Parsing code revamped, not compiled yet.
[adns] / src / query.c
CommitLineData
656b2da9 1/**/
2
4353a5c4 3#include <errno.h>
4#include <string.h>
98a3f706 5#include <stdlib.h>
4353a5c4 6
7#include <sys/uio.h>
8
4bec51a4 9#include "internal.h"
656b2da9 10
4bec51a4 11adns_status adns__mkquery(adns_state ads, const char *owner, int ol, int id,
98a3f706 12 const typeinfo *typei, adns_queryflags flags) {
ddfda861 13 /* Assembles a query packet in ads->rqbuf. */
14 int ll, c, nlabs;
4353a5c4 15 byte label[255], *rqp;
656b2da9 16 const char *p, *pe;
17
ddfda861 18#define MKQUERY_ADDB(b) *rqp++= (b)
656b2da9 19#define MKQUERY_ADDW(w) (MKQUERY_ADDB(((w)>>8)&0x0ff), MKQUERY_ADDB((w)&0x0ff))
20
98a3f706 21 if (!adns__vbuf_ensure(&ads->rqbuf,DNS_HDRSIZE+strlen(owner)+1+5))
b9de380c 22 return adns_s_nolocalmem;
ddfda861 23 rqp= ads->rqbuf.buf;
24
656b2da9 25 MKQUERY_ADDW(id);
26 MKQUERY_ADDB(0x01); /* QR=Q(0), OPCODE=QUERY(0000), !AA, !TC, RD */
27 MKQUERY_ADDB(0x00); /* !RA, Z=000, RCODE=NOERROR(0000) */
28 MKQUERY_ADDW(1); /* QDCOUNT=1 */
29 MKQUERY_ADDW(0); /* ANCOUNT=0 */
30 MKQUERY_ADDW(0); /* NSCOUNT=0 */
31 MKQUERY_ADDW(0); /* ARCOUNT=0 */
32 p= owner; pe= owner+ol;
33 nlabs= 0;
34 if (!*p) return adns_s_invaliddomain;
35 do {
36 ll= 0;
37 while (p!=pe && (c= *p++)!='.') {
38 if (c=='\\') {
4353a5c4 39 if (!(flags & adns_qf_anyquote)) return adns_s_invaliddomain;
656b2da9 40 if (ctype_digit(p[0])) {
41 if (ctype_digit(p[1]) && ctype_digit(p[2])) {
42 c= (*p++ - '0')*100 + (*p++ - '0')*10 + (*p++ - '0');
43 if (c >= 256) return adns_s_invaliddomain;
44 } else {
45 return adns_s_invaliddomain;
46 }
47 } else if (!(c= *p++)) {
48 return adns_s_invaliddomain;
49 }
50 }
4353a5c4 51 if (!(flags & adns_qf_anyquote)) {
4bec51a4 52 if (ctype_digit(c) || c == '-') {
656b2da9 53 if (!ll) return adns_s_invaliddomain;
98a3f706 54 } else if (!ctype_alpha(c)) {
656b2da9 55 return adns_s_invaliddomain;
56 }
57 }
58 if (ll == sizeof(label)) return adns_s_invaliddomain;
59 label[ll++]= c;
60 }
61 if (!ll) return adns_s_invaliddomain;
62 if (nlabs++ > 63) return adns_s_invaliddomain;
63 MKQUERY_ADDB(ll);
ddfda861 64 memcpy(rqp,label,ll); rqp+= ll;
656b2da9 65 } while (p!=pe);
66
67 MKQUERY_ADDB(0);
98a3f706 68 MKQUERY_ADDW(typei->type & adns__rrt_typemask); /* QTYPE */
b9de380c 69 MKQUERY_ADDW(DNS_CLASS_IN); /* QCLASS=IN */
656b2da9 70
4353a5c4 71 ads->rqbuf.used= rqp - ads->rqbuf.buf;
94436798 72 assert(ads->rqbuf.used <= ads->rqbuf.avail);
656b2da9 73
74 return adns_s_ok;
75}
76
4353a5c4 77void adns__query_tcp(adns_state ads, adns_query qu, struct timeval now) {
ddfda861 78 /* Query must be in state tcpwait/timew; it will be moved to a new state
79 * if possible and no further processing can be done on it for now.
80 * (Resulting state is one of tcpwait/timew (if server not connected),
81 * tcpsent/timew, child/childw or done/output.)
82 *
83 * adns__tcp_tryconnect should already have been called - _tcp
84 * will only use an existing connection (if there is one), which it
85 * may break. If the conn list lost then the caller is responsible for any
86 * reestablishment and retry.
87 */
4353a5c4 88 byte length[2];
4bec51a4 89 struct iovec iov[2];
4353a5c4 90 int wr, r;
656b2da9 91
ddfda861 92 if (ads->tcpstate != server_ok) return;
93
4bec51a4 94 length[0]= (qu->querylen&0x0ff00U) >>8;
95 length[1]= (qu->querylen&0x0ff);
96
4353a5c4 97 if (!adns__vbuf_ensure(&ads->tcpsend,ads->tcpsend.used+qu->querylen+2)) return;
656b2da9 98
4bec51a4 99 timevaladd(&now,TCPMS);
100 qu->timeout= now;
4353a5c4 101 qu->state= query_tcpsent;
102 LIST_LINK_TAIL(ads->timew,qu);
4bec51a4 103
4353a5c4 104 if (ads->tcpsend.used) {
ddfda861 105 wr= 0;
4bec51a4 106 } else {
4353a5c4 107 iov[0].iov_base= length;
4bec51a4 108 iov[0].iov_len= 2;
4353a5c4 109 iov[1].iov_base= qu->querymsg;
4bec51a4 110 iov[1].iov_len= qu->querylen;
ddfda861 111 wr= writev(ads->tcpsocket,iov,2);
112 if (wr < 0) {
4bec51a4 113 if (!(errno == EAGAIN || errno == EINTR || errno == ENOSPC ||
114 errno == ENOBUFS || errno == ENOMEM)) {
115 adns__tcp_broken(ads,"write",strerror(errno));
116 return;
117 }
ddfda861 118 wr= 0;
656b2da9 119 }
656b2da9 120 }
ddfda861 121
122 if (wr<2) {
4353a5c4 123 r= adns__vbuf_append(&ads->tcpsend,length,2-wr); assert(r);
ddfda861 124 wr= 0;
4353a5c4 125 } else {
ddfda861 126 wr-= 2;
127 }
128 if (wr<qu->querylen) {
4353a5c4 129 r= adns__vbuf_append(&ads->tcpsend,qu->querymsg+wr,qu->querylen-wr); assert(r);
656b2da9 130 }
4bec51a4 131}
132
ddfda861 133static void query_usetcp(adns_state ads, adns_query qu, struct timeval now) {
134 timevaladd(&now,TCPMS);
135 qu->timeout= now;
136 qu->state= query_tcpwait;
4353a5c4 137 LIST_LINK_TAIL(ads->timew,qu);
138 adns__query_tcp(ads,qu,now);
139 adns__tcp_tryconnect(ads,now);
ddfda861 140}
141
142void adns__query_udp(adns_state ads, adns_query qu, struct timeval now) {
143 /* Query must be in state udp/NONE; it will be moved to a new state,
144 * and no further processing can be done on it for now.
145 * (Resulting state is one of udp/timew, tcpwait/timew (if server not connected),
146 * tcpsent/timew, child/childw or done/output.)
4bec51a4 147 */
148 struct sockaddr_in servaddr;
4353a5c4 149 int serv, r;
4bec51a4 150
ddfda861 151 assert(qu->state == query_udp);
98a3f706 152 if ((qu->flags & adns_qf_usevc) || (qu->querylen > DNS_MAXUDP)) {
ddfda861 153 query_usetcp(ads,qu,now);
4bec51a4 154 return;
155 }
ddfda861 156
98a3f706 157 if (qu->udpretries >= UDPMAXRETRIES) {
4353a5c4 158 adns__query_fail(ads,qu,adns_s_timeout);
4bec51a4 159 return;
160 }
161
4353a5c4 162 serv= qu->udpnextserver;
4bec51a4 163 memset(&servaddr,0,sizeof(servaddr));
164 servaddr.sin_family= AF_INET;
165 servaddr.sin_addr= ads->servers[serv].addr;
98a3f706 166 servaddr.sin_port= htons(DNS_PORT);
4bec51a4 167
168 r= sendto(ads->udpsocket,qu->querymsg,qu->querylen,0,&servaddr,sizeof(servaddr));
ddfda861 169 if (r<0 && errno == EMSGSIZE) { query_usetcp(ads,qu,now); return; }
4353a5c4 170 if (r<0) adns__warn(ads,serv,"sendto failed: %s",strerror(errno));
4bec51a4 171
4bec51a4 172 timevaladd(&now,UDPRETRYMS);
656b2da9 173 qu->timeout= now;
4353a5c4 174 qu->udpsent |= (1<<serv);
175 qu->udpnextserver= (serv+1)%ads->nservers;
4bec51a4 176 qu->udpretries++;
4353a5c4 177 LIST_LINK_TAIL(ads->timew,qu);
178}
179
98a3f706 180void adns__query_finish(adns_state ads, adns_query qu, adns_status stat) {
181 adns_answer *ans;
182 byte *newbuf;
183
184 newbuf= realloc(qu->ans.buf,qu->ans.used);
185 if (newbuf) qu->ans.buf= newbuf;
186 ans= (adns_answer*)qu->ans.buf;
187 ans->status= stat;
188 ans->cname= qu->cnameoff<0 ? 0 : qu->ans.buf + qu->cnameoff;
189 ans->rrs.str= qu->rrsoff<0 ? 0 : (char **)(qu->ans.buf + qu->rrsoff);
4353a5c4 190 qu->id= -1;
191 LIST_LINK_TAIL(ads->output,qu);
656b2da9 192}
193
194void adns__query_fail(adns_state ads, adns_query qu, adns_status stat) {
195 adns_answer *ans;
4353a5c4 196
98a3f706 197 qu->ans.used= sizeof(adns_answer);
198 qu->cnameoff= -1;
199 qu->rrsoff= -1;
200 ans= (adns_answer*)qu->ans.buf;
4353a5c4 201 ans->nrrs= 0;
98a3f706 202
203 adns__query_finish(ads,qu,stat);
656b2da9 204}