2 * Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")
3 * Copyright (c) 1996-1999 by Internet Software Consortium.
5 * Permission to use, copy, modify, and distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
10 * ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
11 * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
12 * CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
13 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
14 * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
15 * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
21 #include <sys/types.h>
22 #include <sys/socket.h>
24 #include <netinet/in.h>
25 #include <arpa/nameser.h>
26 #include <arpa/inet.h>
34 #define SPRINTF(x) ((size_t)sprintf x)
38 static size_t prune_origin(const char *name
, const char *origin
);
39 static int charstr(const u_char
*rdata
, const u_char
*edata
,
40 char **buf
, size_t *buflen
);
41 static int addname(const u_char
*msg
, size_t msglen
,
42 const u_char
**p
, const char *origin
,
43 char **buf
, size_t *buflen
);
44 static void addlen(size_t len
, char **buf
, size_t *buflen
);
45 static int addstr(const char *src
, size_t len
,
46 char **buf
, size_t *buflen
);
47 static int addtab(size_t len
, size_t target
, int spaced
,
48 char **buf
, size_t *buflen
);
50 static u_int16_t
dst_s_dns_key_id(const u_char
*, const int);
63 * Convert an RR to presentation format.
66 *\li Number of characters written to buf, or -1 (check errno).
69 ns_sprintrr(const ns_msg
*handle
, const ns_rr
*rr
,
70 const char *name_ctx
, const char *origin
,
71 char *buf
, size_t buflen
)
75 n
= ns_sprintrrf(ns_msg_base(*handle
), ns_msg_size(*handle
),
76 ns_rr_name(*rr
), ns_rr_class(*rr
), ns_rr_type(*rr
),
77 ns_rr_ttl(*rr
), ns_rr_rdata(*rr
), ns_rr_rdlen(*rr
),
78 name_ctx
, origin
, buf
, buflen
);
81 libresolv_hidden_def (ns_sprintrr
)
84 * Convert the fields of an RR into presentation format.
87 *\li Number of characters written to buf, or -1 (check errno).
90 ns_sprintrrf(const u_char
*msg
, size_t msglen
,
91 const char *name
, ns_class
class, ns_type type
,
92 u_long ttl
, const u_char
*rdata
, size_t rdlen
,
93 const char *name_ctx
, const char *origin
,
94 char *buf
, size_t buflen
)
96 const char *obuf
= buf
;
97 const u_char
*edata
= rdata
+ rdlen
;
108 if (name_ctx
!= NULL
&& ns_samename(name_ctx
, name
) == 1) {
109 T(addstr("\t\t\t", 3, &buf
, &buflen
));
111 len
= prune_origin(name
, origin
);
114 } else if (len
== 0) {
115 T(addstr("@\t\t\t", 4, &buf
, &buflen
));
117 T(addstr(name
, len
, &buf
, &buflen
));
118 /* Origin not used or not root, and no trailing dot? */
119 if (((origin
== NULL
|| origin
[0] == '\0') ||
120 (origin
[0] != '.' && origin
[1] != '\0' &&
121 name
[len
] == '\0')) && name
[len
- 1] != '.') {
123 T(addstr(".", 1, &buf
, &buflen
));
126 T(spaced
= addtab(len
, 24, spaced
, &buf
, &buflen
));
133 T(x
= ns_format_ttl(ttl
, buf
, buflen
));
134 addlen(x
, &buf
, &buflen
);
135 len
= SPRINTF((tmp
, " %s %s", p_class(class), p_type(type
)));
136 T(addstr(tmp
, len
, &buf
, &buflen
));
137 T(spaced
= addtab(x
+ len
, 16, spaced
, &buf
, &buflen
));
144 if (rdlen
!= (size_t)NS_INADDRSZ
)
146 (void) inet_ntop(AF_INET
, rdata
, buf
, buflen
);
147 addlen(strlen(buf
), &buf
, &buflen
);
157 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
163 T(len
= charstr(rdata
, edata
, &buf
, &buflen
));
167 T(addstr(" ", 1, &buf
, &buflen
));
170 /* Second word, optional in ISDN records. */
171 if (type
== ns_t_isdn
&& rdata
== edata
)
174 T(len
= charstr(rdata
, edata
, &buf
, &buflen
));
184 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
185 T(addstr(" ", 1, &buf
, &buflen
));
187 /* Administrator name. */
188 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
189 T(addstr(" (\n", 3, &buf
, &buflen
));
192 if ((edata
- rdata
) != 5*NS_INT32SZ
)
196 t
= ns_get32(rdata
); rdata
+= NS_INT32SZ
;
197 T(addstr("\t\t\t\t\t", 5, &buf
, &buflen
));
198 len
= SPRINTF((tmp
, "%lu", t
));
199 T(addstr(tmp
, len
, &buf
, &buflen
));
200 T(spaced
= addtab(len
, 16, spaced
, &buf
, &buflen
));
201 T(addstr("; serial\n", 9, &buf
, &buflen
));
204 /* Refresh interval. */
205 t
= ns_get32(rdata
); rdata
+= NS_INT32SZ
;
206 T(addstr("\t\t\t\t\t", 5, &buf
, &buflen
));
207 T(len
= ns_format_ttl(t
, buf
, buflen
));
208 addlen(len
, &buf
, &buflen
);
209 T(spaced
= addtab(len
, 16, spaced
, &buf
, &buflen
));
210 T(addstr("; refresh\n", 10, &buf
, &buflen
));
213 /* Retry interval. */
214 t
= ns_get32(rdata
); rdata
+= NS_INT32SZ
;
215 T(addstr("\t\t\t\t\t", 5, &buf
, &buflen
));
216 T(len
= ns_format_ttl(t
, buf
, buflen
));
217 addlen(len
, &buf
, &buflen
);
218 T(spaced
= addtab(len
, 16, spaced
, &buf
, &buflen
));
219 T(addstr("; retry\n", 8, &buf
, &buflen
));
223 t
= ns_get32(rdata
); rdata
+= NS_INT32SZ
;
224 T(addstr("\t\t\t\t\t", 5, &buf
, &buflen
));
225 T(len
= ns_format_ttl(t
, buf
, buflen
));
226 addlen(len
, &buf
, &buflen
);
227 T(spaced
= addtab(len
, 16, spaced
, &buf
, &buflen
));
228 T(addstr("; expiry\n", 9, &buf
, &buflen
));
232 t
= ns_get32(rdata
); rdata
+= NS_INT32SZ
;
233 T(addstr("\t\t\t\t\t", 5, &buf
, &buflen
));
234 T(len
= ns_format_ttl(t
, buf
, buflen
));
235 addlen(len
, &buf
, &buflen
);
236 T(addstr(" )", 2, &buf
, &buflen
));
237 T(spaced
= addtab(len
, 16, spaced
, &buf
, &buflen
));
238 T(addstr("; minimum\n", 10, &buf
, &buflen
));
248 if (rdlen
< (size_t)NS_INT16SZ
)
254 len
= SPRINTF((tmp
, "%u ", t
));
255 T(addstr(tmp
, len
, &buf
, &buflen
));
258 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
266 if (rdlen
< (size_t)NS_INT16SZ
)
272 len
= SPRINTF((tmp
, "%u ", t
));
273 T(addstr(tmp
, len
, &buf
, &buflen
));
276 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
277 T(addstr(" ", 1, &buf
, &buflen
));
280 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
286 T(len
= charstr(rdata
, edata
, &buf
, &buflen
));
293 while (rdata
< edata
) {
294 T(len
= charstr(rdata
, edata
, &buf
, &buflen
));
299 T(addstr(" ", 1, &buf
, &buflen
));
306 (void) inet_nsap_ntoa(rdlen
, rdata
, t
);
307 T(addstr(t
, strlen(t
), &buf
, &buflen
));
312 if (rdlen
!= (size_t)NS_IN6ADDRSZ
)
314 (void) inet_ntop(AF_INET6
, rdata
, buf
, buflen
);
315 addlen(strlen(buf
), &buf
, &buflen
);
321 /* XXX protocol format checking? */
322 (void) loc_ntoa(rdata
, t
);
323 T(addstr(t
, strlen(t
), &buf
, &buflen
));
328 u_int order
, preference
;
331 if (rdlen
< 2U*NS_INT16SZ
)
334 /* Order, Precedence. */
335 order
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
336 preference
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
337 len
= SPRINTF((t
, "%u %u ", order
, preference
));
338 T(addstr(t
, len
, &buf
, &buflen
));
341 T(len
= charstr(rdata
, edata
, &buf
, &buflen
));
345 T(addstr(" ", 1, &buf
, &buflen
));
348 T(len
= charstr(rdata
, edata
, &buf
, &buflen
));
352 T(addstr(" ", 1, &buf
, &buflen
));
355 T(len
= charstr(rdata
, edata
, &buf
, &buflen
));
361 T(addstr(" ", 1, &buf
, &buflen
));
364 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
369 u_int priority
, weight
, port
;
372 if (rdlen
< 3U*NS_INT16SZ
)
375 /* Priority, Weight, Port. */
376 priority
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
377 weight
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
378 port
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
379 len
= SPRINTF((t
, "%u %u %u ", priority
, weight
, port
));
380 T(addstr(t
, len
, &buf
, &buflen
));
383 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
390 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
391 T(addstr(" ", 1, &buf
, &buflen
));
394 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
401 if (rdlen
< 1U + NS_INT32SZ
)
405 (void) inet_ntop(AF_INET
, rdata
, buf
, buflen
);
406 addlen(strlen(buf
), &buf
, &buflen
);
407 rdata
+= NS_INADDRSZ
;
410 len
= SPRINTF((tmp
, " %u ( ", *rdata
));
411 T(addstr(tmp
, len
, &buf
, &buflen
));
417 while (rdata
< edata
) {
422 T(addstr("\n\t\t\t\t", 5,
427 len
= SPRINTF((tmp
, "%d ", n
));
428 T(addstr(tmp
, len
, &buf
, &buflen
));
434 T(addstr(")", 1, &buf
, &buflen
));
440 char base64_key
[NS_MD5RSA_MAX_BASE64
];
441 u_int keyflags
, protocol
, algorithm
, key_id
;
445 if (rdlen
< 0U + NS_INT16SZ
+ NS_INT8SZ
+ NS_INT8SZ
)
448 /* Key flags, Protocol, Algorithm. */
449 key_id
= dst_s_dns_key_id(rdata
, edata
-rdata
);
450 keyflags
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
452 algorithm
= *rdata
++;
453 len
= SPRINTF((tmp
, "0x%04x %u %u",
454 keyflags
, protocol
, algorithm
));
455 T(addstr(tmp
, len
, &buf
, &buflen
));
457 /* Public key data. */
458 len
= b64_ntop(rdata
, edata
- rdata
,
459 base64_key
, sizeof base64_key
);
463 T(addstr(" (", 2, &buf
, &buflen
));
468 for (n
= 0; n
< len
; n
+= 48) {
469 T(addstr(leader
, strlen(leader
), &buf
, &buflen
));
470 T(addstr(base64_key
+ n
, MIN(len
- n
, 48),
474 T(addstr(" )", 2, &buf
, &buflen
));
475 n
= SPRINTF((tmp
, " ; key_tag= %u", key_id
));
476 T(addstr(tmp
, n
, &buf
, &buflen
));
482 char base64_key
[NS_MD5RSA_MAX_BASE64
];
483 u_int type
, algorithm
, labels
, footprint
;
491 /* Type covered, Algorithm, Label count, Original TTL. */
492 type
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
493 algorithm
= *rdata
++;
495 t
= ns_get32(rdata
); rdata
+= NS_INT32SZ
;
496 len
= SPRINTF((tmp
, "%s %d %d %lu ",
497 p_type(type
), algorithm
, labels
, t
));
498 T(addstr(tmp
, len
, &buf
, &buflen
));
499 if (labels
> (u_int
)dn_count_labels(name
))
502 /* Signature expiry. */
503 t
= ns_get32(rdata
); rdata
+= NS_INT32SZ
;
504 len
= SPRINTF((tmp
, "%s ", p_secstodate(t
)));
505 T(addstr(tmp
, len
, &buf
, &buflen
));
508 t
= ns_get32(rdata
); rdata
+= NS_INT32SZ
;
509 len
= SPRINTF((tmp
, "%s ", p_secstodate(t
)));
510 T(addstr(tmp
, len
, &buf
, &buflen
));
512 /* Signature Footprint. */
513 footprint
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
514 len
= SPRINTF((tmp
, "%u ", footprint
));
515 T(addstr(tmp
, len
, &buf
, &buflen
));
518 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
521 len
= b64_ntop(rdata
, edata
- rdata
,
522 base64_key
, sizeof base64_key
);
524 T(addstr(" (", 2, &buf
, &buflen
));
531 for (n
= 0; n
< len
; n
+= 48) {
532 T(addstr(leader
, strlen(leader
), &buf
, &buflen
));
533 T(addstr(base64_key
+ n
, MIN(len
- n
, 48),
537 T(addstr(" )", 2, &buf
, &buflen
));
544 /* Next domain name. */
545 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
549 for (c
= 0; c
< n
*8; c
++)
550 if (NS_NXT_BIT_ISSET(c
, rdata
)) {
551 len
= SPRINTF((tmp
, " %s", p_type(c
)));
552 T(addstr(tmp
, len
, &buf
, &buflen
));
558 u_int c_type
, key_tag
, alg
;
561 char base64_cert
[8192], tmp
[40];
564 c_type
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
565 key_tag
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
566 alg
= (u_int
) *rdata
++;
568 len
= SPRINTF((tmp
, "%d %d %d ", c_type
, key_tag
, alg
));
569 T(addstr(tmp
, len
, &buf
, &buflen
));
570 siz
= (edata
-rdata
)*4/3 + 4; /* "+4" accounts for trailing \0 */
571 if (siz
> sizeof(base64_cert
) * 3/4) {
572 const char *str
= "record too long to print";
573 T(addstr(str
, strlen(str
), &buf
, &buflen
));
576 len
= b64_ntop(rdata
, edata
-rdata
, base64_cert
, siz
);
581 T(addstr(" (", 2, &buf
, &buflen
));
588 for (n
= 0; n
< len
; n
+= 48) {
589 T(addstr(leader
, strlen(leader
),
591 T(addstr(base64_cert
+ n
, MIN(len
- n
, 48),
595 T(addstr(" )", 2, &buf
, &buflen
));
601 /* KJD - need to complete this */
603 int mode
, err
, keysize
;
605 /* Algorithm name. */
606 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
607 T(addstr(" ", 1, &buf
, &buflen
));
610 t
= ns_get32(rdata
); rdata
+= NS_INT32SZ
;
611 len
= SPRINTF((tmp
, "%s ", p_secstodate(t
)));
612 T(addstr(tmp
, len
, &buf
, &buflen
));
615 t
= ns_get32(rdata
); rdata
+= NS_INT32SZ
;
616 len
= SPRINTF((tmp
, "%s ", p_secstodate(t
)));
617 T(addstr(tmp
, len
, &buf
, &buflen
));
619 /* Mode , Error, Key Size. */
620 /* Priority, Weight, Port. */
621 mode
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
622 err
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
623 keysize
= ns_get16(rdata
); rdata
+= NS_INT16SZ
;
624 len
= SPRINTF((tmp
, "%u %u %u ", mode
, err
, keysize
));
625 T(addstr(tmp
, len
, &buf
, &buflen
));
627 /* XXX need to dump key, print otherdata length & other data */
632 /* BEW - need to complete this */
635 T(len
= addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
636 T(addstr(" ", 1, &buf
, &buflen
));
637 rdata
+= 8; /*%< time */
638 n
= ns_get16(rdata
); rdata
+= INT16SZ
;
639 rdata
+= n
; /*%< sig */
640 n
= ns_get16(rdata
); rdata
+= INT16SZ
; /*%< original id */
641 sprintf(buf
, "%d", ns_get16(rdata
));
643 addlen(strlen(buf
), &buf
, &buflen
);
652 if (rdlen
== 0U) goto formerr
;
653 len
= SPRINTF((tmp
, "%d ", *rdata
));
654 T(addstr(tmp
, len
, &buf
, &buflen
));
656 if (pbit
> 128) goto formerr
;
657 pbyte
= (pbit
& ~7) / 8;
660 /* address suffix: provided only when prefix len != 128 */
662 if (rdata
+ pbyte
>= edata
) goto formerr
;
663 memset(&a
, 0, sizeof(a
));
664 memcpy(&a
.s6_addr
[pbyte
], rdata
, sizeof(a
) - pbyte
);
665 (void) inet_ntop(AF_INET6
, &a
, buf
, buflen
);
666 addlen(strlen(buf
), &buf
, &buflen
);
667 rdata
+= sizeof(a
) - pbyte
;
670 /* prefix name: provided only when prefix len > 0 */
673 if (rdata
>= edata
) goto formerr
;
674 T(addstr(" ", 1, &buf
, &buflen
));
675 T(addname(msg
, msglen
, &rdata
, origin
, &buf
, &buflen
));
681 len
= SPRINTF((tmp
, "%u bytes", class));
682 T(addstr(tmp
, len
, &buf
, &buflen
));
687 snprintf (errbuf
, sizeof (errbuf
), "unknown RR type %d", type
);
693 comment
= "RR format error";
698 len
= SPRINTF((tmp
, "\\# %u%s\t; %s", (unsigned)(edata
- rdata
),
699 rdlen
!= 0U ? " (" : "", comment
));
700 T(addstr(tmp
, len
, &buf
, &buflen
));
701 while (rdata
< edata
) {
703 p
+= SPRINTF((p
, "\n\t"));
705 n
= MIN(16, edata
- rdata
);
706 for (m
= 0; m
< n
; m
++)
707 p
+= SPRINTF((p
, "%02x ", rdata
[m
]));
708 T(addstr(tmp
, p
- tmp
, &buf
, &buflen
));
710 T(addstr(")", 1, &buf
, &buflen
));
711 T(addtab(p
- tmp
+ 1, 48, spaced
, &buf
, &buflen
));
714 p
+= SPRINTF((p
, "; "));
715 for (m
= 0; m
< n
; m
++)
716 *p
++ = (isascii(rdata
[m
]) && isprint(rdata
[m
]))
719 T(addstr(tmp
, p
- tmp
, &buf
, &buflen
));
725 libresolv_hidden_def (ns_sprintrrf
)
731 * prune_origin(name, origin)
732 * Find out if the name is at or under the current origin.
734 * Number of characters in name before start of origin,
735 * or length of name if origin does not match.
737 * This function should share code with samedomain().
740 prune_origin(const char *name
, const char *origin
) {
741 const char *oname
= name
;
743 while (*name
!= '\0') {
744 if (origin
!= NULL
&& ns_samename(name
, origin
) == 1)
745 return (name
- oname
- (name
> oname
));
746 while (*name
!= '\0') {
749 /* XXX need to handle \nnn form. */
752 } else if (*name
== '.') {
759 return (name
- oname
);
764 * charstr(rdata, edata, buf, buflen)
765 * Format a <character-string> into the presentation buffer.
767 * Number of rdata octets consumed
768 * 0 for protocol format error
769 * -1 for output buffer error
771 * buffer is advanced on success.
774 charstr(const u_char
*rdata
, const u_char
*edata
, char **buf
, size_t *buflen
) {
775 const u_char
*odata
= rdata
;
776 size_t save_buflen
= *buflen
;
777 char *save_buf
= *buf
;
779 if (addstr("\"", 1, buf
, buflen
) < 0)
784 if (rdata
+ 1 + n
<= edata
) {
787 if (strchr("\n\"\\", *rdata
) != NULL
)
788 if (addstr("\\", 1, buf
, buflen
) < 0)
790 if (addstr((const char *)rdata
, 1,
797 if (addstr("\"", 1, buf
, buflen
) < 0)
799 return (rdata
- odata
);
801 __set_errno (ENOSPC
);
803 *buflen
= save_buflen
;
808 addname(const u_char
*msg
, size_t msglen
,
809 const u_char
**pp
, const char *origin
,
810 char **buf
, size_t *buflen
)
812 size_t newlen
, save_buflen
= *buflen
;
813 char *save_buf
= *buf
;
816 n
= dn_expand(msg
, msg
+ msglen
, *pp
, *buf
, *buflen
);
818 goto enospc
; /*%< Guess. */
819 newlen
= prune_origin(*buf
, origin
);
822 } else if (newlen
== 0U) {
823 /* Use "@" instead of name. */
824 if (newlen
+ 2 > *buflen
)
825 goto enospc
; /* No room for "@\0". */
826 (*buf
)[newlen
++] = '@';
827 (*buf
)[newlen
] = '\0';
829 if (((origin
== NULL
|| origin
[0] == '\0') ||
830 (origin
[0] != '.' && origin
[1] != '\0' &&
831 (*buf
)[newlen
] == '\0')) && (*buf
)[newlen
- 1] != '.') {
832 /* No trailing dot. */
834 if (newlen
+ 2 > *buflen
)
835 goto enospc
; /* No room for ".\0". */
836 (*buf
)[newlen
++] = '.';
837 (*buf
)[newlen
] = '\0';
841 addlen(newlen
, buf
, buflen
);
845 __set_errno (ENOSPC
);
847 *buflen
= save_buflen
;
852 addlen(size_t len
, char **buf
, size_t *buflen
) {
853 assert(len
<= *buflen
);
859 addstr(const char *src
, size_t len
, char **buf
, size_t *buflen
) {
860 if (len
>= *buflen
) {
861 __set_errno (ENOSPC
);
864 memcpy(*buf
, src
, len
);
865 addlen(len
, buf
, buflen
);
871 addtab(size_t len
, size_t target
, int spaced
, char **buf
, size_t *buflen
) {
872 size_t save_buflen
= *buflen
;
873 char *save_buf
= *buf
;
876 if (spaced
|| len
>= target
- 1) {
877 T(addstr(" ", 2, buf
, buflen
));
880 for (t
= (target
- len
- 1) / 8; t
>= 0; t
--)
881 if (addstr("\t", 1, buf
, buflen
) < 0) {
882 *buflen
= save_buflen
;
891 /* DST algorithm codes */
893 #define KEY_HMAC_MD5 157
896 * calculates a checksum used in dst for an id.
897 * takes an array of bytes and a length.
898 * returns a 16 bit checksum.
901 dst_s_id_calc(const u_char
*key
, const int keysize
)
904 const u_char
*kp
= key
;
907 if (!key
|| (keysize
<= 0))
910 for (ac
= 0; size
> 1; size
-= 2, kp
+= 2)
911 ac
+= ((*kp
) << 8) + *(kp
+ 1);
915 ac
+= (ac
>> 16) & 0xffff;
917 return (ac
& 0xffff);
922 * This routine extracts a 16 bit integer from a two byte character
923 * string. The character string is assumed to be in network byte
924 * order and may be unaligned. The number returned is in host order.
926 * buf A two byte character string.
928 * The converted integer value.
932 dst_s_get_int16(const u_char
*buf
)
935 a
= ((u_int16_t
)(buf
[0] << 8)) | ((u_int16_t
)(buf
[1]));
940 * dst_s_dns_key_id() Function to calculate DNSSEC footprint from KEY record
943 * dns_key_rdata: the raw data in wire format
944 * rdata_len: the size of the input data
946 * the key footprint/id calculated from the key data
949 dst_s_dns_key_id(const u_char
*dns_key_rdata
, const int rdata_len
)
955 if (dns_key_rdata
[3] == KEY_RSA
) /*%< Algorithm RSA */
956 return dst_s_get_int16((const u_char
*)
957 &dns_key_rdata
[rdata_len
- 3]);
958 else if (dns_key_rdata
[3] == KEY_HMAC_MD5
)
962 /* compute a checksum on the key part of the key rr */
963 return dst_s_id_calc(dns_key_rdata
, rdata_len
);