chiark / gitweb /
src/types.c: Fix obvious stupid mistake.
[adns] / src / types.c
CommitLineData
98db6da3 1/*
2 * types.c
3 * - RR-type-specific code, and the machinery to call it
4 */
5/*
39f45e7e 6 * This file is part of adns, which is
7 * Copyright (C) 1997-2000,2003,2006 Ian Jackson
8 * Copyright (C) 1999-2000,2003,2006 Tony Finch
9 * Copyright (C) 1991 Massachusetts Institute of Technology
10 * (See the file INSTALL for full details.)
98db6da3 11 *
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2, or (at your option)
15 * any later version.
16 *
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software Foundation,
24 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
25 */
5c596e4d 26
5f8085b7 27#include <stddef.h>
d4c7b0b1 28#include <stdlib.h>
29
b6b3ac61 30#include <sys/types.h>
763d28b9 31#include <sys/socket.h>
32#include <netinet/in.h>
1e9efa71 33#include <arpa/inet.h>
5f8085b7 34#include <netdb.h>
1e9efa71 35
5c596e4d 36#include "internal.h"
37
9c344a42 38#define R_NOMEM return adns_s_nomemory
39#define CSP_ADDSTR(s) do { \
40 if (!adns__vbuf_appendstr(vb,(s))) R_NOMEM; \
41 } while (0)
26eb6bdc 42
14180727 43/*
44 * order of sections:
45 *
61093792 46 * _string (pap)
14180727 47 * _textdata, _qstring (csp)
48 * _str (mf,cs)
61093792 49 * _intstr (mf,csp,cs)
14180727 50 * _manyistr (mf,cs)
51 * _txt (pa)
9136cf0c
MW
52 * _inaddr (pa,cs,di, +search_sortlist, dip_genaddr)
53 * _in6addr (pa,cs,di)
e1d31292 54 * _addr (pap,pa,di,csp,cs,gsz,qs, +search_sortlist_sa,
bcfd6f13 55 * dip_sockaddr, rrtypes)
14180727 56 * _domain (pap)
57 * _host_raw (pa)
58 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +pap_findaddrs)
59 * _mx_raw (pa,di)
60 * _mx (pa,di)
61 * _inthostaddr (mf,cs)
cd1bde2f 62 * _ptr (pa)
61093792 63 * _strpair (mf,cs)
64 * _intstrpair (mf,cs)
65 * _hinfo (pa)
c2875680 66 * _mailbox (pap +pap_mailbox822)
61093792 67 * _rp (pa)
68 * _soa (pa,mf,cs)
59d05d1c 69 * _srv* (qdpl,(pap),pa,mf,di,(csp),cs,postsort)
7d0aaee4 70 * _byteblock (mf)
71 * _opaque (pa,cs)
14180727 72 * _flat (mf)
73 *
74 * within each section:
2248cdf4 75 * qdpl_*
14180727 76 * pap_*
77 * pa_*
78 * dip_*
79 * di_*
80 * mfp_*
81 * mf_*
82 * csp_*
83 * cs_*
59d05d1c 84 * postsort_*
14180727 85 */
86
87/*
0872e289 88 * _qstring (pap,csp)
14180727 89 */
90
0872e289 91static adns_status pap_qstring(const parseinfo *pai, int *cbyte_io, int max,
61093792 92 int *len_r, char **str_r) {
93 /* Neither len_r nor str_r may be null.
94 * End of datagram (overrun) is indicated by returning adns_s_invaliddata;
95 */
96 const byte *dgram= pai->dgram;
97 int l, cbyte;
98 char *str;
99
100 cbyte= *cbyte_io;
101
102 if (cbyte >= max) return adns_s_invaliddata;
103 GET_B(cbyte,l);
104 if (cbyte+l > max) return adns_s_invaliddata;
105
106 str= adns__alloc_interim(pai->qu, l+1);
107 if (!str) R_NOMEM;
108
109 str[l]= 0;
110 memcpy(str,dgram+cbyte,l);
111
112 *len_r= l;
113 *str_r= str;
114 *cbyte_io= cbyte+l;
115
116 return adns_s_ok;
117}
118
0872e289 119static adns_status csp_qstring(vbuf *vb, const char *dp, int len) {
14180727 120 unsigned char ch;
121 char buf[10];
122 int cn;
123
124 CSP_ADDSTR("\"");
125 for (cn=0; cn<len; cn++) {
126 ch= *dp++;
0872e289 127 if (ch == '\\') {
61093792 128 CSP_ADDSTR("\\\\");
0872e289 129 } else if (ch == '"') {
130 CSP_ADDSTR("\\\"");
131 } else if (ch >= 32 && ch <= 126) {
132 if (!adns__vbuf_append(vb,&ch,1)) R_NOMEM;
14180727 133 } else {
61093792 134 sprintf(buf,"\\x%02x",ch);
14180727 135 CSP_ADDSTR(buf);
136 }
137 }
138 CSP_ADDSTR("\"");
139
140 return adns_s_ok;
141}
142
14180727 143/*
0872e289 144 * _str (mf)
14180727 145 */
146
147static void mf_str(adns_query qu, void *datap) {
148 char **rrp= datap;
149
150 adns__makefinal_str(qu,rrp);
151}
152
14180727 153/*
0872e289 154 * _intstr (mf)
14180727 155 */
156
157static void mf_intstr(adns_query qu, void *datap) {
158 adns_rr_intstr *rrp= datap;
159
160 adns__makefinal_str(qu,&rrp->str);
161}
162
14180727 163/*
0872e289 164 * _manyistr (mf)
14180727 165 */
166
167static void mf_manyistr(adns_query qu, void *datap) {
168 adns_rr_intstr **rrp= datap;
169 adns_rr_intstr *te, *table;
170 void *tablev;
171 int tc;
172
173 for (tc=0, te= *rrp; te->i >= 0; te++, tc++);
174 tablev= *rrp;
175 adns__makefinal_block(qu,&tablev,sizeof(*te)*(tc+1));
176 *rrp= table= tablev;
177 for (te= *rrp; te->i >= 0; te++)
178 adns__makefinal_str(qu,&te->str);
179}
180
14180727 181/*
0872e289 182 * _txt (pa,cs)
14180727 183 */
184
9c344a42 185static adns_status pa_txt(const parseinfo *pai, int cbyte,
186 int max, void *datap) {
14180727 187 adns_rr_intstr **rrp= datap, *table, *te;
188 const byte *dgram= pai->dgram;
189 int ti, tc, l, startbyte;
61093792 190 adns_status st;
14180727 191
192 startbyte= cbyte;
193 if (cbyte >= max) return adns_s_invaliddata;
194 tc= 0;
195 while (cbyte < max) {
196 GET_B(cbyte,l);
197 cbyte+= l;
61093792 198 tc++;
14180727 199 }
0872e289 200 if (cbyte != max || !tc) return adns_s_invaliddata;
14180727 201
202 table= adns__alloc_interim(pai->qu,sizeof(*table)*(tc+1));
203 if (!table) R_NOMEM;
204
205 for (cbyte=startbyte, ti=0, te=table; ti<tc; ti++, te++) {
0872e289 206 st= pap_qstring(pai, &cbyte, max, &te->i, &te->str);
61093792 207 if (st) return st;
14180727 208 }
209 assert(cbyte == max);
210
211 te->i= -1;
212 te->str= 0;
213
214 *rrp= table;
215 return adns_s_ok;
cd363ffd 216}
217
0872e289 218static adns_status cs_txt(vbuf *vb, const void *datap) {
219 const adns_rr_intstr *const *rrp= datap;
220 const adns_rr_intstr *current;
221 adns_status st;
222 int spc;
223
224 for (current= *rrp, spc=0; current->i >= 0; current++, spc=1) {
225 if (spc) CSP_ADDSTR(" ");
226 st= csp_qstring(vb,current->str,current->i); if (st) return st;
227 }
228 return adns_s_ok;
229}
230
231/*
232 * _hinfo (cs)
233 */
234
235static adns_status cs_hinfo(vbuf *vb, const void *datap) {
236 const adns_rr_intstrpair *rrp= datap;
237 adns_status st;
238
239 st= csp_qstring(vb,rrp->array[0].str,rrp->array[0].i); if (st) return st;
240 CSP_ADDSTR(" ");
241 st= csp_qstring(vb,rrp->array[1].str,rrp->array[1].i); if (st) return st;
242 return adns_s_ok;
243}
244
14180727 245/*
9136cf0c 246 * _inaddr (pa,di,cs +search_sortlist, dip_genaddr)
14180727 247 */
248
9c344a42 249static adns_status pa_inaddr(const parseinfo *pai, int cbyte,
250 int max, void *datap) {
f2ad23ee 251 struct in_addr *storeto= datap;
68b7fc5f 252
253 if (max-cbyte != 4) return adns_s_invaliddata;
26eb6bdc 254 memcpy(storeto, pai->dgram + cbyte, 4);
68b7fc5f 255 return adns_s_ok;
256}
257
9136cf0c 258static int search_sortlist(adns_state ads, int af, const void *ad) {
8c3aa944 259 const struct sortlist *slp;
4e8966f3
MW
260 const struct in6_addr *a6;
261 union gen_addr a;
8c3aa944 262 int i;
4e8966f3
MW
263 int v6mappedp = 0;
264
265 if (af == AF_INET6) {
266 a6 = ad;
267 if (IN6_IS_ADDR_V4MAPPED(a6)) {
268 a.v4.s_addr = htonl(((unsigned long)a6->s6_addr[12] << 24) |
269 ((unsigned long)a6->s6_addr[13] << 16) |
270 ((unsigned long)a6->s6_addr[14] << 8) |
271 ((unsigned long)a6->s6_addr[15] << 0));
272 v6mappedp = 1;
273 }
274 }
275
8c3aa944 276 for (i=0, slp=ads->sortlist;
4e8966f3
MW
277 i<ads->nsortlist &&
278 !(af == slp->ai->af &&
279 slp->ai->matchp(ad, &slp->base, &slp->mask)) &&
280 !(v6mappedp && slp->ai->af == AF_INET &&
281 slp->ai->matchp(&a, &slp->base, &slp->mask));
8c3aa944 282 i++, slp++);
283 return i;
14180727 284}
285
9136cf0c 286static int dip_genaddr(adns_state ads, int af, const void *a, const void *b) {
8c3aa944 287 int ai, bi;
288
289 if (!ads->nsortlist) return 0;
290
9136cf0c
MW
291 ai= search_sortlist(ads,af,a);
292 bi= search_sortlist(ads,af,b);
8c3aa944 293 return bi<ai;
294}
295
9c344a42 296static int di_inaddr(adns_state ads,
297 const void *datap_a, const void *datap_b) {
9136cf0c 298 return dip_genaddr(ads,AF_INET,datap_a,datap_b);
f2ad23ee 299}
300
301static adns_status cs_inaddr(vbuf *vb, const void *datap) {
302 const struct in_addr *rrp= datap, rr= *rrp;
1e9efa71 303 const char *ia;
304
f2ad23ee 305 ia= inet_ntoa(rr); assert(ia);
26eb6bdc 306 CSP_ADDSTR(ia);
307 return adns_s_ok;
1e9efa71 308}
68b7fc5f 309
14180727 310/*
9136cf0c
MW
311 * _in6addr (pa,di,cs)
312 */
313
314static adns_status pa_in6addr(const parseinfo *pai, int cbyte,
315 int max, void *datap) {
316 struct in6_addr *storeto= datap;
317
318 if (max-cbyte != 16) return adns_s_invaliddata;
319 memcpy(storeto->s6_addr, pai->dgram + cbyte, 16);
320 return adns_s_ok;
321}
322
323static int di_in6addr(adns_state ads,
324 const void *datap_a, const void *datap_b) {
5f8085b7 325 return dip_genaddr(ads,AF_INET6,datap_a,datap_b);
9136cf0c
MW
326}
327
328static adns_status cs_in6addr(vbuf *vb, const void *datap) {
329 char buf[INET6_ADDRSTRLEN];
330 const char *ia;
331
332 ia= inet_ntop(AF_INET6, datap, buf, sizeof(buf)); assert(ia);
333 CSP_ADDSTR(ia);
334 return adns_s_ok;
335}
336
337/*
e1d31292
MW
338 * _addr (pap,pa,di,csp,cs,gsz,qs, +search_sortlist_sa, dip_sockaddr,
339 * addr_rrtypes)
14180727 340 */
341
0b5062df
MW
342static const typeinfo tinfo_addrsub;
343
0aa4a357
MW
344/* About CNAME handling in addr queries.
345 *
346 * A user-level addr query is translated into a number of protocol-level
347 * queries, and its job is to reassemble the results. This gets tricky if
348 * the answers aren't consistent. In particular, if the answers report
349 * inconsistent indirection via CNAME records (e.g., different CNAMEs, or
350 * some indirect via a CNAME, and some don't) then we have trouble.
351 *
352 * Once we've received an answer, even if it was NODATA, we set
353 * adns__qf_addr_answer on the parent query. This will let us detect a
354 * conflict between a no-CNAME-with-NODATA reply and a subsequent CNAME.
355 *
356 * If we detect a conflict of any kind, then at least one answer came back
357 * with a CNAME record, so we pick the first such answer (somewhat
358 * arbitrarily) as being the `right' canonical name, and set this in the
359 * parent query's answer->cname slot. We discard address records from the
360 * wrong name. And finally we cancel the outstanding child queries, and
361 * resubmit address queries for the address families we don't yet have, with
362 * adns__qf_addr_cname set so that we know that we're in the fixup state.
363 */
364
5f8085b7
MW
365static adns_status pap_addr(const parseinfo *pai, int rrty, size_t rrsz,
366 int *cbyte_io, int max, adns_rr_addr *storeto)
367{
26eb6bdc 368 const byte *dgram= pai->dgram;
5f8085b7
MW
369 int af, addrlen, salen;
370 struct in6_addr v6map;
371 const void *oaddr = dgram + *cbyte_io;
372 int avail = max - *cbyte_io;
373 int step = -1;
374 void *addrp = 0;
375
376 switch (rrty) {
377 case adns_r_a:
bcfd6f13 378 if (pai->qu->flags & adns_qf_domapv4) {
5f8085b7
MW
379 if (avail < 4) return adns_s_invaliddata;
380 memset(v6map.s6_addr + 0, 0x00, 10);
381 memset(v6map.s6_addr + 10, 0xff, 2);
382 memcpy(v6map.s6_addr + 12, oaddr, 4);
383 oaddr = v6map.s6_addr; avail = sizeof(v6map.s6_addr);
384 if (step < 0) step = 4;
385 goto aaaa;
386 }
387 af = AF_INET; addrlen = 4;
388 addrp = &storeto->addr.inet.sin_addr;
389 salen = sizeof(storeto->addr.inet);
390 break;
391 case adns_r_aaaa:
392 aaaa:
393 af = AF_INET6; addrlen = 16;
394 addrp = storeto->addr.inet6.sin6_addr.s6_addr;
395 salen = sizeof(storeto->addr.inet6);
396 break;
397 }
398 assert(addrp);
399
400 assert(offsetof(adns_rr_addr, addr) + salen <= rrsz);
401 if (addrlen < avail) return adns_s_invaliddata;
402 if (step < 0) step = addrlen;
403 *cbyte_io += step;
404 memset(&storeto->addr, 0, salen);
405 storeto->len = salen;
406 storeto->addr.sa.sa_family = af;
407 memcpy(addrp, oaddr, addrlen);
a1d2d0ed 408
5f8085b7
MW
409 return adns_s_ok;
410}
411
412static adns_status pa_addr(const parseinfo *pai, int cbyte,
413 int max, void *datap) {
414 int err = pap_addr(pai, pai->qu->answer->type & adns_rrt_typemask,
415 pai->qu->answer->rrsz, &cbyte, max, datap);
416 if (err) return err;
417 if (cbyte != max) return adns_s_invaliddata;
cd363ffd 418 return adns_s_ok;
419}
420
9136cf0c
MW
421static int search_sortlist_sa(adns_state ads, const struct sockaddr *sa)
422{
5f8085b7 423 const afinfo *ai = 0;
9136cf0c
MW
424
425 switch (sa->sa_family) {
426 case AF_INET: ai = &adns__inet_afinfo; break;
427 case AF_INET6: ai = &adns__inet6_afinfo; break;
428 }
429 assert(ai);
430
431 return search_sortlist(ads, sa->sa_family, ai->sockaddr_to_inaddr(sa));
432}
433
434static int dip_sockaddr(adns_state ads,
435 const struct sockaddr *sa,
436 const struct sockaddr *sb)
437{
438 if (!ads->sortlist) return 0;
439 return search_sortlist_sa(ads, sa) > search_sortlist_sa(ads, sb);
440}
441
8c3aa944 442static int di_addr(adns_state ads, const void *datap_a, const void *datap_b) {
bc01473e 443 const adns_rr_addr *ap= datap_a, *bp= datap_b;
cd363ffd 444
9136cf0c 445 return dip_sockaddr(ads, &ap->addr.sa, &bp->addr.sa);
cd363ffd 446}
447
8c3aa944 448static int div_addr(void *context, const void *datap_a, const void *datap_b) {
449 const adns_state ads= context;
450
451 return di_addr(ads, datap_a, datap_b);
452}
453
bc01473e 454static adns_status csp_addr(vbuf *vb, const adns_rr_addr *rrp) {
5f8085b7
MW
455 char buf[128];
456 int err;
cd363ffd 457
458 switch (rrp->addr.inet.sin_family) {
459 case AF_INET:
0872e289 460 CSP_ADDSTR("INET ");
5f8085b7
MW
461 goto ntop;
462 case AF_INET6:
463 CSP_ADDSTR("INET6 ");
464 goto ntop;
465 ntop:
466 err= getnameinfo(&rrp->addr.sa, rrp->len, buf, sizeof(buf), 0, 0,
467 NI_NUMERICHOST); assert(!err);
468 CSP_ADDSTR(buf);
cd363ffd 469 break;
470 default:
471 sprintf(buf,"AF=%u",rrp->addr.sa.sa_family);
26eb6bdc 472 CSP_ADDSTR(buf);
cd363ffd 473 break;
474 }
475 return adns_s_ok;
476}
477
26eb6bdc 478static adns_status cs_addr(vbuf *vb, const void *datap) {
bc01473e 479 const adns_rr_addr *rrp= datap;
26eb6bdc 480
481 return csp_addr(vb,rrp);
482}
483
5f8085b7
MW
484static void addr_rrtypes(adns_state ads, adns_rrtype type,
485 adns_queryflags qf,
486 adns_rrtype *rrty, size_t *nrrty)
487{
488 size_t n = 0;
489 adns_rrtype qtf = type & adns__qtf_deref;
20078efc 490 adns_queryflags permitaf = 0, hackaf = 0;
5f8085b7 491
e1d31292
MW
492 if (!(qf & (adns_qf_ipv4_only | adns_qf_ipv6_only)))
493 qf |= adns_qf_ipv4_only | adns_qf_ipv6_only;
bcfd6f13
MW
494 if (!(type & adns__qtf_bigaddr) || !(type & adns__qtf_manyaf))
495 qf = (qf & adns__qf_afmask) | adns_qf_ipv4_only;
20078efc
MW
496 else if (ads->iflags & adns_if_afmask) {
497 if (ads->iflags & adns_if_af_v4only) {
498 permitaf |= adns_qf_ipv4_only;
499 hackaf |= adns_qf_domapv4;
500 }
501 if (ads->iflags & adns_if_af_v6only)
502 permitaf |= adns_qf_ipv6_only;
503 if (qf & permitaf)
504 qf &= hackaf | permitaf | ~adns__qf_afmask;
505 }
506
bcfd6f13
MW
507 if (qf & adns_qf_ipv4_only) rrty[n++] = adns_r_a | qtf;
508 if (qf & adns_qf_ipv6_only) rrty[n++] = adns_r_aaaa | qtf;
5f8085b7
MW
509
510 *nrrty = n;
511}
512
e1d31292 513static int gsz_addr(adns_rrtype type)
5f8085b7 514{
e1d31292 515 return type & adns__qtf_bigaddr ?
5f8085b7
MW
516 sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only);
517}
518
4678dd22 519static adns_status append_addrs(adns_query qu, adns_query from, size_t rrsz,
bcfd6f13
MW
520 adns_rr_addr **dp, int *dlen,
521 const adns_rr_addr *sp, int slen)
522{
523 size_t drrsz = *dlen*rrsz, srrsz = slen*rrsz;
1bcabfa3
MW
524 byte *p;
525
fb35fb37 526 if (!slen) return adns_s_ok;
1bcabfa3 527 p = adns__alloc_interim(qu, drrsz + srrsz);
bcfd6f13
MW
528 if (!p) R_NOMEM;
529 if (*dlen) {
530 memcpy(p, *dp, drrsz);
531 adns__free_interim(qu, *dp);
532 }
533 memcpy(p + drrsz, sp, srrsz);
534 *dlen += slen;
535 *dp = (adns_rr_addr *)p;
4678dd22 536 if (from && qu->expires > from->expires) qu->expires = from->expires;
bcfd6f13
MW
537 return adns_s_ok;
538}
539
96818a13 540static void icb_addr(adns_query parent, adns_query child);
5f8085b7 541
bcfd6f13 542static void addr_subqueries(adns_query qu, struct timeval now,
88518143 543 const byte *qd_dgram, int qd_dglen)
5f8085b7 544{
bcfd6f13 545 int i, err, id;
5f8085b7 546 adns_query cqu;
0b5062df 547 adns_queryflags qf =qu->flags & ~adns_qf_search;
5f8085b7
MW
548 qcontext ctx;
549
5f8085b7
MW
550 /* This always makes child queries, even if there's only the one. This
551 * seems wasteful, but there's only one case where it'd be safe -- namely
552 * IPv4-only -- and that's not the case I want to optimize.
553 */
554 memset(&ctx, 0, sizeof(ctx));
555 ctx.callback = icb_addr;
334c6111
MW
556 qu->ctx.tinfo.addr.onrrty = qu->ctx.tinfo.addr.nrrty;
557 for (i = 0; i < qu->ctx.tinfo.addr.nrrty; i++) {
88518143 558 err = adns__mkquery_frdgram(qu->ads, &qu->vb, &id, qd_dgram, qd_dglen,
334c6111 559 DNS_HDRSIZE, qu->ctx.tinfo.addr.rrty[i], qf);
5f8085b7 560 if (err) goto x_error;
0b5062df 561 err = adns__internal_submit(qu->ads, &cqu, &tinfo_addrsub,
334c6111 562 qu->ctx.tinfo.addr.rrty[i],
5f8085b7
MW
563 &qu->vb, id, qf, now, &ctx);
564 if (err) goto x_error;
565 cqu->answer->rrsz = qu->answer->rrsz;
566 cqu->parent = qu;
567 LIST_LINK_TAIL_PART(qu->children, cqu,siblings.);
568 }
bcfd6f13
MW
569 qu->state = query_childw;
570 LIST_LINK_TAIL(qu->ads->childw, qu);
5f8085b7
MW
571 return;
572
573x_error:
574 adns__query_fail(qu, err);
575}
576
bcfd6f13
MW
577static adns_status addr_submit(adns_query parent, adns_query *query_r,
578 vbuf *qumsg_vb, int id,
579 const adns_rrtype *rrty, size_t nrrty,
580 adns_queryflags flags, struct timeval now,
581 const qcontext *ctx)
582{
583 /* This is effectively a substitute for adns__internal_submit, intended for
584 * the case where the caller (possibly) only wants a subset of the
585 * available record types. The memory management and callback rules are
586 * the same as for adns__internal_submit.
587 *
588 * Some differences: the query is linked onto the parent's children list
589 * before exit (though the parent's state is not changed, and it is not
590 * linked into the childw list queue).
591 */
592
593 adns_state ads = parent->ads;
88518143 594 adns_query qu;
bcfd6f13
MW
595 adns_status err;
596 adns_rrtype type =
597 (adns_r_addr & adns_rrt_reprmask) |
598 (parent->answer->type & ~adns_rrt_reprmask);
599
88518143 600 err = adns__internal_submit(ads, &qu, adns__findtype(adns_r_addr),
bcfd6f13
MW
601 type, qumsg_vb, id, flags | adns__qf_nosend,
602 now, ctx);
603 if (err) return err;
604
88518143
MW
605 qu->parent = parent;
606 LIST_LINK_TAIL_PART(parent->children, qu, siblings.);
607
334c6111
MW
608 memcpy(qu->ctx.tinfo.addr.rrty, rrty, nrrty*sizeof(*rrty));
609 qu->ctx.tinfo.addr.nrrty = nrrty;
c244361a 610 addr_subqueries(qu, now, qu->query_dgram, qu->query_dglen);
88518143 611 *query_r = qu;
bcfd6f13
MW
612 return adns_s_ok;
613}
614
96818a13
MW
615static adns_status copy_cname_from_child(adns_query parent, adns_query child)
616{
617 adns_answer *pans = parent->answer, *cans = child->answer;
618 size_t n = strlen(cans->cname) + 1;
619
620 pans->cname = adns__alloc_preserved(parent, n);
621 if (!pans->cname) R_NOMEM;
622 memcpy(pans->cname, cans->cname, n);
623 return adns_s_ok;
624}
625
88518143
MW
626static void done_addr_type(adns_query qu, adns_rrtype type)
627{
628 size_t i;
629
334c6111
MW
630 for (i = 0;
631 i < qu->ctx.tinfo.addr.nrrty &&
632 type != qu->ctx.tinfo.addr.rrty[i];
633 i++);
634 assert(i < qu->ctx.tinfo.addr.nrrty);
635 qu->ctx.tinfo.addr.rrty[i] =
636 qu->ctx.tinfo.addr.rrty[--qu->ctx.tinfo.addr.nrrty];
637 qu->ctx.tinfo.addr.rrty[qu->ctx.tinfo.addr.nrrty] = type;
88518143
MW
638}
639
96818a13
MW
640static void icb_addr(adns_query parent, adns_query child)
641{
642 adns_state ads = parent->ads;
643 adns_answer *pans = parent->answer, *cans = child->answer;
70d1b1b5 644 struct timeval now;
96818a13 645 adns_status err;
88518143 646 int id;
96818a13
MW
647
648 if (!(child->flags & adns__qf_addr_cname) &&
649 (parent->flags & adns__qf_addr_answer) &&
68fb0393
MW
650 (!!pans->cname != !!cans->cname ||
651 (pans->cname && strcmp(pans->cname, cans->cname) != 0))) {
96818a13
MW
652 /* We've detected an inconsistency in CNAME records, and must deploy
653 * countermeasures.
654 */
655
656 if (!pans->cname) {
657 /* The child has a CNAME record, but the parent doesn't. We must
658 * discard all of the parent's addresses, and substitute the child's.
659 */
660
661 assert(pans->rrsz == cans->rrsz);
662 adns__free_interim(parent, pans->rrs.bytes);
663 adns__transfer_interim(child, parent, cans->rrs.bytes);
664 pans->rrs.bytes = cans->rrs.bytes;
665 pans->nrrs = cans->nrrs;
334c6111 666 parent->ctx.tinfo.addr.nrrty = parent->ctx.tinfo.addr.onrrty;
88518143 667 done_addr_type(parent, cans->type);
96818a13
MW
668 err = copy_cname_from_child(parent, child); if (err) goto x_err;
669 }
670
671 /* We've settled on the CNAME (now) associated with the parent, which
672 * already has appropriate address records. Build a query datagram for
673 * this name so that we can issue child queries for the missing address
674 * families. The child's vbuf looks handy for this.
675 */
676 err = adns__mkquery(ads, &child->vb, &id, pans->cname,
677 strlen(pans->cname), adns__findtype(adns_r_addr),
678 adns_r_addr, parent->flags);
679 if (err) goto x_err;
680
96818a13
MW
681 /* Now cancel the remaining children, and try again with the CNAME we've
682 * settled on.
683 */
684 adns__cancel_children(parent);
70d1b1b5
MW
685 if (gettimeofday(&now, 0)) goto x_gtod;
686 addr_subqueries(parent, now, child->vb.buf, child->vb.used);
96818a13
MW
687 return;
688 }
689
690 if (cans->cname && !pans->cname) {
691 err = copy_cname_from_child(parent, child);
692 if (err) goto x_err;
693 }
694
695 if ((parent->flags & adns_qf_search) &&
696 !pans->cname && cans->status == adns_s_nxdomain) {
697 /* We're searching a list of suffixes, this is the first answer, and it
698 * tells us that the name doesn't exist. Try the next one.
699 */
700
701 if (parent->expires > child->expires) parent->expires = child->expires;
702 adns__cancel_children(parent);
703 adns__free_interim(parent, pans->rrs.bytes);
704 pans->rrs.bytes = 0; pans->nrrs = 0;
70d1b1b5
MW
705 if (gettimeofday(&now, 0)) goto x_gtod;
706 adns__search_next(ads, parent, now);
96818a13
MW
707 return;
708 }
709
710 if (cans->status && cans->status != adns_s_nodata)
711 { err = cans->status; goto x_err; }
712
713 assert(pans->rrsz == cans->rrsz);
714 err = append_addrs(parent, child, pans->rrsz,
715 &pans->rrs.addr, &pans->nrrs,
716 cans->rrs.addr, cans->nrrs);
717 if (err) goto x_err;
88518143 718 done_addr_type(parent, cans->type);
96818a13
MW
719
720 if (parent->children.head) LIST_LINK_TAIL(ads->childw, parent);
721 else if (!pans->nrrs) adns__query_fail(parent, adns_s_nodata);
722 else adns__query_done(parent);
723 parent->flags |= adns__qf_addr_answer;
724 return;
725
70d1b1b5
MW
726x_gtod:
727 adns__diag(ads, -1, parent, "gettimeofday failed: %s", strerror(errno));
728 err = adns_s_systemfail;
729 goto x_err;
730
96818a13
MW
731x_err:
732 adns__query_fail(parent, err);
733}
734
bcfd6f13
MW
735static void qs_addr(adns_query qu, struct timeval now)
736{
88518143 737 addr_rrtypes(qu->ads, qu->answer->type, qu->flags,
334c6111 738 qu->ctx.tinfo.addr.rrty, &qu->ctx.tinfo.addr.nrrty);
88518143 739 addr_subqueries(qu, now, qu->query_dgram, qu->query_dglen);
bcfd6f13
MW
740}
741
14180727 742/*
0872e289 743 * _domain (pap,csp,cs)
744 * _dom_raw (pa)
14180727 745 */
746
26eb6bdc 747static adns_status pap_domain(const parseinfo *pai, int *cbyte_io, int max,
748 char **domain_r, parsedomain_flags flags) {
f2ad23ee 749 adns_status st;
750 char *dm;
751
26eb6bdc 752 st= adns__parse_domain(pai->qu->ads, pai->serv, pai->qu, &pai->qu->vb, flags,
753 pai->dgram,pai->dglen, cbyte_io, max);
f2ad23ee 754 if (st) return st;
26eb6bdc 755 if (!pai->qu->vb.used) return adns_s_invaliddata;
f2ad23ee 756
26eb6bdc 757 dm= adns__alloc_interim(pai->qu, pai->qu->vb.used+1);
758 if (!dm) R_NOMEM;
f2ad23ee 759
26eb6bdc 760 dm[pai->qu->vb.used]= 0;
761 memcpy(dm,pai->qu->vb.buf,pai->qu->vb.used);
f2ad23ee 762
763 *domain_r= dm;
764 return adns_s_ok;
765}
766
0872e289 767static adns_status csp_domain(vbuf *vb, const char *domain) {
768 CSP_ADDSTR(domain);
769 if (!*domain) CSP_ADDSTR(".");
770 return adns_s_ok;
771}
772
773static adns_status cs_domain(vbuf *vb, const void *datap) {
774 const char *const *domainp= datap;
775 return csp_domain(vb,*domainp);
776}
777
9c344a42 778static adns_status pa_dom_raw(const parseinfo *pai, int cbyte,
779 int max, void *datap) {
0872e289 780 char **rrp= datap;
781 adns_status st;
782
783 st= pap_domain(pai, &cbyte, max, rrp, pdf_quoteok);
784 if (st) return st;
785
786 if (cbyte != max) return adns_s_invaliddata;
787 return adns_s_ok;
788}
789
14180727 790/*
791 * _host_raw (pa)
792 */
793
9c344a42 794static adns_status pa_host_raw(const parseinfo *pai, int cbyte,
795 int max, void *datap) {
f2ad23ee 796 char **rrp= datap;
cfdca685 797 adns_status st;
1e9efa71 798
26eb6bdc 799 st= pap_domain(pai, &cbyte, max, rrp,
800 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
f2ad23ee 801 if (st) return st;
802
803 if (cbyte != max) return adns_s_invaliddata;
804 return adns_s_ok;
805}
cfdca685 806
14180727 807/*
bc01473e 808 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +icb_hostaddr, pap_findaddrs)
14180727 809 */
a1d2d0ed 810
26eb6bdc 811static adns_status pap_findaddrs(const parseinfo *pai, adns_rr_hostaddr *ha,
bcfd6f13
MW
812 adns_rrtype *rrty, size_t *nrrty_io,
813 size_t addrsz, int *cbyte_io, int count,
814 int dmstart) {
5f8085b7
MW
815 int rri, naddrs, j;
816 int type, class, rdlen, rdend, rdstart, ownermatched;
bcfd6f13 817 size_t nrrty = *nrrty_io;
2c7b101b 818 unsigned long ttl;
26eb6bdc 819 adns_status st;
a1d2d0ed 820
bcfd6f13 821 for (rri=0, naddrs=0; rri<count; rri++) {
9c344a42 822 st= adns__findrr_anychk(pai->qu, pai->serv, pai->dgram,
823 pai->dglen, cbyte_io,
2c7b101b 824 &type, &class, &ttl, &rdlen, &rdstart,
26eb6bdc 825 pai->dgram, pai->dglen, dmstart, &ownermatched);
a1d2d0ed 826 if (st) return st;
bcfd6f13 827 if (!ownermatched || class != DNS_CLASS_IN) continue;
5f8085b7
MW
828 for (j = 0; j < nrrty && type != (rrty[j] & adns_rrt_typemask); j++);
829 if (j >= nrrty) continue;
bcfd6f13
MW
830 if (j < *nrrty_io) {
831 (*nrrty_io)--;
832 adns_rrtype t = rrty[j];
833 rrty[j] = rrty[*nrrty_io];
834 rrty[*nrrty_io] = t;
835 }
836 if (!adns__vbuf_ensure(&pai->qu->vb, (naddrs+1)*addrsz)) R_NOMEM;
2c7b101b 837 adns__update_expires(pai->qu,ttl,pai->now);
5f8085b7
MW
838 rdend = rdstart + rdlen;
839 st= pap_addr(pai, type, addrsz, &rdstart, rdend,
840 (adns_rr_addr *)(pai->qu->vb.buf + naddrs*addrsz));
a1d2d0ed 841 if (st) return st;
5f8085b7 842 if (rdstart != rdend) return adns_s_invaliddata;
26eb6bdc 843 naddrs++;
a1d2d0ed 844 }
bcfd6f13 845 if (naddrs > 0) {
4678dd22 846 st = append_addrs(pai->qu, 0, addrsz, &ha->addrs, &ha->naddrs,
bcfd6f13
MW
847 (const adns_rr_addr *)pai->qu->vb.buf, naddrs);
848 if (st) return st;
a1d2d0ed 849 ha->astatus= adns_s_ok;
26eb6bdc 850
bcfd6f13
MW
851 if (!*nrrty_io) {
852 adns__isort(ha->addrs, naddrs, addrsz, pai->qu->vb.buf,
853 div_addr, pai->ads);
854 }
a1d2d0ed 855 }
856 return adns_s_ok;
857}
858
bc01473e 859static void icb_hostaddr(adns_query parent, adns_query child) {
bc01473e 860 adns_answer *cans= child->answer;
334c6111 861 adns_rr_hostaddr *rrp= child->ctx.pinfo.hostaddr;
cb32030b 862 adns_state ads= parent->ads;
0872e289 863 adns_status st;
e1d31292 864 size_t addrsz = gsz_addr(parent->answer->type);
bc01473e 865
bcfd6f13 866 st= cans->status == adns_s_nodata ? adns_s_ok : cans->status;
bcfd6f13
MW
867
868 if (st) goto done;
869 assert(addrsz == cans->rrsz);
4678dd22 870 st = append_addrs(parent, child, addrsz,
bcfd6f13
MW
871 &rrp->addrs, &rrp->naddrs,
872 cans->rrs.addr, cans->nrrs);
873 if (st) goto done;
874 if (!rrp->naddrs) { st = adns_s_nodata; goto done; }
875
876 if (!adns__vbuf_ensure(&parent->vb, addrsz))
877 { st = adns_s_nomemory; goto done; }
878 adns__isort(rrp->addrs, rrp->naddrs, addrsz, parent->vb.buf,
879 div_addr, ads);
880
881done:
882 if (st) {
883 adns__free_interim(parent, rrp->addrs);
1dc15819 884 rrp->naddrs= (st>0 && st<=adns_s_max_tempfail) ? -1 : 0;
bcfd6f13 885 }
cd1bde2f 886
1dc15819 887 rrp->astatus= st;
cb32030b 888 if (parent->children.head) {
889 LIST_LINK_TAIL(ads->childw,parent);
890 } else {
891 adns__query_done(parent);
892 }
bc01473e 893}
894
26eb6bdc 895static adns_status pap_hostaddr(const parseinfo *pai, int *cbyte_io,
896 int max, adns_rr_hostaddr *rrp) {
a1d2d0ed 897 adns_status st;
898 int dmstart, cbyte;
ba1ddf08 899 qcontext ctx;
900 int id;
901 adns_query nqu;
59fbb06a 902 adns_queryflags nflags;
bcfd6f13
MW
903 adns_rrtype rrty[ADDR_MAXRRTYPES];
904 size_t nrrty;
e1d31292 905 size_t addrsz = gsz_addr(pai->qu->answer->type);
a1d2d0ed 906
907 dmstart= cbyte= *cbyte_io;
26eb6bdc 908 st= pap_domain(pai, &cbyte, max, &rrp->host,
909 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
a1d2d0ed 910 if (st) return st;
911 *cbyte_io= cbyte;
912
913 rrp->astatus= adns_s_ok;
bcfd6f13 914 rrp->naddrs= 0;
a1d2d0ed 915 rrp->addrs= 0;
916
26eb6bdc 917 cbyte= pai->nsstart;
a1d2d0ed 918
bcfd6f13
MW
919 addr_rrtypes(pai->ads, pai->qu->answer->type,
920 pai->qu->flags, rrty, &nrrty);
921
922 st= pap_findaddrs(pai, rrp, rrty, &nrrty, addrsz,
923 &cbyte, pai->nscount, dmstart);
a1d2d0ed 924 if (st) return st;
bcfd6f13 925 if (!nrrty) return adns_s_ok;
a1d2d0ed 926
bcfd6f13
MW
927 st= pap_findaddrs(pai, rrp, rrty, &nrrty, addrsz,
928 &cbyte, pai->arcount, dmstart);
a1d2d0ed 929 if (st) return st;
bcfd6f13 930 if (!nrrty) return adns_s_ok;
26eb6bdc 931
ba1ddf08 932 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
933 pai->dgram, pai->dglen, dmstart,
934 adns_r_addr, adns_qf_quoteok_query);
935 if (st) return st;
bc01473e 936
cd1bde2f 937 ctx.ext= 0;
938 ctx.callback= icb_hostaddr;
334c6111 939 ctx.pinfo.hostaddr= rrp;
59fbb06a 940
bcfd6f13 941 nflags= adns_qf_quoteok_query | (pai->qu->flags & adns__qf_afmask);
59fbb06a 942 if (!(pai->qu->flags & adns_qf_cname_loose)) nflags |= adns_qf_cname_forbid;
943
bcfd6f13
MW
944 st= addr_submit(pai->qu, &nqu, &pai->qu->vb, id, rrty, nrrty,
945 nflags, pai->now, &ctx);
ba1ddf08 946 if (st) return st;
947
26eb6bdc 948 return adns_s_ok;
a1d2d0ed 949}
950
9c344a42 951static adns_status pa_hostaddr(const parseinfo *pai, int cbyte,
952 int max, void *datap) {
26eb6bdc 953 adns_rr_hostaddr *rrp= datap;
a1d2d0ed 954 adns_status st;
a1d2d0ed 955
26eb6bdc 956 st= pap_hostaddr(pai, &cbyte, max, rrp);
a1d2d0ed 957 if (st) return st;
958 if (cbyte != max) return adns_s_invaliddata;
959
26eb6bdc 960 return adns_s_ok;
961}
a1d2d0ed 962
9c344a42 963static int dip_hostaddr(adns_state ads,
964 const adns_rr_hostaddr *ap, const adns_rr_hostaddr *bp) {
26eb6bdc 965 if (ap->astatus != bp->astatus) return ap->astatus;
966 if (ap->astatus) return 0;
a1d2d0ed 967
9136cf0c 968 return dip_sockaddr(ads, &ap->addrs[0].addr.sa, &bp->addrs[0].addr.sa);
26eb6bdc 969}
970
9c344a42 971static int di_hostaddr(adns_state ads,
972 const void *datap_a, const void *datap_b) {
26eb6bdc 973 const adns_rr_hostaddr *ap= datap_a, *bp= datap_b;
974
8c3aa944 975 return dip_hostaddr(ads, ap,bp);
a1d2d0ed 976}
977
14180727 978static void mfp_hostaddr(adns_query qu, adns_rr_hostaddr *rrp) {
979 void *tablev;
5f8085b7
MW
980 size_t sz = qu->answer->type & adns__qtf_bigaddr ?
981 sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only);
14180727 982 adns__makefinal_str(qu,&rrp->host);
983 tablev= rrp->addrs;
5f8085b7 984 adns__makefinal_block(qu, &tablev, rrp->naddrs*sz);
14180727 985 rrp->addrs= tablev;
f2ad23ee 986}
987
14180727 988static void mf_hostaddr(adns_query qu, void *datap) {
989 adns_rr_hostaddr *rrp= datap;
f2ad23ee 990
14180727 991 mfp_hostaddr(qu,rrp);
f2ad23ee 992}
993
26eb6bdc 994static adns_status csp_hostaddr(vbuf *vb, const adns_rr_hostaddr *rrp) {
0fb18816 995 const char *errstr;
26eb6bdc 996 adns_status st;
9e50e3ac 997 char buf[20];
26eb6bdc 998 int i;
999
0fb18816 1000 st= csp_domain(vb,rrp->host); if (st) return st;
26eb6bdc 1001
0872e289 1002 CSP_ADDSTR(" ");
9e50e3ac 1003 CSP_ADDSTR(adns_errtypeabbrev(rrp->astatus));
1004
1005 sprintf(buf," %d ",rrp->astatus);
1006 CSP_ADDSTR(buf);
0fb18816 1007
9e50e3ac 1008 CSP_ADDSTR(adns_errabbrev(rrp->astatus));
0fb18816 1009 CSP_ADDSTR(" ");
9e50e3ac 1010
0fb18816 1011 errstr= adns_strerror(rrp->astatus);
1012 st= csp_qstring(vb,errstr,strlen(errstr)); if (st) return st;
0872e289 1013
1014 if (rrp->naddrs >= 0) {
1015 CSP_ADDSTR(" (");
1016 for (i=0; i<rrp->naddrs; i++) {
1017 CSP_ADDSTR(" ");
26eb6bdc 1018 st= csp_addr(vb,&rrp->addrs[i]);
1019 }
0872e289 1020 CSP_ADDSTR(" )");
1021 } else {
1022 CSP_ADDSTR(" ?");
26eb6bdc 1023 }
1024 return adns_s_ok;
1025}
1026
1027static adns_status cs_hostaddr(vbuf *vb, const void *datap) {
1028 const adns_rr_hostaddr *rrp= datap;
1029
1030 return csp_hostaddr(vb,rrp);
1031}
1032
14180727 1033/*
1034 * _mx_raw (pa,di)
1035 */
26eb6bdc 1036
9c344a42 1037static adns_status pa_mx_raw(const parseinfo *pai, int cbyte,
1038 int max, void *datap) {
14180727 1039 const byte *dgram= pai->dgram;
1040 adns_rr_intstr *rrp= datap;
1041 adns_status st;
1042 int pref;
26eb6bdc 1043
14180727 1044 if (cbyte+2 > max) return adns_s_invaliddata;
1045 GET_W(cbyte,pref);
1046 rrp->i= pref;
1047 st= pap_domain(pai, &cbyte, max, &rrp->str,
1048 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1049 if (st) return st;
26eb6bdc 1050
14180727 1051 if (cbyte != max) return adns_s_invaliddata;
1052 return adns_s_ok;
1053}
26eb6bdc 1054
8c3aa944 1055static int di_mx_raw(adns_state ads, const void *datap_a, const void *datap_b) {
14180727 1056 const adns_rr_intstr *ap= datap_a, *bp= datap_b;
1057
1058 if (ap->i < bp->i) return 0;
1059 if (ap->i > bp->i) return 1;
1060 return 0;
26eb6bdc 1061}
1062
14180727 1063/*
1064 * _mx (pa,di)
1065 */
26eb6bdc 1066
9c344a42 1067static adns_status pa_mx(const parseinfo *pai, int cbyte,
1068 int max, void *datap) {
14180727 1069 const byte *dgram= pai->dgram;
1070 adns_rr_inthostaddr *rrp= datap;
1071 adns_status st;
1072 int pref;
1073
1074 if (cbyte+2 > max) return adns_s_invaliddata;
1075 GET_W(cbyte,pref);
1076 rrp->i= pref;
1077 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha);
1078 if (st) return st;
1079
1080 if (cbyte != max) return adns_s_invaliddata;
1081 return adns_s_ok;
1082}
1083
8c3aa944 1084static int di_mx(adns_state ads, const void *datap_a, const void *datap_b) {
14180727 1085 const adns_rr_inthostaddr *ap= datap_a, *bp= datap_b;
1086
1087 if (ap->i < bp->i) return 0;
1088 if (ap->i > bp->i) return 1;
8c3aa944 1089 return dip_hostaddr(ads, &ap->ha, &bp->ha);
26eb6bdc 1090}
1091
14180727 1092/*
1093 * _inthostaddr (mf,cs)
1094 */
1095
26eb6bdc 1096static void mf_inthostaddr(adns_query qu, void *datap) {
1097 adns_rr_inthostaddr *rrp= datap;
1098
1099 mfp_hostaddr(qu,&rrp->ha);
1100}
1101
14180727 1102static adns_status cs_inthostaddr(vbuf *vb, const void *datap) {
1103 const adns_rr_inthostaddr *rrp= datap;
1104 char buf[10];
f2ad23ee 1105
14180727 1106 sprintf(buf,"%u ",rrp->i);
1107 CSP_ADDSTR(buf);
1108
1109 return csp_hostaddr(vb,&rrp->ha);
cfdca685 1110}
1111
0872e289 1112/*
1113 * _inthost (cs)
1114 */
1115
1116static adns_status cs_inthost(vbuf *vb, const void *datap) {
1117 const adns_rr_intstr *rrp= datap;
1118 char buf[10];
1119
1120 sprintf(buf,"%u ",rrp->i);
1121 CSP_ADDSTR(buf);
1122 return csp_domain(vb,rrp->str);
1123}
1124
cd1bde2f 1125/*
1126 * _ptr (pa, +icb_ptr)
1127 */
1128
1129static void icb_ptr(adns_query parent, adns_query child) {
1130 adns_answer *cans= child->answer;
8a53cf7f
MW
1131 const union gen_addr *queried;
1132 const unsigned char *found;
cb32030b 1133 adns_state ads= parent->ads;
cd1bde2f 1134 int i;
1135
1136 if (cans->status == adns_s_nxdomain || cans->status == adns_s_nodata) {
1137 adns__query_fail(parent,adns_s_inconsistent);
1138 return;
1139 } else if (cans->status) {
1140 adns__query_fail(parent,cans->status);
1141 return;
1142 }
1143
334c6111 1144 queried= &parent->ctx.pinfo.ptr_parent_addr.addr;
8a53cf7f
MW
1145 for (i=0, found=cans->rrs.bytes; i<cans->nrrs; i++, found += cans->rrsz) {
1146 if (!memcmp(queried,found,cans->rrsz)) {
cb32030b 1147 if (!parent->children.head) {
1148 adns__query_done(parent);
1149 return;
1150 } else {
1151 LIST_LINK_TAIL(ads->childw,parent);
1152 return;
1153 }
cd1bde2f 1154 }
1155 }
1156
1157 adns__query_fail(parent,adns_s_inconsistent);
1158}
1159
9c344a42 1160static adns_status pa_ptr(const parseinfo *pai, int dmstart,
1161 int max, void *datap) {
8a53cf7f
MW
1162 static const struct {
1163 const afinfo *ai;
1164 const char *const tail[3];
1165 } expectdomain[] = {
1166 { &adns__inet_afinfo, { DNS_INADDR_ARPA, 0 } },
1167 { &adns__inet6_afinfo, { DNS_IP6_ARPA, 0 } }
1168 };
1169 enum { n_ed = sizeof(expectdomain)/sizeof(expectdomain[0]) };
cd1bde2f 1170
1171 char **rrp= datap;
1172 adns_status st;
8a53cf7f 1173 struct afinfo_addr *ap;
cd1bde2f 1174 findlabel_state fls;
8a53cf7f
MW
1175 byte ipv[n_ed][32];
1176 int cbyte, i, j, foundj = -1, lablen, labstart, id, f, ac;
1177 const char *tp;
cd1bde2f 1178 adns_query nqu;
1179 qcontext ctx;
1180
1181 cbyte= dmstart;
1182 st= pap_domain(pai, &cbyte, max, rrp,
1183 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1184 if (st) return st;
1185 if (cbyte != max) return adns_s_invaliddata;
1186
334c6111 1187 ap= &pai->qu->ctx.pinfo.ptr_parent_addr;
8a53cf7f 1188 if (!ap->ai) {
cd1bde2f 1189 adns__findlabel_start(&fls, pai->ads, -1, pai->qu,
1190 pai->qu->query_dgram, pai->qu->query_dglen,
1191 pai->qu->query_dglen, DNS_HDRSIZE, 0);
8a53cf7f
MW
1192
1193 f = (1 << n_ed) - 1; /* superposition of address types */
1194 for (i = 0;; i++) {
cd1bde2f 1195 st= adns__findlabel_next(&fls,&lablen,&labstart); assert(!st);
8a53cf7f
MW
1196 if (lablen <= 0) break;
1197 for (j = 0; j < n_ed; j++) {
1198 if (!(f & (1 << j))) continue;
1199 if (i < expectdomain[j].ai->nrevcomp) {
1200 ac = expectdomain[j].ai->rev_parsecomp(
1201 pai->qu->query_dgram + labstart, lablen);
1202 if (ac < 0) goto mismatch;
1203 assert(i < sizeof(ipv[j]));
1204 ipv[j][i] = ac;
1205 } else {
1206 tp = expectdomain[j].tail[i - expectdomain[j].ai->nrevcomp];
1207 if (!tp ||
1208 strncmp(pai->qu->query_dgram + labstart, tp, lablen) != 0 ||
1209 tp[lablen] != 0)
1210 goto mismatch;
1211 }
1212 continue;
1213
1214 mismatch:
1215 f &= ~(1 << j);
1216 if (!f) return adns_s_querydomainwrong;
1217 }
cd1bde2f 1218 }
8a53cf7f
MW
1219
1220 if (lablen < 0) return adns_s_querydomainwrong;
1221 for (j = 0; j < n_ed; j++) {
1222 if (!(f & (1 << j))) continue;
1223 if (i >= expectdomain[j].ai->nrevcomp &&
1224 !expectdomain[j].tail[i - expectdomain[j].ai->nrevcomp])
1225 { foundj = j; continue; }
1226 f &= ~(1 << j);
1227 if (!f) return adns_s_querydomainwrong;
cd1bde2f 1228 }
8a53cf7f
MW
1229 assert(foundj >= 0 && f == (1 << foundj)); /* collapsed to a single type */
1230
1231 ap->ai = expectdomain[foundj].ai;
1232 ap->ai->rev_mkaddr(&ap->addr, ipv[foundj]);
cd1bde2f 1233 }
1234
1235 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
1236 pai->dgram, pai->dglen, dmstart,
8a53cf7f 1237 ap->ai->rrtype, adns_qf_quoteok_query);
cd1bde2f 1238 if (st) return st;
1239
1240 ctx.ext= 0;
1241 ctx.callback= icb_ptr;
334c6111
MW
1242 memset(&ctx.pinfo,0,sizeof(ctx.pinfo));
1243 memset(&ctx.tinfo,0,sizeof(ctx.tinfo));
8a53cf7f 1244 st= adns__internal_submit(pai->ads, &nqu, adns__findtype(ap->ai->rrtype),
5f8085b7 1245 ap->ai->rrtype, &pai->qu->vb, id,
7e6a84a1 1246 adns_qf_quoteok_query, pai->now, &ctx);
cd1bde2f 1247 if (st) return st;
1248
1249 nqu->parent= pai->qu;
1250 LIST_LINK_TAIL_PART(pai->qu->children,nqu,siblings.);
cd1bde2f 1251 return adns_s_ok;
1252}
1253
61093792 1254/*
0872e289 1255 * _strpair (mf)
61093792 1256 */
1257
1258static void mf_strpair(adns_query qu, void *datap) {
1259 adns_rr_strpair *rrp= datap;
1260
1261 adns__makefinal_str(qu,&rrp->array[0]);
1262 adns__makefinal_str(qu,&rrp->array[1]);
1263}
1264
61093792 1265/*
0872e289 1266 * _intstrpair (mf)
61093792 1267 */
1268
1269static void mf_intstrpair(adns_query qu, void *datap) {
1270 adns_rr_intstrpair *rrp= datap;
1271
1272 adns__makefinal_str(qu,&rrp->array[0].str);
1273 adns__makefinal_str(qu,&rrp->array[1].str);
1274}
1275
61093792 1276/*
1277 * _hinfo (pa)
1278 */
1279
9c344a42 1280static adns_status pa_hinfo(const parseinfo *pai, int cbyte,
1281 int max, void *datap) {
61093792 1282 adns_rr_intstrpair *rrp= datap;
1283 adns_status st;
1284 int i;
1285
1286 for (i=0; i<2; i++) {
0872e289 1287 st= pap_qstring(pai, &cbyte, max, &rrp->array[i].i, &rrp->array[i].str);
61093792 1288 if (st) return st;
1289 }
1290
1291 if (cbyte != max) return adns_s_invaliddata;
1292
1293 return adns_s_ok;
1294}
1295
1296/*
0872e289 1297 * _mailbox (pap,cs)
61093792 1298 */
1299
9c344a42 1300static adns_status pap_mailbox822(const parseinfo *pai,
1301 int *cbyte_io, int max, char **mb_r) {
6f2c243f 1302 int lablen, labstart, i, needquote, c, r, neednorm;
1303 const unsigned char *p;
1304 char *str;
1305 findlabel_state fls;
1306 adns_status st;
1307 vbuf *vb;
1308
1309 vb= &pai->qu->vb;
1310 vb->used= 0;
1311 adns__findlabel_start(&fls, pai->ads,
1312 -1, pai->qu,
1313 pai->dgram, pai->dglen, max,
1314 *cbyte_io, cbyte_io);
1315 st= adns__findlabel_next(&fls,&lablen,&labstart);
1316 if (!lablen) {
0872e289 1317 adns__vbuf_appendstr(vb,".");
6f2c243f 1318 goto x_ok;
1319 }
1320
1321 neednorm= 1;
1322 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++) {
1323 c= *p++;
1324 if ((c&~128) < 32 || (c&~128) == 127) return adns_s_invaliddata;
1325 if (c == '.' && !neednorm) neednorm= 1;
67ca39c8 1326 else if (c==' ' || c>=127 || ctype_822special(c)) needquote++;
6f2c243f 1327 else neednorm= 0;
1328 }
1329
1330 if (needquote || neednorm) {
1331 r= adns__vbuf_ensure(vb, lablen+needquote+4); if (!r) R_NOMEM;
1332 adns__vbuf_appendq(vb,"\"",1);
1333 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++, p++) {
1334 c= *p;
0872e289 1335 if (c == '"' || c=='\\') adns__vbuf_appendq(vb,"\\",1);
6f2c243f 1336 adns__vbuf_appendq(vb,p,1);
1337 }
1338 adns__vbuf_appendq(vb,"\"",1);
1339 } else {
1340 r= adns__vbuf_append(vb, pai->dgram+labstart, lablen); if (!r) R_NOMEM;
1341 }
1342
1343 r= adns__vbuf_appendstr(vb,"@"); if (!r) R_NOMEM;
1344
1345 st= adns__parse_domain_more(&fls,pai->ads, pai->qu,vb,0, pai->dgram);
1346 if (st) return st;
1347
1348 x_ok:
1349 str= adns__alloc_interim(pai->qu, vb->used+1); if (!str) R_NOMEM;
1350 memcpy(str,vb->buf,vb->used);
1351 str[vb->used]= 0;
1352 *mb_r= str;
1353 return adns_s_ok;
61093792 1354}
1355
c2875680 1356static adns_status pap_mailbox(const parseinfo *pai, int *cbyte_io, int max,
1357 char **mb_r) {
7d0aaee4 1358 if (pai->qu->typei->typekey & adns__qtf_mail822) {
c2875680 1359 return pap_mailbox822(pai, cbyte_io, max, mb_r);
1360 } else {
0872e289 1361 return pap_domain(pai, cbyte_io, max, mb_r, pdf_quoteok);
c2875680 1362 }
1363}
1364
0872e289 1365static adns_status csp_mailbox(vbuf *vb, const char *mailbox) {
1366 return csp_domain(vb,mailbox);
1367}
1368
61093792 1369/*
0872e289 1370 * _rp (pa,cs)
61093792 1371 */
1372
9c344a42 1373static adns_status pa_rp(const parseinfo *pai, int cbyte,
1374 int max, void *datap) {
61093792 1375 adns_rr_strpair *rrp= datap;
1376 adns_status st;
1377
1378 st= pap_mailbox(pai, &cbyte, max, &rrp->array[0]);
1379 if (st) return st;
1380
1381 st= pap_domain(pai, &cbyte, max, &rrp->array[1], pdf_quoteok);
1382 if (st) return st;
1383
1384 if (cbyte != max) return adns_s_invaliddata;
1385 return adns_s_ok;
1386}
1387
0872e289 1388static adns_status cs_rp(vbuf *vb, const void *datap) {
1389 const adns_rr_strpair *rrp= datap;
1390 adns_status st;
1391
1392 st= csp_mailbox(vb,rrp->array[0]); if (st) return st;
1393 CSP_ADDSTR(" ");
1394 st= csp_domain(vb,rrp->array[1]); if (st) return st;
1395
1396 return adns_s_ok;
1397}
1398
61093792 1399/*
1400 * _soa (pa,mf,cs)
1401 */
1402
9c344a42 1403static adns_status pa_soa(const parseinfo *pai, int cbyte,
1404 int max, void *datap) {
61093792 1405 adns_rr_soa *rrp= datap;
1406 const byte *dgram= pai->dgram;
1407 adns_status st;
1408 int msw, lsw, i;
1409
1410 st= pap_domain(pai, &cbyte, max, &rrp->mname,
1411 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1412 if (st) return st;
1413
1414 st= pap_mailbox(pai, &cbyte, max, &rrp->rname);
1415 if (st) return st;
1416
1417 if (cbyte+20 != max) return adns_s_invaliddata;
1418
1419 for (i=0; i<5; i++) {
1420 GET_W(cbyte,msw);
1421 GET_W(cbyte,lsw);
1422 (&rrp->serial)[i]= (msw<<16) | lsw;
1423 }
1424
1425 return adns_s_ok;
1426}
1427
1428static void mf_soa(adns_query qu, void *datap) {
1429 adns_rr_soa *rrp= datap;
1430
1431 adns__makefinal_str(qu,&rrp->mname);
1432 adns__makefinal_str(qu,&rrp->rname);
1433}
1434
1435static adns_status cs_soa(vbuf *vb, const void *datap) {
1436 const adns_rr_soa *rrp= datap;
1437 char buf[20];
1438 int i;
1439 adns_status st;
1440
0872e289 1441 st= csp_domain(vb,rrp->mname); if (st) return st;
61093792 1442 CSP_ADDSTR(" ");
0872e289 1443 st= csp_mailbox(vb,rrp->rname); if (st) return st;
61093792 1444
1445 for (i=0; i<5; i++) {
1446 sprintf(buf," %lu",(&rrp->serial)[i]);
1447 CSP_ADDSTR(buf);
1448 }
1449
1450 return adns_s_ok;
1451}
1452
bddb4c18 1453/*
59d05d1c 1454 * _srv* (pa*2,di,cs*2,qdpl,postsort)
bddb4c18 1455 */
1456
1457static adns_status qdpl_srv(adns_state ads,
1458 const char **p_io, const char *pe, int labelnum,
1459 char label_r[DNS_MAXDOMAIN], int *ll_io,
1460 adns_queryflags flags,
1461 const typeinfo *typei) {
1462 int useflags;
1463 const char *p_orig;
1464 adns_status st;
1465
1466 if (labelnum < 2 && !(flags & adns_qf_quoteok_query)) {
1467 useflags= adns_qf_quoteok_query;
1468 p_orig= *p_io;
1469 } else {
1470 useflags= flags;
1471 p_orig= 0;
1472 }
1473 st= adns__qdpl_normal(ads, p_io,pe, labelnum,label_r, ll_io, useflags,typei);
1474 if (st) return st;
1475
1476 if (p_orig) {
1477 int ll= *ll_io;
1478 if (!ll || label_r[0]!='_')
1479 return adns_s_querydomaininvalid;
1480 if (memchr(p_orig+1, '\\', pe - (p_orig+1)))
1481 return adns_s_querydomaininvalid;
1482 }
1483 return adns_s_ok;
1484}
1485
7602bb91 1486static adns_status pap_srv_begin(const parseinfo *pai, int *cbyte_io, int max,
375c6c48 1487 adns_rr_srvha *rrp
1488 /* might be adns_rr_srvraw* */) {
2248cdf4 1489 const byte *dgram= pai->dgram;
7602bb91 1490 int ti, cbyte;
1491
1492 cbyte= *cbyte_io;
1493 if ((*cbyte_io += 6) > max) return adns_s_invaliddata;
2248cdf4 1494
1495 rrp->priority= GET_W(cbyte, ti);
1496 rrp->weight= GET_W(cbyte, ti);
1497 rrp->port= GET_W(cbyte, ti);
1498 return adns_s_ok;
1499}
1500
1501static adns_status pa_srvraw(const parseinfo *pai, int cbyte,
1502 int max, void *datap) {
1503 adns_rr_srvraw *rrp= datap;
1504 adns_status st;
1505
7602bb91 1506 st= pap_srv_begin(pai,&cbyte,max,datap);
2248cdf4 1507 if (st) return st;
1508
1509 st= pap_domain(pai, &cbyte, max, &rrp->host,
1510 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1511 if (st) return st;
1512
1513 if (cbyte != max) return adns_s_invaliddata;
1514 return adns_s_ok;
1515}
1516
1517static adns_status pa_srvha(const parseinfo *pai, int cbyte,
1518 int max, void *datap) {
1519 adns_rr_srvha *rrp= datap;
1520 adns_status st;
1521
7602bb91 1522 st= pap_srv_begin(pai,&cbyte,max,datap); if (st) return st;
2248cdf4 1523 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha); if (st) return st;
1524 if (cbyte != max) return adns_s_invaliddata;
1525 return adns_s_ok;
1526}
1527
1528static void mf_srvraw(adns_query qu, void *datap) {
1529 adns_rr_srvraw *rrp= datap;
1530 adns__makefinal_str(qu, &rrp->host);
1531}
1532
1533static void mf_srvha(adns_query qu, void *datap) {
1534 adns_rr_srvha *rrp= datap;
1535 mfp_hostaddr(qu,&rrp->ha);
1536}
1537
1538static int di_srv(adns_state ads, const void *datap_a, const void *datap_b) {
1539 const adns_rr_srvraw *ap= datap_a, *bp= datap_b;
1540 /* might be const adns_rr_svhostaddr* */
1541
1542 if (ap->priority < bp->priority) return 0;
1543 if (ap->priority > bp->priority) return 1;
1544 return 0;
1545}
1546
375c6c48 1547static adns_status csp_srv_begin(vbuf *vb, const adns_rr_srvha *rrp
1548 /* might be adns_rr_srvraw* */) {
2248cdf4 1549 char buf[30];
1550 sprintf(buf,"%u %u %u ", rrp->priority, rrp->weight, rrp->port);
1551 CSP_ADDSTR(buf);
1552 return adns_s_ok;
1553}
1554
1555static adns_status cs_srvraw(vbuf *vb, const void *datap) {
1556 const adns_rr_srvraw *rrp= datap;
1557 adns_status st;
1558
375c6c48 1559 st= csp_srv_begin(vb,(const void*)rrp); if (st) return st;
2248cdf4 1560 return csp_domain(vb,rrp->host);
1561}
1562
1563static adns_status cs_srvha(vbuf *vb, const void *datap) {
1564 const adns_rr_srvha *rrp= datap;
1565 adns_status st;
1566
375c6c48 1567 st= csp_srv_begin(vb,(const void*)datap); if (st) return st;
2248cdf4 1568 return csp_hostaddr(vb,&rrp->ha);
1569}
1570
375c6c48 1571static void postsort_srv(adns_state ads, void *array, int nrrs,
59d05d1c 1572 const struct typeinfo *typei) {
375c6c48 1573 /* we treat everything in the array as if it were an adns_rr_srvha
1574 * even though the array might be of adns_rr_srvraw. That's OK
1575 * because they have the same prefix, which is all we access.
1576 * We use typei->rrsz, too, rather than naive array indexing, of course.
1577 */
1578 char *workbegin, *workend, *search, *arrayend;
1579 const adns_rr_srvha *rr;
1580 union { adns_rr_srvha ha; adns_rr_srvraw raw; } rrtmp;
1581 int cpriority, totalweight, runtotal;
1582 long randval;
1583
1584 for (workbegin= array, arrayend= workbegin + typei->rrsz * nrrs;
1585 workbegin < arrayend;
1586 workbegin= workend) {
1587 cpriority= (rr=(void*)workbegin)->priority;
1588
1589 for (workend= workbegin, totalweight= 0;
1590 workend < arrayend && (rr=(void*)workend)->priority == cpriority;
1591 workend += typei->rrsz) {
1592 totalweight += rr->weight;
375c6c48 1593 }
1594
1595 /* Now workbegin..(workend-1) incl. are exactly all of the RRs of
1596 * cpriority. From now on, workbegin points to the `remaining'
1597 * records: we select one record at a time (RFC2782 `Usage rules'
1598 * and `Format of the SRV RR' subsection `Weight') to place at
1599 * workbegin (swapping with the one that was there, and then
1600 * advance workbegin. */
1601 for (;
1602 workbegin + typei->rrsz < workend; /* don't bother if just one */
1603 workbegin += typei->rrsz) {
1604
1605 randval= nrand48(ads->rand48xsubi);
1606 randval %= (totalweight + 1);
375c6c48 1607 /* makes it into 0..totalweight inclusive; with 2^10 RRs,
1608 * totalweight must be <= 2^26 so probability nonuniformity is
1609 * no worse than 1 in 2^(31-26) ie 1 in 2^5, ie
1610 * abs(log(P_intended(RR_i) / P_actual(RR_i)) <= log(2^-5).
1611 */
1612
1613 for (search=workbegin, runtotal=0;
1614 (runtotal += (rr=(void*)search)->weight) < randval;
1615 search += typei->rrsz);
375c6c48 1616 assert(search < arrayend);
1617 totalweight -= rr->weight;
1618 if (search != workbegin) {
1619 memcpy(&rrtmp, workbegin, typei->rrsz);
1620 memcpy(workbegin, search, typei->rrsz);
1621 memcpy(search, &rrtmp, typei->rrsz);
1622 }
1623 }
1624 }
59d05d1c 1625 /* tests:
1626 * dig -t srv _srv._tcp.test.iwj.relativity.greenend.org.uk.
1627 * ./adnshost_s -t srv- _sip._udp.voip.net.cam.ac.uk.
1628 * ./adnshost_s -t srv- _jabber._tcp.jabber.org
1629 */
1630}
1631
7d0aaee4 1632/*
1633 * _byteblock (mf)
1634 */
1635
1636static void mf_byteblock(adns_query qu, void *datap) {
1637 adns_rr_byteblock *rrp= datap;
1638 void *bytes= rrp->data;
1639 adns__makefinal_block(qu,&bytes,rrp->len);
1640 rrp->data= bytes;
1641}
1642
1643/*
1644 * _opaque (pa,cs)
1645 */
1646
1647static adns_status pa_opaque(const parseinfo *pai, int cbyte,
1648 int max, void *datap) {
1649 adns_rr_byteblock *rrp= datap;
1650
1651 rrp->len= max - cbyte;
1652 rrp->data= adns__alloc_interim(pai->qu, rrp->len);
1653 if (!rrp->data) R_NOMEM;
1654 memcpy(rrp->data, pai->dgram + cbyte, rrp->len);
1655 return adns_s_ok;
1656}
1657
1658static adns_status cs_opaque(vbuf *vb, const void *datap) {
1659 const adns_rr_byteblock *rrp= datap;
1660 char buf[10];
1661 int l;
1662 unsigned char *p;
1663
1664 sprintf(buf,"\\# %d",rrp->len);
1665 CSP_ADDSTR(buf);
1666
1667 for (l= rrp->len, p= rrp->data;
1668 l>=4;
1669 l -= 4, p += 4) {
1670 sprintf(buf," %02x%02x%02x%02x",p[0],p[1],p[2],p[3]);
1671 CSP_ADDSTR(buf);
1672 }
1673 for (;
1674 l>0;
1675 l--, p++) {
1676 sprintf(buf," %02x",*p);
1677 CSP_ADDSTR(buf);
1678 }
1679 return adns_s_ok;
1680}
1681
14180727 1682/*
1683 * _flat (mf)
1684 */
1685
cfdca685 1686static void mf_flat(adns_query qu, void *data) { }
1687
14180727 1688/*
1689 * Now the table.
1690 */
1691
f2ad23ee 1692#define TYPESZ_M(member) (sizeof(*((adns_answer*)0)->rrs.member))
1e9efa71 1693
cfdca685 1694#define DEEP_MEMB(memb) TYPESZ_M(memb), mf_##memb, cs_##memb
1695#define FLAT_MEMB(memb) TYPESZ_M(memb), mf_flat, cs_##memb
5c596e4d 1696
bddb4c18 1697#define DEEP_TYPE(code,rrt,fmt,memb,parser,comparer,printer) \
5f8085b7 1698{ adns_r_##code & adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), \
e1d31292 1699 mf_##memb, printer,parser,comparer, adns__qdpl_normal,0,0,0 }
bddb4c18 1700#define FLAT_TYPE(code,rrt,fmt,memb,parser,comparer,printer) \
5f8085b7 1701{ adns_r_##code & adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), \
e1d31292 1702 mf_flat, printer,parser,comparer, adns__qdpl_normal,0,0,0 }
5f8085b7 1703#define XTRA_TYPE(code,rrt,fmt,memb,parser,comparer,printer, \
e1d31292 1704 makefinal,qdpl,postsort,getrrsz,sender) \
5f8085b7 1705{ adns_r_##code & adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), makefinal, \
e1d31292 1706 printer,parser,comparer,qdpl,postsort,getrrsz,sender }
5c596e4d 1707
1708static const typeinfo typeinfos[] = {
14180727 1709/* Must be in ascending order of rrtype ! */
9c344a42 1710/* mem-mgmt code rrt fmt member parser comparer printer */
1711
1712FLAT_TYPE(a, "A", 0, inaddr, pa_inaddr, di_inaddr,cs_inaddr ),
1713DEEP_TYPE(ns_raw, "NS", "raw",str, pa_host_raw,0, cs_domain ),
1714DEEP_TYPE(cname, "CNAME", 0, str, pa_dom_raw, 0, cs_domain ),
1715DEEP_TYPE(soa_raw,"SOA", "raw",soa, pa_soa, 0, cs_soa ),
1716DEEP_TYPE(ptr_raw,"PTR", "raw",str, pa_host_raw,0, cs_domain ),
1717DEEP_TYPE(hinfo, "HINFO", 0, intstrpair,pa_hinfo, 0, cs_hinfo ),
1718DEEP_TYPE(mx_raw, "MX", "raw",intstr, pa_mx_raw, di_mx_raw,cs_inthost ),
1719DEEP_TYPE(txt, "TXT", 0, manyistr,pa_txt, 0, cs_txt ),
1720DEEP_TYPE(rp_raw, "RP", "raw",strpair, pa_rp, 0, cs_rp ),
9136cf0c 1721FLAT_TYPE(aaaa, "AAAA", 0, in6addr, pa_in6addr, di_in6addr,cs_in6addr ),
59d05d1c 1722XTRA_TYPE(srv_raw,"SRV", "raw",srvraw , pa_srvraw, di_srv, cs_srvraw,
e1d31292 1723 mf_srvraw, qdpl_srv, postsort_srv, 0, 0),
9c344a42 1724
5f8085b7 1725XTRA_TYPE(addr, "A", "addr", addr, pa_addr, di_addr, cs_addr,
e1d31292 1726 mf_flat, adns__qdpl_normal, 0, gsz_addr, qs_addr),
9c344a42 1727DEEP_TYPE(ns, "NS", "+addr",hostaddr,pa_hostaddr,di_hostaddr,cs_hostaddr ),
1728DEEP_TYPE(ptr, "PTR","checked",str, pa_ptr, 0, cs_domain ),
1729DEEP_TYPE(mx, "MX", "+addr",inthostaddr,pa_mx, di_mx, cs_inthostaddr),
59d05d1c 1730XTRA_TYPE(srv, "SRV","+addr",srvha, pa_srvha, di_srv, cs_srvha,
e1d31292 1731 mf_srvha, qdpl_srv, postsort_srv, 0, 0),
bddb4c18 1732
9c344a42 1733DEEP_TYPE(soa, "SOA","822", soa, pa_soa, 0, cs_soa ),
1734DEEP_TYPE(rp, "RP", "822", strpair, pa_rp, 0, cs_rp ),
5c596e4d 1735};
1736
0b5062df
MW
1737static const typeinfo tinfo_addrsub =
1738XTRA_TYPE(none, "<addr>","sub",addr, pa_addr, 0, cs_addr,
1739 mf_flat, adns__qdpl_normal, 0, gsz_addr, 0);
1740
7d0aaee4 1741static const typeinfo typeinfo_unknown=
1742DEEP_TYPE(unknown,0, "unknown",byteblock,pa_opaque, 0, cs_opaque );
1743
c9afe7bb 1744const typeinfo *adns__findtype(adns_rrtype type) {
1745 const typeinfo *begin, *end, *mid;
5c596e4d 1746
7d0aaee4 1747 if (type & adns_r_unknown) return &typeinfo_unknown;
5f8085b7 1748 type &= adns_rrt_reprmask;
7d0aaee4 1749
5c596e4d 1750 begin= typeinfos; end= typeinfos+(sizeof(typeinfos)/sizeof(typeinfo));
1751
1752 while (begin < end) {
1753 mid= begin + ((end-begin)>>1);
7d0aaee4 1754 if (mid->typekey == type) return mid;
1755 if (type > mid->typekey) begin= mid+1;
5c596e4d 1756 else end= mid;
1757 }
1758 return 0;
1759}