2 * Portions Copyright (C) 2004, 2005, 2008, 2009 Internet Systems Consortium, Inc. ("ISC")
3 * Portions Copyright (C) 1996-2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and/or distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
20 * The Regents of the University of California. All rights reserved.
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
25 * 1. Redistributions of source code must retain the above copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 3. Neither the name of the University nor the names of its contributors
31 * may be used to endorse or promote products derived from this software
32 * without specific prior written permission.
34 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
35 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
36 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
37 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
38 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
39 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
40 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
41 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
42 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
43 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
48 * Portions Copyright (c) 1993 by Digital Equipment Corporation.
50 * Permission to use, copy, modify, and distribute this software for any
51 * purpose with or without fee is hereby granted, provided that the above
52 * copyright notice and this permission notice appear in all copies, and that
53 * the name of Digital Equipment Corporation not be used in advertising or
54 * publicity pertaining to distribution of the document or software without
55 * specific, written prior permission.
57 * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
58 * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
59 * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT
60 * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
61 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
62 * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
63 * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
68 * Portions Copyright (c) 1995 by International Business Machines, Inc.
70 * International Business Machines, Inc. (hereinafter called IBM) grants
71 * permission under its copyrights to use, copy, modify, and distribute this
72 * Software with or without fee, provided that the above copyright notice and
73 * all paragraphs of this notice appear in all copies, and that the name of IBM
74 * not be used in connection with the marketing of any product incorporating
75 * the Software or modifications thereof, without specific, written prior
78 * To the extent it has a right to do so, IBM grants an immunity from suit
79 * under its patents, if any, for the use, sale or manufacture of products to
80 * the extent that such products are used for performing Domain Name System
81 * dynamic updates in TCP/IP networks by means of the Software. No immunity is
82 * granted for any product per se or for any other function of any product.
84 * THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES,
85 * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
86 * PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL,
87 * DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER ARISING
88 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE, EVEN
89 * IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES.
92 #if defined(LIBC_SCCS) && !defined(lint)
93 static const char sccsid[] = "@(#)res_debug.c 8.1 (Berkeley) 6/4/93";
94 static const char rcsid[] = "$Id: res_debug.c,v 1.19 2009/02/26 11:20:20 tbox Exp $";
95 #endif /* LIBC_SCCS and not lint */
96 #include <sys/cdefs.h>
97 __FBSDID("$FreeBSD$");
99 #include "port_before.h"
101 #include <sys/param.h>
102 #include <sys/socket.h>
104 #include <netinet/in.h>
105 #include <arpa/inet.h>
106 #include <arpa/nameser.h>
113 #include <resolv_mt.h>
119 #include "port_after.h"
122 # define SPRINTF(x) strlen(sprintf/**/x)
124 # define SPRINTF(x) sprintf x
127 extern const char *_res_opcodes[];
128 extern const char *_res_sectioncodes[];
131 * Print the current options.
134 fp_resstat(const res_state statp, FILE *file) {
137 fprintf(file, ";; res options:");
138 for (mask = 1; mask != 0U; mask <<= 1)
139 if (statp->options & mask)
140 fprintf(file, " %s", p_option(mask));
145 do_section(const res_state statp,
146 ns_msg *handle, ns_sect section,
147 int pflag, FILE *file)
150 static int buflen = 2048;
156 * Print answer records.
158 sflag = (statp->pfcode & pflag);
159 if (statp->pfcode && !sflag)
162 buf = malloc(buflen);
164 fprintf(file, ";; memory allocation failure\n");
168 opcode = (ns_opcode) ns_msg_getflag(*handle, ns_f_opcode);
171 if (ns_parserr(handle, section, rrnum, &rr)) {
173 fprintf(file, ";; ns_parserr: %s\n",
175 else if (rrnum > 0 && sflag != 0 &&
176 (statp->pfcode & RES_PRF_HEAD1))
180 if (rrnum == 0 && sflag != 0 && (statp->pfcode & RES_PRF_HEAD1))
181 fprintf(file, ";; %s SECTION:\n",
182 p_section(section, opcode));
183 if (section == ns_s_qd)
184 fprintf(file, ";;\t%s, type = %s, class = %s\n",
186 p_type(ns_rr_type(rr)),
187 p_class(ns_rr_class(rr)));
188 else if (section == ns_s_ar && ns_rr_type(rr) == ns_t_opt) {
189 u_int16_t optcode, optlen, rdatalen = ns_rr_rdlen(rr);
190 u_int32_t ttl = ns_rr_ttl(rr);
193 "; EDNS: version: %u, udp=%u, flags=%04x\n",
194 (ttl>>16)&0xff, ns_rr_class(rr), ttl&0xffff);
196 while (rdatalen >= 4) {
197 const u_char *cp = ns_rr_rdata(rr);
200 GETSHORT(optcode, cp);
201 GETSHORT(optlen, cp);
203 if (optcode == NS_OPT_NSID) {
204 fputs("; NSID: ", file);
206 fputs("; NSID\n", file);
208 fputs("; NSID: ", file);
209 for (i = 0; i < optlen; i++)
210 fprintf(file, "%02x ",
213 for (i = 0; i < optlen; i++)
221 fprintf(file, "; OPT=%u\n",
224 fprintf(file, "; OPT=%u: ",
226 for (i = 0; i < optlen; i++)
227 fprintf(file, "%02x ",
230 for (i = 0; i < optlen; i++)
237 rdatalen -= 4 + optlen;
240 n = ns_sprintrr(handle, &rr, NULL, NULL,
243 if (errno == ENOSPC) {
247 buf = malloc(buflen += 1024);
250 ";; memory allocation failure\n");
255 fprintf(file, ";; ns_sprintrr: %s\n",
270 * Print the contents of a query.
271 * This is intended to be primarily a debugging routine.
274 res_pquery(const res_state statp, const u_char *msg, int len, FILE *file) {
276 int qdcount, ancount, nscount, arcount;
277 u_int opcode, rcode, id;
279 if (ns_initparse(msg, len, &handle) < 0) {
280 fprintf(file, ";; ns_initparse: %s\n", strerror(errno));
283 opcode = ns_msg_getflag(handle, ns_f_opcode);
284 rcode = ns_msg_getflag(handle, ns_f_rcode);
285 id = ns_msg_id(handle);
286 qdcount = ns_msg_count(handle, ns_s_qd);
287 ancount = ns_msg_count(handle, ns_s_an);
288 nscount = ns_msg_count(handle, ns_s_ns);
289 arcount = ns_msg_count(handle, ns_s_ar);
292 * Print header fields.
294 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEADX) || rcode)
296 ";; ->>HEADER<<- opcode: %s, status: %s, id: %d\n",
297 _res_opcodes[opcode], p_rcode(rcode), id);
298 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEADX))
300 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEAD2)) {
301 fprintf(file, "; flags:");
302 if (ns_msg_getflag(handle, ns_f_qr))
303 fprintf(file, " qr");
304 if (ns_msg_getflag(handle, ns_f_aa))
305 fprintf(file, " aa");
306 if (ns_msg_getflag(handle, ns_f_tc))
307 fprintf(file, " tc");
308 if (ns_msg_getflag(handle, ns_f_rd))
309 fprintf(file, " rd");
310 if (ns_msg_getflag(handle, ns_f_ra))
311 fprintf(file, " ra");
312 if (ns_msg_getflag(handle, ns_f_z))
313 fprintf(file, " ??");
314 if (ns_msg_getflag(handle, ns_f_ad))
315 fprintf(file, " ad");
316 if (ns_msg_getflag(handle, ns_f_cd))
317 fprintf(file, " cd");
319 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEAD1)) {
320 fprintf(file, "; %s: %d",
321 p_section(ns_s_qd, opcode), qdcount);
322 fprintf(file, ", %s: %d",
323 p_section(ns_s_an, opcode), ancount);
324 fprintf(file, ", %s: %d",
325 p_section(ns_s_ns, opcode), nscount);
326 fprintf(file, ", %s: %d",
327 p_section(ns_s_ar, opcode), arcount);
329 if ((!statp->pfcode) || (statp->pfcode &
330 (RES_PRF_HEADX | RES_PRF_HEAD2 | RES_PRF_HEAD1))) {
334 * Print the various sections.
336 do_section(statp, &handle, ns_s_qd, RES_PRF_QUES, file);
337 do_section(statp, &handle, ns_s_an, RES_PRF_ANS, file);
338 do_section(statp, &handle, ns_s_ns, RES_PRF_AUTH, file);
339 do_section(statp, &handle, ns_s_ar, RES_PRF_ADD, file);
340 if (qdcount == 0 && ancount == 0 &&
341 nscount == 0 && arcount == 0)
346 p_cdnname(const u_char *cp, const u_char *msg, int len, FILE *file) {
350 if ((n = dn_expand(msg, msg + len, cp, name, sizeof name)) < 0)
360 p_cdname(const u_char *cp, const u_char *msg, FILE *file) {
361 return (p_cdnname(cp, msg, PACKETSZ, file));
365 * Return a fully-qualified domain name from a compressed name (with
369 p_fqnname(const u_char *cp, const u_char *msg, int msglen, char *name,
374 if ((n = dn_expand(msg, cp + msglen, cp, name, namelen)) < 0)
376 newlen = strlen(name);
377 if (newlen == 0 || name[newlen - 1] != '.') {
378 if (newlen + 1 >= namelen) /*%< Lack space for final dot */
381 strcpy(name + newlen, ".");
386 /* XXX: the rest of these functions need to become length-limited, too. */
389 p_fqname(const u_char *cp, const u_char *msg, FILE *file) {
393 n = p_fqnname(cp, msg, MAXCDNAME, name, sizeof name);
401 * Names of RR classes and qclasses. Classes and qclasses are the same, except
402 * that C_ANY is a qclass but not a class. (You can ask for records of class
403 * C_ANY, but you can't have any records of that class in the database.)
405 const struct res_sym __p_class_syms[] = {
406 {C_IN, "IN", (char *)0},
407 {C_CHAOS, "CH", (char *)0},
408 {C_CHAOS, "CHAOS", (char *)0},
409 {C_HS, "HS", (char *)0},
410 {C_HS, "HESIOD", (char *)0},
411 {C_ANY, "ANY", (char *)0},
412 {C_NONE, "NONE", (char *)0},
413 {C_IN, (char *)0, (char *)0}
417 * Names of message sections.
419 static const struct res_sym __p_default_section_syms[] = {
420 {ns_s_qd, "QUERY", (char *)0},
421 {ns_s_an, "ANSWER", (char *)0},
422 {ns_s_ns, "AUTHORITY", (char *)0},
423 {ns_s_ar, "ADDITIONAL", (char *)0},
424 {0, (char *)0, (char *)0}
427 static const struct res_sym __p_update_section_syms[] = {
428 {S_ZONE, "ZONE", (char *)0},
429 {S_PREREQ, "PREREQUISITE", (char *)0},
430 {S_UPDATE, "UPDATE", (char *)0},
431 {S_ADDT, "ADDITIONAL", (char *)0},
432 {0, (char *)0, (char *)0}
435 const struct res_sym __p_key_syms[] = {
436 {NS_ALG_MD5RSA, "RSA", "RSA KEY with MD5 hash"},
437 {NS_ALG_DH, "DH", "Diffie Hellman"},
438 {NS_ALG_DSA, "DSA", "Digital Signature Algorithm"},
439 {NS_ALG_EXPIRE_ONLY, "EXPIREONLY", "No algorithm"},
440 {NS_ALG_PRIVATE_OID, "PRIVATE", "Algorithm obtained from OID"},
444 const struct res_sym __p_cert_syms[] = {
445 {cert_t_pkix, "PKIX", "PKIX (X.509v3) Certificate"},
446 {cert_t_spki, "SPKI", "SPKI certificate"},
447 {cert_t_pgp, "PGP", "PGP certificate"},
448 {cert_t_url, "URL", "URL Private"},
449 {cert_t_oid, "OID", "OID Private"},
454 * Names of RR types and qtypes. Types and qtypes are the same, except
455 * that T_ANY is a qtype but not a type. (You can ask for records of type
456 * T_ANY, but you can't have any records of that type in the database.)
458 const struct res_sym __p_type_syms[] = {
459 {ns_t_a, "A", "address"},
460 {ns_t_ns, "NS", "name server"},
461 {ns_t_md, "MD", "mail destination (deprecated)"},
462 {ns_t_mf, "MF", "mail forwarder (deprecated)"},
463 {ns_t_cname, "CNAME", "canonical name"},
464 {ns_t_soa, "SOA", "start of authority"},
465 {ns_t_mb, "MB", "mailbox"},
466 {ns_t_mg, "MG", "mail group member"},
467 {ns_t_mr, "MR", "mail rename"},
468 {ns_t_null, "NULL", "null"},
469 {ns_t_wks, "WKS", "well-known service (deprecated)"},
470 {ns_t_ptr, "PTR", "domain name pointer"},
471 {ns_t_hinfo, "HINFO", "host information"},
472 {ns_t_minfo, "MINFO", "mailbox information"},
473 {ns_t_mx, "MX", "mail exchanger"},
474 {ns_t_txt, "TXT", "text"},
475 {ns_t_rp, "RP", "responsible person"},
476 {ns_t_afsdb, "AFSDB", "DCE or AFS server"},
477 {ns_t_x25, "X25", "X25 address"},
478 {ns_t_isdn, "ISDN", "ISDN address"},
479 {ns_t_rt, "RT", "router"},
480 {ns_t_nsap, "NSAP", "nsap address"},
481 {ns_t_nsap_ptr, "NSAP_PTR", "domain name pointer"},
482 {ns_t_sig, "SIG", "signature"},
483 {ns_t_key, "KEY", "key"},
484 {ns_t_px, "PX", "mapping information"},
485 {ns_t_gpos, "GPOS", "geographical position (withdrawn)"},
486 {ns_t_aaaa, "AAAA", "IPv6 address"},
487 {ns_t_loc, "LOC", "location"},
488 {ns_t_nxt, "NXT", "next valid name (unimplemented)"},
489 {ns_t_eid, "EID", "endpoint identifier (unimplemented)"},
490 {ns_t_nimloc, "NIMLOC", "NIMROD locator (unimplemented)"},
491 {ns_t_srv, "SRV", "server selection"},
492 {ns_t_atma, "ATMA", "ATM address (unimplemented)"},
493 {ns_t_naptr, "NAPTR", "naptr"},
494 {ns_t_kx, "KX", "key exchange"},
495 {ns_t_cert, "CERT", "certificate"},
496 {ns_t_a6, "A", "IPv6 address (experminental)"},
497 {ns_t_dname, "DNAME", "non-terminal redirection"},
498 {ns_t_opt, "OPT", "opt"},
499 {ns_t_apl, "apl", "apl"},
500 {ns_t_ds, "DS", "delegation signer"},
501 {ns_t_sshfp, "SSFP", "SSH fingerprint"},
502 {ns_t_ipseckey, "IPSECKEY", "IPSEC key"},
503 {ns_t_rrsig, "RRSIG", "rrsig"},
504 {ns_t_nsec, "NSEC", "nsec"},
505 {ns_t_dnskey, "DNSKEY", "DNS key"},
506 {ns_t_dhcid, "DHCID", "dynamic host configuration identifier"},
507 {ns_t_nsec3, "NSEC3", "nsec3"},
508 {ns_t_nsec3param, "NSEC3PARAM", "NSEC3 parameters"},
509 {ns_t_hip, "HIP", "host identity protocol"},
510 {ns_t_spf, "SPF", "sender policy framework"},
511 {ns_t_tkey, "TKEY", "tkey"},
512 {ns_t_tsig, "TSIG", "transaction signature"},
513 {ns_t_ixfr, "IXFR", "incremental zone transfer"},
514 {ns_t_axfr, "AXFR", "zone transfer"},
515 {ns_t_zxfr, "ZXFR", "compressed zone transfer"},
516 {ns_t_mailb, "MAILB", "mailbox-related data (deprecated)"},
517 {ns_t_maila, "MAILA", "mail agent (deprecated)"},
518 {ns_t_naptr, "NAPTR", "URN Naming Authority"},
519 {ns_t_kx, "KX", "Key Exchange"},
520 {ns_t_cert, "CERT", "Certificate"},
521 {ns_t_a6, "A6", "IPv6 Address"},
522 {ns_t_dname, "DNAME", "dname"},
523 {ns_t_sink, "SINK", "Kitchen Sink (experimental)"},
524 {ns_t_opt, "OPT", "EDNS Options"},
525 {ns_t_any, "ANY", "\"any\""},
526 {ns_t_dlv, "DLV", "DNSSEC look-aside validation"},
531 * Names of DNS rcodes.
533 const struct res_sym __p_rcode_syms[] = {
534 {ns_r_noerror, "NOERROR", "no error"},
535 {ns_r_formerr, "FORMERR", "format error"},
536 {ns_r_servfail, "SERVFAIL", "server failed"},
537 {ns_r_nxdomain, "NXDOMAIN", "no such domain name"},
538 {ns_r_notimpl, "NOTIMP", "not implemented"},
539 {ns_r_refused, "REFUSED", "refused"},
540 {ns_r_yxdomain, "YXDOMAIN", "domain name exists"},
541 {ns_r_yxrrset, "YXRRSET", "rrset exists"},
542 {ns_r_nxrrset, "NXRRSET", "rrset doesn't exist"},
543 {ns_r_notauth, "NOTAUTH", "not authoritative"},
544 {ns_r_notzone, "NOTZONE", "Not in zone"},
546 {ns_r_badsig, "BADSIG", "bad signature"},
547 {ns_r_badkey, "BADKEY", "bad key"},
548 {ns_r_badtime, "BADTIME", "bad time"},
553 sym_ston(const struct res_sym *syms, const char *name, int *success) {
554 for ((void)NULL; syms->name != 0; syms++) {
555 if (strcasecmp (name, syms->name) == 0) {
558 return (syms->number);
563 return (syms->number); /*%< The default value. */
567 sym_ntos(const struct res_sym *syms, int number, int *success) {
568 char *unname = sym_ntos_unname;
570 for ((void)NULL; syms->name != 0; syms++) {
571 if (number == syms->number) {
578 sprintf(unname, "%d", number); /*%< XXX nonreentrant */
585 sym_ntop(const struct res_sym *syms, int number, int *success) {
586 char *unname = sym_ntop_unname;
588 for ((void)NULL; syms->name != 0; syms++) {
589 if (number == syms->number) {
592 return (syms->humanname);
595 sprintf(unname, "%d", number); /*%< XXX nonreentrant */
602 * Return a string for the type.
608 static char typebuf[20];
610 result = sym_ntos(__p_type_syms, type, &success);
613 if (type < 0 || type > 0xffff)
615 sprintf(typebuf, "TYPE%d", type);
620 * Return a string for the type.
623 p_section(int section, int opcode) {
624 const struct res_sym *symbols;
628 symbols = __p_update_section_syms;
631 symbols = __p_default_section_syms;
634 return (sym_ntos(symbols, section, (int *)0));
638 * Return a mnemonic for class.
644 static char classbuf[20];
646 result = sym_ntos(__p_class_syms, class, &success);
649 if (class < 0 || class > 0xffff)
651 sprintf(classbuf, "CLASS%d", class);
656 * Return a mnemonic for an option
659 p_option(u_long option) {
660 char *nbuf = p_option_nbuf;
663 case RES_INIT: return "init";
664 case RES_DEBUG: return "debug";
665 case RES_AAONLY: return "aaonly(unimpl)";
666 case RES_USEVC: return "usevc";
667 case RES_PRIMARY: return "primry(unimpl)";
668 case RES_IGNTC: return "igntc";
669 case RES_RECURSE: return "recurs";
670 case RES_DEFNAMES: return "defnam";
671 case RES_STAYOPEN: return "styopn";
672 case RES_DNSRCH: return "dnsrch";
673 case RES_INSECURE1: return "insecure1";
674 case RES_INSECURE2: return "insecure2";
675 case RES_NOALIASES: return "noaliases";
676 case RES_USE_INET6: return "inet6";
677 #ifdef RES_USE_EDNS0 /*%< KAME extension */
678 case RES_USE_EDNS0: return "edns0";
679 case RES_NSID: return "nsid";
682 case RES_USE_DNAME: return "dname";
684 #ifdef RES_USE_DNSSEC
685 case RES_USE_DNSSEC: return "dnssec";
687 #ifdef RES_NOTLDQUERY
688 case RES_NOTLDQUERY: return "no-tld-query";
690 #ifdef RES_NO_NIBBLE2
691 case RES_NO_NIBBLE2: return "no-nibble2";
693 /* XXX nonreentrant */
694 default: sprintf(nbuf, "?0x%lx?", (u_long)option);
700 * Return a mnemonic for a time to live.
703 p_time(u_int32_t value) {
704 char *nbuf = p_time_nbuf;
706 if (ns_format_ttl(value, nbuf, sizeof nbuf) < 0)
707 sprintf(nbuf, "%u", value);
712 * Return a string for the rcode.
716 return (sym_ntos(__p_rcode_syms, rcode, (int *)0));
720 * Return a string for a res_sockaddr_union.
723 p_sockun(union res_sockaddr_union u, char *buf, size_t size) {
724 char ret[sizeof "ffff:ffff:ffff:ffff:ffff:ffff:123.123.123.123"];
726 switch (u.sin.sin_family) {
728 inet_ntop(AF_INET, &u.sin.sin_addr, ret, sizeof ret);
730 #ifdef HAS_INET6_STRUCTS
732 inet_ntop(AF_INET6, &u.sin6.sin6_addr, ret, sizeof ret);
736 sprintf(ret, "[af%d]", u.sin.sin_family);
740 strncpy(buf, ret, size - 1);
747 * routines to convert between on-the-wire RR format and zone file format.
748 * Does not contain conversion to/from decimal degrees; divide or multiply
749 * by 60*60*1000 for that.
752 static unsigned int poweroften[10] = {1, 10, 100, 1000, 10000, 100000,
753 1000000,10000000,100000000,1000000000};
755 /*% takes an XeY precision/size value, returns a string representation. */
757 precsize_ntoa(u_int8_t prec)
759 char *retbuf = precsize_ntoa_retbuf;
761 int mantissa, exponent;
763 mantissa = (int)((prec >> 4) & 0x0f) % 10;
764 exponent = (int)((prec >> 0) & 0x0f) % 10;
766 val = mantissa * poweroften[exponent];
768 (void) sprintf(retbuf, "%lu.%.2lu", val/100, val%100);
772 /*% converts ascii size/precision X * 10**Y(cm) to 0xXY. moves pointer. */
774 precsize_aton(const char **strptr) {
775 unsigned int mval = 0, cmval = 0;
783 while (isdigit((unsigned char)*cp))
784 mval = mval * 10 + (*cp++ - '0');
786 if (*cp == '.') { /*%< centimeters */
788 if (isdigit((unsigned char)*cp)) {
789 cmval = (*cp++ - '0') * 10;
790 if (isdigit((unsigned char)*cp)) {
791 cmval += (*cp++ - '0');
795 cmval = (mval * 100) + cmval;
797 for (exponent = 0; exponent < 9; exponent++)
798 if (cmval < poweroften[exponent+1])
801 mantissa = cmval / poweroften[exponent];
805 retval = (mantissa << 4) | exponent;
812 /*% converts ascii lat/lon to unsigned encoded 32-bit number. moves pointer. */
814 latlon2ul(const char **latlonstrptr, int *which) {
817 int deg = 0, min = 0, secs = 0, secsfrac = 0;
821 while (isdigit((unsigned char)*cp))
822 deg = deg * 10 + (*cp++ - '0');
824 while (isspace((unsigned char)*cp))
827 if (!(isdigit((unsigned char)*cp)))
830 while (isdigit((unsigned char)*cp))
831 min = min * 10 + (*cp++ - '0');
833 while (isspace((unsigned char)*cp))
836 if (!(isdigit((unsigned char)*cp)))
839 while (isdigit((unsigned char)*cp))
840 secs = secs * 10 + (*cp++ - '0');
842 if (*cp == '.') { /*%< decimal seconds */
844 if (isdigit((unsigned char)*cp)) {
845 secsfrac = (*cp++ - '0') * 100;
846 if (isdigit((unsigned char)*cp)) {
847 secsfrac += (*cp++ - '0') * 10;
848 if (isdigit((unsigned char)*cp)) {
849 secsfrac += (*cp++ - '0');
855 while (!isspace((unsigned char)*cp)) /*%< if any trailing garbage */
858 while (isspace((unsigned char)*cp))
865 retval = ((unsigned)1<<31)
866 + (((((deg * 60) + min) * 60) + secs) * 1000)
871 retval = ((unsigned)1<<31)
872 - (((((deg * 60) + min) * 60) + secs) * 1000)
876 retval = 0; /*%< invalid value -- indicates error */
883 *which = 1; /*%< latitude */
887 *which = 2; /*%< longitude */
890 *which = 0; /*%< error */
894 cp++; /*%< skip the hemisphere */
895 while (!isspace((unsigned char)*cp)) /*%< if any trailing garbage */
898 while (isspace((unsigned char)*cp)) /*%< move to next field */
907 * converts a zone file representation in a string to an RDATA on-the-wire
910 loc_aton(const char *ascii, u_char *binary)
912 const char *cp, *maxcp;
915 u_int32_t latit = 0, longit = 0, alt = 0;
916 u_int32_t lltemp1 = 0, lltemp2 = 0;
917 int altmeters = 0, altfrac = 0, altsign = 1;
918 u_int8_t hp = 0x16; /*%< default = 1e6 cm = 10000.00m = 10km */
919 u_int8_t vp = 0x13; /*%< default = 1e3 cm = 10.00m */
920 u_int8_t siz = 0x12; /*%< default = 1e2 cm = 1.00m */
921 int which1 = 0, which2 = 0;
924 maxcp = cp + strlen(ascii);
926 lltemp1 = latlon2ul(&cp, &which1);
928 lltemp2 = latlon2ul(&cp, &which2);
930 switch (which1 + which2) {
931 case 3: /*%< 1 + 2, the only valid combination */
932 if ((which1 == 1) && (which2 == 2)) { /*%< normal case */
935 } else if ((which1 == 2) && (which2 == 1)) { /*%< reversed */
938 } else { /*%< some kind of brokenness */
942 default: /*%< we didn't get one of each */
955 while (isdigit((unsigned char)*cp))
956 altmeters = altmeters * 10 + (*cp++ - '0');
958 if (*cp == '.') { /*%< decimal meters */
960 if (isdigit((unsigned char)*cp)) {
961 altfrac = (*cp++ - '0') * 10;
962 if (isdigit((unsigned char)*cp)) {
963 altfrac += (*cp++ - '0');
968 alt = (10000000 + (altsign * (altmeters * 100 + altfrac)));
970 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
973 while (isspace((unsigned char)*cp) && (cp < maxcp))
979 siz = precsize_aton(&cp);
981 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
984 while (isspace((unsigned char)*cp) && (cp < maxcp))
990 hp = precsize_aton(&cp);
992 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
995 while (isspace((unsigned char)*cp) && (cp < maxcp))
1001 vp = precsize_aton(&cp);
1006 *bcp++ = (u_int8_t) 0; /*%< version byte */
1011 PUTLONG(longit,bcp);
1014 return (16); /*%< size of RR in octets */
1017 /*% takes an on-the-wire LOC RR and formats it in a human readable format. */
1019 loc_ntoa(const u_char *binary, char *ascii)
1021 static const char *error = "?";
1022 static char tmpbuf[sizeof
1023 "1000 60 60.000 N 1000 60 60.000 W -12345678.00m 90000000.00m 90000000.00m 90000000.00m"];
1024 const u_char *cp = binary;
1026 int latdeg, latmin, latsec, latsecfrac;
1027 int longdeg, longmin, longsec, longsecfrac;
1028 char northsouth, eastwest;
1029 const char *altsign;
1030 int altmeters, altfrac;
1032 const u_int32_t referencealt = 100000 * 100;
1034 int32_t latval, longval, altval;
1036 u_int8_t sizeval, hpval, vpval, versionval;
1038 char *sizestr, *hpstr, *vpstr;
1046 (void) sprintf(ascii, "; error: unknown LOC RR version");
1056 latval = (templ - ((unsigned)1<<31));
1059 longval = (templ - ((unsigned)1<<31));
1062 if (templ < referencealt) { /*%< below WGS 84 spheroid */
1063 altval = referencealt - templ;
1066 altval = templ - referencealt;
1076 latsecfrac = latval % 1000;
1077 latval = latval / 1000;
1078 latsec = latval % 60;
1079 latval = latval / 60;
1080 latmin = latval % 60;
1081 latval = latval / 60;
1090 longsecfrac = longval % 1000;
1091 longval = longval / 1000;
1092 longsec = longval % 60;
1093 longval = longval / 60;
1094 longmin = longval % 60;
1095 longval = longval / 60;
1098 altfrac = altval % 100;
1099 altmeters = (altval / 100);
1101 sizestr = strdup(precsize_ntoa(sizeval));
1102 hpstr = strdup(precsize_ntoa(hpval));
1103 vpstr = strdup(precsize_ntoa(vpval));
1106 "%d %.2d %.2d.%.3d %c %d %.2d %.2d.%.3d %c %s%d.%.2dm %sm %sm %sm",
1107 latdeg, latmin, latsec, latsecfrac, northsouth,
1108 longdeg, longmin, longsec, longsecfrac, eastwest,
1109 altsign, altmeters, altfrac,
1110 (sizestr != NULL) ? sizestr : error,
1111 (hpstr != NULL) ? hpstr : error,
1112 (vpstr != NULL) ? vpstr : error);
1114 if (sizestr != NULL)
1125 /*% Return the number of DNS hierarchy levels in the name. */
1127 dn_count_labels(const char *name) {
1131 for (i = 0, count = 0; i < len; i++) {
1132 /* XXX need to check for \. or use named's nlabels(). */
1137 /* don't count initial wildcard */
1142 /* don't count the null label for root. */
1143 /* if terminating '.' not found, must adjust */
1144 /* count to include last label */
1145 if (len > 0 && name[len-1] != '.')
1151 * Make dates expressed in seconds-since-Jan-1-1970 easy to read.
1152 * SIG records are required to be printed like this, by the Secure DNS RFC.
1155 p_secstodate (u_long secs) {
1156 char *output = p_secstodate_output;
1157 time_t clock = secs;
1162 time = gmtime_r(&clock, &res);
1164 time = gmtime(&clock);
1166 time->tm_year += 1900;
1168 sprintf(output, "%04d%02d%02d%02d%02d%02d",
1169 time->tm_year, time->tm_mon, time->tm_mday,
1170 time->tm_hour, time->tm_min, time->tm_sec);
1175 res_nametoclass(const char *buf, int *successp) {
1176 unsigned long result;
1180 result = sym_ston(__p_class_syms, buf, &success);
1184 if (strncasecmp(buf, "CLASS", 5) != 0 ||
1185 !isdigit((unsigned char)buf[5]))
1188 result = strtoul(buf + 5, &endptr, 10);
1189 if (errno == 0 && *endptr == '\0' && result <= 0xffffU)
1193 *successp = success;
1198 res_nametotype(const char *buf, int *successp) {
1199 unsigned long result;
1203 result = sym_ston(__p_type_syms, buf, &success);
1207 if (strncasecmp(buf, "type", 4) != 0 ||
1208 !isdigit((unsigned char)buf[4]))
1211 result = strtoul(buf + 4, &endptr, 10);
1212 if (errno == 0 && *endptr == '\0' && result <= 0xffffU)
1216 *successp = success;
1221 * Weak aliases for applications that use certain private entry points,
1222 * and fail to include <resolv.h>.
1225 __weak_reference(__fp_resstat, fp_resstat);
1227 __weak_reference(__p_fqnname, p_fqnname);
1229 __weak_reference(__sym_ston, sym_ston);
1231 __weak_reference(__sym_ntos, sym_ntos);
1233 __weak_reference(__sym_ntop, sym_ntop);
1234 #undef dn_count_labels
1235 __weak_reference(__dn_count_labels, dn_count_labels);
1237 __weak_reference(__p_secstodate, p_secstodate);