dighost.c revision 15a44745412679c30a6d022733925af70a38b715
d6fa26d0adaec6c910115be34fe7a5a5f402c14fMark Andrews/*
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * Copyright (C) 2000 Internet Software Consortium.
71cef386fae61275b03e203825680b39fedaa8c6Tinderbox User *
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * Permission to use, copy, modify, and distribute this software for any
5347c0fcb04eaea19d9f39795646239f487c6207Tinderbox User * purpose with or without fee is hereby granted, provided that the above
5347c0fcb04eaea19d9f39795646239f487c6207Tinderbox User * copyright notice and this permission notice appear in all copies.
5347c0fcb04eaea19d9f39795646239f487c6207Tinderbox User *
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM
d6fa26d0adaec6c910115be34fe7a5a5f402c14fMark Andrews * DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User * FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt * NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
cd32f419a8a5432fbb139f56ee73cbf68b9350ccTinderbox User * WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews */
9b469e3c59015b1a4899c9d8395168126fe094fdAutomatic Updater
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews/* $Id: dighost.c,v 1.100 2000/07/27 09:36:28 tale Exp $ */
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews/*
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * Notice to programmers: Do not use this code as an example of how to
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * use the ISC library to perform DNS lookups. Dig and Host both operate
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * on the request level, since they allow fine-tuning of output and are
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * intended as debugging tools. As a result, they perform many of the
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * functions which could be better handled using the dns_resolver
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * functions in most applications.
9b469e3c59015b1a4899c9d8395168126fe094fdAutomatic Updater */
9b469e3c59015b1a4899c9d8395168126fe094fdAutomatic Updater
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews#include <config.h>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews#include <stdlib.h>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews#include <unistd.h>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews#include <netdb.h>
fd2597f75693a2279fdf588bd40dfe2407c42028Tinderbox User#include <string.h>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews#include <limits.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#if (!(defined(HAVE_ADDRINFO) && defined(HAVE_GETADDRINFO)))
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userextern int h_errno;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#endif
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <dns/message.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <dns/name.h>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews#include <dns/rdata.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <dns/rdataclass.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <dns/rdatalist.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <dns/rdataset.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <dns/rdatastruct.h>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews#include <dns/rdatatype.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <dns/result.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <dns/tsig.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <dst/dst.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews#include <isc/app.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <isc/base64.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <isc/entropy.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <isc/lang.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <isc/netdb.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <isc/result.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <isc/string.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <isc/task.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <isc/timer.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <isc/types.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <isc/util.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User#include <dig/dig.h>
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox UserISC_LIST(dig_lookup_t) lookup_list;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userdig_serverlist_t server_list;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox UserISC_LIST(dig_searchlist_t) search_list;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
7e71f05d8643aca84914437c900cb716444507e4Tinderbox Userisc_boolean_t
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User have_ipv6 = ISC_FALSE,
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User specified_source = ISC_FALSE,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews free_now = ISC_FALSE,
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt cancel_now = ISC_FALSE,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews show_details = ISC_FALSE,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews usesearch = ISC_FALSE,
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt qr = ISC_FALSE,
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt is_dst_up = ISC_FALSE,
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews have_domain = ISC_FALSE;
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsin_port_t port = 53;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsunsigned int timeout = 0;
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Huntisc_mem_t *mctx = NULL;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsisc_taskmgr_t *taskmgr = NULL;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userisc_task_t *global_task = NULL;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userisc_timermgr_t *timermgr = NULL;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userisc_socketmgr_t *socketmgr = NULL;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userisc_sockaddr_t bind_address;
7e71f05d8643aca84914437c900cb716444507e4Tinderbox Userisc_sockaddr_t bind_any;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userisc_buffer_t rootbuf;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userint sendcount = 0;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userint recvcount = 0;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsint sockcount = 0;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsint ndots = -1;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userint tries = 2;
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Huntint lookup_counter = 0;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewschar fixeddomain[MXNAME] = "";
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsint exitcode = 9;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewschar keynametext[MXNAME];
71c66a876ecca77923638d3f94cc0783152b2f03Mark Andrewschar keyfile[MXNAME] = "";
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewschar keysecret[MXNAME] = "";
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Huntdns_name_t keyname;
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Huntisc_buffer_t *namebuf = NULL;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsdns_tsigkey_t *key = NULL;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsisc_boolean_t validated = ISC_TRUE;
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Huntisc_entropy_t *entp = NULL;
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Huntisc_mempool_t *commctx = NULL;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsextern isc_boolean_t isc_mem_debugging;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsisc_boolean_t debugging = ISC_FALSE;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userchar *progname = NULL;
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Huntisc_mutex_t lookup_lock;
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Huntdig_lookup_t *current_lookup = NULL;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsisc_uint32_t name_limit = INT_MAX;
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Huntisc_uint32_t rr_limit = INT_MAX;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews/*
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * Apply and clear locks at the event level in global task.
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User */
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews#define LOCK_LOOKUP {\
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt debug("lock_lookup %s:%d", __FILE__, __LINE__);\
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews check_result(isc_mutex_lock((&lookup_lock)), "isc_mutex_lock");\
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt debug("success");\
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews}
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt#define UNLOCK_LOOKUP {\
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews debug("unlock_lookup %s:%d", __FILE__, __LINE__);\
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews check_result(isc_mutex_unlock((&lookup_lock)),\
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews "isc_mutex_unlock");\
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews}
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
b2f07642fd712c8fda81a116bcdde229ab291f33Tinderbox Userstatic void
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Usercancel_lookup(dig_lookup_t *lookup);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
b2f07642fd712c8fda81a116bcdde229ab291f33Tinderbox Userstatic void
b2f07642fd712c8fda81a116bcdde229ab291f33Tinderbox Userrecv_done(isc_task_t *task, isc_event_t *event);
281ed127e3ed6c7e07792c19c3bc4562f71cfa90Tinderbox User
281ed127e3ed6c7e07792c19c3bc4562f71cfa90Tinderbox Userstatic void
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userconnect_timeout(isc_task_t *task, isc_event_t *event);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsstatic int
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Usercount_dots(char *string) {
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User char *s;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews int i = 0;
b2f07642fd712c8fda81a116bcdde229ab291f33Tinderbox User
b2f07642fd712c8fda81a116bcdde229ab291f33Tinderbox User s = string;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User while (*s != '\0') {
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User if (*s == '.')
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews i++;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User s++;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User }
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt return (i);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews}
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userstatic void
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewshex_dump(isc_buffer_t *b) {
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User unsigned int len;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User isc_region_t r;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt isc_buffer_remainingregion(b, &r);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User printf("Printing a buffer with length %d\n", r.length);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews for (len = 0; len < r.length; len++) {
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User printf("%02x ", r.base[len]);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User if (len != 0 && len % 16 == 0)
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews printf("\n");
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews }
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews if (len % 16 != 0)
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User printf("\n");
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User}
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Uservoid
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userfatal(const char *format, ...) {
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt va_list args;
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews fprintf(stderr, "%s: ", progname);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User va_start(args, format);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User vfprintf(stderr, format, args);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews va_end(args);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User fprintf(stderr, "\n");
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User if (exitcode == 0)
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews exitcode = 8;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews exit(exitcode);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews}
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsvoid
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsdebug(const char *format, ...) {
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews va_list args;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews if (debugging) {
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews va_start(args, format);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User vfprintf(stderr, format, args);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User va_end(args);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews fprintf(stderr, "\n");
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User }
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User}
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrewsvoid
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Huntcheck_result(isc_result_t result, const char *msg) {
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews if (result != ISC_R_SUCCESS) {
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User exitcode = 1;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User fatal("%s: %s", msg, isc_result_totext(result));
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews }
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User}
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt/*
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt * Create a server structure, which is part of the lookup structure.
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * This is little more than a linked list of servers to query in hopes
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews * of finding the answer the user is looking for
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt */
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userdig_server_t *
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Usermake_server(const char *servname) {
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews dig_server_t *srv;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User REQUIRE(servname != NULL);
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews debug("make_server(%s)",servname);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews srv = isc_mem_allocate(mctx, sizeof(struct dig_server));
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews if (srv == NULL)
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt fatal("Memory allocation failure in %s:%d",
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews __FILE__, __LINE__);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews strncpy(srv->servername, servname, MXNAME);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User return (srv);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User}
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User/*
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User * Produce a cloned server list. The dest list must have already had
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User * ISC_LIST_INIT applied.
7e71f05d8643aca84914437c900cb716444507e4Tinderbox User */
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Uservoid
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userclone_server_list(dig_serverlist_t src,
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt dig_serverlist_t *dest)
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews{
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews dig_server_t *srv, *newsrv;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews debug("clone_server_list()");
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User srv = ISC_LIST_HEAD(src);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews while (srv != NULL) {
14a656f94b1fd0ababd84a772228dfa52276ba15Evan Hunt newsrv = make_server(srv->servername);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews ISC_LIST_ENQUEUE(*dest, newsrv, link);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews srv = ISC_LIST_NEXT(srv, link);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews }
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User}
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User/*
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User * Create an empty lookup structure, which holds all the information needed
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User * to get an answer to a user's question. This structure contains two
7e71f05d8643aca84914437c900cb716444507e4Tinderbox User * linked lists: the server list (servers to query) and the query list
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User * (outstanding queries which have been made to the listed servers).
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User */
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Userdig_lookup_t *
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox Usermake_empty_lookup(void) {
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User dig_lookup_t *looknew;
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User debug("make_lookup()");
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User INSIST(!free_now);
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew = isc_mem_allocate(mctx, sizeof(struct dig_lookup));
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews if (looknew == NULL)
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User fatal("Memory allocation failure in %s:%d",
7911e6f9de303bca5a3d8b34f4330c8f7cecffaeTinderbox User __FILE__, __LINE__);
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->pending = ISC_TRUE;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->textname[0]=0;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->rdtype=dns_rdatatype_a;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->rdclass=dns_rdataclass_in;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->sendspace = NULL;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->sendmsg = NULL;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->name = NULL;
cd32f419a8a5432fbb139f56ee73cbf68b9350ccTinderbox User looknew->oname = NULL;
9b469e3c59015b1a4899c9d8395168126fe094fdAutomatic Updater looknew->timer = NULL;
9b469e3c59015b1a4899c9d8395168126fe094fdAutomatic Updater looknew->xfr_q = NULL;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->doing_xfr = ISC_FALSE;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->ixfr_serial = ISC_FALSE;
4abdfc917e6635a7c81d1f931a0c79227e72d025Mark Andrews looknew->defname = ISC_FALSE;
4abdfc917e6635a7c81d1f931a0c79227e72d025Mark Andrews looknew->trace = ISC_FALSE;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->trace_root = ISC_FALSE;
9b469e3c59015b1a4899c9d8395168126fe094fdAutomatic Updater looknew->identify = ISC_FALSE;
9b469e3c59015b1a4899c9d8395168126fe094fdAutomatic Updater looknew->udpsize = 0;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->recurse = ISC_TRUE;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->aaonly = ISC_FALSE;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->adflag = ISC_FALSE;
c313914d0e66b20969215e519bbf2ab4ecf39512Tinderbox User looknew->cdflag = ISC_FALSE;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->ns_search_only = ISC_FALSE;
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews looknew->origin = NULL;
looknew->querysig = NULL;
looknew->retries = tries;
looknew->nsfound = 0;
looknew->tcp_mode = ISC_FALSE;
looknew->comments = ISC_TRUE;
looknew->stats = ISC_TRUE;
looknew->section_question = ISC_TRUE;
looknew->section_answer = ISC_TRUE;
looknew->section_authority = ISC_TRUE;
looknew->section_additional = ISC_TRUE;
looknew->new_search = ISC_FALSE;
ISC_LIST_INIT(looknew->q);
ISC_LIST_INIT(looknew->my_server_list);
return (looknew);
}
/*
* Clone a lookup, perhaps copying the server list. This does not clone
* the query list, since it will be regenerated by the setup_lookup()
* function, nor does it queue up the new lookup for processing.
* Caution: If you don't clone the servers, you MUST clone the server
* list seperately from somewhere else, or construct it by hand.
*/
dig_lookup_t *
clone_lookup(dig_lookup_t *lookold, isc_boolean_t servers) {
dig_lookup_t *looknew;
debug("clone_lookup()");
INSIST(!free_now);
looknew = make_empty_lookup();
INSIST(looknew != NULL);
strncpy(looknew->textname, lookold-> textname, MXNAME);
looknew->rdtype = lookold->rdtype;
looknew->rdclass = lookold->rdclass;
looknew->doing_xfr = lookold->doing_xfr;
looknew->ixfr_serial = lookold->ixfr_serial;
looknew->defname = lookold->defname;
looknew->trace = lookold->trace;
looknew->trace_root = lookold->trace_root;
looknew->identify = lookold->identify;
looknew->udpsize = lookold->udpsize;
looknew->recurse = lookold->recurse;
looknew->aaonly = lookold->aaonly;
looknew->adflag = lookold->adflag;
looknew->cdflag = lookold->cdflag;
looknew->ns_search_only = lookold->ns_search_only;
looknew->tcp_mode = lookold->tcp_mode;
looknew->comments = lookold->comments;
looknew->stats = lookold->stats;
looknew->section_question = lookold->section_question;
looknew->section_answer = lookold->section_answer;
looknew->section_authority = lookold->section_authority;
looknew->section_additional = lookold->section_additional;
if (servers)
clone_server_list(lookold->my_server_list,
&looknew->my_server_list);
return (looknew);
}
/*
* Requeue a lookup for further processing, perhaps copying the server
* list. The new lookup structure is returned to the caller, and is
* queued for processing. If servers are not cloned in the requeue, they
* must be added before allowing the current event to complete, since the
* completion of the event may result in the next entry on the lookup
* queue getting run.
*/
dig_lookup_t *
requeue_lookup(dig_lookup_t *lookold, isc_boolean_t servers) {
dig_lookup_t *looknew;
debug("requeue_lookup()");
lookup_counter++;
if (lookup_counter > LOOKUP_LIMIT)
fatal("Too many lookups");
looknew = clone_lookup(lookold, servers);
INSIST(looknew != NULL);
debug("before insertion, init@%p "
"-> %p, new@%p -> %p",
lookold, lookold->link.next, looknew, looknew->link.next);
ISC_LIST_PREPEND(lookup_list, looknew, link);
debug("after insertion, init -> "
"%p, new = %p, new -> %p",
lookold, looknew, looknew->link.next);
return (looknew);
}
static void
setup_text_key(void) {
isc_result_t result;
isc_buffer_t secretbuf;
int secretsize;
unsigned char *secretstore;
isc_stdtime_t now;
debug("setup_text_key()");
result = isc_buffer_allocate(mctx, &namebuf, MXNAME);
check_result(result, "isc_buffer_allocate");
dns_name_init(&keyname, NULL);
check_result(result, "dns_name_init");
isc_buffer_putstr(namebuf, keynametext);
secretsize = strlen(keysecret) * 3 / 4;
secretstore = isc_mem_allocate(mctx, secretsize);
if (secretstore == NULL)
fatal("Memory allocation failure in %s:%d",
__FILE__, __LINE__);
isc_buffer_init(&secretbuf, secretstore, secretsize);
result = isc_base64_decodestring(mctx, keysecret,
&secretbuf);
if (result != ISC_R_SUCCESS) {
printf(";; Couldn't create key %s: %s\n",
keynametext, isc_result_totext(result));
goto SYSSETUP_FAIL;
}
secretsize = isc_buffer_usedlength(&secretbuf);
isc_stdtime_get(&now);
result = dns_name_fromtext(&keyname, namebuf,
dns_rootname, ISC_FALSE,
namebuf);
if (result != ISC_R_SUCCESS) {
printf(";; Couldn't create key %s: %s\n",
keynametext, dns_result_totext(result));
goto SYSSETUP_FAIL;
}
result = dns_tsigkey_create(&keyname, dns_tsig_hmacmd5_name,
secretstore, secretsize,
ISC_TRUE, NULL, now, now, mctx,
NULL, &key);
if (result != ISC_R_SUCCESS) {
printf(";; Couldn't create key %s: %s\n",
keynametext, dns_result_totext(result));
}
SYSSETUP_FAIL:
isc_mem_free(mctx, secretstore);
dns_name_invalidate(&keyname);
isc_buffer_free(&namebuf);
return;
}
static void
setup_file_key(void) {
isc_result_t result;
isc_buffer_t secretbuf;
unsigned char *secretstore = NULL;
int secretlen;
dst_key_t *dstkey = NULL;
isc_stdtime_t now;
debug("setup_file_key()");
result = dst_key_fromnamedfile(keyfile, DST_TYPE_PRIVATE,
mctx, &dstkey);
if (result != ISC_R_SUCCESS) {
fprintf(stderr, "Couldn't read key from %s: %s\n",
keyfile, isc_result_totext(result));
goto failure;
}
secretlen = (dst_key_size(dstkey) + 7) >> 3;
secretstore = isc_mem_allocate(mctx, secretlen);
if (secretstore == NULL)
fatal("out of memory");
isc_buffer_init(&secretbuf, secretstore, secretlen);
result = dst_key_tobuffer(dstkey, &secretbuf);
if (result != ISC_R_SUCCESS) {
fprintf(stderr, "Couldn't read key from %s: %s\n",
keyfile, isc_result_totext(result));
goto failure;
}
isc_stdtime_get(&now);
dns_name_init(&keyname, NULL);
dns_name_clone(dst_key_name(dstkey), &keyname);
result = dns_tsigkey_create(&keyname, dns_tsig_hmacmd5_name,
secretstore, secretlen,
ISC_TRUE, NULL, now, now, mctx,
NULL, &key);
if (result != ISC_R_SUCCESS) {
printf(";; Couldn't create key %s: %s\n",
keynametext, dns_result_totext(result));
}
failure:
if (dstkey != NULL)
dst_key_free(&dstkey);
if (secretstore != NULL)
isc_mem_free(mctx, secretstore);
}
/*
* Setup the system as a whole, reading key information and resolv.conf
* settings.
*/
void
setup_system(void) {
char rcinput[MXNAME];
FILE *fp;
char *ptr;
dig_server_t *srv;
dig_searchlist_t *search;
isc_boolean_t get_servers;
debug("setup_system()");
if (fixeddomain[0] != 0) {
debug("using fixed domain %s", fixeddomain);
search = isc_mem_allocate(mctx, sizeof(struct dig_server));
if (search == NULL)
fatal("Memory allocation failure in %s:%d",
__FILE__, __LINE__);
strncpy(search->origin, fixeddomain, MXNAME - 1);
ISC_LIST_PREPEND(search_list, search, link);
}
free_now = ISC_FALSE;
get_servers = ISC_TF(server_list.head == NULL);
fp = fopen(RESOLVCONF, "r");
if (fp != NULL) {
while (fgets(rcinput, MXNAME, fp) != 0) {
ptr = strtok(rcinput, " \t\r\n");
if (ptr != NULL) {
if (get_servers &&
strcasecmp(ptr, "nameserver") == 0) {
debug("got a nameserver line");
ptr = strtok(NULL, " \t\r\n");
if (ptr != NULL) {
srv = make_server(ptr);
ISC_LIST_APPEND
(server_list,
srv, link);
}
} else if (strcasecmp(ptr, "options") == 0) {
ptr = strtok(NULL, " \t\r\n");
if (ptr != NULL) {
if((strncasecmp(ptr, "ndots:",
6) == 0) &&
(ndots == -1)) {
ndots = atoi(
&ptr[6]);
debug("ndots is "
"%d.",
ndots);
}
}
} else if (strcasecmp(ptr, "search") == 0){
while ((ptr = strtok(NULL, " \t\r\n"))
!= NULL) {
debug("adding search %s",
ptr);
search = isc_mem_allocate(
mctx, sizeof(struct
dig_server));
if (search == NULL)
fatal("Memory "
"allocation "
"failure in %s:"
"%d", __FILE__,
__LINE__);
strncpy(search->
origin,
ptr,
MXNAME - 1);
ISC_LIST_APPEND
(search_list,
search,
link);
}
} else if ((strcasecmp(ptr, "domain") == 0) &&
(fixeddomain[0] == 0 )){
have_domain = ISC_TRUE;
while ((ptr = strtok(NULL, " \t\r\n"))
!= NULL) {
search = isc_mem_allocate(
mctx, sizeof(struct
dig_server));
if (search == NULL)
fatal("Memory "
"allocation "
"failure in %s:"
"%d", __FILE__,
__LINE__);
strncpy(search->
origin,
ptr,
MXNAME - 1);
ISC_LIST_PREPEND
(search_list,
search,
link);
}
}
}
}
fclose(fp);
}
if (ndots == -1)
ndots = 1;
if (server_list.head == NULL) {
srv = make_server("127.0.0.1");
ISC_LIST_APPEND(server_list, srv, link);
}
if (keyfile[0] != 0)
setup_file_key();
else if (keysecret[0] != 0)
setup_text_key();
}
/*
* Setup the ISC and DNS libraries for use by the system.
*/
void
setup_libs(void) {
isc_result_t result;
debug("setup_libs()");
/*
* Warning: This is not particularly good randomness. We'll
* just use random() now for getting id values, but doing so
* does NOT insure that id's cann't be guessed.
*/
srandom(getpid() + (int)&setup_libs);
result = isc_net_probeipv4();
check_result(result, "isc_net_probeipv4");
result = isc_net_probeipv6();
if (result == ISC_R_SUCCESS)
have_ipv6 = ISC_TRUE;
result = isc_mem_create(0, 0, &mctx);
check_result(result, "isc_mem_create");
result = isc_taskmgr_create(mctx, 1, 0, &taskmgr);
check_result(result, "isc_taskmgr_create");
result = isc_task_create(taskmgr, 0, &global_task);
check_result(result, "isc_task_create");
result = isc_timermgr_create(mctx, &timermgr);
check_result(result, "isc_timermgr_create");
result = isc_socketmgr_create(mctx, &socketmgr);
check_result(result, "isc_socketmgr_create");
result = isc_entropy_create(mctx, &entp);
check_result(result, "isc_entropy_create");
result = dst_lib_init(mctx, entp, 0);
check_result(result, "dst_lib_init");
is_dst_up = ISC_TRUE;
result = isc_mempool_create(mctx, COMMSIZE, &commctx);
check_result(result, "isc_mempool_create");
isc_mempool_setname(commctx, "COMMPOOL");
/*
* 6 and 2 set as reasonable parameters for 3 or 4 nameserver
* systems.
*/
isc_mempool_setfreemax(commctx, 6);
isc_mempool_setfillcount(commctx, 2);
result = isc_mutex_init(&lookup_lock);
check_result(result, "isc_mutex_init");
}
/*
* Add EDNS0 option record to a message. Currently, the only supported
* option is UDP buffer size.
*/
static void
add_opt(dns_message_t *msg, isc_uint16_t udpsize) {
dns_rdataset_t *rdataset = NULL;
dns_rdatalist_t *rdatalist = NULL;
dns_rdata_t *rdata = NULL;
isc_result_t result;
debug("add_opt()");
result = dns_message_gettemprdataset(msg, &rdataset);
check_result(result, "dns_message_gettemprdataset");
dns_rdataset_init(rdataset);
result = dns_message_gettemprdatalist(msg, &rdatalist);
check_result(result, "dns_message_gettemprdatalist");
result = dns_message_gettemprdata(msg, &rdata);
check_result(result, "dns_message_gettemprdata");
debug("setting udp size of %d", udpsize);
rdatalist->type = dns_rdatatype_opt;
rdatalist->covers = 0;
rdatalist->rdclass = udpsize;
rdatalist->ttl = 0;
rdata->data = NULL;
rdata->length = 0;
ISC_LIST_INIT(rdatalist->rdata);
ISC_LIST_APPEND(rdatalist->rdata, rdata, link);
dns_rdatalist_tordataset(rdatalist, rdataset);
result = dns_message_setopt(msg, rdataset);
check_result(result, "dns_message_setopt");
}
/*
* Add a question section to a message, asking for the specified name,
* type, and class.
*/
static void
add_question(dns_message_t *message, dns_name_t *name,
dns_rdataclass_t rdclass, dns_rdatatype_t rdtype)
{
dns_rdataset_t *rdataset;
isc_result_t result;
debug("add_question()");
rdataset = NULL;
result = dns_message_gettemprdataset(message, &rdataset);
check_result(result, "dns_message_gettemprdataset()");
dns_rdataset_init(rdataset);
dns_rdataset_makequestion(rdataset, rdclass, rdtype);
ISC_LIST_APPEND(name->list, rdataset, link);
}
/*
* Check if we're done with all the queued lookups, which is true iff
* all sockets, sends, and recvs are accounted for (counters == 0),
* and the lookup list is empty.
* If we are done, pass control back out to dighost_shutdown() (which is
* part of dig.c, host.c, or nslookup.c) to either shutdown the system as
* a whole or reseed the lookup list.
*/
static void
check_if_done(void) {
debug("check_if_done()");
debug("sockcount=%d, recvcount=%d, sendcount=%d, list %s",
sockcount, recvcount, sendcount,
ISC_LIST_EMPTY(lookup_list)?"empty":"full");
if ((sockcount == 0) && (recvcount == 0) && (sendcount == 0)
&& ISC_LIST_EMPTY(lookup_list)) {
debug("shutting down");
dighost_shutdown();
}
}
/*
* Clear out a query when we're done with it. WARNING: This routine
* WILL invalidate the query pointer.
*/
static void
clear_query(dig_query_t *query) {
dig_lookup_t *lookup;
REQUIRE(query != NULL);
debug("clear_query(%p)",query);
lookup = query->lookup;
ISC_LIST_UNLINK(lookup->q, query, link);
if (ISC_LINK_LINKED(&query->recvbuf, link))
ISC_LIST_DEQUEUE(query->recvlist, &query->recvbuf,
link);
if (ISC_LINK_LINKED(&query->lengthbuf, link))
ISC_LIST_DEQUEUE(query->lengthlist, &query->lengthbuf,
link);
INSIST(query->recvspace != NULL);
if (query->sock != NULL) {
isc_socket_detach(&query->sock);
sockcount--;
debug("sockcount=%d", sockcount);
}
isc_mempool_put(commctx, query->recvspace);
isc_buffer_invalidate(&query->recvbuf);
isc_buffer_invalidate(&query->lengthbuf);
isc_mem_free(mctx, query);
}
/*
* Try and clear out a lookup if we're done with it. Return ISC_TRUE if
* the lookup was successfully cleared. If ISC_TRUE is returned, the
* lookup pointer has been invalidated.
*/
static isc_boolean_t
try_clear_lookup(dig_lookup_t *lookup) {
dig_server_t *s;
dig_query_t *q;
void *ptr;
REQUIRE(lookup != NULL);
debug("try_clear_lookup(%p)", lookup);
if (ISC_LIST_HEAD(lookup->q) != NULL) {
if (debugging) {
q = ISC_LIST_HEAD(lookup->q);
while (q != NULL) {
debug ("query to %s still pending",
q->servname);
q = ISC_LIST_NEXT(q, link);
}
return (ISC_FALSE);
}
}
/*
* At this point, we know there are no queries on the lookup,
* so can make it go away also.
*/
debug("cleared");
s = ISC_LIST_HEAD(lookup->my_server_list);
while (s != NULL) {
debug("freeing server %p belonging to %p",
s, lookup);
ptr = s;
s = ISC_LIST_NEXT(s, link);
ISC_LIST_DEQUEUE(lookup->my_server_list,
(dig_server_t *)ptr, link);
isc_mem_free(mctx, ptr);
}
if (lookup->sendmsg != NULL)
dns_message_destroy(&lookup->sendmsg);
if (lookup->querysig != NULL) {
debug("freeing buffer %p", lookup->querysig);
isc_buffer_free(&lookup->querysig);
}
if (lookup->timer != NULL)
isc_timer_detach(&lookup->timer);
if (lookup->sendspace != NULL)
isc_mempool_put(commctx, lookup->sendspace);
isc_mem_free(mctx, lookup);
return (ISC_TRUE);
}
/*
* If we can, start the next lookup in the queue running.
* This assumes that the lookup on the head of the queue hasn't been
* started yet. It also moves the lookup from the head of the queue
* off, setting the current_lookup pointer pointing to it.
*/
void
start_lookup(void) {
dig_lookup_t *next;
debug("start_lookup()");
if (cancel_now)
return;
/*
* If there's a current lookup running, we really shouldn't get
* here.
*/
INSIST(current_lookup == NULL);
next = ISC_LIST_HEAD(lookup_list);
current_lookup = next;
/*
* Put the current lookup somewhere so cancel_all can find it
*/
if (next != NULL) {
ISC_LIST_DEQUEUE(lookup_list, next, link);
setup_lookup(next);
do_lookup(next);
} else {
check_if_done();
}
}
/*
* If we can, clear the current lookup and start the next one running.
* This calls try_clear_lookup, so may invalidate the lookup pointer.
*/
static void
check_next_lookup(dig_lookup_t *lookup) {
dig_query_t *query;
isc_boolean_t still_working=ISC_FALSE;
INSIST(!free_now);
debug("check_next_lookup(%p)", lookup);
for (query = ISC_LIST_HEAD(lookup->q);
query != NULL;
query = ISC_LIST_NEXT(query, link)) {
if (query->working) {
debug("still have a worker", stderr);
still_working=ISC_TRUE;
}
}
if (still_working)
return;
if (try_clear_lookup(lookup)) {
current_lookup = NULL;
start_lookup();
}
}
/*
* Create and queue a new lookup as a followup to the current lookup,
* based on the supplied message and section. This is used in trace and
* name server search modes to start a new lookup using servers from
* NS records in a reply.
*/
static void
followup_lookup(dns_message_t *msg, dig_query_t *query,
dns_section_t section) {
dig_lookup_t *lookup = NULL;
dig_server_t *srv = NULL;
dns_rdataset_t *rdataset = NULL;
dns_rdata_t rdata;
dns_name_t *name = NULL;
isc_result_t result, loopresult;
isc_buffer_t *b = NULL;
isc_region_t r;
isc_boolean_t success = ISC_FALSE;
int len;
INSIST(!free_now);
debug("followup_lookup()");
result = dns_message_firstname(msg,section);
if (result != ISC_R_SUCCESS) {
debug("firstname returned %s",
isc_result_totext(result));
if ((section == DNS_SECTION_ANSWER) &&
(query->lookup->trace || query->lookup->ns_search_only))
followup_lookup(msg, query, DNS_SECTION_AUTHORITY);
return;
}
debug("following up %s", query->lookup->textname);
for (;;) {
name = NULL;
dns_message_currentname(msg, section, &name);
for (rdataset = ISC_LIST_HEAD(name->list);
rdataset != NULL;
rdataset = ISC_LIST_NEXT(rdataset, link)) {
loopresult = dns_rdataset_first(rdataset);
while (loopresult == ISC_R_SUCCESS) {
dns_rdataset_current(rdataset, &rdata);
debug("got rdata with type %d",
rdata.type);
if ((rdata.type == dns_rdatatype_ns) &&
(!query->lookup->trace_root ||
(query->lookup->nsfound < MXSERV)))
{
query->lookup->nsfound++;
result = isc_buffer_allocate(mctx, &b,
BUFSIZE);
check_result(result,
"isc_buffer_allocate");
result = dns_rdata_totext(&rdata,
NULL,
b);
check_result(result,
"dns_rdata_totext");
isc_buffer_usedregion(b, &r);
len = r.length-1;
if (len >= MXNAME)
len = MXNAME-1;
/* Initialize lookup if we've not yet */
debug("found NS %d %.*s",
(int)r.length, (int)r.length,
(char *)r.base);
if (!success) {
success = ISC_TRUE;
lookup_counter++;
cancel_lookup(query->lookup);
lookup = requeue_lookup
(query->lookup,
ISC_FALSE);
lookup->doing_xfr = ISC_FALSE;
lookup->defname = ISC_FALSE;
if (section ==
DNS_SECTION_ANSWER) {
lookup->trace =
ISC_FALSE;
lookup->ns_search_only =
ISC_FALSE;
}
else {
lookup->trace =
query->
lookup->trace;
lookup->ns_search_only =
query->
lookup->ns_search_only;
}
lookup->trace_root = ISC_FALSE;
}
r.base[len]=0;
srv = make_server(r.base);
debug("adding server %s",
srv->servername);
ISC_LIST_APPEND
(lookup->my_server_list,
srv, link);
isc_buffer_free(&b);
}
loopresult = dns_rdataset_next(rdataset);
}
}
result = dns_message_nextname(msg, section);
if (result != ISC_R_SUCCESS)
break;
}
if ((lookup == NULL) && (section == DNS_SECTION_ANSWER) &&
(query->lookup->trace || query->lookup->ns_search_only))
followup_lookup(msg, query, DNS_SECTION_AUTHORITY);
}
/*
* Create and queue a new lookup using the next origin from the origin
* list, read in setup_system().
*/
static isc_boolean_t
next_origin(dns_message_t *msg, dig_query_t *query) {
dig_lookup_t *lookup;
UNUSED(msg);
INSIST(!free_now);
debug("next_origin()");
debug("following up %s", query->lookup->textname);
if (!usesearch)
/*
* We're not using a search list, so don't even think
* about finding the next entry.
*/
return (ISC_FALSE);
if (query->lookup->origin == NULL)
/*
* Then we just did rootorg; there's nothing left.
*/
return (ISC_FALSE);
cancel_lookup(query->lookup);
lookup = requeue_lookup(query->lookup, ISC_TRUE);
lookup->defname = ISC_FALSE;
lookup->origin = ISC_LIST_NEXT(query->lookup->origin, link);
return (ISC_TRUE);
}
/*
* Insert an SOA record into the sendmessage in a lookup. Used for
* creating IXFR queries.
*/
static void
insert_soa(dig_lookup_t *lookup) {
isc_result_t result;
dns_rdata_soa_t soa;
dns_rdata_t *rdata = NULL;
dns_rdatalist_t *rdatalist = NULL;
dns_rdataset_t *rdataset = NULL;
dns_name_t *soaname = NULL;
debug("insert_soa()");
soa.mctx = mctx;
soa.serial = lookup->ixfr_serial;
soa.refresh = 1;
soa.retry = 1;
soa.expire = 1;
soa.minimum = 1;
soa.common.rdclass = dns_rdataclass_in;
soa.common.rdtype = dns_rdatatype_soa;
dns_name_init(&soa.origin, NULL);
dns_name_init(&soa.mname, NULL);
dns_name_clone(lookup->name, &soa.origin);
dns_name_clone(lookup->name, &soa.mname);
isc_buffer_init(&lookup->rdatabuf, lookup->rdatastore,
MXNAME);
result = dns_message_gettemprdata(lookup->sendmsg, &rdata);
check_result(result, "dns_message_gettemprdata");
result = dns_rdata_fromstruct(rdata, dns_rdataclass_in,
dns_rdatatype_soa, &soa,
&lookup->rdatabuf);
check_result(result, "isc_rdata_fromstruct");
result = dns_message_gettemprdatalist(lookup->sendmsg, &rdatalist);
check_result(result, "dns_message_gettemprdatalist");
result = dns_message_gettemprdataset(lookup->sendmsg, &rdataset);
check_result(result, "dns_message_gettemprdataset");
dns_rdatalist_init(rdatalist);
rdatalist->type = dns_rdatatype_soa;
rdatalist->rdclass = dns_rdataclass_in;
rdatalist->covers = dns_rdatatype_soa;
rdatalist->ttl = 1;
ISC_LIST_INIT(rdatalist->rdata);
ISC_LIST_APPEND(rdatalist->rdata, rdata, link);
dns_rdataset_init(rdataset);
dns_rdatalist_tordataset(rdatalist, rdataset);
result = dns_message_gettempname(lookup->sendmsg, &soaname);
check_result(result, "dns_message_gettempname");
dns_name_init(soaname, NULL);
dns_name_clone(lookup->name, soaname);
ISC_LIST_INIT(soaname->list);
ISC_LIST_APPEND(soaname->list, rdataset, link);
dns_message_addname(lookup->sendmsg, soaname, DNS_SECTION_AUTHORITY);
}
/*
* Setup the supplied lookup structure, making it ready to start sending
* queries to servers. Create and initialize the message to be sent as
* well as the query structures and buffer space for the replies. If the
* server list is empty, clone it from the system default list.
*/
void
setup_lookup(dig_lookup_t *lookup) {
isc_result_t result, res2;
int len;
dig_server_t *serv;
dig_query_t *query;
isc_region_t r;
isc_buffer_t b;
char store[MXNAME];
REQUIRE(lookup != NULL);
INSIST(!free_now);
debug("setup_lookup(%p)",lookup);
debug("setting up for looking up %s @%p->%p",
lookup->textname, lookup,
lookup->link.next);
result = dns_message_create(mctx, DNS_MESSAGE_INTENTRENDER,
&lookup->sendmsg);
check_result(result, "dns_message_create");
if (lookup->new_search) {
debug("resetting lookup counter.");
lookup_counter = 0;
}
if (ISC_LIST_EMPTY(lookup->my_server_list)) {
debug("cloning server list");
clone_server_list(server_list, &lookup->my_server_list);
}
result = dns_message_gettempname(lookup->sendmsg, &lookup->name);
check_result(result, "dns_message_gettempname");
dns_name_init(lookup->name, NULL);
isc_buffer_init(&lookup->namebuf, lookup->namespace,
sizeof(lookup->namespace));
isc_buffer_init(&lookup->onamebuf, lookup->onamespace,
sizeof(lookup->onamespace));
/*
* If the name has too many dots, rotce the origin to be NULL
* (which produces a root lookup). Otherwise, take the origin
* we have if there's one in the struct already. If it's NULL,
* take the first entry in the searchlist iff either usesearch
* is TRUE or we got a domain line in the resolv.conf file.
*/
if ((count_dots(lookup->textname) >= ndots) || lookup->defname)
lookup->origin = NULL; /* Force root lookup */
else if (lookup->origin == NULL && lookup->new_search &&
(usesearch || have_domain))
lookup -> origin = ISC_LIST_HEAD(search_list);
if (lookup->origin != NULL) {
debug("trying origin %s", lookup->origin->origin);
result = dns_message_gettempname(lookup->sendmsg,
&lookup->oname);
check_result(result, "dns_message_gettempname");
dns_name_init(lookup->oname, NULL);
len = strlen(lookup->origin->origin);
isc_buffer_init(&b, lookup->origin->origin, len);
isc_buffer_add(&b, len);
result = dns_name_fromtext(lookup->oname, &b, dns_rootname,
ISC_FALSE, &lookup->onamebuf);
if (result != ISC_R_SUCCESS) {
dns_message_puttempname(lookup->sendmsg,
&lookup->name);
dns_message_puttempname(lookup->sendmsg,
&lookup->oname);
fatal("%s is not a legal name syntax (%s)",
lookup->origin->origin,
dns_result_totext(result));
}
if (!lookup->trace_root) {
len = strlen(lookup->textname);
isc_buffer_init(&b, lookup->textname, len);
isc_buffer_add(&b, len);
result = dns_name_fromtext(lookup->name, &b,
lookup->oname, ISC_FALSE,
&lookup->namebuf);
} else {
dns_name_clone(dns_rootname, lookup->name);
}
if (result != ISC_R_SUCCESS) {
dns_message_puttempname(lookup->sendmsg,
&lookup->name);
dns_message_puttempname(lookup->sendmsg,
&lookup->oname);
fatal("%s is not a legal name syntax (%s)",
lookup->textname, dns_result_totext(result));
}
dns_message_puttempname(lookup->sendmsg, &lookup->oname);
} else {
debug("using root origin");
if (!lookup->trace_root) {
len = strlen(lookup->textname);
isc_buffer_init(&b, lookup->textname, len);
isc_buffer_add(&b, len);
result = dns_name_fromtext(lookup->name, &b,
dns_rootname,
ISC_FALSE,
&lookup->namebuf);
} else {
dns_name_clone(dns_rootname, lookup->name);
}
if (result != ISC_R_SUCCESS) {
dns_message_puttempname(lookup->sendmsg,
&lookup->name);
isc_buffer_init(&b, store, MXNAME);
res2 = dns_name_totext(dns_rootname, ISC_FALSE, &b);
check_result(res2, "dns_name_totext");
isc_buffer_usedregion(&b, &r);
fatal("%s/%.*s is not a legal name syntax "
"(%s)", lookup->textname, (int)r.length,
(char *)r.base, dns_result_totext(result));
}
}
isc_buffer_init(&b, store, MXNAME);
dns_name_totext(lookup->name, ISC_FALSE, &b);
isc_buffer_usedregion(&b, &r);
trying((int)r.length, (char *)r.base, lookup);
ENSURE(dns_name_isabsolute(lookup->name));
lookup->sendmsg->id = (unsigned short)(random() & 0xFFFF);
lookup->sendmsg->opcode = dns_opcode_query;
lookup->msgcounter = 0;
/*
* If this is a trace request, completely disallow recursion, since
* it's meaningless for traces.
*/
if (lookup->recurse && !lookup->trace && !lookup->ns_search_only) {
debug("recursive query");
lookup->sendmsg->flags |= DNS_MESSAGEFLAG_RD;
}
if (lookup->aaonly) {
debug("AA query");
lookup->sendmsg->flags |= DNS_MESSAGEFLAG_AA;
}
if (lookup->adflag) {
debug("AD query");
lookup->sendmsg->flags |= DNS_MESSAGEFLAG_AD;
}
if (lookup->cdflag) {
debug("CD query");
lookup->sendmsg->flags |= DNS_MESSAGEFLAG_CD;
}
dns_message_addname(lookup->sendmsg, lookup->name,
DNS_SECTION_QUESTION);
if (lookup->trace_root) {
lookup->rdtype = dns_rdatatype_soa;
lookup->rdclass = dns_rdataclass_in;
}
if ((lookup->rdtype == dns_rdatatype_axfr) ||
(lookup->rdtype == dns_rdatatype_ixfr)) {
lookup->doing_xfr = ISC_TRUE;
/*
* Force TCP mode if we're doing an xfr.
*/
lookup->tcp_mode = ISC_TRUE;
}
add_question(lookup->sendmsg, lookup->name, lookup->rdclass,
lookup->rdtype);
if (lookup->rdtype == dns_rdatatype_ixfr)
insert_soa(lookup);
if (key != NULL) {
debug("initializing keys");
result = dns_message_settsigkey(lookup->sendmsg, key);
check_result(result, "dns_message_settsigkey");
lookup->tsigctx = NULL;
lookup->querysig = NULL;
}
lookup->sendspace = isc_mempool_get(commctx);
if (lookup->sendspace == NULL)
fatal("memory allocation failure");
debug("starting to render the message");
isc_buffer_init(&lookup->sendbuf, lookup->sendspace, COMMSIZE);
result = dns_message_renderbegin(lookup->sendmsg, &lookup->sendbuf);
check_result(result, "dns_message_renderbegin");
if (lookup->udpsize > 0) {
add_opt(lookup->sendmsg, lookup->udpsize);
}
result = dns_message_rendersection(lookup->sendmsg,
DNS_SECTION_QUESTION, 0);
check_result(result, "dns_message_rendersection");
result = dns_message_rendersection(lookup->sendmsg,
DNS_SECTION_AUTHORITY, 0);
check_result(result, "dns_message_rendersection");
result = dns_message_renderend(lookup->sendmsg);
check_result(result, "dns_message_renderend");
debug("done rendering");
lookup->pending = ISC_FALSE;
serv = ISC_LIST_HEAD(lookup->my_server_list);
for (; serv != NULL;
serv = ISC_LIST_NEXT(serv, link)) {
query = isc_mem_allocate(mctx, sizeof(dig_query_t));
if (query == NULL)
fatal("Memory allocation failure in %s:%d",
__FILE__, __LINE__);
debug("create query %p linked to lookup %p",
query, lookup);
query->lookup = lookup;
query->working = ISC_FALSE;
query->waiting_connect = ISC_FALSE;
query->first_pass = ISC_TRUE;
query->first_soa_rcvd = ISC_FALSE;
query->second_rr_rcvd = ISC_FALSE;
query->second_rr_serial = 0;
query->servname = serv->servername;
query->name_count = 0;
query->rr_count = 0;
ISC_LIST_INIT(query->recvlist);
ISC_LIST_INIT(query->lengthlist);
query->sock = NULL;
query->recvspace = isc_mempool_get(commctx);
if (query->recvspace == NULL)
fatal("memory allocation failure");
isc_buffer_init(&query->recvbuf, query->recvspace, COMMSIZE);
isc_buffer_init(&query->lengthbuf, query->lengthspace, 2);
isc_buffer_init(&query->slbuf, query->slspace, 2);
ISC_LIST_ENQUEUE(lookup->q, query, link);
}
if (!ISC_LIST_EMPTY(lookup->q) && qr) {
printmessage(ISC_LIST_HEAD(lookup->q), lookup->sendmsg,
ISC_TRUE);
}
}
/*
* Event handler for send completion. Track send counter, and clear out
* the query if the send was canceled.
*/
static void
send_done(isc_task_t *task, isc_event_t *event) {
isc_socketevent_t *sevent = NULL;
dig_query_t *query;
REQUIRE(event->ev_type == ISC_SOCKEVENT_SENDDONE);
UNUSED(task);
LOCK_LOOKUP;
sevent = (isc_socketevent_t *)event;
query = event->ev_arg;
isc_event_free(&event);
debug("send_done()");
sendcount--;
debug("sendcount=%d",sendcount);
INSIST(sendcount >= 0);
UNLOCK_LOOKUP;
}
/*
* Cancel a lookup, sending isc_socket_cancel() requests to all outstanding
* IO sockets. The cancel handlers should take care of cleaning up the
* query and lookup structures
*/
void
cancel_lookup(dig_lookup_t *lookup) {
dig_query_t *query = NULL;
debug("cancel_lookup()");
for (query = ISC_LIST_HEAD(lookup->q);
query != NULL;
query = ISC_LIST_NEXT(query, link)) {
if (query->working) {
debug("cancelling a worker");
}
if (query->sock != NULL) {
isc_socket_cancel(query->sock, global_task,
ISC_SOCKCANCEL_ALL);
check_if_done();
}
}
lookup->pending = ISC_FALSE;
lookup->retries = 0;
}
/*
* Send a UDP packet to the remote nameserver, possible starting the
* recv action as well. Also make sure that the timer is running and
* is properly reset.
*/
static void
send_udp(dig_lookup_t *lookup, isc_boolean_t make_recv) {
dig_query_t *query;
isc_result_t result;
unsigned int local_timeout;
debug("send_udp()");
/*
* If the timer already exists, that means we're calling this
* a second time (for a retry). Don't need to recreate it,
* just reset it.
*/
if (lookup->timer == NULL) {
if (timeout != INT_MAX) {
if (timeout == 0) {
local_timeout = UDP_TIMEOUT;
} else
local_timeout = timeout;
debug("have local timeout of %d", local_timeout);
isc_interval_set(&lookup->interval, local_timeout, 0);
result = isc_timer_create(timermgr,
isc_timertype_once, NULL,
&lookup->interval,
global_task,
connect_timeout, lookup,
&lookup->timer);
check_result(result, "isc_timer_create");
}
} else {
result = isc_timer_reset(lookup->timer, isc_timertype_once,
NULL, &lookup->interval,
ISC_TRUE);
check_result(result, "isc_timer_reset");
}
for (query = ISC_LIST_HEAD(lookup->q);
query != NULL;
query = ISC_LIST_NEXT(query, link)) {
debug("working on lookup %p, query %p",
query->lookup, query);
if (make_recv) {
ISC_LIST_ENQUEUE(query->recvlist, &query->recvbuf,
link);
query->working = ISC_TRUE;
debug("recving with lookup=%p, query=%p, sock=%p",
query->lookup, query,
query->sock);
result = isc_socket_recvv(query->sock,
&query->recvlist, 1,
global_task, recv_done,
query);
check_result(result, "isc_socket_recvv");
recvcount++;
debug("recvcount=%d", recvcount);
}
ISC_LIST_INIT(query->sendlist);
ISC_LIST_ENQUEUE(query->sendlist, &lookup->sendbuf,
link);
debug("sending a request");
result = isc_time_now(&query->time_sent);
check_result(result, "isc_time_now");
ENSURE(query->sock != NULL);
result = isc_socket_sendtov(query->sock, &query->sendlist,
global_task, send_done, query,
&query->sockaddr, NULL);
check_result(result, "isc_socket_sendtov");
sendcount++;
}
}
/*
* IO timeout handler, used for both connect and recv timeouts. If
* retries are still allowed, either resend the UDP packet or queue a
* new TCP lookup. Otherwise, cancel the lookup.
*/
static void
connect_timeout(isc_task_t *task, isc_event_t *event) {
dig_lookup_t *lookup=NULL;
UNUSED(task);
REQUIRE(event->ev_type == ISC_TIMEREVENT_IDLE);
debug("connect_timeout()");
LOCK_LOOKUP;
lookup = event->ev_arg;
isc_event_free(&event);
INSIST(!free_now);
if (lookup->retries > 1) {
if (!lookup->tcp_mode) {
lookup->retries--;
debug("resending UDP request");
send_udp(lookup, ISC_FALSE);
} else {
debug("making new TCP request");
cancel_lookup(lookup);
lookup->retries--;
requeue_lookup(lookup, ISC_TRUE);
}
}
else {
cancel_lookup(lookup);
}
UNLOCK_LOOKUP;
}
/*
* Event handler for the TCP recv which gets the length header of TCP
* packets. Start the next recv of length bytes.
*/
static void
tcp_length_done(isc_task_t *task, isc_event_t *event) {
isc_socketevent_t *sevent;
isc_buffer_t *b=NULL;
isc_region_t r;
isc_result_t result;
dig_query_t *query=NULL;
dig_lookup_t *l;
isc_uint16_t length;
REQUIRE(event->ev_type == ISC_SOCKEVENT_RECVDONE);
INSIST(!free_now);
UNUSED(task);
debug("tcp_length_done()");
LOCK_LOOKUP;
sevent = (isc_socketevent_t *)event;
query = event->ev_arg;
recvcount--;
INSIST(recvcount >= 0);
if (sevent->result == ISC_R_CANCELED) {
query->working = ISC_FALSE;
isc_event_free(&event);
l = query->lookup;
clear_query(query);
check_next_lookup(l);
UNLOCK_LOOKUP;
return;
}
if (sevent->result != ISC_R_SUCCESS) {
debug("buffer allocate connect_timeout");
result = isc_buffer_allocate(mctx, &b, 256);
check_result(result, "isc_buffer_allocate");
result = isc_sockaddr_totext(&query->sockaddr, b);
check_result(result, "isc_sockaddr_totext");
isc_buffer_usedregion(b, &r);
printf("%.*s: %s\n", (int)r.length, r.base,
isc_result_totext(sevent->result));
isc_buffer_free(&b);
query->working = ISC_FALSE;
isc_socket_detach(&query->sock);
sockcount--;
debug("sockcount=%d",sockcount);
INSIST(sockcount >= 0);
isc_event_free(&event);
check_next_lookup(query->lookup);
UNLOCK_LOOKUP;
return;
}
b = ISC_LIST_HEAD(sevent->bufferlist);
ISC_LIST_DEQUEUE(sevent->bufferlist, &query->lengthbuf, link);
length = isc_buffer_getuint16(b);
if (length > COMMSIZE) {
isc_event_free(&event);
fatal("Length of %X was longer than I can handle!",
length);
}
/*
* Even though the buffer was already init'ed, we need
* to redo it now, to force the length we want.
*/
isc_buffer_invalidate(&query->recvbuf);
isc_buffer_init(&query->recvbuf, query->recvspace, length);
ENSURE(ISC_LIST_EMPTY(query->recvlist));
ISC_LIST_ENQUEUE(query->recvlist, &query->recvbuf, link);
debug("recving with lookup=%p, query=%p",
query->lookup, query);
result = isc_socket_recvv(query->sock, &query->recvlist, length, task,
recv_done, query);
check_result(result, "isc_socket_recvv");
recvcount++;
debug("resubmitted recv request with length %d, recvcount=%d",
length, recvcount);
isc_event_free(&event);
UNLOCK_LOOKUP;
}
/*
* For transfers that involve multiple recvs (XFR's in particular),
* launch the next recv.
*/
static void
launch_next_query(dig_query_t *query, isc_boolean_t include_question) {
isc_result_t result;
dig_lookup_t *l;
INSIST(!free_now);
debug("launch_next_query()");
if (!query->lookup->pending) {
debug("ignoring launch_next_query because !pending");
isc_socket_detach(&query->sock);
sockcount--;
debug("sockcount=%d", sockcount);
INSIST(sockcount >= 0);
query->working = ISC_FALSE;
query->waiting_connect = ISC_FALSE;
l = query->lookup;
clear_query(query);
check_next_lookup(l);
return;
}
isc_buffer_clear(&query->slbuf);
isc_buffer_clear(&query->lengthbuf);
isc_buffer_putuint16(&query->slbuf, query->lookup->sendbuf.used);
ISC_LIST_INIT(query->sendlist);
ISC_LIST_ENQUEUE(query->sendlist, &query->slbuf, link);
if (include_question) {
ISC_LIST_ENQUEUE(query->sendlist, &query->lookup->sendbuf,
link);
}
ISC_LIST_ENQUEUE(query->lengthlist, &query->lengthbuf, link);
result = isc_socket_recvv(query->sock, &query->lengthlist, 0,
global_task, tcp_length_done, query);
check_result(result, "isc_socket_recvv");
recvcount++;
debug("recvcount=%d",recvcount);
if (!query->first_soa_rcvd) {
debug("sending a request in launch_next_query");
result = isc_time_now(&query->time_sent);
check_result(result, "isc_time_now");
result = isc_socket_sendv(query->sock, &query->sendlist,
global_task, send_done, query);
check_result(result, "isc_socket_sendv");
sendcount++;
debug("sendcount=%d", sendcount);
}
query->waiting_connect = ISC_FALSE;
#if 0
check_next_lookup(query->lookup);
#endif
return;
}
/*
* Event handler for TCP connect complete. Make sure the connection was
* successful, then pass into launch_next_query to actually send the
* question.
*/
static void
connect_done(isc_task_t *task, isc_event_t *event) {
isc_result_t result;
isc_socketevent_t *sevent = NULL;
dig_query_t *query = NULL;
dig_lookup_t *l;
isc_buffer_t *b = NULL;
isc_region_t r;
UNUSED(task);
REQUIRE(event->ev_type == ISC_SOCKEVENT_CONNECT);
INSIST(!free_now);
debug("connect_done()");
LOCK_LOOKUP;
sevent = (isc_socketevent_t *)event;
query = sevent->ev_arg;
INSIST(query->waiting_connect);
query->waiting_connect = ISC_FALSE;
if (sevent->result != ISC_R_SUCCESS) {
debug("unsuccessful connection: %s",
isc_result_totext(sevent->result));
result = isc_buffer_allocate(mctx, &b, 256);
check_result(result, "isc_buffer_allocate");
result = isc_sockaddr_totext(&query->sockaddr, b);
check_result(result, "isc_sockaddr_totext");
isc_buffer_usedregion(b, &r);
if (sevent->result != ISC_R_CANCELED)
printf(";; Connection to %.*s(%s) for %s failed: "
"%s.\n", (int)r.length, r.base,
query->servname, query->lookup->textname,
isc_result_totext(sevent->result));
isc_socket_detach(&query->sock);
sockcount--;
INSIST(sockcount >= 0);
if (exitcode < 7)
exitcode = 9;
debug("sockcount=%d",sockcount);
isc_buffer_free(&b);
query->working = ISC_FALSE;
query->waiting_connect = ISC_FALSE;
isc_event_free(&event);
l = query->lookup;
clear_query(query);
check_next_lookup(l);
UNLOCK_LOOKUP;
return;
}
launch_next_query(query, ISC_TRUE);
isc_event_free(&event);
UNLOCK_LOOKUP;
}
/*
* Check if the ongoing XFR needs more data before it's complete, using
* the semantics of IXFR and AXFR protocols. Much of the complexity of
* this routine comes from determining when an IXFR is complete.
* ISC_FALSE means more data is on the way, and the recv has been issued.
*/
static isc_boolean_t
check_for_more_data(dig_query_t *query, dns_message_t *msg,
isc_socketevent_t *sevent)
{
dns_rdataset_t *rdataset = NULL;
dns_rdata_t rdata;
dns_rdata_soa_t soa;
isc_result_t result;
isc_buffer_t b;
isc_region_t r;
char abspace[MXNAME];
isc_boolean_t atlimit=ISC_FALSE;
debug("check_for_more_data()");
/*
* By the time we're in this routine, we know we're doing
* either an AXFR or IXFR. If there's no second_rr_type,
* then we don't yet know which kind of answer we got back
* from the server. Here, we're going to walk through the
* rr's in the message, acting as necessary whenever we hit
* an SOA rr.
*/
result = dns_message_firstname(msg, DNS_SECTION_ANSWER);
if (result != ISC_R_SUCCESS) {
puts("; Transfer failed.");
query->working = ISC_FALSE;
return (ISC_TRUE);
}
do {
dns_name_t *name = NULL;
dns_message_currentname(msg, DNS_SECTION_ANSWER,
&name);
for (rdataset = ISC_LIST_HEAD(name->list);
rdataset != NULL;
rdataset = ISC_LIST_NEXT(rdataset, link)) {
result = dns_rdataset_first(rdataset);
if (result != ISC_R_SUCCESS)
continue;
do {
query->rr_count++;
if (query->rr_count >= rr_limit)
atlimit = ISC_TRUE;
dns_rdataset_current(rdataset, &rdata);
/*
* If this is the first rr, make sure
* it's an SOA
*/
if ((!query->first_soa_rcvd) &&
(rdata.type != dns_rdatatype_soa)) {
puts("; Transfer failed. "
"Didn't start with "
"SOA answer.");
query->working = ISC_FALSE;
return (ISC_TRUE);
}
if ((!query->second_rr_rcvd) &&
(rdata.type != dns_rdatatype_soa)) {
query->second_rr_rcvd = ISC_TRUE;
query->second_rr_serial = 0;
debug("got the second rr as nonsoa");
continue;
}
/*
* If the record is anything except an SOA
* now, just continue on...
*/
if (rdata.type != dns_rdatatype_soa)
goto next_rdata;
/* Now we have an SOA. Work with it. */
debug("got an SOA");
result = dns_rdata_tostruct(&rdata,
&soa,
mctx);
check_result(result,
"dns_rdata_tostruct");
if (!query->first_soa_rcvd) {
query->first_soa_rcvd =
ISC_TRUE;
query->first_rr_serial =
soa.serial;
debug("this is the first %d",
query->lookup->ixfr_serial);
if (query->lookup->ixfr_serial >=
soa.serial) {
dns_rdata_freestruct(&soa);
goto xfr_done;
}
dns_rdata_freestruct(&soa);
goto next_rdata;
}
if (!query->second_rr_rcvd) {
debug("this is the second %d",
query->lookup->ixfr_serial);
query->second_rr_rcvd = ISC_TRUE;
query->second_rr_serial =
soa.serial;
dns_rdata_freestruct(&soa);
goto next_rdata;
}
if (query->second_rr_serial == 0) {
/*
* If the second RR was a non-SOA
* record, and we're getting any
* other SOA, then this is an
* AXFR, and we're done.
*/
debug("done, since axfr");
xfr_done:
isc_buffer_init(&b, abspace, MXNAME);
result = isc_sockaddr_totext(&sevent->
address,
&b);
check_result(result,
"isc_sockaddr_totext");
isc_buffer_usedregion(&b, &r);
received(b.used, r.length,
(char *)r.base, query);
query->working = ISC_FALSE;
dns_rdata_freestruct(&soa);
if (atlimit) {
exitcode = 7;
}
return (ISC_TRUE);
}
/*
* If we get to this point, we're doing an
* IXFR and have to start really looking
* at serial numbers.
*/
if (query->first_rr_serial == soa.serial) {
debug("got a match for ixfr");
if (!query->first_repeat_rcvd) {
query->first_repeat_rcvd =
ISC_TRUE;
dns_rdata_freestruct(&soa);
goto next_rdata;
}
debug("done with ixfr");
dns_rdata_freestruct(&soa);
goto xfr_done;
}
debug("meaningless soa %d",
soa.serial);
dns_rdata_freestruct(&soa);
next_rdata:
result = dns_rdataset_next(rdataset);
} while (result == ISC_R_SUCCESS);
}
query->name_count++;
if (query->name_count >= name_limit) {
debug("name_count(%d) > name_limit(%d)",
query->name_count, name_limit);
atlimit = ISC_TRUE;
}
result = dns_message_nextname(msg, DNS_SECTION_ANSWER);
} while (result == ISC_R_SUCCESS);
if (atlimit)
goto xfr_done;
launch_next_query(query, ISC_FALSE);
return (ISC_FALSE);
}
/*
* Event handler for recv complete. Perform whatever actions are necessary,
* based on the specifics of the user's request.
*/
static void
recv_done(isc_task_t *task, isc_event_t *event) {
isc_socketevent_t *sevent = NULL;
dig_query_t *query = NULL;
isc_buffer_t *b = NULL;
dns_message_t *msg = NULL;
isc_result_t result;
isc_buffer_t ab;
char abspace[MXNAME];
isc_region_t r;
dig_lookup_t *n, *l;
isc_boolean_t docancel = ISC_FALSE;
unsigned int local_timeout;
UNUSED(task);
INSIST(!free_now);
debug("recv_done()");
LOCK_LOOKUP;
recvcount--;
debug("recvcount=%d", recvcount);
INSIST(recvcount >= 0);
query = event->ev_arg;
debug("lookup=%p, query=%p", query->lookup, query);
l = query->lookup;
REQUIRE(event->ev_type == ISC_SOCKEVENT_RECVDONE);
sevent = (isc_socketevent_t *)event;
if ((l->tcp_mode) && (l->timer != NULL))
isc_timer_touch(l->timer);
if ((!l->pending && !l->ns_search_only)
|| cancel_now) {
debug("no longer pending. Got %s",
isc_result_totext(sevent->result));
query->working = ISC_FALSE;
query->waiting_connect = ISC_FALSE;
isc_event_free(&event);
clear_query(query);
check_next_lookup(l);
UNLOCK_LOOKUP;
return;
}
if (sevent->result == ISC_R_SUCCESS) {
b = ISC_LIST_HEAD(sevent->bufferlist);
ISC_LIST_DEQUEUE(sevent->bufferlist, &query->recvbuf, link);
result = dns_message_create(mctx, DNS_MESSAGE_INTENTPARSE,
&msg);
check_result(result, "dns_message_create");
if (key != NULL) {
debug("querysig 1 is %p", l->querysig);
if (l->querysig == NULL) {
debug("getting initial querysig");
result = dns_message_getquerytsig(
l->sendmsg,
mctx, &l->querysig);
check_result(result,
"dns_message_getquerytsig");
}
result = dns_message_setquerytsig(msg,
l->querysig);
check_result(result, "dns_message_setquerytsig");
result = dns_message_settsigkey(msg, key);
check_result(result, "dns_message_settsigkey");
msg->tsigctx = l->tsigctx;
if (l->msgcounter != 0)
msg->tcp_continuation = 1;
l->msgcounter++;
}
debug("before parse starts");
result = dns_message_parse(msg, b, ISC_TRUE);
if (result != ISC_R_SUCCESS) {
printf(";; Got bad UDP packet:\n");
hex_dump(b);
query->working = ISC_FALSE;
query->waiting_connect = ISC_FALSE;
if (!l->tcp_mode) {
printf(";; Retrying in TCP mode.\n");
n = requeue_lookup(l, ISC_TRUE);
n->tcp_mode = ISC_TRUE;
}
dns_message_destroy(&msg);
isc_event_free(&event);
clear_query(query);
cancel_lookup(l);
check_next_lookup(l);
UNLOCK_LOOKUP;
return;
}
if (key != NULL) {
debug("querysig 2 is %p", l->querysig);
debug("before verify");
result = dns_tsig_verify(&query->recvbuf, msg,
NULL, NULL);
debug("after verify");
if (result != ISC_R_SUCCESS) {
printf(";; Couldn't verify signature: %s\n",
dns_result_totext(result));
validated = ISC_FALSE;
}
l->tsigctx = msg->tsigctx;
if (l->querysig != NULL) {
debug("freeing querysig buffer %p",
l->querysig);
isc_buffer_free(&l->querysig);
}
result = dns_message_getquerytsig(msg, mctx,
&l->querysig);
check_result(result,"dns_message_getquerytsig");
debug("querysig 3 is %p", l->querysig);
}
debug("after parse");
if (l->xfr_q == NULL) {
l->xfr_q = query;
/*
* Once we are in the XFR message, increase
* the timeout to much longer, so brief network
* outages won't cause the XFR to abort
*/
if ((timeout != INT_MAX) &&
(l->timer != NULL) &&
l->doing_xfr ) {
if (timeout == 0) {
if (l->tcp_mode)
local_timeout = TCP_TIMEOUT;
else
local_timeout = UDP_TIMEOUT;
} else {
if (timeout < (INT_MAX / 4))
local_timeout = timeout * 4;
else
local_timeout = INT_MAX;
}
debug("have local timeout of %d",
local_timeout);
isc_interval_set(&l->interval,
local_timeout, 0);
result = isc_timer_reset(l->timer,
isc_timertype_once,
NULL,
&l->interval,
ISC_FALSE);
check_result(result, "isc_timer_reset");
}
}
if (l->xfr_q == query) {
if ((l->trace)||
(l->ns_search_only)) {
debug("in TRACE code");
if (show_details ||
(((dns_message_firstname(msg,
DNS_SECTION_ANSWER)
== ISC_R_SUCCESS)) &&
!l->trace_root)) {
printmessage(query, msg, ISC_TRUE);
}
if ((msg->rcode != 0) &&
(l->origin != NULL)) {
if (!next_origin(msg, query))
printmessage(query, msg,
ISC_TRUE);
} else {
result = dns_message_firstname
(msg,DNS_SECTION_ANSWER);
if ((result != ISC_R_SUCCESS) ||
l->trace_root)
followup_lookup(msg, query,
DNS_SECTION_AUTHORITY);
}
} else if ((msg->rcode != 0) &&
(l->origin != NULL)) {
if (!next_origin(msg, query))
printmessage(query, msg,
ISC_TRUE);
if (show_details) {
printmessage(query, msg, ISC_TRUE);
}
} else {
if (query->first_soa_rcvd &&
l->doing_xfr)
printmessage(query, msg, ISC_FALSE);
else
printmessage(query, msg, ISC_TRUE);
}
} else if ((dns_message_firstname(msg, DNS_SECTION_ANSWER)
== ISC_R_SUCCESS) &&
l->ns_search_only &&
!l->trace_root ) {
printmessage(query, msg, ISC_TRUE);
}
if (l->pending)
debug("still pending.");
if (l->doing_xfr) {
if (query != l->xfr_q) {
dns_message_destroy(&msg);
isc_event_free (&event);
query->working = ISC_FALSE;
query->waiting_connect = ISC_FALSE;
UNLOCK_LOOKUP;
return;
}
docancel = check_for_more_data(query, msg, sevent);
if (docancel) {
dns_message_destroy(&msg);
clear_query(query);
cancel_lookup(l);
check_next_lookup(l);
}
if (msg != NULL)
dns_message_destroy(&msg);
isc_event_free(&event);
}
else {
if ((msg->rcode == 0) ||
(l->origin == NULL)) {
isc_buffer_init(&ab, abspace, MXNAME);
result = isc_sockaddr_totext(&sevent->address,
&ab);
check_result(result, "isc_sockaddr_totext");
isc_buffer_usedregion(&ab, &r);
received(b->used, r.length,
(char *)r.base,
query);
}
query->working = ISC_FALSE;
query->lookup->pending = ISC_FALSE;
if (!query->lookup->ns_search_only ||
query->lookup->trace_root) {
dns_message_destroy(&msg);
cancel_lookup(l);
}
if (msg != NULL)
dns_message_destroy(&msg);
isc_event_free(&event);
clear_query(query);
check_next_lookup(l);
}
UNLOCK_LOOKUP;
return;
}
/*
* In truth, we should never get into the CANCELED routine, since
* the cancel_lookup() routine clears the pending flag.
*/
if (sevent->result == ISC_R_CANCELED) {
debug("in recv cancel handler");
query->working = ISC_FALSE;
query->waiting_connect = ISC_FALSE;
isc_event_free(&event);
clear_query(query);
check_next_lookup(l);
UNLOCK_LOOKUP;
return;
}
fatal("recv_done got result %s",
isc_result_totext(sevent->result));
}
/*
* Turn a name into an address, using system-supplied routines. This is
* used in looking up server names, etc... and needs to use system-supplied
* routines, since they may be using a non-DNS system for these lookups.
*/
void
get_address(char *host, in_port_t port, isc_sockaddr_t *sockaddr) {
struct in_addr in4;
struct in6_addr in6;
#if defined(HAVE_ADDRINFO) && defined(HAVE_GETADDRINFO)
struct addrinfo *res = NULL;
int result;
#else
struct hostent *he;
#endif
debug("get_address()");
if (have_ipv6 && inet_pton(AF_INET6, host, &in6) == 1)
isc_sockaddr_fromin6(sockaddr, &in6, port);
else if (inet_pton(AF_INET, host, &in4) == 1)
isc_sockaddr_fromin(sockaddr, &in4, port);
else {
#if defined(HAVE_ADDRINFO) && defined(HAVE_GETADDRINFO)
result = getaddrinfo(host, NULL, NULL, &res);
if (result != 0) {
fatal("Couldn't find server '%s': %s",
host, gai_strerror(result));
}
memcpy(&sockaddr->type.sa,res->ai_addr, res->ai_addrlen);
sockaddr->length = res->ai_addrlen;
isc_sockaddr_setport(sockaddr, port);
freeaddrinfo(res);
#else
he = gethostbyname(host);
if (he == NULL)
fatal("Couldn't find server '%s' (h_errno=%d)",
host, h_errno);
INSIST(he->h_addrtype == AF_INET);
isc_sockaddr_fromin(sockaddr,
(struct in_addr *)(he->h_addr_list[0]),
port);
#endif
}
}
/*
* Initiate a TCP lookup, starting all of the queries running
*/
static void
do_lookup_tcp(dig_lookup_t *lookup) {
dig_query_t *query;
isc_result_t result;
unsigned int local_timeout;
debug("do_lookup_tcp()");
lookup->pending = ISC_TRUE;
if (timeout != INT_MAX) {
if (timeout == 0) {
local_timeout = TCP_TIMEOUT;
} else
local_timeout = timeout;
debug("have local timeout of %d", local_timeout);
isc_interval_set(&lookup->interval, local_timeout, 0);
result = isc_timer_create(timermgr, isc_timertype_once, NULL,
&lookup->interval, global_task,
connect_timeout, lookup,
&lookup->timer);
check_result(result, "isc_timer_create");
}
for (query = ISC_LIST_HEAD(lookup->q);
query != NULL;
query = ISC_LIST_NEXT(query, link)) {
query->working = ISC_TRUE;
query->waiting_connect = ISC_TRUE;
get_address(query->servname, port, &query->sockaddr);
ENSURE(query->sock == NULL);
result = isc_socket_create(socketmgr,
isc_sockaddr_pf(&query->sockaddr),
isc_sockettype_tcp, &query->sock) ;
check_result(result, "isc_socket_create");
sockcount++;
debug("sockcount=%d",sockcount);
if (specified_source)
result = isc_socket_bind(query->sock, &bind_address);
else {
if (isc_sockaddr_pf(&query->sockaddr) == AF_INET)
isc_sockaddr_any(&bind_any);
else
isc_sockaddr_any6(&bind_any);
result = isc_socket_bind(query->sock, &bind_any);
}
check_result(result, "isc_socket_bind");
result = isc_socket_connect(query->sock, &query->sockaddr,
global_task, connect_done, query);
check_result(result, "isc_socket_connect");
}
}
/*
* Initiate a UDP lookup, starting all of the queries running
*/
static void
do_lookup_udp(dig_lookup_t *lookup) {
dig_query_t *query;
isc_result_t result;
debug("do_lookup_udp()");
ENSURE(!lookup->tcp_mode);
lookup->pending = ISC_TRUE;
for (query = ISC_LIST_HEAD(lookup->q);
query != NULL;
query = ISC_LIST_NEXT(query, link)) {
query->working = ISC_TRUE;
query->waiting_connect = ISC_FALSE;
get_address(query->servname, port, &query->sockaddr);
result = isc_socket_create(socketmgr,
isc_sockaddr_pf(&query->sockaddr),
isc_sockettype_udp, &query->sock);
check_result(result, "isc_socket_create");
sockcount++;
debug("sockcount=%d", sockcount);
if (specified_source)
result = isc_socket_bind(query->sock, &bind_address);
else {
if (isc_sockaddr_pf(&query->sockaddr) == AF_INET)
isc_sockaddr_any(&bind_any);
else
isc_sockaddr_any6(&bind_any);
result = isc_socket_bind(query->sock, &bind_any);
}
check_result(result, "isc_socket_bind");
}
send_udp(lookup, ISC_TRUE);
}
/*
* Initiate either a TCP or UDP lookup
*/
void
do_lookup(dig_lookup_t *lookup) {
REQUIRE(lookup != NULL);
debug("do_lookup()");
if (lookup->tcp_mode)
do_lookup_tcp(lookup);
else
do_lookup_udp(lookup);
}
/*
* Start everything in action upon task startup.
*/
void
onrun_callback(isc_task_t *task, isc_event_t *event) {
UNUSED(task);
isc_event_free(&event);
LOCK_LOOKUP;
start_lookup();
UNLOCK_LOOKUP;
}
/*
* Make everything on the lookup queue go away. Mainly used by the
* SIGINT handler.
*/
void
cancel_all(void) {
dig_lookup_t *l, *n;
dig_query_t *q;
debug("cancel_all()");
LOCK_LOOKUP;
if (free_now) {
UNLOCK_LOOKUP;
return;
}
cancel_now = ISC_TRUE;
if (current_lookup != NULL) {
if (current_lookup->timer != NULL)
isc_timer_detach(&current_lookup->timer);
q = ISC_LIST_HEAD(current_lookup->q);
while (q != NULL) {
debug("cancelling query %p, belonging to %p",
q, current_lookup);
if (q->sock != NULL) {
isc_socket_cancel(q->sock, NULL,
ISC_SOCKCANCEL_ALL);
}
q = ISC_LIST_NEXT(q, link);
}
}
l = ISC_LIST_HEAD(lookup_list);
while (l != NULL) {
n = ISC_LIST_NEXT(l, link);
ISC_LIST_DEQUEUE(lookup_list, l, link);
try_clear_lookup(l);
l = n;
}
UNLOCK_LOOKUP;
}
/*
* Destroy all of the libs we are using, and get everything ready for a
* clean shutdown.
*/
void
destroy_libs(void) {
void *ptr;
dig_server_t *s;
dig_searchlist_t *o;
debug("destroy_libs()");
if (global_task != NULL) {
debug("freeing task");
isc_task_detach(&global_task);
}
/*
* The taskmgr_destroy() call blocks until all events are cleared
* from the task.
*/
if (taskmgr != NULL) {
debug("freeing taskmgr");
isc_taskmgr_destroy(&taskmgr);
}
LOCK_LOOKUP;
REQUIRE(sockcount == 0);
REQUIRE(recvcount == 0);
REQUIRE(sendcount == 0);
INSIST(ISC_LIST_HEAD(lookup_list) == NULL);
INSIST(current_lookup == NULL);
INSIST(!free_now);
free_now = ISC_TRUE;
s = ISC_LIST_HEAD(server_list);
while (s != NULL) {
debug("freeing global server %p", s);
ptr = s;
s = ISC_LIST_NEXT(s, link);
isc_mem_free(mctx, ptr);
}
o = ISC_LIST_HEAD(search_list);
while (o != NULL) {
debug("freeing search %p", o);
ptr = o;
o = ISC_LIST_NEXT(o, link);
isc_mem_free(mctx, ptr);
}
if (commctx != NULL) {
debug("freeing commctx");
isc_mempool_destroy(&commctx);
}
if (socketmgr != NULL) {
debug("freeing socketmgr");
isc_socketmgr_destroy(&socketmgr);
}
if (timermgr != NULL) {
debug("freeing timermgr");
isc_timermgr_destroy(&timermgr);
}
if (key != NULL) {
debug("freeing key %p", key);
dns_tsigkey_detach(&key);
}
if (namebuf != NULL)
isc_buffer_free(&namebuf);
if (is_dst_up) {
debug("destroy DST lib");
dst_lib_destroy();
is_dst_up = ISC_FALSE;
}
if (entp != NULL) {
debug("detach from entropy");
isc_entropy_detach(&entp);
}
isc_mutex_destroy(&lookup_lock);
if (isc_mem_debugging)
isc_mem_stats(mctx, stderr);
if (mctx != NULL)
isc_mem_destroy(&mctx);
}