Support v6-mapping IPv4 addresses found doing addr lookups.
[adns] / src / types.c
1 /*
2 * types.c
3 * - RR-type-specific code, and the machinery to call it
4 */
5 /*
6 * This file is part of adns, which is
7 * Copyright (C) 1997-2000,2003,2006 Ian Jackson
8 * Copyright (C) 1999-2000,2003,2006 Tony Finch
9 * Copyright (C) 1991 Massachusetts Institute of Technology
10 * (See the file INSTALL for full details.)
11 *
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2, or (at your option)
15 * any later version.
16 *
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software Foundation,
24 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25 */
26
27 #include <stddef.h>
28 #include <stdlib.h>
29
30 #include <sys/types.h>
31 #include <sys/socket.h>
32 #include <netinet/in.h>
33 #include <arpa/inet.h>
34
35 #include "internal.h"
36
37 #define R_NOMEM return adns_s_nomemory
38 #define CSP_ADDSTR(s) do { \
39 if (!adns__vbuf_appendstr(vb,(s))) R_NOMEM; \
40 } while (0)
41
42 /*
43 * order of sections:
44 *
45 * _string (pap)
46 * _textdata, _qstring (csp)
47 * _str (mf,cs)
48 * _intstr (mf,csp,cs)
49 * _manyistr (mf,cs)
50 * _txt (pa)
51 * _inaddr (pa,di,cs
52 * +search_sortlist, dip_genaddr, csp_genaddr)
53 * _in6addr (pa,di,cs)
54 * _addr (pap,pa,di,div,csp,cs,gsz,qs
55 * +search_sortlist_sa, dip_sockaddr,
56 * addr_rrtypes, addr_submit, icb_addr)
57 * _domain (pap,csp,cs)
58 * _dom_raw (pa)
59 * _host_raw (pa)
60 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs
61 * +pap_findaddrs, icb_hostaddr)
62 * _mx_raw (pa,di)
63 * _mx (pa,di)
64 * _inthostaddr (mf,cs)
65 * _inthost (cs)
66 * _ptr (ckl,pa +icb_ptr)
67 * _strpair (mf)
68 * _intstrpair (mf)
69 * _hinfo (pa)
70 * _mailbox (pap,csp +pap_mailbox822)
71 * _rp (pa,cs)
72 * _soa (pa,mf,cs)
73 * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort)
74 * _byteblock (mf)
75 * _opaque (pa,cs)
76 * _flat (mf)
77 *
78 * within each section:
79 * ckl_*
80 * pap_*
81 * pa_*
82 * dip_*
83 * di_*
84 * mfp_*
85 * mf_*
86 * csp_*
87 * cs_*
88 * gsz_*
89 * postsort_*
90 * qs_*
91 */
92
93 /*
94 * _qstring (pap,csp)
95 */
96
97 static adns_status pap_qstring(const parseinfo *pai, int *cbyte_io, int max,
98 int *len_r, char **str_r) {
99 /* Neither len_r nor str_r may be null.
100 * End of datagram (overrun) is indicated by returning adns_s_invaliddata;
101 */
102 const byte *dgram= pai->dgram;
103 int l, cbyte;
104 char *str;
105
106 cbyte= *cbyte_io;
107
108 if (cbyte >= max) return adns_s_invaliddata;
109 GET_B(cbyte,l);
110 if (cbyte+l > max) return adns_s_invaliddata;
111
112 str= adns__alloc_interim(pai->qu, l+1);
113 if (!str) R_NOMEM;
114
115 str[l]= 0;
116 memcpy(str,dgram+cbyte,l);
117
118 *len_r= l;
119 *str_r= str;
120 *cbyte_io= cbyte+l;
121
122 return adns_s_ok;
123 }
124
125 static adns_status csp_qstring(vbuf *vb, const char *dp, int len) {
126 unsigned char ch;
127 char buf[10];
128 int cn;
129
130 CSP_ADDSTR("\"");
131 for (cn=0; cn<len; cn++) {
132 ch= *dp++;
133 if (ch == '\\') {
134 CSP_ADDSTR("\\\\");
135 } else if (ch == '"') {
136 CSP_ADDSTR("\\\"");
137 } else if (ch >= 32 && ch <= 126) {
138 if (!adns__vbuf_append(vb,&ch,1)) R_NOMEM;
139 } else {
140 sprintf(buf,"\\x%02x",ch);
141 CSP_ADDSTR(buf);
142 }
143 }
144 CSP_ADDSTR("\"");
145
146 return adns_s_ok;
147 }
148
149 /*
150 * _str (mf)
151 */
152
153 static void mf_str(adns_query qu, void *datap) {
154 char **rrp= datap;
155
156 adns__makefinal_str(qu,rrp);
157 }
158
159 /*
160 * _intstr (mf)
161 */
162
163 static void mf_intstr(adns_query qu, void *datap) {
164 adns_rr_intstr *rrp= datap;
165
166 adns__makefinal_str(qu,&rrp->str);
167 }
168
169 /*
170 * _manyistr (mf)
171 */
172
173 static void mf_manyistr(adns_query qu, void *datap) {
174 adns_rr_intstr **rrp= datap;
175 adns_rr_intstr *te, *table;
176 void *tablev;
177 int tc;
178
179 for (tc=0, te= *rrp; te->i >= 0; te++, tc++);
180 tablev= *rrp;
181 adns__makefinal_block(qu,&tablev,sizeof(*te)*(tc+1));
182 *rrp= table= tablev;
183 for (te= *rrp; te->i >= 0; te++)
184 adns__makefinal_str(qu,&te->str);
185 }
186
187 /*
188 * _txt (pa,cs)
189 */
190
191 static adns_status pa_txt(const parseinfo *pai, int cbyte,
192 int max, void *datap) {
193 adns_rr_intstr **rrp= datap, *table, *te;
194 const byte *dgram= pai->dgram;
195 int ti, tc, l, startbyte;
196 adns_status st;
197
198 startbyte= cbyte;
199 if (cbyte >= max) return adns_s_invaliddata;
200 tc= 0;
201 while (cbyte < max) {
202 GET_B(cbyte,l);
203 cbyte+= l;
204 tc++;
205 }
206 if (cbyte != max || !tc) return adns_s_invaliddata;
207
208 table= adns__alloc_interim(pai->qu,sizeof(*table)*(tc+1));
209 if (!table) R_NOMEM;
210
211 for (cbyte=startbyte, ti=0, te=table; ti<tc; ti++, te++) {
212 st= pap_qstring(pai, &cbyte, max, &te->i, &te->str);
213 if (st) return st;
214 }
215 assert(cbyte == max);
216
217 te->i= -1;
218 te->str= 0;
219
220 *rrp= table;
221 return adns_s_ok;
222 }
223
224 static adns_status cs_txt(vbuf *vb, const void *datap) {
225 const adns_rr_intstr *const *rrp= datap;
226 const adns_rr_intstr *current;
227 adns_status st;
228 int spc;
229
230 for (current= *rrp, spc=0; current->i >= 0; current++, spc=1) {
231 if (spc) CSP_ADDSTR(" ");
232 st= csp_qstring(vb,current->str,current->i); if (st) return st;
233 }
234 return adns_s_ok;
235 }
236
237 /*
238 * _hinfo (cs)
239 */
240
241 static adns_status cs_hinfo(vbuf *vb, const void *datap) {
242 const adns_rr_intstrpair *rrp= datap;
243 adns_status st;
244
245 st= csp_qstring(vb,rrp->array[0].str,rrp->array[0].i); if (st) return st;
246 CSP_ADDSTR(" ");
247 st= csp_qstring(vb,rrp->array[1].str,rrp->array[1].i); if (st) return st;
248 return adns_s_ok;
249 }
250
251 /*
252 * _inaddr (pa,di,cs +search_sortlist, dip_genaddr, csp_genaddr)
253 */
254
255 static adns_status pa_inaddr(const parseinfo *pai, int cbyte,
256 int max, void *datap) {
257 struct in_addr *storeto= datap;
258
259 if (max-cbyte != 4) return adns_s_invaliddata;
260 memcpy(storeto, pai->dgram + cbyte, 4);
261 return adns_s_ok;
262 }
263
264 static int search_sortlist(adns_state ads, int af, const void *ad) {
265 const struct sortlist *slp;
266 const struct in6_addr *a6;
267 union gen_addr a;
268 int i;
269 int v6mappedp= 0;
270
271 if (af == AF_INET6) {
272 a6= ad;
273 if (IN6_IS_ADDR_V4MAPPED(a6)) {
274 a.v4.s_addr= htonl(((unsigned long)a6->s6_addr[12] << 24) |
275 ((unsigned long)a6->s6_addr[13] << 16) |
276 ((unsigned long)a6->s6_addr[14] << 8) |
277 ((unsigned long)a6->s6_addr[15] << 0));
278 v6mappedp= 1;
279 }
280 }
281
282 for (i=0, slp=ads->sortlist;
283 i<ads->nsortlist &&
284 !adns__addr_match_p(af,ad, slp->af,&slp->base,&slp->mask) &&
285 !(v6mappedp &&
286 adns__addr_match_p(AF_INET,&a, slp->af,&slp->base,&slp->mask));
287 i++, slp++);
288 return i;
289 }
290
291 static int dip_genaddr(adns_state ads, int af, const void *a, const void *b) {
292 int ai, bi;
293
294 if (!ads->nsortlist) return 0;
295
296 ai= search_sortlist(ads,af,a);
297 bi= search_sortlist(ads,af,b);
298 return bi<ai;
299 }
300
301 static int di_inaddr(adns_state ads,
302 const void *datap_a, const void *datap_b) {
303 return dip_genaddr(ads,AF_INET,datap_a,datap_b);
304 }
305
306 static adns_status csp_genaddr(vbuf *vb, int af, const void *p) {
307 char buf[ADNS_ADDR2TEXT_BUFLEN];
308 int len= sizeof(buf);
309 adns_rr_addr a;
310 int err;
311
312 memset(&a, 0, sizeof(a));
313 a.addr.sa.sa_family= af;
314 adns__sockaddr_inject(p, 0, &a.addr.sa);
315 err= adns_addr2text(&a.addr.sa,0, buf,&len, 0); assert(!err);
316 CSP_ADDSTR(buf);
317 return adns_s_ok;
318 }
319
320 static adns_status cs_inaddr(vbuf *vb, const void *datap) {
321 return csp_genaddr(vb, AF_INET,datap);
322 }
323
324 /*
325 * _in6addr (pa,di,cs)
326 */
327
328 static adns_status pa_in6addr(const parseinfo *pai, int cbyte,
329 int max, void *datap) {
330 struct in6_addr *storeto= datap;
331
332 if (max-cbyte != 16) return adns_s_invaliddata;
333 memcpy(storeto->s6_addr, pai->dgram + cbyte, 16);
334 return adns_s_ok;
335 }
336
337 static int di_in6addr(adns_state ads,
338 const void *datap_a, const void *datap_b) {
339 return dip_genaddr(ads,AF_INET6,datap_a,datap_b);
340 }
341
342 static adns_status cs_in6addr(vbuf *vb, const void *datap) {
343 return csp_genaddr(vb,AF_INET6,datap);
344 }
345
346 /*
347 * _addr (pap,pa,di,div,csp,cs,gsz,qs
348 * +search_sortlist_sa, dip_sockaddr, addr_rrtypes,
349 * addr_submit, icb_addr)
350 */
351
352 static const typeinfo tinfo_addrsub;
353
354 #define ADDR_RRTYPES(_) _(a) _(aaaa)
355
356 static const adns_rrtype addr_all_rrtypes[] = {
357 #define RRTY_CODE(ty) adns_r_##ty,
358 ADDR_RRTYPES(RRTY_CODE)
359 #undef RRTY_CODE
360 };
361
362 enum {
363 #define RRTY_INDEX(ty) addr__ri_##ty,
364 ADDR_RRTYPES(RRTY_INDEX)
365 #undef RRTY_INDEX
366 addr_nrrtypes,
367 #define RRTY_FLAG(ty) addr_rf_##ty = 1 << addr__ri_##ty,
368 ADDR_RRTYPES(RRTY_FLAG)
369 addr__rrty_hunoz
370 #undef RRTY_FLAG
371 };
372
373 static unsigned addr_rrtypeflag(adns_rrtype type) {
374 int i;
375
376 type &= adns_rrt_typemask;
377 for (i=0; i<addr_nrrtypes && type!=addr_all_rrtypes[i]; i++);
378 return i < addr_nrrtypes ? 1 << i : 0;
379 }
380
381 static adns_status pap_addr(const parseinfo *pai, int rrty, size_t rrsz,
382 int *cbyte_io, int max, adns_rr_addr *storeto) {
383 const byte *dgram= pai->dgram;
384 int af, addrlen, salen;
385 struct in6_addr v6map;
386 const void *oaddr= dgram + *cbyte_io;
387 int avail= max - *cbyte_io;
388 int step= -1;
389 void *addrp= 0;
390
391 switch (rrty) {
392 case adns_r_a:
393 if ((pai->qu->flags & adns_qf_ipv6_mapv4) &&
394 (pai->qu->answer->type & adns__qtf_bigaddr)) {
395 if (avail < 4) return adns_s_invaliddata;
396 memset(v6map.s6_addr + 0, 0x00, 10);
397 memset(v6map.s6_addr + 10, 0xff, 2);
398 memcpy(v6map.s6_addr + 12, oaddr, 4);
399 oaddr= v6map.s6_addr; avail= sizeof(v6map.s6_addr);
400 if (step < 0) step= 4;
401 goto aaaa;
402 }
403 af= AF_INET; addrlen= 4;
404 addrp= &storeto->addr.inet.sin_addr;
405 salen= sizeof(storeto->addr.inet);
406 break;
407 case adns_r_aaaa:
408 aaaa:
409 af= AF_INET6; addrlen= 16;
410 addrp= storeto->addr.inet6.sin6_addr.s6_addr;
411 salen= sizeof(storeto->addr.inet6);
412 break;
413 }
414 assert(addrp);
415
416 assert(offsetof(adns_rr_addr, addr) + salen <= rrsz);
417 if (addrlen < avail) return adns_s_invaliddata;
418 if (step < 0) step= addrlen;
419 *cbyte_io += step;
420 memset(&storeto->addr, 0, salen);
421 storeto->len= salen;
422 storeto->addr.sa.sa_family= af;
423 memcpy(addrp, oaddr, addrlen);
424
425 return adns_s_ok;
426 }
427
428 static adns_status pa_addr(const parseinfo *pai, int cbyte,
429 int max, void *datap) {
430 int err= pap_addr(pai, pai->qu->answer->type & adns_rrt_typemask,
431 pai->qu->answer->rrsz, &cbyte, max, datap);
432 if (err) return err;
433 if (cbyte != max) return adns_s_invaliddata;
434 return adns_s_ok;
435 }
436
437 static int search_sortlist_sa(adns_state ads, const struct sockaddr *sa) {
438 union gen_addr a;
439 adns__sockaddr_extract(sa, &a, 0);
440 return search_sortlist(ads, sa->sa_family, &a);
441 }
442
443 static int dip_sockaddr(adns_state ads,
444 const struct sockaddr *sa,
445 const struct sockaddr *sb) {
446 if (!ads->sortlist) return 0;
447 return search_sortlist_sa(ads, sa) > search_sortlist_sa(ads, sb);
448 }
449
450 static int di_addr(adns_state ads, const void *datap_a, const void *datap_b) {
451 const adns_rr_addr *ap= datap_a, *bp= datap_b;
452 return dip_sockaddr(ads, &ap->addr.sa, &bp->addr.sa);
453 }
454
455 static int div_addr(void *context, const void *datap_a, const void *datap_b) {
456 const adns_state ads= context;
457
458 return di_addr(ads, datap_a, datap_b);
459 }
460
461 static adns_status csp_addr(vbuf *vb, const adns_rr_addr *rrp) {
462 char buf[ADNS_ADDR2TEXT_BUFLEN];
463 int len= sizeof(buf);
464 int err;
465
466 switch (rrp->addr.inet.sin_family) {
467 case AF_INET:
468 CSP_ADDSTR("INET ");
469 goto a2t;
470 case AF_INET6:
471 CSP_ADDSTR("INET6 ");
472 goto a2t;
473 a2t:
474 err= adns_addr2text(&rrp->addr.sa,0, buf,&len, 0); assert(!err);
475 CSP_ADDSTR(buf);
476 break;
477 default:
478 sprintf(buf,"AF=%u",rrp->addr.sa.sa_family);
479 CSP_ADDSTR(buf);
480 break;
481 }
482 return adns_s_ok;
483 }
484
485 static adns_status cs_addr(vbuf *vb, const void *datap) {
486 const adns_rr_addr *rrp= datap;
487
488 return csp_addr(vb,rrp);
489 }
490
491 static int gsz_addr(const typeinfo *typei, adns_rrtype type) {
492 return type & adns__qtf_bigaddr ?
493 sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only);
494 }
495
496 static unsigned addr_rrtypes(adns_state ads, adns_rrtype type,
497 adns_queryflags qf) {
498 /* Return a mask of addr_rf_... flags indicating which address families are
499 * wanted, given a query type and flags.
500 */
501 return addr_rf_a;
502 }
503
504 static void icb_addr(adns_query parent, adns_query child);
505
506 static void addr_subqueries(adns_query qu, struct timeval now,
507 adns_queryflags qf_extra,
508 const byte *qd_dgram, int qd_dglen) {
509 int i, err, id;
510 adns_query cqu;
511 adns_queryflags qf= (qu->flags & ~adns_qf_search) | qf_extra;
512 adns_rrtype qtf= qu->answer->type & adns__qtf_deref;
513 unsigned which= qu->ctx.tinfo.addr.want & ~qu->ctx.tinfo.addr.have;
514 qcontext ctx;
515
516 memset(&ctx, 0, sizeof(ctx));
517 ctx.callback= icb_addr;
518 for (i=0; i<addr_nrrtypes; i++) {
519 if (!(which & (1 << i))) continue;
520 err= adns__mkquery_frdgram(qu->ads, &qu->vb, &id, qd_dgram,qd_dglen,
521 DNS_HDRSIZE, addr_all_rrtypes[i], qf);
522 if (err) goto x_error;
523 err= adns__internal_submit(qu->ads, &cqu, qu, &tinfo_addrsub,
524 addr_all_rrtypes[i] | qtf,
525 &qu->vb, id, qf, now, &ctx);
526 if (err) goto x_error;
527 cqu->answer->rrsz= qu->answer->rrsz;
528 }
529 qu->state= query_childw;
530 LIST_LINK_TAIL(qu->ads->childw, qu);
531 return;
532
533 x_error:
534 adns__query_fail(qu, err);
535 }
536
537 static adns_status addr_submit(adns_query parent, adns_query *query_r,
538 vbuf *qumsg_vb, int id, unsigned want,
539 adns_queryflags flags, struct timeval now,
540 qcontext *ctx) {
541 /* This is effectively a substitute for adns__internal_submit, intended for
542 * the case where the caller (possibly) only wants a subset of the
543 * available record types. The memory management and callback rules are
544 * the same as for adns__internal_submit.
545 *
546 * Some differences: the query is linked onto the parent's children list
547 * before exit (though the parent's state is not changed, and it is not
548 * linked into the childw list queue); and we fiddle with the `tinfo'
549 * portion of the context structure (yes, modifying *ctx), since this is,
550 * in fact, the main purpose of this function.
551 */
552
553 adns_state ads= parent->ads;
554 adns_query qu;
555 adns_status err;
556 adns_rrtype type= ((adns_r_addr & adns_rrt_reprmask) |
557 (parent->answer->type & ~adns_rrt_reprmask));
558
559 ctx->tinfo.addr.want= want;
560 ctx->tinfo.addr.have= 0;
561 err= adns__internal_submit(ads, &qu, parent, adns__findtype(adns_r_addr),
562 type, qumsg_vb, id, flags, now, ctx);
563 if (err) return err;
564
565 *query_r= qu;
566 return adns_s_ok;
567 }
568
569 static adns_status append_addrs(adns_query qu, size_t rrsz,
570 adns_rr_addr **dp, int *dlen,
571 const adns_rr_addr *sp, int slen) {
572 /* Append a vector of slen addr records, each of size rrsz, starting at ap,
573 * to a vector starting at *dp, of length *dlen. On successful completion,
574 * *dp and *dlen are updated.
575 */
576
577 size_t drrsz= *dlen*rrsz, srrsz= slen*rrsz;
578 byte *p;
579
580 if (!slen) return adns_s_ok;
581 p= adns__alloc_interim(qu, drrsz + srrsz);
582 if (!p) R_NOMEM;
583 if (*dlen) {
584 memcpy(p, *dp, drrsz);
585 adns__free_interim(qu, *dp);
586 }
587 memcpy(p + drrsz, sp, srrsz);
588 *dlen += slen;
589 *dp= (adns_rr_addr *)p;
590 return adns_s_ok;
591 }
592
593 static void propagate_ttl(adns_query to, adns_query from)
594 { if (to->expires > from->expires) to->expires= from->expires; }
595
596 static adns_status copy_cname_from_child(adns_query parent, adns_query child) {
597 adns_answer *pans= parent->answer, *cans= child->answer;
598 size_t n= strlen(cans->cname) + 1;
599
600 pans->cname= adns__alloc_preserved(parent, n);
601 if (!pans->cname) R_NOMEM;
602 memcpy(pans->cname, cans->cname, n);
603 return adns_s_ok;
604 }
605
606 static void done_addr_type(adns_query qu, adns_rrtype type) {
607 unsigned f= addr_rrtypeflag(type);
608 assert(f); qu->ctx.tinfo.addr.have |= f;
609 }
610
611 static void icb_addr(adns_query parent, adns_query child) {
612 adns_state ads= parent->ads;
613 adns_answer *pans= parent->answer, *cans= child->answer;
614 struct timeval now;
615 adns_status err;
616
617 propagate_ttl(parent, child);
618
619 if (cans->cname && !pans->cname) {
620 err= copy_cname_from_child(parent, child);
621 if (err) goto x_err;
622 }
623
624 if ((parent->flags & adns_qf_search) &&
625 !pans->cname && cans->status == adns_s_nxdomain) {
626 /* We're searching a list of suffixes, and the name doesn't exist. Try
627 * the next one.
628 */
629
630 adns__cancel_children(parent);
631 adns__free_interim(parent, pans->rrs.bytes);
632 pans->rrs.bytes= 0; pans->nrrs= 0;
633 if (gettimeofday(&now, 0)) goto x_gtod;
634 adns__search_next(ads, parent, now);
635 return;
636 }
637
638 if (cans->status && cans->status != adns_s_nodata)
639 { err= cans->status; goto x_err; }
640
641 assert(pans->rrsz == cans->rrsz);
642 err= append_addrs(parent, pans->rrsz,
643 &pans->rrs.addr, &pans->nrrs,
644 cans->rrs.addr, cans->nrrs);
645 if (err) goto x_err;
646 done_addr_type(parent, cans->type);
647
648 if (parent->children.head) LIST_LINK_TAIL(ads->childw, parent);
649 else if (!pans->nrrs) adns__query_fail(parent, adns_s_nodata);
650 else adns__query_done(parent);
651 return;
652
653 x_gtod:
654 adns__diag(ads, -1, parent, "gettimeofday failed: %s", strerror(errno));
655 err= adns_s_systemfail;
656 goto x_err;
657
658 x_err:
659 adns__query_fail(parent, err);
660 }
661
662 static void qs_addr(adns_query qu, struct timeval now) {
663 if (!qu->ctx.tinfo.addr.want) {
664 qu->ctx.tinfo.addr.want= addr_rrtypes(qu->ads, qu->answer->type,
665 qu->flags);
666 qu->ctx.tinfo.addr.have= 0;
667 }
668 addr_subqueries(qu, now, 0, qu->query_dgram, qu->query_dglen);
669 }
670
671 /*
672 * _domain (pap,csp,cs)
673 * _dom_raw (pa)
674 */
675
676 static adns_status pap_domain(const parseinfo *pai, int *cbyte_io, int max,
677 char **domain_r, parsedomain_flags flags) {
678 adns_status st;
679 char *dm;
680
681 st= adns__parse_domain(pai->qu->ads, pai->serv, pai->qu, &pai->qu->vb, flags,
682 pai->dgram,pai->dglen, cbyte_io, max);
683 if (st) return st;
684 if (!pai->qu->vb.used) return adns_s_invaliddata;
685
686 dm= adns__alloc_interim(pai->qu, pai->qu->vb.used+1);
687 if (!dm) R_NOMEM;
688
689 dm[pai->qu->vb.used]= 0;
690 memcpy(dm,pai->qu->vb.buf,pai->qu->vb.used);
691
692 *domain_r= dm;
693 return adns_s_ok;
694 }
695
696 static adns_status csp_domain(vbuf *vb, const char *domain) {
697 CSP_ADDSTR(domain);
698 if (!*domain) CSP_ADDSTR(".");
699 return adns_s_ok;
700 }
701
702 static adns_status cs_domain(vbuf *vb, const void *datap) {
703 const char *const *domainp= datap;
704 return csp_domain(vb,*domainp);
705 }
706
707 static adns_status pa_dom_raw(const parseinfo *pai, int cbyte,
708 int max, void *datap) {
709 char **rrp= datap;
710 adns_status st;
711
712 st= pap_domain(pai, &cbyte, max, rrp, pdf_quoteok);
713 if (st) return st;
714
715 if (cbyte != max) return adns_s_invaliddata;
716 return adns_s_ok;
717 }
718
719 /*
720 * _host_raw (pa)
721 */
722
723 static adns_status pa_host_raw(const parseinfo *pai, int cbyte,
724 int max, void *datap) {
725 char **rrp= datap;
726 adns_status st;
727
728 st= pap_domain(pai, &cbyte, max, rrp,
729 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
730 if (st) return st;
731
732 if (cbyte != max) return adns_s_invaliddata;
733 return adns_s_ok;
734 }
735
736 /*
737 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +pap_findaddrs, icb_hostaddr)
738 */
739
740 static adns_status pap_findaddrs(const parseinfo *pai, adns_rr_hostaddr *ha,
741 unsigned *want_io, size_t addrsz,
742 int *cbyte_io, int count, int dmstart) {
743 int rri, naddrs;
744 unsigned typef, want= *want_io, need= want;
745 int type, class, rdlen, rdend, rdstart, ownermatched;
746 unsigned long ttl;
747 adns_status st;
748
749 for (rri=0, naddrs=0; rri<count; rri++) {
750 st= adns__findrr_anychk(pai->qu, pai->serv, pai->dgram,
751 pai->dglen, cbyte_io,
752 &type, &class, &ttl, &rdlen, &rdstart,
753 pai->dgram, pai->dglen, dmstart, &ownermatched);
754 if (st) return st;
755 if (!ownermatched || class != DNS_CLASS_IN) continue;
756 typef= addr_rrtypeflag(type);
757 if (!(want & typef)) continue;
758 need &= ~typef;
759 if (!adns__vbuf_ensure(&pai->qu->vb, (naddrs+1)*addrsz)) R_NOMEM;
760 adns__update_expires(pai->qu,ttl,pai->now);
761 rdend= rdstart + rdlen;
762 st= pap_addr(pai, type, addrsz, &rdstart, rdend,
763 (adns_rr_addr *)(pai->qu->vb.buf + naddrs*addrsz));
764 if (st) return st;
765 if (rdstart != rdend) return adns_s_invaliddata;
766 naddrs++;
767 }
768 if (naddrs > 0) {
769 st= append_addrs(pai->qu, addrsz, &ha->addrs, &ha->naddrs,
770 (const adns_rr_addr *)pai->qu->vb.buf, naddrs);
771 if (st) return st;
772 ha->astatus= adns_s_ok;
773
774 if (!need) {
775 adns__isort(ha->addrs, naddrs, addrsz, pai->qu->vb.buf,
776 div_addr, pai->ads);
777 }
778 }
779 *want_io= need;
780 return adns_s_ok;
781 }
782
783 static void icb_hostaddr(adns_query parent, adns_query child) {
784 adns_answer *cans= child->answer;
785 adns_rr_hostaddr *rrp= child->ctx.pinfo.hostaddr;
786 adns_state ads= parent->ads;
787 adns_status st;
788 size_t addrsz= gsz_addr(0, parent->answer->type);
789
790 st= cans->status == adns_s_nodata ? adns_s_ok : cans->status;
791 if (st) goto done;
792 propagate_ttl(parent, child);
793
794 assert(addrsz == cans->rrsz);
795 st= append_addrs(parent, addrsz,
796 &rrp->addrs, &rrp->naddrs,
797 cans->rrs.addr, cans->nrrs);
798 if (st) goto done;
799 if (!rrp->naddrs) { st= adns_s_nodata; goto done; }
800
801 if (!adns__vbuf_ensure(&parent->vb, addrsz))
802 { st= adns_s_nomemory; goto done; }
803 adns__isort(rrp->addrs, rrp->naddrs, addrsz, parent->vb.buf,
804 div_addr, ads);
805
806 done:
807 if (st) {
808 adns__free_interim(parent, rrp->addrs);
809 rrp->naddrs= (st>0 && st<=adns_s_max_tempfail) ? -1 : 0;
810 }
811
812 rrp->astatus= st;
813 if (parent->children.head) {
814 LIST_LINK_TAIL(ads->childw,parent);
815 } else {
816 adns__query_done(parent);
817 }
818 }
819
820 static adns_status pap_hostaddr(const parseinfo *pai, int *cbyte_io,
821 int max, adns_rr_hostaddr *rrp) {
822 adns_status st;
823 int dmstart, cbyte;
824 qcontext ctx;
825 int id;
826 adns_query nqu;
827 adns_queryflags nflags;
828 unsigned want;
829 size_t addrsz= gsz_addr(0, pai->qu->answer->type);
830
831 dmstart= cbyte= *cbyte_io;
832 st= pap_domain(pai, &cbyte, max, &rrp->host,
833 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
834 if (st) return st;
835 *cbyte_io= cbyte;
836
837 rrp->astatus= adns_s_ok;
838 rrp->naddrs= 0;
839 rrp->addrs= 0;
840
841 cbyte= pai->nsstart;
842
843 want= addr_rrtypes(pai->ads, pai->qu->answer->type, pai->qu->flags);
844
845 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->nscount, dmstart);
846 if (st) return st;
847 if (!want) return adns_s_ok;
848
849 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->arcount, dmstart);
850 if (st) return st;
851 if (!want) return adns_s_ok;
852
853 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
854 pai->dgram, pai->dglen, dmstart,
855 adns_r_addr, adns_qf_quoteok_query);
856 if (st) return st;
857
858 ctx.ext= 0;
859 ctx.callback= icb_hostaddr;
860 ctx.pinfo.hostaddr= rrp;
861
862 nflags= adns_qf_quoteok_query | (pai->qu->flags & adns_qf_ipv6_mapv4);
863 if (!(pai->qu->flags & adns_qf_cname_loose)) nflags |= adns_qf_cname_forbid;
864
865 st= addr_submit(pai->qu, &nqu, &pai->qu->vb, id, want,
866 nflags, pai->now, &ctx);
867 if (st) return st;
868
869 return adns_s_ok;
870 }
871
872 static adns_status pa_hostaddr(const parseinfo *pai, int cbyte,
873 int max, void *datap) {
874 adns_rr_hostaddr *rrp= datap;
875 adns_status st;
876
877 st= pap_hostaddr(pai, &cbyte, max, rrp);
878 if (st) return st;
879 if (cbyte != max) return adns_s_invaliddata;
880
881 return adns_s_ok;
882 }
883
884 static int dip_hostaddr(adns_state ads,
885 const adns_rr_hostaddr *ap, const adns_rr_hostaddr *bp) {
886 if (ap->astatus != bp->astatus) return ap->astatus;
887 if (ap->astatus) return 0;
888
889 return dip_sockaddr(ads, &ap->addrs[0].addr.sa, &bp->addrs[0].addr.sa);
890 }
891
892 static int di_hostaddr(adns_state ads,
893 const void *datap_a, const void *datap_b) {
894 const adns_rr_hostaddr *ap= datap_a, *bp= datap_b;
895
896 return dip_hostaddr(ads, ap,bp);
897 }
898
899 static void mfp_hostaddr(adns_query qu, adns_rr_hostaddr *rrp) {
900 void *tablev;
901 size_t addrsz= gsz_addr(0, qu->answer->type);
902
903 adns__makefinal_str(qu,&rrp->host);
904 tablev= rrp->addrs;
905 adns__makefinal_block(qu, &tablev, rrp->naddrs*addrsz);
906 rrp->addrs= tablev;
907 }
908
909 static void mf_hostaddr(adns_query qu, void *datap) {
910 adns_rr_hostaddr *rrp= datap;
911
912 mfp_hostaddr(qu,rrp);
913 }
914
915 static adns_status csp_hostaddr(vbuf *vb, const adns_rr_hostaddr *rrp) {
916 const char *errstr;
917 adns_status st;
918 char buf[20];
919 int i;
920
921 st= csp_domain(vb,rrp->host); if (st) return st;
922
923 CSP_ADDSTR(" ");
924 CSP_ADDSTR(adns_errtypeabbrev(rrp->astatus));
925
926 sprintf(buf," %d ",rrp->astatus);
927 CSP_ADDSTR(buf);
928
929 CSP_ADDSTR(adns_errabbrev(rrp->astatus));
930 CSP_ADDSTR(" ");
931
932 errstr= adns_strerror(rrp->astatus);
933 st= csp_qstring(vb,errstr,strlen(errstr)); if (st) return st;
934
935 if (rrp->naddrs >= 0) {
936 CSP_ADDSTR(" (");
937 for (i=0; i<rrp->naddrs; i++) {
938 CSP_ADDSTR(" ");
939 st= csp_addr(vb,&rrp->addrs[i]);
940 }
941 CSP_ADDSTR(" )");
942 } else {
943 CSP_ADDSTR(" ?");
944 }
945 return adns_s_ok;
946 }
947
948 static adns_status cs_hostaddr(vbuf *vb, const void *datap) {
949 const adns_rr_hostaddr *rrp= datap;
950
951 return csp_hostaddr(vb,rrp);
952 }
953
954 /*
955 * _mx_raw (pa,di)
956 */
957
958 static adns_status pa_mx_raw(const parseinfo *pai, int cbyte,
959 int max, void *datap) {
960 const byte *dgram= pai->dgram;
961 adns_rr_intstr *rrp= datap;
962 adns_status st;
963 int pref;
964
965 if (cbyte+2 > max) return adns_s_invaliddata;
966 GET_W(cbyte,pref);
967 rrp->i= pref;
968 st= pap_domain(pai, &cbyte, max, &rrp->str,
969 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
970 if (st) return st;
971
972 if (cbyte != max) return adns_s_invaliddata;
973 return adns_s_ok;
974 }
975
976 static int di_mx_raw(adns_state ads, const void *datap_a, const void *datap_b) {
977 const adns_rr_intstr *ap= datap_a, *bp= datap_b;
978
979 if (ap->i < bp->i) return 0;
980 if (ap->i > bp->i) return 1;
981 return 0;
982 }
983
984 /*
985 * _mx (pa,di)
986 */
987
988 static adns_status pa_mx(const parseinfo *pai, int cbyte,
989 int max, void *datap) {
990 const byte *dgram= pai->dgram;
991 adns_rr_inthostaddr *rrp= datap;
992 adns_status st;
993 int pref;
994
995 if (cbyte+2 > max) return adns_s_invaliddata;
996 GET_W(cbyte,pref);
997 rrp->i= pref;
998 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha);
999 if (st) return st;
1000
1001 if (cbyte != max) return adns_s_invaliddata;
1002 return adns_s_ok;
1003 }
1004
1005 static int di_mx(adns_state ads, const void *datap_a, const void *datap_b) {
1006 const adns_rr_inthostaddr *ap= datap_a, *bp= datap_b;
1007
1008 if (ap->i < bp->i) return 0;
1009 if (ap->i > bp->i) return 1;
1010 return dip_hostaddr(ads, &ap->ha, &bp->ha);
1011 }
1012
1013 /*
1014 * _inthostaddr (mf,cs)
1015 */
1016
1017 static void mf_inthostaddr(adns_query qu, void *datap) {
1018 adns_rr_inthostaddr *rrp= datap;
1019
1020 mfp_hostaddr(qu,&rrp->ha);
1021 }
1022
1023 static adns_status cs_inthostaddr(vbuf *vb, const void *datap) {
1024 const adns_rr_inthostaddr *rrp= datap;
1025 char buf[10];
1026
1027 sprintf(buf,"%u ",rrp->i);
1028 CSP_ADDSTR(buf);
1029
1030 return csp_hostaddr(vb,&rrp->ha);
1031 }
1032
1033 /*
1034 * _inthost (cs)
1035 */
1036
1037 static adns_status cs_inthost(vbuf *vb, const void *datap) {
1038 const adns_rr_intstr *rrp= datap;
1039 char buf[10];
1040
1041 sprintf(buf,"%u ",rrp->i);
1042 CSP_ADDSTR(buf);
1043 return csp_domain(vb,rrp->str);
1044 }
1045
1046 /*
1047 * _ptr (ckl,pa +icb_ptr)
1048 */
1049
1050 static adns_status ckl_ptr(adns_state ads, adns_queryflags flags,
1051 union checklabel_state *cls, qcontext *ctx,
1052 int labnum, const char *label, int lablen) {
1053 if (lablen) {
1054 if (adns__revparse_label(&cls->ptr, labnum, label,lablen))
1055 return adns_s_querydomainwrong;
1056 } else {
1057 if (adns__revparse_done(&cls->ptr, labnum,
1058 &ctx->tinfo.ptr.rev_rrtype,
1059 &ctx->tinfo.ptr.addr))
1060 return adns_s_querydomainwrong;
1061 }
1062 return adns_s_ok;
1063 }
1064
1065 static void icb_ptr(adns_query parent, adns_query child) {
1066 adns_answer *cans= child->answer;
1067 const struct af_addr *queried;
1068 const unsigned char *found;
1069 adns_state ads= parent->ads;
1070 int i;
1071
1072 if (cans->status == adns_s_nxdomain || cans->status == adns_s_nodata) {
1073 adns__query_fail(parent,adns_s_inconsistent);
1074 return;
1075 } else if (cans->status) {
1076 adns__query_fail(parent,cans->status);
1077 return;
1078 }
1079
1080 queried= &parent->ctx.tinfo.ptr.addr;
1081 for (i=0, found=cans->rrs.bytes; i<cans->nrrs; i++, found+=cans->rrsz) {
1082 if (adns__genaddr_equal_p(queried->af,&queried->addr,
1083 parent->ctx.tinfo.ptr.addr.af,found)) {
1084 if (!parent->children.head) {
1085 adns__query_done(parent);
1086 return;
1087 } else {
1088 LIST_LINK_TAIL(ads->childw,parent);
1089 return;
1090 }
1091 }
1092 }
1093
1094 adns__query_fail(parent,adns_s_inconsistent);
1095 }
1096
1097 static adns_status pa_ptr(const parseinfo *pai, int dmstart,
1098 int max, void *datap) {
1099 char **rrp= datap;
1100 adns_status st;
1101 adns_rrtype rrtype= pai->qu->ctx.tinfo.ptr.rev_rrtype;
1102 int cbyte, id;
1103 adns_query nqu;
1104 qcontext ctx;
1105
1106 cbyte= dmstart;
1107 st= pap_domain(pai, &cbyte, max, rrp,
1108 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1109 if (st) return st;
1110 if (cbyte != max) return adns_s_invaliddata;
1111
1112 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
1113 pai->dgram, pai->dglen, dmstart,
1114 rrtype, adns_qf_quoteok_query);
1115 if (st) return st;
1116
1117 ctx.ext= 0;
1118 ctx.callback= icb_ptr;
1119 memset(&ctx.pinfo,0,sizeof(ctx.pinfo));
1120 memset(&ctx.tinfo,0,sizeof(ctx.tinfo));
1121 st= adns__internal_submit(pai->ads, &nqu, pai->qu,
1122 adns__findtype(rrtype),
1123 rrtype, &pai->qu->vb, id,
1124 adns_qf_quoteok_query, pai->now, &ctx);
1125 if (st) return st;
1126
1127 return adns_s_ok;
1128 }
1129
1130 /*
1131 * _strpair (mf)
1132 */
1133
1134 static void mf_strpair(adns_query qu, void *datap) {
1135 adns_rr_strpair *rrp= datap;
1136
1137 adns__makefinal_str(qu,&rrp->array[0]);
1138 adns__makefinal_str(qu,&rrp->array[1]);
1139 }
1140
1141 /*
1142 * _intstrpair (mf)
1143 */
1144
1145 static void mf_intstrpair(adns_query qu, void *datap) {
1146 adns_rr_intstrpair *rrp= datap;
1147
1148 adns__makefinal_str(qu,&rrp->array[0].str);
1149 adns__makefinal_str(qu,&rrp->array[1].str);
1150 }
1151
1152 /*
1153 * _hinfo (pa)
1154 */
1155
1156 static adns_status pa_hinfo(const parseinfo *pai, int cbyte,
1157 int max, void *datap) {
1158 adns_rr_intstrpair *rrp= datap;
1159 adns_status st;
1160 int i;
1161
1162 for (i=0; i<2; i++) {
1163 st= pap_qstring(pai, &cbyte, max, &rrp->array[i].i, &rrp->array[i].str);
1164 if (st) return st;
1165 }
1166
1167 if (cbyte != max) return adns_s_invaliddata;
1168
1169 return adns_s_ok;
1170 }
1171
1172 /*
1173 * _mailbox (pap,cs +pap_mailbox822)
1174 */
1175
1176 static adns_status pap_mailbox822(const parseinfo *pai,
1177 int *cbyte_io, int max, char **mb_r) {
1178 int lablen, labstart, i, needquote, c, r, neednorm;
1179 const unsigned char *p;
1180 char *str;
1181 findlabel_state fls;
1182 adns_status st;
1183 vbuf *vb;
1184
1185 vb= &pai->qu->vb;
1186 vb->used= 0;
1187 adns__findlabel_start(&fls, pai->ads,
1188 -1, pai->qu,
1189 pai->dgram, pai->dglen, max,
1190 *cbyte_io, cbyte_io);
1191 st= adns__findlabel_next(&fls,&lablen,&labstart);
1192 if (!lablen) {
1193 adns__vbuf_appendstr(vb,".");
1194 goto x_ok;
1195 }
1196
1197 neednorm= 1;
1198 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++) {
1199 c= *p++;
1200 if ((c&~128) < 32 || (c&~128) == 127) return adns_s_invaliddata;
1201 if (c == '.' && !neednorm) neednorm= 1;
1202 else if (c==' ' || c>=127 || ctype_822special(c)) needquote++;
1203 else neednorm= 0;
1204 }
1205
1206 if (needquote || neednorm) {
1207 r= adns__vbuf_ensure(vb, lablen+needquote+4); if (!r) R_NOMEM;
1208 adns__vbuf_appendq(vb,"\"",1);
1209 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++, p++) {
1210 c= *p;
1211 if (c == '"' || c=='\\') adns__vbuf_appendq(vb,"\\",1);
1212 adns__vbuf_appendq(vb,p,1);
1213 }
1214 adns__vbuf_appendq(vb,"\"",1);
1215 } else {
1216 r= adns__vbuf_append(vb, pai->dgram+labstart, lablen); if (!r) R_NOMEM;
1217 }
1218
1219 r= adns__vbuf_appendstr(vb,"@"); if (!r) R_NOMEM;
1220
1221 st= adns__parse_domain_more(&fls,pai->ads, pai->qu,vb,0, pai->dgram);
1222 if (st) return st;
1223
1224 x_ok:
1225 str= adns__alloc_interim(pai->qu, vb->used+1); if (!str) R_NOMEM;
1226 memcpy(str,vb->buf,vb->used);
1227 str[vb->used]= 0;
1228 *mb_r= str;
1229 return adns_s_ok;
1230 }
1231
1232 static adns_status pap_mailbox(const parseinfo *pai, int *cbyte_io, int max,
1233 char **mb_r) {
1234 if (pai->qu->typei->typekey & adns__qtf_mail822) {
1235 return pap_mailbox822(pai, cbyte_io, max, mb_r);
1236 } else {
1237 return pap_domain(pai, cbyte_io, max, mb_r, pdf_quoteok);
1238 }
1239 }
1240
1241 static adns_status csp_mailbox(vbuf *vb, const char *mailbox) {
1242 return csp_domain(vb,mailbox);
1243 }
1244
1245 /*
1246 * _rp (pa,cs)
1247 */
1248
1249 static adns_status pa_rp(const parseinfo *pai, int cbyte,
1250 int max, void *datap) {
1251 adns_rr_strpair *rrp= datap;
1252 adns_status st;
1253
1254 st= pap_mailbox(pai, &cbyte, max, &rrp->array[0]);
1255 if (st) return st;
1256
1257 st= pap_domain(pai, &cbyte, max, &rrp->array[1], pdf_quoteok);
1258 if (st) return st;
1259
1260 if (cbyte != max) return adns_s_invaliddata;
1261 return adns_s_ok;
1262 }
1263
1264 static adns_status cs_rp(vbuf *vb, const void *datap) {
1265 const adns_rr_strpair *rrp= datap;
1266 adns_status st;
1267
1268 st= csp_mailbox(vb,rrp->array[0]); if (st) return st;
1269 CSP_ADDSTR(" ");
1270 st= csp_domain(vb,rrp->array[1]); if (st) return st;
1271
1272 return adns_s_ok;
1273 }
1274
1275 /*
1276 * _soa (pa,mf,cs)
1277 */
1278
1279 static adns_status pa_soa(const parseinfo *pai, int cbyte,
1280 int max, void *datap) {
1281 adns_rr_soa *rrp= datap;
1282 const byte *dgram= pai->dgram;
1283 adns_status st;
1284 int msw, lsw, i;
1285
1286 st= pap_domain(pai, &cbyte, max, &rrp->mname,
1287 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1288 if (st) return st;
1289
1290 st= pap_mailbox(pai, &cbyte, max, &rrp->rname);
1291 if (st) return st;
1292
1293 if (cbyte+20 != max) return adns_s_invaliddata;
1294
1295 for (i=0; i<5; i++) {
1296 GET_W(cbyte,msw);
1297 GET_W(cbyte,lsw);
1298 (&rrp->serial)[i]= (msw<<16) | lsw;
1299 }
1300
1301 return adns_s_ok;
1302 }
1303
1304 static void mf_soa(adns_query qu, void *datap) {
1305 adns_rr_soa *rrp= datap;
1306
1307 adns__makefinal_str(qu,&rrp->mname);
1308 adns__makefinal_str(qu,&rrp->rname);
1309 }
1310
1311 static adns_status cs_soa(vbuf *vb, const void *datap) {
1312 const adns_rr_soa *rrp= datap;
1313 char buf[20];
1314 int i;
1315 adns_status st;
1316
1317 st= csp_domain(vb,rrp->mname); if (st) return st;
1318 CSP_ADDSTR(" ");
1319 st= csp_mailbox(vb,rrp->rname); if (st) return st;
1320
1321 for (i=0; i<5; i++) {
1322 sprintf(buf," %lu",(&rrp->serial)[i]);
1323 CSP_ADDSTR(buf);
1324 }
1325
1326 return adns_s_ok;
1327 }
1328
1329 /*
1330 * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort)
1331 */
1332
1333 static adns_status ckl_srv(adns_state ads, adns_queryflags flags,
1334 union checklabel_state *cls, qcontext *ctx,
1335 int labnum, const char *label, int lablen) {
1336 if (labnum < 2 && !(flags & adns_qf_quoteok_query)) {
1337 if (!lablen || label[0] != '_') return adns_s_querydomaininvalid;
1338 return adns_s_ok;
1339 }
1340 return adns__ckl_hostname(ads, flags, cls, ctx, labnum, label, lablen);
1341 }
1342
1343 static adns_status pap_srv_begin(const parseinfo *pai, int *cbyte_io, int max,
1344 adns_rr_srvha *rrp
1345 /* might be adns_rr_srvraw* */) {
1346 const byte *dgram= pai->dgram;
1347 int ti, cbyte;
1348
1349 cbyte= *cbyte_io;
1350 if ((*cbyte_io += 6) > max) return adns_s_invaliddata;
1351
1352 rrp->priority= GET_W(cbyte, ti);
1353 rrp->weight= GET_W(cbyte, ti);
1354 rrp->port= GET_W(cbyte, ti);
1355 return adns_s_ok;
1356 }
1357
1358 static adns_status pa_srvraw(const parseinfo *pai, int cbyte,
1359 int max, void *datap) {
1360 adns_rr_srvraw *rrp= datap;
1361 adns_status st;
1362
1363 st= pap_srv_begin(pai,&cbyte,max,datap);
1364 if (st) return st;
1365
1366 st= pap_domain(pai, &cbyte, max, &rrp->host,
1367 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1368 if (st) return st;
1369
1370 if (cbyte != max) return adns_s_invaliddata;
1371 return adns_s_ok;
1372 }
1373
1374 static adns_status pa_srvha(const parseinfo *pai, int cbyte,
1375 int max, void *datap) {
1376 adns_rr_srvha *rrp= datap;
1377 adns_status st;
1378
1379 st= pap_srv_begin(pai,&cbyte,max,datap); if (st) return st;
1380 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha); if (st) return st;
1381 if (cbyte != max) return adns_s_invaliddata;
1382 return adns_s_ok;
1383 }
1384
1385 static void mf_srvraw(adns_query qu, void *datap) {
1386 adns_rr_srvraw *rrp= datap;
1387 adns__makefinal_str(qu, &rrp->host);
1388 }
1389
1390 static void mf_srvha(adns_query qu, void *datap) {
1391 adns_rr_srvha *rrp= datap;
1392 mfp_hostaddr(qu,&rrp->ha);
1393 }
1394
1395 static int di_srv(adns_state ads, const void *datap_a, const void *datap_b) {
1396 const adns_rr_srvraw *ap= datap_a, *bp= datap_b;
1397 /* might be const adns_rr_svhostaddr* */
1398
1399 if (ap->priority < bp->priority) return 0;
1400 if (ap->priority > bp->priority) return 1;
1401 return 0;
1402 }
1403
1404 static adns_status csp_srv_begin(vbuf *vb, const adns_rr_srvha *rrp
1405 /* might be adns_rr_srvraw* */) {
1406 char buf[30];
1407 sprintf(buf,"%u %u %u ", rrp->priority, rrp->weight, rrp->port);
1408 CSP_ADDSTR(buf);
1409 return adns_s_ok;
1410 }
1411
1412 static adns_status cs_srvraw(vbuf *vb, const void *datap) {
1413 const adns_rr_srvraw *rrp= datap;
1414 adns_status st;
1415
1416 st= csp_srv_begin(vb,(const void*)rrp); if (st) return st;
1417 return csp_domain(vb,rrp->host);
1418 }
1419
1420 static adns_status cs_srvha(vbuf *vb, const void *datap) {
1421 const adns_rr_srvha *rrp= datap;
1422 adns_status st;
1423
1424 st= csp_srv_begin(vb,(const void*)datap); if (st) return st;
1425 return csp_hostaddr(vb,&rrp->ha);
1426 }
1427
1428 static void postsort_srv(adns_state ads, void *array, int nrrs,int rrsz,
1429 const struct typeinfo *typei) {
1430 /* we treat everything in the array as if it were an adns_rr_srvha
1431 * even though the array might be of adns_rr_srvraw. That's OK
1432 * because they have the same prefix, which is all we access.
1433 * We use rrsz, too, rather than naive array indexing, of course.
1434 */
1435 char *workbegin, *workend, *search, *arrayend;
1436 const adns_rr_srvha *rr;
1437 union { adns_rr_srvha ha; adns_rr_srvraw raw; } rrtmp;
1438 int cpriority, totalweight, runtotal;
1439 long randval;
1440
1441 assert(rrsz <= sizeof(rrtmp));
1442 for (workbegin= array, arrayend= workbegin + rrsz * nrrs;
1443 workbegin < arrayend;
1444 workbegin= workend) {
1445 cpriority= (rr=(void*)workbegin)->priority;
1446
1447 for (workend= workbegin, totalweight= 0;
1448 workend < arrayend && (rr=(void*)workend)->priority == cpriority;
1449 workend += rrsz) {
1450 totalweight += rr->weight;
1451 }
1452
1453 /* Now workbegin..(workend-1) incl. are exactly all of the RRs of
1454 * cpriority. From now on, workbegin points to the `remaining'
1455 * records: we select one record at a time (RFC2782 `Usage rules'
1456 * and `Format of the SRV RR' subsection `Weight') to place at
1457 * workbegin (swapping with the one that was there, and then
1458 * advance workbegin. */
1459 for (;
1460 workbegin + rrsz < workend; /* don't bother if just one */
1461 workbegin += rrsz) {
1462
1463 randval= nrand48(ads->rand48xsubi);
1464 randval %= (totalweight + 1);
1465 /* makes it into 0..totalweight inclusive; with 2^10 RRs,
1466 * totalweight must be <= 2^26 so probability nonuniformity is
1467 * no worse than 1 in 2^(31-26) ie 1 in 2^5, ie
1468 * abs(log(P_intended(RR_i) / P_actual(RR_i)) <= log(2^-5).
1469 */
1470
1471 for (search=workbegin, runtotal=0;
1472 (runtotal += (rr=(void*)search)->weight) < randval;
1473 search += rrsz);
1474 assert(search < arrayend);
1475 totalweight -= rr->weight;
1476 if (search != workbegin) {
1477 memcpy(&rrtmp, workbegin, rrsz);
1478 memcpy(workbegin, search, rrsz);
1479 memcpy(search, &rrtmp, rrsz);
1480 }
1481 }
1482 }
1483 /* tests:
1484 * dig -t srv _srv._tcp.test.iwj.relativity.greenend.org.uk.
1485 * ./adnshost_s -t srv- _sip._udp.voip.net.cam.ac.uk.
1486 * ./adnshost_s -t srv- _jabber._tcp.jabber.org
1487 */
1488 }
1489
1490 /*
1491 * _byteblock (mf)
1492 */
1493
1494 static void mf_byteblock(adns_query qu, void *datap) {
1495 adns_rr_byteblock *rrp= datap;
1496 void *bytes= rrp->data;
1497 adns__makefinal_block(qu,&bytes,rrp->len);
1498 rrp->data= bytes;
1499 }
1500
1501 /*
1502 * _opaque (pa,cs)
1503 */
1504
1505 static adns_status pa_opaque(const parseinfo *pai, int cbyte,
1506 int max, void *datap) {
1507 adns_rr_byteblock *rrp= datap;
1508
1509 rrp->len= max - cbyte;
1510 rrp->data= adns__alloc_interim(pai->qu, rrp->len);
1511 if (!rrp->data) R_NOMEM;
1512 memcpy(rrp->data, pai->dgram + cbyte, rrp->len);
1513 return adns_s_ok;
1514 }
1515
1516 static adns_status cs_opaque(vbuf *vb, const void *datap) {
1517 const adns_rr_byteblock *rrp= datap;
1518 char buf[10];
1519 int l;
1520 unsigned char *p;
1521
1522 sprintf(buf,"\\# %d",rrp->len);
1523 CSP_ADDSTR(buf);
1524
1525 for (l= rrp->len, p= rrp->data;
1526 l>=4;
1527 l -= 4, p += 4) {
1528 sprintf(buf," %02x%02x%02x%02x",p[0],p[1],p[2],p[3]);
1529 CSP_ADDSTR(buf);
1530 }
1531 for (;
1532 l>0;
1533 l--, p++) {
1534 sprintf(buf," %02x",*p);
1535 CSP_ADDSTR(buf);
1536 }
1537 return adns_s_ok;
1538 }
1539
1540 /*
1541 * _flat (mf)
1542 */
1543
1544 static void mf_flat(adns_query qu, void *data) { }
1545
1546 /*
1547 * Now the table.
1548 */
1549
1550 #define TYPESZ_M(member) (sizeof(*((adns_answer*)0)->rrs.member))
1551
1552 #define DEEP_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \
1553 { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_##memb, \
1554 GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \
1555 adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \
1556 CDR(__VA_ARGS__) }
1557 #define FLAT_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \
1558 { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_flat, \
1559 GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \
1560 adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \
1561 CDR(__VA_ARGS__) }
1562
1563 #define di_0 0
1564
1565 static const typeinfo typeinfos[] = {
1566 /* Must be in ascending order of rrtype ! */
1567 /* mem-mgmt code rrt fmt member parser comparer printer */
1568
1569 FLAT_TYPE(a, "A", 0, inaddr, inaddr, inaddr,inaddr ),
1570 DEEP_TYPE(ns_raw, "NS", "raw",str, host_raw,0, domain ),
1571 DEEP_TYPE(cname, "CNAME", 0, str, dom_raw, 0, domain ),
1572 DEEP_TYPE(soa_raw,"SOA", "raw",soa, soa, 0, soa ),
1573 DEEP_TYPE(ptr_raw,"PTR", "raw",str, host_raw,0, domain ),
1574 DEEP_TYPE(hinfo, "HINFO", 0, intstrpair,hinfo, 0, hinfo ),
1575 DEEP_TYPE(mx_raw, "MX", "raw",intstr, mx_raw, mx_raw,inthost ),
1576 DEEP_TYPE(txt, "TXT", 0, manyistr, txt, 0, txt ),
1577 DEEP_TYPE(rp_raw, "RP", "raw",strpair, rp, 0, rp ),
1578 FLAT_TYPE(aaaa, "AAAA", 0, in6addr, in6addr, in6addr,in6addr ),
1579 DEEP_TYPE(srv_raw,"SRV", "raw",srvraw , srvraw, srv, srvraw,
1580 .checklabel= ckl_srv, .postsort= postsort_srv),
1581
1582 FLAT_TYPE(addr, "A", "addr", addr, addr, addr, addr,
1583 .getrrsz= gsz_addr, .query_send= qs_addr),
1584 DEEP_TYPE(ns, "NS", "+addr",hostaddr, hostaddr,hostaddr,hostaddr ),
1585 DEEP_TYPE(ptr, "PTR","checked",str, ptr, 0, domain,
1586 .checklabel= ckl_ptr),
1587 DEEP_TYPE(mx, "MX", "+addr",inthostaddr,mx, mx, inthostaddr, ),
1588 DEEP_TYPE(srv, "SRV","+addr",srvha, srvha, srv, srvha,
1589 .checklabel= ckl_srv, .postsort= postsort_srv),
1590
1591 DEEP_TYPE(soa, "SOA","822", soa, soa, 0, soa ),
1592 DEEP_TYPE(rp, "RP", "822", strpair, rp, 0, rp ),
1593 };
1594
1595 static const typeinfo tinfo_addrsub =
1596 FLAT_TYPE(none, "<addr>","sub",addr, addr, 0, addr,
1597 .getrrsz= gsz_addr);
1598
1599 static const typeinfo typeinfo_unknown=
1600 DEEP_TYPE(unknown,0, "unknown",byteblock,opaque, 0, opaque );
1601
1602 const typeinfo *adns__findtype(adns_rrtype type) {
1603 const typeinfo *begin, *end, *mid;
1604
1605 if (type & adns_r_unknown) return &typeinfo_unknown;
1606 type &= adns_rrt_reprmask;
1607
1608 begin= typeinfos; end= typeinfos+(sizeof(typeinfos)/sizeof(typeinfo));
1609
1610 while (begin < end) {
1611 mid= begin + ((end-begin)>>1);
1612 if (mid->typekey == type) return mid;
1613 if (type > mid->typekey) begin= mid+1;
1614 else end= mid;
1615 }
1616 return 0;
1617 }