3 * - parsing assistance functions (mainly for domains inside datagrams)
6 * This file is part of adns, which is Copyright Ian Jackson
7 * and contributors (see the file INSTALL for full details).
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 3, or (at your option)
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software Foundation.
25 static int vbuf_append_quoted1035(vbuf *vb, const byte *buf, int len) {
31 for (i=0; i<len; i++) {
33 if (ch <= ' ' || ch >= 127) {
34 sprintf(qbuf,"\\%03o",ch);
36 } else if (!ctype_domainunquoted(ch)) {
37 sprintf(qbuf,"\\%c",ch);
41 if (!adns__vbuf_append(vb,buf,i) ||
42 !adns__vbuf_append(vb,qbuf,strlen(qbuf)))
51 void adns__findlabel_start(findlabel_state *fls, adns_state ads,
52 int serv, adns_query qu,
53 const byte *dgram, int dglen, int max,
54 int dmbegin, int *dmend_rlater) {
63 fls->dmend_r= dmend_rlater;
66 adns_status adns__findlabel_next(findlabel_state *fls,
67 int *lablen_r, int *labstart_r) {
74 if (fls->cbyte >= fls->dglen) goto x_truncated;
75 if (fls->cbyte >= fls->max) goto x_badresponse;
76 GET_B(fls->cbyte,lablen);
77 if (!(lablen & 0x0c0)) break;
78 if ((lablen & 0x0c0) != 0x0c0) return adns_s_unknownformat;
79 if (fls->cbyte >= fls->dglen) goto x_truncated;
80 if (fls->cbyte >= fls->max) goto x_badresponse;
81 if (had_pointer++ >= 2) goto x_loop;
82 GET_B(fls->cbyte,jumpto);
83 jumpto |= (lablen&0x3f)<<8;
84 if (fls->dmend_r) *(fls->dmend_r)= fls->cbyte;
86 fls->dmend_r= 0; fls->max= fls->dglen+1;
88 if (labstart_r) *labstart_r= fls->cbyte;
90 if (fls->namelen) fls->namelen++;
91 fls->namelen+= lablen;
92 if (fls->namelen > DNS_MAXDOMAIN) return adns_s_answerdomaintoolong;
94 if (fls->cbyte > fls->dglen) goto x_truncated;
95 if (fls->cbyte > fls->max) goto x_badresponse;
97 if (fls->dmend_r) *(fls->dmend_r)= fls->cbyte;
107 adns__diag(fls->ads,fls->serv,fls->qu,
108 "label in domain runs or points outside of packet");
109 return adns_s_invalidresponse;
112 adns__diag(fls->ads,fls->serv,fls->qu,
113 "compressed label pointer chain");
114 return adns_s_invalidresponse;
117 adns_status adns__parse_domain(adns_state ads, int serv, adns_query qu,
118 vbuf *vb, parsedomain_flags flags,
119 const byte *dgram, int dglen, int *cbyte_io,
123 adns__findlabel_start(&fls,ads, serv,qu, dgram,dglen,max,
126 return adns__parse_domain_more(&fls,ads,qu, vb,flags,dgram);
129 adns_status adns__parse_domain_more(findlabel_state *fls, adns_state ads,
130 adns_query qu, vbuf *vb,
131 parsedomain_flags flags,
133 int lablen, labstart, i, ch, first;
138 st= adns__findlabel_next(fls,&lablen,&labstart);
140 if (lablen<0) { vb->used=0; return adns_s_ok; }
145 if (!adns__vbuf_append(vb,".",1)) return adns_s_nomemory;
147 if (flags & pdf_quoteok) {
148 if (!vbuf_append_quoted1035(vb,dgram+labstart,lablen))
149 return adns_s_nomemory;
152 if (!ctype_alpha(ch) && !ctype_digit(ch))
153 return adns_s_answerdomaininvalid;
154 for (i= labstart+1; i<labstart+lablen; i++) {
156 if (ch != '-' && !ctype_alpha(ch) && !ctype_digit(ch))
157 return adns_s_answerdomaininvalid;
159 if (!adns__vbuf_append(vb,dgram+labstart,lablen))
160 return adns_s_nomemory;
163 if (!adns__vbuf_append(vb,"",1)) return adns_s_nomemory;
167 bool adns__labels_equal(const byte *a, int al, const byte *b, int bl) {
168 if (al != bl) return 0;
170 int ac= ctype_toupper(*a++);
171 int bc= ctype_toupper(*b++);
172 if (ac != bc) return 0;
177 adns_status adns__findrr_anychk(adns_query qu, int serv,
178 const byte *dgram, int dglen, int *cbyte_io,
179 int *type_r, int *class_r,
180 unsigned long *ttl_r,
181 int *rdlen_r, int *rdstart_r,
182 const byte *eo_dgram, int eo_dglen,
183 int eo_cbyte, int *eo_matched_r) {
184 findlabel_state fls, eo_fls_buf;
185 findlabel_state *eo_fls; /* 0 iff we know it's not matching eo_... */
190 int lablen, labstart;
191 int eo_lablen, eo_labstart;
196 adns__findlabel_start(&fls,qu->ads, serv,qu, dgram,dglen,dglen,cbyte,&cbyte);
199 adns__findlabel_start(eo_fls,qu->ads, -1,0,
200 eo_dgram,eo_dglen,eo_dglen,eo_cbyte,0);
206 st= adns__findlabel_next(&fls,&lablen,&labstart);
208 if (lablen<0) goto x_truncated;
211 st= adns__findlabel_next(eo_fls,&eo_lablen,&eo_labstart);
212 assert(!st); assert(eo_lablen>=0);
213 if (!adns__labels_equal(dgram+labstart, lablen,
214 eo_dgram+eo_labstart, eo_lablen))
219 if (eo_matched_r) *eo_matched_r= !!eo_fls;
221 if (cbyte+10>dglen) goto x_truncated;
222 GET_W(cbyte,tmp); *type_r= tmp;
223 GET_W(cbyte,tmp); *class_r= tmp;
226 if (ttl > MAXTTLBELIEVE) ttl= MAXTTLBELIEVE;
229 GET_W(cbyte,rdlen); if (rdlen_r) *rdlen_r= rdlen;
230 if (rdstart_r) *rdstart_r= cbyte;
232 if (cbyte>dglen) goto x_truncated;
241 adns_status adns__findrr(adns_query qu, int serv,
242 const byte *dgram, int dglen, int *cbyte_io,
243 int *type_r, int *class_r, unsigned long *ttl_r,
244 int *rdlen_r, int *rdstart_r,
245 int *ownermatchedquery_r) {
246 if (!ownermatchedquery_r) {
247 return adns__findrr_anychk(qu,serv,
248 dgram,dglen,cbyte_io,
249 type_r,class_r,ttl_r,rdlen_r,rdstart_r,
251 } else if (!qu->cname_dgram) {
252 return adns__findrr_anychk(qu,serv,
253 dgram,dglen,cbyte_io,
254 type_r,class_r,ttl_r,rdlen_r,rdstart_r,
255 qu->query_dgram,qu->query_dglen,DNS_HDRSIZE,
256 ownermatchedquery_r);
258 return adns__findrr_anychk(qu,serv,
259 dgram,dglen,cbyte_io,
260 type_r,class_r,ttl_r,rdlen_r,rdstart_r,
261 qu->cname_dgram,qu->cname_dglen,qu->cname_begin,
262 ownermatchedquery_r);