dbwrap: Remove unused dbwrap_hash_size()
[Samba.git] / lib / addns / dnssock.c
bloba45e3255a54e0ba9b9e09e28bcc50b944d8db97e
1 /*
2 Linux DNS client library implementation
4 Copyright (C) 2006 Krishna Ganugapati <krishnag@centeris.com>
5 Copyright (C) 2006 Gerald Carter <jerry@samba.org>
7 ** NOTE! The following LGPL license applies to the libaddns
8 ** library. This does NOT imply that all of Samba is released
9 ** under the LGPL
11 This library is free software; you can redistribute it and/or
12 modify it under the terms of the GNU Lesser General Public
13 License as published by the Free Software Foundation; either
14 version 2.1 of the License, or (at your option) any later version.
16 This library is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
19 Lesser General Public License for more details.
21 You should have received a copy of the GNU Lesser General Public
22 License along with this library; if not, see <http://www.gnu.org/licenses/>.
25 #include "replace.h"
26 #include "dns.h"
27 #include <sys/time.h>
28 #include <unistd.h>
29 #include "system/select.h"
30 #include "../lib/util/debug.h"
32 static int destroy_dns_connection(struct dns_connection *conn)
34 return close(conn->s);
37 /********************************************************************
38 ********************************************************************/
40 static DNS_ERROR dns_tcp_open( const char *nameserver,
41 TALLOC_CTX *mem_ctx,
42 struct dns_connection **result )
44 struct addrinfo hints;
45 struct addrinfo *ai_result = NULL;
46 struct addrinfo *rp;
47 struct dns_connection *conn;
48 int ret;
49 char service[16];
51 snprintf(service, sizeof(service), "%d", DNS_TCP_PORT);
53 if (!(conn = talloc(mem_ctx, struct dns_connection))) {
54 return ERROR_DNS_NO_MEMORY;
57 memset(&hints, 0, sizeof(struct addrinfo));
58 hints.ai_family = AF_UNSPEC;
59 hints.ai_socktype = SOCK_STREAM;
60 hints.ai_flags = 0;
61 hints.ai_protocol = IPPROTO_TCP;
63 ret = getaddrinfo(nameserver, service, &hints, &ai_result);
64 if (ret != 0) {
65 DEBUG(1,("dns_tcp_open: getaddrinfo: %s\n", gai_strerror(ret)));
66 TALLOC_FREE(conn);
67 return ERROR_DNS_INVALID_NAME_SERVER;
70 for (rp = ai_result; rp != NULL; rp = rp->ai_next) {
71 conn->s = socket(rp->ai_family,
72 rp->ai_socktype,
73 rp->ai_protocol);
74 if (conn->s == -1) {
75 continue;
77 do {
78 ret = connect(conn->s, rp->ai_addr, rp->ai_addrlen);
79 } while ((ret == -1) && (errno == EINTR));
80 if (ret != -1) {
81 /* Successful connect */
82 break;
84 close(conn->s);
87 freeaddrinfo(ai_result);
89 /* Failed to connect with any address */
90 if (rp == NULL) {
91 TALLOC_FREE(conn);
92 return ERROR_DNS_CONNECTION_FAILED;
95 talloc_set_destructor(conn, destroy_dns_connection);
97 conn->hType = DNS_TCP;
98 *result = conn;
99 return ERROR_DNS_SUCCESS;
102 /********************************************************************
103 * ********************************************************************/
105 static DNS_ERROR dns_udp_open( const char *nameserver,
106 TALLOC_CTX *mem_ctx,
107 struct dns_connection **result )
109 struct addrinfo hints;
110 struct addrinfo *ai_result = NULL;
111 struct addrinfo *rp;
112 struct sockaddr_storage RecvAddr;
113 struct dns_connection *conn;
114 int ret;
115 socklen_t RecvAddrLen;
116 char service[16];
118 snprintf(service, sizeof(service), "%d", DNS_UDP_PORT);
120 if (!(conn = talloc(NULL, struct dns_connection))) {
121 return ERROR_DNS_NO_MEMORY;
124 memset(&hints, 0, sizeof(struct addrinfo));
125 hints.ai_family = AF_UNSPEC;
126 hints.ai_socktype = SOCK_DGRAM;
127 hints.ai_flags = 0;
128 hints.ai_protocol = IPPROTO_UDP;
130 ret = getaddrinfo(nameserver, service, &hints, &ai_result);
131 if (ret != 0) {
132 DEBUG(1,("dns_ucp_open:getaddrinfo: %s\n", gai_strerror(ret)));
133 TALLOC_FREE(conn);
134 return ERROR_DNS_INVALID_NAME_SERVER;
137 for (rp = ai_result; rp != NULL; rp = rp->ai_next) {
138 conn->s = socket(rp->ai_family,
139 rp->ai_socktype,
140 rp->ai_protocol);
141 if (conn->s == -1) {
142 continue;
144 ret = connect(conn->s, rp->ai_addr, rp->ai_addrlen);
145 if (ret != -1) {
146 /* Successful connect */
147 break;
149 close(conn->s);
152 freeaddrinfo(ai_result);
154 /* Failed to connect with any address */
155 if (rp == NULL) {
156 TALLOC_FREE(conn);
157 return ERROR_DNS_CONNECTION_FAILED;
160 talloc_set_destructor(conn, destroy_dns_connection);
162 /* Set up the RecvAddr structure with the IP address of
163 the receiver and the specified port number. */
165 RecvAddrLen = sizeof(RecvAddr);
166 if (getpeername(conn->s,
167 (struct sockaddr *)&RecvAddr,
168 &RecvAddrLen) == -1) {
169 TALLOC_FREE(conn);
170 return ERROR_DNS_CONNECTION_FAILED;
173 conn->hType = DNS_UDP;
174 memcpy(&conn->RecvAddr, &RecvAddr, sizeof(struct sockaddr_storage));
176 *result = conn;
177 return ERROR_DNS_SUCCESS;
180 /********************************************************************
181 ********************************************************************/
183 DNS_ERROR dns_open_connection( const char *nameserver, int32_t dwType,
184 TALLOC_CTX *mem_ctx,
185 struct dns_connection **conn )
187 switch ( dwType ) {
188 case DNS_TCP:
189 return dns_tcp_open( nameserver, mem_ctx, conn );
190 case DNS_UDP:
191 return dns_udp_open( nameserver, mem_ctx, conn );
194 return ERROR_DNS_INVALID_PARAMETER;
197 static DNS_ERROR write_all(int fd, uint8_t *data, size_t len)
199 size_t total = 0;
201 while (total < len) {
203 ssize_t ret;
205 do {
206 ret = write(fd, data + total, len - total);
207 } while ((ret == -1) && (errno == EINTR));
209 if (ret <= 0) {
211 * EOF or error
213 return ERROR_DNS_SOCKET_ERROR;
216 total += ret;
219 return ERROR_DNS_SUCCESS;
222 static DNS_ERROR dns_send_tcp(struct dns_connection *conn,
223 const struct dns_buffer *buf)
225 uint16_t len = htons(buf->offset);
226 DNS_ERROR err;
228 err = write_all(conn->s, (uint8_t *)&len, sizeof(len));
229 if (!ERR_DNS_IS_OK(err)) return err;
231 return write_all(conn->s, buf->data, buf->offset);
234 static DNS_ERROR dns_send_udp(struct dns_connection *conn,
235 const struct dns_buffer *buf)
237 ssize_t ret;
239 do {
240 ret = sendto(conn->s, buf->data, buf->offset, 0,
241 (struct sockaddr *)&conn->RecvAddr,
242 sizeof(conn->RecvAddr));
243 } while ((ret == -1) && (errno == EINTR));
245 if (ret != buf->offset) {
246 return ERROR_DNS_SOCKET_ERROR;
249 return ERROR_DNS_SUCCESS;
252 DNS_ERROR dns_send(struct dns_connection *conn, const struct dns_buffer *buf)
254 if (conn->hType == DNS_TCP) {
255 return dns_send_tcp(conn, buf);
258 if (conn->hType == DNS_UDP) {
259 return dns_send_udp(conn, buf);
262 return ERROR_DNS_INVALID_PARAMETER;
265 static DNS_ERROR read_all(int fd, uint8_t *data, size_t len)
267 size_t total = 0;
269 while (total < len) {
270 struct pollfd pfd;
271 ssize_t ret;
272 int fd_ready;
274 ZERO_STRUCT(pfd);
275 pfd.fd = fd;
276 pfd.events = POLLIN|POLLHUP;
278 fd_ready = poll(&pfd, 1, 10000);
279 if (fd_ready == -1) {
280 if (errno == EINTR) {
281 continue;
283 return ERROR_DNS_SOCKET_ERROR;
285 if ( fd_ready == 0 ) {
286 /* read timeout */
287 return ERROR_DNS_SOCKET_ERROR;
290 do {
291 ret = read(fd, data + total, len - total);
292 } while ((ret == -1) && (errno == EINTR));
294 if (ret <= 0) {
295 /* EOF or error */
296 return ERROR_DNS_SOCKET_ERROR;
299 total += ret;
302 return ERROR_DNS_SUCCESS;
305 static DNS_ERROR dns_receive_tcp(TALLOC_CTX *mem_ctx,
306 struct dns_connection *conn,
307 struct dns_buffer **presult)
309 struct dns_buffer *buf;
310 DNS_ERROR err;
311 uint16_t len;
313 if (!(buf = talloc_zero(mem_ctx, struct dns_buffer))) {
314 return ERROR_DNS_NO_MEMORY;
317 err = read_all(conn->s, (uint8_t *)&len, sizeof(len));
318 if (!ERR_DNS_IS_OK(err)) {
319 return err;
322 buf->size = ntohs(len);
324 if (buf->size == 0) {
325 *presult = buf;
326 return ERROR_DNS_SUCCESS;
329 if (!(buf->data = talloc_array(buf, uint8_t, buf->size))) {
330 TALLOC_FREE(buf);
331 return ERROR_DNS_NO_MEMORY;
334 err = read_all(conn->s, buf->data, talloc_get_size(buf->data));
335 if (!ERR_DNS_IS_OK(err)) {
336 TALLOC_FREE(buf);
337 return err;
340 *presult = buf;
341 return ERROR_DNS_SUCCESS;
344 static DNS_ERROR dns_receive_udp(TALLOC_CTX *mem_ctx,
345 struct dns_connection *conn,
346 struct dns_buffer **presult)
348 struct dns_buffer *buf;
349 ssize_t received;
351 if (!(buf = talloc_zero(mem_ctx, struct dns_buffer))) {
352 return ERROR_DNS_NO_MEMORY;
356 * UDP based DNS can only be 512 bytes
359 if (!(buf->data = talloc_array(buf, uint8_t, 512))) {
360 TALLOC_FREE(buf);
361 return ERROR_DNS_NO_MEMORY;
364 do {
365 received = recv(conn->s, (void *)buf->data, 512, 0);
366 } while ((received == -1) && (errno == EINTR));
368 if (received == -1) {
369 TALLOC_FREE(buf);
370 return ERROR_DNS_SOCKET_ERROR;
373 if (received > 512) {
374 TALLOC_FREE(buf);
375 return ERROR_DNS_BAD_RESPONSE;
378 buf->size = received;
379 buf->offset = 0;
381 *presult = buf;
382 return ERROR_DNS_SUCCESS;
385 DNS_ERROR dns_receive(TALLOC_CTX *mem_ctx, struct dns_connection *conn,
386 struct dns_buffer **presult)
388 if (conn->hType == DNS_TCP) {
389 return dns_receive_tcp(mem_ctx, conn, presult);
392 if (conn->hType == DNS_UDP) {
393 return dns_receive_udp(mem_ctx, conn, presult);
396 return ERROR_DNS_INVALID_PARAMETER;
399 DNS_ERROR dns_transaction(TALLOC_CTX *mem_ctx, struct dns_connection *conn,
400 const struct dns_request *req,
401 struct dns_request **resp)
403 struct dns_buffer *buf = NULL;
404 DNS_ERROR err;
406 err = dns_marshall_request(mem_ctx, req, &buf);
407 if (!ERR_DNS_IS_OK(err)) goto error;
409 err = dns_send(conn, buf);
410 if (!ERR_DNS_IS_OK(err)) goto error;
411 TALLOC_FREE(buf);
413 err = dns_receive(mem_ctx, conn, &buf);
414 if (!ERR_DNS_IS_OK(err)) goto error;
416 err = dns_unmarshall_request(mem_ctx, buf, resp);
418 error:
419 TALLOC_FREE(buf);
420 return err;
423 DNS_ERROR dns_update_transaction(TALLOC_CTX *mem_ctx,
424 struct dns_connection *conn,
425 struct dns_update_request *up_req,
426 struct dns_update_request **up_resp)
428 struct dns_request *resp;
429 DNS_ERROR err;
431 err = dns_transaction(mem_ctx, conn, dns_update2request(up_req),
432 &resp);
434 if (!ERR_DNS_IS_OK(err)) return err;
436 *up_resp = dns_request2update(resp);
437 return ERROR_DNS_SUCCESS;