10cb1ce85dc0110468820a44271b7ed0bcc65d46
[adns] / src / addrfam.c
1 /*
2 * addrfam.c
3 * - address-family specific code
4 */
5 /*
6 * This file is part of adns, which is
7 * Copyright (C) 1997-2000,2003,2006 Ian Jackson
8 * Copyright (C) 1999-2000,2003,2006 Tony Finch
9 * Copyright (C) 1991 Massachusetts Institute of Technology
10 * (See the file INSTALL for full details.)
11 *
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2, or (at your option)
15 * any later version.
16 *
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software Foundation,
24 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25 */
26
27 #include <stdlib.h>
28 #include <errno.h>
29 #include <limits.h>
30 #include <unistd.h>
31 #include <inttypes.h>
32 #include <stddef.h>
33 #include <stdbool.h>
34
35 #include <sys/types.h>
36 #include <netdb.h>
37 #include <sys/socket.h>
38 #include <netinet/in.h>
39 #include <arpa/inet.h>
40 #include <netinet/in.h>
41 #include <net/if.h>
42
43 #include "internal.h"
44
45 /*
46 * General address-family operations.
47 */
48
49 #define SIN(sa) ((struct sockaddr_in *)(sa))
50 #define CSIN(sa) ((const struct sockaddr_in *)(sa))
51
52 #define SIN6(sa) ((struct sockaddr_in6 *)(sa))
53 #define CSIN6(sa) ((const struct sockaddr_in6 *)(sa))
54
55 /* This gadget (thanks, Richard Kettlewell) makes sure that we handle the
56 * same set of address families in each switch. */
57 #define AF_CASES(pre) \
58 case AF_INET: goto pre##_inet; \
59 case AF_INET6: goto pre##_inet6
60
61 static void unknown_af(int af) {
62 fprintf(stderr, "ADNS INTERNAL: unknown address family %d\n", af);
63 abort();
64 }
65
66 int adns__af_supported_p(int af)
67 {
68 switch (af) {
69 AF_CASES(af);
70 af_inet: af_inet6: return 1;
71 default: return 0;
72 }
73 }
74
75 int adns__sockaddr_equal_p(const struct sockaddr *sa,
76 const struct sockaddr *sb)
77 {
78 if (sa->sa_family != sb->sa_family) return 0;
79 switch (sa->sa_family) {
80 AF_CASES(af);
81 af_inet: {
82 const struct sockaddr_in *sina = CSIN(sa), *sinb = CSIN(sb);
83 return (sina->sin_addr.s_addr == sinb->sin_addr.s_addr &&
84 sina->sin_port == sinb->sin_port);
85 }
86 af_inet6: {
87 /* Don't check the flowlabel. That's apparently useful for routing
88 * performance, but doesn't affect the address in any important
89 * respect.
90 */
91 const struct sockaddr_in6 *sin6a = CSIN6(sa), *sin6b = CSIN6(sb);
92 return (memcmp(sin6a->sin6_addr.s6_addr,
93 sin6b->sin6_addr.s6_addr,
94 sizeof(sin6a->sin6_addr.s6_addr)) == 0 &&
95 sin6a->sin6_port == sin6b->sin6_port &&
96 sin6a->sin6_scope_id == sin6b->sin6_scope_id);
97 }
98 default:
99 unknown_af(sa->sa_family);
100 return -1;
101 }
102 }
103
104 int adns__gen_pton(const char *p, int *af_r, union gen_addr *addr_r)
105 {
106 static const int aflist[] = { AF_INET6, AF_INET };
107 int i, rc;
108
109 for (i = 0; i < sizeof(aflist)/sizeof(*aflist); i++) {
110 rc = inet_pton(aflist[i], p, addr_r);
111 assert(rc >= 0);
112 if (rc) { *af_r = aflist[i]; return 1; }
113 }
114 return 0;
115 }
116
117 int adns__addr_width(int af)
118 {
119 switch (af) {
120 AF_CASES(af);
121 af_inet: return 32;
122 af_inet6: return 128;
123 default: unknown_af(af); return -1;
124 }
125 }
126
127 void adns__prefix_mask(int af, int len, union gen_addr *mask_r)
128 {
129 switch (af) {
130 AF_CASES(af);
131 af_inet:
132 assert(len <= 32);
133 mask_r->v4.s_addr = htonl(!len ? 0 : 0xffffffff << (32 - len));
134 break;
135 af_inet6: {
136 int i = len/8, j = len%8;
137 unsigned char *m = mask_r->v6.s6_addr;
138
139 assert(len <= 128);
140 memset(m, 0xff, i);
141 if (j) m[i++] = (0xff << (8-j)) & 0xff;
142 memset(m+i, 0, 16-i);
143 } break;
144 default:
145 unknown_af(af);
146 break;
147 }
148 }
149
150 int adns__guess_prefix_length(int af, const union gen_addr *addr)
151 {
152 switch (af) {
153 AF_CASES(af);
154 af_inet: {
155 unsigned a = (ntohl(addr->v4.s_addr) >> 24) & 0xff;
156
157 if (a < 128) return 8;
158 else if (a < 192) return 16;
159 else if (a < 224) return 24;
160 else return -1;
161 } break;
162 af_inet6:
163 return 64;
164 default:
165 unknown_af(af);
166 return -1;
167 }
168 }
169
170 int adns__addr_match_p(int addraf, const union gen_addr *addr,
171 int netaf, const union gen_addr *base,
172 const union gen_addr *mask)
173 {
174 if (addraf != netaf) return 0;
175 switch (addraf) {
176 AF_CASES(af);
177 af_inet:
178 return (addr->v4.s_addr & mask->v4.s_addr) == base->v4.s_addr;
179 af_inet6: {
180 int i;
181 const char *a = addr->v6.s6_addr;
182 const char *b = base->v6.s6_addr;
183 const char *m = mask->v6.s6_addr;
184
185 for (i = 0; i < 16; i++)
186 if ((a[i] & m[i]) != b[i]) return 0;
187 return 1;
188 } break;
189 default:
190 unknown_af(addraf);
191 return -1;
192 }
193 }
194
195 const void *adns__sockaddr_to_inaddr(const struct sockaddr *sa)
196 {
197 switch (sa->sa_family) {
198 AF_CASES(af);
199 af_inet: return &CSIN(sa)->sin_addr;
200 af_inet6: return &CSIN6(sa)->sin6_addr;
201 default: unknown_af(sa->sa_family); return 0;
202 }
203 }
204
205 /*
206 * addr2text and text2addr
207 */
208
209 #define ADDRFAM_DEBUG
210 #ifdef ADDRFAM_DEBUG
211 # define af_debug(fmt,...) \
212 (fprintf(stderr, "%s: " fmt "\n", __func__, __VA_ARGS__))
213 #else
214 # define af_debug(fmt,...) ((void)("" fmt "", __VA_ARGS__))
215 #endif
216
217 static bool addrtext_our_errno(int e) {
218 return
219 e==EAFNOSUPPORT ||
220 e==EINVAL ||
221 e==ENOSPC ||
222 e==ENOSYS;
223 }
224
225 int adns_text2addr(const char *addr, uint16_t port, struct sockaddr *sa,
226 socklen_t *salen /* set if OK or ENOSPC */) {
227 int af;
228 char copybuf[INET6_ADDRSTRLEN];
229 const char *parse=addr;
230 const char *scopestr=0;
231 socklen_t needlen;
232 void *dst;
233 uint16_t *portp;
234
235 #define INVAL(how) do{ \
236 af_debug("invalid: %s: `%s'", how, addr); \
237 return EINVAL; \
238 }while(0)
239
240 #define AFCORE(INETx,SINx,sinx) \
241 af= AF_##INETx; \
242 dst = &SINx(sa)->sinx##_addr; \
243 portp = &SINx(sa)->sinx##_port; \
244 needlen= sizeof(*SINx(sa));
245
246 if (!strchr(addr, ':')) { /* INET */
247
248 AFCORE(INET,SIN,sin);
249
250 } else { /* INET6 */
251
252 AFCORE(INET6,SIN6,sin6);
253
254 const char *percent= strchr(addr, '%');
255 if (percent) {
256 ptrdiff_t lhslen = percent - addr;
257 if (lhslen >= INET6_ADDRSTRLEN) INVAL("scoped addr lhs too long");
258 memcpy(copybuf, addr, lhslen);
259 copybuf[lhslen]= 0;
260
261 parse= copybuf;
262 scopestr= percent+1;
263
264 af_debug("will parse scoped address `%s' %% `%s'", parse, scopestr);
265 }
266
267 }
268
269 #undef AFCORE
270
271 if (*salen < needlen) {
272 *salen = needlen;
273 return ENOSPC;
274 }
275 *salen = needlen;
276
277 memset(sa, 0, needlen);
278
279 sa->sa_family= af;
280 *portp = htons(port);
281
282 int r= inet_pton(af,parse,dst);
283 if (!r) INVAL("inet_pton rejected");
284 if (r<0) {
285 af_debug("inet_pton failed on `%s'", parse);
286 return errno;
287 }
288
289 if (scopestr) {
290 errno=0;
291 char *ep;
292 unsigned long scope= strtoul(scopestr,&ep,10);
293 if (errno==ERANGE) INVAL("numeric scope id too large for unsigned long");
294 assert(!errno);
295 if (!*ep) {
296 if (scope > ~(uint32_t)0)
297 INVAL("numeric scope id too large for uint32_t");
298 } else { /* !!*ep */
299 const struct in6_addr *in6= &SIN6(sa)->sin6_addr;
300 if (!IN6_IS_ADDR_LINKLOCAL(in6) &&
301 !IN6_IS_ADDR_MC_LINKLOCAL(in6)) {
302 af_debug("cannot convert non-numeric scope"
303 " in non-link-local addr `%s'", addr);
304 return ENOSYS;
305 }
306 errno= 0;
307 scope= if_nametoindex(scopestr);
308 if (!scope) {
309 /* RFC3493 says "No errors are defined". It's not clear
310 * whether that is supposed to mean if_nametoindex "can't
311 * fail" (other than by the supplied name not being that of an
312 * interface) which seems unrealistic, or that it conflates
313 * all its errors together by failing to set errno, or simply
314 * that they didn't bother to document the errors.
315 *
316 * glibc, FreeBSD and OpenBSD all set errno (to ENXIO when
317 * appropriate). See Debian bug #749349.
318 *
319 * We attempt to deal with this by clearing errno to start
320 * with, and then perhaps mapping the results. */
321 af_debug("if_nametoindex rejected scope name (errno=%s)",
322 strerror(errno));
323 if (errno==0) {
324 return ENXIO;
325 } else if (addrtext_our_errno(errno)) {
326 /* we use these for other purposes, urgh. */
327 perror("adns: adns_text2addr: if_nametoindex"
328 " failed with unexpected error");
329 return EIO;
330 } else {
331 return errno;
332 }
333 } else { /* ix>0 */
334 if (scope > ~(uint32_t)0) {
335 fprintf(stderr,"adns: adns_text2addr: if_nametoindex"
336 " returned an interface index >=2^32 which will not fit"
337 " in sockaddr_in6.sin6_scope_id");
338 return EIO;
339 }
340 }
341 } /* else; !!*ep */
342
343 SIN6(sa)->sin6_scope_id= scope;
344 } /* if (scopestr) */
345
346 return 0;
347 }
348
349 int adns_addr2text(const struct sockaddr *sa,
350 char *addr_buffer, int *addr_buflen,
351 int *port_r) {
352 const void *src;
353 int port;
354
355 if (*addr_buflen < ADNS_ADDR2TEXT_BUFLEN) {
356 *addr_buflen = ADNS_ADDR2TEXT_BUFLEN;
357 return ENOSPC;
358 }
359
360 switch (sa->sa_family) {
361 AF_CASES(af);
362 af_inet: src= &CSIN(sa)->sin_addr; port= CSIN(sa)->sin_port; break;
363 af_inet6: src= &CSIN6(sa)->sin6_addr; port= CSIN6(sa)->sin6_port; break;
364 default: return EAFNOSUPPORT;
365 }
366
367 const char *ok= inet_ntop(sa->sa_family, src, addr_buffer, *addr_buflen);
368 assert(ok);
369
370 if (sa->sa_family == AF_INET6) {
371 uint32_t scope = CSIN6(sa)->sin6_scope_id;
372 if (scope) {
373 int scopeoffset = strlen(addr_buffer);
374 int remain = *addr_buflen - scopeoffset;
375 char *scopeptr = addr_buffer + scopeoffset;
376 assert(remain >= IF_NAMESIZE+1/*%*/);
377 *scopeptr++= '%'; remain--;
378 char *ok = scope > UINT_MAX
379 ? 0 /* we can't pass it to if_indextoname then */
380 : if_indextoname(scope, scopeptr);
381 if (!ok) {
382 if (errno==ENXIO) {
383 /* fair enough, show it as a number then */
384 } else if (addrtext_our_errno(errno)) {
385 /* we use these for other purposes, urgh. */
386 perror("adns: adns_addr2text: if_indextoname"
387 " failed with unexpected error");
388 return EIO;
389 } else {
390 return errno;
391 }
392 int r = snprintf(scopeptr, remain,
393 "%"PRIu32"", scope);
394 assert(r < *addr_buflen - scopeoffset);
395 }
396 af_debug("printed scoped address `%s'", addr_buffer);
397 }
398 }
399
400 if (port_r) *port_r= ntohs(port);
401 return 0;
402 }
403
404 /*
405 * Reverse-domain parsing and construction.
406 */
407
408 int adns__make_reverse_domain(const struct sockaddr *sa,
409 const char *zone,
410 char **buf_io, size_t bufsz,
411 char **buf_free_r)
412 {
413 size_t req;
414 char *p;
415 unsigned c, y;
416 unsigned long aa;
417 const unsigned char *ap;
418 int i, j;
419
420 switch (sa->sa_family) {
421 AF_CASES(af);
422 af_inet:
423 req = 4 * 4;
424 if (!zone) zone = "in-addr.arpa";
425 break;
426 af_inet6:
427 req = 2 * 32;
428 if (!zone) zone = "ip6.arpa";
429 break;
430 default:
431 return ENOSYS;
432 }
433
434 req += strlen(zone) + 1;
435 if (req <= bufsz)
436 p = *buf_io;
437 else {
438 p = malloc(req); if (!p) return errno;
439 *buf_free_r = p;
440 }
441
442 *buf_io = p;
443 switch (sa->sa_family) {
444 AF_CASES(bf);
445 bf_inet:
446 aa = ntohl(CSIN(sa)->sin_addr.s_addr);
447 for (i = 0; i < 4; i++) {
448 p += sprintf(p, "%d", (int)(aa & 0xff));
449 *p++ = '.';
450 aa >>= 8;
451 }
452 break;
453 bf_inet6:
454 ap = CSIN6(sa)->sin6_addr.s6_addr + 16;
455 for (i = 0; i < 16; i++) {
456 c = *--ap;
457 for (j = 0; j < 2; j++) {
458 y = c & 0xf;
459 if (y < 10) *p++ = y + '0';
460 else *p++ = y - 10 + 'a';
461 c >>= 4;
462 *p++ = '.';
463 }
464 }
465 break;
466 default:
467 unknown_af(sa->sa_family);
468 }
469
470 strcpy(p, zone);
471 return 0;
472 }
473
474
475 static int inet_rev_parsecomp(const char *p, size_t n)
476 {
477 int i = 0;
478 if (n > 3) return -1;
479
480 while (n--) {
481 if ('0' <= *p && *p <= '9') i = 10*i + *p++ - '0';
482 else return -1;
483 }
484 return i;
485 }
486
487 static void inet_rev_mkaddr(union gen_addr *addr, const byte *ipv)
488 {
489 addr->v4.s_addr = htonl((ipv[3]<<24) | (ipv[2]<<16) |
490 (ipv[1]<<8) | (ipv[0]));
491 }
492
493 static int inet6_rev_parsecomp(const char *p, size_t n)
494 {
495 if (n != 1) return -1;
496 else if ('0' <= *p && *p <= '9') return *p - '0';
497 else if ('a' <= *p && *p <= 'f') return *p - 'a' + 10;
498 else if ('A' <= *p && *p <= 'F') return *p - 'a' + 10;
499 else return -1;
500 }
501
502 static void inet6_rev_mkaddr(union gen_addr *addr, const byte *ipv)
503 {
504 unsigned char *a = addr->v6.s6_addr;
505 int i;
506
507 for (i = 0; i < 16; i++)
508 a[i] = (ipv[31-2*i] << 4) | (ipv[30-2*i] << 0);
509 }
510
511 static const struct revparse_domain {
512 int af; /* address family */
513 int nrevlab; /* n of reverse-address labels */
514 adns_rrtype rrtype; /* forward-lookup type */
515
516 int (*rev_parsecomp)(const char *p, size_t n);
517 /* parse a single component from a label; return the integer value, or -1
518 * if it was unintelligible.
519 */
520
521 void (*rev_mkaddr)(union gen_addr *addr, const byte *ipv);
522 /* write out the parsed address from a vector of parsed components */
523
524 const char *const tail[3]; /* tail label names */
525 } revparse_domains[NREVDOMAINS] = {
526 { AF_INET, 4, adns_r_a, inet_rev_parsecomp, inet_rev_mkaddr,
527 { DNS_INADDR_ARPA, 0 } },
528 { AF_INET6, 32, adns_r_aaaa, inet6_rev_parsecomp, inet6_rev_mkaddr,
529 { DNS_IP6_ARPA, 0 } },
530 };
531
532 #define REVDOMAIN_MAP(rps, labnum) \
533 ((labnum) ? (rps)->map : (1 << NREVDOMAINS) - 1)
534
535 int adns__revparse_label(struct revparse_state *rps, int labnum,
536 const char *label, int lablen)
537 {
538 unsigned f = REVDOMAIN_MAP(rps, labnum);
539 const struct revparse_domain *rpd;
540 const char *tp;
541 unsigned d;
542 int i, ac;
543
544 for (rpd=revparse_domains, i=0, d=1; i<NREVDOMAINS; rpd++, i++, d <<= 1) {
545 if (!(f & d)) continue;
546 if (labnum >= rpd->nrevlab) {
547 tp = rpd->tail[labnum - rpd->nrevlab];
548 if (!tp || strncmp(label, tp, lablen) != 0 || tp[lablen])
549 goto mismatch;
550 } else {
551 ac = rpd->rev_parsecomp(label, lablen);
552 if (ac < 0) goto mismatch;
553 assert(labnum < sizeof(rps->ipv[i]));
554 rps->ipv[i][labnum] = ac;
555 }
556 continue;
557
558 mismatch:
559 f &= ~d;
560 if (!f) return -1;
561 }
562
563 rps->map = f;
564 return 0;
565 }
566
567 int adns__revparse_done(struct revparse_state *rps, int nlabels,
568 adns_rrtype *rrtype_r, struct af_addr *addr_r)
569 {
570 unsigned f = REVDOMAIN_MAP(rps, nlabels);
571 const struct revparse_domain *rpd;
572 unsigned d;
573 int i, found = -1;
574
575 for (rpd=revparse_domains, i=0, d=1; i<NREVDOMAINS; rpd++, i++, d <<= 1) {
576 if (!(f & d)) continue;
577 if (nlabels >= rpd->nrevlab && !rpd->tail[nlabels - rpd->nrevlab])
578 { found = i; continue; }
579 f &= ~d;
580 if (!f) return -1;
581 }
582 assert(found >= 0); assert(f == (1 << found));
583
584 rpd = &revparse_domains[found];
585 *rrtype_r = rpd->rrtype;
586 addr_r->af = rpd->af;
587 rpd->rev_mkaddr(&addr_r->addr, rps->ipv[found]);
588 return 0;
589 }