cfd8c45725
At -00, the compiler warns about sprintf(3), and it is promoted to an error by -Werror. Change-Id: Ibb380d27d7eb09dda8ac785be2478d656b379190
1259 lines
31 KiB
C
1259 lines
31 KiB
C
/* $NetBSD: ns_print.c,v 1.11 2012/03/13 21:13:39 christos Exp $ */
|
|
|
|
/*
|
|
* Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")
|
|
* Copyright (c) 1996-1999 by Internet Software Consortium.
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
|
|
* OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
|
|
#include <sys/cdefs.h>
|
|
#ifndef lint
|
|
#ifdef notdef
|
|
static const char rcsid[] = "Id: ns_print.c,v 1.12 2009/03/03 05:29:58 each Exp";
|
|
#else
|
|
__RCSID("$NetBSD: ns_print.c,v 1.11 2012/03/13 21:13:39 christos Exp $");
|
|
#endif
|
|
#endif
|
|
|
|
/* Import. */
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
#include <arpa/nameser.h>
|
|
#include <arpa/inet.h>
|
|
|
|
#include <isc/assertions.h>
|
|
#include <isc/dst.h>
|
|
#include <assert.h>
|
|
#include <errno.h>
|
|
#ifdef ANDROID_CHANGES
|
|
#include "resolv_private.h"
|
|
#else
|
|
#include <resolv.h>
|
|
#endif
|
|
#include <stddef.h>
|
|
#include <string.h>
|
|
#include <ctype.h>
|
|
|
|
#ifndef MIN
|
|
#define MIN(x,y) ((x)<(y)?(x):(y))
|
|
#endif
|
|
|
|
/* Forward. */
|
|
|
|
static size_t prune_origin(const char *name, const char *origin);
|
|
static int charstr(const u_char *rdata, const u_char *edata,
|
|
char **buf, size_t *buflen);
|
|
static int addname(const u_char *msg, size_t msglen,
|
|
const u_char **p, const char *origin,
|
|
char **buf, size_t *buflen);
|
|
static void addlen(size_t len, char **buf, size_t *buflen);
|
|
static int addstr(const char *src, size_t len,
|
|
char **buf, size_t *buflen);
|
|
static int addtab(size_t len, size_t target, int spaced,
|
|
char **buf, size_t *buflen);
|
|
|
|
/* Macros. */
|
|
|
|
#define T(x) \
|
|
do { \
|
|
if ((x) < 0) \
|
|
return (-1); \
|
|
} while (/*CONSTCOND*/0)
|
|
|
|
static const char base32hex[] =
|
|
"0123456789ABCDEFGHIJKLMNOPQRSTUV=0123456789abcdefghijklmnopqrstuv";
|
|
/* Public. */
|
|
|
|
/*
|
|
* Convert an RR to presentation format.
|
|
*
|
|
* return:
|
|
* Number of characters written to buf, or -1 (check errno).
|
|
*/
|
|
int
|
|
ns_sprintrr(const ns_msg *handle, const ns_rr *rr,
|
|
const char *name_ctx, const char *origin,
|
|
char *buf, size_t buflen)
|
|
{
|
|
int n;
|
|
|
|
n = ns_sprintrrf(ns_msg_base(*handle), ns_msg_size(*handle),
|
|
ns_rr_name(*rr), ns_rr_class(*rr), ns_rr_type(*rr),
|
|
ns_rr_ttl(*rr), ns_rr_rdata(*rr), ns_rr_rdlen(*rr),
|
|
name_ctx, origin, buf, buflen);
|
|
return (n);
|
|
}
|
|
|
|
/*
|
|
* Convert the fields of an RR into presentation format.
|
|
*
|
|
* return:
|
|
* Number of characters written to buf, or -1 (check errno).
|
|
*/
|
|
int
|
|
ns_sprintrrf(const u_char *msg, size_t msglen,
|
|
const char *name, ns_class class, ns_type type,
|
|
u_long ttl, const u_char *rdata, size_t rdlen,
|
|
const char *name_ctx, const char *origin,
|
|
char *buf, size_t buflen)
|
|
{
|
|
const char *obuf = buf;
|
|
const u_char *edata = rdata + rdlen;
|
|
int spaced = 0;
|
|
|
|
const char *comment;
|
|
char tmp[100];
|
|
int len, x;
|
|
|
|
/*
|
|
* Owner.
|
|
*/
|
|
if (name_ctx != NULL && ns_samename(name_ctx, name) == 1) {
|
|
T(addstr("\t\t\t", (size_t)3, &buf, &buflen));
|
|
} else {
|
|
len = (int)prune_origin(name, origin);
|
|
if (*name == '\0') {
|
|
goto root;
|
|
} else if (len == 0) {
|
|
T(addstr("@\t\t\t", (size_t)4, &buf, &buflen));
|
|
} else {
|
|
T(addstr(name, (size_t)len, &buf, &buflen));
|
|
/* Origin not used or not root, and no trailing dot? */
|
|
if (((origin == NULL || origin[0] == '\0') ||
|
|
(origin[0] != '.' && origin[1] != '\0' &&
|
|
name[len] == '\0')) && name[len - 1] != '.') {
|
|
root:
|
|
T(addstr(".", (size_t)1, &buf, &buflen));
|
|
len++;
|
|
}
|
|
T(spaced = addtab((size_t)len, 24, spaced, &buf, &buflen));
|
|
}
|
|
}
|
|
|
|
/*
|
|
* TTL, Class, Type.
|
|
*/
|
|
T(x = ns_format_ttl(ttl, buf, buflen));
|
|
addlen((size_t)x, &buf, &buflen);
|
|
len = snprintf(tmp, sizeof(tmp), " %s %s", p_class(class), p_type(type));
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
T(spaced = addtab((size_t)(x + len), (size_t)16, spaced, &buf, &buflen));
|
|
|
|
/*
|
|
* RData.
|
|
*/
|
|
switch (type) {
|
|
case ns_t_a:
|
|
if (rdlen != (size_t)NS_INADDRSZ)
|
|
goto formerr;
|
|
(void) inet_ntop(AF_INET, rdata, buf, (socklen_t)buflen);
|
|
addlen(strlen(buf), &buf, &buflen);
|
|
break;
|
|
|
|
case ns_t_cname:
|
|
case ns_t_mb:
|
|
case ns_t_mg:
|
|
case ns_t_mr:
|
|
case ns_t_ns:
|
|
case ns_t_ptr:
|
|
case ns_t_dname:
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
break;
|
|
|
|
case ns_t_hinfo:
|
|
case ns_t_isdn:
|
|
/* First word. */
|
|
T(len = charstr(rdata, edata, &buf, &buflen));
|
|
if (len == 0)
|
|
goto formerr;
|
|
rdata += len;
|
|
T(addstr(" ", (size_t)1, &buf, &buflen));
|
|
|
|
|
|
/* Second word, optional in ISDN records. */
|
|
if (type == ns_t_isdn && rdata == edata)
|
|
break;
|
|
|
|
T(len = charstr(rdata, edata, &buf, &buflen));
|
|
if (len == 0)
|
|
goto formerr;
|
|
rdata += len;
|
|
break;
|
|
|
|
case ns_t_soa: {
|
|
u_long t;
|
|
|
|
/* Server name. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
T(addstr(" ", (size_t)1, &buf, &buflen));
|
|
|
|
/* Administrator name. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
T(addstr(" (\n", (size_t)3, &buf, &buflen));
|
|
spaced = 0;
|
|
|
|
if ((edata - rdata) != 5*NS_INT32SZ)
|
|
goto formerr;
|
|
|
|
/* Serial number. */
|
|
t = ns_get32(rdata); rdata += NS_INT32SZ;
|
|
T(addstr("\t\t\t\t\t", (size_t)5, &buf, &buflen));
|
|
len = snprintf(tmp, sizeof(tmp), "%lu", t);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
T(spaced = addtab((size_t)len, (size_t)16, spaced, &buf, &buflen));
|
|
T(addstr("; serial\n", (size_t)9, &buf, &buflen));
|
|
spaced = 0;
|
|
|
|
/* Refresh interval. */
|
|
t = ns_get32(rdata); rdata += NS_INT32SZ;
|
|
T(addstr("\t\t\t\t\t", (size_t)5, &buf, &buflen));
|
|
T(len = ns_format_ttl(t, buf, buflen));
|
|
addlen((size_t)len, &buf, &buflen);
|
|
T(spaced = addtab((size_t)len, (size_t)16, spaced, &buf, &buflen));
|
|
T(addstr("; refresh\n", (size_t)10, &buf, &buflen));
|
|
spaced = 0;
|
|
|
|
/* Retry interval. */
|
|
t = ns_get32(rdata); rdata += NS_INT32SZ;
|
|
T(addstr("\t\t\t\t\t", (size_t)5, &buf, &buflen));
|
|
T(len = ns_format_ttl(t, buf, buflen));
|
|
addlen((size_t)len, &buf, &buflen);
|
|
T(spaced = addtab((size_t)len, (size_t)16, spaced, &buf, &buflen));
|
|
T(addstr("; retry\n", (size_t)8, &buf, &buflen));
|
|
spaced = 0;
|
|
|
|
/* Expiry. */
|
|
t = ns_get32(rdata); rdata += NS_INT32SZ;
|
|
T(addstr("\t\t\t\t\t", (size_t)5, &buf, &buflen));
|
|
T(len = ns_format_ttl(t, buf, buflen));
|
|
addlen((size_t)len, &buf, &buflen);
|
|
T(spaced = addtab((size_t)len, (size_t)16, spaced, &buf, &buflen));
|
|
T(addstr("; expiry\n", (size_t)9, &buf, &buflen));
|
|
spaced = 0;
|
|
|
|
/* Minimum TTL. */
|
|
t = ns_get32(rdata); rdata += NS_INT32SZ;
|
|
T(addstr("\t\t\t\t\t", (size_t)5, &buf, &buflen));
|
|
T(len = ns_format_ttl(t, buf, buflen));
|
|
addlen((size_t)len, &buf, &buflen);
|
|
T(addstr(" )", (size_t)2, &buf, &buflen));
|
|
T(spaced = addtab((size_t)len, (size_t)16, spaced, &buf, &buflen));
|
|
T(addstr("; minimum\n", (size_t)10, &buf, &buflen));
|
|
|
|
break;
|
|
}
|
|
|
|
case ns_t_mx:
|
|
case ns_t_afsdb:
|
|
case ns_t_rt:
|
|
case ns_t_kx: {
|
|
u_int t;
|
|
|
|
if (rdlen < (size_t)NS_INT16SZ)
|
|
goto formerr;
|
|
|
|
/* Priority. */
|
|
t = ns_get16(rdata);
|
|
rdata += NS_INT16SZ;
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", t);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
|
|
/* Target. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
|
|
break;
|
|
}
|
|
|
|
case ns_t_px: {
|
|
u_int t;
|
|
|
|
if (rdlen < (size_t)NS_INT16SZ)
|
|
goto formerr;
|
|
|
|
/* Priority. */
|
|
t = ns_get16(rdata);
|
|
rdata += NS_INT16SZ;
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", t);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
|
|
/* Name1. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
T(addstr(" ", (size_t)1, &buf, &buflen));
|
|
|
|
/* Name2. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
|
|
break;
|
|
}
|
|
|
|
case ns_t_x25:
|
|
T(len = charstr(rdata, edata, &buf, &buflen));
|
|
if (len == 0)
|
|
goto formerr;
|
|
rdata += len;
|
|
break;
|
|
|
|
case ns_t_txt:
|
|
case ns_t_spf:
|
|
while (rdata < edata) {
|
|
T(len = charstr(rdata, edata, &buf, &buflen));
|
|
if (len == 0)
|
|
goto formerr;
|
|
rdata += len;
|
|
if (rdata < edata)
|
|
T(addstr(" ", (size_t)1, &buf, &buflen));
|
|
}
|
|
break;
|
|
|
|
case ns_t_nsap: {
|
|
char t[2+255*3];
|
|
|
|
(void) inet_nsap_ntoa((int)rdlen, rdata, t);
|
|
T(addstr(t, strlen(t), &buf, &buflen));
|
|
break;
|
|
}
|
|
|
|
case ns_t_aaaa:
|
|
if (rdlen != (size_t)NS_IN6ADDRSZ)
|
|
goto formerr;
|
|
(void) inet_ntop(AF_INET6, rdata, buf, (socklen_t)buflen);
|
|
addlen(strlen(buf), &buf, &buflen);
|
|
break;
|
|
|
|
case ns_t_loc: {
|
|
char t[255];
|
|
|
|
/* XXX protocol format checking? */
|
|
(void) loc_ntoa(rdata, t, sizeof(t));
|
|
T(addstr(t, strlen(t), &buf, &buflen));
|
|
break;
|
|
}
|
|
|
|
case ns_t_naptr: {
|
|
u_int order, preference;
|
|
char t[50];
|
|
|
|
if (rdlen < 2U*NS_INT16SZ)
|
|
goto formerr;
|
|
|
|
/* Order, Precedence. */
|
|
order = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
preference = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
len = snprintf(t, sizeof(t), "%u %u ", order, preference);
|
|
T(addstr(t, (size_t)len, &buf, &buflen));
|
|
|
|
/* Flags. */
|
|
T(len = charstr(rdata, edata, &buf, &buflen));
|
|
if (len == 0)
|
|
goto formerr;
|
|
rdata += len;
|
|
T(addstr(" ", (size_t)1, &buf, &buflen));
|
|
|
|
/* Service. */
|
|
T(len = charstr(rdata, edata, &buf, &buflen));
|
|
if (len == 0)
|
|
goto formerr;
|
|
rdata += len;
|
|
T(addstr(" ", (size_t)1, &buf, &buflen));
|
|
|
|
/* Regexp. */
|
|
T(len = charstr(rdata, edata, &buf, &buflen));
|
|
if (len < 0)
|
|
return (-1);
|
|
if (len == 0)
|
|
goto formerr;
|
|
rdata += len;
|
|
T(addstr(" ", (size_t)1, &buf, &buflen));
|
|
|
|
/* Server. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
break;
|
|
}
|
|
|
|
case ns_t_srv: {
|
|
u_int priority, weight, port;
|
|
char t[50];
|
|
|
|
if (rdlen < 3U*NS_INT16SZ)
|
|
goto formerr;
|
|
|
|
/* Priority, Weight, Port. */
|
|
priority = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
weight = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
port = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
len = snprintf(t, sizeof(t), "%u %u %u ", priority, weight, port);
|
|
T(addstr(t, (size_t)len, &buf, &buflen));
|
|
|
|
/* Server. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
break;
|
|
}
|
|
|
|
case ns_t_minfo:
|
|
case ns_t_rp:
|
|
/* Name1. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
T(addstr(" ", (size_t)1, &buf, &buflen));
|
|
|
|
/* Name2. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
|
|
break;
|
|
|
|
case ns_t_wks: {
|
|
int n, lcnt;
|
|
|
|
if (rdlen < 1U + NS_INT32SZ)
|
|
goto formerr;
|
|
|
|
/* Address. */
|
|
(void) inet_ntop(AF_INET, rdata, buf, (socklen_t)buflen);
|
|
addlen(strlen(buf), &buf, &buflen);
|
|
rdata += NS_INADDRSZ;
|
|
|
|
/* Protocol. */
|
|
len = snprintf(tmp, sizeof(tmp), " %u ( ", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
rdata += NS_INT8SZ;
|
|
|
|
/* Bit map. */
|
|
n = 0;
|
|
lcnt = 0;
|
|
while (rdata < edata) {
|
|
u_int c = *rdata++;
|
|
do {
|
|
if (c & 0200) {
|
|
if (lcnt == 0) {
|
|
T(addstr("\n\t\t\t\t", (size_t)5,
|
|
&buf, &buflen));
|
|
lcnt = 10;
|
|
spaced = 0;
|
|
}
|
|
len = snprintf(tmp, sizeof(tmp), "%d ", n);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
lcnt--;
|
|
}
|
|
c <<= 1;
|
|
} while (++n & 07);
|
|
}
|
|
T(addstr(")", (size_t)1, &buf, &buflen));
|
|
|
|
break;
|
|
}
|
|
|
|
case ns_t_key:
|
|
case ns_t_dnskey: {
|
|
char base64_key[NS_MD5RSA_MAX_BASE64];
|
|
u_int keyflags, protocol, algorithm, key_id;
|
|
const char *leader;
|
|
int n;
|
|
|
|
if (rdlen < 0U + NS_INT16SZ + NS_INT8SZ + NS_INT8SZ)
|
|
goto formerr;
|
|
|
|
/* Key flags, Protocol, Algorithm. */
|
|
#ifndef _LIBC
|
|
key_id = dst_s_dns_key_id(rdata, edata-rdata);
|
|
#else
|
|
key_id = 0;
|
|
#endif
|
|
keyflags = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
protocol = *rdata++;
|
|
algorithm = *rdata++;
|
|
len = snprintf(tmp, sizeof(tmp), "0x%04x %u %u",
|
|
keyflags, protocol, algorithm);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
|
|
/* Public key data. */
|
|
len = b64_ntop(rdata, (size_t)(edata - rdata),
|
|
base64_key, sizeof base64_key);
|
|
if (len < 0)
|
|
goto formerr;
|
|
if (len > 15) {
|
|
T(addstr(" (", (size_t)2, &buf, &buflen));
|
|
leader = "\n\t\t";
|
|
spaced = 0;
|
|
} else
|
|
leader = " ";
|
|
for (n = 0; n < len; n += 48) {
|
|
T(addstr(leader, strlen(leader), &buf, &buflen));
|
|
T(addstr(base64_key + n, (size_t)MIN(len - n, 48),
|
|
&buf, &buflen));
|
|
}
|
|
if (len > 15)
|
|
T(addstr(" )", (size_t)2, &buf, &buflen));
|
|
n = snprintf(tmp, sizeof(tmp), " ; key_tag= %u", key_id);
|
|
T(addstr(tmp, (size_t)n, &buf, &buflen));
|
|
|
|
break;
|
|
}
|
|
|
|
case ns_t_sig:
|
|
case ns_t_rrsig: {
|
|
char base64_key[NS_MD5RSA_MAX_BASE64];
|
|
u_int typ, algorithm, labels, footprint;
|
|
const char *leader;
|
|
u_long t;
|
|
int n;
|
|
|
|
if (rdlen < 22U)
|
|
goto formerr;
|
|
|
|
/* Type covered, Algorithm, Label count, Original TTL. */
|
|
typ = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
algorithm = *rdata++;
|
|
labels = *rdata++;
|
|
t = ns_get32(rdata); rdata += NS_INT32SZ;
|
|
len = snprintf(tmp, sizeof(tmp), "%s %d %d %lu ",
|
|
p_type((int)typ), algorithm, labels, t);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
if (labels > (u_int)dn_count_labels(name))
|
|
goto formerr;
|
|
|
|
/* Signature expiry. */
|
|
t = ns_get32(rdata); rdata += NS_INT32SZ;
|
|
len = snprintf(tmp, sizeof(tmp), "%s ", p_secstodate(t));
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
|
|
/* Time signed. */
|
|
t = ns_get32(rdata); rdata += NS_INT32SZ;
|
|
len = snprintf(tmp, sizeof(tmp), "%s ", p_secstodate(t));
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
|
|
/* Signature Footprint. */
|
|
footprint = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", footprint);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
|
|
/* Signer's name. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
|
|
/* Signature. */
|
|
len = b64_ntop(rdata, (size_t)(edata - rdata),
|
|
base64_key, sizeof base64_key);
|
|
if (len > 15) {
|
|
T(addstr(" (", (size_t)2, &buf, &buflen));
|
|
leader = "\n\t\t";
|
|
spaced = 0;
|
|
} else
|
|
leader = " ";
|
|
if (len < 0)
|
|
goto formerr;
|
|
for (n = 0; n < len; n += 48) {
|
|
T(addstr(leader, strlen(leader), &buf, &buflen));
|
|
T(addstr(base64_key + n, (size_t)MIN(len - n, 48),
|
|
&buf, &buflen));
|
|
}
|
|
if (len > 15)
|
|
T(addstr(" )", (size_t)2, &buf, &buflen));
|
|
break;
|
|
}
|
|
|
|
case ns_t_nxt: {
|
|
ptrdiff_t n, c;
|
|
|
|
/* Next domain name. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
|
|
/* Type bit map. */
|
|
n = edata - rdata;
|
|
for (c = 0; c < n*8; c++)
|
|
if (NS_NXT_BIT_ISSET(c, rdata)) {
|
|
len = snprintf(tmp, sizeof(tmp), " %s", p_type((int)c));
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
}
|
|
break;
|
|
}
|
|
|
|
case ns_t_cert: {
|
|
u_int c_type, key_tag, alg;
|
|
int n;
|
|
size_t siz;
|
|
char base64_cert[8192], tmp1[40];
|
|
const char *leader;
|
|
|
|
c_type = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
key_tag = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
alg = (u_int) *rdata++;
|
|
|
|
len = snprintf(tmp1, sizeof(tmp1), "%d %d %d ", c_type, key_tag, alg);
|
|
T(addstr(tmp1, (size_t)len, &buf, &buflen));
|
|
siz = (edata-rdata)*4/3 + 4; /* "+4" accounts for trailing \0 */
|
|
if (siz > sizeof(base64_cert) * 3/4) {
|
|
const char *str = "record too long to print";
|
|
T(addstr(str, strlen(str), &buf, &buflen));
|
|
}
|
|
else {
|
|
len = b64_ntop(rdata, (size_t)(edata-rdata),
|
|
base64_cert, siz);
|
|
|
|
if (len < 0)
|
|
goto formerr;
|
|
else if (len > 15) {
|
|
T(addstr(" (", (size_t)2, &buf, &buflen));
|
|
leader = "\n\t\t";
|
|
spaced = 0;
|
|
}
|
|
else
|
|
leader = " ";
|
|
|
|
for (n = 0; n < len; n += 48) {
|
|
T(addstr(leader, strlen(leader),
|
|
&buf, &buflen));
|
|
T(addstr(base64_cert + n, (size_t)MIN(len - n, 48),
|
|
&buf, &buflen));
|
|
}
|
|
if (len > 15)
|
|
T(addstr(" )", (size_t)2, &buf, &buflen));
|
|
}
|
|
break;
|
|
}
|
|
|
|
case ns_t_tkey: {
|
|
/* KJD - need to complete this */
|
|
u_long t;
|
|
int mode, err, keysize;
|
|
|
|
/* Algorithm name. */
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
T(addstr(" ", (size_t)1, &buf, &buflen));
|
|
|
|
/* Inception. */
|
|
t = ns_get32(rdata); rdata += NS_INT32SZ;
|
|
len = snprintf(tmp, sizeof(tmp), "%s ", p_secstodate(t));
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
|
|
/* Experation. */
|
|
t = ns_get32(rdata); rdata += NS_INT32SZ;
|
|
len = snprintf(tmp, sizeof(tmp), "%s ", p_secstodate(t));
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
|
|
/* Mode , Error, Key Size. */
|
|
/* Priority, Weight, Port. */
|
|
mode = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
err = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
keysize = ns_get16(rdata); rdata += NS_INT16SZ;
|
|
len = snprintf(tmp, sizeof(tmp), "%u %u %u ", mode, err, keysize);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
|
|
/* XXX need to dump key, print otherdata length & other data */
|
|
break;
|
|
}
|
|
|
|
case ns_t_tsig: {
|
|
/* BEW - need to complete this */
|
|
int n;
|
|
|
|
T(len = addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
T(addstr(" ", (size_t)1, &buf, &buflen));
|
|
rdata += 8; /* time */
|
|
n = ns_get16(rdata); rdata += INT16SZ;
|
|
rdata += n; /* sig */
|
|
n = ns_get16(rdata); rdata += INT16SZ; /* original id */
|
|
snprintf(buf, buflen, "%d", ns_get16(rdata));
|
|
rdata += INT16SZ;
|
|
addlen(strlen(buf), &buf, &buflen);
|
|
break;
|
|
}
|
|
|
|
case ns_t_a6: {
|
|
struct in6_addr a;
|
|
int pbyte, pbit;
|
|
|
|
/* prefix length */
|
|
if (rdlen == 0U) goto formerr;
|
|
len = snprintf(tmp, sizeof(tmp), "%d ", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
pbit = *rdata;
|
|
if (pbit > 128) goto formerr;
|
|
pbyte = (pbit & ~7) / 8;
|
|
rdata++;
|
|
|
|
/* address suffix: provided only when prefix len != 128 */
|
|
if (pbit < 128) {
|
|
if (rdata + pbyte >= edata) goto formerr;
|
|
memset(&a, 0, sizeof(a));
|
|
memcpy(&a.s6_addr[pbyte], rdata, sizeof(a) - pbyte);
|
|
(void) inet_ntop(AF_INET6, &a, buf, (socklen_t)buflen);
|
|
addlen(strlen(buf), &buf, &buflen);
|
|
rdata += sizeof(a) - pbyte;
|
|
}
|
|
|
|
/* prefix name: provided only when prefix len > 0 */
|
|
if (pbit == 0)
|
|
break;
|
|
if (rdata >= edata) goto formerr;
|
|
T(addstr(" ", (size_t)1, &buf, &buflen));
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
|
|
break;
|
|
}
|
|
|
|
case ns_t_opt: {
|
|
len = snprintf(tmp, sizeof(tmp), "%u bytes", class);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
break;
|
|
}
|
|
|
|
case ns_t_ds:
|
|
case ns_t_dlv:
|
|
case ns_t_sshfp: {
|
|
u_int t;
|
|
|
|
if (type == ns_t_ds || type == ns_t_dlv) {
|
|
if (rdlen < 4U) goto formerr;
|
|
t = ns_get16(rdata);
|
|
rdata += NS_INT16SZ;
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", t);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
} else
|
|
if (rdlen < 2U) goto formerr;
|
|
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
rdata++;
|
|
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
rdata++;
|
|
|
|
while (rdata < edata) {
|
|
len = snprintf(tmp, sizeof(tmp), "%02X", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
rdata++;
|
|
}
|
|
break;
|
|
}
|
|
|
|
case ns_t_nsec3:
|
|
case ns_t_nsec3param: {
|
|
u_int t, w, l, j, k, c;
|
|
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
rdata++;
|
|
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
rdata++;
|
|
|
|
t = ns_get16(rdata);
|
|
rdata += NS_INT16SZ;
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", t);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
|
|
t = *rdata++;
|
|
if (t == 0) {
|
|
T(addstr("-", 1, &buf, &buflen));
|
|
} else {
|
|
while (t-- > 0) {
|
|
len = snprintf(tmp, sizeof(tmp), "%02X", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
rdata++;
|
|
}
|
|
}
|
|
if (type == ns_t_nsec3param)
|
|
break;
|
|
T(addstr(" ", 1, &buf, &buflen));
|
|
|
|
t = *rdata++;
|
|
while (t > 0) {
|
|
switch (t) {
|
|
case 1:
|
|
tmp[0] = base32hex[(((uint32_t)rdata[0]>>3)&0x1f)];
|
|
tmp[1] = base32hex[(((uint32_t)rdata[0]<<2)&0x1c)];
|
|
tmp[2] = tmp[3] = tmp[4] = '=';
|
|
tmp[5] = tmp[6] = tmp[7] = '=';
|
|
break;
|
|
case 2:
|
|
tmp[0] = base32hex[(((uint32_t)rdata[0]>>3)&0x1f)];
|
|
tmp[1] = base32hex[(((uint32_t)rdata[0]<<2)&0x1c)|
|
|
(((uint32_t)rdata[1]>>6)&0x03)];
|
|
tmp[2] = base32hex[(((uint32_t)rdata[1]>>1)&0x1f)];
|
|
tmp[3] = base32hex[(((uint32_t)rdata[1]<<4)&0x10)];
|
|
tmp[4] = tmp[5] = tmp[6] = tmp[7] = '=';
|
|
break;
|
|
case 3:
|
|
tmp[0] = base32hex[(((uint32_t)rdata[0]>>3)&0x1f)];
|
|
tmp[1] = base32hex[(((uint32_t)rdata[0]<<2)&0x1c)|
|
|
(((uint32_t)rdata[1]>>6)&0x03)];
|
|
tmp[2] = base32hex[(((uint32_t)rdata[1]>>1)&0x1f)];
|
|
tmp[3] = base32hex[(((uint32_t)rdata[1]<<4)&0x10)|
|
|
(((uint32_t)rdata[2]>>4)&0x0f)];
|
|
tmp[4] = base32hex[(((uint32_t)rdata[2]<<1)&0x1e)];
|
|
tmp[5] = tmp[6] = tmp[7] = '=';
|
|
break;
|
|
case 4:
|
|
tmp[0] = base32hex[(((uint32_t)rdata[0]>>3)&0x1f)];
|
|
tmp[1] = base32hex[(((uint32_t)rdata[0]<<2)&0x1c)|
|
|
(((uint32_t)rdata[1]>>6)&0x03)];
|
|
tmp[2] = base32hex[(((uint32_t)rdata[1]>>1)&0x1f)];
|
|
tmp[3] = base32hex[(((uint32_t)rdata[1]<<4)&0x10)|
|
|
(((uint32_t)rdata[2]>>4)&0x0f)];
|
|
tmp[4] = base32hex[(((uint32_t)rdata[2]<<1)&0x1e)|
|
|
(((uint32_t)rdata[3]>>7)&0x01)];
|
|
tmp[5] = base32hex[(((uint32_t)rdata[3]>>2)&0x1f)];
|
|
tmp[6] = base32hex[((uint32_t)rdata[3]<<3)&0x18];
|
|
tmp[7] = '=';
|
|
break;
|
|
default:
|
|
tmp[0] = base32hex[(((uint32_t)rdata[0]>>3)&0x1f)];
|
|
tmp[1] = base32hex[(((uint32_t)rdata[0]<<2)&0x1c)|
|
|
(((uint32_t)rdata[1]>>6)&0x03)];
|
|
tmp[2] = base32hex[(((uint32_t)rdata[1]>>1)&0x1f)];
|
|
tmp[3] = base32hex[(((uint32_t)rdata[1]<<4)&0x10)|
|
|
(((uint32_t)rdata[2]>>4)&0x0f)];
|
|
tmp[4] = base32hex[(((uint32_t)rdata[2]<<1)&0x1e)|
|
|
(((uint32_t)rdata[3]>>7)&0x01)];
|
|
tmp[5] = base32hex[(((uint32_t)rdata[3]>>2)&0x1f)];
|
|
tmp[6] = base32hex[(((uint32_t)rdata[3]<<3)&0x18)|
|
|
(((uint32_t)rdata[4]>>5)&0x07)];
|
|
tmp[7] = base32hex[(rdata[4]&0x1f)];
|
|
break;
|
|
}
|
|
T(addstr(tmp, 8, &buf, &buflen));
|
|
if (t >= 5) {
|
|
rdata += 5;
|
|
t -= 5;
|
|
} else {
|
|
rdata += t;
|
|
t -= t;
|
|
}
|
|
}
|
|
|
|
while (rdata < edata) {
|
|
w = *rdata++;
|
|
l = *rdata++;
|
|
for (j = 0; j < l; j++) {
|
|
if (rdata[j] == 0)
|
|
continue;
|
|
for (k = 0; k < 8; k++) {
|
|
if ((rdata[j] & (0x80 >> k)) == 0)
|
|
continue;
|
|
c = w * 256 + j * 8 + k;
|
|
len = snprintf(tmp, sizeof(tmp), " %s", p_type((ns_type)c));
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
}
|
|
}
|
|
rdata += l;
|
|
}
|
|
break;
|
|
}
|
|
|
|
case ns_t_nsec: {
|
|
u_int w, l, j, k, c;
|
|
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
|
|
while (rdata < edata) {
|
|
w = *rdata++;
|
|
l = *rdata++;
|
|
for (j = 0; j < l; j++) {
|
|
if (rdata[j] == 0)
|
|
continue;
|
|
for (k = 0; k < 8; k++) {
|
|
if ((rdata[j] & (0x80 >> k)) == 0)
|
|
continue;
|
|
c = w * 256 + j * 8 + k;
|
|
len = snprintf(tmp, sizeof(tmp), " %s", p_type((ns_type)c));
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
}
|
|
}
|
|
rdata += l;
|
|
}
|
|
break;
|
|
}
|
|
|
|
case ns_t_dhcid: {
|
|
int n;
|
|
unsigned int siz;
|
|
char base64_dhcid[8192];
|
|
const char *leader;
|
|
|
|
siz = (int)(edata-rdata)*4/3 + 4; /* "+4" accounts for trailing \0 */
|
|
if (siz > sizeof(base64_dhcid) * 3/4) {
|
|
const char *str = "record too long to print";
|
|
T(addstr(str, strlen(str), &buf, &buflen));
|
|
} else {
|
|
len = b64_ntop(rdata, (size_t)(edata-rdata),
|
|
base64_dhcid, siz);
|
|
|
|
if (len < 0)
|
|
goto formerr;
|
|
|
|
else if (len > 15) {
|
|
T(addstr(" (", 2, &buf, &buflen));
|
|
leader = "\n\t\t";
|
|
spaced = 0;
|
|
}
|
|
else
|
|
leader = " ";
|
|
|
|
for (n = 0; n < len; n += 48) {
|
|
T(addstr(leader, strlen(leader),
|
|
&buf, &buflen));
|
|
T(addstr(base64_dhcid + n,
|
|
(size_t)MIN(len - n, 48), &buf, &buflen));
|
|
}
|
|
if (len > 15)
|
|
T(addstr(" )", 2, &buf, &buflen));
|
|
}
|
|
break;
|
|
}
|
|
|
|
case ns_t_ipseckey: {
|
|
int n;
|
|
unsigned int siz;
|
|
char base64_key[8192];
|
|
const char *leader;
|
|
|
|
if (rdlen < 2)
|
|
goto formerr;
|
|
|
|
switch (rdata[1]) {
|
|
case 0:
|
|
case 3:
|
|
if (rdlen < 3)
|
|
goto formerr;
|
|
break;
|
|
case 1:
|
|
if (rdlen < 7)
|
|
goto formerr;
|
|
break;
|
|
case 2:
|
|
if (rdlen < 19)
|
|
goto formerr;
|
|
break;
|
|
default:
|
|
comment = "unknown IPSECKEY gateway type";
|
|
goto hexify;
|
|
}
|
|
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
rdata++;
|
|
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
rdata++;
|
|
|
|
len = snprintf(tmp, sizeof(tmp), "%u ", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
rdata++;
|
|
|
|
switch (rdata[-2]) {
|
|
case 0:
|
|
T(addstr(".", 1, &buf, &buflen));
|
|
break;
|
|
case 1:
|
|
(void) inet_ntop(AF_INET, rdata, buf, (socklen_t)buflen);
|
|
addlen(strlen(buf), &buf, &buflen);
|
|
rdata += 4;
|
|
break;
|
|
case 2:
|
|
(void) inet_ntop(AF_INET6, rdata, buf, (socklen_t)buflen);
|
|
addlen(strlen(buf), &buf, &buflen);
|
|
rdata += 16;
|
|
break;
|
|
case 3:
|
|
T(addname(msg, msglen, &rdata, origin, &buf, &buflen));
|
|
break;
|
|
}
|
|
|
|
if (rdata >= edata)
|
|
break;
|
|
|
|
siz = (int)(edata-rdata)*4/3 + 4; /* "+4" accounts for trailing \0 */
|
|
if (siz > sizeof(base64_key) * 3/4) {
|
|
const char *str = "record too long to print";
|
|
T(addstr(str, strlen(str), &buf, &buflen));
|
|
} else {
|
|
len = b64_ntop(rdata, (size_t)(edata-rdata),
|
|
base64_key, siz);
|
|
|
|
if (len < 0)
|
|
goto formerr;
|
|
|
|
else if (len > 15) {
|
|
T(addstr(" (", 2, &buf, &buflen));
|
|
leader = "\n\t\t";
|
|
spaced = 0;
|
|
}
|
|
else
|
|
leader = " ";
|
|
|
|
for (n = 0; n < len; n += 48) {
|
|
T(addstr(leader, strlen(leader),
|
|
&buf, &buflen));
|
|
T(addstr(base64_key + n,
|
|
(size_t)MIN(len - n, 48), &buf, &buflen));
|
|
}
|
|
if (len > 15)
|
|
T(addstr(" )", 2, &buf, &buflen));
|
|
}
|
|
break;
|
|
}
|
|
|
|
case ns_t_hip: {
|
|
unsigned int i, hip_len, algorithm, key_len;
|
|
char base64_key[NS_MD5RSA_MAX_BASE64];
|
|
unsigned int siz;
|
|
const char *leader = "\n\t\t\t\t\t";
|
|
|
|
hip_len = *rdata++;
|
|
algorithm = *rdata++;
|
|
key_len = ns_get16(rdata);
|
|
rdata += NS_INT16SZ;
|
|
|
|
siz = key_len*4/3 + 4; /* "+4" accounts for trailing \0 */
|
|
if (siz > sizeof(base64_key) * 3/4) {
|
|
const char *str = "record too long to print";
|
|
T(addstr(str, strlen(str), &buf, &buflen));
|
|
} else {
|
|
len = snprintf(tmp, sizeof(tmp), "( %u ", algorithm);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
|
|
for (i = 0; i < hip_len; i++) {
|
|
len = snprintf(tmp, sizeof(tmp), "%02X", *rdata);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
rdata++;
|
|
}
|
|
T(addstr(leader, strlen(leader), &buf, &buflen));
|
|
|
|
len = b64_ntop(rdata, key_len, base64_key, siz);
|
|
if (len < 0)
|
|
goto formerr;
|
|
|
|
T(addstr(base64_key, (size_t)len, &buf, &buflen));
|
|
|
|
rdata += key_len;
|
|
while (rdata < edata) {
|
|
T(addstr(leader, strlen(leader), &buf, &buflen));
|
|
T(addname(msg, msglen, &rdata, origin,
|
|
&buf, &buflen));
|
|
}
|
|
T(addstr(" )", 2, &buf, &buflen));
|
|
}
|
|
break;
|
|
}
|
|
|
|
default:
|
|
comment = "unknown RR type";
|
|
goto hexify;
|
|
}
|
|
_DIAGASSERT(__type_fit(int, buf - obuf));
|
|
return (int)(buf - obuf);
|
|
formerr:
|
|
comment = "RR format error";
|
|
hexify: {
|
|
int n, m;
|
|
char *p;
|
|
|
|
len = snprintf(tmp, sizeof(tmp), "\\# %u%s\t; %s", (unsigned)(edata - rdata),
|
|
rdlen != 0U ? " (" : "", comment);
|
|
T(addstr(tmp, (size_t)len, &buf, &buflen));
|
|
while (rdata < edata) {
|
|
p = tmp;
|
|
p += snprintf(p, sizeof(tmp), "\n\t");
|
|
spaced = 0;
|
|
n = MIN(16, (int)(edata - rdata));
|
|
for (m = 0; m < n; m++)
|
|
p += snprintf(p, sizeof(tmp) - (p - tmp), "%02x ", rdata[m]);
|
|
T(addstr(tmp, (size_t)(p - tmp), &buf, &buflen));
|
|
if (n < 16) {
|
|
T(addstr(")", (size_t)1, &buf, &buflen));
|
|
T(addtab((size_t)(p - tmp + 1), (size_t)48, spaced, &buf, &buflen));
|
|
}
|
|
p = tmp;
|
|
p += snprintf(p, sizeof(tmp), "; ");
|
|
for (m = 0; m < n; m++)
|
|
*p++ = (isascii(rdata[m]) && isprint(rdata[m]))
|
|
? rdata[m]
|
|
: '.';
|
|
T(addstr(tmp, (size_t)(p - tmp), &buf, &buflen));
|
|
rdata += n;
|
|
}
|
|
_DIAGASSERT(__type_fit(int, buf - obuf));
|
|
return (int)(buf - obuf);
|
|
}
|
|
}
|
|
|
|
/* Private. */
|
|
|
|
/*
|
|
* size_t
|
|
* prune_origin(name, origin)
|
|
* Find out if the name is at or under the current origin.
|
|
* return:
|
|
* Number of characters in name before start of origin,
|
|
* or length of name if origin does not match.
|
|
* notes:
|
|
* This function should share code with samedomain().
|
|
*/
|
|
static size_t
|
|
prune_origin(const char *name, const char *origin) {
|
|
const char *oname = name;
|
|
|
|
while (*name != '\0') {
|
|
if (origin != NULL && ns_samename(name, origin) == 1)
|
|
return (name - oname - (name > oname));
|
|
while (*name != '\0') {
|
|
if (*name == '\\') {
|
|
name++;
|
|
/* XXX need to handle \nnn form. */
|
|
if (*name == '\0')
|
|
break;
|
|
} else if (*name == '.') {
|
|
name++;
|
|
break;
|
|
}
|
|
name++;
|
|
}
|
|
}
|
|
return (name - oname);
|
|
}
|
|
|
|
/*
|
|
* int
|
|
* charstr(rdata, edata, buf, buflen)
|
|
* Format a <character-string> into the presentation buffer.
|
|
* return:
|
|
* Number of rdata octets consumed
|
|
* 0 for protocol format error
|
|
* -1 for output buffer error
|
|
* side effects:
|
|
* buffer is advanced on success.
|
|
*/
|
|
static int
|
|
charstr(const u_char *rdata, const u_char *edata, char **buf, size_t *buflen) {
|
|
const u_char *odata = rdata;
|
|
size_t save_buflen = *buflen;
|
|
char *save_buf = *buf;
|
|
|
|
if (addstr("\"", (size_t)1, buf, buflen) < 0)
|
|
goto enospc;
|
|
if (rdata < edata) {
|
|
int n = *rdata;
|
|
|
|
if (rdata + 1 + n <= edata) {
|
|
rdata++;
|
|
while (n-- > 0) {
|
|
if (strchr("\n\"\\", *rdata) != NULL)
|
|
if (addstr("\\", (size_t)1, buf, buflen) < 0)
|
|
goto enospc;
|
|
if (addstr((const char *)rdata, (size_t)1,
|
|
buf, buflen) < 0)
|
|
goto enospc;
|
|
rdata++;
|
|
}
|
|
}
|
|
}
|
|
if (addstr("\"", (size_t)1, buf, buflen) < 0)
|
|
goto enospc;
|
|
_DIAGASSERT(__type_fit(int, rdata - odata));
|
|
return (int)(rdata - odata);
|
|
enospc:
|
|
errno = ENOSPC;
|
|
*buf = save_buf;
|
|
*buflen = save_buflen;
|
|
return (-1);
|
|
}
|
|
|
|
static int
|
|
addname(const u_char *msg, size_t msglen,
|
|
const u_char **pp, const char *origin,
|
|
char **buf, size_t *buflen)
|
|
{
|
|
size_t newlen, save_buflen = *buflen;
|
|
char *save_buf = *buf;
|
|
int n;
|
|
|
|
n = dn_expand(msg, msg + msglen, *pp, *buf, (int)*buflen);
|
|
if (n < 0)
|
|
goto enospc; /* Guess. */
|
|
newlen = prune_origin(*buf, origin);
|
|
if (**buf == '\0') {
|
|
goto root;
|
|
} else if (newlen == 0U) {
|
|
/* Use "@" instead of name. */
|
|
if (newlen + 2 > *buflen)
|
|
goto enospc; /* No room for "@\0". */
|
|
(*buf)[newlen++] = '@';
|
|
(*buf)[newlen] = '\0';
|
|
} else {
|
|
if (((origin == NULL || origin[0] == '\0') ||
|
|
(origin[0] != '.' && origin[1] != '\0' &&
|
|
(*buf)[newlen] == '\0')) && (*buf)[newlen - 1] != '.') {
|
|
/* No trailing dot. */
|
|
root:
|
|
if (newlen + 2 > *buflen)
|
|
goto enospc; /* No room for ".\0". */
|
|
(*buf)[newlen++] = '.';
|
|
(*buf)[newlen] = '\0';
|
|
}
|
|
}
|
|
*pp += n;
|
|
addlen(newlen, buf, buflen);
|
|
**buf = '\0';
|
|
_DIAGASSERT(__type_fit(int, newlen));
|
|
return (int)newlen;
|
|
enospc:
|
|
errno = ENOSPC;
|
|
*buf = save_buf;
|
|
*buflen = save_buflen;
|
|
return (-1);
|
|
}
|
|
|
|
static void
|
|
addlen(size_t len, char **buf, size_t *buflen) {
|
|
assert(len <= *buflen);
|
|
*buf += len;
|
|
*buflen -= len;
|
|
}
|
|
|
|
static int
|
|
addstr(const char *src, size_t len, char **buf, size_t *buflen) {
|
|
if (len >= *buflen) {
|
|
errno = ENOSPC;
|
|
return (-1);
|
|
}
|
|
memcpy(*buf, src, len);
|
|
addlen(len, buf, buflen);
|
|
**buf = '\0';
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
addtab(size_t len, size_t target, int spaced, char **buf, size_t *buflen) {
|
|
size_t save_buflen = *buflen;
|
|
char *save_buf = *buf;
|
|
ptrdiff_t t;
|
|
|
|
if (spaced || len >= target - 1) {
|
|
T(addstr(" ", (size_t)2, buf, buflen));
|
|
spaced = 1;
|
|
} else {
|
|
for (t = (target - len - 1) / 8; t >= 0; t--)
|
|
if (addstr("\t", (size_t)1, buf, buflen) < 0) {
|
|
*buflen = save_buflen;
|
|
*buf = save_buf;
|
|
return (-1);
|
|
}
|
|
spaced = 0;
|
|
}
|
|
return (spaced);
|
|
}
|