2006-12-12 03:59:06 +08:00
|
|
|
/* minires-os-if.c. Stub synchronous resolver for Cygwin.
|
|
|
|
|
2015-01-13 16:52:26 +08:00
|
|
|
Copyright 2006, 2007, 2008, 2009, 2011, 2012, 2015 Red Hat, Inc.
|
2006-12-12 03:59:06 +08:00
|
|
|
|
|
|
|
Written by Pierre A. Humblet <Pierre.Humblet@ieee.org>
|
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
details. */
|
|
|
|
|
2012-07-06 21:53:23 +08:00
|
|
|
#define __INSIDE_CYGWIN_NET__
|
|
|
|
#define USE_SYS_TYPES_FD_SET
|
|
|
|
#include <winsup.h>
|
|
|
|
#include <ws2tcpip.h>
|
|
|
|
#include <iphlpapi.h>
|
|
|
|
#include <windns.h>
|
|
|
|
#include "ntdll.h"
|
|
|
|
#undef h_errno
|
2006-12-12 03:59:06 +08:00
|
|
|
#include "minires.h"
|
|
|
|
|
|
|
|
#ifdef __CYGWIN__
|
|
|
|
/***********************************************************************
|
|
|
|
*
|
|
|
|
Windows interface code
|
|
|
|
|
|
|
|
***********************************************************************/
|
|
|
|
|
|
|
|
/* Conflict between Windows definitions and others */
|
|
|
|
#undef ERROR
|
|
|
|
#undef NOERROR
|
|
|
|
#undef DELETE
|
|
|
|
|
|
|
|
/***********************************************************************
|
2008-02-16 01:53:11 +08:00
|
|
|
* write_record: Translates a Windows DNS record into a compressed record
|
2006-12-12 03:59:06 +08:00
|
|
|
***********************************************************************/
|
|
|
|
|
|
|
|
#define PUTDOMAIN(d,p)\
|
2013-04-23 17:44:36 +08:00
|
|
|
{int res = dn_comp(d, p, EndPtr - p, dnptrs, lastdnptr); p += res < 0 ? (int) strlen(d) : res; }
|
2006-12-12 03:59:06 +08:00
|
|
|
|
|
|
|
static u_char * write_record(unsigned char * ptr, PDNS_RECORD rr, unsigned char * EndPtr,
|
|
|
|
unsigned char ** dnptrs, unsigned char ** lastdnptr, int debug)
|
|
|
|
{
|
|
|
|
u_char * rd_length_ptr;
|
|
|
|
|
|
|
|
PUTDOMAIN(rr->pName, ptr);
|
|
|
|
|
|
|
|
if (ptr + 4 > EndPtr)
|
|
|
|
ptr += 4;
|
|
|
|
else {
|
|
|
|
PUTSHORT(rr->wType, ptr);
|
|
|
|
PUTSHORT(ns_c_in, ptr);
|
|
|
|
}
|
|
|
|
if ((rr->Flags.DW & 0x3) == DnsSectionQuestion)
|
|
|
|
return ptr;
|
|
|
|
|
|
|
|
if (ptr + 4 > EndPtr)
|
|
|
|
ptr += 4;
|
|
|
|
else {
|
|
|
|
PUTLONG(rr->dwTtl, ptr);
|
|
|
|
}
|
|
|
|
rd_length_ptr = ptr;
|
|
|
|
ptr += 2; /* Placeholder for RDLENGTH */
|
|
|
|
|
|
|
|
/* The default case uses an undocumented feature of the Windows
|
2008-02-16 01:53:11 +08:00
|
|
|
resolver for types greater than 16.
|
2006-12-12 03:59:06 +08:00
|
|
|
The DNS_RECORD Data contains the record in wire format. */
|
|
|
|
|
|
|
|
switch(rr->wType) {
|
|
|
|
case DNS_TYPE_A:
|
|
|
|
{
|
|
|
|
u_char * aptr = (u_char *) & rr->Data.A.IpAddress;
|
|
|
|
if (ptr + 4 <= EndPtr) {
|
|
|
|
ptr[0] = aptr[0];
|
|
|
|
ptr[1] = aptr[1];
|
|
|
|
ptr[2] = aptr[2];
|
|
|
|
ptr[3] = aptr[3];
|
|
|
|
}
|
|
|
|
ptr += 4;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case DNS_TYPE_NS:
|
|
|
|
case DNS_TYPE_MD:
|
|
|
|
case DNS_TYPE_MF:
|
|
|
|
case DNS_TYPE_CNAME:
|
|
|
|
case DNS_TYPE_MB:
|
|
|
|
case DNS_TYPE_MG:
|
|
|
|
case DNS_TYPE_MR:
|
|
|
|
case DNS_TYPE_PTR:
|
|
|
|
PUTDOMAIN(rr->Data.PTR.pNameHost, ptr);
|
|
|
|
break;
|
|
|
|
case DNS_TYPE_SOA:
|
|
|
|
PUTDOMAIN(rr->Data.SOA.pNamePrimaryServer, ptr);
|
|
|
|
PUTDOMAIN(rr->Data.SOA.pNameAdministrator, ptr);
|
|
|
|
if (ptr + 20 > EndPtr)
|
|
|
|
ptr += 20;
|
|
|
|
else {
|
|
|
|
PUTLONG(rr->Data.SOA.dwSerialNo, ptr);
|
|
|
|
PUTLONG(rr->Data.SOA.dwRefresh, ptr);
|
|
|
|
PUTLONG(rr->Data.SOA.dwRetry, ptr);
|
|
|
|
PUTLONG(rr->Data.SOA.dwExpire, ptr);
|
|
|
|
PUTLONG(rr->Data.SOA.dwDefaultTtl, ptr);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case DNS_TYPE_NULL:
|
|
|
|
if (ptr + rr->Data.Null.dwByteCount <= EndPtr)
|
|
|
|
memcpy(ptr, rr->Data.Null.Data, rr->Data.Null.dwByteCount);
|
|
|
|
ptr += rr->Data.Null.dwByteCount;
|
|
|
|
if (rr->Data.Null.dwByteCount == rr->wDataLength - sizeof(DNS_NULL_DATA) + 1)
|
|
|
|
DPRINTF(debug, "Null byte count has an unexpected value\n");
|
|
|
|
break;
|
|
|
|
case DNS_TYPE_WKS:
|
|
|
|
if (ptr + rr->wDataLength - sizeof(DNS_WKS_DATA) + 1 + 5 > EndPtr)
|
|
|
|
ptr += rr->wDataLength - sizeof(DNS_WKS_DATA) + 1 + 5;
|
|
|
|
else {
|
|
|
|
PUTLONG(rr->Data.WKS.IpAddress, ptr);
|
|
|
|
*ptr++ = rr->Data.WKS.chProtocol;
|
|
|
|
memcpy(ptr, rr->Data.WKS.BitMask, rr->wDataLength - sizeof(DNS_WKS_DATA) + 1);
|
|
|
|
ptr += rr->wDataLength - sizeof(DNS_WKS_DATA) + 1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case DNS_TYPE_MINFO:
|
2007-02-09 18:09:21 +08:00
|
|
|
case DNS_TYPE_RP:
|
2006-12-12 03:59:06 +08:00
|
|
|
PUTDOMAIN(rr->Data.MINFO.pNameMailbox, ptr);
|
|
|
|
PUTDOMAIN(rr->Data.MINFO.pNameErrorsMailbox, ptr);
|
|
|
|
break;
|
|
|
|
case DNS_TYPE_MX:
|
2007-02-09 18:09:21 +08:00
|
|
|
case DNS_TYPE_AFSDB:
|
|
|
|
case DNS_TYPE_RT:
|
2006-12-12 03:59:06 +08:00
|
|
|
if (ptr + 2 > EndPtr)
|
|
|
|
ptr += 2;
|
|
|
|
else
|
|
|
|
PUTSHORT(rr->Data.MX.wPreference, ptr);
|
|
|
|
PUTDOMAIN(rr->Data.MX.pNameExchange, ptr);
|
|
|
|
break;
|
|
|
|
case DNS_TYPE_HINFO:
|
2007-02-09 18:09:21 +08:00
|
|
|
case DNS_TYPE_ISDN:
|
|
|
|
case DNS_TYPE_TEXT:
|
|
|
|
case DNS_TYPE_X25:
|
2006-12-12 03:59:06 +08:00
|
|
|
{
|
|
|
|
unsigned int i, len;
|
|
|
|
for (i = 0; i < rr->Data.TXT.dwStringCount; i++) {
|
|
|
|
len = strlen(rr->Data.TXT.pStringArray[i]) & 0xFF;
|
|
|
|
if (ptr + len + 1 > EndPtr)
|
|
|
|
ptr += len + 1;
|
|
|
|
else {
|
|
|
|
*ptr++ = len;
|
|
|
|
memcpy(ptr, rr->Data.TXT.pStringArray[i], len);
|
|
|
|
ptr += len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2007-02-09 18:09:21 +08:00
|
|
|
case DNS_TYPE_SRV:
|
|
|
|
if (ptr + 6 > EndPtr)
|
|
|
|
ptr += 6;
|
|
|
|
else {
|
|
|
|
PUTSHORT(rr->Data.SRV.wPriority, ptr);
|
|
|
|
PUTSHORT(rr->Data.SRV.wWeight, ptr);
|
|
|
|
PUTSHORT(rr->Data.SRV.wPort, ptr);
|
|
|
|
}
|
|
|
|
PUTDOMAIN(rr->Data.SRV.pNameTarget, ptr);
|
|
|
|
break;
|
2006-12-12 03:59:06 +08:00
|
|
|
default:
|
|
|
|
{
|
|
|
|
unsigned int len = rr->wDataLength;
|
|
|
|
DPRINTF(debug, "No structure for wType %d\n", rr->wType);
|
|
|
|
if (ptr + len <= EndPtr)
|
|
|
|
memcpy(ptr, (char *) &rr->Data, len);
|
|
|
|
ptr += len;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (rd_length_ptr + 2 <= EndPtr)
|
|
|
|
PUTSHORT(ptr - rd_length_ptr - 2, rd_length_ptr);
|
|
|
|
return ptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
/***********************************************************************
|
|
|
|
*
|
|
|
|
cygwin_query: implements res_nquery by calling DnsQuery
|
|
|
|
|
|
|
|
***********************************************************************/
|
2008-02-16 01:53:11 +08:00
|
|
|
static int cygwin_query(res_state statp, const char * DomName, int Class, int Type,
|
2006-12-12 03:59:06 +08:00
|
|
|
unsigned char * AnsPtr, int AnsLength)
|
|
|
|
{
|
|
|
|
DNS_STATUS res;
|
|
|
|
PDNS_RECORD pQueryResultsSet, rr;
|
2013-04-23 17:44:36 +08:00
|
|
|
DWORD section;
|
|
|
|
int len, counts[4] = {0, 0, 0, 0}, debug = statp->options & RES_DEBUG;
|
2006-12-12 03:59:06 +08:00
|
|
|
unsigned char * dnptrs[256], * ptr;
|
|
|
|
|
|
|
|
dnptrs[0] = AnsPtr;
|
|
|
|
dnptrs[1] = NULL;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
if (Class != ns_c_in) {
|
|
|
|
errno = ENOSYS;
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
res = DnsQuery_A(DomName, Type, DNS_QUERY_TREAT_AS_FQDN,
|
|
|
|
NULL, &pQueryResultsSet, NULL);
|
|
|
|
#if 0
|
|
|
|
#define NETDB_INTERNAL -1 /* see errno */
|
|
|
|
#define HOST_NOT_FOUND 1 /* Authoritative Answer Host not found */
|
|
|
|
#define TRY_AGAIN 2 /* Non-Authoritive Host not found, or SERVERFAIL */
|
|
|
|
#define NO_RECOVERY 3 /* Non recoverable errors, FORMERR, REFUSED, NOTIMP */
|
2008-02-16 01:53:11 +08:00
|
|
|
#define NO_DATA 4 /* Valid name, no data record of requested type */
|
2006-12-12 03:59:06 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
DPRINTF(debug, "DnsQuery: %lu (Windows)\n", res);
|
|
|
|
if (res) {
|
|
|
|
switch (res) {
|
|
|
|
case ERROR_INVALID_NAME:
|
|
|
|
errno = EINVAL;
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;;
|
|
|
|
break;
|
|
|
|
case ERROR_TIMEOUT:
|
|
|
|
statp->res_h_errno = TRY_AGAIN;
|
|
|
|
break;
|
|
|
|
case DNS_ERROR_RCODE_NAME_ERROR:
|
|
|
|
statp->res_h_errno = HOST_NOT_FOUND;
|
|
|
|
break;
|
|
|
|
case DNS_ERROR_RCODE_SERVER_FAILURE:
|
|
|
|
statp->res_h_errno = TRY_AGAIN;
|
|
|
|
break;
|
|
|
|
case DNS_ERROR_NO_DNS_SERVERS:
|
|
|
|
case DNS_ERROR_RCODE_FORMAT_ERROR:
|
|
|
|
case DNS_ERROR_RCODE_NOT_IMPLEMENTED:
|
|
|
|
case DNS_ERROR_RCODE_REFUSED:
|
|
|
|
statp->res_h_errno = NO_RECOVERY;
|
|
|
|
break;
|
|
|
|
case DNS_INFO_NO_RECORDS: /* May be returned even if the host doesn't exist */
|
|
|
|
statp->res_h_errno = NO_DATA;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
DPRINTF(debug, "Unknown code %lu for %s %d\n", res, DomName, Type);
|
|
|
|
statp->res_h_errno = NO_RECOVERY;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
len = -1;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
ptr = AnsPtr + HFIXEDSZ; /* Skip header */
|
|
|
|
|
|
|
|
rr = pQueryResultsSet;
|
|
|
|
section = 0;
|
|
|
|
while (rr) {
|
2015-01-13 00:38:02 +08:00
|
|
|
/* Some Windows versions return questions when providing locally generated
|
|
|
|
answers, for example for "localhost" or for the computer name. */
|
|
|
|
if (((rr->Flags.DW & 0x3) == DnsSectionQuestion) &&
|
|
|
|
(rr->wDataLength > 0)) {
|
|
|
|
DPRINTF(debug, "Changing record below from question to answer\n");
|
|
|
|
rr->Flags.DW ^= DnsSectionQuestion ^ DnsSectionAnswer;
|
|
|
|
}
|
2006-12-12 03:59:06 +08:00
|
|
|
if (!counts[0] && (rr->Flags.DW & 0x3)) {
|
|
|
|
/* No question. Adopt the first name as the name in the question */
|
|
|
|
if ((len = dn_comp(rr->pName, ptr, AnsLength - 4,
|
|
|
|
dnptrs, &dnptrs[DIM(dnptrs) - 1])) < 0) {
|
|
|
|
ptr = NULL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ptr += len;
|
|
|
|
PUTSHORT(Type, ptr);
|
|
|
|
PUTSHORT(ns_c_in, ptr);
|
|
|
|
counts[0] = 1;
|
|
|
|
}
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|
|
|
DPRINTF(debug, "%s Section %d Type %u Windows Record Length %u\n",
|
2006-12-12 03:59:06 +08:00
|
|
|
rr->pName, rr->Flags.DW & 0x3, rr->wType, rr->wDataLength);
|
|
|
|
|
|
|
|
/* Check the records are in correct section order */
|
|
|
|
if ((rr->Flags.DW & 0x3) < section) {
|
|
|
|
DPRINTF(debug, "Unexpected section order %s %d\n", DomName, Type);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
section = rr->Flags.DW & 0x3;
|
|
|
|
|
2008-02-16 01:53:11 +08:00
|
|
|
ptr = write_record(ptr, rr, AnsPtr + AnsLength, dnptrs,
|
2006-12-12 03:59:06 +08:00
|
|
|
&dnptrs[DIM(dnptrs) - 1], debug);
|
|
|
|
|
|
|
|
counts[section]++;
|
|
|
|
rr = rr->pNext;
|
|
|
|
}
|
|
|
|
|
|
|
|
DnsRecordListFree(pQueryResultsSet, DnsFreeRecordList);
|
|
|
|
|
|
|
|
len = ptr - AnsPtr;
|
|
|
|
done:
|
|
|
|
ptr = AnsPtr;
|
|
|
|
PUTSHORT(0, ptr); /* Id */
|
|
|
|
PUTSHORT((QR << 8) + RA + RD, ptr);
|
|
|
|
for (section = 0; section < DIM(counts); section++) {
|
|
|
|
PUTSHORT(counts[section], ptr);
|
|
|
|
}
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/***********************************************************************
|
|
|
|
*
|
|
|
|
get_registry_items: returns dns items from the registry
|
2008-02-16 01:53:11 +08:00
|
|
|
|
2011-04-19 18:02:06 +08:00
|
|
|
in: Unicode representation of registry value "value".
|
2006-12-12 03:59:06 +08:00
|
|
|
what: 0 addresses ; 1 search list
|
|
|
|
|
|
|
|
***********************************************************************/
|
2011-04-19 18:02:06 +08:00
|
|
|
static void get_registry_dns_items(PUNICODE_STRING in, res_state statp,
|
|
|
|
int what)
|
2006-12-12 03:59:06 +08:00
|
|
|
{
|
|
|
|
int debug = statp->options & RES_DEBUG;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
2011-04-19 18:02:06 +08:00
|
|
|
if (in->Length) {
|
|
|
|
char list[in->Length];
|
|
|
|
size_t size = wcstombs (list, in->Buffer, in->Length);
|
|
|
|
if (what == 0) { /* Get the addresses */
|
|
|
|
char *ap, *srch;
|
2013-04-23 17:44:36 +08:00
|
|
|
size_t numAddresses = 0;
|
2006-12-12 03:59:06 +08:00
|
|
|
for (ap = list; ap < list + size && *ap; ap = srch) {
|
2008-02-16 01:53:11 +08:00
|
|
|
/* The separation character can be 0, ' ', or ','. */
|
2011-04-19 18:02:06 +08:00
|
|
|
for (srch = ap; *srch && (isdigit((unsigned) *srch) || *srch == '.' );
|
|
|
|
srch++);
|
2006-12-12 03:59:06 +08:00
|
|
|
*srch++ = 0;
|
|
|
|
if (numAddresses < DIM(statp->nsaddr_list)) {
|
|
|
|
DPRINTF(debug, "server \"%s\"\n", ap);
|
2008-09-11 12:34:24 +08:00
|
|
|
statp->nsaddr_list[numAddresses].sin_addr.s_addr = cygwin_inet_addr((char *) ap);
|
2006-12-12 03:59:06 +08:00
|
|
|
if ( statp->nsaddr_list[numAddresses].sin_addr.s_addr != 0 )
|
|
|
|
numAddresses++;
|
|
|
|
}
|
2008-02-16 01:53:11 +08:00
|
|
|
else
|
2006-12-12 03:59:06 +08:00
|
|
|
DPRINTF(debug, "no space for server \"%s\"\n", ap);
|
|
|
|
}
|
|
|
|
statp->nscount = numAddresses;
|
|
|
|
}
|
|
|
|
else /* Parse the search line */
|
2011-04-19 18:02:06 +08:00
|
|
|
minires_get_search(list, statp);
|
2006-12-12 03:59:06 +08:00
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/***********************************************************************
|
|
|
|
*
|
2008-02-16 01:53:11 +08:00
|
|
|
get_registry_dns:
|
2006-12-12 03:59:06 +08:00
|
|
|
|
|
|
|
Read the registry to get dns server addresses in Network Byte Order,
|
2007-02-26 20:22:41 +08:00
|
|
|
and set statp->nscount (for NT <= 4.0)
|
2006-12-12 03:59:06 +08:00
|
|
|
Read the registry SearchList
|
2008-02-16 01:53:11 +08:00
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
***********************************************************************/
|
|
|
|
|
|
|
|
static void get_registry_dns(res_state statp)
|
|
|
|
{
|
2011-04-19 18:02:06 +08:00
|
|
|
NTSTATUS status;
|
|
|
|
const PCWSTR keyName = L"Tcpip\\Parameters";
|
2008-02-16 01:53:11 +08:00
|
|
|
|
2007-02-26 20:22:41 +08:00
|
|
|
DPRINTF(statp->options & RES_DEBUG, "key %s\n", keyName);
|
2011-04-19 18:02:06 +08:00
|
|
|
status = RtlCheckRegistryKey (RTL_REGISTRY_SERVICES, keyName);
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
DPRINTF (statp->options & RES_DEBUG, "RtlCheckRegistryKey: status %p\n",
|
|
|
|
status);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
UNICODE_STRING uns = { 0, 0, NULL };
|
|
|
|
UNICODE_STRING udns = { 0, 0, NULL };
|
|
|
|
UNICODE_STRING usl = { 0, 0, NULL };
|
|
|
|
RTL_QUERY_REGISTRY_TABLE tab[4] = {
|
|
|
|
{ NULL, RTL_QUERY_REGISTRY_DIRECT | RTL_QUERY_REGISTRY_NOEXPAND,
|
|
|
|
L"NameServer", &uns, REG_NONE, NULL, 0 },
|
|
|
|
{ NULL, RTL_QUERY_REGISTRY_DIRECT | RTL_QUERY_REGISTRY_NOEXPAND,
|
|
|
|
L"DhcpNameServer", &udns, REG_NONE, NULL, 0 },
|
|
|
|
{ NULL, RTL_QUERY_REGISTRY_DIRECT | RTL_QUERY_REGISTRY_NOEXPAND,
|
|
|
|
L"SearchList", &usl, REG_NONE, NULL, 0 },
|
|
|
|
};
|
|
|
|
|
|
|
|
status = RtlQueryRegistryValues (RTL_REGISTRY_SERVICES, keyName, tab,
|
|
|
|
NULL, NULL);
|
|
|
|
if (!NT_SUCCESS (status))
|
|
|
|
{
|
|
|
|
DPRINTF (statp->options & RES_DEBUG,
|
|
|
|
"RtlQueryRegistryValues: status %p\n", status);
|
|
|
|
return;
|
|
|
|
}
|
2006-12-12 03:59:06 +08:00
|
|
|
|
|
|
|
if (statp->nscount == 0)
|
2011-04-19 18:02:06 +08:00
|
|
|
get_registry_dns_items(&uns, statp, 0);
|
2008-02-16 01:53:11 +08:00
|
|
|
if (statp->nscount == 0)
|
2011-04-19 18:02:06 +08:00
|
|
|
get_registry_dns_items(&udns, statp, 0);
|
2006-12-12 03:59:06 +08:00
|
|
|
if (statp->dnsrch[0] == NULL)
|
2011-04-19 18:02:06 +08:00
|
|
|
get_registry_dns_items(&usl, statp, 1);
|
|
|
|
|
|
|
|
if (uns.Buffer)
|
|
|
|
RtlFreeUnicodeString (&uns);
|
|
|
|
if (udns.Buffer)
|
|
|
|
RtlFreeUnicodeString (&udns);
|
|
|
|
if (usl.Buffer)
|
|
|
|
RtlFreeUnicodeString (&usl);
|
2006-12-12 03:59:06 +08:00
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/***********************************************************************
|
|
|
|
*
|
|
|
|
get_dns_info: Get the search list or the domain name
|
2008-02-16 01:53:11 +08:00
|
|
|
and the dns server addresses in Network Byte Order
|
2006-12-12 03:59:06 +08:00
|
|
|
Set statp->os_query if DnsQuery is available.
|
2008-02-16 01:53:11 +08:00
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
***********************************************************************/
|
|
|
|
void get_dns_info(res_state statp)
|
|
|
|
{
|
|
|
|
#if MAX_HOSTNAME_LEN > MAXHOSTNAMELEN
|
|
|
|
#define MAX_HOSTNAME_SIZE (MAX_HOSTNAME_LEN + 1)
|
|
|
|
#else
|
|
|
|
#define MAX_HOSTNAME_SIZE (MAXHOSTNAMELEN + 1)
|
|
|
|
#endif
|
|
|
|
#if MAX_HOSTNAME_SIZE > 256 /* sizeof(defdname) */
|
|
|
|
#error stap->defdname too short
|
|
|
|
#endif
|
|
|
|
|
|
|
|
int res, debug = statp->options & RES_DEBUG;
|
|
|
|
|
|
|
|
ULONG ulOutBufLen = 0;
|
|
|
|
DWORD dwRetVal;
|
|
|
|
IP_ADDR_STRING * pIPAddr;
|
|
|
|
FIXED_INFO * pFixedInfo;
|
2013-04-23 17:44:36 +08:00
|
|
|
size_t numAddresses = 0;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
2011-05-01 22:56:46 +08:00
|
|
|
if (statp->use_os)
|
2006-12-15 17:50:32 +08:00
|
|
|
{
|
2011-05-07 02:43:37 +08:00
|
|
|
DPRINTF(debug, "using dnsapi.dll\n");
|
2006-12-12 03:59:06 +08:00
|
|
|
statp->os_query = (typeof(statp->os_query)) cygwin_query;
|
|
|
|
/* We just need the search list. Avoid loading iphlpapi. */
|
|
|
|
statp->nscount = -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (statp->nscount != 0)
|
|
|
|
goto use_registry;
|
|
|
|
|
|
|
|
/* First call to get the buffer length we need */
|
2006-12-15 17:50:32 +08:00
|
|
|
dwRetVal = GetNetworkParams((FIXED_INFO *) 0, &ulOutBufLen);
|
2006-12-12 03:59:06 +08:00
|
|
|
if (dwRetVal != ERROR_BUFFER_OVERFLOW) {
|
|
|
|
DPRINTF(debug, "GetNetworkParams: error %lu (Windows)\n", dwRetVal);
|
|
|
|
goto use_registry;
|
|
|
|
}
|
|
|
|
if ((pFixedInfo = (FIXED_INFO *) alloca(ulOutBufLen)) == 0) {
|
|
|
|
DPRINTF(debug, "alloca: %s\n", strerror(errno));
|
|
|
|
goto use_registry;
|
|
|
|
}
|
2006-12-15 17:50:32 +08:00
|
|
|
if ((dwRetVal = GetNetworkParams(pFixedInfo, & ulOutBufLen))) {
|
2006-12-12 03:59:06 +08:00
|
|
|
DPRINTF(debug, "GetNetworkParams: error %lu (Windows)\n", dwRetVal);
|
|
|
|
goto use_registry;
|
|
|
|
}
|
|
|
|
|
|
|
|
DPRINTF(debug, "GetNetworkParams: OK\n");
|
|
|
|
/* Record server addresses, up to array size */
|
|
|
|
for (pIPAddr = &(pFixedInfo->DnsServerList), numAddresses = 0;
|
|
|
|
pIPAddr;
|
|
|
|
pIPAddr = pIPAddr->Next) {
|
|
|
|
if (numAddresses < DIM(statp->nsaddr_list)) {
|
|
|
|
DPRINTF(debug, "server \"%s\"\n", pIPAddr->IpAddress.String);
|
|
|
|
statp->nsaddr_list[numAddresses].sin_addr.s_addr = cygwin_inet_addr(pIPAddr->IpAddress.String);
|
|
|
|
if (statp->nsaddr_list[numAddresses].sin_addr.s_addr != 0) {
|
|
|
|
numAddresses++;
|
|
|
|
statp->nscount++;
|
|
|
|
}
|
|
|
|
}
|
2008-02-16 01:53:11 +08:00
|
|
|
else
|
2006-12-12 03:59:06 +08:00
|
|
|
DPRINTF(debug, "no space for server \"%s\"\n", pIPAddr->IpAddress.String);
|
|
|
|
}
|
|
|
|
|
|
|
|
use_registry:
|
|
|
|
get_registry_dns(statp);
|
|
|
|
|
|
|
|
if (!statp->dnsrch[0]) {
|
|
|
|
statp->defdname[sizeof(statp->defdname) - 1] = 0;
|
|
|
|
if (!(res = getdomainname(statp->defdname, sizeof(statp->defdname)))) {
|
|
|
|
if (statp->defdname[0] && !statp->defdname[sizeof(statp->defdname) - 1])
|
|
|
|
statp->dnsrch[0] = statp->defdname;
|
|
|
|
}
|
|
|
|
DPRINTF(debug, "getdomainname \"%s\"\n",
|
|
|
|
(res)? strerror(errno) : statp->defdname);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#else
|
|
|
|
/***********************************************************************
|
|
|
|
*
|
|
|
|
Default interface code
|
|
|
|
|
|
|
|
***********************************************************************/
|
|
|
|
|
|
|
|
void get_dns_info(res_state statp)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#if 0
|
|
|
|
#define DNS_ERROR_RCODE_FORMAT_ERROR 9001L
|
|
|
|
#define DNS_ERROR_RCODE_SERVER_FAILURE 9002L
|
|
|
|
#define DNS_ERROR_RCODE_NAME_ERROR 9003L
|
|
|
|
#define DNS_ERROR_RCODE_NOT_IMPLEMENTED 9004L
|
|
|
|
#define DNS_ERROR_RCODE_REFUSED 9005L
|
|
|
|
#define DNS_ERROR_RCODE_YXDOMAIN 9006L
|
|
|
|
#define DNS_ERROR_RCODE_YXRRSET 9007L
|
|
|
|
#define DNS_ERROR_RCODE_NXRRSET 9008L
|
|
|
|
#define DNS_ERROR_RCODE_NOTAUTH 9009L
|
|
|
|
#define DNS_ERROR_RCODE_NOTZONE 9010L
|
|
|
|
#define DNS_ERROR_RCODE_BADSIG 9016L
|
|
|
|
#define DNS_ERROR_RCODE_BADKEY 9017L
|
|
|
|
#define DNS_ERROR_RCODE_BADTIME 9018L
|
|
|
|
#define DNS_INFO_NO_RECORDS 9501L
|
|
|
|
#define DNS_ERROR_BAD_PACKET 9502L
|
|
|
|
#define DNS_ERROR_NO_PACKET 9503L
|
|
|
|
#define DNS_ERROR_RCODE 9504L
|
|
|
|
#define DNS_ERROR_UNSECURE_PACKET 9505L
|
|
|
|
#define DNS_ERROR_INVALID_TYPE 9551L
|
|
|
|
#define DNS_ERROR_INVALID_IP_ADDRESS 9552L
|
|
|
|
#define DNS_ERROR_INVALID_PROPERTY 9553L
|
|
|
|
#define DNS_ERROR_TRY_AGAIN_LATER 9554L
|
|
|
|
#define DNS_ERROR_NOT_UNIQUE 9555L
|
|
|
|
#define DNS_ERROR_NON_RFC_NAME 9556L
|
|
|
|
#define DNS_STATUS_FQDN 9557L
|
|
|
|
#define DNS_STATUS_DOTTED_NAME 9558L
|
|
|
|
#define DNS_STATUS_SINGLE_PART_NAME 9559L
|
|
|
|
#define DNS_ERROR_INVALID_NAME_CHAR 9560L
|
|
|
|
#define DNS_ERROR_NUMERIC_NAME 9561L
|
|
|
|
#define DNS_ERROR_NOT_LALOWED_ON_ROOT_SERVER 9562L
|
|
|
|
#define DNS_ERROR_NOT_ALLOWED_UNDER_DELEGATION 9563L
|
|
|
|
#define DNS_ERROR_CANNOT_FIND_ROOT_HINTS 9564L
|
|
|
|
#define DNS_ERROR_INCONSISTENT_ROOT_HINTS 9565L
|
|
|
|
#define DNS_ERROR_ZONE_DOES_NOT_EXIST 9601L
|
|
|
|
#define DNS_ERROR_NO_ZONE_INFO 9602L
|
|
|
|
#define DNS_ERROR_INVALID_ZONE_OPERATION 9603L
|
|
|
|
#define DNS_ERROR_ZONE_CONFIGURATION_ERROR 9604L
|
|
|
|
#define DNS_ERROR_ZONE_HAS_NO_SOA_RECORD 9605L
|
|
|
|
#define DNS_ERROR_ZONE_HAS_NO_NS_RECORDS 9606L
|
|
|
|
#define DNS_ERROR_ZONE_LOCKED 9607L
|
|
|
|
#define DNS_ERROR_ZONE_CREATION_FAILED 9608L
|
|
|
|
#define DNS_ERROR_ZONE_ALREADY_EXISTS 9609L
|
|
|
|
#define DNS_ERROR_AUTOZONE_ALREADY_EXISTS 9610L
|
|
|
|
#define DNS_ERROR_INVALID_ZONE_TYPE 9611L
|
|
|
|
#define DNS_ERROR_SECONDARY_REQUIRES_MASTER_IP 9612L
|
|
|
|
#define DNS_ERROR_ZONE_NOT_SECONDARY 9613L
|
|
|
|
#define DNS_ERROR_NEED_SECONDARY_ADDRESSES 9614L
|
|
|
|
#define DNS_ERROR_WINS_INIT_FAILED 9615L
|
|
|
|
#define DNS_ERROR_NEED_WINS_SERVERS 9616L
|
|
|
|
#define DNS_ERROR_NBSTAT_INIT_FAILED 9617L
|
|
|
|
#define DNS_ERROR_SOA_DELETE_INVALID 9618L
|
|
|
|
#define DNS_ERROR_FORWARDER_ALREADY_EXISTS 9619L
|
|
|
|
#define DNS_ERROR_ZONE_REQUIRES_MASTER_IP 9620L
|
|
|
|
#define DNS_ERROR_ZONE_IS_SHUTDOWN 9621L
|
|
|
|
#define DNS_ERROR_PRIMARY_REQUIRES_DATAFILE 9651L
|
|
|
|
#define DNS_ERROR_INVALID_DATAFILE_NAME 9652L
|
|
|
|
#define DNS_ERROR_DATAFILE_OPEN_FAILURE 9653L
|
|
|
|
#define DNS_ERROR_FILE_WRITEBACK_FAILED 9654L
|
|
|
|
#define DNS_ERROR_DATAFILE_PARSING 9655L
|
|
|
|
#define DNS_ERROR_RECORD_DOES_NOT_EXIST 9701L
|
|
|
|
#define DNS_ERROR_RECORD_FORMAT 9702L
|
|
|
|
#define DNS_ERROR_NODE_CREATION_FAILED 9703L
|
|
|
|
#define DNS_ERROR_UNKNOWN_RECORD_TYPE 9704L
|
|
|
|
#define DNS_ERROR_RECORD_TIMED_OUT 9705L
|
|
|
|
#define DNS_ERROR_NAME_NOT_IN_ZONE 9706L
|
|
|
|
#define DNS_ERROR_CNAME_LOOP 9707L
|
|
|
|
#define DNS_ERROR_NODE_IS_CNAME 9708L
|
|
|
|
#define DNS_ERROR_CNAME_COLLISION 9709L
|
|
|
|
#define DNS_ERROR_RECORD_ONLY_AT_ZONE_ROOT 9710L
|
|
|
|
#define DNS_ERROR_RECORD_ALREADY_EXISTS 9711L
|
|
|
|
#define DNS_ERROR_SECONDARY_DATA 9712L
|
|
|
|
#define DNS_ERROR_NO_CREATE_CACHE_DATA 9713L
|
|
|
|
#define DNS_ERROR_NAME_DOES_NOT_EXIST 9714L
|
|
|
|
#define DNS_WARNING_PTR_CREATE_FAILED 9715L
|
|
|
|
#define DNS_WARNING_DOMAIN_UNDELETED 9716L
|
|
|
|
#define DNS_ERROR_DS_UNAVAILABLE 9717L
|
|
|
|
#define DNS_ERROR_DS_ZONE_ALREADY_EXISTS 9718L
|
|
|
|
#define DNS_ERROR_NO_BOOTFILE_IF_DS_ZONE 9719L
|
|
|
|
#define DNS_INFO_AXFR_COMPLETE 9751L
|
|
|
|
#define DNS_ERROR_AXFR 9752L
|
|
|
|
#define DNS_INFO_ADDED_LOCAL_WINS 9753L
|
|
|
|
#define DNS_STATUS_CONTINUE_NEEDED 9801L
|
|
|
|
#define DNS_ERROR_NO_TCPIP 9851L
|
|
|
|
#define DNS_ERROR_NO_DNS_SERVERS 9852L
|
|
|
|
#define DNS_ERROR_DP_DOES_NOT_EXIST 9901L
|
|
|
|
#define DNS_ERROR_DP_ALREADY_EXISTS 9902L
|
|
|
|
#define DNS_ERROR_DP_NOT_ENLISTED 9903L
|
|
|
|
#define DNS_ERROR_DP_ALREADY_ENLISTED 9904L
|
|
|
|
#define DNS_ERROR_DP_NOT_AVAILABLE 9905L
|
|
|
|
#endif
|