xref: /titanic_41/usr/src/cmd/cmd-inet/usr.sbin/snoop/snoop_dns.c (revision 6185db853e024a486ff8837e6784dd290d866112)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #pragma ident	"%Z%%M%	%I%	%E% SMI"
28 
29 #include <stdio.h>
30 #include <string.h>
31 #include <limits.h>
32 #include <sys/types.h>
33 #include <sys/errno.h>
34 #include <sys/tiuser.h>
35 #include <arpa/nameser.h>
36 #include <arpa/inet.h>
37 #include <netinet/in.h>
38 #include "snoop.h"
39 
40 /* The string used to indent detail lines */
41 #define	DNS_INDENT	"    "
42 /*
43  * From RFC1035, the maximum size of a character-string is limited by the
44  * one octet length field.  We add one character to that to make sure the
45  * result is terminated.
46  */
47 #define	MAX_CHAR_STRING_SIZE	UCHAR_MAX + 1
48 
49 /* private functions */
50 static char *dns_opcode_string(uint_t opcode);
51 static char *dns_rcode_string(uint_t rcode);
52 static char *dns_type_string(uint_t type, int detail);
53 static char *dns_class_string(uint_t cls, int detail);
54 static size_t skip_question(const uchar_t *header, const uchar_t *data,
55     const uchar_t *data_end);
56 static size_t print_question(char *line, const uchar_t *header,
57     const uchar_t *data, const uchar_t *data_end, int detail);
58 static size_t print_answer(char *line, const uchar_t *header,
59     const uchar_t *data, const uchar_t *data_end, int detail);
60 static char *binary_string(char data);
61 static void print_ip(int af, char *line, const uchar_t *data, uint16_t len);
62 static const uchar_t *get_char_string(const uchar_t *data, char *charbuf,
63     uint16_t datalen);
64 static size_t print_char_string(char *line, const uchar_t *data, uint16_t len);
65 static const uchar_t *get_domain_name(const uchar_t *header,
66     const uchar_t *data, const uchar_t *data_end, char *namebuf, char *namend);
67 static size_t print_domain_name(char *line, const uchar_t *header,
68     const uchar_t *data, const uchar_t *data_end);
69 
70 void
71 interpret_dns(int flags, int proto, const uchar_t *data, int len)
72 {
73 	typedef HEADER dns_header;
74 	dns_header header;
75 	char *line;
76 	ushort_t id, qdcount, ancount, nscount, arcount;
77 	ushort_t count;
78 	const uchar_t *questions;
79 	const uchar_t *answers;
80 	const uchar_t *nservers;
81 	const uchar_t *additions;
82 	const uchar_t *data_end;
83 
84 	if (proto == IPPROTO_TCP) {
85 		/* not supported now */
86 		return;
87 	}
88 
89 	/* We need at least the header in order to parse a packet. */
90 	if (sizeof (dns_header) > len) {
91 		return;
92 	}
93 	data_end = data + len;
94 	/*
95 	 * Copy the header into a local structure for aligned access to
96 	 * each field.
97 	 */
98 	(void) memcpy(&header, data, sizeof (header));
99 	id = ntohs(header.id);
100 	qdcount = ntohs(header.qdcount);
101 	ancount = ntohs(header.ancount);
102 	nscount = ntohs(header.nscount);
103 	arcount = ntohs(header.arcount);
104 
105 	if (flags & F_SUM) {
106 		line = get_sum_line();
107 		line += sprintf(line, "DNS %c ", header.qr ? 'R' : 'C');
108 
109 		if (header.qr) {
110 			/* answer */
111 			if (header.rcode == 0) {
112 				/* reply is OK */
113 				questions = data + sizeof (dns_header);
114 				while (qdcount--) {
115 					if (questions >= data_end) {
116 						return;
117 					}
118 					questions += skip_question(data,
119 					    questions, data_end);
120 				}
121 				/* the answers are following the questions */
122 				answers = questions;
123 				if (ancount > 0) {
124 					(void) print_answer(line,
125 					    data, answers, data_end, FALSE);
126 				}
127 			} else {
128 				(void) sprintf(line, " Error: %d(%s)",
129 				    header.rcode,
130 				    dns_rcode_string(header.rcode));
131 			}
132 		} else {
133 			/* question */
134 			questions = data + sizeof (dns_header);
135 			if (questions >= data_end) {
136 				return;
137 			}
138 			(void) print_question(line, data, questions, data_end,
139 			    FALSE);
140 		}
141 	}
142 	if (flags & F_DTAIL) {
143 		show_header("DNS:  ", "DNS Header", sizeof (dns_header));
144 		show_space();
145 		if (header.qr) {
146 			/* answer */
147 			(void) snprintf(get_line(0, 0), get_line_remain(),
148 			    "Response ID = %d", id);
149 			(void) snprintf(get_line(0, 0), get_line_remain(),
150 			    "%s%s%s",
151 			    header.aa ? "AA (Authoritative Answer) " : "",
152 			    header.tc ? "TC (TrunCation) " : "",
153 			    header.ra ? "RA (Recursion Available) ": "");
154 			(void) snprintf(get_line(0, 0), get_line_remain(),
155 			    "Response Code: %d (%s)",
156 			    header.rcode, dns_rcode_string(header.rcode));
157 			(void) snprintf(get_line(0, 0), get_line_remain(),
158 			    "Reply to %d question(s)", qdcount);
159 			questions = data + sizeof (dns_header);
160 			count = 0;
161 			while (qdcount--) {
162 				if (questions >= data_end) {
163 					return;
164 				}
165 				count++;
166 				questions += print_question(get_line(0, 0),
167 				    data, questions, data_end, TRUE);
168 				show_space();
169 			}
170 			(void) snprintf(get_line(0, 0), get_line_remain(),
171 			    "%d answer(s)", ancount);
172 			answers = questions;
173 			count = 0;
174 			while (ancount--) {
175 				if (answers >= data_end) {
176 					return;
177 				}
178 				count++;
179 				answers += print_answer(get_line(0, 0),
180 				    data, answers, data_end, TRUE);
181 				show_space();
182 			}
183 			(void) snprintf(get_line(0, 0), get_line_remain(),
184 			    "%d name server resource(s)", nscount);
185 			nservers = answers;
186 			count = 0;
187 			while (nscount--) {
188 				if (nservers >= data_end) {
189 					return;
190 				}
191 				count++;
192 				nservers += print_answer(get_line(0, 0), data,
193 				    nservers, data_end, TRUE);
194 				show_space();
195 			}
196 			(void) snprintf(get_line(0, 0), get_line_remain(),
197 			    "%d additional record(s)", arcount);
198 			additions = nservers;
199 			count = 0;
200 			while (arcount-- && additions < data_end) {
201 				count++;
202 				additions += print_answer(get_line(0, 0), data,
203 				    additions, data_end, TRUE);
204 				show_space();
205 			}
206 		} else {
207 			/* question */
208 			(void) snprintf(get_line(0, 0), get_line_remain(),
209 			    "Query ID = %d", id);
210 			(void) snprintf(get_line(0, 0), get_line_remain(),
211 			    "Opcode: %s", dns_opcode_string(header.opcode));
212 			(void) snprintf(get_line(0, 0), get_line_remain(),
213 			    "%s%s",
214 			    header.tc ? "TC (TrunCation) " : "",
215 			    header.rd ? "RD (Recursion Desired) " : "");
216 			(void) snprintf(get_line(0, 0), get_line_remain(),
217 			    "%d question(s)", qdcount);
218 			questions = data + sizeof (dns_header);
219 			count = 0;
220 			while (qdcount-- && questions < data_end) {
221 				count++;
222 				questions += print_question(get_line(0, 0),
223 				    data, questions, data_end, TRUE);
224 				show_space();
225 			}
226 		}
227 	}
228 }
229 
230 
231 static char *
232 dns_opcode_string(uint_t opcode)
233 {
234 	static char buffer[64];
235 	switch (opcode) {
236 	case ns_o_query:	return ("Query");
237 	case ns_o_iquery:	return ("Inverse Query");
238 	case ns_o_status:	return ("Status");
239 	default:
240 		(void) snprintf(buffer, sizeof (buffer), "Unknown (%u)",
241 		    opcode);
242 		return (buffer);
243 	}
244 }
245 
246 static char *
247 dns_rcode_string(uint_t rcode)
248 {
249 	static char buffer[64];
250 	switch (rcode) {
251 	case ns_r_noerror:	return ("OK");
252 	case ns_r_formerr:	return ("Format Error");
253 	case ns_r_servfail:	return ("Server Fail");
254 	case ns_r_nxdomain:	return ("Name Error");
255 	case ns_r_notimpl:	return ("Unimplemented");
256 	case ns_r_refused:	return ("Refused");
257 	default:
258 		(void) snprintf(buffer, sizeof (buffer), "Unknown (%u)", rcode);
259 		return (buffer);
260 	}
261 }
262 
263 static char *
264 dns_type_string(uint_t type, int detail)
265 {
266 	static char buffer[64];
267 	switch (type) {
268 	case ns_t_a:	return (detail ? "Address" : "Addr");
269 	case ns_t_ns:	return (detail ? "Authoritative Name Server" : "NS");
270 	case ns_t_cname:	return (detail ? "Canonical Name" : "CNAME");
271 	case ns_t_soa:	return (detail ? "Start Of a zone Authority" : "SOA");
272 	case ns_t_mb:	return (detail ? "Mailbox domain name" : "MB");
273 	case ns_t_mg:	return (detail ? "Mailbox Group member" : "MG");
274 	case ns_t_mr:	return (detail ? "Mail Rename domain name" : "MR");
275 	case ns_t_null:	return ("NULL");
276 	case ns_t_wks:	return (detail ? "Well Known Service" : "WKS");
277 	case ns_t_ptr:	return (detail ? "Domain Name Pointer" : "PTR");
278 	case ns_t_hinfo:	return (detail ? "Host Information": "HINFO");
279 	case ns_t_minfo:
280 		return (detail ? "Mailbox or maillist Info" : "MINFO");
281 	case ns_t_mx:	return (detail ? "Mail Exchange" : "MX");
282 	case ns_t_txt:	return (detail ? "Text strings" : "TXT");
283 	case ns_t_aaaa:	return (detail ? "IPv6 Address" : "AAAA");
284 	case ns_t_axfr:	return (detail ? "Transfer of entire zone" : "AXFR");
285 	case ns_t_mailb:
286 		return (detail ? "Mailbox related records" : "MAILB");
287 	case ns_t_maila:	return (detail ? "Mail agent RRs" : "MAILA");
288 	case ns_t_any:	return (detail ? "All records" : "*");
289 	default:
290 		(void) snprintf(buffer, sizeof (buffer), "Unknown (%u)", type);
291 		return (buffer);
292 	}
293 }
294 
295 static char *
296 dns_class_string(uint_t cls, int detail)
297 {
298 	static char buffer[64];
299 	switch (cls) {
300 	case ns_c_in:		return (detail ? "Internet" : "Internet");
301 	case ns_c_chaos: 	return (detail ? "CHAOS" : "CH");
302 	case ns_c_hs:		return (detail ? "Hesiod" : "HS");
303 	case ns_c_any:		return (detail ? "* (Any class)" : "*");
304 	default:
305 		(void) snprintf(buffer, sizeof (buffer), "Unknown (%u)", cls);
306 		return (buffer);
307 	}
308 }
309 
310 static size_t
311 skip_question(const uchar_t *header, const uchar_t *data,
312     const uchar_t *data_end)
313 {
314 	const uchar_t *data_bak = data;
315 	char dummy_buffer[NS_MAXDNAME];
316 
317 	data = get_domain_name(header, data, data_end, dummy_buffer,
318 	    dummy_buffer + sizeof (dummy_buffer));
319 	/* Skip the 32 bits of class and type that follow the domain name */
320 	data += sizeof (uint32_t);
321 	return (data - data_bak);
322 }
323 
324 static size_t
325 print_question(char *line, const uchar_t *header, const uchar_t *data,
326     const uchar_t *data_end, int detail)
327 {
328 	const uchar_t *data_bak = data;
329 	uint16_t type;
330 	uint16_t cls;
331 
332 	if (detail) {
333 		line += snprintf(line, get_line_remain(),
334 		    DNS_INDENT "Domain Name: ");
335 	}
336 	data += print_domain_name(line, header, data, data_end);
337 
338 	/*
339 	 * Make sure we don't run off the end of the packet by reading the
340 	 * type and class.
341 	 *
342 	 * The pointer subtraction on the left side of the following
343 	 * expression has a signed result of type ptrdiff_t, and the right
344 	 * side has an unsigned result of type size_t.  We therefore need
345 	 * to cast the right side of the expression to be of the same
346 	 * signed type to keep the result of the pointer arithmetic to be
347 	 * automatically cast to an unsigned value.  We do a similar cast
348 	 * in other similar expressions throughout this file.
349 	 */
350 	if ((data_end - data) < (ptrdiff_t)(2 * sizeof (uint16_t)))
351 		return (data_end - data_bak);
352 
353 	GETINT16(type, data);
354 	GETINT16(cls, data);
355 
356 	if (detail) {
357 		(void) snprintf(get_line(0, 0), get_line_remain(),
358 		    DNS_INDENT "Class: %u (%s)",
359 		    cls, dns_class_string(cls, detail));
360 		(void) snprintf(get_line(0, 0), get_line_remain(),
361 		    DNS_INDENT "Type:  %u (%s)", type,
362 		    dns_type_string(type, detail));
363 	} else {
364 		(void) sprintf(line + strlen(line), " %s %s \?",
365 		    dns_class_string(cls, detail),
366 		    dns_type_string(type, detail));
367 	}
368 	return (data - data_bak);
369 }
370 
371 static size_t
372 print_answer(char *line, const uchar_t *header, const uchar_t *data,
373     const uchar_t *data_end, int detail)
374 {
375 	const uchar_t *data_bak = data;
376 	const uchar_t *data_next;
377 	uint16_t type;
378 	uint16_t cls;
379 	int32_t ttl;
380 	uint16_t rdlen;
381 	uint32_t serial, refresh, retry, expire, minimum;
382 	uint8_t protocol;
383 	int linepos;
384 	uint16_t preference;
385 
386 	if (detail) {
387 		line += snprintf(line, get_line_remain(),
388 		    DNS_INDENT "Domain Name: ");
389 	}
390 	data += print_domain_name(line, header, data, data_end);
391 
392 	/*
393 	 * Make sure we don't run off the end of the packet by reading the
394 	 * type, class, ttl, and length.
395 	 */
396 	if ((data_end - data) <
397 	    (ptrdiff_t)(3 * sizeof (uint16_t) + sizeof (uint32_t))) {
398 		return (data_end - data_bak);
399 	}
400 
401 	GETINT16(type, data);
402 	GETINT16(cls, data);
403 
404 	if (detail) {
405 		(void) snprintf(get_line(0, 0), get_line_remain(),
406 		    DNS_INDENT "Class: %d (%s)", cls,
407 		    dns_class_string(cls, detail));
408 		(void) snprintf(get_line(0, 0), get_line_remain(),
409 		    DNS_INDENT "Type:  %d (%s)", type,
410 		    dns_type_string(type, detail));
411 	} else {
412 		line += strlen(line);
413 		line += sprintf(line, " %s %s ",
414 		    dns_class_string(cls, detail),
415 		    dns_type_string(type, detail));
416 	}
417 
418 	GETINT32(ttl, data);
419 	if (detail) {
420 		(void) snprintf(get_line(0, 0), get_line_remain(),
421 		    DNS_INDENT "TTL (Time To Live): %d", ttl);
422 	}
423 
424 	GETINT16(rdlen, data);
425 	if (detail) {
426 		line = get_line(0, 0);
427 		line += snprintf(line, get_line_remain(), DNS_INDENT "%s: ",
428 		    dns_type_string(type, detail));
429 	}
430 
431 	if (rdlen > data_end - data)
432 		return (data_end - data_bak);
433 
434 	switch (type) {
435 	case ns_t_a:
436 		print_ip(AF_INET, line, data, rdlen);
437 		break;
438 	case ns_t_aaaa:
439 		print_ip(AF_INET6, line, data, rdlen);
440 		break;
441 	case ns_t_hinfo:
442 		line += sprintf(line, "CPU: ");
443 		data_next = data + print_char_string(line, data, rdlen);
444 		if (data_next >= data_end)
445 			break;
446 		line += strlen(line);
447 		line += sprintf(line, "OS: ");
448 		(void) print_char_string(line, data_next,
449 		    rdlen - (data_next - data));
450 		break;
451 	case ns_t_ns:
452 	case ns_t_cname:
453 	case ns_t_mb:
454 	case ns_t_mg:
455 	case ns_t_mr:
456 	case ns_t_ptr:
457 		(void) print_domain_name(line, header, data, data_end);
458 		break;
459 	case ns_t_mx:
460 		data_next = data;
461 		if (rdlen < sizeof (uint16_t))
462 			break;
463 		GETINT16(preference, data_next);
464 		if (detail) {
465 			(void) print_domain_name(line, header, data_next,
466 			    data_end);
467 			(void) snprintf(get_line(0, 0), get_line_remain(),
468 			    DNS_INDENT "Preference: %u", preference);
469 		} else {
470 			(void) print_domain_name(line, header, data_next,
471 			    data_end);
472 		}
473 		break;
474 	case ns_t_soa:
475 		if (!detail)
476 			break;
477 		line = get_line(0, 0);
478 		line += snprintf(line, get_line_remain(),
479 		    DNS_INDENT "MNAME (Server name): ");
480 		data_next = data + print_domain_name(line, header, data,
481 		    data_end);
482 		if (data_next >= data_end)
483 			break;
484 		line = get_line(0, 0);
485 		line += snprintf(line, get_line_remain(),
486 		    DNS_INDENT "RNAME (Resposible mailbox): ");
487 		data_next = data_next +
488 		    print_domain_name(line, header, data_next, data_end);
489 		if ((data_end - data_next) < (ptrdiff_t)(5 * sizeof (uint32_t)))
490 			break;
491 		GETINT32(serial, data_next);
492 		GETINT32(refresh, data_next);
493 		GETINT32(retry, data_next);
494 		GETINT32(expire, data_next);
495 		GETINT32(minimum, data_next);
496 		(void) snprintf(get_line(0, 0), get_line_remain(),
497 		    DNS_INDENT "Serial: %u", serial);
498 		(void) snprintf(get_line(0, 0), get_line_remain(),
499 		    DNS_INDENT "Refresh: %u  Retry: %u  "
500 		    "Expire: %u Minimum: %u",
501 		    refresh, retry, expire, minimum);
502 		break;
503 	case ns_t_wks:
504 		print_ip(AF_INET, line, data, rdlen);
505 		if (!detail)
506 			break;
507 		data_next = data + sizeof (in_addr_t);
508 		if (data_next >= data_end)
509 			break;
510 		GETINT8(protocol, data_next);
511 		line = get_line(0, 0);
512 		line += snprintf(line, get_line_remain(),
513 		    DNS_INDENT "Protocol: %u ", protocol);
514 		switch (protocol) {
515 		case IPPROTO_UDP:
516 			(void) snprintf(line, get_line_remain(), "(UDP)");
517 			break;
518 		case IPPROTO_TCP:
519 			(void) snprintf(line, get_line_remain(), "(TCP)");
520 			break;
521 		}
522 		(void) snprintf(get_line(0, 0), get_line_remain(),
523 		    DNS_INDENT "Service bitmap:");
524 		(void) snprintf(line, get_line_remain(),
525 		    DNS_INDENT "0       8       16      24");
526 		linepos = 4;
527 		while (data_next < data + rdlen) {
528 			if (linepos == 4) {
529 				line = get_line(0, 0);
530 				line += snprintf(line, get_line_remain(),
531 				    DNS_INDENT);
532 				linepos = 0;
533 			}
534 			line += snprintf(line, get_line_remain(), "%s",
535 			    binary_string(*data_next));
536 			linepos++;
537 			data_next++;
538 		}
539 		break;
540 	case ns_t_minfo:
541 		if (!detail)
542 			break;
543 		line = get_line(0, 0);
544 		line += snprintf(line, get_line_remain(),
545 		    DNS_INDENT "RMAILBX (Resposible mailbox): ");
546 		data_next = data + print_domain_name(line, header, data,
547 		    data_end);
548 		line = get_line(0, 0);
549 		line += snprintf(line, get_line_remain(),
550 		    DNS_INDENT "EMAILBX (mailbox to receive err message): ");
551 		data_next = data_next + print_domain_name(line, header,
552 		    data_next, data_end);
553 		break;
554 	}
555 	data += rdlen;
556 	return (data - data_bak);
557 }
558 
559 static char *
560 binary_string(char data)
561 {
562 	static char bstring[8 + 1];
563 	char *ptr;
564 	int i;
565 	ptr = bstring;
566 	for (i = 0; i < 8; i++) {
567 		*ptr++ = (data & 0x80) ? '1' : '0';
568 		data = data << 1;
569 	}
570 	*ptr = (char)0;
571 	return (bstring);
572 }
573 
574 static void
575 print_ip(int af, char *line, const uchar_t *data, uint16_t len)
576 {
577 	in6_addr_t	addr6;
578 	in_addr_t	addr4;
579 	void		*addr;
580 
581 	switch (af) {
582 	case AF_INET:
583 		if (len != sizeof (in_addr_t))
584 			return;
585 		addr = memcpy(&addr4, data, sizeof (addr4));
586 		break;
587 	case AF_INET6:
588 		if (len != sizeof (in6_addr_t))
589 			return;
590 		addr = memcpy(&addr6, data, sizeof (addr6));
591 		break;
592 	}
593 
594 	(void) inet_ntop(af, addr, line, INET6_ADDRSTRLEN);
595 }
596 
597 /*
598  * charbuf is assumed to be of size MAX_CHAR_STRING_SIZE.
599  */
600 static const uchar_t *
601 get_char_string(const uchar_t *data, char *charbuf, uint16_t datalen)
602 {
603 	int len;
604 	char *name = charbuf;
605 	int i = 0;
606 
607 	/*
608 	 * From RFC1035, a character-string is a single length octet followed
609 	 * by that number of characters.
610 	 */
611 	if (datalen > 1) {
612 		len = *data;
613 		data++;
614 		if (len > 0 && len < MAX_CHAR_STRING_SIZE) {
615 			for (i = 0; i < len; i++, data++)
616 				name[i] = *data;
617 		}
618 	}
619 	name[i] = '\0';
620 	return (data);
621 }
622 
623 static size_t
624 print_char_string(char *line, const uchar_t *data, uint16_t len)
625 {
626 	char charbuf[MAX_CHAR_STRING_SIZE];
627 	const uchar_t *data_bak = data;
628 
629 	data = get_char_string(data, charbuf, len);
630 	(void) sprintf(line, "%s", charbuf);
631 	return (data - data_bak);
632 }
633 
634 /*
635  * header: the entire message header, this is where we start to
636  *	   count the offset of the compression scheme
637  * data:   the start of the domain name
638  * namebuf: user supplied buffer
639  * return: the next byte after what we have parsed
640  */
641 static const uchar_t *
642 get_domain_name(const uchar_t *header, const uchar_t *data,
643     const uchar_t *data_end, char *namebuf, char *namend)
644 {
645 	uint8_t len;
646 	char *name = namebuf;
647 
648 	/*
649 	 * From RFC1035, a domain name is a sequence of labels, where each
650 	 * label consists of a length octet followed by that number of
651 	 * octets.  The domain name terminates with the zero length octet
652 	 * for the null label of the root.
653 	 */
654 
655 	while (name < (namend - 1)) {
656 		if ((data_end - data) < (ptrdiff_t)(sizeof (uint8_t))) {
657 			/* The length octet is off the end of the packet. */
658 			break;
659 		}
660 		GETINT8(len, data);
661 		if (len == 0) {
662 			/*
663 			 * Domain names end with a length byte of zero,
664 			 * which represents the null label of the root.
665 			 */
666 			break;
667 		}
668 		/*
669 		 * test if we are using the compression scheme
670 		 */
671 		if ((len & 0xc0) == 0xc0) {
672 			uint16_t offset;
673 			const uchar_t *label_ptr;
674 
675 			/*
676 			 * From RFC1035, message compression allows a
677 			 * domain name or a list of labels at the end of a
678 			 * domain name to be replaced with a pointer to a
679 			 * prior occurance of the same name.  In this
680 			 * scheme, the pointer is a two octet sequence
681 			 * where the most significant two bits are set, and
682 			 * the remaining 14 bits are the offset from the
683 			 * start of the message of the next label.
684 			 */
685 			data--;
686 			if ((data_end - data) <
687 			    (ptrdiff_t)(sizeof (uint16_t))) {
688 				/*
689 				 * The offset octets aren't entirely
690 				 * contained within this pakcet.
691 				 */
692 				data = data_end;
693 				break;
694 			}
695 			GETINT16(offset, data);
696 			label_ptr = header + (offset & 0x3fff);
697 			/*
698 			 * We must verify that the offset is valid by
699 			 * checking that it is less than the current data
700 			 * pointer and that it isn't off the end of the
701 			 * packet.
702 			 */
703 			if (label_ptr > data || label_ptr >= data_end)
704 				break;
705 			(void) get_domain_name(header, label_ptr, data_end,
706 			    name, namend);
707 			return (data);
708 		} else {
709 			if (len > (data_end - data)) {
710 				/*
711 				 * The label isn't entirely contained
712 				 * within the packet.  Don't read it.  The
713 				 * caller checks that the data pointer is
714 				 * not beyond the end after we've
715 				 * incremented it.
716 				 */
717 				data = data_end;
718 				break;
719 			}
720 			while (len > 0 && name < (namend - 2)) {
721 				*name = *data;
722 				name++;
723 				data++;
724 				len--;
725 			}
726 			*name = '.';
727 			name++;
728 		}
729 	}
730 	*name = '\0';
731 	return (data);
732 }
733 
734 static size_t
735 print_domain_name(char *line, const uchar_t *header, const uchar_t *data,
736     const uchar_t *data_end)
737 {
738 	char name[NS_MAXDNAME];
739 	const uchar_t *new_data;
740 
741 	new_data = get_domain_name(header, data, data_end, name,
742 	    name + sizeof (name));
743 
744 	(void) sprintf(line, "%s", name);
745 	return (new_data - data);
746 }
747