readelf: report ARM program and section header types
[freebsd-src.git] / contrib / ldns / net.c
blobb8a5385e1c2067da41feef1b38179ca2da222d00
1 /*
2 * net.c
4 * Network implementation
5 * All network related functions are grouped here
7 * a Net::DNS like library for C
9 * (c) NLnet Labs, 2004-2006
11 * See the file LICENSE for the license
14 #include <ldns/config.h>
16 #include <ldns/ldns.h>
18 #ifdef HAVE_NETINET_IN_H
19 #include <netinet/in.h>
20 #endif
21 #ifdef HAVE_SYS_SOCKET_H
22 #include <sys/socket.h>
23 #endif
24 #ifdef HAVE_NETDB_H
25 #include <netdb.h>
26 #endif
27 #ifdef HAVE_ARPA_INET_H
28 #include <arpa/inet.h>
29 #endif
30 #include <sys/time.h>
31 #include <errno.h>
32 #include <fcntl.h>
34 ldns_status
35 ldns_send(ldns_pkt **result_packet, ldns_resolver *r, const ldns_pkt *query_pkt)
37 ldns_buffer *qb;
38 ldns_status result;
39 ldns_rdf *tsig_mac = NULL;
41 qb = ldns_buffer_new(LDNS_MIN_BUFLEN);
43 if (query_pkt && ldns_pkt_tsig(query_pkt)) {
44 tsig_mac = ldns_rr_rdf(ldns_pkt_tsig(query_pkt), 3);
47 if (!query_pkt ||
48 ldns_pkt2buffer_wire(qb, query_pkt) != LDNS_STATUS_OK) {
49 result = LDNS_STATUS_ERR;
50 } else {
51 result = ldns_send_buffer(result_packet, r, qb, tsig_mac);
54 ldns_buffer_free(qb);
56 return result;
59 /* code from rdata.c */
60 static struct sockaddr_storage *
61 ldns_rdf2native_sockaddr_storage_port(
62 const ldns_rdf *rd, uint16_t port, size_t *size)
64 struct sockaddr_storage *data;
65 struct sockaddr_in *data_in;
66 struct sockaddr_in6 *data_in6;
68 data = LDNS_MALLOC(struct sockaddr_storage);
69 if (!data) {
70 return NULL;
72 /* zero the structure for portability */
73 memset(data, 0, sizeof(struct sockaddr_storage));
75 switch(ldns_rdf_get_type(rd)) {
76 case LDNS_RDF_TYPE_A:
77 #ifndef S_SPLINT_S
78 data->ss_family = AF_INET;
79 #endif
80 data_in = (struct sockaddr_in*) data;
81 data_in->sin_port = (in_port_t)htons(port);
82 memcpy(&(data_in->sin_addr), ldns_rdf_data(rd), ldns_rdf_size(rd));
83 *size = sizeof(struct sockaddr_in);
84 return data;
85 case LDNS_RDF_TYPE_AAAA:
86 #ifndef S_SPLINT_S
87 data->ss_family = AF_INET6;
88 #endif
89 data_in6 = (struct sockaddr_in6*) data;
90 data_in6->sin6_port = (in_port_t)htons(port);
91 memcpy(&data_in6->sin6_addr, ldns_rdf_data(rd), ldns_rdf_size(rd));
92 *size = sizeof(struct sockaddr_in6);
93 return data;
94 default:
95 LDNS_FREE(data);
96 return NULL;
100 struct sockaddr_storage *
101 ldns_rdf2native_sockaddr_storage(
102 const ldns_rdf *rd, uint16_t port, size_t *size)
104 return ldns_rdf2native_sockaddr_storage_port(
105 rd, (port == 0 ? (uint16_t)LDNS_PORT : port), size);
108 /** best effort to set nonblocking */
109 static void
110 ldns_sock_nonblock(int sockfd)
112 #ifdef HAVE_FCNTL
113 int flag;
114 if((flag = fcntl(sockfd, F_GETFL)) != -1) {
115 flag |= O_NONBLOCK;
116 if(fcntl(sockfd, F_SETFL, flag) == -1) {
117 /* ignore error, continue blockingly */
120 #elif defined(HAVE_IOCTLSOCKET)
121 unsigned long on = 1;
122 if(ioctlsocket(sockfd, FIONBIO, &on) != 0) {
123 /* ignore error, continue blockingly */
125 #endif
128 /** best effort to set blocking */
129 static void
130 ldns_sock_block(int sockfd)
132 #ifdef HAVE_FCNTL
133 int flag;
134 if((flag = fcntl(sockfd, F_GETFL)) != -1) {
135 flag &= ~O_NONBLOCK;
136 if(fcntl(sockfd, F_SETFL, flag) == -1) {
137 /* ignore error, continue */
140 #elif defined(HAVE_IOCTLSOCKET)
141 unsigned long off = 0;
142 if(ioctlsocket(sockfd, FIONBIO, &off) != 0) {
143 /* ignore error, continue */
145 #endif
148 /** wait for a socket to become ready */
149 static int
150 ldns_sock_wait(int sockfd, struct timeval timeout, int write)
152 int ret;
153 #ifndef S_SPLINT_S
154 fd_set fds;
155 FD_ZERO(&fds);
156 FD_SET(FD_SET_T sockfd, &fds);
157 if(write)
158 ret = select(sockfd+1, NULL, &fds, NULL, &timeout);
159 else
160 ret = select(sockfd+1, &fds, NULL, NULL, &timeout);
161 #endif
162 if(ret == 0)
163 /* timeout expired */
164 return 0;
165 else if(ret == -1)
166 /* error */
167 return 0;
168 return 1;
172 static int
173 ldns_tcp_connect_from(const struct sockaddr_storage *to, socklen_t tolen,
174 const struct sockaddr_storage *from, socklen_t fromlen,
175 struct timeval timeout)
177 int sockfd;
179 #ifndef S_SPLINT_S
180 if ((sockfd = socket((int)((struct sockaddr*)to)->sa_family, SOCK_STREAM,
181 IPPROTO_TCP)) == -1) {
182 return 0;
184 #endif
185 if (from && bind(sockfd, (const struct sockaddr*)from, fromlen) == -1){
186 return 0;
189 /* perform nonblocking connect, to be able to wait with select() */
190 ldns_sock_nonblock(sockfd);
191 if (connect(sockfd, (struct sockaddr*)to, tolen) == -1) {
192 #ifndef USE_WINSOCK
193 #ifdef EINPROGRESS
194 if(errno != EINPROGRESS) {
195 #else
196 if(1) {
197 #endif
198 close(sockfd);
199 return 0;
201 #else /* USE_WINSOCK */
202 if(WSAGetLastError() != WSAEINPROGRESS &&
203 WSAGetLastError() != WSAEWOULDBLOCK) {
204 closesocket(sockfd);
205 return 0;
207 #endif
208 /* error was only telling us that it would block */
211 /* wait(write) until connected or error */
212 while(1) {
213 int error = 0;
214 socklen_t len = (socklen_t)sizeof(error);
216 if(!ldns_sock_wait(sockfd, timeout, 1)) {
217 #ifndef USE_WINSOCK
218 close(sockfd);
219 #else
220 closesocket(sockfd);
221 #endif
222 return 0;
225 /* check if there is a pending error for nonblocking connect */
226 if(getsockopt(sockfd, SOL_SOCKET, SO_ERROR, (void*)&error,
227 &len) < 0) {
228 #ifndef USE_WINSOCK
229 error = errno; /* on solaris errno is error */
230 #else
231 error = WSAGetLastError();
232 #endif
234 #ifndef USE_WINSOCK
235 #if defined(EINPROGRESS) && defined(EWOULDBLOCK)
236 if(error == EINPROGRESS || error == EWOULDBLOCK)
237 continue; /* try again */
238 #endif
239 else if(error != 0) {
240 close(sockfd);
241 /* error in errno for our user */
242 errno = error;
243 return 0;
245 #else /* USE_WINSOCK */
246 if(error == WSAEINPROGRESS)
247 continue;
248 else if(error == WSAEWOULDBLOCK)
249 continue;
250 else if(error != 0) {
251 closesocket(sockfd);
252 errno = error;
253 return 0;
255 #endif /* USE_WINSOCK */
256 /* connected */
257 break;
260 /* set the socket blocking again */
261 ldns_sock_block(sockfd);
263 return sockfd;
267 ldns_tcp_connect(const struct sockaddr_storage *to, socklen_t tolen,
268 struct timeval timeout)
270 return ldns_tcp_connect_from(to, tolen, NULL, 0, timeout);
273 static int
274 ldns_tcp_bgsend_from(ldns_buffer *qbin,
275 const struct sockaddr_storage *to, socklen_t tolen,
276 const struct sockaddr_storage *from, socklen_t fromlen,
277 struct timeval timeout)
279 int sockfd;
281 sockfd = ldns_tcp_connect_from(to, tolen, from, fromlen, timeout);
283 if (sockfd == 0) {
284 return 0;
287 if (ldns_tcp_send_query(qbin, sockfd, to, tolen) == 0) {
288 #ifndef USE_WINSOCK
289 close(sockfd);
290 #else
291 closesocket(sockfd);
292 #endif
293 return 0;
296 return sockfd;
300 ldns_tcp_bgsend(ldns_buffer *qbin,
301 const struct sockaddr_storage *to, socklen_t tolen,
302 struct timeval timeout)
304 return ldns_tcp_bgsend_from(qbin, to, tolen, NULL, 0, timeout);
308 /* keep in mind that in DNS tcp messages the first 2 bytes signal the
309 * amount data to expect
311 static ldns_status
312 ldns_tcp_send_from(uint8_t **result, ldns_buffer *qbin,
313 const struct sockaddr_storage *to, socklen_t tolen,
314 const struct sockaddr_storage *from, socklen_t fromlen,
315 struct timeval timeout, size_t *answer_size)
317 int sockfd;
318 uint8_t *answer;
320 sockfd = ldns_tcp_bgsend_from(qbin, to, tolen, from, fromlen, timeout);
322 if (sockfd == 0) {
323 return LDNS_STATUS_ERR;
326 answer = ldns_tcp_read_wire_timeout(sockfd, answer_size, timeout);
327 #ifndef USE_WINSOCK
328 close(sockfd);
329 #else
330 closesocket(sockfd);
331 #endif
333 if (*answer_size == 0) {
334 /* oops */
335 return LDNS_STATUS_NETWORK_ERR;
338 /* resize accordingly */
339 *result = LDNS_XREALLOC(answer, uint8_t, (size_t)*answer_size);
340 if(!*result) {
341 LDNS_FREE(answer);
342 return LDNS_STATUS_MEM_ERR;
344 return LDNS_STATUS_OK;
347 ldns_status
348 ldns_tcp_send(uint8_t **result, ldns_buffer *qbin,
349 const struct sockaddr_storage *to, socklen_t tolen,
350 struct timeval timeout, size_t *answer_size)
352 return ldns_tcp_send_from(result, qbin,
353 to, tolen, NULL, 0, timeout, answer_size);
357 ldns_udp_connect(const struct sockaddr_storage *to, struct timeval ATTR_UNUSED(timeout))
359 int sockfd;
361 #ifndef S_SPLINT_S
362 if ((sockfd = socket((int)((struct sockaddr*)to)->sa_family, SOCK_DGRAM,
363 IPPROTO_UDP))
364 == -1) {
365 return 0;
367 #endif
368 return sockfd;
371 static int
372 ldns_udp_bgsend_from(ldns_buffer *qbin,
373 const struct sockaddr_storage *to , socklen_t tolen,
374 const struct sockaddr_storage *from, socklen_t fromlen,
375 struct timeval timeout)
377 int sockfd;
379 sockfd = ldns_udp_connect(to, timeout);
381 if (sockfd == 0) {
382 return 0;
385 if (from && bind(sockfd, (const struct sockaddr*)from, fromlen) == -1){
386 return 0;
389 if (ldns_udp_send_query(qbin, sockfd, to, tolen) == 0) {
390 #ifndef USE_WINSOCK
391 close(sockfd);
392 #else
393 closesocket(sockfd);
394 #endif
395 return 0;
397 return sockfd;
401 ldns_udp_bgsend(ldns_buffer *qbin,
402 const struct sockaddr_storage *to , socklen_t tolen,
403 struct timeval timeout)
405 return ldns_udp_bgsend_from(qbin, to, tolen, NULL, 0, timeout);
408 static ldns_status
409 ldns_udp_send_from(uint8_t **result, ldns_buffer *qbin,
410 const struct sockaddr_storage *to , socklen_t tolen,
411 const struct sockaddr_storage *from, socklen_t fromlen,
412 struct timeval timeout, size_t *answer_size)
414 int sockfd;
415 uint8_t *answer;
417 sockfd = ldns_udp_bgsend_from(qbin, to, tolen, from, fromlen, timeout);
419 if (sockfd == 0) {
420 return LDNS_STATUS_SOCKET_ERROR;
423 /* wait for an response*/
424 if(!ldns_sock_wait(sockfd, timeout, 0)) {
425 #ifndef USE_WINSOCK
426 close(sockfd);
427 #else
428 closesocket(sockfd);
429 #endif
430 return LDNS_STATUS_NETWORK_ERR;
433 /* set to nonblocking, so if the checksum is bad, it becomes
434 * an EGAIN error and the ldns_udp_send function does not block,
435 * but returns a 'NETWORK_ERROR' much like a timeout. */
436 ldns_sock_nonblock(sockfd);
438 answer = ldns_udp_read_wire(sockfd, answer_size, NULL, NULL);
439 #ifndef USE_WINSOCK
440 close(sockfd);
441 #else
442 closesocket(sockfd);
443 #endif
445 if (*answer_size == 0) {
446 /* oops */
447 return LDNS_STATUS_NETWORK_ERR;
450 *result = answer;
451 return LDNS_STATUS_OK;
454 ldns_status
455 ldns_udp_send(uint8_t **result, ldns_buffer *qbin,
456 const struct sockaddr_storage *to , socklen_t tolen,
457 struct timeval timeout, size_t *answer_size)
459 return ldns_udp_send_from(result, qbin, to, tolen, NULL, 0,
460 timeout, answer_size);
463 ldns_status
464 ldns_send_buffer(ldns_pkt **result, ldns_resolver *r, ldns_buffer *qb, ldns_rdf *tsig_mac)
466 uint8_t i;
468 struct sockaddr_storage *src = NULL;
469 size_t src_len;
470 struct sockaddr_storage *ns;
471 size_t ns_len;
472 struct timeval tv_s;
473 struct timeval tv_e;
475 ldns_rdf **ns_array;
476 size_t *rtt;
477 ldns_pkt *reply;
478 bool all_servers_rtt_inf;
479 uint8_t retries;
481 uint8_t *reply_bytes = NULL;
482 size_t reply_size = 0;
483 ldns_status status, send_status;
485 assert(r != NULL);
487 status = LDNS_STATUS_OK;
488 rtt = ldns_resolver_rtt(r);
489 ns_array = ldns_resolver_nameservers(r);
490 reply = NULL;
491 ns_len = 0;
493 all_servers_rtt_inf = true;
495 if (ldns_resolver_random(r)) {
496 ldns_resolver_nameservers_randomize(r);
499 if(ldns_resolver_source(r)) {
500 src = ldns_rdf2native_sockaddr_storage_port(
501 ldns_resolver_source(r), 0, &src_len);
504 /* loop through all defined nameservers */
505 for (i = 0; i < ldns_resolver_nameserver_count(r); i++) {
506 if (rtt[i] == LDNS_RESOLV_RTT_INF) {
507 /* not reachable nameserver! */
508 continue;
511 /* maybe verbosity setting?
512 printf("Sending to ");
513 ldns_rdf_print(stdout, ns_array[i]);
514 printf("\n");
516 ns = ldns_rdf2native_sockaddr_storage(ns_array[i],
517 ldns_resolver_port(r), &ns_len);
520 #ifndef S_SPLINT_S
521 if ((ns->ss_family == AF_INET) &&
522 (ldns_resolver_ip6(r) == LDNS_RESOLV_INET6)) {
523 /* not reachable */
524 LDNS_FREE(ns);
525 continue;
528 if ((ns->ss_family == AF_INET6) &&
529 (ldns_resolver_ip6(r) == LDNS_RESOLV_INET)) {
530 /* not reachable */
531 LDNS_FREE(ns);
532 continue;
534 #endif
536 all_servers_rtt_inf = false;
538 gettimeofday(&tv_s, NULL);
540 send_status = LDNS_STATUS_ERR;
542 /* reply_bytes implicitly handles our error */
543 if (ldns_resolver_usevc(r)) {
544 for (retries = ldns_resolver_retry(r); retries > 0; retries--) {
545 send_status =
546 ldns_tcp_send_from(&reply_bytes, qb,
547 ns, (socklen_t)ns_len,
548 src, (socklen_t)src_len,
549 ldns_resolver_timeout(r),
550 &reply_size);
551 if (send_status == LDNS_STATUS_OK) {
552 break;
555 } else {
556 for (retries = ldns_resolver_retry(r); retries > 0; retries--) {
557 /* ldns_rdf_print(stdout, ns_array[i]); */
558 send_status =
559 ldns_udp_send_from(&reply_bytes, qb,
560 ns, (socklen_t)ns_len,
561 src, (socklen_t)src_len,
562 ldns_resolver_timeout(r),
563 &reply_size);
564 if (send_status == LDNS_STATUS_OK) {
565 break;
570 if (send_status != LDNS_STATUS_OK) {
571 ldns_resolver_set_nameserver_rtt(r, i, LDNS_RESOLV_RTT_INF);
572 status = send_status;
575 /* obey the fail directive */
576 if (!reply_bytes) {
577 /* the current nameserver seems to have a problem, blacklist it */
578 if (ldns_resolver_fail(r)) {
579 LDNS_FREE(ns);
580 return LDNS_STATUS_ERR;
581 } else {
582 LDNS_FREE(ns);
583 continue;
587 status = ldns_wire2pkt(&reply, reply_bytes, reply_size);
588 if (status != LDNS_STATUS_OK) {
589 LDNS_FREE(reply_bytes);
590 LDNS_FREE(ns);
591 return status;
594 LDNS_FREE(ns);
595 gettimeofday(&tv_e, NULL);
597 if (reply) {
598 ldns_pkt_set_querytime(reply, (uint32_t)
599 ((tv_e.tv_sec - tv_s.tv_sec) * 1000) +
600 (tv_e.tv_usec - tv_s.tv_usec) / 1000);
601 ldns_pkt_set_answerfrom(reply,
602 ldns_rdf_clone(ns_array[i]));
603 ldns_pkt_set_timestamp(reply, tv_s);
604 ldns_pkt_set_size(reply, reply_size);
605 break;
606 } else {
607 if (ldns_resolver_fail(r)) {
608 /* if fail is set bail out, after the first
609 * one */
610 break;
614 /* wait retrans seconds... */
615 sleep((unsigned int) ldns_resolver_retrans(r));
618 if(src) {
619 LDNS_FREE(src);
621 if (all_servers_rtt_inf) {
622 LDNS_FREE(reply_bytes);
623 return LDNS_STATUS_RES_NO_NS;
625 #ifdef HAVE_SSL
626 if (tsig_mac && reply && reply_bytes) {
627 if (!ldns_pkt_tsig_verify(reply,
628 reply_bytes,
629 reply_size,
630 ldns_resolver_tsig_keyname(r),
631 ldns_resolver_tsig_keydata(r), tsig_mac)) {
632 status = LDNS_STATUS_CRYPTO_TSIG_BOGUS;
635 #else
636 (void)tsig_mac;
637 #endif /* HAVE_SSL */
639 LDNS_FREE(reply_bytes);
640 if (result) {
641 *result = reply;
644 return status;
647 ssize_t
648 ldns_tcp_send_query(ldns_buffer *qbin, int sockfd,
649 const struct sockaddr_storage *to, socklen_t tolen)
651 uint8_t *sendbuf;
652 ssize_t bytes;
654 /* add length of packet */
655 sendbuf = LDNS_XMALLOC(uint8_t, ldns_buffer_position(qbin) + 2);
656 if(!sendbuf) return 0;
657 ldns_write_uint16(sendbuf, ldns_buffer_position(qbin));
658 memcpy(sendbuf + 2, ldns_buffer_begin(qbin), ldns_buffer_position(qbin));
660 bytes = sendto(sockfd, (void*)sendbuf,
661 ldns_buffer_position(qbin) + 2, 0, (struct sockaddr *)to, tolen);
663 LDNS_FREE(sendbuf);
665 if (bytes == -1 || (size_t) bytes != ldns_buffer_position(qbin) + 2 ) {
666 return 0;
668 return bytes;
671 /* don't wait for an answer */
672 ssize_t
673 ldns_udp_send_query(ldns_buffer *qbin, int sockfd, const struct sockaddr_storage *to,
674 socklen_t tolen)
676 ssize_t bytes;
678 bytes = sendto(sockfd, (void*)ldns_buffer_begin(qbin),
679 ldns_buffer_position(qbin), 0, (struct sockaddr *)to, tolen);
681 if (bytes == -1 || (size_t)bytes != ldns_buffer_position(qbin)) {
682 return 0;
684 if ((size_t) bytes != ldns_buffer_position(qbin)) {
685 return 0;
687 return bytes;
690 uint8_t *
691 ldns_udp_read_wire(int sockfd, size_t *size, struct sockaddr_storage *from,
692 socklen_t *fromlen)
694 uint8_t *wire, *wireout;
695 ssize_t wire_size;
697 wire = LDNS_XMALLOC(uint8_t, LDNS_MAX_PACKETLEN);
698 if (!wire) {
699 *size = 0;
700 return NULL;
703 wire_size = recvfrom(sockfd, (void*)wire, LDNS_MAX_PACKETLEN, 0,
704 (struct sockaddr *)from, fromlen);
706 /* recvfrom can also return 0 */
707 if (wire_size == -1 || wire_size == 0) {
708 *size = 0;
709 LDNS_FREE(wire);
710 return NULL;
713 *size = (size_t)wire_size;
714 wireout = LDNS_XREALLOC(wire, uint8_t, (size_t)wire_size);
715 if(!wireout) LDNS_FREE(wire);
717 return wireout;
720 uint8_t *
721 ldns_tcp_read_wire_timeout(int sockfd, size_t *size, struct timeval timeout)
723 uint8_t *wire;
724 uint16_t wire_size;
725 ssize_t bytes = 0, rc = 0;
727 wire = LDNS_XMALLOC(uint8_t, 2);
728 if (!wire) {
729 *size = 0;
730 return NULL;
733 while (bytes < 2) {
734 if(!ldns_sock_wait(sockfd, timeout, 0)) {
735 *size = 0;
736 LDNS_FREE(wire);
737 return NULL;
739 rc = recv(sockfd, (void*) (wire + bytes),
740 (size_t) (2 - bytes), 0);
741 if (rc == -1 || rc == 0) {
742 *size = 0;
743 LDNS_FREE(wire);
744 return NULL;
746 bytes += rc;
749 wire_size = ldns_read_uint16(wire);
751 LDNS_FREE(wire);
752 wire = LDNS_XMALLOC(uint8_t, wire_size);
753 if (!wire) {
754 *size = 0;
755 return NULL;
757 bytes = 0;
759 while (bytes < (ssize_t) wire_size) {
760 if(!ldns_sock_wait(sockfd, timeout, 0)) {
761 *size = 0;
762 LDNS_FREE(wire);
763 return NULL;
765 rc = recv(sockfd, (void*) (wire + bytes),
766 (size_t) (wire_size - bytes), 0);
767 if (rc == -1 || rc == 0) {
768 LDNS_FREE(wire);
769 *size = 0;
770 return NULL;
772 bytes += rc;
775 *size = (size_t) bytes;
776 return wire;
779 uint8_t *
780 ldns_tcp_read_wire(int sockfd, size_t *size)
782 uint8_t *wire;
783 uint16_t wire_size;
784 ssize_t bytes = 0, rc = 0;
786 wire = LDNS_XMALLOC(uint8_t, 2);
787 if (!wire) {
788 *size = 0;
789 return NULL;
792 while (bytes < 2) {
793 rc = recv(sockfd, (void*) (wire + bytes),
794 (size_t) (2 - bytes), 0);
795 if (rc == -1 || rc == 0) {
796 *size = 0;
797 LDNS_FREE(wire);
798 return NULL;
800 bytes += rc;
803 wire_size = ldns_read_uint16(wire);
805 LDNS_FREE(wire);
806 wire = LDNS_XMALLOC(uint8_t, wire_size);
807 if (!wire) {
808 *size = 0;
809 return NULL;
811 bytes = 0;
813 while (bytes < (ssize_t) wire_size) {
814 rc = recv(sockfd, (void*) (wire + bytes),
815 (size_t) (wire_size - bytes), 0);
816 if (rc == -1 || rc == 0) {
817 LDNS_FREE(wire);
818 *size = 0;
819 return NULL;
821 bytes += rc;
824 *size = (size_t) bytes;
825 return wire;
828 #ifndef S_SPLINT_S
829 ldns_rdf *
830 ldns_sockaddr_storage2rdf(struct sockaddr_storage *sock, uint16_t *port)
832 ldns_rdf *addr;
833 struct sockaddr_in *data_in;
834 struct sockaddr_in6 *data_in6;
836 switch(sock->ss_family) {
837 case AF_INET:
838 data_in = (struct sockaddr_in*)sock;
839 if (port) {
840 *port = ntohs((uint16_t)data_in->sin_port);
842 addr = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_A,
843 LDNS_IP4ADDRLEN, &data_in->sin_addr);
844 break;
845 case AF_INET6:
846 data_in6 = (struct sockaddr_in6*)sock;
847 if (port) {
848 *port = ntohs((uint16_t)data_in6->sin6_port);
850 addr = ldns_rdf_new_frm_data(LDNS_RDF_TYPE_AAAA,
851 LDNS_IP6ADDRLEN, &data_in6->sin6_addr);
852 break;
853 default:
854 if (port) {
855 *port = 0;
857 return NULL;
859 return addr;
861 #endif
863 /* code from resolver.c */
864 ldns_status
865 ldns_axfr_start(ldns_resolver *resolver, ldns_rdf *domain, ldns_rr_class class)
867 ldns_pkt *query;
868 ldns_buffer *query_wire;
870 struct sockaddr_storage *src = NULL;
871 size_t src_len = 0;
872 struct sockaddr_storage *ns = NULL;
873 size_t ns_len = 0;
874 size_t ns_i;
875 ldns_status status;
877 if (!resolver || ldns_resolver_nameserver_count(resolver) < 1) {
878 return LDNS_STATUS_ERR;
881 query = ldns_pkt_query_new(ldns_rdf_clone(domain), LDNS_RR_TYPE_AXFR, class, 0);
883 if (!query) {
884 return LDNS_STATUS_ADDRESS_ERR;
886 if(ldns_resolver_source(resolver)) {
887 src = ldns_rdf2native_sockaddr_storage_port(
888 ldns_resolver_source(resolver), 0, &src_len);
890 /* For AXFR, we have to make the connection ourselves */
891 /* try all nameservers (which usually would mean v4 fallback if
892 * @hostname is used */
893 for (ns_i = 0;
894 ns_i < ldns_resolver_nameserver_count(resolver) &&
895 resolver->_socket == 0;
896 ns_i++) {
897 if (ns != NULL) {
898 LDNS_FREE(ns);
900 ns = ldns_rdf2native_sockaddr_storage(
901 resolver->_nameservers[ns_i],
902 ldns_resolver_port(resolver), &ns_len);
904 resolver->_socket = ldns_tcp_connect_from(
905 ns, (socklen_t)ns_len,
906 src, (socklen_t)src_len,
907 ldns_resolver_timeout(resolver));
910 if (resolver->_socket == 0) {
911 ldns_pkt_free(query);
912 LDNS_FREE(ns);
913 return LDNS_STATUS_NETWORK_ERR;
916 #ifdef HAVE_SSL
917 if (ldns_resolver_tsig_keyname(resolver) && ldns_resolver_tsig_keydata(resolver)) {
918 status = ldns_pkt_tsig_sign(query,
919 ldns_resolver_tsig_keyname(resolver),
920 ldns_resolver_tsig_keydata(resolver),
921 300, ldns_resolver_tsig_algorithm(resolver), NULL);
922 if (status != LDNS_STATUS_OK) {
923 /* to prevent problems on subsequent calls to
924 * ldns_axfr_start we have to close the socket here! */
925 #ifndef USE_WINSOCK
926 close(resolver->_socket);
927 #else
928 closesocket(resolver->_socket);
929 #endif
930 resolver->_socket = 0;
932 ldns_pkt_free(query);
933 LDNS_FREE(ns);
935 return LDNS_STATUS_CRYPTO_TSIG_ERR;
938 #endif /* HAVE_SSL */
940 /* Convert the query to a buffer
941 * Is this necessary?
943 query_wire = ldns_buffer_new(LDNS_MAX_PACKETLEN);
944 if(!query_wire) {
945 ldns_pkt_free(query);
946 LDNS_FREE(ns);
947 #ifndef USE_WINSOCK
948 close(resolver->_socket);
949 #else
950 closesocket(resolver->_socket);
951 #endif
952 resolver->_socket = 0;
954 return LDNS_STATUS_MEM_ERR;
956 status = ldns_pkt2buffer_wire(query_wire, query);
957 if (status != LDNS_STATUS_OK) {
958 ldns_pkt_free(query);
959 ldns_buffer_free(query_wire);
960 LDNS_FREE(ns);
962 /* to prevent problems on subsequent calls to ldns_axfr_start
963 * we have to close the socket here! */
964 #ifndef USE_WINSOCK
965 close(resolver->_socket);
966 #else
967 closesocket(resolver->_socket);
968 #endif
969 resolver->_socket = 0;
971 return status;
973 /* Send the query */
974 if (ldns_tcp_send_query(query_wire, resolver->_socket, ns,
975 (socklen_t)ns_len) == 0) {
976 ldns_pkt_free(query);
977 ldns_buffer_free(query_wire);
978 LDNS_FREE(ns);
980 /* to prevent problems on subsequent calls to ldns_axfr_start
981 * we have to close the socket here! */
983 #ifndef USE_WINSOCK
984 close(resolver->_socket);
985 #else
986 closesocket(resolver->_socket);
987 #endif
988 resolver->_socket = 0;
990 return LDNS_STATUS_NETWORK_ERR;
993 ldns_pkt_free(query);
994 ldns_buffer_free(query_wire);
995 LDNS_FREE(ns);
998 * The AXFR is done once the second SOA record is sent
1000 resolver->_axfr_soa_count = 0;
1001 return LDNS_STATUS_OK;