You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

util.c 21KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994
  1. /* Copyright (c) 2014, Vsevolod Stakhov
  2. * All rights reserved.
  3. *
  4. * Redistribution and use in source and binary forms, with or without
  5. * modification, are permitted provided that the following conditions are met:
  6. * * Redistributions of source code must retain the above copyright
  7. * notice, this list of conditions and the following disclaimer.
  8. * * Redistributions in binary form must reproduce the above copyright
  9. * notice, this list of conditions and the following disclaimer in the
  10. * documentation and/or other materials provided with the distribution.
  11. *
  12. * THIS SOFTWARE IS PROVIDED ''AS IS'' AND ANY
  13. * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
  14. * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  15. * DISCLAIMED. IN NO EVENT SHALL AUTHOR BE LIABLE FOR ANY
  16. * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
  17. * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  18. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
  19. * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  20. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  21. * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  22. */
  23. #include <sys/socket.h>
  24. #include <netinet/in.h>
  25. #include <arpa/inet.h>
  26. #include <sys/un.h>
  27. #include <sys/stat.h>
  28. #include <unistd.h>
  29. #include <stdlib.h>
  30. #include <stdio.h>
  31. #include <string.h>
  32. #include <errno.h>
  33. #include <netdb.h>
  34. #include <fcntl.h>
  35. #include <ctype.h>
  36. #include "ottery.h"
  37. #include "util.h"
  38. #include "logger.h"
  39. #include "rdns.h"
  40. inline void
  41. rdns_request_remove_from_hash (struct rdns_request *req)
  42. {
  43. /* Remove from id hashes */
  44. if (req->io) {
  45. khiter_t k;
  46. k = kh_get(rdns_requests_hash, req->io->requests, req->id);
  47. if (k != kh_end(req->io->requests)) {
  48. kh_del(rdns_requests_hash, req->io->requests, k);
  49. }
  50. }
  51. }
  52. static int
  53. rdns_make_socket_nonblocking (int fd)
  54. {
  55. int ofl;
  56. ofl = fcntl (fd, F_GETFL, 0);
  57. if (fcntl (fd, F_SETFL, ofl | O_NONBLOCK) == -1) {
  58. return -1;
  59. }
  60. return 0;
  61. }
  62. static int
  63. rdns_make_inet_socket (int type, struct addrinfo *addr, struct sockaddr **psockaddr,
  64. socklen_t *psocklen)
  65. {
  66. int fd = -1;
  67. struct addrinfo *cur;
  68. cur = addr;
  69. while (cur) {
  70. /* Create socket */
  71. fd = socket (cur->ai_family, type, 0);
  72. if (fd == -1) {
  73. goto out;
  74. }
  75. if (rdns_make_socket_nonblocking (fd) < 0) {
  76. goto out;
  77. }
  78. /* Set close on exec */
  79. if (fcntl (fd, F_SETFD, FD_CLOEXEC) == -1) {
  80. goto out;
  81. }
  82. if (psockaddr) {
  83. *psockaddr = cur->ai_addr;
  84. *psocklen = cur->ai_addrlen;
  85. }
  86. break;
  87. out:
  88. if (fd != -1) {
  89. close (fd);
  90. }
  91. fd = -1;
  92. cur = cur->ai_next;
  93. }
  94. return (fd);
  95. }
  96. static int
  97. rdns_make_unix_socket (const char *path, struct sockaddr_un *addr, int type)
  98. {
  99. int fd = -1, serrno;
  100. if (path == NULL) {
  101. return -1;
  102. }
  103. addr->sun_family = AF_UNIX;
  104. memset (addr->sun_path, 0, sizeof (addr->sun_path));
  105. memccpy (addr->sun_path, path, 0, sizeof (addr->sun_path) - 1);
  106. #ifdef FREEBSD
  107. addr->sun_len = SUN_LEN (addr);
  108. #endif
  109. fd = socket (PF_LOCAL, type, 0);
  110. if (fd == -1) {
  111. return -1;
  112. }
  113. if (rdns_make_socket_nonblocking (fd) < 0) {
  114. goto out;
  115. }
  116. /* Set close on exec */
  117. if (fcntl (fd, F_SETFD, FD_CLOEXEC) == -1) {
  118. goto out;
  119. }
  120. return (fd);
  121. out:
  122. serrno = errno;
  123. if (fd != -1) {
  124. close (fd);
  125. }
  126. errno = serrno;
  127. return (-1);
  128. }
  129. /**
  130. * Make a universal socket
  131. * @param credits host, ip or path to unix socket
  132. * @param port port (used for network sockets)
  133. * @param async make this socket asynced
  134. * @param is_server make this socket as server socket
  135. * @param try_resolve try name resolution for a socket (BLOCKING)
  136. */
  137. int
  138. rdns_make_client_socket (const char *credits,
  139. uint16_t port,
  140. int type,
  141. struct sockaddr **psockaddr,
  142. socklen_t *psocklen)
  143. {
  144. struct sockaddr_un un;
  145. struct stat st;
  146. struct addrinfo hints, *res;
  147. int r;
  148. char portbuf[8];
  149. if (*credits == '/') {
  150. r = stat (credits, &st);
  151. if (r == -1) {
  152. /* Unix socket doesn't exists it must be created first */
  153. errno = ENOENT;
  154. return -1;
  155. }
  156. else {
  157. if ((st.st_mode & S_IFSOCK) == 0) {
  158. /* Path is not valid socket */
  159. errno = EINVAL;
  160. return -1;
  161. }
  162. else {
  163. r = rdns_make_unix_socket (credits, &un, type);
  164. if (r != -1 && psockaddr) {
  165. struct sockaddr *cpy;
  166. cpy = calloc (1, sizeof (un));
  167. *psocklen = sizeof (un);
  168. if (cpy == NULL) {
  169. close (r);
  170. return -1;
  171. }
  172. memcpy (cpy, &un, *psocklen);
  173. *psockaddr = cpy;
  174. }
  175. return r;
  176. }
  177. }
  178. }
  179. else {
  180. /* TCP related part */
  181. memset (&hints, 0, sizeof (hints));
  182. hints.ai_family = AF_UNSPEC; /* Allow IPv4 or IPv6 */
  183. hints.ai_socktype = type; /* Type of the socket */
  184. hints.ai_flags = 0;
  185. hints.ai_protocol = 0; /* Any protocol */
  186. hints.ai_canonname = NULL;
  187. hints.ai_addr = NULL;
  188. hints.ai_next = NULL;
  189. hints.ai_flags |= AI_NUMERICHOST | AI_NUMERICSERV;
  190. snprintf (portbuf, sizeof (portbuf), "%d", (int)port);
  191. if (getaddrinfo (credits, portbuf, &hints, &res) == 0) {
  192. r = rdns_make_inet_socket (type, res, psockaddr, psocklen);
  193. if (r != -1 && psockaddr) {
  194. struct sockaddr *cpy;
  195. cpy = calloc (1, *psocklen);
  196. if (cpy == NULL) {
  197. close (r);
  198. freeaddrinfo (res);
  199. return -1;
  200. }
  201. memcpy (cpy, *psockaddr, *psocklen);
  202. *psockaddr = cpy;
  203. }
  204. freeaddrinfo (res);
  205. return r;
  206. }
  207. else {
  208. return -1;
  209. }
  210. }
  211. /* Not reached */
  212. return -1;
  213. }
  214. const char *
  215. rdns_strerror (enum dns_rcode rcode)
  216. {
  217. rcode &= 0xf;
  218. static char numbuf[16];
  219. if ('\0' == dns_rcodes[rcode][0]) {
  220. snprintf (numbuf, sizeof (numbuf), "UNKNOWN: %d", (int)rcode);
  221. return numbuf;
  222. }
  223. return dns_rcodes[rcode];
  224. }
  225. const char *
  226. rdns_strtype (enum rdns_request_type type)
  227. {
  228. return dns_types[type];
  229. }
  230. enum rdns_request_type
  231. rdns_type_fromstr (const char *str)
  232. {
  233. if (str) {
  234. if (strcmp (str, "a") == 0) {
  235. return RDNS_REQUEST_A;
  236. }
  237. else if (strcmp (str, "ns") == 0) {
  238. return RDNS_REQUEST_NS;
  239. }
  240. else if (strcmp (str, "soa") == 0) {
  241. return RDNS_REQUEST_SOA;
  242. }
  243. else if (strcmp (str, "ptr") == 0) {
  244. return RDNS_REQUEST_PTR;
  245. }
  246. else if (strcmp (str, "mx") == 0) {
  247. return RDNS_REQUEST_MX;
  248. }
  249. else if (strcmp (str, "srv") == 0) {
  250. return RDNS_REQUEST_SRV;
  251. }
  252. else if (strcmp (str, "txt") == 0) {
  253. return RDNS_REQUEST_TXT;
  254. }
  255. else if (strcmp (str, "spf") == 0) {
  256. return RDNS_REQUEST_SPF;
  257. }
  258. else if (strcmp (str, "aaaa") == 0) {
  259. return RDNS_REQUEST_AAAA;
  260. }
  261. else if (strcmp (str, "tlsa") == 0) {
  262. return RDNS_REQUEST_TLSA;
  263. }
  264. else if (strcmp (str, "any") == 0) {
  265. return RDNS_REQUEST_ANY;
  266. }
  267. }
  268. return RDNS_REQUEST_INVALID;
  269. }
  270. const char *
  271. rdns_str_from_type (enum rdns_request_type rcode)
  272. {
  273. switch (rcode) {
  274. case RDNS_REQUEST_INVALID:
  275. return "(invalid)";
  276. case RDNS_REQUEST_A:
  277. return "a";
  278. case RDNS_REQUEST_NS:
  279. return "ns";
  280. case RDNS_REQUEST_SOA:
  281. return "soa";
  282. case RDNS_REQUEST_PTR:
  283. return "ptr";
  284. case RDNS_REQUEST_MX:
  285. return "mx";
  286. case RDNS_REQUEST_TXT:
  287. return "txt";
  288. case RDNS_REQUEST_SRV:
  289. return "srv";
  290. case RDNS_REQUEST_SPF:
  291. return "spf";
  292. case RDNS_REQUEST_AAAA:
  293. return "aaaa";
  294. case RDNS_REQUEST_TLSA:
  295. return "tlsa";
  296. case RDNS_REQUEST_ANY:
  297. return "any";
  298. default:
  299. return "(unknown)";
  300. }
  301. }
  302. enum dns_rcode
  303. rdns_rcode_fromstr (const char *str)
  304. {
  305. if (str) {
  306. if (strcmp (str, "noerror") == 0) {
  307. return RDNS_RC_NOERROR;
  308. }
  309. else if (strcmp (str, "formerr") == 0) {
  310. return RDNS_RC_FORMERR;
  311. }
  312. else if (strcmp (str, "servfail") == 0) {
  313. return RDNS_RC_SERVFAIL;
  314. }
  315. else if (strcmp (str, "nxdomain") == 0) {
  316. return RDNS_RC_NXDOMAIN;
  317. }
  318. else if (strcmp (str, "notimp") == 0) {
  319. return RDNS_RC_NOTIMP;
  320. }
  321. else if (strcmp (str, "yxdomain") == 0) {
  322. return RDNS_RC_YXDOMAIN;
  323. }
  324. else if (strcmp (str, "yxrrset") == 0) {
  325. return RDNS_RC_YXRRSET;
  326. }
  327. else if (strcmp (str, "nxrrset") == 0) {
  328. return RDNS_RC_NXRRSET;
  329. }
  330. else if (strcmp (str, "notauth") == 0) {
  331. return RDNS_RC_NOTAUTH;
  332. }
  333. else if (strcmp (str, "notzone") == 0) {
  334. return RDNS_RC_NOTZONE;
  335. }
  336. else if (strcmp (str, "timeout") == 0) {
  337. return RDNS_RC_TIMEOUT;
  338. }
  339. else if (strcmp (str, "neterr") == 0) {
  340. return RDNS_RC_NETERR;
  341. }
  342. else if (strcmp (str, "norec") == 0) {
  343. return RDNS_RC_NOREC;
  344. }
  345. }
  346. return RDNS_RC_INVALID;
  347. }
  348. uint16_t
  349. rdns_permutor_generate_id (void)
  350. {
  351. uint16_t id;
  352. id = ottery_rand_unsigned ();
  353. return id;
  354. }
  355. struct rdns_reply *
  356. rdns_make_reply (struct rdns_request *req, enum dns_rcode rcode)
  357. {
  358. struct rdns_reply *rep;
  359. rep = malloc (sizeof (struct rdns_reply));
  360. if (rep != NULL) {
  361. rep->request = req;
  362. rep->resolver = req->resolver;
  363. rep->entries = NULL;
  364. rep->code = rcode;
  365. req->reply = rep;
  366. rep->flags = 0;
  367. rep->requested_name = req->requested_names[0].name;
  368. }
  369. return rep;
  370. }
  371. void
  372. rdns_reply_free (struct rdns_reply *rep)
  373. {
  374. struct rdns_reply_entry *entry, *tmp;
  375. /* We don't need to free data for faked replies */
  376. if (!rep->request || rep->request->state != RDNS_REQUEST_FAKE) {
  377. LL_FOREACH_SAFE (rep->entries, entry, tmp) {
  378. switch (entry->type) {
  379. case RDNS_REQUEST_PTR:
  380. free (entry->content.ptr.name);
  381. break;
  382. case RDNS_REQUEST_NS:
  383. free (entry->content.ns.name);
  384. break;
  385. case RDNS_REQUEST_MX:
  386. free (entry->content.mx.name);
  387. break;
  388. case RDNS_REQUEST_TXT:
  389. case RDNS_REQUEST_SPF:
  390. free (entry->content.txt.data);
  391. break;
  392. case RDNS_REQUEST_SRV:
  393. free (entry->content.srv.target);
  394. break;
  395. case RDNS_REQUEST_TLSA:
  396. free (entry->content.tlsa.data);
  397. break;
  398. case RDNS_REQUEST_SOA:
  399. free (entry->content.soa.mname);
  400. free (entry->content.soa.admin);
  401. break;
  402. default:
  403. break;
  404. }
  405. free (entry);
  406. }
  407. }
  408. free (rep);
  409. }
  410. void
  411. rdns_request_free (struct rdns_request *req)
  412. {
  413. unsigned int i;
  414. if (req != NULL) {
  415. if (req->packet != NULL) {
  416. free (req->packet);
  417. }
  418. for (i = 0; i < req->qcount; i ++) {
  419. free (req->requested_names[i].name);
  420. }
  421. if (req->requested_names != NULL) {
  422. free (req->requested_names);
  423. }
  424. if (req->reply != NULL) {
  425. rdns_reply_free (req->reply);
  426. }
  427. if (req->async_event) {
  428. if (req->state == RDNS_REQUEST_WAIT_REPLY) {
  429. /* Remove timer */
  430. req->async->del_timer (req->async->data,
  431. req->async_event);
  432. rdns_request_remove_from_hash(req);
  433. req->async_event = NULL;
  434. }
  435. else if (req->state == RDNS_REQUEST_WAIT_SEND) {
  436. /* Remove retransmit event */
  437. req->async->del_write (req->async->data,
  438. req->async_event);
  439. rdns_request_remove_from_hash(req);
  440. req->async_event = NULL;
  441. }
  442. else if (req->state == RDNS_REQUEST_FAKE) {
  443. req->async->del_write (req->async->data,
  444. req->async_event);
  445. req->async_event = NULL;
  446. }
  447. }
  448. if (req->state == RDNS_REQUEST_TCP) {
  449. if (req->async_event) {
  450. req->async->del_timer (req->async->data,
  451. req->async_event);
  452. }
  453. rdns_request_remove_from_hash(req);
  454. }
  455. #ifdef TWEETNACL
  456. if (req->curve_plugin_data != NULL) {
  457. req->resolver->curve_plugin->cb.curve_plugin.finish_cb (
  458. req, req->resolver->curve_plugin->data);
  459. }
  460. #endif
  461. if (req->io != NULL && req->state > RDNS_REQUEST_NEW) {
  462. REF_RELEASE (req->io);
  463. REF_RELEASE (req->resolver);
  464. }
  465. free (req);
  466. }
  467. }
  468. void
  469. rdns_ioc_free (struct rdns_io_channel *ioc)
  470. {
  471. struct rdns_request *req;
  472. if (IS_CHANNEL_TCP(ioc)) {
  473. rdns_ioc_tcp_reset(ioc);
  474. }
  475. kh_foreach_value(ioc->requests, req, {
  476. REF_RELEASE (req);
  477. });
  478. if (ioc->async_io) {
  479. ioc->resolver->async->del_read(ioc->resolver->async->data,
  480. ioc->async_io);
  481. }
  482. kh_destroy(rdns_requests_hash, ioc->requests);
  483. if (ioc->sock != -1) {
  484. close(ioc->sock);
  485. }
  486. if (ioc->saddr != NULL) {
  487. free(ioc->saddr);
  488. }
  489. free (ioc);
  490. }
  491. struct rdns_io_channel *
  492. rdns_ioc_new (struct rdns_server *serv,
  493. struct rdns_resolver *resolver,
  494. bool is_tcp)
  495. {
  496. struct rdns_io_channel *nioc;
  497. if (is_tcp) {
  498. nioc = calloc (1, sizeof (struct rdns_io_channel)
  499. + sizeof (struct rdns_tcp_channel));
  500. }
  501. else {
  502. nioc = calloc (1, sizeof (struct rdns_io_channel));
  503. }
  504. if (nioc == NULL) {
  505. rdns_err ("calloc fails to allocate rdns_io_channel");
  506. return NULL;
  507. }
  508. nioc->struct_magic = RDNS_IO_CHANNEL_TAG;
  509. nioc->srv = serv;
  510. nioc->resolver = resolver;
  511. nioc->sock = rdns_make_client_socket (serv->name, serv->port,
  512. is_tcp ? SOCK_STREAM : SOCK_DGRAM, &nioc->saddr, &nioc->slen);
  513. if (nioc->sock == -1) {
  514. rdns_err ("cannot open socket to %s: %s", serv->name,
  515. strerror (errno));
  516. free (nioc);
  517. return NULL;
  518. }
  519. if (is_tcp) {
  520. /* We also need to connect a TCP channel and set a TCP buffer */
  521. nioc->tcp = (struct rdns_tcp_channel *)(((unsigned char *)nioc) + sizeof(*nioc));
  522. if (!rdns_ioc_tcp_connect(nioc)) {
  523. rdns_err ("cannot connect TCP socket to %s: %s", serv->name,
  524. strerror (errno));
  525. close (nioc->sock);
  526. free (nioc);
  527. return NULL;
  528. }
  529. nioc->flags |= RDNS_CHANNEL_TCP;
  530. }
  531. else {
  532. nioc->flags |= RDNS_CHANNEL_ACTIVE;
  533. nioc->async_io = resolver->async->add_read(resolver->async->data,
  534. nioc->sock, nioc);
  535. }
  536. nioc->requests = kh_init(rdns_requests_hash);
  537. REF_INIT_RETAIN (nioc, rdns_ioc_free);
  538. return nioc;
  539. }
  540. void
  541. rdns_resolver_release (struct rdns_resolver *resolver)
  542. {
  543. REF_RELEASE (resolver);
  544. }
  545. struct rdns_request*
  546. rdns_request_retain (struct rdns_request *req)
  547. {
  548. REF_RETAIN (req);
  549. return req;
  550. }
  551. void
  552. rdns_request_unschedule (struct rdns_request *req)
  553. {
  554. if (req->async_event) {
  555. if (req->state == RDNS_REQUEST_WAIT_REPLY) {
  556. req->async->del_timer (req->async->data,
  557. req->async_event);
  558. rdns_request_remove_from_hash(req);
  559. req->async_event = NULL;
  560. }
  561. else if (req->state == RDNS_REQUEST_WAIT_SEND) {
  562. req->async->del_write (req->async->data,
  563. req->async_event);
  564. /* Remove from id hashes */
  565. rdns_request_remove_from_hash(req);
  566. req->async_event = NULL;
  567. }
  568. }
  569. else if (req->state == RDNS_REQUEST_TCP) {
  570. rdns_request_remove_from_hash(req);
  571. req->async->del_timer(req->async->data,
  572. req->async_event);
  573. req->async_event = NULL;
  574. }
  575. }
  576. void
  577. rdns_request_release (struct rdns_request *req)
  578. {
  579. rdns_request_unschedule (req);
  580. REF_RELEASE (req);
  581. }
  582. void
  583. rdns_ioc_tcp_reset (struct rdns_io_channel *ioc)
  584. {
  585. struct rdns_resolver *resolver = ioc->resolver;
  586. if (IS_CHANNEL_CONNECTED(ioc)) {
  587. if (ioc->tcp->async_write) {
  588. resolver->async->del_write (resolver->async->data, ioc->tcp->async_write);
  589. ioc->tcp->async_write = NULL;
  590. }
  591. if (ioc->tcp->async_read) {
  592. resolver->async->del_read (resolver->async->data, ioc->tcp->async_read);
  593. ioc->tcp->async_read = NULL;
  594. }
  595. /* Clean all buffers and temporaries */
  596. if (ioc->tcp->cur_read_buf) {
  597. free (ioc->tcp->cur_read_buf);
  598. ioc->tcp->read_buf_allocated = 0;
  599. ioc->tcp->next_read_size = 0;
  600. ioc->tcp->cur_read = 0;
  601. }
  602. struct rdns_tcp_output_chain *oc, *tmp;
  603. DL_FOREACH_SAFE(ioc->tcp->output_chain, oc, tmp) {
  604. DL_DELETE (ioc->tcp->output_chain, oc);
  605. free (oc);
  606. }
  607. ioc->tcp->cur_output_chains = 0;
  608. ioc->flags &= ~RDNS_CHANNEL_CONNECTED;
  609. }
  610. if (ioc->sock != -1) {
  611. close (ioc->sock);
  612. ioc->sock = -1;
  613. }
  614. if (ioc->saddr) {
  615. free (ioc->saddr);
  616. ioc->saddr = NULL;
  617. }
  618. /* Remove all requests pending as we are unable to complete them */
  619. struct rdns_request *req;
  620. kh_foreach_value(ioc->requests, req, {
  621. struct rdns_reply *rep = rdns_make_reply (req, RDNS_RC_NETERR);
  622. req->state = RDNS_REQUEST_REPLIED;
  623. req->func (rep, req->arg);
  624. REF_RELEASE (req);
  625. });
  626. kh_clear(rdns_requests_hash, ioc->requests);
  627. }
  628. bool
  629. rdns_ioc_tcp_connect (struct rdns_io_channel *ioc)
  630. {
  631. struct rdns_resolver *resolver = ioc->resolver;
  632. if (IS_CHANNEL_CONNECTED(ioc)) {
  633. rdns_err ("trying to connect already connected IO channel!");
  634. return false;
  635. }
  636. if (ioc->flags & RDNS_CHANNEL_TCP_CONNECTING) {
  637. /* Already connecting channel, ignore connect request */
  638. return true;
  639. }
  640. if (ioc->sock == -1) {
  641. ioc->sock = rdns_make_client_socket (ioc->srv->name, ioc->srv->port,
  642. SOCK_STREAM, &ioc->saddr, &ioc->slen);
  643. if (ioc->sock == -1) {
  644. rdns_err ("cannot open socket to %s: %s", ioc->srv->name,
  645. strerror (errno));
  646. if (ioc->saddr) {
  647. free (ioc->saddr);
  648. ioc->saddr = NULL;
  649. }
  650. return false;
  651. }
  652. }
  653. int r = connect (ioc->sock, ioc->saddr, ioc->slen);
  654. if (r == -1) {
  655. if (errno != EAGAIN && errno != EINTR && errno != EINPROGRESS) {
  656. rdns_err ("cannot connect a TCP socket: %s for server %s",
  657. strerror(errno), ioc->srv->name);
  658. close (ioc->sock);
  659. if (ioc->saddr) {
  660. free (ioc->saddr);
  661. ioc->saddr = NULL;
  662. }
  663. ioc->sock = -1;
  664. return false;
  665. }
  666. else {
  667. /* We need to wait for write readiness here */
  668. if (ioc->tcp->async_write != NULL) {
  669. rdns_err("internal rdns error: write event is already registered on connect");
  670. }
  671. else {
  672. ioc->tcp->async_write = resolver->async->add_write(resolver->async->data,
  673. ioc->sock, ioc);
  674. }
  675. /* Prevent double connect attempts */
  676. ioc->flags |= RDNS_CHANNEL_TCP_CONNECTING;
  677. }
  678. }
  679. else {
  680. /* Always be ready to read from a TCP socket */
  681. ioc->flags |= RDNS_CHANNEL_CONNECTED|RDNS_CHANNEL_ACTIVE;
  682. ioc->flags &= ~RDNS_CHANNEL_TCP_CONNECTING;
  683. ioc->tcp->async_read = resolver->async->add_read(resolver->async->data,
  684. ioc->sock, ioc);
  685. }
  686. return true;
  687. }
  688. static bool
  689. rdns_resolver_conf_process_line (struct rdns_resolver *resolver,
  690. const char *line, rdns_resolv_conf_cb cb, void *ud)
  691. {
  692. const char *p, *c, *end;
  693. bool has_obrace = false, ret;
  694. unsigned int port = dns_port;
  695. char *cpy_buf;
  696. end = line + strlen (line);
  697. if (end - line > sizeof ("nameserver") - 1 &&
  698. strncmp (line, "nameserver", sizeof ("nameserver") - 1) == 0) {
  699. p = line + sizeof ("nameserver") - 1;
  700. /* Skip spaces */
  701. while (isspace (*p)) {
  702. p ++;
  703. }
  704. if (*p == '[') {
  705. has_obrace = true;
  706. p ++;
  707. }
  708. if (isxdigit (*p) || *p == ':') {
  709. c = p;
  710. while (isxdigit (*p) || *p == ':' || *p == '.') {
  711. p ++;
  712. }
  713. if (has_obrace && *p != ']') {
  714. return false;
  715. }
  716. else if (*p != '\0' && !isspace (*p) && *p != '#') {
  717. return false;
  718. }
  719. if (has_obrace) {
  720. p ++;
  721. if (*p == ':') {
  722. /* Maybe we have a port definition */
  723. port = strtoul (p + 1, NULL, 10);
  724. if (port == 0 || port > UINT16_MAX) {
  725. return false;
  726. }
  727. }
  728. }
  729. cpy_buf = malloc (p - c + 1);
  730. assert (cpy_buf != NULL);
  731. memcpy (cpy_buf, c, p - c);
  732. cpy_buf[p - c] = '\0';
  733. if (cb == NULL) {
  734. ret = rdns_resolver_add_server (resolver, cpy_buf, port, 0,
  735. default_io_cnt) != NULL;
  736. }
  737. else {
  738. ret = cb (resolver, cpy_buf, port, 0,
  739. default_io_cnt, ud);
  740. }
  741. free (cpy_buf);
  742. return ret;
  743. }
  744. else {
  745. return false;
  746. }
  747. }
  748. /* XXX: skip unknown resolv.conf lines */
  749. return false;
  750. }
  751. bool
  752. rdns_resolver_parse_resolv_conf_cb (struct rdns_resolver *resolver,
  753. const char *path, rdns_resolv_conf_cb cb, void *ud)
  754. {
  755. FILE *in;
  756. char buf[BUFSIZ];
  757. char *p;
  758. bool processed = false;
  759. in = fopen (path, "r");
  760. if (in == NULL) {
  761. return false;
  762. }
  763. while (!feof (in)) {
  764. if (fgets (buf, sizeof (buf) - 1, in) == NULL) {
  765. break;
  766. }
  767. /* Strip trailing spaces */
  768. p = buf + strlen (buf) - 1;
  769. while (p > buf &&
  770. (*p == ' ' || *p == '\t' || *p == '\r' || *p == '\n')) {
  771. *p-- = '\0';
  772. }
  773. if (rdns_resolver_conf_process_line (resolver, buf, cb, ud)) {
  774. processed = true;
  775. }
  776. }
  777. fclose (in);
  778. return processed;
  779. }
  780. bool
  781. rdns_resolver_parse_resolv_conf (struct rdns_resolver *resolver, const char *path)
  782. {
  783. return rdns_resolver_parse_resolv_conf_cb (resolver, path, NULL, NULL);
  784. }
  785. bool
  786. rdns_request_has_type (struct rdns_request *req, enum rdns_request_type type)
  787. {
  788. unsigned int i;
  789. for (i = 0; i < req->qcount; i ++) {
  790. if (req->requested_names[i].type == type) {
  791. return true;
  792. }
  793. }
  794. return false;
  795. }
  796. const struct rdns_request_name *
  797. rdns_request_get_name (struct rdns_request *req, unsigned int *count)
  798. {
  799. if (count != NULL) {
  800. *count = req->qcount;
  801. }
  802. return req->requested_names;
  803. }
  804. const char*
  805. rdns_request_get_server (struct rdns_request *req)
  806. {
  807. if (req && req->io) {
  808. return req->io->srv->name;
  809. }
  810. return NULL;
  811. }
  812. char *
  813. rdns_generate_ptr_from_str (const char *str)
  814. {
  815. union {
  816. struct in_addr v4;
  817. struct in6_addr v6;
  818. } addr;
  819. char *res = NULL;
  820. unsigned char *bytes;
  821. size_t len;
  822. if (inet_pton (AF_INET, str, &addr.v4) == 1) {
  823. bytes = (unsigned char *)&addr.v4;
  824. len = 4 * 4 + sizeof ("in-addr.arpa");
  825. res = malloc (len);
  826. if (res) {
  827. snprintf (res, len, "%u.%u.%u.%u.in-addr.arpa",
  828. (unsigned)bytes[3]&0xFF,
  829. (unsigned)bytes[2]&0xFF,
  830. (unsigned)bytes[1]&0xFF,
  831. (unsigned)bytes[0]&0xFF);
  832. }
  833. }
  834. else if (inet_pton (AF_INET6, str, &addr.v6) == 1) {
  835. bytes = (unsigned char *)&addr.v6;
  836. len = 2*32 + sizeof ("ip6.arpa");
  837. res = malloc (len);
  838. if (res) {
  839. snprintf(res, len,
  840. "%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x."
  841. "%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.ip6.arpa",
  842. bytes[15]&0xF, bytes[15] >> 4, bytes[14]&0xF, bytes[14] >> 4,
  843. bytes[13]&0xF, bytes[13] >> 4, bytes[12]&0xF, bytes[12] >> 4,
  844. bytes[11]&0xF, bytes[11] >> 4, bytes[10]&0xF, bytes[10] >> 4,
  845. bytes[9]&0xF, bytes[9] >> 4, bytes[8]&0xF, bytes[8] >> 4,
  846. bytes[7]&0xF, bytes[7] >> 4, bytes[6]&0xF, bytes[6] >> 4,
  847. bytes[5]&0xF, bytes[5] >> 4, bytes[4]&0xF, bytes[4] >> 4,
  848. bytes[3]&0xF, bytes[3] >> 4, bytes[2]&0xF, bytes[2] >> 4,
  849. bytes[1]&0xF, bytes[1] >> 4, bytes[0]&0xF, bytes[0] >> 4);
  850. }
  851. }
  852. return res;
  853. }