rename variables, make it compile, fix error handling a bit
[adns] / src / addrfam.c
CommitLineData
9136cf0c
MW
1/*
2 * addrfam.c
3 * - address-family specific code
4 */
5/*
6 * This file is part of adns, which is
7 * Copyright (C) 1997-2000,2003,2006 Ian Jackson
8 * Copyright (C) 1999-2000,2003,2006 Tony Finch
9 * Copyright (C) 1991 Massachusetts Institute of Technology
10 * (See the file INSTALL for full details.)
11 *
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2, or (at your option)
15 * any later version.
16 *
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software Foundation,
24 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25 */
26
27#include <stdlib.h>
28#include <errno.h>
29#include <limits.h>
30#include <unistd.h>
b0f1ed64
IJ
31#include <inttypes.h>
32#include <stddef.h>
1a9d7092 33#include <stdbool.h>
9136cf0c
MW
34
35#include <sys/types.h>
36#include <netdb.h>
37#include <sys/socket.h>
38#include <netinet/in.h>
39#include <arpa/inet.h>
b0f1ed64
IJ
40#include <netinet/in.h>
41#include <net/if.h>
9136cf0c
MW
42
43#include "internal.h"
44
45/*
6480e2df 46 * General address-family operations.
9136cf0c
MW
47 */
48
49#define SIN(sa) ((struct sockaddr_in *)(sa))
705b9b15 50#define CSIN(sa) ((const struct sockaddr_in *)(sa))
9136cf0c 51
6480e2df
MW
52#define SIN6(sa) ((struct sockaddr_in6 *)(sa))
53#define CSIN6(sa) ((const struct sockaddr_in6 *)(sa))
54
55/* This gadget (thanks, Richard Kettlewell) makes sure that we handle the
56 * same set of address families in each switch. */
57#define AF_CASES(pre) \
58 case AF_INET: goto pre##_inet; \
59 case AF_INET6: goto pre##_inet6
60
61static void unknown_af(int af) {
62 fprintf(stderr, "ADNS INTERNAL: unknown address family %d\n", af);
63 abort();
64}
9136cf0c 65
6480e2df 66int adns__af_supported_p(int af)
705b9b15 67{
6480e2df
MW
68 switch (af) {
69 AF_CASES(af);
70 af_inet: af_inet6: return 1;
71 default: return 0;
72 }
705b9b15
MW
73}
74
6480e2df
MW
75int adns__sockaddr_equal_p(const struct sockaddr *sa,
76 const struct sockaddr *sb)
77{
78 if (sa->sa_family != sb->sa_family) return 0;
79 switch (sa->sa_family) {
80 AF_CASES(af);
81 af_inet: {
82 const struct sockaddr_in *sina = CSIN(sa), *sinb = CSIN(sb);
83 return (sina->sin_addr.s_addr == sinb->sin_addr.s_addr &&
84 sina->sin_port == sinb->sin_port);
85 }
86 af_inet6: {
87 /* Don't check the flowlabel. That's apparently useful for routing
88 * performance, but doesn't affect the address in any important
89 * respect.
90 */
91 const struct sockaddr_in6 *sin6a = CSIN6(sa), *sin6b = CSIN6(sb);
92 return (memcmp(sin6a->sin6_addr.s6_addr,
93 sin6b->sin6_addr.s6_addr,
94 sizeof(sin6a->sin6_addr.s6_addr)) == 0 &&
95 sin6a->sin6_port == sin6b->sin6_port &&
96 sin6a->sin6_scope_id == sin6b->sin6_scope_id);
97 }
98 default:
99 unknown_af(sa->sa_family);
100 return -1;
101 }
102}
9136cf0c 103
6480e2df 104int adns__gen_pton(const char *p, int *af_r, union gen_addr *addr_r)
9136cf0c 105{
6480e2df
MW
106 static const int aflist[] = { AF_INET6, AF_INET };
107 int i, rc;
9136cf0c 108
6480e2df
MW
109 for (i = 0; i < sizeof(aflist)/sizeof(*aflist); i++) {
110 rc = inet_pton(aflist[i], p, addr_r);
111 assert(rc >= 0);
112 if (rc) { *af_r = aflist[i]; return 1; }
113 }
114 return 0;
9136cf0c
MW
115}
116
6480e2df 117int adns__addr_width(int af)
8a53cf7f 118{
6480e2df
MW
119 switch (af) {
120 AF_CASES(af);
121 af_inet: return 32;
122 af_inet6: return 128;
123 default: unknown_af(af); return -1;
8a53cf7f 124 }
8a53cf7f
MW
125}
126
6480e2df 127void adns__prefix_mask(int af, int len, union gen_addr *mask_r)
8a53cf7f 128{
6480e2df
MW
129 switch (af) {
130 AF_CASES(af);
131 af_inet:
132 assert(len <= 32);
133 mask_r->v4.s_addr = htonl(!len ? 0 : 0xffffffff << (32 - len));
134 break;
135 af_inet6: {
136 int i = len/8, j = len%8;
137 unsigned char *m = mask_r->v6.s6_addr;
138
139 assert(len <= 128);
140 memset(m, 0xff, i);
141 if (j) m[i++] = (0xff << (8-j)) & 0xff;
142 memset(m+i, 0, 16-i);
143 } break;
144 default:
145 unknown_af(af);
146 break;
147 }
8a53cf7f
MW
148}
149
6480e2df 150int adns__guess_prefix_length(int af, const union gen_addr *addr)
8a53cf7f 151{
6480e2df
MW
152 switch (af) {
153 AF_CASES(af);
154 af_inet: {
155 unsigned a = (ntohl(addr->v4.s_addr) >> 24) & 0xff;
156
157 if (a < 128) return 8;
158 else if (a < 192) return 16;
159 else if (a < 224) return 24;
160 else return -1;
161 } break;
162 af_inet6:
163 return 64;
164 default:
165 unknown_af(af);
166 return -1;
167 }
168}
8a53cf7f 169
6480e2df
MW
170int adns__addr_match_p(int addraf, const union gen_addr *addr,
171 int netaf, const union gen_addr *base,
172 const union gen_addr *mask)
173{
174 if (addraf != netaf) return 0;
175 switch (addraf) {
176 AF_CASES(af);
177 af_inet:
178 return (addr->v4.s_addr & mask->v4.s_addr) == base->v4.s_addr;
179 af_inet6: {
180 int i;
181 const char *a = addr->v6.s6_addr;
182 const char *b = base->v6.s6_addr;
183 const char *m = mask->v6.s6_addr;
184
185 for (i = 0; i < 16; i++)
186 if ((a[i] & m[i]) != b[i]) return 0;
187 return 1;
188 } break;
189 default:
190 unknown_af(addraf);
191 return -1;
8a53cf7f 192 }
8a53cf7f
MW
193}
194
6480e2df
MW
195const void *adns__sockaddr_to_inaddr(const struct sockaddr *sa)
196{
197 switch (sa->sa_family) {
198 AF_CASES(af);
199 af_inet: return &CSIN(sa)->sin_addr;
200 af_inet6: return &CSIN6(sa)->sin6_addr;
201 default: unknown_af(sa->sa_family); return 0;
202 }
203}
9136cf0c
MW
204
205/*
504877d1
IJ
206 * addr2text and text2addr
207 */
208
b0f1ed64
IJ
209#define ADDRFAM_DEBUG
210#ifdef ADDRFAM_DEBUG
9964d805
IJ
211static void af_debug_func(const char *fmt, ...) {
212 int esave= errno;
213 va_list al;
214 va_start(al,fmt);
215 vfprintf(stderr,fmt,al);
216 va_end(al);
217 errno= esave;
218}
b0f1ed64 219# define af_debug(fmt,...) \
9964d805 220 (af_debug_func("%s: " fmt "\n", __func__, __VA_ARGS__))
b0f1ed64
IJ
221#else
222# define af_debug(fmt,...) ((void)("" fmt "", __VA_ARGS__))
223#endif
224
1a9d7092
IJ
225static bool addrtext_our_errno(int e) {
226 return
227 e==EAFNOSUPPORT ||
228 e==EINVAL ||
229 e==ENOSPC ||
230 e==ENOSYS;
231}
232
3121b6a6
IJ
233static bool addrtext_scope_use_ifname(const struct sockaddr *sa) {
234 const struct in6_addr *in6= &CSIN6(sa)->sin6_addr;
235 return
236 IN6_IS_ADDR_LINKLOCAL(in6) ||
237 IN6_IS_ADDR_MC_LINKLOCAL(in6);
238}
239
7efa5bdc
IJ
240int adns_text2addr(const char *text, uint16_t port, adns_queryflags flags,
241 struct sockaddr *sa, socklen_t *salen_io) {
504877d1
IJ
242 int af;
243 char copybuf[INET6_ADDRSTRLEN];
7efa5bdc 244 const char *parse=text;
b0f1ed64
IJ
245 const char *scopestr=0;
246 socklen_t needlen;
247 void *dst;
248 uint16_t *portp;
249
250#define INVAL(how) do{ \
7efa5bdc 251 af_debug("invalid: %s: `%s'", how, text); \
b0f1ed64
IJ
252 return EINVAL; \
253}while(0)
504877d1 254
b0f1ed64
IJ
255#define AFCORE(INETx,SINx,sinx) \
256 af= AF_##INETx; \
257 dst = &SINx(sa)->sinx##_addr; \
258 portp = &SINx(sa)->sinx##_port; \
259 needlen= sizeof(*SINx(sa));
260
7efa5bdc 261 if (!strchr(text, ':')) { /* INET */
62c62d61 262
b0f1ed64
IJ
263 AFCORE(INET,SIN,sin);
264
265 } else { /* INET6 */
266
267 AFCORE(INET6,SIN6,sin6);
268
7efa5bdc 269 const char *percent= strchr(text, '%');
504877d1 270 if (percent) {
7efa5bdc 271 ptrdiff_t lhslen = percent - text;
b0f1ed64 272 if (lhslen >= INET6_ADDRSTRLEN) INVAL("scoped addr lhs too long");
7efa5bdc 273 memcpy(copybuf, text, lhslen);
b0f1ed64 274 copybuf[lhslen]= 0;
504877d1 275
b0f1ed64
IJ
276 parse= copybuf;
277 scopestr= percent+1;
504877d1 278
71a5b6fc 279 af_debug("will parse scoped addr `%s' %% `%s'", parse, scopestr);
b0f1ed64 280 }
504877d1 281
504877d1
IJ
282 }
283
62c62d61
IJ
284#undef AFCORE
285
71a5b6fc
IJ
286 if (scopestr && (flags & adns_qf_addrlit_scope_forbid))
287 INVAL("scoped addr but _scope_forbid");
288
7efa5bdc
IJ
289 if (*salen_io < needlen) {
290 *salen_io = needlen;
b0f1ed64
IJ
291 return ENOSPC;
292 }
b0f1ed64
IJ
293
294 memset(sa, 0, needlen);
76af9c49
IJ
295
296 sa->sa_family= af;
b0f1ed64
IJ
297 *portp = htons(port);
298
299 int r= inet_pton(af,parse,dst);
300 if (!r) INVAL("inet_pton rejected");
301 if (r<0) {
302 af_debug("inet_pton failed on `%s'", parse);
303 return errno;
304 }
305
306 if (scopestr) {
307 errno=0;
308 char *ep;
309 unsigned long scope= strtoul(scopestr,&ep,10);
310 if (errno==ERANGE) INVAL("numeric scope id too large for unsigned long");
311 assert(!errno);
312 if (!*ep) {
313 if (scope > ~(uint32_t)0)
314 INVAL("numeric scope id too large for uint32_t");
315 } else { /* !!*ep */
71a5b6fc
IJ
316 if (flags & adns_qf_addrlit_scope_numeric)
317 INVAL("non-numeric scope but _scope_numeric");
3121b6a6 318 if (!addrtext_scope_use_ifname(sa)) {
b0f1ed64 319 af_debug("cannot convert non-numeric scope"
7efa5bdc 320 " in non-link-local addr `%s'", text);
b0f1ed64
IJ
321 return ENOSYS;
322 }
323 errno= 0;
324 scope= if_nametoindex(scopestr);
325 if (!scope) {
326 /* RFC3493 says "No errors are defined". It's not clear
327 * whether that is supposed to mean if_nametoindex "can't
328 * fail" (other than by the supplied name not being that of an
329 * interface) which seems unrealistic, or that it conflates
330 * all its errors together by failing to set errno, or simply
331 * that they didn't bother to document the errors.
332 *
333 * glibc, FreeBSD and OpenBSD all set errno (to ENXIO when
334 * appropriate). See Debian bug #749349.
335 *
336 * We attempt to deal with this by clearing errno to start
337 * with, and then perhaps mapping the results. */
338 af_debug("if_nametoindex rejected scope name (errno=%s)",
339 strerror(errno));
340 if (errno==0) {
341 return ENXIO;
1a9d7092 342 } else if (addrtext_our_errno(errno)) {
b0f1ed64
IJ
343 /* we use these for other purposes, urgh. */
344 perror("adns: adns_text2addr: if_nametoindex"
345 " failed with unexpected error");
346 return EIO;
347 } else {
348 return errno;
349 }
350 } else { /* ix>0 */
351 if (scope > ~(uint32_t)0) {
352 fprintf(stderr,"adns: adns_text2addr: if_nametoindex"
02fd91f8 353 " returned an interface index >=2^32 which will not fit"
b0f1ed64
IJ
354 " in sockaddr_in6.sin6_scope_id");
355 return EIO;
356 }
357 }
358 } /* else; !!*ep */
359
76af9c49 360 SIN6(sa)->sin6_scope_id= scope;
b0f1ed64
IJ
361 } /* if (scopestr) */
362
7efa5bdc 363 *salen_io = needlen;
b0f1ed64
IJ
364 return 0;
365}
504877d1 366
7efa5bdc
IJ
367int adns_addr2text(const struct sockaddr *sa, adns_queryflags flags,
368 char *buffer, int *buflen_io, int *port_r) {
bfd4cc54
IJ
369 const void *src;
370 int port;
371
7efa5bdc
IJ
372 if (*buflen_io < ADNS_ADDR2TEXT_BUFLEN) {
373 *buflen_io = ADNS_ADDR2TEXT_BUFLEN;
bfd4cc54
IJ
374 return ENOSPC;
375 }
376
377 switch (sa->sa_family) {
378 AF_CASES(af);
379 af_inet: src= &CSIN(sa)->sin_addr; port= CSIN(sa)->sin_port; break;
380 af_inet6: src= &CSIN6(sa)->sin6_addr; port= CSIN6(sa)->sin6_port; break;
381 default: return EAFNOSUPPORT;
382 }
383
7efa5bdc 384 const char *ok= inet_ntop(sa->sa_family, src, buffer, *buflen_io);
bfd4cc54
IJ
385 assert(ok);
386
387 if (sa->sa_family == AF_INET6) {
388 uint32_t scope = CSIN6(sa)->sin6_scope_id;
389 if (scope) {
71a5b6fc
IJ
390 if (flags & adns_qf_addrlit_scope_forbid)
391 return EINVAL;
7efa5bdc
IJ
392 int scopeoffset = strlen(buffer);
393 int remain = *buflen_io - scopeoffset;
394 char *scopeptr = buffer + scopeoffset;
1a9d7092
IJ
395 assert(remain >= IF_NAMESIZE+1/*%*/);
396 *scopeptr++= '%'; remain--;
3121b6a6 397 bool parsedname = 0;
7efa5bdc 398 af_debug("will print scoped addr %s %% %"PRIu32"", buffer, scope);
3121b6a6 399 if (scope <= UINT_MAX /* so we can pass it to if_indextoname */
71a5b6fc 400 && !(flags & adns_qf_addrlit_scope_numeric)
3121b6a6
IJ
401 && addrtext_scope_use_ifname(sa)) {
402 parsedname = if_indextoname(scope, scopeptr);
403 if (!parsedname) {
9964d805
IJ
404 af_debug("if_indextoname rejected scope (errno=%s)",
405 strerror(errno));
3121b6a6
IJ
406 if (errno==ENXIO) {
407 /* fair enough, show it as a number then */
408 } else if (addrtext_our_errno(errno)) {
409 /* we use these for other purposes, urgh. */
410 perror("adns: adns_addr2text: if_indextoname"
411 " failed with unexpected error");
412 return EIO;
413 } else {
414 return errno;
415 }
1a9d7092 416 }
3121b6a6
IJ
417 }
418 if (!parsedname) {
1a9d7092
IJ
419 int r = snprintf(scopeptr, remain,
420 "%"PRIu32"", scope);
7efa5bdc 421 assert(r < *buflen_io - scopeoffset);
1a9d7092 422 }
7efa5bdc 423 af_debug("printed scoped addr `%s'", buffer);
bfd4cc54
IJ
424 }
425 }
426
427 if (port_r) *port_r= ntohs(port);
428 return 0;
429}
430
504877d1 431/*
6480e2df 432 * Reverse-domain parsing and construction.
9136cf0c
MW
433 */
434
6480e2df
MW
435int adns__make_reverse_domain(const struct sockaddr *sa,
436 const char *zone,
437 char **buf_io, size_t bufsz,
438 char **buf_free_r)
439{
440 size_t req;
441 char *p;
442 unsigned c, y;
443 unsigned long aa;
444 const unsigned char *ap;
445 int i, j;
9136cf0c 446
6480e2df
MW
447 switch (sa->sa_family) {
448 AF_CASES(af);
449 af_inet:
450 req = 4 * 4;
451 if (!zone) zone = "in-addr.arpa";
452 break;
453 af_inet6:
454 req = 2 * 32;
455 if (!zone) zone = "ip6.arpa";
456 break;
457 default:
458 return ENOSYS;
459 }
9136cf0c 460
6480e2df
MW
461 req += strlen(zone) + 1;
462 if (req <= bufsz)
463 p = *buf_io;
464 else {
465 p = malloc(req); if (!p) return errno;
466 *buf_free_r = p;
467 }
705b9b15 468
6480e2df
MW
469 *buf_io = p;
470 switch (sa->sa_family) {
471 AF_CASES(bf);
472 bf_inet:
473 aa = ntohl(CSIN(sa)->sin_addr.s_addr);
474 for (i = 0; i < 4; i++) {
475 p += sprintf(p, "%d", (int)(aa & 0xff));
476 *p++ = '.';
477 aa >>= 8;
478 }
479 break;
480 bf_inet6:
481 ap = CSIN6(sa)->sin6_addr.s6_addr + 16;
482 for (i = 0; i < 16; i++) {
483 c = *--ap;
484 for (j = 0; j < 2; j++) {
485 y = c & 0xf;
486 if (y < 10) *p++ = y + '0';
487 else *p++ = y - 10 + 'a';
488 c >>= 4;
489 *p++ = '.';
490 }
491 }
492 break;
493 default:
494 unknown_af(sa->sa_family);
495 }
9136cf0c 496
6480e2df
MW
497 strcpy(p, zone);
498 return 0;
9136cf0c
MW
499}
500
9136cf0c 501
6480e2df 502static int inet_rev_parsecomp(const char *p, size_t n)
9136cf0c 503{
6480e2df
MW
504 int i = 0;
505 if (n > 3) return -1;
9136cf0c 506
6480e2df
MW
507 while (n--) {
508 if ('0' <= *p && *p <= '9') i = 10*i + *p++ - '0';
509 else return -1;
510 }
511 return i;
512}
513
514static void inet_rev_mkaddr(union gen_addr *addr, const byte *ipv)
515{
516 addr->v4.s_addr = htonl((ipv[3]<<24) | (ipv[2]<<16) |
517 (ipv[1]<<8) | (ipv[0]));
9136cf0c
MW
518}
519
8a53cf7f
MW
520static int inet6_rev_parsecomp(const char *p, size_t n)
521{
522 if (n != 1) return -1;
523 else if ('0' <= *p && *p <= '9') return *p - '0';
524 else if ('a' <= *p && *p <= 'f') return *p - 'a' + 10;
525 else if ('A' <= *p && *p <= 'F') return *p - 'a' + 10;
526 else return -1;
527}
528
529static void inet6_rev_mkaddr(union gen_addr *addr, const byte *ipv)
530{
531 unsigned char *a = addr->v6.s6_addr;
532 int i;
533
534 for (i = 0; i < 16; i++)
535 a[i] = (ipv[31-2*i] << 4) | (ipv[30-2*i] << 0);
536}
537
6480e2df
MW
538static const struct revparse_domain {
539 int af; /* address family */
540 int nrevlab; /* n of reverse-address labels */
541 adns_rrtype rrtype; /* forward-lookup type */
542
543 int (*rev_parsecomp)(const char *p, size_t n);
544 /* parse a single component from a label; return the integer value, or -1
545 * if it was unintelligible.
546 */
547
548 void (*rev_mkaddr)(union gen_addr *addr, const byte *ipv);
549 /* write out the parsed address from a vector of parsed components */
550
551 const char *const tail[3]; /* tail label names */
552} revparse_domains[NREVDOMAINS] = {
553 { AF_INET, 4, adns_r_a, inet_rev_parsecomp, inet_rev_mkaddr,
554 { DNS_INADDR_ARPA, 0 } },
555 { AF_INET6, 32, adns_r_aaaa, inet6_rev_parsecomp, inet6_rev_mkaddr,
556 { DNS_IP6_ARPA, 0 } },
557};
8a53cf7f 558
6480e2df
MW
559#define REVDOMAIN_MAP(rps, labnum) \
560 ((labnum) ? (rps)->map : (1 << NREVDOMAINS) - 1)
561
562int adns__revparse_label(struct revparse_state *rps, int labnum,
563 const char *label, int lablen)
564{
565 unsigned f = REVDOMAIN_MAP(rps, labnum);
566 const struct revparse_domain *rpd;
567 const char *tp;
568 unsigned d;
569 int i, ac;
570
571 for (rpd=revparse_domains, i=0, d=1; i<NREVDOMAINS; rpd++, i++, d <<= 1) {
572 if (!(f & d)) continue;
573 if (labnum >= rpd->nrevlab) {
574 tp = rpd->tail[labnum - rpd->nrevlab];
575 if (!tp || strncmp(label, tp, lablen) != 0 || tp[lablen])
576 goto mismatch;
577 } else {
578 ac = rpd->rev_parsecomp(label, lablen);
579 if (ac < 0) goto mismatch;
580 assert(labnum < sizeof(rps->ipv[i]));
581 rps->ipv[i][labnum] = ac;
8a53cf7f 582 }
6480e2df
MW
583 continue;
584
585 mismatch:
586 f &= ~d;
587 if (!f) return -1;
8a53cf7f 588 }
6480e2df
MW
589
590 rps->map = f;
591 return 0;
8a53cf7f
MW
592}
593
6480e2df
MW
594int adns__revparse_done(struct revparse_state *rps, int nlabels,
595 adns_rrtype *rrtype_r, struct af_addr *addr_r)
596{
597 unsigned f = REVDOMAIN_MAP(rps, nlabels);
598 const struct revparse_domain *rpd;
599 unsigned d;
600 int i, found = -1;
601
602 for (rpd=revparse_domains, i=0, d=1; i<NREVDOMAINS; rpd++, i++, d <<= 1) {
603 if (!(f & d)) continue;
604 if (nlabels >= rpd->nrevlab && !rpd->tail[nlabels - rpd->nrevlab])
605 { found = i; continue; }
606 f &= ~d;
607 if (!f) return -1;
608 }
609 assert(found >= 0); assert(f == (1 << found));
610
611 rpd = &revparse_domains[found];
612 *rrtype_r = rpd->rrtype;
613 addr_r->af = rpd->af;
614 rpd->rev_mkaddr(&addr_r->addr, rps->ipv[found]);
615 return 0;
616}