656b2da9 |
1 | /**/ |
2 | |
3 | #include "adns-internal.h" |
4 | |
5 | static adns_status mkquery(adns_state ads, const char *owner, int ol, int id, |
6 | adns_rrtype type, adns_queryflags flags, int *qml_r) { |
7 | int ll, c, nlabs, qbufreq; |
8 | unsigned char label[255], *nqbuf; |
9 | const char *p, *pe; |
10 | |
11 | #define MKQUERY_ADDB(b) *nqbuf++= (b) |
12 | #define MKQUERY_ADDW(w) (MKQUERY_ADDB(((w)>>8)&0x0ff), MKQUERY_ADDB((w)&0x0ff)) |
13 | |
14 | qbufreq= 12+strlen(owner)+3; |
15 | if (ads->qbufavail < qbufreq) { |
16 | nqbuf= realloc(ads->qbuf,qbufreq); |
17 | if (!nqbuf) return adns_s_nolocalmem; |
18 | ads->qbuf= nqbuf; ads->qbufavail= qbufreq; |
19 | } |
20 | nqbuf= ads->qbuf; |
21 | |
22 | MKQUERY_ADDW(id); |
23 | MKQUERY_ADDB(0x01); /* QR=Q(0), OPCODE=QUERY(0000), !AA, !TC, RD */ |
24 | MKQUERY_ADDB(0x00); /* !RA, Z=000, RCODE=NOERROR(0000) */ |
25 | MKQUERY_ADDW(1); /* QDCOUNT=1 */ |
26 | MKQUERY_ADDW(0); /* ANCOUNT=0 */ |
27 | MKQUERY_ADDW(0); /* NSCOUNT=0 */ |
28 | MKQUERY_ADDW(0); /* ARCOUNT=0 */ |
29 | p= owner; pe= owner+ol; |
30 | nlabs= 0; |
31 | if (!*p) return adns_s_invaliddomain; |
32 | do { |
33 | ll= 0; |
34 | while (p!=pe && (c= *p++)!='.') { |
35 | if (c=='\\') { |
36 | if (!(flags & adns_f_anyquote)) return adns_s_invaliddomain; |
37 | if (ctype_digit(p[0])) { |
38 | if (ctype_digit(p[1]) && ctype_digit(p[2])) { |
39 | c= (*p++ - '0')*100 + (*p++ - '0')*10 + (*p++ - '0'); |
40 | if (c >= 256) return adns_s_invaliddomain; |
41 | } else { |
42 | return adns_s_invaliddomain; |
43 | } |
44 | } else if (!(c= *p++)) { |
45 | return adns_s_invaliddomain; |
46 | } |
47 | } |
48 | if (!(flags & adns_f_anyquote)) { |
49 | if ((c >= '0' && c <= '9') || c == '-') { |
50 | if (!ll) return adns_s_invaliddomain; |
51 | } else if ((c < 'a' || c > 'z') && (c < 'A' && c > 'Z')) { |
52 | return adns_s_invaliddomain; |
53 | } |
54 | } |
55 | if (ll == sizeof(label)) return adns_s_invaliddomain; |
56 | label[ll++]= c; |
57 | } |
58 | if (!ll) return adns_s_invaliddomain; |
59 | if (nlabs++ > 63) return adns_s_invaliddomain; |
60 | MKQUERY_ADDB(ll); |
61 | memcpy(nqbuf,label,ll); nqbuf+= ll; |
62 | } while (p!=pe); |
63 | |
64 | MKQUERY_ADDB(0); |
65 | MKQUERY_ADDW(type & adns__rrt_typemask); /* QTYPE */ |
66 | MKQUERY_ADDW(1); /* QCLASS=IN */ |
67 | |
68 | *qml_r= nqbuf - ads->qbuf; |
69 | |
70 | return adns_s_ok; |
71 | } |
72 | |
73 | void adns__quproc_tosend(adns_state ads, adns_query qu, struct timeval now) { |
74 | /* Query must be on the `tosend' queue, and guarantees to remove it. */ |
75 | struct sockaddr_in servaddr; |
76 | int serv; |
77 | |
78 | if (qu->nextudpserver != -1) { |
79 | if (qu->udpretries >= UDPMAXRETRIES) { |
80 | DLIST_UNLINK(ads->tosend,qu); |
81 | query_fail(ads,qu,adns_s_notresponding); |
82 | return; |
83 | } |
84 | serv= qu->nextudpserver; |
85 | memset(&servaddr,0,sizeof(servaddr)); |
86 | servaddr.sin_family= AF_INET; |
87 | servaddr.sin_addr= ads->servers[serv].addr; |
88 | servaddr.sin_port= htons(53); |
89 | r= sendto(ads->udpsocket,qu->querymsg,qu->querylen,0,&servaddr,sizeof(servaddr)); |
90 | if (r<0 && errno == EMSGSIZE) { |
91 | qu->nextudpserver= -1; |
92 | } else { |
93 | if (r<0) { |
94 | diag("sendto %s failed: %s",inet_ntoa(servaddr.sin_addr),strerror(errno)); |
95 | } |
96 | DLIST_UNLINK(ads->tosend,qu); |
97 | timevaladd(&now,UDPRETRYMS); |
98 | qu->timeout= now; |
99 | qu->sentudp |= (1<<serv); |
100 | qu->nextudpserver= (serv+1)%ads->nservers; |
101 | qu->udpretries++; |
102 | DLIST_LINKTAIL(ads->timew,qu); |
103 | return; |
104 | } |
105 | } |
106 | |
107 | for (;;) { |
108 | serv= tcpserver_get(ads); |
109 | if (serv<0) { r=0; break; } |
110 | if (ads->opbufused) { r=0; break; } |
111 | r= write(ads->tcpsocket,qu->querymsg,qu->querylen); |
112 | if (r >= 0) break; |
113 | if (errno == EAGAIN || errno == EINTR || errno == ENOSPC || |
114 | errno == ENOBUFS || errno == ENOMEM) { |
115 | r= 0; break; |
116 | } |
117 | tcpserver_broken(serv); |
118 | } |
119 | if (r < qu->querylen) { |
120 | newopbufused= qu->opbufused + (qu->querylen-r); |
121 | if (newopbufused > ads->opbufavail) { |
122 | newopbufavail= ads->newopbufused<<1; |
123 | newopbuf= realloc(newopbufavail); |
124 | if (!newopbuf) { |
125 | DLIST_UNLINK(ads->tosend,qu); |
126 | query_fail(ads,qu,adns_s_nolocalmem); |
127 | return; |
128 | } |
129 | ads->opbuf= newopbuf; |
130 | ads->opbufavail= newopbufavail; |
131 | } |
132 | memcpy(ads->opbuf+ads->opbufused,qu->querymsg+r,qu->querylen-r); |
133 | ads->opbufused= newopbufused; |
134 | } |
135 | DLIST_UNLINK(ads->tosend,qu); |
136 | timevaladd(&now,TCPMS); |
137 | qu->timeout= now; |
138 | qu->senttcp |= (1<<qu->nextserver); |
139 | DLIST_LINKTAIL(ads->timew,qu); |
140 | } |
141 | |
142 | void adns__query_fail(adns_state ads, adns_query qu, adns_status stat) { |
143 | adns_answer *ans; |
144 | |
145 | ans= qu->answer; |
146 | if (!ans) ans= malloc(sizeof(*qu->answer)); |
147 | if (ans) { |
148 | ans->status= stat; |
149 | ans->cname= 0; |
150 | ans->type= qu->type; |
151 | ans->nrrs= 0; |
152 | } |
153 | qu->answer= ans; |
154 | qu->id= -1; |
155 | LIST_LINK_TAIL(ads->output,qu); |
156 | } |