1 /* 2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that: (1) source code distributions 7 * retain the above copyright notice and this paragraph in its entirety, (2) 8 * distributions including binary code include the above copyright notice and 9 * this paragraph in its entirety in the documentation or other materials 10 * provided with the distribution, and (3) all advertising materials mentioning 11 * features or use of this software display the following acknowledgement: 12 * ``This product includes software developed by the University of California, 13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of 14 * the University nor the names of its contributors may be used to endorse 15 * or promote products derived from this software without specific prior 16 * written permission. 17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED 18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF 19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 20 */ 21 22 #ifndef lint 23 static const char rcsid[] _U_ = 24 "@(#) $Header: /tcpdump/master/tcpdump/print-domain.c,v 1.89.2.8 2007/02/13 19:19:27 guy Exp $ (LBL)"; 25 #endif 26 27 #ifdef HAVE_CONFIG_H 28 #include "config.h" 29 #endif 30 31 #include <tcpdump-stdinc.h> 32 33 #include "nameser.h" 34 35 #include <stdio.h> 36 #include <string.h> 37 38 #include "interface.h" 39 #include "addrtoname.h" 40 #include "extract.h" /* must come after interface.h */ 41 42 static const char *ns_ops[] = { 43 "", " inv_q", " stat", " op3", " notify", " update", " op6", " op7", 44 " op8", " updataA", " updateD", " updateDA", 45 " updateM", " updateMA", " zoneInit", " zoneRef", 46 }; 47 48 static const char *ns_resp[] = { 49 "", " FormErr", " ServFail", " NXDomain", 50 " NotImp", " Refused", " YXDomain", " YXRRSet", 51 " NXRRSet", " NotAuth", " NotZone", " Resp11", 52 " Resp12", " Resp13", " Resp14", " NoChange", 53 }; 54 55 /* skip over a domain name */ 56 static const u_char * 57 ns_nskip(register const u_char *cp) 58 { 59 register u_char i; 60 61 if (!TTEST2(*cp, 1)) 62 return (NULL); 63 i = *cp++; 64 while (i) { 65 if ((i & INDIR_MASK) == INDIR_MASK) 66 return (cp + 1); 67 if ((i & INDIR_MASK) == EDNS0_MASK) { 68 int bitlen, bytelen; 69 70 if ((i & ~INDIR_MASK) != EDNS0_ELT_BITLABEL) 71 return(NULL); /* unknown ELT */ 72 if (!TTEST2(*cp, 1)) 73 return (NULL); 74 if ((bitlen = *cp++) == 0) 75 bitlen = 256; 76 bytelen = (bitlen + 7) / 8; 77 cp += bytelen; 78 } else 79 cp += i; 80 if (!TTEST2(*cp, 1)) 81 return (NULL); 82 i = *cp++; 83 } 84 return (cp); 85 } 86 87 /* print a <domain-name> */ 88 static const u_char * 89 blabel_print(const u_char *cp) 90 { 91 int bitlen, slen, b; 92 const u_char *bitp, *lim; 93 char tc; 94 95 if (!TTEST2(*cp, 1)) 96 return(NULL); 97 if ((bitlen = *cp) == 0) 98 bitlen = 256; 99 slen = (bitlen + 3) / 4; 100 lim = cp + 1 + slen; 101 102 /* print the bit string as a hex string */ 103 printf("\\[x"); 104 for (bitp = cp + 1, b = bitlen; bitp < lim && b > 7; b -= 8, bitp++) { 105 TCHECK(*bitp); 106 printf("%02x", *bitp); 107 } 108 if (b > 4) { 109 TCHECK(*bitp); 110 tc = *bitp++; 111 printf("%02x", tc & (0xff << (8 - b))); 112 } else if (b > 0) { 113 TCHECK(*bitp); 114 tc = *bitp++; 115 printf("%1x", ((tc >> 4) & 0x0f) & (0x0f << (4 - b))); 116 } 117 printf("/%d]", bitlen); 118 return lim; 119 trunc: 120 printf(".../%d]", bitlen); 121 return NULL; 122 } 123 124 static int 125 labellen(const u_char *cp) 126 { 127 register u_int i; 128 129 if (!TTEST2(*cp, 1)) 130 return(-1); 131 i = *cp; 132 if ((i & INDIR_MASK) == EDNS0_MASK) { 133 int bitlen, elt; 134 if ((elt = (i & ~INDIR_MASK)) != EDNS0_ELT_BITLABEL) { 135 printf("<ELT %d>", elt); 136 return(-1); 137 } 138 if (!TTEST2(*(cp + 1), 1)) 139 return(-1); 140 if ((bitlen = *(cp + 1)) == 0) 141 bitlen = 256; 142 return(((bitlen + 7) / 8) + 1); 143 } else 144 return(i); 145 } 146 147 static const u_char * 148 ns_nprint(register const u_char *cp, register const u_char *bp) 149 { 150 register u_int i, l; 151 register const u_char *rp = NULL; 152 register int compress = 0; 153 int chars_processed; 154 int elt; 155 int data_size = snapend - bp; 156 157 if ((l = labellen(cp)) == (u_int)-1) 158 return(NULL); 159 if (!TTEST2(*cp, 1)) 160 return(NULL); 161 chars_processed = 1; 162 if (((i = *cp++) & INDIR_MASK) != INDIR_MASK) { 163 compress = 0; 164 rp = cp + l; 165 } 166 167 if (i != 0) 168 while (i && cp < snapend) { 169 if ((i & INDIR_MASK) == INDIR_MASK) { 170 if (!compress) { 171 rp = cp + 1; 172 compress = 1; 173 } 174 if (!TTEST2(*cp, 1)) 175 return(NULL); 176 cp = bp + (((i << 8) | *cp) & 0x3fff); 177 if ((l = labellen(cp)) == (u_int)-1) 178 return(NULL); 179 if (!TTEST2(*cp, 1)) 180 return(NULL); 181 i = *cp++; 182 chars_processed++; 183 184 /* 185 * If we've looked at every character in 186 * the message, this pointer will make 187 * us look at some character again, 188 * which means we're looping. 189 */ 190 if (chars_processed >= data_size) { 191 printf("<LOOP>"); 192 return (NULL); 193 } 194 continue; 195 } 196 if ((i & INDIR_MASK) == EDNS0_MASK) { 197 elt = (i & ~INDIR_MASK); 198 switch(elt) { 199 case EDNS0_ELT_BITLABEL: 200 if (blabel_print(cp) == NULL) 201 return (NULL); 202 break; 203 default: 204 /* unknown ELT */ 205 printf("<ELT %d>", elt); 206 return(NULL); 207 } 208 } else { 209 if (fn_printn(cp, l, snapend)) 210 return(NULL); 211 } 212 213 cp += l; 214 chars_processed += l; 215 putchar('.'); 216 if ((l = labellen(cp)) == (u_int)-1) 217 return(NULL); 218 if (!TTEST2(*cp, 1)) 219 return(NULL); 220 i = *cp++; 221 chars_processed++; 222 if (!compress) 223 rp += l + 1; 224 } 225 else 226 putchar('.'); 227 return (rp); 228 } 229 230 /* print a <character-string> */ 231 static const u_char * 232 ns_cprint(register const u_char *cp) 233 { 234 register u_int i; 235 236 if (!TTEST2(*cp, 1)) 237 return (NULL); 238 i = *cp++; 239 if (fn_printn(cp, i, snapend)) 240 return (NULL); 241 return (cp + i); 242 } 243 244 /* http://www.iana.org/assignments/dns-parameters */ 245 struct tok ns_type2str[] = { 246 { T_A, "A" }, /* RFC 1035 */ 247 { T_NS, "NS" }, /* RFC 1035 */ 248 { T_MD, "MD" }, /* RFC 1035 */ 249 { T_MF, "MF" }, /* RFC 1035 */ 250 { T_CNAME, "CNAME" }, /* RFC 1035 */ 251 { T_SOA, "SOA" }, /* RFC 1035 */ 252 { T_MB, "MB" }, /* RFC 1035 */ 253 { T_MG, "MG" }, /* RFC 1035 */ 254 { T_MR, "MR" }, /* RFC 1035 */ 255 { T_NULL, "NULL" }, /* RFC 1035 */ 256 { T_WKS, "WKS" }, /* RFC 1035 */ 257 { T_PTR, "PTR" }, /* RFC 1035 */ 258 { T_HINFO, "HINFO" }, /* RFC 1035 */ 259 { T_MINFO, "MINFO" }, /* RFC 1035 */ 260 { T_MX, "MX" }, /* RFC 1035 */ 261 { T_TXT, "TXT" }, /* RFC 1035 */ 262 { T_RP, "RP" }, /* RFC 1183 */ 263 { T_AFSDB, "AFSDB" }, /* RFC 1183 */ 264 { T_X25, "X25" }, /* RFC 1183 */ 265 { T_ISDN, "ISDN" }, /* RFC 1183 */ 266 { T_RT, "RT" }, /* RFC 1183 */ 267 { T_NSAP, "NSAP" }, /* RFC 1706 */ 268 { T_NSAP_PTR, "NSAP_PTR" }, 269 { T_SIG, "SIG" }, /* RFC 2535 */ 270 { T_KEY, "KEY" }, /* RFC 2535 */ 271 { T_PX, "PX" }, /* RFC 2163 */ 272 { T_GPOS, "GPOS" }, /* RFC 1712 */ 273 { T_AAAA, "AAAA" }, /* RFC 1886 */ 274 { T_LOC, "LOC" }, /* RFC 1876 */ 275 { T_NXT, "NXT" }, /* RFC 2535 */ 276 { T_EID, "EID" }, /* Nimrod */ 277 { T_NIMLOC, "NIMLOC" }, /* Nimrod */ 278 { T_SRV, "SRV" }, /* RFC 2782 */ 279 { T_ATMA, "ATMA" }, /* ATM Forum */ 280 { T_NAPTR, "NAPTR" }, /* RFC 2168, RFC 2915 */ 281 { T_KX, "KX" }, /* RFC 2230 */ 282 { T_CERT, "CERT" }, /* RFC 2538 */ 283 { T_A6, "A6" }, /* RFC 2874 */ 284 { T_DNAME, "DNAME" }, /* RFC 2672 */ 285 { T_SINK, "SINK" }, 286 { T_OPT, "OPT" }, /* RFC 2671 */ 287 { T_APL, "APL" }, /* RFC 3123 */ 288 { T_DS, "DS" }, /* RFC 4034 */ 289 { T_SSHFP, "SSHFP" }, /* RFC 4255 */ 290 { T_IPSECKEY, "IPSECKEY" }, /* RFC 4025 */ 291 { T_RRSIG, "RRSIG" }, /* RFC 4034 */ 292 { T_NSEC, "NSEC" }, /* RFC 4034 */ 293 { T_DNSKEY, "DNSKEY" }, /* RFC 4034 */ 294 { T_SPF, "SPF" }, /* RFC-schlitt-spf-classic-02.txt */ 295 { T_UINFO, "UINFO" }, 296 { T_UID, "UID" }, 297 { T_GID, "GID" }, 298 { T_UNSPEC, "UNSPEC" }, 299 { T_UNSPECA, "UNSPECA" }, 300 { T_TKEY, "TKEY" }, /* RFC 2930 */ 301 { T_TSIG, "TSIG" }, /* RFC 2845 */ 302 { T_IXFR, "IXFR" }, /* RFC 1995 */ 303 { T_AXFR, "AXFR" }, /* RFC 1035 */ 304 { T_MAILB, "MAILB" }, /* RFC 1035 */ 305 { T_MAILA, "MAILA" }, /* RFC 1035 */ 306 { T_ANY, "ANY" }, 307 { 0, NULL } 308 }; 309 310 struct tok ns_class2str[] = { 311 { C_IN, "IN" }, /* Not used */ 312 { C_CHAOS, "CHAOS" }, 313 { C_HS, "HS" }, 314 { C_ANY, "ANY" }, 315 { 0, NULL } 316 }; 317 318 /* print a query */ 319 static const u_char * 320 ns_qprint(register const u_char *cp, register const u_char *bp, int is_mdns) 321 { 322 register const u_char *np = cp; 323 register u_int i, class; 324 325 cp = ns_nskip(cp); 326 327 if (cp == NULL || !TTEST2(*cp, 4)) 328 return(NULL); 329 330 /* print the qtype */ 331 i = EXTRACT_16BITS(cp); 332 cp += 2; 333 printf(" %s", tok2str(ns_type2str, "Type%d", i)); 334 /* print the qclass (if it's not IN) */ 335 i = EXTRACT_16BITS(cp); 336 cp += 2; 337 if (is_mdns) 338 class = (i & ~C_QU); 339 else 340 class = i; 341 if (class != C_IN) 342 printf(" %s", tok2str(ns_class2str, "(Class %d)", class)); 343 if (is_mdns) { 344 if (i & C_QU) 345 printf(" (QU)"); 346 else 347 printf(" (QM)"); 348 } 349 350 fputs("? ", stdout); 351 cp = ns_nprint(np, bp); 352 return(cp ? cp + 4 : NULL); 353 } 354 355 /* print a reply */ 356 static const u_char * 357 ns_rprint(register const u_char *cp, register const u_char *bp, int is_mdns) 358 { 359 register u_int i, class, opt_flags = 0; 360 register u_short typ, len; 361 register const u_char *rp; 362 363 if (vflag) { 364 putchar(' '); 365 if ((cp = ns_nprint(cp, bp)) == NULL) 366 return NULL; 367 } else 368 cp = ns_nskip(cp); 369 370 if (cp == NULL || !TTEST2(*cp, 10)) 371 return (snapend); 372 373 /* print the type/qtype */ 374 typ = EXTRACT_16BITS(cp); 375 cp += 2; 376 /* print the class (if it's not IN and the type isn't OPT) */ 377 i = EXTRACT_16BITS(cp); 378 cp += 2; 379 if (is_mdns) 380 class = (i & ~C_CACHE_FLUSH); 381 else 382 class = i; 383 if (class != C_IN && typ != T_OPT) 384 printf(" %s", tok2str(ns_class2str, "(Class %d)", class)); 385 if (is_mdns) { 386 if (i & C_CACHE_FLUSH) 387 printf(" (Cache flush)"); 388 } 389 390 /* ignore ttl */ 391 cp += 2; 392 /* if T_OPT, save opt_flags */ 393 if (typ == T_OPT) 394 opt_flags = EXTRACT_16BITS(cp); 395 /* ignore rest of ttl */ 396 cp += 2; 397 398 len = EXTRACT_16BITS(cp); 399 cp += 2; 400 401 rp = cp + len; 402 403 printf(" %s", tok2str(ns_type2str, "Type%d", typ)); 404 if (rp > snapend) 405 return(NULL); 406 407 switch (typ) { 408 case T_A: 409 if (!TTEST2(*cp, sizeof(struct in_addr))) 410 return(NULL); 411 printf(" %s", ipaddr_string(cp)); 412 break; 413 414 case T_NS: 415 case T_CNAME: 416 case T_PTR: 417 #ifdef T_DNAME 418 case T_DNAME: 419 #endif 420 putchar(' '); 421 if (ns_nprint(cp, bp) == NULL) 422 return(NULL); 423 break; 424 425 case T_SOA: 426 if (!vflag) 427 break; 428 putchar(' '); 429 if ((cp = ns_nprint(cp, bp)) == NULL) 430 return(NULL); 431 putchar(' '); 432 if ((cp = ns_nprint(cp, bp)) == NULL) 433 return(NULL); 434 if (!TTEST2(*cp, 5 * 4)) 435 return(NULL); 436 printf(" %u", EXTRACT_32BITS(cp)); 437 cp += 4; 438 printf(" %u", EXTRACT_32BITS(cp)); 439 cp += 4; 440 printf(" %u", EXTRACT_32BITS(cp)); 441 cp += 4; 442 printf(" %u", EXTRACT_32BITS(cp)); 443 cp += 4; 444 printf(" %u", EXTRACT_32BITS(cp)); 445 cp += 4; 446 break; 447 case T_MX: 448 putchar(' '); 449 if (!TTEST2(*cp, 2)) 450 return(NULL); 451 if (ns_nprint(cp + 2, bp) == NULL) 452 return(NULL); 453 printf(" %d", EXTRACT_16BITS(cp)); 454 break; 455 456 case T_TXT: 457 while (cp < rp) { 458 printf(" \""); 459 cp = ns_cprint(cp); 460 if (cp == NULL) 461 return(NULL); 462 putchar('"'); 463 } 464 break; 465 466 case T_SRV: 467 putchar(' '); 468 if (!TTEST2(*cp, 6)) 469 return(NULL); 470 if (ns_nprint(cp + 6, bp) == NULL) 471 return(NULL); 472 printf(":%d %d %d", EXTRACT_16BITS(cp + 4), 473 EXTRACT_16BITS(cp), EXTRACT_16BITS(cp + 2)); 474 break; 475 476 #ifdef INET6 477 case T_AAAA: 478 if (!TTEST2(*cp, sizeof(struct in6_addr))) 479 return(NULL); 480 printf(" %s", ip6addr_string(cp)); 481 break; 482 483 case T_A6: 484 { 485 struct in6_addr a; 486 int pbit, pbyte; 487 488 if (!TTEST2(*cp, 1)) 489 return(NULL); 490 pbit = *cp; 491 pbyte = (pbit & ~7) / 8; 492 if (pbit > 128) { 493 printf(" %u(bad plen)", pbit); 494 break; 495 } else if (pbit < 128) { 496 if (!TTEST2(*(cp + 1), sizeof(a) - pbyte)) 497 return(NULL); 498 memset(&a, 0, sizeof(a)); 499 memcpy(&a.s6_addr[pbyte], cp + 1, sizeof(a) - pbyte); 500 printf(" %u %s", pbit, ip6addr_string(&a)); 501 } 502 if (pbit > 0) { 503 putchar(' '); 504 if (ns_nprint(cp + 1 + sizeof(a) - pbyte, bp) == NULL) 505 return(NULL); 506 } 507 break; 508 } 509 #endif /*INET6*/ 510 511 case T_OPT: 512 printf(" UDPsize=%u", class); 513 if (opt_flags & 0x8000) 514 printf(" OK"); 515 break; 516 517 case T_UNSPECA: /* One long string */ 518 if (!TTEST2(*cp, len)) 519 return(NULL); 520 if (fn_printn(cp, len, snapend)) 521 return(NULL); 522 break; 523 524 case T_TSIG: 525 { 526 if (cp + len > snapend) 527 return(NULL); 528 if (!vflag) 529 break; 530 putchar(' '); 531 if ((cp = ns_nprint(cp, bp)) == NULL) 532 return(NULL); 533 cp += 6; 534 if (!TTEST2(*cp, 2)) 535 return(NULL); 536 printf(" fudge=%u", EXTRACT_16BITS(cp)); 537 cp += 2; 538 if (!TTEST2(*cp, 2)) 539 return(NULL); 540 printf(" maclen=%u", EXTRACT_16BITS(cp)); 541 cp += 2 + EXTRACT_16BITS(cp); 542 if (!TTEST2(*cp, 2)) 543 return(NULL); 544 printf(" origid=%u", EXTRACT_16BITS(cp)); 545 cp += 2; 546 if (!TTEST2(*cp, 2)) 547 return(NULL); 548 printf(" error=%u", EXTRACT_16BITS(cp)); 549 cp += 2; 550 if (!TTEST2(*cp, 2)) 551 return(NULL); 552 printf(" otherlen=%u", EXTRACT_16BITS(cp)); 553 cp += 2; 554 } 555 } 556 return (rp); /* XXX This isn't always right */ 557 } 558 559 void 560 ns_print(register const u_char *bp, u_int length, int is_mdns) 561 { 562 register const HEADER *np; 563 register int qdcount, ancount, nscount, arcount; 564 register const u_char *cp; 565 u_int16_t b2; 566 567 np = (const HEADER *)bp; 568 TCHECK(*np); 569 /* get the byte-order right */ 570 qdcount = EXTRACT_16BITS(&np->qdcount); 571 ancount = EXTRACT_16BITS(&np->ancount); 572 nscount = EXTRACT_16BITS(&np->nscount); 573 arcount = EXTRACT_16BITS(&np->arcount); 574 575 if (DNS_QR(np)) { 576 /* this is a response */ 577 printf("%d%s%s%s%s%s%s", 578 EXTRACT_16BITS(&np->id), 579 ns_ops[DNS_OPCODE(np)], 580 ns_resp[DNS_RCODE(np)], 581 DNS_AA(np)? "*" : "", 582 DNS_RA(np)? "" : "-", 583 DNS_TC(np)? "|" : "", 584 DNS_AD(np)? "$" : ""); 585 586 if (qdcount != 1) 587 printf(" [%dq]", qdcount); 588 /* Print QUESTION section on -vv */ 589 cp = (const u_char *)(np + 1); 590 while (qdcount--) { 591 if (qdcount < EXTRACT_16BITS(&np->qdcount) - 1) 592 putchar(','); 593 if (vflag > 1) { 594 fputs(" q:", stdout); 595 if ((cp = ns_qprint(cp, bp, is_mdns)) == NULL) 596 goto trunc; 597 } else { 598 if ((cp = ns_nskip(cp)) == NULL) 599 goto trunc; 600 cp += 4; /* skip QTYPE and QCLASS */ 601 } 602 } 603 printf(" %d/%d/%d", ancount, nscount, arcount); 604 if (ancount--) { 605 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 606 goto trunc; 607 while (cp < snapend && ancount--) { 608 putchar(','); 609 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 610 goto trunc; 611 } 612 } 613 if (ancount > 0) 614 goto trunc; 615 /* Print NS and AR sections on -vv */ 616 if (vflag > 1) { 617 if (cp < snapend && nscount--) { 618 fputs(" ns:", stdout); 619 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 620 goto trunc; 621 while (cp < snapend && nscount--) { 622 putchar(','); 623 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 624 goto trunc; 625 } 626 } 627 if (nscount > 0) 628 goto trunc; 629 if (cp < snapend && arcount--) { 630 fputs(" ar:", stdout); 631 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 632 goto trunc; 633 while (cp < snapend && arcount--) { 634 putchar(','); 635 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 636 goto trunc; 637 } 638 } 639 if (arcount > 0) 640 goto trunc; 641 } 642 } 643 else { 644 /* this is a request */ 645 printf("%d%s%s%s", EXTRACT_16BITS(&np->id), ns_ops[DNS_OPCODE(np)], 646 DNS_RD(np) ? "+" : "", 647 DNS_CD(np) ? "%" : ""); 648 649 /* any weirdness? */ 650 b2 = EXTRACT_16BITS(((u_short *)np)+1); 651 if (b2 & 0x6cf) 652 printf(" [b2&3=0x%x]", b2); 653 654 if (DNS_OPCODE(np) == IQUERY) { 655 if (qdcount) 656 printf(" [%dq]", qdcount); 657 if (ancount != 1) 658 printf(" [%da]", ancount); 659 } 660 else { 661 if (ancount) 662 printf(" [%da]", ancount); 663 if (qdcount != 1) 664 printf(" [%dq]", qdcount); 665 } 666 if (nscount) 667 printf(" [%dn]", nscount); 668 if (arcount) 669 printf(" [%dau]", arcount); 670 671 cp = (const u_char *)(np + 1); 672 if (qdcount--) { 673 cp = ns_qprint(cp, (const u_char *)np, is_mdns); 674 if (!cp) 675 goto trunc; 676 while (cp < snapend && qdcount--) { 677 cp = ns_qprint((const u_char *)cp, 678 (const u_char *)np, 679 is_mdns); 680 if (!cp) 681 goto trunc; 682 } 683 } 684 if (qdcount > 0) 685 goto trunc; 686 687 /* Print remaining sections on -vv */ 688 if (vflag > 1) { 689 if (ancount--) { 690 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 691 goto trunc; 692 while (cp < snapend && ancount--) { 693 putchar(','); 694 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 695 goto trunc; 696 } 697 } 698 if (ancount > 0) 699 goto trunc; 700 if (cp < snapend && nscount--) { 701 fputs(" ns:", stdout); 702 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 703 goto trunc; 704 while (nscount-- && cp < snapend) { 705 putchar(','); 706 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 707 goto trunc; 708 } 709 } 710 if (nscount > 0) 711 goto trunc; 712 if (cp < snapend && arcount--) { 713 fputs(" ar:", stdout); 714 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 715 goto trunc; 716 while (cp < snapend && arcount--) { 717 putchar(','); 718 if ((cp = ns_rprint(cp, bp, is_mdns)) == NULL) 719 goto trunc; 720 } 721 } 722 if (arcount > 0) 723 goto trunc; 724 } 725 } 726 printf(" (%d)", length); 727 return; 728 729 trunc: 730 printf("[|domain]"); 731 return; 732 } 733