API: Reject unknown flags
[adns] / src / types.c
CommitLineData
e576be50 1/*
2 * types.c
3 * - RR-type-specific code, and the machinery to call it
4 */
5/*
ae8cc977 6 * This file is part of adns, which is
26e1c3d6 7 * Copyright (C) 1997-2000,2003,2006,2014 Ian Jackson
17cd4f48 8 * Copyright (C) 2014 Mark Wooding
ae8cc977 9 * Copyright (C) 1999-2000,2003,2006 Tony Finch
10 * Copyright (C) 1991 Massachusetts Institute of Technology
11 * (See the file INSTALL for full details.)
e576be50 12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
7f8bbe29 15 * the Free Software Foundation; either version 3, or (at your option)
e576be50 16 * any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License
8c09a4c6 24 * along with this program; if not, write to the Free Software Foundation.
e576be50 25 */
98a3f706 26
908dbcfa 27#include <stddef.h>
1b644113 28#include <stdlib.h>
29
0f091044 30#include <sys/types.h>
71a6ff46 31#include <sys/socket.h>
32#include <netinet/in.h>
86e7b8d9 33#include <arpa/inet.h>
34
98a3f706 35#include "internal.h"
36
609133ee 37#define R_NOMEM return adns_s_nomemory
38#define CSP_ADDSTR(s) do { \
39 if (!adns__vbuf_appendstr(vb,(s))) R_NOMEM; \
40 } while (0)
1dfe95d8 41
eb81d633 42/*
43 * order of sections:
44 *
9ec44266 45 * _string (pap)
eb81d633 46 * _textdata, _qstring (csp)
47 * _str (mf,cs)
9ec44266 48 * _intstr (mf,csp,cs)
eb81d633 49 * _manyistr (mf,cs)
50 * _txt (pa)
b0e8338a
MW
51 * _inaddr (pa,di,cs
52 * +search_sortlist, dip_genaddr, csp_genaddr)
50e2b0c3 53 * _in6addr (pa,di,cs)
908dbcfa 54 * _addr (pap,pa,di,div,csp,cs,gsz,qs
2ca5496d
MW
55 * +search_sortlist_sa, dip_sockaddr,
56 * addr_rrtypes, addr_submit, icb_addr)
382b81f7
MW
57 * _domain (pap,csp,cs)
58 * _dom_raw (pa)
eb81d633 59 * _host_raw (pa)
382b81f7
MW
60 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs
61 * +pap_findaddrs, icb_hostaddr)
eb81d633 62 * _mx_raw (pa,di)
63 * _mx (pa,di)
64 * _inthostaddr (mf,cs)
382b81f7 65 * _inthost (cs)
938b0228 66 * _ptr (ckl,pa +icb_ptr)
382b81f7
MW
67 * _strpair (mf)
68 * _intstrpair (mf)
9ec44266 69 * _hinfo (pa)
382b81f7
MW
70 * _mailbox (pap,csp +pap_mailbox822)
71 * _rp (pa,cs)
9ec44266 72 * _soa (pa,mf,cs)
e8e5aeac 73 * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort)
2c6eb096 74 * _byteblock (mf)
75 * _opaque (pa,cs)
eb81d633 76 * _flat (mf)
77 *
78 * within each section:
e8e5aeac 79 * ckl_*
eb81d633 80 * pap_*
81 * pa_*
82 * dip_*
83 * di_*
84 * mfp_*
85 * mf_*
86 * csp_*
87 * cs_*
b0a32b17 88 * gsz_*
d24e2a7e 89 * postsort_*
13826233 90 * qs_*
eb81d633 91 */
92
93/*
b365d68a 94 * _qstring (pap,csp)
eb81d633 95 */
96
b365d68a 97static adns_status pap_qstring(const parseinfo *pai, int *cbyte_io, int max,
9ec44266 98 int *len_r, char **str_r) {
99 /* Neither len_r nor str_r may be null.
100 * End of datagram (overrun) is indicated by returning adns_s_invaliddata;
101 */
102 const byte *dgram= pai->dgram;
103 int l, cbyte;
104 char *str;
105
106 cbyte= *cbyte_io;
107
108 if (cbyte >= max) return adns_s_invaliddata;
109 GET_B(cbyte,l);
110 if (cbyte+l > max) return adns_s_invaliddata;
111
112 str= adns__alloc_interim(pai->qu, l+1);
113 if (!str) R_NOMEM;
114
115 str[l]= 0;
116 memcpy(str,dgram+cbyte,l);
117
118 *len_r= l;
119 *str_r= str;
120 *cbyte_io= cbyte+l;
121
122 return adns_s_ok;
123}
124
b365d68a 125static adns_status csp_qstring(vbuf *vb, const char *dp, int len) {
eb81d633 126 unsigned char ch;
127 char buf[10];
128 int cn;
129
130 CSP_ADDSTR("\"");
131 for (cn=0; cn<len; cn++) {
132 ch= *dp++;
b365d68a 133 if (ch == '\\') {
9ec44266 134 CSP_ADDSTR("\\\\");
b365d68a 135 } else if (ch == '"') {
136 CSP_ADDSTR("\\\"");
137 } else if (ch >= 32 && ch <= 126) {
138 if (!adns__vbuf_append(vb,&ch,1)) R_NOMEM;
eb81d633 139 } else {
9ec44266 140 sprintf(buf,"\\x%02x",ch);
eb81d633 141 CSP_ADDSTR(buf);
142 }
143 }
144 CSP_ADDSTR("\"");
145
146 return adns_s_ok;
147}
148
eb81d633 149/*
b365d68a 150 * _str (mf)
eb81d633 151 */
152
153static void mf_str(adns_query qu, void *datap) {
154 char **rrp= datap;
155
156 adns__makefinal_str(qu,rrp);
157}
158
eb81d633 159/*
b365d68a 160 * _intstr (mf)
eb81d633 161 */
162
163static void mf_intstr(adns_query qu, void *datap) {
164 adns_rr_intstr *rrp= datap;
165
166 adns__makefinal_str(qu,&rrp->str);
167}
168
eb81d633 169/*
b365d68a 170 * _manyistr (mf)
eb81d633 171 */
172
173static void mf_manyistr(adns_query qu, void *datap) {
174 adns_rr_intstr **rrp= datap;
175 adns_rr_intstr *te, *table;
176 void *tablev;
177 int tc;
178
179 for (tc=0, te= *rrp; te->i >= 0; te++, tc++);
180 tablev= *rrp;
181 adns__makefinal_block(qu,&tablev,sizeof(*te)*(tc+1));
182 *rrp= table= tablev;
183 for (te= *rrp; te->i >= 0; te++)
184 adns__makefinal_str(qu,&te->str);
185}
186
eb81d633 187/*
b365d68a 188 * _txt (pa,cs)
eb81d633 189 */
190
609133ee 191static adns_status pa_txt(const parseinfo *pai, int cbyte,
192 int max, void *datap) {
eb81d633 193 adns_rr_intstr **rrp= datap, *table, *te;
194 const byte *dgram= pai->dgram;
195 int ti, tc, l, startbyte;
9ec44266 196 adns_status st;
eb81d633 197
198 startbyte= cbyte;
199 if (cbyte >= max) return adns_s_invaliddata;
200 tc= 0;
201 while (cbyte < max) {
202 GET_B(cbyte,l);
203 cbyte+= l;
9ec44266 204 tc++;
eb81d633 205 }
b365d68a 206 if (cbyte != max || !tc) return adns_s_invaliddata;
eb81d633 207
208 table= adns__alloc_interim(pai->qu,sizeof(*table)*(tc+1));
209 if (!table) R_NOMEM;
210
211 for (cbyte=startbyte, ti=0, te=table; ti<tc; ti++, te++) {
b365d68a 212 st= pap_qstring(pai, &cbyte, max, &te->i, &te->str);
9ec44266 213 if (st) return st;
eb81d633 214 }
215 assert(cbyte == max);
216
217 te->i= -1;
218 te->str= 0;
219
220 *rrp= table;
221 return adns_s_ok;
828d89bd 222}
223
b365d68a 224static adns_status cs_txt(vbuf *vb, const void *datap) {
225 const adns_rr_intstr *const *rrp= datap;
226 const adns_rr_intstr *current;
227 adns_status st;
228 int spc;
229
230 for (current= *rrp, spc=0; current->i >= 0; current++, spc=1) {
231 if (spc) CSP_ADDSTR(" ");
232 st= csp_qstring(vb,current->str,current->i); if (st) return st;
233 }
234 return adns_s_ok;
235}
236
237/*
238 * _hinfo (cs)
239 */
240
241static adns_status cs_hinfo(vbuf *vb, const void *datap) {
242 const adns_rr_intstrpair *rrp= datap;
243 adns_status st;
244
245 st= csp_qstring(vb,rrp->array[0].str,rrp->array[0].i); if (st) return st;
246 CSP_ADDSTR(" ");
247 st= csp_qstring(vb,rrp->array[1].str,rrp->array[1].i); if (st) return st;
248 return adns_s_ok;
249}
250
eb81d633 251/*
b0e8338a 252 * _inaddr (pa,di,cs +search_sortlist, dip_genaddr, csp_genaddr)
eb81d633 253 */
254
609133ee 255static adns_status pa_inaddr(const parseinfo *pai, int cbyte,
256 int max, void *datap) {
e062dcae 257 struct in_addr *storeto= datap;
e7a9ca47 258
259 if (max-cbyte != 4) return adns_s_invaliddata;
1dfe95d8 260 memcpy(storeto, pai->dgram + cbyte, 4);
e7a9ca47 261 return adns_s_ok;
262}
263
f930c455 264static int search_sortlist(adns_state ads, int af, const void *ad) {
09957b1c 265 const struct sortlist *slp;
82ae109e 266 struct in_addr a4;
09957b1c 267 int i;
477b9c0b
MW
268 int v6mappedp= 0;
269
270 if (af == AF_INET6) {
82ae109e 271 const struct in6_addr *a6= ad;
477b9c0b 272 if (IN6_IS_ADDR_V4MAPPED(a6)) {
82ae109e
IJ
273 a4.s_addr= htonl(((unsigned long)a6->s6_addr[12] << 24) |
274 ((unsigned long)a6->s6_addr[13] << 16) |
275 ((unsigned long)a6->s6_addr[14] << 8) |
276 ((unsigned long)a6->s6_addr[15] << 0));
477b9c0b
MW
277 v6mappedp= 1;
278 }
279 }
280
09957b1c 281 for (i=0, slp=ads->sortlist;
609133ee 282 i<ads->nsortlist &&
82ae109e 283 !adns__addr_matches(af,ad, &slp->base,&slp->mask) &&
477b9c0b 284 !(v6mappedp &&
82ae109e 285 adns__addr_matches(AF_INET,&a4, &slp->base,&slp->mask));
09957b1c 286 i++, slp++);
287 return i;
eb81d633 288}
289
f930c455 290static int dip_genaddr(adns_state ads, int af, const void *a, const void *b) {
09957b1c 291 int ai, bi;
292
293 if (!ads->nsortlist) return 0;
294
f930c455
MW
295 ai= search_sortlist(ads,af,a);
296 bi= search_sortlist(ads,af,b);
09957b1c 297 return bi<ai;
298}
299
609133ee 300static int di_inaddr(adns_state ads,
301 const void *datap_a, const void *datap_b) {
f930c455 302 return dip_genaddr(ads,AF_INET,datap_a,datap_b);
e062dcae 303}
304
b0e8338a
MW
305static adns_status csp_genaddr(vbuf *vb, int af, const void *p) {
306 char buf[ADNS_ADDR2TEXT_BUFLEN];
307 int len= sizeof(buf);
308 adns_rr_addr a;
309 int err;
310
311 memset(&a, 0, sizeof(a));
312 a.addr.sa.sa_family= af;
82ae109e 313 adns__addr_inject(p, &a.addr);
b0e8338a
MW
314 err= adns_addr2text(&a.addr.sa,0, buf,&len, 0); assert(!err);
315 CSP_ADDSTR(buf);
1dfe95d8 316 return adns_s_ok;
86e7b8d9 317}
e7a9ca47 318
b0e8338a
MW
319static adns_status cs_inaddr(vbuf *vb, const void *datap) {
320 return csp_genaddr(vb, AF_INET,datap);
321}
322
eb81d633 323/*
50e2b0c3
MW
324 * _in6addr (pa,di,cs)
325 */
326
327static adns_status pa_in6addr(const parseinfo *pai, int cbyte,
328 int max, void *datap) {
329 struct in6_addr *storeto= datap;
330
331 if (max-cbyte != 16) return adns_s_invaliddata;
332 memcpy(storeto->s6_addr, pai->dgram + cbyte, 16);
333 return adns_s_ok;
334}
335
336static int di_in6addr(adns_state ads,
337 const void *datap_a, const void *datap_b) {
338 return dip_genaddr(ads,AF_INET6,datap_a,datap_b);
339}
340
341static adns_status cs_in6addr(vbuf *vb, const void *datap) {
342 return csp_genaddr(vb,AF_INET6,datap);
343}
344
345/*
908dbcfa 346 * _addr (pap,pa,di,div,csp,cs,gsz,qs
2ca5496d
MW
347 * +search_sortlist_sa, dip_sockaddr, addr_rrtypes,
348 * addr_submit, icb_addr)
eb81d633 349 */
350
9d138734
MW
351static const typeinfo tinfo_addrsub;
352
2ca5496d 353#define ADDR_RRTYPES(_) _(a) _(aaaa)
9d138734
MW
354
355static const adns_rrtype addr_all_rrtypes[] = {
356#define RRTY_CODE(ty) adns_r_##ty,
357 ADDR_RRTYPES(RRTY_CODE)
358#undef RRTY_CODE
359};
360
361enum {
362#define RRTY_INDEX(ty) addr__ri_##ty,
363 ADDR_RRTYPES(RRTY_INDEX)
364#undef RRTY_INDEX
365 addr_nrrtypes,
366#define RRTY_FLAG(ty) addr_rf_##ty = 1 << addr__ri_##ty,
367 ADDR_RRTYPES(RRTY_FLAG)
991b3d57 368 addr__rrty_eat_final_comma
9d138734
MW
369#undef RRTY_FLAG
370};
371
372static unsigned addr_rrtypeflag(adns_rrtype type) {
373 int i;
374
375 type &= adns_rrt_typemask;
2140e71d
IJ
376 for (i=0; i<addr_nrrtypes; i++)
377 if (type==addr_all_rrtypes[i])
378 return 1 << i;
379 return 0;
9d138734
MW
380}
381
1bc731c6
MW
382/* About CNAME handling in addr queries.
383 *
384 * A user-level addr query is translated into a number of protocol-level
385 * queries, and its job is to reassemble the results. This gets tricky if
386 * the answers aren't consistent. In particular, if the answers report
387 * inconsistent indirection via CNAME records (e.g., different CNAMEs, or
388 * some indirect via a CNAME, and some don't) then we have trouble.
389 *
390 * Once we've received an answer, even if it was NODATA, we set
391 * adns__qf_addr_answer on the parent query. This will let us detect a
392 * conflict between a no-CNAME-with-NODATA reply and a subsequent CNAME.
393 *
394 * If we detect a conflict of any kind, then at least one answer came back
395 * with a CNAME record, so we pick the first such answer (somewhat
396 * arbitrarily) as being the `right' canonical name, and set this in the
397 * parent query's answer->cname slot. We discard address records from the
398 * wrong name. And finally we cancel the outstanding child queries, and
399 * resubmit address queries for the address families we don't yet have, with
400 * adns__qf_addr_cname set so that we know that we're in the fixup state.
401 */
402
9e04ed83
IJ
403static adns_status pap_addr(const parseinfo *pai, int in_rrty, size_t out_rrsz,
404 int *cbyte_io, int cbyte_max, adns_rr_addr *out) {
405 int in_addrlen;
406 int out_af, out_salen;
cdf51ff0 407 struct in6_addr v6map;
9e04ed83
IJ
408
409 const void *use_addr= pai->dgram + *cbyte_io;
410
411 switch (in_rrty) {
412 case adns_r_a: in_addrlen= 4; out_af= AF_INET; break;
413 case adns_r_aaaa: in_addrlen= 16; out_af= AF_INET6; break;
414 default: abort();
415 }
416
417 if ((*cbyte_io + in_addrlen) != cbyte_max) return adns_s_invaliddata;
418
419 if (out_af==AF_INET &&
420 (pai->qu->flags & adns_qf_ipv6_mapv4) &&
421 (pai->qu->answer->type & adns__qtf_bigaddr)) {
422 memset(v6map.s6_addr + 0, 0x00, 10);
423 memset(v6map.s6_addr + 10, 0xff, 2);
424 memcpy(v6map.s6_addr + 12, use_addr, 4);
425 use_addr= v6map.s6_addr;
426 out_af= AF_INET6;
908dbcfa 427 }
c7836bc9 428
9e04ed83
IJ
429 switch (out_af) {
430 case AF_INET: out_salen= sizeof(out->addr.inet); break;
431 case AF_INET6: out_salen= sizeof(out->addr.inet6); break;
432 default: abort();
433 }
434
435 assert(offsetof(adns_rr_addr, addr) + out_salen <= out_rrsz);
436
437 memset(&out->addr, 0, out_salen);
438 out->len= out_salen;
439 out->addr.sa.sa_family= out_af;
440 adns__addr_inject(use_addr, &out->addr);
908dbcfa 441
9e04ed83 442 *cbyte_io += in_addrlen;
908dbcfa
MW
443 return adns_s_ok;
444}
445
446static adns_status pa_addr(const parseinfo *pai, int cbyte,
447 int max, void *datap) {
448 int err= pap_addr(pai, pai->qu->answer->type & adns_rrt_typemask,
449 pai->qu->answer->rrsz, &cbyte, max, datap);
450 if (err) return err;
451 if (cbyte != max) return adns_s_invaliddata;
828d89bd 452 return adns_s_ok;
453}
454
f930c455 455static int search_sortlist_sa(adns_state ads, const struct sockaddr *sa) {
82ae109e
IJ
456 const void *pa = adns__sockaddr_addr(sa);
457 return search_sortlist(ads, sa->sa_family, pa);
f930c455 458}
07554ccd 459
f930c455
MW
460static int dip_sockaddr(adns_state ads,
461 const struct sockaddr *sa,
462 const struct sockaddr *sb) {
463 if (!ads->sortlist) return 0;
464 return search_sortlist_sa(ads, sa) > search_sortlist_sa(ads, sb);
465}
466
09957b1c 467static int di_addr(adns_state ads, const void *datap_a, const void *datap_b) {
551ff40f 468 const adns_rr_addr *ap= datap_a, *bp= datap_b;
f930c455 469 return dip_sockaddr(ads, &ap->addr.sa, &bp->addr.sa);
828d89bd 470}
471
09957b1c 472static int div_addr(void *context, const void *datap_a, const void *datap_b) {
473 const adns_state ads= context;
474
475 return di_addr(ads, datap_a, datap_b);
476}
477
551ff40f 478static adns_status csp_addr(vbuf *vb, const adns_rr_addr *rrp) {
b0e8338a
MW
479 char buf[ADNS_ADDR2TEXT_BUFLEN];
480 int len= sizeof(buf);
481 int err;
828d89bd 482
483 switch (rrp->addr.inet.sin_family) {
484 case AF_INET:
b365d68a 485 CSP_ADDSTR("INET ");
b0e8338a
MW
486 goto a2t;
487 case AF_INET6:
488 CSP_ADDSTR("INET6 ");
489 goto a2t;
490 a2t:
491 err= adns_addr2text(&rrp->addr.sa,0, buf,&len, 0); assert(!err);
492 CSP_ADDSTR(buf);
828d89bd 493 break;
494 default:
495 sprintf(buf,"AF=%u",rrp->addr.sa.sa_family);
1dfe95d8 496 CSP_ADDSTR(buf);
828d89bd 497 break;
498 }
499 return adns_s_ok;
500}
501
1dfe95d8 502static adns_status cs_addr(vbuf *vb, const void *datap) {
551ff40f 503 const adns_rr_addr *rrp= datap;
1dfe95d8 504
505 return csp_addr(vb,rrp);
506}
507
b0a32b17
MW
508static int gsz_addr(const typeinfo *typei, adns_rrtype type) {
509 return type & adns__qtf_bigaddr ?
510 sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only);
511}
512
9d138734
MW
513static unsigned addr_rrtypes(adns_state ads, adns_rrtype type,
514 adns_queryflags qf) {
515 /* Return a mask of addr_rf_... flags indicating which address families are
516 * wanted, given a query type and flags.
517 */
138722f0
MW
518
519 adns_queryflags permitaf= 0;
520 unsigned want= 0;
521
522 if (!(type & adns__qtf_bigaddr))
523 qf= (qf & ~adns_qf_want_allaf) | adns_qf_want_ipv4;
524 else {
525 if (!(qf & adns_qf_want_allaf)) {
526 qf |= (type & adns__qtf_manyaf) ?
527 adns_qf_want_allaf : adns_qf_want_ipv4;
528 }
529 if (ads->iflags & adns_if_permit_ipv4) permitaf |= adns_qf_want_ipv4;
530 if (ads->iflags & adns_if_permit_ipv6) permitaf |= adns_qf_want_ipv6;
531 if (qf & permitaf) qf &= permitaf | ~adns_qf_want_allaf;
532 }
533
534 if (qf & adns_qf_want_ipv4) want |= addr_rf_a;
535 if (qf & adns_qf_want_ipv6) want |= addr_rf_aaaa;
536
537 return want;
9d138734
MW
538}
539
540static void icb_addr(adns_query parent, adns_query child);
541
542static void addr_subqueries(adns_query qu, struct timeval now,
543 adns_queryflags qf_extra,
544 const byte *qd_dgram, int qd_dglen) {
545 int i, err, id;
546 adns_query cqu;
547 adns_queryflags qf= (qu->flags & ~adns_qf_search) | qf_extra;
548 adns_rrtype qtf= qu->answer->type & adns__qtf_deref;
549 unsigned which= qu->ctx.tinfo.addr.want & ~qu->ctx.tinfo.addr.have;
550 qcontext ctx;
551
552 memset(&ctx, 0, sizeof(ctx));
553 ctx.callback= icb_addr;
554 for (i=0; i<addr_nrrtypes; i++) {
555 if (!(which & (1 << i))) continue;
556 err= adns__mkquery_frdgram(qu->ads, &qu->vb, &id, qd_dgram,qd_dglen,
557 DNS_HDRSIZE, addr_all_rrtypes[i], qf);
558 if (err) goto x_error;
559 err= adns__internal_submit(qu->ads, &cqu, qu, &tinfo_addrsub,
560 addr_all_rrtypes[i] | qtf,
561 &qu->vb, id, qf, now, &ctx);
562 if (err) goto x_error;
563 cqu->answer->rrsz= qu->answer->rrsz;
564 }
565 qu->state= query_childw;
566 LIST_LINK_TAIL(qu->ads->childw, qu);
567 return;
568
569x_error:
570 adns__query_fail(qu, err);
571}
572
2ca5496d
MW
573static adns_status addr_submit(adns_query parent, adns_query *query_r,
574 vbuf *qumsg_vb, int id, unsigned want,
575 adns_queryflags flags, struct timeval now,
576 qcontext *ctx) {
577 /* This is effectively a substitute for adns__internal_submit, intended for
578 * the case where the caller (possibly) only wants a subset of the
579 * available record types. The memory management and callback rules are
580 * the same as for adns__internal_submit.
581 *
5cba7987
IJ
582 * Some differences: the query is linked onto the parent's children
583 * list before exit (though the parent's state is not changed, and
584 * it is not linked into the childw list queue); and we set the
585 * `tinfo' portion of the context structure (yes, modifying *ctx),
586 * since this is, in fact, the main purpose of this function.
2ca5496d
MW
587 */
588
589 adns_state ads= parent->ads;
590 adns_query qu;
591 adns_status err;
592 adns_rrtype type= ((adns_r_addr & adns_rrt_reprmask) |
593 (parent->answer->type & ~adns_rrt_reprmask));
594
595 ctx->tinfo.addr.want= want;
596 ctx->tinfo.addr.have= 0;
597 err= adns__internal_submit(ads, &qu, parent, adns__findtype(adns_r_addr),
598 type, qumsg_vb, id, flags, now, ctx);
599 if (err) return err;
600
601 *query_r= qu;
602 return adns_s_ok;
603}
604
9d138734
MW
605static adns_status append_addrs(adns_query qu, size_t rrsz,
606 adns_rr_addr **dp, int *dlen,
607 const adns_rr_addr *sp, int slen) {
608 /* Append a vector of slen addr records, each of size rrsz, starting at ap,
609 * to a vector starting at *dp, of length *dlen. On successful completion,
610 * *dp and *dlen are updated.
611 */
612
613 size_t drrsz= *dlen*rrsz, srrsz= slen*rrsz;
614 byte *p;
615
616 if (!slen) return adns_s_ok;
617 p= adns__alloc_interim(qu, drrsz + srrsz);
618 if (!p) R_NOMEM;
619 if (*dlen) {
620 memcpy(p, *dp, drrsz);
621 adns__free_interim(qu, *dp);
622 }
623 memcpy(p + drrsz, sp, srrsz);
624 *dlen += slen;
625 *dp= (adns_rr_addr *)p;
626 return adns_s_ok;
627}
628
629static void propagate_ttl(adns_query to, adns_query from)
630 { if (to->expires > from->expires) to->expires= from->expires; }
631
632static adns_status copy_cname_from_child(adns_query parent, adns_query child) {
633 adns_answer *pans= parent->answer, *cans= child->answer;
634 size_t n= strlen(cans->cname) + 1;
635
636 pans->cname= adns__alloc_preserved(parent, n);
637 if (!pans->cname) R_NOMEM;
638 memcpy(pans->cname, cans->cname, n);
639 return adns_s_ok;
640}
641
642static void done_addr_type(adns_query qu, adns_rrtype type) {
643 unsigned f= addr_rrtypeflag(type);
644 assert(f); qu->ctx.tinfo.addr.have |= f;
645}
646
647static void icb_addr(adns_query parent, adns_query child) {
648 adns_state ads= parent->ads;
649 adns_answer *pans= parent->answer, *cans= child->answer;
650 struct timeval now;
651 adns_status err;
1bc731c6 652 adns_queryflags qf;
79d4d86a 653 int id, r;
9d138734
MW
654
655 propagate_ttl(parent, child);
656
1bc731c6
MW
657 if (!(child->flags & adns__qf_addr_cname) &&
658 (parent->flags & adns__qf_addr_answer) &&
659 (!!pans->cname != !!cans->cname ||
660 (pans->cname && strcmp(pans->cname, cans->cname)))) {
661 /* We've detected an inconsistency in CNAME records, and must deploy
662 * countermeasures.
663 */
664
665 if (!pans->cname) {
666 /* The child has a CNAME record, but the parent doesn't. We must
667 * discard all of the parent's addresses, and substitute the child's.
668 */
669
670 assert(pans->rrsz == cans->rrsz);
671 adns__free_interim(parent, pans->rrs.bytes);
672 adns__transfer_interim(child, parent, cans->rrs.bytes);
673 pans->rrs.bytes= cans->rrs.bytes;
674 pans->nrrs= cans->nrrs;
675 parent->ctx.tinfo.addr.have= 0;
676 done_addr_type(parent, cans->type);
677 err= copy_cname_from_child(parent, child); if (err) goto x_err;
678 }
679
680 /* We've settled on the CNAME (now) associated with the parent, which
681 * already has appropriate address records. Build a query datagram for
682 * this name so that we can issue child queries for the missing address
683 * families. The child's vbuf looks handy for this.
684 */
685 err= adns__mkquery(ads, &child->vb, &id, pans->cname,
686 strlen(pans->cname), &tinfo_addrsub,
687 adns_r_addr, parent->flags);
688 if (err) goto x_err;
689
690 /* Now cancel the remaining children, and try again with the CNAME we've
691 * settled on.
692 */
693 adns__cancel_children(parent);
79d4d86a 694 r= gettimeofday(&now, 0); if (r) goto x_gtod;
1bc731c6
MW
695 qf= adns__qf_addr_cname;
696 if (!(parent->flags & adns_qf_cname_loose)) qf |= adns_qf_cname_forbid;
697 addr_subqueries(parent, now, qf, child->vb.buf, child->vb.used);
698 return;
699 }
700
9d138734
MW
701 if (cans->cname && !pans->cname) {
702 err= copy_cname_from_child(parent, child);
703 if (err) goto x_err;
704 }
705
706 if ((parent->flags & adns_qf_search) &&
707 !pans->cname && cans->status == adns_s_nxdomain) {
708 /* We're searching a list of suffixes, and the name doesn't exist. Try
709 * the next one.
710 */
711
712 adns__cancel_children(parent);
713 adns__free_interim(parent, pans->rrs.bytes);
714 pans->rrs.bytes= 0; pans->nrrs= 0;
79d4d86a 715 r= gettimeofday(&now, 0); if (r) goto x_gtod;
9d138734
MW
716 adns__search_next(ads, parent, now);
717 return;
718 }
719
720 if (cans->status && cans->status != adns_s_nodata)
721 { err= cans->status; goto x_err; }
722
723 assert(pans->rrsz == cans->rrsz);
724 err= append_addrs(parent, pans->rrsz,
725 &pans->rrs.addr, &pans->nrrs,
726 cans->rrs.addr, cans->nrrs);
727 if (err) goto x_err;
728 done_addr_type(parent, cans->type);
729
730 if (parent->children.head) LIST_LINK_TAIL(ads->childw, parent);
731 else if (!pans->nrrs) adns__query_fail(parent, adns_s_nodata);
732 else adns__query_done(parent);
1bc731c6 733 parent->flags |= adns__qf_addr_answer;
9d138734
MW
734 return;
735
736x_gtod:
79d4d86a
IJ
737 /* We have our own error handling, because adns__must_gettimeofday
738 * handles errors by calling adns_globalsystemfailure, which would
739 * reenter the query processing logic. */
9d138734
MW
740 adns__diag(ads, -1, parent, "gettimeofday failed: %s", strerror(errno));
741 err= adns_s_systemfail;
742 goto x_err;
743
744x_err:
745 adns__query_fail(parent, err);
746}
747
748static void qs_addr(adns_query qu, struct timeval now) {
749 if (!qu->ctx.tinfo.addr.want) {
750 qu->ctx.tinfo.addr.want= addr_rrtypes(qu->ads, qu->answer->type,
751 qu->flags);
752 qu->ctx.tinfo.addr.have= 0;
753 }
754 addr_subqueries(qu, now, 0, qu->query_dgram, qu->query_dglen);
755}
756
eb81d633 757/*
b365d68a 758 * _domain (pap,csp,cs)
759 * _dom_raw (pa)
eb81d633 760 */
761
1dfe95d8 762static adns_status pap_domain(const parseinfo *pai, int *cbyte_io, int max,
763 char **domain_r, parsedomain_flags flags) {
e062dcae 764 adns_status st;
765 char *dm;
766
1dfe95d8 767 st= adns__parse_domain(pai->qu->ads, pai->serv, pai->qu, &pai->qu->vb, flags,
768 pai->dgram,pai->dglen, cbyte_io, max);
e062dcae 769 if (st) return st;
1dfe95d8 770 if (!pai->qu->vb.used) return adns_s_invaliddata;
e062dcae 771
1dfe95d8 772 dm= adns__alloc_interim(pai->qu, pai->qu->vb.used+1);
773 if (!dm) R_NOMEM;
e062dcae 774
1dfe95d8 775 dm[pai->qu->vb.used]= 0;
776 memcpy(dm,pai->qu->vb.buf,pai->qu->vb.used);
e062dcae 777
778 *domain_r= dm;
779 return adns_s_ok;
780}
781
b365d68a 782static adns_status csp_domain(vbuf *vb, const char *domain) {
783 CSP_ADDSTR(domain);
784 if (!*domain) CSP_ADDSTR(".");
785 return adns_s_ok;
786}
787
788static adns_status cs_domain(vbuf *vb, const void *datap) {
789 const char *const *domainp= datap;
790 return csp_domain(vb,*domainp);
791}
792
609133ee 793static adns_status pa_dom_raw(const parseinfo *pai, int cbyte,
794 int max, void *datap) {
b365d68a 795 char **rrp= datap;
796 adns_status st;
797
798 st= pap_domain(pai, &cbyte, max, rrp, pdf_quoteok);
799 if (st) return st;
800
801 if (cbyte != max) return adns_s_invaliddata;
802 return adns_s_ok;
803}
804
eb81d633 805/*
806 * _host_raw (pa)
807 */
808
609133ee 809static adns_status pa_host_raw(const parseinfo *pai, int cbyte,
810 int max, void *datap) {
e062dcae 811 char **rrp= datap;
ffbda80c 812 adns_status st;
86e7b8d9 813
1dfe95d8 814 st= pap_domain(pai, &cbyte, max, rrp,
815 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
e062dcae 816 if (st) return st;
817
818 if (cbyte != max) return adns_s_invaliddata;
819 return adns_s_ok;
820}
ffbda80c 821
eb81d633 822/*
382b81f7 823 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +pap_findaddrs, icb_hostaddr)
eb81d633 824 */
c7836bc9 825
1dfe95d8 826static adns_status pap_findaddrs(const parseinfo *pai, adns_rr_hostaddr *ha,
2ca5496d 827 unsigned *want_io, size_t addrsz,
1dfe95d8 828 int *cbyte_io, int count, int dmstart) {
829 int rri, naddrs;
2ca5496d
MW
830 unsigned typef, want= *want_io, need= want;
831 int type, class, rdlen, rdend, rdstart, ownermatched;
73dba56e 832 unsigned long ttl;
1dfe95d8 833 adns_status st;
c7836bc9 834
2ca5496d 835 for (rri=0, naddrs=0; rri<count; rri++) {
609133ee 836 st= adns__findrr_anychk(pai->qu, pai->serv, pai->dgram,
837 pai->dglen, cbyte_io,
73dba56e 838 &type, &class, &ttl, &rdlen, &rdstart,
1dfe95d8 839 pai->dgram, pai->dglen, dmstart, &ownermatched);
c7836bc9 840 if (st) return st;
2ca5496d
MW
841 if (!ownermatched || class != DNS_CLASS_IN) continue;
842 typef= addr_rrtypeflag(type);
843 if (!(want & typef)) continue;
844 need &= ~typef;
845 if (!adns__vbuf_ensure(&pai->qu->vb, (naddrs+1)*addrsz)) R_NOMEM;
73dba56e 846 adns__update_expires(pai->qu,ttl,pai->now);
908dbcfa 847 rdend= rdstart + rdlen;
2ca5496d 848 st= pap_addr(pai, type, addrsz, &rdstart, rdend,
908dbcfa 849 (adns_rr_addr *)(pai->qu->vb.buf + naddrs*addrsz));
c7836bc9 850 if (st) return st;
908dbcfa 851 if (rdstart != rdend) return adns_s_invaliddata;
1dfe95d8 852 naddrs++;
c7836bc9 853 }
2ca5496d
MW
854 if (naddrs > 0) {
855 st= append_addrs(pai->qu, addrsz, &ha->addrs, &ha->naddrs,
856 (const adns_rr_addr *)pai->qu->vb.buf, naddrs);
857 if (st) return st;
c7836bc9 858 ha->astatus= adns_s_ok;
1dfe95d8 859
2ca5496d
MW
860 if (!need) {
861 adns__isort(ha->addrs, naddrs, addrsz, pai->qu->vb.buf,
862 div_addr, pai->ads);
863 }
c7836bc9 864 }
2ca5496d 865 *want_io= need;
c7836bc9 866 return adns_s_ok;
867}
868
551ff40f 869static void icb_hostaddr(adns_query parent, adns_query child) {
551ff40f 870 adns_answer *cans= child->answer;
0ea82d76 871 adns_rr_hostaddr *rrp= child->ctx.pinfo.hostaddr;
4218fb9a 872 adns_state ads= parent->ads;
b365d68a 873 adns_status st;
2ca5496d 874 size_t addrsz= gsz_addr(0, parent->answer->type);
551ff40f 875
2ca5496d
MW
876 st= cans->status == adns_s_nodata ? adns_s_ok : cans->status;
877 if (st) goto done;
878 propagate_ttl(parent, child);
879
880 assert(addrsz == cans->rrsz);
881 st= append_addrs(parent, addrsz,
882 &rrp->addrs, &rrp->naddrs,
883 cans->rrs.addr, cans->nrrs);
884 if (st) goto done;
885 if (!rrp->naddrs) { st= adns_s_nodata; goto done; }
886
887 if (!adns__vbuf_ensure(&parent->vb, addrsz))
888 { st= adns_s_nomemory; goto done; }
889 adns__isort(rrp->addrs, rrp->naddrs, addrsz, parent->vb.buf,
890 div_addr, ads);
891
892done:
893 if (st) {
894 adns__free_interim(parent, rrp->addrs);
895 rrp->naddrs= (st>0 && st<=adns_s_max_tempfail) ? -1 : 0;
896 }
a6536d8b 897
2ca5496d 898 rrp->astatus= st;
4218fb9a 899 if (parent->children.head) {
900 LIST_LINK_TAIL(ads->childw,parent);
901 } else {
902 adns__query_done(parent);
903 }
551ff40f 904}
905
1dfe95d8 906static adns_status pap_hostaddr(const parseinfo *pai, int *cbyte_io,
907 int max, adns_rr_hostaddr *rrp) {
c7836bc9 908 adns_status st;
909 int dmstart, cbyte;
7da21070 910 qcontext ctx;
911 int id;
912 adns_query nqu;
4b707d8b 913 adns_queryflags nflags;
2ca5496d 914 unsigned want;
b0a32b17 915 size_t addrsz= gsz_addr(0, pai->qu->answer->type);
c7836bc9 916
917 dmstart= cbyte= *cbyte_io;
1dfe95d8 918 st= pap_domain(pai, &cbyte, max, &rrp->host,
919 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
c7836bc9 920 if (st) return st;
921 *cbyte_io= cbyte;
922
923 rrp->astatus= adns_s_ok;
2ca5496d 924 rrp->naddrs= 0;
c7836bc9 925 rrp->addrs= 0;
926
1dfe95d8 927 cbyte= pai->nsstart;
c7836bc9 928
2ca5496d
MW
929 want= addr_rrtypes(pai->ads, pai->qu->answer->type, pai->qu->flags);
930
931 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->nscount, dmstart);
c7836bc9 932 if (st) return st;
2ca5496d 933 if (!want) return adns_s_ok;
c7836bc9 934
2ca5496d 935 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->arcount, dmstart);
c7836bc9 936 if (st) return st;
2ca5496d 937 if (!want) return adns_s_ok;
1dfe95d8 938
7da21070 939 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
940 pai->dgram, pai->dglen, dmstart,
941 adns_r_addr, adns_qf_quoteok_query);
942 if (st) return st;
551ff40f 943
a6536d8b 944 ctx.ext= 0;
945 ctx.callback= icb_hostaddr;
0ea82d76 946 ctx.pinfo.hostaddr= rrp;
4b707d8b 947
138722f0
MW
948 nflags= adns_qf_quoteok_query | (pai->qu->flags & (adns_qf_want_allaf |
949 adns_qf_ipv6_mapv4));
4b707d8b 950 if (!(pai->qu->flags & adns_qf_cname_loose)) nflags |= adns_qf_cname_forbid;
951
2ca5496d
MW
952 st= addr_submit(pai->qu, &nqu, &pai->qu->vb, id, want,
953 nflags, pai->now, &ctx);
7da21070 954 if (st) return st;
955
1dfe95d8 956 return adns_s_ok;
c7836bc9 957}
958
609133ee 959static adns_status pa_hostaddr(const parseinfo *pai, int cbyte,
960 int max, void *datap) {
1dfe95d8 961 adns_rr_hostaddr *rrp= datap;
c7836bc9 962 adns_status st;
c7836bc9 963
1dfe95d8 964 st= pap_hostaddr(pai, &cbyte, max, rrp);
c7836bc9 965 if (st) return st;
966 if (cbyte != max) return adns_s_invaliddata;
967
1dfe95d8 968 return adns_s_ok;
969}
c7836bc9 970
609133ee 971static int dip_hostaddr(adns_state ads,
972 const adns_rr_hostaddr *ap, const adns_rr_hostaddr *bp) {
1dfe95d8 973 if (ap->astatus != bp->astatus) return ap->astatus;
974 if (ap->astatus) return 0;
c7836bc9 975
f930c455 976 return dip_sockaddr(ads, &ap->addrs[0].addr.sa, &bp->addrs[0].addr.sa);
1dfe95d8 977}
978
609133ee 979static int di_hostaddr(adns_state ads,
980 const void *datap_a, const void *datap_b) {
1dfe95d8 981 const adns_rr_hostaddr *ap= datap_a, *bp= datap_b;
982
09957b1c 983 return dip_hostaddr(ads, ap,bp);
c7836bc9 984}
985
eb81d633 986static void mfp_hostaddr(adns_query qu, adns_rr_hostaddr *rrp) {
987 void *tablev;
b0a32b17 988 size_t addrsz= gsz_addr(0, qu->answer->type);
e062dcae 989
eb81d633 990 adns__makefinal_str(qu,&rrp->host);
991 tablev= rrp->addrs;
b0a32b17 992 adns__makefinal_block(qu, &tablev, rrp->naddrs*addrsz);
eb81d633 993 rrp->addrs= tablev;
e062dcae 994}
995
eb81d633 996static void mf_hostaddr(adns_query qu, void *datap) {
997 adns_rr_hostaddr *rrp= datap;
e062dcae 998
eb81d633 999 mfp_hostaddr(qu,rrp);
e062dcae 1000}
1001
1dfe95d8 1002static adns_status csp_hostaddr(vbuf *vb, const adns_rr_hostaddr *rrp) {
a6f1dc92 1003 const char *errstr;
1dfe95d8 1004 adns_status st;
ac77ffc1 1005 char buf[20];
1dfe95d8 1006 int i;
1007
a6f1dc92 1008 st= csp_domain(vb,rrp->host); if (st) return st;
1dfe95d8 1009
b365d68a 1010 CSP_ADDSTR(" ");
ac77ffc1 1011 CSP_ADDSTR(adns_errtypeabbrev(rrp->astatus));
1012
1013 sprintf(buf," %d ",rrp->astatus);
1014 CSP_ADDSTR(buf);
a6f1dc92 1015
ac77ffc1 1016 CSP_ADDSTR(adns_errabbrev(rrp->astatus));
a6f1dc92 1017 CSP_ADDSTR(" ");
ac77ffc1 1018
a6f1dc92 1019 errstr= adns_strerror(rrp->astatus);
1020 st= csp_qstring(vb,errstr,strlen(errstr)); if (st) return st;
b365d68a 1021
1022 if (rrp->naddrs >= 0) {
1023 CSP_ADDSTR(" (");
1024 for (i=0; i<rrp->naddrs; i++) {
1025 CSP_ADDSTR(" ");
1dfe95d8 1026 st= csp_addr(vb,&rrp->addrs[i]);
1027 }
b365d68a 1028 CSP_ADDSTR(" )");
1029 } else {
1030 CSP_ADDSTR(" ?");
1dfe95d8 1031 }
1032 return adns_s_ok;
1033}
1034
1035static adns_status cs_hostaddr(vbuf *vb, const void *datap) {
1036 const adns_rr_hostaddr *rrp= datap;
1037
1038 return csp_hostaddr(vb,rrp);
1039}
1040
eb81d633 1041/*
1042 * _mx_raw (pa,di)
1043 */
1dfe95d8 1044
609133ee 1045static adns_status pa_mx_raw(const parseinfo *pai, int cbyte,
1046 int max, void *datap) {
eb81d633 1047 const byte *dgram= pai->dgram;
1048 adns_rr_intstr *rrp= datap;
1049 adns_status st;
1050 int pref;
1dfe95d8 1051
eb81d633 1052 if (cbyte+2 > max) return adns_s_invaliddata;
1053 GET_W(cbyte,pref);
1054 rrp->i= pref;
1055 st= pap_domain(pai, &cbyte, max, &rrp->str,
1056 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1057 if (st) return st;
1dfe95d8 1058
eb81d633 1059 if (cbyte != max) return adns_s_invaliddata;
1060 return adns_s_ok;
1061}
1dfe95d8 1062
09957b1c 1063static int di_mx_raw(adns_state ads, const void *datap_a, const void *datap_b) {
eb81d633 1064 const adns_rr_intstr *ap= datap_a, *bp= datap_b;
1065
1066 if (ap->i < bp->i) return 0;
1067 if (ap->i > bp->i) return 1;
1068 return 0;
1dfe95d8 1069}
1070
eb81d633 1071/*
1072 * _mx (pa,di)
1073 */
1dfe95d8 1074
609133ee 1075static adns_status pa_mx(const parseinfo *pai, int cbyte,
1076 int max, void *datap) {
eb81d633 1077 const byte *dgram= pai->dgram;
1078 adns_rr_inthostaddr *rrp= datap;
1079 adns_status st;
1080 int pref;
1081
1082 if (cbyte+2 > max) return adns_s_invaliddata;
1083 GET_W(cbyte,pref);
1084 rrp->i= pref;
1085 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha);
1086 if (st) return st;
1087
1088 if (cbyte != max) return adns_s_invaliddata;
1089 return adns_s_ok;
1090}
1091
09957b1c 1092static int di_mx(adns_state ads, const void *datap_a, const void *datap_b) {
eb81d633 1093 const adns_rr_inthostaddr *ap= datap_a, *bp= datap_b;
1094
1095 if (ap->i < bp->i) return 0;
1096 if (ap->i > bp->i) return 1;
09957b1c 1097 return dip_hostaddr(ads, &ap->ha, &bp->ha);
1dfe95d8 1098}
1099
eb81d633 1100/*
1101 * _inthostaddr (mf,cs)
1102 */
1103
1dfe95d8 1104static void mf_inthostaddr(adns_query qu, void *datap) {
1105 adns_rr_inthostaddr *rrp= datap;
1106
1107 mfp_hostaddr(qu,&rrp->ha);
1108}
1109
eb81d633 1110static adns_status cs_inthostaddr(vbuf *vb, const void *datap) {
1111 const adns_rr_inthostaddr *rrp= datap;
1112 char buf[10];
e062dcae 1113
eb81d633 1114 sprintf(buf,"%u ",rrp->i);
1115 CSP_ADDSTR(buf);
1116
1117 return csp_hostaddr(vb,&rrp->ha);
ffbda80c 1118}
1119
eb81d633 1120/*
b365d68a 1121 * _inthost (cs)
1122 */
1123
1124static adns_status cs_inthost(vbuf *vb, const void *datap) {
1125 const adns_rr_intstr *rrp= datap;
1126 char buf[10];
1127
1128 sprintf(buf,"%u ",rrp->i);
1129 CSP_ADDSTR(buf);
1130 return csp_domain(vb,rrp->str);
1131}
1132
1133/*
938b0228 1134 * _ptr (ckl,pa +icb_ptr)
a6536d8b 1135 */
1136
938b0228
MW
1137static adns_status ckl_ptr(adns_state ads, adns_queryflags flags,
1138 union checklabel_state *cls, qcontext *ctx,
0b062ecc
IJ
1139 int labnum, const char *dgram,
1140 int labstart, int lablen) {
51cb3de3 1141 if (lablen) {
e9fe1bdb 1142 if (!adns__revparse_label(&cls->ptr, labnum, dgram,labstart,lablen))
51cb3de3 1143 return adns_s_querydomainwrong;
938b0228 1144 } else {
e9fe1bdb
IJ
1145 if (!adns__revparse_done(&cls->ptr, dgram, labnum,
1146 &ctx->tinfo.ptr.rev_rrtype,
1147 &ctx->tinfo.ptr.addr))
51cb3de3 1148 return adns_s_querydomainwrong;
938b0228
MW
1149 }
1150 return adns_s_ok;
1151}
1152
a6536d8b 1153static void icb_ptr(adns_query parent, adns_query child) {
1154 adns_answer *cans= child->answer;
82ae109e 1155 const adns_sockaddr *queried;
ac5a2748 1156 const unsigned char *found;
4218fb9a 1157 adns_state ads= parent->ads;
a6536d8b 1158 int i;
1159
1160 if (cans->status == adns_s_nxdomain || cans->status == adns_s_nodata) {
1161 adns__query_fail(parent,adns_s_inconsistent);
1162 return;
1163 } else if (cans->status) {
1164 adns__query_fail(parent,cans->status);
1165 return;
1166 }
1167
ac5a2748
MW
1168 queried= &parent->ctx.tinfo.ptr.addr;
1169 for (i=0, found=cans->rrs.bytes; i<cans->nrrs; i++, found+=cans->rrsz) {
82ae109e
IJ
1170 if (adns__addrs_equal_raw(&queried->sa,
1171 parent->ctx.tinfo.ptr.addr.sa.sa_family,found)) {
4218fb9a 1172 if (!parent->children.head) {
1173 adns__query_done(parent);
1174 return;
1175 } else {
1176 LIST_LINK_TAIL(ads->childw,parent);
1177 return;
1178 }
a6536d8b 1179 }
1180 }
1181
1182 adns__query_fail(parent,adns_s_inconsistent);
1183}
1184
609133ee 1185static adns_status pa_ptr(const parseinfo *pai, int dmstart,
1186 int max, void *datap) {
a6536d8b 1187 char **rrp= datap;
1188 adns_status st;
51cb3de3 1189 adns_rrtype rrtype= pai->qu->ctx.tinfo.ptr.rev_rrtype;
938b0228 1190 int cbyte, id;
a6536d8b 1191 adns_query nqu;
1192 qcontext ctx;
1193
1194 cbyte= dmstart;
1195 st= pap_domain(pai, &cbyte, max, rrp,
1196 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1197 if (st) return st;
1198 if (cbyte != max) return adns_s_invaliddata;
1199
a6536d8b 1200 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
1201 pai->dgram, pai->dglen, dmstart,
51cb3de3 1202 rrtype, adns_qf_quoteok_query);
a6536d8b 1203 if (st) return st;
1204
1205 ctx.ext= 0;
1206 ctx.callback= icb_ptr;
0ea82d76
MW
1207 memset(&ctx.pinfo,0,sizeof(ctx.pinfo));
1208 memset(&ctx.tinfo,0,sizeof(ctx.tinfo));
07c3d3e2
IJ
1209 st= adns__internal_submit(pai->ads, &nqu, pai->qu,
1210 adns__findtype(rrtype),
51cb3de3
MW
1211 rrtype, &pai->qu->vb, id,
1212 adns_qf_quoteok_query, pai->now, &ctx);
a6536d8b 1213 if (st) return st;
1214
a6536d8b 1215 return adns_s_ok;
1216}
1217
1218/*
b365d68a 1219 * _strpair (mf)
9ec44266 1220 */
1221
1222static void mf_strpair(adns_query qu, void *datap) {
1223 adns_rr_strpair *rrp= datap;
1224
1225 adns__makefinal_str(qu,&rrp->array[0]);
1226 adns__makefinal_str(qu,&rrp->array[1]);
1227}
1228
9ec44266 1229/*
b365d68a 1230 * _intstrpair (mf)
9ec44266 1231 */
1232
1233static void mf_intstrpair(adns_query qu, void *datap) {
1234 adns_rr_intstrpair *rrp= datap;
1235
1236 adns__makefinal_str(qu,&rrp->array[0].str);
1237 adns__makefinal_str(qu,&rrp->array[1].str);
1238}
1239
9ec44266 1240/*
1241 * _hinfo (pa)
1242 */
1243
609133ee 1244static adns_status pa_hinfo(const parseinfo *pai, int cbyte,
1245 int max, void *datap) {
9ec44266 1246 adns_rr_intstrpair *rrp= datap;
1247 adns_status st;
1248 int i;
1249
1250 for (i=0; i<2; i++) {
b365d68a 1251 st= pap_qstring(pai, &cbyte, max, &rrp->array[i].i, &rrp->array[i].str);
9ec44266 1252 if (st) return st;
1253 }
1254
1255 if (cbyte != max) return adns_s_invaliddata;
1256
1257 return adns_s_ok;
1258}
1259
1260/*
382b81f7 1261 * _mailbox (pap,cs +pap_mailbox822)
9ec44266 1262 */
1263
609133ee 1264static adns_status pap_mailbox822(const parseinfo *pai,
1265 int *cbyte_io, int max, char **mb_r) {
eaa44731 1266 int lablen, labstart, i, needquote, c, r, neednorm;
1267 const unsigned char *p;
1268 char *str;
1269 findlabel_state fls;
1270 adns_status st;
1271 vbuf *vb;
1272
1273 vb= &pai->qu->vb;
1274 vb->used= 0;
1275 adns__findlabel_start(&fls, pai->ads,
1276 -1, pai->qu,
1277 pai->dgram, pai->dglen, max,
1278 *cbyte_io, cbyte_io);
1279 st= adns__findlabel_next(&fls,&lablen,&labstart);
1280 if (!lablen) {
b365d68a 1281 adns__vbuf_appendstr(vb,".");
eaa44731 1282 goto x_ok;
1283 }
1284
1285 neednorm= 1;
1286 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++) {
1287 c= *p++;
1288 if ((c&~128) < 32 || (c&~128) == 127) return adns_s_invaliddata;
1289 if (c == '.' && !neednorm) neednorm= 1;
7672a872 1290 else if (c==' ' || c>=127 || ctype_822special(c)) needquote++;
eaa44731 1291 else neednorm= 0;
1292 }
1293
1294 if (needquote || neednorm) {
1295 r= adns__vbuf_ensure(vb, lablen+needquote+4); if (!r) R_NOMEM;
1296 adns__vbuf_appendq(vb,"\"",1);
1297 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++, p++) {
1298 c= *p;
b365d68a 1299 if (c == '"' || c=='\\') adns__vbuf_appendq(vb,"\\",1);
eaa44731 1300 adns__vbuf_appendq(vb,p,1);
1301 }
1302 adns__vbuf_appendq(vb,"\"",1);
1303 } else {
1304 r= adns__vbuf_append(vb, pai->dgram+labstart, lablen); if (!r) R_NOMEM;
1305 }
1306
1307 r= adns__vbuf_appendstr(vb,"@"); if (!r) R_NOMEM;
1308
1309 st= adns__parse_domain_more(&fls,pai->ads, pai->qu,vb,0, pai->dgram);
1310 if (st) return st;
1311
1312 x_ok:
1313 str= adns__alloc_interim(pai->qu, vb->used+1); if (!str) R_NOMEM;
1314 memcpy(str,vb->buf,vb->used);
1315 str[vb->used]= 0;
1316 *mb_r= str;
1317 return adns_s_ok;
9ec44266 1318}
1319
9da4a044 1320static adns_status pap_mailbox(const parseinfo *pai, int *cbyte_io, int max,
1321 char **mb_r) {
2c6eb096 1322 if (pai->qu->typei->typekey & adns__qtf_mail822) {
9da4a044 1323 return pap_mailbox822(pai, cbyte_io, max, mb_r);
1324 } else {
b365d68a 1325 return pap_domain(pai, cbyte_io, max, mb_r, pdf_quoteok);
9da4a044 1326 }
1327}
1328
b365d68a 1329static adns_status csp_mailbox(vbuf *vb, const char *mailbox) {
1330 return csp_domain(vb,mailbox);
1331}
1332
9ec44266 1333/*
b365d68a 1334 * _rp (pa,cs)
9ec44266 1335 */
1336
609133ee 1337static adns_status pa_rp(const parseinfo *pai, int cbyte,
1338 int max, void *datap) {
9ec44266 1339 adns_rr_strpair *rrp= datap;
1340 adns_status st;
1341
1342 st= pap_mailbox(pai, &cbyte, max, &rrp->array[0]);
1343 if (st) return st;
1344
1345 st= pap_domain(pai, &cbyte, max, &rrp->array[1], pdf_quoteok);
1346 if (st) return st;
1347
1348 if (cbyte != max) return adns_s_invaliddata;
1349 return adns_s_ok;
1350}
1351
b365d68a 1352static adns_status cs_rp(vbuf *vb, const void *datap) {
1353 const adns_rr_strpair *rrp= datap;
1354 adns_status st;
1355
1356 st= csp_mailbox(vb,rrp->array[0]); if (st) return st;
1357 CSP_ADDSTR(" ");
1358 st= csp_domain(vb,rrp->array[1]); if (st) return st;
1359
1360 return adns_s_ok;
1361}
1362
9ec44266 1363/*
1364 * _soa (pa,mf,cs)
1365 */
1366
609133ee 1367static adns_status pa_soa(const parseinfo *pai, int cbyte,
1368 int max, void *datap) {
9ec44266 1369 adns_rr_soa *rrp= datap;
1370 const byte *dgram= pai->dgram;
1371 adns_status st;
1372 int msw, lsw, i;
1373
1374 st= pap_domain(pai, &cbyte, max, &rrp->mname,
1375 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1376 if (st) return st;
1377
1378 st= pap_mailbox(pai, &cbyte, max, &rrp->rname);
1379 if (st) return st;
1380
1381 if (cbyte+20 != max) return adns_s_invaliddata;
1382
1383 for (i=0; i<5; i++) {
1384 GET_W(cbyte,msw);
1385 GET_W(cbyte,lsw);
1386 (&rrp->serial)[i]= (msw<<16) | lsw;
1387 }
1388
1389 return adns_s_ok;
1390}
1391
1392static void mf_soa(adns_query qu, void *datap) {
1393 adns_rr_soa *rrp= datap;
1394
1395 adns__makefinal_str(qu,&rrp->mname);
1396 adns__makefinal_str(qu,&rrp->rname);
1397}
1398
1399static adns_status cs_soa(vbuf *vb, const void *datap) {
1400 const adns_rr_soa *rrp= datap;
1401 char buf[20];
1402 int i;
1403 adns_status st;
1404
b365d68a 1405 st= csp_domain(vb,rrp->mname); if (st) return st;
9ec44266 1406 CSP_ADDSTR(" ");
b365d68a 1407 st= csp_mailbox(vb,rrp->rname); if (st) return st;
9ec44266 1408
1409 for (i=0; i<5; i++) {
1410 sprintf(buf," %lu",(&rrp->serial)[i]);
1411 CSP_ADDSTR(buf);
1412 }
1413
1414 return adns_s_ok;
1415}
1416
1417/*
e8e5aeac 1418 * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort)
d19b03d0 1419 */
1420
e8e5aeac
MW
1421static adns_status ckl_srv(adns_state ads, adns_queryflags flags,
1422 union checklabel_state *cls, qcontext *ctx,
0b062ecc
IJ
1423 int labnum, const char *dgram,
1424 int labstart, int lablen) {
1425 const char *label = dgram+labstart;
7b4b4314
IJ
1426 if (labnum < 2) {
1427 if (flags & adns_qf_quoteok_query) return adns_s_ok;
e8e5aeac
MW
1428 if (!lablen || label[0] != '_') return adns_s_querydomaininvalid;
1429 return adns_s_ok;
d19b03d0 1430 }
0b062ecc 1431 return adns__ckl_hostname(ads,flags, cls,ctx, labnum, dgram,labstart,lablen);
d19b03d0 1432}
1433
05fc6b3a 1434static adns_status pap_srv_begin(const parseinfo *pai, int *cbyte_io, int max,
0e45654b 1435 adns_rr_srvha *rrp
1436 /* might be adns_rr_srvraw* */) {
401c256a 1437 const byte *dgram= pai->dgram;
05fc6b3a 1438 int ti, cbyte;
1439
1440 cbyte= *cbyte_io;
1441 if ((*cbyte_io += 6) > max) return adns_s_invaliddata;
401c256a 1442
1443 rrp->priority= GET_W(cbyte, ti);
1444 rrp->weight= GET_W(cbyte, ti);
1445 rrp->port= GET_W(cbyte, ti);
1446 return adns_s_ok;
1447}
1448
1449static adns_status pa_srvraw(const parseinfo *pai, int cbyte,
1450 int max, void *datap) {
1451 adns_rr_srvraw *rrp= datap;
1452 adns_status st;
1453
05fc6b3a 1454 st= pap_srv_begin(pai,&cbyte,max,datap);
401c256a 1455 if (st) return st;
1456
1457 st= pap_domain(pai, &cbyte, max, &rrp->host,
1458 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1459 if (st) return st;
1460
1461 if (cbyte != max) return adns_s_invaliddata;
1462 return adns_s_ok;
1463}
1464
1465static adns_status pa_srvha(const parseinfo *pai, int cbyte,
1466 int max, void *datap) {
1467 adns_rr_srvha *rrp= datap;
1468 adns_status st;
1469
05fc6b3a 1470 st= pap_srv_begin(pai,&cbyte,max,datap); if (st) return st;
401c256a 1471 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha); if (st) return st;
1472 if (cbyte != max) return adns_s_invaliddata;
1473 return adns_s_ok;
1474}
1475
1476static void mf_srvraw(adns_query qu, void *datap) {
1477 adns_rr_srvraw *rrp= datap;
1478 adns__makefinal_str(qu, &rrp->host);
1479}
1480
1481static void mf_srvha(adns_query qu, void *datap) {
1482 adns_rr_srvha *rrp= datap;
1483 mfp_hostaddr(qu,&rrp->ha);
1484}
1485
1486static int di_srv(adns_state ads, const void *datap_a, const void *datap_b) {
1487 const adns_rr_srvraw *ap= datap_a, *bp= datap_b;
1488 /* might be const adns_rr_svhostaddr* */
1489
1490 if (ap->priority < bp->priority) return 0;
1491 if (ap->priority > bp->priority) return 1;
1492 return 0;
1493}
1494
0e45654b 1495static adns_status csp_srv_begin(vbuf *vb, const adns_rr_srvha *rrp
1496 /* might be adns_rr_srvraw* */) {
401c256a 1497 char buf[30];
1498 sprintf(buf,"%u %u %u ", rrp->priority, rrp->weight, rrp->port);
1499 CSP_ADDSTR(buf);
1500 return adns_s_ok;
1501}
1502
1503static adns_status cs_srvraw(vbuf *vb, const void *datap) {
1504 const adns_rr_srvraw *rrp= datap;
1505 adns_status st;
1506
0e45654b 1507 st= csp_srv_begin(vb,(const void*)rrp); if (st) return st;
401c256a 1508 return csp_domain(vb,rrp->host);
1509}
1510
1511static adns_status cs_srvha(vbuf *vb, const void *datap) {
1512 const adns_rr_srvha *rrp= datap;
1513 adns_status st;
1514
0e45654b 1515 st= csp_srv_begin(vb,(const void*)datap); if (st) return st;
401c256a 1516 return csp_hostaddr(vb,&rrp->ha);
1517}
1518
042b0909 1519static void postsort_srv(adns_state ads, void *array, int nrrs,int rrsz,
d24e2a7e 1520 const struct typeinfo *typei) {
0e45654b 1521 /* we treat everything in the array as if it were an adns_rr_srvha
1522 * even though the array might be of adns_rr_srvraw. That's OK
1523 * because they have the same prefix, which is all we access.
042b0909 1524 * We use rrsz, too, rather than naive array indexing, of course.
0e45654b 1525 */
1526 char *workbegin, *workend, *search, *arrayend;
1527 const adns_rr_srvha *rr;
1528 union { adns_rr_srvha ha; adns_rr_srvraw raw; } rrtmp;
1529 int cpriority, totalweight, runtotal;
1530 long randval;
1531
042b0909
MW
1532 assert(rrsz <= sizeof(rrtmp));
1533 for (workbegin= array, arrayend= workbegin + rrsz * nrrs;
0e45654b 1534 workbegin < arrayend;
1535 workbegin= workend) {
1536 cpriority= (rr=(void*)workbegin)->priority;
1537
1538 for (workend= workbegin, totalweight= 0;
1539 workend < arrayend && (rr=(void*)workend)->priority == cpriority;
042b0909 1540 workend += rrsz) {
0e45654b 1541 totalweight += rr->weight;
0e45654b 1542 }
1543
1544 /* Now workbegin..(workend-1) incl. are exactly all of the RRs of
1545 * cpriority. From now on, workbegin points to the `remaining'
1546 * records: we select one record at a time (RFC2782 `Usage rules'
1547 * and `Format of the SRV RR' subsection `Weight') to place at
1548 * workbegin (swapping with the one that was there, and then
1549 * advance workbegin. */
1550 for (;
042b0909
MW
1551 workbegin + rrsz < workend; /* don't bother if just one */
1552 workbegin += rrsz) {
0e45654b 1553
1554 randval= nrand48(ads->rand48xsubi);
1555 randval %= (totalweight + 1);
0e45654b 1556 /* makes it into 0..totalweight inclusive; with 2^10 RRs,
1557 * totalweight must be <= 2^26 so probability nonuniformity is
1558 * no worse than 1 in 2^(31-26) ie 1 in 2^5, ie
1559 * abs(log(P_intended(RR_i) / P_actual(RR_i)) <= log(2^-5).
1560 */
1561
1562 for (search=workbegin, runtotal=0;
1563 (runtotal += (rr=(void*)search)->weight) < randval;
042b0909 1564 search += rrsz);
0e45654b 1565 assert(search < arrayend);
1566 totalweight -= rr->weight;
1567 if (search != workbegin) {
042b0909
MW
1568 memcpy(&rrtmp, workbegin, rrsz);
1569 memcpy(workbegin, search, rrsz);
1570 memcpy(search, &rrtmp, rrsz);
0e45654b 1571 }
1572 }
1573 }
d24e2a7e 1574 /* tests:
1575 * dig -t srv _srv._tcp.test.iwj.relativity.greenend.org.uk.
1576 * ./adnshost_s -t srv- _sip._udp.voip.net.cam.ac.uk.
1577 * ./adnshost_s -t srv- _jabber._tcp.jabber.org
1578 */
1579}
1580
d19b03d0 1581/*
2c6eb096 1582 * _byteblock (mf)
1583 */
1584
1585static void mf_byteblock(adns_query qu, void *datap) {
1586 adns_rr_byteblock *rrp= datap;
1587 void *bytes= rrp->data;
1588 adns__makefinal_block(qu,&bytes,rrp->len);
1589 rrp->data= bytes;
1590}
1591
1592/*
1593 * _opaque (pa,cs)
1594 */
1595
1596static adns_status pa_opaque(const parseinfo *pai, int cbyte,
1597 int max, void *datap) {
1598 adns_rr_byteblock *rrp= datap;
1599
1600 rrp->len= max - cbyte;
1601 rrp->data= adns__alloc_interim(pai->qu, rrp->len);
1602 if (!rrp->data) R_NOMEM;
1603 memcpy(rrp->data, pai->dgram + cbyte, rrp->len);
1604 return adns_s_ok;
1605}
1606
1607static adns_status cs_opaque(vbuf *vb, const void *datap) {
1608 const adns_rr_byteblock *rrp= datap;
1609 char buf[10];
1610 int l;
1611 unsigned char *p;
1612
1613 sprintf(buf,"\\# %d",rrp->len);
1614 CSP_ADDSTR(buf);
1615
1616 for (l= rrp->len, p= rrp->data;
1617 l>=4;
1618 l -= 4, p += 4) {
1619 sprintf(buf," %02x%02x%02x%02x",p[0],p[1],p[2],p[3]);
1620 CSP_ADDSTR(buf);
1621 }
1622 for (;
1623 l>0;
1624 l--, p++) {
1625 sprintf(buf," %02x",*p);
1626 CSP_ADDSTR(buf);
1627 }
1628 return adns_s_ok;
1629}
1630
1631/*
eb81d633 1632 * _flat (mf)
1633 */
1634
ffbda80c 1635static void mf_flat(adns_query qu, void *data) { }
1636
eb81d633 1637/*
1638 * Now the table.
1639 */
1640
e062dcae 1641#define TYPESZ_M(member) (sizeof(*((adns_answer*)0)->rrs.member))
86e7b8d9 1642
c5fd1fbb 1643#define DEEP_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \
d24b603f 1644 { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_##memb, \
c5fd1fbb 1645 GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \
13826233
MW
1646 adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \
1647 CDR(__VA_ARGS__) }
c5fd1fbb 1648#define FLAT_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \
d24b603f 1649 { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_flat, \
c5fd1fbb 1650 GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \
13826233
MW
1651 adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \
1652 CDR(__VA_ARGS__) }
c5fd1fbb
MW
1653
1654#define di_0 0
98a3f706 1655
1656static const typeinfo typeinfos[] = {
eb81d633 1657/* Must be in ascending order of rrtype ! */
609133ee 1658/* mem-mgmt code rrt fmt member parser comparer printer */
1659
c5fd1fbb
MW
1660FLAT_TYPE(a, "A", 0, inaddr, inaddr, inaddr,inaddr ),
1661DEEP_TYPE(ns_raw, "NS", "raw",str, host_raw,0, domain ),
1662DEEP_TYPE(cname, "CNAME", 0, str, dom_raw, 0, domain ),
1663DEEP_TYPE(soa_raw,"SOA", "raw",soa, soa, 0, soa ),
1664DEEP_TYPE(ptr_raw,"PTR", "raw",str, host_raw,0, domain ),
1665DEEP_TYPE(hinfo, "HINFO", 0, intstrpair,hinfo, 0, hinfo ),
1666DEEP_TYPE(mx_raw, "MX", "raw",intstr, mx_raw, mx_raw,inthost ),
1667DEEP_TYPE(txt, "TXT", 0, manyistr, txt, 0, txt ),
1668DEEP_TYPE(rp_raw, "RP", "raw",strpair, rp, 0, rp ),
50e2b0c3 1669FLAT_TYPE(aaaa, "AAAA", 0, in6addr, in6addr, in6addr,in6addr ),
c5fd1fbb 1670DEEP_TYPE(srv_raw,"SRV", "raw",srvraw , srvraw, srv, srvraw,
e8e5aeac 1671 .checklabel= ckl_srv, .postsort= postsort_srv),
c5fd1fbb 1672
b0a32b17 1673FLAT_TYPE(addr, "A", "addr", addr, addr, addr, addr,
9d138734 1674 .getrrsz= gsz_addr, .query_send= qs_addr),
c5fd1fbb 1675DEEP_TYPE(ns, "NS", "+addr",hostaddr, hostaddr,hostaddr,hostaddr ),
938b0228
MW
1676DEEP_TYPE(ptr, "PTR","checked",str, ptr, 0, domain,
1677 .checklabel= ckl_ptr),
c5fd1fbb
MW
1678DEEP_TYPE(mx, "MX", "+addr",inthostaddr,mx, mx, inthostaddr, ),
1679DEEP_TYPE(srv, "SRV","+addr",srvha, srvha, srv, srvha,
e8e5aeac 1680 .checklabel= ckl_srv, .postsort= postsort_srv),
c5fd1fbb
MW
1681
1682DEEP_TYPE(soa, "SOA","822", soa, soa, 0, soa ),
1683DEEP_TYPE(rp, "RP", "822", strpair, rp, 0, rp ),
98a3f706 1684};
1685
9d138734
MW
1686static const typeinfo tinfo_addrsub =
1687FLAT_TYPE(none, "<addr>","sub",addr, addr, 0, addr,
1688 .getrrsz= gsz_addr);
1689
2c6eb096 1690static const typeinfo typeinfo_unknown=
c5fd1fbb 1691DEEP_TYPE(unknown,0, "unknown",byteblock,opaque, 0, opaque );
2c6eb096 1692
f759e52e 1693const typeinfo *adns__findtype(adns_rrtype type) {
1694 const typeinfo *begin, *end, *mid;
98a3f706 1695
039a0566
IJ
1696 if (type & ~(adns_rrtype)0x63ffffff)
1697 /* 0x60000000 is reserved for `harmless' future expansion */
1698 return 0;
1699
2c6eb096 1700 if (type & adns_r_unknown) return &typeinfo_unknown;
d24b603f 1701 type &= adns_rrt_reprmask;
2c6eb096 1702
98a3f706 1703 begin= typeinfos; end= typeinfos+(sizeof(typeinfos)/sizeof(typeinfo));
1704
1705 while (begin < end) {
1706 mid= begin + ((end-begin)>>1);
2c6eb096 1707 if (mid->typekey == type) return mid;
1708 if (type > mid->typekey) begin= mid+1;
98a3f706 1709 else end= mid;
1710 }
1711 return 0;
1712}