sortix-mirror/libc/netdb/getaddrinfo.c
2023-03-19 21:56:54 +01:00

807 lines
22 KiB
C

/*
* Copyright (c) 2013, 2015, 2016, 2022 Jonas 'Sortie' Termansen.
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*
* netdb/getaddrinfo.c
* Network address and service translation.
*/
#include <sys/dnsconfig.h>
#include <sys/socket.h>
#include <arpa/inet.h>
#include <ctype.h>
#include <errno.h>
#include <endian.h>
#include <netdb.h>
#include <netinet/in.h>
#include <poll.h>
#include <stdbool.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>
#include <timespec.h>
#include <unistd.h>
#define DNS_SIZE 512
#define DNS_NAME_MAX 255
#define DNS_LABEL_MAX 64
struct dns_header
{
uint16_t id;
uint16_t flags;
uint16_t qdcount;
uint16_t ancount;
uint16_t nscount;
uint16_t arcount;
};
struct dns_question
{
uint16_t qtype;
uint16_t qclass;
};
struct dns_record
{
uint16_t type;
uint16_t class;
uint16_t ttl_high;
uint16_t ttl_low;
uint16_t rdlength;
};
#define DNS_HEADER_FLAGS_RCODE_MASK (0xF << 0)
#define DNS_HEADER_FLAGS_RCODE_NO (0 << 0)
#define DNS_HEADER_FLAGS_RCODE_FORMAT (1 << 0)
#define DNS_HEADER_FLAGS_RCODE_SERVER (2 << 0)
#define DNS_HEADER_FLAGS_RCODE_NAME (3 << 0)
#define DNS_HEADER_FLAGS_RCODE_NOT_IMPLEMENTED (4 << 0)
#define DNS_HEADER_FLAGS_RCODE_REFUSED (5 << 0)
#define DNS_HEADER_FLAGS_RA (1 << 7)
#define DNS_HEADER_FLAGS_RD (1 << 8)
#define DNS_HEADER_FLAGS_TC (1 << 9)
#define DNS_HEADER_FLAGS_AA (1 << 10)
#define DNS_HEADER_FLAGS_OPCODE_MASK (0xF << 11)
#define DNS_HEADER_FLAGS_OPCODE_QUERY (0 << 11)
#define DNS_HEADER_FLAGS_OPCODE_IQUERY (1 << 11)
#define DNS_HEADER_FLAGS_OPCODE_STATUS (2 << 11)
#define DNS_HEADER_FLAGS_QR (1 << 15)
#define DNS_TYPE_A 1
#define DNS_TYPE_NS 2
#define DNS_TYPE_MD 3
#define DNS_TYPE_MF 4
#define DNS_TYPE_CNAME 5
#define DNS_TYPE_SOA 6
#define DNS_TYPE_MB 7
#define DNS_TYPE_MG 8
#define DNS_TYPE_MR 9
#define DNS_TYPE_NULL 10
#define DNS_TYPE_WKS 11
#define DNS_TYPE_PTR 12
#define DNS_TYPE_HINFO 13
#define DNS_TYPE_MINFO 14
#define DNS_TYPE_MX 15
#define DNS_TYPE_TXT 16
#define DNS_TYPE_AAAA 28
#define DNS_QTYPE_AXFR 252
#define DNS_QTYPE_MAILB 253
#define DNS_QTYPE_MAILA 254
#define DNS_QTYPE_ANY 255
#define DNS_CLASS_IN 1
#define DNS_CLASS_CS 2
#define DNS_CLASS_CH 3
#define DNS_CLASS_HS 4
#define DNS_QCLASS_ANY 255
static bool encode_dns_header(unsigned char* msg,
size_t* offset_ptr,
const struct dns_header* hdrin)
{
size_t offset = *offset_ptr;
struct dns_header hdr;
if ( DNS_SIZE - offset < sizeof(hdr) )
return false;
hdr.id = htobe16(hdrin->id);
hdr.flags = htobe16(hdrin->flags);
hdr.qdcount = htobe16(hdrin->qdcount);
hdr.ancount = htobe16(hdrin->ancount);
hdr.nscount = htobe16(hdrin->nscount);
hdr.arcount = htobe16(hdrin->arcount);
memcpy(msg + offset, &hdr, sizeof(hdr));
*offset_ptr = offset + sizeof(hdr);
return true;
}
static bool encode_dns_byte(unsigned char* msg,
size_t* offset_ptr,
unsigned char byte)
{
size_t offset = *offset_ptr;
if ( DNS_SIZE - offset < 1 )
return false;
msg[offset] = byte;
*offset_ptr = offset + 1;
return true;
}
// TODO: Enforce things like proper use of dashes and restrict to allowed ASCII
// sequences (but see internationalized domain names).
// TODO: Simplify this further.
static bool is_valid_name(const char* name)
{
size_t index = 0;
size_t namelen = 0;
if ( !name[0] )
return false; /* unexpected end of input */
while ( name[index] )
{
if ( !strcmp(name + index, ".") )
break;
if ( name[index] == '.' )
return false; /* empty label */
size_t length = strcspn(name + index, ".");
if ( DNS_LABEL_MAX <= length )
return false; /* label too long */
if ( namelen++ == DNS_NAME_MAX )
return false; /* name is too long */
for ( size_t i = 0; i < length; i++ )
{
if ( namelen++ == DNS_NAME_MAX )
return false; /* name is too long */
}
index += length;
if ( name[index] == '.' )
index++;
}
if ( namelen++ == DNS_NAME_MAX )
return false;
return true;
}
static bool encode_dns_name(unsigned char* msg,
size_t* offset_ptr,
const char* name)
{
size_t index = 0;
size_t namelen = 0;
if ( !name[0] )
return false;
while ( name[index] )
{
if ( !strcmp(name + index, ".") )
break;
if ( name[index] == '.' )
return false;
size_t length = strcspn(name + index, ".");
if ( DNS_LABEL_MAX <= length )
return false;
if ( namelen++ == DNS_NAME_MAX )
return false;
if ( !encode_dns_byte(msg, offset_ptr, length & 0xFF) )
return false;
for ( size_t i = 0; i < length; i++ )
{
if ( namelen++ == DNS_NAME_MAX )
return false;
if ( !encode_dns_byte(msg, offset_ptr, name[index + i]) )
return false;
}
index += length;
if ( name[index] == '.' )
index++;
}
if ( namelen++ == DNS_NAME_MAX )
return false;
if ( !encode_dns_byte(msg, offset_ptr, 0) )
return false;
return true;
}
static bool encode_dns_question(unsigned char* msg,
size_t* offset_ptr,
const char* name,
const struct dns_question* qsin)
{
if ( !encode_dns_name(msg, offset_ptr, name) )
return false;
size_t offset = *offset_ptr;
struct dns_question qs;
if ( DNS_SIZE - offset < sizeof(qs) )
return false;
qs.qtype = htobe16(qsin->qtype);
qs.qclass = htobe16(qsin->qclass);
memcpy(msg + offset, &qs, sizeof(qs));
*offset_ptr = offset + sizeof(qs);
return true;
}
static bool decode_dns_header(const unsigned char* msg,
size_t* offset_ptr,
size_t msg_size,
struct dns_header* hdrout)
{
size_t offset = *offset_ptr;
struct dns_header hdr;
if ( msg_size - offset < sizeof(hdr) )
return false;
memcpy(&hdr, msg + offset, sizeof(hdr));
hdrout->id = be16toh(hdr.id);
hdrout->flags = be16toh(hdr.flags);
hdrout->qdcount = be16toh(hdr.qdcount);
hdrout->ancount = be16toh(hdr.ancount);
hdrout->nscount = be16toh(hdr.nscount);
hdrout->arcount = be16toh(hdr.arcount);
*offset_ptr = offset + sizeof(hdr);
return true;
}
static bool decode_dns_byte(const unsigned char* msg,
size_t* offset_ptr,
size_t msg_size,
unsigned char* byte)
{
size_t offset = *offset_ptr;
if ( msg_size <= offset || msg_size - offset < 1 )
return false;
*byte = msg[offset];
*offset_ptr = offset + 1;
return true;
}
static bool decode_dns_name(const unsigned char* msg,
size_t* offset_ptr,
size_t msg_size,
char* name)
{
bool real_offset_set = false;
size_t real_offset = 0;
size_t index = 0;
size_t namelen = 0;
uint8_t b;
while ( true )
{
if ( namelen++ == DNS_NAME_MAX )
return false;
if ( !decode_dns_byte(msg, offset_ptr, msg_size, &b) )
return false;
if ( 0xC0 & b )
{
namelen--;
size_t ptr = (b & 0x3F) << 8;
if ( !decode_dns_byte(msg, offset_ptr, msg_size, &b) )
return false;
ptr |= b;
if ( !real_offset_set )
{
real_offset = *offset_ptr;
real_offset_set = true;
}
*offset_ptr = ptr;
continue;
}
size_t length = b;
if ( DNS_LABEL_MAX <= length )
return false;
if ( !length )
break;
if ( index )
name[index++] = '.';
for ( size_t i = 0; i < length; i++ )
{
if ( namelen++ == DNS_NAME_MAX )
return false;
if ( !decode_dns_byte(msg, offset_ptr, msg_size, &b) )
return false;
// TODO: Handle if b == '.'.
name[index++] = b;
}
}
name[index++] = '.';
name[index] = '\0';
if ( real_offset_set )
*offset_ptr = real_offset;
return true;
}
static bool decode_dns_question(const unsigned char* msg,
size_t* offset_ptr,
size_t msg_size,
char* name,
struct dns_question* qsout)
{
if ( !decode_dns_name(msg, offset_ptr, msg_size, name) )
return false;
size_t offset = *offset_ptr;
struct dns_question qs;
if ( msg_size <= offset || msg_size - offset < sizeof(qs) )
return false;
memcpy(&qs, msg + offset, sizeof(qs));
qsout->qtype = be16toh(qs.qtype);
qsout->qclass = be16toh(qs.qclass);
*offset_ptr = offset + sizeof(qs);
return true;
}
static bool decode_dns_record(const unsigned char* msg,
size_t* offset_ptr,
size_t msg_size,
char* name,
struct dns_record* rrout)
{
if ( !decode_dns_name(msg, offset_ptr, msg_size, name) )
return false;
size_t offset = *offset_ptr;
struct dns_record rr;
if ( msg_size <= offset || msg_size - offset < sizeof(rr) )
return false;
memcpy(&rr, msg + offset, sizeof(rr));
rrout->type = be16toh(rr.type);
rrout->class = be16toh(rr.class);
rrout->ttl_high = be16toh(rr.ttl_high);
rrout->ttl_low = be16toh(rr.ttl_low);
rrout->rdlength = be16toh(rr.rdlength);
*offset_ptr = offset + sizeof(rr);
return true;
}
static bool linkaddrinfo(struct addrinfo** restrict* res_ptr,
const struct addrinfo* restrict templ)
{
struct addrinfo* link =
(struct addrinfo*) calloc(1, sizeof(struct addrinfo));
if ( !link )
return false;
link->ai_flags = templ->ai_flags;
link->ai_family = templ->ai_family;
link->ai_socktype = templ->ai_socktype;
link->ai_protocol = templ->ai_protocol;
link->ai_addrlen = templ->ai_addrlen;
link->ai_addr = (struct sockaddr*) malloc(templ->ai_addrlen);
if ( !link->ai_addr )
return free(link), false;
memcpy(link->ai_addr, templ->ai_addr, templ->ai_addrlen);
link->ai_canonname = NULL;
if ( templ->ai_canonname )
{
link->ai_canonname = strdup(templ->ai_canonname);
if ( !link->ai_canonname )
return free(link->ai_addr), free(link), false;
}
**res_ptr = link;
*res_ptr = &link->ai_next;
return true;
}
int getaddrinfo(const char* restrict node,
const char* restrict servname,
const struct addrinfo* restrict hints,
struct addrinfo** restrict res)
{
int flags = 0;
int family = AF_UNSPEC;
int socktype = 0;
int protocol = 0;
if ( hints )
{
flags = hints->ai_flags;
family = hints->ai_family;
socktype = hints->ai_socktype;
protocol = hints->ai_protocol;
}
// TODO: Implement missing flags.
// TODO: Revisit AI_ADDRCONFIG when IPv6 is implemented.
int supported = AI_PASSIVE | AI_NUMERICHOST | AI_NUMERICSERV |
AI_CANONNAME | AI_ADDRCONFIG;
if ( flags & ~supported )
return EAI_BADFLAGS;
// TODO: IPv6 support.
if ( family != AF_UNSPEC && family != AF_INET )
return EAI_FAMILY;
family = AF_INET;
if ( socktype == 0 )
socktype = SOCK_STREAM;
in_port_t port = 0;
if ( servname )
{
int errval = flags & AI_NUMERICSERV ? EAI_NONAME : EAI_SERVICE;
if ( isspace((unsigned char) servname[0]) )
return errval;
const char* end;
long portl = strtol(servname, (char**) &end, 10);
if ( end[0] )
return errval;
if ( (in_port_t) portl != portl )
return errval;
port = portl;
}
struct addrinfo** res_orig = res;
*res = NULL;
struct sockaddr_in sin;
memset(&sin, 0, sizeof(sin));
struct sockaddr_in6 sin6;
memset(&sin6, 0, sizeof(sin6));
if ( !node || !strcasecmp(node, "localhost") )
{
if ( !node && !servname )
return EAI_NONAME;
bool any = false;
if ( family == AF_UNSPEC || family == AF_INET )
{
sin.sin_family = AF_INET;
sin.sin_port = htobe16(port);
if ( flags & AI_PASSIVE )
sin.sin_addr.s_addr = htobe32(INADDR_ANY);
else
sin.sin_addr.s_addr = htobe32(INADDR_LOOPBACK);
struct addrinfo templ;
memset(&templ, 0, sizeof(templ));
templ.ai_family = sin.sin_family;
templ.ai_socktype = socktype;
templ.ai_protocol = protocol;
templ.ai_addrlen = sizeof(sin);
templ.ai_addr = (struct sockaddr*) &sin;
if ( flags & AI_CANONNAME )
templ.ai_canonname = "localhost";
if ( !linkaddrinfo(&res, &templ) )
return freeaddrinfo(*res_orig), EAI_MEMORY;
any = true;
}
if ( family == AF_UNSPEC || family == AF_INET6 )
{
sin6.sin6_family = AF_INET6;
sin6.sin6_port = htobe16(port);
sin6.sin6_flowinfo = 0;
if ( flags & AI_PASSIVE )
sin6.sin6_addr = in6addr_any;
else
sin6.sin6_addr = in6addr_loopback;
sin6.sin6_scope_id = 0;
struct addrinfo templ;
memset(&templ, 0, sizeof(templ));
templ.ai_family = sin6.sin6_family;
templ.ai_socktype = socktype;
templ.ai_protocol = protocol;
templ.ai_addrlen = sizeof(sin6);
templ.ai_addr = (struct sockaddr*) &sin6;
if ( flags & AI_CANONNAME )
templ.ai_canonname = "localhost";
if ( !linkaddrinfo(&res, &templ) )
return freeaddrinfo(*res_orig), EAI_MEMORY;
any = true;
}
if ( any )
return 0;
return EAI_NONAME;
}
if ( (family == AF_UNSPEC || family == AF_INET) )
{
// POSIX divergence: Use inet_pton instead of inet_addr format.
if ( inet_pton(AF_INET, node, &sin.sin_addr) == 1 )
{
sin.sin_family = AF_INET;
sin.sin_port = htobe16(port);
struct addrinfo templ;
memset(&templ, 0, sizeof(templ));
templ.ai_family = sin.sin_family;
templ.ai_socktype = socktype;
templ.ai_protocol = protocol;
templ.ai_addrlen = sizeof(sin);
templ.ai_addr = (struct sockaddr*) &sin;
if ( !linkaddrinfo(&res, &templ) )
return freeaddrinfo(*res_orig), EAI_MEMORY;
return 0;
}
}
if ( (family == AF_UNSPEC || family == AF_INET6) )
{
if ( inet_pton(AF_INET6, node, &sin6.sin6_addr) == 1 )
{
sin6.sin6_family = AF_INET6;
sin6.sin6_port = htobe16(port);
sin6.sin6_flowinfo = 0;
sin6.sin6_scope_id = 0;
struct addrinfo templ;
memset(&templ, 0, sizeof(templ));
templ.ai_family = sin6.sin6_family;
templ.ai_socktype = socktype;
templ.ai_protocol = protocol;
templ.ai_addrlen = sizeof(sin6);
templ.ai_addr = (struct sockaddr*) &sin6;
if ( !linkaddrinfo(&res, &templ) )
return freeaddrinfo(*res_orig), EAI_MEMORY;
return 0;
}
}
if ( flags & AI_NUMERICHOST )
return EAI_NONAME;
if ( !is_valid_name(node) )
return EAI_NONAME;
size_t encoded_size = 0;
unsigned char encoded[DNS_SIZE];
if ( !encode_dns_name(encoded, &encoded_size, node) )
return EAI_NONAME;
size_t decoded_size = 0;
char target[DNS_NAME_MAX + 1];
if ( !decode_dns_name(encoded, &decoded_size, encoded_size, target) )
return EAI_NONAME;
int cname_retries = 0;
retry_cname:
if ( 5 < cname_retries++ )
return EAI_NONAME;
struct dnsconfig dnsconfig;
if ( getdnsconfig(&dnsconfig) < 0 )
return EAI_SYSTEM;
// TODO: Potentially do a blocking wait for DNS configuration to come up (or
// for the automatic configuration to time out) if it isn't ready yet.
if ( dnsconfig.servers_count == 0 )
return EAI_NONAME;
// TODO: Send requests to all the servers rather than picking the first one
// a socket can be made for.
int fd = -1;
size_t server_index = 0;
struct dnsconfig_server* server = NULL;
for ( ; server_index < dnsconfig.servers_count; server_index++ )
{
server = &dnsconfig.servers[server_index];
if ( 0 <= (fd = socket(server->family, SOCK_DGRAM, 0)) )
break;
}
if ( server_index == dnsconfig.servers_count )
return EAI_SYSTEM;
struct sockaddr* addr;
size_t addr_size;
if ( server->family == AF_INET )
{
memset(&sin, 0, sizeof(sin));
sin.sin_family = AF_INET;
sin.sin_port = htobe16(53);
memcpy(&sin.sin_addr, &server->addr, sizeof(sin.sin_addr));
addr = (struct sockaddr*) &sin;
addr_size = sizeof(sin);
}
else if ( server->family == AF_INET6 )
{
memset(&sin6, 0, sizeof(sin6));
sin6.sin6_family = AF_INET6;
sin6.sin6_port = htobe16(53);
memcpy(&sin6.sin6_addr, &server->addr, sizeof(sin6.sin6_addr));
addr = (struct sockaddr*) &sin6;
addr_size = sizeof(sin6);
}
else
return EAI_FAMILY;
if ( connect(fd, addr, addr_size) < 0 )
return close(fd), EAI_SYSTEM;
uint16_t id = arc4random() & 0xFFFF;
unsigned char req[DNS_SIZE];
size_t req_size = 0;
struct dns_header hdr;
hdr.id = id;
hdr.flags = DNS_HEADER_FLAGS_RD;
hdr.qdcount = 1;
hdr.ancount = 0;
hdr.nscount = 0;
hdr.arcount = 0;
if ( !encode_dns_header(req, &req_size, &hdr) )
return close(fd), EAI_OVERFLOW;
struct dns_question qs;
qs.qtype = 0;
if ( family == AF_INET )
qs.qtype = DNS_TYPE_A;
else if ( family == AF_INET6 )
qs.qtype = DNS_TYPE_AAAA;
qs.qclass = DNS_CLASS_IN;
if ( !encode_dns_question(req, &req_size, node, &qs) )
return close(fd), EAI_OVERFLOW;
struct timespec last_sent = timespec_nul();
struct timespec timeout = timespec_nul();
unsigned char resp[DNS_SIZE];
ssize_t resp_size;
size_t offset;
unsigned int retransmissions = 0;
while ( true )
{
struct timespec now;
clock_gettime(CLOCK_MONOTONIC, &now);
struct timespec since_sent = timespec_sub(now, last_sent);
if ( timespec_le(timeout, since_sent) )
{
if ( 2 <= retransmissions )
return close(fd), EAI_AGAIN;
ssize_t amount = send(fd, req, req_size, 0);
if ( amount < 0 )
return close(fd), EAI_SYSTEM;
timeout = timespec_make(2, 500000000);
last_sent = now;
retransmissions++;
}
struct timespec left =
timespec_sub(timespec_add(last_sent, timeout), now);
struct pollfd pfd = { 0 };
pfd.fd = fd;
pfd.events = POLLIN;
int num_events = ppoll(&pfd, 1, &left, NULL);
if ( num_events < 0 )
return close(fd), EAI_SYSTEM;
if ( num_events == 0 )
continue;
resp_size = recv(fd, resp, sizeof(resp), 0);
if ( resp_size < 0 )
return close(fd), EAI_SYSTEM;
offset = 0;
if ( !decode_dns_header(resp, &offset, resp_size, &hdr) )
continue;
if ( hdr.id != id )
continue;
break;
}
// TODO: Return the correct errors below. It may be the best behavior to
// simply drop any responses with errors.
uint16_t rcode = hdr.flags & DNS_HEADER_FLAGS_RCODE_MASK;
if ( rcode == DNS_HEADER_FLAGS_RCODE_FORMAT )
return close(fd), EAI_FAIL;
else if ( rcode == DNS_HEADER_FLAGS_RCODE_SERVER )
return close(fd), EAI_FAIL;
else if ( rcode == DNS_HEADER_FLAGS_RCODE_NAME )
return close(fd), EAI_NONAME;
else if ( rcode == DNS_HEADER_FLAGS_RCODE_NOT_IMPLEMENTED )
return close(fd), EAI_FAIL;
else if ( rcode == DNS_HEADER_FLAGS_RCODE_REFUSED )
return close(fd), EAI_FAIL;
else if ( rcode != DNS_HEADER_FLAGS_RCODE_NO )
return close(fd), EAI_FAIL;
// TODO: Reconnect to server using TCP to get full response.
if ( hdr.flags & DNS_HEADER_FLAGS_TC )
return close(fd), EAI_FAIL;
// TODO: Check query bit.
for ( uint16_t i = 0; i < hdr.qdcount; i++ )
{
char name[DNS_NAME_MAX + 1];
if ( !decode_dns_question(resp, &offset, resp_size, name, &qs) )
return close(fd), EAI_OVERFLOW;
}
bool any = false;
bool found_cname = false;
for ( uint16_t i = 0; i < hdr.ancount; i++ )
{
char name[DNS_NAME_MAX + 1];
struct dns_record rr;
if ( !decode_dns_record(resp, &offset, resp_size, name, &rr) )
return close(fd), freeaddrinfo(*res_orig), EAI_OVERFLOW;
bool match = strcmp(name, target) == 0;
// TODO: Support aliases.
if ( rr.class == DNS_CLASS_IN && rr.type == DNS_TYPE_A )
{
unsigned char ip[4];
for ( size_t i = 0; i < 4; i++ )
if ( !decode_dns_byte(resp, &offset, resp_size, &ip[i]) )
return close(fd), freeaddrinfo(*res_orig), EAI_OVERFLOW;
if ( match && (family == AF_UNSPEC || family == AF_INET) )
{
memset(&sin, 0, sizeof(sin));
sin.sin_family = AF_INET;
sin.sin_port = htobe16(port);
memcpy(&sin.sin_addr, ip, sizeof(sin.sin_addr));
struct addrinfo templ;
memset(&templ, 0, sizeof(templ));
templ.ai_family = sin.sin_family;
templ.ai_socktype = socktype;
templ.ai_protocol = protocol;
templ.ai_addrlen = sizeof(sin);
templ.ai_addr = (struct sockaddr*) &sin;
if ( !linkaddrinfo(&res, &templ) )
return close(fd), freeaddrinfo(*res_orig), EAI_MEMORY;
any = true;
}
}
else if ( rr.class == DNS_CLASS_IN && rr.type == DNS_TYPE_AAAA )
{
unsigned char ip[16];
for ( size_t i = 0; i < 16; i++ )
if ( !decode_dns_byte(resp, &offset, resp_size, &ip[i]) )
return close(fd), freeaddrinfo(*res_orig), EAI_OVERFLOW;
if ( match && (family == AF_UNSPEC || family == AF_INET6) )
{
sin6.sin6_family = AF_INET6;
sin6.sin6_port = htobe16(port);
sin6.sin6_flowinfo = 0;
memcpy(&sin6.sin6_addr, ip, sizeof(sin6.sin6_addr));
sin6.sin6_scope_id = 0;
struct addrinfo templ;
memset(&templ, 0, sizeof(templ));
templ.ai_family = sin6.sin6_family;
templ.ai_socktype = socktype;
templ.ai_protocol = protocol;
templ.ai_addrlen = sizeof(sin6);
templ.ai_addr = (struct sockaddr*) &sin6;
if ( !linkaddrinfo(&res, &templ) )
return close(fd), freeaddrinfo(*res_orig), EAI_MEMORY;
any = true;
}
}
else if ( rr.type == DNS_TYPE_CNAME )
{
char cname[DNS_NAME_MAX + 1];
if ( !decode_dns_name(resp, &offset, resp_size, cname) )
return close(fd), freeaddrinfo(*res_orig), EAI_OVERFLOW;
if ( match )
{
// TODO: Report CNAME to caller.
memcpy(target, cname, sizeof(target));
found_cname = true;
}
}
else
{
for ( size_t i = 0; i < rr.rdlength; i++ )
{
unsigned char b;
if ( !decode_dns_byte(resp, &offset, resp_size, &b) )
return close(fd), freeaddrinfo(*res_orig), EAI_OVERFLOW;
}
}
}
close(fd);
if ( !any )
{
if ( found_cname )
{
freeaddrinfo(*res_orig);
res = res_orig;
*res = NULL;
goto retry_cname;
}
return EAI_NONAME;
}
return 0;
}