res_send.c revision 1.7 1 1.7 christos /* $NetBSD: res_send.c,v 1.7 2004/11/07 02:25:01 christos Exp $ */
2 1.1 christos
3 1.1 christos /*
4 1.1 christos * Copyright (c) 1985, 1989, 1993
5 1.1 christos * The Regents of the University of California. All rights reserved.
6 1.1 christos *
7 1.1 christos * Redistribution and use in source and binary forms, with or without
8 1.1 christos * modification, are permitted provided that the following conditions
9 1.1 christos * are met:
10 1.1 christos * 1. Redistributions of source code must retain the above copyright
11 1.1 christos * notice, this list of conditions and the following disclaimer.
12 1.1 christos * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 christos * notice, this list of conditions and the following disclaimer in the
14 1.1 christos * documentation and/or other materials provided with the distribution.
15 1.1 christos * 3. All advertising materials mentioning features or use of this software
16 1.1 christos * must display the following acknowledgement:
17 1.1 christos * This product includes software developed by the University of
18 1.1 christos * California, Berkeley and its contributors.
19 1.1 christos * 4. Neither the name of the University nor the names of its contributors
20 1.1 christos * may be used to endorse or promote products derived from this software
21 1.1 christos * without specific prior written permission.
22 1.1 christos *
23 1.1 christos * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24 1.1 christos * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 1.1 christos * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 1.1 christos * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 1.1 christos * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 1.1 christos * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 1.1 christos * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 1.1 christos * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 1.1 christos * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 1.1 christos * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 1.1 christos * SUCH DAMAGE.
34 1.1 christos */
35 1.1 christos
36 1.1 christos /*
37 1.1 christos * Portions Copyright (c) 1993 by Digital Equipment Corporation.
38 1.1 christos *
39 1.1 christos * Permission to use, copy, modify, and distribute this software for any
40 1.1 christos * purpose with or without fee is hereby granted, provided that the above
41 1.1 christos * copyright notice and this permission notice appear in all copies, and that
42 1.1 christos * the name of Digital Equipment Corporation not be used in advertising or
43 1.1 christos * publicity pertaining to distribution of the document or software without
44 1.1 christos * specific, written prior permission.
45 1.1 christos *
46 1.1 christos * THE SOFTWARE IS PROVIDED "AS IS" AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL
47 1.1 christos * WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES
48 1.1 christos * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT
49 1.1 christos * CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
50 1.1 christos * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
51 1.1 christos * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
52 1.1 christos * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
53 1.1 christos * SOFTWARE.
54 1.1 christos */
55 1.1 christos
56 1.1 christos /*
57 1.1 christos * Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")
58 1.1 christos * Portions Copyright (c) 1996-1999 by Internet Software Consortium.
59 1.1 christos *
60 1.1 christos * Permission to use, copy, modify, and distribute this software for any
61 1.1 christos * purpose with or without fee is hereby granted, provided that the above
62 1.1 christos * copyright notice and this permission notice appear in all copies.
63 1.1 christos *
64 1.1 christos * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES
65 1.1 christos * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
66 1.1 christos * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR
67 1.1 christos * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
68 1.1 christos * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
69 1.1 christos * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
70 1.1 christos * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
71 1.1 christos */
72 1.1 christos
73 1.4 christos #include <sys/cdefs.h>
74 1.1 christos #if defined(LIBC_SCCS) && !defined(lint)
75 1.4 christos #ifdef notdef
76 1.1 christos static const char sccsid[] = "@(#)res_send.c 8.1 (Berkeley) 6/4/93";
77 1.7 christos static const char rcsid[] = "Id: res_send.c,v 1.5.2.2.4.5 2004/08/10 02:19:56 marka Exp";
78 1.4 christos #else
79 1.7 christos __RCSID("$NetBSD: res_send.c,v 1.7 2004/11/07 02:25:01 christos Exp $");
80 1.4 christos #endif
81 1.1 christos #endif /* LIBC_SCCS and not lint */
82 1.1 christos
83 1.1 christos /*
84 1.1 christos * Send query to name server and wait for reply.
85 1.1 christos */
86 1.1 christos
87 1.1 christos #include "port_before.h"
88 1.1 christos #include "fd_setsize.h"
89 1.1 christos
90 1.1 christos #include <sys/types.h>
91 1.1 christos #include <sys/param.h>
92 1.1 christos #include <sys/time.h>
93 1.1 christos #include <sys/socket.h>
94 1.1 christos #include <sys/uio.h>
95 1.1 christos
96 1.1 christos #include <netinet/in.h>
97 1.1 christos #include <arpa/nameser.h>
98 1.1 christos #include <arpa/inet.h>
99 1.1 christos
100 1.1 christos #include <errno.h>
101 1.1 christos #include <netdb.h>
102 1.1 christos #include <resolv.h>
103 1.1 christos #include <signal.h>
104 1.1 christos #include <stdio.h>
105 1.1 christos #include <stdlib.h>
106 1.1 christos #include <string.h>
107 1.1 christos #include <unistd.h>
108 1.1 christos
109 1.1 christos #include <isc/eventlib.h>
110 1.1 christos
111 1.1 christos #include "port_after.h"
112 1.1 christos
113 1.6 christos #if 0
114 1.5 christos #ifdef __weak_alias
115 1.5 christos __weak_alias(res_ourserver_p,__res_ourserver_p)
116 1.5 christos __weak_alias(res_nameinquery,__res_nameinquery)
117 1.5 christos __weak_alias(res_queriesmatch,__res_queriesmatch)
118 1.5 christos __weak_alias(res_nsend,__res_nsend)
119 1.5 christos #endif
120 1.6 christos #endif
121 1.5 christos
122 1.1 christos /* Options. Leave them on. */
123 1.1 christos #define DEBUG
124 1.1 christos #include "res_debug.h"
125 1.1 christos #include "res_private.h"
126 1.1 christos
127 1.1 christos #define EXT(res) ((res)->_u._ext)
128 1.1 christos
129 1.1 christos static const int highestFD = FD_SETSIZE - 1;
130 1.1 christos
131 1.1 christos /* Forward. */
132 1.1 christos
133 1.1 christos static int get_salen __P((const struct sockaddr *));
134 1.1 christos static struct sockaddr * get_nsaddr __P((res_state, size_t));
135 1.1 christos static int send_vc(res_state, const u_char *, int,
136 1.1 christos u_char *, int, int *, int);
137 1.1 christos static int send_dg(res_state, const u_char *, int,
138 1.1 christos u_char *, int, int *, int,
139 1.1 christos int *, int *);
140 1.1 christos static void Aerror(const res_state, FILE *, const char *, int,
141 1.1 christos const struct sockaddr *, int);
142 1.1 christos static void Perror(const res_state, FILE *, const char *, int);
143 1.1 christos static int sock_eq(struct sockaddr *, struct sockaddr *);
144 1.1 christos #ifdef NEED_PSELECT
145 1.1 christos static int pselect(int, void *, void *, void *,
146 1.1 christos struct timespec *,
147 1.1 christos const sigset_t *);
148 1.1 christos #endif
149 1.1 christos void res_pquery(const res_state, const u_char *, int, FILE *);
150 1.1 christos
151 1.1 christos static const int niflags = NI_NUMERICHOST | NI_NUMERICSERV;
152 1.1 christos
153 1.1 christos /* Public. */
154 1.1 christos
155 1.1 christos /* int
156 1.1 christos * res_isourserver(ina)
157 1.1 christos * looks up "ina" in _res.ns_addr_list[]
158 1.1 christos * returns:
159 1.1 christos * 0 : not found
160 1.1 christos * >0 : found
161 1.1 christos * author:
162 1.1 christos * paul vixie, 29may94
163 1.1 christos */
164 1.1 christos int
165 1.1 christos res_ourserver_p(const res_state statp, const struct sockaddr *sa) {
166 1.1 christos const struct sockaddr_in *inp, *srv;
167 1.1 christos const struct sockaddr_in6 *in6p, *srv6;
168 1.1 christos int ns;
169 1.1 christos
170 1.1 christos switch (sa->sa_family) {
171 1.1 christos case AF_INET:
172 1.3 christos inp = (const struct sockaddr_in *)(const void *)sa;
173 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
174 1.2 christos srv = (struct sockaddr_in *)(void *)get_nsaddr(statp, (size_t)ns);
175 1.1 christos if (srv->sin_family == inp->sin_family &&
176 1.1 christos srv->sin_port == inp->sin_port &&
177 1.1 christos (srv->sin_addr.s_addr == INADDR_ANY ||
178 1.1 christos srv->sin_addr.s_addr == inp->sin_addr.s_addr))
179 1.1 christos return (1);
180 1.1 christos }
181 1.1 christos break;
182 1.1 christos case AF_INET6:
183 1.1 christos if (EXT(statp).ext == NULL)
184 1.1 christos break;
185 1.3 christos in6p = (const struct sockaddr_in6 *)(const void *)sa;
186 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
187 1.2 christos srv6 = (struct sockaddr_in6 *)(void *)get_nsaddr(statp, (size_t)ns);
188 1.1 christos if (srv6->sin6_family == in6p->sin6_family &&
189 1.1 christos srv6->sin6_port == in6p->sin6_port &&
190 1.1 christos #ifdef HAVE_SIN6_SCOPE_ID
191 1.7 christos (srv6->sin6_scope_id == 0 ||
192 1.7 christos srv6->sin6_scope_id == in6p->sin6_scope_id) &&
193 1.1 christos #endif
194 1.1 christos (IN6_IS_ADDR_UNSPECIFIED(&srv6->sin6_addr) ||
195 1.1 christos IN6_ARE_ADDR_EQUAL(&srv6->sin6_addr, &in6p->sin6_addr)))
196 1.1 christos return (1);
197 1.1 christos }
198 1.1 christos break;
199 1.1 christos default:
200 1.1 christos break;
201 1.1 christos }
202 1.1 christos return (0);
203 1.1 christos }
204 1.1 christos
205 1.1 christos /* int
206 1.1 christos * res_nameinquery(name, type, class, buf, eom)
207 1.1 christos * look for (name,type,class) in the query section of packet (buf,eom)
208 1.1 christos * requires:
209 1.1 christos * buf + HFIXEDSZ <= eom
210 1.1 christos * returns:
211 1.1 christos * -1 : format error
212 1.1 christos * 0 : not found
213 1.1 christos * >0 : found
214 1.1 christos * author:
215 1.1 christos * paul vixie, 29may94
216 1.1 christos */
217 1.1 christos int
218 1.1 christos res_nameinquery(const char *name, int type, int class,
219 1.1 christos const u_char *buf, const u_char *eom)
220 1.1 christos {
221 1.1 christos const u_char *cp = buf + HFIXEDSZ;
222 1.2 christos int qdcount = ntohs(((const HEADER*)(const void *)buf)->qdcount);
223 1.1 christos
224 1.1 christos while (qdcount-- > 0) {
225 1.1 christos char tname[MAXDNAME+1];
226 1.1 christos int n, ttype, tclass;
227 1.1 christos
228 1.1 christos n = dn_expand(buf, eom, cp, tname, sizeof tname);
229 1.1 christos if (n < 0)
230 1.1 christos return (-1);
231 1.1 christos cp += n;
232 1.1 christos if (cp + 2 * INT16SZ > eom)
233 1.1 christos return (-1);
234 1.1 christos ttype = ns_get16(cp); cp += INT16SZ;
235 1.1 christos tclass = ns_get16(cp); cp += INT16SZ;
236 1.1 christos if (ttype == type && tclass == class &&
237 1.1 christos ns_samename(tname, name) == 1)
238 1.1 christos return (1);
239 1.1 christos }
240 1.1 christos return (0);
241 1.1 christos }
242 1.1 christos
243 1.1 christos /* int
244 1.1 christos * res_queriesmatch(buf1, eom1, buf2, eom2)
245 1.1 christos * is there a 1:1 mapping of (name,type,class)
246 1.1 christos * in (buf1,eom1) and (buf2,eom2)?
247 1.1 christos * returns:
248 1.1 christos * -1 : format error
249 1.1 christos * 0 : not a 1:1 mapping
250 1.1 christos * >0 : is a 1:1 mapping
251 1.1 christos * author:
252 1.1 christos * paul vixie, 29may94
253 1.1 christos */
254 1.1 christos int
255 1.1 christos res_queriesmatch(const u_char *buf1, const u_char *eom1,
256 1.1 christos const u_char *buf2, const u_char *eom2)
257 1.1 christos {
258 1.1 christos const u_char *cp = buf1 + HFIXEDSZ;
259 1.2 christos int qdcount = ntohs(((const HEADER*)(const void *)buf1)->qdcount);
260 1.1 christos
261 1.1 christos if (buf1 + HFIXEDSZ > eom1 || buf2 + HFIXEDSZ > eom2)
262 1.1 christos return (-1);
263 1.1 christos
264 1.1 christos /*
265 1.1 christos * Only header section present in replies to
266 1.1 christos * dynamic update packets.
267 1.1 christos */
268 1.2 christos if ((((const HEADER *)(const void *)buf1)->opcode == ns_o_update) &&
269 1.2 christos (((const HEADER *)(const void *)buf2)->opcode == ns_o_update))
270 1.1 christos return (1);
271 1.1 christos
272 1.2 christos if (qdcount != ntohs(((const HEADER*)(const void *)buf2)->qdcount))
273 1.1 christos return (0);
274 1.1 christos while (qdcount-- > 0) {
275 1.1 christos char tname[MAXDNAME+1];
276 1.1 christos int n, ttype, tclass;
277 1.1 christos
278 1.1 christos n = dn_expand(buf1, eom1, cp, tname, sizeof tname);
279 1.1 christos if (n < 0)
280 1.1 christos return (-1);
281 1.1 christos cp += n;
282 1.1 christos if (cp + 2 * INT16SZ > eom1)
283 1.1 christos return (-1);
284 1.1 christos ttype = ns_get16(cp); cp += INT16SZ;
285 1.1 christos tclass = ns_get16(cp); cp += INT16SZ;
286 1.1 christos if (!res_nameinquery(tname, ttype, tclass, buf2, eom2))
287 1.1 christos return (0);
288 1.1 christos }
289 1.1 christos return (1);
290 1.1 christos }
291 1.1 christos
292 1.1 christos int
293 1.1 christos res_nsend(res_state statp,
294 1.1 christos const u_char *buf, int buflen, u_char *ans, int anssiz)
295 1.1 christos {
296 1.1 christos int gotsomewhere, terrno, try, v_circuit, resplen, ns, n;
297 1.1 christos char abuf[NI_MAXHOST];
298 1.1 christos
299 1.1 christos if (statp->nscount == 0) {
300 1.1 christos errno = ESRCH;
301 1.1 christos return (-1);
302 1.1 christos }
303 1.1 christos if (anssiz < HFIXEDSZ) {
304 1.1 christos errno = EINVAL;
305 1.1 christos return (-1);
306 1.1 christos }
307 1.1 christos DprintQ((statp->options & RES_DEBUG) || (statp->pfcode & RES_PRF_QUERY),
308 1.1 christos (stdout, ";; res_send()\n"), buf, buflen);
309 1.1 christos v_circuit = (statp->options & RES_USEVC) || buflen > PACKETSZ;
310 1.1 christos gotsomewhere = 0;
311 1.1 christos terrno = ETIMEDOUT;
312 1.1 christos
313 1.1 christos /*
314 1.1 christos * If the ns_addr_list in the resolver context has changed, then
315 1.1 christos * invalidate our cached copy and the associated timing data.
316 1.1 christos */
317 1.1 christos if (EXT(statp).nscount != 0) {
318 1.1 christos int needclose = 0;
319 1.1 christos struct sockaddr_storage peer;
320 1.1 christos ISC_SOCKLEN_T peerlen;
321 1.1 christos
322 1.1 christos if (EXT(statp).nscount != statp->nscount)
323 1.1 christos needclose++;
324 1.1 christos else
325 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
326 1.1 christos if (statp->nsaddr_list[ns].sin_family &&
327 1.2 christos !sock_eq((struct sockaddr *)(void *)&statp->nsaddr_list[ns],
328 1.2 christos (struct sockaddr *)(void *)&EXT(statp).ext->nsaddrs[ns])) {
329 1.1 christos needclose++;
330 1.1 christos break;
331 1.1 christos }
332 1.1 christos
333 1.1 christos if (EXT(statp).nssocks[ns] == -1)
334 1.1 christos continue;
335 1.1 christos peerlen = sizeof(peer);
336 1.1 christos if (getsockname(EXT(statp).nssocks[ns],
337 1.2 christos (struct sockaddr *)(void *)&peer, &peerlen) < 0) {
338 1.1 christos needclose++;
339 1.1 christos break;
340 1.1 christos }
341 1.2 christos if (!sock_eq((struct sockaddr *)(void *)&peer,
342 1.2 christos get_nsaddr(statp, (size_t)ns))) {
343 1.1 christos needclose++;
344 1.1 christos break;
345 1.1 christos }
346 1.1 christos }
347 1.1 christos if (needclose) {
348 1.1 christos res_nclose(statp);
349 1.1 christos EXT(statp).nscount = 0;
350 1.1 christos }
351 1.1 christos }
352 1.1 christos
353 1.1 christos /*
354 1.1 christos * Maybe initialize our private copy of the ns_addr_list.
355 1.1 christos */
356 1.1 christos if (EXT(statp).nscount == 0) {
357 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
358 1.1 christos EXT(statp).nstimes[ns] = RES_MAXTIME;
359 1.1 christos EXT(statp).nssocks[ns] = -1;
360 1.1 christos if (!statp->nsaddr_list[ns].sin_family)
361 1.1 christos continue;
362 1.1 christos EXT(statp).ext->nsaddrs[ns].sin =
363 1.1 christos statp->nsaddr_list[ns];
364 1.1 christos }
365 1.1 christos EXT(statp).nscount = statp->nscount;
366 1.1 christos }
367 1.1 christos
368 1.1 christos /*
369 1.1 christos * Some resolvers want to even out the load on their nameservers.
370 1.1 christos * Note that RES_BLAST overrides RES_ROTATE.
371 1.1 christos */
372 1.1 christos if ((statp->options & RES_ROTATE) != 0U &&
373 1.1 christos (statp->options & RES_BLAST) == 0U) {
374 1.1 christos union res_sockaddr_union inu;
375 1.1 christos struct sockaddr_in ina;
376 1.1 christos int lastns = statp->nscount - 1;
377 1.1 christos int fd;
378 1.1 christos u_int16_t nstime;
379 1.1 christos
380 1.1 christos if (EXT(statp).ext != NULL)
381 1.1 christos inu = EXT(statp).ext->nsaddrs[0];
382 1.1 christos ina = statp->nsaddr_list[0];
383 1.1 christos fd = EXT(statp).nssocks[0];
384 1.1 christos nstime = EXT(statp).nstimes[0];
385 1.1 christos for (ns = 0; ns < lastns; ns++) {
386 1.1 christos if (EXT(statp).ext != NULL)
387 1.1 christos EXT(statp).ext->nsaddrs[ns] =
388 1.1 christos EXT(statp).ext->nsaddrs[ns + 1];
389 1.1 christos statp->nsaddr_list[ns] = statp->nsaddr_list[ns + 1];
390 1.1 christos EXT(statp).nssocks[ns] = EXT(statp).nssocks[ns + 1];
391 1.1 christos EXT(statp).nstimes[ns] = EXT(statp).nstimes[ns + 1];
392 1.1 christos }
393 1.1 christos if (EXT(statp).ext != NULL)
394 1.1 christos EXT(statp).ext->nsaddrs[lastns] = inu;
395 1.1 christos statp->nsaddr_list[lastns] = ina;
396 1.1 christos EXT(statp).nssocks[lastns] = fd;
397 1.1 christos EXT(statp).nstimes[lastns] = nstime;
398 1.1 christos }
399 1.1 christos
400 1.1 christos /*
401 1.1 christos * Send request, RETRY times, or until successful.
402 1.1 christos */
403 1.1 christos for (try = 0; try < statp->retry; try++) {
404 1.1 christos for (ns = 0; ns < statp->nscount; ns++) {
405 1.1 christos struct sockaddr *nsap;
406 1.1 christos int nsaplen;
407 1.2 christos nsap = get_nsaddr(statp, (size_t)ns);
408 1.1 christos nsaplen = get_salen(nsap);
409 1.1 christos statp->_flags &= ~RES_F_LASTMASK;
410 1.1 christos statp->_flags |= (ns << RES_F_LASTSHIFT);
411 1.1 christos same_ns:
412 1.1 christos if (statp->qhook) {
413 1.1 christos int done = 0, loops = 0;
414 1.1 christos
415 1.1 christos do {
416 1.1 christos res_sendhookact act;
417 1.1 christos
418 1.1 christos act = (*statp->qhook)(&nsap, &buf, &buflen,
419 1.1 christos ans, anssiz, &resplen);
420 1.1 christos switch (act) {
421 1.1 christos case res_goahead:
422 1.1 christos done = 1;
423 1.1 christos break;
424 1.1 christos case res_nextns:
425 1.1 christos res_nclose(statp);
426 1.1 christos goto next_ns;
427 1.1 christos case res_done:
428 1.1 christos return (resplen);
429 1.1 christos case res_modified:
430 1.1 christos /* give the hook another try */
431 1.1 christos if (++loops < 42) /*doug adams*/
432 1.1 christos break;
433 1.1 christos /*FALLTHROUGH*/
434 1.1 christos case res_error:
435 1.1 christos /*FALLTHROUGH*/
436 1.1 christos default:
437 1.1 christos goto fail;
438 1.1 christos }
439 1.1 christos } while (!done);
440 1.1 christos }
441 1.1 christos
442 1.1 christos Dprint(((statp->options & RES_DEBUG) &&
443 1.2 christos getnameinfo(nsap, (socklen_t)nsaplen, abuf, sizeof(abuf),
444 1.1 christos NULL, 0, niflags) == 0),
445 1.1 christos (stdout, ";; Querying server (# %d) address = %s\n",
446 1.1 christos ns + 1, abuf));
447 1.1 christos
448 1.1 christos
449 1.1 christos if (v_circuit) {
450 1.1 christos /* Use VC; at most one attempt per server. */
451 1.1 christos try = statp->retry;
452 1.1 christos n = send_vc(statp, buf, buflen, ans, anssiz, &terrno,
453 1.1 christos ns);
454 1.1 christos if (n < 0)
455 1.1 christos goto fail;
456 1.1 christos if (n == 0)
457 1.1 christos goto next_ns;
458 1.1 christos resplen = n;
459 1.1 christos } else {
460 1.1 christos /* Use datagrams. */
461 1.1 christos n = send_dg(statp, buf, buflen, ans, anssiz, &terrno,
462 1.1 christos ns, &v_circuit, &gotsomewhere);
463 1.1 christos if (n < 0)
464 1.1 christos goto fail;
465 1.1 christos if (n == 0)
466 1.1 christos goto next_ns;
467 1.1 christos if (v_circuit)
468 1.1 christos goto same_ns;
469 1.1 christos resplen = n;
470 1.1 christos }
471 1.1 christos
472 1.1 christos Dprint((statp->options & RES_DEBUG) ||
473 1.1 christos ((statp->pfcode & RES_PRF_REPLY) &&
474 1.1 christos (statp->pfcode & RES_PRF_HEAD1)),
475 1.1 christos (stdout, ";; got answer:\n"));
476 1.1 christos
477 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
478 1.1 christos (statp->pfcode & RES_PRF_REPLY),
479 1.1 christos (stdout, "%s", ""),
480 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
481 1.1 christos
482 1.1 christos /*
483 1.1 christos * If we have temporarily opened a virtual circuit,
484 1.1 christos * or if we haven't been asked to keep a socket open,
485 1.1 christos * close the socket.
486 1.1 christos */
487 1.1 christos if ((v_circuit && (statp->options & RES_USEVC) == 0U) ||
488 1.1 christos (statp->options & RES_STAYOPEN) == 0U) {
489 1.1 christos res_nclose(statp);
490 1.1 christos }
491 1.1 christos if (statp->rhook) {
492 1.1 christos int done = 0, loops = 0;
493 1.1 christos
494 1.1 christos do {
495 1.1 christos res_sendhookact act;
496 1.1 christos
497 1.1 christos act = (*statp->rhook)(nsap, buf, buflen,
498 1.1 christos ans, anssiz, &resplen);
499 1.1 christos switch (act) {
500 1.1 christos case res_goahead:
501 1.1 christos case res_done:
502 1.1 christos done = 1;
503 1.1 christos break;
504 1.1 christos case res_nextns:
505 1.1 christos res_nclose(statp);
506 1.1 christos goto next_ns;
507 1.1 christos case res_modified:
508 1.1 christos /* give the hook another try */
509 1.1 christos if (++loops < 42) /*doug adams*/
510 1.1 christos break;
511 1.1 christos /*FALLTHROUGH*/
512 1.1 christos case res_error:
513 1.1 christos /*FALLTHROUGH*/
514 1.1 christos default:
515 1.1 christos goto fail;
516 1.1 christos }
517 1.1 christos } while (!done);
518 1.1 christos
519 1.1 christos }
520 1.1 christos return (resplen);
521 1.1 christos next_ns: ;
522 1.1 christos } /*foreach ns*/
523 1.1 christos } /*foreach retry*/
524 1.1 christos res_nclose(statp);
525 1.1 christos if (!v_circuit) {
526 1.1 christos if (!gotsomewhere)
527 1.1 christos errno = ECONNREFUSED; /* no nameservers found */
528 1.1 christos else
529 1.1 christos errno = ETIMEDOUT; /* no answer obtained */
530 1.1 christos } else
531 1.1 christos errno = terrno;
532 1.1 christos return (-1);
533 1.1 christos fail:
534 1.1 christos res_nclose(statp);
535 1.1 christos return (-1);
536 1.1 christos }
537 1.1 christos
538 1.1 christos /* Private */
539 1.1 christos
540 1.1 christos static int
541 1.1 christos get_salen(sa)
542 1.1 christos const struct sockaddr *sa;
543 1.1 christos {
544 1.1 christos
545 1.1 christos #ifdef HAVE_SA_LEN
546 1.1 christos /* There are people do not set sa_len. Be forgiving to them. */
547 1.1 christos if (sa->sa_len)
548 1.1 christos return (sa->sa_len);
549 1.1 christos #endif
550 1.1 christos
551 1.1 christos if (sa->sa_family == AF_INET)
552 1.1 christos return (sizeof(struct sockaddr_in));
553 1.1 christos else if (sa->sa_family == AF_INET6)
554 1.1 christos return (sizeof(struct sockaddr_in6));
555 1.1 christos else
556 1.1 christos return (0); /* unknown, die on connect */
557 1.1 christos }
558 1.1 christos
559 1.1 christos /*
560 1.1 christos * pick appropriate nsaddr_list for use. see res_init() for initialization.
561 1.1 christos */
562 1.1 christos static struct sockaddr *
563 1.1 christos get_nsaddr(statp, n)
564 1.1 christos res_state statp;
565 1.1 christos size_t n;
566 1.1 christos {
567 1.1 christos
568 1.1 christos if (!statp->nsaddr_list[n].sin_family && EXT(statp).ext) {
569 1.1 christos /*
570 1.1 christos * - EXT(statp).ext->nsaddrs[n] holds an address that is larger
571 1.1 christos * than struct sockaddr, and
572 1.1 christos * - user code did not update statp->nsaddr_list[n].
573 1.1 christos */
574 1.1 christos return (struct sockaddr *)(void *)&EXT(statp).ext->nsaddrs[n];
575 1.1 christos } else {
576 1.1 christos /*
577 1.1 christos * - user code updated statp->nsaddr_list[n], or
578 1.1 christos * - statp->nsaddr_list[n] has the same content as
579 1.1 christos * EXT(statp).ext->nsaddrs[n].
580 1.1 christos */
581 1.1 christos return (struct sockaddr *)(void *)&statp->nsaddr_list[n];
582 1.1 christos }
583 1.1 christos }
584 1.1 christos
585 1.1 christos static int
586 1.1 christos send_vc(res_state statp,
587 1.1 christos const u_char *buf, int buflen, u_char *ans, int anssiz,
588 1.1 christos int *terrno, int ns)
589 1.1 christos {
590 1.3 christos const HEADER *hp = (const HEADER *)(const void *)buf;
591 1.3 christos HEADER *anhp = (HEADER *)(void *)ans;
592 1.1 christos struct sockaddr *nsap;
593 1.1 christos int nsaplen;
594 1.1 christos int truncating, connreset, resplen, n;
595 1.1 christos struct iovec iov[2];
596 1.1 christos u_short len;
597 1.1 christos u_char *cp;
598 1.1 christos void *tmp;
599 1.1 christos
600 1.2 christos nsap = get_nsaddr(statp, (size_t)ns);
601 1.1 christos nsaplen = get_salen(nsap);
602 1.1 christos
603 1.1 christos connreset = 0;
604 1.1 christos same_ns:
605 1.1 christos truncating = 0;
606 1.1 christos
607 1.1 christos /* Are we still talking to whom we want to talk to? */
608 1.1 christos if (statp->_vcsock >= 0 && (statp->_flags & RES_F_VC) != 0) {
609 1.1 christos struct sockaddr_storage peer;
610 1.1 christos ISC_SOCKLEN_T size = sizeof peer;
611 1.1 christos
612 1.1 christos if (getpeername(statp->_vcsock,
613 1.2 christos (struct sockaddr *)(void *)&peer, &size) < 0 ||
614 1.2 christos !sock_eq((struct sockaddr *)(void *)&peer, nsap)) {
615 1.1 christos res_nclose(statp);
616 1.1 christos statp->_flags &= ~RES_F_VC;
617 1.1 christos }
618 1.1 christos }
619 1.1 christos
620 1.1 christos if (statp->_vcsock < 0 || (statp->_flags & RES_F_VC) == 0) {
621 1.1 christos if (statp->_vcsock >= 0)
622 1.1 christos res_nclose(statp);
623 1.1 christos
624 1.1 christos statp->_vcsock = socket(nsap->sa_family, SOCK_STREAM, 0);
625 1.1 christos if (statp->_vcsock > highestFD) {
626 1.1 christos res_nclose(statp);
627 1.1 christos errno = ENOTSOCK;
628 1.1 christos }
629 1.1 christos if (statp->_vcsock < 0) {
630 1.1 christos switch (errno) {
631 1.1 christos case EPROTONOSUPPORT:
632 1.1 christos #ifdef EPFNOSUPPORT
633 1.1 christos case EPFNOSUPPORT:
634 1.1 christos #endif
635 1.1 christos case EAFNOSUPPORT:
636 1.1 christos Perror(statp, stderr, "socket(vc)", errno);
637 1.1 christos return (0);
638 1.1 christos default:
639 1.1 christos *terrno = errno;
640 1.1 christos Perror(statp, stderr, "socket(vc)", errno);
641 1.1 christos return (-1);
642 1.1 christos }
643 1.1 christos }
644 1.1 christos errno = 0;
645 1.2 christos if (connect(statp->_vcsock, nsap, (socklen_t)nsaplen) < 0) {
646 1.1 christos *terrno = errno;
647 1.1 christos Aerror(statp, stderr, "connect/vc", errno, nsap,
648 1.1 christos nsaplen);
649 1.1 christos res_nclose(statp);
650 1.1 christos return (0);
651 1.1 christos }
652 1.1 christos statp->_flags |= RES_F_VC;
653 1.1 christos }
654 1.1 christos
655 1.1 christos /*
656 1.1 christos * Send length & message
657 1.1 christos */
658 1.2 christos ns_put16((u_short)buflen, (u_char*)(void *)&len);
659 1.1 christos iov[0] = evConsIovec(&len, INT16SZ);
660 1.1 christos DE_CONST(buf, tmp);
661 1.2 christos iov[1] = evConsIovec(tmp, (size_t)buflen);
662 1.1 christos if (writev(statp->_vcsock, iov, 2) != (INT16SZ + buflen)) {
663 1.1 christos *terrno = errno;
664 1.1 christos Perror(statp, stderr, "write failed", errno);
665 1.1 christos res_nclose(statp);
666 1.1 christos return (0);
667 1.1 christos }
668 1.1 christos /*
669 1.1 christos * Receive length & response
670 1.1 christos */
671 1.1 christos read_len:
672 1.1 christos cp = ans;
673 1.1 christos len = INT16SZ;
674 1.2 christos while ((n = read(statp->_vcsock, (char *)cp, (size_t)len)) > 0) {
675 1.1 christos cp += n;
676 1.2 christos if ((len -= n) == 0)
677 1.1 christos break;
678 1.1 christos }
679 1.1 christos if (n <= 0) {
680 1.1 christos *terrno = errno;
681 1.1 christos Perror(statp, stderr, "read failed", errno);
682 1.1 christos res_nclose(statp);
683 1.1 christos /*
684 1.1 christos * A long running process might get its TCP
685 1.1 christos * connection reset if the remote server was
686 1.1 christos * restarted. Requery the server instead of
687 1.1 christos * trying a new one. When there is only one
688 1.1 christos * server, this means that a query might work
689 1.1 christos * instead of failing. We only allow one reset
690 1.1 christos * per query to prevent looping.
691 1.1 christos */
692 1.1 christos if (*terrno == ECONNRESET && !connreset) {
693 1.1 christos connreset = 1;
694 1.1 christos res_nclose(statp);
695 1.1 christos goto same_ns;
696 1.1 christos }
697 1.1 christos res_nclose(statp);
698 1.1 christos return (0);
699 1.1 christos }
700 1.1 christos resplen = ns_get16(ans);
701 1.1 christos if (resplen > anssiz) {
702 1.1 christos Dprint(statp->options & RES_DEBUG,
703 1.1 christos (stdout, ";; response truncated\n")
704 1.1 christos );
705 1.1 christos truncating = 1;
706 1.1 christos len = anssiz;
707 1.1 christos } else
708 1.1 christos len = resplen;
709 1.1 christos if (len < HFIXEDSZ) {
710 1.1 christos /*
711 1.1 christos * Undersized message.
712 1.1 christos */
713 1.1 christos Dprint(statp->options & RES_DEBUG,
714 1.1 christos (stdout, ";; undersized: %d\n", len));
715 1.1 christos *terrno = EMSGSIZE;
716 1.1 christos res_nclose(statp);
717 1.1 christos return (0);
718 1.1 christos }
719 1.1 christos cp = ans;
720 1.2 christos while (len != 0 && (n = read(statp->_vcsock, (char *)cp, (size_t)len)) > 0){
721 1.1 christos cp += n;
722 1.1 christos len -= n;
723 1.1 christos }
724 1.1 christos if (n <= 0) {
725 1.1 christos *terrno = errno;
726 1.1 christos Perror(statp, stderr, "read(vc)", errno);
727 1.1 christos res_nclose(statp);
728 1.1 christos return (0);
729 1.1 christos }
730 1.1 christos if (truncating) {
731 1.1 christos /*
732 1.1 christos * Flush rest of answer so connection stays in synch.
733 1.1 christos */
734 1.1 christos anhp->tc = 1;
735 1.1 christos len = resplen - anssiz;
736 1.1 christos while (len != 0) {
737 1.1 christos char junk[PACKETSZ];
738 1.1 christos
739 1.1 christos n = read(statp->_vcsock, junk,
740 1.1 christos (len > sizeof junk) ? sizeof junk : len);
741 1.1 christos if (n > 0)
742 1.1 christos len -= n;
743 1.1 christos else
744 1.1 christos break;
745 1.1 christos }
746 1.1 christos }
747 1.1 christos /*
748 1.1 christos * If the calling applicating has bailed out of
749 1.1 christos * a previous call and failed to arrange to have
750 1.1 christos * the circuit closed or the server has got
751 1.1 christos * itself confused, then drop the packet and
752 1.1 christos * wait for the correct one.
753 1.1 christos */
754 1.1 christos if (hp->id != anhp->id) {
755 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
756 1.1 christos (statp->pfcode & RES_PRF_REPLY),
757 1.1 christos (stdout, ";; old answer (unexpected):\n"),
758 1.1 christos ans, (resplen > anssiz) ? anssiz: resplen);
759 1.1 christos goto read_len;
760 1.1 christos }
761 1.1 christos
762 1.1 christos /*
763 1.1 christos * All is well, or the error is fatal. Signal that the
764 1.1 christos * next nameserver ought not be tried.
765 1.1 christos */
766 1.1 christos return (resplen);
767 1.1 christos }
768 1.1 christos
769 1.1 christos static int
770 1.1 christos send_dg(res_state statp,
771 1.1 christos const u_char *buf, int buflen, u_char *ans, int anssiz,
772 1.1 christos int *terrno, int ns, int *v_circuit, int *gotsomewhere)
773 1.1 christos {
774 1.2 christos const HEADER *hp = (const HEADER *)(const void *)buf;
775 1.2 christos HEADER *anhp = (HEADER *)(void *)ans;
776 1.1 christos const struct sockaddr *nsap;
777 1.1 christos int nsaplen;
778 1.1 christos struct timespec now, timeout, finish;
779 1.1 christos fd_set dsmask;
780 1.1 christos struct sockaddr_storage from;
781 1.1 christos ISC_SOCKLEN_T fromlen;
782 1.1 christos int resplen, seconds, n, s;
783 1.1 christos
784 1.2 christos nsap = get_nsaddr(statp, (size_t)ns);
785 1.1 christos nsaplen = get_salen(nsap);
786 1.1 christos if (EXT(statp).nssocks[ns] == -1) {
787 1.1 christos EXT(statp).nssocks[ns] = socket(nsap->sa_family, SOCK_DGRAM, 0);
788 1.1 christos if (EXT(statp).nssocks[ns] > highestFD) {
789 1.1 christos res_nclose(statp);
790 1.1 christos errno = ENOTSOCK;
791 1.1 christos }
792 1.1 christos if (EXT(statp).nssocks[ns] < 0) {
793 1.1 christos switch (errno) {
794 1.1 christos case EPROTONOSUPPORT:
795 1.1 christos #ifdef EPFNOSUPPORT
796 1.1 christos case EPFNOSUPPORT:
797 1.1 christos #endif
798 1.1 christos case EAFNOSUPPORT:
799 1.1 christos Perror(statp, stderr, "socket(dg)", errno);
800 1.1 christos return (0);
801 1.1 christos default:
802 1.1 christos *terrno = errno;
803 1.1 christos Perror(statp, stderr, "socket(dg)", errno);
804 1.1 christos return (-1);
805 1.1 christos }
806 1.1 christos }
807 1.1 christos #ifndef CANNOT_CONNECT_DGRAM
808 1.1 christos /*
809 1.1 christos * On a 4.3BSD+ machine (client and server,
810 1.1 christos * actually), sending to a nameserver datagram
811 1.1 christos * port with no nameserver will cause an
812 1.1 christos * ICMP port unreachable message to be returned.
813 1.1 christos * If our datagram socket is "connected" to the
814 1.1 christos * server, we get an ECONNREFUSED error on the next
815 1.1 christos * socket operation, and select returns if the
816 1.1 christos * error message is received. We can thus detect
817 1.1 christos * the absence of a nameserver without timing out.
818 1.1 christos */
819 1.2 christos if (connect(EXT(statp).nssocks[ns], nsap, (socklen_t)nsaplen) < 0) {
820 1.1 christos Aerror(statp, stderr, "connect(dg)", errno, nsap,
821 1.1 christos nsaplen);
822 1.1 christos res_nclose(statp);
823 1.1 christos return (0);
824 1.1 christos }
825 1.1 christos #endif /* !CANNOT_CONNECT_DGRAM */
826 1.1 christos Dprint(statp->options & RES_DEBUG,
827 1.1 christos (stdout, ";; new DG socket\n"))
828 1.1 christos }
829 1.1 christos s = EXT(statp).nssocks[ns];
830 1.1 christos #ifndef CANNOT_CONNECT_DGRAM
831 1.2 christos if (send(s, (const char*)buf, (size_t)buflen, 0) != buflen) {
832 1.1 christos Perror(statp, stderr, "send", errno);
833 1.1 christos res_nclose(statp);
834 1.1 christos return (0);
835 1.1 christos }
836 1.1 christos #else /* !CANNOT_CONNECT_DGRAM */
837 1.1 christos if (sendto(s, (const char*)buf, buflen, 0, nsap, nsaplen) != buflen)
838 1.1 christos {
839 1.1 christos Aerror(statp, stderr, "sendto", errno, nsap, nsaplen);
840 1.1 christos res_nclose(statp);
841 1.1 christos return (0);
842 1.1 christos }
843 1.1 christos #endif /* !CANNOT_CONNECT_DGRAM */
844 1.1 christos
845 1.1 christos /*
846 1.1 christos * Wait for reply.
847 1.1 christos */
848 1.1 christos seconds = (statp->retrans << ns);
849 1.1 christos if (ns > 0)
850 1.1 christos seconds /= statp->nscount;
851 1.1 christos if (seconds <= 0)
852 1.1 christos seconds = 1;
853 1.1 christos now = evNowTime();
854 1.3 christos timeout = evConsTime((long)seconds, 0L);
855 1.1 christos finish = evAddTime(now, timeout);
856 1.1 christos goto nonow;
857 1.1 christos wait:
858 1.1 christos now = evNowTime();
859 1.1 christos nonow:
860 1.1 christos FD_ZERO(&dsmask);
861 1.1 christos FD_SET(s, &dsmask);
862 1.1 christos if (evCmpTime(finish, now) > 0)
863 1.1 christos timeout = evSubTime(finish, now);
864 1.1 christos else
865 1.3 christos timeout = evConsTime(0L, 0L);
866 1.1 christos n = pselect(s + 1, &dsmask, NULL, NULL, &timeout, NULL);
867 1.1 christos if (n == 0) {
868 1.1 christos Dprint(statp->options & RES_DEBUG, (stdout, ";; timeout\n"));
869 1.1 christos *gotsomewhere = 1;
870 1.1 christos return (0);
871 1.1 christos }
872 1.1 christos if (n < 0) {
873 1.1 christos if (errno == EINTR)
874 1.1 christos goto wait;
875 1.1 christos Perror(statp, stderr, "select", errno);
876 1.1 christos res_nclose(statp);
877 1.1 christos return (0);
878 1.1 christos }
879 1.1 christos errno = 0;
880 1.1 christos fromlen = sizeof(from);
881 1.2 christos resplen = recvfrom(s, (char*)ans, (size_t)anssiz,0,
882 1.2 christos (struct sockaddr *)(void *)&from, &fromlen);
883 1.1 christos if (resplen <= 0) {
884 1.1 christos Perror(statp, stderr, "recvfrom", errno);
885 1.1 christos res_nclose(statp);
886 1.1 christos return (0);
887 1.1 christos }
888 1.1 christos *gotsomewhere = 1;
889 1.1 christos if (resplen < HFIXEDSZ) {
890 1.1 christos /*
891 1.1 christos * Undersized message.
892 1.1 christos */
893 1.1 christos Dprint(statp->options & RES_DEBUG,
894 1.1 christos (stdout, ";; undersized: %d\n",
895 1.1 christos resplen));
896 1.1 christos *terrno = EMSGSIZE;
897 1.1 christos res_nclose(statp);
898 1.1 christos return (0);
899 1.1 christos }
900 1.1 christos if (hp->id != anhp->id) {
901 1.1 christos /*
902 1.1 christos * response from old query, ignore it.
903 1.1 christos * XXX - potential security hazard could
904 1.1 christos * be detected here.
905 1.1 christos */
906 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
907 1.1 christos (statp->pfcode & RES_PRF_REPLY),
908 1.1 christos (stdout, ";; old answer:\n"),
909 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
910 1.1 christos goto wait;
911 1.1 christos }
912 1.1 christos if (!(statp->options & RES_INSECURE1) &&
913 1.2 christos !res_ourserver_p(statp, (struct sockaddr *)(void *)&from)) {
914 1.1 christos /*
915 1.1 christos * response from wrong server? ignore it.
916 1.1 christos * XXX - potential security hazard could
917 1.1 christos * be detected here.
918 1.1 christos */
919 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
920 1.1 christos (statp->pfcode & RES_PRF_REPLY),
921 1.1 christos (stdout, ";; not our server:\n"),
922 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
923 1.1 christos goto wait;
924 1.1 christos }
925 1.1 christos #ifdef RES_USE_EDNS0
926 1.1 christos if (anhp->rcode == FORMERR && (statp->options & RES_USE_EDNS0) != 0U) {
927 1.1 christos /*
928 1.1 christos * Do not retry if the server do not understand EDNS0.
929 1.1 christos * The case has to be captured here, as FORMERR packet do not
930 1.1 christos * carry query section, hence res_queriesmatch() returns 0.
931 1.1 christos */
932 1.1 christos DprintQ(statp->options & RES_DEBUG,
933 1.1 christos (stdout, "server rejected query with EDNS0:\n"),
934 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
935 1.1 christos /* record the error */
936 1.1 christos statp->_flags |= RES_F_EDNS0ERR;
937 1.1 christos res_nclose(statp);
938 1.1 christos return (0);
939 1.1 christos }
940 1.1 christos #endif
941 1.1 christos if (!(statp->options & RES_INSECURE2) &&
942 1.1 christos !res_queriesmatch(buf, buf + buflen,
943 1.1 christos ans, ans + anssiz)) {
944 1.1 christos /*
945 1.1 christos * response contains wrong query? ignore it.
946 1.1 christos * XXX - potential security hazard could
947 1.1 christos * be detected here.
948 1.1 christos */
949 1.1 christos DprintQ((statp->options & RES_DEBUG) ||
950 1.1 christos (statp->pfcode & RES_PRF_REPLY),
951 1.1 christos (stdout, ";; wrong query name:\n"),
952 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
953 1.1 christos goto wait;
954 1.1 christos }
955 1.1 christos if (anhp->rcode == SERVFAIL ||
956 1.1 christos anhp->rcode == NOTIMP ||
957 1.1 christos anhp->rcode == REFUSED) {
958 1.1 christos DprintQ(statp->options & RES_DEBUG,
959 1.1 christos (stdout, "server rejected query:\n"),
960 1.1 christos ans, (resplen > anssiz) ? anssiz : resplen);
961 1.1 christos res_nclose(statp);
962 1.1 christos /* don't retry if called from dig */
963 1.1 christos if (!statp->pfcode)
964 1.1 christos return (0);
965 1.1 christos }
966 1.1 christos if (!(statp->options & RES_IGNTC) && anhp->tc) {
967 1.1 christos /*
968 1.1 christos * To get the rest of answer,
969 1.1 christos * use TCP with same server.
970 1.1 christos */
971 1.1 christos Dprint(statp->options & RES_DEBUG,
972 1.1 christos (stdout, ";; truncated answer\n"));
973 1.1 christos *v_circuit = 1;
974 1.1 christos res_nclose(statp);
975 1.1 christos return (1);
976 1.1 christos }
977 1.1 christos /*
978 1.1 christos * All is well, or the error is fatal. Signal that the
979 1.1 christos * next nameserver ought not be tried.
980 1.1 christos */
981 1.1 christos return (resplen);
982 1.1 christos }
983 1.1 christos
984 1.1 christos static void
985 1.1 christos Aerror(const res_state statp, FILE *file, const char *string, int error,
986 1.1 christos const struct sockaddr *address, int alen)
987 1.1 christos {
988 1.1 christos int save = errno;
989 1.1 christos char hbuf[NI_MAXHOST];
990 1.1 christos char sbuf[NI_MAXSERV];
991 1.1 christos
992 1.1 christos alen = alen;
993 1.1 christos
994 1.1 christos if ((statp->options & RES_DEBUG) != 0U) {
995 1.2 christos if (getnameinfo(address, (socklen_t)alen, hbuf, sizeof(hbuf),
996 1.1 christos sbuf, sizeof(sbuf), niflags)) {
997 1.1 christos strncpy(hbuf, "?", sizeof(hbuf) - 1);
998 1.1 christos hbuf[sizeof(hbuf) - 1] = '\0';
999 1.1 christos strncpy(sbuf, "?", sizeof(sbuf) - 1);
1000 1.1 christos sbuf[sizeof(sbuf) - 1] = '\0';
1001 1.1 christos }
1002 1.1 christos fprintf(file, "res_send: %s ([%s].%s): %s\n",
1003 1.1 christos string, hbuf, sbuf, strerror(error));
1004 1.1 christos }
1005 1.1 christos errno = save;
1006 1.1 christos }
1007 1.1 christos
1008 1.1 christos static void
1009 1.1 christos Perror(const res_state statp, FILE *file, const char *string, int error) {
1010 1.1 christos int save = errno;
1011 1.1 christos
1012 1.1 christos if ((statp->options & RES_DEBUG) != 0U)
1013 1.1 christos fprintf(file, "res_send: %s: %s\n",
1014 1.1 christos string, strerror(error));
1015 1.1 christos errno = save;
1016 1.1 christos }
1017 1.1 christos
1018 1.1 christos static int
1019 1.1 christos sock_eq(struct sockaddr *a, struct sockaddr *b) {
1020 1.1 christos struct sockaddr_in *a4, *b4;
1021 1.1 christos struct sockaddr_in6 *a6, *b6;
1022 1.1 christos
1023 1.1 christos if (a->sa_family != b->sa_family)
1024 1.1 christos return 0;
1025 1.1 christos switch (a->sa_family) {
1026 1.1 christos case AF_INET:
1027 1.2 christos a4 = (struct sockaddr_in *)(void *)a;
1028 1.2 christos b4 = (struct sockaddr_in *)(void *)b;
1029 1.1 christos return a4->sin_port == b4->sin_port &&
1030 1.1 christos a4->sin_addr.s_addr == b4->sin_addr.s_addr;
1031 1.1 christos case AF_INET6:
1032 1.2 christos a6 = (struct sockaddr_in6 *)(void *)a;
1033 1.2 christos b6 = (struct sockaddr_in6 *)(void *)b;
1034 1.1 christos return a6->sin6_port == b6->sin6_port &&
1035 1.1 christos #ifdef HAVE_SIN6_SCOPE_ID
1036 1.1 christos a6->sin6_scope_id == b6->sin6_scope_id &&
1037 1.1 christos #endif
1038 1.1 christos IN6_ARE_ADDR_EQUAL(&a6->sin6_addr, &b6->sin6_addr);
1039 1.1 christos default:
1040 1.1 christos return 0;
1041 1.1 christos }
1042 1.1 christos }
1043 1.1 christos
1044 1.1 christos #ifdef NEED_PSELECT
1045 1.1 christos /* XXX needs to move to the porting library. */
1046 1.1 christos static int
1047 1.1 christos pselect(int nfds, void *rfds, void *wfds, void *efds,
1048 1.1 christos struct timespec *tsp, const sigset_t *sigmask)
1049 1.1 christos {
1050 1.1 christos struct timeval tv, *tvp;
1051 1.1 christos sigset_t sigs;
1052 1.1 christos int n;
1053 1.1 christos
1054 1.1 christos if (tsp) {
1055 1.1 christos tvp = &tv;
1056 1.1 christos tv = evTimeVal(*tsp);
1057 1.1 christos } else
1058 1.1 christos tvp = NULL;
1059 1.1 christos if (sigmask)
1060 1.1 christos sigprocmask(SIG_SETMASK, sigmask, &sigs);
1061 1.1 christos n = select(nfds, rfds, wfds, efds, tvp);
1062 1.1 christos if (sigmask)
1063 1.1 christos sigprocmask(SIG_SETMASK, &sigs, NULL);
1064 1.1 christos if (tsp)
1065 1.1 christos *tsp = evTimeSpec(tv);
1066 1.1 christos return (n);
1067 1.1 christos }
1068 1.1 christos #endif
1069