0f672bf0bba0aad97a05bb9631e6ab735f8b8376
[adns] / src / types.c
1 /*
2 * types.c
3 * - RR-type-specific code, and the machinery to call it
4 */
5 /*
6 * This file is part of adns, which is
7 * Copyright (C) 1997-2000,2003,2006 Ian Jackson
8 * Copyright (C) 1999-2000,2003,2006 Tony Finch
9 * Copyright (C) 1991 Massachusetts Institute of Technology
10 * (See the file INSTALL for full details.)
11 *
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2, or (at your option)
15 * any later version.
16 *
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software Foundation,
24 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25 */
26
27 #include <stddef.h>
28 #include <stdlib.h>
29
30 #include <sys/types.h>
31 #include <sys/socket.h>
32 #include <netinet/in.h>
33 #include <arpa/inet.h>
34 #include <netdb.h>
35
36 #include "internal.h"
37
38 #define R_NOMEM return adns_s_nomemory
39 #define CSP_ADDSTR(s) do { \
40 if (!adns__vbuf_appendstr(vb,(s))) R_NOMEM; \
41 } while (0)
42
43 /*
44 * order of sections:
45 *
46 * _string (pap)
47 * _textdata, _qstring (csp)
48 * _str (mf,cs)
49 * _intstr (mf,csp,cs)
50 * _manyistr (mf,cs)
51 * _txt (pa)
52 * _inaddr (pa,cs,di, +search_sortlist, dip_genaddr)
53 * _in6addr (pa,cs,di)
54 * _addr (pap,pa,di,csp,cs,qs, +search_sortlist_sa,
55 * dip_sockaddr, rrtypes)
56 * _domain (pap)
57 * _host_raw (pa)
58 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +pap_findaddrs)
59 * _mx_raw (pa,di)
60 * _mx (pa,di)
61 * _inthostaddr (mf,cs)
62 * _ptr (pa)
63 * _strpair (mf,cs)
64 * _intstrpair (mf,cs)
65 * _hinfo (pa)
66 * _mailbox (pap +pap_mailbox822)
67 * _rp (pa)
68 * _soa (pa,mf,cs)
69 * _srv* (qdpl,(pap),pa,mf,di,(csp),cs,postsort)
70 * _byteblock (mf)
71 * _opaque (pa,cs)
72 * _flat (mf)
73 *
74 * within each section:
75 * qdpl_*
76 * pap_*
77 * pa_*
78 * dip_*
79 * di_*
80 * mfp_*
81 * mf_*
82 * csp_*
83 * cs_*
84 * postsort_*
85 */
86
87 /*
88 * _qstring (pap,csp)
89 */
90
91 static adns_status pap_qstring(const parseinfo *pai, int *cbyte_io, int max,
92 int *len_r, char **str_r) {
93 /* Neither len_r nor str_r may be null.
94 * End of datagram (overrun) is indicated by returning adns_s_invaliddata;
95 */
96 const byte *dgram= pai->dgram;
97 int l, cbyte;
98 char *str;
99
100 cbyte= *cbyte_io;
101
102 if (cbyte >= max) return adns_s_invaliddata;
103 GET_B(cbyte,l);
104 if (cbyte+l > max) return adns_s_invaliddata;
105
106 str= adns__alloc_interim(pai->qu, l+1);
107 if (!str) R_NOMEM;
108
109 str[l]= 0;
110 memcpy(str,dgram+cbyte,l);
111
112 *len_r= l;
113 *str_r= str;
114 *cbyte_io= cbyte+l;
115
116 return adns_s_ok;
117 }
118
119 static adns_status csp_qstring(vbuf *vb, const char *dp, int len) {
120 unsigned char ch;
121 char buf[10];
122 int cn;
123
124 CSP_ADDSTR("\"");
125 for (cn=0; cn<len; cn++) {
126 ch= *dp++;
127 if (ch == '\\') {
128 CSP_ADDSTR("\\\\");
129 } else if (ch == '"') {
130 CSP_ADDSTR("\\\"");
131 } else if (ch >= 32 && ch <= 126) {
132 if (!adns__vbuf_append(vb,&ch,1)) R_NOMEM;
133 } else {
134 sprintf(buf,"\\x%02x",ch);
135 CSP_ADDSTR(buf);
136 }
137 }
138 CSP_ADDSTR("\"");
139
140 return adns_s_ok;
141 }
142
143 /*
144 * _str (mf)
145 */
146
147 static void mf_str(adns_query qu, void *datap) {
148 char **rrp= datap;
149
150 adns__makefinal_str(qu,rrp);
151 }
152
153 /*
154 * _intstr (mf)
155 */
156
157 static void mf_intstr(adns_query qu, void *datap) {
158 adns_rr_intstr *rrp= datap;
159
160 adns__makefinal_str(qu,&rrp->str);
161 }
162
163 /*
164 * _manyistr (mf)
165 */
166
167 static void mf_manyistr(adns_query qu, void *datap) {
168 adns_rr_intstr **rrp= datap;
169 adns_rr_intstr *te, *table;
170 void *tablev;
171 int tc;
172
173 for (tc=0, te= *rrp; te->i >= 0; te++, tc++);
174 tablev= *rrp;
175 adns__makefinal_block(qu,&tablev,sizeof(*te)*(tc+1));
176 *rrp= table= tablev;
177 for (te= *rrp; te->i >= 0; te++)
178 adns__makefinal_str(qu,&te->str);
179 }
180
181 /*
182 * _txt (pa,cs)
183 */
184
185 static adns_status pa_txt(const parseinfo *pai, int cbyte,
186 int max, void *datap) {
187 adns_rr_intstr **rrp= datap, *table, *te;
188 const byte *dgram= pai->dgram;
189 int ti, tc, l, startbyte;
190 adns_status st;
191
192 startbyte= cbyte;
193 if (cbyte >= max) return adns_s_invaliddata;
194 tc= 0;
195 while (cbyte < max) {
196 GET_B(cbyte,l);
197 cbyte+= l;
198 tc++;
199 }
200 if (cbyte != max || !tc) return adns_s_invaliddata;
201
202 table= adns__alloc_interim(pai->qu,sizeof(*table)*(tc+1));
203 if (!table) R_NOMEM;
204
205 for (cbyte=startbyte, ti=0, te=table; ti<tc; ti++, te++) {
206 st= pap_qstring(pai, &cbyte, max, &te->i, &te->str);
207 if (st) return st;
208 }
209 assert(cbyte == max);
210
211 te->i= -1;
212 te->str= 0;
213
214 *rrp= table;
215 return adns_s_ok;
216 }
217
218 static adns_status cs_txt(vbuf *vb, const void *datap) {
219 const adns_rr_intstr *const *rrp= datap;
220 const adns_rr_intstr *current;
221 adns_status st;
222 int spc;
223
224 for (current= *rrp, spc=0; current->i >= 0; current++, spc=1) {
225 if (spc) CSP_ADDSTR(" ");
226 st= csp_qstring(vb,current->str,current->i); if (st) return st;
227 }
228 return adns_s_ok;
229 }
230
231 /*
232 * _hinfo (cs)
233 */
234
235 static adns_status cs_hinfo(vbuf *vb, const void *datap) {
236 const adns_rr_intstrpair *rrp= datap;
237 adns_status st;
238
239 st= csp_qstring(vb,rrp->array[0].str,rrp->array[0].i); if (st) return st;
240 CSP_ADDSTR(" ");
241 st= csp_qstring(vb,rrp->array[1].str,rrp->array[1].i); if (st) return st;
242 return adns_s_ok;
243 }
244
245 /*
246 * _inaddr (pa,di,cs +search_sortlist, dip_genaddr)
247 */
248
249 static adns_status pa_inaddr(const parseinfo *pai, int cbyte,
250 int max, void *datap) {
251 struct in_addr *storeto= datap;
252
253 if (max-cbyte != 4) return adns_s_invaliddata;
254 memcpy(storeto, pai->dgram + cbyte, 4);
255 return adns_s_ok;
256 }
257
258 static int search_sortlist(adns_state ads, int af, const void *ad) {
259 const struct sortlist *slp;
260 const struct in6_addr *a6;
261 union gen_addr a;
262 int i;
263 int v6mappedp = 0;
264
265 if (af == AF_INET6) {
266 a6 = ad;
267 if (IN6_IS_ADDR_V4MAPPED(a6)) {
268 a.v4.s_addr = htonl(((unsigned long)a6->s6_addr[12] << 24) |
269 ((unsigned long)a6->s6_addr[13] << 16) |
270 ((unsigned long)a6->s6_addr[14] << 8) |
271 ((unsigned long)a6->s6_addr[15] << 0));
272 v6mappedp = 1;
273 }
274 }
275
276 for (i=0, slp=ads->sortlist;
277 i<ads->nsortlist &&
278 !(af == slp->ai->af &&
279 slp->ai->matchp(ad, &slp->base, &slp->mask)) &&
280 !(v6mappedp && slp->ai->af == AF_INET &&
281 slp->ai->matchp(&a, &slp->base, &slp->mask));
282 i++, slp++);
283 return i;
284 }
285
286 static int dip_genaddr(adns_state ads, int af, const void *a, const void *b) {
287 int ai, bi;
288
289 if (!ads->nsortlist) return 0;
290
291 ai= search_sortlist(ads,af,a);
292 bi= search_sortlist(ads,af,b);
293 return bi<ai;
294 }
295
296 static int di_inaddr(adns_state ads,
297 const void *datap_a, const void *datap_b) {
298 return dip_genaddr(ads,AF_INET,datap_a,datap_b);
299 }
300
301 static adns_status cs_inaddr(vbuf *vb, const void *datap) {
302 const struct in_addr *rrp= datap, rr= *rrp;
303 const char *ia;
304
305 ia= inet_ntoa(rr); assert(ia);
306 CSP_ADDSTR(ia);
307 return adns_s_ok;
308 }
309
310 /*
311 * _in6addr (pa,di,cs)
312 */
313
314 static adns_status pa_in6addr(const parseinfo *pai, int cbyte,
315 int max, void *datap) {
316 struct in6_addr *storeto= datap;
317
318 if (max-cbyte != 16) return adns_s_invaliddata;
319 memcpy(storeto->s6_addr, pai->dgram + cbyte, 16);
320 return adns_s_ok;
321 }
322
323 static int di_in6addr(adns_state ads,
324 const void *datap_a, const void *datap_b) {
325 return dip_genaddr(ads,AF_INET6,datap_a,datap_b);
326 }
327
328 static adns_status cs_in6addr(vbuf *vb, const void *datap) {
329 char buf[INET6_ADDRSTRLEN];
330 const char *ia;
331
332 ia= inet_ntop(AF_INET6, datap, buf, sizeof(buf)); assert(ia);
333 CSP_ADDSTR(ia);
334 return adns_s_ok;
335 }
336
337 /*
338 * _addr (pap,pa,di,csp,cs,qs, +search_sortlist_sa, dip_sockaddr,
339 * addr_rrtypes, addr_rrsz)
340 */
341
342 static adns_status pap_addr(const parseinfo *pai, int rrty, size_t rrsz,
343 int *cbyte_io, int max, adns_rr_addr *storeto)
344 {
345 const byte *dgram= pai->dgram;
346 int af, addrlen, salen;
347 struct in6_addr v6map;
348 const void *oaddr = dgram + *cbyte_io;
349 int avail = max - *cbyte_io;
350 int step = -1;
351 void *addrp = 0;
352
353 switch (rrty) {
354 case adns_r_a:
355 if (pai->qu->flags & adns_qf_domapv4) {
356 if (avail < 4) return adns_s_invaliddata;
357 memset(v6map.s6_addr + 0, 0x00, 10);
358 memset(v6map.s6_addr + 10, 0xff, 2);
359 memcpy(v6map.s6_addr + 12, oaddr, 4);
360 oaddr = v6map.s6_addr; avail = sizeof(v6map.s6_addr);
361 if (step < 0) step = 4;
362 goto aaaa;
363 }
364 af = AF_INET; addrlen = 4;
365 addrp = &storeto->addr.inet.sin_addr;
366 salen = sizeof(storeto->addr.inet);
367 break;
368 case adns_r_aaaa:
369 aaaa:
370 af = AF_INET6; addrlen = 16;
371 addrp = storeto->addr.inet6.sin6_addr.s6_addr;
372 salen = sizeof(storeto->addr.inet6);
373 break;
374 }
375 assert(addrp);
376
377 assert(offsetof(adns_rr_addr, addr) + salen <= rrsz);
378 if (addrlen < avail) return adns_s_invaliddata;
379 if (step < 0) step = addrlen;
380 *cbyte_io += step;
381 memset(&storeto->addr, 0, salen);
382 storeto->len = salen;
383 storeto->addr.sa.sa_family = af;
384 memcpy(addrp, oaddr, addrlen);
385
386 return adns_s_ok;
387 }
388
389 static adns_status pa_addr(const parseinfo *pai, int cbyte,
390 int max, void *datap) {
391 int err = pap_addr(pai, pai->qu->answer->type & adns_rrt_typemask,
392 pai->qu->answer->rrsz, &cbyte, max, datap);
393 if (err) return err;
394 if (cbyte != max) return adns_s_invaliddata;
395 return adns_s_ok;
396 }
397
398 static int search_sortlist_sa(adns_state ads, const struct sockaddr *sa)
399 {
400 const afinfo *ai = 0;
401
402 switch (sa->sa_family) {
403 case AF_INET: ai = &adns__inet_afinfo; break;
404 case AF_INET6: ai = &adns__inet6_afinfo; break;
405 }
406 assert(ai);
407
408 return search_sortlist(ads, sa->sa_family, ai->sockaddr_to_inaddr(sa));
409 }
410
411 static int dip_sockaddr(adns_state ads,
412 const struct sockaddr *sa,
413 const struct sockaddr *sb)
414 {
415 if (!ads->sortlist) return 0;
416 return search_sortlist_sa(ads, sa) > search_sortlist_sa(ads, sb);
417 }
418
419 static int di_addr(adns_state ads, const void *datap_a, const void *datap_b) {
420 const adns_rr_addr *ap= datap_a, *bp= datap_b;
421
422 return dip_sockaddr(ads, &ap->addr.sa, &bp->addr.sa);
423 }
424
425 static int div_addr(void *context, const void *datap_a, const void *datap_b) {
426 const adns_state ads= context;
427
428 return di_addr(ads, datap_a, datap_b);
429 }
430
431 static adns_status csp_addr(vbuf *vb, const adns_rr_addr *rrp) {
432 char buf[128];
433 int err;
434
435 switch (rrp->addr.inet.sin_family) {
436 case AF_INET:
437 CSP_ADDSTR("INET ");
438 goto ntop;
439 case AF_INET6:
440 CSP_ADDSTR("INET6 ");
441 goto ntop;
442 ntop:
443 err= getnameinfo(&rrp->addr.sa, rrp->len, buf, sizeof(buf), 0, 0,
444 NI_NUMERICHOST); assert(!err);
445 CSP_ADDSTR(buf);
446 break;
447 default:
448 sprintf(buf,"AF=%u",rrp->addr.sa.sa_family);
449 CSP_ADDSTR(buf);
450 break;
451 }
452 return adns_s_ok;
453 }
454
455 static adns_status cs_addr(vbuf *vb, const void *datap) {
456 const adns_rr_addr *rrp= datap;
457
458 return csp_addr(vb,rrp);
459 }
460
461 #define ADDR_MAXRRTYPES 2
462
463 static void addr_rrtypes(adns_state ads, adns_rrtype type,
464 adns_queryflags qf,
465 adns_rrtype *rrty, size_t *nrrty)
466 {
467 size_t n = 0;
468 adns_rrtype qtf = type & adns__qtf_deref;
469
470 if (!(type & adns__qtf_bigaddr) || !(type & adns__qtf_manyaf))
471 qf = (qf & adns__qf_afmask) | adns_qf_ipv4_only;
472
473 if (qf & adns_qf_ipv4_only) rrty[n++] = adns_r_a | qtf;
474 if (qf & adns_qf_ipv6_only) rrty[n++] = adns_r_aaaa | qtf;
475
476 *nrrty = n;
477 }
478
479 static size_t addr_rrsz(adns_query qu)
480 {
481 return qu->answer->type & adns__qtf_bigaddr ?
482 sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only);
483 }
484
485 static adns_status append_addrs(adns_query qu, adns_query from, size_t rrsz,
486 adns_rr_addr **dp, int *dlen,
487 const adns_rr_addr *sp, int slen)
488 {
489 size_t drrsz = *dlen*rrsz, srrsz = slen*rrsz;
490 byte *p = adns__alloc_interim(qu, drrsz + srrsz);
491 if (!p) R_NOMEM;
492 if (*dlen) {
493 memcpy(p, *dp, drrsz);
494 adns__free_interim(qu, *dp);
495 }
496 memcpy(p + drrsz, sp, srrsz);
497 *dlen += slen;
498 *dp = (adns_rr_addr *)p;
499 if (from && qu->expires > from->expires) qu->expires = from->expires;
500 return adns_s_ok;
501 }
502
503 static void icb_addr(adns_query parent, adns_query child)
504 {
505 adns_state ads = parent->ads;
506 adns_answer *pans = parent->answer, *cans = child->answer;
507 struct timeval tvbuf;
508 adns_status err;
509 const struct timeval *now = 0;
510
511 /* Must handle CNAMEs correctly. This gets very hairy if the answers we
512 * get are inconsistent.
513 */
514
515 if ((parent->flags & adns_qf_search) &&
516 cans->status == adns_s_nxdomain) {
517 if (parent->expires > child->expires) parent->expires = child->expires;
518 adns__cancel_children(parent);
519 adns__free_interim(parent, pans->rrs.bytes);
520 pans->rrs.bytes = 0; pans->nrrs = 0;
521 adns__must_gettimeofday(ads, &now, &tvbuf);
522 if (now) adns__search_next(ads, parent, *now);
523 return;
524 }
525
526 if (cans->status && cans->status != adns_s_nodata) {
527 adns__query_fail(parent, cans->status);
528 return;
529 }
530
531 assert(pans->rrsz == cans->rrsz);
532 err = append_addrs(parent, child, pans->rrsz,
533 &pans->rrs.addr, &pans->nrrs,
534 cans->rrs.addr, cans->nrrs);
535 if (err) { adns__query_fail(parent, err); return; }
536
537 if (parent->children.head) LIST_LINK_TAIL(ads->childw, parent);
538 else if (!pans->nrrs) adns__query_fail(parent, adns_s_nodata);
539 else adns__query_done(parent);
540 }
541
542 static void addr_subqueries(adns_query qu, struct timeval now,
543 const adns_rrtype *rrty, size_t nrrty)
544 {
545 int i, err, id;
546 adns_query cqu;
547 adns_queryflags qf =
548 (qu->flags | adns__qf_senddirect) &
549 ~(adns_qf_search);
550 qcontext ctx;
551
552 if (!(qu->answer->type & adns__qtf_bigaddr))
553 qu->answer->rrsz = sizeof(adns_rr_addr_v4only);
554
555 /* This always makes child queries, even if there's only the one. This
556 * seems wasteful, but there's only one case where it'd be safe -- namely
557 * IPv4-only -- and that's not the case I want to optimize.
558 */
559 memset(&ctx, 0, sizeof(ctx));
560 ctx.callback = icb_addr;
561 for (i = 0; i < nrrty; i++) {
562 err = adns__mkquery_frdgram(qu->ads, &qu->vb, &id, qu->query_dgram,
563 qu->query_dglen, DNS_HDRSIZE, rrty[i], qf);
564 if (err) goto x_error;
565 err = adns__internal_submit(qu->ads, &cqu, qu->typei, rrty[i],
566 &qu->vb, id, qf, now, &ctx);
567 if (err) goto x_error;
568 cqu->answer->rrsz = qu->answer->rrsz;
569 cqu->parent = qu;
570 LIST_LINK_TAIL_PART(qu->children, cqu,siblings.);
571 }
572 qu->state = query_childw;
573 LIST_LINK_TAIL(qu->ads->childw, qu);
574 return;
575
576 x_error:
577 adns__query_fail(qu, err);
578 }
579
580 static adns_status addr_submit(adns_query parent, adns_query *query_r,
581 vbuf *qumsg_vb, int id,
582 const adns_rrtype *rrty, size_t nrrty,
583 adns_queryflags flags, struct timeval now,
584 const qcontext *ctx)
585 {
586 /* This is effectively a substitute for adns__internal_submit, intended for
587 * the case where the caller (possibly) only wants a subset of the
588 * available record types. The memory management and callback rules are
589 * the same as for adns__internal_submit.
590 *
591 * Some differences: the query is linked onto the parent's children list
592 * before exit (though the parent's state is not changed, and it is not
593 * linked into the childw list queue).
594 */
595
596 adns_state ads = parent->ads;
597 adns_status err;
598 adns_rrtype type =
599 (adns_r_addr & adns_rrt_reprmask) |
600 (parent->answer->type & ~adns_rrt_reprmask);
601
602 err = adns__internal_submit(ads, query_r, adns__findtype(adns_r_addr),
603 type, qumsg_vb, id, flags | adns__qf_nosend,
604 now, ctx);
605 if (err) return err;
606
607 (*query_r)->parent = parent;
608 LIST_LINK_TAIL_PART(parent->children, *query_r, siblings.);
609 addr_subqueries(*query_r, now, rrty, nrrty);
610 return adns_s_ok;
611 }
612
613 static void qs_addr(adns_query qu, struct timeval now)
614 {
615 adns_rrtype rrty[ADDR_MAXRRTYPES];
616 size_t nrrty;
617
618 addr_rrtypes(qu->ads, qu->answer->type, qu->flags, rrty, &nrrty);
619 addr_subqueries(qu, now, rrty, nrrty);
620 }
621
622 /*
623 * _domain (pap,csp,cs)
624 * _dom_raw (pa)
625 */
626
627 static adns_status pap_domain(const parseinfo *pai, int *cbyte_io, int max,
628 char **domain_r, parsedomain_flags flags) {
629 adns_status st;
630 char *dm;
631
632 st= adns__parse_domain(pai->qu->ads, pai->serv, pai->qu, &pai->qu->vb, flags,
633 pai->dgram,pai->dglen, cbyte_io, max);
634 if (st) return st;
635 if (!pai->qu->vb.used) return adns_s_invaliddata;
636
637 dm= adns__alloc_interim(pai->qu, pai->qu->vb.used+1);
638 if (!dm) R_NOMEM;
639
640 dm[pai->qu->vb.used]= 0;
641 memcpy(dm,pai->qu->vb.buf,pai->qu->vb.used);
642
643 *domain_r= dm;
644 return adns_s_ok;
645 }
646
647 static adns_status csp_domain(vbuf *vb, const char *domain) {
648 CSP_ADDSTR(domain);
649 if (!*domain) CSP_ADDSTR(".");
650 return adns_s_ok;
651 }
652
653 static adns_status cs_domain(vbuf *vb, const void *datap) {
654 const char *const *domainp= datap;
655 return csp_domain(vb,*domainp);
656 }
657
658 static adns_status pa_dom_raw(const parseinfo *pai, int cbyte,
659 int max, void *datap) {
660 char **rrp= datap;
661 adns_status st;
662
663 st= pap_domain(pai, &cbyte, max, rrp, pdf_quoteok);
664 if (st) return st;
665
666 if (cbyte != max) return adns_s_invaliddata;
667 return adns_s_ok;
668 }
669
670 /*
671 * _host_raw (pa)
672 */
673
674 static adns_status pa_host_raw(const parseinfo *pai, int cbyte,
675 int max, void *datap) {
676 char **rrp= datap;
677 adns_status st;
678
679 st= pap_domain(pai, &cbyte, max, rrp,
680 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
681 if (st) return st;
682
683 if (cbyte != max) return adns_s_invaliddata;
684 return adns_s_ok;
685 }
686
687 /*
688 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +icb_hostaddr, pap_findaddrs)
689 */
690
691 static adns_status pap_findaddrs(const parseinfo *pai, adns_rr_hostaddr *ha,
692 adns_rrtype *rrty, size_t *nrrty_io,
693 size_t addrsz, int *cbyte_io, int count,
694 int dmstart) {
695 int rri, naddrs, j;
696 int type, class, rdlen, rdend, rdstart, ownermatched;
697 size_t nrrty = *nrrty_io;
698 unsigned long ttl;
699 adns_status st;
700
701 for (rri=0, naddrs=0; rri<count; rri++) {
702 st= adns__findrr_anychk(pai->qu, pai->serv, pai->dgram,
703 pai->dglen, cbyte_io,
704 &type, &class, &ttl, &rdlen, &rdstart,
705 pai->dgram, pai->dglen, dmstart, &ownermatched);
706 if (st) return st;
707 if (!ownermatched || class != DNS_CLASS_IN) continue;
708 for (j = 0; j < nrrty && type != (rrty[j] & adns_rrt_typemask); j++);
709 if (j >= nrrty) continue;
710 if (j < *nrrty_io) {
711 (*nrrty_io)--;
712 adns_rrtype t = rrty[j];
713 rrty[j] = rrty[*nrrty_io];
714 rrty[*nrrty_io] = t;
715 }
716 if (!adns__vbuf_ensure(&pai->qu->vb, (naddrs+1)*addrsz)) R_NOMEM;
717 adns__update_expires(pai->qu,ttl,pai->now);
718 rdend = rdstart + rdlen;
719 st= pap_addr(pai, type, addrsz, &rdstart, rdend,
720 (adns_rr_addr *)(pai->qu->vb.buf + naddrs*addrsz));
721 if (st) return st;
722 if (rdstart != rdend) return adns_s_invaliddata;
723 naddrs++;
724 }
725 if (naddrs > 0) {
726 st = append_addrs(pai->qu, 0, addrsz, &ha->addrs, &ha->naddrs,
727 (const adns_rr_addr *)pai->qu->vb.buf, naddrs);
728 if (st) return st;
729 ha->astatus= adns_s_ok;
730
731 if (!*nrrty_io) {
732 adns__isort(ha->addrs, naddrs, addrsz, pai->qu->vb.buf,
733 div_addr, pai->ads);
734 }
735 }
736 return adns_s_ok;
737 }
738
739 static void icb_hostaddr(adns_query parent, adns_query child) {
740 adns_answer *cans= child->answer;
741 adns_rr_hostaddr *rrp= child->ctx.info.hostaddr;
742 adns_state ads= parent->ads;
743 adns_status st;
744 size_t addrsz = addr_rrsz(parent);
745
746 st= cans->status == adns_s_nodata ? adns_s_ok : cans->status;
747 rrp->astatus= st;
748
749 if (st) goto done;
750 assert(addrsz == cans->rrsz);
751 st = append_addrs(parent, child, addrsz,
752 &rrp->addrs, &rrp->naddrs,
753 cans->rrs.addr, cans->nrrs);
754 if (st) goto done;
755 if (!rrp->naddrs) { st = adns_s_nodata; goto done; }
756
757 if (!adns__vbuf_ensure(&parent->vb, addrsz))
758 { st = adns_s_nomemory; goto done; }
759 adns__isort(rrp->addrs, rrp->naddrs, addrsz, parent->vb.buf,
760 div_addr, ads);
761
762 done:
763 if (st) {
764 adns__free_interim(parent, rrp->addrs);
765 rrp->naddrs= (st>0 && st<=adns_s_max_tempfail) ? -1 : cans->nrrs;
766 }
767
768 if (parent->children.head) {
769 LIST_LINK_TAIL(ads->childw,parent);
770 } else {
771 adns__query_done(parent);
772 }
773 }
774
775 static adns_status pap_hostaddr(const parseinfo *pai, int *cbyte_io,
776 int max, adns_rr_hostaddr *rrp) {
777 adns_status st;
778 int dmstart, cbyte;
779 qcontext ctx;
780 int id;
781 adns_query nqu;
782 adns_queryflags nflags;
783 adns_rrtype rrty[ADDR_MAXRRTYPES];
784 size_t nrrty;
785 size_t addrsz = addr_rrsz(pai->qu);
786
787 dmstart= cbyte= *cbyte_io;
788 st= pap_domain(pai, &cbyte, max, &rrp->host,
789 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
790 if (st) return st;
791 *cbyte_io= cbyte;
792
793 rrp->astatus= adns_s_ok;
794 rrp->naddrs= 0;
795 rrp->addrs= 0;
796
797 cbyte= pai->nsstart;
798
799 addr_rrtypes(pai->ads, pai->qu->answer->type,
800 pai->qu->flags, rrty, &nrrty);
801
802 st= pap_findaddrs(pai, rrp, rrty, &nrrty, addrsz,
803 &cbyte, pai->nscount, dmstart);
804 if (st) return st;
805 if (!nrrty) return adns_s_ok;
806
807 st= pap_findaddrs(pai, rrp, rrty, &nrrty, addrsz,
808 &cbyte, pai->arcount, dmstart);
809 if (st) return st;
810 if (!nrrty) return adns_s_ok;
811
812 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
813 pai->dgram, pai->dglen, dmstart,
814 adns_r_addr, adns_qf_quoteok_query);
815 if (st) return st;
816
817 ctx.ext= 0;
818 ctx.callback= icb_hostaddr;
819 ctx.info.hostaddr= rrp;
820
821 nflags= adns_qf_quoteok_query | (pai->qu->flags & adns__qf_afmask);
822 if (!(pai->qu->flags & adns_qf_cname_loose)) nflags |= adns_qf_cname_forbid;
823
824 st= addr_submit(pai->qu, &nqu, &pai->qu->vb, id, rrty, nrrty,
825 nflags, pai->now, &ctx);
826 if (st) return st;
827
828 return adns_s_ok;
829 }
830
831 static adns_status pa_hostaddr(const parseinfo *pai, int cbyte,
832 int max, void *datap) {
833 adns_rr_hostaddr *rrp= datap;
834 adns_status st;
835
836 st= pap_hostaddr(pai, &cbyte, max, rrp);
837 if (st) return st;
838 if (cbyte != max) return adns_s_invaliddata;
839
840 return adns_s_ok;
841 }
842
843 static int dip_hostaddr(adns_state ads,
844 const adns_rr_hostaddr *ap, const adns_rr_hostaddr *bp) {
845 if (ap->astatus != bp->astatus) return ap->astatus;
846 if (ap->astatus) return 0;
847
848 return dip_sockaddr(ads, &ap->addrs[0].addr.sa, &bp->addrs[0].addr.sa);
849 }
850
851 static int di_hostaddr(adns_state ads,
852 const void *datap_a, const void *datap_b) {
853 const adns_rr_hostaddr *ap= datap_a, *bp= datap_b;
854
855 return dip_hostaddr(ads, ap,bp);
856 }
857
858 static void mfp_hostaddr(adns_query qu, adns_rr_hostaddr *rrp) {
859 void *tablev;
860 size_t sz = qu->answer->type & adns__qtf_bigaddr ?
861 sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only);
862 adns__makefinal_str(qu,&rrp->host);
863 tablev= rrp->addrs;
864 adns__makefinal_block(qu, &tablev, rrp->naddrs*sz);
865 rrp->addrs= tablev;
866 }
867
868 static void mf_hostaddr(adns_query qu, void *datap) {
869 adns_rr_hostaddr *rrp= datap;
870
871 mfp_hostaddr(qu,rrp);
872 }
873
874 static adns_status csp_hostaddr(vbuf *vb, const adns_rr_hostaddr *rrp) {
875 const char *errstr;
876 adns_status st;
877 char buf[20];
878 int i;
879
880 st= csp_domain(vb,rrp->host); if (st) return st;
881
882 CSP_ADDSTR(" ");
883 CSP_ADDSTR(adns_errtypeabbrev(rrp->astatus));
884
885 sprintf(buf," %d ",rrp->astatus);
886 CSP_ADDSTR(buf);
887
888 CSP_ADDSTR(adns_errabbrev(rrp->astatus));
889 CSP_ADDSTR(" ");
890
891 errstr= adns_strerror(rrp->astatus);
892 st= csp_qstring(vb,errstr,strlen(errstr)); if (st) return st;
893
894 if (rrp->naddrs >= 0) {
895 CSP_ADDSTR(" (");
896 for (i=0; i<rrp->naddrs; i++) {
897 CSP_ADDSTR(" ");
898 st= csp_addr(vb,&rrp->addrs[i]);
899 }
900 CSP_ADDSTR(" )");
901 } else {
902 CSP_ADDSTR(" ?");
903 }
904 return adns_s_ok;
905 }
906
907 static adns_status cs_hostaddr(vbuf *vb, const void *datap) {
908 const adns_rr_hostaddr *rrp= datap;
909
910 return csp_hostaddr(vb,rrp);
911 }
912
913 /*
914 * _mx_raw (pa,di)
915 */
916
917 static adns_status pa_mx_raw(const parseinfo *pai, int cbyte,
918 int max, void *datap) {
919 const byte *dgram= pai->dgram;
920 adns_rr_intstr *rrp= datap;
921 adns_status st;
922 int pref;
923
924 if (cbyte+2 > max) return adns_s_invaliddata;
925 GET_W(cbyte,pref);
926 rrp->i= pref;
927 st= pap_domain(pai, &cbyte, max, &rrp->str,
928 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
929 if (st) return st;
930
931 if (cbyte != max) return adns_s_invaliddata;
932 return adns_s_ok;
933 }
934
935 static int di_mx_raw(adns_state ads, const void *datap_a, const void *datap_b) {
936 const adns_rr_intstr *ap= datap_a, *bp= datap_b;
937
938 if (ap->i < bp->i) return 0;
939 if (ap->i > bp->i) return 1;
940 return 0;
941 }
942
943 /*
944 * _mx (pa,di)
945 */
946
947 static adns_status pa_mx(const parseinfo *pai, int cbyte,
948 int max, void *datap) {
949 const byte *dgram= pai->dgram;
950 adns_rr_inthostaddr *rrp= datap;
951 adns_status st;
952 int pref;
953
954 if (cbyte+2 > max) return adns_s_invaliddata;
955 GET_W(cbyte,pref);
956 rrp->i= pref;
957 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha);
958 if (st) return st;
959
960 if (cbyte != max) return adns_s_invaliddata;
961 return adns_s_ok;
962 }
963
964 static int di_mx(adns_state ads, const void *datap_a, const void *datap_b) {
965 const adns_rr_inthostaddr *ap= datap_a, *bp= datap_b;
966
967 if (ap->i < bp->i) return 0;
968 if (ap->i > bp->i) return 1;
969 return dip_hostaddr(ads, &ap->ha, &bp->ha);
970 }
971
972 /*
973 * _inthostaddr (mf,cs)
974 */
975
976 static void mf_inthostaddr(adns_query qu, void *datap) {
977 adns_rr_inthostaddr *rrp= datap;
978
979 mfp_hostaddr(qu,&rrp->ha);
980 }
981
982 static adns_status cs_inthostaddr(vbuf *vb, const void *datap) {
983 const adns_rr_inthostaddr *rrp= datap;
984 char buf[10];
985
986 sprintf(buf,"%u ",rrp->i);
987 CSP_ADDSTR(buf);
988
989 return csp_hostaddr(vb,&rrp->ha);
990 }
991
992 /*
993 * _inthost (cs)
994 */
995
996 static adns_status cs_inthost(vbuf *vb, const void *datap) {
997 const adns_rr_intstr *rrp= datap;
998 char buf[10];
999
1000 sprintf(buf,"%u ",rrp->i);
1001 CSP_ADDSTR(buf);
1002 return csp_domain(vb,rrp->str);
1003 }
1004
1005 /*
1006 * _ptr (pa, +icb_ptr)
1007 */
1008
1009 static void icb_ptr(adns_query parent, adns_query child) {
1010 adns_answer *cans= child->answer;
1011 const union gen_addr *queried;
1012 const unsigned char *found;
1013 adns_state ads= parent->ads;
1014 int i;
1015
1016 if (cans->status == adns_s_nxdomain || cans->status == adns_s_nodata) {
1017 adns__query_fail(parent,adns_s_inconsistent);
1018 return;
1019 } else if (cans->status) {
1020 adns__query_fail(parent,cans->status);
1021 return;
1022 }
1023
1024 queried= &parent->ctx.info.ptr_parent_addr.addr;
1025 for (i=0, found=cans->rrs.bytes; i<cans->nrrs; i++, found += cans->rrsz) {
1026 if (!memcmp(queried,found,cans->rrsz)) {
1027 if (!parent->children.head) {
1028 adns__query_done(parent);
1029 return;
1030 } else {
1031 LIST_LINK_TAIL(ads->childw,parent);
1032 return;
1033 }
1034 }
1035 }
1036
1037 adns__query_fail(parent,adns_s_inconsistent);
1038 }
1039
1040 static adns_status pa_ptr(const parseinfo *pai, int dmstart,
1041 int max, void *datap) {
1042 static const struct {
1043 const afinfo *ai;
1044 const char *const tail[3];
1045 } expectdomain[] = {
1046 { &adns__inet_afinfo, { DNS_INADDR_ARPA, 0 } },
1047 { &adns__inet6_afinfo, { DNS_IP6_ARPA, 0 } }
1048 };
1049 enum { n_ed = sizeof(expectdomain)/sizeof(expectdomain[0]) };
1050
1051 char **rrp= datap;
1052 adns_status st;
1053 struct afinfo_addr *ap;
1054 findlabel_state fls;
1055 byte ipv[n_ed][32];
1056 int cbyte, i, j, foundj = -1, lablen, labstart, id, f, ac;
1057 const char *tp;
1058 adns_query nqu;
1059 qcontext ctx;
1060
1061 cbyte= dmstart;
1062 st= pap_domain(pai, &cbyte, max, rrp,
1063 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1064 if (st) return st;
1065 if (cbyte != max) return adns_s_invaliddata;
1066
1067 ap= &pai->qu->ctx.info.ptr_parent_addr;
1068 if (!ap->ai) {
1069 adns__findlabel_start(&fls, pai->ads, -1, pai->qu,
1070 pai->qu->query_dgram, pai->qu->query_dglen,
1071 pai->qu->query_dglen, DNS_HDRSIZE, 0);
1072
1073 f = (1 << n_ed) - 1; /* superposition of address types */
1074 for (i = 0;; i++) {
1075 st= adns__findlabel_next(&fls,&lablen,&labstart); assert(!st);
1076 if (lablen <= 0) break;
1077 for (j = 0; j < n_ed; j++) {
1078 if (!(f & (1 << j))) continue;
1079 if (i < expectdomain[j].ai->nrevcomp) {
1080 ac = expectdomain[j].ai->rev_parsecomp(
1081 pai->qu->query_dgram + labstart, lablen);
1082 if (ac < 0) goto mismatch;
1083 assert(i < sizeof(ipv[j]));
1084 ipv[j][i] = ac;
1085 } else {
1086 tp = expectdomain[j].tail[i - expectdomain[j].ai->nrevcomp];
1087 if (!tp ||
1088 strncmp(pai->qu->query_dgram + labstart, tp, lablen) != 0 ||
1089 tp[lablen] != 0)
1090 goto mismatch;
1091 }
1092 continue;
1093
1094 mismatch:
1095 f &= ~(1 << j);
1096 if (!f) return adns_s_querydomainwrong;
1097 }
1098 }
1099
1100 if (lablen < 0) return adns_s_querydomainwrong;
1101 for (j = 0; j < n_ed; j++) {
1102 if (!(f & (1 << j))) continue;
1103 if (i >= expectdomain[j].ai->nrevcomp &&
1104 !expectdomain[j].tail[i - expectdomain[j].ai->nrevcomp])
1105 { foundj = j; continue; }
1106 f &= ~(1 << j);
1107 if (!f) return adns_s_querydomainwrong;
1108 }
1109 assert(foundj >= 0 && f == (1 << foundj)); /* collapsed to a single type */
1110
1111 ap->ai = expectdomain[foundj].ai;
1112 ap->ai->rev_mkaddr(&ap->addr, ipv[foundj]);
1113 }
1114
1115 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
1116 pai->dgram, pai->dglen, dmstart,
1117 ap->ai->rrtype, adns_qf_quoteok_query);
1118 if (st) return st;
1119
1120 ctx.ext= 0;
1121 ctx.callback= icb_ptr;
1122 memset(&ctx.info,0,sizeof(ctx.info));
1123 st= adns__internal_submit(pai->ads, &nqu, adns__findtype(ap->ai->rrtype),
1124 ap->ai->rrtype, &pai->qu->vb, id,
1125 adns_qf_quoteok_query, pai->now, &ctx);
1126 if (st) return st;
1127
1128 nqu->parent= pai->qu;
1129 LIST_LINK_TAIL_PART(pai->qu->children,nqu,siblings.);
1130 return adns_s_ok;
1131 }
1132
1133 /*
1134 * _strpair (mf)
1135 */
1136
1137 static void mf_strpair(adns_query qu, void *datap) {
1138 adns_rr_strpair *rrp= datap;
1139
1140 adns__makefinal_str(qu,&rrp->array[0]);
1141 adns__makefinal_str(qu,&rrp->array[1]);
1142 }
1143
1144 /*
1145 * _intstrpair (mf)
1146 */
1147
1148 static void mf_intstrpair(adns_query qu, void *datap) {
1149 adns_rr_intstrpair *rrp= datap;
1150
1151 adns__makefinal_str(qu,&rrp->array[0].str);
1152 adns__makefinal_str(qu,&rrp->array[1].str);
1153 }
1154
1155 /*
1156 * _hinfo (pa)
1157 */
1158
1159 static adns_status pa_hinfo(const parseinfo *pai, int cbyte,
1160 int max, void *datap) {
1161 adns_rr_intstrpair *rrp= datap;
1162 adns_status st;
1163 int i;
1164
1165 for (i=0; i<2; i++) {
1166 st= pap_qstring(pai, &cbyte, max, &rrp->array[i].i, &rrp->array[i].str);
1167 if (st) return st;
1168 }
1169
1170 if (cbyte != max) return adns_s_invaliddata;
1171
1172 return adns_s_ok;
1173 }
1174
1175 /*
1176 * _mailbox (pap,cs)
1177 */
1178
1179 static adns_status pap_mailbox822(const parseinfo *pai,
1180 int *cbyte_io, int max, char **mb_r) {
1181 int lablen, labstart, i, needquote, c, r, neednorm;
1182 const unsigned char *p;
1183 char *str;
1184 findlabel_state fls;
1185 adns_status st;
1186 vbuf *vb;
1187
1188 vb= &pai->qu->vb;
1189 vb->used= 0;
1190 adns__findlabel_start(&fls, pai->ads,
1191 -1, pai->qu,
1192 pai->dgram, pai->dglen, max,
1193 *cbyte_io, cbyte_io);
1194 st= adns__findlabel_next(&fls,&lablen,&labstart);
1195 if (!lablen) {
1196 adns__vbuf_appendstr(vb,".");
1197 goto x_ok;
1198 }
1199
1200 neednorm= 1;
1201 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++) {
1202 c= *p++;
1203 if ((c&~128) < 32 || (c&~128) == 127) return adns_s_invaliddata;
1204 if (c == '.' && !neednorm) neednorm= 1;
1205 else if (c==' ' || c>=127 || ctype_822special(c)) needquote++;
1206 else neednorm= 0;
1207 }
1208
1209 if (needquote || neednorm) {
1210 r= adns__vbuf_ensure(vb, lablen+needquote+4); if (!r) R_NOMEM;
1211 adns__vbuf_appendq(vb,"\"",1);
1212 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++, p++) {
1213 c= *p;
1214 if (c == '"' || c=='\\') adns__vbuf_appendq(vb,"\\",1);
1215 adns__vbuf_appendq(vb,p,1);
1216 }
1217 adns__vbuf_appendq(vb,"\"",1);
1218 } else {
1219 r= adns__vbuf_append(vb, pai->dgram+labstart, lablen); if (!r) R_NOMEM;
1220 }
1221
1222 r= adns__vbuf_appendstr(vb,"@"); if (!r) R_NOMEM;
1223
1224 st= adns__parse_domain_more(&fls,pai->ads, pai->qu,vb,0, pai->dgram);
1225 if (st) return st;
1226
1227 x_ok:
1228 str= adns__alloc_interim(pai->qu, vb->used+1); if (!str) R_NOMEM;
1229 memcpy(str,vb->buf,vb->used);
1230 str[vb->used]= 0;
1231 *mb_r= str;
1232 return adns_s_ok;
1233 }
1234
1235 static adns_status pap_mailbox(const parseinfo *pai, int *cbyte_io, int max,
1236 char **mb_r) {
1237 if (pai->qu->typei->typekey & adns__qtf_mail822) {
1238 return pap_mailbox822(pai, cbyte_io, max, mb_r);
1239 } else {
1240 return pap_domain(pai, cbyte_io, max, mb_r, pdf_quoteok);
1241 }
1242 }
1243
1244 static adns_status csp_mailbox(vbuf *vb, const char *mailbox) {
1245 return csp_domain(vb,mailbox);
1246 }
1247
1248 /*
1249 * _rp (pa,cs)
1250 */
1251
1252 static adns_status pa_rp(const parseinfo *pai, int cbyte,
1253 int max, void *datap) {
1254 adns_rr_strpair *rrp= datap;
1255 adns_status st;
1256
1257 st= pap_mailbox(pai, &cbyte, max, &rrp->array[0]);
1258 if (st) return st;
1259
1260 st= pap_domain(pai, &cbyte, max, &rrp->array[1], pdf_quoteok);
1261 if (st) return st;
1262
1263 if (cbyte != max) return adns_s_invaliddata;
1264 return adns_s_ok;
1265 }
1266
1267 static adns_status cs_rp(vbuf *vb, const void *datap) {
1268 const adns_rr_strpair *rrp= datap;
1269 adns_status st;
1270
1271 st= csp_mailbox(vb,rrp->array[0]); if (st) return st;
1272 CSP_ADDSTR(" ");
1273 st= csp_domain(vb,rrp->array[1]); if (st) return st;
1274
1275 return adns_s_ok;
1276 }
1277
1278 /*
1279 * _soa (pa,mf,cs)
1280 */
1281
1282 static adns_status pa_soa(const parseinfo *pai, int cbyte,
1283 int max, void *datap) {
1284 adns_rr_soa *rrp= datap;
1285 const byte *dgram= pai->dgram;
1286 adns_status st;
1287 int msw, lsw, i;
1288
1289 st= pap_domain(pai, &cbyte, max, &rrp->mname,
1290 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1291 if (st) return st;
1292
1293 st= pap_mailbox(pai, &cbyte, max, &rrp->rname);
1294 if (st) return st;
1295
1296 if (cbyte+20 != max) return adns_s_invaliddata;
1297
1298 for (i=0; i<5; i++) {
1299 GET_W(cbyte,msw);
1300 GET_W(cbyte,lsw);
1301 (&rrp->serial)[i]= (msw<<16) | lsw;
1302 }
1303
1304 return adns_s_ok;
1305 }
1306
1307 static void mf_soa(adns_query qu, void *datap) {
1308 adns_rr_soa *rrp= datap;
1309
1310 adns__makefinal_str(qu,&rrp->mname);
1311 adns__makefinal_str(qu,&rrp->rname);
1312 }
1313
1314 static adns_status cs_soa(vbuf *vb, const void *datap) {
1315 const adns_rr_soa *rrp= datap;
1316 char buf[20];
1317 int i;
1318 adns_status st;
1319
1320 st= csp_domain(vb,rrp->mname); if (st) return st;
1321 CSP_ADDSTR(" ");
1322 st= csp_mailbox(vb,rrp->rname); if (st) return st;
1323
1324 for (i=0; i<5; i++) {
1325 sprintf(buf," %lu",(&rrp->serial)[i]);
1326 CSP_ADDSTR(buf);
1327 }
1328
1329 return adns_s_ok;
1330 }
1331
1332 /*
1333 * _srv* (pa*2,di,cs*2,qdpl,postsort)
1334 */
1335
1336 static adns_status qdpl_srv(adns_state ads,
1337 const char **p_io, const char *pe, int labelnum,
1338 char label_r[DNS_MAXDOMAIN], int *ll_io,
1339 adns_queryflags flags,
1340 const typeinfo *typei) {
1341 int useflags;
1342 const char *p_orig;
1343 adns_status st;
1344
1345 if (labelnum < 2 && !(flags & adns_qf_quoteok_query)) {
1346 useflags= adns_qf_quoteok_query;
1347 p_orig= *p_io;
1348 } else {
1349 useflags= flags;
1350 p_orig= 0;
1351 }
1352 st= adns__qdpl_normal(ads, p_io,pe, labelnum,label_r, ll_io, useflags,typei);
1353 if (st) return st;
1354
1355 if (p_orig) {
1356 int ll= *ll_io;
1357 if (!ll || label_r[0]!='_')
1358 return adns_s_querydomaininvalid;
1359 if (memchr(p_orig+1, '\\', pe - (p_orig+1)))
1360 return adns_s_querydomaininvalid;
1361 }
1362 return adns_s_ok;
1363 }
1364
1365 static adns_status pap_srv_begin(const parseinfo *pai, int *cbyte_io, int max,
1366 adns_rr_srvha *rrp
1367 /* might be adns_rr_srvraw* */) {
1368 const byte *dgram= pai->dgram;
1369 int ti, cbyte;
1370
1371 cbyte= *cbyte_io;
1372 if ((*cbyte_io += 6) > max) return adns_s_invaliddata;
1373
1374 rrp->priority= GET_W(cbyte, ti);
1375 rrp->weight= GET_W(cbyte, ti);
1376 rrp->port= GET_W(cbyte, ti);
1377 return adns_s_ok;
1378 }
1379
1380 static adns_status pa_srvraw(const parseinfo *pai, int cbyte,
1381 int max, void *datap) {
1382 adns_rr_srvraw *rrp= datap;
1383 adns_status st;
1384
1385 st= pap_srv_begin(pai,&cbyte,max,datap);
1386 if (st) return st;
1387
1388 st= pap_domain(pai, &cbyte, max, &rrp->host,
1389 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1390 if (st) return st;
1391
1392 if (cbyte != max) return adns_s_invaliddata;
1393 return adns_s_ok;
1394 }
1395
1396 static adns_status pa_srvha(const parseinfo *pai, int cbyte,
1397 int max, void *datap) {
1398 adns_rr_srvha *rrp= datap;
1399 adns_status st;
1400
1401 st= pap_srv_begin(pai,&cbyte,max,datap); if (st) return st;
1402 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha); if (st) return st;
1403 if (cbyte != max) return adns_s_invaliddata;
1404 return adns_s_ok;
1405 }
1406
1407 static void mf_srvraw(adns_query qu, void *datap) {
1408 adns_rr_srvraw *rrp= datap;
1409 adns__makefinal_str(qu, &rrp->host);
1410 }
1411
1412 static void mf_srvha(adns_query qu, void *datap) {
1413 adns_rr_srvha *rrp= datap;
1414 mfp_hostaddr(qu,&rrp->ha);
1415 }
1416
1417 static int di_srv(adns_state ads, const void *datap_a, const void *datap_b) {
1418 const adns_rr_srvraw *ap= datap_a, *bp= datap_b;
1419 /* might be const adns_rr_svhostaddr* */
1420
1421 if (ap->priority < bp->priority) return 0;
1422 if (ap->priority > bp->priority) return 1;
1423 return 0;
1424 }
1425
1426 static adns_status csp_srv_begin(vbuf *vb, const adns_rr_srvha *rrp
1427 /* might be adns_rr_srvraw* */) {
1428 char buf[30];
1429 sprintf(buf,"%u %u %u ", rrp->priority, rrp->weight, rrp->port);
1430 CSP_ADDSTR(buf);
1431 return adns_s_ok;
1432 }
1433
1434 static adns_status cs_srvraw(vbuf *vb, const void *datap) {
1435 const adns_rr_srvraw *rrp= datap;
1436 adns_status st;
1437
1438 st= csp_srv_begin(vb,(const void*)rrp); if (st) return st;
1439 return csp_domain(vb,rrp->host);
1440 }
1441
1442 static adns_status cs_srvha(vbuf *vb, const void *datap) {
1443 const adns_rr_srvha *rrp= datap;
1444 adns_status st;
1445
1446 st= csp_srv_begin(vb,(const void*)datap); if (st) return st;
1447 return csp_hostaddr(vb,&rrp->ha);
1448 }
1449
1450 static void postsort_srv(adns_state ads, void *array, int nrrs,
1451 const struct typeinfo *typei) {
1452 /* we treat everything in the array as if it were an adns_rr_srvha
1453 * even though the array might be of adns_rr_srvraw. That's OK
1454 * because they have the same prefix, which is all we access.
1455 * We use typei->rrsz, too, rather than naive array indexing, of course.
1456 */
1457 char *workbegin, *workend, *search, *arrayend;
1458 const adns_rr_srvha *rr;
1459 union { adns_rr_srvha ha; adns_rr_srvraw raw; } rrtmp;
1460 int cpriority, totalweight, runtotal;
1461 long randval;
1462
1463 for (workbegin= array, arrayend= workbegin + typei->rrsz * nrrs;
1464 workbegin < arrayend;
1465 workbegin= workend) {
1466 cpriority= (rr=(void*)workbegin)->priority;
1467
1468 for (workend= workbegin, totalweight= 0;
1469 workend < arrayend && (rr=(void*)workend)->priority == cpriority;
1470 workend += typei->rrsz) {
1471 totalweight += rr->weight;
1472 }
1473
1474 /* Now workbegin..(workend-1) incl. are exactly all of the RRs of
1475 * cpriority. From now on, workbegin points to the `remaining'
1476 * records: we select one record at a time (RFC2782 `Usage rules'
1477 * and `Format of the SRV RR' subsection `Weight') to place at
1478 * workbegin (swapping with the one that was there, and then
1479 * advance workbegin. */
1480 for (;
1481 workbegin + typei->rrsz < workend; /* don't bother if just one */
1482 workbegin += typei->rrsz) {
1483
1484 randval= nrand48(ads->rand48xsubi);
1485 randval %= (totalweight + 1);
1486 /* makes it into 0..totalweight inclusive; with 2^10 RRs,
1487 * totalweight must be <= 2^26 so probability nonuniformity is
1488 * no worse than 1 in 2^(31-26) ie 1 in 2^5, ie
1489 * abs(log(P_intended(RR_i) / P_actual(RR_i)) <= log(2^-5).
1490 */
1491
1492 for (search=workbegin, runtotal=0;
1493 (runtotal += (rr=(void*)search)->weight) < randval;
1494 search += typei->rrsz);
1495 assert(search < arrayend);
1496 totalweight -= rr->weight;
1497 if (search != workbegin) {
1498 memcpy(&rrtmp, workbegin, typei->rrsz);
1499 memcpy(workbegin, search, typei->rrsz);
1500 memcpy(search, &rrtmp, typei->rrsz);
1501 }
1502 }
1503 }
1504 /* tests:
1505 * dig -t srv _srv._tcp.test.iwj.relativity.greenend.org.uk.
1506 * ./adnshost_s -t srv- _sip._udp.voip.net.cam.ac.uk.
1507 * ./adnshost_s -t srv- _jabber._tcp.jabber.org
1508 */
1509 }
1510
1511 /*
1512 * _byteblock (mf)
1513 */
1514
1515 static void mf_byteblock(adns_query qu, void *datap) {
1516 adns_rr_byteblock *rrp= datap;
1517 void *bytes= rrp->data;
1518 adns__makefinal_block(qu,&bytes,rrp->len);
1519 rrp->data= bytes;
1520 }
1521
1522 /*
1523 * _opaque (pa,cs)
1524 */
1525
1526 static adns_status pa_opaque(const parseinfo *pai, int cbyte,
1527 int max, void *datap) {
1528 adns_rr_byteblock *rrp= datap;
1529
1530 rrp->len= max - cbyte;
1531 rrp->data= adns__alloc_interim(pai->qu, rrp->len);
1532 if (!rrp->data) R_NOMEM;
1533 memcpy(rrp->data, pai->dgram + cbyte, rrp->len);
1534 return adns_s_ok;
1535 }
1536
1537 static adns_status cs_opaque(vbuf *vb, const void *datap) {
1538 const adns_rr_byteblock *rrp= datap;
1539 char buf[10];
1540 int l;
1541 unsigned char *p;
1542
1543 sprintf(buf,"\\# %d",rrp->len);
1544 CSP_ADDSTR(buf);
1545
1546 for (l= rrp->len, p= rrp->data;
1547 l>=4;
1548 l -= 4, p += 4) {
1549 sprintf(buf," %02x%02x%02x%02x",p[0],p[1],p[2],p[3]);
1550 CSP_ADDSTR(buf);
1551 }
1552 for (;
1553 l>0;
1554 l--, p++) {
1555 sprintf(buf," %02x",*p);
1556 CSP_ADDSTR(buf);
1557 }
1558 return adns_s_ok;
1559 }
1560
1561 /*
1562 * _flat (mf)
1563 */
1564
1565 static void mf_flat(adns_query qu, void *data) { }
1566
1567 /*
1568 * Now the table.
1569 */
1570
1571 #define TYPESZ_M(member) (sizeof(*((adns_answer*)0)->rrs.member))
1572
1573 #define DEEP_MEMB(memb) TYPESZ_M(memb), mf_##memb, cs_##memb
1574 #define FLAT_MEMB(memb) TYPESZ_M(memb), mf_flat, cs_##memb
1575
1576 #define DEEP_TYPE(code,rrt,fmt,memb,parser,comparer,printer) \
1577 { adns_r_##code & adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), \
1578 mf_##memb, printer,parser,comparer, adns__qdpl_normal,0,0 }
1579 #define FLAT_TYPE(code,rrt,fmt,memb,parser,comparer,printer) \
1580 { adns_r_##code & adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), \
1581 mf_flat, printer,parser,comparer, adns__qdpl_normal,0,0 }
1582 #define XTRA_TYPE(code,rrt,fmt,memb,parser,comparer,printer, \
1583 makefinal,qdpl,postsort,sender) \
1584 { adns_r_##code & adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), makefinal, \
1585 printer,parser,comparer,qdpl,postsort,sender }
1586
1587 static const typeinfo typeinfos[] = {
1588 /* Must be in ascending order of rrtype ! */
1589 /* mem-mgmt code rrt fmt member parser comparer printer */
1590
1591 FLAT_TYPE(a, "A", 0, inaddr, pa_inaddr, di_inaddr,cs_inaddr ),
1592 DEEP_TYPE(ns_raw, "NS", "raw",str, pa_host_raw,0, cs_domain ),
1593 DEEP_TYPE(cname, "CNAME", 0, str, pa_dom_raw, 0, cs_domain ),
1594 DEEP_TYPE(soa_raw,"SOA", "raw",soa, pa_soa, 0, cs_soa ),
1595 DEEP_TYPE(ptr_raw,"PTR", "raw",str, pa_host_raw,0, cs_domain ),
1596 DEEP_TYPE(hinfo, "HINFO", 0, intstrpair,pa_hinfo, 0, cs_hinfo ),
1597 DEEP_TYPE(mx_raw, "MX", "raw",intstr, pa_mx_raw, di_mx_raw,cs_inthost ),
1598 DEEP_TYPE(txt, "TXT", 0, manyistr,pa_txt, 0, cs_txt ),
1599 DEEP_TYPE(rp_raw, "RP", "raw",strpair, pa_rp, 0, cs_rp ),
1600 FLAT_TYPE(aaaa, "AAAA", 0, in6addr, pa_in6addr, di_in6addr,cs_in6addr ),
1601 XTRA_TYPE(srv_raw,"SRV", "raw",srvraw , pa_srvraw, di_srv, cs_srvraw,
1602 mf_srvraw, qdpl_srv, postsort_srv, 0),
1603
1604 XTRA_TYPE(addr, "A", "addr", addr, pa_addr, di_addr, cs_addr,
1605 mf_flat, adns__qdpl_normal, 0, qs_addr),
1606 DEEP_TYPE(ns, "NS", "+addr",hostaddr,pa_hostaddr,di_hostaddr,cs_hostaddr ),
1607 DEEP_TYPE(ptr, "PTR","checked",str, pa_ptr, 0, cs_domain ),
1608 DEEP_TYPE(mx, "MX", "+addr",inthostaddr,pa_mx, di_mx, cs_inthostaddr),
1609 XTRA_TYPE(srv, "SRV","+addr",srvha, pa_srvha, di_srv, cs_srvha,
1610 mf_srvha, qdpl_srv, postsort_srv, 0),
1611
1612 DEEP_TYPE(soa, "SOA","822", soa, pa_soa, 0, cs_soa ),
1613 DEEP_TYPE(rp, "RP", "822", strpair, pa_rp, 0, cs_rp ),
1614 };
1615
1616 static const typeinfo typeinfo_unknown=
1617 DEEP_TYPE(unknown,0, "unknown",byteblock,pa_opaque, 0, cs_opaque );
1618
1619 const typeinfo *adns__findtype(adns_rrtype type) {
1620 const typeinfo *begin, *end, *mid;
1621
1622 if (type & adns_r_unknown) return &typeinfo_unknown;
1623 type &= adns_rrt_reprmask;
1624
1625 begin= typeinfos; end= typeinfos+(sizeof(typeinfos)/sizeof(typeinfo));
1626
1627 while (begin < end) {
1628 mid= begin + ((end-begin)>>1);
1629 if (mid->typekey == type) return mid;
1630 if (type > mid->typekey) begin= mid+1;
1631 else end= mid;
1632 }
1633 return 0;
1634 }