Licensing: Update copyright dates for Ian Jackson
[adns] / src / types.c
1 /*
2 * types.c
3 * - RR-type-specific code, and the machinery to call it
4 */
5 /*
6 * This file is part of adns, which is
7 * Copyright (C) 1997-2000,2003,2006,2014 Ian Jackson
8 * Copyright (C) 1999-2000,2003,2006 Tony Finch
9 * Copyright (C) 1991 Massachusetts Institute of Technology
10 * (See the file INSTALL for full details.)
11 *
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 3, or (at your option)
15 * any later version.
16 *
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software Foundation.
24 */
25
26 #include <stddef.h>
27 #include <stdlib.h>
28
29 #include <sys/types.h>
30 #include <sys/socket.h>
31 #include <netinet/in.h>
32 #include <arpa/inet.h>
33
34 #include "internal.h"
35
36 #define R_NOMEM return adns_s_nomemory
37 #define CSP_ADDSTR(s) do { \
38 if (!adns__vbuf_appendstr(vb,(s))) R_NOMEM; \
39 } while (0)
40
41 /*
42 * order of sections:
43 *
44 * _string (pap)
45 * _textdata, _qstring (csp)
46 * _str (mf,cs)
47 * _intstr (mf,csp,cs)
48 * _manyistr (mf,cs)
49 * _txt (pa)
50 * _inaddr (pa,di,cs
51 * +search_sortlist, dip_genaddr, csp_genaddr)
52 * _in6addr (pa,di,cs)
53 * _addr (pap,pa,di,div,csp,cs,gsz,qs
54 * +search_sortlist_sa, dip_sockaddr,
55 * addr_rrtypes, addr_submit, icb_addr)
56 * _domain (pap,csp,cs)
57 * _dom_raw (pa)
58 * _host_raw (pa)
59 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs
60 * +pap_findaddrs, icb_hostaddr)
61 * _mx_raw (pa,di)
62 * _mx (pa,di)
63 * _inthostaddr (mf,cs)
64 * _inthost (cs)
65 * _ptr (ckl,pa +icb_ptr)
66 * _strpair (mf)
67 * _intstrpair (mf)
68 * _hinfo (pa)
69 * _mailbox (pap,csp +pap_mailbox822)
70 * _rp (pa,cs)
71 * _soa (pa,mf,cs)
72 * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort)
73 * _byteblock (mf)
74 * _opaque (pa,cs)
75 * _flat (mf)
76 *
77 * within each section:
78 * ckl_*
79 * pap_*
80 * pa_*
81 * dip_*
82 * di_*
83 * mfp_*
84 * mf_*
85 * csp_*
86 * cs_*
87 * gsz_*
88 * postsort_*
89 * qs_*
90 */
91
92 /*
93 * _qstring (pap,csp)
94 */
95
96 static adns_status pap_qstring(const parseinfo *pai, int *cbyte_io, int max,
97 int *len_r, char **str_r) {
98 /* Neither len_r nor str_r may be null.
99 * End of datagram (overrun) is indicated by returning adns_s_invaliddata;
100 */
101 const byte *dgram= pai->dgram;
102 int l, cbyte;
103 char *str;
104
105 cbyte= *cbyte_io;
106
107 if (cbyte >= max) return adns_s_invaliddata;
108 GET_B(cbyte,l);
109 if (cbyte+l > max) return adns_s_invaliddata;
110
111 str= adns__alloc_interim(pai->qu, l+1);
112 if (!str) R_NOMEM;
113
114 str[l]= 0;
115 memcpy(str,dgram+cbyte,l);
116
117 *len_r= l;
118 *str_r= str;
119 *cbyte_io= cbyte+l;
120
121 return adns_s_ok;
122 }
123
124 static adns_status csp_qstring(vbuf *vb, const char *dp, int len) {
125 unsigned char ch;
126 char buf[10];
127 int cn;
128
129 CSP_ADDSTR("\"");
130 for (cn=0; cn<len; cn++) {
131 ch= *dp++;
132 if (ch == '\\') {
133 CSP_ADDSTR("\\\\");
134 } else if (ch == '"') {
135 CSP_ADDSTR("\\\"");
136 } else if (ch >= 32 && ch <= 126) {
137 if (!adns__vbuf_append(vb,&ch,1)) R_NOMEM;
138 } else {
139 sprintf(buf,"\\x%02x",ch);
140 CSP_ADDSTR(buf);
141 }
142 }
143 CSP_ADDSTR("\"");
144
145 return adns_s_ok;
146 }
147
148 /*
149 * _str (mf)
150 */
151
152 static void mf_str(adns_query qu, void *datap) {
153 char **rrp= datap;
154
155 adns__makefinal_str(qu,rrp);
156 }
157
158 /*
159 * _intstr (mf)
160 */
161
162 static void mf_intstr(adns_query qu, void *datap) {
163 adns_rr_intstr *rrp= datap;
164
165 adns__makefinal_str(qu,&rrp->str);
166 }
167
168 /*
169 * _manyistr (mf)
170 */
171
172 static void mf_manyistr(adns_query qu, void *datap) {
173 adns_rr_intstr **rrp= datap;
174 adns_rr_intstr *te, *table;
175 void *tablev;
176 int tc;
177
178 for (tc=0, te= *rrp; te->i >= 0; te++, tc++);
179 tablev= *rrp;
180 adns__makefinal_block(qu,&tablev,sizeof(*te)*(tc+1));
181 *rrp= table= tablev;
182 for (te= *rrp; te->i >= 0; te++)
183 adns__makefinal_str(qu,&te->str);
184 }
185
186 /*
187 * _txt (pa,cs)
188 */
189
190 static adns_status pa_txt(const parseinfo *pai, int cbyte,
191 int max, void *datap) {
192 adns_rr_intstr **rrp= datap, *table, *te;
193 const byte *dgram= pai->dgram;
194 int ti, tc, l, startbyte;
195 adns_status st;
196
197 startbyte= cbyte;
198 if (cbyte >= max) return adns_s_invaliddata;
199 tc= 0;
200 while (cbyte < max) {
201 GET_B(cbyte,l);
202 cbyte+= l;
203 tc++;
204 }
205 if (cbyte != max || !tc) return adns_s_invaliddata;
206
207 table= adns__alloc_interim(pai->qu,sizeof(*table)*(tc+1));
208 if (!table) R_NOMEM;
209
210 for (cbyte=startbyte, ti=0, te=table; ti<tc; ti++, te++) {
211 st= pap_qstring(pai, &cbyte, max, &te->i, &te->str);
212 if (st) return st;
213 }
214 assert(cbyte == max);
215
216 te->i= -1;
217 te->str= 0;
218
219 *rrp= table;
220 return adns_s_ok;
221 }
222
223 static adns_status cs_txt(vbuf *vb, const void *datap) {
224 const adns_rr_intstr *const *rrp= datap;
225 const adns_rr_intstr *current;
226 adns_status st;
227 int spc;
228
229 for (current= *rrp, spc=0; current->i >= 0; current++, spc=1) {
230 if (spc) CSP_ADDSTR(" ");
231 st= csp_qstring(vb,current->str,current->i); if (st) return st;
232 }
233 return adns_s_ok;
234 }
235
236 /*
237 * _hinfo (cs)
238 */
239
240 static adns_status cs_hinfo(vbuf *vb, const void *datap) {
241 const adns_rr_intstrpair *rrp= datap;
242 adns_status st;
243
244 st= csp_qstring(vb,rrp->array[0].str,rrp->array[0].i); if (st) return st;
245 CSP_ADDSTR(" ");
246 st= csp_qstring(vb,rrp->array[1].str,rrp->array[1].i); if (st) return st;
247 return adns_s_ok;
248 }
249
250 /*
251 * _inaddr (pa,di,cs +search_sortlist, dip_genaddr, csp_genaddr)
252 */
253
254 static adns_status pa_inaddr(const parseinfo *pai, int cbyte,
255 int max, void *datap) {
256 struct in_addr *storeto= datap;
257
258 if (max-cbyte != 4) return adns_s_invaliddata;
259 memcpy(storeto, pai->dgram + cbyte, 4);
260 return adns_s_ok;
261 }
262
263 static int search_sortlist(adns_state ads, int af, const void *ad) {
264 const struct sortlist *slp;
265 struct in_addr a4;
266 int i;
267 int v6mappedp= 0;
268
269 if (af == AF_INET6) {
270 const struct in6_addr *a6= ad;
271 if (IN6_IS_ADDR_V4MAPPED(a6)) {
272 a4.s_addr= htonl(((unsigned long)a6->s6_addr[12] << 24) |
273 ((unsigned long)a6->s6_addr[13] << 16) |
274 ((unsigned long)a6->s6_addr[14] << 8) |
275 ((unsigned long)a6->s6_addr[15] << 0));
276 v6mappedp= 1;
277 }
278 }
279
280 for (i=0, slp=ads->sortlist;
281 i<ads->nsortlist &&
282 !adns__addr_matches(af,ad, &slp->base,&slp->mask) &&
283 !(v6mappedp &&
284 adns__addr_matches(AF_INET,&a4, &slp->base,&slp->mask));
285 i++, slp++);
286 return i;
287 }
288
289 static int dip_genaddr(adns_state ads, int af, const void *a, const void *b) {
290 int ai, bi;
291
292 if (!ads->nsortlist) return 0;
293
294 ai= search_sortlist(ads,af,a);
295 bi= search_sortlist(ads,af,b);
296 return bi<ai;
297 }
298
299 static int di_inaddr(adns_state ads,
300 const void *datap_a, const void *datap_b) {
301 return dip_genaddr(ads,AF_INET,datap_a,datap_b);
302 }
303
304 static adns_status csp_genaddr(vbuf *vb, int af, const void *p) {
305 char buf[ADNS_ADDR2TEXT_BUFLEN];
306 int len= sizeof(buf);
307 adns_rr_addr a;
308 int err;
309
310 memset(&a, 0, sizeof(a));
311 a.addr.sa.sa_family= af;
312 adns__addr_inject(p, &a.addr);
313 err= adns_addr2text(&a.addr.sa,0, buf,&len, 0); assert(!err);
314 CSP_ADDSTR(buf);
315 return adns_s_ok;
316 }
317
318 static adns_status cs_inaddr(vbuf *vb, const void *datap) {
319 return csp_genaddr(vb, AF_INET,datap);
320 }
321
322 /*
323 * _in6addr (pa,di,cs)
324 */
325
326 static adns_status pa_in6addr(const parseinfo *pai, int cbyte,
327 int max, void *datap) {
328 struct in6_addr *storeto= datap;
329
330 if (max-cbyte != 16) return adns_s_invaliddata;
331 memcpy(storeto->s6_addr, pai->dgram + cbyte, 16);
332 return adns_s_ok;
333 }
334
335 static int di_in6addr(adns_state ads,
336 const void *datap_a, const void *datap_b) {
337 return dip_genaddr(ads,AF_INET6,datap_a,datap_b);
338 }
339
340 static adns_status cs_in6addr(vbuf *vb, const void *datap) {
341 return csp_genaddr(vb,AF_INET6,datap);
342 }
343
344 /*
345 * _addr (pap,pa,di,div,csp,cs,gsz,qs
346 * +search_sortlist_sa, dip_sockaddr, addr_rrtypes,
347 * addr_submit, icb_addr)
348 */
349
350 static const typeinfo tinfo_addrsub;
351
352 #define ADDR_RRTYPES(_) _(a) _(aaaa)
353
354 static const adns_rrtype addr_all_rrtypes[] = {
355 #define RRTY_CODE(ty) adns_r_##ty,
356 ADDR_RRTYPES(RRTY_CODE)
357 #undef RRTY_CODE
358 };
359
360 enum {
361 #define RRTY_INDEX(ty) addr__ri_##ty,
362 ADDR_RRTYPES(RRTY_INDEX)
363 #undef RRTY_INDEX
364 addr_nrrtypes,
365 #define RRTY_FLAG(ty) addr_rf_##ty = 1 << addr__ri_##ty,
366 ADDR_RRTYPES(RRTY_FLAG)
367 addr__rrty_eat_final_comma
368 #undef RRTY_FLAG
369 };
370
371 static unsigned addr_rrtypeflag(adns_rrtype type) {
372 int i;
373
374 type &= adns_rrt_typemask;
375 for (i=0; i<addr_nrrtypes; i++)
376 if (type==addr_all_rrtypes[i])
377 return 1 << i;
378 return 0;
379 }
380
381 /* About CNAME handling in addr queries.
382 *
383 * A user-level addr query is translated into a number of protocol-level
384 * queries, and its job is to reassemble the results. This gets tricky if
385 * the answers aren't consistent. In particular, if the answers report
386 * inconsistent indirection via CNAME records (e.g., different CNAMEs, or
387 * some indirect via a CNAME, and some don't) then we have trouble.
388 *
389 * Once we've received an answer, even if it was NODATA, we set
390 * adns__qf_addr_answer on the parent query. This will let us detect a
391 * conflict between a no-CNAME-with-NODATA reply and a subsequent CNAME.
392 *
393 * If we detect a conflict of any kind, then at least one answer came back
394 * with a CNAME record, so we pick the first such answer (somewhat
395 * arbitrarily) as being the `right' canonical name, and set this in the
396 * parent query's answer->cname slot. We discard address records from the
397 * wrong name. And finally we cancel the outstanding child queries, and
398 * resubmit address queries for the address families we don't yet have, with
399 * adns__qf_addr_cname set so that we know that we're in the fixup state.
400 */
401
402 static adns_status pap_addr(const parseinfo *pai, int in_rrty, size_t out_rrsz,
403 int *cbyte_io, int cbyte_max, adns_rr_addr *out) {
404 int in_addrlen;
405 int out_af, out_salen;
406 struct in6_addr v6map;
407
408 const void *use_addr= pai->dgram + *cbyte_io;
409
410 switch (in_rrty) {
411 case adns_r_a: in_addrlen= 4; out_af= AF_INET; break;
412 case adns_r_aaaa: in_addrlen= 16; out_af= AF_INET6; break;
413 default: abort();
414 }
415
416 if ((*cbyte_io + in_addrlen) != cbyte_max) return adns_s_invaliddata;
417
418 if (out_af==AF_INET &&
419 (pai->qu->flags & adns_qf_ipv6_mapv4) &&
420 (pai->qu->answer->type & adns__qtf_bigaddr)) {
421 memset(v6map.s6_addr + 0, 0x00, 10);
422 memset(v6map.s6_addr + 10, 0xff, 2);
423 memcpy(v6map.s6_addr + 12, use_addr, 4);
424 use_addr= v6map.s6_addr;
425 out_af= AF_INET6;
426 }
427
428 switch (out_af) {
429 case AF_INET: out_salen= sizeof(out->addr.inet); break;
430 case AF_INET6: out_salen= sizeof(out->addr.inet6); break;
431 default: abort();
432 }
433
434 assert(offsetof(adns_rr_addr, addr) + out_salen <= out_rrsz);
435
436 memset(&out->addr, 0, out_salen);
437 out->len= out_salen;
438 out->addr.sa.sa_family= out_af;
439 adns__addr_inject(use_addr, &out->addr);
440
441 *cbyte_io += in_addrlen;
442 return adns_s_ok;
443 }
444
445 static adns_status pa_addr(const parseinfo *pai, int cbyte,
446 int max, void *datap) {
447 int err= pap_addr(pai, pai->qu->answer->type & adns_rrt_typemask,
448 pai->qu->answer->rrsz, &cbyte, max, datap);
449 if (err) return err;
450 if (cbyte != max) return adns_s_invaliddata;
451 return adns_s_ok;
452 }
453
454 static int search_sortlist_sa(adns_state ads, const struct sockaddr *sa) {
455 const void *pa = adns__sockaddr_addr(sa);
456 return search_sortlist(ads, sa->sa_family, pa);
457 }
458
459 static int dip_sockaddr(adns_state ads,
460 const struct sockaddr *sa,
461 const struct sockaddr *sb) {
462 if (!ads->sortlist) return 0;
463 return search_sortlist_sa(ads, sa) > search_sortlist_sa(ads, sb);
464 }
465
466 static int di_addr(adns_state ads, const void *datap_a, const void *datap_b) {
467 const adns_rr_addr *ap= datap_a, *bp= datap_b;
468 return dip_sockaddr(ads, &ap->addr.sa, &bp->addr.sa);
469 }
470
471 static int div_addr(void *context, const void *datap_a, const void *datap_b) {
472 const adns_state ads= context;
473
474 return di_addr(ads, datap_a, datap_b);
475 }
476
477 static adns_status csp_addr(vbuf *vb, const adns_rr_addr *rrp) {
478 char buf[ADNS_ADDR2TEXT_BUFLEN];
479 int len= sizeof(buf);
480 int err;
481
482 switch (rrp->addr.inet.sin_family) {
483 case AF_INET:
484 CSP_ADDSTR("INET ");
485 goto a2t;
486 case AF_INET6:
487 CSP_ADDSTR("INET6 ");
488 goto a2t;
489 a2t:
490 err= adns_addr2text(&rrp->addr.sa,0, buf,&len, 0); assert(!err);
491 CSP_ADDSTR(buf);
492 break;
493 default:
494 sprintf(buf,"AF=%u",rrp->addr.sa.sa_family);
495 CSP_ADDSTR(buf);
496 break;
497 }
498 return adns_s_ok;
499 }
500
501 static adns_status cs_addr(vbuf *vb, const void *datap) {
502 const adns_rr_addr *rrp= datap;
503
504 return csp_addr(vb,rrp);
505 }
506
507 static int gsz_addr(const typeinfo *typei, adns_rrtype type) {
508 return type & adns__qtf_bigaddr ?
509 sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only);
510 }
511
512 static unsigned addr_rrtypes(adns_state ads, adns_rrtype type,
513 adns_queryflags qf) {
514 /* Return a mask of addr_rf_... flags indicating which address families are
515 * wanted, given a query type and flags.
516 */
517
518 adns_queryflags permitaf= 0;
519 unsigned want= 0;
520
521 if (!(type & adns__qtf_bigaddr))
522 qf= (qf & ~adns_qf_want_allaf) | adns_qf_want_ipv4;
523 else {
524 if (!(qf & adns_qf_want_allaf)) {
525 qf |= (type & adns__qtf_manyaf) ?
526 adns_qf_want_allaf : adns_qf_want_ipv4;
527 }
528 if (ads->iflags & adns_if_permit_ipv4) permitaf |= adns_qf_want_ipv4;
529 if (ads->iflags & adns_if_permit_ipv6) permitaf |= adns_qf_want_ipv6;
530 if (qf & permitaf) qf &= permitaf | ~adns_qf_want_allaf;
531 }
532
533 if (qf & adns_qf_want_ipv4) want |= addr_rf_a;
534 if (qf & adns_qf_want_ipv6) want |= addr_rf_aaaa;
535
536 return want;
537 }
538
539 static void icb_addr(adns_query parent, adns_query child);
540
541 static void addr_subqueries(adns_query qu, struct timeval now,
542 adns_queryflags qf_extra,
543 const byte *qd_dgram, int qd_dglen) {
544 int i, err, id;
545 adns_query cqu;
546 adns_queryflags qf= (qu->flags & ~adns_qf_search) | qf_extra;
547 adns_rrtype qtf= qu->answer->type & adns__qtf_deref;
548 unsigned which= qu->ctx.tinfo.addr.want & ~qu->ctx.tinfo.addr.have;
549 qcontext ctx;
550
551 memset(&ctx, 0, sizeof(ctx));
552 ctx.callback= icb_addr;
553 for (i=0; i<addr_nrrtypes; i++) {
554 if (!(which & (1 << i))) continue;
555 err= adns__mkquery_frdgram(qu->ads, &qu->vb, &id, qd_dgram,qd_dglen,
556 DNS_HDRSIZE, addr_all_rrtypes[i], qf);
557 if (err) goto x_error;
558 err= adns__internal_submit(qu->ads, &cqu, qu, &tinfo_addrsub,
559 addr_all_rrtypes[i] | qtf,
560 &qu->vb, id, qf, now, &ctx);
561 if (err) goto x_error;
562 cqu->answer->rrsz= qu->answer->rrsz;
563 }
564 qu->state= query_childw;
565 LIST_LINK_TAIL(qu->ads->childw, qu);
566 return;
567
568 x_error:
569 adns__query_fail(qu, err);
570 }
571
572 static adns_status addr_submit(adns_query parent, adns_query *query_r,
573 vbuf *qumsg_vb, int id, unsigned want,
574 adns_queryflags flags, struct timeval now,
575 qcontext *ctx) {
576 /* This is effectively a substitute for adns__internal_submit, intended for
577 * the case where the caller (possibly) only wants a subset of the
578 * available record types. The memory management and callback rules are
579 * the same as for adns__internal_submit.
580 *
581 * Some differences: the query is linked onto the parent's children
582 * list before exit (though the parent's state is not changed, and
583 * it is not linked into the childw list queue); and we set the
584 * `tinfo' portion of the context structure (yes, modifying *ctx),
585 * since this is, in fact, the main purpose of this function.
586 */
587
588 adns_state ads= parent->ads;
589 adns_query qu;
590 adns_status err;
591 adns_rrtype type= ((adns_r_addr & adns_rrt_reprmask) |
592 (parent->answer->type & ~adns_rrt_reprmask));
593
594 ctx->tinfo.addr.want= want;
595 ctx->tinfo.addr.have= 0;
596 err= adns__internal_submit(ads, &qu, parent, adns__findtype(adns_r_addr),
597 type, qumsg_vb, id, flags, now, ctx);
598 if (err) return err;
599
600 *query_r= qu;
601 return adns_s_ok;
602 }
603
604 static adns_status append_addrs(adns_query qu, size_t rrsz,
605 adns_rr_addr **dp, int *dlen,
606 const adns_rr_addr *sp, int slen) {
607 /* Append a vector of slen addr records, each of size rrsz, starting at ap,
608 * to a vector starting at *dp, of length *dlen. On successful completion,
609 * *dp and *dlen are updated.
610 */
611
612 size_t drrsz= *dlen*rrsz, srrsz= slen*rrsz;
613 byte *p;
614
615 if (!slen) return adns_s_ok;
616 p= adns__alloc_interim(qu, drrsz + srrsz);
617 if (!p) R_NOMEM;
618 if (*dlen) {
619 memcpy(p, *dp, drrsz);
620 adns__free_interim(qu, *dp);
621 }
622 memcpy(p + drrsz, sp, srrsz);
623 *dlen += slen;
624 *dp= (adns_rr_addr *)p;
625 return adns_s_ok;
626 }
627
628 static void propagate_ttl(adns_query to, adns_query from)
629 { if (to->expires > from->expires) to->expires= from->expires; }
630
631 static adns_status copy_cname_from_child(adns_query parent, adns_query child) {
632 adns_answer *pans= parent->answer, *cans= child->answer;
633 size_t n= strlen(cans->cname) + 1;
634
635 pans->cname= adns__alloc_preserved(parent, n);
636 if (!pans->cname) R_NOMEM;
637 memcpy(pans->cname, cans->cname, n);
638 return adns_s_ok;
639 }
640
641 static void done_addr_type(adns_query qu, adns_rrtype type) {
642 unsigned f= addr_rrtypeflag(type);
643 assert(f); qu->ctx.tinfo.addr.have |= f;
644 }
645
646 static void icb_addr(adns_query parent, adns_query child) {
647 adns_state ads= parent->ads;
648 adns_answer *pans= parent->answer, *cans= child->answer;
649 struct timeval now;
650 adns_status err;
651 adns_queryflags qf;
652 int id, r;
653
654 propagate_ttl(parent, child);
655
656 if (!(child->flags & adns__qf_addr_cname) &&
657 (parent->flags & adns__qf_addr_answer) &&
658 (!!pans->cname != !!cans->cname ||
659 (pans->cname && strcmp(pans->cname, cans->cname)))) {
660 /* We've detected an inconsistency in CNAME records, and must deploy
661 * countermeasures.
662 */
663
664 if (!pans->cname) {
665 /* The child has a CNAME record, but the parent doesn't. We must
666 * discard all of the parent's addresses, and substitute the child's.
667 */
668
669 assert(pans->rrsz == cans->rrsz);
670 adns__free_interim(parent, pans->rrs.bytes);
671 adns__transfer_interim(child, parent, cans->rrs.bytes);
672 pans->rrs.bytes= cans->rrs.bytes;
673 pans->nrrs= cans->nrrs;
674 parent->ctx.tinfo.addr.have= 0;
675 done_addr_type(parent, cans->type);
676 err= copy_cname_from_child(parent, child); if (err) goto x_err;
677 }
678
679 /* We've settled on the CNAME (now) associated with the parent, which
680 * already has appropriate address records. Build a query datagram for
681 * this name so that we can issue child queries for the missing address
682 * families. The child's vbuf looks handy for this.
683 */
684 err= adns__mkquery(ads, &child->vb, &id, pans->cname,
685 strlen(pans->cname), &tinfo_addrsub,
686 adns_r_addr, parent->flags);
687 if (err) goto x_err;
688
689 /* Now cancel the remaining children, and try again with the CNAME we've
690 * settled on.
691 */
692 adns__cancel_children(parent);
693 r= gettimeofday(&now, 0); if (r) goto x_gtod;
694 qf= adns__qf_addr_cname;
695 if (!(parent->flags & adns_qf_cname_loose)) qf |= adns_qf_cname_forbid;
696 addr_subqueries(parent, now, qf, child->vb.buf, child->vb.used);
697 return;
698 }
699
700 if (cans->cname && !pans->cname) {
701 err= copy_cname_from_child(parent, child);
702 if (err) goto x_err;
703 }
704
705 if ((parent->flags & adns_qf_search) &&
706 !pans->cname && cans->status == adns_s_nxdomain) {
707 /* We're searching a list of suffixes, and the name doesn't exist. Try
708 * the next one.
709 */
710
711 adns__cancel_children(parent);
712 adns__free_interim(parent, pans->rrs.bytes);
713 pans->rrs.bytes= 0; pans->nrrs= 0;
714 r= gettimeofday(&now, 0); if (r) goto x_gtod;
715 adns__search_next(ads, parent, now);
716 return;
717 }
718
719 if (cans->status && cans->status != adns_s_nodata)
720 { err= cans->status; goto x_err; }
721
722 assert(pans->rrsz == cans->rrsz);
723 err= append_addrs(parent, pans->rrsz,
724 &pans->rrs.addr, &pans->nrrs,
725 cans->rrs.addr, cans->nrrs);
726 if (err) goto x_err;
727 done_addr_type(parent, cans->type);
728
729 if (parent->children.head) LIST_LINK_TAIL(ads->childw, parent);
730 else if (!pans->nrrs) adns__query_fail(parent, adns_s_nodata);
731 else adns__query_done(parent);
732 parent->flags |= adns__qf_addr_answer;
733 return;
734
735 x_gtod:
736 /* We have our own error handling, because adns__must_gettimeofday
737 * handles errors by calling adns_globalsystemfailure, which would
738 * reenter the query processing logic. */
739 adns__diag(ads, -1, parent, "gettimeofday failed: %s", strerror(errno));
740 err= adns_s_systemfail;
741 goto x_err;
742
743 x_err:
744 adns__query_fail(parent, err);
745 }
746
747 static void qs_addr(adns_query qu, struct timeval now) {
748 if (!qu->ctx.tinfo.addr.want) {
749 qu->ctx.tinfo.addr.want= addr_rrtypes(qu->ads, qu->answer->type,
750 qu->flags);
751 qu->ctx.tinfo.addr.have= 0;
752 }
753 addr_subqueries(qu, now, 0, qu->query_dgram, qu->query_dglen);
754 }
755
756 /*
757 * _domain (pap,csp,cs)
758 * _dom_raw (pa)
759 */
760
761 static adns_status pap_domain(const parseinfo *pai, int *cbyte_io, int max,
762 char **domain_r, parsedomain_flags flags) {
763 adns_status st;
764 char *dm;
765
766 st= adns__parse_domain(pai->qu->ads, pai->serv, pai->qu, &pai->qu->vb, flags,
767 pai->dgram,pai->dglen, cbyte_io, max);
768 if (st) return st;
769 if (!pai->qu->vb.used) return adns_s_invaliddata;
770
771 dm= adns__alloc_interim(pai->qu, pai->qu->vb.used+1);
772 if (!dm) R_NOMEM;
773
774 dm[pai->qu->vb.used]= 0;
775 memcpy(dm,pai->qu->vb.buf,pai->qu->vb.used);
776
777 *domain_r= dm;
778 return adns_s_ok;
779 }
780
781 static adns_status csp_domain(vbuf *vb, const char *domain) {
782 CSP_ADDSTR(domain);
783 if (!*domain) CSP_ADDSTR(".");
784 return adns_s_ok;
785 }
786
787 static adns_status cs_domain(vbuf *vb, const void *datap) {
788 const char *const *domainp= datap;
789 return csp_domain(vb,*domainp);
790 }
791
792 static adns_status pa_dom_raw(const parseinfo *pai, int cbyte,
793 int max, void *datap) {
794 char **rrp= datap;
795 adns_status st;
796
797 st= pap_domain(pai, &cbyte, max, rrp, pdf_quoteok);
798 if (st) return st;
799
800 if (cbyte != max) return adns_s_invaliddata;
801 return adns_s_ok;
802 }
803
804 /*
805 * _host_raw (pa)
806 */
807
808 static adns_status pa_host_raw(const parseinfo *pai, int cbyte,
809 int max, void *datap) {
810 char **rrp= datap;
811 adns_status st;
812
813 st= pap_domain(pai, &cbyte, max, rrp,
814 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
815 if (st) return st;
816
817 if (cbyte != max) return adns_s_invaliddata;
818 return adns_s_ok;
819 }
820
821 /*
822 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +pap_findaddrs, icb_hostaddr)
823 */
824
825 static adns_status pap_findaddrs(const parseinfo *pai, adns_rr_hostaddr *ha,
826 unsigned *want_io, size_t addrsz,
827 int *cbyte_io, int count, int dmstart) {
828 int rri, naddrs;
829 unsigned typef, want= *want_io, need= want;
830 int type, class, rdlen, rdend, rdstart, ownermatched;
831 unsigned long ttl;
832 adns_status st;
833
834 for (rri=0, naddrs=0; rri<count; rri++) {
835 st= adns__findrr_anychk(pai->qu, pai->serv, pai->dgram,
836 pai->dglen, cbyte_io,
837 &type, &class, &ttl, &rdlen, &rdstart,
838 pai->dgram, pai->dglen, dmstart, &ownermatched);
839 if (st) return st;
840 if (!ownermatched || class != DNS_CLASS_IN) continue;
841 typef= addr_rrtypeflag(type);
842 if (!(want & typef)) continue;
843 need &= ~typef;
844 if (!adns__vbuf_ensure(&pai->qu->vb, (naddrs+1)*addrsz)) R_NOMEM;
845 adns__update_expires(pai->qu,ttl,pai->now);
846 rdend= rdstart + rdlen;
847 st= pap_addr(pai, type, addrsz, &rdstart, rdend,
848 (adns_rr_addr *)(pai->qu->vb.buf + naddrs*addrsz));
849 if (st) return st;
850 if (rdstart != rdend) return adns_s_invaliddata;
851 naddrs++;
852 }
853 if (naddrs > 0) {
854 st= append_addrs(pai->qu, addrsz, &ha->addrs, &ha->naddrs,
855 (const adns_rr_addr *)pai->qu->vb.buf, naddrs);
856 if (st) return st;
857 ha->astatus= adns_s_ok;
858
859 if (!need) {
860 adns__isort(ha->addrs, naddrs, addrsz, pai->qu->vb.buf,
861 div_addr, pai->ads);
862 }
863 }
864 *want_io= need;
865 return adns_s_ok;
866 }
867
868 static void icb_hostaddr(adns_query parent, adns_query child) {
869 adns_answer *cans= child->answer;
870 adns_rr_hostaddr *rrp= child->ctx.pinfo.hostaddr;
871 adns_state ads= parent->ads;
872 adns_status st;
873 size_t addrsz= gsz_addr(0, parent->answer->type);
874
875 st= cans->status == adns_s_nodata ? adns_s_ok : cans->status;
876 if (st) goto done;
877 propagate_ttl(parent, child);
878
879 assert(addrsz == cans->rrsz);
880 st= append_addrs(parent, addrsz,
881 &rrp->addrs, &rrp->naddrs,
882 cans->rrs.addr, cans->nrrs);
883 if (st) goto done;
884 if (!rrp->naddrs) { st= adns_s_nodata; goto done; }
885
886 if (!adns__vbuf_ensure(&parent->vb, addrsz))
887 { st= adns_s_nomemory; goto done; }
888 adns__isort(rrp->addrs, rrp->naddrs, addrsz, parent->vb.buf,
889 div_addr, ads);
890
891 done:
892 if (st) {
893 adns__free_interim(parent, rrp->addrs);
894 rrp->naddrs= (st>0 && st<=adns_s_max_tempfail) ? -1 : 0;
895 }
896
897 rrp->astatus= st;
898 if (parent->children.head) {
899 LIST_LINK_TAIL(ads->childw,parent);
900 } else {
901 adns__query_done(parent);
902 }
903 }
904
905 static adns_status pap_hostaddr(const parseinfo *pai, int *cbyte_io,
906 int max, adns_rr_hostaddr *rrp) {
907 adns_status st;
908 int dmstart, cbyte;
909 qcontext ctx;
910 int id;
911 adns_query nqu;
912 adns_queryflags nflags;
913 unsigned want;
914 size_t addrsz= gsz_addr(0, pai->qu->answer->type);
915
916 dmstart= cbyte= *cbyte_io;
917 st= pap_domain(pai, &cbyte, max, &rrp->host,
918 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
919 if (st) return st;
920 *cbyte_io= cbyte;
921
922 rrp->astatus= adns_s_ok;
923 rrp->naddrs= 0;
924 rrp->addrs= 0;
925
926 cbyte= pai->nsstart;
927
928 want= addr_rrtypes(pai->ads, pai->qu->answer->type, pai->qu->flags);
929
930 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->nscount, dmstart);
931 if (st) return st;
932 if (!want) return adns_s_ok;
933
934 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->arcount, dmstart);
935 if (st) return st;
936 if (!want) return adns_s_ok;
937
938 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
939 pai->dgram, pai->dglen, dmstart,
940 adns_r_addr, adns_qf_quoteok_query);
941 if (st) return st;
942
943 ctx.ext= 0;
944 ctx.callback= icb_hostaddr;
945 ctx.pinfo.hostaddr= rrp;
946
947 nflags= adns_qf_quoteok_query | (pai->qu->flags & (adns_qf_want_allaf |
948 adns_qf_ipv6_mapv4));
949 if (!(pai->qu->flags & adns_qf_cname_loose)) nflags |= adns_qf_cname_forbid;
950
951 st= addr_submit(pai->qu, &nqu, &pai->qu->vb, id, want,
952 nflags, pai->now, &ctx);
953 if (st) return st;
954
955 return adns_s_ok;
956 }
957
958 static adns_status pa_hostaddr(const parseinfo *pai, int cbyte,
959 int max, void *datap) {
960 adns_rr_hostaddr *rrp= datap;
961 adns_status st;
962
963 st= pap_hostaddr(pai, &cbyte, max, rrp);
964 if (st) return st;
965 if (cbyte != max) return adns_s_invaliddata;
966
967 return adns_s_ok;
968 }
969
970 static int dip_hostaddr(adns_state ads,
971 const adns_rr_hostaddr *ap, const adns_rr_hostaddr *bp) {
972 if (ap->astatus != bp->astatus) return ap->astatus;
973 if (ap->astatus) return 0;
974
975 return dip_sockaddr(ads, &ap->addrs[0].addr.sa, &bp->addrs[0].addr.sa);
976 }
977
978 static int di_hostaddr(adns_state ads,
979 const void *datap_a, const void *datap_b) {
980 const adns_rr_hostaddr *ap= datap_a, *bp= datap_b;
981
982 return dip_hostaddr(ads, ap,bp);
983 }
984
985 static void mfp_hostaddr(adns_query qu, adns_rr_hostaddr *rrp) {
986 void *tablev;
987 size_t addrsz= gsz_addr(0, qu->answer->type);
988
989 adns__makefinal_str(qu,&rrp->host);
990 tablev= rrp->addrs;
991 adns__makefinal_block(qu, &tablev, rrp->naddrs*addrsz);
992 rrp->addrs= tablev;
993 }
994
995 static void mf_hostaddr(adns_query qu, void *datap) {
996 adns_rr_hostaddr *rrp= datap;
997
998 mfp_hostaddr(qu,rrp);
999 }
1000
1001 static adns_status csp_hostaddr(vbuf *vb, const adns_rr_hostaddr *rrp) {
1002 const char *errstr;
1003 adns_status st;
1004 char buf[20];
1005 int i;
1006
1007 st= csp_domain(vb,rrp->host); if (st) return st;
1008
1009 CSP_ADDSTR(" ");
1010 CSP_ADDSTR(adns_errtypeabbrev(rrp->astatus));
1011
1012 sprintf(buf," %d ",rrp->astatus);
1013 CSP_ADDSTR(buf);
1014
1015 CSP_ADDSTR(adns_errabbrev(rrp->astatus));
1016 CSP_ADDSTR(" ");
1017
1018 errstr= adns_strerror(rrp->astatus);
1019 st= csp_qstring(vb,errstr,strlen(errstr)); if (st) return st;
1020
1021 if (rrp->naddrs >= 0) {
1022 CSP_ADDSTR(" (");
1023 for (i=0; i<rrp->naddrs; i++) {
1024 CSP_ADDSTR(" ");
1025 st= csp_addr(vb,&rrp->addrs[i]);
1026 }
1027 CSP_ADDSTR(" )");
1028 } else {
1029 CSP_ADDSTR(" ?");
1030 }
1031 return adns_s_ok;
1032 }
1033
1034 static adns_status cs_hostaddr(vbuf *vb, const void *datap) {
1035 const adns_rr_hostaddr *rrp= datap;
1036
1037 return csp_hostaddr(vb,rrp);
1038 }
1039
1040 /*
1041 * _mx_raw (pa,di)
1042 */
1043
1044 static adns_status pa_mx_raw(const parseinfo *pai, int cbyte,
1045 int max, void *datap) {
1046 const byte *dgram= pai->dgram;
1047 adns_rr_intstr *rrp= datap;
1048 adns_status st;
1049 int pref;
1050
1051 if (cbyte+2 > max) return adns_s_invaliddata;
1052 GET_W(cbyte,pref);
1053 rrp->i= pref;
1054 st= pap_domain(pai, &cbyte, max, &rrp->str,
1055 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1056 if (st) return st;
1057
1058 if (cbyte != max) return adns_s_invaliddata;
1059 return adns_s_ok;
1060 }
1061
1062 static int di_mx_raw(adns_state ads, const void *datap_a, const void *datap_b) {
1063 const adns_rr_intstr *ap= datap_a, *bp= datap_b;
1064
1065 if (ap->i < bp->i) return 0;
1066 if (ap->i > bp->i) return 1;
1067 return 0;
1068 }
1069
1070 /*
1071 * _mx (pa,di)
1072 */
1073
1074 static adns_status pa_mx(const parseinfo *pai, int cbyte,
1075 int max, void *datap) {
1076 const byte *dgram= pai->dgram;
1077 adns_rr_inthostaddr *rrp= datap;
1078 adns_status st;
1079 int pref;
1080
1081 if (cbyte+2 > max) return adns_s_invaliddata;
1082 GET_W(cbyte,pref);
1083 rrp->i= pref;
1084 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha);
1085 if (st) return st;
1086
1087 if (cbyte != max) return adns_s_invaliddata;
1088 return adns_s_ok;
1089 }
1090
1091 static int di_mx(adns_state ads, const void *datap_a, const void *datap_b) {
1092 const adns_rr_inthostaddr *ap= datap_a, *bp= datap_b;
1093
1094 if (ap->i < bp->i) return 0;
1095 if (ap->i > bp->i) return 1;
1096 return dip_hostaddr(ads, &ap->ha, &bp->ha);
1097 }
1098
1099 /*
1100 * _inthostaddr (mf,cs)
1101 */
1102
1103 static void mf_inthostaddr(adns_query qu, void *datap) {
1104 adns_rr_inthostaddr *rrp= datap;
1105
1106 mfp_hostaddr(qu,&rrp->ha);
1107 }
1108
1109 static adns_status cs_inthostaddr(vbuf *vb, const void *datap) {
1110 const adns_rr_inthostaddr *rrp= datap;
1111 char buf[10];
1112
1113 sprintf(buf,"%u ",rrp->i);
1114 CSP_ADDSTR(buf);
1115
1116 return csp_hostaddr(vb,&rrp->ha);
1117 }
1118
1119 /*
1120 * _inthost (cs)
1121 */
1122
1123 static adns_status cs_inthost(vbuf *vb, const void *datap) {
1124 const adns_rr_intstr *rrp= datap;
1125 char buf[10];
1126
1127 sprintf(buf,"%u ",rrp->i);
1128 CSP_ADDSTR(buf);
1129 return csp_domain(vb,rrp->str);
1130 }
1131
1132 /*
1133 * _ptr (ckl,pa +icb_ptr)
1134 */
1135
1136 static adns_status ckl_ptr(adns_state ads, adns_queryflags flags,
1137 union checklabel_state *cls, qcontext *ctx,
1138 int labnum, const char *dgram,
1139 int labstart, int lablen) {
1140 if (lablen) {
1141 if (!adns__revparse_label(&cls->ptr, labnum, dgram,labstart,lablen))
1142 return adns_s_querydomainwrong;
1143 } else {
1144 if (!adns__revparse_done(&cls->ptr, dgram, labnum,
1145 &ctx->tinfo.ptr.rev_rrtype,
1146 &ctx->tinfo.ptr.addr))
1147 return adns_s_querydomainwrong;
1148 }
1149 return adns_s_ok;
1150 }
1151
1152 static void icb_ptr(adns_query parent, adns_query child) {
1153 adns_answer *cans= child->answer;
1154 const adns_sockaddr *queried;
1155 const unsigned char *found;
1156 adns_state ads= parent->ads;
1157 int i;
1158
1159 if (cans->status == adns_s_nxdomain || cans->status == adns_s_nodata) {
1160 adns__query_fail(parent,adns_s_inconsistent);
1161 return;
1162 } else if (cans->status) {
1163 adns__query_fail(parent,cans->status);
1164 return;
1165 }
1166
1167 queried= &parent->ctx.tinfo.ptr.addr;
1168 for (i=0, found=cans->rrs.bytes; i<cans->nrrs; i++, found+=cans->rrsz) {
1169 if (adns__addrs_equal_raw(&queried->sa,
1170 parent->ctx.tinfo.ptr.addr.sa.sa_family,found)) {
1171 if (!parent->children.head) {
1172 adns__query_done(parent);
1173 return;
1174 } else {
1175 LIST_LINK_TAIL(ads->childw,parent);
1176 return;
1177 }
1178 }
1179 }
1180
1181 adns__query_fail(parent,adns_s_inconsistent);
1182 }
1183
1184 static adns_status pa_ptr(const parseinfo *pai, int dmstart,
1185 int max, void *datap) {
1186 char **rrp= datap;
1187 adns_status st;
1188 adns_rrtype rrtype= pai->qu->ctx.tinfo.ptr.rev_rrtype;
1189 int cbyte, id;
1190 adns_query nqu;
1191 qcontext ctx;
1192
1193 cbyte= dmstart;
1194 st= pap_domain(pai, &cbyte, max, rrp,
1195 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1196 if (st) return st;
1197 if (cbyte != max) return adns_s_invaliddata;
1198
1199 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
1200 pai->dgram, pai->dglen, dmstart,
1201 rrtype, adns_qf_quoteok_query);
1202 if (st) return st;
1203
1204 ctx.ext= 0;
1205 ctx.callback= icb_ptr;
1206 memset(&ctx.pinfo,0,sizeof(ctx.pinfo));
1207 memset(&ctx.tinfo,0,sizeof(ctx.tinfo));
1208 st= adns__internal_submit(pai->ads, &nqu, pai->qu,
1209 adns__findtype(rrtype),
1210 rrtype, &pai->qu->vb, id,
1211 adns_qf_quoteok_query, pai->now, &ctx);
1212 if (st) return st;
1213
1214 return adns_s_ok;
1215 }
1216
1217 /*
1218 * _strpair (mf)
1219 */
1220
1221 static void mf_strpair(adns_query qu, void *datap) {
1222 adns_rr_strpair *rrp= datap;
1223
1224 adns__makefinal_str(qu,&rrp->array[0]);
1225 adns__makefinal_str(qu,&rrp->array[1]);
1226 }
1227
1228 /*
1229 * _intstrpair (mf)
1230 */
1231
1232 static void mf_intstrpair(adns_query qu, void *datap) {
1233 adns_rr_intstrpair *rrp= datap;
1234
1235 adns__makefinal_str(qu,&rrp->array[0].str);
1236 adns__makefinal_str(qu,&rrp->array[1].str);
1237 }
1238
1239 /*
1240 * _hinfo (pa)
1241 */
1242
1243 static adns_status pa_hinfo(const parseinfo *pai, int cbyte,
1244 int max, void *datap) {
1245 adns_rr_intstrpair *rrp= datap;
1246 adns_status st;
1247 int i;
1248
1249 for (i=0; i<2; i++) {
1250 st= pap_qstring(pai, &cbyte, max, &rrp->array[i].i, &rrp->array[i].str);
1251 if (st) return st;
1252 }
1253
1254 if (cbyte != max) return adns_s_invaliddata;
1255
1256 return adns_s_ok;
1257 }
1258
1259 /*
1260 * _mailbox (pap,cs +pap_mailbox822)
1261 */
1262
1263 static adns_status pap_mailbox822(const parseinfo *pai,
1264 int *cbyte_io, int max, char **mb_r) {
1265 int lablen, labstart, i, needquote, c, r, neednorm;
1266 const unsigned char *p;
1267 char *str;
1268 findlabel_state fls;
1269 adns_status st;
1270 vbuf *vb;
1271
1272 vb= &pai->qu->vb;
1273 vb->used= 0;
1274 adns__findlabel_start(&fls, pai->ads,
1275 -1, pai->qu,
1276 pai->dgram, pai->dglen, max,
1277 *cbyte_io, cbyte_io);
1278 st= adns__findlabel_next(&fls,&lablen,&labstart);
1279 if (!lablen) {
1280 adns__vbuf_appendstr(vb,".");
1281 goto x_ok;
1282 }
1283
1284 neednorm= 1;
1285 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++) {
1286 c= *p++;
1287 if ((c&~128) < 32 || (c&~128) == 127) return adns_s_invaliddata;
1288 if (c == '.' && !neednorm) neednorm= 1;
1289 else if (c==' ' || c>=127 || ctype_822special(c)) needquote++;
1290 else neednorm= 0;
1291 }
1292
1293 if (needquote || neednorm) {
1294 r= adns__vbuf_ensure(vb, lablen+needquote+4); if (!r) R_NOMEM;
1295 adns__vbuf_appendq(vb,"\"",1);
1296 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++, p++) {
1297 c= *p;
1298 if (c == '"' || c=='\\') adns__vbuf_appendq(vb,"\\",1);
1299 adns__vbuf_appendq(vb,p,1);
1300 }
1301 adns__vbuf_appendq(vb,"\"",1);
1302 } else {
1303 r= adns__vbuf_append(vb, pai->dgram+labstart, lablen); if (!r) R_NOMEM;
1304 }
1305
1306 r= adns__vbuf_appendstr(vb,"@"); if (!r) R_NOMEM;
1307
1308 st= adns__parse_domain_more(&fls,pai->ads, pai->qu,vb,0, pai->dgram);
1309 if (st) return st;
1310
1311 x_ok:
1312 str= adns__alloc_interim(pai->qu, vb->used+1); if (!str) R_NOMEM;
1313 memcpy(str,vb->buf,vb->used);
1314 str[vb->used]= 0;
1315 *mb_r= str;
1316 return adns_s_ok;
1317 }
1318
1319 static adns_status pap_mailbox(const parseinfo *pai, int *cbyte_io, int max,
1320 char **mb_r) {
1321 if (pai->qu->typei->typekey & adns__qtf_mail822) {
1322 return pap_mailbox822(pai, cbyte_io, max, mb_r);
1323 } else {
1324 return pap_domain(pai, cbyte_io, max, mb_r, pdf_quoteok);
1325 }
1326 }
1327
1328 static adns_status csp_mailbox(vbuf *vb, const char *mailbox) {
1329 return csp_domain(vb,mailbox);
1330 }
1331
1332 /*
1333 * _rp (pa,cs)
1334 */
1335
1336 static adns_status pa_rp(const parseinfo *pai, int cbyte,
1337 int max, void *datap) {
1338 adns_rr_strpair *rrp= datap;
1339 adns_status st;
1340
1341 st= pap_mailbox(pai, &cbyte, max, &rrp->array[0]);
1342 if (st) return st;
1343
1344 st= pap_domain(pai, &cbyte, max, &rrp->array[1], pdf_quoteok);
1345 if (st) return st;
1346
1347 if (cbyte != max) return adns_s_invaliddata;
1348 return adns_s_ok;
1349 }
1350
1351 static adns_status cs_rp(vbuf *vb, const void *datap) {
1352 const adns_rr_strpair *rrp= datap;
1353 adns_status st;
1354
1355 st= csp_mailbox(vb,rrp->array[0]); if (st) return st;
1356 CSP_ADDSTR(" ");
1357 st= csp_domain(vb,rrp->array[1]); if (st) return st;
1358
1359 return adns_s_ok;
1360 }
1361
1362 /*
1363 * _soa (pa,mf,cs)
1364 */
1365
1366 static adns_status pa_soa(const parseinfo *pai, int cbyte,
1367 int max, void *datap) {
1368 adns_rr_soa *rrp= datap;
1369 const byte *dgram= pai->dgram;
1370 adns_status st;
1371 int msw, lsw, i;
1372
1373 st= pap_domain(pai, &cbyte, max, &rrp->mname,
1374 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1375 if (st) return st;
1376
1377 st= pap_mailbox(pai, &cbyte, max, &rrp->rname);
1378 if (st) return st;
1379
1380 if (cbyte+20 != max) return adns_s_invaliddata;
1381
1382 for (i=0; i<5; i++) {
1383 GET_W(cbyte,msw);
1384 GET_W(cbyte,lsw);
1385 (&rrp->serial)[i]= (msw<<16) | lsw;
1386 }
1387
1388 return adns_s_ok;
1389 }
1390
1391 static void mf_soa(adns_query qu, void *datap) {
1392 adns_rr_soa *rrp= datap;
1393
1394 adns__makefinal_str(qu,&rrp->mname);
1395 adns__makefinal_str(qu,&rrp->rname);
1396 }
1397
1398 static adns_status cs_soa(vbuf *vb, const void *datap) {
1399 const adns_rr_soa *rrp= datap;
1400 char buf[20];
1401 int i;
1402 adns_status st;
1403
1404 st= csp_domain(vb,rrp->mname); if (st) return st;
1405 CSP_ADDSTR(" ");
1406 st= csp_mailbox(vb,rrp->rname); if (st) return st;
1407
1408 for (i=0; i<5; i++) {
1409 sprintf(buf," %lu",(&rrp->serial)[i]);
1410 CSP_ADDSTR(buf);
1411 }
1412
1413 return adns_s_ok;
1414 }
1415
1416 /*
1417 * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort)
1418 */
1419
1420 static adns_status ckl_srv(adns_state ads, adns_queryflags flags,
1421 union checklabel_state *cls, qcontext *ctx,
1422 int labnum, const char *dgram,
1423 int labstart, int lablen) {
1424 const char *label = dgram+labstart;
1425 if (labnum < 2) {
1426 if (flags & adns_qf_quoteok_query) return adns_s_ok;
1427 if (!lablen || label[0] != '_') return adns_s_querydomaininvalid;
1428 return adns_s_ok;
1429 }
1430 return adns__ckl_hostname(ads,flags, cls,ctx, labnum, dgram,labstart,lablen);
1431 }
1432
1433 static adns_status pap_srv_begin(const parseinfo *pai, int *cbyte_io, int max,
1434 adns_rr_srvha *rrp
1435 /* might be adns_rr_srvraw* */) {
1436 const byte *dgram= pai->dgram;
1437 int ti, cbyte;
1438
1439 cbyte= *cbyte_io;
1440 if ((*cbyte_io += 6) > max) return adns_s_invaliddata;
1441
1442 rrp->priority= GET_W(cbyte, ti);
1443 rrp->weight= GET_W(cbyte, ti);
1444 rrp->port= GET_W(cbyte, ti);
1445 return adns_s_ok;
1446 }
1447
1448 static adns_status pa_srvraw(const parseinfo *pai, int cbyte,
1449 int max, void *datap) {
1450 adns_rr_srvraw *rrp= datap;
1451 adns_status st;
1452
1453 st= pap_srv_begin(pai,&cbyte,max,datap);
1454 if (st) return st;
1455
1456 st= pap_domain(pai, &cbyte, max, &rrp->host,
1457 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1458 if (st) return st;
1459
1460 if (cbyte != max) return adns_s_invaliddata;
1461 return adns_s_ok;
1462 }
1463
1464 static adns_status pa_srvha(const parseinfo *pai, int cbyte,
1465 int max, void *datap) {
1466 adns_rr_srvha *rrp= datap;
1467 adns_status st;
1468
1469 st= pap_srv_begin(pai,&cbyte,max,datap); if (st) return st;
1470 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha); if (st) return st;
1471 if (cbyte != max) return adns_s_invaliddata;
1472 return adns_s_ok;
1473 }
1474
1475 static void mf_srvraw(adns_query qu, void *datap) {
1476 adns_rr_srvraw *rrp= datap;
1477 adns__makefinal_str(qu, &rrp->host);
1478 }
1479
1480 static void mf_srvha(adns_query qu, void *datap) {
1481 adns_rr_srvha *rrp= datap;
1482 mfp_hostaddr(qu,&rrp->ha);
1483 }
1484
1485 static int di_srv(adns_state ads, const void *datap_a, const void *datap_b) {
1486 const adns_rr_srvraw *ap= datap_a, *bp= datap_b;
1487 /* might be const adns_rr_svhostaddr* */
1488
1489 if (ap->priority < bp->priority) return 0;
1490 if (ap->priority > bp->priority) return 1;
1491 return 0;
1492 }
1493
1494 static adns_status csp_srv_begin(vbuf *vb, const adns_rr_srvha *rrp
1495 /* might be adns_rr_srvraw* */) {
1496 char buf[30];
1497 sprintf(buf,"%u %u %u ", rrp->priority, rrp->weight, rrp->port);
1498 CSP_ADDSTR(buf);
1499 return adns_s_ok;
1500 }
1501
1502 static adns_status cs_srvraw(vbuf *vb, const void *datap) {
1503 const adns_rr_srvraw *rrp= datap;
1504 adns_status st;
1505
1506 st= csp_srv_begin(vb,(const void*)rrp); if (st) return st;
1507 return csp_domain(vb,rrp->host);
1508 }
1509
1510 static adns_status cs_srvha(vbuf *vb, const void *datap) {
1511 const adns_rr_srvha *rrp= datap;
1512 adns_status st;
1513
1514 st= csp_srv_begin(vb,(const void*)datap); if (st) return st;
1515 return csp_hostaddr(vb,&rrp->ha);
1516 }
1517
1518 static void postsort_srv(adns_state ads, void *array, int nrrs,int rrsz,
1519 const struct typeinfo *typei) {
1520 /* we treat everything in the array as if it were an adns_rr_srvha
1521 * even though the array might be of adns_rr_srvraw. That's OK
1522 * because they have the same prefix, which is all we access.
1523 * We use rrsz, too, rather than naive array indexing, of course.
1524 */
1525 char *workbegin, *workend, *search, *arrayend;
1526 const adns_rr_srvha *rr;
1527 union { adns_rr_srvha ha; adns_rr_srvraw raw; } rrtmp;
1528 int cpriority, totalweight, runtotal;
1529 long randval;
1530
1531 assert(rrsz <= sizeof(rrtmp));
1532 for (workbegin= array, arrayend= workbegin + rrsz * nrrs;
1533 workbegin < arrayend;
1534 workbegin= workend) {
1535 cpriority= (rr=(void*)workbegin)->priority;
1536
1537 for (workend= workbegin, totalweight= 0;
1538 workend < arrayend && (rr=(void*)workend)->priority == cpriority;
1539 workend += rrsz) {
1540 totalweight += rr->weight;
1541 }
1542
1543 /* Now workbegin..(workend-1) incl. are exactly all of the RRs of
1544 * cpriority. From now on, workbegin points to the `remaining'
1545 * records: we select one record at a time (RFC2782 `Usage rules'
1546 * and `Format of the SRV RR' subsection `Weight') to place at
1547 * workbegin (swapping with the one that was there, and then
1548 * advance workbegin. */
1549 for (;
1550 workbegin + rrsz < workend; /* don't bother if just one */
1551 workbegin += rrsz) {
1552
1553 randval= nrand48(ads->rand48xsubi);
1554 randval %= (totalweight + 1);
1555 /* makes it into 0..totalweight inclusive; with 2^10 RRs,
1556 * totalweight must be <= 2^26 so probability nonuniformity is
1557 * no worse than 1 in 2^(31-26) ie 1 in 2^5, ie
1558 * abs(log(P_intended(RR_i) / P_actual(RR_i)) <= log(2^-5).
1559 */
1560
1561 for (search=workbegin, runtotal=0;
1562 (runtotal += (rr=(void*)search)->weight) < randval;
1563 search += rrsz);
1564 assert(search < arrayend);
1565 totalweight -= rr->weight;
1566 if (search != workbegin) {
1567 memcpy(&rrtmp, workbegin, rrsz);
1568 memcpy(workbegin, search, rrsz);
1569 memcpy(search, &rrtmp, rrsz);
1570 }
1571 }
1572 }
1573 /* tests:
1574 * dig -t srv _srv._tcp.test.iwj.relativity.greenend.org.uk.
1575 * ./adnshost_s -t srv- _sip._udp.voip.net.cam.ac.uk.
1576 * ./adnshost_s -t srv- _jabber._tcp.jabber.org
1577 */
1578 }
1579
1580 /*
1581 * _byteblock (mf)
1582 */
1583
1584 static void mf_byteblock(adns_query qu, void *datap) {
1585 adns_rr_byteblock *rrp= datap;
1586 void *bytes= rrp->data;
1587 adns__makefinal_block(qu,&bytes,rrp->len);
1588 rrp->data= bytes;
1589 }
1590
1591 /*
1592 * _opaque (pa,cs)
1593 */
1594
1595 static adns_status pa_opaque(const parseinfo *pai, int cbyte,
1596 int max, void *datap) {
1597 adns_rr_byteblock *rrp= datap;
1598
1599 rrp->len= max - cbyte;
1600 rrp->data= adns__alloc_interim(pai->qu, rrp->len);
1601 if (!rrp->data) R_NOMEM;
1602 memcpy(rrp->data, pai->dgram + cbyte, rrp->len);
1603 return adns_s_ok;
1604 }
1605
1606 static adns_status cs_opaque(vbuf *vb, const void *datap) {
1607 const adns_rr_byteblock *rrp= datap;
1608 char buf[10];
1609 int l;
1610 unsigned char *p;
1611
1612 sprintf(buf,"\\# %d",rrp->len);
1613 CSP_ADDSTR(buf);
1614
1615 for (l= rrp->len, p= rrp->data;
1616 l>=4;
1617 l -= 4, p += 4) {
1618 sprintf(buf," %02x%02x%02x%02x",p[0],p[1],p[2],p[3]);
1619 CSP_ADDSTR(buf);
1620 }
1621 for (;
1622 l>0;
1623 l--, p++) {
1624 sprintf(buf," %02x",*p);
1625 CSP_ADDSTR(buf);
1626 }
1627 return adns_s_ok;
1628 }
1629
1630 /*
1631 * _flat (mf)
1632 */
1633
1634 static void mf_flat(adns_query qu, void *data) { }
1635
1636 /*
1637 * Now the table.
1638 */
1639
1640 #define TYPESZ_M(member) (sizeof(*((adns_answer*)0)->rrs.member))
1641
1642 #define DEEP_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \
1643 { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_##memb, \
1644 GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \
1645 adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \
1646 CDR(__VA_ARGS__) }
1647 #define FLAT_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \
1648 { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_flat, \
1649 GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \
1650 adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \
1651 CDR(__VA_ARGS__) }
1652
1653 #define di_0 0
1654
1655 static const typeinfo typeinfos[] = {
1656 /* Must be in ascending order of rrtype ! */
1657 /* mem-mgmt code rrt fmt member parser comparer printer */
1658
1659 FLAT_TYPE(a, "A", 0, inaddr, inaddr, inaddr,inaddr ),
1660 DEEP_TYPE(ns_raw, "NS", "raw",str, host_raw,0, domain ),
1661 DEEP_TYPE(cname, "CNAME", 0, str, dom_raw, 0, domain ),
1662 DEEP_TYPE(soa_raw,"SOA", "raw",soa, soa, 0, soa ),
1663 DEEP_TYPE(ptr_raw,"PTR", "raw",str, host_raw,0, domain ),
1664 DEEP_TYPE(hinfo, "HINFO", 0, intstrpair,hinfo, 0, hinfo ),
1665 DEEP_TYPE(mx_raw, "MX", "raw",intstr, mx_raw, mx_raw,inthost ),
1666 DEEP_TYPE(txt, "TXT", 0, manyistr, txt, 0, txt ),
1667 DEEP_TYPE(rp_raw, "RP", "raw",strpair, rp, 0, rp ),
1668 FLAT_TYPE(aaaa, "AAAA", 0, in6addr, in6addr, in6addr,in6addr ),
1669 DEEP_TYPE(srv_raw,"SRV", "raw",srvraw , srvraw, srv, srvraw,
1670 .checklabel= ckl_srv, .postsort= postsort_srv),
1671
1672 FLAT_TYPE(addr, "A", "addr", addr, addr, addr, addr,
1673 .getrrsz= gsz_addr, .query_send= qs_addr),
1674 DEEP_TYPE(ns, "NS", "+addr",hostaddr, hostaddr,hostaddr,hostaddr ),
1675 DEEP_TYPE(ptr, "PTR","checked",str, ptr, 0, domain,
1676 .checklabel= ckl_ptr),
1677 DEEP_TYPE(mx, "MX", "+addr",inthostaddr,mx, mx, inthostaddr, ),
1678 DEEP_TYPE(srv, "SRV","+addr",srvha, srvha, srv, srvha,
1679 .checklabel= ckl_srv, .postsort= postsort_srv),
1680
1681 DEEP_TYPE(soa, "SOA","822", soa, soa, 0, soa ),
1682 DEEP_TYPE(rp, "RP", "822", strpair, rp, 0, rp ),
1683 };
1684
1685 static const typeinfo tinfo_addrsub =
1686 FLAT_TYPE(none, "<addr>","sub",addr, addr, 0, addr,
1687 .getrrsz= gsz_addr);
1688
1689 static const typeinfo typeinfo_unknown=
1690 DEEP_TYPE(unknown,0, "unknown",byteblock,opaque, 0, opaque );
1691
1692 const typeinfo *adns__findtype(adns_rrtype type) {
1693 const typeinfo *begin, *end, *mid;
1694
1695 if (type & adns_r_unknown) return &typeinfo_unknown;
1696 type &= adns_rrt_reprmask;
1697
1698 begin= typeinfos; end= typeinfos+(sizeof(typeinfos)/sizeof(typeinfo));
1699
1700 while (begin < end) {
1701 mid= begin + ((end-begin)>>1);
1702 if (mid->typekey == type) return mid;
1703 if (type > mid->typekey) begin= mid+1;
1704 else end= mid;
1705 }
1706 return 0;
1707 }