Home | History | Annotate | Line # | Download | only in resolv
res_send.c revision 1.3
      1  1.3  christos /*	$NetBSD: res_send.c,v 1.3 2004/05/20 19:31:52 christos Exp $	*/
      2  1.1  christos 
      3  1.1  christos /*
      4  1.1  christos  * Copyright (c) 1985, 1989, 1993
      5  1.1  christos  *    The Regents of the University of California.  All rights reserved.
      6  1.1  christos  *
      7  1.1  christos  * Redistribution and use in source and binary forms, with or without
      8  1.1  christos  * modification, are permitted provided that the following conditions
      9  1.1  christos  * are met:
     10  1.1  christos  * 1. Redistributions of source code must retain the above copyright
     11  1.1  christos  *    notice, this list of conditions and the following disclaimer.
     12  1.1  christos  * 2. Redistributions in binary form must reproduce the above copyright
     13  1.1  christos  *    notice, this list of conditions and the following disclaimer in the
     14  1.1  christos  *    documentation and/or other materials provided with the distribution.
     15  1.1  christos  * 3. All advertising materials mentioning features or use of this software
     16  1.1  christos  *    must display the following acknowledgement:
     17  1.1  christos  * 	This product includes software developed by the University of
     18  1.1  christos  * 	California, Berkeley and its contributors.
     19  1.1  christos  * 4. Neither the name of the University nor the names of its contributors
     20  1.1  christos  *    may be used to endorse or promote products derived from this software
     21  1.1  christos  *    without specific prior written permission.
     22  1.1  christos  *
     23  1.1  christos  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     24  1.1  christos  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     25  1.1  christos  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     26  1.1  christos  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     27  1.1  christos  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     28  1.1  christos  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     29  1.1  christos  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     30  1.1  christos  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     31  1.1  christos  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     32  1.1  christos  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     33  1.1  christos  * SUCH DAMAGE.
     34  1.1  christos  */
     35  1.1  christos 
     36  1.1  christos /*
     37  1.1  christos  * Portions Copyright (c) 1993 by Digital Equipment Corporation.
     38  1.1  christos  *
     39  1.1  christos  * Permission to use, copy, modify, and distribute this software for any
     40  1.1  christos  * purpose with or without fee is hereby granted, provided that the above
     41  1.1  christos  * copyright notice and this permission notice appear in all copies, and that
     42  1.1  christos  * the name of Digital Equipment Corporation not be used in advertising or
     43  1.1  christos  * publicity pertaining to distribution of the document or software without
     44  1.1  christos  * specific, written prior permission.
     45  1.1  christos  *
     46  1.1  christos  * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
     47  1.1  christos  * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
     48  1.1  christos  * OF MERCHANTABILITY AND FITNESS.   IN NO EVENT SHALL DIGITAL EQUIPMENT
     49  1.1  christos  * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
     50  1.1  christos  * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
     51  1.1  christos  * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
     52  1.1  christos  * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
     53  1.1  christos  * SOFTWARE.
     54  1.1  christos  */
     55  1.1  christos 
     56  1.1  christos /*
     57  1.1  christos  * Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")
     58  1.1  christos  * Portions Copyright (c) 1996-1999 by Internet Software Consortium.
     59  1.1  christos  *
     60  1.1  christos  * Permission to use, copy, modify, and distribute this software for any
     61  1.1  christos  * purpose with or without fee is hereby granted, provided that the above
     62  1.1  christos  * copyright notice and this permission notice appear in all copies.
     63  1.1  christos  *
     64  1.1  christos  * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES
     65  1.1  christos  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
     66  1.1  christos  * MERCHANTABILITY AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR
     67  1.1  christos  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
     68  1.1  christos  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
     69  1.1  christos  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
     70  1.1  christos  * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
     71  1.1  christos  */
     72  1.1  christos 
     73  1.1  christos #if defined(LIBC_SCCS) && !defined(lint)
     74  1.1  christos static const char sccsid[] = "@(#)res_send.c	8.1 (Berkeley) 6/4/93";
     75  1.1  christos static const char rcsid[] = "Id: res_send.c,v 1.5.2.2.4.3 2004/04/12 06:54:59 marka Exp";
     76  1.1  christos #endif /* LIBC_SCCS and not lint */
     77  1.1  christos 
     78  1.1  christos /*
     79  1.1  christos  * Send query to name server and wait for reply.
     80  1.1  christos  */
     81  1.1  christos 
     82  1.1  christos #include "port_before.h"
     83  1.1  christos #include "fd_setsize.h"
     84  1.1  christos 
     85  1.1  christos #include <sys/types.h>
     86  1.1  christos #include <sys/param.h>
     87  1.1  christos #include <sys/time.h>
     88  1.1  christos #include <sys/socket.h>
     89  1.1  christos #include <sys/uio.h>
     90  1.1  christos 
     91  1.1  christos #include <netinet/in.h>
     92  1.1  christos #include <arpa/nameser.h>
     93  1.1  christos #include <arpa/inet.h>
     94  1.1  christos 
     95  1.1  christos #include <errno.h>
     96  1.1  christos #include <netdb.h>
     97  1.1  christos #include <resolv.h>
     98  1.1  christos #include <signal.h>
     99  1.1  christos #include <stdio.h>
    100  1.1  christos #include <stdlib.h>
    101  1.1  christos #include <string.h>
    102  1.1  christos #include <unistd.h>
    103  1.1  christos 
    104  1.1  christos #include <isc/eventlib.h>
    105  1.1  christos 
    106  1.1  christos #include "port_after.h"
    107  1.1  christos 
    108  1.1  christos /* Options.  Leave them on. */
    109  1.1  christos #define DEBUG
    110  1.1  christos #include "res_debug.h"
    111  1.1  christos #include "res_private.h"
    112  1.1  christos 
    113  1.1  christos #define EXT(res) ((res)->_u._ext)
    114  1.1  christos 
    115  1.1  christos static const int highestFD = FD_SETSIZE - 1;
    116  1.1  christos 
    117  1.1  christos /* Forward. */
    118  1.1  christos 
    119  1.1  christos static int		get_salen __P((const struct sockaddr *));
    120  1.1  christos static struct sockaddr * get_nsaddr __P((res_state, size_t));
    121  1.1  christos static int		send_vc(res_state, const u_char *, int,
    122  1.1  christos 				u_char *, int, int *, int);
    123  1.1  christos static int		send_dg(res_state, const u_char *, int,
    124  1.1  christos 				u_char *, int, int *, int,
    125  1.1  christos 				int *, int *);
    126  1.1  christos static void		Aerror(const res_state, FILE *, const char *, int,
    127  1.1  christos 			       const struct sockaddr *, int);
    128  1.1  christos static void		Perror(const res_state, FILE *, const char *, int);
    129  1.1  christos static int		sock_eq(struct sockaddr *, struct sockaddr *);
    130  1.1  christos #ifdef NEED_PSELECT
    131  1.1  christos static int		pselect(int, void *, void *, void *,
    132  1.1  christos 				struct timespec *,
    133  1.1  christos 				const sigset_t *);
    134  1.1  christos #endif
    135  1.1  christos void res_pquery(const res_state, const u_char *, int, FILE *);
    136  1.1  christos 
    137  1.1  christos static const int niflags = NI_NUMERICHOST | NI_NUMERICSERV;
    138  1.1  christos 
    139  1.1  christos /* Public. */
    140  1.1  christos 
    141  1.1  christos /* int
    142  1.1  christos  * res_isourserver(ina)
    143  1.1  christos  *	looks up "ina" in _res.ns_addr_list[]
    144  1.1  christos  * returns:
    145  1.1  christos  *	0  : not found
    146  1.1  christos  *	>0 : found
    147  1.1  christos  * author:
    148  1.1  christos  *	paul vixie, 29may94
    149  1.1  christos  */
    150  1.1  christos int
    151  1.1  christos res_ourserver_p(const res_state statp, const struct sockaddr *sa) {
    152  1.1  christos 	const struct sockaddr_in *inp, *srv;
    153  1.1  christos 	const struct sockaddr_in6 *in6p, *srv6;
    154  1.1  christos 	int ns;
    155  1.1  christos 
    156  1.1  christos 	switch (sa->sa_family) {
    157  1.1  christos 	case AF_INET:
    158  1.3  christos 		inp = (const struct sockaddr_in *)(const void *)sa;
    159  1.1  christos 		for (ns = 0;  ns < statp->nscount;  ns++) {
    160  1.2  christos 			srv = (struct sockaddr_in *)(void *)get_nsaddr(statp, (size_t)ns);
    161  1.1  christos 			if (srv->sin_family == inp->sin_family &&
    162  1.1  christos 			    srv->sin_port == inp->sin_port &&
    163  1.1  christos 			    (srv->sin_addr.s_addr == INADDR_ANY ||
    164  1.1  christos 			     srv->sin_addr.s_addr == inp->sin_addr.s_addr))
    165  1.1  christos 				return (1);
    166  1.1  christos 		}
    167  1.1  christos 		break;
    168  1.1  christos 	case AF_INET6:
    169  1.1  christos 		if (EXT(statp).ext == NULL)
    170  1.1  christos 			break;
    171  1.3  christos 		in6p = (const struct sockaddr_in6 *)(const void *)sa;
    172  1.1  christos 		for (ns = 0;  ns < statp->nscount;  ns++) {
    173  1.2  christos 			srv6 = (struct sockaddr_in6 *)(void *)get_nsaddr(statp, (size_t)ns);
    174  1.1  christos 			if (srv6->sin6_family == in6p->sin6_family &&
    175  1.1  christos 			    srv6->sin6_port == in6p->sin6_port &&
    176  1.1  christos #ifdef HAVE_SIN6_SCOPE_ID
    177  1.1  christos 			    srv6->sin6_scope_id == in6p->sin6_scope_id &&
    178  1.1  christos #endif
    179  1.1  christos 			    (IN6_IS_ADDR_UNSPECIFIED(&srv6->sin6_addr) ||
    180  1.1  christos 			     IN6_ARE_ADDR_EQUAL(&srv6->sin6_addr, &in6p->sin6_addr)))
    181  1.1  christos 				return (1);
    182  1.1  christos 		}
    183  1.1  christos 		break;
    184  1.1  christos 	default:
    185  1.1  christos 		break;
    186  1.1  christos 	}
    187  1.1  christos 	return (0);
    188  1.1  christos }
    189  1.1  christos 
    190  1.1  christos /* int
    191  1.1  christos  * res_nameinquery(name, type, class, buf, eom)
    192  1.1  christos  *	look for (name,type,class) in the query section of packet (buf,eom)
    193  1.1  christos  * requires:
    194  1.1  christos  *	buf + HFIXEDSZ <= eom
    195  1.1  christos  * returns:
    196  1.1  christos  *	-1 : format error
    197  1.1  christos  *	0  : not found
    198  1.1  christos  *	>0 : found
    199  1.1  christos  * author:
    200  1.1  christos  *	paul vixie, 29may94
    201  1.1  christos  */
    202  1.1  christos int
    203  1.1  christos res_nameinquery(const char *name, int type, int class,
    204  1.1  christos 		const u_char *buf, const u_char *eom)
    205  1.1  christos {
    206  1.1  christos 	const u_char *cp = buf + HFIXEDSZ;
    207  1.2  christos 	int qdcount = ntohs(((const HEADER*)(const void *)buf)->qdcount);
    208  1.1  christos 
    209  1.1  christos 	while (qdcount-- > 0) {
    210  1.1  christos 		char tname[MAXDNAME+1];
    211  1.1  christos 		int n, ttype, tclass;
    212  1.1  christos 
    213  1.1  christos 		n = dn_expand(buf, eom, cp, tname, sizeof tname);
    214  1.1  christos 		if (n < 0)
    215  1.1  christos 			return (-1);
    216  1.1  christos 		cp += n;
    217  1.1  christos 		if (cp + 2 * INT16SZ > eom)
    218  1.1  christos 			return (-1);
    219  1.1  christos 		ttype = ns_get16(cp); cp += INT16SZ;
    220  1.1  christos 		tclass = ns_get16(cp); cp += INT16SZ;
    221  1.1  christos 		if (ttype == type && tclass == class &&
    222  1.1  christos 		    ns_samename(tname, name) == 1)
    223  1.1  christos 			return (1);
    224  1.1  christos 	}
    225  1.1  christos 	return (0);
    226  1.1  christos }
    227  1.1  christos 
    228  1.1  christos /* int
    229  1.1  christos  * res_queriesmatch(buf1, eom1, buf2, eom2)
    230  1.1  christos  *	is there a 1:1 mapping of (name,type,class)
    231  1.1  christos  *	in (buf1,eom1) and (buf2,eom2)?
    232  1.1  christos  * returns:
    233  1.1  christos  *	-1 : format error
    234  1.1  christos  *	0  : not a 1:1 mapping
    235  1.1  christos  *	>0 : is a 1:1 mapping
    236  1.1  christos  * author:
    237  1.1  christos  *	paul vixie, 29may94
    238  1.1  christos  */
    239  1.1  christos int
    240  1.1  christos res_queriesmatch(const u_char *buf1, const u_char *eom1,
    241  1.1  christos 		 const u_char *buf2, const u_char *eom2)
    242  1.1  christos {
    243  1.1  christos 	const u_char *cp = buf1 + HFIXEDSZ;
    244  1.2  christos 	int qdcount = ntohs(((const HEADER*)(const void *)buf1)->qdcount);
    245  1.1  christos 
    246  1.1  christos 	if (buf1 + HFIXEDSZ > eom1 || buf2 + HFIXEDSZ > eom2)
    247  1.1  christos 		return (-1);
    248  1.1  christos 
    249  1.1  christos 	/*
    250  1.1  christos 	 * Only header section present in replies to
    251  1.1  christos 	 * dynamic update packets.
    252  1.1  christos 	 */
    253  1.2  christos 	if ((((const HEADER *)(const void *)buf1)->opcode == ns_o_update) &&
    254  1.2  christos 	    (((const HEADER *)(const void *)buf2)->opcode == ns_o_update))
    255  1.1  christos 		return (1);
    256  1.1  christos 
    257  1.2  christos 	if (qdcount != ntohs(((const HEADER*)(const void *)buf2)->qdcount))
    258  1.1  christos 		return (0);
    259  1.1  christos 	while (qdcount-- > 0) {
    260  1.1  christos 		char tname[MAXDNAME+1];
    261  1.1  christos 		int n, ttype, tclass;
    262  1.1  christos 
    263  1.1  christos 		n = dn_expand(buf1, eom1, cp, tname, sizeof tname);
    264  1.1  christos 		if (n < 0)
    265  1.1  christos 			return (-1);
    266  1.1  christos 		cp += n;
    267  1.1  christos 		if (cp + 2 * INT16SZ > eom1)
    268  1.1  christos 			return (-1);
    269  1.1  christos 		ttype = ns_get16(cp);	cp += INT16SZ;
    270  1.1  christos 		tclass = ns_get16(cp); cp += INT16SZ;
    271  1.1  christos 		if (!res_nameinquery(tname, ttype, tclass, buf2, eom2))
    272  1.1  christos 			return (0);
    273  1.1  christos 	}
    274  1.1  christos 	return (1);
    275  1.1  christos }
    276  1.1  christos 
    277  1.1  christos int
    278  1.1  christos res_nsend(res_state statp,
    279  1.1  christos 	  const u_char *buf, int buflen, u_char *ans, int anssiz)
    280  1.1  christos {
    281  1.1  christos 	int gotsomewhere, terrno, try, v_circuit, resplen, ns, n;
    282  1.1  christos 	char abuf[NI_MAXHOST];
    283  1.1  christos 
    284  1.1  christos 	if (statp->nscount == 0) {
    285  1.1  christos 		errno = ESRCH;
    286  1.1  christos 		return (-1);
    287  1.1  christos 	}
    288  1.1  christos 	if (anssiz < HFIXEDSZ) {
    289  1.1  christos 		errno = EINVAL;
    290  1.1  christos 		return (-1);
    291  1.1  christos 	}
    292  1.1  christos 	DprintQ((statp->options & RES_DEBUG) || (statp->pfcode & RES_PRF_QUERY),
    293  1.1  christos 		(stdout, ";; res_send()\n"), buf, buflen);
    294  1.1  christos 	v_circuit = (statp->options & RES_USEVC) || buflen > PACKETSZ;
    295  1.1  christos 	gotsomewhere = 0;
    296  1.1  christos 	terrno = ETIMEDOUT;
    297  1.1  christos 
    298  1.1  christos 	/*
    299  1.1  christos 	 * If the ns_addr_list in the resolver context has changed, then
    300  1.1  christos 	 * invalidate our cached copy and the associated timing data.
    301  1.1  christos 	 */
    302  1.1  christos 	if (EXT(statp).nscount != 0) {
    303  1.1  christos 		int needclose = 0;
    304  1.1  christos 		struct sockaddr_storage peer;
    305  1.1  christos 		ISC_SOCKLEN_T peerlen;
    306  1.1  christos 
    307  1.1  christos 		if (EXT(statp).nscount != statp->nscount)
    308  1.1  christos 			needclose++;
    309  1.1  christos 		else
    310  1.1  christos 			for (ns = 0; ns < statp->nscount; ns++) {
    311  1.1  christos 				if (statp->nsaddr_list[ns].sin_family &&
    312  1.2  christos 				    !sock_eq((struct sockaddr *)(void *)&statp->nsaddr_list[ns],
    313  1.2  christos 					     (struct sockaddr *)(void *)&EXT(statp).ext->nsaddrs[ns])) {
    314  1.1  christos 					needclose++;
    315  1.1  christos 					break;
    316  1.1  christos 				}
    317  1.1  christos 
    318  1.1  christos 				if (EXT(statp).nssocks[ns] == -1)
    319  1.1  christos 					continue;
    320  1.1  christos 				peerlen = sizeof(peer);
    321  1.1  christos 				if (getsockname(EXT(statp).nssocks[ns],
    322  1.2  christos 				    (struct sockaddr *)(void *)&peer, &peerlen) < 0) {
    323  1.1  christos 					needclose++;
    324  1.1  christos 					break;
    325  1.1  christos 				}
    326  1.2  christos 				if (!sock_eq((struct sockaddr *)(void *)&peer,
    327  1.2  christos 				    get_nsaddr(statp, (size_t)ns))) {
    328  1.1  christos 					needclose++;
    329  1.1  christos 					break;
    330  1.1  christos 				}
    331  1.1  christos 			}
    332  1.1  christos 		if (needclose) {
    333  1.1  christos 			res_nclose(statp);
    334  1.1  christos 			EXT(statp).nscount = 0;
    335  1.1  christos 		}
    336  1.1  christos 	}
    337  1.1  christos 
    338  1.1  christos 	/*
    339  1.1  christos 	 * Maybe initialize our private copy of the ns_addr_list.
    340  1.1  christos 	 */
    341  1.1  christos 	if (EXT(statp).nscount == 0) {
    342  1.1  christos 		for (ns = 0; ns < statp->nscount; ns++) {
    343  1.1  christos 			EXT(statp).nstimes[ns] = RES_MAXTIME;
    344  1.1  christos 			EXT(statp).nssocks[ns] = -1;
    345  1.1  christos 			if (!statp->nsaddr_list[ns].sin_family)
    346  1.1  christos 				continue;
    347  1.1  christos 			EXT(statp).ext->nsaddrs[ns].sin =
    348  1.1  christos 				 statp->nsaddr_list[ns];
    349  1.1  christos 		}
    350  1.1  christos 		EXT(statp).nscount = statp->nscount;
    351  1.1  christos 	}
    352  1.1  christos 
    353  1.1  christos 	/*
    354  1.1  christos 	 * Some resolvers want to even out the load on their nameservers.
    355  1.1  christos 	 * Note that RES_BLAST overrides RES_ROTATE.
    356  1.1  christos 	 */
    357  1.1  christos 	if ((statp->options & RES_ROTATE) != 0U &&
    358  1.1  christos 	    (statp->options & RES_BLAST) == 0U) {
    359  1.1  christos 		union res_sockaddr_union inu;
    360  1.1  christos 		struct sockaddr_in ina;
    361  1.1  christos 		int lastns = statp->nscount - 1;
    362  1.1  christos 		int fd;
    363  1.1  christos 		u_int16_t nstime;
    364  1.1  christos 
    365  1.1  christos 		if (EXT(statp).ext != NULL)
    366  1.1  christos 			inu = EXT(statp).ext->nsaddrs[0];
    367  1.1  christos 		ina = statp->nsaddr_list[0];
    368  1.1  christos 		fd = EXT(statp).nssocks[0];
    369  1.1  christos 		nstime = EXT(statp).nstimes[0];
    370  1.1  christos 		for (ns = 0; ns < lastns; ns++) {
    371  1.1  christos 			if (EXT(statp).ext != NULL)
    372  1.1  christos                                 EXT(statp).ext->nsaddrs[ns] =
    373  1.1  christos 					EXT(statp).ext->nsaddrs[ns + 1];
    374  1.1  christos 			statp->nsaddr_list[ns] = statp->nsaddr_list[ns + 1];
    375  1.1  christos 			EXT(statp).nssocks[ns] = EXT(statp).nssocks[ns + 1];
    376  1.1  christos 			EXT(statp).nstimes[ns] = EXT(statp).nstimes[ns + 1];
    377  1.1  christos 		}
    378  1.1  christos 		if (EXT(statp).ext != NULL)
    379  1.1  christos 			EXT(statp).ext->nsaddrs[lastns] = inu;
    380  1.1  christos 		statp->nsaddr_list[lastns] = ina;
    381  1.1  christos 		EXT(statp).nssocks[lastns] = fd;
    382  1.1  christos 		EXT(statp).nstimes[lastns] = nstime;
    383  1.1  christos 	}
    384  1.1  christos 
    385  1.1  christos 	/*
    386  1.1  christos 	 * Send request, RETRY times, or until successful.
    387  1.1  christos 	 */
    388  1.1  christos 	for (try = 0; try < statp->retry; try++) {
    389  1.1  christos 	    for (ns = 0; ns < statp->nscount; ns++) {
    390  1.1  christos 		struct sockaddr *nsap;
    391  1.1  christos 		int nsaplen;
    392  1.2  christos 		nsap = get_nsaddr(statp, (size_t)ns);
    393  1.1  christos 		nsaplen = get_salen(nsap);
    394  1.1  christos 		statp->_flags &= ~RES_F_LASTMASK;
    395  1.1  christos 		statp->_flags |= (ns << RES_F_LASTSHIFT);
    396  1.1  christos  same_ns:
    397  1.1  christos 		if (statp->qhook) {
    398  1.1  christos 			int done = 0, loops = 0;
    399  1.1  christos 
    400  1.1  christos 			do {
    401  1.1  christos 				res_sendhookact act;
    402  1.1  christos 
    403  1.1  christos 				act = (*statp->qhook)(&nsap, &buf, &buflen,
    404  1.1  christos 						      ans, anssiz, &resplen);
    405  1.1  christos 				switch (act) {
    406  1.1  christos 				case res_goahead:
    407  1.1  christos 					done = 1;
    408  1.1  christos 					break;
    409  1.1  christos 				case res_nextns:
    410  1.1  christos 					res_nclose(statp);
    411  1.1  christos 					goto next_ns;
    412  1.1  christos 				case res_done:
    413  1.1  christos 					return (resplen);
    414  1.1  christos 				case res_modified:
    415  1.1  christos 					/* give the hook another try */
    416  1.1  christos 					if (++loops < 42) /*doug adams*/
    417  1.1  christos 						break;
    418  1.1  christos 					/*FALLTHROUGH*/
    419  1.1  christos 				case res_error:
    420  1.1  christos 					/*FALLTHROUGH*/
    421  1.1  christos 				default:
    422  1.1  christos 					goto fail;
    423  1.1  christos 				}
    424  1.1  christos 			} while (!done);
    425  1.1  christos 		}
    426  1.1  christos 
    427  1.1  christos 		Dprint(((statp->options & RES_DEBUG) &&
    428  1.2  christos 			getnameinfo(nsap, (socklen_t)nsaplen, abuf, sizeof(abuf),
    429  1.1  christos 				    NULL, 0, niflags) == 0),
    430  1.1  christos 		       (stdout, ";; Querying server (# %d) address = %s\n",
    431  1.1  christos 			ns + 1, abuf));
    432  1.1  christos 
    433  1.1  christos 
    434  1.1  christos 		if (v_circuit) {
    435  1.1  christos 			/* Use VC; at most one attempt per server. */
    436  1.1  christos 			try = statp->retry;
    437  1.1  christos 			n = send_vc(statp, buf, buflen, ans, anssiz, &terrno,
    438  1.1  christos 				    ns);
    439  1.1  christos 			if (n < 0)
    440  1.1  christos 				goto fail;
    441  1.1  christos 			if (n == 0)
    442  1.1  christos 				goto next_ns;
    443  1.1  christos 			resplen = n;
    444  1.1  christos 		} else {
    445  1.1  christos 			/* Use datagrams. */
    446  1.1  christos 			n = send_dg(statp, buf, buflen, ans, anssiz, &terrno,
    447  1.1  christos 				    ns, &v_circuit, &gotsomewhere);
    448  1.1  christos 			if (n < 0)
    449  1.1  christos 				goto fail;
    450  1.1  christos 			if (n == 0)
    451  1.1  christos 				goto next_ns;
    452  1.1  christos 			if (v_circuit)
    453  1.1  christos 				goto same_ns;
    454  1.1  christos 			resplen = n;
    455  1.1  christos 		}
    456  1.1  christos 
    457  1.1  christos 		Dprint((statp->options & RES_DEBUG) ||
    458  1.1  christos 		       ((statp->pfcode & RES_PRF_REPLY) &&
    459  1.1  christos 			(statp->pfcode & RES_PRF_HEAD1)),
    460  1.1  christos 		       (stdout, ";; got answer:\n"));
    461  1.1  christos 
    462  1.1  christos 		DprintQ((statp->options & RES_DEBUG) ||
    463  1.1  christos 			(statp->pfcode & RES_PRF_REPLY),
    464  1.1  christos 			(stdout, "%s", ""),
    465  1.1  christos 			ans, (resplen > anssiz) ? anssiz : resplen);
    466  1.1  christos 
    467  1.1  christos 		/*
    468  1.1  christos 		 * If we have temporarily opened a virtual circuit,
    469  1.1  christos 		 * or if we haven't been asked to keep a socket open,
    470  1.1  christos 		 * close the socket.
    471  1.1  christos 		 */
    472  1.1  christos 		if ((v_circuit && (statp->options & RES_USEVC) == 0U) ||
    473  1.1  christos 		    (statp->options & RES_STAYOPEN) == 0U) {
    474  1.1  christos 			res_nclose(statp);
    475  1.1  christos 		}
    476  1.1  christos 		if (statp->rhook) {
    477  1.1  christos 			int done = 0, loops = 0;
    478  1.1  christos 
    479  1.1  christos 			do {
    480  1.1  christos 				res_sendhookact act;
    481  1.1  christos 
    482  1.1  christos 				act = (*statp->rhook)(nsap, buf, buflen,
    483  1.1  christos 						      ans, anssiz, &resplen);
    484  1.1  christos 				switch (act) {
    485  1.1  christos 				case res_goahead:
    486  1.1  christos 				case res_done:
    487  1.1  christos 					done = 1;
    488  1.1  christos 					break;
    489  1.1  christos 				case res_nextns:
    490  1.1  christos 					res_nclose(statp);
    491  1.1  christos 					goto next_ns;
    492  1.1  christos 				case res_modified:
    493  1.1  christos 					/* give the hook another try */
    494  1.1  christos 					if (++loops < 42) /*doug adams*/
    495  1.1  christos 						break;
    496  1.1  christos 					/*FALLTHROUGH*/
    497  1.1  christos 				case res_error:
    498  1.1  christos 					/*FALLTHROUGH*/
    499  1.1  christos 				default:
    500  1.1  christos 					goto fail;
    501  1.1  christos 				}
    502  1.1  christos 			} while (!done);
    503  1.1  christos 
    504  1.1  christos 		}
    505  1.1  christos 		return (resplen);
    506  1.1  christos  next_ns: ;
    507  1.1  christos 	   } /*foreach ns*/
    508  1.1  christos 	} /*foreach retry*/
    509  1.1  christos 	res_nclose(statp);
    510  1.1  christos 	if (!v_circuit) {
    511  1.1  christos 		if (!gotsomewhere)
    512  1.1  christos 			errno = ECONNREFUSED;	/* no nameservers found */
    513  1.1  christos 		else
    514  1.1  christos 			errno = ETIMEDOUT;	/* no answer obtained */
    515  1.1  christos 	} else
    516  1.1  christos 		errno = terrno;
    517  1.1  christos 	return (-1);
    518  1.1  christos  fail:
    519  1.1  christos 	res_nclose(statp);
    520  1.1  christos 	return (-1);
    521  1.1  christos }
    522  1.1  christos 
    523  1.1  christos /* Private */
    524  1.1  christos 
    525  1.1  christos static int
    526  1.1  christos get_salen(sa)
    527  1.1  christos 	const struct sockaddr *sa;
    528  1.1  christos {
    529  1.1  christos 
    530  1.1  christos #ifdef HAVE_SA_LEN
    531  1.1  christos 	/* There are people do not set sa_len.  Be forgiving to them. */
    532  1.1  christos 	if (sa->sa_len)
    533  1.1  christos 		return (sa->sa_len);
    534  1.1  christos #endif
    535  1.1  christos 
    536  1.1  christos 	if (sa->sa_family == AF_INET)
    537  1.1  christos 		return (sizeof(struct sockaddr_in));
    538  1.1  christos 	else if (sa->sa_family == AF_INET6)
    539  1.1  christos 		return (sizeof(struct sockaddr_in6));
    540  1.1  christos 	else
    541  1.1  christos 		return (0);	/* unknown, die on connect */
    542  1.1  christos }
    543  1.1  christos 
    544  1.1  christos /*
    545  1.1  christos  * pick appropriate nsaddr_list for use.  see res_init() for initialization.
    546  1.1  christos  */
    547  1.1  christos static struct sockaddr *
    548  1.1  christos get_nsaddr(statp, n)
    549  1.1  christos 	res_state statp;
    550  1.1  christos 	size_t n;
    551  1.1  christos {
    552  1.1  christos 
    553  1.1  christos 	if (!statp->nsaddr_list[n].sin_family && EXT(statp).ext) {
    554  1.1  christos 		/*
    555  1.1  christos 		 * - EXT(statp).ext->nsaddrs[n] holds an address that is larger
    556  1.1  christos 		 *   than struct sockaddr, and
    557  1.1  christos 		 * - user code did not update statp->nsaddr_list[n].
    558  1.1  christos 		 */
    559  1.1  christos 		return (struct sockaddr *)(void *)&EXT(statp).ext->nsaddrs[n];
    560  1.1  christos 	} else {
    561  1.1  christos 		/*
    562  1.1  christos 		 * - user code updated statp->nsaddr_list[n], or
    563  1.1  christos 		 * - statp->nsaddr_list[n] has the same content as
    564  1.1  christos 		 *   EXT(statp).ext->nsaddrs[n].
    565  1.1  christos 		 */
    566  1.1  christos 		return (struct sockaddr *)(void *)&statp->nsaddr_list[n];
    567  1.1  christos 	}
    568  1.1  christos }
    569  1.1  christos 
    570  1.1  christos static int
    571  1.1  christos send_vc(res_state statp,
    572  1.1  christos 	const u_char *buf, int buflen, u_char *ans, int anssiz,
    573  1.1  christos 	int *terrno, int ns)
    574  1.1  christos {
    575  1.3  christos 	const HEADER *hp = (const HEADER *)(const void *)buf;
    576  1.3  christos 	HEADER *anhp = (HEADER *)(void *)ans;
    577  1.1  christos 	struct sockaddr *nsap;
    578  1.1  christos 	int nsaplen;
    579  1.1  christos 	int truncating, connreset, resplen, n;
    580  1.1  christos 	struct iovec iov[2];
    581  1.1  christos 	u_short len;
    582  1.1  christos 	u_char *cp;
    583  1.1  christos 	void *tmp;
    584  1.1  christos 
    585  1.2  christos 	nsap = get_nsaddr(statp, (size_t)ns);
    586  1.1  christos 	nsaplen = get_salen(nsap);
    587  1.1  christos 
    588  1.1  christos 	connreset = 0;
    589  1.1  christos  same_ns:
    590  1.1  christos 	truncating = 0;
    591  1.1  christos 
    592  1.1  christos 	/* Are we still talking to whom we want to talk to? */
    593  1.1  christos 	if (statp->_vcsock >= 0 && (statp->_flags & RES_F_VC) != 0) {
    594  1.1  christos 		struct sockaddr_storage peer;
    595  1.1  christos 		ISC_SOCKLEN_T size = sizeof peer;
    596  1.1  christos 
    597  1.1  christos 		if (getpeername(statp->_vcsock,
    598  1.2  christos 				(struct sockaddr *)(void *)&peer, &size) < 0 ||
    599  1.2  christos 		    !sock_eq((struct sockaddr *)(void *)&peer, nsap)) {
    600  1.1  christos 			res_nclose(statp);
    601  1.1  christos 			statp->_flags &= ~RES_F_VC;
    602  1.1  christos 		}
    603  1.1  christos 	}
    604  1.1  christos 
    605  1.1  christos 	if (statp->_vcsock < 0 || (statp->_flags & RES_F_VC) == 0) {
    606  1.1  christos 		if (statp->_vcsock >= 0)
    607  1.1  christos 			res_nclose(statp);
    608  1.1  christos 
    609  1.1  christos 		statp->_vcsock = socket(nsap->sa_family, SOCK_STREAM, 0);
    610  1.1  christos 		if (statp->_vcsock > highestFD) {
    611  1.1  christos 			res_nclose(statp);
    612  1.1  christos 			errno = ENOTSOCK;
    613  1.1  christos 		}
    614  1.1  christos 		if (statp->_vcsock < 0) {
    615  1.1  christos 			switch (errno) {
    616  1.1  christos 			case EPROTONOSUPPORT:
    617  1.1  christos #ifdef EPFNOSUPPORT
    618  1.1  christos 			case EPFNOSUPPORT:
    619  1.1  christos #endif
    620  1.1  christos 			case EAFNOSUPPORT:
    621  1.1  christos 				Perror(statp, stderr, "socket(vc)", errno);
    622  1.1  christos 				return (0);
    623  1.1  christos 			default:
    624  1.1  christos 				*terrno = errno;
    625  1.1  christos 				Perror(statp, stderr, "socket(vc)", errno);
    626  1.1  christos 				return (-1);
    627  1.1  christos 			}
    628  1.1  christos 		}
    629  1.1  christos 		errno = 0;
    630  1.2  christos 		if (connect(statp->_vcsock, nsap, (socklen_t)nsaplen) < 0) {
    631  1.1  christos 			*terrno = errno;
    632  1.1  christos 			Aerror(statp, stderr, "connect/vc", errno, nsap,
    633  1.1  christos 			    nsaplen);
    634  1.1  christos 			res_nclose(statp);
    635  1.1  christos 			return (0);
    636  1.1  christos 		}
    637  1.1  christos 		statp->_flags |= RES_F_VC;
    638  1.1  christos 	}
    639  1.1  christos 
    640  1.1  christos 	/*
    641  1.1  christos 	 * Send length & message
    642  1.1  christos 	 */
    643  1.2  christos 	ns_put16((u_short)buflen, (u_char*)(void *)&len);
    644  1.1  christos 	iov[0] = evConsIovec(&len, INT16SZ);
    645  1.1  christos 	DE_CONST(buf, tmp);
    646  1.2  christos 	iov[1] = evConsIovec(tmp, (size_t)buflen);
    647  1.1  christos 	if (writev(statp->_vcsock, iov, 2) != (INT16SZ + buflen)) {
    648  1.1  christos 		*terrno = errno;
    649  1.1  christos 		Perror(statp, stderr, "write failed", errno);
    650  1.1  christos 		res_nclose(statp);
    651  1.1  christos 		return (0);
    652  1.1  christos 	}
    653  1.1  christos 	/*
    654  1.1  christos 	 * Receive length & response
    655  1.1  christos 	 */
    656  1.1  christos  read_len:
    657  1.1  christos 	cp = ans;
    658  1.1  christos 	len = INT16SZ;
    659  1.2  christos 	while ((n = read(statp->_vcsock, (char *)cp, (size_t)len)) > 0) {
    660  1.1  christos 		cp += n;
    661  1.2  christos 		if ((len -= n) == 0)
    662  1.1  christos 			break;
    663  1.1  christos 	}
    664  1.1  christos 	if (n <= 0) {
    665  1.1  christos 		*terrno = errno;
    666  1.1  christos 		Perror(statp, stderr, "read failed", errno);
    667  1.1  christos 		res_nclose(statp);
    668  1.1  christos 		/*
    669  1.1  christos 		 * A long running process might get its TCP
    670  1.1  christos 		 * connection reset if the remote server was
    671  1.1  christos 		 * restarted.  Requery the server instead of
    672  1.1  christos 		 * trying a new one.  When there is only one
    673  1.1  christos 		 * server, this means that a query might work
    674  1.1  christos 		 * instead of failing.  We only allow one reset
    675  1.1  christos 		 * per query to prevent looping.
    676  1.1  christos 		 */
    677  1.1  christos 		if (*terrno == ECONNRESET && !connreset) {
    678  1.1  christos 			connreset = 1;
    679  1.1  christos 			res_nclose(statp);
    680  1.1  christos 			goto same_ns;
    681  1.1  christos 		}
    682  1.1  christos 		res_nclose(statp);
    683  1.1  christos 		return (0);
    684  1.1  christos 	}
    685  1.1  christos 	resplen = ns_get16(ans);
    686  1.1  christos 	if (resplen > anssiz) {
    687  1.1  christos 		Dprint(statp->options & RES_DEBUG,
    688  1.1  christos 		       (stdout, ";; response truncated\n")
    689  1.1  christos 		       );
    690  1.1  christos 		truncating = 1;
    691  1.1  christos 		len = anssiz;
    692  1.1  christos 	} else
    693  1.1  christos 		len = resplen;
    694  1.1  christos 	if (len < HFIXEDSZ) {
    695  1.1  christos 		/*
    696  1.1  christos 		 * Undersized message.
    697  1.1  christos 		 */
    698  1.1  christos 		Dprint(statp->options & RES_DEBUG,
    699  1.1  christos 		       (stdout, ";; undersized: %d\n", len));
    700  1.1  christos 		*terrno = EMSGSIZE;
    701  1.1  christos 		res_nclose(statp);
    702  1.1  christos 		return (0);
    703  1.1  christos 	}
    704  1.1  christos 	cp = ans;
    705  1.2  christos 	while (len != 0 && (n = read(statp->_vcsock, (char *)cp, (size_t)len)) > 0){
    706  1.1  christos 		cp += n;
    707  1.1  christos 		len -= n;
    708  1.1  christos 	}
    709  1.1  christos 	if (n <= 0) {
    710  1.1  christos 		*terrno = errno;
    711  1.1  christos 		Perror(statp, stderr, "read(vc)", errno);
    712  1.1  christos 		res_nclose(statp);
    713  1.1  christos 		return (0);
    714  1.1  christos 	}
    715  1.1  christos 	if (truncating) {
    716  1.1  christos 		/*
    717  1.1  christos 		 * Flush rest of answer so connection stays in synch.
    718  1.1  christos 		 */
    719  1.1  christos 		anhp->tc = 1;
    720  1.1  christos 		len = resplen - anssiz;
    721  1.1  christos 		while (len != 0) {
    722  1.1  christos 			char junk[PACKETSZ];
    723  1.1  christos 
    724  1.1  christos 			n = read(statp->_vcsock, junk,
    725  1.1  christos 				 (len > sizeof junk) ? sizeof junk : len);
    726  1.1  christos 			if (n > 0)
    727  1.1  christos 				len -= n;
    728  1.1  christos 			else
    729  1.1  christos 				break;
    730  1.1  christos 		}
    731  1.1  christos 	}
    732  1.1  christos 	/*
    733  1.1  christos 	 * If the calling applicating has bailed out of
    734  1.1  christos 	 * a previous call and failed to arrange to have
    735  1.1  christos 	 * the circuit closed or the server has got
    736  1.1  christos 	 * itself confused, then drop the packet and
    737  1.1  christos 	 * wait for the correct one.
    738  1.1  christos 	 */
    739  1.1  christos 	if (hp->id != anhp->id) {
    740  1.1  christos 		DprintQ((statp->options & RES_DEBUG) ||
    741  1.1  christos 			(statp->pfcode & RES_PRF_REPLY),
    742  1.1  christos 			(stdout, ";; old answer (unexpected):\n"),
    743  1.1  christos 			ans, (resplen > anssiz) ? anssiz: resplen);
    744  1.1  christos 		goto read_len;
    745  1.1  christos 	}
    746  1.1  christos 
    747  1.1  christos 	/*
    748  1.1  christos 	 * All is well, or the error is fatal.  Signal that the
    749  1.1  christos 	 * next nameserver ought not be tried.
    750  1.1  christos 	 */
    751  1.1  christos 	return (resplen);
    752  1.1  christos }
    753  1.1  christos 
    754  1.1  christos static int
    755  1.1  christos send_dg(res_state statp,
    756  1.1  christos 	const u_char *buf, int buflen, u_char *ans, int anssiz,
    757  1.1  christos 	int *terrno, int ns, int *v_circuit, int *gotsomewhere)
    758  1.1  christos {
    759  1.2  christos 	const HEADER *hp = (const HEADER *)(const void *)buf;
    760  1.2  christos 	HEADER *anhp = (HEADER *)(void *)ans;
    761  1.1  christos 	const struct sockaddr *nsap;
    762  1.1  christos 	int nsaplen;
    763  1.1  christos 	struct timespec now, timeout, finish;
    764  1.1  christos 	fd_set dsmask;
    765  1.1  christos 	struct sockaddr_storage from;
    766  1.1  christos 	ISC_SOCKLEN_T fromlen;
    767  1.1  christos 	int resplen, seconds, n, s;
    768  1.1  christos 
    769  1.2  christos 	nsap = get_nsaddr(statp, (size_t)ns);
    770  1.1  christos 	nsaplen = get_salen(nsap);
    771  1.1  christos 	if (EXT(statp).nssocks[ns] == -1) {
    772  1.1  christos 		EXT(statp).nssocks[ns] = socket(nsap->sa_family, SOCK_DGRAM, 0);
    773  1.1  christos 		if (EXT(statp).nssocks[ns] > highestFD) {
    774  1.1  christos 			res_nclose(statp);
    775  1.1  christos 			errno = ENOTSOCK;
    776  1.1  christos 		}
    777  1.1  christos 		if (EXT(statp).nssocks[ns] < 0) {
    778  1.1  christos 			switch (errno) {
    779  1.1  christos 			case EPROTONOSUPPORT:
    780  1.1  christos #ifdef EPFNOSUPPORT
    781  1.1  christos 			case EPFNOSUPPORT:
    782  1.1  christos #endif
    783  1.1  christos 			case EAFNOSUPPORT:
    784  1.1  christos 				Perror(statp, stderr, "socket(dg)", errno);
    785  1.1  christos 				return (0);
    786  1.1  christos 			default:
    787  1.1  christos 				*terrno = errno;
    788  1.1  christos 				Perror(statp, stderr, "socket(dg)", errno);
    789  1.1  christos 				return (-1);
    790  1.1  christos 			}
    791  1.1  christos 		}
    792  1.1  christos #ifndef CANNOT_CONNECT_DGRAM
    793  1.1  christos 		/*
    794  1.1  christos 		 * On a 4.3BSD+ machine (client and server,
    795  1.1  christos 		 * actually), sending to a nameserver datagram
    796  1.1  christos 		 * port with no nameserver will cause an
    797  1.1  christos 		 * ICMP port unreachable message to be returned.
    798  1.1  christos 		 * If our datagram socket is "connected" to the
    799  1.1  christos 		 * server, we get an ECONNREFUSED error on the next
    800  1.1  christos 		 * socket operation, and select returns if the
    801  1.1  christos 		 * error message is received.  We can thus detect
    802  1.1  christos 		 * the absence of a nameserver without timing out.
    803  1.1  christos 		 */
    804  1.2  christos 		if (connect(EXT(statp).nssocks[ns], nsap, (socklen_t)nsaplen) < 0) {
    805  1.1  christos 			Aerror(statp, stderr, "connect(dg)", errno, nsap,
    806  1.1  christos 			    nsaplen);
    807  1.1  christos 			res_nclose(statp);
    808  1.1  christos 			return (0);
    809  1.1  christos 		}
    810  1.1  christos #endif /* !CANNOT_CONNECT_DGRAM */
    811  1.1  christos 		Dprint(statp->options & RES_DEBUG,
    812  1.1  christos 		       (stdout, ";; new DG socket\n"))
    813  1.1  christos 	}
    814  1.1  christos 	s = EXT(statp).nssocks[ns];
    815  1.1  christos #ifndef CANNOT_CONNECT_DGRAM
    816  1.2  christos 	if (send(s, (const char*)buf, (size_t)buflen, 0) != buflen) {
    817  1.1  christos 		Perror(statp, stderr, "send", errno);
    818  1.1  christos 		res_nclose(statp);
    819  1.1  christos 		return (0);
    820  1.1  christos 	}
    821  1.1  christos #else /* !CANNOT_CONNECT_DGRAM */
    822  1.1  christos 	if (sendto(s, (const char*)buf, buflen, 0, nsap, nsaplen) != buflen)
    823  1.1  christos 	{
    824  1.1  christos 		Aerror(statp, stderr, "sendto", errno, nsap, nsaplen);
    825  1.1  christos 		res_nclose(statp);
    826  1.1  christos 		return (0);
    827  1.1  christos 	}
    828  1.1  christos #endif /* !CANNOT_CONNECT_DGRAM */
    829  1.1  christos 
    830  1.1  christos 	/*
    831  1.1  christos 	 * Wait for reply.
    832  1.1  christos 	 */
    833  1.1  christos 	seconds = (statp->retrans << ns);
    834  1.1  christos 	if (ns > 0)
    835  1.1  christos 		seconds /= statp->nscount;
    836  1.1  christos 	if (seconds <= 0)
    837  1.1  christos 		seconds = 1;
    838  1.1  christos 	now = evNowTime();
    839  1.3  christos 	timeout = evConsTime((long)seconds, 0L);
    840  1.1  christos 	finish = evAddTime(now, timeout);
    841  1.1  christos 	goto nonow;
    842  1.1  christos  wait:
    843  1.1  christos 	now = evNowTime();
    844  1.1  christos  nonow:
    845  1.1  christos 	FD_ZERO(&dsmask);
    846  1.1  christos 	FD_SET(s, &dsmask);
    847  1.1  christos 	if (evCmpTime(finish, now) > 0)
    848  1.1  christos 		timeout = evSubTime(finish, now);
    849  1.1  christos 	else
    850  1.3  christos 		timeout = evConsTime(0L, 0L);
    851  1.1  christos 	n = pselect(s + 1, &dsmask, NULL, NULL, &timeout, NULL);
    852  1.1  christos 	if (n == 0) {
    853  1.1  christos 		Dprint(statp->options & RES_DEBUG, (stdout, ";; timeout\n"));
    854  1.1  christos 		*gotsomewhere = 1;
    855  1.1  christos 		return (0);
    856  1.1  christos 	}
    857  1.1  christos 	if (n < 0) {
    858  1.1  christos 		if (errno == EINTR)
    859  1.1  christos 			goto wait;
    860  1.1  christos 		Perror(statp, stderr, "select", errno);
    861  1.1  christos 		res_nclose(statp);
    862  1.1  christos 		return (0);
    863  1.1  christos 	}
    864  1.1  christos 	errno = 0;
    865  1.1  christos 	fromlen = sizeof(from);
    866  1.2  christos 	resplen = recvfrom(s, (char*)ans, (size_t)anssiz,0,
    867  1.2  christos 			   (struct sockaddr *)(void *)&from, &fromlen);
    868  1.1  christos 	if (resplen <= 0) {
    869  1.1  christos 		Perror(statp, stderr, "recvfrom", errno);
    870  1.1  christos 		res_nclose(statp);
    871  1.1  christos 		return (0);
    872  1.1  christos 	}
    873  1.1  christos 	*gotsomewhere = 1;
    874  1.1  christos 	if (resplen < HFIXEDSZ) {
    875  1.1  christos 		/*
    876  1.1  christos 		 * Undersized message.
    877  1.1  christos 		 */
    878  1.1  christos 		Dprint(statp->options & RES_DEBUG,
    879  1.1  christos 		       (stdout, ";; undersized: %d\n",
    880  1.1  christos 			resplen));
    881  1.1  christos 		*terrno = EMSGSIZE;
    882  1.1  christos 		res_nclose(statp);
    883  1.1  christos 		return (0);
    884  1.1  christos 	}
    885  1.1  christos 	if (hp->id != anhp->id) {
    886  1.1  christos 		/*
    887  1.1  christos 		 * response from old query, ignore it.
    888  1.1  christos 		 * XXX - potential security hazard could
    889  1.1  christos 		 *	 be detected here.
    890  1.1  christos 		 */
    891  1.1  christos 		DprintQ((statp->options & RES_DEBUG) ||
    892  1.1  christos 			(statp->pfcode & RES_PRF_REPLY),
    893  1.1  christos 			(stdout, ";; old answer:\n"),
    894  1.1  christos 			ans, (resplen > anssiz) ? anssiz : resplen);
    895  1.1  christos 		goto wait;
    896  1.1  christos 	}
    897  1.1  christos 	if (!(statp->options & RES_INSECURE1) &&
    898  1.2  christos 	    !res_ourserver_p(statp, (struct sockaddr *)(void *)&from)) {
    899  1.1  christos 		/*
    900  1.1  christos 		 * response from wrong server? ignore it.
    901  1.1  christos 		 * XXX - potential security hazard could
    902  1.1  christos 		 *	 be detected here.
    903  1.1  christos 		 */
    904  1.1  christos 		DprintQ((statp->options & RES_DEBUG) ||
    905  1.1  christos 			(statp->pfcode & RES_PRF_REPLY),
    906  1.1  christos 			(stdout, ";; not our server:\n"),
    907  1.1  christos 			ans, (resplen > anssiz) ? anssiz : resplen);
    908  1.1  christos 		goto wait;
    909  1.1  christos 	}
    910  1.1  christos #ifdef RES_USE_EDNS0
    911  1.1  christos 	if (anhp->rcode == FORMERR && (statp->options & RES_USE_EDNS0) != 0U) {
    912  1.1  christos 		/*
    913  1.1  christos 		 * Do not retry if the server do not understand EDNS0.
    914  1.1  christos 		 * The case has to be captured here, as FORMERR packet do not
    915  1.1  christos 		 * carry query section, hence res_queriesmatch() returns 0.
    916  1.1  christos 		 */
    917  1.1  christos 		DprintQ(statp->options & RES_DEBUG,
    918  1.1  christos 			(stdout, "server rejected query with EDNS0:\n"),
    919  1.1  christos 			ans, (resplen > anssiz) ? anssiz : resplen);
    920  1.1  christos 		/* record the error */
    921  1.1  christos 		statp->_flags |= RES_F_EDNS0ERR;
    922  1.1  christos 		res_nclose(statp);
    923  1.1  christos 		return (0);
    924  1.1  christos 	}
    925  1.1  christos #endif
    926  1.1  christos 	if (!(statp->options & RES_INSECURE2) &&
    927  1.1  christos 	    !res_queriesmatch(buf, buf + buflen,
    928  1.1  christos 			      ans, ans + anssiz)) {
    929  1.1  christos 		/*
    930  1.1  christos 		 * response contains wrong query? ignore it.
    931  1.1  christos 		 * XXX - potential security hazard could
    932  1.1  christos 		 *	 be detected here.
    933  1.1  christos 		 */
    934  1.1  christos 		DprintQ((statp->options & RES_DEBUG) ||
    935  1.1  christos 			(statp->pfcode & RES_PRF_REPLY),
    936  1.1  christos 			(stdout, ";; wrong query name:\n"),
    937  1.1  christos 			ans, (resplen > anssiz) ? anssiz : resplen);
    938  1.1  christos 		goto wait;
    939  1.1  christos 	}
    940  1.1  christos 	if (anhp->rcode == SERVFAIL ||
    941  1.1  christos 	    anhp->rcode == NOTIMP ||
    942  1.1  christos 	    anhp->rcode == REFUSED) {
    943  1.1  christos 		DprintQ(statp->options & RES_DEBUG,
    944  1.1  christos 			(stdout, "server rejected query:\n"),
    945  1.1  christos 			ans, (resplen > anssiz) ? anssiz : resplen);
    946  1.1  christos 		res_nclose(statp);
    947  1.1  christos 		/* don't retry if called from dig */
    948  1.1  christos 		if (!statp->pfcode)
    949  1.1  christos 			return (0);
    950  1.1  christos 	}
    951  1.1  christos 	if (!(statp->options & RES_IGNTC) && anhp->tc) {
    952  1.1  christos 		/*
    953  1.1  christos 		 * To get the rest of answer,
    954  1.1  christos 		 * use TCP with same server.
    955  1.1  christos 		 */
    956  1.1  christos 		Dprint(statp->options & RES_DEBUG,
    957  1.1  christos 		       (stdout, ";; truncated answer\n"));
    958  1.1  christos 		*v_circuit = 1;
    959  1.1  christos 		res_nclose(statp);
    960  1.1  christos 		return (1);
    961  1.1  christos 	}
    962  1.1  christos 	/*
    963  1.1  christos 	 * All is well, or the error is fatal.  Signal that the
    964  1.1  christos 	 * next nameserver ought not be tried.
    965  1.1  christos 	 */
    966  1.1  christos 	return (resplen);
    967  1.1  christos }
    968  1.1  christos 
    969  1.1  christos static void
    970  1.1  christos Aerror(const res_state statp, FILE *file, const char *string, int error,
    971  1.1  christos        const struct sockaddr *address, int alen)
    972  1.1  christos {
    973  1.1  christos 	int save = errno;
    974  1.1  christos 	char hbuf[NI_MAXHOST];
    975  1.1  christos 	char sbuf[NI_MAXSERV];
    976  1.1  christos 
    977  1.1  christos 	alen = alen;
    978  1.1  christos 
    979  1.1  christos 	if ((statp->options & RES_DEBUG) != 0U) {
    980  1.2  christos 		if (getnameinfo(address, (socklen_t)alen, hbuf, sizeof(hbuf),
    981  1.1  christos 		    sbuf, sizeof(sbuf), niflags)) {
    982  1.1  christos 			strncpy(hbuf, "?", sizeof(hbuf) - 1);
    983  1.1  christos 			hbuf[sizeof(hbuf) - 1] = '\0';
    984  1.1  christos 			strncpy(sbuf, "?", sizeof(sbuf) - 1);
    985  1.1  christos 			sbuf[sizeof(sbuf) - 1] = '\0';
    986  1.1  christos 		}
    987  1.1  christos 		fprintf(file, "res_send: %s ([%s].%s): %s\n",
    988  1.1  christos 			string, hbuf, sbuf, strerror(error));
    989  1.1  christos 	}
    990  1.1  christos 	errno = save;
    991  1.1  christos }
    992  1.1  christos 
    993  1.1  christos static void
    994  1.1  christos Perror(const res_state statp, FILE *file, const char *string, int error) {
    995  1.1  christos 	int save = errno;
    996  1.1  christos 
    997  1.1  christos 	if ((statp->options & RES_DEBUG) != 0U)
    998  1.1  christos 		fprintf(file, "res_send: %s: %s\n",
    999  1.1  christos 			string, strerror(error));
   1000  1.1  christos 	errno = save;
   1001  1.1  christos }
   1002  1.1  christos 
   1003  1.1  christos static int
   1004  1.1  christos sock_eq(struct sockaddr *a, struct sockaddr *b) {
   1005  1.1  christos 	struct sockaddr_in *a4, *b4;
   1006  1.1  christos 	struct sockaddr_in6 *a6, *b6;
   1007  1.1  christos 
   1008  1.1  christos 	if (a->sa_family != b->sa_family)
   1009  1.1  christos 		return 0;
   1010  1.1  christos 	switch (a->sa_family) {
   1011  1.1  christos 	case AF_INET:
   1012  1.2  christos 		a4 = (struct sockaddr_in *)(void *)a;
   1013  1.2  christos 		b4 = (struct sockaddr_in *)(void *)b;
   1014  1.1  christos 		return a4->sin_port == b4->sin_port &&
   1015  1.1  christos 		    a4->sin_addr.s_addr == b4->sin_addr.s_addr;
   1016  1.1  christos 	case AF_INET6:
   1017  1.2  christos 		a6 = (struct sockaddr_in6 *)(void *)a;
   1018  1.2  christos 		b6 = (struct sockaddr_in6 *)(void *)b;
   1019  1.1  christos 		return a6->sin6_port == b6->sin6_port &&
   1020  1.1  christos #ifdef HAVE_SIN6_SCOPE_ID
   1021  1.1  christos 		    a6->sin6_scope_id == b6->sin6_scope_id &&
   1022  1.1  christos #endif
   1023  1.1  christos 		    IN6_ARE_ADDR_EQUAL(&a6->sin6_addr, &b6->sin6_addr);
   1024  1.1  christos 	default:
   1025  1.1  christos 		return 0;
   1026  1.1  christos 	}
   1027  1.1  christos }
   1028  1.1  christos 
   1029  1.1  christos #ifdef NEED_PSELECT
   1030  1.1  christos /* XXX needs to move to the porting library. */
   1031  1.1  christos static int
   1032  1.1  christos pselect(int nfds, void *rfds, void *wfds, void *efds,
   1033  1.1  christos 	struct timespec *tsp, const sigset_t *sigmask)
   1034  1.1  christos {
   1035  1.1  christos 	struct timeval tv, *tvp;
   1036  1.1  christos 	sigset_t sigs;
   1037  1.1  christos 	int n;
   1038  1.1  christos 
   1039  1.1  christos 	if (tsp) {
   1040  1.1  christos 		tvp = &tv;
   1041  1.1  christos 		tv = evTimeVal(*tsp);
   1042  1.1  christos 	} else
   1043  1.1  christos 		tvp = NULL;
   1044  1.1  christos 	if (sigmask)
   1045  1.1  christos 		sigprocmask(SIG_SETMASK, sigmask, &sigs);
   1046  1.1  christos 	n = select(nfds, rfds, wfds, efds, tvp);
   1047  1.1  christos 	if (sigmask)
   1048  1.1  christos 		sigprocmask(SIG_SETMASK, &sigs, NULL);
   1049  1.1  christos 	if (tsp)
   1050  1.1  christos 		*tsp = evTimeSpec(tv);
   1051  1.1  christos 	return (n);
   1052  1.1  christos }
   1053  1.1  christos #endif
   1054