Do PTR checking (multiple PTRs allowed).
[adns] / src / parse.c
CommitLineData
e576be50 1/*
2 * parse.c
3 * - parsing assistance functions (mainly for domains inside datagrams)
4 */
5/*
6 * This file is part of adns, which is Copyright (C) 1997, 1998 Ian Jackson
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2, or (at your option)
11 * any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software Foundation,
20 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
21 */
98a3f706 22
23#include "internal.h"
24
25int vbuf__append_quoted1035(vbuf *vb, const byte *buf, int len) {
26 char qbuf[10];
27 int i, ch;
28
29 while (len) {
30 qbuf[0]= 0;
31 for (i=0; i<len; i++) {
32 ch= buf[i];
33 if (ch == '.' || ch == '"' || ch == '(' || ch == ')' ||
34 ch == '@' || ch == ';' || ch == '$') {
35 sprintf(qbuf,"\\%c",ch);
36 break;
37 } else if (ch <= ' ' || ch >= 127) {
38 sprintf(qbuf,"\\%03o",ch);
39 break;
40 }
41 }
42 if (!adns__vbuf_append(vb,buf,i) || !adns__vbuf_append(vb,qbuf,strlen(qbuf)))
43 return 0;
44 buf+= i; len-= i;
45 }
46 return 1;
47}
48
3955725c 49void adns__findlabel_start(findlabel_state *fls, adns_state ads,
50 int serv, adns_query qu,
f1e474dd 51 const byte *dgram, int dglen, int max,
52 int dmbegin, int *dmend_rlater) {
53 fls->ads= ads;
3955725c 54 fls->qu= qu;
f1e474dd 55 fls->serv= serv;
56 fls->dgram= dgram;
57 fls->dglen= dglen;
58 fls->max= max;
59 fls->cbyte= dmbegin;
60 fls->namelen= 0;
61 fls->dmend_r= dmend_rlater;
f1e474dd 62}
98a3f706 63
3955725c 64adns_status adns__findlabel_next(findlabel_state *fls,
f1e474dd 65 int *lablen_r, int *labstart_r) {
86e7b8d9 66 int lablen, jumped, jumpto;
3955725c 67 const char *dgram;
f1e474dd 68
69 jumped= 0;
3955725c 70 dgram= fls->dgram;
98a3f706 71 for (;;) {
86e7b8d9 72 if (fls->cbyte >= fls->dglen) goto x_truncated;
73 if (fls->cbyte >= fls->max) goto x_serverfaulty;
74 GET_B(fls->cbyte,lablen);
75 if (!(lablen & 0x0c0)) break;
76 if ((lablen & 0x0c0) != 0x0c0) return adns_s_unknownreply;
f1e474dd 77 if (jumped++) {
3955725c 78 adns__diag(fls->ads,fls->serv,fls->qu,"compressed datagram contains loop");
f1e474dd 79 return adns_s_serverfaulty;
80 }
86e7b8d9 81 if (fls->cbyte >= fls->dglen) goto x_truncated;
82 if (fls->cbyte >= fls->max) goto x_serverfaulty;
83 GET_B(fls->cbyte,jumpto);
84 jumpto |= (lablen&0x3f)<<8;
f1e474dd 85 if (fls->dmend_r) *(fls->dmend_r)= fls->cbyte;
86e7b8d9 86 fls->cbyte= jumpto;
f1e474dd 87 fls->dmend_r= 0; fls->max= fls->dglen+1;
98a3f706 88 }
86e7b8d9 89 if (labstart_r) *labstart_r= fls->cbyte;
98a3f706 90 if (lablen) {
f1e474dd 91 if (fls->namelen) fls->namelen++;
92 fls->namelen+= lablen;
93 if (fls->namelen > DNS_MAXDOMAIN) return adns_s_domaintoolong;
94 fls->cbyte+= lablen;
95 if (fls->cbyte > fls->dglen) goto x_truncated;
96 if (fls->cbyte > fls->max) goto x_serverfaulty;
97 } else {
98 if (fls->dmend_r) *(fls->dmend_r)= fls->cbyte;
98a3f706 99 }
98a3f706 100 *lablen_r= lablen;
86e7b8d9 101/*if (labstart_r) fprintf(stderr,"label %d >%.*s<\n",lablen,lablen,fls->dgram+*labstart_r);*/
98a3f706 102 return adns_s_ok;
103
104 x_truncated:
105 *lablen_r= -1;
106 return adns_s_ok;
f1e474dd 107
108 x_serverfaulty:
3955725c 109 adns__diag(fls->ads,fls->serv,fls->qu,"label in domain runs beyond end of domain");
f1e474dd 110 return adns_s_serverfaulty;
98a3f706 111}
112
3955725c 113adns_status adns__parse_domain(adns_state ads, int serv, adns_query qu,
828d89bd 114 vbuf *vb, adns_queryflags flags,
3955725c 115 const byte *dgram, int dglen, int *cbyte_io, int max) {
f1e474dd 116 findlabel_state fls;
117
3955725c 118 int lablen, labstart, i, ch;
98a3f706 119 adns_status st;
120
3955725c 121 adns__findlabel_start(&fls,ads, serv,qu, dgram,dglen,max, *cbyte_io,cbyte_io);
f1e474dd 122 vb->used= 0;
98a3f706 123 for (;;) {
f1e474dd 124 st= adns__findlabel_next(&fls,&lablen,&labstart);
98a3f706 125 if (st) return st;
f1e474dd 126 if (lablen<0) { vb->used=0; return adns_s_ok; }
98a3f706 127 if (!lablen) break;
f1e474dd 128 if (vb->used)
3955725c 129 if (!adns__vbuf_append(vb,".",1)) return adns_s_nolocalmem;
828d89bd 130 if (flags & pdf_quoteok) {
3955725c 131 if (!vbuf__append_quoted1035(vb,dgram+labstart,lablen))
98a3f706 132 return adns_s_nolocalmem;
133 } else {
ffbda80c 134 ch= dgram[labstart];
135 if (!ctype_alpha(ch) && !ctype_digit(ch)) return adns_s_invalidanswerdomain;
f1e474dd 136 for (i= labstart+1; i<labstart+lablen; i++) {
137 ch= dgram[i];
98a3f706 138 if (ch != '-' && !ctype_alpha(ch) && !ctype_digit(ch))
ffbda80c 139 return adns_s_invalidanswerdomain;
98a3f706 140 }
3955725c 141 if (!adns__vbuf_append(vb,dgram+labstart,lablen))
98a3f706 142 return adns_s_nolocalmem;
143 }
144 }
3955725c 145 if (!adns__vbuf_append(vb,"",1)) return adns_s_nolocalmem;
98a3f706 146 return adns_s_ok;
98a3f706 147}
31144a72 148
1dfe95d8 149adns_status adns__findrr_anychk(adns_query qu, int serv,
150 const byte *dgram, int dglen, int *cbyte_io,
151 int *type_r, int *class_r, int *rdlen_r, int *rdstart_r,
152 const byte *eo_dgram, int eo_dglen, int eo_cbyte,
153 int *eo_matched_r) {
f1e474dd 154 findlabel_state fls, eo_fls;
155 int cbyte;
156
157 int tmp, rdlen, mismatch;
3955725c 158 int lablen, labstart, ch;
159 int eo_lablen, eo_labstart, eo_ch;
98a3f706 160 adns_status st;
161
162 cbyte= *cbyte_io;
98a3f706 163
3955725c 164 adns__findlabel_start(&fls,qu->ads, serv,qu, dgram,dglen,dglen,cbyte,&cbyte);
f1e474dd 165 if (eo_dgram) {
3955725c 166 adns__findlabel_start(&eo_fls,qu->ads, -1,0, eo_dgram,eo_dglen,eo_dglen,eo_cbyte,0);
f1e474dd 167 mismatch= 0;
168 } else {
169 mismatch= 1;
170 }
171
98a3f706 172 for (;;) {
f1e474dd 173 st= adns__findlabel_next(&fls,&lablen,&labstart);
98a3f706 174 if (st) return st;
175 if (lablen<0) goto x_truncated;
176
177 if (!mismatch) {
f1e474dd 178 st= adns__findlabel_next(&eo_fls,&eo_lablen,&eo_labstart);
179 assert(!st); assert(eo_lablen>=0);
98a3f706 180 if (lablen != eo_lablen) mismatch= 1;
86e7b8d9 181 while (!mismatch && eo_lablen-- > 0) {
98a3f706 182 ch= dgram[labstart++]; if (ctype_alpha(ch)) ch &= ~32;
183 eo_ch= eo_dgram[eo_labstart++]; if (ctype_alpha(eo_ch)) eo_ch &= ~32;
184 if (ch != eo_ch) mismatch= 1;
185 }
186 }
86e7b8d9 187 if (!lablen) break;
98a3f706 188 }
189 if (eo_matched_r) *eo_matched_r= !mismatch;
190
191 if (cbyte+10>dglen) goto x_truncated;
192 GET_W(cbyte,tmp); *type_r= tmp;
193 GET_W(cbyte,tmp); *class_r= tmp;
194 cbyte+= 4; /* we skip the TTL */
86e7b8d9 195 GET_W(cbyte,rdlen); if (rdlen_r) *rdlen_r= rdlen;
98a3f706 196 if (rdstart_r) *rdstart_r= cbyte;
197 cbyte+= rdlen;
198 if (cbyte>dglen) goto x_truncated;
199 *cbyte_io= cbyte;
200 return adns_s_ok;
201
202 x_truncated:
203 *type_r= -1;
86e7b8d9 204 return 0;
98a3f706 205}
3955725c 206
207adns_status adns__findrr(adns_query qu, int serv,
208 const byte *dgram, int dglen, int *cbyte_io,
209 int *type_r, int *class_r, int *rdlen_r, int *rdstart_r,
210 int *ownermatchedquery_r) {
211 if (!ownermatchedquery_r) {
1dfe95d8 212 return adns__findrr_anychk(qu,serv,
213 dgram,dglen,cbyte_io,
214 type_r,class_r,rdlen_r,rdstart_r,
215 0,0,0, 0);
3955725c 216 } else if (!qu->cname_dgram) {
1dfe95d8 217 return adns__findrr_anychk(qu,serv,
218 dgram,dglen,cbyte_io,
219 type_r,class_r,rdlen_r,rdstart_r,
220 qu->query_dgram,qu->query_dglen,DNS_HDRSIZE,
221 ownermatchedquery_r);
3955725c 222 } else {
1dfe95d8 223 return adns__findrr_anychk(qu,serv,
224 dgram,dglen,cbyte_io,
225 type_r,class_r,rdlen_r,rdstart_r,
226 qu->cname_dgram,qu->cname_dglen,qu->cname_begin,
227 ownermatchedquery_r);
3955725c 228 }
229}