2 * Portions Copyright (C) 2004, 2005, 2008, 2009 Internet Systems Consortium, Inc. ("ISC")
3 * Portions Copyright (C) 1996-2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and/or distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
20 * The Regents of the University of California. All rights reserved.
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
25 * 1. Redistributions of source code must retain the above copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 4. Neither the name of the University nor the names of its contributors
31 * may be used to endorse or promote products derived from this software
32 * without specific prior written permission.
34 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
35 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
36 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
37 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
38 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
39 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
40 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
41 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
42 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
43 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
48 * Portions Copyright (c) 1993 by Digital Equipment Corporation.
50 * Permission to use, copy, modify, and distribute this software for any
51 * purpose with or without fee is hereby granted, provided that the above
52 * copyright notice and this permission notice appear in all copies, and that
53 * the name of Digital Equipment Corporation not be used in advertising or
54 * publicity pertaining to distribution of the document or software without
55 * specific, written prior permission.
57 * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
58 * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
59 * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT
60 * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
61 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
62 * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
63 * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
68 * Portions Copyright (c) 1995 by International Business Machines, Inc.
70 * International Business Machines, Inc. (hereinafter called IBM) grants
71 * permission under its copyrights to use, copy, modify, and distribute this
72 * Software with or without fee, provided that the above copyright notice and
73 * all paragraphs of this notice appear in all copies, and that the name of IBM
74 * not be used in connection with the marketing of any product incorporating
75 * the Software or modifications thereof, without specific, written prior
78 * To the extent it has a right to do so, IBM grants an immunity from suit
79 * under its patents, if any, for the use, sale or manufacture of products to
80 * the extent that such products are used for performing Domain Name System
81 * dynamic updates in TCP/IP networks by means of the Software. No immunity is
82 * granted for any product per se or for any other function of any product.
84 * THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES,
85 * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
86 * PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL,
87 * DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER ARISING
88 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE, EVEN
89 * IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES.
92 #if defined(LIBC_SCCS) && !defined(lint)
93 static const char sccsid[] = "@(#)res_debug.c 8.1 (Berkeley) 6/4/93";
94 static const char rcsid[] = "$Id: res_debug.c,v 1.19 2009/02/26 11:20:20 tbox Exp $";
95 #endif /* LIBC_SCCS and not lint */
96 #include <sys/cdefs.h>
97 __FBSDID("$FreeBSD$");
99 #include "port_before.h"
101 #include <sys/types.h>
102 #include <sys/param.h>
103 #include <sys/socket.h>
105 #include <netinet/in.h>
106 #include <arpa/inet.h>
107 #include <arpa/nameser.h>
114 #include <resolv_mt.h>
120 #include "port_after.h"
123 # define SPRINTF(x) strlen(sprintf/**/x)
125 # define SPRINTF(x) sprintf x
128 extern const char *_res_opcodes[];
129 extern const char *_res_sectioncodes[];
132 * Print the current options.
135 fp_resstat(const res_state statp, FILE *file) {
138 fprintf(file, ";; res options:");
139 for (mask = 1; mask != 0U; mask <<= 1)
140 if (statp->options & mask)
141 fprintf(file, " %s", p_option(mask));
146 do_section(const res_state statp,
147 ns_msg *handle, ns_sect section,
148 int pflag, FILE *file)
151 static int buflen = 2048;
157 * Print answer records.
159 sflag = (statp->pfcode & pflag);
160 if (statp->pfcode && !sflag)
163 buf = malloc(buflen);
165 fprintf(file, ";; memory allocation failure\n");
169 opcode = (ns_opcode) ns_msg_getflag(*handle, ns_f_opcode);
172 if (ns_parserr(handle, section, rrnum, &rr)) {
174 fprintf(file, ";; ns_parserr: %s\n",
176 else if (rrnum > 0 && sflag != 0 &&
177 (statp->pfcode & RES_PRF_HEAD1))
181 if (rrnum == 0 && sflag != 0 && (statp->pfcode & RES_PRF_HEAD1))
182 fprintf(file, ";; %s SECTION:\n",
183 p_section(section, opcode));
184 if (section == ns_s_qd)
185 fprintf(file, ";;\t%s, type = %s, class = %s\n",
187 p_type(ns_rr_type(rr)),
188 p_class(ns_rr_class(rr)));
189 else if (section == ns_s_ar && ns_rr_type(rr) == ns_t_opt) {
190 u_int16_t optcode, optlen, rdatalen = ns_rr_rdlen(rr);
191 u_int32_t ttl = ns_rr_ttl(rr);
194 "; EDNS: version: %u, udp=%u, flags=%04x\n",
195 (ttl>>16)&0xff, ns_rr_class(rr), ttl&0xffff);
197 while (rdatalen >= 4) {
198 const u_char *cp = ns_rr_rdata(rr);
201 GETSHORT(optcode, cp);
202 GETSHORT(optlen, cp);
204 if (optcode == NS_OPT_NSID) {
205 fputs("; NSID: ", file);
207 fputs("; NSID\n", file);
209 fputs("; NSID: ", file);
210 for (i = 0; i < optlen; i++)
211 fprintf(file, "%02x ",
214 for (i = 0; i < optlen; i++)
222 fprintf(file, "; OPT=%u\n",
225 fprintf(file, "; OPT=%u: ",
227 for (i = 0; i < optlen; i++)
228 fprintf(file, "%02x ",
231 for (i = 0; i < optlen; i++)
238 rdatalen -= 4 + optlen;
241 n = ns_sprintrr(handle, &rr, NULL, NULL,
244 if (errno == ENOSPC) {
248 buf = malloc(buflen += 1024);
251 ";; memory allocation failure\n");
256 fprintf(file, ";; ns_sprintrr: %s\n",
271 * Print the contents of a query.
272 * This is intended to be primarily a debugging routine.
275 res_pquery(const res_state statp, const u_char *msg, int len, FILE *file) {
277 int qdcount, ancount, nscount, arcount;
278 u_int opcode, rcode, id;
280 if (ns_initparse(msg, len, &handle) < 0) {
281 fprintf(file, ";; ns_initparse: %s\n", strerror(errno));
284 opcode = ns_msg_getflag(handle, ns_f_opcode);
285 rcode = ns_msg_getflag(handle, ns_f_rcode);
286 id = ns_msg_id(handle);
287 qdcount = ns_msg_count(handle, ns_s_qd);
288 ancount = ns_msg_count(handle, ns_s_an);
289 nscount = ns_msg_count(handle, ns_s_ns);
290 arcount = ns_msg_count(handle, ns_s_ar);
293 * Print header fields.
295 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEADX) || rcode)
297 ";; ->>HEADER<<- opcode: %s, status: %s, id: %d\n",
298 _res_opcodes[opcode], p_rcode(rcode), id);
299 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEADX))
301 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEAD2)) {
302 fprintf(file, "; flags:");
303 if (ns_msg_getflag(handle, ns_f_qr))
304 fprintf(file, " qr");
305 if (ns_msg_getflag(handle, ns_f_aa))
306 fprintf(file, " aa");
307 if (ns_msg_getflag(handle, ns_f_tc))
308 fprintf(file, " tc");
309 if (ns_msg_getflag(handle, ns_f_rd))
310 fprintf(file, " rd");
311 if (ns_msg_getflag(handle, ns_f_ra))
312 fprintf(file, " ra");
313 if (ns_msg_getflag(handle, ns_f_z))
314 fprintf(file, " ??");
315 if (ns_msg_getflag(handle, ns_f_ad))
316 fprintf(file, " ad");
317 if (ns_msg_getflag(handle, ns_f_cd))
318 fprintf(file, " cd");
320 if ((!statp->pfcode) || (statp->pfcode & RES_PRF_HEAD1)) {
321 fprintf(file, "; %s: %d",
322 p_section(ns_s_qd, opcode), qdcount);
323 fprintf(file, ", %s: %d",
324 p_section(ns_s_an, opcode), ancount);
325 fprintf(file, ", %s: %d",
326 p_section(ns_s_ns, opcode), nscount);
327 fprintf(file, ", %s: %d",
328 p_section(ns_s_ar, opcode), arcount);
330 if ((!statp->pfcode) || (statp->pfcode &
331 (RES_PRF_HEADX | RES_PRF_HEAD2 | RES_PRF_HEAD1))) {
335 * Print the various sections.
337 do_section(statp, &handle, ns_s_qd, RES_PRF_QUES, file);
338 do_section(statp, &handle, ns_s_an, RES_PRF_ANS, file);
339 do_section(statp, &handle, ns_s_ns, RES_PRF_AUTH, file);
340 do_section(statp, &handle, ns_s_ar, RES_PRF_ADD, file);
341 if (qdcount == 0 && ancount == 0 &&
342 nscount == 0 && arcount == 0)
347 p_cdnname(const u_char *cp, const u_char *msg, int len, FILE *file) {
351 if ((n = dn_expand(msg, msg + len, cp, name, sizeof name)) < 0)
361 p_cdname(const u_char *cp, const u_char *msg, FILE *file) {
362 return (p_cdnname(cp, msg, PACKETSZ, file));
366 * Return a fully-qualified domain name from a compressed name (with
370 p_fqnname(const u_char *cp, const u_char *msg, int msglen, char *name,
375 if ((n = dn_expand(msg, cp + msglen, cp, name, namelen)) < 0)
377 newlen = strlen(name);
378 if (newlen == 0 || name[newlen - 1] != '.') {
379 if (newlen + 1 >= namelen) /*%< Lack space for final dot */
382 strcpy(name + newlen, ".");
387 /* XXX: the rest of these functions need to become length-limited, too. */
390 p_fqname(const u_char *cp, const u_char *msg, FILE *file) {
394 n = p_fqnname(cp, msg, MAXCDNAME, name, sizeof name);
402 * Names of RR classes and qclasses. Classes and qclasses are the same, except
403 * that C_ANY is a qclass but not a class. (You can ask for records of class
404 * C_ANY, but you can't have any records of that class in the database.)
406 const struct res_sym __p_class_syms[] = {
407 {C_IN, "IN", (char *)0},
408 {C_CHAOS, "CH", (char *)0},
409 {C_CHAOS, "CHAOS", (char *)0},
410 {C_HS, "HS", (char *)0},
411 {C_HS, "HESIOD", (char *)0},
412 {C_ANY, "ANY", (char *)0},
413 {C_NONE, "NONE", (char *)0},
414 {C_IN, (char *)0, (char *)0}
418 * Names of message sections.
420 static const struct res_sym __p_default_section_syms[] = {
421 {ns_s_qd, "QUERY", (char *)0},
422 {ns_s_an, "ANSWER", (char *)0},
423 {ns_s_ns, "AUTHORITY", (char *)0},
424 {ns_s_ar, "ADDITIONAL", (char *)0},
425 {0, (char *)0, (char *)0}
428 static const struct res_sym __p_update_section_syms[] = {
429 {S_ZONE, "ZONE", (char *)0},
430 {S_PREREQ, "PREREQUISITE", (char *)0},
431 {S_UPDATE, "UPDATE", (char *)0},
432 {S_ADDT, "ADDITIONAL", (char *)0},
433 {0, (char *)0, (char *)0}
436 const struct res_sym __p_key_syms[] = {
437 {NS_ALG_MD5RSA, "RSA", "RSA KEY with MD5 hash"},
438 {NS_ALG_DH, "DH", "Diffie Hellman"},
439 {NS_ALG_DSA, "DSA", "Digital Signature Algorithm"},
440 {NS_ALG_EXPIRE_ONLY, "EXPIREONLY", "No algorithm"},
441 {NS_ALG_PRIVATE_OID, "PRIVATE", "Algorithm obtained from OID"},
445 const struct res_sym __p_cert_syms[] = {
446 {cert_t_pkix, "PKIX", "PKIX (X.509v3) Certificate"},
447 {cert_t_spki, "SPKI", "SPKI certificate"},
448 {cert_t_pgp, "PGP", "PGP certificate"},
449 {cert_t_url, "URL", "URL Private"},
450 {cert_t_oid, "OID", "OID Private"},
455 * Names of RR types and qtypes. Types and qtypes are the same, except
456 * that T_ANY is a qtype but not a type. (You can ask for records of type
457 * T_ANY, but you can't have any records of that type in the database.)
459 const struct res_sym __p_type_syms[] = {
460 {ns_t_a, "A", "address"},
461 {ns_t_ns, "NS", "name server"},
462 {ns_t_md, "MD", "mail destination (deprecated)"},
463 {ns_t_mf, "MF", "mail forwarder (deprecated)"},
464 {ns_t_cname, "CNAME", "canonical name"},
465 {ns_t_soa, "SOA", "start of authority"},
466 {ns_t_mb, "MB", "mailbox"},
467 {ns_t_mg, "MG", "mail group member"},
468 {ns_t_mr, "MR", "mail rename"},
469 {ns_t_null, "NULL", "null"},
470 {ns_t_wks, "WKS", "well-known service (deprecated)"},
471 {ns_t_ptr, "PTR", "domain name pointer"},
472 {ns_t_hinfo, "HINFO", "host information"},
473 {ns_t_minfo, "MINFO", "mailbox information"},
474 {ns_t_mx, "MX", "mail exchanger"},
475 {ns_t_txt, "TXT", "text"},
476 {ns_t_rp, "RP", "responsible person"},
477 {ns_t_afsdb, "AFSDB", "DCE or AFS server"},
478 {ns_t_x25, "X25", "X25 address"},
479 {ns_t_isdn, "ISDN", "ISDN address"},
480 {ns_t_rt, "RT", "router"},
481 {ns_t_nsap, "NSAP", "nsap address"},
482 {ns_t_nsap_ptr, "NSAP_PTR", "domain name pointer"},
483 {ns_t_sig, "SIG", "signature"},
484 {ns_t_key, "KEY", "key"},
485 {ns_t_px, "PX", "mapping information"},
486 {ns_t_gpos, "GPOS", "geographical position (withdrawn)"},
487 {ns_t_aaaa, "AAAA", "IPv6 address"},
488 {ns_t_loc, "LOC", "location"},
489 {ns_t_nxt, "NXT", "next valid name (unimplemented)"},
490 {ns_t_eid, "EID", "endpoint identifier (unimplemented)"},
491 {ns_t_nimloc, "NIMLOC", "NIMROD locator (unimplemented)"},
492 {ns_t_srv, "SRV", "server selection"},
493 {ns_t_atma, "ATMA", "ATM address (unimplemented)"},
494 {ns_t_naptr, "NAPTR", "naptr"},
495 {ns_t_kx, "KX", "key exchange"},
496 {ns_t_cert, "CERT", "certificate"},
497 {ns_t_a6, "A", "IPv6 address (experminental)"},
498 {ns_t_dname, "DNAME", "non-terminal redirection"},
499 {ns_t_opt, "OPT", "opt"},
500 {ns_t_apl, "apl", "apl"},
501 {ns_t_ds, "DS", "delegation signer"},
502 {ns_t_sshfp, "SSFP", "SSH fingerprint"},
503 {ns_t_ipseckey, "IPSECKEY", "IPSEC key"},
504 {ns_t_rrsig, "RRSIG", "rrsig"},
505 {ns_t_nsec, "NSEC", "nsec"},
506 {ns_t_dnskey, "DNSKEY", "DNS key"},
507 {ns_t_dhcid, "DHCID", "dynamic host configuration identifier"},
508 {ns_t_nsec3, "NSEC3", "nsec3"},
509 {ns_t_nsec3param, "NSEC3PARAM", "NSEC3 parameters"},
510 {ns_t_hip, "HIP", "host identity protocol"},
511 {ns_t_spf, "SPF", "sender policy framework"},
512 {ns_t_tkey, "TKEY", "tkey"},
513 {ns_t_tsig, "TSIG", "transaction signature"},
514 {ns_t_ixfr, "IXFR", "incremental zone transfer"},
515 {ns_t_axfr, "AXFR", "zone transfer"},
516 {ns_t_zxfr, "ZXFR", "compressed zone transfer"},
517 {ns_t_mailb, "MAILB", "mailbox-related data (deprecated)"},
518 {ns_t_maila, "MAILA", "mail agent (deprecated)"},
519 {ns_t_naptr, "NAPTR", "URN Naming Authority"},
520 {ns_t_kx, "KX", "Key Exchange"},
521 {ns_t_cert, "CERT", "Certificate"},
522 {ns_t_a6, "A6", "IPv6 Address"},
523 {ns_t_dname, "DNAME", "dname"},
524 {ns_t_sink, "SINK", "Kitchen Sink (experimental)"},
525 {ns_t_opt, "OPT", "EDNS Options"},
526 {ns_t_any, "ANY", "\"any\""},
527 {ns_t_dlv, "DLV", "DNSSEC look-aside validation"},
532 * Names of DNS rcodes.
534 const struct res_sym __p_rcode_syms[] = {
535 {ns_r_noerror, "NOERROR", "no error"},
536 {ns_r_formerr, "FORMERR", "format error"},
537 {ns_r_servfail, "SERVFAIL", "server failed"},
538 {ns_r_nxdomain, "NXDOMAIN", "no such domain name"},
539 {ns_r_notimpl, "NOTIMP", "not implemented"},
540 {ns_r_refused, "REFUSED", "refused"},
541 {ns_r_yxdomain, "YXDOMAIN", "domain name exists"},
542 {ns_r_yxrrset, "YXRRSET", "rrset exists"},
543 {ns_r_nxrrset, "NXRRSET", "rrset doesn't exist"},
544 {ns_r_notauth, "NOTAUTH", "not authoritative"},
545 {ns_r_notzone, "NOTZONE", "Not in zone"},
547 {ns_r_badsig, "BADSIG", "bad signature"},
548 {ns_r_badkey, "BADKEY", "bad key"},
549 {ns_r_badtime, "BADTIME", "bad time"},
554 sym_ston(const struct res_sym *syms, const char *name, int *success) {
555 for ((void)NULL; syms->name != 0; syms++) {
556 if (strcasecmp (name, syms->name) == 0) {
559 return (syms->number);
564 return (syms->number); /*%< The default value. */
568 sym_ntos(const struct res_sym *syms, int number, int *success) {
569 char *unname = sym_ntos_unname;
571 for ((void)NULL; syms->name != 0; syms++) {
572 if (number == syms->number) {
579 sprintf(unname, "%d", number); /*%< XXX nonreentrant */
586 sym_ntop(const struct res_sym *syms, int number, int *success) {
587 char *unname = sym_ntop_unname;
589 for ((void)NULL; syms->name != 0; syms++) {
590 if (number == syms->number) {
593 return (syms->humanname);
596 sprintf(unname, "%d", number); /*%< XXX nonreentrant */
603 * Return a string for the type.
609 static char typebuf[20];
611 result = sym_ntos(__p_type_syms, type, &success);
614 if (type < 0 || type > 0xffff)
616 sprintf(typebuf, "TYPE%d", type);
621 * Return a string for the type.
624 p_section(int section, int opcode) {
625 const struct res_sym *symbols;
629 symbols = __p_update_section_syms;
632 symbols = __p_default_section_syms;
635 return (sym_ntos(symbols, section, (int *)0));
639 * Return a mnemonic for class.
645 static char classbuf[20];
647 result = sym_ntos(__p_class_syms, class, &success);
650 if (class < 0 || class > 0xffff)
652 sprintf(classbuf, "CLASS%d", class);
657 * Return a mnemonic for an option
660 p_option(u_long option) {
661 char *nbuf = p_option_nbuf;
664 case RES_INIT: return "init";
665 case RES_DEBUG: return "debug";
666 case RES_AAONLY: return "aaonly(unimpl)";
667 case RES_USEVC: return "usevc";
668 case RES_PRIMARY: return "primry(unimpl)";
669 case RES_IGNTC: return "igntc";
670 case RES_RECURSE: return "recurs";
671 case RES_DEFNAMES: return "defnam";
672 case RES_STAYOPEN: return "styopn";
673 case RES_DNSRCH: return "dnsrch";
674 case RES_INSECURE1: return "insecure1";
675 case RES_INSECURE2: return "insecure2";
676 case RES_NOALIASES: return "noaliases";
677 case RES_USE_INET6: return "inet6";
678 #ifdef RES_USE_EDNS0 /*%< KAME extension */
679 case RES_USE_EDNS0: return "edns0";
680 case RES_NSID: return "nsid";
683 case RES_USE_DNAME: return "dname";
685 #ifdef RES_USE_DNSSEC
686 case RES_USE_DNSSEC: return "dnssec";
688 #ifdef RES_NOTLDQUERY
689 case RES_NOTLDQUERY: return "no-tld-query";
691 #ifdef RES_NO_NIBBLE2
692 case RES_NO_NIBBLE2: return "no-nibble2";
694 /* XXX nonreentrant */
695 default: sprintf(nbuf, "?0x%lx?", (u_long)option);
701 * Return a mnemonic for a time to live.
704 p_time(u_int32_t value) {
705 char *nbuf = p_time_nbuf;
707 if (ns_format_ttl(value, nbuf, sizeof nbuf) < 0)
708 sprintf(nbuf, "%u", value);
713 * Return a string for the rcode.
717 return (sym_ntos(__p_rcode_syms, rcode, (int *)0));
721 * Return a string for a res_sockaddr_union.
724 p_sockun(union res_sockaddr_union u, char *buf, size_t size) {
725 char ret[sizeof "ffff:ffff:ffff:ffff:ffff:ffff:123.123.123.123"];
727 switch (u.sin.sin_family) {
729 inet_ntop(AF_INET, &u.sin.sin_addr, ret, sizeof ret);
731 #ifdef HAS_INET6_STRUCTS
733 inet_ntop(AF_INET6, &u.sin6.sin6_addr, ret, sizeof ret);
737 sprintf(ret, "[af%d]", u.sin.sin_family);
741 strncpy(buf, ret, size - 1);
748 * routines to convert between on-the-wire RR format and zone file format.
749 * Does not contain conversion to/from decimal degrees; divide or multiply
750 * by 60*60*1000 for that.
753 static unsigned int poweroften[10] = {1, 10, 100, 1000, 10000, 100000,
754 1000000,10000000,100000000,1000000000};
756 /*% takes an XeY precision/size value, returns a string representation. */
758 precsize_ntoa(u_int8_t prec)
760 char *retbuf = precsize_ntoa_retbuf;
762 int mantissa, exponent;
764 mantissa = (int)((prec >> 4) & 0x0f) % 10;
765 exponent = (int)((prec >> 0) & 0x0f) % 10;
767 val = mantissa * poweroften[exponent];
769 (void) sprintf(retbuf, "%lu.%.2lu", val/100, val%100);
773 /*% converts ascii size/precision X * 10**Y(cm) to 0xXY. moves pointer. */
775 precsize_aton(const char **strptr) {
776 unsigned int mval = 0, cmval = 0;
784 while (isdigit((unsigned char)*cp))
785 mval = mval * 10 + (*cp++ - '0');
787 if (*cp == '.') { /*%< centimeters */
789 if (isdigit((unsigned char)*cp)) {
790 cmval = (*cp++ - '0') * 10;
791 if (isdigit((unsigned char)*cp)) {
792 cmval += (*cp++ - '0');
796 cmval = (mval * 100) + cmval;
798 for (exponent = 0; exponent < 9; exponent++)
799 if (cmval < poweroften[exponent+1])
802 mantissa = cmval / poweroften[exponent];
806 retval = (mantissa << 4) | exponent;
813 /*% converts ascii lat/lon to unsigned encoded 32-bit number. moves pointer. */
815 latlon2ul(const char **latlonstrptr, int *which) {
818 int deg = 0, min = 0, secs = 0, secsfrac = 0;
822 while (isdigit((unsigned char)*cp))
823 deg = deg * 10 + (*cp++ - '0');
825 while (isspace((unsigned char)*cp))
828 if (!(isdigit((unsigned char)*cp)))
831 while (isdigit((unsigned char)*cp))
832 min = min * 10 + (*cp++ - '0');
834 while (isspace((unsigned char)*cp))
837 if (!(isdigit((unsigned char)*cp)))
840 while (isdigit((unsigned char)*cp))
841 secs = secs * 10 + (*cp++ - '0');
843 if (*cp == '.') { /*%< decimal seconds */
845 if (isdigit((unsigned char)*cp)) {
846 secsfrac = (*cp++ - '0') * 100;
847 if (isdigit((unsigned char)*cp)) {
848 secsfrac += (*cp++ - '0') * 10;
849 if (isdigit((unsigned char)*cp)) {
850 secsfrac += (*cp++ - '0');
856 while (!isspace((unsigned char)*cp)) /*%< if any trailing garbage */
859 while (isspace((unsigned char)*cp))
866 retval = ((unsigned)1<<31)
867 + (((((deg * 60) + min) * 60) + secs) * 1000)
872 retval = ((unsigned)1<<31)
873 - (((((deg * 60) + min) * 60) + secs) * 1000)
877 retval = 0; /*%< invalid value -- indicates error */
884 *which = 1; /*%< latitude */
888 *which = 2; /*%< longitude */
891 *which = 0; /*%< error */
895 cp++; /*%< skip the hemisphere */
896 while (!isspace((unsigned char)*cp)) /*%< if any trailing garbage */
899 while (isspace((unsigned char)*cp)) /*%< move to next field */
908 * converts a zone file representation in a string to an RDATA on-the-wire
911 loc_aton(const char *ascii, u_char *binary)
913 const char *cp, *maxcp;
916 u_int32_t latit = 0, longit = 0, alt = 0;
917 u_int32_t lltemp1 = 0, lltemp2 = 0;
918 int altmeters = 0, altfrac = 0, altsign = 1;
919 u_int8_t hp = 0x16; /*%< default = 1e6 cm = 10000.00m = 10km */
920 u_int8_t vp = 0x13; /*%< default = 1e3 cm = 10.00m */
921 u_int8_t siz = 0x12; /*%< default = 1e2 cm = 1.00m */
922 int which1 = 0, which2 = 0;
925 maxcp = cp + strlen(ascii);
927 lltemp1 = latlon2ul(&cp, &which1);
929 lltemp2 = latlon2ul(&cp, &which2);
931 switch (which1 + which2) {
932 case 3: /*%< 1 + 2, the only valid combination */
933 if ((which1 == 1) && (which2 == 2)) { /*%< normal case */
936 } else if ((which1 == 2) && (which2 == 1)) { /*%< reversed */
939 } else { /*%< some kind of brokenness */
943 default: /*%< we didn't get one of each */
956 while (isdigit((unsigned char)*cp))
957 altmeters = altmeters * 10 + (*cp++ - '0');
959 if (*cp == '.') { /*%< decimal meters */
961 if (isdigit((unsigned char)*cp)) {
962 altfrac = (*cp++ - '0') * 10;
963 if (isdigit((unsigned char)*cp)) {
964 altfrac += (*cp++ - '0');
969 alt = (10000000 + (altsign * (altmeters * 100 + altfrac)));
971 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
974 while (isspace((unsigned char)*cp) && (cp < maxcp))
980 siz = precsize_aton(&cp);
982 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
985 while (isspace((unsigned char)*cp) && (cp < maxcp))
991 hp = precsize_aton(&cp);
993 while (!isspace((unsigned char)*cp) && (cp < maxcp)) /*%< if trailing garbage or m */
996 while (isspace((unsigned char)*cp) && (cp < maxcp))
1002 vp = precsize_aton(&cp);
1007 *bcp++ = (u_int8_t) 0; /*%< version byte */
1012 PUTLONG(longit,bcp);
1015 return (16); /*%< size of RR in octets */
1018 /*% takes an on-the-wire LOC RR and formats it in a human readable format. */
1020 loc_ntoa(const u_char *binary, char *ascii)
1022 static const char *error = "?";
1023 static char tmpbuf[sizeof
1024 "1000 60 60.000 N 1000 60 60.000 W -12345678.00m 90000000.00m 90000000.00m 90000000.00m"];
1025 const u_char *cp = binary;
1027 int latdeg, latmin, latsec, latsecfrac;
1028 int longdeg, longmin, longsec, longsecfrac;
1029 char northsouth, eastwest;
1030 const char *altsign;
1031 int altmeters, altfrac;
1033 const u_int32_t referencealt = 100000 * 100;
1035 int32_t latval, longval, altval;
1037 u_int8_t sizeval, hpval, vpval, versionval;
1039 char *sizestr, *hpstr, *vpstr;
1047 (void) sprintf(ascii, "; error: unknown LOC RR version");
1057 latval = (templ - ((unsigned)1<<31));
1060 longval = (templ - ((unsigned)1<<31));
1063 if (templ < referencealt) { /*%< below WGS 84 spheroid */
1064 altval = referencealt - templ;
1067 altval = templ - referencealt;
1077 latsecfrac = latval % 1000;
1078 latval = latval / 1000;
1079 latsec = latval % 60;
1080 latval = latval / 60;
1081 latmin = latval % 60;
1082 latval = latval / 60;
1091 longsecfrac = longval % 1000;
1092 longval = longval / 1000;
1093 longsec = longval % 60;
1094 longval = longval / 60;
1095 longmin = longval % 60;
1096 longval = longval / 60;
1099 altfrac = altval % 100;
1100 altmeters = (altval / 100);
1102 sizestr = strdup(precsize_ntoa(sizeval));
1103 hpstr = strdup(precsize_ntoa(hpval));
1104 vpstr = strdup(precsize_ntoa(vpval));
1107 "%d %.2d %.2d.%.3d %c %d %.2d %.2d.%.3d %c %s%d.%.2dm %sm %sm %sm",
1108 latdeg, latmin, latsec, latsecfrac, northsouth,
1109 longdeg, longmin, longsec, longsecfrac, eastwest,
1110 altsign, altmeters, altfrac,
1111 (sizestr != NULL) ? sizestr : error,
1112 (hpstr != NULL) ? hpstr : error,
1113 (vpstr != NULL) ? vpstr : error);
1115 if (sizestr != NULL)
1126 /*% Return the number of DNS hierarchy levels in the name. */
1128 dn_count_labels(const char *name) {
1132 for (i = 0, count = 0; i < len; i++) {
1133 /* XXX need to check for \. or use named's nlabels(). */
1138 /* don't count initial wildcard */
1143 /* don't count the null label for root. */
1144 /* if terminating '.' not found, must adjust */
1145 /* count to include last label */
1146 if (len > 0 && name[len-1] != '.')
1152 * Make dates expressed in seconds-since-Jan-1-1970 easy to read.
1153 * SIG records are required to be printed like this, by the Secure DNS RFC.
1156 p_secstodate (u_long secs) {
1157 char *output = p_secstodate_output;
1158 time_t clock = secs;
1163 time = gmtime_r(&clock, &res);
1165 time = gmtime(&clock);
1167 time->tm_year += 1900;
1169 sprintf(output, "%04d%02d%02d%02d%02d%02d",
1170 time->tm_year, time->tm_mon, time->tm_mday,
1171 time->tm_hour, time->tm_min, time->tm_sec);
1176 res_nametoclass(const char *buf, int *successp) {
1177 unsigned long result;
1181 result = sym_ston(__p_class_syms, buf, &success);
1185 if (strncasecmp(buf, "CLASS", 5) != 0 ||
1186 !isdigit((unsigned char)buf[5]))
1189 result = strtoul(buf + 5, &endptr, 10);
1190 if (errno == 0 && *endptr == '\0' && result <= 0xffffU)
1194 *successp = success;
1199 res_nametotype(const char *buf, int *successp) {
1200 unsigned long result;
1204 result = sym_ston(__p_type_syms, buf, &success);
1208 if (strncasecmp(buf, "type", 4) != 0 ||
1209 !isdigit((unsigned char)buf[4]))
1212 result = strtoul(buf + 4, &endptr, 10);
1213 if (errno == 0 && *endptr == '\0' && result <= 0xffffU)
1217 *successp = success;
1222 * Weak aliases for applications that use certain private entry points,
1223 * and fail to include <resolv.h>.
1226 __weak_reference(__fp_resstat, fp_resstat);
1228 __weak_reference(__p_fqnname, p_fqnname);
1230 __weak_reference(__sym_ston, sym_ston);
1232 __weak_reference(__sym_ntos, sym_ntos);
1234 __weak_reference(__sym_ntop, sym_ntop);
1235 #undef dn_count_labels
1236 __weak_reference(__dn_count_labels, dn_count_labels);
1238 __weak_reference(__p_secstodate, p_secstodate);