src/types.c: Clarify addr_rrtypeflag loop (style)
[adns] / src / types.c
1 /*
2 * types.c
3 * - RR-type-specific code, and the machinery to call it
4 */
5 /*
6 * This file is part of adns, which is
7 * Copyright (C) 1997-2000,2003,2006 Ian Jackson
8 * Copyright (C) 1999-2000,2003,2006 Tony Finch
9 * Copyright (C) 1991 Massachusetts Institute of Technology
10 * (See the file INSTALL for full details.)
11 *
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2, or (at your option)
15 * any later version.
16 *
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software Foundation,
24 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25 */
26
27 #include <stddef.h>
28 #include <stdlib.h>
29
30 #include <sys/types.h>
31 #include <sys/socket.h>
32 #include <netinet/in.h>
33 #include <arpa/inet.h>
34
35 #include "internal.h"
36
37 #define R_NOMEM return adns_s_nomemory
38 #define CSP_ADDSTR(s) do { \
39 if (!adns__vbuf_appendstr(vb,(s))) R_NOMEM; \
40 } while (0)
41
42 /*
43 * order of sections:
44 *
45 * _string (pap)
46 * _textdata, _qstring (csp)
47 * _str (mf,cs)
48 * _intstr (mf,csp,cs)
49 * _manyistr (mf,cs)
50 * _txt (pa)
51 * _inaddr (pa,di,cs
52 * +search_sortlist, dip_genaddr, csp_genaddr)
53 * _in6addr (pa,di,cs)
54 * _addr (pap,pa,di,div,csp,cs,gsz,qs
55 * +search_sortlist_sa, dip_sockaddr,
56 * addr_rrtypes, addr_submit, icb_addr)
57 * _domain (pap,csp,cs)
58 * _dom_raw (pa)
59 * _host_raw (pa)
60 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs
61 * +pap_findaddrs, icb_hostaddr)
62 * _mx_raw (pa,di)
63 * _mx (pa,di)
64 * _inthostaddr (mf,cs)
65 * _inthost (cs)
66 * _ptr (ckl,pa +icb_ptr)
67 * _strpair (mf)
68 * _intstrpair (mf)
69 * _hinfo (pa)
70 * _mailbox (pap,csp +pap_mailbox822)
71 * _rp (pa,cs)
72 * _soa (pa,mf,cs)
73 * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort)
74 * _byteblock (mf)
75 * _opaque (pa,cs)
76 * _flat (mf)
77 *
78 * within each section:
79 * ckl_*
80 * pap_*
81 * pa_*
82 * dip_*
83 * di_*
84 * mfp_*
85 * mf_*
86 * csp_*
87 * cs_*
88 * gsz_*
89 * postsort_*
90 * qs_*
91 */
92
93 /*
94 * _qstring (pap,csp)
95 */
96
97 static adns_status pap_qstring(const parseinfo *pai, int *cbyte_io, int max,
98 int *len_r, char **str_r) {
99 /* Neither len_r nor str_r may be null.
100 * End of datagram (overrun) is indicated by returning adns_s_invaliddata;
101 */
102 const byte *dgram= pai->dgram;
103 int l, cbyte;
104 char *str;
105
106 cbyte= *cbyte_io;
107
108 if (cbyte >= max) return adns_s_invaliddata;
109 GET_B(cbyte,l);
110 if (cbyte+l > max) return adns_s_invaliddata;
111
112 str= adns__alloc_interim(pai->qu, l+1);
113 if (!str) R_NOMEM;
114
115 str[l]= 0;
116 memcpy(str,dgram+cbyte,l);
117
118 *len_r= l;
119 *str_r= str;
120 *cbyte_io= cbyte+l;
121
122 return adns_s_ok;
123 }
124
125 static adns_status csp_qstring(vbuf *vb, const char *dp, int len) {
126 unsigned char ch;
127 char buf[10];
128 int cn;
129
130 CSP_ADDSTR("\"");
131 for (cn=0; cn<len; cn++) {
132 ch= *dp++;
133 if (ch == '\\') {
134 CSP_ADDSTR("\\\\");
135 } else if (ch == '"') {
136 CSP_ADDSTR("\\\"");
137 } else if (ch >= 32 && ch <= 126) {
138 if (!adns__vbuf_append(vb,&ch,1)) R_NOMEM;
139 } else {
140 sprintf(buf,"\\x%02x",ch);
141 CSP_ADDSTR(buf);
142 }
143 }
144 CSP_ADDSTR("\"");
145
146 return adns_s_ok;
147 }
148
149 /*
150 * _str (mf)
151 */
152
153 static void mf_str(adns_query qu, void *datap) {
154 char **rrp= datap;
155
156 adns__makefinal_str(qu,rrp);
157 }
158
159 /*
160 * _intstr (mf)
161 */
162
163 static void mf_intstr(adns_query qu, void *datap) {
164 adns_rr_intstr *rrp= datap;
165
166 adns__makefinal_str(qu,&rrp->str);
167 }
168
169 /*
170 * _manyistr (mf)
171 */
172
173 static void mf_manyistr(adns_query qu, void *datap) {
174 adns_rr_intstr **rrp= datap;
175 adns_rr_intstr *te, *table;
176 void *tablev;
177 int tc;
178
179 for (tc=0, te= *rrp; te->i >= 0; te++, tc++);
180 tablev= *rrp;
181 adns__makefinal_block(qu,&tablev,sizeof(*te)*(tc+1));
182 *rrp= table= tablev;
183 for (te= *rrp; te->i >= 0; te++)
184 adns__makefinal_str(qu,&te->str);
185 }
186
187 /*
188 * _txt (pa,cs)
189 */
190
191 static adns_status pa_txt(const parseinfo *pai, int cbyte,
192 int max, void *datap) {
193 adns_rr_intstr **rrp= datap, *table, *te;
194 const byte *dgram= pai->dgram;
195 int ti, tc, l, startbyte;
196 adns_status st;
197
198 startbyte= cbyte;
199 if (cbyte >= max) return adns_s_invaliddata;
200 tc= 0;
201 while (cbyte < max) {
202 GET_B(cbyte,l);
203 cbyte+= l;
204 tc++;
205 }
206 if (cbyte != max || !tc) return adns_s_invaliddata;
207
208 table= adns__alloc_interim(pai->qu,sizeof(*table)*(tc+1));
209 if (!table) R_NOMEM;
210
211 for (cbyte=startbyte, ti=0, te=table; ti<tc; ti++, te++) {
212 st= pap_qstring(pai, &cbyte, max, &te->i, &te->str);
213 if (st) return st;
214 }
215 assert(cbyte == max);
216
217 te->i= -1;
218 te->str= 0;
219
220 *rrp= table;
221 return adns_s_ok;
222 }
223
224 static adns_status cs_txt(vbuf *vb, const void *datap) {
225 const adns_rr_intstr *const *rrp= datap;
226 const adns_rr_intstr *current;
227 adns_status st;
228 int spc;
229
230 for (current= *rrp, spc=0; current->i >= 0; current++, spc=1) {
231 if (spc) CSP_ADDSTR(" ");
232 st= csp_qstring(vb,current->str,current->i); if (st) return st;
233 }
234 return adns_s_ok;
235 }
236
237 /*
238 * _hinfo (cs)
239 */
240
241 static adns_status cs_hinfo(vbuf *vb, const void *datap) {
242 const adns_rr_intstrpair *rrp= datap;
243 adns_status st;
244
245 st= csp_qstring(vb,rrp->array[0].str,rrp->array[0].i); if (st) return st;
246 CSP_ADDSTR(" ");
247 st= csp_qstring(vb,rrp->array[1].str,rrp->array[1].i); if (st) return st;
248 return adns_s_ok;
249 }
250
251 /*
252 * _inaddr (pa,di,cs +search_sortlist, dip_genaddr, csp_genaddr)
253 */
254
255 static adns_status pa_inaddr(const parseinfo *pai, int cbyte,
256 int max, void *datap) {
257 struct in_addr *storeto= datap;
258
259 if (max-cbyte != 4) return adns_s_invaliddata;
260 memcpy(storeto, pai->dgram + cbyte, 4);
261 return adns_s_ok;
262 }
263
264 static int search_sortlist(adns_state ads, int af, const void *ad) {
265 const struct sortlist *slp;
266 struct in_addr a4;
267 int i;
268 int v6mappedp= 0;
269
270 if (af == AF_INET6) {
271 const struct in6_addr *a6= ad;
272 if (IN6_IS_ADDR_V4MAPPED(a6)) {
273 a4.s_addr= htonl(((unsigned long)a6->s6_addr[12] << 24) |
274 ((unsigned long)a6->s6_addr[13] << 16) |
275 ((unsigned long)a6->s6_addr[14] << 8) |
276 ((unsigned long)a6->s6_addr[15] << 0));
277 v6mappedp= 1;
278 }
279 }
280
281 for (i=0, slp=ads->sortlist;
282 i<ads->nsortlist &&
283 !adns__addr_matches(af,ad, &slp->base,&slp->mask) &&
284 !(v6mappedp &&
285 adns__addr_matches(AF_INET,&a4, &slp->base,&slp->mask));
286 i++, slp++);
287 return i;
288 }
289
290 static int dip_genaddr(adns_state ads, int af, const void *a, const void *b) {
291 int ai, bi;
292
293 if (!ads->nsortlist) return 0;
294
295 ai= search_sortlist(ads,af,a);
296 bi= search_sortlist(ads,af,b);
297 return bi<ai;
298 }
299
300 static int di_inaddr(adns_state ads,
301 const void *datap_a, const void *datap_b) {
302 return dip_genaddr(ads,AF_INET,datap_a,datap_b);
303 }
304
305 static adns_status csp_genaddr(vbuf *vb, int af, const void *p) {
306 char buf[ADNS_ADDR2TEXT_BUFLEN];
307 int len= sizeof(buf);
308 adns_rr_addr a;
309 int err;
310
311 memset(&a, 0, sizeof(a));
312 a.addr.sa.sa_family= af;
313 adns__addr_inject(p, &a.addr);
314 err= adns_addr2text(&a.addr.sa,0, buf,&len, 0); assert(!err);
315 CSP_ADDSTR(buf);
316 return adns_s_ok;
317 }
318
319 static adns_status cs_inaddr(vbuf *vb, const void *datap) {
320 return csp_genaddr(vb, AF_INET,datap);
321 }
322
323 /*
324 * _in6addr (pa,di,cs)
325 */
326
327 static adns_status pa_in6addr(const parseinfo *pai, int cbyte,
328 int max, void *datap) {
329 struct in6_addr *storeto= datap;
330
331 if (max-cbyte != 16) return adns_s_invaliddata;
332 memcpy(storeto->s6_addr, pai->dgram + cbyte, 16);
333 return adns_s_ok;
334 }
335
336 static int di_in6addr(adns_state ads,
337 const void *datap_a, const void *datap_b) {
338 return dip_genaddr(ads,AF_INET6,datap_a,datap_b);
339 }
340
341 static adns_status cs_in6addr(vbuf *vb, const void *datap) {
342 return csp_genaddr(vb,AF_INET6,datap);
343 }
344
345 /*
346 * _addr (pap,pa,di,div,csp,cs,gsz,qs
347 * +search_sortlist_sa, dip_sockaddr, addr_rrtypes,
348 * addr_submit, icb_addr)
349 */
350
351 static const typeinfo tinfo_addrsub;
352
353 #define ADDR_RRTYPES(_) _(a) _(aaaa)
354
355 static const adns_rrtype addr_all_rrtypes[] = {
356 #define RRTY_CODE(ty) adns_r_##ty,
357 ADDR_RRTYPES(RRTY_CODE)
358 #undef RRTY_CODE
359 };
360
361 enum {
362 #define RRTY_INDEX(ty) addr__ri_##ty,
363 ADDR_RRTYPES(RRTY_INDEX)
364 #undef RRTY_INDEX
365 addr_nrrtypes,
366 #define RRTY_FLAG(ty) addr_rf_##ty = 1 << addr__ri_##ty,
367 ADDR_RRTYPES(RRTY_FLAG)
368 addr__rrty_eat_final_comma
369 #undef RRTY_FLAG
370 };
371
372 static unsigned addr_rrtypeflag(adns_rrtype type) {
373 int i;
374
375 type &= adns_rrt_typemask;
376 for (i=0; i<addr_nrrtypes; i++)
377 if (type==addr_all_rrtypes[i])
378 return 1 << i;
379 return 0;
380 }
381
382 /* About CNAME handling in addr queries.
383 *
384 * A user-level addr query is translated into a number of protocol-level
385 * queries, and its job is to reassemble the results. This gets tricky if
386 * the answers aren't consistent. In particular, if the answers report
387 * inconsistent indirection via CNAME records (e.g., different CNAMEs, or
388 * some indirect via a CNAME, and some don't) then we have trouble.
389 *
390 * Once we've received an answer, even if it was NODATA, we set
391 * adns__qf_addr_answer on the parent query. This will let us detect a
392 * conflict between a no-CNAME-with-NODATA reply and a subsequent CNAME.
393 *
394 * If we detect a conflict of any kind, then at least one answer came back
395 * with a CNAME record, so we pick the first such answer (somewhat
396 * arbitrarily) as being the `right' canonical name, and set this in the
397 * parent query's answer->cname slot. We discard address records from the
398 * wrong name. And finally we cancel the outstanding child queries, and
399 * resubmit address queries for the address families we don't yet have, with
400 * adns__qf_addr_cname set so that we know that we're in the fixup state.
401 */
402
403 static adns_status pap_addr(const parseinfo *pai, int rrty, size_t rrsz,
404 int *cbyte_io, int max, adns_rr_addr *storeto) {
405 const byte *dgram= pai->dgram;
406 int af, addrlen, salen;
407 struct in6_addr v6map;
408 const void *oaddr= dgram + *cbyte_io;
409 int avail= max - *cbyte_io;
410 int step= -1;
411 void *addrp= 0;
412
413 switch (rrty) {
414 case adns_r_a:
415 if ((pai->qu->flags & adns_qf_ipv6_mapv4) &&
416 (pai->qu->answer->type & adns__qtf_bigaddr)) {
417 if (avail < 4) return adns_s_invaliddata;
418 memset(v6map.s6_addr + 0, 0x00, 10);
419 memset(v6map.s6_addr + 10, 0xff, 2);
420 memcpy(v6map.s6_addr + 12, oaddr, 4);
421 oaddr= v6map.s6_addr; avail= sizeof(v6map.s6_addr);
422 if (step < 0) step= 4;
423 goto aaaa;
424 }
425 af= AF_INET; addrlen= 4;
426 addrp= &storeto->addr.inet.sin_addr;
427 salen= sizeof(storeto->addr.inet);
428 break;
429 case adns_r_aaaa:
430 aaaa:
431 af= AF_INET6; addrlen= 16;
432 addrp= storeto->addr.inet6.sin6_addr.s6_addr;
433 salen= sizeof(storeto->addr.inet6);
434 break;
435 }
436 assert(addrp);
437
438 assert(offsetof(adns_rr_addr, addr) + salen <= rrsz);
439 if (addrlen < avail) return adns_s_invaliddata;
440 if (step < 0) step= addrlen;
441 *cbyte_io += step;
442 memset(&storeto->addr, 0, salen);
443 storeto->len= salen;
444 storeto->addr.sa.sa_family= af;
445 memcpy(addrp, oaddr, addrlen);
446
447 return adns_s_ok;
448 }
449
450 static adns_status pa_addr(const parseinfo *pai, int cbyte,
451 int max, void *datap) {
452 int err= pap_addr(pai, pai->qu->answer->type & adns_rrt_typemask,
453 pai->qu->answer->rrsz, &cbyte, max, datap);
454 if (err) return err;
455 if (cbyte != max) return adns_s_invaliddata;
456 return adns_s_ok;
457 }
458
459 static int search_sortlist_sa(adns_state ads, const struct sockaddr *sa) {
460 const void *pa = adns__sockaddr_addr(sa);
461 return search_sortlist(ads, sa->sa_family, pa);
462 }
463
464 static int dip_sockaddr(adns_state ads,
465 const struct sockaddr *sa,
466 const struct sockaddr *sb) {
467 if (!ads->sortlist) return 0;
468 return search_sortlist_sa(ads, sa) > search_sortlist_sa(ads, sb);
469 }
470
471 static int di_addr(adns_state ads, const void *datap_a, const void *datap_b) {
472 const adns_rr_addr *ap= datap_a, *bp= datap_b;
473 return dip_sockaddr(ads, &ap->addr.sa, &bp->addr.sa);
474 }
475
476 static int div_addr(void *context, const void *datap_a, const void *datap_b) {
477 const adns_state ads= context;
478
479 return di_addr(ads, datap_a, datap_b);
480 }
481
482 static adns_status csp_addr(vbuf *vb, const adns_rr_addr *rrp) {
483 char buf[ADNS_ADDR2TEXT_BUFLEN];
484 int len= sizeof(buf);
485 int err;
486
487 switch (rrp->addr.inet.sin_family) {
488 case AF_INET:
489 CSP_ADDSTR("INET ");
490 goto a2t;
491 case AF_INET6:
492 CSP_ADDSTR("INET6 ");
493 goto a2t;
494 a2t:
495 err= adns_addr2text(&rrp->addr.sa,0, buf,&len, 0); assert(!err);
496 CSP_ADDSTR(buf);
497 break;
498 default:
499 sprintf(buf,"AF=%u",rrp->addr.sa.sa_family);
500 CSP_ADDSTR(buf);
501 break;
502 }
503 return adns_s_ok;
504 }
505
506 static adns_status cs_addr(vbuf *vb, const void *datap) {
507 const adns_rr_addr *rrp= datap;
508
509 return csp_addr(vb,rrp);
510 }
511
512 static int gsz_addr(const typeinfo *typei, adns_rrtype type) {
513 return type & adns__qtf_bigaddr ?
514 sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only);
515 }
516
517 static unsigned addr_rrtypes(adns_state ads, adns_rrtype type,
518 adns_queryflags qf) {
519 /* Return a mask of addr_rf_... flags indicating which address families are
520 * wanted, given a query type and flags.
521 */
522
523 adns_queryflags permitaf= 0;
524 unsigned want= 0;
525
526 if (!(type & adns__qtf_bigaddr))
527 qf= (qf & ~adns_qf_want_allaf) | adns_qf_want_ipv4;
528 else {
529 if (!(qf & adns_qf_want_allaf)) {
530 qf |= (type & adns__qtf_manyaf) ?
531 adns_qf_want_allaf : adns_qf_want_ipv4;
532 }
533 if (ads->iflags & adns_if_permit_ipv4) permitaf |= adns_qf_want_ipv4;
534 if (ads->iflags & adns_if_permit_ipv6) permitaf |= adns_qf_want_ipv6;
535 if (qf & permitaf) qf &= permitaf | ~adns_qf_want_allaf;
536 }
537
538 if (qf & adns_qf_want_ipv4) want |= addr_rf_a;
539 if (qf & adns_qf_want_ipv6) want |= addr_rf_aaaa;
540
541 return want;
542 }
543
544 static void icb_addr(adns_query parent, adns_query child);
545
546 static void addr_subqueries(adns_query qu, struct timeval now,
547 adns_queryflags qf_extra,
548 const byte *qd_dgram, int qd_dglen) {
549 int i, err, id;
550 adns_query cqu;
551 adns_queryflags qf= (qu->flags & ~adns_qf_search) | qf_extra;
552 adns_rrtype qtf= qu->answer->type & adns__qtf_deref;
553 unsigned which= qu->ctx.tinfo.addr.want & ~qu->ctx.tinfo.addr.have;
554 qcontext ctx;
555
556 memset(&ctx, 0, sizeof(ctx));
557 ctx.callback= icb_addr;
558 for (i=0; i<addr_nrrtypes; i++) {
559 if (!(which & (1 << i))) continue;
560 err= adns__mkquery_frdgram(qu->ads, &qu->vb, &id, qd_dgram,qd_dglen,
561 DNS_HDRSIZE, addr_all_rrtypes[i], qf);
562 if (err) goto x_error;
563 err= adns__internal_submit(qu->ads, &cqu, qu, &tinfo_addrsub,
564 addr_all_rrtypes[i] | qtf,
565 &qu->vb, id, qf, now, &ctx);
566 if (err) goto x_error;
567 cqu->answer->rrsz= qu->answer->rrsz;
568 }
569 qu->state= query_childw;
570 LIST_LINK_TAIL(qu->ads->childw, qu);
571 return;
572
573 x_error:
574 adns__query_fail(qu, err);
575 }
576
577 static adns_status addr_submit(adns_query parent, adns_query *query_r,
578 vbuf *qumsg_vb, int id, unsigned want,
579 adns_queryflags flags, struct timeval now,
580 qcontext *ctx) {
581 /* This is effectively a substitute for adns__internal_submit, intended for
582 * the case where the caller (possibly) only wants a subset of the
583 * available record types. The memory management and callback rules are
584 * the same as for adns__internal_submit.
585 *
586 * Some differences: the query is linked onto the parent's children list
587 * before exit (though the parent's state is not changed, and it is not
588 * linked into the childw list queue); and we fiddle with the `tinfo'
589 * portion of the context structure (yes, modifying *ctx), since this is,
590 * in fact, the main purpose of this function.
591 */
592
593 adns_state ads= parent->ads;
594 adns_query qu;
595 adns_status err;
596 adns_rrtype type= ((adns_r_addr & adns_rrt_reprmask) |
597 (parent->answer->type & ~adns_rrt_reprmask));
598
599 ctx->tinfo.addr.want= want;
600 ctx->tinfo.addr.have= 0;
601 err= adns__internal_submit(ads, &qu, parent, adns__findtype(adns_r_addr),
602 type, qumsg_vb, id, flags, now, ctx);
603 if (err) return err;
604
605 *query_r= qu;
606 return adns_s_ok;
607 }
608
609 static adns_status append_addrs(adns_query qu, size_t rrsz,
610 adns_rr_addr **dp, int *dlen,
611 const adns_rr_addr *sp, int slen) {
612 /* Append a vector of slen addr records, each of size rrsz, starting at ap,
613 * to a vector starting at *dp, of length *dlen. On successful completion,
614 * *dp and *dlen are updated.
615 */
616
617 size_t drrsz= *dlen*rrsz, srrsz= slen*rrsz;
618 byte *p;
619
620 if (!slen) return adns_s_ok;
621 p= adns__alloc_interim(qu, drrsz + srrsz);
622 if (!p) R_NOMEM;
623 if (*dlen) {
624 memcpy(p, *dp, drrsz);
625 adns__free_interim(qu, *dp);
626 }
627 memcpy(p + drrsz, sp, srrsz);
628 *dlen += slen;
629 *dp= (adns_rr_addr *)p;
630 return adns_s_ok;
631 }
632
633 static void propagate_ttl(adns_query to, adns_query from)
634 { if (to->expires > from->expires) to->expires= from->expires; }
635
636 static adns_status copy_cname_from_child(adns_query parent, adns_query child) {
637 adns_answer *pans= parent->answer, *cans= child->answer;
638 size_t n= strlen(cans->cname) + 1;
639
640 pans->cname= adns__alloc_preserved(parent, n);
641 if (!pans->cname) R_NOMEM;
642 memcpy(pans->cname, cans->cname, n);
643 return adns_s_ok;
644 }
645
646 static void done_addr_type(adns_query qu, adns_rrtype type) {
647 unsigned f= addr_rrtypeflag(type);
648 assert(f); qu->ctx.tinfo.addr.have |= f;
649 }
650
651 static void icb_addr(adns_query parent, adns_query child) {
652 adns_state ads= parent->ads;
653 adns_answer *pans= parent->answer, *cans= child->answer;
654 struct timeval now;
655 adns_status err;
656 adns_queryflags qf;
657 int id;
658
659 propagate_ttl(parent, child);
660
661 if (!(child->flags & adns__qf_addr_cname) &&
662 (parent->flags & adns__qf_addr_answer) &&
663 (!!pans->cname != !!cans->cname ||
664 (pans->cname && strcmp(pans->cname, cans->cname)))) {
665 /* We've detected an inconsistency in CNAME records, and must deploy
666 * countermeasures.
667 */
668
669 if (!pans->cname) {
670 /* The child has a CNAME record, but the parent doesn't. We must
671 * discard all of the parent's addresses, and substitute the child's.
672 */
673
674 assert(pans->rrsz == cans->rrsz);
675 adns__free_interim(parent, pans->rrs.bytes);
676 adns__transfer_interim(child, parent, cans->rrs.bytes);
677 pans->rrs.bytes= cans->rrs.bytes;
678 pans->nrrs= cans->nrrs;
679 parent->ctx.tinfo.addr.have= 0;
680 done_addr_type(parent, cans->type);
681 err= copy_cname_from_child(parent, child); if (err) goto x_err;
682 }
683
684 /* We've settled on the CNAME (now) associated with the parent, which
685 * already has appropriate address records. Build a query datagram for
686 * this name so that we can issue child queries for the missing address
687 * families. The child's vbuf looks handy for this.
688 */
689 err= adns__mkquery(ads, &child->vb, &id, pans->cname,
690 strlen(pans->cname), &tinfo_addrsub,
691 adns_r_addr, parent->flags);
692 if (err) goto x_err;
693
694 /* Now cancel the remaining children, and try again with the CNAME we've
695 * settled on.
696 */
697 adns__cancel_children(parent);
698 if (gettimeofday(&now, 0)) goto x_gtod;
699 qf= adns__qf_addr_cname;
700 if (!(parent->flags & adns_qf_cname_loose)) qf |= adns_qf_cname_forbid;
701 addr_subqueries(parent, now, qf, child->vb.buf, child->vb.used);
702 return;
703 }
704
705 if (cans->cname && !pans->cname) {
706 err= copy_cname_from_child(parent, child);
707 if (err) goto x_err;
708 }
709
710 if ((parent->flags & adns_qf_search) &&
711 !pans->cname && cans->status == adns_s_nxdomain) {
712 /* We're searching a list of suffixes, and the name doesn't exist. Try
713 * the next one.
714 */
715
716 adns__cancel_children(parent);
717 adns__free_interim(parent, pans->rrs.bytes);
718 pans->rrs.bytes= 0; pans->nrrs= 0;
719 if (gettimeofday(&now, 0)) goto x_gtod;
720 adns__search_next(ads, parent, now);
721 return;
722 }
723
724 if (cans->status && cans->status != adns_s_nodata)
725 { err= cans->status; goto x_err; }
726
727 assert(pans->rrsz == cans->rrsz);
728 err= append_addrs(parent, pans->rrsz,
729 &pans->rrs.addr, &pans->nrrs,
730 cans->rrs.addr, cans->nrrs);
731 if (err) goto x_err;
732 done_addr_type(parent, cans->type);
733
734 if (parent->children.head) LIST_LINK_TAIL(ads->childw, parent);
735 else if (!pans->nrrs) adns__query_fail(parent, adns_s_nodata);
736 else adns__query_done(parent);
737 parent->flags |= adns__qf_addr_answer;
738 return;
739
740 x_gtod:
741 adns__diag(ads, -1, parent, "gettimeofday failed: %s", strerror(errno));
742 err= adns_s_systemfail;
743 goto x_err;
744
745 x_err:
746 adns__query_fail(parent, err);
747 }
748
749 static void qs_addr(adns_query qu, struct timeval now) {
750 if (!qu->ctx.tinfo.addr.want) {
751 qu->ctx.tinfo.addr.want= addr_rrtypes(qu->ads, qu->answer->type,
752 qu->flags);
753 qu->ctx.tinfo.addr.have= 0;
754 }
755 addr_subqueries(qu, now, 0, qu->query_dgram, qu->query_dglen);
756 }
757
758 /*
759 * _domain (pap,csp,cs)
760 * _dom_raw (pa)
761 */
762
763 static adns_status pap_domain(const parseinfo *pai, int *cbyte_io, int max,
764 char **domain_r, parsedomain_flags flags) {
765 adns_status st;
766 char *dm;
767
768 st= adns__parse_domain(pai->qu->ads, pai->serv, pai->qu, &pai->qu->vb, flags,
769 pai->dgram,pai->dglen, cbyte_io, max);
770 if (st) return st;
771 if (!pai->qu->vb.used) return adns_s_invaliddata;
772
773 dm= adns__alloc_interim(pai->qu, pai->qu->vb.used+1);
774 if (!dm) R_NOMEM;
775
776 dm[pai->qu->vb.used]= 0;
777 memcpy(dm,pai->qu->vb.buf,pai->qu->vb.used);
778
779 *domain_r= dm;
780 return adns_s_ok;
781 }
782
783 static adns_status csp_domain(vbuf *vb, const char *domain) {
784 CSP_ADDSTR(domain);
785 if (!*domain) CSP_ADDSTR(".");
786 return adns_s_ok;
787 }
788
789 static adns_status cs_domain(vbuf *vb, const void *datap) {
790 const char *const *domainp= datap;
791 return csp_domain(vb,*domainp);
792 }
793
794 static adns_status pa_dom_raw(const parseinfo *pai, int cbyte,
795 int max, void *datap) {
796 char **rrp= datap;
797 adns_status st;
798
799 st= pap_domain(pai, &cbyte, max, rrp, pdf_quoteok);
800 if (st) return st;
801
802 if (cbyte != max) return adns_s_invaliddata;
803 return adns_s_ok;
804 }
805
806 /*
807 * _host_raw (pa)
808 */
809
810 static adns_status pa_host_raw(const parseinfo *pai, int cbyte,
811 int max, void *datap) {
812 char **rrp= datap;
813 adns_status st;
814
815 st= pap_domain(pai, &cbyte, max, rrp,
816 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
817 if (st) return st;
818
819 if (cbyte != max) return adns_s_invaliddata;
820 return adns_s_ok;
821 }
822
823 /*
824 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +pap_findaddrs, icb_hostaddr)
825 */
826
827 static adns_status pap_findaddrs(const parseinfo *pai, adns_rr_hostaddr *ha,
828 unsigned *want_io, size_t addrsz,
829 int *cbyte_io, int count, int dmstart) {
830 int rri, naddrs;
831 unsigned typef, want= *want_io, need= want;
832 int type, class, rdlen, rdend, rdstart, ownermatched;
833 unsigned long ttl;
834 adns_status st;
835
836 for (rri=0, naddrs=0; rri<count; rri++) {
837 st= adns__findrr_anychk(pai->qu, pai->serv, pai->dgram,
838 pai->dglen, cbyte_io,
839 &type, &class, &ttl, &rdlen, &rdstart,
840 pai->dgram, pai->dglen, dmstart, &ownermatched);
841 if (st) return st;
842 if (!ownermatched || class != DNS_CLASS_IN) continue;
843 typef= addr_rrtypeflag(type);
844 if (!(want & typef)) continue;
845 need &= ~typef;
846 if (!adns__vbuf_ensure(&pai->qu->vb, (naddrs+1)*addrsz)) R_NOMEM;
847 adns__update_expires(pai->qu,ttl,pai->now);
848 rdend= rdstart + rdlen;
849 st= pap_addr(pai, type, addrsz, &rdstart, rdend,
850 (adns_rr_addr *)(pai->qu->vb.buf + naddrs*addrsz));
851 if (st) return st;
852 if (rdstart != rdend) return adns_s_invaliddata;
853 naddrs++;
854 }
855 if (naddrs > 0) {
856 st= append_addrs(pai->qu, addrsz, &ha->addrs, &ha->naddrs,
857 (const adns_rr_addr *)pai->qu->vb.buf, naddrs);
858 if (st) return st;
859 ha->astatus= adns_s_ok;
860
861 if (!need) {
862 adns__isort(ha->addrs, naddrs, addrsz, pai->qu->vb.buf,
863 div_addr, pai->ads);
864 }
865 }
866 *want_io= need;
867 return adns_s_ok;
868 }
869
870 static void icb_hostaddr(adns_query parent, adns_query child) {
871 adns_answer *cans= child->answer;
872 adns_rr_hostaddr *rrp= child->ctx.pinfo.hostaddr;
873 adns_state ads= parent->ads;
874 adns_status st;
875 size_t addrsz= gsz_addr(0, parent->answer->type);
876
877 st= cans->status == adns_s_nodata ? adns_s_ok : cans->status;
878 if (st) goto done;
879 propagate_ttl(parent, child);
880
881 assert(addrsz == cans->rrsz);
882 st= append_addrs(parent, addrsz,
883 &rrp->addrs, &rrp->naddrs,
884 cans->rrs.addr, cans->nrrs);
885 if (st) goto done;
886 if (!rrp->naddrs) { st= adns_s_nodata; goto done; }
887
888 if (!adns__vbuf_ensure(&parent->vb, addrsz))
889 { st= adns_s_nomemory; goto done; }
890 adns__isort(rrp->addrs, rrp->naddrs, addrsz, parent->vb.buf,
891 div_addr, ads);
892
893 done:
894 if (st) {
895 adns__free_interim(parent, rrp->addrs);
896 rrp->naddrs= (st>0 && st<=adns_s_max_tempfail) ? -1 : 0;
897 }
898
899 rrp->astatus= st;
900 if (parent->children.head) {
901 LIST_LINK_TAIL(ads->childw,parent);
902 } else {
903 adns__query_done(parent);
904 }
905 }
906
907 static adns_status pap_hostaddr(const parseinfo *pai, int *cbyte_io,
908 int max, adns_rr_hostaddr *rrp) {
909 adns_status st;
910 int dmstart, cbyte;
911 qcontext ctx;
912 int id;
913 adns_query nqu;
914 adns_queryflags nflags;
915 unsigned want;
916 size_t addrsz= gsz_addr(0, pai->qu->answer->type);
917
918 dmstart= cbyte= *cbyte_io;
919 st= pap_domain(pai, &cbyte, max, &rrp->host,
920 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
921 if (st) return st;
922 *cbyte_io= cbyte;
923
924 rrp->astatus= adns_s_ok;
925 rrp->naddrs= 0;
926 rrp->addrs= 0;
927
928 cbyte= pai->nsstart;
929
930 want= addr_rrtypes(pai->ads, pai->qu->answer->type, pai->qu->flags);
931
932 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->nscount, dmstart);
933 if (st) return st;
934 if (!want) return adns_s_ok;
935
936 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->arcount, dmstart);
937 if (st) return st;
938 if (!want) return adns_s_ok;
939
940 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
941 pai->dgram, pai->dglen, dmstart,
942 adns_r_addr, adns_qf_quoteok_query);
943 if (st) return st;
944
945 ctx.ext= 0;
946 ctx.callback= icb_hostaddr;
947 ctx.pinfo.hostaddr= rrp;
948
949 nflags= adns_qf_quoteok_query | (pai->qu->flags & (adns_qf_want_allaf |
950 adns_qf_ipv6_mapv4));
951 if (!(pai->qu->flags & adns_qf_cname_loose)) nflags |= adns_qf_cname_forbid;
952
953 st= addr_submit(pai->qu, &nqu, &pai->qu->vb, id, want,
954 nflags, pai->now, &ctx);
955 if (st) return st;
956
957 return adns_s_ok;
958 }
959
960 static adns_status pa_hostaddr(const parseinfo *pai, int cbyte,
961 int max, void *datap) {
962 adns_rr_hostaddr *rrp= datap;
963 adns_status st;
964
965 st= pap_hostaddr(pai, &cbyte, max, rrp);
966 if (st) return st;
967 if (cbyte != max) return adns_s_invaliddata;
968
969 return adns_s_ok;
970 }
971
972 static int dip_hostaddr(adns_state ads,
973 const adns_rr_hostaddr *ap, const adns_rr_hostaddr *bp) {
974 if (ap->astatus != bp->astatus) return ap->astatus;
975 if (ap->astatus) return 0;
976
977 return dip_sockaddr(ads, &ap->addrs[0].addr.sa, &bp->addrs[0].addr.sa);
978 }
979
980 static int di_hostaddr(adns_state ads,
981 const void *datap_a, const void *datap_b) {
982 const adns_rr_hostaddr *ap= datap_a, *bp= datap_b;
983
984 return dip_hostaddr(ads, ap,bp);
985 }
986
987 static void mfp_hostaddr(adns_query qu, adns_rr_hostaddr *rrp) {
988 void *tablev;
989 size_t addrsz= gsz_addr(0, qu->answer->type);
990
991 adns__makefinal_str(qu,&rrp->host);
992 tablev= rrp->addrs;
993 adns__makefinal_block(qu, &tablev, rrp->naddrs*addrsz);
994 rrp->addrs= tablev;
995 }
996
997 static void mf_hostaddr(adns_query qu, void *datap) {
998 adns_rr_hostaddr *rrp= datap;
999
1000 mfp_hostaddr(qu,rrp);
1001 }
1002
1003 static adns_status csp_hostaddr(vbuf *vb, const adns_rr_hostaddr *rrp) {
1004 const char *errstr;
1005 adns_status st;
1006 char buf[20];
1007 int i;
1008
1009 st= csp_domain(vb,rrp->host); if (st) return st;
1010
1011 CSP_ADDSTR(" ");
1012 CSP_ADDSTR(adns_errtypeabbrev(rrp->astatus));
1013
1014 sprintf(buf," %d ",rrp->astatus);
1015 CSP_ADDSTR(buf);
1016
1017 CSP_ADDSTR(adns_errabbrev(rrp->astatus));
1018 CSP_ADDSTR(" ");
1019
1020 errstr= adns_strerror(rrp->astatus);
1021 st= csp_qstring(vb,errstr,strlen(errstr)); if (st) return st;
1022
1023 if (rrp->naddrs >= 0) {
1024 CSP_ADDSTR(" (");
1025 for (i=0; i<rrp->naddrs; i++) {
1026 CSP_ADDSTR(" ");
1027 st= csp_addr(vb,&rrp->addrs[i]);
1028 }
1029 CSP_ADDSTR(" )");
1030 } else {
1031 CSP_ADDSTR(" ?");
1032 }
1033 return adns_s_ok;
1034 }
1035
1036 static adns_status cs_hostaddr(vbuf *vb, const void *datap) {
1037 const adns_rr_hostaddr *rrp= datap;
1038
1039 return csp_hostaddr(vb,rrp);
1040 }
1041
1042 /*
1043 * _mx_raw (pa,di)
1044 */
1045
1046 static adns_status pa_mx_raw(const parseinfo *pai, int cbyte,
1047 int max, void *datap) {
1048 const byte *dgram= pai->dgram;
1049 adns_rr_intstr *rrp= datap;
1050 adns_status st;
1051 int pref;
1052
1053 if (cbyte+2 > max) return adns_s_invaliddata;
1054 GET_W(cbyte,pref);
1055 rrp->i= pref;
1056 st= pap_domain(pai, &cbyte, max, &rrp->str,
1057 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1058 if (st) return st;
1059
1060 if (cbyte != max) return adns_s_invaliddata;
1061 return adns_s_ok;
1062 }
1063
1064 static int di_mx_raw(adns_state ads, const void *datap_a, const void *datap_b) {
1065 const adns_rr_intstr *ap= datap_a, *bp= datap_b;
1066
1067 if (ap->i < bp->i) return 0;
1068 if (ap->i > bp->i) return 1;
1069 return 0;
1070 }
1071
1072 /*
1073 * _mx (pa,di)
1074 */
1075
1076 static adns_status pa_mx(const parseinfo *pai, int cbyte,
1077 int max, void *datap) {
1078 const byte *dgram= pai->dgram;
1079 adns_rr_inthostaddr *rrp= datap;
1080 adns_status st;
1081 int pref;
1082
1083 if (cbyte+2 > max) return adns_s_invaliddata;
1084 GET_W(cbyte,pref);
1085 rrp->i= pref;
1086 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha);
1087 if (st) return st;
1088
1089 if (cbyte != max) return adns_s_invaliddata;
1090 return adns_s_ok;
1091 }
1092
1093 static int di_mx(adns_state ads, const void *datap_a, const void *datap_b) {
1094 const adns_rr_inthostaddr *ap= datap_a, *bp= datap_b;
1095
1096 if (ap->i < bp->i) return 0;
1097 if (ap->i > bp->i) return 1;
1098 return dip_hostaddr(ads, &ap->ha, &bp->ha);
1099 }
1100
1101 /*
1102 * _inthostaddr (mf,cs)
1103 */
1104
1105 static void mf_inthostaddr(adns_query qu, void *datap) {
1106 adns_rr_inthostaddr *rrp= datap;
1107
1108 mfp_hostaddr(qu,&rrp->ha);
1109 }
1110
1111 static adns_status cs_inthostaddr(vbuf *vb, const void *datap) {
1112 const adns_rr_inthostaddr *rrp= datap;
1113 char buf[10];
1114
1115 sprintf(buf,"%u ",rrp->i);
1116 CSP_ADDSTR(buf);
1117
1118 return csp_hostaddr(vb,&rrp->ha);
1119 }
1120
1121 /*
1122 * _inthost (cs)
1123 */
1124
1125 static adns_status cs_inthost(vbuf *vb, const void *datap) {
1126 const adns_rr_intstr *rrp= datap;
1127 char buf[10];
1128
1129 sprintf(buf,"%u ",rrp->i);
1130 CSP_ADDSTR(buf);
1131 return csp_domain(vb,rrp->str);
1132 }
1133
1134 /*
1135 * _ptr (ckl,pa +icb_ptr)
1136 */
1137
1138 static adns_status ckl_ptr(adns_state ads, adns_queryflags flags,
1139 union checklabel_state *cls, qcontext *ctx,
1140 int labnum, const char *dgram,
1141 int labstart, int lablen) {
1142 if (lablen) {
1143 if (!adns__revparse_label(&cls->ptr, labnum, dgram,labstart,lablen))
1144 return adns_s_querydomainwrong;
1145 } else {
1146 if (!adns__revparse_done(&cls->ptr, dgram, labnum,
1147 &ctx->tinfo.ptr.rev_rrtype,
1148 &ctx->tinfo.ptr.addr))
1149 return adns_s_querydomainwrong;
1150 }
1151 return adns_s_ok;
1152 }
1153
1154 static void icb_ptr(adns_query parent, adns_query child) {
1155 adns_answer *cans= child->answer;
1156 const adns_sockaddr *queried;
1157 const unsigned char *found;
1158 adns_state ads= parent->ads;
1159 int i;
1160
1161 if (cans->status == adns_s_nxdomain || cans->status == adns_s_nodata) {
1162 adns__query_fail(parent,adns_s_inconsistent);
1163 return;
1164 } else if (cans->status) {
1165 adns__query_fail(parent,cans->status);
1166 return;
1167 }
1168
1169 queried= &parent->ctx.tinfo.ptr.addr;
1170 for (i=0, found=cans->rrs.bytes; i<cans->nrrs; i++, found+=cans->rrsz) {
1171 if (adns__addrs_equal_raw(&queried->sa,
1172 parent->ctx.tinfo.ptr.addr.sa.sa_family,found)) {
1173 if (!parent->children.head) {
1174 adns__query_done(parent);
1175 return;
1176 } else {
1177 LIST_LINK_TAIL(ads->childw,parent);
1178 return;
1179 }
1180 }
1181 }
1182
1183 adns__query_fail(parent,adns_s_inconsistent);
1184 }
1185
1186 static adns_status pa_ptr(const parseinfo *pai, int dmstart,
1187 int max, void *datap) {
1188 char **rrp= datap;
1189 adns_status st;
1190 adns_rrtype rrtype= pai->qu->ctx.tinfo.ptr.rev_rrtype;
1191 int cbyte, id;
1192 adns_query nqu;
1193 qcontext ctx;
1194
1195 cbyte= dmstart;
1196 st= pap_domain(pai, &cbyte, max, rrp,
1197 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1198 if (st) return st;
1199 if (cbyte != max) return adns_s_invaliddata;
1200
1201 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
1202 pai->dgram, pai->dglen, dmstart,
1203 rrtype, adns_qf_quoteok_query);
1204 if (st) return st;
1205
1206 ctx.ext= 0;
1207 ctx.callback= icb_ptr;
1208 memset(&ctx.pinfo,0,sizeof(ctx.pinfo));
1209 memset(&ctx.tinfo,0,sizeof(ctx.tinfo));
1210 st= adns__internal_submit(pai->ads, &nqu, pai->qu,
1211 adns__findtype(rrtype),
1212 rrtype, &pai->qu->vb, id,
1213 adns_qf_quoteok_query, pai->now, &ctx);
1214 if (st) return st;
1215
1216 return adns_s_ok;
1217 }
1218
1219 /*
1220 * _strpair (mf)
1221 */
1222
1223 static void mf_strpair(adns_query qu, void *datap) {
1224 adns_rr_strpair *rrp= datap;
1225
1226 adns__makefinal_str(qu,&rrp->array[0]);
1227 adns__makefinal_str(qu,&rrp->array[1]);
1228 }
1229
1230 /*
1231 * _intstrpair (mf)
1232 */
1233
1234 static void mf_intstrpair(adns_query qu, void *datap) {
1235 adns_rr_intstrpair *rrp= datap;
1236
1237 adns__makefinal_str(qu,&rrp->array[0].str);
1238 adns__makefinal_str(qu,&rrp->array[1].str);
1239 }
1240
1241 /*
1242 * _hinfo (pa)
1243 */
1244
1245 static adns_status pa_hinfo(const parseinfo *pai, int cbyte,
1246 int max, void *datap) {
1247 adns_rr_intstrpair *rrp= datap;
1248 adns_status st;
1249 int i;
1250
1251 for (i=0; i<2; i++) {
1252 st= pap_qstring(pai, &cbyte, max, &rrp->array[i].i, &rrp->array[i].str);
1253 if (st) return st;
1254 }
1255
1256 if (cbyte != max) return adns_s_invaliddata;
1257
1258 return adns_s_ok;
1259 }
1260
1261 /*
1262 * _mailbox (pap,cs +pap_mailbox822)
1263 */
1264
1265 static adns_status pap_mailbox822(const parseinfo *pai,
1266 int *cbyte_io, int max, char **mb_r) {
1267 int lablen, labstart, i, needquote, c, r, neednorm;
1268 const unsigned char *p;
1269 char *str;
1270 findlabel_state fls;
1271 adns_status st;
1272 vbuf *vb;
1273
1274 vb= &pai->qu->vb;
1275 vb->used= 0;
1276 adns__findlabel_start(&fls, pai->ads,
1277 -1, pai->qu,
1278 pai->dgram, pai->dglen, max,
1279 *cbyte_io, cbyte_io);
1280 st= adns__findlabel_next(&fls,&lablen,&labstart);
1281 if (!lablen) {
1282 adns__vbuf_appendstr(vb,".");
1283 goto x_ok;
1284 }
1285
1286 neednorm= 1;
1287 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++) {
1288 c= *p++;
1289 if ((c&~128) < 32 || (c&~128) == 127) return adns_s_invaliddata;
1290 if (c == '.' && !neednorm) neednorm= 1;
1291 else if (c==' ' || c>=127 || ctype_822special(c)) needquote++;
1292 else neednorm= 0;
1293 }
1294
1295 if (needquote || neednorm) {
1296 r= adns__vbuf_ensure(vb, lablen+needquote+4); if (!r) R_NOMEM;
1297 adns__vbuf_appendq(vb,"\"",1);
1298 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++, p++) {
1299 c= *p;
1300 if (c == '"' || c=='\\') adns__vbuf_appendq(vb,"\\",1);
1301 adns__vbuf_appendq(vb,p,1);
1302 }
1303 adns__vbuf_appendq(vb,"\"",1);
1304 } else {
1305 r= adns__vbuf_append(vb, pai->dgram+labstart, lablen); if (!r) R_NOMEM;
1306 }
1307
1308 r= adns__vbuf_appendstr(vb,"@"); if (!r) R_NOMEM;
1309
1310 st= adns__parse_domain_more(&fls,pai->ads, pai->qu,vb,0, pai->dgram);
1311 if (st) return st;
1312
1313 x_ok:
1314 str= adns__alloc_interim(pai->qu, vb->used+1); if (!str) R_NOMEM;
1315 memcpy(str,vb->buf,vb->used);
1316 str[vb->used]= 0;
1317 *mb_r= str;
1318 return adns_s_ok;
1319 }
1320
1321 static adns_status pap_mailbox(const parseinfo *pai, int *cbyte_io, int max,
1322 char **mb_r) {
1323 if (pai->qu->typei->typekey & adns__qtf_mail822) {
1324 return pap_mailbox822(pai, cbyte_io, max, mb_r);
1325 } else {
1326 return pap_domain(pai, cbyte_io, max, mb_r, pdf_quoteok);
1327 }
1328 }
1329
1330 static adns_status csp_mailbox(vbuf *vb, const char *mailbox) {
1331 return csp_domain(vb,mailbox);
1332 }
1333
1334 /*
1335 * _rp (pa,cs)
1336 */
1337
1338 static adns_status pa_rp(const parseinfo *pai, int cbyte,
1339 int max, void *datap) {
1340 adns_rr_strpair *rrp= datap;
1341 adns_status st;
1342
1343 st= pap_mailbox(pai, &cbyte, max, &rrp->array[0]);
1344 if (st) return st;
1345
1346 st= pap_domain(pai, &cbyte, max, &rrp->array[1], pdf_quoteok);
1347 if (st) return st;
1348
1349 if (cbyte != max) return adns_s_invaliddata;
1350 return adns_s_ok;
1351 }
1352
1353 static adns_status cs_rp(vbuf *vb, const void *datap) {
1354 const adns_rr_strpair *rrp= datap;
1355 adns_status st;
1356
1357 st= csp_mailbox(vb,rrp->array[0]); if (st) return st;
1358 CSP_ADDSTR(" ");
1359 st= csp_domain(vb,rrp->array[1]); if (st) return st;
1360
1361 return adns_s_ok;
1362 }
1363
1364 /*
1365 * _soa (pa,mf,cs)
1366 */
1367
1368 static adns_status pa_soa(const parseinfo *pai, int cbyte,
1369 int max, void *datap) {
1370 adns_rr_soa *rrp= datap;
1371 const byte *dgram= pai->dgram;
1372 adns_status st;
1373 int msw, lsw, i;
1374
1375 st= pap_domain(pai, &cbyte, max, &rrp->mname,
1376 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1377 if (st) return st;
1378
1379 st= pap_mailbox(pai, &cbyte, max, &rrp->rname);
1380 if (st) return st;
1381
1382 if (cbyte+20 != max) return adns_s_invaliddata;
1383
1384 for (i=0; i<5; i++) {
1385 GET_W(cbyte,msw);
1386 GET_W(cbyte,lsw);
1387 (&rrp->serial)[i]= (msw<<16) | lsw;
1388 }
1389
1390 return adns_s_ok;
1391 }
1392
1393 static void mf_soa(adns_query qu, void *datap) {
1394 adns_rr_soa *rrp= datap;
1395
1396 adns__makefinal_str(qu,&rrp->mname);
1397 adns__makefinal_str(qu,&rrp->rname);
1398 }
1399
1400 static adns_status cs_soa(vbuf *vb, const void *datap) {
1401 const adns_rr_soa *rrp= datap;
1402 char buf[20];
1403 int i;
1404 adns_status st;
1405
1406 st= csp_domain(vb,rrp->mname); if (st) return st;
1407 CSP_ADDSTR(" ");
1408 st= csp_mailbox(vb,rrp->rname); if (st) return st;
1409
1410 for (i=0; i<5; i++) {
1411 sprintf(buf," %lu",(&rrp->serial)[i]);
1412 CSP_ADDSTR(buf);
1413 }
1414
1415 return adns_s_ok;
1416 }
1417
1418 /*
1419 * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort)
1420 */
1421
1422 static adns_status ckl_srv(adns_state ads, adns_queryflags flags,
1423 union checklabel_state *cls, qcontext *ctx,
1424 int labnum, const char *dgram,
1425 int labstart, int lablen) {
1426 const char *label = dgram+labstart;
1427 if (labnum < 2) {
1428 if (flags & adns_qf_quoteok_query) return adns_s_ok;
1429 if (!lablen || label[0] != '_') return adns_s_querydomaininvalid;
1430 return adns_s_ok;
1431 }
1432 return adns__ckl_hostname(ads,flags, cls,ctx, labnum, dgram,labstart,lablen);
1433 }
1434
1435 static adns_status pap_srv_begin(const parseinfo *pai, int *cbyte_io, int max,
1436 adns_rr_srvha *rrp
1437 /* might be adns_rr_srvraw* */) {
1438 const byte *dgram= pai->dgram;
1439 int ti, cbyte;
1440
1441 cbyte= *cbyte_io;
1442 if ((*cbyte_io += 6) > max) return adns_s_invaliddata;
1443
1444 rrp->priority= GET_W(cbyte, ti);
1445 rrp->weight= GET_W(cbyte, ti);
1446 rrp->port= GET_W(cbyte, ti);
1447 return adns_s_ok;
1448 }
1449
1450 static adns_status pa_srvraw(const parseinfo *pai, int cbyte,
1451 int max, void *datap) {
1452 adns_rr_srvraw *rrp= datap;
1453 adns_status st;
1454
1455 st= pap_srv_begin(pai,&cbyte,max,datap);
1456 if (st) return st;
1457
1458 st= pap_domain(pai, &cbyte, max, &rrp->host,
1459 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1460 if (st) return st;
1461
1462 if (cbyte != max) return adns_s_invaliddata;
1463 return adns_s_ok;
1464 }
1465
1466 static adns_status pa_srvha(const parseinfo *pai, int cbyte,
1467 int max, void *datap) {
1468 adns_rr_srvha *rrp= datap;
1469 adns_status st;
1470
1471 st= pap_srv_begin(pai,&cbyte,max,datap); if (st) return st;
1472 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha); if (st) return st;
1473 if (cbyte != max) return adns_s_invaliddata;
1474 return adns_s_ok;
1475 }
1476
1477 static void mf_srvraw(adns_query qu, void *datap) {
1478 adns_rr_srvraw *rrp= datap;
1479 adns__makefinal_str(qu, &rrp->host);
1480 }
1481
1482 static void mf_srvha(adns_query qu, void *datap) {
1483 adns_rr_srvha *rrp= datap;
1484 mfp_hostaddr(qu,&rrp->ha);
1485 }
1486
1487 static int di_srv(adns_state ads, const void *datap_a, const void *datap_b) {
1488 const adns_rr_srvraw *ap= datap_a, *bp= datap_b;
1489 /* might be const adns_rr_svhostaddr* */
1490
1491 if (ap->priority < bp->priority) return 0;
1492 if (ap->priority > bp->priority) return 1;
1493 return 0;
1494 }
1495
1496 static adns_status csp_srv_begin(vbuf *vb, const adns_rr_srvha *rrp
1497 /* might be adns_rr_srvraw* */) {
1498 char buf[30];
1499 sprintf(buf,"%u %u %u ", rrp->priority, rrp->weight, rrp->port);
1500 CSP_ADDSTR(buf);
1501 return adns_s_ok;
1502 }
1503
1504 static adns_status cs_srvraw(vbuf *vb, const void *datap) {
1505 const adns_rr_srvraw *rrp= datap;
1506 adns_status st;
1507
1508 st= csp_srv_begin(vb,(const void*)rrp); if (st) return st;
1509 return csp_domain(vb,rrp->host);
1510 }
1511
1512 static adns_status cs_srvha(vbuf *vb, const void *datap) {
1513 const adns_rr_srvha *rrp= datap;
1514 adns_status st;
1515
1516 st= csp_srv_begin(vb,(const void*)datap); if (st) return st;
1517 return csp_hostaddr(vb,&rrp->ha);
1518 }
1519
1520 static void postsort_srv(adns_state ads, void *array, int nrrs,int rrsz,
1521 const struct typeinfo *typei) {
1522 /* we treat everything in the array as if it were an adns_rr_srvha
1523 * even though the array might be of adns_rr_srvraw. That's OK
1524 * because they have the same prefix, which is all we access.
1525 * We use rrsz, too, rather than naive array indexing, of course.
1526 */
1527 char *workbegin, *workend, *search, *arrayend;
1528 const adns_rr_srvha *rr;
1529 union { adns_rr_srvha ha; adns_rr_srvraw raw; } rrtmp;
1530 int cpriority, totalweight, runtotal;
1531 long randval;
1532
1533 assert(rrsz <= sizeof(rrtmp));
1534 for (workbegin= array, arrayend= workbegin + rrsz * nrrs;
1535 workbegin < arrayend;
1536 workbegin= workend) {
1537 cpriority= (rr=(void*)workbegin)->priority;
1538
1539 for (workend= workbegin, totalweight= 0;
1540 workend < arrayend && (rr=(void*)workend)->priority == cpriority;
1541 workend += rrsz) {
1542 totalweight += rr->weight;
1543 }
1544
1545 /* Now workbegin..(workend-1) incl. are exactly all of the RRs of
1546 * cpriority. From now on, workbegin points to the `remaining'
1547 * records: we select one record at a time (RFC2782 `Usage rules'
1548 * and `Format of the SRV RR' subsection `Weight') to place at
1549 * workbegin (swapping with the one that was there, and then
1550 * advance workbegin. */
1551 for (;
1552 workbegin + rrsz < workend; /* don't bother if just one */
1553 workbegin += rrsz) {
1554
1555 randval= nrand48(ads->rand48xsubi);
1556 randval %= (totalweight + 1);
1557 /* makes it into 0..totalweight inclusive; with 2^10 RRs,
1558 * totalweight must be <= 2^26 so probability nonuniformity is
1559 * no worse than 1 in 2^(31-26) ie 1 in 2^5, ie
1560 * abs(log(P_intended(RR_i) / P_actual(RR_i)) <= log(2^-5).
1561 */
1562
1563 for (search=workbegin, runtotal=0;
1564 (runtotal += (rr=(void*)search)->weight) < randval;
1565 search += rrsz);
1566 assert(search < arrayend);
1567 totalweight -= rr->weight;
1568 if (search != workbegin) {
1569 memcpy(&rrtmp, workbegin, rrsz);
1570 memcpy(workbegin, search, rrsz);
1571 memcpy(search, &rrtmp, rrsz);
1572 }
1573 }
1574 }
1575 /* tests:
1576 * dig -t srv _srv._tcp.test.iwj.relativity.greenend.org.uk.
1577 * ./adnshost_s -t srv- _sip._udp.voip.net.cam.ac.uk.
1578 * ./adnshost_s -t srv- _jabber._tcp.jabber.org
1579 */
1580 }
1581
1582 /*
1583 * _byteblock (mf)
1584 */
1585
1586 static void mf_byteblock(adns_query qu, void *datap) {
1587 adns_rr_byteblock *rrp= datap;
1588 void *bytes= rrp->data;
1589 adns__makefinal_block(qu,&bytes,rrp->len);
1590 rrp->data= bytes;
1591 }
1592
1593 /*
1594 * _opaque (pa,cs)
1595 */
1596
1597 static adns_status pa_opaque(const parseinfo *pai, int cbyte,
1598 int max, void *datap) {
1599 adns_rr_byteblock *rrp= datap;
1600
1601 rrp->len= max - cbyte;
1602 rrp->data= adns__alloc_interim(pai->qu, rrp->len);
1603 if (!rrp->data) R_NOMEM;
1604 memcpy(rrp->data, pai->dgram + cbyte, rrp->len);
1605 return adns_s_ok;
1606 }
1607
1608 static adns_status cs_opaque(vbuf *vb, const void *datap) {
1609 const adns_rr_byteblock *rrp= datap;
1610 char buf[10];
1611 int l;
1612 unsigned char *p;
1613
1614 sprintf(buf,"\\# %d",rrp->len);
1615 CSP_ADDSTR(buf);
1616
1617 for (l= rrp->len, p= rrp->data;
1618 l>=4;
1619 l -= 4, p += 4) {
1620 sprintf(buf," %02x%02x%02x%02x",p[0],p[1],p[2],p[3]);
1621 CSP_ADDSTR(buf);
1622 }
1623 for (;
1624 l>0;
1625 l--, p++) {
1626 sprintf(buf," %02x",*p);
1627 CSP_ADDSTR(buf);
1628 }
1629 return adns_s_ok;
1630 }
1631
1632 /*
1633 * _flat (mf)
1634 */
1635
1636 static void mf_flat(adns_query qu, void *data) { }
1637
1638 /*
1639 * Now the table.
1640 */
1641
1642 #define TYPESZ_M(member) (sizeof(*((adns_answer*)0)->rrs.member))
1643
1644 #define DEEP_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \
1645 { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_##memb, \
1646 GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \
1647 adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \
1648 CDR(__VA_ARGS__) }
1649 #define FLAT_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \
1650 { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_flat, \
1651 GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \
1652 adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \
1653 CDR(__VA_ARGS__) }
1654
1655 #define di_0 0
1656
1657 static const typeinfo typeinfos[] = {
1658 /* Must be in ascending order of rrtype ! */
1659 /* mem-mgmt code rrt fmt member parser comparer printer */
1660
1661 FLAT_TYPE(a, "A", 0, inaddr, inaddr, inaddr,inaddr ),
1662 DEEP_TYPE(ns_raw, "NS", "raw",str, host_raw,0, domain ),
1663 DEEP_TYPE(cname, "CNAME", 0, str, dom_raw, 0, domain ),
1664 DEEP_TYPE(soa_raw,"SOA", "raw",soa, soa, 0, soa ),
1665 DEEP_TYPE(ptr_raw,"PTR", "raw",str, host_raw,0, domain ),
1666 DEEP_TYPE(hinfo, "HINFO", 0, intstrpair,hinfo, 0, hinfo ),
1667 DEEP_TYPE(mx_raw, "MX", "raw",intstr, mx_raw, mx_raw,inthost ),
1668 DEEP_TYPE(txt, "TXT", 0, manyistr, txt, 0, txt ),
1669 DEEP_TYPE(rp_raw, "RP", "raw",strpair, rp, 0, rp ),
1670 FLAT_TYPE(aaaa, "AAAA", 0, in6addr, in6addr, in6addr,in6addr ),
1671 DEEP_TYPE(srv_raw,"SRV", "raw",srvraw , srvraw, srv, srvraw,
1672 .checklabel= ckl_srv, .postsort= postsort_srv),
1673
1674 FLAT_TYPE(addr, "A", "addr", addr, addr, addr, addr,
1675 .getrrsz= gsz_addr, .query_send= qs_addr),
1676 DEEP_TYPE(ns, "NS", "+addr",hostaddr, hostaddr,hostaddr,hostaddr ),
1677 DEEP_TYPE(ptr, "PTR","checked",str, ptr, 0, domain,
1678 .checklabel= ckl_ptr),
1679 DEEP_TYPE(mx, "MX", "+addr",inthostaddr,mx, mx, inthostaddr, ),
1680 DEEP_TYPE(srv, "SRV","+addr",srvha, srvha, srv, srvha,
1681 .checklabel= ckl_srv, .postsort= postsort_srv),
1682
1683 DEEP_TYPE(soa, "SOA","822", soa, soa, 0, soa ),
1684 DEEP_TYPE(rp, "RP", "822", strpair, rp, 0, rp ),
1685 };
1686
1687 static const typeinfo tinfo_addrsub =
1688 FLAT_TYPE(none, "<addr>","sub",addr, addr, 0, addr,
1689 .getrrsz= gsz_addr);
1690
1691 static const typeinfo typeinfo_unknown=
1692 DEEP_TYPE(unknown,0, "unknown",byteblock,opaque, 0, opaque );
1693
1694 const typeinfo *adns__findtype(adns_rrtype type) {
1695 const typeinfo *begin, *end, *mid;
1696
1697 if (type & adns_r_unknown) return &typeinfo_unknown;
1698 type &= adns_rrt_reprmask;
1699
1700 begin= typeinfos; end= typeinfos+(sizeof(typeinfos)/sizeof(typeinfo));
1701
1702 while (begin < end) {
1703 mid= begin + ((end-begin)>>1);
1704 if (mid->typekey == type) return mid;
1705 if (type > mid->typekey) begin= mid+1;
1706 else end= mid;
1707 }
1708 return 0;
1709 }