OpenCores
URL https://opencores.org/ocsvn/or1k/or1k/trunk

Subversion Repositories or1k

[/] [or1k/] [trunk/] [linux/] [uClibc/] [include/] [arpa/] [nameser.h] - Blame information for rev 1765

Details | Compare with Previous | View Log

Line No. Rev Author Line
1 1325 phoenix
/*
2
 * Copyright (c) 1983, 1989, 1993
3
 *    The Regents of the University of California.  All rights reserved.
4
 *
5
 * Redistribution and use in source and binary forms, with or without
6
 * modification, are permitted provided that the following conditions
7
 * are met:
8
 * 1. Redistributions of source code must retain the above copyright
9
 *    notice, this list of conditions and the following disclaimer.
10
 * 2. Redistributions in binary form must reproduce the above copyright
11
 *    notice, this list of conditions and the following disclaimer in the
12
 *    documentation and/or other materials provided with the distribution.
13
 * 4. Neither the name of the University nor the names of its contributors
14
 *    may be used to endorse or promote products derived from this software
15
 *    without specific prior written permission.
16
 *
17
 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27
 * SUCH DAMAGE.
28
 */
29
 
30
/*
31
 * Copyright (c) 1996-1999 by Internet Software Consortium.
32
 *
33
 * Permission to use, copy, modify, and distribute this software for any
34
 * purpose with or without fee is hereby granted, provided that the above
35
 * copyright notice and this permission notice appear in all copies.
36
 *
37
 * THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
38
 * ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
39
 * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
40
 * CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
41
 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
42
 * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
43
 * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
44
 * SOFTWARE.
45
 */
46
 
47
/*
48
 *      $BINDId: nameser.h,v 8.37 2000/03/30 21:16:49 vixie Exp $
49
 */
50
 
51
#ifndef _ARPA_NAMESER_H_
52
#define _ARPA_NAMESER_H_
53
 
54
#define BIND_4_COMPAT
55
 
56
#include <sys/param.h>
57
#if (!defined(BSD)) || (BSD < 199306)
58
# include <sys/bitypes.h>
59
#else
60
# include <sys/types.h>
61
#endif
62
#include <sys/cdefs.h>
63
 
64
/*
65
 * Revision information.  This is the release date in YYYYMMDD format.
66
 * It can change every day so the right thing to do with it is use it
67
 * in preprocessor commands such as "#if (__NAMESER > 19931104)".  Do not
68
 * compare for equality; rather, use it to determine whether your libbind.a
69
 * contains a new enough lib/nameser/ to support the feature you need.
70
 */
71
 
72
#define __NAMESER       19991006        /* New interface version stamp. */
73
 
74
/*
75
 * Define constants based on RFC 883, RFC 1034, RFC 1035
76
 */
77
#define NS_PACKETSZ     512     /* maximum packet size */
78
#define NS_MAXDNAME     1025    /* maximum domain name */
79
#define NS_MAXCDNAME    255     /* maximum compressed domain name */
80
#define NS_MAXLABEL     63      /* maximum length of domain label */
81
#define NS_HFIXEDSZ     12      /* #/bytes of fixed data in header */
82
#define NS_QFIXEDSZ     4       /* #/bytes of fixed data in query */
83
#define NS_RRFIXEDSZ    10      /* #/bytes of fixed data in r record */
84
#define NS_INT32SZ      4       /* #/bytes of data in a u_int32_t */
85
#define NS_INT16SZ      2       /* #/bytes of data in a u_int16_t */
86
#define NS_INT8SZ       1       /* #/bytes of data in a u_int8_t */
87
#define NS_INADDRSZ     4       /* IPv4 T_A */
88
#define NS_IN6ADDRSZ    16      /* IPv6 T_AAAA */
89
#define NS_CMPRSFLGS    0xc0    /* Flag bits indicating name compression. */
90
#define NS_DEFAULTPORT  53      /* For both TCP and UDP. */
91
 
92
/*
93
 * These can be expanded with synonyms, just keep ns_parse.c:ns_parserecord()
94
 * in synch with it.
95
 */
96
typedef enum __ns_sect {
97
        ns_s_qd = 0,             /* Query: Question. */
98
        ns_s_zn = 0,             /* Update: Zone. */
99
        ns_s_an = 1,            /* Query: Answer. */
100
        ns_s_pr = 1,            /* Update: Prerequisites. */
101
        ns_s_ns = 2,            /* Query: Name servers. */
102
        ns_s_ud = 2,            /* Update: Update. */
103
        ns_s_ar = 3,            /* Query|Update: Additional records. */
104
        ns_s_max = 4
105
} ns_sect;
106
 
107
/*
108
 * This is a message handle.  It is caller allocated and has no dynamic data.
109
 * This structure is intended to be opaque to all but ns_parse.c, thus the
110
 * leading _'s on the member names.  Use the accessor functions, not the _'s.
111
 */
112
typedef struct __ns_msg {
113
        const u_char    *_msg, *_eom;
114
        u_int16_t       _id, _flags, _counts[ns_s_max];
115
        const u_char    *_sections[ns_s_max];
116
        ns_sect         _sect;
117
        int             _rrnum;
118
        const u_char    *_ptr;
119
} ns_msg;
120
 
121
/* Private data structure - do not use from outside library. */
122
struct _ns_flagdata {  int mask, shift;  };
123
extern struct _ns_flagdata _ns_flagdata[];
124
 
125
/* Accessor macros - this is part of the public interface. */
126
#define ns_msg_getflag(handle, flag) ( \
127
                        ((handle)._flags & _ns_flagdata[flag].mask) \
128
                         >> _ns_flagdata[flag].shift \
129
                        )
130
#define ns_msg_id(handle) ((handle)._id + 0)
131
#define ns_msg_base(handle) ((handle)._msg + 0)
132
#define ns_msg_end(handle) ((handle)._eom + 0)
133
#define ns_msg_size(handle) ((handle)._eom - (handle)._msg)
134
#define ns_msg_count(handle, section) ((handle)._counts[section] + 0)
135
 
136
/*
137
 * This is a parsed record.  It is caller allocated and has no dynamic data.
138
 */
139
typedef struct __ns_rr {
140
        char            name[NS_MAXDNAME];
141
        u_int16_t       type;
142
        u_int16_t       rr_class;
143
        u_int32_t       ttl;
144
        u_int16_t       rdlength;
145
        const u_char *  rdata;
146
} ns_rr;
147
 
148
/* Accessor macros - this is part of the public interface. */
149
#define ns_rr_name(rr)  (((rr).name[0] != '\0') ? (rr).name : ".")
150
#define ns_rr_type(rr)  ((ns_type)((rr).type + 0))
151
#define ns_rr_class(rr) ((ns_class)((rr).rr_class + 0))
152
#define ns_rr_ttl(rr)   ((rr).ttl + 0)
153
#define ns_rr_rdlen(rr) ((rr).rdlength + 0)
154
#define ns_rr_rdata(rr) ((rr).rdata + 0)
155
 
156
/*
157
 * These don't have to be in the same order as in the packet flags word,
158
 * and they can even overlap in some cases, but they will need to be kept
159
 * in synch with ns_parse.c:ns_flagdata[].
160
 */
161
typedef enum __ns_flag {
162
        ns_f_qr,                /* Question/Response. */
163
        ns_f_opcode,            /* Operation code. */
164
        ns_f_aa,                /* Authoritative Answer. */
165
        ns_f_tc,                /* Truncation occurred. */
166
        ns_f_rd,                /* Recursion Desired. */
167
        ns_f_ra,                /* Recursion Available. */
168
        ns_f_z,                 /* MBZ. */
169
        ns_f_ad,                /* Authentic Data (DNSSEC). */
170
        ns_f_cd,                /* Checking Disabled (DNSSEC). */
171
        ns_f_rcode,             /* Response code. */
172
        ns_f_max
173
} ns_flag;
174
 
175
/*
176
 * Currently defined opcodes.
177
 */
178
typedef enum __ns_opcode {
179
        ns_o_query = 0,          /* Standard query. */
180
        ns_o_iquery = 1,        /* Inverse query (deprecated/unsupported). */
181
        ns_o_status = 2,        /* Name server status query (unsupported). */
182
                                /* Opcode 3 is undefined/reserved. */
183
        ns_o_notify = 4,        /* Zone change notification. */
184
        ns_o_update = 5,        /* Zone update message. */
185
        ns_o_max = 6
186
} ns_opcode;
187
 
188
/*
189
 * Currently defined response codes.
190
 */
191
typedef enum __ns_rcode {
192
        ns_r_noerror = 0,        /* No error occurred. */
193
        ns_r_formerr = 1,       /* Format error. */
194
        ns_r_servfail = 2,      /* Server failure. */
195
        ns_r_nxdomain = 3,      /* Name error. */
196
        ns_r_notimpl = 4,       /* Unimplemented. */
197
        ns_r_refused = 5,       /* Operation refused. */
198
        /* these are for BIND_UPDATE */
199
        ns_r_yxdomain = 6,      /* Name exists */
200
        ns_r_yxrrset = 7,       /* RRset exists */
201
        ns_r_nxrrset = 8,       /* RRset does not exist */
202
        ns_r_notauth = 9,       /* Not authoritative for zone */
203
        ns_r_notzone = 10,      /* Zone of record different from zone section */
204
        ns_r_max = 11,
205
        /* The following are TSIG extended errors */
206
        ns_r_badsig = 16,
207
        ns_r_badkey = 17,
208
        ns_r_badtime = 18
209
} ns_rcode;
210
 
211
/* BIND_UPDATE */
212
typedef enum __ns_update_operation {
213
        ns_uop_delete = 0,
214
        ns_uop_add = 1,
215
        ns_uop_max = 2
216
} ns_update_operation;
217
 
218
/*
219
 * This structure is used for TSIG authenticated messages
220
 */
221
struct ns_tsig_key {
222
        char name[NS_MAXDNAME], alg[NS_MAXDNAME];
223
        unsigned char *data;
224
        int len;
225
};
226
typedef struct ns_tsig_key ns_tsig_key;
227
 
228
/*
229
 * This structure is used for TSIG authenticated TCP messages
230
 */
231
struct ns_tcp_tsig_state {
232
        int counter;
233
        struct dst_key *key;
234
        void *ctx;
235
        unsigned char sig[NS_PACKETSZ];
236
        int siglen;
237
};
238
typedef struct ns_tcp_tsig_state ns_tcp_tsig_state;
239
 
240
#define NS_TSIG_FUDGE 300
241
#define NS_TSIG_TCP_COUNT 100
242
#define NS_TSIG_ALG_HMAC_MD5 "HMAC-MD5.SIG-ALG.REG.INT"
243
 
244
#define NS_TSIG_ERROR_NO_TSIG -10
245
#define NS_TSIG_ERROR_NO_SPACE -11
246
#define NS_TSIG_ERROR_FORMERR -12
247
 
248
/*
249
 * Currently defined type values for resources and queries.
250
 */
251
typedef enum __ns_type {
252
        ns_t_invalid = 0,        /* Cookie. */
253
        ns_t_a = 1,             /* Host address. */
254
        ns_t_ns = 2,            /* Authoritative server. */
255
        ns_t_md = 3,            /* Mail destination. */
256
        ns_t_mf = 4,            /* Mail forwarder. */
257
        ns_t_cname = 5,         /* Canonical name. */
258
        ns_t_soa = 6,           /* Start of authority zone. */
259
        ns_t_mb = 7,            /* Mailbox domain name. */
260
        ns_t_mg = 8,            /* Mail group member. */
261
        ns_t_mr = 9,            /* Mail rename name. */
262
        ns_t_null = 10,         /* Null resource record. */
263
        ns_t_wks = 11,          /* Well known service. */
264
        ns_t_ptr = 12,          /* Domain name pointer. */
265
        ns_t_hinfo = 13,        /* Host information. */
266
        ns_t_minfo = 14,        /* Mailbox information. */
267
        ns_t_mx = 15,           /* Mail routing information. */
268
        ns_t_txt = 16,          /* Text strings. */
269
        ns_t_rp = 17,           /* Responsible person. */
270
        ns_t_afsdb = 18,        /* AFS cell database. */
271
        ns_t_x25 = 19,          /* X_25 calling address. */
272
        ns_t_isdn = 20,         /* ISDN calling address. */
273
        ns_t_rt = 21,           /* Router. */
274
        ns_t_nsap = 22,         /* NSAP address. */
275
        ns_t_nsap_ptr = 23,     /* Reverse NSAP lookup (deprecated). */
276
        ns_t_sig = 24,          /* Security signature. */
277
        ns_t_key = 25,          /* Security key. */
278
        ns_t_px = 26,           /* X.400 mail mapping. */
279
        ns_t_gpos = 27,         /* Geographical position (withdrawn). */
280
        ns_t_aaaa = 28,         /* Ip6 Address. */
281
        ns_t_loc = 29,          /* Location Information. */
282
        ns_t_nxt = 30,          /* Next domain (security). */
283
        ns_t_eid = 31,          /* Endpoint identifier. */
284
        ns_t_nimloc = 32,       /* Nimrod Locator. */
285
        ns_t_srv = 33,          /* Server Selection. */
286
        ns_t_atma = 34,         /* ATM Address */
287
        ns_t_naptr = 35,        /* Naming Authority PoinTeR */
288
        ns_t_kx = 36,           /* Key Exchange */
289
        ns_t_cert = 37,         /* Certification record */
290
        ns_t_a6 = 38,           /* IPv6 address (deprecates AAAA) */
291
        ns_t_dname = 39,        /* Non-terminal DNAME (for IPv6) */
292
        ns_t_sink = 40,         /* Kitchen sink (experimentatl) */
293
        ns_t_opt = 41,          /* EDNS0 option (meta-RR) */
294
        ns_t_tsig = 250,        /* Transaction signature. */
295
        ns_t_ixfr = 251,        /* Incremental zone transfer. */
296
        ns_t_axfr = 252,        /* Transfer zone of authority. */
297
        ns_t_mailb = 253,       /* Transfer mailbox records. */
298
        ns_t_maila = 254,       /* Transfer mail agent records. */
299
        ns_t_any = 255,         /* Wildcard match. */
300
        ns_t_zxfr = 256,        /* BIND-specific, nonstandard. */
301
        ns_t_max = 65536
302
} ns_type;
303
 
304
/* Exclusively a QTYPE? (not also an RTYPE) */
305
#define ns_t_qt_p(t) (ns_t_xfr_p(t) || (t) == ns_t_any || \
306
                      (t) == ns_t_mailb || (t) == ns_t_maila)
307
/* Some kind of meta-RR? (not a QTYPE, but also not an RTYPE) */
308
#define ns_t_mrr_p(t) ((t) == ns_t_tsig || (t) == ns_t_opt)
309
/* Exclusively an RTYPE? (not also a QTYPE or a meta-RR) */
310
#define ns_t_rr_p(t) (!ns_t_qt_p(t) && !ns_t_mrr_p(t))
311
#define ns_t_udp_p(t) ((t) != ns_t_axfr && (t) != ns_t_zxfr)
312
#define ns_t_xfr_p(t) ((t) == ns_t_axfr || (t) == ns_t_ixfr || \
313
                       (t) == ns_t_zxfr)
314
 
315
/*
316
 * Values for class field
317
 */
318
typedef enum __ns_class {
319
        ns_c_invalid = 0,        /* Cookie. */
320
        ns_c_in = 1,            /* Internet. */
321
        ns_c_2 = 2,             /* unallocated/unsupported. */
322
        ns_c_chaos = 3,         /* MIT Chaos-net. */
323
        ns_c_hs = 4,            /* MIT Hesiod. */
324
        /* Query class values which do not appear in resource records */
325
        ns_c_none = 254,        /* for prereq. sections in update requests */
326
        ns_c_any = 255,         /* Wildcard match. */
327
        ns_c_max = 65536
328
} ns_class;
329
 
330
/* DNSSEC constants. */
331
 
332
typedef enum __ns_key_types {
333
        ns_kt_rsa = 1,          /* key type RSA/MD5 */
334
        ns_kt_dh  = 2,          /* Diffie Hellman */
335
        ns_kt_dsa = 3,          /* Digital Signature Standard (MANDATORY) */
336
        ns_kt_private = 254     /* Private key type starts with OID */
337
} ns_key_types;
338
 
339
typedef enum __ns_cert_types {
340
        cert_t_pkix = 1,        /* PKIX (X.509v3) */
341
        cert_t_spki = 2,        /* SPKI */
342
        cert_t_pgp  = 3,        /* PGP */
343
        cert_t_url  = 253,      /* URL private type */
344
        cert_t_oid  = 254       /* OID private type */
345
} ns_cert_types;
346
 
347
/* Flags field of the KEY RR rdata. */
348
#define NS_KEY_TYPEMASK         0xC000  /* Mask for "type" bits */
349
#define NS_KEY_TYPE_AUTH_CONF   0x0000  /* Key usable for both */
350
#define NS_KEY_TYPE_CONF_ONLY   0x8000  /* Key usable for confidentiality */
351
#define NS_KEY_TYPE_AUTH_ONLY   0x4000  /* Key usable for authentication */
352
#define NS_KEY_TYPE_NO_KEY      0xC000  /* No key usable for either; no key */
353
/* The type bits can also be interpreted independently, as single bits: */
354
#define NS_KEY_NO_AUTH          0x8000  /* Key unusable for authentication */
355
#define NS_KEY_NO_CONF          0x4000  /* Key unusable for confidentiality */
356
#define NS_KEY_RESERVED2        0x2000  /* Security is *mandatory* if bit=0 */
357
#define NS_KEY_EXTENDED_FLAGS   0x1000  /* reserved - must be zero */
358
#define NS_KEY_RESERVED4        0x0800  /* reserved - must be zero */
359
#define NS_KEY_RESERVED5        0x0400  /* reserved - must be zero */
360
#define NS_KEY_NAME_TYPE        0x0300  /* these bits determine the type */
361
#define NS_KEY_NAME_USER        0x0000  /* key is assoc. with user */
362
#define NS_KEY_NAME_ENTITY      0x0200  /* key is assoc. with entity eg host */
363
#define NS_KEY_NAME_ZONE        0x0100  /* key is zone key */
364
#define NS_KEY_NAME_RESERVED    0x0300  /* reserved meaning */
365
#define NS_KEY_RESERVED8        0x0080  /* reserved - must be zero */
366
#define NS_KEY_RESERVED9        0x0040  /* reserved - must be zero */
367
#define NS_KEY_RESERVED10       0x0020  /* reserved - must be zero */
368
#define NS_KEY_RESERVED11       0x0010  /* reserved - must be zero */
369
#define NS_KEY_SIGNATORYMASK    0x000F  /* key can sign RR's of same name */
370
#define NS_KEY_RESERVED_BITMASK ( NS_KEY_RESERVED2 | \
371
                                  NS_KEY_RESERVED4 | \
372
                                  NS_KEY_RESERVED5 | \
373
                                  NS_KEY_RESERVED8 | \
374
                                  NS_KEY_RESERVED9 | \
375
                                  NS_KEY_RESERVED10 | \
376
                                  NS_KEY_RESERVED11 )
377
#define NS_KEY_RESERVED_BITMASK2 0xFFFF /* no bits defined here */
378
 
379
/* The Algorithm field of the KEY and SIG RR's is an integer, {1..254} */
380
#define NS_ALG_MD5RSA           1       /* MD5 with RSA */
381
#define NS_ALG_DH               2       /* Diffie Hellman KEY */
382
#define NS_ALG_DSA              3       /* DSA KEY */
383
#define NS_ALG_DSS              NS_ALG_DSA
384
#define NS_ALG_EXPIRE_ONLY      253     /* No alg, no security */
385
#define NS_ALG_PRIVATE_OID      254     /* Key begins with OID giving alg */
386
 
387
/* Protocol values  */
388
/* value 0 is reserved */
389
#define NS_KEY_PROT_TLS         1
390
#define NS_KEY_PROT_EMAIL       2
391
#define NS_KEY_PROT_DNSSEC      3
392
#define NS_KEY_PROT_IPSEC       4
393
#define NS_KEY_PROT_ANY         255
394
 
395
/* Signatures */
396
#define NS_MD5RSA_MIN_BITS       512    /* Size of a mod or exp in bits */
397
#define NS_MD5RSA_MAX_BITS      2552
398
        /* Total of binary mod and exp */
399
#define NS_MD5RSA_MAX_BYTES     ((NS_MD5RSA_MAX_BITS+7/8)*2+3)
400
        /* Max length of text sig block */
401
#define NS_MD5RSA_MAX_BASE64    (((NS_MD5RSA_MAX_BYTES+2)/3)*4)
402
#define NS_MD5RSA_MIN_SIZE      ((NS_MD5RSA_MIN_BITS+7)/8)
403
#define NS_MD5RSA_MAX_SIZE      ((NS_MD5RSA_MAX_BITS+7)/8)
404
 
405
#define NS_DSA_SIG_SIZE         41
406
#define NS_DSA_MIN_SIZE         213
407
#define NS_DSA_MAX_BYTES        405
408
 
409
/* Offsets into SIG record rdata to find various values */
410
#define NS_SIG_TYPE     0        /* Type flags */
411
#define NS_SIG_ALG      2       /* Algorithm */
412
#define NS_SIG_LABELS   3       /* How many labels in name */
413
#define NS_SIG_OTTL     4       /* Original TTL */
414
#define NS_SIG_EXPIR    8       /* Expiration time */
415
#define NS_SIG_SIGNED   12      /* Signature time */
416
#define NS_SIG_FOOT     16      /* Key footprint */
417
#define NS_SIG_SIGNER   18      /* Domain name of who signed it */
418
 
419
/* How RR types are represented as bit-flags in NXT records */
420
#define NS_NXT_BITS 8
421
#define NS_NXT_BIT_SET(  n,p) (p[(n)/NS_NXT_BITS] |=  (0x80>>((n)%NS_NXT_BITS)))
422
#define NS_NXT_BIT_CLEAR(n,p) (p[(n)/NS_NXT_BITS] &= ~(0x80>>((n)%NS_NXT_BITS)))
423
#define NS_NXT_BIT_ISSET(n,p) (p[(n)/NS_NXT_BITS] &   (0x80>>((n)%NS_NXT_BITS)))
424
#define NS_NXT_MAX 127
425
 
426
/*
427
 * Inline versions of get/put short/long.  Pointer is advanced.
428
 */
429
#define NS_GET16(s, cp) do { \
430
        register u_char *t_cp = (u_char *)(cp); \
431
        (s) = ((u_int16_t)t_cp[0] << 8) \
432
            | ((u_int16_t)t_cp[1]) \
433
            ; \
434
        (cp) += NS_INT16SZ; \
435
} while (0)
436
 
437
#define NS_GET32(l, cp) do { \
438
        register u_char *t_cp = (u_char *)(cp); \
439
        (l) = ((u_int32_t)t_cp[0] << 24) \
440
            | ((u_int32_t)t_cp[1] << 16) \
441
            | ((u_int32_t)t_cp[2] << 8) \
442
            | ((u_int32_t)t_cp[3]) \
443
            ; \
444
        (cp) += NS_INT32SZ; \
445
} while (0)
446
 
447
#define NS_PUT16(s, cp) do { \
448
        register u_int16_t t_s = (u_int16_t)(s); \
449
        register u_char *t_cp = (u_char *)(cp); \
450
        *t_cp++ = t_s >> 8; \
451
        *t_cp   = t_s; \
452
        (cp) += NS_INT16SZ; \
453
} while (0)
454
 
455
#define NS_PUT32(l, cp) do { \
456
        register u_int32_t t_l = (u_int32_t)(l); \
457
        register u_char *t_cp = (u_char *)(cp); \
458
        *t_cp++ = t_l >> 24; \
459
        *t_cp++ = t_l >> 16; \
460
        *t_cp++ = t_l >> 8; \
461
        *t_cp   = t_l; \
462
        (cp) += NS_INT32SZ; \
463
} while (0)
464
 
465
/*
466
 * ANSI C identifier hiding for bind's lib/nameser.
467
 */
468
#define ns_get16                __ns_get16
469
#define ns_get32                __ns_get32
470
#define ns_put16                __ns_put16
471
#define ns_put32                __ns_put32
472
#define ns_initparse            __ns_initparse
473
#define ns_skiprr               __ns_skiprr
474
#define ns_parserr              __ns_parserr
475
#define ns_sprintrr             __ns_sprintrr
476
#define ns_sprintrrf            __ns_sprintrrf
477
#define ns_format_ttl           __ns_format_ttl
478
#define ns_parse_ttl            __ns_parse_ttl
479
#define ns_datetosecs           __ns_datetosecs
480
#define ns_name_ntol            __ns_name_ntol
481
#define ns_name_ntop            __ns_name_ntop
482
#define ns_name_pton            __ns_name_pton
483
#define ns_name_unpack          __ns_name_unpack
484
#define ns_name_pack            __ns_name_pack
485
#define ns_name_compress        __ns_name_compress
486
#define ns_name_uncompress      __ns_name_uncompress
487
#define ns_name_skip            __ns_name_skip
488
#define ns_name_rollback        __ns_name_rollback
489
#define ns_sign                 __ns_sign
490
#define ns_sign_tcp             __ns_sign_tcp
491
#define ns_sign_tcp_init        __ns_sign_tcp_init
492
#define ns_find_tsig            __ns_find_tsig
493
#define ns_verify               __ns_verify
494
#define ns_verify_tcp           __ns_verify_tcp
495
#define ns_verify_tcp_init      __ns_verify_tcp_init
496
#define ns_samedomain           __ns_samedomain
497
#define ns_subdomain            __ns_subdomain
498
#define ns_makecanon            __ns_makecanon
499
#define ns_samename             __ns_samename
500
 
501
__BEGIN_DECLS
502
u_int           ns_get16 __P((const u_char *));
503
u_long          ns_get32 __P((const u_char *));
504
void            ns_put16 __P((u_int, u_char *));
505
void            ns_put32 __P((u_long, u_char *));
506
int             ns_initparse __P((const u_char *, int, ns_msg *));
507
int             ns_skiprr __P((const u_char *, const u_char *, ns_sect, int));
508
int             ns_parserr __P((ns_msg *, ns_sect, int, ns_rr *));
509
int             ns_sprintrr __P((const ns_msg *, const ns_rr *,
510
                                 const char *, const char *, char *, size_t));
511
int             ns_sprintrrf __P((const u_char *, size_t, const char *,
512
                                  ns_class, ns_type, u_long, const u_char *,
513
                                  size_t, const char *, const char *,
514
                                  char *, size_t));
515
int             ns_format_ttl __P((u_long, char *, size_t));
516
int             ns_parse_ttl __P((const char *, u_long *));
517
u_int32_t       ns_datetosecs __P((const char *cp, int *errp));
518
int             ns_name_ntol __P((const u_char *, u_char *, size_t));
519
int             ns_name_ntop __P((const u_char *, char *, size_t));
520
int             ns_name_pton __P((const char *, u_char *, size_t));
521
int             ns_name_unpack __P((const u_char *, const u_char *,
522
                                    const u_char *, u_char *, size_t));
523
int             ns_name_pack __P((const u_char *, u_char *, int,
524
                                  const u_char **, const u_char **));
525
int             ns_name_uncompress __P((const u_char *, const u_char *,
526
                                        const u_char *, char *, size_t));
527
int             ns_name_compress __P((const char *, u_char *, size_t,
528
                                      const u_char **, const u_char **));
529
int             ns_name_skip __P((const u_char **, const u_char *));
530
void            ns_name_rollback __P((const u_char *, const u_char **,
531
                                      const u_char **));
532
int             ns_sign __P((u_char *, int *, int, int, void *,
533
                             const u_char *, int, u_char *, int *, time_t));
534
int             ns_sign_tcp __P((u_char *, int *, int, int,
535
                                 ns_tcp_tsig_state *, int));
536
int             ns_sign_tcp_init __P((void *, const u_char *, int,
537
                                        ns_tcp_tsig_state *));
538
u_char          *ns_find_tsig __P((u_char *, u_char *));
539
int             ns_verify __P((u_char *, int *, void *,
540
                               const u_char *, int, u_char *, int *,
541
                               time_t *, int));
542
int             ns_verify_tcp __P((u_char *, int *, ns_tcp_tsig_state *, int));
543
int             ns_verify_tcp_init __P((void *, const u_char *, int,
544
                                        ns_tcp_tsig_state *));
545
int             ns_samedomain __P((const char *, const char *));
546
int             ns_subdomain __P((const char *, const char *));
547
int             ns_makecanon __P((const char *, char *, size_t));
548
int             ns_samename __P((const char *, const char *));
549
__END_DECLS
550
 
551
#ifdef BIND_4_COMPAT
552
#include <arpa/nameser_compat.h>
553
#endif
554
 
555
#endif /* !_ARPA_NAMESER_H_ */

powered by: WebSVN 2.1.0

© copyright 1999-2024 OpenCores.org, equivalent to Oliscience, all rights reserved. OpenCores®, registered trademark.