| 1 | /* |
| 2 | * types.c |
| 3 | * - RR-type-specific code, and the machinery to call it |
| 4 | */ |
| 5 | /* |
| 6 | * This file is part of adns, which is |
| 7 | * Copyright (C) 1997-2000,2003,2006 Ian Jackson |
| 8 | * Copyright (C) 1999-2000,2003,2006 Tony Finch |
| 9 | * Copyright (C) 1991 Massachusetts Institute of Technology |
| 10 | * (See the file INSTALL for full details.) |
| 11 | * |
| 12 | * This program is free software; you can redistribute it and/or modify |
| 13 | * it under the terms of the GNU General Public License as published by |
| 14 | * the Free Software Foundation; either version 2, or (at your option) |
| 15 | * any later version. |
| 16 | * |
| 17 | * This program is distributed in the hope that it will be useful, |
| 18 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 19 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 20 | * GNU General Public License for more details. |
| 21 | * |
| 22 | * You should have received a copy of the GNU General Public License |
| 23 | * along with this program; if not, write to the Free Software Foundation, |
| 24 | * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. |
| 25 | */ |
| 26 | |
| 27 | #include <stddef.h> |
| 28 | #include <stdlib.h> |
| 29 | |
| 30 | #include <sys/types.h> |
| 31 | #include <sys/socket.h> |
| 32 | #include <netinet/in.h> |
| 33 | #include <arpa/inet.h> |
| 34 | |
| 35 | #include "internal.h" |
| 36 | |
| 37 | #define R_NOMEM return adns_s_nomemory |
| 38 | #define CSP_ADDSTR(s) do { \ |
| 39 | if (!adns__vbuf_appendstr(vb,(s))) R_NOMEM; \ |
| 40 | } while (0) |
| 41 | |
| 42 | /* |
| 43 | * order of sections: |
| 44 | * |
| 45 | * _string (pap) |
| 46 | * _textdata, _qstring (csp) |
| 47 | * _str (mf,cs) |
| 48 | * _intstr (mf,csp,cs) |
| 49 | * _manyistr (mf,cs) |
| 50 | * _txt (pa) |
| 51 | * _inaddr (pa,di,cs |
| 52 | * +search_sortlist, dip_genaddr, csp_genaddr) |
| 53 | * _in6addr (pa,di,cs) |
| 54 | * _addr (pap,pa,di,div,csp,cs,gsz,qs |
| 55 | * +search_sortlist_sa, dip_sockaddr, |
| 56 | * addr_rrtypes, addr_submit, icb_addr) |
| 57 | * _domain (pap,csp,cs) |
| 58 | * _dom_raw (pa) |
| 59 | * _host_raw (pa) |
| 60 | * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs |
| 61 | * +pap_findaddrs, icb_hostaddr) |
| 62 | * _mx_raw (pa,di) |
| 63 | * _mx (pa,di) |
| 64 | * _inthostaddr (mf,cs) |
| 65 | * _inthost (cs) |
| 66 | * _ptr (ckl,pa +icb_ptr) |
| 67 | * _strpair (mf) |
| 68 | * _intstrpair (mf) |
| 69 | * _hinfo (pa) |
| 70 | * _mailbox (pap,csp +pap_mailbox822) |
| 71 | * _rp (pa,cs) |
| 72 | * _soa (pa,mf,cs) |
| 73 | * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort) |
| 74 | * _byteblock (mf) |
| 75 | * _opaque (pa,cs) |
| 76 | * _flat (mf) |
| 77 | * |
| 78 | * within each section: |
| 79 | * ckl_* |
| 80 | * pap_* |
| 81 | * pa_* |
| 82 | * dip_* |
| 83 | * di_* |
| 84 | * mfp_* |
| 85 | * mf_* |
| 86 | * csp_* |
| 87 | * cs_* |
| 88 | * gsz_* |
| 89 | * postsort_* |
| 90 | * qs_* |
| 91 | */ |
| 92 | |
| 93 | /* |
| 94 | * _qstring (pap,csp) |
| 95 | */ |
| 96 | |
| 97 | static adns_status pap_qstring(const parseinfo *pai, int *cbyte_io, int max, |
| 98 | int *len_r, char **str_r) { |
| 99 | /* Neither len_r nor str_r may be null. |
| 100 | * End of datagram (overrun) is indicated by returning adns_s_invaliddata; |
| 101 | */ |
| 102 | const byte *dgram= pai->dgram; |
| 103 | int l, cbyte; |
| 104 | char *str; |
| 105 | |
| 106 | cbyte= *cbyte_io; |
| 107 | |
| 108 | if (cbyte >= max) return adns_s_invaliddata; |
| 109 | GET_B(cbyte,l); |
| 110 | if (cbyte+l > max) return adns_s_invaliddata; |
| 111 | |
| 112 | str= adns__alloc_interim(pai->qu, l+1); |
| 113 | if (!str) R_NOMEM; |
| 114 | |
| 115 | str[l]= 0; |
| 116 | memcpy(str,dgram+cbyte,l); |
| 117 | |
| 118 | *len_r= l; |
| 119 | *str_r= str; |
| 120 | *cbyte_io= cbyte+l; |
| 121 | |
| 122 | return adns_s_ok; |
| 123 | } |
| 124 | |
| 125 | static adns_status csp_qstring(vbuf *vb, const char *dp, int len) { |
| 126 | unsigned char ch; |
| 127 | char buf[10]; |
| 128 | int cn; |
| 129 | |
| 130 | CSP_ADDSTR("\""); |
| 131 | for (cn=0; cn<len; cn++) { |
| 132 | ch= *dp++; |
| 133 | if (ch == '\\') { |
| 134 | CSP_ADDSTR("\\\\"); |
| 135 | } else if (ch == '"') { |
| 136 | CSP_ADDSTR("\\\""); |
| 137 | } else if (ch >= 32 && ch <= 126) { |
| 138 | if (!adns__vbuf_append(vb,&ch,1)) R_NOMEM; |
| 139 | } else { |
| 140 | sprintf(buf,"\\x%02x",ch); |
| 141 | CSP_ADDSTR(buf); |
| 142 | } |
| 143 | } |
| 144 | CSP_ADDSTR("\""); |
| 145 | |
| 146 | return adns_s_ok; |
| 147 | } |
| 148 | |
| 149 | /* |
| 150 | * _str (mf) |
| 151 | */ |
| 152 | |
| 153 | static void mf_str(adns_query qu, void *datap) { |
| 154 | char **rrp= datap; |
| 155 | |
| 156 | adns__makefinal_str(qu,rrp); |
| 157 | } |
| 158 | |
| 159 | /* |
| 160 | * _intstr (mf) |
| 161 | */ |
| 162 | |
| 163 | static void mf_intstr(adns_query qu, void *datap) { |
| 164 | adns_rr_intstr *rrp= datap; |
| 165 | |
| 166 | adns__makefinal_str(qu,&rrp->str); |
| 167 | } |
| 168 | |
| 169 | /* |
| 170 | * _manyistr (mf) |
| 171 | */ |
| 172 | |
| 173 | static void mf_manyistr(adns_query qu, void *datap) { |
| 174 | adns_rr_intstr **rrp= datap; |
| 175 | adns_rr_intstr *te, *table; |
| 176 | void *tablev; |
| 177 | int tc; |
| 178 | |
| 179 | for (tc=0, te= *rrp; te->i >= 0; te++, tc++); |
| 180 | tablev= *rrp; |
| 181 | adns__makefinal_block(qu,&tablev,sizeof(*te)*(tc+1)); |
| 182 | *rrp= table= tablev; |
| 183 | for (te= *rrp; te->i >= 0; te++) |
| 184 | adns__makefinal_str(qu,&te->str); |
| 185 | } |
| 186 | |
| 187 | /* |
| 188 | * _txt (pa,cs) |
| 189 | */ |
| 190 | |
| 191 | static adns_status pa_txt(const parseinfo *pai, int cbyte, |
| 192 | int max, void *datap) { |
| 193 | adns_rr_intstr **rrp= datap, *table, *te; |
| 194 | const byte *dgram= pai->dgram; |
| 195 | int ti, tc, l, startbyte; |
| 196 | adns_status st; |
| 197 | |
| 198 | startbyte= cbyte; |
| 199 | if (cbyte >= max) return adns_s_invaliddata; |
| 200 | tc= 0; |
| 201 | while (cbyte < max) { |
| 202 | GET_B(cbyte,l); |
| 203 | cbyte+= l; |
| 204 | tc++; |
| 205 | } |
| 206 | if (cbyte != max || !tc) return adns_s_invaliddata; |
| 207 | |
| 208 | table= adns__alloc_interim(pai->qu,sizeof(*table)*(tc+1)); |
| 209 | if (!table) R_NOMEM; |
| 210 | |
| 211 | for (cbyte=startbyte, ti=0, te=table; ti<tc; ti++, te++) { |
| 212 | st= pap_qstring(pai, &cbyte, max, &te->i, &te->str); |
| 213 | if (st) return st; |
| 214 | } |
| 215 | assert(cbyte == max); |
| 216 | |
| 217 | te->i= -1; |
| 218 | te->str= 0; |
| 219 | |
| 220 | *rrp= table; |
| 221 | return adns_s_ok; |
| 222 | } |
| 223 | |
| 224 | static adns_status cs_txt(vbuf *vb, const void *datap) { |
| 225 | const adns_rr_intstr *const *rrp= datap; |
| 226 | const adns_rr_intstr *current; |
| 227 | adns_status st; |
| 228 | int spc; |
| 229 | |
| 230 | for (current= *rrp, spc=0; current->i >= 0; current++, spc=1) { |
| 231 | if (spc) CSP_ADDSTR(" "); |
| 232 | st= csp_qstring(vb,current->str,current->i); if (st) return st; |
| 233 | } |
| 234 | return adns_s_ok; |
| 235 | } |
| 236 | |
| 237 | /* |
| 238 | * _hinfo (cs) |
| 239 | */ |
| 240 | |
| 241 | static adns_status cs_hinfo(vbuf *vb, const void *datap) { |
| 242 | const adns_rr_intstrpair *rrp= datap; |
| 243 | adns_status st; |
| 244 | |
| 245 | st= csp_qstring(vb,rrp->array[0].str,rrp->array[0].i); if (st) return st; |
| 246 | CSP_ADDSTR(" "); |
| 247 | st= csp_qstring(vb,rrp->array[1].str,rrp->array[1].i); if (st) return st; |
| 248 | return adns_s_ok; |
| 249 | } |
| 250 | |
| 251 | /* |
| 252 | * _inaddr (pa,di,cs +search_sortlist, dip_genaddr, csp_genaddr) |
| 253 | */ |
| 254 | |
| 255 | static adns_status pa_inaddr(const parseinfo *pai, int cbyte, |
| 256 | int max, void *datap) { |
| 257 | struct in_addr *storeto= datap; |
| 258 | |
| 259 | if (max-cbyte != 4) return adns_s_invaliddata; |
| 260 | memcpy(storeto, pai->dgram + cbyte, 4); |
| 261 | return adns_s_ok; |
| 262 | } |
| 263 | |
| 264 | static int search_sortlist(adns_state ads, int af, const void *ad) { |
| 265 | const struct sortlist *slp; |
| 266 | struct in_addr a4; |
| 267 | int i; |
| 268 | int v6mappedp= 0; |
| 269 | |
| 270 | if (af == AF_INET6) { |
| 271 | const struct in6_addr *a6= ad; |
| 272 | if (IN6_IS_ADDR_V4MAPPED(a6)) { |
| 273 | a4.s_addr= htonl(((unsigned long)a6->s6_addr[12] << 24) | |
| 274 | ((unsigned long)a6->s6_addr[13] << 16) | |
| 275 | ((unsigned long)a6->s6_addr[14] << 8) | |
| 276 | ((unsigned long)a6->s6_addr[15] << 0)); |
| 277 | v6mappedp= 1; |
| 278 | } |
| 279 | } |
| 280 | |
| 281 | for (i=0, slp=ads->sortlist; |
| 282 | i<ads->nsortlist && |
| 283 | !adns__addr_matches(af,ad, &slp->base,&slp->mask) && |
| 284 | !(v6mappedp && |
| 285 | adns__addr_matches(AF_INET,&a4, &slp->base,&slp->mask)); |
| 286 | i++, slp++); |
| 287 | return i; |
| 288 | } |
| 289 | |
| 290 | static int dip_genaddr(adns_state ads, int af, const void *a, const void *b) { |
| 291 | int ai, bi; |
| 292 | |
| 293 | if (!ads->nsortlist) return 0; |
| 294 | |
| 295 | ai= search_sortlist(ads,af,a); |
| 296 | bi= search_sortlist(ads,af,b); |
| 297 | return bi<ai; |
| 298 | } |
| 299 | |
| 300 | static int di_inaddr(adns_state ads, |
| 301 | const void *datap_a, const void *datap_b) { |
| 302 | return dip_genaddr(ads,AF_INET,datap_a,datap_b); |
| 303 | } |
| 304 | |
| 305 | static adns_status csp_genaddr(vbuf *vb, int af, const void *p) { |
| 306 | char buf[ADNS_ADDR2TEXT_BUFLEN]; |
| 307 | int len= sizeof(buf); |
| 308 | adns_rr_addr a; |
| 309 | int err; |
| 310 | |
| 311 | memset(&a, 0, sizeof(a)); |
| 312 | a.addr.sa.sa_family= af; |
| 313 | adns__addr_inject(p, &a.addr); |
| 314 | err= adns_addr2text(&a.addr.sa,0, buf,&len, 0); assert(!err); |
| 315 | CSP_ADDSTR(buf); |
| 316 | return adns_s_ok; |
| 317 | } |
| 318 | |
| 319 | static adns_status cs_inaddr(vbuf *vb, const void *datap) { |
| 320 | return csp_genaddr(vb, AF_INET,datap); |
| 321 | } |
| 322 | |
| 323 | /* |
| 324 | * _in6addr (pa,di,cs) |
| 325 | */ |
| 326 | |
| 327 | static adns_status pa_in6addr(const parseinfo *pai, int cbyte, |
| 328 | int max, void *datap) { |
| 329 | struct in6_addr *storeto= datap; |
| 330 | |
| 331 | if (max-cbyte != 16) return adns_s_invaliddata; |
| 332 | memcpy(storeto->s6_addr, pai->dgram + cbyte, 16); |
| 333 | return adns_s_ok; |
| 334 | } |
| 335 | |
| 336 | static int di_in6addr(adns_state ads, |
| 337 | const void *datap_a, const void *datap_b) { |
| 338 | return dip_genaddr(ads,AF_INET6,datap_a,datap_b); |
| 339 | } |
| 340 | |
| 341 | static adns_status cs_in6addr(vbuf *vb, const void *datap) { |
| 342 | return csp_genaddr(vb,AF_INET6,datap); |
| 343 | } |
| 344 | |
| 345 | /* |
| 346 | * _addr (pap,pa,di,div,csp,cs,gsz,qs |
| 347 | * +search_sortlist_sa, dip_sockaddr, addr_rrtypes, |
| 348 | * addr_submit, icb_addr) |
| 349 | */ |
| 350 | |
| 351 | static const typeinfo tinfo_addrsub; |
| 352 | |
| 353 | #define ADDR_RRTYPES(_) _(a) _(aaaa) |
| 354 | |
| 355 | static const adns_rrtype addr_all_rrtypes[] = { |
| 356 | #define RRTY_CODE(ty) adns_r_##ty, |
| 357 | ADDR_RRTYPES(RRTY_CODE) |
| 358 | #undef RRTY_CODE |
| 359 | }; |
| 360 | |
| 361 | enum { |
| 362 | #define RRTY_INDEX(ty) addr__ri_##ty, |
| 363 | ADDR_RRTYPES(RRTY_INDEX) |
| 364 | #undef RRTY_INDEX |
| 365 | addr_nrrtypes, |
| 366 | #define RRTY_FLAG(ty) addr_rf_##ty = 1 << addr__ri_##ty, |
| 367 | ADDR_RRTYPES(RRTY_FLAG) |
| 368 | addr__rrty_hunoz |
| 369 | #undef RRTY_FLAG |
| 370 | }; |
| 371 | |
| 372 | static unsigned addr_rrtypeflag(adns_rrtype type) { |
| 373 | int i; |
| 374 | |
| 375 | type &= adns_rrt_typemask; |
| 376 | for (i=0; i<addr_nrrtypes && type!=addr_all_rrtypes[i]; i++); |
| 377 | return i < addr_nrrtypes ? 1 << i : 0; |
| 378 | } |
| 379 | |
| 380 | /* About CNAME handling in addr queries. |
| 381 | * |
| 382 | * A user-level addr query is translated into a number of protocol-level |
| 383 | * queries, and its job is to reassemble the results. This gets tricky if |
| 384 | * the answers aren't consistent. In particular, if the answers report |
| 385 | * inconsistent indirection via CNAME records (e.g., different CNAMEs, or |
| 386 | * some indirect via a CNAME, and some don't) then we have trouble. |
| 387 | * |
| 388 | * Once we've received an answer, even if it was NODATA, we set |
| 389 | * adns__qf_addr_answer on the parent query. This will let us detect a |
| 390 | * conflict between a no-CNAME-with-NODATA reply and a subsequent CNAME. |
| 391 | * |
| 392 | * If we detect a conflict of any kind, then at least one answer came back |
| 393 | * with a CNAME record, so we pick the first such answer (somewhat |
| 394 | * arbitrarily) as being the `right' canonical name, and set this in the |
| 395 | * parent query's answer->cname slot. We discard address records from the |
| 396 | * wrong name. And finally we cancel the outstanding child queries, and |
| 397 | * resubmit address queries for the address families we don't yet have, with |
| 398 | * adns__qf_addr_cname set so that we know that we're in the fixup state. |
| 399 | */ |
| 400 | |
| 401 | static adns_status pap_addr(const parseinfo *pai, int rrty, size_t rrsz, |
| 402 | int *cbyte_io, int max, adns_rr_addr *storeto) { |
| 403 | const byte *dgram= pai->dgram; |
| 404 | int af, addrlen, salen; |
| 405 | struct in6_addr v6map; |
| 406 | const void *oaddr= dgram + *cbyte_io; |
| 407 | int avail= max - *cbyte_io; |
| 408 | int step= -1; |
| 409 | void *addrp= 0; |
| 410 | |
| 411 | switch (rrty) { |
| 412 | case adns_r_a: |
| 413 | if ((pai->qu->flags & adns_qf_ipv6_mapv4) && |
| 414 | (pai->qu->answer->type & adns__qtf_bigaddr)) { |
| 415 | if (avail < 4) return adns_s_invaliddata; |
| 416 | memset(v6map.s6_addr + 0, 0x00, 10); |
| 417 | memset(v6map.s6_addr + 10, 0xff, 2); |
| 418 | memcpy(v6map.s6_addr + 12, oaddr, 4); |
| 419 | oaddr= v6map.s6_addr; avail= sizeof(v6map.s6_addr); |
| 420 | if (step < 0) step= 4; |
| 421 | goto aaaa; |
| 422 | } |
| 423 | af= AF_INET; addrlen= 4; |
| 424 | addrp= &storeto->addr.inet.sin_addr; |
| 425 | salen= sizeof(storeto->addr.inet); |
| 426 | break; |
| 427 | case adns_r_aaaa: |
| 428 | aaaa: |
| 429 | af= AF_INET6; addrlen= 16; |
| 430 | addrp= storeto->addr.inet6.sin6_addr.s6_addr; |
| 431 | salen= sizeof(storeto->addr.inet6); |
| 432 | break; |
| 433 | } |
| 434 | assert(addrp); |
| 435 | |
| 436 | assert(offsetof(adns_rr_addr, addr) + salen <= rrsz); |
| 437 | if (addrlen < avail) return adns_s_invaliddata; |
| 438 | if (step < 0) step= addrlen; |
| 439 | *cbyte_io += step; |
| 440 | memset(&storeto->addr, 0, salen); |
| 441 | storeto->len= salen; |
| 442 | storeto->addr.sa.sa_family= af; |
| 443 | memcpy(addrp, oaddr, addrlen); |
| 444 | |
| 445 | return adns_s_ok; |
| 446 | } |
| 447 | |
| 448 | static adns_status pa_addr(const parseinfo *pai, int cbyte, |
| 449 | int max, void *datap) { |
| 450 | int err= pap_addr(pai, pai->qu->answer->type & adns_rrt_typemask, |
| 451 | pai->qu->answer->rrsz, &cbyte, max, datap); |
| 452 | if (err) return err; |
| 453 | if (cbyte != max) return adns_s_invaliddata; |
| 454 | return adns_s_ok; |
| 455 | } |
| 456 | |
| 457 | static int search_sortlist_sa(adns_state ads, const struct sockaddr *sa) { |
| 458 | const void *pa = adns__sockaddr_addr(sa); |
| 459 | return search_sortlist(ads, sa->sa_family, pa); |
| 460 | } |
| 461 | |
| 462 | static int dip_sockaddr(adns_state ads, |
| 463 | const struct sockaddr *sa, |
| 464 | const struct sockaddr *sb) { |
| 465 | if (!ads->sortlist) return 0; |
| 466 | return search_sortlist_sa(ads, sa) > search_sortlist_sa(ads, sb); |
| 467 | } |
| 468 | |
| 469 | static int di_addr(adns_state ads, const void *datap_a, const void *datap_b) { |
| 470 | const adns_rr_addr *ap= datap_a, *bp= datap_b; |
| 471 | return dip_sockaddr(ads, &ap->addr.sa, &bp->addr.sa); |
| 472 | } |
| 473 | |
| 474 | static int div_addr(void *context, const void *datap_a, const void *datap_b) { |
| 475 | const adns_state ads= context; |
| 476 | |
| 477 | return di_addr(ads, datap_a, datap_b); |
| 478 | } |
| 479 | |
| 480 | static adns_status csp_addr(vbuf *vb, const adns_rr_addr *rrp) { |
| 481 | char buf[ADNS_ADDR2TEXT_BUFLEN]; |
| 482 | int len= sizeof(buf); |
| 483 | int err; |
| 484 | |
| 485 | switch (rrp->addr.inet.sin_family) { |
| 486 | case AF_INET: |
| 487 | CSP_ADDSTR("INET "); |
| 488 | goto a2t; |
| 489 | case AF_INET6: |
| 490 | CSP_ADDSTR("INET6 "); |
| 491 | goto a2t; |
| 492 | a2t: |
| 493 | err= adns_addr2text(&rrp->addr.sa,0, buf,&len, 0); assert(!err); |
| 494 | CSP_ADDSTR(buf); |
| 495 | break; |
| 496 | default: |
| 497 | sprintf(buf,"AF=%u",rrp->addr.sa.sa_family); |
| 498 | CSP_ADDSTR(buf); |
| 499 | break; |
| 500 | } |
| 501 | return adns_s_ok; |
| 502 | } |
| 503 | |
| 504 | static adns_status cs_addr(vbuf *vb, const void *datap) { |
| 505 | const adns_rr_addr *rrp= datap; |
| 506 | |
| 507 | return csp_addr(vb,rrp); |
| 508 | } |
| 509 | |
| 510 | static int gsz_addr(const typeinfo *typei, adns_rrtype type) { |
| 511 | return type & adns__qtf_bigaddr ? |
| 512 | sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only); |
| 513 | } |
| 514 | |
| 515 | static unsigned addr_rrtypes(adns_state ads, adns_rrtype type, |
| 516 | adns_queryflags qf) { |
| 517 | /* Return a mask of addr_rf_... flags indicating which address families are |
| 518 | * wanted, given a query type and flags. |
| 519 | */ |
| 520 | |
| 521 | adns_queryflags permitaf= 0; |
| 522 | unsigned want= 0; |
| 523 | |
| 524 | if (!(type & adns__qtf_bigaddr)) |
| 525 | qf= (qf & ~adns_qf_want_allaf) | adns_qf_want_ipv4; |
| 526 | else { |
| 527 | if (!(qf & adns_qf_want_allaf)) { |
| 528 | qf |= (type & adns__qtf_manyaf) ? |
| 529 | adns_qf_want_allaf : adns_qf_want_ipv4; |
| 530 | } |
| 531 | if (ads->iflags & adns_if_permit_ipv4) permitaf |= adns_qf_want_ipv4; |
| 532 | if (ads->iflags & adns_if_permit_ipv6) permitaf |= adns_qf_want_ipv6; |
| 533 | if (qf & permitaf) qf &= permitaf | ~adns_qf_want_allaf; |
| 534 | } |
| 535 | |
| 536 | if (qf & adns_qf_want_ipv4) want |= addr_rf_a; |
| 537 | if (qf & adns_qf_want_ipv6) want |= addr_rf_aaaa; |
| 538 | |
| 539 | return want; |
| 540 | } |
| 541 | |
| 542 | static void icb_addr(adns_query parent, adns_query child); |
| 543 | |
| 544 | static void addr_subqueries(adns_query qu, struct timeval now, |
| 545 | adns_queryflags qf_extra, |
| 546 | const byte *qd_dgram, int qd_dglen) { |
| 547 | int i, err, id; |
| 548 | adns_query cqu; |
| 549 | adns_queryflags qf= (qu->flags & ~adns_qf_search) | qf_extra; |
| 550 | adns_rrtype qtf= qu->answer->type & adns__qtf_deref; |
| 551 | unsigned which= qu->ctx.tinfo.addr.want & ~qu->ctx.tinfo.addr.have; |
| 552 | qcontext ctx; |
| 553 | |
| 554 | memset(&ctx, 0, sizeof(ctx)); |
| 555 | ctx.callback= icb_addr; |
| 556 | for (i=0; i<addr_nrrtypes; i++) { |
| 557 | if (!(which & (1 << i))) continue; |
| 558 | err= adns__mkquery_frdgram(qu->ads, &qu->vb, &id, qd_dgram,qd_dglen, |
| 559 | DNS_HDRSIZE, addr_all_rrtypes[i], qf); |
| 560 | if (err) goto x_error; |
| 561 | err= adns__internal_submit(qu->ads, &cqu, qu, &tinfo_addrsub, |
| 562 | addr_all_rrtypes[i] | qtf, |
| 563 | &qu->vb, id, qf, now, &ctx); |
| 564 | if (err) goto x_error; |
| 565 | cqu->answer->rrsz= qu->answer->rrsz; |
| 566 | } |
| 567 | qu->state= query_childw; |
| 568 | LIST_LINK_TAIL(qu->ads->childw, qu); |
| 569 | return; |
| 570 | |
| 571 | x_error: |
| 572 | adns__query_fail(qu, err); |
| 573 | } |
| 574 | |
| 575 | static adns_status addr_submit(adns_query parent, adns_query *query_r, |
| 576 | vbuf *qumsg_vb, int id, unsigned want, |
| 577 | adns_queryflags flags, struct timeval now, |
| 578 | qcontext *ctx) { |
| 579 | /* This is effectively a substitute for adns__internal_submit, intended for |
| 580 | * the case where the caller (possibly) only wants a subset of the |
| 581 | * available record types. The memory management and callback rules are |
| 582 | * the same as for adns__internal_submit. |
| 583 | * |
| 584 | * Some differences: the query is linked onto the parent's children list |
| 585 | * before exit (though the parent's state is not changed, and it is not |
| 586 | * linked into the childw list queue); and we fiddle with the `tinfo' |
| 587 | * portion of the context structure (yes, modifying *ctx), since this is, |
| 588 | * in fact, the main purpose of this function. |
| 589 | */ |
| 590 | |
| 591 | adns_state ads= parent->ads; |
| 592 | adns_query qu; |
| 593 | adns_status err; |
| 594 | adns_rrtype type= ((adns_r_addr & adns_rrt_reprmask) | |
| 595 | (parent->answer->type & ~adns_rrt_reprmask)); |
| 596 | |
| 597 | ctx->tinfo.addr.want= want; |
| 598 | ctx->tinfo.addr.have= 0; |
| 599 | err= adns__internal_submit(ads, &qu, parent, adns__findtype(adns_r_addr), |
| 600 | type, qumsg_vb, id, flags, now, ctx); |
| 601 | if (err) return err; |
| 602 | |
| 603 | *query_r= qu; |
| 604 | return adns_s_ok; |
| 605 | } |
| 606 | |
| 607 | static adns_status append_addrs(adns_query qu, size_t rrsz, |
| 608 | adns_rr_addr **dp, int *dlen, |
| 609 | const adns_rr_addr *sp, int slen) { |
| 610 | /* Append a vector of slen addr records, each of size rrsz, starting at ap, |
| 611 | * to a vector starting at *dp, of length *dlen. On successful completion, |
| 612 | * *dp and *dlen are updated. |
| 613 | */ |
| 614 | |
| 615 | size_t drrsz= *dlen*rrsz, srrsz= slen*rrsz; |
| 616 | byte *p; |
| 617 | |
| 618 | if (!slen) return adns_s_ok; |
| 619 | p= adns__alloc_interim(qu, drrsz + srrsz); |
| 620 | if (!p) R_NOMEM; |
| 621 | if (*dlen) { |
| 622 | memcpy(p, *dp, drrsz); |
| 623 | adns__free_interim(qu, *dp); |
| 624 | } |
| 625 | memcpy(p + drrsz, sp, srrsz); |
| 626 | *dlen += slen; |
| 627 | *dp= (adns_rr_addr *)p; |
| 628 | return adns_s_ok; |
| 629 | } |
| 630 | |
| 631 | static void propagate_ttl(adns_query to, adns_query from) |
| 632 | { if (to->expires > from->expires) to->expires= from->expires; } |
| 633 | |
| 634 | static adns_status copy_cname_from_child(adns_query parent, adns_query child) { |
| 635 | adns_answer *pans= parent->answer, *cans= child->answer; |
| 636 | size_t n= strlen(cans->cname) + 1; |
| 637 | |
| 638 | pans->cname= adns__alloc_preserved(parent, n); |
| 639 | if (!pans->cname) R_NOMEM; |
| 640 | memcpy(pans->cname, cans->cname, n); |
| 641 | return adns_s_ok; |
| 642 | } |
| 643 | |
| 644 | static void done_addr_type(adns_query qu, adns_rrtype type) { |
| 645 | unsigned f= addr_rrtypeflag(type); |
| 646 | assert(f); qu->ctx.tinfo.addr.have |= f; |
| 647 | } |
| 648 | |
| 649 | static void icb_addr(adns_query parent, adns_query child) { |
| 650 | adns_state ads= parent->ads; |
| 651 | adns_answer *pans= parent->answer, *cans= child->answer; |
| 652 | struct timeval now; |
| 653 | adns_status err; |
| 654 | adns_queryflags qf; |
| 655 | int id; |
| 656 | |
| 657 | propagate_ttl(parent, child); |
| 658 | |
| 659 | if (!(child->flags & adns__qf_addr_cname) && |
| 660 | (parent->flags & adns__qf_addr_answer) && |
| 661 | (!!pans->cname != !!cans->cname || |
| 662 | (pans->cname && strcmp(pans->cname, cans->cname)))) { |
| 663 | /* We've detected an inconsistency in CNAME records, and must deploy |
| 664 | * countermeasures. |
| 665 | */ |
| 666 | |
| 667 | if (!pans->cname) { |
| 668 | /* The child has a CNAME record, but the parent doesn't. We must |
| 669 | * discard all of the parent's addresses, and substitute the child's. |
| 670 | */ |
| 671 | |
| 672 | assert(pans->rrsz == cans->rrsz); |
| 673 | adns__free_interim(parent, pans->rrs.bytes); |
| 674 | adns__transfer_interim(child, parent, cans->rrs.bytes); |
| 675 | pans->rrs.bytes= cans->rrs.bytes; |
| 676 | pans->nrrs= cans->nrrs; |
| 677 | parent->ctx.tinfo.addr.have= 0; |
| 678 | done_addr_type(parent, cans->type); |
| 679 | err= copy_cname_from_child(parent, child); if (err) goto x_err; |
| 680 | } |
| 681 | |
| 682 | /* We've settled on the CNAME (now) associated with the parent, which |
| 683 | * already has appropriate address records. Build a query datagram for |
| 684 | * this name so that we can issue child queries for the missing address |
| 685 | * families. The child's vbuf looks handy for this. |
| 686 | */ |
| 687 | err= adns__mkquery(ads, &child->vb, &id, pans->cname, |
| 688 | strlen(pans->cname), &tinfo_addrsub, |
| 689 | adns_r_addr, parent->flags); |
| 690 | if (err) goto x_err; |
| 691 | |
| 692 | /* Now cancel the remaining children, and try again with the CNAME we've |
| 693 | * settled on. |
| 694 | */ |
| 695 | adns__cancel_children(parent); |
| 696 | if (gettimeofday(&now, 0)) goto x_gtod; |
| 697 | qf= adns__qf_addr_cname; |
| 698 | if (!(parent->flags & adns_qf_cname_loose)) qf |= adns_qf_cname_forbid; |
| 699 | addr_subqueries(parent, now, qf, child->vb.buf, child->vb.used); |
| 700 | return; |
| 701 | } |
| 702 | |
| 703 | if (cans->cname && !pans->cname) { |
| 704 | err= copy_cname_from_child(parent, child); |
| 705 | if (err) goto x_err; |
| 706 | } |
| 707 | |
| 708 | if ((parent->flags & adns_qf_search) && |
| 709 | !pans->cname && cans->status == adns_s_nxdomain) { |
| 710 | /* We're searching a list of suffixes, and the name doesn't exist. Try |
| 711 | * the next one. |
| 712 | */ |
| 713 | |
| 714 | adns__cancel_children(parent); |
| 715 | adns__free_interim(parent, pans->rrs.bytes); |
| 716 | pans->rrs.bytes= 0; pans->nrrs= 0; |
| 717 | if (gettimeofday(&now, 0)) goto x_gtod; |
| 718 | adns__search_next(ads, parent, now); |
| 719 | return; |
| 720 | } |
| 721 | |
| 722 | if (cans->status && cans->status != adns_s_nodata) |
| 723 | { err= cans->status; goto x_err; } |
| 724 | |
| 725 | assert(pans->rrsz == cans->rrsz); |
| 726 | err= append_addrs(parent, pans->rrsz, |
| 727 | &pans->rrs.addr, &pans->nrrs, |
| 728 | cans->rrs.addr, cans->nrrs); |
| 729 | if (err) goto x_err; |
| 730 | done_addr_type(parent, cans->type); |
| 731 | |
| 732 | if (parent->children.head) LIST_LINK_TAIL(ads->childw, parent); |
| 733 | else if (!pans->nrrs) adns__query_fail(parent, adns_s_nodata); |
| 734 | else adns__query_done(parent); |
| 735 | parent->flags |= adns__qf_addr_answer; |
| 736 | return; |
| 737 | |
| 738 | x_gtod: |
| 739 | adns__diag(ads, -1, parent, "gettimeofday failed: %s", strerror(errno)); |
| 740 | err= adns_s_systemfail; |
| 741 | goto x_err; |
| 742 | |
| 743 | x_err: |
| 744 | adns__query_fail(parent, err); |
| 745 | } |
| 746 | |
| 747 | static void qs_addr(adns_query qu, struct timeval now) { |
| 748 | if (!qu->ctx.tinfo.addr.want) { |
| 749 | qu->ctx.tinfo.addr.want= addr_rrtypes(qu->ads, qu->answer->type, |
| 750 | qu->flags); |
| 751 | qu->ctx.tinfo.addr.have= 0; |
| 752 | } |
| 753 | addr_subqueries(qu, now, 0, qu->query_dgram, qu->query_dglen); |
| 754 | } |
| 755 | |
| 756 | /* |
| 757 | * _domain (pap,csp,cs) |
| 758 | * _dom_raw (pa) |
| 759 | */ |
| 760 | |
| 761 | static adns_status pap_domain(const parseinfo *pai, int *cbyte_io, int max, |
| 762 | char **domain_r, parsedomain_flags flags) { |
| 763 | adns_status st; |
| 764 | char *dm; |
| 765 | |
| 766 | st= adns__parse_domain(pai->qu->ads, pai->serv, pai->qu, &pai->qu->vb, flags, |
| 767 | pai->dgram,pai->dglen, cbyte_io, max); |
| 768 | if (st) return st; |
| 769 | if (!pai->qu->vb.used) return adns_s_invaliddata; |
| 770 | |
| 771 | dm= adns__alloc_interim(pai->qu, pai->qu->vb.used+1); |
| 772 | if (!dm) R_NOMEM; |
| 773 | |
| 774 | dm[pai->qu->vb.used]= 0; |
| 775 | memcpy(dm,pai->qu->vb.buf,pai->qu->vb.used); |
| 776 | |
| 777 | *domain_r= dm; |
| 778 | return adns_s_ok; |
| 779 | } |
| 780 | |
| 781 | static adns_status csp_domain(vbuf *vb, const char *domain) { |
| 782 | CSP_ADDSTR(domain); |
| 783 | if (!*domain) CSP_ADDSTR("."); |
| 784 | return adns_s_ok; |
| 785 | } |
| 786 | |
| 787 | static adns_status cs_domain(vbuf *vb, const void *datap) { |
| 788 | const char *const *domainp= datap; |
| 789 | return csp_domain(vb,*domainp); |
| 790 | } |
| 791 | |
| 792 | static adns_status pa_dom_raw(const parseinfo *pai, int cbyte, |
| 793 | int max, void *datap) { |
| 794 | char **rrp= datap; |
| 795 | adns_status st; |
| 796 | |
| 797 | st= pap_domain(pai, &cbyte, max, rrp, pdf_quoteok); |
| 798 | if (st) return st; |
| 799 | |
| 800 | if (cbyte != max) return adns_s_invaliddata; |
| 801 | return adns_s_ok; |
| 802 | } |
| 803 | |
| 804 | /* |
| 805 | * _host_raw (pa) |
| 806 | */ |
| 807 | |
| 808 | static adns_status pa_host_raw(const parseinfo *pai, int cbyte, |
| 809 | int max, void *datap) { |
| 810 | char **rrp= datap; |
| 811 | adns_status st; |
| 812 | |
| 813 | st= pap_domain(pai, &cbyte, max, rrp, |
| 814 | pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0); |
| 815 | if (st) return st; |
| 816 | |
| 817 | if (cbyte != max) return adns_s_invaliddata; |
| 818 | return adns_s_ok; |
| 819 | } |
| 820 | |
| 821 | /* |
| 822 | * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +pap_findaddrs, icb_hostaddr) |
| 823 | */ |
| 824 | |
| 825 | static adns_status pap_findaddrs(const parseinfo *pai, adns_rr_hostaddr *ha, |
| 826 | unsigned *want_io, size_t addrsz, |
| 827 | int *cbyte_io, int count, int dmstart) { |
| 828 | int rri, naddrs; |
| 829 | unsigned typef, want= *want_io, need= want; |
| 830 | int type, class, rdlen, rdend, rdstart, ownermatched; |
| 831 | unsigned long ttl; |
| 832 | adns_status st; |
| 833 | |
| 834 | for (rri=0, naddrs=0; rri<count; rri++) { |
| 835 | st= adns__findrr_anychk(pai->qu, pai->serv, pai->dgram, |
| 836 | pai->dglen, cbyte_io, |
| 837 | &type, &class, &ttl, &rdlen, &rdstart, |
| 838 | pai->dgram, pai->dglen, dmstart, &ownermatched); |
| 839 | if (st) return st; |
| 840 | if (!ownermatched || class != DNS_CLASS_IN) continue; |
| 841 | typef= addr_rrtypeflag(type); |
| 842 | if (!(want & typef)) continue; |
| 843 | need &= ~typef; |
| 844 | if (!adns__vbuf_ensure(&pai->qu->vb, (naddrs+1)*addrsz)) R_NOMEM; |
| 845 | adns__update_expires(pai->qu,ttl,pai->now); |
| 846 | rdend= rdstart + rdlen; |
| 847 | st= pap_addr(pai, type, addrsz, &rdstart, rdend, |
| 848 | (adns_rr_addr *)(pai->qu->vb.buf + naddrs*addrsz)); |
| 849 | if (st) return st; |
| 850 | if (rdstart != rdend) return adns_s_invaliddata; |
| 851 | naddrs++; |
| 852 | } |
| 853 | if (naddrs > 0) { |
| 854 | st= append_addrs(pai->qu, addrsz, &ha->addrs, &ha->naddrs, |
| 855 | (const adns_rr_addr *)pai->qu->vb.buf, naddrs); |
| 856 | if (st) return st; |
| 857 | ha->astatus= adns_s_ok; |
| 858 | |
| 859 | if (!need) { |
| 860 | adns__isort(ha->addrs, naddrs, addrsz, pai->qu->vb.buf, |
| 861 | div_addr, pai->ads); |
| 862 | } |
| 863 | } |
| 864 | *want_io= need; |
| 865 | return adns_s_ok; |
| 866 | } |
| 867 | |
| 868 | static void icb_hostaddr(adns_query parent, adns_query child) { |
| 869 | adns_answer *cans= child->answer; |
| 870 | adns_rr_hostaddr *rrp= child->ctx.pinfo.hostaddr; |
| 871 | adns_state ads= parent->ads; |
| 872 | adns_status st; |
| 873 | size_t addrsz= gsz_addr(0, parent->answer->type); |
| 874 | |
| 875 | st= cans->status == adns_s_nodata ? adns_s_ok : cans->status; |
| 876 | if (st) goto done; |
| 877 | propagate_ttl(parent, child); |
| 878 | |
| 879 | assert(addrsz == cans->rrsz); |
| 880 | st= append_addrs(parent, addrsz, |
| 881 | &rrp->addrs, &rrp->naddrs, |
| 882 | cans->rrs.addr, cans->nrrs); |
| 883 | if (st) goto done; |
| 884 | if (!rrp->naddrs) { st= adns_s_nodata; goto done; } |
| 885 | |
| 886 | if (!adns__vbuf_ensure(&parent->vb, addrsz)) |
| 887 | { st= adns_s_nomemory; goto done; } |
| 888 | adns__isort(rrp->addrs, rrp->naddrs, addrsz, parent->vb.buf, |
| 889 | div_addr, ads); |
| 890 | |
| 891 | done: |
| 892 | if (st) { |
| 893 | adns__free_interim(parent, rrp->addrs); |
| 894 | rrp->naddrs= (st>0 && st<=adns_s_max_tempfail) ? -1 : 0; |
| 895 | } |
| 896 | |
| 897 | rrp->astatus= st; |
| 898 | if (parent->children.head) { |
| 899 | LIST_LINK_TAIL(ads->childw,parent); |
| 900 | } else { |
| 901 | adns__query_done(parent); |
| 902 | } |
| 903 | } |
| 904 | |
| 905 | static adns_status pap_hostaddr(const parseinfo *pai, int *cbyte_io, |
| 906 | int max, adns_rr_hostaddr *rrp) { |
| 907 | adns_status st; |
| 908 | int dmstart, cbyte; |
| 909 | qcontext ctx; |
| 910 | int id; |
| 911 | adns_query nqu; |
| 912 | adns_queryflags nflags; |
| 913 | unsigned want; |
| 914 | size_t addrsz= gsz_addr(0, pai->qu->answer->type); |
| 915 | |
| 916 | dmstart= cbyte= *cbyte_io; |
| 917 | st= pap_domain(pai, &cbyte, max, &rrp->host, |
| 918 | pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0); |
| 919 | if (st) return st; |
| 920 | *cbyte_io= cbyte; |
| 921 | |
| 922 | rrp->astatus= adns_s_ok; |
| 923 | rrp->naddrs= 0; |
| 924 | rrp->addrs= 0; |
| 925 | |
| 926 | cbyte= pai->nsstart; |
| 927 | |
| 928 | want= addr_rrtypes(pai->ads, pai->qu->answer->type, pai->qu->flags); |
| 929 | |
| 930 | st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->nscount, dmstart); |
| 931 | if (st) return st; |
| 932 | if (!want) return adns_s_ok; |
| 933 | |
| 934 | st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->arcount, dmstart); |
| 935 | if (st) return st; |
| 936 | if (!want) return adns_s_ok; |
| 937 | |
| 938 | st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id, |
| 939 | pai->dgram, pai->dglen, dmstart, |
| 940 | adns_r_addr, adns_qf_quoteok_query); |
| 941 | if (st) return st; |
| 942 | |
| 943 | ctx.ext= 0; |
| 944 | ctx.callback= icb_hostaddr; |
| 945 | ctx.pinfo.hostaddr= rrp; |
| 946 | |
| 947 | nflags= adns_qf_quoteok_query | (pai->qu->flags & (adns_qf_want_allaf | |
| 948 | adns_qf_ipv6_mapv4)); |
| 949 | if (!(pai->qu->flags & adns_qf_cname_loose)) nflags |= adns_qf_cname_forbid; |
| 950 | |
| 951 | st= addr_submit(pai->qu, &nqu, &pai->qu->vb, id, want, |
| 952 | nflags, pai->now, &ctx); |
| 953 | if (st) return st; |
| 954 | |
| 955 | return adns_s_ok; |
| 956 | } |
| 957 | |
| 958 | static adns_status pa_hostaddr(const parseinfo *pai, int cbyte, |
| 959 | int max, void *datap) { |
| 960 | adns_rr_hostaddr *rrp= datap; |
| 961 | adns_status st; |
| 962 | |
| 963 | st= pap_hostaddr(pai, &cbyte, max, rrp); |
| 964 | if (st) return st; |
| 965 | if (cbyte != max) return adns_s_invaliddata; |
| 966 | |
| 967 | return adns_s_ok; |
| 968 | } |
| 969 | |
| 970 | static int dip_hostaddr(adns_state ads, |
| 971 | const adns_rr_hostaddr *ap, const adns_rr_hostaddr *bp) { |
| 972 | if (ap->astatus != bp->astatus) return ap->astatus; |
| 973 | if (ap->astatus) return 0; |
| 974 | |
| 975 | return dip_sockaddr(ads, &ap->addrs[0].addr.sa, &bp->addrs[0].addr.sa); |
| 976 | } |
| 977 | |
| 978 | static int di_hostaddr(adns_state ads, |
| 979 | const void *datap_a, const void *datap_b) { |
| 980 | const adns_rr_hostaddr *ap= datap_a, *bp= datap_b; |
| 981 | |
| 982 | return dip_hostaddr(ads, ap,bp); |
| 983 | } |
| 984 | |
| 985 | static void mfp_hostaddr(adns_query qu, adns_rr_hostaddr *rrp) { |
| 986 | void *tablev; |
| 987 | size_t addrsz= gsz_addr(0, qu->answer->type); |
| 988 | |
| 989 | adns__makefinal_str(qu,&rrp->host); |
| 990 | tablev= rrp->addrs; |
| 991 | adns__makefinal_block(qu, &tablev, rrp->naddrs*addrsz); |
| 992 | rrp->addrs= tablev; |
| 993 | } |
| 994 | |
| 995 | static void mf_hostaddr(adns_query qu, void *datap) { |
| 996 | adns_rr_hostaddr *rrp= datap; |
| 997 | |
| 998 | mfp_hostaddr(qu,rrp); |
| 999 | } |
| 1000 | |
| 1001 | static adns_status csp_hostaddr(vbuf *vb, const adns_rr_hostaddr *rrp) { |
| 1002 | const char *errstr; |
| 1003 | adns_status st; |
| 1004 | char buf[20]; |
| 1005 | int i; |
| 1006 | |
| 1007 | st= csp_domain(vb,rrp->host); if (st) return st; |
| 1008 | |
| 1009 | CSP_ADDSTR(" "); |
| 1010 | CSP_ADDSTR(adns_errtypeabbrev(rrp->astatus)); |
| 1011 | |
| 1012 | sprintf(buf," %d ",rrp->astatus); |
| 1013 | CSP_ADDSTR(buf); |
| 1014 | |
| 1015 | CSP_ADDSTR(adns_errabbrev(rrp->astatus)); |
| 1016 | CSP_ADDSTR(" "); |
| 1017 | |
| 1018 | errstr= adns_strerror(rrp->astatus); |
| 1019 | st= csp_qstring(vb,errstr,strlen(errstr)); if (st) return st; |
| 1020 | |
| 1021 | if (rrp->naddrs >= 0) { |
| 1022 | CSP_ADDSTR(" ("); |
| 1023 | for (i=0; i<rrp->naddrs; i++) { |
| 1024 | CSP_ADDSTR(" "); |
| 1025 | st= csp_addr(vb,&rrp->addrs[i]); |
| 1026 | } |
| 1027 | CSP_ADDSTR(" )"); |
| 1028 | } else { |
| 1029 | CSP_ADDSTR(" ?"); |
| 1030 | } |
| 1031 | return adns_s_ok; |
| 1032 | } |
| 1033 | |
| 1034 | static adns_status cs_hostaddr(vbuf *vb, const void *datap) { |
| 1035 | const adns_rr_hostaddr *rrp= datap; |
| 1036 | |
| 1037 | return csp_hostaddr(vb,rrp); |
| 1038 | } |
| 1039 | |
| 1040 | /* |
| 1041 | * _mx_raw (pa,di) |
| 1042 | */ |
| 1043 | |
| 1044 | static adns_status pa_mx_raw(const parseinfo *pai, int cbyte, |
| 1045 | int max, void *datap) { |
| 1046 | const byte *dgram= pai->dgram; |
| 1047 | adns_rr_intstr *rrp= datap; |
| 1048 | adns_status st; |
| 1049 | int pref; |
| 1050 | |
| 1051 | if (cbyte+2 > max) return adns_s_invaliddata; |
| 1052 | GET_W(cbyte,pref); |
| 1053 | rrp->i= pref; |
| 1054 | st= pap_domain(pai, &cbyte, max, &rrp->str, |
| 1055 | pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0); |
| 1056 | if (st) return st; |
| 1057 | |
| 1058 | if (cbyte != max) return adns_s_invaliddata; |
| 1059 | return adns_s_ok; |
| 1060 | } |
| 1061 | |
| 1062 | static int di_mx_raw(adns_state ads, const void *datap_a, const void *datap_b) { |
| 1063 | const adns_rr_intstr *ap= datap_a, *bp= datap_b; |
| 1064 | |
| 1065 | if (ap->i < bp->i) return 0; |
| 1066 | if (ap->i > bp->i) return 1; |
| 1067 | return 0; |
| 1068 | } |
| 1069 | |
| 1070 | /* |
| 1071 | * _mx (pa,di) |
| 1072 | */ |
| 1073 | |
| 1074 | static adns_status pa_mx(const parseinfo *pai, int cbyte, |
| 1075 | int max, void *datap) { |
| 1076 | const byte *dgram= pai->dgram; |
| 1077 | adns_rr_inthostaddr *rrp= datap; |
| 1078 | adns_status st; |
| 1079 | int pref; |
| 1080 | |
| 1081 | if (cbyte+2 > max) return adns_s_invaliddata; |
| 1082 | GET_W(cbyte,pref); |
| 1083 | rrp->i= pref; |
| 1084 | st= pap_hostaddr(pai, &cbyte, max, &rrp->ha); |
| 1085 | if (st) return st; |
| 1086 | |
| 1087 | if (cbyte != max) return adns_s_invaliddata; |
| 1088 | return adns_s_ok; |
| 1089 | } |
| 1090 | |
| 1091 | static int di_mx(adns_state ads, const void *datap_a, const void *datap_b) { |
| 1092 | const adns_rr_inthostaddr *ap= datap_a, *bp= datap_b; |
| 1093 | |
| 1094 | if (ap->i < bp->i) return 0; |
| 1095 | if (ap->i > bp->i) return 1; |
| 1096 | return dip_hostaddr(ads, &ap->ha, &bp->ha); |
| 1097 | } |
| 1098 | |
| 1099 | /* |
| 1100 | * _inthostaddr (mf,cs) |
| 1101 | */ |
| 1102 | |
| 1103 | static void mf_inthostaddr(adns_query qu, void *datap) { |
| 1104 | adns_rr_inthostaddr *rrp= datap; |
| 1105 | |
| 1106 | mfp_hostaddr(qu,&rrp->ha); |
| 1107 | } |
| 1108 | |
| 1109 | static adns_status cs_inthostaddr(vbuf *vb, const void *datap) { |
| 1110 | const adns_rr_inthostaddr *rrp= datap; |
| 1111 | char buf[10]; |
| 1112 | |
| 1113 | sprintf(buf,"%u ",rrp->i); |
| 1114 | CSP_ADDSTR(buf); |
| 1115 | |
| 1116 | return csp_hostaddr(vb,&rrp->ha); |
| 1117 | } |
| 1118 | |
| 1119 | /* |
| 1120 | * _inthost (cs) |
| 1121 | */ |
| 1122 | |
| 1123 | static adns_status cs_inthost(vbuf *vb, const void *datap) { |
| 1124 | const adns_rr_intstr *rrp= datap; |
| 1125 | char buf[10]; |
| 1126 | |
| 1127 | sprintf(buf,"%u ",rrp->i); |
| 1128 | CSP_ADDSTR(buf); |
| 1129 | return csp_domain(vb,rrp->str); |
| 1130 | } |
| 1131 | |
| 1132 | /* |
| 1133 | * _ptr (ckl,pa +icb_ptr) |
| 1134 | */ |
| 1135 | |
| 1136 | static adns_status ckl_ptr(adns_state ads, adns_queryflags flags, |
| 1137 | union checklabel_state *cls, qcontext *ctx, |
| 1138 | int labnum, const char *dgram, |
| 1139 | int labstart, int lablen) { |
| 1140 | if (lablen) { |
| 1141 | if (!adns__revparse_label(&cls->ptr, labnum, dgram,labstart,lablen)) |
| 1142 | return adns_s_querydomainwrong; |
| 1143 | } else { |
| 1144 | if (!adns__revparse_done(&cls->ptr, dgram, labnum, |
| 1145 | &ctx->tinfo.ptr.rev_rrtype, |
| 1146 | &ctx->tinfo.ptr.addr)) |
| 1147 | return adns_s_querydomainwrong; |
| 1148 | } |
| 1149 | return adns_s_ok; |
| 1150 | } |
| 1151 | |
| 1152 | static void icb_ptr(adns_query parent, adns_query child) { |
| 1153 | adns_answer *cans= child->answer; |
| 1154 | const adns_sockaddr *queried; |
| 1155 | const unsigned char *found; |
| 1156 | adns_state ads= parent->ads; |
| 1157 | int i; |
| 1158 | |
| 1159 | if (cans->status == adns_s_nxdomain || cans->status == adns_s_nodata) { |
| 1160 | adns__query_fail(parent,adns_s_inconsistent); |
| 1161 | return; |
| 1162 | } else if (cans->status) { |
| 1163 | adns__query_fail(parent,cans->status); |
| 1164 | return; |
| 1165 | } |
| 1166 | |
| 1167 | queried= &parent->ctx.tinfo.ptr.addr; |
| 1168 | for (i=0, found=cans->rrs.bytes; i<cans->nrrs; i++, found+=cans->rrsz) { |
| 1169 | if (adns__addrs_equal_raw(&queried->sa, |
| 1170 | parent->ctx.tinfo.ptr.addr.sa.sa_family,found)) { |
| 1171 | if (!parent->children.head) { |
| 1172 | adns__query_done(parent); |
| 1173 | return; |
| 1174 | } else { |
| 1175 | LIST_LINK_TAIL(ads->childw,parent); |
| 1176 | return; |
| 1177 | } |
| 1178 | } |
| 1179 | } |
| 1180 | |
| 1181 | adns__query_fail(parent,adns_s_inconsistent); |
| 1182 | } |
| 1183 | |
| 1184 | static adns_status pa_ptr(const parseinfo *pai, int dmstart, |
| 1185 | int max, void *datap) { |
| 1186 | char **rrp= datap; |
| 1187 | adns_status st; |
| 1188 | adns_rrtype rrtype= pai->qu->ctx.tinfo.ptr.rev_rrtype; |
| 1189 | int cbyte, id; |
| 1190 | adns_query nqu; |
| 1191 | qcontext ctx; |
| 1192 | |
| 1193 | cbyte= dmstart; |
| 1194 | st= pap_domain(pai, &cbyte, max, rrp, |
| 1195 | pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0); |
| 1196 | if (st) return st; |
| 1197 | if (cbyte != max) return adns_s_invaliddata; |
| 1198 | |
| 1199 | st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id, |
| 1200 | pai->dgram, pai->dglen, dmstart, |
| 1201 | rrtype, adns_qf_quoteok_query); |
| 1202 | if (st) return st; |
| 1203 | |
| 1204 | ctx.ext= 0; |
| 1205 | ctx.callback= icb_ptr; |
| 1206 | memset(&ctx.pinfo,0,sizeof(ctx.pinfo)); |
| 1207 | memset(&ctx.tinfo,0,sizeof(ctx.tinfo)); |
| 1208 | st= adns__internal_submit(pai->ads, &nqu, pai->qu, |
| 1209 | adns__findtype(rrtype), |
| 1210 | rrtype, &pai->qu->vb, id, |
| 1211 | adns_qf_quoteok_query, pai->now, &ctx); |
| 1212 | if (st) return st; |
| 1213 | |
| 1214 | return adns_s_ok; |
| 1215 | } |
| 1216 | |
| 1217 | /* |
| 1218 | * _strpair (mf) |
| 1219 | */ |
| 1220 | |
| 1221 | static void mf_strpair(adns_query qu, void *datap) { |
| 1222 | adns_rr_strpair *rrp= datap; |
| 1223 | |
| 1224 | adns__makefinal_str(qu,&rrp->array[0]); |
| 1225 | adns__makefinal_str(qu,&rrp->array[1]); |
| 1226 | } |
| 1227 | |
| 1228 | /* |
| 1229 | * _intstrpair (mf) |
| 1230 | */ |
| 1231 | |
| 1232 | static void mf_intstrpair(adns_query qu, void *datap) { |
| 1233 | adns_rr_intstrpair *rrp= datap; |
| 1234 | |
| 1235 | adns__makefinal_str(qu,&rrp->array[0].str); |
| 1236 | adns__makefinal_str(qu,&rrp->array[1].str); |
| 1237 | } |
| 1238 | |
| 1239 | /* |
| 1240 | * _hinfo (pa) |
| 1241 | */ |
| 1242 | |
| 1243 | static adns_status pa_hinfo(const parseinfo *pai, int cbyte, |
| 1244 | int max, void *datap) { |
| 1245 | adns_rr_intstrpair *rrp= datap; |
| 1246 | adns_status st; |
| 1247 | int i; |
| 1248 | |
| 1249 | for (i=0; i<2; i++) { |
| 1250 | st= pap_qstring(pai, &cbyte, max, &rrp->array[i].i, &rrp->array[i].str); |
| 1251 | if (st) return st; |
| 1252 | } |
| 1253 | |
| 1254 | if (cbyte != max) return adns_s_invaliddata; |
| 1255 | |
| 1256 | return adns_s_ok; |
| 1257 | } |
| 1258 | |
| 1259 | /* |
| 1260 | * _mailbox (pap,cs +pap_mailbox822) |
| 1261 | */ |
| 1262 | |
| 1263 | static adns_status pap_mailbox822(const parseinfo *pai, |
| 1264 | int *cbyte_io, int max, char **mb_r) { |
| 1265 | int lablen, labstart, i, needquote, c, r, neednorm; |
| 1266 | const unsigned char *p; |
| 1267 | char *str; |
| 1268 | findlabel_state fls; |
| 1269 | adns_status st; |
| 1270 | vbuf *vb; |
| 1271 | |
| 1272 | vb= &pai->qu->vb; |
| 1273 | vb->used= 0; |
| 1274 | adns__findlabel_start(&fls, pai->ads, |
| 1275 | -1, pai->qu, |
| 1276 | pai->dgram, pai->dglen, max, |
| 1277 | *cbyte_io, cbyte_io); |
| 1278 | st= adns__findlabel_next(&fls,&lablen,&labstart); |
| 1279 | if (!lablen) { |
| 1280 | adns__vbuf_appendstr(vb,"."); |
| 1281 | goto x_ok; |
| 1282 | } |
| 1283 | |
| 1284 | neednorm= 1; |
| 1285 | for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++) { |
| 1286 | c= *p++; |
| 1287 | if ((c&~128) < 32 || (c&~128) == 127) return adns_s_invaliddata; |
| 1288 | if (c == '.' && !neednorm) neednorm= 1; |
| 1289 | else if (c==' ' || c>=127 || ctype_822special(c)) needquote++; |
| 1290 | else neednorm= 0; |
| 1291 | } |
| 1292 | |
| 1293 | if (needquote || neednorm) { |
| 1294 | r= adns__vbuf_ensure(vb, lablen+needquote+4); if (!r) R_NOMEM; |
| 1295 | adns__vbuf_appendq(vb,"\"",1); |
| 1296 | for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++, p++) { |
| 1297 | c= *p; |
| 1298 | if (c == '"' || c=='\\') adns__vbuf_appendq(vb,"\\",1); |
| 1299 | adns__vbuf_appendq(vb,p,1); |
| 1300 | } |
| 1301 | adns__vbuf_appendq(vb,"\"",1); |
| 1302 | } else { |
| 1303 | r= adns__vbuf_append(vb, pai->dgram+labstart, lablen); if (!r) R_NOMEM; |
| 1304 | } |
| 1305 | |
| 1306 | r= adns__vbuf_appendstr(vb,"@"); if (!r) R_NOMEM; |
| 1307 | |
| 1308 | st= adns__parse_domain_more(&fls,pai->ads, pai->qu,vb,0, pai->dgram); |
| 1309 | if (st) return st; |
| 1310 | |
| 1311 | x_ok: |
| 1312 | str= adns__alloc_interim(pai->qu, vb->used+1); if (!str) R_NOMEM; |
| 1313 | memcpy(str,vb->buf,vb->used); |
| 1314 | str[vb->used]= 0; |
| 1315 | *mb_r= str; |
| 1316 | return adns_s_ok; |
| 1317 | } |
| 1318 | |
| 1319 | static adns_status pap_mailbox(const parseinfo *pai, int *cbyte_io, int max, |
| 1320 | char **mb_r) { |
| 1321 | if (pai->qu->typei->typekey & adns__qtf_mail822) { |
| 1322 | return pap_mailbox822(pai, cbyte_io, max, mb_r); |
| 1323 | } else { |
| 1324 | return pap_domain(pai, cbyte_io, max, mb_r, pdf_quoteok); |
| 1325 | } |
| 1326 | } |
| 1327 | |
| 1328 | static adns_status csp_mailbox(vbuf *vb, const char *mailbox) { |
| 1329 | return csp_domain(vb,mailbox); |
| 1330 | } |
| 1331 | |
| 1332 | /* |
| 1333 | * _rp (pa,cs) |
| 1334 | */ |
| 1335 | |
| 1336 | static adns_status pa_rp(const parseinfo *pai, int cbyte, |
| 1337 | int max, void *datap) { |
| 1338 | adns_rr_strpair *rrp= datap; |
| 1339 | adns_status st; |
| 1340 | |
| 1341 | st= pap_mailbox(pai, &cbyte, max, &rrp->array[0]); |
| 1342 | if (st) return st; |
| 1343 | |
| 1344 | st= pap_domain(pai, &cbyte, max, &rrp->array[1], pdf_quoteok); |
| 1345 | if (st) return st; |
| 1346 | |
| 1347 | if (cbyte != max) return adns_s_invaliddata; |
| 1348 | return adns_s_ok; |
| 1349 | } |
| 1350 | |
| 1351 | static adns_status cs_rp(vbuf *vb, const void *datap) { |
| 1352 | const adns_rr_strpair *rrp= datap; |
| 1353 | adns_status st; |
| 1354 | |
| 1355 | st= csp_mailbox(vb,rrp->array[0]); if (st) return st; |
| 1356 | CSP_ADDSTR(" "); |
| 1357 | st= csp_domain(vb,rrp->array[1]); if (st) return st; |
| 1358 | |
| 1359 | return adns_s_ok; |
| 1360 | } |
| 1361 | |
| 1362 | /* |
| 1363 | * _soa (pa,mf,cs) |
| 1364 | */ |
| 1365 | |
| 1366 | static adns_status pa_soa(const parseinfo *pai, int cbyte, |
| 1367 | int max, void *datap) { |
| 1368 | adns_rr_soa *rrp= datap; |
| 1369 | const byte *dgram= pai->dgram; |
| 1370 | adns_status st; |
| 1371 | int msw, lsw, i; |
| 1372 | |
| 1373 | st= pap_domain(pai, &cbyte, max, &rrp->mname, |
| 1374 | pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0); |
| 1375 | if (st) return st; |
| 1376 | |
| 1377 | st= pap_mailbox(pai, &cbyte, max, &rrp->rname); |
| 1378 | if (st) return st; |
| 1379 | |
| 1380 | if (cbyte+20 != max) return adns_s_invaliddata; |
| 1381 | |
| 1382 | for (i=0; i<5; i++) { |
| 1383 | GET_W(cbyte,msw); |
| 1384 | GET_W(cbyte,lsw); |
| 1385 | (&rrp->serial)[i]= (msw<<16) | lsw; |
| 1386 | } |
| 1387 | |
| 1388 | return adns_s_ok; |
| 1389 | } |
| 1390 | |
| 1391 | static void mf_soa(adns_query qu, void *datap) { |
| 1392 | adns_rr_soa *rrp= datap; |
| 1393 | |
| 1394 | adns__makefinal_str(qu,&rrp->mname); |
| 1395 | adns__makefinal_str(qu,&rrp->rname); |
| 1396 | } |
| 1397 | |
| 1398 | static adns_status cs_soa(vbuf *vb, const void *datap) { |
| 1399 | const adns_rr_soa *rrp= datap; |
| 1400 | char buf[20]; |
| 1401 | int i; |
| 1402 | adns_status st; |
| 1403 | |
| 1404 | st= csp_domain(vb,rrp->mname); if (st) return st; |
| 1405 | CSP_ADDSTR(" "); |
| 1406 | st= csp_mailbox(vb,rrp->rname); if (st) return st; |
| 1407 | |
| 1408 | for (i=0; i<5; i++) { |
| 1409 | sprintf(buf," %lu",(&rrp->serial)[i]); |
| 1410 | CSP_ADDSTR(buf); |
| 1411 | } |
| 1412 | |
| 1413 | return adns_s_ok; |
| 1414 | } |
| 1415 | |
| 1416 | /* |
| 1417 | * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort) |
| 1418 | */ |
| 1419 | |
| 1420 | static adns_status ckl_srv(adns_state ads, adns_queryflags flags, |
| 1421 | union checklabel_state *cls, qcontext *ctx, |
| 1422 | int labnum, const char *dgram, |
| 1423 | int labstart, int lablen) { |
| 1424 | const char *label = dgram+labstart; |
| 1425 | if (labnum < 2) { |
| 1426 | if (flags & adns_qf_quoteok_query) return adns_s_ok; |
| 1427 | if (!lablen || label[0] != '_') return adns_s_querydomaininvalid; |
| 1428 | return adns_s_ok; |
| 1429 | } |
| 1430 | return adns__ckl_hostname(ads,flags, cls,ctx, labnum, dgram,labstart,lablen); |
| 1431 | } |
| 1432 | |
| 1433 | static adns_status pap_srv_begin(const parseinfo *pai, int *cbyte_io, int max, |
| 1434 | adns_rr_srvha *rrp |
| 1435 | /* might be adns_rr_srvraw* */) { |
| 1436 | const byte *dgram= pai->dgram; |
| 1437 | int ti, cbyte; |
| 1438 | |
| 1439 | cbyte= *cbyte_io; |
| 1440 | if ((*cbyte_io += 6) > max) return adns_s_invaliddata; |
| 1441 | |
| 1442 | rrp->priority= GET_W(cbyte, ti); |
| 1443 | rrp->weight= GET_W(cbyte, ti); |
| 1444 | rrp->port= GET_W(cbyte, ti); |
| 1445 | return adns_s_ok; |
| 1446 | } |
| 1447 | |
| 1448 | static adns_status pa_srvraw(const parseinfo *pai, int cbyte, |
| 1449 | int max, void *datap) { |
| 1450 | adns_rr_srvraw *rrp= datap; |
| 1451 | adns_status st; |
| 1452 | |
| 1453 | st= pap_srv_begin(pai,&cbyte,max,datap); |
| 1454 | if (st) return st; |
| 1455 | |
| 1456 | st= pap_domain(pai, &cbyte, max, &rrp->host, |
| 1457 | pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0); |
| 1458 | if (st) return st; |
| 1459 | |
| 1460 | if (cbyte != max) return adns_s_invaliddata; |
| 1461 | return adns_s_ok; |
| 1462 | } |
| 1463 | |
| 1464 | static adns_status pa_srvha(const parseinfo *pai, int cbyte, |
| 1465 | int max, void *datap) { |
| 1466 | adns_rr_srvha *rrp= datap; |
| 1467 | adns_status st; |
| 1468 | |
| 1469 | st= pap_srv_begin(pai,&cbyte,max,datap); if (st) return st; |
| 1470 | st= pap_hostaddr(pai, &cbyte, max, &rrp->ha); if (st) return st; |
| 1471 | if (cbyte != max) return adns_s_invaliddata; |
| 1472 | return adns_s_ok; |
| 1473 | } |
| 1474 | |
| 1475 | static void mf_srvraw(adns_query qu, void *datap) { |
| 1476 | adns_rr_srvraw *rrp= datap; |
| 1477 | adns__makefinal_str(qu, &rrp->host); |
| 1478 | } |
| 1479 | |
| 1480 | static void mf_srvha(adns_query qu, void *datap) { |
| 1481 | adns_rr_srvha *rrp= datap; |
| 1482 | mfp_hostaddr(qu,&rrp->ha); |
| 1483 | } |
| 1484 | |
| 1485 | static int di_srv(adns_state ads, const void *datap_a, const void *datap_b) { |
| 1486 | const adns_rr_srvraw *ap= datap_a, *bp= datap_b; |
| 1487 | /* might be const adns_rr_svhostaddr* */ |
| 1488 | |
| 1489 | if (ap->priority < bp->priority) return 0; |
| 1490 | if (ap->priority > bp->priority) return 1; |
| 1491 | return 0; |
| 1492 | } |
| 1493 | |
| 1494 | static adns_status csp_srv_begin(vbuf *vb, const adns_rr_srvha *rrp |
| 1495 | /* might be adns_rr_srvraw* */) { |
| 1496 | char buf[30]; |
| 1497 | sprintf(buf,"%u %u %u ", rrp->priority, rrp->weight, rrp->port); |
| 1498 | CSP_ADDSTR(buf); |
| 1499 | return adns_s_ok; |
| 1500 | } |
| 1501 | |
| 1502 | static adns_status cs_srvraw(vbuf *vb, const void *datap) { |
| 1503 | const adns_rr_srvraw *rrp= datap; |
| 1504 | adns_status st; |
| 1505 | |
| 1506 | st= csp_srv_begin(vb,(const void*)rrp); if (st) return st; |
| 1507 | return csp_domain(vb,rrp->host); |
| 1508 | } |
| 1509 | |
| 1510 | static adns_status cs_srvha(vbuf *vb, const void *datap) { |
| 1511 | const adns_rr_srvha *rrp= datap; |
| 1512 | adns_status st; |
| 1513 | |
| 1514 | st= csp_srv_begin(vb,(const void*)datap); if (st) return st; |
| 1515 | return csp_hostaddr(vb,&rrp->ha); |
| 1516 | } |
| 1517 | |
| 1518 | static void postsort_srv(adns_state ads, void *array, int nrrs,int rrsz, |
| 1519 | const struct typeinfo *typei) { |
| 1520 | /* we treat everything in the array as if it were an adns_rr_srvha |
| 1521 | * even though the array might be of adns_rr_srvraw. That's OK |
| 1522 | * because they have the same prefix, which is all we access. |
| 1523 | * We use rrsz, too, rather than naive array indexing, of course. |
| 1524 | */ |
| 1525 | char *workbegin, *workend, *search, *arrayend; |
| 1526 | const adns_rr_srvha *rr; |
| 1527 | union { adns_rr_srvha ha; adns_rr_srvraw raw; } rrtmp; |
| 1528 | int cpriority, totalweight, runtotal; |
| 1529 | long randval; |
| 1530 | |
| 1531 | assert(rrsz <= sizeof(rrtmp)); |
| 1532 | for (workbegin= array, arrayend= workbegin + rrsz * nrrs; |
| 1533 | workbegin < arrayend; |
| 1534 | workbegin= workend) { |
| 1535 | cpriority= (rr=(void*)workbegin)->priority; |
| 1536 | |
| 1537 | for (workend= workbegin, totalweight= 0; |
| 1538 | workend < arrayend && (rr=(void*)workend)->priority == cpriority; |
| 1539 | workend += rrsz) { |
| 1540 | totalweight += rr->weight; |
| 1541 | } |
| 1542 | |
| 1543 | /* Now workbegin..(workend-1) incl. are exactly all of the RRs of |
| 1544 | * cpriority. From now on, workbegin points to the `remaining' |
| 1545 | * records: we select one record at a time (RFC2782 `Usage rules' |
| 1546 | * and `Format of the SRV RR' subsection `Weight') to place at |
| 1547 | * workbegin (swapping with the one that was there, and then |
| 1548 | * advance workbegin. */ |
| 1549 | for (; |
| 1550 | workbegin + rrsz < workend; /* don't bother if just one */ |
| 1551 | workbegin += rrsz) { |
| 1552 | |
| 1553 | randval= nrand48(ads->rand48xsubi); |
| 1554 | randval %= (totalweight + 1); |
| 1555 | /* makes it into 0..totalweight inclusive; with 2^10 RRs, |
| 1556 | * totalweight must be <= 2^26 so probability nonuniformity is |
| 1557 | * no worse than 1 in 2^(31-26) ie 1 in 2^5, ie |
| 1558 | * abs(log(P_intended(RR_i) / P_actual(RR_i)) <= log(2^-5). |
| 1559 | */ |
| 1560 | |
| 1561 | for (search=workbegin, runtotal=0; |
| 1562 | (runtotal += (rr=(void*)search)->weight) < randval; |
| 1563 | search += rrsz); |
| 1564 | assert(search < arrayend); |
| 1565 | totalweight -= rr->weight; |
| 1566 | if (search != workbegin) { |
| 1567 | memcpy(&rrtmp, workbegin, rrsz); |
| 1568 | memcpy(workbegin, search, rrsz); |
| 1569 | memcpy(search, &rrtmp, rrsz); |
| 1570 | } |
| 1571 | } |
| 1572 | } |
| 1573 | /* tests: |
| 1574 | * dig -t srv _srv._tcp.test.iwj.relativity.greenend.org.uk. |
| 1575 | * ./adnshost_s -t srv- _sip._udp.voip.net.cam.ac.uk. |
| 1576 | * ./adnshost_s -t srv- _jabber._tcp.jabber.org |
| 1577 | */ |
| 1578 | } |
| 1579 | |
| 1580 | /* |
| 1581 | * _byteblock (mf) |
| 1582 | */ |
| 1583 | |
| 1584 | static void mf_byteblock(adns_query qu, void *datap) { |
| 1585 | adns_rr_byteblock *rrp= datap; |
| 1586 | void *bytes= rrp->data; |
| 1587 | adns__makefinal_block(qu,&bytes,rrp->len); |
| 1588 | rrp->data= bytes; |
| 1589 | } |
| 1590 | |
| 1591 | /* |
| 1592 | * _opaque (pa,cs) |
| 1593 | */ |
| 1594 | |
| 1595 | static adns_status pa_opaque(const parseinfo *pai, int cbyte, |
| 1596 | int max, void *datap) { |
| 1597 | adns_rr_byteblock *rrp= datap; |
| 1598 | |
| 1599 | rrp->len= max - cbyte; |
| 1600 | rrp->data= adns__alloc_interim(pai->qu, rrp->len); |
| 1601 | if (!rrp->data) R_NOMEM; |
| 1602 | memcpy(rrp->data, pai->dgram + cbyte, rrp->len); |
| 1603 | return adns_s_ok; |
| 1604 | } |
| 1605 | |
| 1606 | static adns_status cs_opaque(vbuf *vb, const void *datap) { |
| 1607 | const adns_rr_byteblock *rrp= datap; |
| 1608 | char buf[10]; |
| 1609 | int l; |
| 1610 | unsigned char *p; |
| 1611 | |
| 1612 | sprintf(buf,"\\# %d",rrp->len); |
| 1613 | CSP_ADDSTR(buf); |
| 1614 | |
| 1615 | for (l= rrp->len, p= rrp->data; |
| 1616 | l>=4; |
| 1617 | l -= 4, p += 4) { |
| 1618 | sprintf(buf," %02x%02x%02x%02x",p[0],p[1],p[2],p[3]); |
| 1619 | CSP_ADDSTR(buf); |
| 1620 | } |
| 1621 | for (; |
| 1622 | l>0; |
| 1623 | l--, p++) { |
| 1624 | sprintf(buf," %02x",*p); |
| 1625 | CSP_ADDSTR(buf); |
| 1626 | } |
| 1627 | return adns_s_ok; |
| 1628 | } |
| 1629 | |
| 1630 | /* |
| 1631 | * _flat (mf) |
| 1632 | */ |
| 1633 | |
| 1634 | static void mf_flat(adns_query qu, void *data) { } |
| 1635 | |
| 1636 | /* |
| 1637 | * Now the table. |
| 1638 | */ |
| 1639 | |
| 1640 | #define TYPESZ_M(member) (sizeof(*((adns_answer*)0)->rrs.member)) |
| 1641 | |
| 1642 | #define DEEP_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \ |
| 1643 | { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_##memb, \ |
| 1644 | GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \ |
| 1645 | adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \ |
| 1646 | CDR(__VA_ARGS__) } |
| 1647 | #define FLAT_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \ |
| 1648 | { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_flat, \ |
| 1649 | GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \ |
| 1650 | adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \ |
| 1651 | CDR(__VA_ARGS__) } |
| 1652 | |
| 1653 | #define di_0 0 |
| 1654 | |
| 1655 | static const typeinfo typeinfos[] = { |
| 1656 | /* Must be in ascending order of rrtype ! */ |
| 1657 | /* mem-mgmt code rrt fmt member parser comparer printer */ |
| 1658 | |
| 1659 | FLAT_TYPE(a, "A", 0, inaddr, inaddr, inaddr,inaddr ), |
| 1660 | DEEP_TYPE(ns_raw, "NS", "raw",str, host_raw,0, domain ), |
| 1661 | DEEP_TYPE(cname, "CNAME", 0, str, dom_raw, 0, domain ), |
| 1662 | DEEP_TYPE(soa_raw,"SOA", "raw",soa, soa, 0, soa ), |
| 1663 | DEEP_TYPE(ptr_raw,"PTR", "raw",str, host_raw,0, domain ), |
| 1664 | DEEP_TYPE(hinfo, "HINFO", 0, intstrpair,hinfo, 0, hinfo ), |
| 1665 | DEEP_TYPE(mx_raw, "MX", "raw",intstr, mx_raw, mx_raw,inthost ), |
| 1666 | DEEP_TYPE(txt, "TXT", 0, manyistr, txt, 0, txt ), |
| 1667 | DEEP_TYPE(rp_raw, "RP", "raw",strpair, rp, 0, rp ), |
| 1668 | FLAT_TYPE(aaaa, "AAAA", 0, in6addr, in6addr, in6addr,in6addr ), |
| 1669 | DEEP_TYPE(srv_raw,"SRV", "raw",srvraw , srvraw, srv, srvraw, |
| 1670 | .checklabel= ckl_srv, .postsort= postsort_srv), |
| 1671 | |
| 1672 | FLAT_TYPE(addr, "A", "addr", addr, addr, addr, addr, |
| 1673 | .getrrsz= gsz_addr, .query_send= qs_addr), |
| 1674 | DEEP_TYPE(ns, "NS", "+addr",hostaddr, hostaddr,hostaddr,hostaddr ), |
| 1675 | DEEP_TYPE(ptr, "PTR","checked",str, ptr, 0, domain, |
| 1676 | .checklabel= ckl_ptr), |
| 1677 | DEEP_TYPE(mx, "MX", "+addr",inthostaddr,mx, mx, inthostaddr, ), |
| 1678 | DEEP_TYPE(srv, "SRV","+addr",srvha, srvha, srv, srvha, |
| 1679 | .checklabel= ckl_srv, .postsort= postsort_srv), |
| 1680 | |
| 1681 | DEEP_TYPE(soa, "SOA","822", soa, soa, 0, soa ), |
| 1682 | DEEP_TYPE(rp, "RP", "822", strpair, rp, 0, rp ), |
| 1683 | }; |
| 1684 | |
| 1685 | static const typeinfo tinfo_addrsub = |
| 1686 | FLAT_TYPE(none, "<addr>","sub",addr, addr, 0, addr, |
| 1687 | .getrrsz= gsz_addr); |
| 1688 | |
| 1689 | static const typeinfo typeinfo_unknown= |
| 1690 | DEEP_TYPE(unknown,0, "unknown",byteblock,opaque, 0, opaque ); |
| 1691 | |
| 1692 | const typeinfo *adns__findtype(adns_rrtype type) { |
| 1693 | const typeinfo *begin, *end, *mid; |
| 1694 | |
| 1695 | if (type & adns_r_unknown) return &typeinfo_unknown; |
| 1696 | type &= adns_rrt_reprmask; |
| 1697 | |
| 1698 | begin= typeinfos; end= typeinfos+(sizeof(typeinfos)/sizeof(typeinfo)); |
| 1699 | |
| 1700 | while (begin < end) { |
| 1701 | mid= begin + ((end-begin)>>1); |
| 1702 | if (mid->typekey == type) return mid; |
| 1703 | if (type > mid->typekey) begin= mid+1; |
| 1704 | else end= mid; |
| 1705 | } |
| 1706 | return 0; |
| 1707 | } |