Lines Matching +full:un +full:- +full:padded
26 #include "netdissect-stdinc.h"
127 for (bitp = cp + 1, b = bitlen; bitp < lim && b > 7; b -= 8, bitp++) { in blabel_print()
133 ND_PRINT("%02x", tc & (0xff << (8 - b))); in blabel_print()
137 ND_PRINT("%1x", ((tc >> 4) & 0x0f) & (0x0f << (4 - b))); in blabel_print()
150 return(-1); in labellen()
158 return(-1); in labellen()
161 return(-1); in labellen()
177 return(-1); in labellen()
181 /* print a <domain-name> */
193 if ((l = labellen(ndo, cp)) == (u_int)-1) in fqdn_print()
197 max_offset = (u_int)(cp - bp); in fqdn_print()
206 while (i && cp < ndo->ndo_snapend) { in fqdn_print()
236 if ((l = labellen(ndo, cp)) == (u_int)-1) in fqdn_print()
261 if (nd_printn(ndo, cp, l, ndo->ndo_snapend)) in fqdn_print()
265 MAXCDNAME - name_chars, ndo->ndo_snapend)) in fqdn_print()
279 if ((l = labellen(ndo, cp)) == (u_int)-1) in fqdn_print()
292 /* print a <character-string> */
303 if (nd_printn(ndo, cp, i, ndo->ndo_snapend)) in ns_cprint()
314 u_char padded[32]; in print_eopt_ecs() local
339 if (data_len - 4 > (addr_bits / 8)) { in print_eopt_ecs()
344 if (src_len > addr_bits || scope_len > addr_bits || ((src_len + 7) / 8) != (data_len - 4)) { in print_eopt_ecs()
350 memset(padded, 0, sizeof(padded)); in print_eopt_ecs()
351 memcpy(padded, cp, data_len - 4); in print_eopt_ecs()
355 ND_PRINT("%s/%d/%d", addrtostr(padded, addr, INET_ADDRSTRLEN), in print_eopt_ecs()
358 ND_PRINT("%s/%d/%d", addrtostr6(padded, addr, INET6_ADDRSTRLEN), in print_eopt_ecs()
369 /* print an <EDNS-option> */
459 /* intentional fall-through. NSID is an undefined byte string */ in eopt_print()
477 /* https://www.iana.org/assignments/dns-parameters */
594 { E_KEYTAG, "KEY-TAG" },
595 { E_CLIENTTAG, "CLIENT-TAG" },
596 { E_SERVERTAG, "SERVER-TAG" },
606 { A_DSA_NSEC3_SHA1, "DSA-NSEC3-SHA1" },
607 { A_RSASHA1_NSEC3_SHA1, "RSASHA1-NSEC3-SHA1" },
610 { A_ECC_GOST, "ECC-GOST" },
622 { DS_SHA1, "SHA-1" },
623 { DS_SHA256,"SHA-256" },
624 { DS_GOST, "GOST_R_34.11-94" },
625 { DS_SHA384,"SHA-384" },
630 { NSEC_SHA1,"SHA-1" },
678 if (ndo->ndo_vflag) { in ns_rprint()
686 return (ndo->ndo_snapend); in ns_rprint()
711 } else if (ndo->ndo_vflag > 2) { in ns_rprint()
728 if (rp > ndo->ndo_snapend) in ns_rprint()
748 if (!ndo->ndo_vflag) in ns_rprint()
825 GET_CPY_BYTES(a + pbyte, cp + 1, sizeof(a) - pbyte); in ns_rprint()
831 if (fqdn_print(ndo, cp + 1 + sizeof(a) - pbyte, bp) == NULL) in ns_rprint()
845 if (nd_printn(ndo, cp + 4, len - 4, ndo->ndo_snapend)) in ns_rprint()
868 if (cp + len > ndo->ndo_snapend) in ns_rprint()
870 if (!ndo->ndo_vflag) in ns_rprint()
912 ndo->ndo_protocol = "domain"; in domain_print()
918 * length field. (RFC 1035 - 4.2.2. TCP usage) in domain_print()
925 length -= 2; /* excluding the two byte length field */ in domain_print()
951 flags = GET_BE_U_2(np->flags); in domain_print()
952 /* get the byte-order right */ in domain_print()
953 qdcount = GET_BE_U_2(np->qdcount); in domain_print()
954 ancount = GET_BE_U_2(np->ancount); in domain_print()
955 nscount = GET_BE_U_2(np->nscount); in domain_print()
956 arcount = GET_BE_U_2(np->arcount); in domain_print()
965 if (cp >= ndo->ndo_snapend) in domain_print()
972 if (cp + 2 > ndo->ndo_snapend) in domain_print()
976 if (cp >= ndo->ndo_snapend) in domain_print()
982 if (cp + 2 > ndo->ndo_snapend) in domain_print()
986 if (cp + 1 > ndo->ndo_snapend) in domain_print()
993 if (cp + 2 > ndo->ndo_snapend) in domain_print()
997 if (cp >= ndo->ndo_snapend) in domain_print()
1005 GET_BE_U_2(np->id), in domain_print()
1009 DNS_RA(flags)? "" : "-", in domain_print()
1015 /* Print QUESTION section on -vv */ in domain_print()
1020 if (ndo->ndo_vflag > 1) { in domain_print()
1034 ancount--; in domain_print()
1035 while (cp < ndo->ndo_snapend && ancount) { in domain_print()
1039 ancount--; in domain_print()
1044 /* Print NS and AR sections on -vv */ in domain_print()
1045 if (ndo->ndo_vflag > 1) { in domain_print()
1046 if (cp < ndo->ndo_snapend && nscount) { in domain_print()
1050 nscount--; in domain_print()
1051 while (cp < ndo->ndo_snapend && nscount) { in domain_print()
1055 nscount--; in domain_print()
1060 if (cp < ndo->ndo_snapend && arcount) { in domain_print()
1064 arcount--; in domain_print()
1065 while (cp < ndo->ndo_snapend && arcount) { in domain_print()
1069 arcount--; in domain_print()
1077 ND_PRINT("%u%s%s%s", GET_BE_U_2(np->id), in domain_print()
1099 ND_PRINT(" [%un]", nscount); in domain_print()
1108 qdcount--; in domain_print()
1109 while (cp < ndo->ndo_snapend && qdcount) { in domain_print()
1115 qdcount--; in domain_print()
1121 /* Print remaining sections on -vv */ in domain_print()
1122 if (ndo->ndo_vflag > 1) { in domain_print()
1126 ancount--; in domain_print()
1127 while (cp < ndo->ndo_snapend && ancount) { in domain_print()
1131 ancount--; in domain_print()
1136 if (cp < ndo->ndo_snapend && nscount) { in domain_print()
1140 nscount--; in domain_print()
1141 while (cp < ndo->ndo_snapend && nscount) { in domain_print()
1145 nscount--; in domain_print()
1150 if (cp < ndo->ndo_snapend && arcount) { in domain_print()
1154 arcount--; in domain_print()
1155 while (cp < ndo->ndo_snapend && arcount) { in domain_print()
1159 arcount--; in domain_print()