '0');
967 alt = (10000000 + (altsign * (altmeters * 100 + altfrac)));
969 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
972 while (isspace((unsigned char)*cp) && (cp < maxcp))
978 siz = precsize_aton(&cp);
980 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
983 while (isspace((unsigned char)*cp) && (cp < maxcp))
989 hp = precsize_aton(&cp);
991 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
994 while (isspace((unsigned char)*cp) && (cp < maxcp))
1000 vp = precsize_aton(&cp);
1005 *bcp++ = (u_int8_t) 0; /*%< version byte */
1010 PUTLONG(longit,bcp);
1013 return (16); /*%< size of RR in octets */
1016 /*% takes an on-the-wire LOC RR and formats it in a human readable format. */
1018 loc_ntoa(const u_char *binary, char *ascii)
1020 static const char *error = "?";
1021 static char tmpbuf[sizeof
1022 "1000 60 60.000 N 1000 60 60.000 W -12345678.00m 90000000.00m 90000000.00m 90000000.00m"];
1023 const u_char *cp = binary;
1025 int latdeg, latmin, latsec, latsecfrac;
1026 int longdeg, longmin, longsec, longsecfrac;
1027 char northsouth, eastwest;
1028 const char *altsign;
1029 int altmeters, altfrac;
1031 const u_int32_t referencealt = 100000 * 100;
1033 int32_t latval, longval, altval;
1035 u_int8_t sizeval, hpval, vpval, versionval;
1037 char *sizestr, *hpstr, *vpstr;
1045 (void) sprintf(ascii, "; error: unknown LOC RR version");
1055 latval = (templ - ((unsigned)1<<31));
1058 longval = (templ - ((unsigned)1<<31));
1061 if (templ < referencealt) { /*%< below WGS 84 spheroid */
1062 altval = referencealt - templ;
1065 altval = templ - referencealt;
1075 latsecfrac = latval % 1000;
1076 latval = latval / 1000;
1077 latsec = latval % 60;
1078 latval = latval / 60;
1079 latmin = latval % 60;
1080 latval = latval / 60;
1089 longsecfrac = longval % 1000;
1090 longval = longval / 1000;
1091 longsec = longval % 60;
1092 longval = longval / 60;
1093 longmin = longval % 60;
1094 longval = longval / 60;
1097 altfrac = altval % 100;
1098 altmeters = (altval / 100);
1100 sizestr = strdup(precsize_ntoa(sizeval));
1101 hpstr = strdup(precsize_ntoa(hpval));
1102 vpstr = strdup(precsize_ntoa(vpval));
1105 "%d %.2d %.2d.%.3d %c %d %.2d %.2d.%.3d %c %s%d.%.2dm %sm %sm %sm",
1106 latdeg, latmin, latsec, latsecfrac, northsouth,
1107 longdeg, longmin, longsec, longsecfrac, eastwest,
1108 altsign, altmeters, altfrac,
1109 (sizestr != NULL) ? sizestr : error,
1110 (hpstr != NULL) ? hpstr : error,
1111 (vpstr != NULL) ? vpstr : error);
1113 if (sizestr != NULL)
1124 /*% Return the number of DNS hierarchy levels in the name. */
1126 dn_count_labels(const char *name) {
1130 for (i = 0, count = 0; i < len; i++) {
1131 /* XXX need to check for \. or use named's nlabels(). */
1136 /* don't count initial wildcard */
1141 /* don't count the null label for root. */
1142 /* if terminating '.' not found, must adjust */
1143 /* count to include last label */
1144 if (len > 0 && name[len-1] != '.')
1150 * Make dates expressed in seconds-since-Jan-1-1970 easy to read.
1151 * SIG records are required to be printed like this, by the Secure DNS RFC.
1154 p_secstodate (u_long secs) {
1155 char *output = p_secstodate_output;
1156 time_t clock = secs;
1161 time = gmtime_r(&clock, &res);
1163 time = gmtime(&clock);
1165 time->tm_year += 1900;
1167 sprintf(output, "%04d%02d%02d%02d%02d%02d",
1168 time->tm_year, time->tm_mon, time->tm_mday,
1169 time->tm_hour, time->tm_min, time->tm_sec);
1174 res_nametoclass(const char *buf, int *successp) {
1175 unsigned long result;
1179 result = sym_ston(__p_class_syms, buf, &success);
1183 if (strncasecmp(buf, "CLASS", 5) != 0 ||
1184 !isdigit((unsigned char)buf[5]))
1187 result = strtoul(buf + 5, &endptr, 10);
1188 if (errno == 0 && *endptr == '\0' && result <= 0xffffU)
1192 *successp = success;
1197 res_nametotype(const char *buf, int *successp) {
1198 unsigned long result;
1202 result = sym_ston(__p_type_syms, buf, &success);
1206 if (strncasecmp(buf, "type", 4) != 0 ||
1207 !isdigit((unsigned char)buf[4]))
1210 result = strtoul(buf + 4, &endptr, 10);
1211 if (errno == 0 && *endptr == '\0' && result <= 0xffffU)
1215 *successp = success;
1220 * Weak aliases for applications that use certain private entry points,
1221 * and fail to include <resolv.h>.
1224 __weak_reference(__fp_resstat, fp_resstat);
1226 __weak_reference(__p_fqnname, p_fqnname);
1228 __weak_reference(__sym_ston, sym_ston);
1230 __weak_reference(__sym_ntos, sym_ntos);
1232 __weak_reference(__sym_ntop, sym_ntop);
1233 #undef dn_count_labels
1234 __weak_reference(__dn_count_labels, dn_count_labels);
1236 __weak_reference(__p_secstodate, p_secstodate);