res_send.c revision 1.5 1 1.5 christos /* $NetBSD: res_send.c,v 1.5 2004/05/21 15:35:05 christos Exp $ */
2 1.1 christos
3 1.1 christos /*
4 1.1 christos * Copyright (c) 1985, 1989, 1993
5 1.1 christos * The Regents of the University of California. All rights reserved.
6 1.1 christos *
7 1.1 christos * Redistribution and use in source and binary forms, with or without
8 1.1 christos * modification, are permitted provided that the following conditions
9 1.1 christos * are met:
10 1.1 christos * 1. Redistributions of source code must retain the above copyright
11 1.1 christos * notice, this list of conditions and the following disclaimer.
12 1.1 christos * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 christos * notice, this list of conditions and the following disclaimer in the
14 1.1 christos * documentation and/or other materials provided with the distribution.
15 1.1 christos * 3. All advertising materials mentioning features or use of this software
16 1.1 christos * must display the following acknowledgement:
17 1.1 christos * This product includes software developed by the University of
18 1.1 christos * California, Berkeley and its contributors.
19 1.1 christos * 4. Neither the name of the University nor the names of its contributors
20 1.1 christos * may be used to endorse or promote products derived from this software
21 1.1 christos * without specific prior written permission.
22 1.1 christos *
23 1.1 christos * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 1.1 christos * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 1.1 christos * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 1.1 christos * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 1.1 christos * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 1.1 christos * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 1.1 christos * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 1.1 christos * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 1.1 christos * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 1.1 christos * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 1.1 christos * SUCH DAMAGE.
34 1.1 christos */
35 1.1 christos
36 1.1 christos /*
37 1.1 christos * Portions Copyright (c) 1993 by Digital Equipment Corporation.
38 1.1 christos *
39 1.1 christos * Permission to use, copy, modify, and distribute this software for any
40 1.1 christos * purpose with or without fee is hereby granted, provided that the above
41 1.1 christos * copyright notice and this permission notice appear in all copies, and that
42 1.1 christos * the name of Digital Equipment Corporation not be used in advertising or
43 1.1 christos * publicity pertaining to distribution of the document or software without
44 1.1 christos * specific, written prior permission.
45 1.1 christos *
46 1.1 christos * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
47 1.1 christos * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
48 1.1 christos * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT
49 1.1 christos * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
50 1.1 christos * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
51 1.1 christos * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
52 1.1 christos * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
53 1.1 christos * SOFTWARE.
54 1.1 christos */
55 1.1 christos
56 1.1 christos /*
57 1.1 christos * Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")
58 1.1 christos * Portions Copyright (c) 1996-1999 by Internet Software Consortium.
59 1.1 christos *
60 1.1 christos * Permission to use, copy, modify, and distribute this software for any
61 1.1 christos * purpose with or without fee is hereby granted, provided that the above
62 1.1 christos * copyright notice and this permission notice appear in all copies.
63 1.1 christos *
64 1.1 christos * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES
65 1.1 christos * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
66 1.1 christos * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR
67 1.1 christos * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
68 1.1 christos * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
69 1.1 christos * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
70 1.1 christos * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
71 1.1 christos */
72 1.1 christos
73 1.4 christos #include <sys/cdefs.h>
74 1.1 christos #if defined(LIBC_SCCS) && !defined(lint)
75 1.4 christos #ifdef notdef
76 1.1 christos static const char sccsid[] = "@(#)res_send.c 8.1 (Berkeley) 6/4/93";
77 1.1 christos static const char rcsid[] = "Id: res_send.c,v 1.5.2.2.4.3 2004/04/12 06:54:59 marka Exp";
78 1.4 christos #else
79 1.5 christos __RCSID("$NetBSD: res_send.c,v 1.5 2004/05/21 15:35:05 christos Exp $");
80 1.4 christos #endif
81 1.1 christos #endif /* LIBC_SCCS and not lint */
82 1.1 christos
83 1.1 christos /*
84 1.1 christos * Send query to name server and wait for reply.
85 1.1 christos */
86 1.1 christos
87 1.1 christos #include "port_before.h"
88 1.1 christos #include "fd_setsize.h"
89 1.1 christos
90 1.1 christos #include <sys/types.h>
91 1.1 christos #include <sys/param.h>
92 1.1 christos #include <sys/time.h>
93 1.1 christos #include <sys/socket.h>
94 1.1 christos #include <sys/uio.h>
95 1.1 christos
96 1.1 christos #include <netinet/in.h>
97 1.1 christos #include <arpa/nameser.h>
98 1.1 christos #include <arpa/inet.h>
99 1.1 christos
100 1.1 christos #include <errno.h>
101 1.1 christos #include <netdb.h>
102 1.1 christos #include <resolv.h>
103 1.1 christos #include <signal.h>
104 1.1 christos #include <stdio.h>
105 1.1 christos #include <stdlib.h>
106 1.1 christos #include <string.h>
107 1.1 christos #include <unistd.h>
108 1.1 christos
109 1.1 christos #include <isc/eventlib.h>
110 1.1 christos
111 1.1 christos #include "port_after.h"
112 1.1 christos
113 1.5 christos #ifdef __weak_alias
114 1.5 christos __weak_alias(res_ourserver_p,__res_ourserver_p)
115 1.5 christos __weak_alias(res_nameinquery,__res_nameinquery)
116 1.5 christos __weak_alias(res_queriesmatch,__res_queriesmatch)
117 1.5 christos __weak_alias(res_nsend,__res_nsend)
118 1.5 christos #endif
119 1.5 christos
120 1.1 christos /* Options. Leave them on. */
121 1.1 christos #define DEBUG
122 1.1 christos #include "res_debug.h"
123 1.1 christos #include "res_private.h"
124 1.1 christos
125 1.1 christos #define EXT(res) ((res)->_u._ext)
126 1.1 christos
127 1.1 christos static const int highestFD = FD_SETSIZE - 1;
128 1.1 christos
129 1.1 christos /* Forward. */
130 1.1 christos
131 1.1 christos static int get_salen __P((const struct sockaddr *));
132 1.1 christos static struct sockaddr * get_nsaddr __P((res_state, size_t));
133 1.1 christos static int send_vc(res_state, const u_char *, int,
134 1.1 christos u_char *, int, int *, int);
135 1.1 christos static int send_dg(res_state, const u_char *, int,
136 1.1 christos u_char *, int, int *, int,
137 1.1 christos int *, int *);
138 1.1 christos static void Aerror(const res_state, FILE *, const char *, int,
139 1.1 christos const struct sockaddr *, int);
140 1.1 christos static void Perror(const res_state, FILE *, const char *, int);
141 1.1 christos static int sock_eq(struct sockaddr *, struct sockaddr *);
142 1.1 christos #ifdef NEED_PSELECT
143 1.1 christos static int pselect(int, void *, void *, void *,
144 1.1 christos struct timespec *,
145 1.1 christos const sigset_t *);
146 1.1 christos #endif
147 1.1 christos void res_pquery(const res_state, const u_char *, int, FILE *);
148 1.1 christos
149 1.1 christos static const int niflags = NI_NUMERICHOST | NI_NUMERICSERV;
150 1.1 christos
151 1.1 christos /* Public. */
152 1.1 christos
153 1.1 christos /* int
154 1.1 christos * res_isourserver(ina)
155 1.1 christos * looks up "ina" in _res.ns_addr_list[]
156 1.1 christos * returns:
157 1.1 christos * 0 : not found
158 1.1 christos * >0 : found
159 1.1 christos * author:
160 1.1 christos * paul vixie, 29may94
161 1.1 christos */
162 1.1 christos int
163 1.1 christos res_ourserver_p(const res_state statp, const struct sockaddr *sa) {
164 1.1 christos const struct sockaddr_in *inp, *srv;
165 1.1 christos const struct sockaddr_in6 *in6p, *srv6;
166 1.1 christos int ns;
167 1.1 christos
168 1.1 christos switch (sa->sa_family) {
169 1.1 christos case AF_INET:
170 1.3 christos inp = (const struct sockaddr_in *)(const void *)sa;
171 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
172 1.2 christos srv = (struct sockaddr_in *)(void *)get_nsaddr(statp, (size_t)ns);
173 1.1 christos if (srv->sin_family == inp->sin_family &&
174 1.1 christos srv->sin_port == inp->sin_port &&
175 1.1 christos (srv->sin_addr.s_addr == INADDR_ANY ||
176 1.1 christos srv->sin_addr.s_addr == inp->sin_addr.s_addr))
177 1.1 christos return (1);
178 1.1 christos }
179 1.1 christos break;
180 1.1 christos case AF_INET6:
181 1.1 christos if (EXT(statp).ext == NULL)
182 1.1 christos break;
183 1.3 christos in6p = (const struct sockaddr_in6 *)(const void *)sa;
184 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
185 1.2 christos srv6 = (struct sockaddr_in6 *)(void *)get_nsaddr(statp, (size_t)ns);
186 1.1 christos if (srv6->sin6_family == in6p->sin6_family &&
187 1.1 christos srv6->sin6_port == in6p->sin6_port &&
188 1.1 christos #ifdef HAVE_SIN6_SCOPE_ID
189 1.1 christos srv6->sin6_scope_id == in6p->sin6_scope_id &&
190 1.1 christos #endif
191 1.1 christos (IN6_IS_ADDR_UNSPECIFIED(&srv6->sin6_addr) ||
192 1.1 christos IN6_ARE_ADDR_EQUAL(&srv6->sin6_addr, &in6p->sin6_addr)))
193 1.1 christos return (1);
194 1.1 christos }
195 1.1 christos break;
196 1.1 christos default:
197 1.1 christos break;
198 1.1 christos }
199 1.1 christos return (0);
200 1.1 christos }
201 1.1 christos
202 1.1 christos /* int
203 1.1 christos * res_nameinquery(name, type, class, buf, eom)
204 1.1 christos * look for (name,type,class) in the query section of packet (buf,eom)
205 1.1 christos * requires:
206 1.1 christos * buf + HFIXEDSZ <= eom
207 1.1 christos * returns:
208 1.1 christos * -1 : format error
209 1.1 christos * 0 : not found
210 1.1 christos * >0 : found
211 1.1 christos * author:
212 1.1 christos * paul vixie, 29may94
213 1.1 christos */
214 1.1 christos int
215 1.1 christos res_nameinquery(const char *name, int type, int class,
216 1.1 christos const u_char *buf, const u_char *eom)
217 1.1 christos {
218 1.1 christos const u_char *cp = buf + HFIXEDSZ;
219 1.2 christos int qdcount = ntohs(((const HEADER*)(const void *)buf)->qdcount);
220 1.1 christos
221 1.1 christos while (qdcount-- > 0) {
222 1.1 christos char tname[MAXDNAME+1];
223 1.1 christos int n, ttype, tclass;
224 1.1 christos
225 1.1 christos n = dn_expand(buf, eom, cp, tname, sizeof tname);
226 1.1 christos if (n < 0)
227 1.1 christos return (-1);
228 1.1 christos cp += n;
229 1.1 christos if (cp + 2 * INT16SZ > eom)
230 1.1 christos return (-1);
231 1.1 christos ttype = ns_get16(cp); cp += INT16SZ;
232 1.1 christos tclass = ns_get16(cp); cp += INT16SZ;
233 1.1 christos if (ttype == type && tclass == class &&
234 1.1 christos ns_samename(tname, name) == 1)
235 1.1 christos return (1);
236 1.1 christos }
237 1.1 christos return (0);
238 1.1 christos }
239 1.1 christos
240 1.1 christos /* int
241 1.1 christos * res_queriesmatch(buf1, eom1, buf2, eom2)
242 1.1 christos * is there a 1:1 mapping of (name,type,class)
243 1.1 christos * in (buf1,eom1) and (buf2,eom2)?
244 1.1 christos * returns:
245 1.1 christos * -1 : format error
246 1.1 christos * 0 : not a 1:1 mapping
247 1.1 christos * >0 : is a 1:1 mapping
248 1.1 christos * author:
249 1.1 christos * paul vixie, 29may94
250 1.1 christos */
251 1.1 christos int
252 1.1 christos res_queriesmatch(const u_char *buf1, const u_char *eom1,
253 1.1 christos const u_char *buf2, const u_char *eom2)
254 1.1 christos {
255 1.1 christos const u_char *cp = buf1 + HFIXEDSZ;
256 1.2 christos int qdcount = ntohs(((const HEADER*)(const void *)buf1)->qdcount);
257 1.1 christos
258 1.1 christos if (buf1 + HFIXEDSZ > eom1 || buf2 + HFIXEDSZ > eom2)
259 1.1 christos return (-1);
260 1.1 christos
261 1.1 christos /*
262 1.1 christos * Only header section present in replies to
263 1.1 christos * dynamic update packets.
264 1.1 christos */
265 1.2 christos if ((((const HEADER *)(const void *)buf1)->opcode == ns_o_update) &&
266 1.2 christos (((const HEADER *)(const void *)buf2)->opcode == ns_o_update))
267 1.1 christos return (1);
268 1.1 christos
269 1.2 christos if (qdcount != ntohs(((const HEADER*)(const void *)buf2)->qdcount))
270 1.1 christos return (0);
271 1.1 christos while (qdcount-- > 0) {
272 1.1 christos char tname[MAXDNAME+1];
273 1.1 christos int n, ttype, tclass;
274 1.1 christos
275 1.1 christos n = dn_expand(buf1, eom1, cp, tname, sizeof tname);
276 1.1 christos if (n < 0)
277 1.1 christos return (-1);
278 1.1 christos cp += n;
279 1.1 christos if (cp + 2 * INT16SZ > eom1)
280 1.1 christos return (-1);
281 1.1 christos ttype = ns_get16(cp); cp += INT16SZ;
282 1.1 christos tclass = ns_get16(cp); cp += INT16SZ;
283 1.1 christos if (!res_nameinquery(tname, ttype, tclass, buf2, eom2))
284 1.1 christos return (0);
285 1.1 christos }
286 1.1 christos return (1);
287 1.1 christos }
288 1.1 christos
289 1.1 christos int
290 1.1 christos res_nsend(res_state statp,
291 1.1 christos const u_char *buf, int buflen, u_char *ans, int anssiz)
292 1.1 christos {
293 1.1 christos int gotsomewhere, terrno, try, v_circuit, resplen, ns, n;
294 1.1 christos char abuf[NI_MAXHOST];
295 1.1 christos
296 1.1 christos if (statp->nscount == 0) {
297 1.1 christos errno = ESRCH;
298 1.1 christos return (-1);
299 1.1 christos }
300 1.1 christos if (anssiz < HFIXEDSZ) {
301 1.1 christos errno = EINVAL;
302 1.1 christos return (-1);
303 1.1 christos }
304 1.1 christos DprintQ((statp->options & RES_DEBUG) || (statp->pfcode & RES_PRF_QUERY),
305 1.1 christos (stdout, ";; res_send()\n"), buf, buflen);
306 1.1 christos v_circuit = (statp->options & RES_USEVC) || buflen > PACKETSZ;
307 1.1 christos gotsomewhere = 0;
308 1.1 christos terrno = ETIMEDOUT;
309 1.1 christos
310 1.1 christos /*
311 1.1 christos * If the ns_addr_list in the resolver context has changed, then
312 1.1 christos * invalidate our cached copy and the associated timing data.
313 1.1 christos */
314 1.1 christos if (EXT(statp).nscount != 0) {
315 1.1 christos int needclose = 0;
316 1.1 christos struct sockaddr_storage peer;
317 1.1 christos ISC_SOCKLEN_T peerlen;
318 1.1 christos
319 1.1 christos if (EXT(statp).nscount != statp->nscount)
320 1.1 christos needclose++;
321 1.1 christos else
322 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
323 1.1 christos if (statp->nsaddr_list[ns].sin_family &&
324 1.2 christos !sock_eq((struct sockaddr *)(void *)&statp->nsaddr_list[ns],
325 1.2 christos (struct sockaddr *)(void *)&EXT(statp).ext->nsaddrs[ns])) {
326 1.1 christos needclose++;
327 1.1 christos break;
328 1.1 christos }
329 1.1 christos
330 1.1 christos if (EXT(statp).nssocks[ns] == -1)
331 1.1 christos continue;
332 1.1 christos peerlen = sizeof(peer);
333 1.1 christos if (getsockname(EXT(statp).nssocks[ns],
334 1.2 christos (struct sockaddr *)(void *)&peer, &peerlen) < 0) {
335 1.1 christos needclose++;
336 1.1 christos break;
337 1.1 christos }
338 1.2 christos if (!sock_eq((struct sockaddr *)(void *)&peer,
339 1.2 christos get_nsaddr(statp, (size_t)ns))) {
340 1.1 christos needclose++;
341 1.1 christos break;
342 1.1 christos }
343 1.1 christos }
344 1.1 christos if (needclose) {
345 1.1 christos res_nclose(statp);
346 1.1 christos EXT(statp).nscount = 0;
347 1.1 christos }
348 1.1 christos }
349 1.1 christos
350 1.1 christos /*
351 1.1 christos * Maybe initialize our private copy of the ns_addr_list.
352 1.1 christos */
353 1.1 christos if (EXT(statp).nscount == 0) {
354 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
355 1.1 christos EXT(statp).nstimes[ns] = RES_MAXTIME;
356 1.1 christos EXT(statp).nssocks[ns] = -1;
357 1.1 christos if (!statp->nsaddr_list[ns].sin_family)
358 1.1 christos continue;
359 1.1 christos EXT(statp).ext->nsaddrs[ns].sin =
360 1.1 christos statp->nsaddr_list[ns];
361 1.1 christos }
362 1.1 christos EXT(statp).nscount = statp->nscount;
363 1.1 christos }
364 1.1 christos
365 1.1 christos /*
366 1.1 christos * Some resolvers want to even out the load on their nameservers.
367 1.1 christos * Note that RES_BLAST overrides RES_ROTATE.
368 1.1 christos */
369 1.1 christos if ((statp->options & RES_ROTATE) != 0U &&
370 1.1 christos (statp->options & RES_BLAST) == 0U) {
371 1.1 christos union res_sockaddr_union inu;
372 1.1 christos struct sockaddr_in ina;
373 1.1 christos int lastns = statp->nscount - 1;
374 1.1 christos int fd;
375 1.1 christos u_int16_t nstime;
376 1.1 christos
377 1.1 christos if (EXT(statp).ext != NULL)
378 1.1 christos inu = EXT(statp).ext->nsaddrs[0];
379 1.1 christos ina = statp->nsaddr_list[0];
380 1.1 christos fd = EXT(statp).nssocks[0];
381 1.1 christos nstime = EXT(statp).nstimes[0];
382 1.1 christos for (ns = 0; ns < lastns; ns++) {
383 1.1 christos if (EXT(statp).ext != NULL)
384 1.1 christos EXT(statp).ext->nsaddrs[ns] =
385 1.1 christos EXT(statp).ext->nsaddrs[ns + 1];
386 1.1 christos statp->nsaddr_list[ns] = statp->nsaddr_list[ns + 1];
387 1.1 christos EXT(statp).nssocks[ns] = EXT(statp).nssocks[ns + 1];
388 1.1 christos EXT(statp).nstimes[ns] = EXT(statp).nstimes[ns + 1];
389 1.1 christos }
390 1.1 christos if (EXT(statp).ext != NULL)
391 1.1 christos EXT(statp).ext->nsaddrs[lastns] = inu;
392 1.1 christos statp->nsaddr_list[lastns] = ina;
393 1.1 christos EXT(statp).nssocks[lastns] = fd;
394 1.1 christos EXT(statp).nstimes[lastns] = nstime;
395 1.1 christos }
396 1.1 christos
397 1.1 christos /*
398 1.1 christos * Send request, RETRY times, or until successful.
399 1.1 christos */
400 1.1 christos for (try = 0; try < statp->retry; try++) {
401 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
402 1.1 christos struct sockaddr *nsap;
403 1.1 christos int nsaplen;
404 1.2 christos nsap = get_nsaddr(statp, (size_t)ns);
405 1.1 christos nsaplen = get_salen(nsap);
406 1.1 christos statp->_flags &= ~RES_F_LASTMASK;
407 1.1 christos statp->_flags |= (ns << RES_F_LASTSHIFT);
408 1.1 christos same_ns:
409 1.1 christos if (statp->qhook) {
410 1.1 christos int done = 0, loops = 0;
411 1.1 christos
412 1.1 christos do {
413 1.1 christos res_sendhookact act;
414 1.1 christos
415 1.1 christos act = (*statp->qhook)(&nsap, &buf, &buflen,
416 1.1 christos ans, anssiz, &resplen);
417 1.1 christos switch (act) {
418 1.1 christos case res_goahead:
419 1.1 christos done = 1;
420 1.1 christos break;
421 1.1 christos case res_nextns:
422 1.1 christos res_nclose(statp);
423 1.1 christos goto next_ns;
424 1.1 christos case res_done:
425 1.1 christos return (resplen);
426 1.1 christos case res_modified:
427 1.1 christos /* give the hook another try */
428 1.1 christos if (++loops < 42) /*doug adams*/
429 1.1 christos break;
430 1.1 christos /*FALLTHROUGH*/
431 1.1 christos case res_error:
432 1.1 christos /*FALLTHROUGH*/
433 1.1 christos default:
434 1.1 christos goto fail;
435 1.1 christos }
436 1.1 christos } while (!done);
437 1.1 christos }
438 1.1 christos
439 1.1 christos Dprint(((statp->options & RES_DEBUG) &&
440 1.2 christos getnameinfo(nsap, (socklen_t)nsaplen, abuf, sizeof(abuf),
441 1.1 christos NULL, 0, niflags) == 0),
442 1.1 christos (stdout, ";; Querying server (# %d) address = %s\n",
443 1.1 christos ns + 1, abuf));
444 1.1 christos
445 1.1 christos
446 1.1 christos if (v_circuit) {
447 1.1 christos /* Use VC; at most one attempt per server. */
448 1.1 christos try = statp->retry;
449 1.1 christos n = send_vc(statp, buf, buflen, ans, anssiz, &terrno,
450 1.1 christos ns);
451 1.1 christos if (n < 0)
452 1.1 christos goto fail;
453 1.1 christos if (n == 0)
454 1.1 christos goto next_ns;
455 1.1 christos resplen = n;
456 1.1 christos } else {
457 1.1 christos /* Use datagrams. */
458 1.1 christos n = send_dg(statp, buf, buflen, ans, anssiz, &terrno,
459 1.1 christos ns, &v_circuit, &gotsomewhere);
460 1.1 christos if (n < 0)
461 1.1 christos goto fail;
462 1.1 christos if (n == 0)
463 1.1 christos goto next_ns;
464 1.1 christos if (v_circuit)
465 1.1 christos goto same_ns;
466 1.1 christos resplen = n;
467 1.1 christos }
468 1.1 christos
469 1.1 christos Dprint((statp->options & RES_DEBUG) ||
470 1.1 christos ((statp->pfcode & RES_PRF_REPLY) &&
471 1.1 christos (statp->pfcode & RES_PRF_HEAD1)),
472 1.1 christos (stdout, ";; got answer:\n"));
473 1.1 christos
474 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
475 1.1 christos (statp->pfcode & RES_PRF_REPLY),
476 1.1 christos (stdout, "%s", ""),
477 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
478 1.1 christos
479 1.1 christos /*
480 1.1 christos * If we have temporarily opened a virtual circuit,
481 1.1 christos * or if we haven't been asked to keep a socket open,
482 1.1 christos * close the socket.
483 1.1 christos */
484 1.1 christos if ((v_circuit && (statp->options & RES_USEVC) == 0U) ||
485 1.1 christos (statp->options & RES_STAYOPEN) == 0U) {
486 1.1 christos res_nclose(statp);
487 1.1 christos }
488 1.1 christos if (statp->rhook) {
489 1.1 christos int done = 0, loops = 0;
490 1.1 christos
491 1.1 christos do {
492 1.1 christos res_sendhookact act;
493 1.1 christos
494 1.1 christos act = (*statp->rhook)(nsap, buf, buflen,
495 1.1 christos ans, anssiz, &resplen);
496 1.1 christos switch (act) {
497 1.1 christos case res_goahead:
498 1.1 christos case res_done:
499 1.1 christos done = 1;
500 1.1 christos break;
501 1.1 christos case res_nextns:
502 1.1 christos res_nclose(statp);
503 1.1 christos goto next_ns;
504 1.1 christos case res_modified:
505 1.1 christos /* give the hook another try */
506 1.1 christos if (++loops < 42) /*doug adams*/
507 1.1 christos break;
508 1.1 christos /*FALLTHROUGH*/
509 1.1 christos case res_error:
510 1.1 christos /*FALLTHROUGH*/
511 1.1 christos default:
512 1.1 christos goto fail;
513 1.1 christos }
514 1.1 christos } while (!done);
515 1.1 christos
516 1.1 christos }
517 1.1 christos return (resplen);
518 1.1 christos next_ns: ;
519 1.1 christos } /*foreach ns*/
520 1.1 christos } /*foreach retry*/
521 1.1 christos res_nclose(statp);
522 1.1 christos if (!v_circuit) {
523 1.1 christos if (!gotsomewhere)
524 1.1 christos errno = ECONNREFUSED; /* no nameservers found */
525 1.1 christos else
526 1.1 christos errno = ETIMEDOUT; /* no answer obtained */
527 1.1 christos } else
528 1.1 christos errno = terrno;
529 1.1 christos return (-1);
530 1.1 christos fail:
531 1.1 christos res_nclose(statp);
532 1.1 christos return (-1);
533 1.1 christos }
534 1.1 christos
535 1.1 christos /* Private */
536 1.1 christos
537 1.1 christos static int
538 1.1 christos get_salen(sa)
539 1.1 christos const struct sockaddr *sa;
540 1.1 christos {
541 1.1 christos
542 1.1 christos #ifdef HAVE_SA_LEN
543 1.1 christos /* There are people do not set sa_len. Be forgiving to them. */
544 1.1 christos if (sa->sa_len)
545 1.1 christos return (sa->sa_len);
546 1.1 christos #endif
547 1.1 christos
548 1.1 christos if (sa->sa_family == AF_INET)
549 1.1 christos return (sizeof(struct sockaddr_in));
550 1.1 christos else if (sa->sa_family == AF_INET6)
551 1.1 christos return (sizeof(struct sockaddr_in6));
552 1.1 christos else
553 1.1 christos return (0); /* unknown, die on connect */
554 1.1 christos }
555 1.1 christos
556 1.1 christos /*
557 1.1 christos * pick appropriate nsaddr_list for use. see res_init() for initialization.
558 1.1 christos */
559 1.1 christos static struct sockaddr *
560 1.1 christos get_nsaddr(statp, n)
561 1.1 christos res_state statp;
562 1.1 christos size_t n;
563 1.1 christos {
564 1.1 christos
565 1.1 christos if (!statp->nsaddr_list[n].sin_family && EXT(statp).ext) {
566 1.1 christos /*
567 1.1 christos * - EXT(statp).ext->nsaddrs[n] holds an address that is larger
568 1.1 christos * than struct sockaddr, and
569 1.1 christos * - user code did not update statp->nsaddr_list[n].
570 1.1 christos */
571 1.1 christos return (struct sockaddr *)(void *)&EXT(statp).ext->nsaddrs[n];
572 1.1 christos } else {
573 1.1 christos /*
574 1.1 christos * - user code updated statp->nsaddr_list[n], or
575 1.1 christos * - statp->nsaddr_list[n] has the same content as
576 1.1 christos * EXT(statp).ext->nsaddrs[n].
577 1.1 christos */
578 1.1 christos return (struct sockaddr *)(void *)&statp->nsaddr_list[n];
579 1.1 christos }
580 1.1 christos }
581 1.1 christos
582 1.1 christos static int
583 1.1 christos send_vc(res_state statp,
584 1.1 christos const u_char *buf, int buflen, u_char *ans, int anssiz,
585 1.1 christos int *terrno, int ns)
586 1.1 christos {
587 1.3 christos const HEADER *hp = (const HEADER *)(const void *)buf;
588 1.3 christos HEADER *anhp = (HEADER *)(void *)ans;
589 1.1 christos struct sockaddr *nsap;
590 1.1 christos int nsaplen;
591 1.1 christos int truncating, connreset, resplen, n;
592 1.1 christos struct iovec iov[2];
593 1.1 christos u_short len;
594 1.1 christos u_char *cp;
595 1.1 christos void *tmp;
596 1.1 christos
597 1.2 christos nsap = get_nsaddr(statp, (size_t)ns);
598 1.1 christos nsaplen = get_salen(nsap);
599 1.1 christos
600 1.1 christos connreset = 0;
601 1.1 christos same_ns:
602 1.1 christos truncating = 0;
603 1.1 christos
604 1.1 christos /* Are we still talking to whom we want to talk to? */
605 1.1 christos if (statp->_vcsock >= 0 && (statp->_flags & RES_F_VC) != 0) {
606 1.1 christos struct sockaddr_storage peer;
607 1.1 christos ISC_SOCKLEN_T size = sizeof peer;
608 1.1 christos
609 1.1 christos if (getpeername(statp->_vcsock,
610 1.2 christos (struct sockaddr *)(void *)&peer, &size) < 0 ||
611 1.2 christos !sock_eq((struct sockaddr *)(void *)&peer, nsap)) {
612 1.1 christos res_nclose(statp);
613 1.1 christos statp->_flags &= ~RES_F_VC;
614 1.1 christos }
615 1.1 christos }
616 1.1 christos
617 1.1 christos if (statp->_vcsock < 0 || (statp->_flags & RES_F_VC) == 0) {
618 1.1 christos if (statp->_vcsock >= 0)
619 1.1 christos res_nclose(statp);
620 1.1 christos
621 1.1 christos statp->_vcsock = socket(nsap->sa_family, SOCK_STREAM, 0);
622 1.1 christos if (statp->_vcsock > highestFD) {
623 1.1 christos res_nclose(statp);
624 1.1 christos errno = ENOTSOCK;
625 1.1 christos }
626 1.1 christos if (statp->_vcsock < 0) {
627 1.1 christos switch (errno) {
628 1.1 christos case EPROTONOSUPPORT:
629 1.1 christos #ifdef EPFNOSUPPORT
630 1.1 christos case EPFNOSUPPORT:
631 1.1 christos #endif
632 1.1 christos case EAFNOSUPPORT:
633 1.1 christos Perror(statp, stderr, "socket(vc)", errno);
634 1.1 christos return (0);
635 1.1 christos default:
636 1.1 christos *terrno = errno;
637 1.1 christos Perror(statp, stderr, "socket(vc)", errno);
638 1.1 christos return (-1);
639 1.1 christos }
640 1.1 christos }
641 1.1 christos errno = 0;
642 1.2 christos if (connect(statp->_vcsock, nsap, (socklen_t)nsaplen) < 0) {
643 1.1 christos *terrno = errno;
644 1.1 christos Aerror(statp, stderr, "connect/vc", errno, nsap,
645 1.1 christos nsaplen);
646 1.1 christos res_nclose(statp);
647 1.1 christos return (0);
648 1.1 christos }
649 1.1 christos statp->_flags |= RES_F_VC;
650 1.1 christos }
651 1.1 christos
652 1.1 christos /*
653 1.1 christos * Send length & message
654 1.1 christos */
655 1.2 christos ns_put16((u_short)buflen, (u_char*)(void *)&len);
656 1.1 christos iov[0] = evConsIovec(&len, INT16SZ);
657 1.1 christos DE_CONST(buf, tmp);
658 1.2 christos iov[1] = evConsIovec(tmp, (size_t)buflen);
659 1.1 christos if (writev(statp->_vcsock, iov, 2) != (INT16SZ + buflen)) {
660 1.1 christos *terrno = errno;
661 1.1 christos Perror(statp, stderr, "write failed", errno);
662 1.1 christos res_nclose(statp);
663 1.1 christos return (0);
664 1.1 christos }
665 1.1 christos /*
666 1.1 christos * Receive length & response
667 1.1 christos */
668 1.1 christos read_len:
669 1.1 christos cp = ans;
670 1.1 christos len = INT16SZ;
671 1.2 christos while ((n = read(statp->_vcsock, (char *)cp, (size_t)len)) > 0) {
672 1.1 christos cp += n;
673 1.2 christos if ((len -= n) == 0)
674 1.1 christos break;
675 1.1 christos }
676 1.1 christos if (n <= 0) {
677 1.1 christos *terrno = errno;
678 1.1 christos Perror(statp, stderr, "read failed", errno);
679 1.1 christos res_nclose(statp);
680 1.1 christos /*
681 1.1 christos * A long running process might get its TCP
682 1.1 christos * connection reset if the remote server was
683 1.1 christos * restarted. Requery the server instead of
684 1.1 christos * trying a new one. When there is only one
685 1.1 christos * server, this means that a query might work
686 1.1 christos * instead of failing. We only allow one reset
687 1.1 christos * per query to prevent looping.
688 1.1 christos */
689 1.1 christos if (*terrno == ECONNRESET && !connreset) {
690 1.1 christos connreset = 1;
691 1.1 christos res_nclose(statp);
692 1.1 christos goto same_ns;
693 1.1 christos }
694 1.1 christos res_nclose(statp);
695 1.1 christos return (0);
696 1.1 christos }
697 1.1 christos resplen = ns_get16(ans);
698 1.1 christos if (resplen > anssiz) {
699 1.1 christos Dprint(statp->options & RES_DEBUG,
700 1.1 christos (stdout, ";; response truncated\n")
701 1.1 christos );
702 1.1 christos truncating = 1;
703 1.1 christos len = anssiz;
704 1.1 christos } else
705 1.1 christos len = resplen;
706 1.1 christos if (len < HFIXEDSZ) {
707 1.1 christos /*
708 1.1 christos * Undersized message.
709 1.1 christos */
710 1.1 christos Dprint(statp->options & RES_DEBUG,
711 1.1 christos (stdout, ";; undersized: %d\n", len));
712 1.1 christos *terrno = EMSGSIZE;
713 1.1 christos res_nclose(statp);
714 1.1 christos return (0);
715 1.1 christos }
716 1.1 christos cp = ans;
717 1.2 christos while (len != 0 && (n = read(statp->_vcsock, (char *)cp, (size_t)len)) > 0){
718 1.1 christos cp += n;
719 1.1 christos len -= n;
720 1.1 christos }
721 1.1 christos if (n <= 0) {
722 1.1 christos *terrno = errno;
723 1.1 christos Perror(statp, stderr, "read(vc)", errno);
724 1.1 christos res_nclose(statp);
725 1.1 christos return (0);
726 1.1 christos }
727 1.1 christos if (truncating) {
728 1.1 christos /*
729 1.1 christos * Flush rest of answer so connection stays in synch.
730 1.1 christos */
731 1.1 christos anhp->tc = 1;
732 1.1 christos len = resplen - anssiz;
733 1.1 christos while (len != 0) {
734 1.1 christos char junk[PACKETSZ];
735 1.1 christos
736 1.1 christos n = read(statp->_vcsock, junk,
737 1.1 christos (len > sizeof junk) ? sizeof junk : len);
738 1.1 christos if (n > 0)
739 1.1 christos len -= n;
740 1.1 christos else
741 1.1 christos break;
742 1.1 christos }
743 1.1 christos }
744 1.1 christos /*
745 1.1 christos * If the calling applicating has bailed out of
746 1.1 christos * a previous call and failed to arrange to have
747 1.1 christos * the circuit closed or the server has got
748 1.1 christos * itself confused, then drop the packet and
749 1.1 christos * wait for the correct one.
750 1.1 christos */
751 1.1 christos if (hp->id != anhp->id) {
752 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
753 1.1 christos (statp->pfcode & RES_PRF_REPLY),
754 1.1 christos (stdout, ";; old answer (unexpected):\n"),
755 1.1 christos ans, (resplen > anssiz) ? anssiz: resplen);
756 1.1 christos goto read_len;
757 1.1 christos }
758 1.1 christos
759 1.1 christos /*
760 1.1 christos * All is well, or the error is fatal. Signal that the
761 1.1 christos * next nameserver ought not be tried.
762 1.1 christos */
763 1.1 christos return (resplen);
764 1.1 christos }
765 1.1 christos
766 1.1 christos static int
767 1.1 christos send_dg(res_state statp,
768 1.1 christos const u_char *buf, int buflen, u_char *ans, int anssiz,
769 1.1 christos int *terrno, int ns, int *v_circuit, int *gotsomewhere)
770 1.1 christos {
771 1.2 christos const HEADER *hp = (const HEADER *)(const void *)buf;
772 1.2 christos HEADER *anhp = (HEADER *)(void *)ans;
773 1.1 christos const struct sockaddr *nsap;
774 1.1 christos int nsaplen;
775 1.1 christos struct timespec now, timeout, finish;
776 1.1 christos fd_set dsmask;
777 1.1 christos struct sockaddr_storage from;
778 1.1 christos ISC_SOCKLEN_T fromlen;
779 1.1 christos int resplen, seconds, n, s;
780 1.1 christos
781 1.2 christos nsap = get_nsaddr(statp, (size_t)ns);
782 1.1 christos nsaplen = get_salen(nsap);
783 1.1 christos if (EXT(statp).nssocks[ns] == -1) {
784 1.1 christos EXT(statp).nssocks[ns] = socket(nsap->sa_family, SOCK_DGRAM, 0);
785 1.1 christos if (EXT(statp).nssocks[ns] > highestFD) {
786 1.1 christos res_nclose(statp);
787 1.1 christos errno = ENOTSOCK;
788 1.1 christos }
789 1.1 christos if (EXT(statp).nssocks[ns] < 0) {
790 1.1 christos switch (errno) {
791 1.1 christos case EPROTONOSUPPORT:
792 1.1 christos #ifdef EPFNOSUPPORT
793 1.1 christos case EPFNOSUPPORT:
794 1.1 christos #endif
795 1.1 christos case EAFNOSUPPORT:
796 1.1 christos Perror(statp, stderr, "socket(dg)", errno);
797 1.1 christos return (0);
798 1.1 christos default:
799 1.1 christos *terrno = errno;
800 1.1 christos Perror(statp, stderr, "socket(dg)", errno);
801 1.1 christos return (-1);
802 1.1 christos }
803 1.1 christos }
804 1.1 christos #ifndef CANNOT_CONNECT_DGRAM
805 1.1 christos /*
806 1.1 christos * On a 4.3BSD+ machine (client and server,
807 1.1 christos * actually), sending to a nameserver datagram
808 1.1 christos * port with no nameserver will cause an
809 1.1 christos * ICMP port unreachable message to be returned.
810 1.1 christos * If our datagram socket is "connected" to the
811 1.1 christos * server, we get an ECONNREFUSED error on the next
812 1.1 christos * socket operation, and select returns if the
813 1.1 christos * error message is received. We can thus detect
814 1.1 christos * the absence of a nameserver without timing out.
815 1.1 christos */
816 1.2 christos if (connect(EXT(statp).nssocks[ns], nsap, (socklen_t)nsaplen) < 0) {
817 1.1 christos Aerror(statp, stderr, "connect(dg)", errno, nsap,
818 1.1 christos nsaplen);
819 1.1 christos res_nclose(statp);
820 1.1 christos return (0);
821 1.1 christos }
822 1.1 christos #endif /* !CANNOT_CONNECT_DGRAM */
823 1.1 christos Dprint(statp->options & RES_DEBUG,
824 1.1 christos (stdout, ";; new DG socket\n"))
825 1.1 christos }
826 1.1 christos s = EXT(statp).nssocks[ns];
827 1.1 christos #ifndef CANNOT_CONNECT_DGRAM
828 1.2 christos if (send(s, (const char*)buf, (size_t)buflen, 0) != buflen) {
829 1.1 christos Perror(statp, stderr, "send", errno);
830 1.1 christos res_nclose(statp);
831 1.1 christos return (0);
832 1.1 christos }
833 1.1 christos #else /* !CANNOT_CONNECT_DGRAM */
834 1.1 christos if (sendto(s, (const char*)buf, buflen, 0, nsap, nsaplen) != buflen)
835 1.1 christos {
836 1.1 christos Aerror(statp, stderr, "sendto", errno, nsap, nsaplen);
837 1.1 christos res_nclose(statp);
838 1.1 christos return (0);
839 1.1 christos }
840 1.1 christos #endif /* !CANNOT_CONNECT_DGRAM */
841 1.1 christos
842 1.1 christos /*
843 1.1 christos * Wait for reply.
844 1.1 christos */
845 1.1 christos seconds = (statp->retrans << ns);
846 1.1 christos if (ns > 0)
847 1.1 christos seconds /= statp->nscount;
848 1.1 christos if (seconds <= 0)
849 1.1 christos seconds = 1;
850 1.1 christos now = evNowTime();
851 1.3 christos timeout = evConsTime((long)seconds, 0L);
852 1.1 christos finish = evAddTime(now, timeout);
853 1.1 christos goto nonow;
854 1.1 christos wait:
855 1.1 christos now = evNowTime();
856 1.1 christos nonow:
857 1.1 christos FD_ZERO(&dsmask);
858 1.1 christos FD_SET(s, &dsmask);
859 1.1 christos if (evCmpTime(finish, now) > 0)
860 1.1 christos timeout = evSubTime(finish, now);
861 1.1 christos else
862 1.3 christos timeout = evConsTime(0L, 0L);
863 1.1 christos n = pselect(s + 1, &dsmask, NULL, NULL, &timeout, NULL);
864 1.1 christos if (n == 0) {
865 1.1 christos Dprint(statp->options & RES_DEBUG, (stdout, ";; timeout\n"));
866 1.1 christos *gotsomewhere = 1;
867 1.1 christos return (0);
868 1.1 christos }
869 1.1 christos if (n < 0) {
870 1.1 christos if (errno == EINTR)
871 1.1 christos goto wait;
872 1.1 christos Perror(statp, stderr, "select", errno);
873 1.1 christos res_nclose(statp);
874 1.1 christos return (0);
875 1.1 christos }
876 1.1 christos errno = 0;
877 1.1 christos fromlen = sizeof(from);
878 1.2 christos resplen = recvfrom(s, (char*)ans, (size_t)anssiz,0,
879 1.2 christos (struct sockaddr *)(void *)&from, &fromlen);
880 1.1 christos if (resplen <= 0) {
881 1.1 christos Perror(statp, stderr, "recvfrom", errno);
882 1.1 christos res_nclose(statp);
883 1.1 christos return (0);
884 1.1 christos }
885 1.1 christos *gotsomewhere = 1;
886 1.1 christos if (resplen < HFIXEDSZ) {
887 1.1 christos /*
888 1.1 christos * Undersized message.
889 1.1 christos */
890 1.1 christos Dprint(statp->options & RES_DEBUG,
891 1.1 christos (stdout, ";; undersized: %d\n",
892 1.1 christos resplen));
893 1.1 christos *terrno = EMSGSIZE;
894 1.1 christos res_nclose(statp);
895 1.1 christos return (0);
896 1.1 christos }
897 1.1 christos if (hp->id != anhp->id) {
898 1.1 christos /*
899 1.1 christos * response from old query, ignore it.
900 1.1 christos * XXX - potential security hazard could
901 1.1 christos * be detected here.
902 1.1 christos */
903 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
904 1.1 christos (statp->pfcode & RES_PRF_REPLY),
905 1.1 christos (stdout, ";; old answer:\n"),
906 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
907 1.1 christos goto wait;
908 1.1 christos }
909 1.1 christos if (!(statp->options & RES_INSECURE1) &&
910 1.2 christos !res_ourserver_p(statp, (struct sockaddr *)(void *)&from)) {
911 1.1 christos /*
912 1.1 christos * response from wrong server? ignore it.
913 1.1 christos * XXX - potential security hazard could
914 1.1 christos * be detected here.
915 1.1 christos */
916 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
917 1.1 christos (statp->pfcode & RES_PRF_REPLY),
918 1.1 christos (stdout, ";; not our server:\n"),
919 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
920 1.1 christos goto wait;
921 1.1 christos }
922 1.1 christos #ifdef RES_USE_EDNS0
923 1.1 christos if (anhp->rcode == FORMERR && (statp->options & RES_USE_EDNS0) != 0U) {
924 1.1 christos /*
925 1.1 christos * Do not retry if the server do not understand EDNS0.
926 1.1 christos * The case has to be captured here, as FORMERR packet do not
927 1.1 christos * carry query section, hence res_queriesmatch() returns 0.
928 1.1 christos */
929 1.1 christos DprintQ(statp->options & RES_DEBUG,
930 1.1 christos (stdout, "server rejected query with EDNS0:\n"),
931 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
932 1.1 christos /* record the error */
933 1.1 christos statp->_flags |= RES_F_EDNS0ERR;
934 1.1 christos res_nclose(statp);
935 1.1 christos return (0);
936 1.1 christos }
937 1.1 christos #endif
938 1.1 christos if (!(statp->options & RES_INSECURE2) &&
939 1.1 christos !res_queriesmatch(buf, buf + buflen,
940 1.1 christos ans, ans + anssiz)) {
941 1.1 christos /*
942 1.1 christos * response contains wrong query? ignore it.
943 1.1 christos * XXX - potential security hazard could
944 1.1 christos * be detected here.
945 1.1 christos */
946 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
947 1.1 christos (statp->pfcode & RES_PRF_REPLY),
948 1.1 christos (stdout, ";; wrong query name:\n"),
949 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
950 1.1 christos goto wait;
951 1.1 christos }
952 1.1 christos if (anhp->rcode == SERVFAIL ||
953 1.1 christos anhp->rcode == NOTIMP ||
954 1.1 christos anhp->rcode == REFUSED) {
955 1.1 christos DprintQ(statp->options & RES_DEBUG,
956 1.1 christos (stdout, "server rejected query:\n"),
957 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
958 1.1 christos res_nclose(statp);
959 1.1 christos /* don't retry if called from dig */
960 1.1 christos if (!statp->pfcode)
961 1.1 christos return (0);
962 1.1 christos }
963 1.1 christos if (!(statp->options & RES_IGNTC) && anhp->tc) {
964 1.1 christos /*
965 1.1 christos * To get the rest of answer,
966 1.1 christos * use TCP with same server.
967 1.1 christos */
968 1.1 christos Dprint(statp->options & RES_DEBUG,
969 1.1 christos (stdout, ";; truncated answer\n"));
970 1.1 christos *v_circuit = 1;
971 1.1 christos res_nclose(statp);
972 1.1 christos return (1);
973 1.1 christos }
974 1.1 christos /*
975 1.1 christos * All is well, or the error is fatal. Signal that the
976 1.1 christos * next nameserver ought not be tried.
977 1.1 christos */
978 1.1 christos return (resplen);
979 1.1 christos }
980 1.1 christos
981 1.1 christos static void
982 1.1 christos Aerror(const res_state statp, FILE *file, const char *string, int error,
983 1.1 christos const struct sockaddr *address, int alen)
984 1.1 christos {
985 1.1 christos int save = errno;
986 1.1 christos char hbuf[NI_MAXHOST];
987 1.1 christos char sbuf[NI_MAXSERV];
988 1.1 christos
989 1.1 christos alen = alen;
990 1.1 christos
991 1.1 christos if ((statp->options & RES_DEBUG) != 0U) {
992 1.2 christos if (getnameinfo(address, (socklen_t)alen, hbuf, sizeof(hbuf),
993 1.1 christos sbuf, sizeof(sbuf), niflags)) {
994 1.1 christos strncpy(hbuf, "?", sizeof(hbuf) - 1);
995 1.1 christos hbuf[sizeof(hbuf) - 1] = '\0';
996 1.1 christos strncpy(sbuf, "?", sizeof(sbuf) - 1);
997 1.1 christos sbuf[sizeof(sbuf) - 1] = '\0';
998 1.1 christos }
999 1.1 christos fprintf(file, "res_send: %s ([%s].%s): %s\n",
1000 1.1 christos string, hbuf, sbuf, strerror(error));
1001 1.1 christos }
1002 1.1 christos errno = save;
1003 1.1 christos }
1004 1.1 christos
1005 1.1 christos static void
1006 1.1 christos Perror(const res_state statp, FILE *file, const char *string, int error) {
1007 1.1 christos int save = errno;
1008 1.1 christos
1009 1.1 christos if ((statp->options & RES_DEBUG) != 0U)
1010 1.1 christos fprintf(file, "res_send: %s: %s\n",
1011 1.1 christos string, strerror(error));
1012 1.1 christos errno = save;
1013 1.1 christos }
1014 1.1 christos
1015 1.1 christos static int
1016 1.1 christos sock_eq(struct sockaddr *a, struct sockaddr *b) {
1017 1.1 christos struct sockaddr_in *a4, *b4;
1018 1.1 christos struct sockaddr_in6 *a6, *b6;
1019 1.1 christos
1020 1.1 christos if (a->sa_family != b->sa_family)
1021 1.1 christos return 0;
1022 1.1 christos switch (a->sa_family) {
1023 1.1 christos case AF_INET:
1024 1.2 christos a4 = (struct sockaddr_in *)(void *)a;
1025 1.2 christos b4 = (struct sockaddr_in *)(void *)b;
1026 1.1 christos return a4->sin_port == b4->sin_port &&
1027 1.1 christos a4->sin_addr.s_addr == b4->sin_addr.s_addr;
1028 1.1 christos case AF_INET6:
1029 1.2 christos a6 = (struct sockaddr_in6 *)(void *)a;
1030 1.2 christos b6 = (struct sockaddr_in6 *)(void *)b;
1031 1.1 christos return a6->sin6_port == b6->sin6_port &&
1032 1.1 christos #ifdef HAVE_SIN6_SCOPE_ID
1033 1.1 christos a6->sin6_scope_id == b6->sin6_scope_id &&
1034 1.1 christos #endif
1035 1.1 christos IN6_ARE_ADDR_EQUAL(&a6->sin6_addr, &b6->sin6_addr);
1036 1.1 christos default:
1037 1.1 christos return 0;
1038 1.1 christos }
1039 1.1 christos }
1040 1.1 christos
1041 1.1 christos #ifdef NEED_PSELECT
1042 1.1 christos /* XXX needs to move to the porting library. */
1043 1.1 christos static int
1044 1.1 christos pselect(int nfds, void *rfds, void *wfds, void *efds,
1045 1.1 christos struct timespec *tsp, const sigset_t *sigmask)
1046 1.1 christos {
1047 1.1 christos struct timeval tv, *tvp;
1048 1.1 christos sigset_t sigs;
1049 1.1 christos int n;
1050 1.1 christos
1051 1.1 christos if (tsp) {
1052 1.1 christos tvp = &tv;
1053 1.1 christos tv = evTimeVal(*tsp);
1054 1.1 christos } else
1055 1.1 christos tvp = NULL;
1056 1.1 christos if (sigmask)
1057 1.1 christos sigprocmask(SIG_SETMASK, sigmask, &sigs);
1058 1.1 christos n = select(nfds, rfds, wfds, efds, tvp);
1059 1.1 christos if (sigmask)
1060 1.1 christos sigprocmask(SIG_SETMASK, &sigs, NULL);
1061 1.1 christos if (tsp)
1062 1.1 christos *tsp = evTimeSpec(tv);
1063 1.1 christos return (n);
1064 1.1 christos }
1065 1.1 christos #endif
1066