2006-12-12 03:59:06 +08:00
|
|
|
|
/* minires.c. Stub synchronous resolver for Cygwin.
|
|
|
|
|
|
2013-01-21 12:38:31 +08:00
|
|
|
|
Copyright 2006, 2008, 2009, 2010, 2011 Red Hat, Inc.
|
2006-12-12 03:59:06 +08:00
|
|
|
|
|
|
|
|
|
Written by Pierre A. Humblet <Pierre.Humblet@ieee.org>
|
|
|
|
|
|
|
|
|
|
This file is part of Cygwin.
|
|
|
|
|
|
|
|
|
|
This software is a copyrighted work licensed under the terms of the
|
|
|
|
|
Cygwin license. Please consult the file "CYGWIN_LICENSE" for
|
|
|
|
|
details. */
|
|
|
|
|
|
|
|
|
|
#include "minires.h"
|
|
|
|
|
|
|
|
|
|
/***********************************************************************
|
|
|
|
|
|
|
|
|
|
Utilities
|
|
|
|
|
|
|
|
|
|
***********************************************************************/
|
|
|
|
|
/***********************************************************************
|
|
|
|
|
|
|
|
|
|
dprintf
|
|
|
|
|
***********************************************************************/
|
|
|
|
|
void minires_dprintf(const char * format, ...)
|
|
|
|
|
{
|
|
|
|
|
va_list args;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
va_start(args, format);
|
|
|
|
|
fprintf(stderr, "Minires: ");
|
|
|
|
|
vfprintf(stderr, format, args);
|
|
|
|
|
va_end(args);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/***********************************************************************
|
|
|
|
|
|
|
|
|
|
scanline
|
|
|
|
|
Put pointers in list[] to the beginning of each space or comma delimited
|
|
|
|
|
word in "in", and put the lengths in sizes[] (counting the final 0).
|
2008-02-16 01:53:11 +08:00
|
|
|
|
Return the number of words found
|
2006-12-12 03:59:06 +08:00
|
|
|
|
***********************************************************************/
|
|
|
|
|
static int scanline(char * in, char **list, int * sizes, int maxnum)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
|
|
|
|
char * startp;
|
|
|
|
|
for (i = 0; i < maxnum; i++) {
|
2009-05-06 20:03:34 +08:00
|
|
|
|
while((*in) && (isspace((unsigned char)*in) || *in == ',')) in++;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
if (*in == 0)
|
2006-12-12 03:59:06 +08:00
|
|
|
|
break;
|
|
|
|
|
startp = in++;
|
2009-05-06 20:03:34 +08:00
|
|
|
|
while((*in) && !isspace((unsigned char)*in) && *in != ',') in++;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
list[i] = startp;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
sizes[i] = in - startp + 1;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
if (*in)
|
|
|
|
|
*in++ = 0;
|
|
|
|
|
}
|
|
|
|
|
return i;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/***********************************************************************
|
|
|
|
|
|
|
|
|
|
Read the search string.
|
|
|
|
|
|
|
|
|
|
***********************************************************************/
|
|
|
|
|
void minires_get_search(char * string, res_state statp)
|
|
|
|
|
{
|
|
|
|
|
char * words[MAXDNSRCH+1], * ptr;
|
|
|
|
|
int sizes[MAXDNSRCH+1];
|
|
|
|
|
int i, j, debug = statp->options & RES_DEBUG;
|
|
|
|
|
|
|
|
|
|
i = scanline(string, words, sizes, MAXDNSRCH+1);
|
|
|
|
|
ptr = statp->defdname;
|
|
|
|
|
for (j = 0; j < i; j++) {
|
2008-02-16 01:53:11 +08:00
|
|
|
|
if (j < MAXDNSRCH
|
2006-12-12 03:59:06 +08:00
|
|
|
|
&& ptr + sizes[j] < &statp->defdname[DIM(statp->defdname)]) {
|
|
|
|
|
statp->dnsrch[j] = strcpy(ptr, words[j]);
|
|
|
|
|
statp->dnsrch[j+1] = NULL;
|
|
|
|
|
ptr += sizes[j];
|
|
|
|
|
DPRINTF(debug, "search \"%s\"\n", words[j]);
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
DPRINTF(debug, "no space for \"%s\"\n", words[j]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/***********************************************************************
|
|
|
|
|
|
|
|
|
|
Read options
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
***********************************************************************/
|
|
|
|
|
static void get_options(res_state statp, int i, char **words)
|
|
|
|
|
{
|
|
|
|
|
char *ptr;
|
|
|
|
|
int value;
|
|
|
|
|
|
|
|
|
|
while (i-- > 0) {
|
|
|
|
|
if (!strcasecmp("debug", words[i])) {
|
|
|
|
|
statp->options |= RES_DEBUG;
|
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "%s: 1\n", words[i]);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2009-03-07 00:31:26 +08:00
|
|
|
|
if (!strcasecmp("inet6", words[i])) {
|
|
|
|
|
statp->options |= RES_USE_INET6;
|
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "%s: 1\n", words[i]);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2006-12-12 03:59:06 +08:00
|
|
|
|
if (!strcasecmp("osquery", words[i])) {
|
|
|
|
|
statp->use_os = 1;
|
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "%s: 1\n", words[i]);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if ((ptr = strchr(words[i], ':'))) {
|
|
|
|
|
*ptr++ = 0;
|
|
|
|
|
value = atoi(ptr);
|
2008-02-16 01:53:11 +08:00
|
|
|
|
/* Not supported
|
2006-12-12 03:59:06 +08:00
|
|
|
|
if (!strcasecmp("ndots", words[i])) {
|
|
|
|
|
statp->ndots = value;
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
*/
|
2009-03-07 00:31:26 +08:00
|
|
|
|
if (!strcasecmp("retry", words[i])
|
|
|
|
|
|| !strcasecmp("attempts", words[i])) {
|
2006-12-12 03:59:06 +08:00
|
|
|
|
if (value < 1)
|
|
|
|
|
value = 1;
|
2009-03-07 00:31:26 +08:00
|
|
|
|
else if (value > RES_MAXRETRY)
|
|
|
|
|
value = RES_MAXRETRY;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->retry = value;
|
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "%s: %d\n", words[i], value);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2009-03-07 00:31:26 +08:00
|
|
|
|
if (!strcasecmp("retrans", words[i])
|
|
|
|
|
|| !strcasecmp("timeout", words[i])) {
|
2006-12-12 03:59:06 +08:00
|
|
|
|
if (value < 1)
|
|
|
|
|
value = 1;
|
2009-03-07 00:31:26 +08:00
|
|
|
|
else if (value > RES_MAXRETRANS)
|
|
|
|
|
value = RES_MAXRETRANS;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->retrans = value;
|
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "%s: %d\n", words[i], value);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "unknown option: \"%s\"\n", words[i]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/***********************************************************************
|
|
|
|
|
|
|
|
|
|
Read the resolv.conf file.
|
|
|
|
|
We only look for nameserver, domain, search and options
|
|
|
|
|
|
|
|
|
|
***********************************************************************/
|
|
|
|
|
#if MAXNS > MAXDNSRCH + 1
|
|
|
|
|
#define MAXSIZE MAXNS
|
2008-02-16 01:53:11 +08:00
|
|
|
|
#else
|
2006-12-12 03:59:06 +08:00
|
|
|
|
#define MAXSIZE MAXDNSRCH + 1 /* Make unused one visible */
|
|
|
|
|
#endif
|
|
|
|
|
static void get_resolv(res_state statp)
|
|
|
|
|
{
|
|
|
|
|
FILE * fd;
|
|
|
|
|
char *words[MAXSIZE + 1], line[4096], *ptr;
|
|
|
|
|
int sizes[DIM(words)];
|
|
|
|
|
int i, j, ns = 0, have_search, have_address, debug = statp->options & RES_DEBUG;
|
|
|
|
|
|
|
|
|
|
fd = fopen(_PATH_RESCONF, "r");
|
|
|
|
|
DPRINTF(debug, _PATH_RESCONF ": %s\n", fd?"OK":strerror(errno));
|
|
|
|
|
if (fd == NULL)
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
statp->use_os = 0; /* Do not use os_query, except if allowed by "options" */
|
|
|
|
|
have_search = (statp->dnsrch[0] != NULL);
|
|
|
|
|
have_address = (statp->nscount != 0);
|
|
|
|
|
|
|
|
|
|
while ( fgets(line, sizeof(line), fd) != 0) {
|
|
|
|
|
DPRINTF(debug, "resolv.conf %s", line);
|
|
|
|
|
if ((i = scanline(line, words, sizes, DIM(words))) > 0) {
|
2008-02-16 01:53:11 +08:00
|
|
|
|
if (!have_address
|
2006-12-12 03:59:06 +08:00
|
|
|
|
&& !strncasecmp("nameserver", words[0], sizes[0])) {
|
|
|
|
|
for ( j = 1; j < i ; j++) {
|
|
|
|
|
unsigned int address;
|
|
|
|
|
address = cygwin_inet_addr(words[j]);
|
|
|
|
|
if (address == -1) {
|
|
|
|
|
DPRINTF(debug, "invalid server \"%s\"\n", words[j]);
|
|
|
|
|
}
|
|
|
|
|
else if (ns >= MAXNS) {
|
|
|
|
|
DPRINTF(debug, "no space for server \"%s\"\n", words[j]);
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
statp->nsaddr_list[ns++].sin_addr.s_addr = address;
|
|
|
|
|
statp->nscount++;
|
|
|
|
|
DPRINTF(debug, "server \"%s\"\n", words[j]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2008-02-16 01:53:11 +08:00
|
|
|
|
else if (!have_search
|
2006-12-12 03:59:06 +08:00
|
|
|
|
&& (!strncasecmp("search", words[0], sizes[0])
|
|
|
|
|
|| !strncasecmp("domain", words[0], sizes[0]))) {
|
|
|
|
|
ptr = statp->defdname;
|
|
|
|
|
for (j = 0; j + 1 < i; j++) {
|
|
|
|
|
if (j < MAXDNSRCH
|
|
|
|
|
&& ptr + sizes[j + 1] < &statp->defdname[DIM(statp->defdname)]) {
|
|
|
|
|
statp->dnsrch[j] = strcpy(ptr, words[j+1]);
|
|
|
|
|
statp->dnsrch[j+1] = 0;
|
|
|
|
|
ptr += sizes[j+1];
|
|
|
|
|
DPRINTF(debug, "domain|search \"%s\"\n", statp->dnsrch[j]);
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
DPRINTF(debug, "no space for \"%s\"\n", words[j+1]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
/* Options line */
|
|
|
|
|
else if (!strncasecmp("options", words[0], sizes[0]))
|
|
|
|
|
get_options(statp, i - 1, &words[1]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
fclose(fd);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/****************************************************************************/
|
2008-02-16 01:53:11 +08:00
|
|
|
|
/*
|
2006-12-12 03:59:06 +08:00
|
|
|
|
open_sock()
|
|
|
|
|
Create a datagram socket and call bind.
|
|
|
|
|
|
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
|
|
static int open_sock(struct sockaddr_in *CliAddr, int debug)
|
|
|
|
|
{
|
|
|
|
|
int fd;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
DPRINTF(debug, "opening UDP socket\n");
|
|
|
|
|
|
|
|
|
|
/* Create a datagram socket */
|
|
|
|
|
if ((fd = cygwin_socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
|
|
|
|
|
DPRINTF(debug, "socket(UDP): %s\n", strerror(errno));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2008-12-04 00:37:53 +08:00
|
|
|
|
/* Set non-blocking */
|
|
|
|
|
if (fcntl64(fd, F_SETFL, O_NONBLOCK) < 0) {
|
|
|
|
|
DPRINTF(debug, "fcntl: %s\n", strerror(errno));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
/* Set close on exec flag */
|
|
|
|
|
if (fcntl64(fd, F_SETFD, 1) == -1) {
|
|
|
|
|
DPRINTF(debug, "fcntl: %s\n", strerror(errno));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
CliAddr->sin_family = AF_INET;
|
|
|
|
|
CliAddr->sin_addr.s_addr = htonl(INADDR_ANY);
|
|
|
|
|
CliAddr->sin_port = htons(0);
|
|
|
|
|
bzero(CliAddr->sin_zero, sizeof(CliAddr->sin_zero));
|
|
|
|
|
/* Get a port */
|
|
|
|
|
if (cygwin_bind(fd, (struct sockaddr *) CliAddr, sizeof(*CliAddr)) < 0) {
|
|
|
|
|
DPRINTF(debug, "bind: %s\n", strerror(errno));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
return fd;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
|
|
|
|
*
|
|
|
|
|
__res_state()
|
|
|
|
|
Undocumented but public. Accessed through _res
|
|
|
|
|
|
|
|
|
|
*****************************************************************/
|
|
|
|
|
static struct __res_state res;
|
|
|
|
|
struct __res_state *__res_state(void)
|
|
|
|
|
{
|
|
|
|
|
return & res;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
|
|
|
|
*
|
|
|
|
|
res_init()
|
|
|
|
|
|
|
|
|
|
*****************************************************************/
|
|
|
|
|
int res_ninit(res_state statp)
|
|
|
|
|
{
|
|
|
|
|
int i;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->res_h_errno = NETDB_SUCCESS;
|
2009-03-07 00:31:26 +08:00
|
|
|
|
/* Only debug may be set before calling init */
|
|
|
|
|
statp->options &= RES_DEBUG;
|
|
|
|
|
statp->options |= RES_INIT | RES_DEFAULT;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->nscount = 0;
|
|
|
|
|
statp->os_query = NULL;
|
|
|
|
|
statp->retrans = RES_TIMEOUT; /* timeout in seconds */
|
|
|
|
|
statp->retry = RES_MAXRETRY; /* max number of retries */
|
|
|
|
|
statp->use_os = 1; /* use os_query if available and allowed by get_resolv */
|
|
|
|
|
statp->mypid = -1;
|
|
|
|
|
statp->sockfd = -1;
|
2008-12-04 00:37:53 +08:00
|
|
|
|
/* Use the pid and the ppid for random seed, from the point of view of an outsider.
|
|
|
|
|
Mix the upper and lower bits as they are not used equally */
|
|
|
|
|
i = getpid();
|
|
|
|
|
statp->id = (ushort) (getppid() ^ (i << 8) ^ (i >> 8));
|
2006-12-12 03:59:06 +08:00
|
|
|
|
for (i = 0; i < DIM(statp->dnsrch); i++) statp->dnsrch[i] = 0;
|
|
|
|
|
|
|
|
|
|
/* resolv.conf (dns servers & search list)*/
|
|
|
|
|
get_resolv(statp);
|
|
|
|
|
/* Get dns servers and search list from an os-specific routine, set os_query */
|
|
|
|
|
get_dns_info(statp);
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
if (statp->nscount == 0 && !statp->os_query) {
|
|
|
|
|
errno = ENONET;
|
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "no dns server found\n");
|
2006-12-12 03:59:06 +08:00
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
for (i = 0; i < statp->nscount; i++) {
|
|
|
|
|
statp->nsaddr_list[i].sin_family = AF_INET;
|
|
|
|
|
statp->nsaddr_list[i].sin_port = htons(NAMESERVER_PORT);
|
|
|
|
|
bzero(statp->nsaddr_list[i].sin_zero, sizeof(statp->nsaddr_list[i].sin_zero));
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int res_init()
|
|
|
|
|
{
|
|
|
|
|
int r = res_ninit(& res);
|
|
|
|
|
h_errno = res.res_h_errno;
|
|
|
|
|
return r;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
|
|
|
|
*
|
|
|
|
|
res_close()
|
|
|
|
|
|
|
|
|
|
*****************************************************************/
|
|
|
|
|
void res_nclose(res_state statp)
|
|
|
|
|
{
|
|
|
|
|
int res;
|
|
|
|
|
if (statp->sockfd != -1) {
|
|
|
|
|
res = close(statp->sockfd);
|
2008-02-16 01:53:11 +08:00
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "close sockfd %d: %s\n",
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->sockfd, (res == 0)?"OK":strerror(errno));
|
|
|
|
|
statp->sockfd = -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void res_close()
|
|
|
|
|
{
|
|
|
|
|
res_nclose(& res);
|
2008-02-16 01:53:11 +08:00
|
|
|
|
}
|
2006-12-12 03:59:06 +08:00
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
|
|
|
|
*
|
|
|
|
|
get_tcp_buf()
|
|
|
|
|
|
|
|
|
|
*****************************************************************/
|
|
|
|
|
static int get_tcp_buf(int fd, unsigned char *buf, int size, int debug)
|
|
|
|
|
{
|
|
|
|
|
int res;
|
|
|
|
|
while (size > 0) {
|
|
|
|
|
if ((res = read(fd, buf, size)) < 0) {
|
|
|
|
|
DPRINTF(debug, "read: %s\n", strerror(errno));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
DPRINTF(debug, "read %d out of %d\n", res, size);
|
|
|
|
|
size -= res;
|
|
|
|
|
buf += res;
|
|
|
|
|
}
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
|
|
|
|
*
|
|
|
|
|
get_tcp()
|
|
|
|
|
|
|
|
|
|
*****************************************************************/
|
2008-02-16 01:53:11 +08:00
|
|
|
|
static int get_tcp(struct sockaddr_in *CliAddr,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
const unsigned char * MsgPtr, int MsgLength,
|
|
|
|
|
unsigned char * AnsPtr, int AnsLength, int debug)
|
|
|
|
|
{
|
|
|
|
|
int fd, res = -1;
|
|
|
|
|
unsigned short ans_length;
|
|
|
|
|
union {short len; u_char buf[sizeof(short)];} len_buf;
|
|
|
|
|
|
|
|
|
|
DPRINTF(debug, "retrying with TCP\n");
|
|
|
|
|
|
|
|
|
|
/* Create a tcp socket */
|
|
|
|
|
if ((fd = cygwin_socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) < 0) {
|
|
|
|
|
DPRINTF(debug, "socket(TCP): %s\n", strerror(errno));
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (cygwin_connect(fd, (struct sockaddr *) CliAddr, sizeof(* CliAddr)) < 0) {
|
|
|
|
|
DPRINTF(debug, "connect: %s\n", strerror(errno));
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Send the length then the message */
|
|
|
|
|
len_buf.len = htons(MsgLength);
|
|
|
|
|
if (write(fd, len_buf.buf, sizeof(len_buf)) != sizeof(len_buf)
|
|
|
|
|
|| write(fd, MsgPtr, MsgLength) != MsgLength) {
|
|
|
|
|
DPRINTF(debug, "write: %s\n", strerror(errno));
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Read the answer length */
|
|
|
|
|
if (get_tcp_buf(fd, len_buf.buf, sizeof(len_buf), debug))
|
|
|
|
|
goto done;
|
|
|
|
|
ans_length = ntohs(len_buf.len);
|
|
|
|
|
|
|
|
|
|
/* Read the answer */
|
2008-02-16 01:53:11 +08:00
|
|
|
|
if (get_tcp_buf(fd, AnsPtr, MIN(ans_length, AnsLength), debug))
|
2006-12-12 03:59:06 +08:00
|
|
|
|
goto done;
|
|
|
|
|
res = ans_length;
|
|
|
|
|
|
|
|
|
|
done:
|
|
|
|
|
close (fd);
|
|
|
|
|
return res;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
|
|
|
|
**
|
|
|
|
|
res_send
|
|
|
|
|
Assumes that the message is a query starting with a short id.
|
|
|
|
|
Handles retransmissions until that id is received.
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
*****************************************************************/
|
2008-02-16 01:53:11 +08:00
|
|
|
|
int res_nsend( res_state statp, const unsigned char * MsgPtr,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
int MsgLength, unsigned char * AnsPtr, int AnsLength)
|
|
|
|
|
{
|
|
|
|
|
/* Current server, shared by all tasks */
|
|
|
|
|
volatile static unsigned int SServ = 0XFFFFFFFF;
|
|
|
|
|
int tcp;
|
|
|
|
|
const int debug = statp->options & RES_DEBUG;
|
|
|
|
|
|
2008-02-16 01:53:11 +08:00
|
|
|
|
fd_set fdset_read;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
int rslt, addrLen, transNum, wServ;
|
|
|
|
|
struct sockaddr_in mySockAddr, dnsSockAddr;
|
|
|
|
|
struct timeval timeOut;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->res_h_errno = NETDB_SUCCESS;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
if (((statp->options & RES_INIT) == 0) && (res_ninit(statp) != 0))
|
2006-12-12 03:59:06 +08:00
|
|
|
|
return -1;
|
|
|
|
|
|
2010-09-22 05:41:31 +08:00
|
|
|
|
/* If a hook exists to a native implementation, use it */
|
|
|
|
|
if (statp->os_query) {
|
|
|
|
|
int len;
|
|
|
|
|
short int Class, Type;
|
2010-09-25 03:53:18 +08:00
|
|
|
|
char DomName[MAXDNAME];
|
|
|
|
|
unsigned char * ptr = (unsigned char *) MsgPtr + HFIXEDSZ;
|
2010-09-22 05:41:31 +08:00
|
|
|
|
len = dn_expand(MsgPtr, MsgPtr + MsgLength, ptr, DomName, sizeof(DomName));
|
|
|
|
|
if (len > 0) {
|
|
|
|
|
ptr += len;
|
|
|
|
|
GETSHORT(Type, ptr);
|
|
|
|
|
GETSHORT(Class, ptr);
|
|
|
|
|
return ((os_query_t *) statp->os_query)(statp, DomName, Class, Type, AnsPtr, AnsLength);
|
|
|
|
|
}
|
|
|
|
|
else {
|
2011-12-18 07:39:47 +08:00
|
|
|
|
/* dn_expand sets errno */
|
2010-09-22 05:41:31 +08:00
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2011-12-18 07:39:47 +08:00
|
|
|
|
}
|
2010-09-22 05:41:31 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
/* Close the socket if it had been opened before a fork.
|
|
|
|
|
Reuse of pid's cannot hurt */
|
|
|
|
|
if ((statp->sockfd != -1) && (statp->mypid != getpid())) {
|
|
|
|
|
res_nclose(statp);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Open a socket for this process */
|
|
|
|
|
if (statp->sockfd == -1) {
|
2008-12-04 00:37:53 +08:00
|
|
|
|
/* Create a non-blocking, close on exec socket and bind it (to any port) */
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->sockfd = open_sock(& mySockAddr, debug);
|
|
|
|
|
if (statp->sockfd < 0 ) {
|
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
statp->mypid = getpid();
|
|
|
|
|
if (SServ == 0XFFFFFFFF) /* Pseudo random */
|
2008-12-04 00:37:53 +08:00
|
|
|
|
SServ = statp->id % statp->nscount;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
}
|
|
|
|
|
|
2008-02-16 01:53:11 +08:00
|
|
|
|
transNum = 0;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
while ( transNum++ < statp->retry) {
|
2008-02-16 01:53:11 +08:00
|
|
|
|
if ((wServ = SServ + 1) >= statp->nscount)
|
2006-12-12 03:59:06 +08:00
|
|
|
|
wServ = 0;
|
|
|
|
|
SServ = wServ;
|
2008-12-04 00:37:53 +08:00
|
|
|
|
|
|
|
|
|
/* There exists attacks on DNS where many wrong answers with guessed id's and
|
|
|
|
|
spoofed source address and port are generated at about the time when the
|
|
|
|
|
program is tricked into resolving a name.
|
|
|
|
|
This routine runs through the retry loop for each incorrect answer.
|
|
|
|
|
It is thus extremely likely that such attacks will cause a TRY_AGAIN return,
|
|
|
|
|
probably causing the calling program to retry after a delay.
|
2011-12-18 07:39:47 +08:00
|
|
|
|
|
2008-12-04 00:37:53 +08:00
|
|
|
|
Note that valid late or duplicate answers to a previous questions also cause
|
|
|
|
|
a retry, although this is minimized by flushing the socket before sending the
|
|
|
|
|
new question.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
/* Flush duplicate or late answers */
|
|
|
|
|
while ((rslt = cygwin_recvfrom( statp->sockfd, AnsPtr, AnsLength, 0, NULL, NULL)) >= 0) {
|
|
|
|
|
DPRINTF(debug, "Flushed %d bytes\n", rslt);
|
|
|
|
|
}
|
2011-12-18 07:39:47 +08:00
|
|
|
|
DPRINTF(debug && (errno != EWOULDBLOCK),
|
|
|
|
|
"Unexpected errno for flushing recvfrom: %s", strerror(errno));
|
2008-12-04 00:37:53 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
/* Send the message */
|
2008-02-16 01:53:11 +08:00
|
|
|
|
rslt = cygwin_sendto(statp->sockfd, MsgPtr, MsgLength, 0,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
(struct sockaddr *) &statp->nsaddr_list[wServ],
|
|
|
|
|
sizeof(struct sockaddr_in));
|
|
|
|
|
DPRINTF(debug, "sendto: server %08x sockfd %d %s\n",
|
2008-02-16 01:53:11 +08:00
|
|
|
|
statp->nsaddr_list[wServ].sin_addr.s_addr,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->sockfd, (rslt == MsgLength)?"OK":strerror(errno));
|
|
|
|
|
if (rslt != MsgLength) {
|
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;
|
|
|
|
|
return -1;
|
|
|
|
|
};
|
|
|
|
|
/*
|
|
|
|
|
Wait for a reply with select()
|
|
|
|
|
*/
|
|
|
|
|
FD_ZERO(&fdset_read);
|
|
|
|
|
FD_SET (statp->sockfd, &fdset_read );
|
|
|
|
|
timeOut.tv_sec = statp->retrans;
|
|
|
|
|
timeOut.tv_usec = 0;
|
|
|
|
|
rslt = cygwin_select(statp->sockfd + 1, &fdset_read, NULL, NULL, &timeOut);
|
|
|
|
|
if ( rslt == 0 ) { /* Timeout */
|
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "timeout for server %08x\n",
|
|
|
|
|
statp->nsaddr_list[wServ].sin_addr.s_addr);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
else if ((rslt != 1) || (FD_ISSET(statp->sockfd, &fdset_read) == 0)) {
|
|
|
|
|
DPRINTF(debug, "select: %s\n", strerror(errno));
|
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
addrLen = sizeof(dnsSockAddr);
|
2008-02-16 01:53:11 +08:00
|
|
|
|
rslt = cygwin_recvfrom(statp->sockfd, AnsPtr, AnsLength, 0,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
(struct sockaddr *) & dnsSockAddr, & addrLen);
|
|
|
|
|
if (rslt <= 0) {
|
|
|
|
|
DPRINTF(debug, "recvfrom: %s\n", strerror(errno));
|
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2008-12-04 00:37:53 +08:00
|
|
|
|
DPRINTF(debug, "recvfrom: %d bytes from %08x\n", rslt, dnsSockAddr.sin_addr.s_addr);
|
2011-12-18 07:39:47 +08:00
|
|
|
|
/*
|
|
|
|
|
Prepare to retry with tcp
|
2006-12-12 03:59:06 +08:00
|
|
|
|
*/
|
|
|
|
|
for (tcp = 0; tcp < 2; tcp++) {
|
2008-12-04 00:37:53 +08:00
|
|
|
|
/* Check if this is the expected message from the expected server */
|
|
|
|
|
if ((memcmp(& dnsSockAddr, & statp->nsaddr_list[wServ],
|
|
|
|
|
(char *) & dnsSockAddr.sin_zero[0] - (char *) & dnsSockAddr) == 0)
|
2006-12-12 03:59:06 +08:00
|
|
|
|
&& (rslt >= HFIXEDSZ)
|
2008-12-04 00:37:53 +08:00
|
|
|
|
&& (*MsgPtr == *AnsPtr) /* Ids match */
|
|
|
|
|
&& (*(MsgPtr + 1) == *(AnsPtr + 1))
|
|
|
|
|
&& ((AnsPtr[2] & QR) != 0)
|
|
|
|
|
&& (AnsPtr[4] == 0)
|
|
|
|
|
/* We check the question if present.
|
|
|
|
|
Some servers don't return it on error, in particular
|
|
|
|
|
when the name in the question is not valid. */
|
|
|
|
|
&& (((AnsPtr[5] == 0)
|
|
|
|
|
&& ((AnsPtr[3] & ERR_MASK) != NOERROR))
|
|
|
|
|
|| ((AnsPtr[5] == 1)
|
|
|
|
|
&& (rslt >= MsgLength)
|
|
|
|
|
&& (memcmp(MsgPtr + HFIXEDSZ, AnsPtr + HFIXEDSZ, MsgLength - HFIXEDSZ) == 0)))) {
|
2006-12-12 03:59:06 +08:00
|
|
|
|
if ((AnsPtr[3] & ERR_MASK) == NOERROR) {
|
2011-12-18 07:39:47 +08:00
|
|
|
|
if ((AnsPtr[2] & TC) && (tcp == 0) && !(statp->options & RES_IGNTC)) {
|
2008-12-04 00:37:53 +08:00
|
|
|
|
/* Truncated. Try TCP */
|
2006-12-12 03:59:06 +08:00
|
|
|
|
rslt = get_tcp(&statp->nsaddr_list[wServ], MsgPtr, MsgLength,
|
|
|
|
|
AnsPtr, AnsLength, statp->options & RES_DEBUG);
|
2011-12-18 07:39:47 +08:00
|
|
|
|
continue /* Tcp loop */;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
}
|
2008-02-16 01:53:11 +08:00
|
|
|
|
else if ((AnsPtr[6] | AnsPtr[7])!= 0)
|
2006-12-12 03:59:06 +08:00
|
|
|
|
return rslt;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
else
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->res_h_errno = NO_DATA;
|
|
|
|
|
}
|
2008-12-04 00:37:53 +08:00
|
|
|
|
#if 0
|
|
|
|
|
NETDB_INTERNAL -1 /* see errno */
|
|
|
|
|
NETDB_SUCCESS 0 /* no problem */
|
|
|
|
|
HOST_NOT_FOUND 1 /* Authoritative Answer Host not found */
|
|
|
|
|
TRY_AGAIN 2 /* Non-Authoritive Host not found, or SERVERFAIL */
|
|
|
|
|
Also seen returned by some servers when the name is too long
|
|
|
|
|
NO_RECOVERY 3 /* Non recoverable errors, FORMERR, REFUSED, NOTIMP */
|
|
|
|
|
NO_DATA 4 /* Valid name, no data record of requested type */
|
|
|
|
|
#endif
|
2006-12-12 03:59:06 +08:00
|
|
|
|
else {
|
2008-12-04 00:37:53 +08:00
|
|
|
|
switch (AnsPtr[3] & ERR_MASK) {
|
2006-12-12 03:59:06 +08:00
|
|
|
|
/* return HOST_NOT_FOUND even for non-authoritative answers */
|
2008-12-04 00:37:53 +08:00
|
|
|
|
case NXDOMAIN:
|
|
|
|
|
case FORMERR:
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->res_h_errno = HOST_NOT_FOUND;
|
2008-12-04 00:37:53 +08:00
|
|
|
|
break;
|
2011-12-18 07:39:47 +08:00
|
|
|
|
case SERVFAIL:
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->res_h_errno = TRY_AGAIN;
|
2008-12-04 00:37:53 +08:00
|
|
|
|
break;
|
|
|
|
|
default:
|
2006-12-12 03:59:06 +08:00
|
|
|
|
statp->res_h_errno = NO_RECOVERY;
|
2008-12-04 00:37:53 +08:00
|
|
|
|
}
|
2006-12-12 03:59:06 +08:00
|
|
|
|
}
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
else {
|
2008-12-04 00:37:53 +08:00
|
|
|
|
DPRINTF(debug, "unexpected answer\n");
|
2006-12-12 03:59:06 +08:00
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
} /* TCP */
|
|
|
|
|
}
|
|
|
|
|
DPRINTF(debug, "too many retries\n");
|
|
|
|
|
statp->res_h_errno = TRY_AGAIN;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
2008-02-16 01:53:11 +08:00
|
|
|
|
int res_send( const unsigned char * MsgPtr, int MsgLength,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
unsigned char * AnsPtr, int AnsLength)
|
|
|
|
|
{
|
|
|
|
|
int r = res_nsend(& res, MsgPtr, MsgLength, AnsPtr, AnsLength);
|
|
|
|
|
h_errno = res.res_h_errno;
|
|
|
|
|
return r;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
|
|
|
|
*
|
|
|
|
|
res_mkquery
|
|
|
|
|
|
|
|
|
|
Return: packet size
|
2008-02-16 01:53:11 +08:00
|
|
|
|
-1 name format is incorrect
|
2006-12-12 03:59:06 +08:00
|
|
|
|
*****************************************************************/
|
|
|
|
|
int res_nmkquery (res_state statp,
|
2008-02-16 01:53:11 +08:00
|
|
|
|
int op, const char * dnameptr, int qclass, int qtype,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
const unsigned char * dataptr, int datalen,
|
|
|
|
|
const unsigned char * newrr, unsigned char * buf, int buflen)
|
|
|
|
|
{
|
|
|
|
|
int i, len;
|
2008-12-04 00:37:53 +08:00
|
|
|
|
const char * ptr;
|
|
|
|
|
unsigned int id4;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
|
|
|
|
|
if (op == QUERY) {
|
|
|
|
|
/* Write the name and verify buffer length */
|
|
|
|
|
len = dn_comp(dnameptr, buf + HFIXEDSZ, buflen - HFIXEDSZ - QFIXEDSZ, NULL, NULL);
|
|
|
|
|
if (len < 0) {
|
2008-02-16 01:53:11 +08:00
|
|
|
|
DPRINTF(statp->options & RES_DEBUG,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
"\"%s\" invalid or buffer too short\n", dnameptr);
|
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
2008-12-04 00:37:53 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
/* Fill the header */
|
2008-12-04 00:37:53 +08:00
|
|
|
|
PUTSHORT(statp->id, buf);
|
2011-12-18 07:39:47 +08:00
|
|
|
|
PUTSHORT(RD, buf);
|
2006-12-12 03:59:06 +08:00
|
|
|
|
PUTSHORT(1, buf); /* Number of questions */
|
|
|
|
|
for (i = 0; i < 3; i++)
|
|
|
|
|
PUTSHORT(0, buf); /* Number of answers */
|
|
|
|
|
|
|
|
|
|
/* Write qtype and qclass */
|
|
|
|
|
buf += len;
|
|
|
|
|
PUTSHORT(qtype, buf);
|
|
|
|
|
PUTSHORT(qclass, buf);
|
2008-12-04 00:37:53 +08:00
|
|
|
|
|
|
|
|
|
/* Update id. The current query adds entropy to the next query id */
|
2011-12-18 07:39:47 +08:00
|
|
|
|
for (id4 = qtype, i = 0, ptr = dnameptr; *ptr; ptr++, i += 3)
|
2008-12-04 00:37:53 +08:00
|
|
|
|
id4 ^= *ptr << (i & 0xF);
|
|
|
|
|
i = 1 + statp->id % 15; /* Between 1 and 16 */
|
|
|
|
|
/* id dependent rotation, also brings MSW to LSW */
|
|
|
|
|
id4 = (id4 << i) ^ (id4 >> (16 - i)) ^ (id4 >> (32 - i));
|
|
|
|
|
if ((short) id4)
|
|
|
|
|
statp->id ^= (short) id4;
|
2011-12-18 07:39:47 +08:00
|
|
|
|
else
|
2008-12-04 00:37:53 +08:00
|
|
|
|
statp->id++; /* Force change */
|
|
|
|
|
|
|
|
|
|
return len + (HFIXEDSZ + QFIXEDSZ); /* packet size */
|
2006-12-12 03:59:06 +08:00
|
|
|
|
}
|
|
|
|
|
else { /* Not implemented */
|
|
|
|
|
errno = ENOSYS;
|
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2008-02-16 01:53:11 +08:00
|
|
|
|
int res_mkquery (int op, const char * dnameptr, int qclass, int qtype,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
const unsigned char * dataptr, int datalen,
|
|
|
|
|
const unsigned char * newrr, unsigned char * buf, int buflen)
|
|
|
|
|
{
|
2008-02-16 01:53:11 +08:00
|
|
|
|
int r = res_nmkquery (& res, op, dnameptr, qclass, qtype,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
dataptr, datalen, newrr, buf, buflen);
|
|
|
|
|
h_errno = res.res_h_errno;
|
|
|
|
|
return r;
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
2008-02-16 01:53:11 +08:00
|
|
|
|
* res_query()
|
2006-12-12 03:59:06 +08:00
|
|
|
|
*****************************************************************/
|
|
|
|
|
|
2008-02-16 01:53:11 +08:00
|
|
|
|
int res_nquery( res_state statp, const char * DomName, int Class, int Type,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
unsigned char * AnsPtr, int AnsLength)
|
|
|
|
|
{
|
|
|
|
|
u_char packet[PACKETSZ];
|
|
|
|
|
int len;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "query \"%s\" type %d\n", DomName, Type);
|
|
|
|
|
statp->res_h_errno = NETDB_SUCCESS;
|
|
|
|
|
|
|
|
|
|
/* If a hook exists to a native implementation, use it */
|
|
|
|
|
if (statp->os_query)
|
|
|
|
|
return ((os_query_t *) statp->os_query)(statp, DomName, Class, Type, AnsPtr, AnsLength);
|
|
|
|
|
|
2008-02-16 01:53:11 +08:00
|
|
|
|
if ((len = res_nmkquery (statp, QUERY, DomName, Class, Type,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
0, 0, 0, packet, PACKETSZ)) < 0)
|
|
|
|
|
return -1;
|
|
|
|
|
return res_nsend( statp, packet, len, AnsPtr, AnsLength);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int res_query( const char * DomName, int Class, int Type, unsigned char * AnsPtr, int AnsLength)
|
|
|
|
|
{
|
|
|
|
|
int r = res_nquery(& res, DomName, Class, Type, AnsPtr, AnsLength);
|
|
|
|
|
h_errno = res.res_h_errno;
|
|
|
|
|
return r;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
2008-02-16 01:53:11 +08:00
|
|
|
|
* res_querydomain()
|
2006-12-12 03:59:06 +08:00
|
|
|
|
*****************************************************************/
|
|
|
|
|
int res_nquerydomain( res_state statp, const char * Name, const char * DomName,
|
|
|
|
|
int Class, int Type, unsigned char * AnsPtr, int AnsLength)
|
|
|
|
|
{
|
|
|
|
|
char fqdn[MAXDNAME], *ptr;
|
|
|
|
|
int nlen;
|
|
|
|
|
|
|
|
|
|
if (!DomName)
|
|
|
|
|
ptr = (char *) Name;
|
|
|
|
|
else if ((nlen = strlen(Name)) >= sizeof(fqdn) - 1)
|
|
|
|
|
goto error;
|
|
|
|
|
else {
|
|
|
|
|
strcpy(fqdn, Name);
|
|
|
|
|
ptr = &fqdn[nlen];
|
2008-02-16 01:53:11 +08:00
|
|
|
|
if (nlen && *(ptr - 1) != '.')
|
2006-12-12 03:59:06 +08:00
|
|
|
|
*(ptr++ - 1) = '.';
|
|
|
|
|
fqdn[sizeof(fqdn) - 1] = 0;
|
|
|
|
|
strncpy(ptr, DomName, sizeof(fqdn) - (ptr - fqdn));
|
|
|
|
|
if (fqdn[sizeof(fqdn) - 1])
|
|
|
|
|
goto error;
|
|
|
|
|
ptr = fqdn;
|
|
|
|
|
}
|
|
|
|
|
return res_nquery(statp, ptr, Class, Type, AnsPtr, AnsLength);
|
|
|
|
|
|
|
|
|
|
error:
|
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "querydomain: name too long\n");
|
|
|
|
|
errno = EINVAL;
|
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int res_querydomain( const char * Name, const char * DomName, int Class,
|
|
|
|
|
int Type, unsigned char * AnsPtr, int AnsLength)
|
|
|
|
|
{
|
|
|
|
|
int r = res_nquerydomain(& res, Name, DomName, Class, Type, AnsPtr,
|
|
|
|
|
AnsLength);
|
|
|
|
|
h_errno = res.res_h_errno;
|
|
|
|
|
return r;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
|
|
|
|
*
|
|
|
|
|
res_search()
|
|
|
|
|
|
|
|
|
|
*****************************************************************/
|
|
|
|
|
|
2008-02-16 01:53:11 +08:00
|
|
|
|
int res_nsearch( res_state statp, const char * DomName, int Class, int Type,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
unsigned char * AnsPtr, int AnsLength)
|
|
|
|
|
{
|
|
|
|
|
int len, stat, i;
|
|
|
|
|
char fullDomName[MAXDNAME], *ptr, *sptr;
|
|
|
|
|
|
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "search \"%s\" type %d\n", DomName, Type);
|
|
|
|
|
|
2008-02-16 01:53:11 +08:00
|
|
|
|
if (((statp->options & RES_INIT) == 0) && (res_ninit(statp) != 0))
|
2006-12-12 03:59:06 +08:00
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
|
|
stat = res_nquery( statp, DomName, Class, Type, AnsPtr, AnsLength);
|
|
|
|
|
|
|
|
|
|
/* Check if will skip search */
|
|
|
|
|
if (statp->res_h_errno != HOST_NOT_FOUND /* Success or hard failure */
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|| ((ptr = strrchr(DomName, '.')) && (!*(ptr+1))) /* Final dot */
|
2006-12-12 03:59:06 +08:00
|
|
|
|
|| (((statp->options & RES_DNSRCH) == 0) /* Or no search */
|
|
|
|
|
&& ((ptr != NULL) /* And some dot */
|
|
|
|
|
|| ((statp->options & RES_DEFNAMES) == 0)))/* or no def domain */
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|| (!(sptr = statp->dnsrch[0])))
|
2006-12-12 03:59:06 +08:00
|
|
|
|
return stat;
|
|
|
|
|
|
|
|
|
|
len = strlen(DomName);
|
|
|
|
|
if (len >= MAXDNAME - 1) /* Space for next dot */
|
|
|
|
|
goto error;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
strcpy(fullDomName, DomName);
|
2006-12-12 03:59:06 +08:00
|
|
|
|
fullDomName[len++] = '.';
|
|
|
|
|
fullDomName[MAXDNAME - 1] = 0; /* Overflow indicator */
|
|
|
|
|
i = 0;
|
|
|
|
|
do {
|
|
|
|
|
strncpy(fullDomName + len, sptr, MAXDNAME - len);
|
|
|
|
|
if (fullDomName[MAXDNAME - 1])
|
2008-02-16 01:53:11 +08:00
|
|
|
|
goto error;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
stat = res_nquery(statp, fullDomName, Class, Type, AnsPtr, AnsLength);
|
|
|
|
|
} while ((sptr = statp->dnsrch[++i]) != NULL
|
|
|
|
|
&& statp->res_h_errno == HOST_NOT_FOUND
|
|
|
|
|
&& (statp->options & RES_DNSRCH) != 0);
|
|
|
|
|
|
|
|
|
|
/* Return last stat */
|
|
|
|
|
return stat;
|
|
|
|
|
|
|
|
|
|
error:
|
|
|
|
|
DPRINTF(statp->options & RES_DEBUG, "name too long during search\n");
|
|
|
|
|
errno = EINVAL;
|
|
|
|
|
statp->res_h_errno = NETDB_INTERNAL;
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
2008-02-16 01:53:11 +08:00
|
|
|
|
int res_search( const char * DomName, int Class, int Type,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
unsigned char * AnsPtr, int AnsLength)
|
|
|
|
|
{
|
|
|
|
|
int r = res_nsearch(& res, DomName, Class, Type, AnsPtr, AnsLength);
|
|
|
|
|
h_errno = res.res_h_errno;
|
|
|
|
|
return r;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
2008-02-16 01:53:11 +08:00
|
|
|
|
* dn_expand
|
2006-12-12 03:59:06 +08:00
|
|
|
|
*****************************************************************/
|
|
|
|
|
|
|
|
|
|
int dn_expand(const unsigned char *msg, const unsigned char *eomorig,
|
2008-02-16 01:53:11 +08:00
|
|
|
|
const unsigned char *comp_dn, char *exp_dn, int length)
|
2006-12-12 03:59:06 +08:00
|
|
|
|
{
|
|
|
|
|
unsigned int len, complen = 0;
|
|
|
|
|
const unsigned char *comp_dn_orig = comp_dn;
|
|
|
|
|
|
|
|
|
|
if (comp_dn >= eomorig)
|
|
|
|
|
goto expand_fail;
|
|
|
|
|
if ((len = *comp_dn++) == 0) /* Weird case */
|
|
|
|
|
exp_dn++;
|
|
|
|
|
else do {
|
|
|
|
|
if (len <= MAXLABEL) {
|
2009-03-07 00:31:26 +08:00
|
|
|
|
if ((length -= (len + 1)) >= 0 /* Need space for final . */
|
2006-12-12 03:59:06 +08:00
|
|
|
|
&& comp_dn + len <= eomorig) {
|
2008-02-16 01:53:11 +08:00
|
|
|
|
do { *exp_dn++ = *comp_dn++; } while (--len != 0);
|
|
|
|
|
*exp_dn++ = '.';
|
2006-12-12 03:59:06 +08:00
|
|
|
|
}
|
2008-02-16 01:53:11 +08:00
|
|
|
|
else
|
2006-12-12 03:59:06 +08:00
|
|
|
|
goto expand_fail;
|
|
|
|
|
}
|
|
|
|
|
else if (len >= (128+64)) {
|
|
|
|
|
if (!complen) /* Still in the original field? */
|
2008-02-16 01:53:11 +08:00
|
|
|
|
complen = (comp_dn - comp_dn_orig) + 1;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
comp_dn = msg + (((len & ~(128+64)) << 8) + *comp_dn);
|
2008-02-16 01:53:11 +08:00
|
|
|
|
if (comp_dn >= eomorig)
|
2006-12-12 03:59:06 +08:00
|
|
|
|
goto expand_fail;
|
|
|
|
|
}
|
2008-02-16 01:53:11 +08:00
|
|
|
|
else
|
2006-12-12 03:59:06 +08:00
|
|
|
|
goto expand_fail;
|
|
|
|
|
} while ((len = *comp_dn++) != 0);
|
|
|
|
|
/* Replace last . with a 0 */
|
|
|
|
|
*(--exp_dn) = 0;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
if (!complen)
|
2006-12-12 03:59:06 +08:00
|
|
|
|
complen = comp_dn - comp_dn_orig;
|
|
|
|
|
/* fprintf(stderr, "dn_expand %s\n", exp_start); */
|
|
|
|
|
return complen;
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
expand_fail:
|
2010-09-22 05:41:31 +08:00
|
|
|
|
errno = EINVAL;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
|
|
|
|
*
|
|
|
|
|
dn_comp
|
|
|
|
|
|
|
|
|
|
Return -1 in case of overflow, but still fill buffer correctly.
|
|
|
|
|
We do not check the alphabet of the host names
|
|
|
|
|
nor the length of the compressed name and we
|
|
|
|
|
preserve the letter cases.
|
|
|
|
|
|
|
|
|
|
*****************************************************************/
|
2008-02-16 01:53:11 +08:00
|
|
|
|
int dn_comp(const char * exp_dn, u_char * comp_dn, int length,
|
2006-12-12 03:59:06 +08:00
|
|
|
|
u_char ** dnptrs, u_char ** lastdnptr)
|
|
|
|
|
{
|
|
|
|
|
u_char *cptr = comp_dn, *dptr, *lptr, *rptr;
|
|
|
|
|
unsigned int i, len;
|
|
|
|
|
u_char * const eptr = comp_dn + length - 1; /* Last valid */
|
2008-02-16 01:53:11 +08:00
|
|
|
|
|
2006-12-12 03:59:06 +08:00
|
|
|
|
errno = EINVAL;
|
|
|
|
|
|
|
|
|
|
if (*exp_dn == '.' && !*(exp_dn + 1))
|
|
|
|
|
exp_dn++;
|
|
|
|
|
while (1) {
|
|
|
|
|
if (*exp_dn == '.' || cptr > eptr)
|
|
|
|
|
return -1;
|
|
|
|
|
if (*exp_dn == 0) {
|
|
|
|
|
*cptr++ = 0;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
/* Try to compress */
|
|
|
|
|
if (dnptrs) {
|
|
|
|
|
for (i = 1; dnptrs[i]; i++) {
|
|
|
|
|
dptr = dnptrs[i];
|
|
|
|
|
if (dptr >= comp_dn) /* Handle name.name */
|
|
|
|
|
continue;
|
|
|
|
|
rptr = (u_char *) exp_dn;
|
|
|
|
|
len = *dptr++;
|
|
|
|
|
while (1) {
|
|
|
|
|
do {
|
|
|
|
|
if (*dptr++ != *rptr++)
|
|
|
|
|
goto next_dn;
|
|
|
|
|
} while (--len);
|
2008-02-16 01:53:11 +08:00
|
|
|
|
len = *dptr++;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
if (len == 0) { /* last label */
|
|
|
|
|
if (!*rptr || (*rptr == '.' && !*(rptr + 1))) { /* Full match */
|
|
|
|
|
len = (dnptrs[i] - dnptrs[0]) | 0xC000;
|
|
|
|
|
/* Write pointer */
|
|
|
|
|
*cptr++ = len >> 8;
|
|
|
|
|
if (cptr > eptr)
|
|
|
|
|
return -1;
|
|
|
|
|
*cptr++ = len;
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
goto next_dn;
|
|
|
|
|
}
|
|
|
|
|
if (*rptr++ != '.')
|
|
|
|
|
goto next_dn;
|
|
|
|
|
if (len >= 128 + 64) {
|
|
|
|
|
dptr = dnptrs[0] + ((len - 128 - 64) << 8) + *dptr;
|
|
|
|
|
len = *dptr++;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
next_dn: ;
|
|
|
|
|
}
|
|
|
|
|
/* Record label if asked and if space is available and if not too far off */
|
|
|
|
|
if (lastdnptr && (lastdnptr != &dnptrs[i]) && (cptr - dnptrs[0]) < 0xC000) {
|
|
|
|
|
dnptrs[i] = cptr;
|
|
|
|
|
dnptrs[i+1] = NULL;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
/* Write label */
|
|
|
|
|
lptr = cptr++; /* Length byte */
|
|
|
|
|
rptr = (u_char *) exp_dn;
|
|
|
|
|
do {
|
|
|
|
|
if (cptr <= eptr)
|
|
|
|
|
*cptr++ = *rptr;
|
|
|
|
|
} while ((*++rptr != '.') && (*rptr != 0));
|
|
|
|
|
len = rptr - (u_char *) exp_dn;
|
|
|
|
|
if (len > MAXLABEL)
|
|
|
|
|
return -1;
|
|
|
|
|
*lptr = len;
|
|
|
|
|
exp_dn = (char *) rptr;
|
|
|
|
|
if (*exp_dn != 0)
|
|
|
|
|
exp_dn++; /* Skip over . */
|
|
|
|
|
}
|
|
|
|
|
done:
|
|
|
|
|
return cptr - comp_dn;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
2009-03-07 00:31:26 +08:00
|
|
|
|
* dn_skipname
|
2006-12-12 03:59:06 +08:00
|
|
|
|
|
|
|
|
|
Measures the compressed domain name length and returns it.
|
|
|
|
|
*****************************************************************/
|
|
|
|
|
int dn_skipname(const unsigned char *comp_dn, const unsigned char *eom)
|
|
|
|
|
{
|
|
|
|
|
int len;
|
|
|
|
|
const unsigned char *comp_dn_orig = comp_dn;
|
|
|
|
|
|
|
|
|
|
do {
|
|
|
|
|
len = *comp_dn++;
|
|
|
|
|
if (len >= (128 + 64)) {
|
|
|
|
|
comp_dn++;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
if (len > MAXLABEL ||
|
|
|
|
|
(comp_dn += len) > eom)
|
2008-02-16 01:53:11 +08:00
|
|
|
|
return -1;
|
2006-12-12 03:59:06 +08:00
|
|
|
|
} while (len != 0);
|
|
|
|
|
|
|
|
|
|
return comp_dn - comp_dn_orig;
|
|
|
|
|
}
|
2009-03-07 00:31:26 +08:00
|
|
|
|
|
|
|
|
|
/*****************************************************************
|
|
|
|
|
* dn_length1 For internal use
|
|
|
|
|
|
2010-09-22 05:41:31 +08:00
|
|
|
|
Return length of uncompressed name incl final 0.
|
2009-03-07 00:31:26 +08:00
|
|
|
|
*****************************************************************/
|
|
|
|
|
|
|
|
|
|
int dn_length1(const unsigned char *msg, const unsigned char *eomorig,
|
|
|
|
|
const unsigned char *comp_dn)
|
|
|
|
|
{
|
|
|
|
|
unsigned int len, length = 0;
|
|
|
|
|
|
|
|
|
|
errno = EINVAL;
|
|
|
|
|
if (comp_dn >= eomorig)
|
|
|
|
|
goto expand_fail;
|
|
|
|
|
else while ((len = *comp_dn++) != 0) {
|
|
|
|
|
if (len <= MAXLABEL) {
|
|
|
|
|
if ((comp_dn += len) <= eomorig)
|
|
|
|
|
length += len + 1;
|
|
|
|
|
else
|
|
|
|
|
goto expand_fail;
|
|
|
|
|
}
|
|
|
|
|
else if (len >= (128+64)) {
|
|
|
|
|
comp_dn = msg + (((len & ~(128+64)) << 8) + *comp_dn);
|
|
|
|
|
if (comp_dn >= eomorig)
|
|
|
|
|
goto expand_fail;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
goto expand_fail;
|
|
|
|
|
}
|
|
|
|
|
return length;
|
|
|
|
|
|
|
|
|
|
expand_fail:
|
|
|
|
|
return -1;
|
|
|
|
|
}
|