7 * This file is part of adns, which is
8 * Copyright (C) 1997-2000,2003,2006 Ian Jackson
9 * Copyright (C) 1999-2000,2003,2006 Tony Finch
10 * Copyright (C) 1991 Massachusetts Institute of Technology
11 * (See the file INSTALL for full details.)
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 2, or (at your option)
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
23 * You should have received a copy of the GNU General Public License
24 * along with this program; if not, write to the Free Software Foundation,
25 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
30 #include <sys/types.h>
36 #define MKQUERY_START(vb) (rqp= (vb)->buf+(vb)->used)
37 #define MKQUERY_ADDB(b) *rqp++= (b)
38 #define MKQUERY_ADDW(w) (MKQUERY_ADDB(((w)>>8)&0x0ff), MKQUERY_ADDB((w)&0x0ff))
39 #define MKQUERY_STOP(vb) ((vb)->used= rqp-(vb)->buf)
41 static adns_status mkquery_header(adns_state ads, vbuf *vb,
42 int *id_r, int qdlen) {
46 if (!adns__vbuf_ensure(vb,DNS_HDRSIZE+qdlen+4)) return adns_s_nomemory;
51 *id_r= id= (ads->nextid++) & 0x0ffff;
53 MKQUERY_ADDB(0x01); /* QR=Q(0), OPCODE=QUERY(0000), !AA, !TC, RD */
54 MKQUERY_ADDB(0x00); /* !RA, Z=000, RCODE=NOERROR(0000) */
55 MKQUERY_ADDW(1); /* QDCOUNT=1 */
56 MKQUERY_ADDW(0); /* ANCOUNT=0 */
57 MKQUERY_ADDW(0); /* NSCOUNT=0 */
58 MKQUERY_ADDW(0); /* ARCOUNT=0 */
65 /* FIXME: Return value is always adns_s_ok, and never used. But I
66 * don't understand why we can assert that we have space in the vbuf. */
67 static adns_status mkquery_footer(vbuf *vb, adns_rrtype type) {
71 MKQUERY_ADDW(type & adns_rrt_typemask); /* QTYPE */
72 MKQUERY_ADDW(DNS_CLASS_IN); /* QCLASS=IN */
74 assert(vb->used <= vb->avail);
79 adns_status adns__qdpl_normal(adns_state ads,
80 const char **p_io, const char *pe, int labelnum,
81 char label_r[], int *ll_io,
82 adns_queryflags flags,
83 const typeinfo *typei) {
90 while (p!=pe && (c= *p++)!='.') {
92 if (!(flags & adns_qf_quoteok_query)) return adns_s_querydomaininvalid;
93 if (ctype_digit(p[0])) {
94 if (p+1==pe || p+2==pe) return adns_s_querydomaininvalid;
95 if (ctype_digit(p[1]) && ctype_digit(p[2])) {
99 if (c >= 256) return adns_s_querydomaininvalid;
101 return adns_s_querydomaininvalid;
103 } else if (!(c= *p++)) {
104 return adns_s_querydomaininvalid;
107 if (!(flags & adns_qf_quoteok_query)) {
109 if (!ll) return adns_s_querydomaininvalid;
110 } else if (!ctype_alpha(c) && !ctype_digit(c)) {
111 return adns_s_querydomaininvalid;
114 if (ll == *ll_io) return adns_s_querydomaininvalid;
123 adns_status adns__mkquery_labels(adns_state ads, vbuf *vb,
124 const char *owner, int ol,
125 const typeinfo *typei, adns_queryflags flags) {
126 int labelnum, ll, nbytes;
127 byte label[255], *rqp;
131 if (!adns__vbuf_ensure(vb,ol+2)) return adns_s_nomemory;
135 p= owner; pe= owner+ol;
140 st= typei->qdparselabel(ads, &p,pe, labelnum++, label, &ll, flags, typei);
142 if (!ll) return adns_s_querydomaininvalid;
143 if (ll > DNS_MAXLABEL) return adns_s_querydomaintoolong;
145 if (nbytes >= DNS_MAXDOMAIN) return adns_s_querydomaintoolong;
147 memcpy(rqp,label,ll); rqp+= ll;
155 adns_status adns__mkquery(adns_state ads, vbuf *vb, int *id_r,
156 const char *owner, int ol,
157 const typeinfo *typei, adns_rrtype type,
158 adns_queryflags flags) {
161 st= mkquery_header(ads,vb,id_r,ol+2); if (st) return st;
162 st= adns__mkquery_labels(ads, vb, owner, ol, typei, flags); if (st) return st;
163 st= mkquery_footer(vb,type);
168 adns_status adns__mkquery_labels_frdgram(adns_state ads, vbuf *vb,
169 const byte *qd_dgram, int qd_dglen,
174 int lablen, labstart;
176 if (!adns__vbuf_ensure(vb,qd_dglen)) return adns_s_nomemory;
180 adns__findlabel_start(&fls,ads,-1,0,qd_dgram,qd_dglen,qd_dglen,qd_begin,0);
182 st= adns__findlabel_next(&fls,&lablen,&labstart); assert(!st);
185 MKQUERY_ADDB(lablen);
186 memcpy(rqp,qd_dgram+labstart,lablen);
196 adns_status adns__mkquery_frdgram(adns_state ads, vbuf *vb, int *id_r,
197 const byte *qd_dgram, int qd_dglen,
199 adns_rrtype type, adns_queryflags flags) {
202 st= mkquery_header(ads,vb,id_r,qd_dglen); if (st) return st;
203 st= adns__mkquery_labels_frdgram(ads, vb, qd_dgram, qd_dglen, qd_begin);
205 st= mkquery_footer(vb,type);
210 adns_status adns__mkquery_frlabels(adns_state ads, vbuf *vb, int *id_r,
212 adns_rrtype type, adns_queryflags flags) {
215 st= mkquery_header(ads,vb,id_r,llen); if (st) return st;
216 if (!adns__vbuf_append(vb, l, llen)) return adns_s_nomemory;
217 st= mkquery_footer(vb,type);
222 void adns__querysend_tcp(adns_query qu, struct timeval now) {
228 if (qu->ads->tcpstate != server_ok) return;
230 assert(qu->state == query_tcpw);
232 length[0]= (qu->query_dglen&0x0ff00U) >>8;
233 length[1]= (qu->query_dglen&0x0ff);
236 if (!adns__vbuf_ensure(&ads->tcpsend,ads->tcpsend.used+qu->query_dglen+2))
241 /* Reset idle timeout. */
242 ads->tcptimeout.tv_sec= ads->tcptimeout.tv_usec= 0;
244 if (ads->tcpsend.used) {
247 iov[0].iov_base= length;
249 iov[1].iov_base= qu->query_dgram;
250 iov[1].iov_len= qu->query_dglen;
251 adns__sigpipe_protect(qu->ads);
252 wr= writev(qu->ads->tcpsocket,iov,2);
253 adns__sigpipe_unprotect(qu->ads);
255 if (!(errno == EAGAIN || errno == EINTR || errno == ENOSPC ||
256 errno == ENOBUFS || errno == ENOMEM)) {
257 adns__tcp_broken(ads,"write",strerror(errno));
265 r= adns__vbuf_append(&ads->tcpsend,length,2-wr); assert(r);
270 if (wr<qu->query_dglen) {
271 r= adns__vbuf_append(&ads->tcpsend,qu->query_dgram+wr,qu->query_dglen-wr);
276 static void query_usetcp(adns_query qu, struct timeval now) {
277 qu->state= query_tcpw;
279 timevaladd(&qu->timeout,TCPWAITMS);
280 LIST_LINK_TAIL(qu->ads->tcpw,qu);
281 adns__querysend_tcp(qu,now);
282 adns__tcp_tryconnect(qu->ads,now);
285 void adns__query_send(adns_query qu, struct timeval now) {
286 struct sockaddr_in servaddr;
290 assert(qu->state == query_tosend);
291 if ((qu->flags & adns_qf_usevc) || (qu->query_dglen > DNS_MAXUDP)) {
292 query_usetcp(qu,now);
296 if (qu->retries >= UDPMAXRETRIES) {
297 adns__query_fail(qu,adns_s_timeout);
301 serv= qu->udpnextserver;
302 memset(&servaddr,0,sizeof(servaddr));
305 servaddr.sin_family= AF_INET;
306 servaddr.sin_addr= ads->servers[serv].addr;
307 servaddr.sin_port= htons(DNS_PORT);
309 r= sendto(ads->udpsocket,qu->query_dgram,qu->query_dglen,0,
310 (const struct sockaddr*)&servaddr,sizeof(servaddr));
311 if (r<0 && errno == EMSGSIZE) {
313 query_usetcp(qu,now);
316 if (r<0 && errno != EAGAIN)
317 adns__warn(ads,serv,0,"sendto failed: %s",strerror(errno));
320 timevaladd(&qu->timeout,UDPRETRYMS);
321 qu->udpsent |= (1<<serv);
322 qu->udpnextserver= (serv+1)%ads->nservers;
324 LIST_LINK_TAIL(ads->udpw,qu);