summaryrefslogtreecommitdiff
path: root/print-domain.c
diff options
context:
space:
mode:
Diffstat (limited to 'print-domain.c')
-rw-r--r--print-domain.c748
1 files changed, 748 insertions, 0 deletions
diff --git a/print-domain.c b/print-domain.c
new file mode 100644
index 000000000000..d0b6996fda2f
--- /dev/null
+++ b/print-domain.c
@@ -0,0 +1,748 @@
+/*
+ * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
+ * The Regents of the University of California. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that: (1) source code distributions
+ * retain the above copyright notice and this paragraph in its entirety, (2)
+ * distributions including binary code include the above copyright notice and
+ * this paragraph in its entirety in the documentation or other materials
+ * provided with the distribution, and (3) all advertising materials mentioning
+ * features or use of this software display the following acknowledgement:
+ * ``This product includes software developed by the University of California,
+ * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
+ * the University nor the names of its contributors may be used to endorse
+ * or promote products derived from this software without specific prior
+ * written permission.
+ * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
+ * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
+ * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
+ */
+
+/* \summary: Domain Name System (DNS) printer */
+
+#ifdef HAVE_CONFIG_H
+#include "config.h"
+#endif
+
+#include <netdissect-stdinc.h>
+
+#include "nameser.h"
+
+#include <string.h>
+
+#include "netdissect.h"
+#include "addrtoname.h"
+#include "addrtostr.h"
+#include "extract.h"
+
+static const char *ns_ops[] = {
+ "", " inv_q", " stat", " op3", " notify", " update", " op6", " op7",
+ " op8", " updateA", " updateD", " updateDA",
+ " updateM", " updateMA", " zoneInit", " zoneRef",
+};
+
+static const char *ns_resp[] = {
+ "", " FormErr", " ServFail", " NXDomain",
+ " NotImp", " Refused", " YXDomain", " YXRRSet",
+ " NXRRSet", " NotAuth", " NotZone", " Resp11",
+ " Resp12", " Resp13", " Resp14", " NoChange",
+};
+
+/* skip over a domain name */
+static const u_char *
+ns_nskip(netdissect_options *ndo,
+ register const u_char *cp)
+{
+ register u_char i;
+
+ if (!ND_TTEST2(*cp, 1))
+ return (NULL);
+ i = *cp++;
+ while (i) {
+ if ((i & INDIR_MASK) == INDIR_MASK)
+ return (cp + 1);
+ if ((i & INDIR_MASK) == EDNS0_MASK) {
+ int bitlen, bytelen;
+
+ if ((i & ~INDIR_MASK) != EDNS0_ELT_BITLABEL)
+ return(NULL); /* unknown ELT */
+ if (!ND_TTEST2(*cp, 1))
+ return (NULL);
+ if ((bitlen = *cp++) == 0)
+ bitlen = 256;
+ bytelen = (bitlen + 7) / 8;
+ cp += bytelen;
+ } else
+ cp += i;
+ if (!ND_TTEST2(*cp, 1))
+ return (NULL);
+ i = *cp++;
+ }
+ return (cp);
+}
+
+/* print a <domain-name> */
+static const u_char *
+blabel_print(netdissect_options *ndo,
+ const u_char *cp)
+{
+ int bitlen, slen, b;
+ const u_char *bitp, *lim;
+ char tc;
+
+ if (!ND_TTEST2(*cp, 1))
+ return(NULL);
+ if ((bitlen = *cp) == 0)
+ bitlen = 256;
+ slen = (bitlen + 3) / 4;
+ lim = cp + 1 + slen;
+
+ /* print the bit string as a hex string */
+ ND_PRINT((ndo, "\\[x"));
+ for (bitp = cp + 1, b = bitlen; bitp < lim && b > 7; b -= 8, bitp++) {
+ ND_TCHECK(*bitp);
+ ND_PRINT((ndo, "%02x", *bitp));
+ }
+ if (b > 4) {
+ ND_TCHECK(*bitp);
+ tc = *bitp++;
+ ND_PRINT((ndo, "%02x", tc & (0xff << (8 - b))));
+ } else if (b > 0) {
+ ND_TCHECK(*bitp);
+ tc = *bitp++;
+ ND_PRINT((ndo, "%1x", ((tc >> 4) & 0x0f) & (0x0f << (4 - b))));
+ }
+ ND_PRINT((ndo, "/%d]", bitlen));
+ return lim;
+trunc:
+ ND_PRINT((ndo, ".../%d]", bitlen));
+ return NULL;
+}
+
+static int
+labellen(netdissect_options *ndo,
+ const u_char *cp)
+{
+ register u_int i;
+
+ if (!ND_TTEST2(*cp, 1))
+ return(-1);
+ i = *cp;
+ if ((i & INDIR_MASK) == EDNS0_MASK) {
+ int bitlen, elt;
+ if ((elt = (i & ~INDIR_MASK)) != EDNS0_ELT_BITLABEL) {
+ ND_PRINT((ndo, "<ELT %d>", elt));
+ return(-1);
+ }
+ if (!ND_TTEST2(*(cp + 1), 1))
+ return(-1);
+ if ((bitlen = *(cp + 1)) == 0)
+ bitlen = 256;
+ return(((bitlen + 7) / 8) + 1);
+ } else
+ return(i);
+}
+
+const u_char *
+ns_nprint(netdissect_options *ndo,
+ register const u_char *cp, register const u_char *bp)
+{
+ register u_int i, l;
+ register const u_char *rp = NULL;
+ register int compress = 0;
+ int chars_processed;
+ int elt;
+ int data_size = ndo->ndo_snapend - bp;
+
+ if ((l = labellen(ndo, cp)) == (u_int)-1)
+ return(NULL);
+ if (!ND_TTEST2(*cp, 1))
+ return(NULL);
+ chars_processed = 1;
+ if (((i = *cp++) & INDIR_MASK) != INDIR_MASK) {
+ compress = 0;
+ rp = cp + l;
+ }
+
+ if (i != 0)
+ while (i && cp < ndo->ndo_snapend) {
+ if ((i & INDIR_MASK) == INDIR_MASK) {
+ if (!compress) {
+ rp = cp + 1;
+ compress = 1;
+ }
+ if (!ND_TTEST2(*cp, 1))
+ return(NULL);
+ cp = bp + (((i << 8) | *cp) & 0x3fff);
+ if ((l = labellen(ndo, cp)) == (u_int)-1)
+ return(NULL);
+ if (!ND_TTEST2(*cp, 1))
+ return(NULL);
+ i = *cp++;
+ chars_processed++;
+
+ /*
+ * If we've looked at every character in
+ * the message, this pointer will make
+ * us look at some character again,
+ * which means we're looping.
+ */
+ if (chars_processed >= data_size) {
+ ND_PRINT((ndo, "<LOOP>"));
+ return (NULL);
+ }
+ continue;
+ }
+ if ((i & INDIR_MASK) == EDNS0_MASK) {
+ elt = (i & ~INDIR_MASK);
+ switch(elt) {
+ case EDNS0_ELT_BITLABEL:
+ if (blabel_print(ndo, cp) == NULL)
+ return (NULL);
+ break;
+ default:
+ /* unknown ELT */
+ ND_PRINT((ndo, "<ELT %d>", elt));
+ return(NULL);
+ }
+ } else {
+ if (fn_printn(ndo, cp, l, ndo->ndo_snapend))
+ return(NULL);
+ }
+
+ cp += l;
+ chars_processed += l;
+ ND_PRINT((ndo, "."));
+ if ((l = labellen(ndo, cp)) == (u_int)-1)
+ return(NULL);
+ if (!ND_TTEST2(*cp, 1))
+ return(NULL);
+ i = *cp++;
+ chars_processed++;
+ if (!compress)
+ rp += l + 1;
+ }
+ else
+ ND_PRINT((ndo, "."));
+ return (rp);
+}
+
+/* print a <character-string> */
+static const u_char *
+ns_cprint(netdissect_options *ndo,
+ register const u_char *cp)
+{
+ register u_int i;
+
+ if (!ND_TTEST2(*cp, 1))
+ return (NULL);
+ i = *cp++;
+ if (fn_printn(ndo, cp, i, ndo->ndo_snapend))
+ return (NULL);
+ return (cp + i);
+}
+
+/* http://www.iana.org/assignments/dns-parameters */
+const struct tok ns_type2str[] = {
+ { T_A, "A" }, /* RFC 1035 */
+ { T_NS, "NS" }, /* RFC 1035 */
+ { T_MD, "MD" }, /* RFC 1035 */
+ { T_MF, "MF" }, /* RFC 1035 */
+ { T_CNAME, "CNAME" }, /* RFC 1035 */
+ { T_SOA, "SOA" }, /* RFC 1035 */
+ { T_MB, "MB" }, /* RFC 1035 */
+ { T_MG, "MG" }, /* RFC 1035 */
+ { T_MR, "MR" }, /* RFC 1035 */
+ { T_NULL, "NULL" }, /* RFC 1035 */
+ { T_WKS, "WKS" }, /* RFC 1035 */
+ { T_PTR, "PTR" }, /* RFC 1035 */
+ { T_HINFO, "HINFO" }, /* RFC 1035 */
+ { T_MINFO, "MINFO" }, /* RFC 1035 */
+ { T_MX, "MX" }, /* RFC 1035 */
+ { T_TXT, "TXT" }, /* RFC 1035 */
+ { T_RP, "RP" }, /* RFC 1183 */
+ { T_AFSDB, "AFSDB" }, /* RFC 1183 */
+ { T_X25, "X25" }, /* RFC 1183 */
+ { T_ISDN, "ISDN" }, /* RFC 1183 */
+ { T_RT, "RT" }, /* RFC 1183 */
+ { T_NSAP, "NSAP" }, /* RFC 1706 */
+ { T_NSAP_PTR, "NSAP_PTR" },
+ { T_SIG, "SIG" }, /* RFC 2535 */
+ { T_KEY, "KEY" }, /* RFC 2535 */
+ { T_PX, "PX" }, /* RFC 2163 */
+ { T_GPOS, "GPOS" }, /* RFC 1712 */
+ { T_AAAA, "AAAA" }, /* RFC 1886 */
+ { T_LOC, "LOC" }, /* RFC 1876 */
+ { T_NXT, "NXT" }, /* RFC 2535 */
+ { T_EID, "EID" }, /* Nimrod */
+ { T_NIMLOC, "NIMLOC" }, /* Nimrod */
+ { T_SRV, "SRV" }, /* RFC 2782 */
+ { T_ATMA, "ATMA" }, /* ATM Forum */
+ { T_NAPTR, "NAPTR" }, /* RFC 2168, RFC 2915 */
+ { T_KX, "KX" }, /* RFC 2230 */
+ { T_CERT, "CERT" }, /* RFC 2538 */
+ { T_A6, "A6" }, /* RFC 2874 */
+ { T_DNAME, "DNAME" }, /* RFC 2672 */
+ { T_SINK, "SINK" },
+ { T_OPT, "OPT" }, /* RFC 2671 */
+ { T_APL, "APL" }, /* RFC 3123 */
+ { T_DS, "DS" }, /* RFC 4034 */
+ { T_SSHFP, "SSHFP" }, /* RFC 4255 */
+ { T_IPSECKEY, "IPSECKEY" }, /* RFC 4025 */
+ { T_RRSIG, "RRSIG" }, /* RFC 4034 */
+ { T_NSEC, "NSEC" }, /* RFC 4034 */
+ { T_DNSKEY, "DNSKEY" }, /* RFC 4034 */
+ { T_SPF, "SPF" }, /* RFC-schlitt-spf-classic-02.txt */
+ { T_UINFO, "UINFO" },
+ { T_UID, "UID" },
+ { T_GID, "GID" },
+ { T_UNSPEC, "UNSPEC" },
+ { T_UNSPECA, "UNSPECA" },
+ { T_TKEY, "TKEY" }, /* RFC 2930 */
+ { T_TSIG, "TSIG" }, /* RFC 2845 */
+ { T_IXFR, "IXFR" }, /* RFC 1995 */
+ { T_AXFR, "AXFR" }, /* RFC 1035 */
+ { T_MAILB, "MAILB" }, /* RFC 1035 */
+ { T_MAILA, "MAILA" }, /* RFC 1035 */
+ { T_ANY, "ANY" },
+ { 0, NULL }
+};
+
+const struct tok ns_class2str[] = {
+ { C_IN, "IN" }, /* Not used */
+ { C_CHAOS, "CHAOS" },
+ { C_HS, "HS" },
+ { C_ANY, "ANY" },
+ { 0, NULL }
+};
+
+/* print a query */
+static const u_char *
+ns_qprint(netdissect_options *ndo,
+ register const u_char *cp, register const u_char *bp, int is_mdns)
+{
+ register const u_char *np = cp;
+ register u_int i, class;
+
+ cp = ns_nskip(ndo, cp);
+
+ if (cp == NULL || !ND_TTEST2(*cp, 4))
+ return(NULL);
+
+ /* print the qtype */
+ i = EXTRACT_16BITS(cp);
+ cp += 2;
+ ND_PRINT((ndo, " %s", tok2str(ns_type2str, "Type%d", i)));
+ /* print the qclass (if it's not IN) */
+ i = EXTRACT_16BITS(cp);
+ cp += 2;
+ if (is_mdns)
+ class = (i & ~C_QU);
+ else
+ class = i;
+ if (class != C_IN)
+ ND_PRINT((ndo, " %s", tok2str(ns_class2str, "(Class %d)", class)));
+ if (is_mdns) {
+ ND_PRINT((ndo, i & C_QU ? " (QU)" : " (QM)"));
+ }
+
+ ND_PRINT((ndo, "? "));
+ cp = ns_nprint(ndo, np, bp);
+ return(cp ? cp + 4 : NULL);
+}
+
+/* print a reply */
+static const u_char *
+ns_rprint(netdissect_options *ndo,
+ register const u_char *cp, register const u_char *bp, int is_mdns)
+{
+ register u_int i, class, opt_flags = 0;
+ register u_short typ, len;
+ register const u_char *rp;
+
+ if (ndo->ndo_vflag) {
+ ND_PRINT((ndo, " "));
+ if ((cp = ns_nprint(ndo, cp, bp)) == NULL)
+ return NULL;
+ } else
+ cp = ns_nskip(ndo, cp);
+
+ if (cp == NULL || !ND_TTEST2(*cp, 10))
+ return (ndo->ndo_snapend);
+
+ /* print the type/qtype */
+ typ = EXTRACT_16BITS(cp);
+ cp += 2;
+ /* print the class (if it's not IN and the type isn't OPT) */
+ i = EXTRACT_16BITS(cp);
+ cp += 2;
+ if (is_mdns)
+ class = (i & ~C_CACHE_FLUSH);
+ else
+ class = i;
+ if (class != C_IN && typ != T_OPT)
+ ND_PRINT((ndo, " %s", tok2str(ns_class2str, "(Class %d)", class)));
+ if (is_mdns) {
+ if (i & C_CACHE_FLUSH)
+ ND_PRINT((ndo, " (Cache flush)"));
+ }
+
+ if (typ == T_OPT) {
+ /* get opt flags */
+ cp += 2;
+ opt_flags = EXTRACT_16BITS(cp);
+ /* ignore rest of ttl field */
+ cp += 2;
+ } else if (ndo->ndo_vflag > 2) {
+ /* print ttl */
+ ND_PRINT((ndo, " ["));
+ unsigned_relts_print(ndo, EXTRACT_32BITS(cp));
+ ND_PRINT((ndo, "]"));
+ cp += 4;
+ } else {
+ /* ignore ttl */
+ cp += 4;
+ }
+
+ len = EXTRACT_16BITS(cp);
+ cp += 2;
+
+ rp = cp + len;
+
+ ND_PRINT((ndo, " %s", tok2str(ns_type2str, "Type%d", typ)));
+ if (rp > ndo->ndo_snapend)
+ return(NULL);
+
+ switch (typ) {
+ case T_A:
+ if (!ND_TTEST2(*cp, sizeof(struct in_addr)))
+ return(NULL);
+ ND_PRINT((ndo, " %s", intoa(htonl(EXTRACT_32BITS(cp)))));
+ break;
+
+ case T_NS:
+ case T_CNAME:
+ case T_PTR:
+#ifdef T_DNAME
+ case T_DNAME:
+#endif
+ ND_PRINT((ndo, " "));
+ if (ns_nprint(ndo, cp, bp) == NULL)
+ return(NULL);
+ break;
+
+ case T_SOA:
+ if (!ndo->ndo_vflag)
+ break;
+ ND_PRINT((ndo, " "));
+ if ((cp = ns_nprint(ndo, cp, bp)) == NULL)
+ return(NULL);
+ ND_PRINT((ndo, " "));
+ if ((cp = ns_nprint(ndo, cp, bp)) == NULL)
+ return(NULL);
+ if (!ND_TTEST2(*cp, 5 * 4))
+ return(NULL);
+ ND_PRINT((ndo, " %u", EXTRACT_32BITS(cp)));
+ cp += 4;
+ ND_PRINT((ndo, " %u", EXTRACT_32BITS(cp)));
+ cp += 4;
+ ND_PRINT((ndo, " %u", EXTRACT_32BITS(cp)));
+ cp += 4;
+ ND_PRINT((ndo, " %u", EXTRACT_32BITS(cp)));
+ cp += 4;
+ ND_PRINT((ndo, " %u", EXTRACT_32BITS(cp)));
+ cp += 4;
+ break;
+ case T_MX:
+ ND_PRINT((ndo, " "));
+ if (!ND_TTEST2(*cp, 2))
+ return(NULL);
+ if (ns_nprint(ndo, cp + 2, bp) == NULL)
+ return(NULL);
+ ND_PRINT((ndo, " %d", EXTRACT_16BITS(cp)));
+ break;
+
+ case T_TXT:
+ while (cp < rp) {
+ ND_PRINT((ndo, " \""));
+ cp = ns_cprint(ndo, cp);
+ if (cp == NULL)
+ return(NULL);
+ ND_PRINT((ndo, "\""));
+ }
+ break;
+
+ case T_SRV:
+ ND_PRINT((ndo, " "));
+ if (!ND_TTEST2(*cp, 6))
+ return(NULL);
+ if (ns_nprint(ndo, cp + 6, bp) == NULL)
+ return(NULL);
+ ND_PRINT((ndo, ":%d %d %d", EXTRACT_16BITS(cp + 4),
+ EXTRACT_16BITS(cp), EXTRACT_16BITS(cp + 2)));
+ break;
+
+ case T_AAAA:
+ {
+ char ntop_buf[INET6_ADDRSTRLEN];
+
+ if (!ND_TTEST2(*cp, sizeof(struct in6_addr)))
+ return(NULL);
+ ND_PRINT((ndo, " %s",
+ addrtostr6(cp, ntop_buf, sizeof(ntop_buf))));
+
+ break;
+ }
+
+ case T_A6:
+ {
+ struct in6_addr a;
+ int pbit, pbyte;
+ char ntop_buf[INET6_ADDRSTRLEN];
+
+ if (!ND_TTEST2(*cp, 1))
+ return(NULL);
+ pbit = *cp;
+ pbyte = (pbit & ~7) / 8;
+ if (pbit > 128) {
+ ND_PRINT((ndo, " %u(bad plen)", pbit));
+ break;
+ } else if (pbit < 128) {
+ if (!ND_TTEST2(*(cp + 1), sizeof(a) - pbyte))
+ return(NULL);
+ memset(&a, 0, sizeof(a));
+ memcpy(&a.s6_addr[pbyte], cp + 1, sizeof(a) - pbyte);
+ ND_PRINT((ndo, " %u %s", pbit,
+ addrtostr6(&a, ntop_buf, sizeof(ntop_buf))));
+ }
+ if (pbit > 0) {
+ ND_PRINT((ndo, " "));
+ if (ns_nprint(ndo, cp + 1 + sizeof(a) - pbyte, bp) == NULL)
+ return(NULL);
+ }
+ break;
+ }
+
+ case T_OPT:
+ ND_PRINT((ndo, " UDPsize=%u", class));
+ if (opt_flags & 0x8000)
+ ND_PRINT((ndo, " DO"));
+ break;
+
+ case T_UNSPECA: /* One long string */
+ if (!ND_TTEST2(*cp, len))
+ return(NULL);
+ if (fn_printn(ndo, cp, len, ndo->ndo_snapend))
+ return(NULL);
+ break;
+
+ case T_TSIG:
+ {
+ if (cp + len > ndo->ndo_snapend)
+ return(NULL);
+ if (!ndo->ndo_vflag)
+ break;
+ ND_PRINT((ndo, " "));
+ if ((cp = ns_nprint(ndo, cp, bp)) == NULL)
+ return(NULL);
+ cp += 6;
+ if (!ND_TTEST2(*cp, 2))
+ return(NULL);
+ ND_PRINT((ndo, " fudge=%u", EXTRACT_16BITS(cp)));
+ cp += 2;
+ if (!ND_TTEST2(*cp, 2))
+ return(NULL);
+ ND_PRINT((ndo, " maclen=%u", EXTRACT_16BITS(cp)));
+ cp += 2 + EXTRACT_16BITS(cp);
+ if (!ND_TTEST2(*cp, 2))
+ return(NULL);
+ ND_PRINT((ndo, " origid=%u", EXTRACT_16BITS(cp)));
+ cp += 2;
+ if (!ND_TTEST2(*cp, 2))
+ return(NULL);
+ ND_PRINT((ndo, " error=%u", EXTRACT_16BITS(cp)));
+ cp += 2;
+ if (!ND_TTEST2(*cp, 2))
+ return(NULL);
+ ND_PRINT((ndo, " otherlen=%u", EXTRACT_16BITS(cp)));
+ cp += 2;
+ }
+ }
+ return (rp); /* XXX This isn't always right */
+}
+
+void
+ns_print(netdissect_options *ndo,
+ register const u_char *bp, u_int length, int is_mdns)
+{
+ register const HEADER *np;
+ register int qdcount, ancount, nscount, arcount;
+ register const u_char *cp;
+ uint16_t b2;
+
+ np = (const HEADER *)bp;
+ ND_TCHECK(*np);
+ /* get the byte-order right */
+ qdcount = EXTRACT_16BITS(&np->qdcount);
+ ancount = EXTRACT_16BITS(&np->ancount);
+ nscount = EXTRACT_16BITS(&np->nscount);
+ arcount = EXTRACT_16BITS(&np->arcount);
+
+ if (DNS_QR(np)) {
+ /* this is a response */
+ ND_PRINT((ndo, "%d%s%s%s%s%s%s",
+ EXTRACT_16BITS(&np->id),
+ ns_ops[DNS_OPCODE(np)],
+ ns_resp[DNS_RCODE(np)],
+ DNS_AA(np)? "*" : "",
+ DNS_RA(np)? "" : "-",
+ DNS_TC(np)? "|" : "",
+ DNS_AD(np)? "$" : ""));
+
+ if (qdcount != 1)
+ ND_PRINT((ndo, " [%dq]", qdcount));
+ /* Print QUESTION section on -vv */
+ cp = (const u_char *)(np + 1);
+ while (qdcount--) {
+ if (qdcount < EXTRACT_16BITS(&np->qdcount) - 1)
+ ND_PRINT((ndo, ","));
+ if (ndo->ndo_vflag > 1) {
+ ND_PRINT((ndo, " q:"));
+ if ((cp = ns_qprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ } else {
+ if ((cp = ns_nskip(ndo, cp)) == NULL)
+ goto trunc;
+ cp += 4; /* skip QTYPE and QCLASS */
+ }
+ }
+ ND_PRINT((ndo, " %d/%d/%d", ancount, nscount, arcount));
+ if (ancount--) {
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ while (cp < ndo->ndo_snapend && ancount--) {
+ ND_PRINT((ndo, ","));
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ }
+ }
+ if (ancount > 0)
+ goto trunc;
+ /* Print NS and AR sections on -vv */
+ if (ndo->ndo_vflag > 1) {
+ if (cp < ndo->ndo_snapend && nscount--) {
+ ND_PRINT((ndo, " ns:"));
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ while (cp < ndo->ndo_snapend && nscount--) {
+ ND_PRINT((ndo, ","));
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ }
+ }
+ if (nscount > 0)
+ goto trunc;
+ if (cp < ndo->ndo_snapend && arcount--) {
+ ND_PRINT((ndo, " ar:"));
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ while (cp < ndo->ndo_snapend && arcount--) {
+ ND_PRINT((ndo, ","));
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ }
+ }
+ if (arcount > 0)
+ goto trunc;
+ }
+ }
+ else {
+ /* this is a request */
+ ND_PRINT((ndo, "%d%s%s%s", EXTRACT_16BITS(&np->id), ns_ops[DNS_OPCODE(np)],
+ DNS_RD(np) ? "+" : "",
+ DNS_CD(np) ? "%" : ""));
+
+ /* any weirdness? */
+ b2 = EXTRACT_16BITS(((const u_short *)np)+1);
+ if (b2 & 0x6cf)
+ ND_PRINT((ndo, " [b2&3=0x%x]", b2));
+
+ if (DNS_OPCODE(np) == IQUERY) {
+ if (qdcount)
+ ND_PRINT((ndo, " [%dq]", qdcount));
+ if (ancount != 1)
+ ND_PRINT((ndo, " [%da]", ancount));
+ }
+ else {
+ if (ancount)
+ ND_PRINT((ndo, " [%da]", ancount));
+ if (qdcount != 1)
+ ND_PRINT((ndo, " [%dq]", qdcount));
+ }
+ if (nscount)
+ ND_PRINT((ndo, " [%dn]", nscount));
+ if (arcount)
+ ND_PRINT((ndo, " [%dau]", arcount));
+
+ cp = (const u_char *)(np + 1);
+ if (qdcount--) {
+ cp = ns_qprint(ndo, cp, (const u_char *)np, is_mdns);
+ if (!cp)
+ goto trunc;
+ while (cp < ndo->ndo_snapend && qdcount--) {
+ cp = ns_qprint(ndo, (const u_char *)cp,
+ (const u_char *)np,
+ is_mdns);
+ if (!cp)
+ goto trunc;
+ }
+ }
+ if (qdcount > 0)
+ goto trunc;
+
+ /* Print remaining sections on -vv */
+ if (ndo->ndo_vflag > 1) {
+ if (ancount--) {
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ while (cp < ndo->ndo_snapend && ancount--) {
+ ND_PRINT((ndo, ","));
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ }
+ }
+ if (ancount > 0)
+ goto trunc;
+ if (cp < ndo->ndo_snapend && nscount--) {
+ ND_PRINT((ndo, " ns:"));
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ while (nscount-- && cp < ndo->ndo_snapend) {
+ ND_PRINT((ndo, ","));
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ }
+ }
+ if (nscount > 0)
+ goto trunc;
+ if (cp < ndo->ndo_snapend && arcount--) {
+ ND_PRINT((ndo, " ar:"));
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ while (cp < ndo->ndo_snapend && arcount--) {
+ ND_PRINT((ndo, ","));
+ if ((cp = ns_rprint(ndo, cp, bp, is_mdns)) == NULL)
+ goto trunc;
+ }
+ }
+ if (arcount > 0)
+ goto trunc;
+ }
+ }
+ ND_PRINT((ndo, " (%d)", length));
+ return;
+
+ trunc:
+ ND_PRINT((ndo, "[|domain]"));
+}