1 .\" $KAME: getnameinfo.3,v 1.37 2005/01/05 03:23:05 itojun Exp $
2 .\" $OpenBSD: getnameinfo.3,v 1.36 2004/12/21 09:48:20 jmc Exp $
4 .\" Copyright (C) 2004 Internet Systems Consortium, Inc. ("ISC")
5 .\" Copyright (C) 2000, 2001 Internet Software Consortium.
7 .\" Permission to use, copy, modify, and distribute this software for any
8 .\" purpose with or without fee is hereby granted, provided that the above
9 .\" copyright notice and this permission notice appear in all copies.
11 .\" THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
12 .\" REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
13 .\" AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
14 .\" INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
15 .\" LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
16 .\" OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
17 .\" PERFORMANCE OF THIS SOFTWARE.
19 .\" $FreeBSD: src/lib/libc/net/getnameinfo.3,v 1.25 2007/02/28 21:28:33 bms Exp $
26 .Nd socket address structure to hostname and service name
28 .Fd #include <sys/types.h>
29 .Fd #include <sys/socket.h>
30 .Fd #include <netdb.h>
33 .Fa "const struct sockaddr *sa" "socklen_t salen" "char *host"
34 .Fa "socklen_t hostlen" "char *serv" "socklen_t servlen" "int flags"
35 .\".Fa "size_t hostlen" "char *serv" "size_t servlen" "int flags"
40 function is used to convert a
42 structure to a pair of host name and service strings.
43 It is a replacement for and provides more flexibility than the
47 functions and is the converse of the
51 If a link-layer address is passed to
53 its ASCII representation will be stored in
55 The string pointed to by
57 will be set to the empty string if non-NULL;
59 will always be ignored.
60 This is intended as a replacement for the legacy
68 should point to either a
73 structure (for IPv4, IPv6 or link-layer respectively) that is
77 The host and service names associated with
83 which have length parameters
98 If a length parameter is zero, no string will be stored.
99 Otherwise, enough space must be provided to store the
100 host name or service string plus a byte for the NUL terminator.
104 argument is formed by
106 the following values:
107 .Bl -tag -width "NI_NUMERICHOSTXX"
109 A fully qualified domain name is not required for local hosts.
110 The local part of the fully qualified domain name is returned instead.
111 .It Dv NI_NUMERICHOST
112 Return the address in numeric form, as if calling
114 instead of a host name.
117 If the host name cannot be found in DNS and this flag is set,
118 a non-zero error code is returned.
119 If the host name is not found and the flag is not set, the
120 address is returned in numeric form.
122 The service name is returned as a digit string representing the port number.
124 Specifies that the service being looked up is a datagram
127 to be called with a second argument of
129 instead of its default of
131 This is required for the few ports (512\-514) that have different services
138 This implementation allows numeric IPv6 address notation with scope identifier,
139 as documented in chapter 11 of draft-ietf-ipv6-scoping-arch-02.txt.
140 IPv6 link-local address will appear as a string like
144 for more information.
147 returns zero on success or one of the error codes listed in
151 The following code tries to get a numeric host name, and service name,
152 for a given socket address.
153 Observe that there is no hardcoded reference to a particular address family.
154 .Bd -literal -offset indent
155 struct sockaddr *sa; /* input */
156 char hbuf[NI_MAXHOST], sbuf[NI_MAXSERV];
158 if (getnameinfo(sa, sa->sa_len, hbuf, sizeof(hbuf), sbuf,
159 sizeof(sbuf), NI_NUMERICHOST | NI_NUMERICSERV)) {
160 errx(1, "could not get numeric hostname");
163 printf("host=%s, serv=%s\en", hbuf, sbuf);
166 The following version checks if the socket address has a reverse address mapping:
167 .Bd -literal -offset indent
168 struct sockaddr *sa; /* input */
169 char hbuf[NI_MAXHOST];
171 if (getnameinfo(sa, sa->sa_len, hbuf, sizeof(hbuf), NULL, 0,
173 errx(1, "could not resolve hostname");
176 printf("host=%s\en", hbuf);
181 .Xr gethostbyaddr 3 ,
182 .Xr getservbyport 3 ,
196 .%T Basic Socket Interface Extensions for IPv6
206 .%T "IPv6 Scoped Address Architecture"
208 .%N draft-ietf-ipv6-scoping-arch-02.txt
209 .%O work in progress material
213 .%T Protocol Independence Using the Sockets API
214 .%B "Proceedings of the freenix track: 2000 USENIX annual technical conference"
220 function is defined by the
222 draft specification and documented in
224 .Dq Basic Socket Interface Extensions for IPv6 .
227 can return both numeric and FQDN forms of the address specified in
229 There is no return value that indicates whether the string returned in
231 is a result of binary to numeric-text translation (like
233 or is the result of a DNS reverse lookup.
234 Because of this, malicious parties could set up a PTR record as follows:
235 .Bd -literal -offset indent
236 1.0.0.127.in-addr.arpa. IN PTR 10.1.1.1
239 and trick the caller of
248 To prevent such attacks, the use of
250 is recommended when the result of
253 for access control purposes:
254 .Bd -literal -offset indent
257 char addr[NI_MAXHOST];
258 struct addrinfo hints, *res;
261 error = getnameinfo(sa, salen, addr, sizeof(addr),
262 NULL, 0, NI_NAMEREQD);
264 memset(&hints, 0, sizeof(hints));
265 hints.ai_socktype = SOCK_DGRAM; /*dummy*/
266 hints.ai_flags = AI_NUMERICHOST;
267 if (getaddrinfo(addr, "0", &hints, &res) == 0) {
268 /* malicious PTR record */
270 printf("bogus PTR record\en");
273 /* addr is FQDN as a result of PTR lookup */
275 /* addr is numeric string */
276 error = getnameinfo(sa, salen, addr, sizeof(addr),
277 NULL, 0, NI_NUMERICHOST);
282 .\"intentionally uses a different
286 .\"suggests, to avoid buffer length handling mistakes.