Fix denial of service - memory corruption.
[Samba.git] / source3 / client / dnsbrowse.c
bloba6b9360a1b0a257e8ecf83f7721c78f29cbfc012
1 /*
2 Unix SMB/CIFS implementation.
3 DNS-SD browse client
4 Copyright (C) Rishi Srivatsavai 2007
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
20 #include "includes.h"
21 #include "client/client_proto.h"
23 #ifdef WITH_DNSSD_SUPPORT
25 #include <dns_sd.h>
27 /* Holds service instances found during DNS browse */
28 struct mdns_smbsrv_result
30 char *serviceName;
31 char *regType;
32 char *domain;
33 uint32_t ifIndex;
34 struct mdns_smbsrv_result *nextResult;
37 /* Maintains state during DNS browse */
38 struct mdns_browse_state
40 struct mdns_smbsrv_result *listhead; /* Browse result list head */
41 int browseDone;
46 static void
47 do_smb_resolve_reply (DNSServiceRef sdRef, DNSServiceFlags flags,
48 uint32_t interfaceIndex, DNSServiceErrorType errorCode,
49 const char *fullname, const char *hosttarget, uint16_t port,
50 uint16_t txtLen, const unsigned char *txtRecord, void *context)
52 printf("SMB service available on %s port %u\n",
53 hosttarget, ntohs(port));
57 static void do_smb_resolve(struct mdns_smbsrv_result *browsesrv)
59 DNSServiceRef mdns_conn_sdref = NULL;
60 int mdnsfd;
61 int fdsetsz;
62 int ret;
63 fd_set *fdset = NULL;
64 struct timeval tv;
65 DNSServiceErrorType err;
67 TALLOC_CTX * ctx = talloc_tos();
69 err = DNSServiceResolve(&mdns_conn_sdref, 0 /* flags */,
70 browsesrv->ifIndex,
71 browsesrv->serviceName, browsesrv->regType, browsesrv->domain,
72 do_smb_resolve_reply, NULL);
74 if (err != kDNSServiceErr_NoError) {
75 return;
78 mdnsfd = DNSServiceRefSockFD(mdns_conn_sdref);
79 for (;;) {
80 if (fdset != NULL) {
81 TALLOC_FREE(fdset);
84 if (mdnsfd < 0 || mdnsfd >= FD_SETSIZE) {
85 errno = EBADF;
86 break;
89 fdsetsz = howmany(mdnsfd + 1, NFDBITS) * sizeof(fd_mask);
90 fdset = TALLOC_ZERO(ctx, fdsetsz);
91 FD_SET(mdnsfd, fdset);
93 tv.tv_sec = 1;
94 tv.tv_usec = 0;
96 /* Wait until response received from mDNS daemon */
97 ret = sys_select(mdnsfd + 1, fdset, NULL, NULL, &tv);
98 if (ret <= 0 && errno != EINTR) {
99 break;
102 if (FD_ISSET(mdnsfd, fdset)) {
103 /* Invoke callback function */
104 DNSServiceProcessResult(mdns_conn_sdref);
105 break;
109 TALLOC_FREE(fdset);
110 DNSServiceRefDeallocate(mdns_conn_sdref);
114 static void
115 do_smb_browse_reply(DNSServiceRef sdRef, DNSServiceFlags flags,
116 uint32_t interfaceIndex, DNSServiceErrorType errorCode,
117 const char *serviceName, const char *regtype,
118 const char *replyDomain, void *context)
120 struct mdns_browse_state *bstatep = (struct mdns_browse_state *)context;
121 struct mdns_smbsrv_result *bresult;
123 if (bstatep == NULL) {
124 return;
127 if (errorCode != kDNSServiceErr_NoError) {
128 bstatep->browseDone = 1;
129 return;
132 if (flags & kDNSServiceFlagsMoreComing) {
133 bstatep->browseDone = 0;
134 } else {
135 bstatep->browseDone = 1;
138 if (!(flags & kDNSServiceFlagsAdd)) {
139 return;
142 bresult = TALLOC_ARRAY(talloc_tos(), struct mdns_smbsrv_result, 1);
143 if (bresult == NULL) {
144 return;
147 if (bstatep->listhead != NULL) {
148 bresult->nextResult = bstatep->listhead;
151 bresult->serviceName = talloc_strdup(talloc_tos(), serviceName);
152 bresult->regType = talloc_strdup(talloc_tos(), regtype);
153 bresult->domain = talloc_strdup(talloc_tos(), replyDomain);
154 bresult->ifIndex = interfaceIndex;
155 bstatep->listhead = bresult;
158 int do_smb_browse(void)
160 int mdnsfd;
161 int fdsetsz;
162 int ret;
163 fd_set *fdset = NULL;
164 struct mdns_browse_state bstate;
165 struct mdns_smbsrv_result *resptr;
166 struct timeval tv;
167 DNSServiceRef mdns_conn_sdref = NULL;
168 DNSServiceErrorType err;
170 TALLOC_CTX * ctx = talloc_stackframe();
172 ZERO_STRUCT(bstate);
174 err = DNSServiceBrowse(&mdns_conn_sdref, 0, 0, "_smb._tcp", "",
175 do_smb_browse_reply, &bstate);
177 if (err != kDNSServiceErr_NoError) {
178 d_printf("Error connecting to the Multicast DNS daemon\n");
179 TALLOC_FREE(ctx);
180 return 1;
183 mdnsfd = DNSServiceRefSockFD(mdns_conn_sdref);
184 for (;;) {
185 if (fdset != NULL) {
186 TALLOC_FREE(fdset);
189 if (mdnsfd < 0 || mdnsfd >= FD_SETSIZE) {
190 errno = EBADF;
191 TALLOC_FREE(ctx);
192 return 1;
195 fdsetsz = howmany(mdnsfd + 1, NFDBITS) * sizeof(fd_mask);
196 fdset = TALLOC_ZERO(ctx, fdsetsz);
197 FD_SET(mdnsfd, fdset);
199 tv.tv_sec = 1;
200 tv.tv_usec = 0;
202 /* Wait until response received from mDNS daemon */
203 ret = sys_select(mdnsfd + 1, fdset, NULL, NULL, &tv);
204 if (ret <= 0 && errno != EINTR) {
205 break;
208 if (FD_ISSET(mdnsfd, fdset)) {
209 /* Invoke callback function */
210 if (DNSServiceProcessResult(mdns_conn_sdref)) {
211 break;
213 if (bstate.browseDone) {
214 break;
219 DNSServiceRefDeallocate(mdns_conn_sdref);
221 if (bstate.listhead != NULL) {
222 resptr = bstate.listhead;
223 while (resptr != NULL) {
224 struct mdns_smbsrv_result *oldresptr;
225 oldresptr = resptr;
227 /* Resolve smb service instance */
228 do_smb_resolve(resptr);
230 resptr = resptr->nextResult;
234 TALLOC_FREE(ctx);
235 return 0;
238 #else /* WITH_DNSSD_SUPPORT */
240 int do_smb_browse(void)
242 d_printf("DNS-SD browsing is not supported on this platform\n");
243 return 1;
246 #endif /* WITH_DNSSD_SUPPORT */