mirror of
https://github.com/monero-project/monero.git
synced 2024-11-18 10:01:02 +00:00
646 lines
17 KiB
C
646 lines
17 KiB
C
|
/*
|
||
|
* iterator/iter_delegpt.c - delegation point with NS and address information.
|
||
|
*
|
||
|
* Copyright (c) 2007, NLnet Labs. All rights reserved.
|
||
|
*
|
||
|
* This software is open source.
|
||
|
*
|
||
|
* Redistribution and use in source and binary forms, with or without
|
||
|
* modification, are permitted provided that the following conditions
|
||
|
* are met:
|
||
|
*
|
||
|
* Redistributions of source code must retain the above copyright notice,
|
||
|
* this list of conditions and the following disclaimer.
|
||
|
*
|
||
|
* Redistributions in binary form must reproduce the above copyright notice,
|
||
|
* this list of conditions and the following disclaimer in the documentation
|
||
|
* and/or other materials provided with the distribution.
|
||
|
*
|
||
|
* Neither the name of the NLNET LABS nor the names of its contributors may
|
||
|
* be used to endorse or promote products derived from this software without
|
||
|
* specific prior written permission.
|
||
|
*
|
||
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
||
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
||
|
* HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
|
||
|
* TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
|
||
|
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
||
|
* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
||
|
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
||
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||
|
*/
|
||
|
|
||
|
/**
|
||
|
* \file
|
||
|
*
|
||
|
* This file implements the Delegation Point. It contains a list of name servers
|
||
|
* and their addresses if known.
|
||
|
*/
|
||
|
#include "config.h"
|
||
|
#include "iterator/iter_delegpt.h"
|
||
|
#include "services/cache/dns.h"
|
||
|
#include "util/regional.h"
|
||
|
#include "util/data/dname.h"
|
||
|
#include "util/data/packed_rrset.h"
|
||
|
#include "util/data/msgreply.h"
|
||
|
#include "util/net_help.h"
|
||
|
#include "ldns/rrdef.h"
|
||
|
#include "ldns/sbuffer.h"
|
||
|
|
||
|
struct delegpt*
|
||
|
delegpt_create(struct regional* region)
|
||
|
{
|
||
|
struct delegpt* dp=(struct delegpt*)regional_alloc(
|
||
|
region, sizeof(*dp));
|
||
|
if(!dp)
|
||
|
return NULL;
|
||
|
memset(dp, 0, sizeof(*dp));
|
||
|
return dp;
|
||
|
}
|
||
|
|
||
|
struct delegpt* delegpt_copy(struct delegpt* dp, struct regional* region)
|
||
|
{
|
||
|
struct delegpt* copy = delegpt_create(region);
|
||
|
struct delegpt_ns* ns;
|
||
|
struct delegpt_addr* a;
|
||
|
if(!copy)
|
||
|
return NULL;
|
||
|
if(!delegpt_set_name(copy, region, dp->name))
|
||
|
return NULL;
|
||
|
copy->bogus = dp->bogus;
|
||
|
copy->has_parent_side_NS = dp->has_parent_side_NS;
|
||
|
for(ns = dp->nslist; ns; ns = ns->next) {
|
||
|
if(!delegpt_add_ns(copy, region, ns->name, ns->lame))
|
||
|
return NULL;
|
||
|
copy->nslist->resolved = ns->resolved;
|
||
|
copy->nslist->got4 = ns->got4;
|
||
|
copy->nslist->got6 = ns->got6;
|
||
|
copy->nslist->done_pside4 = ns->done_pside4;
|
||
|
copy->nslist->done_pside6 = ns->done_pside6;
|
||
|
}
|
||
|
for(a = dp->target_list; a; a = a->next_target) {
|
||
|
if(!delegpt_add_addr(copy, region, &a->addr, a->addrlen,
|
||
|
a->bogus, a->lame))
|
||
|
return NULL;
|
||
|
}
|
||
|
return copy;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
delegpt_set_name(struct delegpt* dp, struct regional* region, uint8_t* name)
|
||
|
{
|
||
|
log_assert(!dp->dp_type_mlc);
|
||
|
dp->namelabs = dname_count_size_labels(name, &dp->namelen);
|
||
|
dp->name = regional_alloc_init(region, name, dp->namelen);
|
||
|
return dp->name != 0;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
delegpt_add_ns(struct delegpt* dp, struct regional* region, uint8_t* name,
|
||
|
uint8_t lame)
|
||
|
{
|
||
|
struct delegpt_ns* ns;
|
||
|
size_t len;
|
||
|
(void)dname_count_size_labels(name, &len);
|
||
|
log_assert(!dp->dp_type_mlc);
|
||
|
/* slow check for duplicates to avoid counting failures when
|
||
|
* adding the same server as a dependency twice */
|
||
|
if(delegpt_find_ns(dp, name, len))
|
||
|
return 1;
|
||
|
ns = (struct delegpt_ns*)regional_alloc(region,
|
||
|
sizeof(struct delegpt_ns));
|
||
|
if(!ns)
|
||
|
return 0;
|
||
|
ns->next = dp->nslist;
|
||
|
ns->namelen = len;
|
||
|
dp->nslist = ns;
|
||
|
ns->name = regional_alloc_init(region, name, ns->namelen);
|
||
|
ns->resolved = 0;
|
||
|
ns->got4 = 0;
|
||
|
ns->got6 = 0;
|
||
|
ns->lame = lame;
|
||
|
ns->done_pside4 = 0;
|
||
|
ns->done_pside6 = 0;
|
||
|
return ns->name != 0;
|
||
|
}
|
||
|
|
||
|
struct delegpt_ns*
|
||
|
delegpt_find_ns(struct delegpt* dp, uint8_t* name, size_t namelen)
|
||
|
{
|
||
|
struct delegpt_ns* p = dp->nslist;
|
||
|
while(p) {
|
||
|
if(namelen == p->namelen &&
|
||
|
query_dname_compare(name, p->name) == 0) {
|
||
|
return p;
|
||
|
}
|
||
|
p = p->next;
|
||
|
}
|
||
|
return NULL;
|
||
|
}
|
||
|
|
||
|
struct delegpt_addr*
|
||
|
delegpt_find_addr(struct delegpt* dp, struct sockaddr_storage* addr,
|
||
|
socklen_t addrlen)
|
||
|
{
|
||
|
struct delegpt_addr* p = dp->target_list;
|
||
|
while(p) {
|
||
|
if(sockaddr_cmp_addr(addr, addrlen, &p->addr, p->addrlen)==0) {
|
||
|
return p;
|
||
|
}
|
||
|
p = p->next_target;
|
||
|
}
|
||
|
return NULL;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
delegpt_add_target(struct delegpt* dp, struct regional* region,
|
||
|
uint8_t* name, size_t namelen, struct sockaddr_storage* addr,
|
||
|
socklen_t addrlen, uint8_t bogus, uint8_t lame)
|
||
|
{
|
||
|
struct delegpt_ns* ns = delegpt_find_ns(dp, name, namelen);
|
||
|
log_assert(!dp->dp_type_mlc);
|
||
|
if(!ns) {
|
||
|
/* ignore it */
|
||
|
return 1;
|
||
|
}
|
||
|
if(!lame) {
|
||
|
if(addr_is_ip6(addr, addrlen))
|
||
|
ns->got6 = 1;
|
||
|
else ns->got4 = 1;
|
||
|
if(ns->got4 && ns->got6)
|
||
|
ns->resolved = 1;
|
||
|
}
|
||
|
return delegpt_add_addr(dp, region, addr, addrlen, bogus, lame);
|
||
|
}
|
||
|
|
||
|
int
|
||
|
delegpt_add_addr(struct delegpt* dp, struct regional* region,
|
||
|
struct sockaddr_storage* addr, socklen_t addrlen, uint8_t bogus,
|
||
|
uint8_t lame)
|
||
|
{
|
||
|
struct delegpt_addr* a;
|
||
|
log_assert(!dp->dp_type_mlc);
|
||
|
/* check for duplicates */
|
||
|
if((a = delegpt_find_addr(dp, addr, addrlen))) {
|
||
|
if(bogus)
|
||
|
a->bogus = bogus;
|
||
|
if(!lame)
|
||
|
a->lame = 0;
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
a = (struct delegpt_addr*)regional_alloc(region,
|
||
|
sizeof(struct delegpt_addr));
|
||
|
if(!a)
|
||
|
return 0;
|
||
|
a->next_target = dp->target_list;
|
||
|
dp->target_list = a;
|
||
|
a->next_result = 0;
|
||
|
a->next_usable = dp->usable_list;
|
||
|
dp->usable_list = a;
|
||
|
memcpy(&a->addr, addr, addrlen);
|
||
|
a->addrlen = addrlen;
|
||
|
a->attempts = 0;
|
||
|
a->bogus = bogus;
|
||
|
a->lame = lame;
|
||
|
a->dnsseclame = 0;
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
void
|
||
|
delegpt_count_ns(struct delegpt* dp, size_t* numns, size_t* missing)
|
||
|
{
|
||
|
struct delegpt_ns* ns;
|
||
|
*numns = 0;
|
||
|
*missing = 0;
|
||
|
for(ns = dp->nslist; ns; ns = ns->next) {
|
||
|
(*numns)++;
|
||
|
if(!ns->resolved)
|
||
|
(*missing)++;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void
|
||
|
delegpt_count_addr(struct delegpt* dp, size_t* numaddr, size_t* numres,
|
||
|
size_t* numavail)
|
||
|
{
|
||
|
struct delegpt_addr* a;
|
||
|
*numaddr = 0;
|
||
|
*numres = 0;
|
||
|
*numavail = 0;
|
||
|
for(a = dp->target_list; a; a = a->next_target) {
|
||
|
(*numaddr)++;
|
||
|
}
|
||
|
for(a = dp->result_list; a; a = a->next_result) {
|
||
|
(*numres)++;
|
||
|
}
|
||
|
for(a = dp->usable_list; a; a = a->next_usable) {
|
||
|
(*numavail)++;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void delegpt_log(enum verbosity_value v, struct delegpt* dp)
|
||
|
{
|
||
|
char buf[LDNS_MAX_DOMAINLEN+1];
|
||
|
struct delegpt_ns* ns;
|
||
|
struct delegpt_addr* a;
|
||
|
size_t missing=0, numns=0, numaddr=0, numres=0, numavail=0;
|
||
|
if(verbosity < v)
|
||
|
return;
|
||
|
dname_str(dp->name, buf);
|
||
|
if(dp->nslist == NULL && dp->target_list == NULL) {
|
||
|
log_info("DelegationPoint<%s>: empty", buf);
|
||
|
return;
|
||
|
}
|
||
|
delegpt_count_ns(dp, &numns, &missing);
|
||
|
delegpt_count_addr(dp, &numaddr, &numres, &numavail);
|
||
|
log_info("DelegationPoint<%s>: %u names (%u missing), "
|
||
|
"%u addrs (%u result, %u avail)%s",
|
||
|
buf, (unsigned)numns, (unsigned)missing,
|
||
|
(unsigned)numaddr, (unsigned)numres, (unsigned)numavail,
|
||
|
(dp->has_parent_side_NS?" parentNS":" cacheNS"));
|
||
|
if(verbosity >= VERB_ALGO) {
|
||
|
for(ns = dp->nslist; ns; ns = ns->next) {
|
||
|
dname_str(ns->name, buf);
|
||
|
log_info(" %s %s%s%s%s%s%s%s", buf,
|
||
|
(ns->resolved?"*":""),
|
||
|
(ns->got4?" A":""), (ns->got6?" AAAA":""),
|
||
|
(dp->bogus?" BOGUS":""), (ns->lame?" PARENTSIDE":""),
|
||
|
(ns->done_pside4?" PSIDE_A":""),
|
||
|
(ns->done_pside6?" PSIDE_AAAA":""));
|
||
|
}
|
||
|
for(a = dp->target_list; a; a = a->next_target) {
|
||
|
const char* str = " ";
|
||
|
if(a->bogus && a->lame) str = " BOGUS ADDR_LAME ";
|
||
|
else if(a->bogus) str = " BOGUS ";
|
||
|
else if(a->lame) str = " ADDR_LAME ";
|
||
|
log_addr(VERB_ALGO, str, &a->addr, a->addrlen);
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void
|
||
|
delegpt_add_unused_targets(struct delegpt* dp)
|
||
|
{
|
||
|
struct delegpt_addr* usa = dp->usable_list;
|
||
|
dp->usable_list = NULL;
|
||
|
while(usa) {
|
||
|
usa->next_result = dp->result_list;
|
||
|
dp->result_list = usa;
|
||
|
usa = usa->next_usable;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
size_t
|
||
|
delegpt_count_targets(struct delegpt* dp)
|
||
|
{
|
||
|
struct delegpt_addr* a;
|
||
|
size_t n = 0;
|
||
|
for(a = dp->target_list; a; a = a->next_target)
|
||
|
n++;
|
||
|
return n;
|
||
|
}
|
||
|
|
||
|
size_t
|
||
|
delegpt_count_missing_targets(struct delegpt* dp)
|
||
|
{
|
||
|
struct delegpt_ns* ns;
|
||
|
size_t n = 0;
|
||
|
for(ns = dp->nslist; ns; ns = ns->next)
|
||
|
if(!ns->resolved)
|
||
|
n++;
|
||
|
return n;
|
||
|
}
|
||
|
|
||
|
/** find NS rrset in given list */
|
||
|
static struct ub_packed_rrset_key*
|
||
|
find_NS(struct reply_info* rep, size_t from, size_t to)
|
||
|
{
|
||
|
size_t i;
|
||
|
for(i=from; i<to; i++) {
|
||
|
if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS)
|
||
|
return rep->rrsets[i];
|
||
|
}
|
||
|
return NULL;
|
||
|
}
|
||
|
|
||
|
struct delegpt*
|
||
|
delegpt_from_message(struct dns_msg* msg, struct regional* region)
|
||
|
{
|
||
|
struct ub_packed_rrset_key* ns_rrset = NULL;
|
||
|
struct delegpt* dp;
|
||
|
size_t i;
|
||
|
/* look for NS records in the authority section... */
|
||
|
ns_rrset = find_NS(msg->rep, msg->rep->an_numrrsets,
|
||
|
msg->rep->an_numrrsets+msg->rep->ns_numrrsets);
|
||
|
|
||
|
/* In some cases (even legitimate, perfectly legal cases), the
|
||
|
* NS set for the "referral" might be in the answer section. */
|
||
|
if(!ns_rrset)
|
||
|
ns_rrset = find_NS(msg->rep, 0, msg->rep->an_numrrsets);
|
||
|
|
||
|
/* If there was no NS rrset in the authority section, then this
|
||
|
* wasn't a referral message. (It might not actually be a
|
||
|
* referral message anyway) */
|
||
|
if(!ns_rrset)
|
||
|
return NULL;
|
||
|
|
||
|
/* If we found any, then Yay! we have a delegation point. */
|
||
|
dp = delegpt_create(region);
|
||
|
if(!dp)
|
||
|
return NULL;
|
||
|
dp->has_parent_side_NS = 1; /* created from message */
|
||
|
if(!delegpt_set_name(dp, region, ns_rrset->rk.dname))
|
||
|
return NULL;
|
||
|
if(!delegpt_rrset_add_ns(dp, region, ns_rrset, 0))
|
||
|
return NULL;
|
||
|
|
||
|
/* add glue, A and AAAA in answer and additional section */
|
||
|
for(i=0; i<msg->rep->rrset_count; i++) {
|
||
|
struct ub_packed_rrset_key* s = msg->rep->rrsets[i];
|
||
|
/* skip auth section. FIXME really needed?*/
|
||
|
if(msg->rep->an_numrrsets <= i &&
|
||
|
i < (msg->rep->an_numrrsets+msg->rep->ns_numrrsets))
|
||
|
continue;
|
||
|
|
||
|
if(ntohs(s->rk.type) == LDNS_RR_TYPE_A) {
|
||
|
if(!delegpt_add_rrset_A(dp, region, s, 0))
|
||
|
return NULL;
|
||
|
} else if(ntohs(s->rk.type) == LDNS_RR_TYPE_AAAA) {
|
||
|
if(!delegpt_add_rrset_AAAA(dp, region, s, 0))
|
||
|
return NULL;
|
||
|
}
|
||
|
}
|
||
|
return dp;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
delegpt_rrset_add_ns(struct delegpt* dp, struct regional* region,
|
||
|
struct ub_packed_rrset_key* ns_rrset, uint8_t lame)
|
||
|
{
|
||
|
struct packed_rrset_data* nsdata = (struct packed_rrset_data*)
|
||
|
ns_rrset->entry.data;
|
||
|
size_t i;
|
||
|
log_assert(!dp->dp_type_mlc);
|
||
|
if(nsdata->security == sec_status_bogus)
|
||
|
dp->bogus = 1;
|
||
|
for(i=0; i<nsdata->count; i++) {
|
||
|
if(nsdata->rr_len[i] < 2+1) continue; /* len + root label */
|
||
|
if(dname_valid(nsdata->rr_data[i]+2, nsdata->rr_len[i]-2) !=
|
||
|
(size_t)sldns_read_uint16(nsdata->rr_data[i]))
|
||
|
continue; /* bad format */
|
||
|
/* add rdata of NS (= wirefmt dname), skip rdatalen bytes */
|
||
|
if(!delegpt_add_ns(dp, region, nsdata->rr_data[i]+2, lame))
|
||
|
return 0;
|
||
|
}
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
delegpt_add_rrset_A(struct delegpt* dp, struct regional* region,
|
||
|
struct ub_packed_rrset_key* ak, uint8_t lame)
|
||
|
{
|
||
|
struct packed_rrset_data* d=(struct packed_rrset_data*)ak->entry.data;
|
||
|
size_t i;
|
||
|
struct sockaddr_in sa;
|
||
|
socklen_t len = (socklen_t)sizeof(sa);
|
||
|
log_assert(!dp->dp_type_mlc);
|
||
|
memset(&sa, 0, len);
|
||
|
sa.sin_family = AF_INET;
|
||
|
sa.sin_port = (in_port_t)htons(UNBOUND_DNS_PORT);
|
||
|
for(i=0; i<d->count; i++) {
|
||
|
if(d->rr_len[i] != 2 + INET_SIZE)
|
||
|
continue;
|
||
|
memmove(&sa.sin_addr, d->rr_data[i]+2, INET_SIZE);
|
||
|
if(!delegpt_add_target(dp, region, ak->rk.dname,
|
||
|
ak->rk.dname_len, (struct sockaddr_storage*)&sa,
|
||
|
len, (d->security==sec_status_bogus), lame))
|
||
|
return 0;
|
||
|
}
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
delegpt_add_rrset_AAAA(struct delegpt* dp, struct regional* region,
|
||
|
struct ub_packed_rrset_key* ak, uint8_t lame)
|
||
|
{
|
||
|
struct packed_rrset_data* d=(struct packed_rrset_data*)ak->entry.data;
|
||
|
size_t i;
|
||
|
struct sockaddr_in6 sa;
|
||
|
socklen_t len = (socklen_t)sizeof(sa);
|
||
|
log_assert(!dp->dp_type_mlc);
|
||
|
memset(&sa, 0, len);
|
||
|
sa.sin6_family = AF_INET6;
|
||
|
sa.sin6_port = (in_port_t)htons(UNBOUND_DNS_PORT);
|
||
|
for(i=0; i<d->count; i++) {
|
||
|
if(d->rr_len[i] != 2 + INET6_SIZE) /* rdatalen + len of IP6 */
|
||
|
continue;
|
||
|
memmove(&sa.sin6_addr, d->rr_data[i]+2, INET6_SIZE);
|
||
|
if(!delegpt_add_target(dp, region, ak->rk.dname,
|
||
|
ak->rk.dname_len, (struct sockaddr_storage*)&sa,
|
||
|
len, (d->security==sec_status_bogus), lame))
|
||
|
return 0;
|
||
|
}
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
int
|
||
|
delegpt_add_rrset(struct delegpt* dp, struct regional* region,
|
||
|
struct ub_packed_rrset_key* rrset, uint8_t lame)
|
||
|
{
|
||
|
if(!rrset)
|
||
|
return 1;
|
||
|
if(ntohs(rrset->rk.type) == LDNS_RR_TYPE_NS)
|
||
|
return delegpt_rrset_add_ns(dp, region, rrset, lame);
|
||
|
else if(ntohs(rrset->rk.type) == LDNS_RR_TYPE_A)
|
||
|
return delegpt_add_rrset_A(dp, region, rrset, lame);
|
||
|
else if(ntohs(rrset->rk.type) == LDNS_RR_TYPE_AAAA)
|
||
|
return delegpt_add_rrset_AAAA(dp, region, rrset, lame);
|
||
|
log_warn("Unknown rrset type added to delegpt");
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
void delegpt_add_neg_msg(struct delegpt* dp, struct msgreply_entry* msg)
|
||
|
{
|
||
|
struct reply_info* rep = (struct reply_info*)msg->entry.data;
|
||
|
if(!rep) return;
|
||
|
|
||
|
/* if error or no answers */
|
||
|
if(FLAGS_GET_RCODE(rep->flags) != 0 || rep->an_numrrsets == 0) {
|
||
|
struct delegpt_ns* ns = delegpt_find_ns(dp, msg->key.qname,
|
||
|
msg->key.qname_len);
|
||
|
if(ns) {
|
||
|
if(msg->key.qtype == LDNS_RR_TYPE_A)
|
||
|
ns->got4 = 1;
|
||
|
else if(msg->key.qtype == LDNS_RR_TYPE_AAAA)
|
||
|
ns->got6 = 1;
|
||
|
if(ns->got4 && ns->got6)
|
||
|
ns->resolved = 1;
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void delegpt_no_ipv6(struct delegpt* dp)
|
||
|
{
|
||
|
struct delegpt_ns* ns;
|
||
|
for(ns = dp->nslist; ns; ns = ns->next) {
|
||
|
/* no ipv6, so only ipv4 is enough to resolve a nameserver */
|
||
|
if(ns->got4)
|
||
|
ns->resolved = 1;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void delegpt_no_ipv4(struct delegpt* dp)
|
||
|
{
|
||
|
struct delegpt_ns* ns;
|
||
|
for(ns = dp->nslist; ns; ns = ns->next) {
|
||
|
/* no ipv4, so only ipv6 is enough to resolve a nameserver */
|
||
|
if(ns->got6)
|
||
|
ns->resolved = 1;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
struct delegpt* delegpt_create_mlc(uint8_t* name)
|
||
|
{
|
||
|
struct delegpt* dp=(struct delegpt*)calloc(1, sizeof(*dp));
|
||
|
if(!dp)
|
||
|
return NULL;
|
||
|
dp->dp_type_mlc = 1;
|
||
|
if(name) {
|
||
|
dp->namelabs = dname_count_size_labels(name, &dp->namelen);
|
||
|
dp->name = memdup(name, dp->namelen);
|
||
|
if(!dp->name) {
|
||
|
free(dp);
|
||
|
return NULL;
|
||
|
}
|
||
|
}
|
||
|
return dp;
|
||
|
}
|
||
|
|
||
|
void delegpt_free_mlc(struct delegpt* dp)
|
||
|
{
|
||
|
struct delegpt_ns* n, *nn;
|
||
|
struct delegpt_addr* a, *na;
|
||
|
if(!dp) return;
|
||
|
log_assert(dp->dp_type_mlc);
|
||
|
n = dp->nslist;
|
||
|
while(n) {
|
||
|
nn = n->next;
|
||
|
free(n->name);
|
||
|
free(n);
|
||
|
n = nn;
|
||
|
}
|
||
|
a = dp->target_list;
|
||
|
while(a) {
|
||
|
na = a->next_target;
|
||
|
free(a);
|
||
|
a = na;
|
||
|
}
|
||
|
free(dp->name);
|
||
|
free(dp);
|
||
|
}
|
||
|
|
||
|
int delegpt_set_name_mlc(struct delegpt* dp, uint8_t* name)
|
||
|
{
|
||
|
log_assert(dp->dp_type_mlc);
|
||
|
dp->namelabs = dname_count_size_labels(name, &dp->namelen);
|
||
|
dp->name = memdup(name, dp->namelen);
|
||
|
return (dp->name != NULL);
|
||
|
}
|
||
|
|
||
|
int delegpt_add_ns_mlc(struct delegpt* dp, uint8_t* name, uint8_t lame)
|
||
|
{
|
||
|
struct delegpt_ns* ns;
|
||
|
size_t len;
|
||
|
(void)dname_count_size_labels(name, &len);
|
||
|
log_assert(dp->dp_type_mlc);
|
||
|
/* slow check for duplicates to avoid counting failures when
|
||
|
* adding the same server as a dependency twice */
|
||
|
if(delegpt_find_ns(dp, name, len))
|
||
|
return 1;
|
||
|
ns = (struct delegpt_ns*)malloc(sizeof(struct delegpt_ns));
|
||
|
if(!ns)
|
||
|
return 0;
|
||
|
ns->namelen = len;
|
||
|
ns->name = memdup(name, ns->namelen);
|
||
|
if(!ns->name) {
|
||
|
free(ns);
|
||
|
return 0;
|
||
|
}
|
||
|
ns->next = dp->nslist;
|
||
|
dp->nslist = ns;
|
||
|
ns->resolved = 0;
|
||
|
ns->got4 = 0;
|
||
|
ns->got6 = 0;
|
||
|
ns->lame = (uint8_t)lame;
|
||
|
ns->done_pside4 = 0;
|
||
|
ns->done_pside6 = 0;
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
int delegpt_add_addr_mlc(struct delegpt* dp, struct sockaddr_storage* addr,
|
||
|
socklen_t addrlen, uint8_t bogus, uint8_t lame)
|
||
|
{
|
||
|
struct delegpt_addr* a;
|
||
|
log_assert(dp->dp_type_mlc);
|
||
|
/* check for duplicates */
|
||
|
if((a = delegpt_find_addr(dp, addr, addrlen))) {
|
||
|
if(bogus)
|
||
|
a->bogus = bogus;
|
||
|
if(!lame)
|
||
|
a->lame = 0;
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
a = (struct delegpt_addr*)malloc(sizeof(struct delegpt_addr));
|
||
|
if(!a)
|
||
|
return 0;
|
||
|
a->next_target = dp->target_list;
|
||
|
dp->target_list = a;
|
||
|
a->next_result = 0;
|
||
|
a->next_usable = dp->usable_list;
|
||
|
dp->usable_list = a;
|
||
|
memcpy(&a->addr, addr, addrlen);
|
||
|
a->addrlen = addrlen;
|
||
|
a->attempts = 0;
|
||
|
a->bogus = bogus;
|
||
|
a->lame = lame;
|
||
|
a->dnsseclame = 0;
|
||
|
return 1;
|
||
|
}
|
||
|
|
||
|
int delegpt_add_target_mlc(struct delegpt* dp, uint8_t* name, size_t namelen,
|
||
|
struct sockaddr_storage* addr, socklen_t addrlen, uint8_t bogus,
|
||
|
uint8_t lame)
|
||
|
{
|
||
|
struct delegpt_ns* ns = delegpt_find_ns(dp, name, namelen);
|
||
|
log_assert(dp->dp_type_mlc);
|
||
|
if(!ns) {
|
||
|
/* ignore it */
|
||
|
return 1;
|
||
|
}
|
||
|
if(!lame) {
|
||
|
if(addr_is_ip6(addr, addrlen))
|
||
|
ns->got6 = 1;
|
||
|
else ns->got4 = 1;
|
||
|
if(ns->got4 && ns->got6)
|
||
|
ns->resolved = 1;
|
||
|
}
|
||
|
return delegpt_add_addr_mlc(dp, addr, addrlen, bogus, lame);
|
||
|
}
|
||
|
|
||
|
size_t delegpt_get_mem(struct delegpt* dp)
|
||
|
{
|
||
|
struct delegpt_ns* ns;
|
||
|
size_t s;
|
||
|
if(!dp) return 0;
|
||
|
s = sizeof(*dp) + dp->namelen +
|
||
|
delegpt_count_targets(dp)*sizeof(struct delegpt_addr);
|
||
|
for(ns=dp->nslist; ns; ns=ns->next)
|
||
|
s += sizeof(*ns)+ns->namelen;
|
||
|
return s;
|
||
|
}
|