mirror of https://github.com/getdnsapi/getdns.git
743 lines
22 KiB
C
743 lines
22 KiB
C
/**
|
|
*
|
|
* /file
|
|
* /brief private library routines
|
|
*
|
|
* These routines are not intended to be used by applications calling into
|
|
* the library.
|
|
*
|
|
*/
|
|
|
|
/*
|
|
* Copyright (c) 2013, Versign, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions are met:
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* * Neither the name of the <organization> nor the
|
|
* names of its contributors may be used to endorse or promote products
|
|
* derived from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
* DISCLAIMED. IN NO EVENT SHALL Verisign, Inc. BE LIABLE FOR ANY
|
|
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
|
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "getdns/getdns.h"
|
|
#include <ldns/rbtree.h>
|
|
#include "dict.h"
|
|
#include "list.h"
|
|
#include "util-internal.h"
|
|
#include "types-internal.h"
|
|
#include <unbound.h>
|
|
|
|
/**
|
|
* this is a comprehensive list of extensions and their data types
|
|
* used by validate_extensions()
|
|
* The list has to be in sorted order for bsearch lookup in function
|
|
* validate_extensions.
|
|
*/
|
|
static getdns_extension_format extformats[] = {
|
|
{"add_opt_parameters", t_dict},
|
|
{"add_warning_for_bad_dns", t_int},
|
|
{"dnssec_return_only_secure", t_int},
|
|
{"dnssec_return_status", t_int},
|
|
{"dnssec_return_validation_chain", t_int},
|
|
{"return_api_information", t_int},
|
|
{"return_both_v4_and_v6", t_int},
|
|
{"return_call_debugging", t_int},
|
|
{"specify_class", t_int},
|
|
};
|
|
|
|
static struct getdns_bindata IPv4_str_bindata = { 5, (void *)"IPv4" };
|
|
static struct getdns_bindata IPv6_str_bindata = { 5, (void *)"IPv6" };
|
|
|
|
getdns_return_t
|
|
getdns_dict_util_set_string(struct getdns_dict * dict, char *name, const char *value)
|
|
{
|
|
/* account for the null term */
|
|
if (value == NULL) {
|
|
return GETDNS_RETURN_WRONG_TYPE_REQUESTED;
|
|
}
|
|
struct getdns_bindata type_bin = { strlen(value) + 1, (uint8_t *) value };
|
|
return getdns_dict_set_bindata(dict, name, &type_bin);
|
|
}
|
|
|
|
getdns_return_t
|
|
getdns_dict_util_get_string(struct getdns_dict * dict, char *name, char **result)
|
|
{
|
|
struct getdns_bindata *bindata = NULL;
|
|
if (!result) {
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
}
|
|
*result = NULL;
|
|
getdns_dict_get_bindata(dict, name, &bindata);
|
|
if (!bindata) {
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
}
|
|
*result = (char *) bindata->data;
|
|
return GETDNS_RETURN_GOOD;
|
|
}
|
|
|
|
getdns_return_t
|
|
dict_to_sockaddr(struct getdns_dict * ns, struct sockaddr_storage * output)
|
|
{
|
|
char *address_type = NULL;
|
|
struct getdns_bindata *address_data = NULL;
|
|
uint32_t port = 53;
|
|
memset(output, 0, sizeof(struct sockaddr_storage));
|
|
output->ss_family = AF_UNSPEC;
|
|
|
|
uint32_t prt = 0;
|
|
if (getdns_dict_get_int(ns, GETDNS_STR_PORT,
|
|
&prt) == GETDNS_RETURN_GOOD) {
|
|
port = prt;
|
|
}
|
|
|
|
getdns_dict_util_get_string(ns, GETDNS_STR_ADDRESS_TYPE,
|
|
&address_type);
|
|
getdns_dict_get_bindata(ns, GETDNS_STR_ADDRESS_DATA, &address_data);
|
|
if (!address_type || !address_data) {
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
}
|
|
if (strncmp(GETDNS_STR_IPV4, address_type,
|
|
strlen(GETDNS_STR_IPV4)) == 0) {
|
|
/* data is an in_addr_t */
|
|
struct sockaddr_in *addr = (struct sockaddr_in *) output;
|
|
addr->sin_family = AF_INET;
|
|
addr->sin_port = htons((uint16_t) port);
|
|
memcpy(&(addr->sin_addr), address_data->data,
|
|
address_data->size);
|
|
} else {
|
|
/* data is a v6 addr in host order */
|
|
struct sockaddr_in6 *addr = (struct sockaddr_in6 *) output;
|
|
addr->sin6_family = AF_INET6;
|
|
addr->sin6_port = htons((uint16_t) port);
|
|
memcpy(&(addr->sin6_addr), address_data->data,
|
|
address_data->size);
|
|
}
|
|
return GETDNS_RETURN_GOOD;
|
|
}
|
|
|
|
getdns_return_t
|
|
sockaddr_to_dict(struct getdns_context *context, struct sockaddr_storage *address,
|
|
struct getdns_dict ** output)
|
|
{
|
|
if (!output || !address) {
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
}
|
|
struct getdns_bindata addr_data;
|
|
*output = NULL;
|
|
struct getdns_dict *result = getdns_dict_create_with_context(context);
|
|
if (address->ss_family == AF_INET) {
|
|
struct sockaddr_in *addr = (struct sockaddr_in *) address;
|
|
getdns_dict_util_set_string(result, GETDNS_STR_ADDRESS_TYPE,
|
|
GETDNS_STR_IPV4);
|
|
addr_data.size = sizeof(addr->sin_addr);
|
|
addr_data.data = (uint8_t *) & (addr->sin_addr);
|
|
getdns_dict_set_bindata(result, GETDNS_STR_ADDRESS_DATA,
|
|
&addr_data);
|
|
} else if (address->ss_family == AF_INET6) {
|
|
struct sockaddr_in6 *addr = (struct sockaddr_in6 *) address;
|
|
getdns_dict_util_set_string(result, GETDNS_STR_ADDRESS_TYPE,
|
|
GETDNS_STR_IPV6);
|
|
addr_data.size = sizeof(addr->sin6_addr);
|
|
addr_data.data = (uint8_t *) & (addr->sin6_addr);
|
|
getdns_dict_set_bindata(result, GETDNS_STR_ADDRESS_DATA,
|
|
&addr_data);
|
|
} else {
|
|
// invalid
|
|
getdns_dict_destroy(result);
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
}
|
|
*output = result;
|
|
return GETDNS_RETURN_GOOD;
|
|
}
|
|
|
|
/* result must be freed */
|
|
static char *
|
|
convert_rdf_to_str(ldns_rdf * rdf)
|
|
{
|
|
if (ldns_rdf_get_type(rdf) == LDNS_RDF_TYPE_DNAME) {
|
|
ldns_dname2canonical(rdf);
|
|
}
|
|
return ldns_rdf2str(rdf);
|
|
}
|
|
|
|
/* create the header dict */
|
|
static struct getdns_dict *
|
|
create_reply_header_dict(struct getdns_context *context, ldns_pkt * reply)
|
|
{
|
|
/* { "id": 23456, "qr": 1, "opcode": 0, ... }, */
|
|
int r = 0;
|
|
struct getdns_dict *result = getdns_dict_create_with_context(context);
|
|
if (!result) {
|
|
return NULL;
|
|
}
|
|
/* cheat since we know GETDNS_RETURN_GOOD == 0 */
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_ID,
|
|
ldns_pkt_id(reply));
|
|
|
|
/* set bits - seems like this could be macro-ified*/
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_QR,
|
|
(int) ldns_pkt_qr(reply));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_AA,
|
|
(int) ldns_pkt_aa(reply));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_TC,
|
|
(int) ldns_pkt_tc(reply));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_RD,
|
|
(int) ldns_pkt_rd(reply));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_CD,
|
|
(int) ldns_pkt_cd(reply));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_RA,
|
|
(int) ldns_pkt_ra(reply));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_AD,
|
|
(int) ldns_pkt_ad(reply));
|
|
|
|
/* codes */
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_OPCODE,
|
|
(int) ldns_pkt_get_opcode(reply));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_RCODE,
|
|
(int) ldns_pkt_get_rcode(reply));
|
|
/* default z to 0 */
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_Z, 0);
|
|
|
|
/* counts */
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_QDCOUNT,
|
|
(int) ldns_pkt_qdcount(reply));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_ANCOUNT,
|
|
(int) ldns_pkt_ancount(reply));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_NSCOUNT,
|
|
(int) ldns_pkt_nscount(reply));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_ARCOUNT,
|
|
(int) ldns_pkt_arcount(reply));
|
|
|
|
|
|
if (r != 0) {
|
|
getdns_dict_destroy(result);
|
|
result = NULL;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
static struct getdns_dict *
|
|
create_reply_question_dict(struct getdns_context *context, ldns_pkt * reply)
|
|
{
|
|
/* { "qname": <bindata for "www.example.com">, "qtype": 1, "qclass": 1 } */
|
|
int r = 0;
|
|
ldns_rr *question = NULL;
|
|
char *qname;
|
|
struct getdns_dict *result = getdns_dict_create_with_context(context);
|
|
if (!result) {
|
|
return NULL;
|
|
}
|
|
question = ldns_rr_list_rr(ldns_pkt_question(reply), 0);
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_QTYPE,
|
|
(int) ldns_rr_get_type(question));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_QCLASS,
|
|
(int) ldns_rr_get_class(question));
|
|
qname = convert_rdf_to_str(ldns_rr_owner(question));
|
|
if (qname) {
|
|
r |= getdns_dict_util_set_string(result, GETDNS_STR_KEY_QNAME,
|
|
qname);
|
|
free(qname);
|
|
} else {
|
|
r = 1;
|
|
}
|
|
if (r != 0) {
|
|
getdns_dict_destroy(result);
|
|
result = NULL;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
static struct getdns_dict *
|
|
create_dict_from_rdf(struct getdns_context *context, ldns_rdf * rdf)
|
|
{
|
|
/*
|
|
* create a dict w/ rdata_raw and special fields if needed
|
|
* i.e.
|
|
* {
|
|
* "ipv4_address": <bindata of 0x0a0b0c01>
|
|
* "rdata_raw": <bindata of 0x0a0b0c01>
|
|
* }
|
|
*/
|
|
int r = 0;
|
|
struct getdns_bindata rbin = { ldns_rdf_size(rdf), ldns_rdf_data(rdf) };
|
|
struct getdns_dict *result = getdns_dict_create_with_context(context);
|
|
r |= getdns_dict_set_bindata(result, GETDNS_STR_KEY_RDATA_RAW, &rbin);
|
|
if (ldns_rdf_get_type(rdf) == LDNS_RDF_TYPE_AAAA) {
|
|
r |= getdns_dict_set_bindata(result, GETDNS_STR_KEY_V6_ADDR,
|
|
&rbin);
|
|
} else if (ldns_rdf_get_type(rdf) == LDNS_RDF_TYPE_A) {
|
|
r |= getdns_dict_set_bindata(result, GETDNS_STR_KEY_V4_ADDR,
|
|
&rbin);
|
|
}
|
|
if (r != 0) {
|
|
getdns_dict_destroy(result);
|
|
result = NULL;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
static struct getdns_dict *
|
|
create_dict_from_rr(struct getdns_context *context, ldns_rr * rr)
|
|
{
|
|
/*
|
|
* {
|
|
* "name": <bindata for "www.example.com">,
|
|
* "type": 1,
|
|
* "class": 1,
|
|
* "ttl": 33000,
|
|
* "rdata":
|
|
* {
|
|
* "ipv4_address": <bindata of 0x0a0b0c01>
|
|
* "rdata_raw": <bindata of 0x0a0b0c01>
|
|
* }
|
|
* }
|
|
*/
|
|
int r = 0;
|
|
char *name = NULL;
|
|
struct getdns_dict *result = getdns_dict_create_with_context(context);
|
|
size_t rd_count = ldns_rr_rd_count(rr);
|
|
ldns_rdf *owner = ldns_rr_owner(rr);
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_TYPE,
|
|
(int) ldns_rr_get_type(rr));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_CLASS,
|
|
(int) ldns_rr_get_class(rr));
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_TTL, ldns_rr_ttl(rr));
|
|
if (owner) {
|
|
name = convert_rdf_to_str(owner);
|
|
if (name) {
|
|
r |= getdns_dict_util_set_string(result,
|
|
GETDNS_STR_KEY_NAME, name);
|
|
free(name);
|
|
} else {
|
|
r = 1;
|
|
}
|
|
}
|
|
/* create rdatas */
|
|
if (rd_count >= 1) {
|
|
struct getdns_dict *rdata = create_dict_from_rdf(context,
|
|
ldns_rr_rdf(rr, 0));
|
|
r |= getdns_dict_set_dict(result, GETDNS_STR_KEY_RDATA, rdata);
|
|
getdns_dict_destroy(rdata);
|
|
}
|
|
/* TODO - if more than one, is rdata a list? */
|
|
|
|
if (r != 0) {
|
|
getdns_dict_destroy(result);
|
|
result = NULL;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
/* helper to convert an rr_list to getdns_list.
|
|
returns a list of objects where each object
|
|
is a result from create_dict_from_rr */
|
|
struct getdns_list *
|
|
create_list_from_rr_list(struct getdns_context *context, ldns_rr_list * rr_list)
|
|
{
|
|
size_t i = 0;
|
|
size_t idx = 0;
|
|
int r = 0;
|
|
struct getdns_list *result = getdns_list_create_with_context(context);
|
|
for (i = 0; i < ldns_rr_list_rr_count(rr_list); ++i) {
|
|
ldns_rr *rr = ldns_rr_list_rr(rr_list, i);
|
|
struct getdns_dict *rrdict = create_dict_from_rr(context, rr);
|
|
r |= getdns_list_add_item(result, &idx);
|
|
r |= getdns_list_set_dict(result, idx, rrdict);
|
|
getdns_dict_destroy(rrdict);
|
|
}
|
|
if (r != 0) {
|
|
getdns_list_destroy(result);
|
|
result = NULL;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
/* helper to add the ipv4 or ipv6 bin data to the list of addrs */
|
|
static getdns_return_t
|
|
add_only_addresses(struct getdns_list * addrs, ldns_rr_list * rr_list)
|
|
{
|
|
int r = GETDNS_RETURN_GOOD;
|
|
size_t i = 0;
|
|
size_t item_idx = 0;
|
|
|
|
r = getdns_list_get_length(addrs, &item_idx);
|
|
for (i = 0; r == GETDNS_RETURN_GOOD &&
|
|
i < ldns_rr_list_rr_count(rr_list); ++i) {
|
|
ldns_rr *rr = ldns_rr_list_rr(rr_list, i);
|
|
size_t j = 0;
|
|
size_t rd_count = ldns_rr_rd_count(rr);
|
|
for (j = 0; r == GETDNS_RETURN_GOOD && j < rd_count; ++j) {
|
|
ldns_rdf *rdf = ldns_rr_rdf(rr, j);
|
|
if (ldns_rdf_get_type(rdf) != LDNS_RDF_TYPE_A &&
|
|
ldns_rdf_get_type(rdf) != LDNS_RDF_TYPE_AAAA) {
|
|
continue;
|
|
}
|
|
struct getdns_dict *this_address =
|
|
getdns_dict_create_with_extended_memory_functions(
|
|
addrs->mf.mf_arg,
|
|
addrs->mf.mf.ext.malloc,
|
|
addrs->mf.mf.ext.realloc,
|
|
addrs->mf.mf.ext.free);
|
|
if (this_address == NULL) {
|
|
r |= GETDNS_RETURN_MEMORY_ERROR;
|
|
break;
|
|
}
|
|
struct getdns_bindata rbin =
|
|
{ ldns_rdf_size(rdf), ldns_rdf_data(rdf) };
|
|
r |= getdns_dict_set_bindata(this_address,
|
|
GETDNS_STR_ADDRESS_TYPE,
|
|
( ldns_rdf_get_type(rdf) == LDNS_RDF_TYPE_A
|
|
? &IPv4_str_bindata : &IPv6_str_bindata));
|
|
r |= getdns_dict_set_bindata(this_address,
|
|
GETDNS_STR_ADDRESS_DATA, &rbin);
|
|
r |= getdns_list_set_dict(addrs, item_idx++,
|
|
this_address);
|
|
getdns_dict_destroy(this_address);
|
|
}
|
|
}
|
|
return r;
|
|
}
|
|
|
|
static struct getdns_dict *
|
|
create_reply_dict(struct getdns_context *context, getdns_network_req * req,
|
|
struct getdns_list * just_addrs)
|
|
{
|
|
/* turn a packet into this glorious structure
|
|
*
|
|
* { # This is the first reply
|
|
* "header": { "id": 23456, "qr": 1, "opcode": 0, ... },
|
|
* "question": { "qname": <bindata for "www.example.com">, "qtype": 1, "qclass": 1 },
|
|
* "answer":
|
|
* [
|
|
* {
|
|
* "name": <bindata for "www.example.com">,
|
|
* "type": 1,
|
|
* "class": 1,
|
|
* "ttl": 33000,
|
|
* "rdata":
|
|
* {
|
|
* "ipv4_address": <bindata of 0x0a0b0c01>
|
|
* "rdata_raw": <bindata of 0x0a0b0c01>
|
|
* }
|
|
* }
|
|
* ],
|
|
* "authority":
|
|
* [
|
|
* {
|
|
* "name": <bindata for "ns1.example.com">,
|
|
* "type": 1,
|
|
* "class": 1,
|
|
* "ttl": 600,
|
|
* "rdata":
|
|
* {
|
|
* "ipv4_address": <bindata of 0x65439876>
|
|
* "rdata_raw": <bindata of 0x65439876>
|
|
* }
|
|
* }
|
|
* ]
|
|
* "additional": [],
|
|
* "canonical_name": <bindata for "www.example.com">,
|
|
* "answer_type": GETDNS_NAMETYPE_DNS
|
|
* }
|
|
*
|
|
*/
|
|
int r = 0;
|
|
ldns_pkt *reply = req->result;
|
|
ldns_rr_list *rr_list = NULL;
|
|
ldns_rr *question = NULL;
|
|
struct getdns_dict *subdict = NULL;
|
|
struct getdns_list *sublist = NULL;
|
|
char *name = NULL;
|
|
|
|
struct getdns_dict *result = getdns_dict_create_with_context(context);
|
|
if (!result) {
|
|
return NULL;
|
|
}
|
|
/* header */
|
|
subdict = create_reply_header_dict(context, reply);
|
|
r |= getdns_dict_set_dict(result, GETDNS_STR_KEY_HEADER, subdict);
|
|
getdns_dict_destroy(subdict);
|
|
|
|
/* question */
|
|
subdict = create_reply_question_dict(context, reply);
|
|
r |= getdns_dict_set_dict(result, GETDNS_STR_KEY_QUESTION, subdict);
|
|
getdns_dict_destroy(subdict);
|
|
|
|
/* answers */
|
|
rr_list = ldns_pkt_answer(reply);
|
|
sublist = create_list_from_rr_list(context, rr_list);
|
|
r |= getdns_dict_set_list(result, GETDNS_STR_KEY_ANSWER, sublist);
|
|
getdns_list_destroy(sublist);
|
|
if ((req->request_type == GETDNS_RRTYPE_A ||
|
|
req->request_type == GETDNS_RRTYPE_AAAA) &&
|
|
just_addrs != NULL) {
|
|
/* add to just addrs */
|
|
r |= add_only_addresses(just_addrs, rr_list);
|
|
}
|
|
|
|
/* authority */
|
|
rr_list = ldns_pkt_authority(reply);
|
|
sublist = create_list_from_rr_list(context, rr_list);
|
|
r |= getdns_dict_set_list(result, GETDNS_STR_KEY_AUTHORITY, sublist);
|
|
getdns_list_destroy(sublist);
|
|
|
|
/* additional */
|
|
rr_list = ldns_pkt_additional(reply);
|
|
sublist = create_list_from_rr_list(context, rr_list);
|
|
r |= getdns_dict_set_list(result, GETDNS_STR_KEY_ADDITIONAL, sublist);
|
|
getdns_list_destroy(sublist);
|
|
|
|
/* other stuff */
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_ANSWER_TYPE,
|
|
GETDNS_NAMETYPE_DNS);
|
|
question = ldns_rr_list_rr(ldns_pkt_question(reply), 0);
|
|
name = convert_rdf_to_str(ldns_rr_owner(question));
|
|
if (name) {
|
|
r |= getdns_dict_util_set_string(result,
|
|
GETDNS_STR_KEY_CANONICAL_NM, name);
|
|
free(name);
|
|
} else {
|
|
r |= 1;
|
|
}
|
|
if (r != 0) {
|
|
getdns_dict_destroy(result);
|
|
result = NULL;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
static char *
|
|
get_canonical_name(const char *name)
|
|
{
|
|
ldns_rdf *rdf = ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME, name);
|
|
if (!rdf) {
|
|
return NULL;
|
|
}
|
|
char *result = convert_rdf_to_str(rdf);
|
|
ldns_rdf_deep_free(rdf);
|
|
return result;
|
|
}
|
|
|
|
struct getdns_dict *
|
|
create_getdns_response(struct getdns_dns_req * completed_request)
|
|
{
|
|
struct getdns_dict *result = getdns_dict_create_with_context(completed_request->context);
|
|
struct getdns_list *replies_full = getdns_list_create_with_context(
|
|
completed_request->context);
|
|
struct getdns_list *just_addrs = NULL;
|
|
struct getdns_list *replies_tree = getdns_list_create_with_context(
|
|
completed_request->context);
|
|
getdns_network_req *netreq = completed_request->first_req;
|
|
char *canonical_name = NULL;
|
|
|
|
int r = 0;
|
|
|
|
if (completed_request->first_req->request_class == GETDNS_RRTYPE_A ||
|
|
completed_request->first_req->request_class ==
|
|
GETDNS_RRTYPE_AAAA) {
|
|
just_addrs = getdns_list_create_with_context(
|
|
completed_request->context);
|
|
}
|
|
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_STATUS,
|
|
GETDNS_RESPSTATUS_GOOD);
|
|
canonical_name = get_canonical_name(completed_request->name);
|
|
r |= getdns_dict_util_set_string(result, GETDNS_STR_KEY_CANONICAL_NM,
|
|
canonical_name);
|
|
free(canonical_name);
|
|
r |= getdns_dict_set_int(result, GETDNS_STR_KEY_ANSWER_TYPE,
|
|
GETDNS_NAMETYPE_DNS);
|
|
|
|
while (netreq) {
|
|
struct getdns_bindata full_data;
|
|
full_data.data = NULL;
|
|
full_data.size = 0;
|
|
ldns_pkt *pkt = netreq->result;
|
|
ldns_status s =
|
|
ldns_pkt2wire(&(full_data.data), pkt, &(full_data.size));
|
|
size_t idx = 0;
|
|
/* reply tree */
|
|
struct getdns_dict *reply = create_reply_dict(
|
|
completed_request->context, netreq, just_addrs);
|
|
r |= getdns_list_add_item(replies_tree, &idx);
|
|
r |= getdns_list_set_dict(replies_tree, idx, reply);
|
|
getdns_dict_destroy(reply);
|
|
/* buffer */
|
|
if (s == LDNS_STATUS_OK) {
|
|
r |= getdns_list_add_item(replies_full, &idx);
|
|
r |= getdns_list_set_bindata(replies_full, idx,
|
|
&full_data);
|
|
free(full_data.data);
|
|
} else {
|
|
r = 1;
|
|
break;
|
|
}
|
|
netreq = netreq->next;
|
|
}
|
|
|
|
r |= getdns_dict_set_list(result, GETDNS_STR_KEY_REPLIES_TREE,
|
|
replies_tree);
|
|
r |= getdns_dict_set_list(result, GETDNS_STR_KEY_REPLIES_FULL,
|
|
replies_full);
|
|
if (just_addrs) {
|
|
r |= getdns_dict_set_list(result, GETDNS_STR_KEY_JUST_ADDRS,
|
|
just_addrs);
|
|
}
|
|
|
|
/* cleanup */
|
|
getdns_list_destroy(replies_tree);
|
|
getdns_list_destroy(replies_full);
|
|
getdns_list_destroy(just_addrs);
|
|
|
|
if (r != 0) {
|
|
getdns_dict_destroy(result);
|
|
result = NULL;
|
|
}
|
|
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* reverse an IP address for PTR lookup
|
|
* @param address_data IP address to reverse
|
|
* @return NULL on allocation failure
|
|
* @return reversed string on success, caller must free storage via call to free()
|
|
*/
|
|
char *
|
|
reverse_address(struct getdns_bindata *address_data)
|
|
{
|
|
ldns_rdf *addr_rdf;
|
|
ldns_rdf *rev_rdf;
|
|
char *rev_str;
|
|
|
|
if (address_data->size == 4)
|
|
addr_rdf = ldns_rdf_new(LDNS_RDF_TYPE_A, 4, address_data->data);
|
|
else if (address_data->size == 16)
|
|
addr_rdf = ldns_rdf_new(LDNS_RDF_TYPE_AAAA, 16, address_data->data);
|
|
else
|
|
return NULL;
|
|
if (!addr_rdf)
|
|
return NULL;
|
|
|
|
rev_rdf = ldns_rdf_address_reverse(addr_rdf);
|
|
ldns_rdf_free(addr_rdf);
|
|
if (!rev_rdf)
|
|
return NULL;
|
|
|
|
rev_str = ldns_rdf2str(rev_rdf);
|
|
ldns_rdf_deep_free(rev_rdf);
|
|
return rev_str;
|
|
}
|
|
|
|
static int
|
|
extformatcmp(const void *a, const void *b)
|
|
{
|
|
return strcmp(((getdns_extension_format *) a)->extstring,
|
|
((getdns_extension_format *) b)->extstring);
|
|
}
|
|
|
|
/*---------------------------------------- validate_extensions */
|
|
getdns_return_t
|
|
validate_extensions(struct getdns_dict * extensions)
|
|
{
|
|
struct getdns_dict_item *item;
|
|
getdns_extension_format *extformat;
|
|
|
|
if (extensions)
|
|
LDNS_RBTREE_FOR(item, struct getdns_dict_item *,
|
|
&(extensions->root))
|
|
{
|
|
getdns_extension_format key;
|
|
key.extstring = (char *) item->node.key;
|
|
extformat = bsearch(&key, extformats,
|
|
sizeof(extformats) /
|
|
sizeof(getdns_extension_format),
|
|
sizeof(getdns_extension_format), extformatcmp);
|
|
if (!extformat)
|
|
return GETDNS_RETURN_NO_SUCH_EXTENSION;
|
|
|
|
if (item->dtype != extformat->exttype)
|
|
return GETDNS_RETURN_EXTENSION_MISFORMAT;
|
|
}
|
|
return GETDNS_RETURN_GOOD;
|
|
} /* validate_extensions */
|
|
|
|
getdns_return_t
|
|
getdns_apply_network_result(getdns_network_req* netreq,
|
|
struct ub_result* ub_res) {
|
|
ldns_buffer *result = ldns_buffer_new(ub_res->answer_len);
|
|
if (!result) {
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
}
|
|
ldns_status r =
|
|
ldns_wire2pkt(&(netreq->result), ub_res->answer_packet, ub_res->answer_len);
|
|
if (r != LDNS_STATUS_OK) {
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
}
|
|
return GETDNS_RETURN_GOOD;
|
|
}
|
|
|
|
|
|
getdns_return_t
|
|
validate_dname(const char* dname) {
|
|
int len;
|
|
int label_len;
|
|
const char* s;
|
|
if (dname == NULL) {
|
|
return GETDNS_RETURN_INVALID_PARAMETER;
|
|
}
|
|
len = strlen(dname);
|
|
if (len >= GETDNS_MAX_DNAME_LEN || len == 0) {
|
|
return GETDNS_RETURN_BAD_DOMAIN_NAME;
|
|
}
|
|
if (len == 1 && dname[0] == '.') {
|
|
/* root is ok */
|
|
return GETDNS_RETURN_GOOD;
|
|
}
|
|
label_len = 0;
|
|
for (s = dname; *s; ++s) {
|
|
switch (*s) {
|
|
case '.':
|
|
if (label_len > GETDNS_MAX_LABEL_LEN ||
|
|
label_len == 0) {
|
|
return GETDNS_RETURN_BAD_DOMAIN_NAME;
|
|
}
|
|
label_len = 0;
|
|
break;
|
|
default:
|
|
if ((*s >= 'a' && *s <= 'z') ||
|
|
(*s >= 'A' && *s <= 'Z') ||
|
|
(*s >= '0' && *s <= '9')) {
|
|
label_len++;
|
|
} else if (*s == '-' && label_len != 0) {
|
|
label_len++;
|
|
} else {
|
|
return GETDNS_RETURN_BAD_DOMAIN_NAME;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
if (label_len > GETDNS_MAX_LABEL_LEN) {
|
|
return GETDNS_RETURN_BAD_DOMAIN_NAME;
|
|
}
|
|
return GETDNS_RETURN_GOOD;
|
|
}
|
|
|
|
/* util-internal.c */
|