res_send.c revision 1.14 1 1.14 christos /* $NetBSD: res_send.c,v 1.14 2008/06/21 20:41:48 christos Exp $ */
2 1.1 christos
3 1.1 christos /*
4 1.1 christos * Copyright (c) 1985, 1989, 1993
5 1.1 christos * The Regents of the University of California. All rights reserved.
6 1.1 christos *
7 1.1 christos * Redistribution and use in source and binary forms, with or without
8 1.1 christos * modification, are permitted provided that the following conditions
9 1.1 christos * are met:
10 1.1 christos * 1. Redistributions of source code must retain the above copyright
11 1.1 christos * notice, this list of conditions and the following disclaimer.
12 1.1 christos * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 christos * notice, this list of conditions and the following disclaimer in the
14 1.1 christos * documentation and/or other materials provided with the distribution.
15 1.1 christos * 3. All advertising materials mentioning features or use of this software
16 1.1 christos * must display the following acknowledgement:
17 1.1 christos * This product includes software developed by the University of
18 1.1 christos * California, Berkeley and its contributors.
19 1.1 christos * 4. Neither the name of the University nor the names of its contributors
20 1.1 christos * may be used to endorse or promote products derived from this software
21 1.1 christos * without specific prior written permission.
22 1.1 christos *
23 1.1 christos * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 1.1 christos * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 1.1 christos * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 1.1 christos * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 1.1 christos * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 1.1 christos * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 1.1 christos * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 1.1 christos * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 1.1 christos * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 1.1 christos * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 1.1 christos * SUCH DAMAGE.
34 1.1 christos */
35 1.1 christos
36 1.1 christos /*
37 1.1 christos * Portions Copyright (c) 1993 by Digital Equipment Corporation.
38 1.1 christos *
39 1.1 christos * Permission to use, copy, modify, and distribute this software for any
40 1.1 christos * purpose with or without fee is hereby granted, provided that the above
41 1.1 christos * copyright notice and this permission notice appear in all copies, and that
42 1.1 christos * the name of Digital Equipment Corporation not be used in advertising or
43 1.1 christos * publicity pertaining to distribution of the document or software without
44 1.1 christos * specific, written prior permission.
45 1.1 christos *
46 1.1 christos * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
47 1.1 christos * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
48 1.1 christos * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT
49 1.1 christos * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
50 1.1 christos * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
51 1.1 christos * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
52 1.1 christos * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
53 1.1 christos * SOFTWARE.
54 1.1 christos */
55 1.1 christos
56 1.1 christos /*
57 1.10 christos * Copyright (c) 2005 by Internet Systems Consortium, Inc. ("ISC")
58 1.1 christos * Portions Copyright (c) 1996-1999 by Internet Software Consortium.
59 1.1 christos *
60 1.1 christos * Permission to use, copy, modify, and distribute this software for any
61 1.1 christos * purpose with or without fee is hereby granted, provided that the above
62 1.1 christos * copyright notice and this permission notice appear in all copies.
63 1.1 christos *
64 1.1 christos * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES
65 1.1 christos * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
66 1.1 christos * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR
67 1.1 christos * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
68 1.1 christos * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
69 1.1 christos * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
70 1.1 christos * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
71 1.1 christos */
72 1.1 christos
73 1.4 christos #include <sys/cdefs.h>
74 1.1 christos #if defined(LIBC_SCCS) && !defined(lint)
75 1.4 christos #ifdef notdef
76 1.1 christos static const char sccsid[] = "@(#)res_send.c 8.1 (Berkeley) 6/4/93";
77 1.14 christos static const char rcsid[] = "Id: res_send.c,v 1.18.10.1 2008/01/27 02:06:46 marka Exp";
78 1.4 christos #else
79 1.14 christos __RCSID("$NetBSD: res_send.c,v 1.14 2008/06/21 20:41:48 christos Exp $");
80 1.4 christos #endif
81 1.1 christos #endif /* LIBC_SCCS and not lint */
82 1.1 christos
83 1.10 christos /*! \file
84 1.10 christos * \brief
85 1.1 christos * Send query to name server and wait for reply.
86 1.1 christos */
87 1.1 christos
88 1.8 kleink #include "namespace.h"
89 1.1 christos #include "port_before.h"
90 1.1 christos #include "fd_setsize.h"
91 1.1 christos
92 1.1 christos #include <sys/types.h>
93 1.1 christos #include <sys/param.h>
94 1.1 christos #include <sys/time.h>
95 1.1 christos #include <sys/socket.h>
96 1.1 christos #include <sys/uio.h>
97 1.1 christos
98 1.1 christos #include <netinet/in.h>
99 1.1 christos #include <arpa/nameser.h>
100 1.1 christos #include <arpa/inet.h>
101 1.1 christos
102 1.1 christos #include <errno.h>
103 1.1 christos #include <netdb.h>
104 1.1 christos #include <resolv.h>
105 1.1 christos #include <signal.h>
106 1.1 christos #include <stdio.h>
107 1.1 christos #include <stdlib.h>
108 1.1 christos #include <string.h>
109 1.1 christos #include <unistd.h>
110 1.1 christos
111 1.1 christos #include <isc/eventlib.h>
112 1.1 christos
113 1.1 christos #include "port_after.h"
114 1.1 christos
115 1.6 christos #if 0
116 1.5 christos #ifdef __weak_alias
117 1.5 christos __weak_alias(res_ourserver_p,__res_ourserver_p)
118 1.5 christos __weak_alias(res_nameinquery,__res_nameinquery)
119 1.5 christos __weak_alias(res_queriesmatch,__res_queriesmatch)
120 1.5 christos __weak_alias(res_nsend,__res_nsend)
121 1.5 christos #endif
122 1.6 christos #endif
123 1.5 christos
124 1.10 christos
125 1.10 christos #ifdef USE_POLL
126 1.10 christos #ifdef HAVE_STROPTS_H
127 1.10 christos #include <stropts.h>
128 1.10 christos #endif
129 1.10 christos #include <poll.h>
130 1.10 christos #endif /* USE_POLL */
131 1.10 christos
132 1.1 christos /* Options. Leave them on. */
133 1.1 christos #define DEBUG
134 1.1 christos #include "res_debug.h"
135 1.1 christos #include "res_private.h"
136 1.1 christos
137 1.1 christos #define EXT(res) ((res)->_u._ext)
138 1.1 christos
139 1.10 christos #ifndef USE_POLL
140 1.1 christos static const int highestFD = FD_SETSIZE - 1;
141 1.14 christos #else
142 1.14 christos static int highestFD = 0;
143 1.10 christos #endif
144 1.1 christos
145 1.1 christos /* Forward. */
146 1.1 christos
147 1.1 christos static int get_salen __P((const struct sockaddr *));
148 1.1 christos static struct sockaddr * get_nsaddr __P((res_state, size_t));
149 1.1 christos static int send_vc(res_state, const u_char *, int,
150 1.1 christos u_char *, int, int *, int);
151 1.1 christos static int send_dg(res_state, const u_char *, int,
152 1.10 christos u_char *, int, int *, int, int,
153 1.1 christos int *, int *);
154 1.1 christos static void Aerror(const res_state, FILE *, const char *, int,
155 1.1 christos const struct sockaddr *, int);
156 1.1 christos static void Perror(const res_state, FILE *, const char *, int);
157 1.1 christos static int sock_eq(struct sockaddr *, struct sockaddr *);
158 1.10 christos #if defined(NEED_PSELECT) && !defined(USE_POLL)
159 1.1 christos static int pselect(int, void *, void *, void *,
160 1.1 christos struct timespec *,
161 1.1 christos const sigset_t *);
162 1.1 christos #endif
163 1.1 christos void res_pquery(const res_state, const u_char *, int, FILE *);
164 1.1 christos
165 1.1 christos static const int niflags = NI_NUMERICHOST | NI_NUMERICSERV;
166 1.1 christos
167 1.1 christos /* Public. */
168 1.1 christos
169 1.10 christos /*%
170 1.1 christos * looks up "ina" in _res.ns_addr_list[]
171 1.10 christos *
172 1.1 christos * returns:
173 1.10 christos *\li 0 : not found
174 1.10 christos *\li >0 : found
175 1.10 christos *
176 1.1 christos * author:
177 1.10 christos *\li paul vixie, 29may94
178 1.1 christos */
179 1.1 christos int
180 1.1 christos res_ourserver_p(const res_state statp, const struct sockaddr *sa) {
181 1.1 christos const struct sockaddr_in *inp, *srv;
182 1.1 christos const struct sockaddr_in6 *in6p, *srv6;
183 1.1 christos int ns;
184 1.1 christos
185 1.1 christos switch (sa->sa_family) {
186 1.1 christos case AF_INET:
187 1.3 christos inp = (const struct sockaddr_in *)(const void *)sa;
188 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
189 1.2 christos srv = (struct sockaddr_in *)(void *)get_nsaddr(statp, (size_t)ns);
190 1.1 christos if (srv->sin_family == inp->sin_family &&
191 1.1 christos srv->sin_port == inp->sin_port &&
192 1.1 christos (srv->sin_addr.s_addr == INADDR_ANY ||
193 1.1 christos srv->sin_addr.s_addr == inp->sin_addr.s_addr))
194 1.1 christos return (1);
195 1.1 christos }
196 1.1 christos break;
197 1.1 christos case AF_INET6:
198 1.1 christos if (EXT(statp).ext == NULL)
199 1.1 christos break;
200 1.3 christos in6p = (const struct sockaddr_in6 *)(const void *)sa;
201 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
202 1.2 christos srv6 = (struct sockaddr_in6 *)(void *)get_nsaddr(statp, (size_t)ns);
203 1.1 christos if (srv6->sin6_family == in6p->sin6_family &&
204 1.1 christos srv6->sin6_port == in6p->sin6_port &&
205 1.1 christos #ifdef HAVE_SIN6_SCOPE_ID
206 1.7 christos (srv6->sin6_scope_id == 0 ||
207 1.7 christos srv6->sin6_scope_id == in6p->sin6_scope_id) &&
208 1.1 christos #endif
209 1.1 christos (IN6_IS_ADDR_UNSPECIFIED(&srv6->sin6_addr) ||
210 1.1 christos IN6_ARE_ADDR_EQUAL(&srv6->sin6_addr, &in6p->sin6_addr)))
211 1.1 christos return (1);
212 1.1 christos }
213 1.1 christos break;
214 1.1 christos default:
215 1.1 christos break;
216 1.1 christos }
217 1.1 christos return (0);
218 1.1 christos }
219 1.1 christos
220 1.10 christos /*%
221 1.1 christos * look for (name,type,class) in the query section of packet (buf,eom)
222 1.10 christos *
223 1.1 christos * requires:
224 1.10 christos *\li buf + HFIXEDSZ <= eom
225 1.10 christos *
226 1.1 christos * returns:
227 1.10 christos *\li -1 : format error
228 1.10 christos *\li 0 : not found
229 1.10 christos *\li >0 : found
230 1.10 christos *
231 1.1 christos * author:
232 1.10 christos *\li paul vixie, 29may94
233 1.1 christos */
234 1.1 christos int
235 1.1 christos res_nameinquery(const char *name, int type, int class,
236 1.1 christos const u_char *buf, const u_char *eom)
237 1.1 christos {
238 1.1 christos const u_char *cp = buf + HFIXEDSZ;
239 1.2 christos int qdcount = ntohs(((const HEADER*)(const void *)buf)->qdcount);
240 1.1 christos
241 1.1 christos while (qdcount-- > 0) {
242 1.1 christos char tname[MAXDNAME+1];
243 1.1 christos int n, ttype, tclass;
244 1.1 christos
245 1.1 christos n = dn_expand(buf, eom, cp, tname, sizeof tname);
246 1.1 christos if (n < 0)
247 1.1 christos return (-1);
248 1.1 christos cp += n;
249 1.1 christos if (cp + 2 * INT16SZ > eom)
250 1.1 christos return (-1);
251 1.1 christos ttype = ns_get16(cp); cp += INT16SZ;
252 1.1 christos tclass = ns_get16(cp); cp += INT16SZ;
253 1.1 christos if (ttype == type && tclass == class &&
254 1.1 christos ns_samename(tname, name) == 1)
255 1.1 christos return (1);
256 1.1 christos }
257 1.1 christos return (0);
258 1.1 christos }
259 1.1 christos
260 1.10 christos /*%
261 1.1 christos * is there a 1:1 mapping of (name,type,class)
262 1.1 christos * in (buf1,eom1) and (buf2,eom2)?
263 1.10 christos *
264 1.1 christos * returns:
265 1.10 christos *\li -1 : format error
266 1.10 christos *\li 0 : not a 1:1 mapping
267 1.10 christos *\li >0 : is a 1:1 mapping
268 1.10 christos *
269 1.1 christos * author:
270 1.10 christos *\li paul vixie, 29may94
271 1.1 christos */
272 1.1 christos int
273 1.1 christos res_queriesmatch(const u_char *buf1, const u_char *eom1,
274 1.1 christos const u_char *buf2, const u_char *eom2)
275 1.1 christos {
276 1.1 christos const u_char *cp = buf1 + HFIXEDSZ;
277 1.2 christos int qdcount = ntohs(((const HEADER*)(const void *)buf1)->qdcount);
278 1.1 christos
279 1.1 christos if (buf1 + HFIXEDSZ > eom1 || buf2 + HFIXEDSZ > eom2)
280 1.1 christos return (-1);
281 1.1 christos
282 1.1 christos /*
283 1.1 christos * Only header section present in replies to
284 1.1 christos * dynamic update packets.
285 1.1 christos */
286 1.2 christos if ((((const HEADER *)(const void *)buf1)->opcode == ns_o_update) &&
287 1.2 christos (((const HEADER *)(const void *)buf2)->opcode == ns_o_update))
288 1.1 christos return (1);
289 1.1 christos
290 1.2 christos if (qdcount != ntohs(((const HEADER*)(const void *)buf2)->qdcount))
291 1.1 christos return (0);
292 1.1 christos while (qdcount-- > 0) {
293 1.1 christos char tname[MAXDNAME+1];
294 1.1 christos int n, ttype, tclass;
295 1.1 christos
296 1.1 christos n = dn_expand(buf1, eom1, cp, tname, sizeof tname);
297 1.1 christos if (n < 0)
298 1.1 christos return (-1);
299 1.1 christos cp += n;
300 1.1 christos if (cp + 2 * INT16SZ > eom1)
301 1.1 christos return (-1);
302 1.1 christos ttype = ns_get16(cp); cp += INT16SZ;
303 1.1 christos tclass = ns_get16(cp); cp += INT16SZ;
304 1.1 christos if (!res_nameinquery(tname, ttype, tclass, buf2, eom2))
305 1.1 christos return (0);
306 1.1 christos }
307 1.1 christos return (1);
308 1.1 christos }
309 1.1 christos
310 1.1 christos int
311 1.1 christos res_nsend(res_state statp,
312 1.1 christos const u_char *buf, int buflen, u_char *ans, int anssiz)
313 1.1 christos {
314 1.14 christos int gotsomewhere, terrno, tries, v_circuit, resplen, ns, n;
315 1.1 christos char abuf[NI_MAXHOST];
316 1.1 christos
317 1.14 christos #ifdef USE_POLL
318 1.14 christos highestFD = sysconf(_SC_OPEN_MAX) - 1;
319 1.14 christos #endif
320 1.14 christos
321 1.10 christos /* No name servers or res_init() failure */
322 1.10 christos if (statp->nscount == 0 || EXT(statp).ext == NULL) {
323 1.1 christos errno = ESRCH;
324 1.1 christos return (-1);
325 1.1 christos }
326 1.1 christos if (anssiz < HFIXEDSZ) {
327 1.1 christos errno = EINVAL;
328 1.1 christos return (-1);
329 1.1 christos }
330 1.1 christos DprintQ((statp->options & RES_DEBUG) || (statp->pfcode & RES_PRF_QUERY),
331 1.1 christos (stdout, ";; res_send()\n"), buf, buflen);
332 1.1 christos v_circuit = (statp->options & RES_USEVC) || buflen > PACKETSZ;
333 1.1 christos gotsomewhere = 0;
334 1.1 christos terrno = ETIMEDOUT;
335 1.1 christos
336 1.1 christos /*
337 1.1 christos * If the ns_addr_list in the resolver context has changed, then
338 1.1 christos * invalidate our cached copy and the associated timing data.
339 1.1 christos */
340 1.1 christos if (EXT(statp).nscount != 0) {
341 1.1 christos int needclose = 0;
342 1.1 christos struct sockaddr_storage peer;
343 1.1 christos ISC_SOCKLEN_T peerlen;
344 1.1 christos
345 1.1 christos if (EXT(statp).nscount != statp->nscount)
346 1.1 christos needclose++;
347 1.1 christos else
348 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
349 1.1 christos if (statp->nsaddr_list[ns].sin_family &&
350 1.2 christos !sock_eq((struct sockaddr *)(void *)&statp->nsaddr_list[ns],
351 1.2 christos (struct sockaddr *)(void *)&EXT(statp).ext->nsaddrs[ns])) {
352 1.1 christos needclose++;
353 1.1 christos break;
354 1.1 christos }
355 1.1 christos
356 1.1 christos if (EXT(statp).nssocks[ns] == -1)
357 1.1 christos continue;
358 1.1 christos peerlen = sizeof(peer);
359 1.1 christos if (getsockname(EXT(statp).nssocks[ns],
360 1.2 christos (struct sockaddr *)(void *)&peer, &peerlen) < 0) {
361 1.1 christos needclose++;
362 1.1 christos break;
363 1.1 christos }
364 1.2 christos if (!sock_eq((struct sockaddr *)(void *)&peer,
365 1.2 christos get_nsaddr(statp, (size_t)ns))) {
366 1.1 christos needclose++;
367 1.1 christos break;
368 1.1 christos }
369 1.1 christos }
370 1.1 christos if (needclose) {
371 1.1 christos res_nclose(statp);
372 1.1 christos EXT(statp).nscount = 0;
373 1.1 christos }
374 1.1 christos }
375 1.1 christos
376 1.1 christos /*
377 1.1 christos * Maybe initialize our private copy of the ns_addr_list.
378 1.1 christos */
379 1.1 christos if (EXT(statp).nscount == 0) {
380 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
381 1.1 christos EXT(statp).nstimes[ns] = RES_MAXTIME;
382 1.1 christos EXT(statp).nssocks[ns] = -1;
383 1.1 christos if (!statp->nsaddr_list[ns].sin_family)
384 1.1 christos continue;
385 1.1 christos EXT(statp).ext->nsaddrs[ns].sin =
386 1.1 christos statp->nsaddr_list[ns];
387 1.1 christos }
388 1.1 christos EXT(statp).nscount = statp->nscount;
389 1.1 christos }
390 1.1 christos
391 1.1 christos /*
392 1.1 christos * Some resolvers want to even out the load on their nameservers.
393 1.1 christos * Note that RES_BLAST overrides RES_ROTATE.
394 1.1 christos */
395 1.1 christos if ((statp->options & RES_ROTATE) != 0U &&
396 1.1 christos (statp->options & RES_BLAST) == 0U) {
397 1.1 christos union res_sockaddr_union inu;
398 1.1 christos struct sockaddr_in ina;
399 1.1 christos int lastns = statp->nscount - 1;
400 1.1 christos int fd;
401 1.1 christos u_int16_t nstime;
402 1.1 christos
403 1.1 christos if (EXT(statp).ext != NULL)
404 1.1 christos inu = EXT(statp).ext->nsaddrs[0];
405 1.1 christos ina = statp->nsaddr_list[0];
406 1.1 christos fd = EXT(statp).nssocks[0];
407 1.1 christos nstime = EXT(statp).nstimes[0];
408 1.1 christos for (ns = 0; ns < lastns; ns++) {
409 1.1 christos if (EXT(statp).ext != NULL)
410 1.1 christos EXT(statp).ext->nsaddrs[ns] =
411 1.1 christos EXT(statp).ext->nsaddrs[ns + 1];
412 1.1 christos statp->nsaddr_list[ns] = statp->nsaddr_list[ns + 1];
413 1.1 christos EXT(statp).nssocks[ns] = EXT(statp).nssocks[ns + 1];
414 1.1 christos EXT(statp).nstimes[ns] = EXT(statp).nstimes[ns + 1];
415 1.1 christos }
416 1.1 christos if (EXT(statp).ext != NULL)
417 1.1 christos EXT(statp).ext->nsaddrs[lastns] = inu;
418 1.1 christos statp->nsaddr_list[lastns] = ina;
419 1.1 christos EXT(statp).nssocks[lastns] = fd;
420 1.1 christos EXT(statp).nstimes[lastns] = nstime;
421 1.1 christos }
422 1.1 christos
423 1.1 christos /*
424 1.1 christos * Send request, RETRY times, or until successful.
425 1.1 christos */
426 1.14 christos for (tries = 0; tries < statp->retry; tries++) {
427 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
428 1.1 christos struct sockaddr *nsap;
429 1.1 christos int nsaplen;
430 1.2 christos nsap = get_nsaddr(statp, (size_t)ns);
431 1.1 christos nsaplen = get_salen(nsap);
432 1.1 christos statp->_flags &= ~RES_F_LASTMASK;
433 1.1 christos statp->_flags |= (ns << RES_F_LASTSHIFT);
434 1.1 christos same_ns:
435 1.1 christos if (statp->qhook) {
436 1.1 christos int done = 0, loops = 0;
437 1.1 christos
438 1.1 christos do {
439 1.1 christos res_sendhookact act;
440 1.1 christos
441 1.1 christos act = (*statp->qhook)(&nsap, &buf, &buflen,
442 1.1 christos ans, anssiz, &resplen);
443 1.1 christos switch (act) {
444 1.1 christos case res_goahead:
445 1.1 christos done = 1;
446 1.1 christos break;
447 1.1 christos case res_nextns:
448 1.1 christos res_nclose(statp);
449 1.1 christos goto next_ns;
450 1.1 christos case res_done:
451 1.1 christos return (resplen);
452 1.1 christos case res_modified:
453 1.1 christos /* give the hook another try */
454 1.1 christos if (++loops < 42) /*doug adams*/
455 1.1 christos break;
456 1.1 christos /*FALLTHROUGH*/
457 1.1 christos case res_error:
458 1.1 christos /*FALLTHROUGH*/
459 1.1 christos default:
460 1.1 christos goto fail;
461 1.1 christos }
462 1.1 christos } while (!done);
463 1.1 christos }
464 1.1 christos
465 1.1 christos Dprint(((statp->options & RES_DEBUG) &&
466 1.2 christos getnameinfo(nsap, (socklen_t)nsaplen, abuf, sizeof(abuf),
467 1.1 christos NULL, 0, niflags) == 0),
468 1.1 christos (stdout, ";; Querying server (# %d) address = %s\n",
469 1.1 christos ns + 1, abuf));
470 1.1 christos
471 1.1 christos
472 1.1 christos if (v_circuit) {
473 1.1 christos /* Use VC; at most one attempt per server. */
474 1.14 christos tries = statp->retry;
475 1.1 christos n = send_vc(statp, buf, buflen, ans, anssiz, &terrno,
476 1.1 christos ns);
477 1.1 christos if (n < 0)
478 1.1 christos goto fail;
479 1.1 christos if (n == 0)
480 1.1 christos goto next_ns;
481 1.1 christos resplen = n;
482 1.1 christos } else {
483 1.1 christos /* Use datagrams. */
484 1.1 christos n = send_dg(statp, buf, buflen, ans, anssiz, &terrno,
485 1.14 christos ns, tries, &v_circuit, &gotsomewhere);
486 1.1 christos if (n < 0)
487 1.1 christos goto fail;
488 1.1 christos if (n == 0)
489 1.1 christos goto next_ns;
490 1.1 christos if (v_circuit)
491 1.1 christos goto same_ns;
492 1.1 christos resplen = n;
493 1.1 christos }
494 1.1 christos
495 1.1 christos Dprint((statp->options & RES_DEBUG) ||
496 1.1 christos ((statp->pfcode & RES_PRF_REPLY) &&
497 1.1 christos (statp->pfcode & RES_PRF_HEAD1)),
498 1.1 christos (stdout, ";; got answer:\n"));
499 1.1 christos
500 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
501 1.1 christos (statp->pfcode & RES_PRF_REPLY),
502 1.1 christos (stdout, "%s", ""),
503 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
504 1.1 christos
505 1.1 christos /*
506 1.1 christos * If we have temporarily opened a virtual circuit,
507 1.1 christos * or if we haven't been asked to keep a socket open,
508 1.1 christos * close the socket.
509 1.1 christos */
510 1.1 christos if ((v_circuit && (statp->options & RES_USEVC) == 0U) ||
511 1.1 christos (statp->options & RES_STAYOPEN) == 0U) {
512 1.1 christos res_nclose(statp);
513 1.1 christos }
514 1.1 christos if (statp->rhook) {
515 1.1 christos int done = 0, loops = 0;
516 1.1 christos
517 1.1 christos do {
518 1.1 christos res_sendhookact act;
519 1.1 christos
520 1.1 christos act = (*statp->rhook)(nsap, buf, buflen,
521 1.1 christos ans, anssiz, &resplen);
522 1.1 christos switch (act) {
523 1.1 christos case res_goahead:
524 1.1 christos case res_done:
525 1.1 christos done = 1;
526 1.1 christos break;
527 1.1 christos case res_nextns:
528 1.1 christos res_nclose(statp);
529 1.1 christos goto next_ns;
530 1.1 christos case res_modified:
531 1.1 christos /* give the hook another try */
532 1.1 christos if (++loops < 42) /*doug adams*/
533 1.1 christos break;
534 1.1 christos /*FALLTHROUGH*/
535 1.1 christos case res_error:
536 1.1 christos /*FALLTHROUGH*/
537 1.1 christos default:
538 1.1 christos goto fail;
539 1.1 christos }
540 1.1 christos } while (!done);
541 1.1 christos
542 1.1 christos }
543 1.1 christos return (resplen);
544 1.1 christos next_ns: ;
545 1.1 christos } /*foreach ns*/
546 1.1 christos } /*foreach retry*/
547 1.1 christos res_nclose(statp);
548 1.1 christos if (!v_circuit) {
549 1.1 christos if (!gotsomewhere)
550 1.10 christos errno = ECONNREFUSED; /*%< no nameservers found */
551 1.1 christos else
552 1.10 christos errno = ETIMEDOUT; /*%< no answer obtained */
553 1.1 christos } else
554 1.1 christos errno = terrno;
555 1.1 christos return (-1);
556 1.1 christos fail:
557 1.1 christos res_nclose(statp);
558 1.1 christos return (-1);
559 1.1 christos }
560 1.1 christos
561 1.1 christos /* Private */
562 1.1 christos
563 1.1 christos static int
564 1.1 christos get_salen(sa)
565 1.1 christos const struct sockaddr *sa;
566 1.1 christos {
567 1.1 christos
568 1.1 christos #ifdef HAVE_SA_LEN
569 1.1 christos /* There are people do not set sa_len. Be forgiving to them. */
570 1.1 christos if (sa->sa_len)
571 1.1 christos return (sa->sa_len);
572 1.1 christos #endif
573 1.1 christos
574 1.1 christos if (sa->sa_family == AF_INET)
575 1.1 christos return (sizeof(struct sockaddr_in));
576 1.1 christos else if (sa->sa_family == AF_INET6)
577 1.1 christos return (sizeof(struct sockaddr_in6));
578 1.1 christos else
579 1.10 christos return (0); /*%< unknown, die on connect */
580 1.1 christos }
581 1.1 christos
582 1.10 christos /*%
583 1.1 christos * pick appropriate nsaddr_list for use. see res_init() for initialization.
584 1.1 christos */
585 1.1 christos static struct sockaddr *
586 1.1 christos get_nsaddr(statp, n)
587 1.1 christos res_state statp;
588 1.1 christos size_t n;
589 1.1 christos {
590 1.1 christos
591 1.1 christos if (!statp->nsaddr_list[n].sin_family && EXT(statp).ext) {
592 1.1 christos /*
593 1.1 christos * - EXT(statp).ext->nsaddrs[n] holds an address that is larger
594 1.1 christos * than struct sockaddr, and
595 1.1 christos * - user code did not update statp->nsaddr_list[n].
596 1.1 christos */
597 1.1 christos return (struct sockaddr *)(void *)&EXT(statp).ext->nsaddrs[n];
598 1.1 christos } else {
599 1.1 christos /*
600 1.1 christos * - user code updated statp->nsaddr_list[n], or
601 1.1 christos * - statp->nsaddr_list[n] has the same content as
602 1.1 christos * EXT(statp).ext->nsaddrs[n].
603 1.1 christos */
604 1.1 christos return (struct sockaddr *)(void *)&statp->nsaddr_list[n];
605 1.1 christos }
606 1.1 christos }
607 1.1 christos
608 1.1 christos static int
609 1.1 christos send_vc(res_state statp,
610 1.1 christos const u_char *buf, int buflen, u_char *ans, int anssiz,
611 1.1 christos int *terrno, int ns)
612 1.1 christos {
613 1.3 christos const HEADER *hp = (const HEADER *)(const void *)buf;
614 1.3 christos HEADER *anhp = (HEADER *)(void *)ans;
615 1.1 christos struct sockaddr *nsap;
616 1.1 christos int nsaplen;
617 1.1 christos int truncating, connreset, resplen, n;
618 1.1 christos struct iovec iov[2];
619 1.1 christos u_short len;
620 1.1 christos u_char *cp;
621 1.1 christos void *tmp;
622 1.14 christos #ifdef SO_NOSIGPIPE
623 1.14 christos int on = 1;
624 1.14 christos #endif
625 1.1 christos
626 1.2 christos nsap = get_nsaddr(statp, (size_t)ns);
627 1.1 christos nsaplen = get_salen(nsap);
628 1.1 christos
629 1.1 christos connreset = 0;
630 1.1 christos same_ns:
631 1.1 christos truncating = 0;
632 1.1 christos
633 1.1 christos /* Are we still talking to whom we want to talk to? */
634 1.1 christos if (statp->_vcsock >= 0 && (statp->_flags & RES_F_VC) != 0) {
635 1.1 christos struct sockaddr_storage peer;
636 1.1 christos ISC_SOCKLEN_T size = sizeof peer;
637 1.1 christos
638 1.1 christos if (getpeername(statp->_vcsock,
639 1.2 christos (struct sockaddr *)(void *)&peer, &size) < 0 ||
640 1.2 christos !sock_eq((struct sockaddr *)(void *)&peer, nsap)) {
641 1.1 christos res_nclose(statp);
642 1.1 christos statp->_flags &= ~RES_F_VC;
643 1.1 christos }
644 1.1 christos }
645 1.1 christos
646 1.1 christos if (statp->_vcsock < 0 || (statp->_flags & RES_F_VC) == 0) {
647 1.1 christos if (statp->_vcsock >= 0)
648 1.1 christos res_nclose(statp);
649 1.1 christos
650 1.1 christos statp->_vcsock = socket(nsap->sa_family, SOCK_STREAM, 0);
651 1.1 christos if (statp->_vcsock > highestFD) {
652 1.1 christos res_nclose(statp);
653 1.1 christos errno = ENOTSOCK;
654 1.1 christos }
655 1.1 christos if (statp->_vcsock < 0) {
656 1.1 christos switch (errno) {
657 1.1 christos case EPROTONOSUPPORT:
658 1.1 christos #ifdef EPFNOSUPPORT
659 1.1 christos case EPFNOSUPPORT:
660 1.1 christos #endif
661 1.1 christos case EAFNOSUPPORT:
662 1.1 christos Perror(statp, stderr, "socket(vc)", errno);
663 1.1 christos return (0);
664 1.1 christos default:
665 1.1 christos *terrno = errno;
666 1.1 christos Perror(statp, stderr, "socket(vc)", errno);
667 1.1 christos return (-1);
668 1.1 christos }
669 1.1 christos }
670 1.14 christos #ifdef SO_NOSIGPIPE
671 1.14 christos /*
672 1.14 christos * Disable generation of SIGPIPE when writing to a closed
673 1.14 christos * socket. Write should return -1 and set errno to EPIPE
674 1.14 christos * instead.
675 1.14 christos *
676 1.14 christos * Push on even if setsockopt(SO_NOSIGPIPE) fails.
677 1.14 christos */
678 1.14 christos (void)setsockopt(statp->_vcsock, SOL_SOCKET, SO_NOSIGPIPE, &on,
679 1.14 christos sizeof(on));
680 1.14 christos #endif
681 1.1 christos errno = 0;
682 1.2 christos if (connect(statp->_vcsock, nsap, (socklen_t)nsaplen) < 0) {
683 1.1 christos *terrno = errno;
684 1.1 christos Aerror(statp, stderr, "connect/vc", errno, nsap,
685 1.1 christos nsaplen);
686 1.1 christos res_nclose(statp);
687 1.1 christos return (0);
688 1.1 christos }
689 1.1 christos statp->_flags |= RES_F_VC;
690 1.1 christos }
691 1.1 christos
692 1.1 christos /*
693 1.1 christos * Send length & message
694 1.1 christos */
695 1.2 christos ns_put16((u_short)buflen, (u_char*)(void *)&len);
696 1.1 christos iov[0] = evConsIovec(&len, INT16SZ);
697 1.1 christos DE_CONST(buf, tmp);
698 1.2 christos iov[1] = evConsIovec(tmp, (size_t)buflen);
699 1.1 christos if (writev(statp->_vcsock, iov, 2) != (INT16SZ + buflen)) {
700 1.1 christos *terrno = errno;
701 1.1 christos Perror(statp, stderr, "write failed", errno);
702 1.1 christos res_nclose(statp);
703 1.1 christos return (0);
704 1.1 christos }
705 1.1 christos /*
706 1.1 christos * Receive length & response
707 1.1 christos */
708 1.1 christos read_len:
709 1.1 christos cp = ans;
710 1.1 christos len = INT16SZ;
711 1.2 christos while ((n = read(statp->_vcsock, (char *)cp, (size_t)len)) > 0) {
712 1.1 christos cp += n;
713 1.2 christos if ((len -= n) == 0)
714 1.1 christos break;
715 1.1 christos }
716 1.1 christos if (n <= 0) {
717 1.1 christos *terrno = errno;
718 1.1 christos Perror(statp, stderr, "read failed", errno);
719 1.1 christos res_nclose(statp);
720 1.1 christos /*
721 1.1 christos * A long running process might get its TCP
722 1.1 christos * connection reset if the remote server was
723 1.1 christos * restarted. Requery the server instead of
724 1.1 christos * trying a new one. When there is only one
725 1.1 christos * server, this means that a query might work
726 1.1 christos * instead of failing. We only allow one reset
727 1.1 christos * per query to prevent looping.
728 1.1 christos */
729 1.1 christos if (*terrno == ECONNRESET && !connreset) {
730 1.1 christos connreset = 1;
731 1.1 christos res_nclose(statp);
732 1.1 christos goto same_ns;
733 1.1 christos }
734 1.1 christos res_nclose(statp);
735 1.1 christos return (0);
736 1.1 christos }
737 1.1 christos resplen = ns_get16(ans);
738 1.1 christos if (resplen > anssiz) {
739 1.1 christos Dprint(statp->options & RES_DEBUG,
740 1.1 christos (stdout, ";; response truncated\n")
741 1.1 christos );
742 1.1 christos truncating = 1;
743 1.1 christos len = anssiz;
744 1.1 christos } else
745 1.1 christos len = resplen;
746 1.1 christos if (len < HFIXEDSZ) {
747 1.1 christos /*
748 1.1 christos * Undersized message.
749 1.1 christos */
750 1.1 christos Dprint(statp->options & RES_DEBUG,
751 1.1 christos (stdout, ";; undersized: %d\n", len));
752 1.1 christos *terrno = EMSGSIZE;
753 1.1 christos res_nclose(statp);
754 1.1 christos return (0);
755 1.1 christos }
756 1.1 christos cp = ans;
757 1.2 christos while (len != 0 && (n = read(statp->_vcsock, (char *)cp, (size_t)len)) > 0){
758 1.1 christos cp += n;
759 1.1 christos len -= n;
760 1.1 christos }
761 1.1 christos if (n <= 0) {
762 1.1 christos *terrno = errno;
763 1.1 christos Perror(statp, stderr, "read(vc)", errno);
764 1.1 christos res_nclose(statp);
765 1.1 christos return (0);
766 1.1 christos }
767 1.1 christos if (truncating) {
768 1.1 christos /*
769 1.1 christos * Flush rest of answer so connection stays in synch.
770 1.1 christos */
771 1.1 christos anhp->tc = 1;
772 1.1 christos len = resplen - anssiz;
773 1.1 christos while (len != 0) {
774 1.1 christos char junk[PACKETSZ];
775 1.1 christos
776 1.1 christos n = read(statp->_vcsock, junk,
777 1.1 christos (len > sizeof junk) ? sizeof junk : len);
778 1.1 christos if (n > 0)
779 1.1 christos len -= n;
780 1.1 christos else
781 1.1 christos break;
782 1.1 christos }
783 1.1 christos }
784 1.1 christos /*
785 1.1 christos * If the calling applicating has bailed out of
786 1.1 christos * a previous call and failed to arrange to have
787 1.1 christos * the circuit closed or the server has got
788 1.1 christos * itself confused, then drop the packet and
789 1.1 christos * wait for the correct one.
790 1.1 christos */
791 1.1 christos if (hp->id != anhp->id) {
792 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
793 1.1 christos (statp->pfcode & RES_PRF_REPLY),
794 1.1 christos (stdout, ";; old answer (unexpected):\n"),
795 1.1 christos ans, (resplen > anssiz) ? anssiz: resplen);
796 1.1 christos goto read_len;
797 1.1 christos }
798 1.1 christos
799 1.1 christos /*
800 1.1 christos * All is well, or the error is fatal. Signal that the
801 1.1 christos * next nameserver ought not be tried.
802 1.1 christos */
803 1.1 christos return (resplen);
804 1.1 christos }
805 1.1 christos
806 1.1 christos static int
807 1.10 christos send_dg(res_state statp, const u_char *buf, int buflen, u_char *ans,
808 1.14 christos int anssiz, int *terrno, int ns, int tries, int *v_circuit,
809 1.10 christos int *gotsomewhere)
810 1.1 christos {
811 1.2 christos const HEADER *hp = (const HEADER *)(const void *)buf;
812 1.2 christos HEADER *anhp = (HEADER *)(void *)ans;
813 1.1 christos const struct sockaddr *nsap;
814 1.1 christos int nsaplen;
815 1.1 christos struct timespec now, timeout, finish;
816 1.1 christos struct sockaddr_storage from;
817 1.1 christos ISC_SOCKLEN_T fromlen;
818 1.1 christos int resplen, seconds, n, s;
819 1.10 christos #ifdef USE_POLL
820 1.10 christos int polltimeout;
821 1.10 christos struct pollfd pollfd;
822 1.10 christos #else
823 1.10 christos fd_set dsmask;
824 1.10 christos #endif
825 1.1 christos
826 1.2 christos nsap = get_nsaddr(statp, (size_t)ns);
827 1.1 christos nsaplen = get_salen(nsap);
828 1.1 christos if (EXT(statp).nssocks[ns] == -1) {
829 1.1 christos EXT(statp).nssocks[ns] = socket(nsap->sa_family, SOCK_DGRAM, 0);
830 1.1 christos if (EXT(statp).nssocks[ns] > highestFD) {
831 1.1 christos res_nclose(statp);
832 1.1 christos errno = ENOTSOCK;
833 1.1 christos }
834 1.1 christos if (EXT(statp).nssocks[ns] < 0) {
835 1.1 christos switch (errno) {
836 1.1 christos case EPROTONOSUPPORT:
837 1.1 christos #ifdef EPFNOSUPPORT
838 1.1 christos case EPFNOSUPPORT:
839 1.1 christos #endif
840 1.1 christos case EAFNOSUPPORT:
841 1.1 christos Perror(statp, stderr, "socket(dg)", errno);
842 1.1 christos return (0);
843 1.1 christos default:
844 1.1 christos *terrno = errno;
845 1.1 christos Perror(statp, stderr, "socket(dg)", errno);
846 1.1 christos return (-1);
847 1.1 christos }
848 1.1 christos }
849 1.1 christos #ifndef CANNOT_CONNECT_DGRAM
850 1.1 christos /*
851 1.1 christos * On a 4.3BSD+ machine (client and server,
852 1.1 christos * actually), sending to a nameserver datagram
853 1.1 christos * port with no nameserver will cause an
854 1.1 christos * ICMP port unreachable message to be returned.
855 1.1 christos * If our datagram socket is "connected" to the
856 1.1 christos * server, we get an ECONNREFUSED error on the next
857 1.1 christos * socket operation, and select returns if the
858 1.1 christos * error message is received. We can thus detect
859 1.1 christos * the absence of a nameserver without timing out.
860 1.1 christos */
861 1.2 christos if (connect(EXT(statp).nssocks[ns], nsap, (socklen_t)nsaplen) < 0) {
862 1.1 christos Aerror(statp, stderr, "connect(dg)", errno, nsap,
863 1.1 christos nsaplen);
864 1.1 christos res_nclose(statp);
865 1.1 christos return (0);
866 1.1 christos }
867 1.1 christos #endif /* !CANNOT_CONNECT_DGRAM */
868 1.1 christos Dprint(statp->options & RES_DEBUG,
869 1.1 christos (stdout, ";; new DG socket\n"))
870 1.1 christos }
871 1.1 christos s = EXT(statp).nssocks[ns];
872 1.1 christos #ifndef CANNOT_CONNECT_DGRAM
873 1.2 christos if (send(s, (const char*)buf, (size_t)buflen, 0) != buflen) {
874 1.1 christos Perror(statp, stderr, "send", errno);
875 1.1 christos res_nclose(statp);
876 1.1 christos return (0);
877 1.1 christos }
878 1.1 christos #else /* !CANNOT_CONNECT_DGRAM */
879 1.1 christos if (sendto(s, (const char*)buf, buflen, 0, nsap, nsaplen) != buflen)
880 1.1 christos {
881 1.1 christos Aerror(statp, stderr, "sendto", errno, nsap, nsaplen);
882 1.1 christos res_nclose(statp);
883 1.1 christos return (0);
884 1.1 christos }
885 1.1 christos #endif /* !CANNOT_CONNECT_DGRAM */
886 1.1 christos
887 1.1 christos /*
888 1.1 christos * Wait for reply.
889 1.1 christos */
890 1.14 christos seconds = (statp->retrans << tries);
891 1.1 christos if (ns > 0)
892 1.1 christos seconds /= statp->nscount;
893 1.1 christos if (seconds <= 0)
894 1.1 christos seconds = 1;
895 1.1 christos now = evNowTime();
896 1.3 christos timeout = evConsTime((long)seconds, 0L);
897 1.1 christos finish = evAddTime(now, timeout);
898 1.1 christos goto nonow;
899 1.1 christos wait:
900 1.1 christos now = evNowTime();
901 1.1 christos nonow:
902 1.10 christos #ifndef USE_POLL
903 1.1 christos FD_ZERO(&dsmask);
904 1.1 christos FD_SET(s, &dsmask);
905 1.1 christos if (evCmpTime(finish, now) > 0)
906 1.1 christos timeout = evSubTime(finish, now);
907 1.1 christos else
908 1.3 christos timeout = evConsTime(0L, 0L);
909 1.1 christos n = pselect(s + 1, &dsmask, NULL, NULL, &timeout, NULL);
910 1.10 christos #else
911 1.10 christos timeout = evSubTime(finish, now);
912 1.10 christos if (timeout.tv_sec < 0)
913 1.11 christos timeout = evConsTime(0L, 0L);
914 1.10 christos polltimeout = 1000*timeout.tv_sec +
915 1.10 christos timeout.tv_nsec/1000000;
916 1.10 christos pollfd.fd = s;
917 1.10 christos pollfd.events = POLLRDNORM;
918 1.10 christos n = poll(&pollfd, 1, polltimeout);
919 1.10 christos #endif /* USE_POLL */
920 1.10 christos
921 1.1 christos if (n == 0) {
922 1.1 christos Dprint(statp->options & RES_DEBUG, (stdout, ";; timeout\n"));
923 1.1 christos *gotsomewhere = 1;
924 1.1 christos return (0);
925 1.1 christos }
926 1.1 christos if (n < 0) {
927 1.1 christos if (errno == EINTR)
928 1.1 christos goto wait;
929 1.10 christos #ifndef USE_POLL
930 1.1 christos Perror(statp, stderr, "select", errno);
931 1.10 christos #else
932 1.10 christos Perror(statp, stderr, "poll", errno);
933 1.10 christos #endif /* USE_POLL */
934 1.1 christos res_nclose(statp);
935 1.1 christos return (0);
936 1.1 christos }
937 1.1 christos errno = 0;
938 1.1 christos fromlen = sizeof(from);
939 1.2 christos resplen = recvfrom(s, (char*)ans, (size_t)anssiz,0,
940 1.2 christos (struct sockaddr *)(void *)&from, &fromlen);
941 1.1 christos if (resplen <= 0) {
942 1.1 christos Perror(statp, stderr, "recvfrom", errno);
943 1.1 christos res_nclose(statp);
944 1.1 christos return (0);
945 1.1 christos }
946 1.1 christos *gotsomewhere = 1;
947 1.1 christos if (resplen < HFIXEDSZ) {
948 1.1 christos /*
949 1.1 christos * Undersized message.
950 1.1 christos */
951 1.1 christos Dprint(statp->options & RES_DEBUG,
952 1.1 christos (stdout, ";; undersized: %d\n",
953 1.1 christos resplen));
954 1.1 christos *terrno = EMSGSIZE;
955 1.1 christos res_nclose(statp);
956 1.1 christos return (0);
957 1.1 christos }
958 1.1 christos if (hp->id != anhp->id) {
959 1.1 christos /*
960 1.1 christos * response from old query, ignore it.
961 1.1 christos * XXX - potential security hazard could
962 1.1 christos * be detected here.
963 1.1 christos */
964 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
965 1.1 christos (statp->pfcode & RES_PRF_REPLY),
966 1.1 christos (stdout, ";; old answer:\n"),
967 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
968 1.1 christos goto wait;
969 1.1 christos }
970 1.1 christos if (!(statp->options & RES_INSECURE1) &&
971 1.2 christos !res_ourserver_p(statp, (struct sockaddr *)(void *)&from)) {
972 1.1 christos /*
973 1.1 christos * response from wrong server? ignore it.
974 1.1 christos * XXX - potential security hazard could
975 1.1 christos * be detected here.
976 1.1 christos */
977 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
978 1.1 christos (statp->pfcode & RES_PRF_REPLY),
979 1.1 christos (stdout, ";; not our server:\n"),
980 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
981 1.1 christos goto wait;
982 1.1 christos }
983 1.1 christos #ifdef RES_USE_EDNS0
984 1.1 christos if (anhp->rcode == FORMERR && (statp->options & RES_USE_EDNS0) != 0U) {
985 1.1 christos /*
986 1.1 christos * Do not retry if the server do not understand EDNS0.
987 1.1 christos * The case has to be captured here, as FORMERR packet do not
988 1.1 christos * carry query section, hence res_queriesmatch() returns 0.
989 1.1 christos */
990 1.1 christos DprintQ(statp->options & RES_DEBUG,
991 1.1 christos (stdout, "server rejected query with EDNS0:\n"),
992 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
993 1.1 christos /* record the error */
994 1.1 christos statp->_flags |= RES_F_EDNS0ERR;
995 1.1 christos res_nclose(statp);
996 1.1 christos return (0);
997 1.1 christos }
998 1.1 christos #endif
999 1.1 christos if (!(statp->options & RES_INSECURE2) &&
1000 1.1 christos !res_queriesmatch(buf, buf + buflen,
1001 1.1 christos ans, ans + anssiz)) {
1002 1.1 christos /*
1003 1.1 christos * response contains wrong query? ignore it.
1004 1.1 christos * XXX - potential security hazard could
1005 1.1 christos * be detected here.
1006 1.1 christos */
1007 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
1008 1.1 christos (statp->pfcode & RES_PRF_REPLY),
1009 1.1 christos (stdout, ";; wrong query name:\n"),
1010 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
1011 1.1 christos goto wait;
1012 1.1 christos }
1013 1.1 christos if (anhp->rcode == SERVFAIL ||
1014 1.1 christos anhp->rcode == NOTIMP ||
1015 1.1 christos anhp->rcode == REFUSED) {
1016 1.1 christos DprintQ(statp->options & RES_DEBUG,
1017 1.1 christos (stdout, "server rejected query:\n"),
1018 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
1019 1.1 christos res_nclose(statp);
1020 1.1 christos /* don't retry if called from dig */
1021 1.1 christos if (!statp->pfcode)
1022 1.1 christos return (0);
1023 1.1 christos }
1024 1.1 christos if (!(statp->options & RES_IGNTC) && anhp->tc) {
1025 1.1 christos /*
1026 1.1 christos * To get the rest of answer,
1027 1.1 christos * use TCP with same server.
1028 1.1 christos */
1029 1.1 christos Dprint(statp->options & RES_DEBUG,
1030 1.1 christos (stdout, ";; truncated answer\n"));
1031 1.1 christos *v_circuit = 1;
1032 1.1 christos res_nclose(statp);
1033 1.1 christos return (1);
1034 1.1 christos }
1035 1.1 christos /*
1036 1.1 christos * All is well, or the error is fatal. Signal that the
1037 1.1 christos * next nameserver ought not be tried.
1038 1.1 christos */
1039 1.1 christos return (resplen);
1040 1.1 christos }
1041 1.1 christos
1042 1.1 christos static void
1043 1.1 christos Aerror(const res_state statp, FILE *file, const char *string, int error,
1044 1.1 christos const struct sockaddr *address, int alen)
1045 1.1 christos {
1046 1.1 christos int save = errno;
1047 1.1 christos char hbuf[NI_MAXHOST];
1048 1.1 christos char sbuf[NI_MAXSERV];
1049 1.1 christos
1050 1.1 christos alen = alen;
1051 1.1 christos
1052 1.1 christos if ((statp->options & RES_DEBUG) != 0U) {
1053 1.2 christos if (getnameinfo(address, (socklen_t)alen, hbuf, sizeof(hbuf),
1054 1.1 christos sbuf, sizeof(sbuf), niflags)) {
1055 1.1 christos strncpy(hbuf, "?", sizeof(hbuf) - 1);
1056 1.1 christos hbuf[sizeof(hbuf) - 1] = '\0';
1057 1.1 christos strncpy(sbuf, "?", sizeof(sbuf) - 1);
1058 1.1 christos sbuf[sizeof(sbuf) - 1] = '\0';
1059 1.1 christos }
1060 1.1 christos fprintf(file, "res_send: %s ([%s].%s): %s\n",
1061 1.1 christos string, hbuf, sbuf, strerror(error));
1062 1.1 christos }
1063 1.1 christos errno = save;
1064 1.1 christos }
1065 1.1 christos
1066 1.1 christos static void
1067 1.1 christos Perror(const res_state statp, FILE *file, const char *string, int error) {
1068 1.1 christos int save = errno;
1069 1.1 christos
1070 1.1 christos if ((statp->options & RES_DEBUG) != 0U)
1071 1.1 christos fprintf(file, "res_send: %s: %s\n",
1072 1.1 christos string, strerror(error));
1073 1.1 christos errno = save;
1074 1.1 christos }
1075 1.1 christos
1076 1.1 christos static int
1077 1.1 christos sock_eq(struct sockaddr *a, struct sockaddr *b) {
1078 1.1 christos struct sockaddr_in *a4, *b4;
1079 1.1 christos struct sockaddr_in6 *a6, *b6;
1080 1.1 christos
1081 1.1 christos if (a->sa_family != b->sa_family)
1082 1.1 christos return 0;
1083 1.1 christos switch (a->sa_family) {
1084 1.1 christos case AF_INET:
1085 1.2 christos a4 = (struct sockaddr_in *)(void *)a;
1086 1.2 christos b4 = (struct sockaddr_in *)(void *)b;
1087 1.1 christos return a4->sin_port == b4->sin_port &&
1088 1.1 christos a4->sin_addr.s_addr == b4->sin_addr.s_addr;
1089 1.1 christos case AF_INET6:
1090 1.2 christos a6 = (struct sockaddr_in6 *)(void *)a;
1091 1.2 christos b6 = (struct sockaddr_in6 *)(void *)b;
1092 1.1 christos return a6->sin6_port == b6->sin6_port &&
1093 1.1 christos #ifdef HAVE_SIN6_SCOPE_ID
1094 1.1 christos a6->sin6_scope_id == b6->sin6_scope_id &&
1095 1.1 christos #endif
1096 1.1 christos IN6_ARE_ADDR_EQUAL(&a6->sin6_addr, &b6->sin6_addr);
1097 1.1 christos default:
1098 1.1 christos return 0;
1099 1.1 christos }
1100 1.1 christos }
1101 1.1 christos
1102 1.10 christos #if defined(NEED_PSELECT) && !defined(USE_POLL)
1103 1.1 christos /* XXX needs to move to the porting library. */
1104 1.1 christos static int
1105 1.1 christos pselect(int nfds, void *rfds, void *wfds, void *efds,
1106 1.1 christos struct timespec *tsp, const sigset_t *sigmask)
1107 1.1 christos {
1108 1.1 christos struct timeval tv, *tvp;
1109 1.1 christos sigset_t sigs;
1110 1.1 christos int n;
1111 1.1 christos
1112 1.1 christos if (tsp) {
1113 1.1 christos tvp = &tv;
1114 1.1 christos tv = evTimeVal(*tsp);
1115 1.1 christos } else
1116 1.1 christos tvp = NULL;
1117 1.1 christos if (sigmask)
1118 1.1 christos sigprocmask(SIG_SETMASK, sigmask, &sigs);
1119 1.1 christos n = select(nfds, rfds, wfds, efds, tvp);
1120 1.1 christos if (sigmask)
1121 1.1 christos sigprocmask(SIG_SETMASK, &sigs, NULL);
1122 1.1 christos if (tsp)
1123 1.1 christos *tsp = evTimeSpec(tv);
1124 1.1 christos return (n);
1125 1.1 christos }
1126 1.1 christos #endif
1127