3 * - RR-type-specific code, and the machinery to call it
6 * This file is part of adns, which is
7 * Copyright (C) 1997-2000,2003,2006 Ian Jackson
8 * Copyright (C) 1999-2000,2003,2006 Tony Finch
9 * Copyright (C) 1991 Massachusetts Institute of Technology
10 * (See the file INSTALL for full details.)
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2, or (at your option)
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software Foundation,
24 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
30 #include <sys/types.h>
31 #include <sys/socket.h>
32 #include <netinet/in.h>
33 #include <arpa/inet.h>
38 #define R_NOMEM return adns_s_nomemory
39 #define CSP_ADDSTR(s) do { \
40 if (!adns__vbuf_appendstr(vb,(s))) R_NOMEM; \
47 * _textdata, _qstring (csp)
52 * _inaddr (pa,cs,di, +search_sortlist, dip_genaddr)
54 * _addr (pap,pa,di,csp,cs,gsz,qs, +search_sortlist_sa,
55 * dip_sockaddr, rrtypes)
58 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +pap_findaddrs)
61 * _inthostaddr (mf,cs)
66 * _mailbox (pap +pap_mailbox822)
69 * _srv* (ckl,(pap),pa,mf,di,(csp),cs,postsort)
74 * within each section:
91 static adns_status pap_qstring(const parseinfo *pai, int *cbyte_io, int max,
92 int *len_r, char **str_r) {
93 /* Neither len_r nor str_r may be null.
94 * End of datagram (overrun) is indicated by returning adns_s_invaliddata;
96 const byte *dgram= pai->dgram;
102 if (cbyte >= max) return adns_s_invaliddata;
104 if (cbyte+l > max) return adns_s_invaliddata;
106 str= adns__alloc_interim(pai->qu, l+1);
110 memcpy(str,dgram+cbyte,l);
119 static adns_status csp_qstring(vbuf *vb, const char *dp, int len) {
125 for (cn=0; cn<len; cn++) {
129 } else if (ch == '"') {
131 } else if (ch >= 32 && ch <= 126) {
132 if (!adns__vbuf_append(vb,&ch,1)) R_NOMEM;
134 sprintf(buf,"\\x%02x",ch);
147 static void mf_str(adns_query qu, void *datap) {
150 adns__makefinal_str(qu,rrp);
157 static void mf_intstr(adns_query qu, void *datap) {
158 adns_rr_intstr *rrp= datap;
160 adns__makefinal_str(qu,&rrp->str);
167 static void mf_manyistr(adns_query qu, void *datap) {
168 adns_rr_intstr **rrp= datap;
169 adns_rr_intstr *te, *table;
173 for (tc=0, te= *rrp; te->i >= 0; te++, tc++);
175 adns__makefinal_block(qu,&tablev,sizeof(*te)*(tc+1));
177 for (te= *rrp; te->i >= 0; te++)
178 adns__makefinal_str(qu,&te->str);
185 static adns_status pa_txt(const parseinfo *pai, int cbyte,
186 int max, void *datap) {
187 adns_rr_intstr **rrp= datap, *table, *te;
188 const byte *dgram= pai->dgram;
189 int ti, tc, l, startbyte;
193 if (cbyte >= max) return adns_s_invaliddata;
195 while (cbyte < max) {
200 if (cbyte != max || !tc) return adns_s_invaliddata;
202 table= adns__alloc_interim(pai->qu,sizeof(*table)*(tc+1));
205 for (cbyte=startbyte, ti=0, te=table; ti<tc; ti++, te++) {
206 st= pap_qstring(pai, &cbyte, max, &te->i, &te->str);
209 assert(cbyte == max);
218 static adns_status cs_txt(vbuf *vb, const void *datap) {
219 const adns_rr_intstr *const *rrp= datap;
220 const adns_rr_intstr *current;
224 for (current= *rrp, spc=0; current->i >= 0; current++, spc=1) {
225 if (spc) CSP_ADDSTR(" ");
226 st= csp_qstring(vb,current->str,current->i); if (st) return st;
235 static adns_status cs_hinfo(vbuf *vb, const void *datap) {
236 const adns_rr_intstrpair *rrp= datap;
239 st= csp_qstring(vb,rrp->array[0].str,rrp->array[0].i); if (st) return st;
241 st= csp_qstring(vb,rrp->array[1].str,rrp->array[1].i); if (st) return st;
246 * _inaddr (pa,di,cs +search_sortlist, dip_genaddr)
249 static adns_status pa_inaddr(const parseinfo *pai, int cbyte,
250 int max, void *datap) {
251 struct in_addr *storeto= datap;
253 if (max-cbyte != 4) return adns_s_invaliddata;
254 memcpy(storeto, pai->dgram + cbyte, 4);
258 static int search_sortlist(adns_state ads, int af, const void *ad) {
259 const struct sortlist *slp;
260 const struct in6_addr *a6;
265 if (af == AF_INET6) {
267 if (IN6_IS_ADDR_V4MAPPED(a6)) {
268 a.v4.s_addr = htonl(((unsigned long)a6->s6_addr[12] << 24) |
269 ((unsigned long)a6->s6_addr[13] << 16) |
270 ((unsigned long)a6->s6_addr[14] << 8) |
271 ((unsigned long)a6->s6_addr[15] << 0));
276 for (i=0, slp=ads->sortlist;
278 !(af == slp->ai->af &&
279 slp->ai->matchp(ad, &slp->base, &slp->mask)) &&
280 !(v6mappedp && slp->ai->af == AF_INET &&
281 slp->ai->matchp(&a, &slp->base, &slp->mask));
286 static int dip_genaddr(adns_state ads, int af, const void *a, const void *b) {
289 if (!ads->nsortlist) return 0;
291 ai= search_sortlist(ads,af,a);
292 bi= search_sortlist(ads,af,b);
296 static int di_inaddr(adns_state ads,
297 const void *datap_a, const void *datap_b) {
298 return dip_genaddr(ads,AF_INET,datap_a,datap_b);
301 static adns_status cs_inaddr(vbuf *vb, const void *datap) {
302 const struct in_addr *rrp= datap, rr= *rrp;
305 ia= inet_ntoa(rr); assert(ia);
311 * _in6addr (pa,di,cs)
314 static adns_status pa_in6addr(const parseinfo *pai, int cbyte,
315 int max, void *datap) {
316 struct in6_addr *storeto= datap;
318 if (max-cbyte != 16) return adns_s_invaliddata;
319 memcpy(storeto->s6_addr, pai->dgram + cbyte, 16);
323 static int di_in6addr(adns_state ads,
324 const void *datap_a, const void *datap_b) {
325 return dip_genaddr(ads,AF_INET6,datap_a,datap_b);
328 static adns_status cs_in6addr(vbuf *vb, const void *datap) {
329 char buf[INET6_ADDRSTRLEN];
332 ia= inet_ntop(AF_INET6, datap, buf, sizeof(buf)); assert(ia);
338 * _addr (pap,pa,di,csp,cs,gsz,qs, +search_sortlist_sa, dip_sockaddr,
342 static const typeinfo tinfo_addrsub;
344 #define ADDR_RRTYPES(_) _(a) _(aaaa)
346 static const adns_rrtype addr_all_rrtypes[] = {
347 #define RRTY_CODE(ty) adns_r_##ty,
348 ADDR_RRTYPES(RRTY_CODE)
353 #define RRTY_INDEX(ty) addr__ri_##ty,
354 ADDR_RRTYPES(RRTY_INDEX)
357 #define RRTY_FLAG(ty) addr_rf_##ty = 1 << addr__ri_##ty,
358 ADDR_RRTYPES(RRTY_FLAG)
363 static unsigned addr_rrtypeflag(adns_rrtype type)
367 type &= adns_rrt_typemask;
368 for (i = 0; i < addr_nrrtypes && type != addr_all_rrtypes[i]; i++);
369 assert(i < addr_nrrtypes);
373 /* About CNAME handling in addr queries.
375 * A user-level addr query is translated into a number of protocol-level
376 * queries, and its job is to reassemble the results. This gets tricky if
377 * the answers aren't consistent. In particular, if the answers report
378 * inconsistent indirection via CNAME records (e.g., different CNAMEs, or
379 * some indirect via a CNAME, and some don't) then we have trouble.
381 * Once we've received an answer, even if it was NODATA, we set
382 * adns__qf_addr_answer on the parent query. This will let us detect a
383 * conflict between a no-CNAME-with-NODATA reply and a subsequent CNAME.
385 * If we detect a conflict of any kind, then at least one answer came back
386 * with a CNAME record, so we pick the first such answer (somewhat
387 * arbitrarily) as being the `right' canonical name, and set this in the
388 * parent query's answer->cname slot. We discard address records from the
389 * wrong name. And finally we cancel the outstanding child queries, and
390 * resubmit address queries for the address families we don't yet have, with
391 * adns__qf_addr_cname set so that we know that we're in the fixup state.
394 static adns_status pap_addr(const parseinfo *pai, int rrty, size_t rrsz,
395 int *cbyte_io, int max, adns_rr_addr *storeto)
397 const byte *dgram= pai->dgram;
398 int af, addrlen, salen;
399 struct in6_addr v6map;
400 const void *oaddr = dgram + *cbyte_io;
401 int avail = max - *cbyte_io;
407 if (pai->qu->flags & adns_qf_domapv4) {
408 if (avail < 4) return adns_s_invaliddata;
409 memset(v6map.s6_addr + 0, 0x00, 10);
410 memset(v6map.s6_addr + 10, 0xff, 2);
411 memcpy(v6map.s6_addr + 12, oaddr, 4);
412 oaddr = v6map.s6_addr; avail = sizeof(v6map.s6_addr);
413 if (step < 0) step = 4;
416 af = AF_INET; addrlen = 4;
417 addrp = &storeto->addr.inet.sin_addr;
418 salen = sizeof(storeto->addr.inet);
422 af = AF_INET6; addrlen = 16;
423 addrp = storeto->addr.inet6.sin6_addr.s6_addr;
424 salen = sizeof(storeto->addr.inet6);
429 assert(offsetof(adns_rr_addr, addr) + salen <= rrsz);
430 if (addrlen < avail) return adns_s_invaliddata;
431 if (step < 0) step = addrlen;
433 memset(&storeto->addr, 0, salen);
434 storeto->len = salen;
435 storeto->addr.sa.sa_family = af;
436 memcpy(addrp, oaddr, addrlen);
441 static adns_status pa_addr(const parseinfo *pai, int cbyte,
442 int max, void *datap) {
443 int err = pap_addr(pai, pai->qu->answer->type & adns_rrt_typemask,
444 pai->qu->answer->rrsz, &cbyte, max, datap);
446 if (cbyte != max) return adns_s_invaliddata;
450 static int search_sortlist_sa(adns_state ads, const struct sockaddr *sa)
452 const afinfo *ai = 0;
454 switch (sa->sa_family) {
455 case AF_INET: ai = &adns__inet_afinfo; break;
456 case AF_INET6: ai = &adns__inet6_afinfo; break;
460 return search_sortlist(ads, sa->sa_family, ai->sockaddr_to_inaddr(sa));
463 static int dip_sockaddr(adns_state ads,
464 const struct sockaddr *sa,
465 const struct sockaddr *sb)
467 if (!ads->sortlist) return 0;
468 return search_sortlist_sa(ads, sa) > search_sortlist_sa(ads, sb);
471 static int di_addr(adns_state ads, const void *datap_a, const void *datap_b) {
472 const adns_rr_addr *ap= datap_a, *bp= datap_b;
474 return dip_sockaddr(ads, &ap->addr.sa, &bp->addr.sa);
477 static int div_addr(void *context, const void *datap_a, const void *datap_b) {
478 const adns_state ads= context;
480 return di_addr(ads, datap_a, datap_b);
483 static adns_status csp_addr(vbuf *vb, const adns_rr_addr *rrp) {
487 switch (rrp->addr.inet.sin_family) {
492 CSP_ADDSTR("INET6 ");
495 err= getnameinfo(&rrp->addr.sa, rrp->len, buf, sizeof(buf), 0, 0,
496 NI_NUMERICHOST); assert(!err);
500 sprintf(buf,"AF=%u",rrp->addr.sa.sa_family);
507 static adns_status cs_addr(vbuf *vb, const void *datap) {
508 const adns_rr_addr *rrp= datap;
510 return csp_addr(vb,rrp);
513 static unsigned addr_rrtypes(adns_state ads, adns_rrtype type,
516 adns_queryflags permitaf = 0, hackaf = 0;
519 if (!(qf & (adns_qf_ipv4_only | adns_qf_ipv6_only)))
520 qf |= adns_qf_ipv4_only | adns_qf_ipv6_only;
521 if (!(type & adns__qtf_bigaddr) || !(type & adns__qtf_manyaf))
522 qf = (qf & adns__qf_afmask) | adns_qf_ipv4_only;
523 else if (ads->iflags & adns_if_afmask) {
524 if (ads->iflags & adns_if_af_v4only) {
525 permitaf |= adns_qf_ipv4_only;
526 hackaf |= adns_qf_domapv4;
528 if (ads->iflags & adns_if_af_v6only)
529 permitaf |= adns_qf_ipv6_only;
531 qf &= hackaf | permitaf | ~adns__qf_afmask;
534 if (qf & adns_qf_ipv4_only) want |= addr_rf_a;
535 if (qf & adns_qf_ipv6_only) want |= addr_rf_aaaa;
540 static int gsz_addr(adns_rrtype type)
542 return type & adns__qtf_bigaddr ?
543 sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only);
546 static adns_status append_addrs(adns_query qu, adns_query from, size_t rrsz,
547 adns_rr_addr **dp, int *dlen,
548 const adns_rr_addr *sp, int slen)
550 size_t drrsz = *dlen*rrsz, srrsz = slen*rrsz;
553 if (!slen) return adns_s_ok;
554 p = adns__alloc_interim(qu, drrsz + srrsz);
557 memcpy(p, *dp, drrsz);
558 adns__free_interim(qu, *dp);
560 memcpy(p + drrsz, sp, srrsz);
562 *dp = (adns_rr_addr *)p;
563 if (from && qu->expires > from->expires) qu->expires = from->expires;
567 static void icb_addr(adns_query parent, adns_query child);
569 static void addr_subqueries(adns_query qu, struct timeval now,
570 adns_queryflags qf_extra,
571 const byte *qd_dgram, int qd_dglen)
575 adns_queryflags qf = (qu->flags & ~adns_qf_search) | qf_extra;
576 adns_rrtype qtf = qu->answer->type & adns__qtf_deref;
577 unsigned which = qu->ctx.tinfo.addr.want & ~qu->ctx.tinfo.addr.have;
580 memset(&ctx, 0, sizeof(ctx));
581 ctx.callback = icb_addr;
582 for (i = 0; i < addr_nrrtypes; i++) {
583 if (!(which & (1 << i))) continue;
584 err = adns__mkquery_frdgram(qu->ads, &qu->vb, &id, qd_dgram, qd_dglen,
585 DNS_HDRSIZE, addr_all_rrtypes[i], qf);
586 if (err) goto x_error;
587 err = adns__internal_submit(qu->ads, &cqu, &tinfo_addrsub,
588 addr_all_rrtypes[i] | qtf,
589 &qu->vb, id, qf, now, &ctx);
590 if (err) goto x_error;
591 cqu->answer->rrsz = qu->answer->rrsz;
593 LIST_LINK_TAIL_PART(qu->children, cqu,siblings.);
595 qu->state = query_childw;
596 LIST_LINK_TAIL(qu->ads->childw, qu);
600 adns__query_fail(qu, err);
603 static adns_status addr_submit(adns_query parent, adns_query *query_r,
604 vbuf *qumsg_vb, int id, unsigned want,
605 adns_queryflags flags, struct timeval now,
608 /* This is effectively a substitute for adns__internal_submit, intended for
609 * the case where the caller (possibly) only wants a subset of the
610 * available record types. The memory management and callback rules are
611 * the same as for adns__internal_submit.
613 * Some differences: the query is linked onto the parent's children list
614 * before exit (though the parent's state is not changed, and it is not
615 * linked into the childw list queue); and we fiddle with the `tinfo'
616 * portion of the context structure (yes, modifying *ctx), since this is,
617 * in fact, the main purpose of this function.
620 adns_state ads = parent->ads;
624 (adns_r_addr & adns_rrt_reprmask) |
625 (parent->answer->type & ~adns_rrt_reprmask);
627 ctx->tinfo.addr.want = want;
628 ctx->tinfo.addr.have = 0;
629 err = adns__internal_submit(ads, &qu, adns__findtype(adns_r_addr),
630 type, qumsg_vb, id, flags, now, ctx);
634 LIST_LINK_TAIL_PART(parent->children, qu, siblings.);
639 static adns_status copy_cname_from_child(adns_query parent, adns_query child)
641 adns_answer *pans = parent->answer, *cans = child->answer;
642 size_t n = strlen(cans->cname) + 1;
644 pans->cname = adns__alloc_preserved(parent, n);
645 if (!pans->cname) R_NOMEM;
646 memcpy(pans->cname, cans->cname, n);
650 static void done_addr_type(adns_query qu, adns_rrtype type)
651 { qu->ctx.tinfo.addr.have |= addr_rrtypeflag(type); }
653 static void icb_addr(adns_query parent, adns_query child)
655 adns_state ads = parent->ads;
656 adns_answer *pans = parent->answer, *cans = child->answer;
661 if (!(child->flags & adns__qf_addr_cname) &&
662 (parent->flags & adns__qf_addr_answer) &&
663 (!!pans->cname != !!cans->cname ||
664 (pans->cname && strcmp(pans->cname, cans->cname) != 0))) {
665 /* We've detected an inconsistency in CNAME records, and must deploy
670 /* The child has a CNAME record, but the parent doesn't. We must
671 * discard all of the parent's addresses, and substitute the child's.
674 assert(pans->rrsz == cans->rrsz);
675 adns__free_interim(parent, pans->rrs.bytes);
676 adns__transfer_interim(child, parent, cans->rrs.bytes);
677 pans->rrs.bytes = cans->rrs.bytes;
678 pans->nrrs = cans->nrrs;
679 parent->ctx.tinfo.addr.have = 0;
680 done_addr_type(parent, cans->type);
681 err = copy_cname_from_child(parent, child); if (err) goto x_err;
684 /* We've settled on the CNAME (now) associated with the parent, which
685 * already has appropriate address records. Build a query datagram for
686 * this name so that we can issue child queries for the missing address
687 * families. The child's vbuf looks handy for this.
689 err = adns__mkquery(ads, &child->vb, &id, pans->cname,
690 strlen(pans->cname), &tinfo_addrsub,
691 adns_r_addr, parent->flags);
694 /* Now cancel the remaining children, and try again with the CNAME we've
697 adns__cancel_children(parent);
698 if (gettimeofday(&now, 0)) goto x_gtod;
699 addr_subqueries(parent, now, adns__qf_addr_cname,
700 child->vb.buf, child->vb.used);
704 if (cans->cname && !pans->cname) {
705 err = copy_cname_from_child(parent, child);
709 if ((parent->flags & adns_qf_search) &&
710 !pans->cname && cans->status == adns_s_nxdomain) {
711 /* We're searching a list of suffixes, this is the first answer, and it
712 * tells us that the name doesn't exist. Try the next one.
715 if (parent->expires > child->expires) parent->expires = child->expires;
716 adns__cancel_children(parent);
717 adns__free_interim(parent, pans->rrs.bytes);
718 pans->rrs.bytes = 0; pans->nrrs = 0;
719 if (gettimeofday(&now, 0)) goto x_gtod;
720 adns__search_next(ads, parent, now);
724 if (cans->status && cans->status != adns_s_nodata)
725 { err = cans->status; goto x_err; }
727 assert(pans->rrsz == cans->rrsz);
728 err = append_addrs(parent, child, pans->rrsz,
729 &pans->rrs.addr, &pans->nrrs,
730 cans->rrs.addr, cans->nrrs);
732 done_addr_type(parent, cans->type);
734 if (parent->children.head) LIST_LINK_TAIL(ads->childw, parent);
735 else if (!pans->nrrs) adns__query_fail(parent, adns_s_nodata);
736 else adns__query_done(parent);
737 parent->flags |= adns__qf_addr_answer;
741 adns__diag(ads, -1, parent, "gettimeofday failed: %s", strerror(errno));
742 err = adns_s_systemfail;
746 adns__query_fail(parent, err);
749 static void qs_addr(adns_query qu, struct timeval now)
751 if (!qu->ctx.tinfo.addr.want) {
752 qu->ctx.tinfo.addr.want =
753 addr_rrtypes(qu->ads, qu->answer->type, qu->flags);
754 qu->ctx.tinfo.addr.have = 0;
756 addr_subqueries(qu, now, 0, qu->query_dgram, qu->query_dglen);
760 * _domain (pap,csp,cs)
764 static adns_status pap_domain(const parseinfo *pai, int *cbyte_io, int max,
765 char **domain_r, parsedomain_flags flags) {
769 st= adns__parse_domain(pai->qu->ads, pai->serv, pai->qu, &pai->qu->vb, flags,
770 pai->dgram,pai->dglen, cbyte_io, max);
772 if (!pai->qu->vb.used) return adns_s_invaliddata;
774 dm= adns__alloc_interim(pai->qu, pai->qu->vb.used+1);
777 dm[pai->qu->vb.used]= 0;
778 memcpy(dm,pai->qu->vb.buf,pai->qu->vb.used);
784 static adns_status csp_domain(vbuf *vb, const char *domain) {
786 if (!*domain) CSP_ADDSTR(".");
790 static adns_status cs_domain(vbuf *vb, const void *datap) {
791 const char *const *domainp= datap;
792 return csp_domain(vb,*domainp);
795 static adns_status pa_dom_raw(const parseinfo *pai, int cbyte,
796 int max, void *datap) {
800 st= pap_domain(pai, &cbyte, max, rrp, pdf_quoteok);
803 if (cbyte != max) return adns_s_invaliddata;
811 static adns_status pa_host_raw(const parseinfo *pai, int cbyte,
812 int max, void *datap) {
816 st= pap_domain(pai, &cbyte, max, rrp,
817 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
820 if (cbyte != max) return adns_s_invaliddata;
825 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +icb_hostaddr, pap_findaddrs)
828 static adns_status pap_findaddrs(const parseinfo *pai, adns_rr_hostaddr *ha,
829 unsigned *want_io, size_t addrsz,
830 int *cbyte_io, int count, int dmstart) {
832 unsigned typef, want = *want_io;
833 int type, class, rdlen, rdend, rdstart, ownermatched;
837 for (rri=0, naddrs=0; rri<count; rri++) {
838 st= adns__findrr_anychk(pai->qu, pai->serv, pai->dgram,
839 pai->dglen, cbyte_io,
840 &type, &class, &ttl, &rdlen, &rdstart,
841 pai->dgram, pai->dglen, dmstart, &ownermatched);
843 if (!ownermatched || class != DNS_CLASS_IN) continue;
844 typef = addr_rrtypeflag(type);
845 if (!(want & typef)) continue;
847 if (!adns__vbuf_ensure(&pai->qu->vb, (naddrs+1)*addrsz)) R_NOMEM;
848 adns__update_expires(pai->qu,ttl,pai->now);
849 rdend = rdstart + rdlen;
850 st= pap_addr(pai, type, addrsz, &rdstart, rdend,
851 (adns_rr_addr *)(pai->qu->vb.buf + naddrs*addrsz));
853 if (rdstart != rdend) return adns_s_invaliddata;
857 st = append_addrs(pai->qu, 0, addrsz, &ha->addrs, &ha->naddrs,
858 (const adns_rr_addr *)pai->qu->vb.buf, naddrs);
860 ha->astatus= adns_s_ok;
863 adns__isort(ha->addrs, naddrs, addrsz, pai->qu->vb.buf,
871 static void icb_hostaddr(adns_query parent, adns_query child) {
872 adns_answer *cans= child->answer;
873 adns_rr_hostaddr *rrp= child->ctx.pinfo.hostaddr;
874 adns_state ads= parent->ads;
876 size_t addrsz = gsz_addr(parent->answer->type);
878 st= cans->status == adns_s_nodata ? adns_s_ok : cans->status;
881 assert(addrsz == cans->rrsz);
882 st = append_addrs(parent, child, addrsz,
883 &rrp->addrs, &rrp->naddrs,
884 cans->rrs.addr, cans->nrrs);
886 if (!rrp->naddrs) { st = adns_s_nodata; goto done; }
888 if (!adns__vbuf_ensure(&parent->vb, addrsz))
889 { st = adns_s_nomemory; goto done; }
890 adns__isort(rrp->addrs, rrp->naddrs, addrsz, parent->vb.buf,
895 adns__free_interim(parent, rrp->addrs);
896 rrp->naddrs= (st>0 && st<=adns_s_max_tempfail) ? -1 : 0;
900 if (parent->children.head) {
901 LIST_LINK_TAIL(ads->childw,parent);
903 adns__query_done(parent);
907 static adns_status pap_hostaddr(const parseinfo *pai, int *cbyte_io,
908 int max, adns_rr_hostaddr *rrp) {
914 adns_queryflags nflags;
916 size_t addrsz = gsz_addr(pai->qu->answer->type);
918 dmstart= cbyte= *cbyte_io;
919 st= pap_domain(pai, &cbyte, max, &rrp->host,
920 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
924 rrp->astatus= adns_s_ok;
930 want = addr_rrtypes(pai->ads, pai->qu->answer->type, pai->qu->flags);
932 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->nscount, dmstart);
934 if (!want) return adns_s_ok;
936 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->arcount, dmstart);
938 if (!want) return adns_s_ok;
940 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
941 pai->dgram, pai->dglen, dmstart,
942 adns_r_addr, adns_qf_quoteok_query);
946 ctx.callback= icb_hostaddr;
947 ctx.pinfo.hostaddr= rrp;
949 nflags= adns_qf_quoteok_query | (pai->qu->flags & adns__qf_afmask);
950 if (!(pai->qu->flags & adns_qf_cname_loose)) nflags |= adns_qf_cname_forbid;
952 st= addr_submit(pai->qu, &nqu, &pai->qu->vb, id, want,
953 nflags, pai->now, &ctx);
959 static adns_status pa_hostaddr(const parseinfo *pai, int cbyte,
960 int max, void *datap) {
961 adns_rr_hostaddr *rrp= datap;
964 st= pap_hostaddr(pai, &cbyte, max, rrp);
966 if (cbyte != max) return adns_s_invaliddata;
971 static int dip_hostaddr(adns_state ads,
972 const adns_rr_hostaddr *ap, const adns_rr_hostaddr *bp) {
973 if (ap->astatus != bp->astatus) return ap->astatus;
974 if (ap->astatus) return 0;
976 return dip_sockaddr(ads, &ap->addrs[0].addr.sa, &bp->addrs[0].addr.sa);
979 static int di_hostaddr(adns_state ads,
980 const void *datap_a, const void *datap_b) {
981 const adns_rr_hostaddr *ap= datap_a, *bp= datap_b;
983 return dip_hostaddr(ads, ap,bp);
986 static void mfp_hostaddr(adns_query qu, adns_rr_hostaddr *rrp) {
988 size_t sz = qu->answer->type & adns__qtf_bigaddr ?
989 sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only);
990 adns__makefinal_str(qu,&rrp->host);
992 adns__makefinal_block(qu, &tablev, rrp->naddrs*sz);
996 static void mf_hostaddr(adns_query qu, void *datap) {
997 adns_rr_hostaddr *rrp= datap;
999 mfp_hostaddr(qu,rrp);
1002 static adns_status csp_hostaddr(vbuf *vb, const adns_rr_hostaddr *rrp) {
1008 st= csp_domain(vb,rrp->host); if (st) return st;
1011 CSP_ADDSTR(adns_errtypeabbrev(rrp->astatus));
1013 sprintf(buf," %d ",rrp->astatus);
1016 CSP_ADDSTR(adns_errabbrev(rrp->astatus));
1019 errstr= adns_strerror(rrp->astatus);
1020 st= csp_qstring(vb,errstr,strlen(errstr)); if (st) return st;
1022 if (rrp->naddrs >= 0) {
1024 for (i=0; i<rrp->naddrs; i++) {
1026 st= csp_addr(vb,&rrp->addrs[i]);
1035 static adns_status cs_hostaddr(vbuf *vb, const void *datap) {
1036 const adns_rr_hostaddr *rrp= datap;
1038 return csp_hostaddr(vb,rrp);
1045 static adns_status pa_mx_raw(const parseinfo *pai, int cbyte,
1046 int max, void *datap) {
1047 const byte *dgram= pai->dgram;
1048 adns_rr_intstr *rrp= datap;
1052 if (cbyte+2 > max) return adns_s_invaliddata;
1055 st= pap_domain(pai, &cbyte, max, &rrp->str,
1056 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1059 if (cbyte != max) return adns_s_invaliddata;
1063 static int di_mx_raw(adns_state ads, const void *datap_a, const void *datap_b) {
1064 const adns_rr_intstr *ap= datap_a, *bp= datap_b;
1066 if (ap->i < bp->i) return 0;
1067 if (ap->i > bp->i) return 1;
1075 static adns_status pa_mx(const parseinfo *pai, int cbyte,
1076 int max, void *datap) {
1077 const byte *dgram= pai->dgram;
1078 adns_rr_inthostaddr *rrp= datap;
1082 if (cbyte+2 > max) return adns_s_invaliddata;
1085 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha);
1088 if (cbyte != max) return adns_s_invaliddata;
1092 static int di_mx(adns_state ads, const void *datap_a, const void *datap_b) {
1093 const adns_rr_inthostaddr *ap= datap_a, *bp= datap_b;
1095 if (ap->i < bp->i) return 0;
1096 if (ap->i > bp->i) return 1;
1097 return dip_hostaddr(ads, &ap->ha, &bp->ha);
1101 * _inthostaddr (mf,cs)
1104 static void mf_inthostaddr(adns_query qu, void *datap) {
1105 adns_rr_inthostaddr *rrp= datap;
1107 mfp_hostaddr(qu,&rrp->ha);
1110 static adns_status cs_inthostaddr(vbuf *vb, const void *datap) {
1111 const adns_rr_inthostaddr *rrp= datap;
1114 sprintf(buf,"%u ",rrp->i);
1117 return csp_hostaddr(vb,&rrp->ha);
1124 static adns_status cs_inthost(vbuf *vb, const void *datap) {
1125 const adns_rr_intstr *rrp= datap;
1128 sprintf(buf,"%u ",rrp->i);
1130 return csp_domain(vb,rrp->str);
1134 * _ptr (pa, +icb_ptr)
1137 static void icb_ptr(adns_query parent, adns_query child) {
1138 adns_answer *cans= child->answer;
1139 const union gen_addr *queried;
1140 const unsigned char *found;
1141 adns_state ads= parent->ads;
1144 if (cans->status == adns_s_nxdomain || cans->status == adns_s_nodata) {
1145 adns__query_fail(parent,adns_s_inconsistent);
1147 } else if (cans->status) {
1148 adns__query_fail(parent,cans->status);
1152 queried= &parent->ctx.pinfo.ptr_parent_addr.addr;
1153 for (i=0, found=cans->rrs.bytes; i<cans->nrrs; i++, found += cans->rrsz) {
1154 if (!memcmp(queried,found,cans->rrsz)) {
1155 if (!parent->children.head) {
1156 adns__query_done(parent);
1159 LIST_LINK_TAIL(ads->childw,parent);
1165 adns__query_fail(parent,adns_s_inconsistent);
1168 static adns_status pa_ptr(const parseinfo *pai, int dmstart,
1169 int max, void *datap) {
1170 static const struct {
1172 const char *const tail[3];
1173 } expectdomain[] = {
1174 { &adns__inet_afinfo, { DNS_INADDR_ARPA, 0 } },
1175 { &adns__inet6_afinfo, { DNS_IP6_ARPA, 0 } }
1177 enum { n_ed = sizeof(expectdomain)/sizeof(expectdomain[0]) };
1181 struct afinfo_addr *ap;
1182 findlabel_state fls;
1184 int cbyte, i, j, foundj = -1, lablen, labstart, id, f, ac;
1190 st= pap_domain(pai, &cbyte, max, rrp,
1191 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1193 if (cbyte != max) return adns_s_invaliddata;
1195 ap= &pai->qu->ctx.pinfo.ptr_parent_addr;
1197 adns__findlabel_start(&fls, pai->ads, -1, pai->qu,
1198 pai->qu->query_dgram, pai->qu->query_dglen,
1199 pai->qu->query_dglen, DNS_HDRSIZE, 0);
1201 f = (1 << n_ed) - 1; /* superposition of address types */
1203 st= adns__findlabel_next(&fls,&lablen,&labstart); assert(!st);
1204 if (lablen <= 0) break;
1205 for (j = 0; j < n_ed; j++) {
1206 if (!(f & (1 << j))) continue;
1207 if (i < expectdomain[j].ai->nrevcomp) {
1208 ac = expectdomain[j].ai->rev_parsecomp(
1209 pai->qu->query_dgram + labstart, lablen);
1210 if (ac < 0) goto mismatch;
1211 assert(i < sizeof(ipv[j]));
1214 tp = expectdomain[j].tail[i - expectdomain[j].ai->nrevcomp];
1216 strncmp(pai->qu->query_dgram + labstart, tp, lablen) != 0 ||
1224 if (!f) return adns_s_querydomainwrong;
1228 if (lablen < 0) return adns_s_querydomainwrong;
1229 for (j = 0; j < n_ed; j++) {
1230 if (!(f & (1 << j))) continue;
1231 if (i >= expectdomain[j].ai->nrevcomp &&
1232 !expectdomain[j].tail[i - expectdomain[j].ai->nrevcomp])
1233 { foundj = j; continue; }
1235 if (!f) return adns_s_querydomainwrong;
1237 assert(foundj >= 0 && f == (1 << foundj)); /* collapsed to a single type */
1239 ap->ai = expectdomain[foundj].ai;
1240 ap->ai->rev_mkaddr(&ap->addr, ipv[foundj]);
1243 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
1244 pai->dgram, pai->dglen, dmstart,
1245 ap->ai->rrtype, adns_qf_quoteok_query);
1249 ctx.callback= icb_ptr;
1250 memset(&ctx.pinfo,0,sizeof(ctx.pinfo));
1251 memset(&ctx.tinfo,0,sizeof(ctx.tinfo));
1252 st= adns__internal_submit(pai->ads, &nqu, adns__findtype(ap->ai->rrtype),
1253 ap->ai->rrtype, &pai->qu->vb, id,
1254 adns_qf_quoteok_query, pai->now, &ctx);
1257 nqu->parent= pai->qu;
1258 LIST_LINK_TAIL_PART(pai->qu->children,nqu,siblings.);
1266 static void mf_strpair(adns_query qu, void *datap) {
1267 adns_rr_strpair *rrp= datap;
1269 adns__makefinal_str(qu,&rrp->array[0]);
1270 adns__makefinal_str(qu,&rrp->array[1]);
1277 static void mf_intstrpair(adns_query qu, void *datap) {
1278 adns_rr_intstrpair *rrp= datap;
1280 adns__makefinal_str(qu,&rrp->array[0].str);
1281 adns__makefinal_str(qu,&rrp->array[1].str);
1288 static adns_status pa_hinfo(const parseinfo *pai, int cbyte,
1289 int max, void *datap) {
1290 adns_rr_intstrpair *rrp= datap;
1294 for (i=0; i<2; i++) {
1295 st= pap_qstring(pai, &cbyte, max, &rrp->array[i].i, &rrp->array[i].str);
1299 if (cbyte != max) return adns_s_invaliddata;
1308 static adns_status pap_mailbox822(const parseinfo *pai,
1309 int *cbyte_io, int max, char **mb_r) {
1310 int lablen, labstart, i, needquote, c, r, neednorm;
1311 const unsigned char *p;
1313 findlabel_state fls;
1319 adns__findlabel_start(&fls, pai->ads,
1321 pai->dgram, pai->dglen, max,
1322 *cbyte_io, cbyte_io);
1323 st= adns__findlabel_next(&fls,&lablen,&labstart);
1325 adns__vbuf_appendstr(vb,".");
1330 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++) {
1332 if ((c&~128) < 32 || (c&~128) == 127) return adns_s_invaliddata;
1333 if (c == '.' && !neednorm) neednorm= 1;
1334 else if (c==' ' || c>=127 || ctype_822special(c)) needquote++;
1338 if (needquote || neednorm) {
1339 r= adns__vbuf_ensure(vb, lablen+needquote+4); if (!r) R_NOMEM;
1340 adns__vbuf_appendq(vb,"\"",1);
1341 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++, p++) {
1343 if (c == '"' || c=='\\') adns__vbuf_appendq(vb,"\\",1);
1344 adns__vbuf_appendq(vb,p,1);
1346 adns__vbuf_appendq(vb,"\"",1);
1348 r= adns__vbuf_append(vb, pai->dgram+labstart, lablen); if (!r) R_NOMEM;
1351 r= adns__vbuf_appendstr(vb,"@"); if (!r) R_NOMEM;
1353 st= adns__parse_domain_more(&fls,pai->ads, pai->qu,vb,0, pai->dgram);
1357 str= adns__alloc_interim(pai->qu, vb->used+1); if (!str) R_NOMEM;
1358 memcpy(str,vb->buf,vb->used);
1364 static adns_status pap_mailbox(const parseinfo *pai, int *cbyte_io, int max,
1366 if (pai->qu->typei->typekey & adns__qtf_mail822) {
1367 return pap_mailbox822(pai, cbyte_io, max, mb_r);
1369 return pap_domain(pai, cbyte_io, max, mb_r, pdf_quoteok);
1373 static adns_status csp_mailbox(vbuf *vb, const char *mailbox) {
1374 return csp_domain(vb,mailbox);
1381 static adns_status pa_rp(const parseinfo *pai, int cbyte,
1382 int max, void *datap) {
1383 adns_rr_strpair *rrp= datap;
1386 st= pap_mailbox(pai, &cbyte, max, &rrp->array[0]);
1389 st= pap_domain(pai, &cbyte, max, &rrp->array[1], pdf_quoteok);
1392 if (cbyte != max) return adns_s_invaliddata;
1396 static adns_status cs_rp(vbuf *vb, const void *datap) {
1397 const adns_rr_strpair *rrp= datap;
1400 st= csp_mailbox(vb,rrp->array[0]); if (st) return st;
1402 st= csp_domain(vb,rrp->array[1]); if (st) return st;
1411 static adns_status pa_soa(const parseinfo *pai, int cbyte,
1412 int max, void *datap) {
1413 adns_rr_soa *rrp= datap;
1414 const byte *dgram= pai->dgram;
1418 st= pap_domain(pai, &cbyte, max, &rrp->mname,
1419 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1422 st= pap_mailbox(pai, &cbyte, max, &rrp->rname);
1425 if (cbyte+20 != max) return adns_s_invaliddata;
1427 for (i=0; i<5; i++) {
1430 (&rrp->serial)[i]= (msw<<16) | lsw;
1436 static void mf_soa(adns_query qu, void *datap) {
1437 adns_rr_soa *rrp= datap;
1439 adns__makefinal_str(qu,&rrp->mname);
1440 adns__makefinal_str(qu,&rrp->rname);
1443 static adns_status cs_soa(vbuf *vb, const void *datap) {
1444 const adns_rr_soa *rrp= datap;
1449 st= csp_domain(vb,rrp->mname); if (st) return st;
1451 st= csp_mailbox(vb,rrp->rname); if (st) return st;
1453 for (i=0; i<5; i++) {
1454 sprintf(buf," %lu",(&rrp->serial)[i]);
1462 * _srv* (pa*2,di,cs*2,ckl,postsort)
1465 static adns_status ckl_srv(adns_state ads, adns_queryflags flags,
1466 union checklabel_state *css, qcontext *ctx,
1467 int labnum, const char *label, int lablen)
1469 if (labnum < 2 && !(flags & adns_qf_quoteok_query)) {
1470 if (!lablen || label[0] != '_') return adns_s_querydomaininvalid;
1473 return adns__ckl_hostname(ads, flags, css, ctx, labnum, label, lablen);
1476 static adns_status pap_srv_begin(const parseinfo *pai, int *cbyte_io, int max,
1478 /* might be adns_rr_srvraw* */) {
1479 const byte *dgram= pai->dgram;
1483 if ((*cbyte_io += 6) > max) return adns_s_invaliddata;
1485 rrp->priority= GET_W(cbyte, ti);
1486 rrp->weight= GET_W(cbyte, ti);
1487 rrp->port= GET_W(cbyte, ti);
1491 static adns_status pa_srvraw(const parseinfo *pai, int cbyte,
1492 int max, void *datap) {
1493 adns_rr_srvraw *rrp= datap;
1496 st= pap_srv_begin(pai,&cbyte,max,datap);
1499 st= pap_domain(pai, &cbyte, max, &rrp->host,
1500 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1503 if (cbyte != max) return adns_s_invaliddata;
1507 static adns_status pa_srvha(const parseinfo *pai, int cbyte,
1508 int max, void *datap) {
1509 adns_rr_srvha *rrp= datap;
1512 st= pap_srv_begin(pai,&cbyte,max,datap); if (st) return st;
1513 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha); if (st) return st;
1514 if (cbyte != max) return adns_s_invaliddata;
1518 static void mf_srvraw(adns_query qu, void *datap) {
1519 adns_rr_srvraw *rrp= datap;
1520 adns__makefinal_str(qu, &rrp->host);
1523 static void mf_srvha(adns_query qu, void *datap) {
1524 adns_rr_srvha *rrp= datap;
1525 mfp_hostaddr(qu,&rrp->ha);
1528 static int di_srv(adns_state ads, const void *datap_a, const void *datap_b) {
1529 const adns_rr_srvraw *ap= datap_a, *bp= datap_b;
1530 /* might be const adns_rr_svhostaddr* */
1532 if (ap->priority < bp->priority) return 0;
1533 if (ap->priority > bp->priority) return 1;
1537 static adns_status csp_srv_begin(vbuf *vb, const adns_rr_srvha *rrp
1538 /* might be adns_rr_srvraw* */) {
1540 sprintf(buf,"%u %u %u ", rrp->priority, rrp->weight, rrp->port);
1545 static adns_status cs_srvraw(vbuf *vb, const void *datap) {
1546 const adns_rr_srvraw *rrp= datap;
1549 st= csp_srv_begin(vb,(const void*)rrp); if (st) return st;
1550 return csp_domain(vb,rrp->host);
1553 static adns_status cs_srvha(vbuf *vb, const void *datap) {
1554 const adns_rr_srvha *rrp= datap;
1557 st= csp_srv_begin(vb,(const void*)datap); if (st) return st;
1558 return csp_hostaddr(vb,&rrp->ha);
1561 static void postsort_srv(adns_state ads, void *array, int nrrs,
1562 const struct typeinfo *typei) {
1563 /* we treat everything in the array as if it were an adns_rr_srvha
1564 * even though the array might be of adns_rr_srvraw. That's OK
1565 * because they have the same prefix, which is all we access.
1566 * We use typei->rrsz, too, rather than naive array indexing, of course.
1568 char *workbegin, *workend, *search, *arrayend;
1569 const adns_rr_srvha *rr;
1570 union { adns_rr_srvha ha; adns_rr_srvraw raw; } rrtmp;
1571 int cpriority, totalweight, runtotal;
1574 for (workbegin= array, arrayend= workbegin + typei->rrsz * nrrs;
1575 workbegin < arrayend;
1576 workbegin= workend) {
1577 cpriority= (rr=(void*)workbegin)->priority;
1579 for (workend= workbegin, totalweight= 0;
1580 workend < arrayend && (rr=(void*)workend)->priority == cpriority;
1581 workend += typei->rrsz) {
1582 totalweight += rr->weight;
1585 /* Now workbegin..(workend-1) incl. are exactly all of the RRs of
1586 * cpriority. From now on, workbegin points to the `remaining'
1587 * records: we select one record at a time (RFC2782 `Usage rules'
1588 * and `Format of the SRV RR' subsection `Weight') to place at
1589 * workbegin (swapping with the one that was there, and then
1590 * advance workbegin. */
1592 workbegin + typei->rrsz < workend; /* don't bother if just one */
1593 workbegin += typei->rrsz) {
1595 randval= nrand48(ads->rand48xsubi);
1596 randval %= (totalweight + 1);
1597 /* makes it into 0..totalweight inclusive; with 2^10 RRs,
1598 * totalweight must be <= 2^26 so probability nonuniformity is
1599 * no worse than 1 in 2^(31-26) ie 1 in 2^5, ie
1600 * abs(log(P_intended(RR_i) / P_actual(RR_i)) <= log(2^-5).
1603 for (search=workbegin, runtotal=0;
1604 (runtotal += (rr=(void*)search)->weight) < randval;
1605 search += typei->rrsz);
1606 assert(search < arrayend);
1607 totalweight -= rr->weight;
1608 if (search != workbegin) {
1609 memcpy(&rrtmp, workbegin, typei->rrsz);
1610 memcpy(workbegin, search, typei->rrsz);
1611 memcpy(search, &rrtmp, typei->rrsz);
1616 * dig -t srv _srv._tcp.test.iwj.relativity.greenend.org.uk.
1617 * ./adnshost_s -t srv- _sip._udp.voip.net.cam.ac.uk.
1618 * ./adnshost_s -t srv- _jabber._tcp.jabber.org
1626 static void mf_byteblock(adns_query qu, void *datap) {
1627 adns_rr_byteblock *rrp= datap;
1628 void *bytes= rrp->data;
1629 adns__makefinal_block(qu,&bytes,rrp->len);
1637 static adns_status pa_opaque(const parseinfo *pai, int cbyte,
1638 int max, void *datap) {
1639 adns_rr_byteblock *rrp= datap;
1641 rrp->len= max - cbyte;
1642 rrp->data= adns__alloc_interim(pai->qu, rrp->len);
1643 if (!rrp->data) R_NOMEM;
1644 memcpy(rrp->data, pai->dgram + cbyte, rrp->len);
1648 static adns_status cs_opaque(vbuf *vb, const void *datap) {
1649 const adns_rr_byteblock *rrp= datap;
1654 sprintf(buf,"\\# %d",rrp->len);
1657 for (l= rrp->len, p= rrp->data;
1660 sprintf(buf," %02x%02x%02x%02x",p[0],p[1],p[2],p[3]);
1666 sprintf(buf," %02x",*p);
1676 static void mf_flat(adns_query qu, void *data) { }
1682 #define TYPESZ_M(member) (sizeof(*((adns_answer*)0)->rrs.member))
1684 #define DEEP_MEMB(memb) TYPESZ_M(memb), mf_##memb, cs_##memb
1685 #define FLAT_MEMB(memb) TYPESZ_M(memb), mf_flat, cs_##memb
1687 #define DEEP_TYPE(code,rrt,fmt,memb,parser,comparer,printer) \
1688 { adns_r_##code & adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), \
1689 mf_##memb, printer,parser,comparer, adns__ckl_hostname,0,0,0 }
1690 #define FLAT_TYPE(code,rrt,fmt,memb,parser,comparer,printer) \
1691 { adns_r_##code & adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), \
1692 mf_flat, printer,parser,comparer, adns__ckl_hostname,0,0,0 }
1693 #define XTRA_TYPE(code,rrt,fmt,memb,parser,comparer,printer, \
1694 makefinal,ckl,postsort,getrrsz,sender) \
1695 { adns_r_##code & adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), makefinal, \
1696 printer,parser,comparer,ckl,postsort,getrrsz,sender }
1698 static const typeinfo typeinfos[] = {
1699 /* Must be in ascending order of rrtype ! */
1700 /* mem-mgmt code rrt fmt member parser comparer printer */
1702 FLAT_TYPE(a, "A", 0, inaddr, pa_inaddr, di_inaddr,cs_inaddr ),
1703 DEEP_TYPE(ns_raw, "NS", "raw",str, pa_host_raw,0, cs_domain ),
1704 DEEP_TYPE(cname, "CNAME", 0, str, pa_dom_raw, 0, cs_domain ),
1705 DEEP_TYPE(soa_raw,"SOA", "raw",soa, pa_soa, 0, cs_soa ),
1706 DEEP_TYPE(ptr_raw,"PTR", "raw",str, pa_host_raw,0, cs_domain ),
1707 DEEP_TYPE(hinfo, "HINFO", 0, intstrpair,pa_hinfo, 0, cs_hinfo ),
1708 DEEP_TYPE(mx_raw, "MX", "raw",intstr, pa_mx_raw, di_mx_raw,cs_inthost ),
1709 DEEP_TYPE(txt, "TXT", 0, manyistr,pa_txt, 0, cs_txt ),
1710 DEEP_TYPE(rp_raw, "RP", "raw",strpair, pa_rp, 0, cs_rp ),
1711 FLAT_TYPE(aaaa, "AAAA", 0, in6addr, pa_in6addr, di_in6addr,cs_in6addr ),
1712 XTRA_TYPE(srv_raw,"SRV", "raw",srvraw , pa_srvraw, di_srv, cs_srvraw,
1713 mf_srvraw, ckl_srv, postsort_srv, 0, 0),
1715 XTRA_TYPE(addr, "A", "addr", addr, pa_addr, di_addr, cs_addr,
1716 mf_flat, adns__ckl_hostname, 0, gsz_addr, qs_addr),
1717 DEEP_TYPE(ns, "NS", "+addr",hostaddr,pa_hostaddr,di_hostaddr,cs_hostaddr ),
1718 DEEP_TYPE(ptr, "PTR","checked",str, pa_ptr, 0, cs_domain ),
1719 DEEP_TYPE(mx, "MX", "+addr",inthostaddr,pa_mx, di_mx, cs_inthostaddr),
1720 XTRA_TYPE(srv, "SRV","+addr",srvha, pa_srvha, di_srv, cs_srvha,
1721 mf_srvha, ckl_srv, postsort_srv, 0, 0),
1723 DEEP_TYPE(soa, "SOA","822", soa, pa_soa, 0, cs_soa ),
1724 DEEP_TYPE(rp, "RP", "822", strpair, pa_rp, 0, cs_rp ),
1727 static const typeinfo tinfo_addrsub =
1728 XTRA_TYPE(none, "<addr>","sub",addr, pa_addr, 0, cs_addr,
1729 mf_flat, adns__ckl_hostname, 0, gsz_addr, 0);
1731 static const typeinfo typeinfo_unknown=
1732 DEEP_TYPE(unknown,0, "unknown",byteblock,pa_opaque, 0, cs_opaque );
1734 const typeinfo *adns__findtype(adns_rrtype type) {
1735 const typeinfo *begin, *end, *mid;
1737 if (type & adns_r_unknown) return &typeinfo_unknown;
1738 type &= adns_rrt_reprmask;
1740 begin= typeinfos; end= typeinfos+(sizeof(typeinfos)/sizeof(typeinfo));
1742 while (begin < end) {
1743 mid= begin + ((end-begin)>>1);
1744 if (mid->typekey == type) return mid;
1745 if (type > mid->typekey) begin= mid+1;