3 * - RR-type-specific code, and the machinery to call it
6 * This file is part of adns, which is Copyright Ian Jackson
7 * and contributors (see the file INSTALL for full details).
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 3, or (at your option)
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software Foundation.
26 #include <sys/types.h>
27 #include <sys/socket.h>
28 #include <netinet/in.h>
29 #include <arpa/inet.h>
33 #define R_NOMEM return adns_s_nomemory
34 #define CSP_ADDSTR(s) do { \
35 if (!adns__vbuf_appendstr(vb,(s))) R_NOMEM; \
42 * _textdata, _qstring (csp)
48 * +search_sortlist, dip_genaddr, csp_genaddr)
50 * _addr (pap,pa,di,div,csp,cs,gsz,qs
51 * +search_sortlist_sa, dip_sockaddr,
52 * addr_rrtypes, addr_submit, icb_addr)
53 * _domain (pap,csp,cs)
56 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs
57 * +pap_findaddrs, icb_hostaddr)
60 * _inthostaddr (mf,cs)
62 * _ptr (ckl,pa +icb_ptr)
66 * _mailbox (pap,csp +pap_mailbox822)
69 * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort)
74 * within each section:
93 static adns_status pap_qstring(const parseinfo *pai, int *cbyte_io, int max,
94 int *len_r, char **str_r) {
95 /* Neither len_r nor str_r may be null.
96 * End of datagram (overrun) is indicated by returning adns_s_invaliddata;
98 const byte *dgram= pai->dgram;
104 if (cbyte >= max) return adns_s_invaliddata;
106 if (cbyte+l > max) return adns_s_invaliddata;
108 str= adns__alloc_interim(pai->qu, l+1);
112 memcpy(str,dgram+cbyte,l);
121 static adns_status csp_qstring(vbuf *vb, const char *dp, int len) {
127 for (cn=0; cn<len; cn++) {
131 } else if (ch == '"') {
133 } else if (ch >= 32 && ch <= 126) {
134 if (!adns__vbuf_append(vb,&ch,1)) R_NOMEM;
136 sprintf(buf,"\\x%02x",ch);
149 static void mf_str(adns_query qu, void *datap) {
152 adns__makefinal_str(qu,rrp);
159 static void mf_intstr(adns_query qu, void *datap) {
160 adns_rr_intstr *rrp= datap;
162 adns__makefinal_str(qu,&rrp->str);
169 static void mf_manyistr(adns_query qu, void *datap) {
170 adns_rr_intstr **rrp= datap;
171 adns_rr_intstr *te, *table;
175 for (tc=0, te= *rrp; te->i >= 0; te++, tc++);
177 adns__makefinal_block(qu,&tablev,sizeof(*te)*(tc+1));
179 for (te= *rrp; te->i >= 0; te++)
180 adns__makefinal_str(qu,&te->str);
187 static adns_status pa_txt(const parseinfo *pai, int cbyte,
188 int max, void *datap) {
189 adns_rr_intstr **rrp= datap, *table, *te;
190 const byte *dgram= pai->dgram;
191 int ti, tc, l, startbyte;
195 if (cbyte >= max) return adns_s_invaliddata;
197 while (cbyte < max) {
202 if (cbyte != max || !tc) return adns_s_invaliddata;
204 table= adns__alloc_interim(pai->qu,sizeof(*table)*(tc+1));
207 for (cbyte=startbyte, ti=0, te=table; ti<tc; ti++, te++) {
208 st= pap_qstring(pai, &cbyte, max, &te->i, &te->str);
211 assert(cbyte == max);
220 static adns_status cs_txt(vbuf *vb, adns_rrtype rrt, const void *datap) {
221 const adns_rr_intstr *const *rrp= datap;
222 const adns_rr_intstr *current;
226 for (current= *rrp, spc=0; current->i >= 0; current++, spc=1) {
227 if (spc) CSP_ADDSTR(" ");
228 st= csp_qstring(vb,current->str,current->i); if (st) return st;
237 static adns_status cs_hinfo(vbuf *vb, adns_rrtype rrt, const void *datap) {
238 const adns_rr_intstrpair *rrp= datap;
241 st= csp_qstring(vb,rrp->array[0].str,rrp->array[0].i); if (st) return st;
243 st= csp_qstring(vb,rrp->array[1].str,rrp->array[1].i); if (st) return st;
248 * _inaddr (pa,di,cs +search_sortlist, dip_genaddr, csp_genaddr)
251 static adns_status pa_inaddr(const parseinfo *pai, int cbyte,
252 int max, void *datap) {
253 struct in_addr *storeto= datap;
255 if (max-cbyte != 4) return adns_s_invaliddata;
256 memcpy(storeto, pai->dgram + cbyte, 4);
260 static int search_sortlist(adns_state ads, int af, const void *ad) {
261 const struct sortlist *slp;
266 if (af == AF_INET6) {
267 const struct in6_addr *a6= ad;
268 if (IN6_IS_ADDR_V4MAPPED(a6)) {
269 a4.s_addr= htonl(((unsigned long)a6->s6_addr[12] << 24) |
270 ((unsigned long)a6->s6_addr[13] << 16) |
271 ((unsigned long)a6->s6_addr[14] << 8) |
272 ((unsigned long)a6->s6_addr[15] << 0));
277 for (i=0, slp=ads->sortlist;
279 !adns__addr_matches(af,ad, &slp->base,&slp->mask) &&
281 adns__addr_matches(AF_INET,&a4, &slp->base,&slp->mask));
286 static int dip_genaddr(adns_state ads, int af, const void *a, const void *b) {
289 if (!ads->nsortlist) return 0;
291 ai= search_sortlist(ads,af,a);
292 bi= search_sortlist(ads,af,b);
296 static int di_inaddr(adns_state ads,
297 const void *datap_a, const void *datap_b) {
298 return dip_genaddr(ads,AF_INET,datap_a,datap_b);
301 static adns_status csp_genaddr(vbuf *vb, int af, const void *p) {
302 char buf[ADNS_ADDR2TEXT_BUFLEN];
303 int len= sizeof(buf);
307 memset(&a, 0, sizeof(a));
308 a.addr.sa.sa_family= af;
309 adns__addr_inject(p, &a.addr);
310 err= adns_addr2text(&a.addr.sa,0, buf,&len, 0); assert(!err);
315 static adns_status cs_inaddr(vbuf *vb, adns_rrtype rrt, const void *datap) {
316 return csp_genaddr(vb, AF_INET,datap);
320 * _in6addr (pa,di,cs)
323 static adns_status pa_in6addr(const parseinfo *pai, int cbyte,
324 int max, void *datap) {
325 struct in6_addr *storeto= datap;
327 if (max-cbyte != 16) return adns_s_invaliddata;
328 memcpy(storeto->s6_addr, pai->dgram + cbyte, 16);
332 static int di_in6addr(adns_state ads,
333 const void *datap_a, const void *datap_b) {
334 return dip_genaddr(ads,AF_INET6,datap_a,datap_b);
337 static adns_status cs_in6addr(vbuf *vb, adns_rrtype rrt, const void *datap) {
338 return csp_genaddr(vb,AF_INET6,datap);
342 * _addr (pap,pa,di,div,csp,cs,gsz,qs
343 * +search_sortlist_sa, dip_sockaddr, addr_rrtypes,
344 * addr_submit, icb_addr)
347 static const typeinfo tinfo_addrsub;
349 #define ADDR_RRTYPES(_) _(a) _(aaaa)
351 static const adns_rrtype addr_all_rrtypes[] = {
352 #define RRTY_CODE(ty) adns_r_##ty,
353 ADDR_RRTYPES(RRTY_CODE)
358 #define RRTY_INDEX(ty) addr__ri_##ty,
359 ADDR_RRTYPES(RRTY_INDEX)
362 #define RRTY_FLAG(ty) addr_rf_##ty = 1 << addr__ri_##ty,
363 ADDR_RRTYPES(RRTY_FLAG)
364 addr__rrty_eat_final_comma
368 static unsigned addr_rrtypeflag(adns_rrtype type) {
371 type &= adns_rrt_typemask;
372 for (i=0; i<addr_nrrtypes; i++)
373 if (type==addr_all_rrtypes[i])
378 /* About CNAME handling in addr queries.
380 * A user-level addr query is translated into a number of protocol-level
381 * queries, and its job is to reassemble the results. This gets tricky if
382 * the answers aren't consistent. In particular, if the answers report
383 * inconsistent indirection via CNAME records (e.g., different CNAMEs, or
384 * some indirect via a CNAME, and some don't) then we have trouble.
386 * Once we've received an answer, even if it was NODATA, we set
387 * adns__qf_addr_answer on the parent query. This will let us detect a
388 * conflict between a no-CNAME-with-NODATA reply and a subsequent CNAME.
390 * If we detect a conflict of any kind, then at least one answer came back
391 * with a CNAME record, so we pick the first such answer (somewhat
392 * arbitrarily) as being the `right' canonical name, and set this in the
393 * parent query's answer->cname slot. We discard address records from the
394 * wrong name. And finally we cancel the outstanding child queries, and
395 * resubmit address queries for the address families we don't yet have, with
396 * adns__qf_addr_cname set so that we know that we're in the fixup state.
399 static adns_status pap_addr(const parseinfo *pai, int in_rrty, size_t out_rrsz,
400 int *cbyte_io, int cbyte_max, adns_rr_addr *out) {
402 int out_af, out_salen;
403 struct in6_addr v6map;
405 const void *use_addr= pai->dgram + *cbyte_io;
408 case adns_r_a: in_addrlen= 4; out_af= AF_INET; break;
409 case adns_r_aaaa: in_addrlen= 16; out_af= AF_INET6; break;
413 if ((*cbyte_io + in_addrlen) != cbyte_max) return adns_s_invaliddata;
415 if (out_af==AF_INET &&
416 (pai->qu->flags & adns_qf_ipv6_mapv4) &&
417 (pai->qu->answer->type & adns__qtf_bigaddr)) {
418 memset(v6map.s6_addr + 0, 0x00, 10);
419 memset(v6map.s6_addr + 10, 0xff, 2);
420 memcpy(v6map.s6_addr + 12, use_addr, 4);
421 use_addr= v6map.s6_addr;
426 case AF_INET: out_salen= sizeof(out->addr.inet); break;
427 case AF_INET6: out_salen= sizeof(out->addr.inet6); break;
431 assert(offsetof(adns_rr_addr, addr) + out_salen <= out_rrsz);
433 memset(&out->addr, 0, out_salen);
435 out->addr.sa.sa_family= out_af;
436 adns__addr_inject(use_addr, &out->addr);
438 *cbyte_io += in_addrlen;
442 static adns_status pa_addr(const parseinfo *pai, int cbyte,
443 int max, void *datap) {
444 int err= pap_addr(pai, pai->qu->answer->type & adns_rrt_typemask,
445 pai->qu->answer->rrsz, &cbyte, max, datap);
447 if (cbyte != max) return adns_s_invaliddata;
451 static int search_sortlist_sa(adns_state ads, const struct sockaddr *sa) {
452 const void *pa = adns__sockaddr_addr(sa);
453 return search_sortlist(ads, sa->sa_family, pa);
456 static int dip_sockaddr(adns_state ads,
457 const struct sockaddr *sa,
458 const struct sockaddr *sb) {
459 if (!ads->sortlist) return 0;
460 return search_sortlist_sa(ads, sa) > search_sortlist_sa(ads, sb);
463 static int di_addr(adns_state ads, const void *datap_a, const void *datap_b) {
464 const adns_rr_addr *ap= datap_a, *bp= datap_b;
465 return dip_sockaddr(ads, &ap->addr.sa, &bp->addr.sa);
468 static int div_addr(void *context, const void *datap_a, const void *datap_b) {
469 const adns_state ads= context;
471 return di_addr(ads, datap_a, datap_b);
474 static adns_status csp_addr(vbuf *vb, const adns_rr_addr *rrp) {
475 char buf[ADNS_ADDR2TEXT_BUFLEN];
476 int len= sizeof(buf);
479 switch (rrp->addr.inet.sin_family) {
484 CSP_ADDSTR("INET6 ");
487 err= adns_addr2text(&rrp->addr.sa,0, buf,&len, 0); assert(!err);
491 sprintf(buf,"AF=%u",rrp->addr.sa.sa_family);
498 static adns_status cs_addr(vbuf *vb, adns_rrtype rrt, const void *datap) {
499 const adns_rr_addr *rrp= datap;
501 return csp_addr(vb,rrp);
504 static int gsz_addr(const typeinfo *typei, adns_rrtype type) {
505 return type & adns__qtf_bigaddr ?
506 sizeof(adns_rr_addr) : sizeof(adns_rr_addr_v4only);
509 static unsigned addr_rrtypes(adns_state ads, adns_rrtype type,
510 adns_queryflags qf) {
511 /* Return a mask of addr_rf_... flags indicating which address families are
512 * wanted, given a query type and flags.
515 adns_queryflags permitaf= 0;
518 if (!(type & adns__qtf_bigaddr))
519 qf= (qf & ~adns_qf_want_allaf) | adns_qf_want_ipv4;
521 if (!(qf & adns_qf_want_allaf)) {
522 qf |= (type & adns__qtf_manyaf) ?
523 adns_qf_want_allaf : adns_qf_want_ipv4;
525 if (ads->iflags & adns_if_permit_ipv4) permitaf |= adns_qf_want_ipv4;
526 if (ads->iflags & adns_if_permit_ipv6) permitaf |= adns_qf_want_ipv6;
527 if (qf & permitaf) qf &= permitaf | ~adns_qf_want_allaf;
530 if (qf & adns_qf_want_ipv4) want |= addr_rf_a;
531 if (qf & adns_qf_want_ipv6) want |= addr_rf_aaaa;
536 static void icb_addr(adns_query parent, adns_query child);
538 static void addr_subqueries(adns_query qu, struct timeval now,
539 adns_queryflags qf_extra,
540 const byte *qd_dgram, int qd_dglen) {
543 adns_queryflags qf= (qu->flags & ~adns_qf_search) | qf_extra;
544 adns_rrtype qtf= qu->answer->type & adns__qtf_deref;
545 unsigned which= qu->ctx.tinfo.addr.want & ~qu->ctx.tinfo.addr.have;
548 memset(&ctx, 0, sizeof(ctx));
549 ctx.callback= icb_addr;
550 for (i=0; i<addr_nrrtypes; i++) {
551 if (!(which & (1 << i))) continue;
552 err= adns__mkquery_frdgram(qu->ads, &qu->vb, &id, qd_dgram,qd_dglen,
553 DNS_HDRSIZE, addr_all_rrtypes[i], qf);
554 if (err) goto x_error;
555 err= adns__internal_submit(qu->ads, &cqu, qu, &tinfo_addrsub,
556 addr_all_rrtypes[i] | qtf,
557 &qu->vb, id, qf, now, &ctx);
558 if (err) goto x_error;
559 cqu->answer->rrsz= qu->answer->rrsz;
561 qu->state= query_childw;
562 LIST_LINK_TAIL(qu->ads->childw, qu);
566 adns__query_fail(qu, err);
569 static adns_status addr_submit(adns_query parent, adns_query *query_r,
570 vbuf *qumsg_vb, int id, unsigned want,
571 adns_queryflags flags, struct timeval now,
573 /* This is effectively a substitute for adns__internal_submit, intended for
574 * the case where the caller (possibly) only wants a subset of the
575 * available record types. The memory management and callback rules are
576 * the same as for adns__internal_submit.
578 * Some differences: the query is linked onto the parent's children
579 * list before exit (though the parent's state is not changed, and
580 * it is not linked into the childw list queue); and we set the
581 * `tinfo' portion of the context structure (yes, modifying *ctx),
582 * since this is, in fact, the main purpose of this function.
585 adns_state ads= parent->ads;
588 adns_rrtype type= ((adns_r_addr & adns_rrt_reprmask) |
589 (parent->answer->type & ~adns_rrt_reprmask));
591 ctx->tinfo.addr.want= want;
592 ctx->tinfo.addr.have= 0;
593 err= adns__internal_submit(ads, &qu, parent, adns__findtype(adns_r_addr),
594 type, qumsg_vb, id, flags, now, ctx);
601 static adns_status append_addrs(adns_query qu, size_t rrsz,
602 adns_rr_addr **dp, int *dlen,
603 const adns_rr_addr *sp, int slen) {
604 /* Append a vector of slen addr records, each of size rrsz, starting at ap,
605 * to a vector starting at *dp, of length *dlen. On successful completion,
606 * *dp and *dlen are updated.
609 size_t drrsz= *dlen*rrsz, srrsz= slen*rrsz;
612 if (!slen) return adns_s_ok;
613 p= adns__alloc_interim(qu, drrsz + srrsz);
616 memcpy(p, *dp, drrsz);
617 adns__free_interim(qu, *dp);
619 memcpy(p + drrsz, sp, srrsz);
621 *dp= (adns_rr_addr *)p;
625 static void propagate_ttl(adns_query to, adns_query from)
626 { if (to->expires > from->expires) to->expires= from->expires; }
628 static adns_status copy_cname_from_child(adns_query parent, adns_query child) {
629 adns_answer *pans= parent->answer, *cans= child->answer;
630 size_t n= strlen(cans->cname) + 1;
632 pans->cname= adns__alloc_preserved(parent, n);
633 if (!pans->cname) R_NOMEM;
634 memcpy(pans->cname, cans->cname, n);
638 static void done_addr_type(adns_query qu, adns_rrtype type) {
639 unsigned f= addr_rrtypeflag(type);
640 assert(f); qu->ctx.tinfo.addr.have |= f;
643 static void icb_addr(adns_query parent, adns_query child) {
644 adns_state ads= parent->ads;
645 adns_answer *pans= parent->answer, *cans= child->answer;
651 propagate_ttl(parent, child);
653 if (!(child->flags & adns__qf_addr_cname) &&
654 (parent->flags & adns__qf_addr_answer) &&
655 (!!pans->cname != !!cans->cname ||
656 (pans->cname && strcmp(pans->cname, cans->cname)))) {
657 /* We've detected an inconsistency in CNAME records, and must deploy
662 /* The child has a CNAME record, but the parent doesn't. We must
663 * discard all of the parent's addresses, and substitute the child's.
666 assert(pans->rrsz == cans->rrsz);
667 adns__free_interim(parent, pans->rrs.bytes);
668 adns__transfer_interim(child, parent, cans->rrs.bytes);
669 pans->rrs.bytes= cans->rrs.bytes;
670 pans->nrrs= cans->nrrs;
671 parent->ctx.tinfo.addr.have= 0;
672 done_addr_type(parent, cans->type);
673 err= copy_cname_from_child(parent, child); if (err) goto x_err;
676 /* We've settled on the CNAME (now) associated with the parent, which
677 * already has appropriate address records. Build a query datagram for
678 * this name so that we can issue child queries for the missing address
679 * families. The child's vbuf looks handy for this.
681 err= adns__mkquery(ads, &child->vb, &id, pans->cname,
682 strlen(pans->cname), &tinfo_addrsub,
683 adns_r_addr, parent->flags);
686 /* Now cancel the remaining children, and try again with the CNAME we've
689 adns__cancel_children(parent);
690 r= adns__gettimeofday(ads,&now); if (r) goto x_gtod;
691 qf= adns__qf_addr_cname;
692 if (!(parent->flags & adns_qf_cname_loose)) qf |= adns_qf_cname_forbid;
693 addr_subqueries(parent, now, qf, child->vb.buf, child->vb.used);
697 if (cans->cname && !pans->cname) {
698 err= copy_cname_from_child(parent, child);
702 if ((parent->flags & adns_qf_search) &&
703 !pans->cname && cans->status == adns_s_nxdomain) {
704 /* We're searching a list of suffixes, and the name doesn't exist. Try
708 adns__cancel_children(parent);
709 adns__free_interim(parent, pans->rrs.bytes);
710 pans->rrs.bytes= 0; pans->nrrs= 0;
711 r= adns__gettimeofday(ads,&now); if (r) goto x_gtod;
712 adns__search_next(ads, parent, now);
716 if (cans->status && cans->status != adns_s_nodata)
717 { err= cans->status; goto x_err; }
719 assert(pans->rrsz == cans->rrsz);
720 err= append_addrs(parent, pans->rrsz,
721 &pans->rrs.addr, &pans->nrrs,
722 cans->rrs.addr, cans->nrrs);
724 done_addr_type(parent, cans->type);
726 if (parent->children.head) LIST_LINK_TAIL(ads->childw, parent);
727 else if (!pans->nrrs) adns__query_fail(parent, adns_s_nodata);
728 else adns__query_done(parent);
729 parent->flags |= adns__qf_addr_answer;
733 /* We have our own error handling, because adns__must_gettimeofday
734 * handles errors by calling adns_globalsystemfailure, which would
735 * reenter the query processing logic. */
736 adns__diag(ads, -1, parent, "gettimeofday/clock_gettime failed: %s",
738 err= adns_s_systemfail;
742 adns__query_fail(parent, err);
745 static void qs_addr(adns_query qu, struct timeval now) {
746 if (!qu->ctx.tinfo.addr.want) {
747 qu->ctx.tinfo.addr.want= addr_rrtypes(qu->ads, qu->answer->type,
749 qu->ctx.tinfo.addr.have= 0;
751 addr_subqueries(qu, now, 0, qu->query_dgram, qu->query_dglen);
755 * _domain (pap,csp,cs)
759 static adns_status pap_domain(const parseinfo *pai, int *cbyte_io, int max,
760 char **domain_r, parsedomain_flags flags) {
764 st= adns__parse_domain(pai->qu->ads, pai->serv, pai->qu, &pai->qu->vb, flags,
765 pai->dgram,pai->dglen, cbyte_io, max);
767 if (!pai->qu->vb.used) return adns_s_invaliddata;
769 dm= adns__alloc_interim(pai->qu, pai->qu->vb.used+1);
772 dm[pai->qu->vb.used]= 0;
773 memcpy(dm,pai->qu->vb.buf,pai->qu->vb.used);
779 static adns_status csp_domain(vbuf *vb, const char *domain) {
781 if (!*domain) CSP_ADDSTR(".");
785 static adns_status cs_domain(vbuf *vb, adns_rrtype rrt, const void *datap) {
786 const char *const *domainp= datap;
787 return csp_domain(vb,*domainp);
790 static adns_status pa_dom_raw(const parseinfo *pai, int cbyte,
791 int max, void *datap) {
795 st= pap_domain(pai, &cbyte, max, rrp, pdf_quoteok);
798 if (cbyte != max) return adns_s_invaliddata;
806 static adns_status pa_host_raw(const parseinfo *pai, int cbyte,
807 int max, void *datap) {
811 st= pap_domain(pai, &cbyte, max, rrp,
812 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
815 if (cbyte != max) return adns_s_invaliddata;
820 * _hostaddr (pap,pa,dip,di,mfp,mf,csp,cs +pap_findaddrs, icb_hostaddr)
823 static adns_status pap_findaddrs(const parseinfo *pai, adns_rr_hostaddr *ha,
824 unsigned *want_io, size_t addrsz,
825 int *cbyte_io, int count, int dmstart) {
827 unsigned typef, want= *want_io, need= want;
828 int type, class, rdlen, rdend, rdstart, ownermatched;
832 for (rri=0, naddrs=0; rri<count; rri++) {
833 st= adns__findrr_anychk(pai->qu, pai->serv, pai->dgram,
834 pai->dglen, cbyte_io,
835 &type, &class, &ttl, &rdlen, &rdstart,
836 pai->dgram, pai->dglen, dmstart, &ownermatched);
838 if (type==-1) continue;
839 if (!ownermatched || class != DNS_CLASS_IN) continue;
840 typef= addr_rrtypeflag(type);
841 if (!(want & typef)) continue;
843 if (!adns__vbuf_ensure(&pai->qu->vb, (naddrs+1)*addrsz)) R_NOMEM;
844 adns__update_expires(pai->qu,ttl,pai->now);
845 rdend= rdstart + rdlen;
846 st= pap_addr(pai, type, addrsz, &rdstart, rdend,
847 (adns_rr_addr *)(pai->qu->vb.buf + naddrs*addrsz));
849 if (rdstart != rdend) return adns_s_invaliddata;
853 st= append_addrs(pai->qu, addrsz, &ha->addrs, &ha->naddrs,
854 (const adns_rr_addr *)pai->qu->vb.buf, naddrs);
856 ha->astatus= adns_s_ok;
859 adns__isort(ha->addrs, naddrs, addrsz, pai->qu->vb.buf,
867 static void icb_hostaddr(adns_query parent, adns_query child) {
868 adns_answer *cans= child->answer;
869 adns_rr_hostaddr *rrp= child->ctx.pinfo.hostaddr;
870 adns_state ads= parent->ads;
872 size_t addrsz= gsz_addr(0, parent->answer->type);
874 st= cans->status == adns_s_nodata ? adns_s_ok : cans->status;
876 propagate_ttl(parent, child);
878 assert(addrsz == cans->rrsz);
879 st= append_addrs(parent, addrsz,
880 &rrp->addrs, &rrp->naddrs,
881 cans->rrs.addr, cans->nrrs);
883 if (!rrp->naddrs) { st= adns_s_nodata; goto done; }
885 if (!adns__vbuf_ensure(&parent->vb, addrsz))
886 { st= adns_s_nomemory; goto done; }
887 adns__isort(rrp->addrs, rrp->naddrs, addrsz, parent->vb.buf,
892 adns__free_interim(parent, rrp->addrs);
894 rrp->naddrs= (st>0 && st<=adns_s_max_tempfail) ? -1 : 0;
898 if (parent->children.head) {
899 LIST_LINK_TAIL(ads->childw,parent);
901 adns__query_done(parent);
905 static adns_status pap_hostaddr(const parseinfo *pai, int *cbyte_io,
906 int max, adns_rr_hostaddr *rrp) {
912 adns_queryflags nflags;
914 size_t addrsz= gsz_addr(0, pai->qu->answer->type);
916 dmstart= cbyte= *cbyte_io;
917 st= pap_domain(pai, &cbyte, max, &rrp->host,
918 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
922 rrp->astatus= adns_s_ok;
928 want= addr_rrtypes(pai->ads, pai->qu->answer->type, pai->qu->flags);
930 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->nscount, dmstart);
932 if (!want) return adns_s_ok;
934 st= pap_findaddrs(pai, rrp, &want, addrsz, &cbyte, pai->arcount, dmstart);
936 if (!want) return adns_s_ok;
938 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
939 pai->dgram, pai->dglen, dmstart,
940 adns_r_addr, adns_qf_quoteok_query);
944 ctx.callback= icb_hostaddr;
945 ctx.pinfo.hostaddr= rrp;
947 nflags= adns_qf_quoteok_query | (pai->qu->flags & (adns_qf_want_allaf |
948 adns_qf_ipv6_mapv4));
949 if (!(pai->qu->flags & adns_qf_cname_loose)) nflags |= adns_qf_cname_forbid;
951 st= addr_submit(pai->qu, &nqu, &pai->qu->vb, id, want,
952 nflags, pai->now, &ctx);
958 static adns_status pa_hostaddr(const parseinfo *pai, int cbyte,
959 int max, void *datap) {
960 adns_rr_hostaddr *rrp= datap;
963 st= pap_hostaddr(pai, &cbyte, max, rrp);
965 if (cbyte != max) return adns_s_invaliddata;
970 static int dip_hostaddr(adns_state ads,
971 const adns_rr_hostaddr *ap, const adns_rr_hostaddr *bp) {
972 if (ap->astatus != bp->astatus) return ap->astatus;
973 if (ap->astatus) return 0;
975 return dip_sockaddr(ads, &ap->addrs[0].addr.sa, &bp->addrs[0].addr.sa);
978 static int di_hostaddr(adns_state ads,
979 const void *datap_a, const void *datap_b) {
980 const adns_rr_hostaddr *ap= datap_a, *bp= datap_b;
982 return dip_hostaddr(ads, ap,bp);
985 static void mfp_hostaddr(adns_query qu, adns_rr_hostaddr *rrp) {
987 size_t addrsz= gsz_addr(0, qu->answer->type);
989 adns__makefinal_str(qu,&rrp->host);
991 adns__makefinal_block(qu, &tablev, rrp->naddrs*addrsz);
995 static void mf_hostaddr(adns_query qu, void *datap) {
996 adns_rr_hostaddr *rrp= datap;
998 mfp_hostaddr(qu,rrp);
1001 static adns_status csp_hostaddr(vbuf *vb, adns_rrtype rrt,
1002 const adns_rr_hostaddr *rrp) {
1007 size_t addrsz= gsz_addr(0, rrt);
1009 st= csp_domain(vb,rrp->host); if (st) return st;
1012 CSP_ADDSTR(adns_errtypeabbrev(rrp->astatus));
1014 sprintf(buf," %d ",rrp->astatus);
1017 CSP_ADDSTR(adns_errabbrev(rrp->astatus));
1020 errstr= adns_strerror(rrp->astatus);
1021 st= csp_qstring(vb,errstr,strlen(errstr)); if (st) return st;
1023 if (rrp->naddrs >= 0) {
1025 for (i=0; i<rrp->naddrs; i++) {
1027 st= csp_addr(vb, (const void*)((const char*)rrp->addrs + addrsz*i));
1036 static adns_status cs_hostaddr(vbuf *vb, adns_rrtype rrt, const void *datap) {
1037 const adns_rr_hostaddr *rrp= datap;
1039 return csp_hostaddr(vb,rrt,rrp);
1046 static adns_status pa_mx_raw(const parseinfo *pai, int cbyte,
1047 int max, void *datap) {
1048 const byte *dgram= pai->dgram;
1049 adns_rr_intstr *rrp= datap;
1053 if (cbyte+2 > max) return adns_s_invaliddata;
1056 st= pap_domain(pai, &cbyte, max, &rrp->str,
1057 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1060 if (cbyte != max) return adns_s_invaliddata;
1064 static int di_mx_raw(adns_state ads, const void *datap_a, const void *datap_b) {
1065 const adns_rr_intstr *ap= datap_a, *bp= datap_b;
1067 if (ap->i < bp->i) return 0;
1068 if (ap->i > bp->i) return 1;
1076 static adns_status pa_mx(const parseinfo *pai, int cbyte,
1077 int max, void *datap) {
1078 const byte *dgram= pai->dgram;
1079 adns_rr_inthostaddr *rrp= datap;
1083 if (cbyte+2 > max) return adns_s_invaliddata;
1086 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha);
1089 if (cbyte != max) return adns_s_invaliddata;
1093 static int di_mx(adns_state ads, const void *datap_a, const void *datap_b) {
1094 const adns_rr_inthostaddr *ap= datap_a, *bp= datap_b;
1096 if (ap->i < bp->i) return 0;
1097 if (ap->i > bp->i) return 1;
1098 return dip_hostaddr(ads, &ap->ha, &bp->ha);
1102 * _inthostaddr (mf,cs)
1105 static void mf_inthostaddr(adns_query qu, void *datap) {
1106 adns_rr_inthostaddr *rrp= datap;
1108 mfp_hostaddr(qu,&rrp->ha);
1111 static adns_status csp_intofinthost(vbuf *vb, int i) {
1114 if (i < 0 || i > 0xffff)
1115 /* currently only used for MX whose priorities are 16-bit */
1116 return adns_s_invaliddata;
1118 sprintf(buf,"%u ",i);
1123 static adns_status cs_inthostaddr(vbuf *vb, adns_rrtype rrt, const void *datap) {
1124 const adns_rr_inthostaddr *rrp= datap;
1127 st = csp_intofinthost(vb,rrp->i); if (st) return st;
1128 return csp_hostaddr(vb,rrt,&rrp->ha);
1135 static adns_status cs_inthost(vbuf *vb, adns_rrtype rrt, const void *datap) {
1136 const adns_rr_intstr *rrp= datap;
1139 st = csp_intofinthost(vb,rrp->i); if (st) return st;
1140 return csp_domain(vb,rrp->str);
1144 * _ptr (ckl,pa +icb_ptr)
1147 static adns_status ckl_ptr(adns_state ads, adns_queryflags flags,
1148 union checklabel_state *cls, qcontext *ctx,
1149 int labnum, const char *dgram,
1150 int labstart, int lablen) {
1152 if (!adns__revparse_label(&cls->ptr, labnum, dgram,labstart,lablen))
1153 return adns_s_querydomainwrong;
1155 if (!adns__revparse_done(&cls->ptr, dgram, labnum,
1156 &ctx->tinfo.ptr.rev_rrtype,
1157 &ctx->tinfo.ptr.addr))
1158 return adns_s_querydomainwrong;
1163 static void icb_ptr(adns_query parent, adns_query child) {
1164 adns_answer *cans= child->answer;
1165 const adns_sockaddr *queried;
1166 const unsigned char *found;
1167 adns_state ads= parent->ads;
1170 if (cans->status == adns_s_nxdomain || cans->status == adns_s_nodata) {
1171 adns__query_fail(parent,adns_s_inconsistent);
1173 } else if (cans->status) {
1174 adns__query_fail(parent,cans->status);
1178 queried= &parent->ctx.tinfo.ptr.addr;
1179 for (i=0, found=cans->rrs.bytes; i<cans->nrrs; i++, found+=cans->rrsz) {
1180 if (adns__addrs_equal_raw(&queried->sa,
1181 parent->ctx.tinfo.ptr.addr.sa.sa_family,found)) {
1182 if (!parent->children.head) {
1183 adns__query_done(parent);
1186 LIST_LINK_TAIL(ads->childw,parent);
1192 adns__query_fail(parent,adns_s_inconsistent);
1195 static adns_status pa_ptr(const parseinfo *pai, int dmstart,
1196 int max, void *datap) {
1199 adns_rrtype rrtype= pai->qu->ctx.tinfo.ptr.rev_rrtype;
1205 st= pap_domain(pai, &cbyte, max, rrp,
1206 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1208 if (cbyte != max) return adns_s_invaliddata;
1210 st= adns__mkquery_frdgram(pai->ads, &pai->qu->vb, &id,
1211 pai->dgram, pai->dglen, dmstart,
1212 rrtype, adns_qf_quoteok_query);
1216 ctx.callback= icb_ptr;
1217 memset(&ctx.pinfo,0,sizeof(ctx.pinfo));
1218 memset(&ctx.tinfo,0,sizeof(ctx.tinfo));
1219 st= adns__internal_submit(pai->ads, &nqu, pai->qu,
1220 adns__findtype(rrtype),
1221 rrtype, &pai->qu->vb, id,
1222 adns_qf_quoteok_query, pai->now, &ctx);
1232 static void mf_strpair(adns_query qu, void *datap) {
1233 adns_rr_strpair *rrp= datap;
1235 adns__makefinal_str(qu,&rrp->array[0]);
1236 adns__makefinal_str(qu,&rrp->array[1]);
1243 static void mf_intstrpair(adns_query qu, void *datap) {
1244 adns_rr_intstrpair *rrp= datap;
1246 adns__makefinal_str(qu,&rrp->array[0].str);
1247 adns__makefinal_str(qu,&rrp->array[1].str);
1254 static adns_status pa_hinfo(const parseinfo *pai, int cbyte,
1255 int max, void *datap) {
1256 adns_rr_intstrpair *rrp= datap;
1260 for (i=0; i<2; i++) {
1261 st= pap_qstring(pai, &cbyte, max, &rrp->array[i].i, &rrp->array[i].str);
1265 if (cbyte != max) return adns_s_invaliddata;
1271 * _mailbox (pap,cs +pap_mailbox822)
1274 static adns_status pap_mailbox822(const parseinfo *pai,
1275 int *cbyte_io, int max, char **mb_r) {
1276 int lablen, labstart, i, needquote, c, r, neednorm;
1277 const unsigned char *p;
1279 findlabel_state fls;
1285 adns__findlabel_start(&fls, pai->ads,
1287 pai->dgram, pai->dglen, max,
1288 *cbyte_io, cbyte_io);
1289 st= adns__findlabel_next(&fls,&lablen,&labstart);
1292 adns__vbuf_appendstr(vb,".");
1297 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++) {
1299 if ((c&~128) < 32 || (c&~128) == 127) return adns_s_invaliddata;
1300 if (c == '.' && !neednorm) neednorm= 1;
1301 else if (c==' ' || c>=127 || ctype_822special(c)) needquote++;
1305 if (needquote || neednorm) {
1306 r= adns__vbuf_ensure(vb, lablen+needquote+4); if (!r) R_NOMEM;
1307 adns__vbuf_appendq(vb,"\"",1);
1308 for (i=0, needquote=0, p= pai->dgram+labstart; i<lablen; i++, p++) {
1310 if (c == '"' || c=='\\') adns__vbuf_appendq(vb,"\\",1);
1311 adns__vbuf_appendq(vb,p,1);
1313 adns__vbuf_appendq(vb,"\"",1);
1315 r= adns__vbuf_append(vb, pai->dgram+labstart, lablen); if (!r) R_NOMEM;
1318 r= adns__vbuf_appendstr(vb,"@"); if (!r) R_NOMEM;
1320 st= adns__parse_domain_more(&fls,pai->ads, pai->qu,vb,0, pai->dgram);
1324 str= adns__alloc_interim(pai->qu, vb->used+1); if (!str) R_NOMEM;
1325 memcpy(str,vb->buf,vb->used);
1331 static adns_status pap_mailbox(const parseinfo *pai, int *cbyte_io, int max,
1333 if (pai->qu->typei->typekey & adns__qtf_mail822) {
1334 return pap_mailbox822(pai, cbyte_io, max, mb_r);
1336 return pap_domain(pai, cbyte_io, max, mb_r, pdf_quoteok);
1340 static adns_status csp_mailbox(vbuf *vb, const char *mailbox) {
1341 return csp_domain(vb,mailbox);
1348 static adns_status pa_rp(const parseinfo *pai, int cbyte,
1349 int max, void *datap) {
1350 adns_rr_strpair *rrp= datap;
1353 st= pap_mailbox(pai, &cbyte, max, &rrp->array[0]);
1356 st= pap_domain(pai, &cbyte, max, &rrp->array[1], pdf_quoteok);
1359 if (cbyte != max) return adns_s_invaliddata;
1363 static adns_status cs_rp(vbuf *vb, adns_rrtype rrt, const void *datap) {
1364 const adns_rr_strpair *rrp= datap;
1367 st= csp_mailbox(vb,rrp->array[0]); if (st) return st;
1369 st= csp_domain(vb,rrp->array[1]); if (st) return st;
1378 static adns_status pa_soa(const parseinfo *pai, int cbyte,
1379 int max, void *datap) {
1380 adns_rr_soa *rrp= datap;
1381 const byte *dgram= pai->dgram;
1385 st= pap_domain(pai, &cbyte, max, &rrp->mname,
1386 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1389 st= pap_mailbox(pai, &cbyte, max, &rrp->rname);
1392 if (cbyte+20 != max) return adns_s_invaliddata;
1394 for (i=0; i<5; i++) {
1396 (&rrp->serial)[i]= GET_L(cbyte, v);
1402 static void mf_soa(adns_query qu, void *datap) {
1403 adns_rr_soa *rrp= datap;
1405 adns__makefinal_str(qu,&rrp->mname);
1406 adns__makefinal_str(qu,&rrp->rname);
1409 static adns_status cs_soa(vbuf *vb, adns_rrtype rrt, const void *datap) {
1410 const adns_rr_soa *rrp= datap;
1415 st= csp_domain(vb,rrp->mname); if (st) return st;
1417 st= csp_mailbox(vb,rrp->rname); if (st) return st;
1419 for (i=0; i<5; i++) {
1420 if (rrp->serial > 0xffffffffUL)
1421 return adns_s_invaliddata;
1422 sprintf(buf," %lu",(&rrp->serial)[i]);
1430 * _srv* (ckl,(pap),pa*2,mf*2,di,(csp),cs*2,postsort)
1433 static adns_status ckl_srv(adns_state ads, adns_queryflags flags,
1434 union checklabel_state *cls, qcontext *ctx,
1435 int labnum, const char *dgram,
1436 int labstart, int lablen) {
1437 const char *label = dgram+labstart;
1439 if (flags & adns_qf_quoteok_query) return adns_s_ok;
1440 if (!lablen || label[0] != '_') return adns_s_querydomaininvalid;
1443 return adns__ckl_hostname(ads,flags, cls,ctx, labnum, dgram,labstart,lablen);
1446 static adns_status pap_srv_begin(const parseinfo *pai, int *cbyte_io, int max,
1448 /* might be adns_rr_srvraw* */) {
1449 const byte *dgram= pai->dgram;
1453 if ((*cbyte_io += 6) > max) return adns_s_invaliddata;
1455 rrp->priority= GET_W(cbyte, ti);
1456 rrp->weight= GET_W(cbyte, ti);
1457 rrp->port= GET_W(cbyte, ti);
1461 static adns_status pa_srvraw(const parseinfo *pai, int cbyte,
1462 int max, void *datap) {
1463 adns_rr_srvraw *rrp= datap;
1466 st= pap_srv_begin(pai,&cbyte,max,datap);
1469 st= pap_domain(pai, &cbyte, max, &rrp->host,
1470 pai->qu->flags & adns_qf_quoteok_anshost ? pdf_quoteok : 0);
1473 if (cbyte != max) return adns_s_invaliddata;
1477 static adns_status pa_srvha(const parseinfo *pai, int cbyte,
1478 int max, void *datap) {
1479 adns_rr_srvha *rrp= datap;
1482 st= pap_srv_begin(pai,&cbyte,max,datap); if (st) return st;
1483 st= pap_hostaddr(pai, &cbyte, max, &rrp->ha); if (st) return st;
1484 if (cbyte != max) return adns_s_invaliddata;
1488 static void mf_srvraw(adns_query qu, void *datap) {
1489 adns_rr_srvraw *rrp= datap;
1490 adns__makefinal_str(qu, &rrp->host);
1493 static void mf_srvha(adns_query qu, void *datap) {
1494 adns_rr_srvha *rrp= datap;
1495 mfp_hostaddr(qu,&rrp->ha);
1498 static int di_srv(adns_state ads, const void *datap_a, const void *datap_b) {
1499 const adns_rr_srvraw *ap= datap_a, *bp= datap_b;
1500 /* might be const adns_rr_svhostaddr* */
1502 if (ap->priority < bp->priority) return 0;
1503 if (ap->priority > bp->priority) return 1;
1507 static adns_status csp_srv_begin(vbuf *vb, const adns_rr_srvha *rrp
1508 /* might be adns_rr_srvraw* */) {
1510 if (rrp->priority < 0 || rrp->priority > 0xffff ||
1511 rrp->weight < 0 || rrp->weight > 0xffff ||
1512 rrp->port < 0 || rrp->port > 0xffff)
1513 return adns_s_invaliddata;
1514 sprintf(buf,"%u %u %u ", rrp->priority, rrp->weight, rrp->port);
1519 static adns_status cs_srvraw(vbuf *vb, adns_rrtype rrt, const void *datap) {
1520 const adns_rr_srvraw *rrp= datap;
1523 st= csp_srv_begin(vb,(const void*)rrp); if (st) return st;
1524 return csp_domain(vb,rrp->host);
1527 static adns_status cs_srvha(vbuf *vb, adns_rrtype rrt, const void *datap) {
1528 const adns_rr_srvha *rrp= datap;
1531 st= csp_srv_begin(vb,(const void*)datap); if (st) return st;
1532 return csp_hostaddr(vb,rrt,&rrp->ha);
1535 static void postsort_srv(adns_state ads, void *array, int nrrs,int rrsz,
1536 const struct typeinfo *typei) {
1537 /* we treat everything in the array as if it were an adns_rr_srvha
1538 * even though the array might be of adns_rr_srvraw. That's OK
1539 * because they have the same prefix, which is all we access.
1540 * We use rrsz, too, rather than naive array indexing, of course.
1542 char *workbegin, *workend, *search, *arrayend;
1543 const adns_rr_srvha *rr;
1544 union { adns_rr_srvha ha; adns_rr_srvraw raw; } rrtmp;
1545 int cpriority, totalweight, runtotal;
1548 assert(rrsz <= sizeof(rrtmp));
1549 for (workbegin= array, arrayend= workbegin + rrsz * nrrs;
1550 workbegin < arrayend;
1551 workbegin= workend) {
1552 cpriority= (rr=(void*)workbegin)->priority;
1554 for (workend= workbegin, totalweight= 0;
1555 workend < arrayend && (rr=(void*)workend)->priority == cpriority;
1557 totalweight += rr->weight;
1560 /* Now workbegin..(workend-1) incl. are exactly all of the RRs of
1561 * cpriority. From now on, workbegin points to the `remaining'
1562 * records: we select one record at a time (RFC2782 `Usage rules'
1563 * and `Format of the SRV RR' subsection `Weight') to place at
1564 * workbegin (swapping with the one that was there, and then
1565 * advance workbegin. */
1567 workbegin + rrsz < workend; /* don't bother if just one */
1568 workbegin += rrsz) {
1570 randval= nrand48(ads->rand48xsubi);
1571 randval %= (totalweight + 1);
1572 /* makes it into 0..totalweight inclusive; with 2^10 RRs,
1573 * totalweight must be <= 2^26 so probability nonuniformity is
1574 * no worse than 1 in 2^(31-26) ie 1 in 2^5, ie
1575 * abs(log(P_intended(RR_i) / P_actual(RR_i)) <= log(2^-5).
1578 for (search=workbegin, runtotal=0;
1579 (runtotal += (rr=(void*)search)->weight) < randval;
1581 assert(search < arrayend);
1582 totalweight -= rr->weight;
1583 if (search != workbegin) {
1584 memcpy(&rrtmp, workbegin, rrsz);
1585 memcpy(workbegin, search, rrsz);
1586 memcpy(search, &rrtmp, rrsz);
1591 * dig -t srv _srv._tcp.test.iwj.relativity.greenend.org.uk.
1592 * ./adnshost_s -t srv- _sip._udp.voip.net.cam.ac.uk.
1593 * ./adnshost_s -t srv- _jabber._tcp.jabber.org
1601 static void mf_byteblock(adns_query qu, void *datap) {
1602 adns_rr_byteblock *rrp= datap;
1603 void *bytes= rrp->data;
1604 adns__makefinal_block(qu,&bytes,rrp->len);
1612 static adns_status pa_opaque(const parseinfo *pai, int cbyte,
1613 int max, void *datap) {
1614 adns_rr_byteblock *rrp= datap;
1616 rrp->len= max - cbyte;
1617 rrp->data= adns__alloc_interim(pai->qu, rrp->len);
1618 if (!rrp->data) R_NOMEM;
1619 memcpy(rrp->data, pai->dgram + cbyte, rrp->len);
1623 static adns_status cs_opaque(vbuf *vb, adns_rrtype rrt, const void *datap) {
1624 const adns_rr_byteblock *rrp= datap;
1629 if (rrp->len < 0 || rrp->len > 0xffff)
1630 return adns_s_invaliddata;
1632 sprintf(buf,"\\# %d",rrp->len);
1635 for (l= rrp->len, p= rrp->data;
1638 sprintf(buf," %02x%02x%02x%02x",p[0],p[1],p[2],p[3]);
1644 sprintf(buf," %02x",*p);
1654 static void mf_flat(adns_query qu, void *data) { }
1660 #define TYPESZ_M(member) (sizeof(*((adns_answer*)0)->rrs.member))
1662 #define DEEP_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \
1663 { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_##memb, \
1664 GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \
1665 adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \
1667 #define FLAT_TYPE(code,rrt,fmt,memb,parser,comparer,/*printer*/...) \
1668 { adns_r_##code&adns_rrt_reprmask, rrt,fmt,TYPESZ_M(memb), mf_flat, \
1669 GLUE(cs_, CAR(__VA_ARGS__)),pa_##parser,di_##comparer, \
1670 adns__ckl_hostname, 0, adns__getrrsz_default, adns__query_send, \
1675 static const typeinfo typeinfos[] = {
1676 /* Must be in ascending order of rrtype ! */
1677 /* mem-mgmt code rrt fmt member parser comparer printer */
1679 FLAT_TYPE(a, "A", 0, inaddr, inaddr, inaddr,inaddr ),
1680 DEEP_TYPE(ns_raw, "NS", "raw",str, host_raw,0, domain ),
1681 DEEP_TYPE(cname, "CNAME", 0, str, dom_raw, 0, domain ),
1682 DEEP_TYPE(soa_raw,"SOA", "raw",soa, soa, 0, soa ),
1683 DEEP_TYPE(ptr_raw,"PTR", "raw",str, host_raw,0, domain ),
1684 DEEP_TYPE(hinfo, "HINFO", 0, intstrpair,hinfo, 0, hinfo ),
1685 DEEP_TYPE(mx_raw, "MX", "raw",intstr, mx_raw, mx_raw,inthost ),
1686 DEEP_TYPE(txt, "TXT", 0, manyistr, txt, 0, txt ),
1687 DEEP_TYPE(rp_raw, "RP", "raw",strpair, rp, 0, rp ),
1688 FLAT_TYPE(aaaa, "AAAA", 0, in6addr, in6addr, in6addr,in6addr ),
1689 DEEP_TYPE(srv_raw,"SRV", "raw",srvraw , srvraw, srv, srvraw,
1690 .checklabel= ckl_srv, .postsort= postsort_srv),
1692 FLAT_TYPE(addr, "A", "addr", addr, addr, addr, addr,
1693 .getrrsz= gsz_addr, .query_send= qs_addr),
1694 DEEP_TYPE(ns, "NS", "+addr",hostaddr, hostaddr,hostaddr,hostaddr ),
1695 DEEP_TYPE(ptr, "PTR","checked",str, ptr, 0, domain,
1696 .checklabel= ckl_ptr),
1697 DEEP_TYPE(mx, "MX", "+addr",inthostaddr,mx, mx, inthostaddr, ),
1698 DEEP_TYPE(srv, "SRV","+addr",srvha, srvha, srv, srvha,
1699 .checklabel= ckl_srv, .postsort= postsort_srv),
1701 DEEP_TYPE(soa, "SOA","822", soa, soa, 0, soa ),
1702 DEEP_TYPE(rp, "RP", "822", strpair, rp, 0, rp ),
1705 static const typeinfo tinfo_addrsub =
1706 FLAT_TYPE(none, "<addr>","sub",addr, addr, 0, addr,
1707 .getrrsz= gsz_addr);
1709 static const typeinfo typeinfo_unknown=
1710 DEEP_TYPE(unknown,0, "unknown",byteblock,opaque, 0, opaque );
1712 const typeinfo *adns__findtype(adns_rrtype type) {
1713 const typeinfo *begin, *end, *mid;
1715 if (type & ~(adns_rrtype)0x63ffffff)
1716 /* 0x60000000 is reserved for `harmless' future expansion */
1719 if (type & adns_r_unknown) return &typeinfo_unknown;
1720 type &= adns_rrt_reprmask;
1722 begin= typeinfos; end= typeinfos+(sizeof(typeinfos)/sizeof(typeinfo));
1724 while (begin < end) {
1725 mid= begin + ((end-begin)>>1);
1726 if (mid->typekey == type) return mid;
1727 if (type > mid->typekey) begin= mid+1;