1ec20fe00SJun-ichiro itojun Hagino /* $KAME: getaddrinfo.c,v 1.15 2000/07/09 04:37:24 itojun Exp $ */ 2b826397aSJun-ichiro itojun Hagino 37d56d374SYoshinobu Inoue /* 47d56d374SYoshinobu Inoue * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. 57d56d374SYoshinobu Inoue * All rights reserved. 67d56d374SYoshinobu Inoue * 77d56d374SYoshinobu Inoue * Redistribution and use in source and binary forms, with or without 87d56d374SYoshinobu Inoue * modification, are permitted provided that the following conditions 97d56d374SYoshinobu Inoue * are met: 107d56d374SYoshinobu Inoue * 1. Redistributions of source code must retain the above copyright 117d56d374SYoshinobu Inoue * notice, this list of conditions and the following disclaimer. 127d56d374SYoshinobu Inoue * 2. Redistributions in binary form must reproduce the above copyright 137d56d374SYoshinobu Inoue * notice, this list of conditions and the following disclaimer in the 147d56d374SYoshinobu Inoue * documentation and/or other materials provided with the distribution. 157d56d374SYoshinobu Inoue * 3. Neither the name of the project nor the names of its contributors 167d56d374SYoshinobu Inoue * may be used to endorse or promote products derived from this software 177d56d374SYoshinobu Inoue * without specific prior written permission. 187d56d374SYoshinobu Inoue * 197d56d374SYoshinobu Inoue * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 207d56d374SYoshinobu Inoue * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 217d56d374SYoshinobu Inoue * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 227d56d374SYoshinobu Inoue * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 237d56d374SYoshinobu Inoue * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 247d56d374SYoshinobu Inoue * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 257d56d374SYoshinobu Inoue * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 267d56d374SYoshinobu Inoue * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 277d56d374SYoshinobu Inoue * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 287d56d374SYoshinobu Inoue * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 297d56d374SYoshinobu Inoue * SUCH DAMAGE. 307d56d374SYoshinobu Inoue */ 317d56d374SYoshinobu Inoue 327d56d374SYoshinobu Inoue /* 337d56d374SYoshinobu Inoue * "#ifdef FAITH" part is local hack for supporting IPv4-v6 translator. 347d56d374SYoshinobu Inoue * 357d56d374SYoshinobu Inoue * Issues to be discussed: 367d56d374SYoshinobu Inoue * - Thread safe-ness must be checked. 377d56d374SYoshinobu Inoue * - Return values. There are nonstandard return values defined and used 387d56d374SYoshinobu Inoue * in the source code. This is because RFC2553 is silent about which error 397d56d374SYoshinobu Inoue * code must be returned for which situation. 40a42af91cSHajimu UMEMOTO * - freeaddrinfo(NULL). RFC2553 is silent about it. XNET 5.2 says it is 41dd521ef1SHajimu UMEMOTO * invalid. current code - SEGV on freeaddrinfo(NULL) 42dd521ef1SHajimu UMEMOTO * 4300a8a579SYoshinobu Inoue * Note: 4400a8a579SYoshinobu Inoue * - The code filters out AFs that are not supported by the kernel, 4500a8a579SYoshinobu Inoue * when globbing NULL hostname (to loopback, or wildcard). Is it the right 4600a8a579SYoshinobu Inoue * thing to do? What is the relationship with post-RFC2553 AI_ADDRCONFIG 4700a8a579SYoshinobu Inoue * in ai_flags? 48a42af91cSHajimu UMEMOTO * - (post-2553) semantics of AI_ADDRCONFIG itself is too vague. 49a42af91cSHajimu UMEMOTO * (1) what should we do against numeric hostname (2) what should we do 50a42af91cSHajimu UMEMOTO * against NULL hostname (3) what is AI_ADDRCONFIG itself. AF not ready? 51a42af91cSHajimu UMEMOTO * non-loopback address configured? global address configured? 52dd521ef1SHajimu UMEMOTO * 53dd521ef1SHajimu UMEMOTO * OS specific notes for netbsd/openbsd/freebsd4/bsdi4: 54a42af91cSHajimu UMEMOTO * - To avoid search order issue, we have a big amount of code duplicate 55a42af91cSHajimu UMEMOTO * from gethnamaddr.c and some other places. The issues that there's no 56a42af91cSHajimu UMEMOTO * lower layer function to lookup "IPv4 or IPv6" record. Calling 57a42af91cSHajimu UMEMOTO * gethostbyname2 from getaddrinfo will end up in wrong search order, as 58dd521ef1SHajimu UMEMOTO * presented above. 59dd521ef1SHajimu UMEMOTO * 60dd521ef1SHajimu UMEMOTO * OS specific notes for freebsd4: 61dd521ef1SHajimu UMEMOTO * - FreeBSD supported $GAI. The code does not. 62dd521ef1SHajimu UMEMOTO * - FreeBSD allowed classful IPv4 numeric (127.1), the code does not. 637d56d374SYoshinobu Inoue */ 647d56d374SYoshinobu Inoue 65333fc21eSDavid E. O'Brien #include <sys/cdefs.h> 66333fc21eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 67333fc21eSDavid E. O'Brien 68d201fe46SDaniel Eischen #include "namespace.h" 697d56d374SYoshinobu Inoue #include <sys/types.h> 707d56d374SYoshinobu Inoue #include <sys/param.h> 717d56d374SYoshinobu Inoue #include <sys/socket.h> 727d56d374SYoshinobu Inoue #include <net/if.h> 737d56d374SYoshinobu Inoue #include <netinet/in.h> 747d56d374SYoshinobu Inoue #include <arpa/inet.h> 757d56d374SYoshinobu Inoue #include <arpa/nameser.h> 768d630135SAlfred Perlstein #include <rpc/rpc.h> 778d630135SAlfred Perlstein #include <rpcsvc/yp_prot.h> 788d630135SAlfred Perlstein #include <rpcsvc/ypclnt.h> 797d56d374SYoshinobu Inoue #include <netdb.h> 80e8baaa70SDaniel Eischen #include <pthread.h> 817d56d374SYoshinobu Inoue #include <resolv.h> 827d56d374SYoshinobu Inoue #include <string.h> 837d56d374SYoshinobu Inoue #include <stdlib.h> 847d56d374SYoshinobu Inoue #include <stddef.h> 857d56d374SYoshinobu Inoue #include <ctype.h> 867d56d374SYoshinobu Inoue #include <unistd.h> 877d56d374SYoshinobu Inoue #include <stdio.h> 88a42af91cSHajimu UMEMOTO #include <errno.h> 8969b0a4b6SJim Pirzyk 9069b0a4b6SJim Pirzyk #include "res_config.h" 9169b0a4b6SJim Pirzyk 92ce6282dbSHajimu UMEMOTO #ifdef DEBUG 93ce6282dbSHajimu UMEMOTO #include <syslog.h> 94ce6282dbSHajimu UMEMOTO #endif 957d56d374SYoshinobu Inoue 96248aee62SJacques Vidrine #include <stdarg.h> 97248aee62SJacques Vidrine #include <nsswitch.h> 98d201fe46SDaniel Eischen #include "un-namespace.h" 992bbd7cf8SJacques Vidrine #include "libc_private.h" 100248aee62SJacques Vidrine 1017d56d374SYoshinobu Inoue #if defined(__KAME__) && defined(INET6) 1027d56d374SYoshinobu Inoue # define FAITH 1037d56d374SYoshinobu Inoue #endif 1047d56d374SYoshinobu Inoue 1057d56d374SYoshinobu Inoue #define SUCCESS 0 1067d56d374SYoshinobu Inoue #define ANY 0 1077d56d374SYoshinobu Inoue #define YES 1 1087d56d374SYoshinobu Inoue #define NO 0 1097d56d374SYoshinobu Inoue 1107d56d374SYoshinobu Inoue static const char in_addrany[] = { 0, 0, 0, 0 }; 111dd521ef1SHajimu UMEMOTO static const char in_loopback[] = { 127, 0, 0, 1 }; 112dd521ef1SHajimu UMEMOTO #ifdef INET6 1137d56d374SYoshinobu Inoue static const char in6_addrany[] = { 1147d56d374SYoshinobu Inoue 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 1157d56d374SYoshinobu Inoue }; 1167d56d374SYoshinobu Inoue static const char in6_loopback[] = { 1177d56d374SYoshinobu Inoue 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1 1187d56d374SYoshinobu Inoue }; 119dd521ef1SHajimu UMEMOTO #endif 1207d56d374SYoshinobu Inoue 1217d56d374SYoshinobu Inoue static const struct afd { 1227d56d374SYoshinobu Inoue int a_af; 1237d56d374SYoshinobu Inoue int a_addrlen; 1247d56d374SYoshinobu Inoue int a_socklen; 1257d56d374SYoshinobu Inoue int a_off; 1267d56d374SYoshinobu Inoue const char *a_addrany; 1277d56d374SYoshinobu Inoue const char *a_loopback; 1287d56d374SYoshinobu Inoue int a_scoped; 1297d56d374SYoshinobu Inoue } afdl [] = { 1307d56d374SYoshinobu Inoue #ifdef INET6 1317d56d374SYoshinobu Inoue #define N_INET6 0 1327d56d374SYoshinobu Inoue {PF_INET6, sizeof(struct in6_addr), 1337d56d374SYoshinobu Inoue sizeof(struct sockaddr_in6), 1347d56d374SYoshinobu Inoue offsetof(struct sockaddr_in6, sin6_addr), 1357d56d374SYoshinobu Inoue in6_addrany, in6_loopback, 1}, 1367d56d374SYoshinobu Inoue #define N_INET 1 1377d56d374SYoshinobu Inoue #else 1387d56d374SYoshinobu Inoue #define N_INET 0 1397d56d374SYoshinobu Inoue #endif 1407d56d374SYoshinobu Inoue {PF_INET, sizeof(struct in_addr), 1417d56d374SYoshinobu Inoue sizeof(struct sockaddr_in), 1427d56d374SYoshinobu Inoue offsetof(struct sockaddr_in, sin_addr), 1437d56d374SYoshinobu Inoue in_addrany, in_loopback, 0}, 1447d56d374SYoshinobu Inoue {0, 0, 0, 0, NULL, NULL, 0}, 1457d56d374SYoshinobu Inoue }; 1467d56d374SYoshinobu Inoue 1477d56d374SYoshinobu Inoue struct explore { 148a42af91cSHajimu UMEMOTO int e_af; 1497d56d374SYoshinobu Inoue int e_socktype; 1507d56d374SYoshinobu Inoue int e_protocol; 1517d56d374SYoshinobu Inoue const char *e_protostr; 1527d56d374SYoshinobu Inoue int e_wild; 1537d56d374SYoshinobu Inoue #define WILD_AF(ex) ((ex)->e_wild & 0x01) 1547d56d374SYoshinobu Inoue #define WILD_SOCKTYPE(ex) ((ex)->e_wild & 0x02) 1557d56d374SYoshinobu Inoue #define WILD_PROTOCOL(ex) ((ex)->e_wild & 0x04) 1567d56d374SYoshinobu Inoue }; 1577d56d374SYoshinobu Inoue 1587d56d374SYoshinobu Inoue static const struct explore explore[] = { 159a42af91cSHajimu UMEMOTO #if 0 160a42af91cSHajimu UMEMOTO { PF_LOCAL, 0, ANY, ANY, NULL, 0x01 }, 161a42af91cSHajimu UMEMOTO #endif 162a42af91cSHajimu UMEMOTO #ifdef INET6 163a42af91cSHajimu UMEMOTO { PF_INET6, SOCK_DGRAM, IPPROTO_UDP, "udp", 0x07 }, 164a42af91cSHajimu UMEMOTO { PF_INET6, SOCK_STREAM, IPPROTO_TCP, "tcp", 0x07 }, 165a42af91cSHajimu UMEMOTO { PF_INET6, SOCK_RAW, ANY, NULL, 0x05 }, 166a42af91cSHajimu UMEMOTO #endif 167a42af91cSHajimu UMEMOTO { PF_INET, SOCK_DGRAM, IPPROTO_UDP, "udp", 0x07 }, 168a42af91cSHajimu UMEMOTO { PF_INET, SOCK_STREAM, IPPROTO_TCP, "tcp", 0x07 }, 169a42af91cSHajimu UMEMOTO { PF_INET, SOCK_RAW, ANY, NULL, 0x05 }, 170a42af91cSHajimu UMEMOTO { PF_UNSPEC, SOCK_DGRAM, IPPROTO_UDP, "udp", 0x07 }, 171a42af91cSHajimu UMEMOTO { PF_UNSPEC, SOCK_STREAM, IPPROTO_TCP, "tcp", 0x07 }, 172a42af91cSHajimu UMEMOTO { PF_UNSPEC, SOCK_RAW, ANY, NULL, 0x05 }, 173a42af91cSHajimu UMEMOTO { -1, 0, 0, NULL, 0 }, 1747d56d374SYoshinobu Inoue }; 1757d56d374SYoshinobu Inoue 1767d56d374SYoshinobu Inoue #ifdef INET6 1777d56d374SYoshinobu Inoue #define PTON_MAX 16 1787d56d374SYoshinobu Inoue #else 1797d56d374SYoshinobu Inoue #define PTON_MAX 4 1807d56d374SYoshinobu Inoue #endif 1817d56d374SYoshinobu Inoue 182248aee62SJacques Vidrine static const ns_src default_dns_files[] = { 183248aee62SJacques Vidrine { NSSRC_FILES, NS_SUCCESS }, 184248aee62SJacques Vidrine { NSSRC_DNS, NS_SUCCESS }, 185248aee62SJacques Vidrine { 0 } 186248aee62SJacques Vidrine }; 187248aee62SJacques Vidrine 188a42af91cSHajimu UMEMOTO struct res_target { 189a42af91cSHajimu UMEMOTO struct res_target *next; 190a42af91cSHajimu UMEMOTO const char *name; /* domain name */ 191b826397aSJun-ichiro itojun Hagino int qclass, qtype; /* class and type of query */ 192a42af91cSHajimu UMEMOTO u_char *answer; /* buffer to put answer */ 193a42af91cSHajimu UMEMOTO int anslen; /* size of answer buffer */ 194a42af91cSHajimu UMEMOTO int n; /* result length */ 195a42af91cSHajimu UMEMOTO }; 196a42af91cSHajimu UMEMOTO 197688a5c3eSHajimu UMEMOTO #define MAXPACKET (64*1024) 198688a5c3eSHajimu UMEMOTO 199688a5c3eSHajimu UMEMOTO typedef union { 200688a5c3eSHajimu UMEMOTO HEADER hdr; 201688a5c3eSHajimu UMEMOTO u_char buf[MAXPACKET]; 202688a5c3eSHajimu UMEMOTO } querybuf; 203688a5c3eSHajimu UMEMOTO 204c05ac53bSDavid E. O'Brien static int str_isnumber(const char *); 2051372519bSDavid E. O'Brien static int explore_null(const struct addrinfo *, 2061372519bSDavid E. O'Brien const char *, struct addrinfo **); 2071372519bSDavid E. O'Brien static int explore_numeric(const struct addrinfo *, const char *, 2081372519bSDavid E. O'Brien const char *, struct addrinfo **); 2091372519bSDavid E. O'Brien static int explore_numeric_scope(const struct addrinfo *, const char *, 2101372519bSDavid E. O'Brien const char *, struct addrinfo **); 2111372519bSDavid E. O'Brien static int get_canonname(const struct addrinfo *, 2121372519bSDavid E. O'Brien struct addrinfo *, const char *); 2131372519bSDavid E. O'Brien static struct addrinfo *get_ai(const struct addrinfo *, 2141372519bSDavid E. O'Brien const struct afd *, const char *); 215c05ac53bSDavid E. O'Brien static int get_portmatch(const struct addrinfo *, const char *); 216c05ac53bSDavid E. O'Brien static int get_port(struct addrinfo *, const char *, int); 217c05ac53bSDavid E. O'Brien static const struct afd *find_afd(int); 218c05ac53bSDavid E. O'Brien static int addrconfig(struct addrinfo *); 219a42af91cSHajimu UMEMOTO #ifdef INET6 220a89c1d30SHajimu UMEMOTO static int ip6_str2scopeid(char *, struct sockaddr_in6 *, u_int32_t *); 221a42af91cSHajimu UMEMOTO #endif 222a42af91cSHajimu UMEMOTO 223688a5c3eSHajimu UMEMOTO static int explore_fqdn(const struct addrinfo *, const char *, 224688a5c3eSHajimu UMEMOTO const char *, struct addrinfo **); 225688a5c3eSHajimu UMEMOTO 2261372519bSDavid E. O'Brien static struct addrinfo *getanswer(const querybuf *, int, const char *, int, 2271372519bSDavid E. O'Brien const struct addrinfo *); 228688a5c3eSHajimu UMEMOTO #if defined(RESOLVSORT) 229688a5c3eSHajimu UMEMOTO static int addr4sort(struct addrinfo *); 230688a5c3eSHajimu UMEMOTO #endif 231a89c1d30SHajimu UMEMOTO static int _dns_getaddrinfo(void *, void *, va_list); 232c05ac53bSDavid E. O'Brien static void _sethtent(void); 233c05ac53bSDavid E. O'Brien static void _endhtent(void); 234c05ac53bSDavid E. O'Brien static struct addrinfo *_gethtent(const char *, const struct addrinfo *); 235c05ac53bSDavid E. O'Brien static int _files_getaddrinfo(void *, void *, va_list); 236a42af91cSHajimu UMEMOTO #ifdef YP 237c05ac53bSDavid E. O'Brien static struct addrinfo *_yphostent(char *, const struct addrinfo *); 238c05ac53bSDavid E. O'Brien static int _yp_getaddrinfo(void *, void *, va_list); 239a42af91cSHajimu UMEMOTO #endif 240a42af91cSHajimu UMEMOTO 241c05ac53bSDavid E. O'Brien static int res_queryN(const char *, struct res_target *); 242c05ac53bSDavid E. O'Brien static int res_searchN(const char *, struct res_target *); 2431372519bSDavid E. O'Brien static int res_querydomainN(const char *, const char *, 2441372519bSDavid E. O'Brien struct res_target *); 245a42af91cSHajimu UMEMOTO 246b29ec00bSHajimu UMEMOTO static struct ai_errlist { 247b29ec00bSHajimu UMEMOTO const char *str; 248b29ec00bSHajimu UMEMOTO int code; 249b29ec00bSHajimu UMEMOTO } ai_errlist[] = { 250b29ec00bSHajimu UMEMOTO { "Success", 0, }, 251b29ec00bSHajimu UMEMOTO { "Temporary failure in name resolution", EAI_AGAIN, }, 252b29ec00bSHajimu UMEMOTO { "Invalid value for ai_flags", EAI_BADFLAGS, }, 253b29ec00bSHajimu UMEMOTO { "Non-recoverable failure in name resolution", EAI_FAIL, }, 254b29ec00bSHajimu UMEMOTO { "ai_family not supported", EAI_FAMILY, }, 255b29ec00bSHajimu UMEMOTO { "Memory allocation failure", EAI_MEMORY, }, 256b29ec00bSHajimu UMEMOTO { "hostname nor servname provided, or not known", EAI_NONAME, }, 257b29ec00bSHajimu UMEMOTO { "servname not supported for ai_socktype", EAI_SERVICE, }, 258b29ec00bSHajimu UMEMOTO { "ai_socktype not supported", EAI_SOCKTYPE, }, 259b29ec00bSHajimu UMEMOTO { "System error returned in errno", EAI_SYSTEM, }, 260b29ec00bSHajimu UMEMOTO { "Invalid value for hints", EAI_BADHINTS, }, 261b29ec00bSHajimu UMEMOTO { "Resolved protocol is unknown", EAI_PROTOCOL, }, 262b29ec00bSHajimu UMEMOTO /* backward compatibility with userland code prior to 2553bis-02 */ 263b29ec00bSHajimu UMEMOTO { "Address family for hostname not supported", 1, }, 264b29ec00bSHajimu UMEMOTO { "No address associated with hostname", 7, }, 265b29ec00bSHajimu UMEMOTO { NULL, -1, }, 2667d56d374SYoshinobu Inoue }; 2677d56d374SYoshinobu Inoue 26871918af6SHajimu UMEMOTO /* 26971918af6SHajimu UMEMOTO * XXX: Our res_*() is not thread-safe. So, we share lock between 27071918af6SHajimu UMEMOTO * getaddrinfo() and getipnodeby*(). Still, we cannot use 27171918af6SHajimu UMEMOTO * getaddrinfo() and getipnodeby*() in conjunction with other 27271918af6SHajimu UMEMOTO * functions which call res_*(). 27371918af6SHajimu UMEMOTO */ 274e8baaa70SDaniel Eischen pthread_mutex_t __getaddrinfo_thread_lock = PTHREAD_MUTEX_INITIALIZER; 27571918af6SHajimu UMEMOTO #define THREAD_LOCK() \ 276e8baaa70SDaniel Eischen if (__isthreaded) _pthread_mutex_lock(&__getaddrinfo_thread_lock); 27771918af6SHajimu UMEMOTO #define THREAD_UNLOCK() \ 278e8baaa70SDaniel Eischen if (__isthreaded) _pthread_mutex_unlock(&__getaddrinfo_thread_lock); 27971918af6SHajimu UMEMOTO 2807d56d374SYoshinobu Inoue /* XXX macros that make external reference is BAD. */ 2817d56d374SYoshinobu Inoue 2827d56d374SYoshinobu Inoue #define GET_AI(ai, afd, addr) \ 2837d56d374SYoshinobu Inoue do { \ 2847d56d374SYoshinobu Inoue /* external reference: pai, error, and label free */ \ 2857d56d374SYoshinobu Inoue (ai) = get_ai(pai, (afd), (addr)); \ 2867d56d374SYoshinobu Inoue if ((ai) == NULL) { \ 2877d56d374SYoshinobu Inoue error = EAI_MEMORY; \ 2887d56d374SYoshinobu Inoue goto free; \ 2897d56d374SYoshinobu Inoue } \ 290a42af91cSHajimu UMEMOTO } while (/*CONSTCOND*/0) 2917d56d374SYoshinobu Inoue 2927d56d374SYoshinobu Inoue #define GET_PORT(ai, serv) \ 2937d56d374SYoshinobu Inoue do { \ 2947d56d374SYoshinobu Inoue /* external reference: error and label free */ \ 2957d56d374SYoshinobu Inoue error = get_port((ai), (serv), 0); \ 2967d56d374SYoshinobu Inoue if (error != 0) \ 2977d56d374SYoshinobu Inoue goto free; \ 298a42af91cSHajimu UMEMOTO } while (/*CONSTCOND*/0) 2997d56d374SYoshinobu Inoue 3007d56d374SYoshinobu Inoue #define GET_CANONNAME(ai, str) \ 3017d56d374SYoshinobu Inoue do { \ 3027d56d374SYoshinobu Inoue /* external reference: pai, error and label free */ \ 3037d56d374SYoshinobu Inoue error = get_canonname(pai, (ai), (str)); \ 3047d56d374SYoshinobu Inoue if (error != 0) \ 3057d56d374SYoshinobu Inoue goto free; \ 306a42af91cSHajimu UMEMOTO } while (/*CONSTCOND*/0) 3077d56d374SYoshinobu Inoue 3087d56d374SYoshinobu Inoue #define ERR(err) \ 3097d56d374SYoshinobu Inoue do { \ 3107d56d374SYoshinobu Inoue /* external reference: error, and label bad */ \ 3117d56d374SYoshinobu Inoue error = (err); \ 3127d56d374SYoshinobu Inoue goto bad; \ 313a42af91cSHajimu UMEMOTO /*NOTREACHED*/ \ 314a42af91cSHajimu UMEMOTO } while (/*CONSTCOND*/0) 3157d56d374SYoshinobu Inoue 3167d56d374SYoshinobu Inoue #define MATCH_FAMILY(x, y, w) \ 317a42af91cSHajimu UMEMOTO ((x) == (y) || (/*CONSTCOND*/(w) && ((x) == PF_UNSPEC || (y) == PF_UNSPEC))) 3187d56d374SYoshinobu Inoue #define MATCH(x, y, w) \ 319a42af91cSHajimu UMEMOTO ((x) == (y) || (/*CONSTCOND*/(w) && ((x) == ANY || (y) == ANY))) 3207d56d374SYoshinobu Inoue 3217d56d374SYoshinobu Inoue char * 3227d56d374SYoshinobu Inoue gai_strerror(ecode) 3237d56d374SYoshinobu Inoue int ecode; 3247d56d374SYoshinobu Inoue { 325b29ec00bSHajimu UMEMOTO struct ai_errlist *p; 326b29ec00bSHajimu UMEMOTO 327b29ec00bSHajimu UMEMOTO for (p = ai_errlist; p->str; p++) { 328b29ec00bSHajimu UMEMOTO if (p->code == ecode) 329b29ec00bSHajimu UMEMOTO return (char *)p->str; 330b29ec00bSHajimu UMEMOTO } 3313b1a7797SHajimu UMEMOTO return "Unknown error"; 3327d56d374SYoshinobu Inoue } 3337d56d374SYoshinobu Inoue 3347d56d374SYoshinobu Inoue void 3357d56d374SYoshinobu Inoue freeaddrinfo(ai) 3367d56d374SYoshinobu Inoue struct addrinfo *ai; 3377d56d374SYoshinobu Inoue { 3387d56d374SYoshinobu Inoue struct addrinfo *next; 3397d56d374SYoshinobu Inoue 3407d56d374SYoshinobu Inoue do { 3417d56d374SYoshinobu Inoue next = ai->ai_next; 3427d56d374SYoshinobu Inoue if (ai->ai_canonname) 3437d56d374SYoshinobu Inoue free(ai->ai_canonname); 3447d56d374SYoshinobu Inoue /* no need to free(ai->ai_addr) */ 3457d56d374SYoshinobu Inoue free(ai); 346a42af91cSHajimu UMEMOTO ai = next; 347a42af91cSHajimu UMEMOTO } while (ai); 3487d56d374SYoshinobu Inoue } 3497d56d374SYoshinobu Inoue 3507d56d374SYoshinobu Inoue static int 3517d56d374SYoshinobu Inoue str_isnumber(p) 3527d56d374SYoshinobu Inoue const char *p; 3537d56d374SYoshinobu Inoue { 354ec20fe00SJun-ichiro itojun Hagino char *ep; 355ec20fe00SJun-ichiro itojun Hagino 356ec20fe00SJun-ichiro itojun Hagino if (*p == '\0') 3577d56d374SYoshinobu Inoue return NO; 358ec20fe00SJun-ichiro itojun Hagino ep = NULL; 359a89c1d30SHajimu UMEMOTO errno = 0; 360ec20fe00SJun-ichiro itojun Hagino (void)strtoul(p, &ep, 10); 361a89c1d30SHajimu UMEMOTO if (errno == 0 && ep && *ep == '\0') 3627d56d374SYoshinobu Inoue return YES; 363ec20fe00SJun-ichiro itojun Hagino else 364ec20fe00SJun-ichiro itojun Hagino return NO; 3657d56d374SYoshinobu Inoue } 3667d56d374SYoshinobu Inoue 3677d56d374SYoshinobu Inoue int 3687d56d374SYoshinobu Inoue getaddrinfo(hostname, servname, hints, res) 3697d56d374SYoshinobu Inoue const char *hostname, *servname; 3707d56d374SYoshinobu Inoue const struct addrinfo *hints; 3717d56d374SYoshinobu Inoue struct addrinfo **res; 3727d56d374SYoshinobu Inoue { 3737d56d374SYoshinobu Inoue struct addrinfo sentinel; 3747d56d374SYoshinobu Inoue struct addrinfo *cur; 3757d56d374SYoshinobu Inoue int error = 0; 3767d56d374SYoshinobu Inoue struct addrinfo ai; 3777d56d374SYoshinobu Inoue struct addrinfo ai0; 3787d56d374SYoshinobu Inoue struct addrinfo *pai; 3797d56d374SYoshinobu Inoue const struct explore *ex; 3807d56d374SYoshinobu Inoue 381a42af91cSHajimu UMEMOTO memset(&sentinel, 0, sizeof(sentinel)); 3827d56d374SYoshinobu Inoue cur = &sentinel; 3837d56d374SYoshinobu Inoue pai = &ai; 3847d56d374SYoshinobu Inoue pai->ai_flags = 0; 3857d56d374SYoshinobu Inoue pai->ai_family = PF_UNSPEC; 3867d56d374SYoshinobu Inoue pai->ai_socktype = ANY; 3877d56d374SYoshinobu Inoue pai->ai_protocol = ANY; 3887d56d374SYoshinobu Inoue pai->ai_addrlen = 0; 3897d56d374SYoshinobu Inoue pai->ai_canonname = NULL; 3907d56d374SYoshinobu Inoue pai->ai_addr = NULL; 3917d56d374SYoshinobu Inoue pai->ai_next = NULL; 3927d56d374SYoshinobu Inoue 3937d56d374SYoshinobu Inoue if (hostname == NULL && servname == NULL) 3947d56d374SYoshinobu Inoue return EAI_NONAME; 3957d56d374SYoshinobu Inoue if (hints) { 3967d56d374SYoshinobu Inoue /* error check for hints */ 3977d56d374SYoshinobu Inoue if (hints->ai_addrlen || hints->ai_canonname || 3987d56d374SYoshinobu Inoue hints->ai_addr || hints->ai_next) 3997d56d374SYoshinobu Inoue ERR(EAI_BADHINTS); /* xxx */ 4007d56d374SYoshinobu Inoue if (hints->ai_flags & ~AI_MASK) 4017d56d374SYoshinobu Inoue ERR(EAI_BADFLAGS); 4027d56d374SYoshinobu Inoue switch (hints->ai_family) { 4037d56d374SYoshinobu Inoue case PF_UNSPEC: 4047d56d374SYoshinobu Inoue case PF_INET: 4057d56d374SYoshinobu Inoue #ifdef INET6 4067d56d374SYoshinobu Inoue case PF_INET6: 4077d56d374SYoshinobu Inoue #endif 4087d56d374SYoshinobu Inoue break; 4097d56d374SYoshinobu Inoue default: 4107d56d374SYoshinobu Inoue ERR(EAI_FAMILY); 4117d56d374SYoshinobu Inoue } 4127d56d374SYoshinobu Inoue memcpy(pai, hints, sizeof(*pai)); 4137d56d374SYoshinobu Inoue 4147d56d374SYoshinobu Inoue /* 4157d56d374SYoshinobu Inoue * if both socktype/protocol are specified, check if they 4167d56d374SYoshinobu Inoue * are meaningful combination. 4177d56d374SYoshinobu Inoue */ 4187d56d374SYoshinobu Inoue if (pai->ai_socktype != ANY && pai->ai_protocol != ANY) { 419a42af91cSHajimu UMEMOTO for (ex = explore; ex->e_af >= 0; ex++) { 420a42af91cSHajimu UMEMOTO if (pai->ai_family != ex->e_af) 421a42af91cSHajimu UMEMOTO continue; 4227d56d374SYoshinobu Inoue if (ex->e_socktype == ANY) 4237d56d374SYoshinobu Inoue continue; 4247d56d374SYoshinobu Inoue if (ex->e_protocol == ANY) 4257d56d374SYoshinobu Inoue continue; 426dd521ef1SHajimu UMEMOTO if (pai->ai_socktype == ex->e_socktype && 427dd521ef1SHajimu UMEMOTO pai->ai_protocol != ex->e_protocol) { 4287d56d374SYoshinobu Inoue ERR(EAI_BADHINTS); 4297d56d374SYoshinobu Inoue } 4307d56d374SYoshinobu Inoue } 4317d56d374SYoshinobu Inoue } 432a42af91cSHajimu UMEMOTO } 4337d56d374SYoshinobu Inoue 4347d56d374SYoshinobu Inoue /* 435a42af91cSHajimu UMEMOTO * post-2553: AI_ALL and AI_V4MAPPED are effective only against 436dd521ef1SHajimu UMEMOTO * AF_INET6 query. They need to be ignored if specified in other 437a42af91cSHajimu UMEMOTO * occassions. 438a42af91cSHajimu UMEMOTO */ 439a42af91cSHajimu UMEMOTO switch (pai->ai_flags & (AI_ALL | AI_V4MAPPED)) { 440a42af91cSHajimu UMEMOTO case AI_V4MAPPED: 441a42af91cSHajimu UMEMOTO case AI_ALL | AI_V4MAPPED: 442a42af91cSHajimu UMEMOTO if (pai->ai_family != AF_INET6) 443a42af91cSHajimu UMEMOTO pai->ai_flags &= ~(AI_ALL | AI_V4MAPPED); 444a42af91cSHajimu UMEMOTO break; 445a42af91cSHajimu UMEMOTO case AI_ALL: 446a42af91cSHajimu UMEMOTO #if 1 447a42af91cSHajimu UMEMOTO /* illegal */ 448a42af91cSHajimu UMEMOTO ERR(EAI_BADFLAGS); 449a42af91cSHajimu UMEMOTO #else 450a42af91cSHajimu UMEMOTO pai->ai_flags &= ~(AI_ALL | AI_V4MAPPED); 451a42af91cSHajimu UMEMOTO #endif 452a42af91cSHajimu UMEMOTO break; 453a42af91cSHajimu UMEMOTO } 454a42af91cSHajimu UMEMOTO 455a42af91cSHajimu UMEMOTO /* 456a42af91cSHajimu UMEMOTO * check for special cases. (1) numeric servname is disallowed if 457a42af91cSHajimu UMEMOTO * socktype/protocol are left unspecified. (2) servname is disallowed 458a42af91cSHajimu UMEMOTO * for raw and other inet{,6} sockets. 4597d56d374SYoshinobu Inoue */ 4607d56d374SYoshinobu Inoue if (MATCH_FAMILY(pai->ai_family, PF_INET, 1) 461a42af91cSHajimu UMEMOTO #ifdef PF_INET6 4627d56d374SYoshinobu Inoue || MATCH_FAMILY(pai->ai_family, PF_INET6, 1) 4637d56d374SYoshinobu Inoue #endif 4647d56d374SYoshinobu Inoue ) { 465a42af91cSHajimu UMEMOTO ai0 = *pai; /* backup *pai */ 4667d56d374SYoshinobu Inoue 467a42af91cSHajimu UMEMOTO if (pai->ai_family == PF_UNSPEC) { 468a42af91cSHajimu UMEMOTO #ifdef PF_INET6 4697d56d374SYoshinobu Inoue pai->ai_family = PF_INET6; 4707d56d374SYoshinobu Inoue #else 4717d56d374SYoshinobu Inoue pai->ai_family = PF_INET; 4727d56d374SYoshinobu Inoue #endif 473a42af91cSHajimu UMEMOTO } 4747d56d374SYoshinobu Inoue error = get_portmatch(pai, servname); 4757d56d374SYoshinobu Inoue if (error) 4767d56d374SYoshinobu Inoue ERR(error); 477a42af91cSHajimu UMEMOTO 478a42af91cSHajimu UMEMOTO *pai = ai0; 4797d56d374SYoshinobu Inoue } 4807d56d374SYoshinobu Inoue 481a42af91cSHajimu UMEMOTO ai0 = *pai; 482a42af91cSHajimu UMEMOTO 4837d56d374SYoshinobu Inoue /* NULL hostname, or numeric hostname */ 484a42af91cSHajimu UMEMOTO for (ex = explore; ex->e_af >= 0; ex++) { 4857d56d374SYoshinobu Inoue *pai = ai0; 4867d56d374SYoshinobu Inoue 487a42af91cSHajimu UMEMOTO /* PF_UNSPEC entries are prepared for DNS queries only */ 488a42af91cSHajimu UMEMOTO if (ex->e_af == PF_UNSPEC) 4897d56d374SYoshinobu Inoue continue; 490a42af91cSHajimu UMEMOTO 491a42af91cSHajimu UMEMOTO if (!MATCH_FAMILY(pai->ai_family, ex->e_af, WILD_AF(ex))) 4927d56d374SYoshinobu Inoue continue; 493248aee62SJacques Vidrine if (!MATCH(pai->ai_socktype, ex->e_socktype, WILD_SOCKTYPE(ex))) 494a42af91cSHajimu UMEMOTO continue; 495248aee62SJacques Vidrine if (!MATCH(pai->ai_protocol, ex->e_protocol, WILD_PROTOCOL(ex))) 4967d56d374SYoshinobu Inoue continue; 4977d56d374SYoshinobu Inoue 4987d56d374SYoshinobu Inoue if (pai->ai_family == PF_UNSPEC) 499a42af91cSHajimu UMEMOTO pai->ai_family = ex->e_af; 5007d56d374SYoshinobu Inoue if (pai->ai_socktype == ANY && ex->e_socktype != ANY) 5017d56d374SYoshinobu Inoue pai->ai_socktype = ex->e_socktype; 5027d56d374SYoshinobu Inoue if (pai->ai_protocol == ANY && ex->e_protocol != ANY) 5037d56d374SYoshinobu Inoue pai->ai_protocol = ex->e_protocol; 5047d56d374SYoshinobu Inoue 5057d56d374SYoshinobu Inoue if (hostname == NULL) 506a42af91cSHajimu UMEMOTO error = explore_null(pai, servname, &cur->ai_next); 5077d56d374SYoshinobu Inoue else 508248aee62SJacques Vidrine error = explore_numeric_scope(pai, hostname, servname, &cur->ai_next); 5097d56d374SYoshinobu Inoue 5107d56d374SYoshinobu Inoue if (error) 5117d56d374SYoshinobu Inoue goto free; 5127d56d374SYoshinobu Inoue 5137d56d374SYoshinobu Inoue while (cur && cur->ai_next) 5147d56d374SYoshinobu Inoue cur = cur->ai_next; 5157d56d374SYoshinobu Inoue } 5167d56d374SYoshinobu Inoue 5177d56d374SYoshinobu Inoue /* 5187d56d374SYoshinobu Inoue * XXX 5197d56d374SYoshinobu Inoue * If numreic representation of AF1 can be interpreted as FQDN 5207d56d374SYoshinobu Inoue * representation of AF2, we need to think again about the code below. 5217d56d374SYoshinobu Inoue */ 5227d56d374SYoshinobu Inoue if (sentinel.ai_next) 5237d56d374SYoshinobu Inoue goto good; 5247d56d374SYoshinobu Inoue 52537b3e941SHajimu UMEMOTO if (hostname == NULL) 52637b3e941SHajimu UMEMOTO ERR(EAI_NONAME); /* used to be EAI_NODATA */ 5277d56d374SYoshinobu Inoue if (pai->ai_flags & AI_NUMERICHOST) 528b484faa5SPeter Pentchev ERR(EAI_NONAME); 5297d56d374SYoshinobu Inoue 530a42af91cSHajimu UMEMOTO if ((pai->ai_flags & AI_ADDRCONFIG) != 0 && !addrconfig(&ai0)) 531a42af91cSHajimu UMEMOTO ERR(EAI_FAIL); 532a42af91cSHajimu UMEMOTO 533a42af91cSHajimu UMEMOTO /* 534a42af91cSHajimu UMEMOTO * hostname as alphabetical name. 535a42af91cSHajimu UMEMOTO * we would like to prefer AF_INET6 than AF_INET, so we'll make a 536a42af91cSHajimu UMEMOTO * outer loop by AFs. 537a42af91cSHajimu UMEMOTO */ 538a42af91cSHajimu UMEMOTO for (ex = explore; ex->e_af >= 0; ex++) { 5397d56d374SYoshinobu Inoue *pai = ai0; 5407d56d374SYoshinobu Inoue 541a42af91cSHajimu UMEMOTO /* require exact match for family field */ 542a42af91cSHajimu UMEMOTO if (pai->ai_family != ex->e_af) 543a42af91cSHajimu UMEMOTO continue; 544a42af91cSHajimu UMEMOTO 5457d56d374SYoshinobu Inoue if (!MATCH(pai->ai_socktype, ex->e_socktype, 5467d56d374SYoshinobu Inoue WILD_SOCKTYPE(ex))) { 5477d56d374SYoshinobu Inoue continue; 5487d56d374SYoshinobu Inoue } 5497d56d374SYoshinobu Inoue if (!MATCH(pai->ai_protocol, ex->e_protocol, 5507d56d374SYoshinobu Inoue WILD_PROTOCOL(ex))) { 5517d56d374SYoshinobu Inoue continue; 5527d56d374SYoshinobu Inoue } 5537d56d374SYoshinobu Inoue 5547d56d374SYoshinobu Inoue if (pai->ai_socktype == ANY && ex->e_socktype != ANY) 5557d56d374SYoshinobu Inoue pai->ai_socktype = ex->e_socktype; 5567d56d374SYoshinobu Inoue if (pai->ai_protocol == ANY && ex->e_protocol != ANY) 5577d56d374SYoshinobu Inoue pai->ai_protocol = ex->e_protocol; 5587d56d374SYoshinobu Inoue 559248aee62SJacques Vidrine error = explore_fqdn(pai, hostname, servname, 560248aee62SJacques Vidrine &cur->ai_next); 5617d56d374SYoshinobu Inoue 5627d56d374SYoshinobu Inoue while (cur && cur->ai_next) 5637d56d374SYoshinobu Inoue cur = cur->ai_next; 5647d56d374SYoshinobu Inoue } 5657d56d374SYoshinobu Inoue 566a42af91cSHajimu UMEMOTO /* XXX */ 567a42af91cSHajimu UMEMOTO if (sentinel.ai_next) 568a42af91cSHajimu UMEMOTO error = 0; 569a42af91cSHajimu UMEMOTO 570a42af91cSHajimu UMEMOTO if (error) 571a42af91cSHajimu UMEMOTO goto free; 572a42af91cSHajimu UMEMOTO if (error == 0) { 5737d56d374SYoshinobu Inoue if (sentinel.ai_next) { 5747d56d374SYoshinobu Inoue good: 5757d56d374SYoshinobu Inoue *res = sentinel.ai_next; 5767d56d374SYoshinobu Inoue return SUCCESS; 577a42af91cSHajimu UMEMOTO } else 578a42af91cSHajimu UMEMOTO error = EAI_FAIL; 5797d56d374SYoshinobu Inoue } 5807d56d374SYoshinobu Inoue free: 5817d56d374SYoshinobu Inoue bad: 5827d56d374SYoshinobu Inoue if (sentinel.ai_next) 5837d56d374SYoshinobu Inoue freeaddrinfo(sentinel.ai_next); 5847d56d374SYoshinobu Inoue *res = NULL; 5857d56d374SYoshinobu Inoue return error; 5867d56d374SYoshinobu Inoue } 5877d56d374SYoshinobu Inoue 5887d56d374SYoshinobu Inoue /* 5897d56d374SYoshinobu Inoue * hostname == NULL. 5907d56d374SYoshinobu Inoue * passive socket -> anyaddr (0.0.0.0 or ::) 5917d56d374SYoshinobu Inoue * non-passive socket -> localhost (127.0.0.1 or ::1) 5927d56d374SYoshinobu Inoue */ 5937d56d374SYoshinobu Inoue static int 594a42af91cSHajimu UMEMOTO explore_null(pai, servname, res) 5957d56d374SYoshinobu Inoue const struct addrinfo *pai; 5967d56d374SYoshinobu Inoue const char *servname; 5977d56d374SYoshinobu Inoue struct addrinfo **res; 5987d56d374SYoshinobu Inoue { 5997d56d374SYoshinobu Inoue int s; 6007d56d374SYoshinobu Inoue const struct afd *afd; 6017d56d374SYoshinobu Inoue struct addrinfo *cur; 6027d56d374SYoshinobu Inoue struct addrinfo sentinel; 6037d56d374SYoshinobu Inoue int error; 6047d56d374SYoshinobu Inoue 6057d56d374SYoshinobu Inoue *res = NULL; 6067d56d374SYoshinobu Inoue sentinel.ai_next = NULL; 6077d56d374SYoshinobu Inoue cur = &sentinel; 6087d56d374SYoshinobu Inoue 6097d56d374SYoshinobu Inoue /* 6107d56d374SYoshinobu Inoue * filter out AFs that are not supported by the kernel 6117d56d374SYoshinobu Inoue * XXX errno? 6127d56d374SYoshinobu Inoue */ 613d201fe46SDaniel Eischen s = _socket(pai->ai_family, SOCK_DGRAM, 0); 614a42af91cSHajimu UMEMOTO if (s < 0) { 615a42af91cSHajimu UMEMOTO if (errno != EMFILE) 6167d56d374SYoshinobu Inoue return 0; 617a42af91cSHajimu UMEMOTO } else 6189233c4d9SJason Evans _close(s); 619a42af91cSHajimu UMEMOTO 620a42af91cSHajimu UMEMOTO /* 621a42af91cSHajimu UMEMOTO * if the servname does not match socktype/protocol, ignore it. 622a42af91cSHajimu UMEMOTO */ 623a42af91cSHajimu UMEMOTO if (get_portmatch(pai, servname) != 0) 624a42af91cSHajimu UMEMOTO return 0; 625a42af91cSHajimu UMEMOTO 6267d56d374SYoshinobu Inoue afd = find_afd(pai->ai_family); 6277d56d374SYoshinobu Inoue if (afd == NULL) 6287d56d374SYoshinobu Inoue return 0; 6297d56d374SYoshinobu Inoue 630a42af91cSHajimu UMEMOTO if (pai->ai_flags & AI_PASSIVE) { 631a42af91cSHajimu UMEMOTO GET_AI(cur->ai_next, afd, afd->a_addrany); 6327d56d374SYoshinobu Inoue /* xxx meaningless? 6337d56d374SYoshinobu Inoue * GET_CANONNAME(cur->ai_next, "anyaddr"); 634a42af91cSHajimu UMEMOTO */ 635a42af91cSHajimu UMEMOTO GET_PORT(cur->ai_next, servname); 636a42af91cSHajimu UMEMOTO } else { 637a42af91cSHajimu UMEMOTO GET_AI(cur->ai_next, afd, afd->a_loopback); 638a42af91cSHajimu UMEMOTO /* xxx meaningless? 6397d56d374SYoshinobu Inoue * GET_CANONNAME(cur->ai_next, "localhost"); 6407d56d374SYoshinobu Inoue */ 6417d56d374SYoshinobu Inoue GET_PORT(cur->ai_next, servname); 642a42af91cSHajimu UMEMOTO } 643a42af91cSHajimu UMEMOTO cur = cur->ai_next; 6447d56d374SYoshinobu Inoue 6457d56d374SYoshinobu Inoue *res = sentinel.ai_next; 6467d56d374SYoshinobu Inoue return 0; 6477d56d374SYoshinobu Inoue 6487d56d374SYoshinobu Inoue free: 6497d56d374SYoshinobu Inoue if (sentinel.ai_next) 6507d56d374SYoshinobu Inoue freeaddrinfo(sentinel.ai_next); 6517d56d374SYoshinobu Inoue return error; 6527d56d374SYoshinobu Inoue } 6537d56d374SYoshinobu Inoue 6547d56d374SYoshinobu Inoue /* 6557d56d374SYoshinobu Inoue * numeric hostname 6567d56d374SYoshinobu Inoue */ 6577d56d374SYoshinobu Inoue static int 6587d56d374SYoshinobu Inoue explore_numeric(pai, hostname, servname, res) 6597d56d374SYoshinobu Inoue const struct addrinfo *pai; 6607d56d374SYoshinobu Inoue const char *hostname; 6617d56d374SYoshinobu Inoue const char *servname; 6627d56d374SYoshinobu Inoue struct addrinfo **res; 6637d56d374SYoshinobu Inoue { 6647d56d374SYoshinobu Inoue const struct afd *afd; 6657d56d374SYoshinobu Inoue struct addrinfo *cur; 6667d56d374SYoshinobu Inoue struct addrinfo sentinel; 6677d56d374SYoshinobu Inoue int error; 6687d56d374SYoshinobu Inoue char pton[PTON_MAX]; 6697d56d374SYoshinobu Inoue 6707d56d374SYoshinobu Inoue *res = NULL; 6717d56d374SYoshinobu Inoue sentinel.ai_next = NULL; 6727d56d374SYoshinobu Inoue cur = &sentinel; 6737d56d374SYoshinobu Inoue 6747d56d374SYoshinobu Inoue /* 6757d56d374SYoshinobu Inoue * if the servname does not match socktype/protocol, ignore it. 6767d56d374SYoshinobu Inoue */ 6777d56d374SYoshinobu Inoue if (get_portmatch(pai, servname) != 0) 6787d56d374SYoshinobu Inoue return 0; 6797d56d374SYoshinobu Inoue 6807d56d374SYoshinobu Inoue afd = find_afd(pai->ai_family); 6817d56d374SYoshinobu Inoue if (afd == NULL) 6827d56d374SYoshinobu Inoue return 0; 6837d56d374SYoshinobu Inoue 684b826397aSJun-ichiro itojun Hagino switch (afd->a_af) { 685b826397aSJun-ichiro itojun Hagino #if 1 /*X/Open spec*/ 686b826397aSJun-ichiro itojun Hagino case AF_INET: 687b826397aSJun-ichiro itojun Hagino if (inet_aton(hostname, (struct in_addr *)pton) == 1) { 6887d56d374SYoshinobu Inoue if (pai->ai_family == afd->a_af || 6897d56d374SYoshinobu Inoue pai->ai_family == PF_UNSPEC /*?*/) { 6907d56d374SYoshinobu Inoue GET_AI(cur->ai_next, afd, pton); 6917d56d374SYoshinobu Inoue GET_PORT(cur->ai_next, servname); 6927d56d374SYoshinobu Inoue while (cur && cur->ai_next) 6937d56d374SYoshinobu Inoue cur = cur->ai_next; 6947d56d374SYoshinobu Inoue } else 6957d56d374SYoshinobu Inoue ERR(EAI_FAMILY); /*xxx*/ 6967d56d374SYoshinobu Inoue } 697b826397aSJun-ichiro itojun Hagino break; 698b826397aSJun-ichiro itojun Hagino #endif 699b826397aSJun-ichiro itojun Hagino default: 700b826397aSJun-ichiro itojun Hagino if (inet_pton(afd->a_af, hostname, pton) == 1) { 701b826397aSJun-ichiro itojun Hagino if (pai->ai_family == afd->a_af || 702b826397aSJun-ichiro itojun Hagino pai->ai_family == PF_UNSPEC /*?*/) { 703b826397aSJun-ichiro itojun Hagino GET_AI(cur->ai_next, afd, pton); 704b826397aSJun-ichiro itojun Hagino GET_PORT(cur->ai_next, servname); 705b826397aSJun-ichiro itojun Hagino while (cur && cur->ai_next) 706b826397aSJun-ichiro itojun Hagino cur = cur->ai_next; 707b826397aSJun-ichiro itojun Hagino } else 708dd521ef1SHajimu UMEMOTO ERR(EAI_FAMILY); /* XXX */ 709b826397aSJun-ichiro itojun Hagino } 710b826397aSJun-ichiro itojun Hagino break; 711b826397aSJun-ichiro itojun Hagino } 7127d56d374SYoshinobu Inoue 7137d56d374SYoshinobu Inoue *res = sentinel.ai_next; 7147d56d374SYoshinobu Inoue return 0; 7157d56d374SYoshinobu Inoue 7167d56d374SYoshinobu Inoue free: 7177d56d374SYoshinobu Inoue bad: 7187d56d374SYoshinobu Inoue if (sentinel.ai_next) 7197d56d374SYoshinobu Inoue freeaddrinfo(sentinel.ai_next); 7207d56d374SYoshinobu Inoue return error; 7217d56d374SYoshinobu Inoue } 7227d56d374SYoshinobu Inoue 7237d56d374SYoshinobu Inoue /* 7247d56d374SYoshinobu Inoue * numeric hostname with scope 7257d56d374SYoshinobu Inoue */ 7267d56d374SYoshinobu Inoue static int 7277d56d374SYoshinobu Inoue explore_numeric_scope(pai, hostname, servname, res) 7287d56d374SYoshinobu Inoue const struct addrinfo *pai; 7297d56d374SYoshinobu Inoue const char *hostname; 7307d56d374SYoshinobu Inoue const char *servname; 7317d56d374SYoshinobu Inoue struct addrinfo **res; 7327d56d374SYoshinobu Inoue { 733a42af91cSHajimu UMEMOTO #if !defined(SCOPE_DELIMITER) || !defined(INET6) 7347d56d374SYoshinobu Inoue return explore_numeric(pai, hostname, servname, res); 7357d56d374SYoshinobu Inoue #else 7367d56d374SYoshinobu Inoue const struct afd *afd; 7377d56d374SYoshinobu Inoue struct addrinfo *cur; 7387d56d374SYoshinobu Inoue int error; 739a42af91cSHajimu UMEMOTO char *cp, *hostname2 = NULL, *scope, *addr; 7407d56d374SYoshinobu Inoue struct sockaddr_in6 *sin6; 7417d56d374SYoshinobu Inoue 7427d56d374SYoshinobu Inoue /* 7437d56d374SYoshinobu Inoue * if the servname does not match socktype/protocol, ignore it. 7447d56d374SYoshinobu Inoue */ 7457d56d374SYoshinobu Inoue if (get_portmatch(pai, servname) != 0) 7467d56d374SYoshinobu Inoue return 0; 7477d56d374SYoshinobu Inoue 7487d56d374SYoshinobu Inoue afd = find_afd(pai->ai_family); 7497d56d374SYoshinobu Inoue if (afd == NULL) 7507d56d374SYoshinobu Inoue return 0; 751248aee62SJacques Vidrine 7527d56d374SYoshinobu Inoue if (!afd->a_scoped) 7537d56d374SYoshinobu Inoue return explore_numeric(pai, hostname, servname, res); 7547d56d374SYoshinobu Inoue 7557d56d374SYoshinobu Inoue cp = strchr(hostname, SCOPE_DELIMITER); 7567d56d374SYoshinobu Inoue if (cp == NULL) 7577d56d374SYoshinobu Inoue return explore_numeric(pai, hostname, servname, res); 7587d56d374SYoshinobu Inoue 7597d56d374SYoshinobu Inoue /* 7607d56d374SYoshinobu Inoue * Handle special case of <scoped_address><delimiter><scope id> 7617d56d374SYoshinobu Inoue */ 7627d56d374SYoshinobu Inoue hostname2 = strdup(hostname); 7637d56d374SYoshinobu Inoue if (hostname2 == NULL) 7647d56d374SYoshinobu Inoue return EAI_MEMORY; 7657d56d374SYoshinobu Inoue /* terminate at the delimiter */ 7667d56d374SYoshinobu Inoue hostname2[cp - hostname] = '\0'; 767a42af91cSHajimu UMEMOTO addr = hostname2; 768a42af91cSHajimu UMEMOTO scope = cp + 1; 7697d56d374SYoshinobu Inoue 770a42af91cSHajimu UMEMOTO error = explore_numeric(pai, addr, servname, res); 7717d56d374SYoshinobu Inoue if (error == 0) { 772a89c1d30SHajimu UMEMOTO u_int32_t scopeid; 773a42af91cSHajimu UMEMOTO 7747d56d374SYoshinobu Inoue for (cur = *res; cur; cur = cur->ai_next) { 7757d56d374SYoshinobu Inoue if (cur->ai_family != AF_INET6) 7767d56d374SYoshinobu Inoue continue; 777a42af91cSHajimu UMEMOTO sin6 = (struct sockaddr_in6 *)(void *)cur->ai_addr; 778a89c1d30SHajimu UMEMOTO if (ip6_str2scopeid(scope, sin6, &scopeid) == -1) { 779a42af91cSHajimu UMEMOTO free(hostname2); 78037b3e941SHajimu UMEMOTO return(EAI_NONAME); /* XXX: is return OK? */ 781a42af91cSHajimu UMEMOTO } 782a42af91cSHajimu UMEMOTO sin6->sin6_scope_id = scopeid; 7837d56d374SYoshinobu Inoue } 7847d56d374SYoshinobu Inoue } 7857d56d374SYoshinobu Inoue 7867d56d374SYoshinobu Inoue free(hostname2); 7877d56d374SYoshinobu Inoue 7887d56d374SYoshinobu Inoue return error; 7897d56d374SYoshinobu Inoue #endif 7907d56d374SYoshinobu Inoue } 7917d56d374SYoshinobu Inoue 7927d56d374SYoshinobu Inoue static int 7937d56d374SYoshinobu Inoue get_canonname(pai, ai, str) 7947d56d374SYoshinobu Inoue const struct addrinfo *pai; 7957d56d374SYoshinobu Inoue struct addrinfo *ai; 7967d56d374SYoshinobu Inoue const char *str; 7977d56d374SYoshinobu Inoue { 7987d56d374SYoshinobu Inoue if ((pai->ai_flags & AI_CANONNAME) != 0) { 7997d56d374SYoshinobu Inoue ai->ai_canonname = (char *)malloc(strlen(str) + 1); 8007d56d374SYoshinobu Inoue if (ai->ai_canonname == NULL) 8017d56d374SYoshinobu Inoue return EAI_MEMORY; 802d0509082SJacques Vidrine strlcpy(ai->ai_canonname, str, strlen(str) + 1); 8037d56d374SYoshinobu Inoue } 8047d56d374SYoshinobu Inoue return 0; 8057d56d374SYoshinobu Inoue } 8067d56d374SYoshinobu Inoue 8077d56d374SYoshinobu Inoue static struct addrinfo * 8087d56d374SYoshinobu Inoue get_ai(pai, afd, addr) 8097d56d374SYoshinobu Inoue const struct addrinfo *pai; 8107d56d374SYoshinobu Inoue const struct afd *afd; 8117d56d374SYoshinobu Inoue const char *addr; 8127d56d374SYoshinobu Inoue { 8137d56d374SYoshinobu Inoue char *p; 8147d56d374SYoshinobu Inoue struct addrinfo *ai; 8157d56d374SYoshinobu Inoue #ifdef FAITH 8167d56d374SYoshinobu Inoue struct in6_addr faith_prefix; 8177d56d374SYoshinobu Inoue char *fp_str; 8187d56d374SYoshinobu Inoue int translate = 0; 8197d56d374SYoshinobu Inoue #endif 8207d56d374SYoshinobu Inoue 8217d56d374SYoshinobu Inoue #ifdef FAITH 8227d56d374SYoshinobu Inoue /* 8237d56d374SYoshinobu Inoue * Transfrom an IPv4 addr into a special IPv6 addr format for 8247d56d374SYoshinobu Inoue * IPv6->IPv4 translation gateway. (only TCP is supported now) 8257d56d374SYoshinobu Inoue * 8267d56d374SYoshinobu Inoue * +-----------------------------------+------------+ 8277d56d374SYoshinobu Inoue * | faith prefix part (12 bytes) | embedded | 8287d56d374SYoshinobu Inoue * | | IPv4 addr part (4 bytes) 8297d56d374SYoshinobu Inoue * +-----------------------------------+------------+ 8307d56d374SYoshinobu Inoue * 8317d56d374SYoshinobu Inoue * faith prefix part is specified as ascii IPv6 addr format 8327d56d374SYoshinobu Inoue * in environmental variable GAI. 8337d56d374SYoshinobu Inoue * For FAITH to work correctly, routing to faith prefix must be 8347d56d374SYoshinobu Inoue * setup toward a machine where a FAITH daemon operates. 8357d56d374SYoshinobu Inoue * Also, the machine must enable some mechanizm 8367d56d374SYoshinobu Inoue * (e.g. faith interface hack) to divert those packet with 8377d56d374SYoshinobu Inoue * faith prefixed destination addr to user-land FAITH daemon. 8387d56d374SYoshinobu Inoue */ 8397d56d374SYoshinobu Inoue fp_str = getenv("GAI"); 8407d56d374SYoshinobu Inoue if (fp_str && inet_pton(AF_INET6, fp_str, &faith_prefix) == 1 && 8417d56d374SYoshinobu Inoue afd->a_af == AF_INET && pai->ai_socktype == SOCK_STREAM) { 8427d56d374SYoshinobu Inoue u_int32_t v4a; 8437d56d374SYoshinobu Inoue u_int8_t v4a_top; 8447d56d374SYoshinobu Inoue 8457d56d374SYoshinobu Inoue memcpy(&v4a, addr, sizeof v4a); 8467d56d374SYoshinobu Inoue v4a_top = v4a >> IN_CLASSA_NSHIFT; 8477d56d374SYoshinobu Inoue if (!IN_MULTICAST(v4a) && !IN_EXPERIMENTAL(v4a) && 8487d56d374SYoshinobu Inoue v4a_top != 0 && v4a != IN_LOOPBACKNET) { 8497d56d374SYoshinobu Inoue afd = &afdl[N_INET6]; 8507d56d374SYoshinobu Inoue memcpy(&faith_prefix.s6_addr[12], addr, 8517d56d374SYoshinobu Inoue sizeof(struct in_addr)); 8527d56d374SYoshinobu Inoue translate = 1; 8537d56d374SYoshinobu Inoue } 8547d56d374SYoshinobu Inoue } 8557d56d374SYoshinobu Inoue #endif 8567d56d374SYoshinobu Inoue 8577d56d374SYoshinobu Inoue ai = (struct addrinfo *)malloc(sizeof(struct addrinfo) 8587d56d374SYoshinobu Inoue + (afd->a_socklen)); 8597d56d374SYoshinobu Inoue if (ai == NULL) 8607d56d374SYoshinobu Inoue return NULL; 8617d56d374SYoshinobu Inoue 8627d56d374SYoshinobu Inoue memcpy(ai, pai, sizeof(struct addrinfo)); 863a42af91cSHajimu UMEMOTO ai->ai_addr = (struct sockaddr *)(void *)(ai + 1); 864a42af91cSHajimu UMEMOTO memset(ai->ai_addr, 0, (size_t)afd->a_socklen); 8657d56d374SYoshinobu Inoue ai->ai_addr->sa_len = afd->a_socklen; 8667d56d374SYoshinobu Inoue ai->ai_addrlen = afd->a_socklen; 8677d56d374SYoshinobu Inoue ai->ai_addr->sa_family = ai->ai_family = afd->a_af; 868248aee62SJacques Vidrine p = (char *)(void *)(ai->ai_addr); 8697d56d374SYoshinobu Inoue #ifdef FAITH 8707d56d374SYoshinobu Inoue if (translate == 1) 871248aee62SJacques Vidrine memcpy(p + afd->a_off, &faith_prefix, (size_t)afd->a_addrlen); 8727d56d374SYoshinobu Inoue else 8737d56d374SYoshinobu Inoue #endif 874248aee62SJacques Vidrine memcpy(p + afd->a_off, addr, (size_t)afd->a_addrlen); 8757d56d374SYoshinobu Inoue return ai; 8767d56d374SYoshinobu Inoue } 8777d56d374SYoshinobu Inoue 8787d56d374SYoshinobu Inoue static int 8797d56d374SYoshinobu Inoue get_portmatch(ai, servname) 8807d56d374SYoshinobu Inoue const struct addrinfo *ai; 8817d56d374SYoshinobu Inoue const char *servname; 8827d56d374SYoshinobu Inoue { 883a42af91cSHajimu UMEMOTO 8847d56d374SYoshinobu Inoue /* get_port does not touch first argument. when matchonly == 1. */ 885a42af91cSHajimu UMEMOTO /* LINTED const cast */ 8867d56d374SYoshinobu Inoue return get_port((struct addrinfo *)ai, servname, 1); 8877d56d374SYoshinobu Inoue } 8887d56d374SYoshinobu Inoue 8897d56d374SYoshinobu Inoue static int 8907d56d374SYoshinobu Inoue get_port(ai, servname, matchonly) 8917d56d374SYoshinobu Inoue struct addrinfo *ai; 8927d56d374SYoshinobu Inoue const char *servname; 8937d56d374SYoshinobu Inoue int matchonly; 8947d56d374SYoshinobu Inoue { 8957d56d374SYoshinobu Inoue const char *proto; 8967d56d374SYoshinobu Inoue struct servent *sp; 8977d56d374SYoshinobu Inoue int port; 8987d56d374SYoshinobu Inoue int allownumeric; 8997d56d374SYoshinobu Inoue 9007d56d374SYoshinobu Inoue if (servname == NULL) 9017d56d374SYoshinobu Inoue return 0; 902a42af91cSHajimu UMEMOTO switch (ai->ai_family) { 903a42af91cSHajimu UMEMOTO case AF_INET: 904a42af91cSHajimu UMEMOTO #ifdef AF_INET6 905a42af91cSHajimu UMEMOTO case AF_INET6: 9067d56d374SYoshinobu Inoue #endif 907a42af91cSHajimu UMEMOTO break; 908a42af91cSHajimu UMEMOTO default: 9097d56d374SYoshinobu Inoue return 0; 910a42af91cSHajimu UMEMOTO } 9117d56d374SYoshinobu Inoue 9127d56d374SYoshinobu Inoue switch (ai->ai_socktype) { 9137d56d374SYoshinobu Inoue case SOCK_RAW: 9147d56d374SYoshinobu Inoue return EAI_SERVICE; 9157d56d374SYoshinobu Inoue case SOCK_DGRAM: 9167d56d374SYoshinobu Inoue case SOCK_STREAM: 9177d56d374SYoshinobu Inoue allownumeric = 1; 9187d56d374SYoshinobu Inoue break; 9197d56d374SYoshinobu Inoue case ANY: 9207d56d374SYoshinobu Inoue allownumeric = 0; 9217d56d374SYoshinobu Inoue break; 9227d56d374SYoshinobu Inoue default: 9237d56d374SYoshinobu Inoue return EAI_SOCKTYPE; 9247d56d374SYoshinobu Inoue } 9257d56d374SYoshinobu Inoue 9267d56d374SYoshinobu Inoue if (str_isnumber(servname)) { 9277d56d374SYoshinobu Inoue if (!allownumeric) 9287d56d374SYoshinobu Inoue return EAI_SERVICE; 929dd521ef1SHajimu UMEMOTO port = atoi(servname); 9307d56d374SYoshinobu Inoue if (port < 0 || port > 65535) 9317d56d374SYoshinobu Inoue return EAI_SERVICE; 932dd521ef1SHajimu UMEMOTO port = htons(port); 9337d56d374SYoshinobu Inoue } else { 9347d56d374SYoshinobu Inoue switch (ai->ai_socktype) { 9357d56d374SYoshinobu Inoue case SOCK_DGRAM: 9367d56d374SYoshinobu Inoue proto = "udp"; 9377d56d374SYoshinobu Inoue break; 9387d56d374SYoshinobu Inoue case SOCK_STREAM: 9397d56d374SYoshinobu Inoue proto = "tcp"; 9407d56d374SYoshinobu Inoue break; 9417d56d374SYoshinobu Inoue default: 9427d56d374SYoshinobu Inoue proto = NULL; 9437d56d374SYoshinobu Inoue break; 9447d56d374SYoshinobu Inoue } 9457d56d374SYoshinobu Inoue 9467d56d374SYoshinobu Inoue if ((sp = getservbyname(servname, proto)) == NULL) 9477d56d374SYoshinobu Inoue return EAI_SERVICE; 9487d56d374SYoshinobu Inoue port = sp->s_port; 9497d56d374SYoshinobu Inoue } 9507d56d374SYoshinobu Inoue 9517d56d374SYoshinobu Inoue if (!matchonly) { 9527d56d374SYoshinobu Inoue switch (ai->ai_family) { 9537d56d374SYoshinobu Inoue case AF_INET: 954a42af91cSHajimu UMEMOTO ((struct sockaddr_in *)(void *) 955a42af91cSHajimu UMEMOTO ai->ai_addr)->sin_port = port; 9567d56d374SYoshinobu Inoue break; 9577d56d374SYoshinobu Inoue #ifdef INET6 9587d56d374SYoshinobu Inoue case AF_INET6: 959a42af91cSHajimu UMEMOTO ((struct sockaddr_in6 *)(void *) 960a42af91cSHajimu UMEMOTO ai->ai_addr)->sin6_port = port; 9617d56d374SYoshinobu Inoue break; 9627d56d374SYoshinobu Inoue #endif 9637d56d374SYoshinobu Inoue } 9647d56d374SYoshinobu Inoue } 9657d56d374SYoshinobu Inoue 9667d56d374SYoshinobu Inoue return 0; 9677d56d374SYoshinobu Inoue } 9687d56d374SYoshinobu Inoue 9697d56d374SYoshinobu Inoue static const struct afd * 9707d56d374SYoshinobu Inoue find_afd(af) 9717d56d374SYoshinobu Inoue int af; 9727d56d374SYoshinobu Inoue { 9737d56d374SYoshinobu Inoue const struct afd *afd; 9747d56d374SYoshinobu Inoue 9757d56d374SYoshinobu Inoue if (af == PF_UNSPEC) 9767d56d374SYoshinobu Inoue return NULL; 9777d56d374SYoshinobu Inoue for (afd = afdl; afd->a_af; afd++) { 9787d56d374SYoshinobu Inoue if (afd->a_af == af) 9797d56d374SYoshinobu Inoue return afd; 9807d56d374SYoshinobu Inoue } 9817d56d374SYoshinobu Inoue return NULL; 9827d56d374SYoshinobu Inoue } 983a42af91cSHajimu UMEMOTO 984a42af91cSHajimu UMEMOTO /* 985a42af91cSHajimu UMEMOTO * post-2553: AI_ADDRCONFIG check. if we use getipnodeby* as backend, backend 986a42af91cSHajimu UMEMOTO * will take care of it. 987a42af91cSHajimu UMEMOTO * the semantics of AI_ADDRCONFIG is not defined well. we are not sure 988a42af91cSHajimu UMEMOTO * if the code is right or not. 989a42af91cSHajimu UMEMOTO * 990a42af91cSHajimu UMEMOTO * XXX PF_UNSPEC -> PF_INET6 + PF_INET mapping needs to be in sync with 991a42af91cSHajimu UMEMOTO * _dns_getaddrinfo. 992a42af91cSHajimu UMEMOTO */ 993a42af91cSHajimu UMEMOTO static int 994a42af91cSHajimu UMEMOTO addrconfig(pai) 995a42af91cSHajimu UMEMOTO struct addrinfo *pai; 996a42af91cSHajimu UMEMOTO { 997a42af91cSHajimu UMEMOTO int s, af; 998a42af91cSHajimu UMEMOTO 999a42af91cSHajimu UMEMOTO /* 1000a42af91cSHajimu UMEMOTO * TODO: 1001a42af91cSHajimu UMEMOTO * Note that implementation dependent test for address 1002a42af91cSHajimu UMEMOTO * configuration should be done everytime called 1003a42af91cSHajimu UMEMOTO * (or apropriate interval), 1004a42af91cSHajimu UMEMOTO * because addresses will be dynamically assigned or deleted. 1005a42af91cSHajimu UMEMOTO */ 1006a42af91cSHajimu UMEMOTO af = pai->ai_family; 1007a42af91cSHajimu UMEMOTO if (af == AF_UNSPEC) { 1008d201fe46SDaniel Eischen if ((s = _socket(AF_INET6, SOCK_DGRAM, 0)) < 0) 1009a42af91cSHajimu UMEMOTO af = AF_INET; 1010a42af91cSHajimu UMEMOTO else { 101161e4108cSJason Evans _close(s); 1012d201fe46SDaniel Eischen if ((s = _socket(AF_INET, SOCK_DGRAM, 0)) < 0) 1013a42af91cSHajimu UMEMOTO af = AF_INET6; 1014a42af91cSHajimu UMEMOTO else 101561e4108cSJason Evans _close(s); 1016a42af91cSHajimu UMEMOTO } 1017a42af91cSHajimu UMEMOTO } 1018a42af91cSHajimu UMEMOTO if (af != AF_UNSPEC) { 1019d201fe46SDaniel Eischen if ((s = _socket(af, SOCK_DGRAM, 0)) < 0) 1020a42af91cSHajimu UMEMOTO return 0; 102161e4108cSJason Evans _close(s); 1022a42af91cSHajimu UMEMOTO } 1023a42af91cSHajimu UMEMOTO pai->ai_family = af; 1024a42af91cSHajimu UMEMOTO return 1; 1025a42af91cSHajimu UMEMOTO } 1026a42af91cSHajimu UMEMOTO 1027a42af91cSHajimu UMEMOTO #ifdef INET6 1028a42af91cSHajimu UMEMOTO /* convert a string to a scope identifier. XXX: IPv6 specific */ 1029a42af91cSHajimu UMEMOTO static int 1030a89c1d30SHajimu UMEMOTO ip6_str2scopeid(scope, sin6, scopeid) 1031a42af91cSHajimu UMEMOTO char *scope; 1032a42af91cSHajimu UMEMOTO struct sockaddr_in6 *sin6; 1033a89c1d30SHajimu UMEMOTO u_int32_t *scopeid; 1034a42af91cSHajimu UMEMOTO { 1035a89c1d30SHajimu UMEMOTO u_long lscopeid; 1036a89c1d30SHajimu UMEMOTO struct in6_addr *a6; 1037a42af91cSHajimu UMEMOTO char *ep; 1038a42af91cSHajimu UMEMOTO 1039a89c1d30SHajimu UMEMOTO a6 = &sin6->sin6_addr; 1040a89c1d30SHajimu UMEMOTO 1041ec20fe00SJun-ichiro itojun Hagino /* empty scopeid portion is invalid */ 1042ec20fe00SJun-ichiro itojun Hagino if (*scope == '\0') 1043ec20fe00SJun-ichiro itojun Hagino return -1; 1044ec20fe00SJun-ichiro itojun Hagino 1045a42af91cSHajimu UMEMOTO if (IN6_IS_ADDR_LINKLOCAL(a6) || IN6_IS_ADDR_MC_LINKLOCAL(a6)) { 1046a42af91cSHajimu UMEMOTO /* 1047a42af91cSHajimu UMEMOTO * We currently assume a one-to-one mapping between links 1048a42af91cSHajimu UMEMOTO * and interfaces, so we simply use interface indices for 1049a42af91cSHajimu UMEMOTO * like-local scopes. 1050a42af91cSHajimu UMEMOTO */ 1051a89c1d30SHajimu UMEMOTO *scopeid = if_nametoindex(scope); 1052a89c1d30SHajimu UMEMOTO if (*scopeid == 0) 1053a42af91cSHajimu UMEMOTO goto trynumeric; 1054a89c1d30SHajimu UMEMOTO return 0; 1055a42af91cSHajimu UMEMOTO } 1056a42af91cSHajimu UMEMOTO 1057a42af91cSHajimu UMEMOTO /* still unclear about literal, allow numeric only - placeholder */ 1058a42af91cSHajimu UMEMOTO if (IN6_IS_ADDR_SITELOCAL(a6) || IN6_IS_ADDR_MC_SITELOCAL(a6)) 1059a42af91cSHajimu UMEMOTO goto trynumeric; 1060a42af91cSHajimu UMEMOTO if (IN6_IS_ADDR_MC_ORGLOCAL(a6)) 1061a42af91cSHajimu UMEMOTO goto trynumeric; 1062a42af91cSHajimu UMEMOTO else 1063a42af91cSHajimu UMEMOTO goto trynumeric; /* global */ 1064a42af91cSHajimu UMEMOTO 1065a42af91cSHajimu UMEMOTO /* try to convert to a numeric id as a last resort */ 1066a42af91cSHajimu UMEMOTO trynumeric: 1067a89c1d30SHajimu UMEMOTO errno = 0; 1068a89c1d30SHajimu UMEMOTO lscopeid = strtoul(scope, &ep, 10); 1069a89c1d30SHajimu UMEMOTO *scopeid = (u_int32_t)(lscopeid & 0xffffffffUL); 1070a89c1d30SHajimu UMEMOTO if (errno == 0 && ep && *ep == '\0' && *scopeid == lscopeid) 1071a89c1d30SHajimu UMEMOTO return 0; 1072a42af91cSHajimu UMEMOTO else 1073a42af91cSHajimu UMEMOTO return -1; 1074a42af91cSHajimu UMEMOTO } 1075a42af91cSHajimu UMEMOTO #endif 1076a42af91cSHajimu UMEMOTO 1077688a5c3eSHajimu UMEMOTO /* 1078688a5c3eSHajimu UMEMOTO * FQDN hostname, DNS lookup 1079688a5c3eSHajimu UMEMOTO */ 1080688a5c3eSHajimu UMEMOTO static int 1081688a5c3eSHajimu UMEMOTO explore_fqdn(pai, hostname, servname, res) 1082688a5c3eSHajimu UMEMOTO const struct addrinfo *pai; 1083688a5c3eSHajimu UMEMOTO const char *hostname; 1084688a5c3eSHajimu UMEMOTO const char *servname; 1085688a5c3eSHajimu UMEMOTO struct addrinfo **res; 1086688a5c3eSHajimu UMEMOTO { 1087688a5c3eSHajimu UMEMOTO struct addrinfo *result; 1088688a5c3eSHajimu UMEMOTO struct addrinfo *cur; 1089688a5c3eSHajimu UMEMOTO int error = 0; 1090688a5c3eSHajimu UMEMOTO static const ns_dtab dtab[] = { 1091688a5c3eSHajimu UMEMOTO NS_FILES_CB(_files_getaddrinfo, NULL) 1092688a5c3eSHajimu UMEMOTO { NSSRC_DNS, _dns_getaddrinfo, NULL }, /* force -DHESIOD */ 1093688a5c3eSHajimu UMEMOTO NS_NIS_CB(_yp_getaddrinfo, NULL) 1094688a5c3eSHajimu UMEMOTO { 0 } 109569b0a4b6SJim Pirzyk }; 109669b0a4b6SJim Pirzyk 1097688a5c3eSHajimu UMEMOTO result = NULL; 109869b0a4b6SJim Pirzyk 1099688a5c3eSHajimu UMEMOTO THREAD_LOCK(); 1100688a5c3eSHajimu UMEMOTO 1101688a5c3eSHajimu UMEMOTO /* 1102688a5c3eSHajimu UMEMOTO * if the servname does not match socktype/protocol, ignore it. 1103688a5c3eSHajimu UMEMOTO */ 1104688a5c3eSHajimu UMEMOTO if (get_portmatch(pai, servname) != 0) { 1105688a5c3eSHajimu UMEMOTO THREAD_UNLOCK(); 110669b0a4b6SJim Pirzyk return 0; 110769b0a4b6SJim Pirzyk } 110869b0a4b6SJim Pirzyk 1109688a5c3eSHajimu UMEMOTO switch (_nsdispatch(&result, dtab, NSDB_HOSTS, "getaddrinfo", 1110688a5c3eSHajimu UMEMOTO default_dns_files, hostname, pai)) { 1111688a5c3eSHajimu UMEMOTO case NS_TRYAGAIN: 1112688a5c3eSHajimu UMEMOTO error = EAI_AGAIN; 1113688a5c3eSHajimu UMEMOTO goto free; 1114688a5c3eSHajimu UMEMOTO case NS_UNAVAIL: 1115688a5c3eSHajimu UMEMOTO error = EAI_FAIL; 1116688a5c3eSHajimu UMEMOTO goto free; 1117688a5c3eSHajimu UMEMOTO case NS_NOTFOUND: 1118688a5c3eSHajimu UMEMOTO error = EAI_NONAME; 1119688a5c3eSHajimu UMEMOTO goto free; 1120688a5c3eSHajimu UMEMOTO case NS_SUCCESS: 1121688a5c3eSHajimu UMEMOTO error = 0; 1122688a5c3eSHajimu UMEMOTO for (cur = result; cur; cur = cur->ai_next) { 1123688a5c3eSHajimu UMEMOTO GET_PORT(cur, servname); 1124688a5c3eSHajimu UMEMOTO /* canonname should be filled already */ 1125688a5c3eSHajimu UMEMOTO } 112669b0a4b6SJim Pirzyk break; 112769b0a4b6SJim Pirzyk } 1128688a5c3eSHajimu UMEMOTO THREAD_UNLOCK(); 112969b0a4b6SJim Pirzyk 1130688a5c3eSHajimu UMEMOTO *res = result; 1131688a5c3eSHajimu UMEMOTO 113269b0a4b6SJim Pirzyk return 0; 1133688a5c3eSHajimu UMEMOTO 1134688a5c3eSHajimu UMEMOTO free: 1135688a5c3eSHajimu UMEMOTO THREAD_UNLOCK(); 1136688a5c3eSHajimu UMEMOTO if (result) 1137688a5c3eSHajimu UMEMOTO freeaddrinfo(result); 1138688a5c3eSHajimu UMEMOTO return error; 113969b0a4b6SJim Pirzyk } 114069b0a4b6SJim Pirzyk 1141a42af91cSHajimu UMEMOTO #ifdef DEBUG 1142a42af91cSHajimu UMEMOTO static const char AskedForGot[] = 1143a42af91cSHajimu UMEMOTO "gethostby*.getanswer: asked for \"%s\", got \"%s\""; 1144a42af91cSHajimu UMEMOTO #endif 1145248aee62SJacques Vidrine static FILE *hostf = NULL; 1146a42af91cSHajimu UMEMOTO 1147a42af91cSHajimu UMEMOTO static struct addrinfo * 1148a42af91cSHajimu UMEMOTO getanswer(answer, anslen, qname, qtype, pai) 1149a42af91cSHajimu UMEMOTO const querybuf *answer; 1150a42af91cSHajimu UMEMOTO int anslen; 1151a42af91cSHajimu UMEMOTO const char *qname; 1152a42af91cSHajimu UMEMOTO int qtype; 1153a42af91cSHajimu UMEMOTO const struct addrinfo *pai; 1154a42af91cSHajimu UMEMOTO { 1155a42af91cSHajimu UMEMOTO struct addrinfo sentinel, *cur; 1156a42af91cSHajimu UMEMOTO struct addrinfo ai; 1157a42af91cSHajimu UMEMOTO const struct afd *afd; 1158a42af91cSHajimu UMEMOTO char *canonname; 1159a42af91cSHajimu UMEMOTO const HEADER *hp; 1160a42af91cSHajimu UMEMOTO const u_char *cp; 1161a42af91cSHajimu UMEMOTO int n; 1162a42af91cSHajimu UMEMOTO const u_char *eom; 1163dd521ef1SHajimu UMEMOTO char *bp, *ep; 1164dd521ef1SHajimu UMEMOTO int type, class, ancount, qdcount; 1165a42af91cSHajimu UMEMOTO int haveanswer, had_error; 1166a42af91cSHajimu UMEMOTO char tbuf[MAXDNAME]; 1167c05ac53bSDavid E. O'Brien int (*name_ok)(const char *); 1168a42af91cSHajimu UMEMOTO char hostbuf[8*1024]; 1169a42af91cSHajimu UMEMOTO 1170a42af91cSHajimu UMEMOTO memset(&sentinel, 0, sizeof(sentinel)); 1171a42af91cSHajimu UMEMOTO cur = &sentinel; 1172a42af91cSHajimu UMEMOTO 1173a42af91cSHajimu UMEMOTO canonname = NULL; 1174a42af91cSHajimu UMEMOTO eom = answer->buf + anslen; 1175a42af91cSHajimu UMEMOTO switch (qtype) { 1176a42af91cSHajimu UMEMOTO case T_A: 1177a42af91cSHajimu UMEMOTO case T_AAAA: 1178a42af91cSHajimu UMEMOTO case T_ANY: /*use T_ANY only for T_A/T_AAAA lookup*/ 1179a42af91cSHajimu UMEMOTO name_ok = res_hnok; 1180a42af91cSHajimu UMEMOTO break; 1181a42af91cSHajimu UMEMOTO default: 1182a42af91cSHajimu UMEMOTO return (NULL); /* XXX should be abort(); */ 1183a42af91cSHajimu UMEMOTO } 1184a42af91cSHajimu UMEMOTO /* 1185a42af91cSHajimu UMEMOTO * find first satisfactory answer 1186a42af91cSHajimu UMEMOTO */ 1187a42af91cSHajimu UMEMOTO hp = &answer->hdr; 1188a42af91cSHajimu UMEMOTO ancount = ntohs(hp->ancount); 1189a42af91cSHajimu UMEMOTO qdcount = ntohs(hp->qdcount); 1190a42af91cSHajimu UMEMOTO bp = hostbuf; 1191dd521ef1SHajimu UMEMOTO ep = hostbuf + sizeof hostbuf; 1192a42af91cSHajimu UMEMOTO cp = answer->buf + HFIXEDSZ; 1193a42af91cSHajimu UMEMOTO if (qdcount != 1) { 1194a42af91cSHajimu UMEMOTO h_errno = NO_RECOVERY; 1195a42af91cSHajimu UMEMOTO return (NULL); 1196a42af91cSHajimu UMEMOTO } 1197dd521ef1SHajimu UMEMOTO n = dn_expand(answer->buf, eom, cp, bp, ep - bp); 1198a42af91cSHajimu UMEMOTO if ((n < 0) || !(*name_ok)(bp)) { 1199a42af91cSHajimu UMEMOTO h_errno = NO_RECOVERY; 1200a42af91cSHajimu UMEMOTO return (NULL); 1201a42af91cSHajimu UMEMOTO } 1202a42af91cSHajimu UMEMOTO cp += n + QFIXEDSZ; 1203a42af91cSHajimu UMEMOTO if (qtype == T_A || qtype == T_AAAA || qtype == T_ANY) { 1204a42af91cSHajimu UMEMOTO /* res_send() has already verified that the query name is the 1205a42af91cSHajimu UMEMOTO * same as the one we sent; this just gets the expanded name 1206a42af91cSHajimu UMEMOTO * (i.e., with the succeeding search-domain tacked on). 1207a42af91cSHajimu UMEMOTO */ 1208a42af91cSHajimu UMEMOTO n = strlen(bp) + 1; /* for the \0 */ 1209a42af91cSHajimu UMEMOTO if (n >= MAXHOSTNAMELEN) { 1210a42af91cSHajimu UMEMOTO h_errno = NO_RECOVERY; 1211a42af91cSHajimu UMEMOTO return (NULL); 1212a42af91cSHajimu UMEMOTO } 1213a42af91cSHajimu UMEMOTO canonname = bp; 1214a42af91cSHajimu UMEMOTO bp += n; 1215a42af91cSHajimu UMEMOTO /* The qname can be abbreviated, but h_name is now absolute. */ 1216a42af91cSHajimu UMEMOTO qname = canonname; 1217a42af91cSHajimu UMEMOTO } 1218a42af91cSHajimu UMEMOTO haveanswer = 0; 1219a42af91cSHajimu UMEMOTO had_error = 0; 1220a42af91cSHajimu UMEMOTO while (ancount-- > 0 && cp < eom && !had_error) { 1221dd521ef1SHajimu UMEMOTO n = dn_expand(answer->buf, eom, cp, bp, ep - bp); 1222a42af91cSHajimu UMEMOTO if ((n < 0) || !(*name_ok)(bp)) { 1223a42af91cSHajimu UMEMOTO had_error++; 1224a42af91cSHajimu UMEMOTO continue; 1225a42af91cSHajimu UMEMOTO } 1226a42af91cSHajimu UMEMOTO cp += n; /* name */ 1227a42af91cSHajimu UMEMOTO type = _getshort(cp); 1228a42af91cSHajimu UMEMOTO cp += INT16SZ; /* type */ 1229a42af91cSHajimu UMEMOTO class = _getshort(cp); 1230a42af91cSHajimu UMEMOTO cp += INT16SZ + INT32SZ; /* class, TTL */ 1231a42af91cSHajimu UMEMOTO n = _getshort(cp); 1232a42af91cSHajimu UMEMOTO cp += INT16SZ; /* len */ 1233a42af91cSHajimu UMEMOTO if (class != C_IN) { 1234a42af91cSHajimu UMEMOTO /* XXX - debug? syslog? */ 1235a42af91cSHajimu UMEMOTO cp += n; 1236a42af91cSHajimu UMEMOTO continue; /* XXX - had_error++ ? */ 1237a42af91cSHajimu UMEMOTO } 1238a42af91cSHajimu UMEMOTO if ((qtype == T_A || qtype == T_AAAA || qtype == T_ANY) && 1239a42af91cSHajimu UMEMOTO type == T_CNAME) { 1240a42af91cSHajimu UMEMOTO n = dn_expand(answer->buf, eom, cp, tbuf, sizeof tbuf); 1241a42af91cSHajimu UMEMOTO if ((n < 0) || !(*name_ok)(tbuf)) { 1242a42af91cSHajimu UMEMOTO had_error++; 1243a42af91cSHajimu UMEMOTO continue; 1244a42af91cSHajimu UMEMOTO } 1245a42af91cSHajimu UMEMOTO cp += n; 1246a42af91cSHajimu UMEMOTO /* Get canonical name. */ 1247a42af91cSHajimu UMEMOTO n = strlen(tbuf) + 1; /* for the \0 */ 1248dd521ef1SHajimu UMEMOTO if (n > ep - bp || n >= MAXHOSTNAMELEN) { 1249a42af91cSHajimu UMEMOTO had_error++; 1250a42af91cSHajimu UMEMOTO continue; 1251a42af91cSHajimu UMEMOTO } 1252d0509082SJacques Vidrine strlcpy(bp, tbuf, ep - bp); 1253a42af91cSHajimu UMEMOTO canonname = bp; 1254a42af91cSHajimu UMEMOTO bp += n; 1255a42af91cSHajimu UMEMOTO continue; 1256a42af91cSHajimu UMEMOTO } 1257a42af91cSHajimu UMEMOTO if (qtype == T_ANY) { 1258a42af91cSHajimu UMEMOTO if (!(type == T_A || type == T_AAAA)) { 1259a42af91cSHajimu UMEMOTO cp += n; 1260a42af91cSHajimu UMEMOTO continue; 1261a42af91cSHajimu UMEMOTO } 1262a42af91cSHajimu UMEMOTO } else if (type != qtype) { 1263a42af91cSHajimu UMEMOTO #ifdef DEBUG 1264a42af91cSHajimu UMEMOTO if (type != T_KEY && type != T_SIG) 1265a42af91cSHajimu UMEMOTO syslog(LOG_NOTICE|LOG_AUTH, 1266a42af91cSHajimu UMEMOTO "gethostby*.getanswer: asked for \"%s %s %s\", got type \"%s\"", 1267a42af91cSHajimu UMEMOTO qname, p_class(C_IN), p_type(qtype), 1268a42af91cSHajimu UMEMOTO p_type(type)); 1269a42af91cSHajimu UMEMOTO #endif 1270a42af91cSHajimu UMEMOTO cp += n; 1271a42af91cSHajimu UMEMOTO continue; /* XXX - had_error++ ? */ 1272a42af91cSHajimu UMEMOTO } 1273a42af91cSHajimu UMEMOTO switch (type) { 1274a42af91cSHajimu UMEMOTO case T_A: 1275a42af91cSHajimu UMEMOTO case T_AAAA: 1276a42af91cSHajimu UMEMOTO if (strcasecmp(canonname, bp) != 0) { 1277a42af91cSHajimu UMEMOTO #ifdef DEBUG 1278a42af91cSHajimu UMEMOTO syslog(LOG_NOTICE|LOG_AUTH, 1279a42af91cSHajimu UMEMOTO AskedForGot, canonname, bp); 1280a42af91cSHajimu UMEMOTO #endif 1281a42af91cSHajimu UMEMOTO cp += n; 1282a42af91cSHajimu UMEMOTO continue; /* XXX - had_error++ ? */ 1283a42af91cSHajimu UMEMOTO } 1284a42af91cSHajimu UMEMOTO if (type == T_A && n != INADDRSZ) { 1285a42af91cSHajimu UMEMOTO cp += n; 1286a42af91cSHajimu UMEMOTO continue; 1287a42af91cSHajimu UMEMOTO } 1288a42af91cSHajimu UMEMOTO if (type == T_AAAA && n != IN6ADDRSZ) { 1289a42af91cSHajimu UMEMOTO cp += n; 1290a42af91cSHajimu UMEMOTO continue; 1291a42af91cSHajimu UMEMOTO } 1292a42af91cSHajimu UMEMOTO #ifdef FILTER_V4MAPPED 1293a42af91cSHajimu UMEMOTO if (type == T_AAAA) { 1294a42af91cSHajimu UMEMOTO struct in6_addr in6; 1295a42af91cSHajimu UMEMOTO memcpy(&in6, cp, sizeof(in6)); 1296a42af91cSHajimu UMEMOTO if (IN6_IS_ADDR_V4MAPPED(&in6)) { 1297a42af91cSHajimu UMEMOTO cp += n; 1298a42af91cSHajimu UMEMOTO continue; 1299a42af91cSHajimu UMEMOTO } 1300a42af91cSHajimu UMEMOTO } 1301a42af91cSHajimu UMEMOTO #endif 1302a42af91cSHajimu UMEMOTO if (!haveanswer) { 1303a42af91cSHajimu UMEMOTO int nn; 1304a42af91cSHajimu UMEMOTO 1305a42af91cSHajimu UMEMOTO canonname = bp; 1306a42af91cSHajimu UMEMOTO nn = strlen(bp) + 1; /* for the \0 */ 1307a42af91cSHajimu UMEMOTO bp += nn; 1308a42af91cSHajimu UMEMOTO } 1309a42af91cSHajimu UMEMOTO 1310a42af91cSHajimu UMEMOTO /* don't overwrite pai */ 1311a42af91cSHajimu UMEMOTO ai = *pai; 1312a42af91cSHajimu UMEMOTO ai.ai_family = (type == T_A) ? AF_INET : AF_INET6; 1313a42af91cSHajimu UMEMOTO afd = find_afd(ai.ai_family); 1314a42af91cSHajimu UMEMOTO if (afd == NULL) { 1315a42af91cSHajimu UMEMOTO cp += n; 1316a42af91cSHajimu UMEMOTO continue; 1317a42af91cSHajimu UMEMOTO } 1318a42af91cSHajimu UMEMOTO cur->ai_next = get_ai(&ai, afd, (const char *)cp); 1319a42af91cSHajimu UMEMOTO if (cur->ai_next == NULL) 1320a42af91cSHajimu UMEMOTO had_error++; 1321a42af91cSHajimu UMEMOTO while (cur && cur->ai_next) 1322a42af91cSHajimu UMEMOTO cur = cur->ai_next; 1323a42af91cSHajimu UMEMOTO cp += n; 1324a42af91cSHajimu UMEMOTO break; 1325a42af91cSHajimu UMEMOTO default: 1326a42af91cSHajimu UMEMOTO abort(); 1327a42af91cSHajimu UMEMOTO } 1328a42af91cSHajimu UMEMOTO if (!had_error) 1329a42af91cSHajimu UMEMOTO haveanswer++; 1330a42af91cSHajimu UMEMOTO } 1331a42af91cSHajimu UMEMOTO if (haveanswer) { 133269b0a4b6SJim Pirzyk #if defined(RESOLVSORT) 133369b0a4b6SJim Pirzyk /* 133469b0a4b6SJim Pirzyk * We support only IPv4 address for backward 133569b0a4b6SJim Pirzyk * compatibility against gethostbyname(3). 133669b0a4b6SJim Pirzyk */ 133769b0a4b6SJim Pirzyk if (_res.nsort && qtype == T_A) { 133869b0a4b6SJim Pirzyk if (addr4sort(&sentinel) < 0) { 133969b0a4b6SJim Pirzyk freeaddrinfo(sentinel.ai_next); 134069b0a4b6SJim Pirzyk h_errno = NO_RECOVERY; 134169b0a4b6SJim Pirzyk return NULL; 134269b0a4b6SJim Pirzyk } 134369b0a4b6SJim Pirzyk } 134469b0a4b6SJim Pirzyk #endif /*RESOLVSORT*/ 1345a42af91cSHajimu UMEMOTO if (!canonname) 1346a42af91cSHajimu UMEMOTO (void)get_canonname(pai, sentinel.ai_next, qname); 1347a42af91cSHajimu UMEMOTO else 1348a42af91cSHajimu UMEMOTO (void)get_canonname(pai, sentinel.ai_next, canonname); 1349a42af91cSHajimu UMEMOTO h_errno = NETDB_SUCCESS; 1350a42af91cSHajimu UMEMOTO return sentinel.ai_next; 1351a42af91cSHajimu UMEMOTO } 1352a42af91cSHajimu UMEMOTO 1353a42af91cSHajimu UMEMOTO h_errno = NO_RECOVERY; 1354a42af91cSHajimu UMEMOTO return NULL; 1355a42af91cSHajimu UMEMOTO } 1356a42af91cSHajimu UMEMOTO 1357688a5c3eSHajimu UMEMOTO #ifdef RESOLVSORT 1358688a5c3eSHajimu UMEMOTO struct addr_ptr { 1359688a5c3eSHajimu UMEMOTO struct addrinfo *ai; 1360688a5c3eSHajimu UMEMOTO int aval; 1361688a5c3eSHajimu UMEMOTO }; 1362688a5c3eSHajimu UMEMOTO 1363688a5c3eSHajimu UMEMOTO static int 1364688a5c3eSHajimu UMEMOTO addr4sort(struct addrinfo *sentinel) 1365688a5c3eSHajimu UMEMOTO { 1366688a5c3eSHajimu UMEMOTO struct addrinfo *ai; 1367688a5c3eSHajimu UMEMOTO struct addr_ptr *addrs, addr; 1368688a5c3eSHajimu UMEMOTO struct sockaddr_in *sin; 1369688a5c3eSHajimu UMEMOTO int naddrs, i, j; 1370688a5c3eSHajimu UMEMOTO int needsort = 0; 1371688a5c3eSHajimu UMEMOTO 1372688a5c3eSHajimu UMEMOTO if (!sentinel) 1373688a5c3eSHajimu UMEMOTO return -1; 1374688a5c3eSHajimu UMEMOTO naddrs = 0; 1375688a5c3eSHajimu UMEMOTO for (ai = sentinel->ai_next; ai; ai = ai->ai_next) 1376688a5c3eSHajimu UMEMOTO naddrs++; 1377688a5c3eSHajimu UMEMOTO if (naddrs < 2) 1378688a5c3eSHajimu UMEMOTO return 0; /* We don't need sorting. */ 1379688a5c3eSHajimu UMEMOTO if ((addrs = malloc(sizeof(struct addr_ptr) * naddrs)) == NULL) 1380688a5c3eSHajimu UMEMOTO return -1; 1381688a5c3eSHajimu UMEMOTO i = 0; 1382688a5c3eSHajimu UMEMOTO for (ai = sentinel->ai_next; ai; ai = ai->ai_next) { 1383688a5c3eSHajimu UMEMOTO sin = (struct sockaddr_in *)ai->ai_addr; 1384688a5c3eSHajimu UMEMOTO for (j = 0; (unsigned)j < _res.nsort; j++) { 1385688a5c3eSHajimu UMEMOTO if (_res.sort_list[j].addr.s_addr == 1386688a5c3eSHajimu UMEMOTO (sin->sin_addr.s_addr & _res.sort_list[j].mask)) 1387688a5c3eSHajimu UMEMOTO break; 1388688a5c3eSHajimu UMEMOTO } 1389688a5c3eSHajimu UMEMOTO addrs[i].ai = ai; 1390688a5c3eSHajimu UMEMOTO addrs[i].aval = j; 1391688a5c3eSHajimu UMEMOTO if (needsort == 0 && i > 0 && j < addrs[i - 1].aval) 1392688a5c3eSHajimu UMEMOTO needsort = i; 1393688a5c3eSHajimu UMEMOTO i++; 1394688a5c3eSHajimu UMEMOTO } 1395688a5c3eSHajimu UMEMOTO if (!needsort) { 1396688a5c3eSHajimu UMEMOTO free(addrs); 1397688a5c3eSHajimu UMEMOTO return 0; 1398688a5c3eSHajimu UMEMOTO } 1399688a5c3eSHajimu UMEMOTO 1400688a5c3eSHajimu UMEMOTO while (needsort < naddrs) { 1401688a5c3eSHajimu UMEMOTO for (j = needsort - 1; j >= 0; j--) { 1402688a5c3eSHajimu UMEMOTO if (addrs[j].aval > addrs[j+1].aval) { 1403688a5c3eSHajimu UMEMOTO addr = addrs[j]; 1404688a5c3eSHajimu UMEMOTO addrs[j] = addrs[j + 1]; 1405688a5c3eSHajimu UMEMOTO addrs[j + 1] = addr; 1406688a5c3eSHajimu UMEMOTO } else 1407688a5c3eSHajimu UMEMOTO break; 1408688a5c3eSHajimu UMEMOTO } 1409688a5c3eSHajimu UMEMOTO needsort++; 1410688a5c3eSHajimu UMEMOTO } 1411688a5c3eSHajimu UMEMOTO 1412688a5c3eSHajimu UMEMOTO ai = sentinel; 1413688a5c3eSHajimu UMEMOTO for (i = 0; i < naddrs; ++i) { 1414688a5c3eSHajimu UMEMOTO ai->ai_next = addrs[i].ai; 1415688a5c3eSHajimu UMEMOTO ai = ai->ai_next; 1416688a5c3eSHajimu UMEMOTO } 1417688a5c3eSHajimu UMEMOTO ai->ai_next = NULL; 1418688a5c3eSHajimu UMEMOTO free(addrs); 1419688a5c3eSHajimu UMEMOTO return 0; 1420688a5c3eSHajimu UMEMOTO } 1421688a5c3eSHajimu UMEMOTO #endif /*RESOLVSORT*/ 1422688a5c3eSHajimu UMEMOTO 1423a42af91cSHajimu UMEMOTO /*ARGSUSED*/ 1424a42af91cSHajimu UMEMOTO static int 1425248aee62SJacques Vidrine _dns_getaddrinfo(rv, cb_data, ap) 1426248aee62SJacques Vidrine void *rv; 1427248aee62SJacques Vidrine void *cb_data; 1428248aee62SJacques Vidrine va_list ap; 1429a42af91cSHajimu UMEMOTO { 1430a42af91cSHajimu UMEMOTO struct addrinfo *ai; 14315cd588cbSHajimu UMEMOTO querybuf *buf, *buf2; 1432a42af91cSHajimu UMEMOTO const char *name; 1433248aee62SJacques Vidrine const struct addrinfo *pai; 1434a42af91cSHajimu UMEMOTO struct addrinfo sentinel, *cur; 1435a42af91cSHajimu UMEMOTO struct res_target q, q2; 1436a42af91cSHajimu UMEMOTO 1437248aee62SJacques Vidrine name = va_arg(ap, char *); 1438248aee62SJacques Vidrine pai = va_arg(ap, const struct addrinfo *); 1439248aee62SJacques Vidrine 1440a42af91cSHajimu UMEMOTO memset(&q, 0, sizeof(q2)); 1441a42af91cSHajimu UMEMOTO memset(&q2, 0, sizeof(q2)); 1442a42af91cSHajimu UMEMOTO memset(&sentinel, 0, sizeof(sentinel)); 1443a42af91cSHajimu UMEMOTO cur = &sentinel; 1444a42af91cSHajimu UMEMOTO 14455cd588cbSHajimu UMEMOTO buf = malloc(sizeof(*buf)); 14465cd588cbSHajimu UMEMOTO if (!buf) { 14475cd588cbSHajimu UMEMOTO h_errno = NETDB_INTERNAL; 14485cd588cbSHajimu UMEMOTO return NS_NOTFOUND; 14495cd588cbSHajimu UMEMOTO } 14505cd588cbSHajimu UMEMOTO buf2 = malloc(sizeof(*buf2)); 14515cd588cbSHajimu UMEMOTO if (!buf2) { 14525cd588cbSHajimu UMEMOTO free(buf); 14535cd588cbSHajimu UMEMOTO h_errno = NETDB_INTERNAL; 14545cd588cbSHajimu UMEMOTO return NS_NOTFOUND; 14555cd588cbSHajimu UMEMOTO } 14565cd588cbSHajimu UMEMOTO 1457a42af91cSHajimu UMEMOTO switch (pai->ai_family) { 1458a42af91cSHajimu UMEMOTO case AF_UNSPEC: 1459a42af91cSHajimu UMEMOTO /* prefer IPv6 */ 1460dd521ef1SHajimu UMEMOTO q.name = name; 1461b826397aSJun-ichiro itojun Hagino q.qclass = C_IN; 1462b826397aSJun-ichiro itojun Hagino q.qtype = T_AAAA; 14635cd588cbSHajimu UMEMOTO q.answer = buf->buf; 14645cd588cbSHajimu UMEMOTO q.anslen = sizeof(buf->buf); 1465a42af91cSHajimu UMEMOTO q.next = &q2; 1466a89c1d30SHajimu UMEMOTO q2.name = name; 1467b826397aSJun-ichiro itojun Hagino q2.qclass = C_IN; 1468b826397aSJun-ichiro itojun Hagino q2.qtype = T_A; 14695cd588cbSHajimu UMEMOTO q2.answer = buf2->buf; 14705cd588cbSHajimu UMEMOTO q2.anslen = sizeof(buf2->buf); 1471a42af91cSHajimu UMEMOTO break; 1472a42af91cSHajimu UMEMOTO case AF_INET: 1473dd521ef1SHajimu UMEMOTO q.name = name; 1474b826397aSJun-ichiro itojun Hagino q.qclass = C_IN; 1475b826397aSJun-ichiro itojun Hagino q.qtype = T_A; 14765cd588cbSHajimu UMEMOTO q.answer = buf->buf; 14775cd588cbSHajimu UMEMOTO q.anslen = sizeof(buf->buf); 1478a42af91cSHajimu UMEMOTO break; 1479a42af91cSHajimu UMEMOTO case AF_INET6: 1480dd521ef1SHajimu UMEMOTO q.name = name; 1481b826397aSJun-ichiro itojun Hagino q.qclass = C_IN; 1482b826397aSJun-ichiro itojun Hagino q.qtype = T_AAAA; 14835cd588cbSHajimu UMEMOTO q.answer = buf->buf; 14845cd588cbSHajimu UMEMOTO q.anslen = sizeof(buf->buf); 1485a42af91cSHajimu UMEMOTO break; 1486a42af91cSHajimu UMEMOTO default: 14875cd588cbSHajimu UMEMOTO free(buf); 14885cd588cbSHajimu UMEMOTO free(buf2); 1489248aee62SJacques Vidrine return NS_UNAVAIL; 1490a42af91cSHajimu UMEMOTO } 14915cd588cbSHajimu UMEMOTO if (res_searchN(name, &q) < 0) { 14925cd588cbSHajimu UMEMOTO free(buf); 14935cd588cbSHajimu UMEMOTO free(buf2); 1494248aee62SJacques Vidrine return NS_NOTFOUND; 14955cd588cbSHajimu UMEMOTO } 14965cd588cbSHajimu UMEMOTO ai = getanswer(buf, q.n, q.name, q.qtype, pai); 1497a42af91cSHajimu UMEMOTO if (ai) { 1498a42af91cSHajimu UMEMOTO cur->ai_next = ai; 1499a42af91cSHajimu UMEMOTO while (cur && cur->ai_next) 1500a42af91cSHajimu UMEMOTO cur = cur->ai_next; 1501a42af91cSHajimu UMEMOTO } 1502a42af91cSHajimu UMEMOTO if (q.next) { 15035cd588cbSHajimu UMEMOTO ai = getanswer(buf2, q2.n, q2.name, q2.qtype, pai); 1504a42af91cSHajimu UMEMOTO if (ai) 1505a42af91cSHajimu UMEMOTO cur->ai_next = ai; 1506a42af91cSHajimu UMEMOTO } 15075cd588cbSHajimu UMEMOTO free(buf); 15085cd588cbSHajimu UMEMOTO free(buf2); 1509a42af91cSHajimu UMEMOTO if (sentinel.ai_next == NULL) 1510a42af91cSHajimu UMEMOTO switch (h_errno) { 1511a42af91cSHajimu UMEMOTO case HOST_NOT_FOUND: 1512248aee62SJacques Vidrine return NS_NOTFOUND; 1513a42af91cSHajimu UMEMOTO case TRY_AGAIN: 1514248aee62SJacques Vidrine return NS_TRYAGAIN; 1515a42af91cSHajimu UMEMOTO default: 1516248aee62SJacques Vidrine return NS_UNAVAIL; 1517a42af91cSHajimu UMEMOTO } 1518248aee62SJacques Vidrine *((struct addrinfo **)rv) = sentinel.ai_next; 1519248aee62SJacques Vidrine return NS_SUCCESS; 1520248aee62SJacques Vidrine } 1521248aee62SJacques Vidrine 1522248aee62SJacques Vidrine static void 1523248aee62SJacques Vidrine _sethtent() 1524248aee62SJacques Vidrine { 1525248aee62SJacques Vidrine if (!hostf) 1526248aee62SJacques Vidrine hostf = fopen(_PATH_HOSTS, "r" ); 1527248aee62SJacques Vidrine else 1528248aee62SJacques Vidrine rewind(hostf); 1529248aee62SJacques Vidrine } 1530248aee62SJacques Vidrine 1531248aee62SJacques Vidrine static void 1532248aee62SJacques Vidrine _endhtent() 1533248aee62SJacques Vidrine { 1534248aee62SJacques Vidrine if (hostf) { 1535248aee62SJacques Vidrine (void) fclose(hostf); 1536248aee62SJacques Vidrine hostf = NULL; 1537248aee62SJacques Vidrine } 1538a42af91cSHajimu UMEMOTO } 1539a42af91cSHajimu UMEMOTO 1540a42af91cSHajimu UMEMOTO static struct addrinfo * 1541248aee62SJacques Vidrine _gethtent(name, pai) 1542a42af91cSHajimu UMEMOTO const char *name; 1543a42af91cSHajimu UMEMOTO const struct addrinfo *pai; 1544a42af91cSHajimu UMEMOTO { 1545a42af91cSHajimu UMEMOTO char *p; 1546a42af91cSHajimu UMEMOTO char *cp, *tname, *cname; 1547a42af91cSHajimu UMEMOTO struct addrinfo hints, *res0, *res; 1548a42af91cSHajimu UMEMOTO int error; 1549a42af91cSHajimu UMEMOTO const char *addr; 1550a42af91cSHajimu UMEMOTO char hostbuf[8*1024]; 1551a42af91cSHajimu UMEMOTO 1552248aee62SJacques Vidrine if (!hostf && !(hostf = fopen(_PATH_HOSTS, "r" ))) 1553248aee62SJacques Vidrine return (NULL); 1554a42af91cSHajimu UMEMOTO again: 1555a42af91cSHajimu UMEMOTO if (!(p = fgets(hostbuf, sizeof hostbuf, hostf))) 1556a42af91cSHajimu UMEMOTO return (NULL); 1557a42af91cSHajimu UMEMOTO if (*p == '#') 1558a42af91cSHajimu UMEMOTO goto again; 1559a42af91cSHajimu UMEMOTO if (!(cp = strpbrk(p, "#\n"))) 1560a42af91cSHajimu UMEMOTO goto again; 1561a42af91cSHajimu UMEMOTO *cp = '\0'; 1562a42af91cSHajimu UMEMOTO if (!(cp = strpbrk(p, " \t"))) 1563a42af91cSHajimu UMEMOTO goto again; 1564a42af91cSHajimu UMEMOTO *cp++ = '\0'; 1565a42af91cSHajimu UMEMOTO addr = p; 1566a42af91cSHajimu UMEMOTO cname = NULL; 1567a42af91cSHajimu UMEMOTO /* if this is not something we're looking for, skip it. */ 1568a42af91cSHajimu UMEMOTO while (cp && *cp) { 1569a42af91cSHajimu UMEMOTO if (*cp == ' ' || *cp == '\t') { 1570a42af91cSHajimu UMEMOTO cp++; 1571a42af91cSHajimu UMEMOTO continue; 1572a42af91cSHajimu UMEMOTO } 1573a42af91cSHajimu UMEMOTO tname = cp; 1574a42af91cSHajimu UMEMOTO if (cname == NULL) 1575a42af91cSHajimu UMEMOTO cname = cp; 1576a42af91cSHajimu UMEMOTO if ((cp = strpbrk(cp, " \t")) != NULL) 1577a42af91cSHajimu UMEMOTO *cp++ = '\0'; 1578a42af91cSHajimu UMEMOTO if (strcasecmp(name, tname) == 0) 1579a42af91cSHajimu UMEMOTO goto found; 1580a42af91cSHajimu UMEMOTO } 1581a42af91cSHajimu UMEMOTO goto again; 1582a42af91cSHajimu UMEMOTO 1583a42af91cSHajimu UMEMOTO found: 1584dd521ef1SHajimu UMEMOTO /* we should not glob socktype/protocol here */ 1585dd521ef1SHajimu UMEMOTO memset(&hints, 0, sizeof(hints)); 1586dd521ef1SHajimu UMEMOTO hints.ai_family = pai->ai_family; 1587dd521ef1SHajimu UMEMOTO hints.ai_socktype = SOCK_DGRAM; 1588dd521ef1SHajimu UMEMOTO hints.ai_protocol = 0; 1589a42af91cSHajimu UMEMOTO hints.ai_flags = AI_NUMERICHOST; 1590dd521ef1SHajimu UMEMOTO error = getaddrinfo(addr, "0", &hints, &res0); 1591a42af91cSHajimu UMEMOTO if (error) 1592a42af91cSHajimu UMEMOTO goto again; 1593a42af91cSHajimu UMEMOTO #ifdef FILTER_V4MAPPED 1594a42af91cSHajimu UMEMOTO /* XXX should check all items in the chain */ 1595a42af91cSHajimu UMEMOTO if (res0->ai_family == AF_INET6 && 1596a42af91cSHajimu UMEMOTO IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)res0->ai_addr)->sin6_addr)) { 1597a42af91cSHajimu UMEMOTO freeaddrinfo(res0); 1598a42af91cSHajimu UMEMOTO goto again; 1599a42af91cSHajimu UMEMOTO } 1600a42af91cSHajimu UMEMOTO #endif 1601a42af91cSHajimu UMEMOTO for (res = res0; res; res = res->ai_next) { 1602a42af91cSHajimu UMEMOTO /* cover it up */ 1603a42af91cSHajimu UMEMOTO res->ai_flags = pai->ai_flags; 1604dd521ef1SHajimu UMEMOTO res->ai_socktype = pai->ai_socktype; 1605dd521ef1SHajimu UMEMOTO res->ai_protocol = pai->ai_protocol; 1606a42af91cSHajimu UMEMOTO 1607a42af91cSHajimu UMEMOTO if (pai->ai_flags & AI_CANONNAME) { 1608a42af91cSHajimu UMEMOTO if (get_canonname(pai, res, cname) != 0) { 1609a42af91cSHajimu UMEMOTO freeaddrinfo(res0); 1610a42af91cSHajimu UMEMOTO goto again; 1611a42af91cSHajimu UMEMOTO } 1612a42af91cSHajimu UMEMOTO } 1613a42af91cSHajimu UMEMOTO } 1614a42af91cSHajimu UMEMOTO return res0; 1615a42af91cSHajimu UMEMOTO } 1616a42af91cSHajimu UMEMOTO 1617a42af91cSHajimu UMEMOTO /*ARGSUSED*/ 1618a42af91cSHajimu UMEMOTO static int 1619248aee62SJacques Vidrine _files_getaddrinfo(rv, cb_data, ap) 1620248aee62SJacques Vidrine void *rv; 1621248aee62SJacques Vidrine void *cb_data; 1622248aee62SJacques Vidrine va_list ap; 1623a42af91cSHajimu UMEMOTO { 1624248aee62SJacques Vidrine const char *name; 1625248aee62SJacques Vidrine const struct addrinfo *pai; 1626a42af91cSHajimu UMEMOTO struct addrinfo sentinel, *cur; 1627a42af91cSHajimu UMEMOTO struct addrinfo *p; 1628a42af91cSHajimu UMEMOTO 1629248aee62SJacques Vidrine name = va_arg(ap, char *); 1630248aee62SJacques Vidrine pai = va_arg(ap, struct addrinfo *); 1631248aee62SJacques Vidrine 1632248aee62SJacques Vidrine memset(&sentinel, 0, sizeof(sentinel)); 1633a42af91cSHajimu UMEMOTO cur = &sentinel; 1634a42af91cSHajimu UMEMOTO 1635248aee62SJacques Vidrine _sethtent(); 1636248aee62SJacques Vidrine while ((p = _gethtent(name, pai)) != NULL) { 1637a42af91cSHajimu UMEMOTO cur->ai_next = p; 1638a42af91cSHajimu UMEMOTO while (cur && cur->ai_next) 1639a42af91cSHajimu UMEMOTO cur = cur->ai_next; 1640a42af91cSHajimu UMEMOTO } 1641248aee62SJacques Vidrine _endhtent(); 1642a42af91cSHajimu UMEMOTO 1643248aee62SJacques Vidrine *((struct addrinfo **)rv) = sentinel.ai_next; 1644248aee62SJacques Vidrine if (sentinel.ai_next == NULL) 1645248aee62SJacques Vidrine return NS_NOTFOUND; 1646248aee62SJacques Vidrine return NS_SUCCESS; 1647a42af91cSHajimu UMEMOTO } 1648a42af91cSHajimu UMEMOTO 1649a42af91cSHajimu UMEMOTO #ifdef YP 1650248aee62SJacques Vidrine static char *__ypdomain; 1651a42af91cSHajimu UMEMOTO 1652248aee62SJacques Vidrine /*ARGSUSED*/ 1653248aee62SJacques Vidrine static struct addrinfo * 1654248aee62SJacques Vidrine _yphostent(line, pai) 1655248aee62SJacques Vidrine char *line; 1656248aee62SJacques Vidrine const struct addrinfo *pai; 1657248aee62SJacques Vidrine { 1658248aee62SJacques Vidrine struct addrinfo sentinel, *cur; 1659248aee62SJacques Vidrine struct addrinfo hints, *res, *res0; 1660248aee62SJacques Vidrine int error; 1661248aee62SJacques Vidrine char *p = line; 1662248aee62SJacques Vidrine const char *addr, *canonname; 1663248aee62SJacques Vidrine char *nextline; 1664248aee62SJacques Vidrine char *cp; 1665248aee62SJacques Vidrine 1666248aee62SJacques Vidrine addr = canonname = NULL; 1667248aee62SJacques Vidrine 1668248aee62SJacques Vidrine memset(&sentinel, 0, sizeof(sentinel)); 1669a42af91cSHajimu UMEMOTO cur = &sentinel; 1670a42af91cSHajimu UMEMOTO 1671248aee62SJacques Vidrine nextline: 1672248aee62SJacques Vidrine /* terminate line */ 1673248aee62SJacques Vidrine cp = strchr(p, '\n'); 1674248aee62SJacques Vidrine if (cp) { 1675248aee62SJacques Vidrine *cp++ = '\0'; 1676248aee62SJacques Vidrine nextline = cp; 1677248aee62SJacques Vidrine } else 1678248aee62SJacques Vidrine nextline = NULL; 1679a42af91cSHajimu UMEMOTO 1680248aee62SJacques Vidrine cp = strpbrk(p, " \t"); 1681248aee62SJacques Vidrine if (cp == NULL) { 1682248aee62SJacques Vidrine if (canonname == NULL) 1683248aee62SJacques Vidrine return (NULL); 1684248aee62SJacques Vidrine else 1685248aee62SJacques Vidrine goto done; 1686a42af91cSHajimu UMEMOTO } 1687248aee62SJacques Vidrine *cp++ = '\0'; 1688a42af91cSHajimu UMEMOTO 1689248aee62SJacques Vidrine addr = p; 1690a42af91cSHajimu UMEMOTO 1691248aee62SJacques Vidrine while (cp && *cp) { 1692248aee62SJacques Vidrine if (*cp == ' ' || *cp == '\t') { 1693248aee62SJacques Vidrine cp++; 1694a42af91cSHajimu UMEMOTO continue; 1695248aee62SJacques Vidrine } 1696248aee62SJacques Vidrine if (!canonname) 1697248aee62SJacques Vidrine canonname = cp; 1698248aee62SJacques Vidrine if ((cp = strpbrk(cp, " \t")) != NULL) 1699248aee62SJacques Vidrine *cp++ = '\0'; 1700a42af91cSHajimu UMEMOTO } 1701a42af91cSHajimu UMEMOTO 1702248aee62SJacques Vidrine hints = *pai; 1703248aee62SJacques Vidrine hints.ai_flags = AI_NUMERICHOST; 1704248aee62SJacques Vidrine error = getaddrinfo(addr, NULL, &hints, &res0); 1705248aee62SJacques Vidrine if (error == 0) { 1706248aee62SJacques Vidrine for (res = res0; res; res = res->ai_next) { 1707248aee62SJacques Vidrine /* cover it up */ 1708248aee62SJacques Vidrine res->ai_flags = pai->ai_flags; 1709248aee62SJacques Vidrine 1710248aee62SJacques Vidrine if (pai->ai_flags & AI_CANONNAME) 1711248aee62SJacques Vidrine (void)get_canonname(pai, res, canonname); 1712248aee62SJacques Vidrine } 1713248aee62SJacques Vidrine } else 1714248aee62SJacques Vidrine res0 = NULL; 1715248aee62SJacques Vidrine if (res0) { 1716248aee62SJacques Vidrine cur->ai_next = res0; 1717a42af91cSHajimu UMEMOTO while (cur && cur->ai_next) 1718a42af91cSHajimu UMEMOTO cur = cur->ai_next; 1719a42af91cSHajimu UMEMOTO } 1720a42af91cSHajimu UMEMOTO 1721248aee62SJacques Vidrine if (nextline) { 1722248aee62SJacques Vidrine p = nextline; 1723248aee62SJacques Vidrine goto nextline; 1724248aee62SJacques Vidrine } 1725a42af91cSHajimu UMEMOTO 1726248aee62SJacques Vidrine done: 1727248aee62SJacques Vidrine return sentinel.ai_next; 1728248aee62SJacques Vidrine } 1729248aee62SJacques Vidrine 1730248aee62SJacques Vidrine /*ARGSUSED*/ 1731248aee62SJacques Vidrine static int 1732248aee62SJacques Vidrine _yp_getaddrinfo(rv, cb_data, ap) 1733248aee62SJacques Vidrine void *rv; 1734248aee62SJacques Vidrine void *cb_data; 1735248aee62SJacques Vidrine va_list ap; 1736248aee62SJacques Vidrine { 1737248aee62SJacques Vidrine struct addrinfo sentinel, *cur; 1738248aee62SJacques Vidrine struct addrinfo *ai = NULL; 1739248aee62SJacques Vidrine static char *__ypcurrent; 1740248aee62SJacques Vidrine int __ypcurrentlen, r; 1741248aee62SJacques Vidrine const char *name; 1742248aee62SJacques Vidrine const struct addrinfo *pai; 1743248aee62SJacques Vidrine 1744248aee62SJacques Vidrine name = va_arg(ap, char *); 1745248aee62SJacques Vidrine pai = va_arg(ap, const struct addrinfo *); 1746248aee62SJacques Vidrine 1747248aee62SJacques Vidrine memset(&sentinel, 0, sizeof(sentinel)); 1748248aee62SJacques Vidrine cur = &sentinel; 1749248aee62SJacques Vidrine 1750248aee62SJacques Vidrine if (!__ypdomain) { 1751248aee62SJacques Vidrine if (_yp_check(&__ypdomain) == 0) 1752248aee62SJacques Vidrine return NS_UNAVAIL; 1753248aee62SJacques Vidrine } 1754248aee62SJacques Vidrine if (__ypcurrent) 1755248aee62SJacques Vidrine free(__ypcurrent); 1756248aee62SJacques Vidrine __ypcurrent = NULL; 1757248aee62SJacques Vidrine 1758248aee62SJacques Vidrine /* hosts.byname is only for IPv4 (Solaris8) */ 1759248aee62SJacques Vidrine if (pai->ai_family == PF_UNSPEC || pai->ai_family == PF_INET) { 1760248aee62SJacques Vidrine r = yp_match(__ypdomain, "hosts.byname", name, 1761248aee62SJacques Vidrine (int)strlen(name), &__ypcurrent, &__ypcurrentlen); 1762248aee62SJacques Vidrine if (r == 0) { 1763248aee62SJacques Vidrine struct addrinfo ai4; 1764248aee62SJacques Vidrine 1765248aee62SJacques Vidrine ai4 = *pai; 1766248aee62SJacques Vidrine ai4.ai_family = AF_INET; 1767248aee62SJacques Vidrine ai = _yphostent(__ypcurrent, &ai4); 1768248aee62SJacques Vidrine if (ai) { 1769248aee62SJacques Vidrine cur->ai_next = ai; 1770248aee62SJacques Vidrine while (cur && cur->ai_next) 1771248aee62SJacques Vidrine cur = cur->ai_next; 1772248aee62SJacques Vidrine } 1773248aee62SJacques Vidrine } 1774248aee62SJacques Vidrine } 1775248aee62SJacques Vidrine 1776248aee62SJacques Vidrine /* ipnodes.byname can hold both IPv4/v6 */ 1777248aee62SJacques Vidrine r = yp_match(__ypdomain, "ipnodes.byname", name, 1778248aee62SJacques Vidrine (int)strlen(name), &__ypcurrent, &__ypcurrentlen); 1779248aee62SJacques Vidrine if (r == 0) { 1780248aee62SJacques Vidrine ai = _yphostent(__ypcurrent, pai); 1781248aee62SJacques Vidrine if (ai) { 1782248aee62SJacques Vidrine cur->ai_next = ai; 1783248aee62SJacques Vidrine while (cur && cur->ai_next) 1784248aee62SJacques Vidrine cur = cur->ai_next; 1785248aee62SJacques Vidrine } 1786248aee62SJacques Vidrine } 1787248aee62SJacques Vidrine 1788248aee62SJacques Vidrine if (sentinel.ai_next == NULL) { 1789248aee62SJacques Vidrine h_errno = HOST_NOT_FOUND; 1790248aee62SJacques Vidrine return NS_NOTFOUND; 1791248aee62SJacques Vidrine } 1792248aee62SJacques Vidrine *((struct addrinfo **)rv) = sentinel.ai_next; 1793248aee62SJacques Vidrine return NS_SUCCESS; 1794a42af91cSHajimu UMEMOTO } 1795a42af91cSHajimu UMEMOTO #endif 1796a42af91cSHajimu UMEMOTO 1797a42af91cSHajimu UMEMOTO /* resolver logic */ 1798a42af91cSHajimu UMEMOTO 1799c05ac53bSDavid E. O'Brien extern const char *__hostalias(const char *); 1800a42af91cSHajimu UMEMOTO extern int h_errno; 1801a42af91cSHajimu UMEMOTO 1802a42af91cSHajimu UMEMOTO /* 1803a42af91cSHajimu UMEMOTO * Formulate a normal query, send, and await answer. 1804a42af91cSHajimu UMEMOTO * Returned answer is placed in supplied buffer "answer". 1805a42af91cSHajimu UMEMOTO * Perform preliminary check of answer, returning success only 1806a42af91cSHajimu UMEMOTO * if no error is indicated and the answer count is nonzero. 1807a42af91cSHajimu UMEMOTO * Return the size of the response on success, -1 on error. 1808a42af91cSHajimu UMEMOTO * Error number is left in h_errno. 1809a42af91cSHajimu UMEMOTO * 1810a42af91cSHajimu UMEMOTO * Caller must parse answer and determine whether it answers the question. 1811a42af91cSHajimu UMEMOTO */ 1812a42af91cSHajimu UMEMOTO static int 1813a42af91cSHajimu UMEMOTO res_queryN(name, target) 1814a42af91cSHajimu UMEMOTO const char *name; /* domain name */ 1815a42af91cSHajimu UMEMOTO struct res_target *target; 1816a42af91cSHajimu UMEMOTO { 18175cd588cbSHajimu UMEMOTO u_char *buf; 1818a42af91cSHajimu UMEMOTO HEADER *hp; 1819a42af91cSHajimu UMEMOTO int n; 1820a42af91cSHajimu UMEMOTO struct res_target *t; 1821a42af91cSHajimu UMEMOTO int rcode; 1822a42af91cSHajimu UMEMOTO int ancount; 1823a42af91cSHajimu UMEMOTO 1824a42af91cSHajimu UMEMOTO rcode = NOERROR; 1825a42af91cSHajimu UMEMOTO ancount = 0; 1826a42af91cSHajimu UMEMOTO 1827a42af91cSHajimu UMEMOTO if ((_res.options & RES_INIT) == 0 && res_init() == -1) { 1828a42af91cSHajimu UMEMOTO h_errno = NETDB_INTERNAL; 1829a42af91cSHajimu UMEMOTO return (-1); 1830a42af91cSHajimu UMEMOTO } 1831a42af91cSHajimu UMEMOTO 18325cd588cbSHajimu UMEMOTO buf = malloc(MAXPACKET); 18335cd588cbSHajimu UMEMOTO if (!buf) { 18345cd588cbSHajimu UMEMOTO h_errno = NETDB_INTERNAL; 18355cd588cbSHajimu UMEMOTO return -1; 18365cd588cbSHajimu UMEMOTO } 18375cd588cbSHajimu UMEMOTO 1838a42af91cSHajimu UMEMOTO for (t = target; t; t = t->next) { 1839a42af91cSHajimu UMEMOTO int class, type; 1840a42af91cSHajimu UMEMOTO u_char *answer; 1841a42af91cSHajimu UMEMOTO int anslen; 1842a42af91cSHajimu UMEMOTO 1843a42af91cSHajimu UMEMOTO hp = (HEADER *)(void *)t->answer; 1844a42af91cSHajimu UMEMOTO hp->rcode = NOERROR; /* default */ 1845a42af91cSHajimu UMEMOTO 1846a42af91cSHajimu UMEMOTO /* make it easier... */ 1847b826397aSJun-ichiro itojun Hagino class = t->qclass; 1848b826397aSJun-ichiro itojun Hagino type = t->qtype; 1849a42af91cSHajimu UMEMOTO answer = t->answer; 1850a42af91cSHajimu UMEMOTO anslen = t->anslen; 1851a42af91cSHajimu UMEMOTO #ifdef DEBUG 1852a42af91cSHajimu UMEMOTO if (_res.options & RES_DEBUG) 1853a42af91cSHajimu UMEMOTO printf(";; res_query(%s, %d, %d)\n", name, class, type); 1854a42af91cSHajimu UMEMOTO #endif 1855a42af91cSHajimu UMEMOTO 1856a42af91cSHajimu UMEMOTO n = res_mkquery(QUERY, name, class, type, NULL, 0, NULL, 18575cd588cbSHajimu UMEMOTO buf, MAXPACKET); 1858ce6282dbSHajimu UMEMOTO if (n > 0 && (_res.options & RES_USE_EDNS0) != 0) 18595cd588cbSHajimu UMEMOTO n = res_opt(n, buf, MAXPACKET, anslen); 1860a42af91cSHajimu UMEMOTO if (n <= 0) { 1861a42af91cSHajimu UMEMOTO #ifdef DEBUG 1862a42af91cSHajimu UMEMOTO if (_res.options & RES_DEBUG) 1863a42af91cSHajimu UMEMOTO printf(";; res_query: mkquery failed\n"); 1864a42af91cSHajimu UMEMOTO #endif 18655cd588cbSHajimu UMEMOTO free(buf); 1866a42af91cSHajimu UMEMOTO h_errno = NO_RECOVERY; 1867a42af91cSHajimu UMEMOTO return (n); 1868a42af91cSHajimu UMEMOTO } 1869a42af91cSHajimu UMEMOTO n = res_send(buf, n, answer, anslen); 1870a42af91cSHajimu UMEMOTO #if 0 1871a42af91cSHajimu UMEMOTO if (n < 0) { 1872a42af91cSHajimu UMEMOTO #ifdef DEBUG 1873a42af91cSHajimu UMEMOTO if (_res.options & RES_DEBUG) 1874a42af91cSHajimu UMEMOTO printf(";; res_query: send error\n"); 1875a42af91cSHajimu UMEMOTO #endif 18765cd588cbSHajimu UMEMOTO free(buf); 1877a42af91cSHajimu UMEMOTO h_errno = TRY_AGAIN; 1878a42af91cSHajimu UMEMOTO return (n); 1879a42af91cSHajimu UMEMOTO } 1880a42af91cSHajimu UMEMOTO #endif 1881a42af91cSHajimu UMEMOTO 188254384cf3SJacques Vidrine if (n < 0 || n > anslen) 188354384cf3SJacques Vidrine hp->rcode = FORMERR; /* XXX not very informative */ 188454384cf3SJacques Vidrine if (hp->rcode != NOERROR || ntohs(hp->ancount) == 0) { 1885a42af91cSHajimu UMEMOTO rcode = hp->rcode; /* record most recent error */ 1886a42af91cSHajimu UMEMOTO #ifdef DEBUG 1887a42af91cSHajimu UMEMOTO if (_res.options & RES_DEBUG) 1888dd521ef1SHajimu UMEMOTO printf(";; rcode = %u, ancount=%u\n", hp->rcode, 1889a42af91cSHajimu UMEMOTO ntohs(hp->ancount)); 1890a42af91cSHajimu UMEMOTO #endif 1891a42af91cSHajimu UMEMOTO continue; 1892a42af91cSHajimu UMEMOTO } 1893a42af91cSHajimu UMEMOTO 1894a42af91cSHajimu UMEMOTO ancount += ntohs(hp->ancount); 1895a42af91cSHajimu UMEMOTO 1896a42af91cSHajimu UMEMOTO t->n = n; 1897a42af91cSHajimu UMEMOTO } 1898a42af91cSHajimu UMEMOTO 18995cd588cbSHajimu UMEMOTO free(buf); 19005cd588cbSHajimu UMEMOTO 1901a42af91cSHajimu UMEMOTO if (ancount == 0) { 1902a42af91cSHajimu UMEMOTO switch (rcode) { 1903a42af91cSHajimu UMEMOTO case NXDOMAIN: 1904a42af91cSHajimu UMEMOTO h_errno = HOST_NOT_FOUND; 1905a42af91cSHajimu UMEMOTO break; 1906a42af91cSHajimu UMEMOTO case SERVFAIL: 1907a42af91cSHajimu UMEMOTO h_errno = TRY_AGAIN; 1908a42af91cSHajimu UMEMOTO break; 1909a42af91cSHajimu UMEMOTO case NOERROR: 1910a42af91cSHajimu UMEMOTO h_errno = NO_DATA; 1911a42af91cSHajimu UMEMOTO break; 1912a42af91cSHajimu UMEMOTO case FORMERR: 1913a42af91cSHajimu UMEMOTO case NOTIMP: 1914a42af91cSHajimu UMEMOTO case REFUSED: 1915a42af91cSHajimu UMEMOTO default: 1916a42af91cSHajimu UMEMOTO h_errno = NO_RECOVERY; 1917a42af91cSHajimu UMEMOTO break; 1918a42af91cSHajimu UMEMOTO } 1919a42af91cSHajimu UMEMOTO return (-1); 1920a42af91cSHajimu UMEMOTO } 1921a42af91cSHajimu UMEMOTO return (ancount); 1922a42af91cSHajimu UMEMOTO } 1923a42af91cSHajimu UMEMOTO 1924a42af91cSHajimu UMEMOTO /* 1925a42af91cSHajimu UMEMOTO * Formulate a normal query, send, and retrieve answer in supplied buffer. 1926a42af91cSHajimu UMEMOTO * Return the size of the response on success, -1 on error. 1927a42af91cSHajimu UMEMOTO * If enabled, implement search rules until answer or unrecoverable failure 1928a42af91cSHajimu UMEMOTO * is detected. Error code, if any, is left in h_errno. 1929a42af91cSHajimu UMEMOTO */ 1930a42af91cSHajimu UMEMOTO static int 1931a42af91cSHajimu UMEMOTO res_searchN(name, target) 1932a42af91cSHajimu UMEMOTO const char *name; /* domain name */ 1933a42af91cSHajimu UMEMOTO struct res_target *target; 1934a42af91cSHajimu UMEMOTO { 1935a42af91cSHajimu UMEMOTO const char *cp, * const *domain; 1936a42af91cSHajimu UMEMOTO HEADER *hp = (HEADER *)(void *)target->answer; /*XXX*/ 1937a42af91cSHajimu UMEMOTO u_int dots; 1938a42af91cSHajimu UMEMOTO int trailing_dot, ret, saved_herrno; 1939a42af91cSHajimu UMEMOTO int got_nodata = 0, got_servfail = 0, tried_as_is = 0; 1940a42af91cSHajimu UMEMOTO 1941a42af91cSHajimu UMEMOTO if ((_res.options & RES_INIT) == 0 && res_init() == -1) { 1942a42af91cSHajimu UMEMOTO h_errno = NETDB_INTERNAL; 1943a42af91cSHajimu UMEMOTO return (-1); 1944a42af91cSHajimu UMEMOTO } 1945a42af91cSHajimu UMEMOTO 1946a42af91cSHajimu UMEMOTO errno = 0; 1947a42af91cSHajimu UMEMOTO h_errno = HOST_NOT_FOUND; /* default, if we never query */ 1948a42af91cSHajimu UMEMOTO dots = 0; 1949a42af91cSHajimu UMEMOTO for (cp = name; *cp; cp++) 1950a42af91cSHajimu UMEMOTO dots += (*cp == '.'); 1951a42af91cSHajimu UMEMOTO trailing_dot = 0; 1952a42af91cSHajimu UMEMOTO if (cp > name && *--cp == '.') 1953a42af91cSHajimu UMEMOTO trailing_dot++; 1954a42af91cSHajimu UMEMOTO 1955a42af91cSHajimu UMEMOTO /* 1956a42af91cSHajimu UMEMOTO * if there aren't any dots, it could be a user-level alias 1957a42af91cSHajimu UMEMOTO */ 1958a42af91cSHajimu UMEMOTO if (!dots && (cp = __hostalias(name)) != NULL) 1959a42af91cSHajimu UMEMOTO return (res_queryN(cp, target)); 1960a42af91cSHajimu UMEMOTO 1961a42af91cSHajimu UMEMOTO /* 1962a42af91cSHajimu UMEMOTO * If there are dots in the name already, let's just give it a try 1963a42af91cSHajimu UMEMOTO * 'as is'. The threshold can be set with the "ndots" option. 1964a42af91cSHajimu UMEMOTO */ 1965a42af91cSHajimu UMEMOTO saved_herrno = -1; 1966a42af91cSHajimu UMEMOTO if (dots >= _res.ndots) { 1967a42af91cSHajimu UMEMOTO ret = res_querydomainN(name, NULL, target); 1968a42af91cSHajimu UMEMOTO if (ret > 0) 1969a42af91cSHajimu UMEMOTO return (ret); 1970a42af91cSHajimu UMEMOTO saved_herrno = h_errno; 1971a42af91cSHajimu UMEMOTO tried_as_is++; 1972a42af91cSHajimu UMEMOTO } 1973a42af91cSHajimu UMEMOTO 1974a42af91cSHajimu UMEMOTO /* 1975a42af91cSHajimu UMEMOTO * We do at least one level of search if 1976a42af91cSHajimu UMEMOTO * - there is no dot and RES_DEFNAME is set, or 1977a42af91cSHajimu UMEMOTO * - there is at least one dot, there is no trailing dot, 1978a42af91cSHajimu UMEMOTO * and RES_DNSRCH is set. 1979a42af91cSHajimu UMEMOTO */ 1980a42af91cSHajimu UMEMOTO if ((!dots && (_res.options & RES_DEFNAMES)) || 1981a42af91cSHajimu UMEMOTO (dots && !trailing_dot && (_res.options & RES_DNSRCH))) { 1982a42af91cSHajimu UMEMOTO int done = 0; 1983a42af91cSHajimu UMEMOTO 1984a42af91cSHajimu UMEMOTO for (domain = (const char * const *)_res.dnsrch; 1985a42af91cSHajimu UMEMOTO *domain && !done; 1986a42af91cSHajimu UMEMOTO domain++) { 1987a42af91cSHajimu UMEMOTO 1988a42af91cSHajimu UMEMOTO ret = res_querydomainN(name, *domain, target); 1989a42af91cSHajimu UMEMOTO if (ret > 0) 1990a42af91cSHajimu UMEMOTO return (ret); 1991a42af91cSHajimu UMEMOTO 1992a42af91cSHajimu UMEMOTO /* 1993a42af91cSHajimu UMEMOTO * If no server present, give up. 1994a42af91cSHajimu UMEMOTO * If name isn't found in this domain, 1995a42af91cSHajimu UMEMOTO * keep trying higher domains in the search list 1996a42af91cSHajimu UMEMOTO * (if that's enabled). 1997a42af91cSHajimu UMEMOTO * On a NO_DATA error, keep trying, otherwise 1998a42af91cSHajimu UMEMOTO * a wildcard entry of another type could keep us 1999a42af91cSHajimu UMEMOTO * from finding this entry higher in the domain. 2000a42af91cSHajimu UMEMOTO * If we get some other error (negative answer or 2001a42af91cSHajimu UMEMOTO * server failure), then stop searching up, 2002a42af91cSHajimu UMEMOTO * but try the input name below in case it's 2003a42af91cSHajimu UMEMOTO * fully-qualified. 2004a42af91cSHajimu UMEMOTO */ 2005a42af91cSHajimu UMEMOTO if (errno == ECONNREFUSED) { 2006a42af91cSHajimu UMEMOTO h_errno = TRY_AGAIN; 2007a42af91cSHajimu UMEMOTO return (-1); 2008a42af91cSHajimu UMEMOTO } 2009a42af91cSHajimu UMEMOTO 2010a42af91cSHajimu UMEMOTO switch (h_errno) { 2011a42af91cSHajimu UMEMOTO case NO_DATA: 2012a42af91cSHajimu UMEMOTO got_nodata++; 2013a42af91cSHajimu UMEMOTO /* FALLTHROUGH */ 2014a42af91cSHajimu UMEMOTO case HOST_NOT_FOUND: 2015a42af91cSHajimu UMEMOTO /* keep trying */ 2016a42af91cSHajimu UMEMOTO break; 2017a42af91cSHajimu UMEMOTO case TRY_AGAIN: 2018a42af91cSHajimu UMEMOTO if (hp->rcode == SERVFAIL) { 2019a42af91cSHajimu UMEMOTO /* try next search element, if any */ 2020a42af91cSHajimu UMEMOTO got_servfail++; 2021a42af91cSHajimu UMEMOTO break; 2022a42af91cSHajimu UMEMOTO } 2023a42af91cSHajimu UMEMOTO /* FALLTHROUGH */ 2024a42af91cSHajimu UMEMOTO default: 2025a42af91cSHajimu UMEMOTO /* anything else implies that we're done */ 2026a42af91cSHajimu UMEMOTO done++; 2027a42af91cSHajimu UMEMOTO } 2028a42af91cSHajimu UMEMOTO /* 2029a42af91cSHajimu UMEMOTO * if we got here for some reason other than DNSRCH, 2030a42af91cSHajimu UMEMOTO * we only wanted one iteration of the loop, so stop. 2031a42af91cSHajimu UMEMOTO */ 2032a42af91cSHajimu UMEMOTO if (!(_res.options & RES_DNSRCH)) 2033a42af91cSHajimu UMEMOTO done++; 2034a42af91cSHajimu UMEMOTO } 2035a42af91cSHajimu UMEMOTO } 2036a42af91cSHajimu UMEMOTO 2037a42af91cSHajimu UMEMOTO /* 2038a42af91cSHajimu UMEMOTO * if we have not already tried the name "as is", do that now. 2039a42af91cSHajimu UMEMOTO * note that we do this regardless of how many dots were in the 2040a42af91cSHajimu UMEMOTO * name or whether it ends with a dot. 2041a42af91cSHajimu UMEMOTO */ 2042a42af91cSHajimu UMEMOTO if (!tried_as_is && (dots || !(_res.options & RES_NOTLDQUERY))) { 2043a42af91cSHajimu UMEMOTO ret = res_querydomainN(name, NULL, target); 2044a42af91cSHajimu UMEMOTO if (ret > 0) 2045a42af91cSHajimu UMEMOTO return (ret); 2046a42af91cSHajimu UMEMOTO } 2047a42af91cSHajimu UMEMOTO 2048a42af91cSHajimu UMEMOTO /* 2049a42af91cSHajimu UMEMOTO * if we got here, we didn't satisfy the search. 2050a42af91cSHajimu UMEMOTO * if we did an initial full query, return that query's h_errno 2051a42af91cSHajimu UMEMOTO * (note that we wouldn't be here if that query had succeeded). 2052a42af91cSHajimu UMEMOTO * else if we ever got a nodata, send that back as the reason. 2053a42af91cSHajimu UMEMOTO * else send back meaningless h_errno, that being the one from 2054a42af91cSHajimu UMEMOTO * the last DNSRCH we did. 2055a42af91cSHajimu UMEMOTO */ 2056a42af91cSHajimu UMEMOTO if (saved_herrno != -1) 2057a42af91cSHajimu UMEMOTO h_errno = saved_herrno; 2058a42af91cSHajimu UMEMOTO else if (got_nodata) 2059a42af91cSHajimu UMEMOTO h_errno = NO_DATA; 2060a42af91cSHajimu UMEMOTO else if (got_servfail) 2061a42af91cSHajimu UMEMOTO h_errno = TRY_AGAIN; 2062a42af91cSHajimu UMEMOTO return (-1); 2063a42af91cSHajimu UMEMOTO } 2064a42af91cSHajimu UMEMOTO 2065a42af91cSHajimu UMEMOTO /* 2066a42af91cSHajimu UMEMOTO * Perform a call on res_query on the concatenation of name and domain, 2067a42af91cSHajimu UMEMOTO * removing a trailing dot from name if domain is NULL. 2068a42af91cSHajimu UMEMOTO */ 2069a42af91cSHajimu UMEMOTO static int 2070a42af91cSHajimu UMEMOTO res_querydomainN(name, domain, target) 2071a42af91cSHajimu UMEMOTO const char *name, *domain; 2072a42af91cSHajimu UMEMOTO struct res_target *target; 2073a42af91cSHajimu UMEMOTO { 2074a42af91cSHajimu UMEMOTO char nbuf[MAXDNAME]; 2075a42af91cSHajimu UMEMOTO const char *longname = nbuf; 2076a42af91cSHajimu UMEMOTO size_t n, d; 2077a42af91cSHajimu UMEMOTO 2078a42af91cSHajimu UMEMOTO if ((_res.options & RES_INIT) == 0 && res_init() == -1) { 2079a42af91cSHajimu UMEMOTO h_errno = NETDB_INTERNAL; 2080a42af91cSHajimu UMEMOTO return (-1); 2081a42af91cSHajimu UMEMOTO } 2082a42af91cSHajimu UMEMOTO #ifdef DEBUG 2083a42af91cSHajimu UMEMOTO if (_res.options & RES_DEBUG) 2084a42af91cSHajimu UMEMOTO printf(";; res_querydomain(%s, %s)\n", 2085a42af91cSHajimu UMEMOTO name, domain?domain:"<Nil>"); 2086a42af91cSHajimu UMEMOTO #endif 2087a42af91cSHajimu UMEMOTO if (domain == NULL) { 2088a42af91cSHajimu UMEMOTO /* 2089a42af91cSHajimu UMEMOTO * Check for trailing '.'; 2090a42af91cSHajimu UMEMOTO * copy without '.' if present. 2091a42af91cSHajimu UMEMOTO */ 2092a42af91cSHajimu UMEMOTO n = strlen(name); 2093a42af91cSHajimu UMEMOTO if (n >= MAXDNAME) { 2094a42af91cSHajimu UMEMOTO h_errno = NO_RECOVERY; 2095a42af91cSHajimu UMEMOTO return (-1); 2096a42af91cSHajimu UMEMOTO } 2097a42af91cSHajimu UMEMOTO if (n > 0 && name[--n] == '.') { 2098a42af91cSHajimu UMEMOTO strncpy(nbuf, name, n); 2099a42af91cSHajimu UMEMOTO nbuf[n] = '\0'; 2100a42af91cSHajimu UMEMOTO } else 2101a42af91cSHajimu UMEMOTO longname = name; 2102a42af91cSHajimu UMEMOTO } else { 2103a42af91cSHajimu UMEMOTO n = strlen(name); 2104a42af91cSHajimu UMEMOTO d = strlen(domain); 2105a42af91cSHajimu UMEMOTO if (n + d + 1 >= MAXDNAME) { 2106a42af91cSHajimu UMEMOTO h_errno = NO_RECOVERY; 2107a42af91cSHajimu UMEMOTO return (-1); 2108a42af91cSHajimu UMEMOTO } 2109dd521ef1SHajimu UMEMOTO snprintf(nbuf, sizeof(nbuf), "%s.%s", name, domain); 2110a42af91cSHajimu UMEMOTO } 2111a42af91cSHajimu UMEMOTO return (res_queryN(longname, target)); 2112a42af91cSHajimu UMEMOTO } 2113