| File: | s2check/s2dns.c |
| Warning: | line 472, column 12 Although the value stored to 'prefix' is used in the enclosing expression, the value is never actually read from 'prefix' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* ---------------------------------------------------------------------- */ |
| 2 | /* S2 DNS server */ |
| 3 | |
| 4 | #include <sofia-sip/sresolv.h> |
| 5 | #include <sofia-resolv/sres_record.h> |
| 6 | #include <sofia-sip/url.h> |
| 7 | |
| 8 | #include "s2dns.h" |
| 9 | |
| 10 | #include <string.h> |
| 11 | #include <stdlib.h> |
| 12 | #include <assert.h> |
| 13 | |
| 14 | extern uint16_t _sres_default_port; /* Ugly hack */ |
| 15 | |
| 16 | static struct s2dns { |
| 17 | su_root_t *root; |
| 18 | su_socket_t socket; |
| 19 | su_wait_t wait[1]; |
| 20 | int reg; |
| 21 | int (*filter)(void *data, size_t len, void *userdata); |
| 22 | void *userdata; |
| 23 | } s2dns; |
| 24 | |
| 25 | static |
| 26 | struct s2_dns_response { |
| 27 | struct s2_dns_response *next; |
| 28 | uint16_t qlen, dlen; |
| 29 | struct m_header { |
| 30 | /* Header defined in RFC 1035 section 4.1.1 (page 26) */ |
| 31 | uint16_t mh_id; /* Query ID */ |
| 32 | uint16_t mh_flags; /* Flags */ |
| 33 | uint16_t mh_qdcount; /* Question record count */ |
| 34 | uint16_t mh_ancount; /* Answer record count */ |
| 35 | uint16_t mh_nscount; /* Authority records count */ |
| 36 | uint16_t mh_arcount; /* Additional records count */ |
| 37 | } header[1]; |
| 38 | uint8_t data[1500]; |
| 39 | } *zonedata; |
| 40 | |
| 41 | enum { |
| 42 | FLAGS_QR = (1 << 15), |
| 43 | FLAGS_QUERY = (0 << 11), |
| 44 | FLAGS_IQUERY = (1 << 11), |
| 45 | FLAGS_STATUS = (2 << 11), |
| 46 | FLAGS_OPCODE = (15 << 11), /* mask */ |
| 47 | FLAGS_AA = (1 << 10), /* */ |
| 48 | FLAGS_TC = (1 << 9), |
| 49 | FLAGS_RD = (1 << 8), |
| 50 | FLAGS_RA = (1 << 7), |
| 51 | |
| 52 | FLAGS_RCODE = (15 << 0), /* mask of return code */ |
| 53 | |
| 54 | FLAGS_OK = 0, /* No error condition. */ |
| 55 | FLAGS_FORMAT_ERR = 1, /* Server could not interpret query. */ |
| 56 | FLAGS_SERVER_ERR = 2, /* Server error. */ |
| 57 | FLAGS_NAME_ERR = 3, /* No domain name. */ |
| 58 | FLAGS_UNIMPL_ERR = 4, /* Not implemented. */ |
| 59 | FLAGS_AUTH_ERR = 5, /* Refused */ |
| 60 | }; |
| 61 | |
| 62 | uint32_t s2_dns_ttl = 3600; |
| 63 | |
| 64 | static int s2_dns_query(su_root_magic_t *magic, |
| 65 | su_wait_t *w, |
| 66 | su_wakeup_arg_t *arg); |
| 67 | |
| 68 | void s2_dns_setup(su_root_t *root) |
| 69 | { |
| 70 | int n; |
| 71 | su_socket_t socket; |
| 72 | su_wait_t *wait; |
| 73 | su_sockaddr_t su[1]; |
| 74 | socklen_t sulen = sizeof su->su_sin; |
| 75 | |
| 76 | assert(root)((void) sizeof ((root) ? 1 : 0), __extension__ ({ if (root) ; else __assert_fail ("root", "s2dns.c", 76, __extension__ __PRETTY_FUNCTION__ ); })); |
| 77 | |
| 78 | memset(su, 0, sulen); |
| 79 | su->su_lensu_array[0] = sulen; |
| 80 | su->su_familysu_sa.sa_family = AF_INET2; |
| 81 | |
| 82 | /* su->su_port = htons(1053); */ |
| 83 | |
| 84 | socket = su_socket(su->su_familysu_sa.sa_family, SOCK_DGRAMSOCK_DGRAM, 0); |
| 85 | |
| 86 | n = bind(socket, &su->su_sa, sulen); assert(n == 0)((void) sizeof ((n == 0) ? 1 : 0), __extension__ ({ if (n == 0 ) ; else __assert_fail ("n == 0", "s2dns.c", 86, __extension__ __PRETTY_FUNCTION__); })); |
| 87 | n = getsockname(socket, &su->su_sa, &sulen); assert(n == 0)((void) sizeof ((n == 0) ? 1 : 0), __extension__ ({ if (n == 0 ) ; else __assert_fail ("n == 0", "s2dns.c", 87, __extension__ __PRETTY_FUNCTION__); })); |
| 88 | |
| 89 | _sres_default_port = ntohs(su->su_portsu_sin.sin_port); |
| 90 | |
| 91 | s2dns.root = root; |
| 92 | wait = s2dns.wait; |
| 93 | n = su_wait_create(wait, socket, SU_WAIT_IN(0x001)); assert(n == 0)((void) sizeof ((n == 0) ? 1 : 0), __extension__ ({ if (n == 0 ) ; else __assert_fail ("n == 0", "s2dns.c", 93, __extension__ __PRETTY_FUNCTION__); })); |
| 94 | s2dns.reg = su_root_register(root, wait, s2_dns_query, NULL((void*)0), 0); |
| 95 | assert(s2dns.reg > 0)((void) sizeof ((s2dns.reg > 0) ? 1 : 0), __extension__ ({ if (s2dns.reg > 0) ; else __assert_fail ("s2dns.reg > 0" , "s2dns.c", 95, __extension__ __PRETTY_FUNCTION__); })); |
| 96 | s2dns.socket = socket; |
| 97 | } |
| 98 | |
| 99 | /* Set filter function */ |
| 100 | void |
| 101 | s2_dns_set_filter(int (*filter)(void *data, size_t len, void *userdata), |
| 102 | void *userdata) |
| 103 | { |
| 104 | s2dns.filter = filter; |
| 105 | s2dns.userdata = userdata; |
| 106 | } |
| 107 | |
| 108 | void |
| 109 | s2_dns_teardown(void) |
| 110 | { |
| 111 | struct s2_dns_response *r, *next; |
| 112 | su_root_deregister(s2dns.root, s2dns.reg), s2dns.reg = -1; |
| 113 | su_close(s2dns.socket), s2dns.socket = -1; |
| 114 | s2dns.root = NULL((void*)0); |
| 115 | |
| 116 | for (r = zonedata, zonedata = NULL((void*)0); r; r = next) { |
| 117 | next = r->next; |
| 118 | free(r); |
| 119 | } |
| 120 | } |
| 121 | |
| 122 | static int |
| 123 | s2_dns_query(su_root_magic_t *magic, |
| 124 | su_wait_t *w, |
| 125 | su_wakeup_arg_t *arg) |
| 126 | { |
| 127 | union { |
| 128 | struct m_header header[1]; |
| 129 | uint8_t buffer[1500]; |
| 130 | } request; |
| 131 | ssize_t len; |
| 132 | |
| 133 | su_socket_t socket; |
| 134 | su_sockaddr_t su[1]; |
| 135 | socklen_t sulen = sizeof su; |
| 136 | uint16_t flags; |
| 137 | struct s2_dns_response *r; |
| 138 | size_t const hlen = sizeof r->header; |
| 139 | |
| 140 | (void)arg; |
| 141 | |
| 142 | socket = s2dns.socket; |
| 143 | |
| 144 | len = su_recvfrom(socket, request.buffer, sizeof request.buffer, 0,recvfrom((socket),(request.buffer),(sizeof request.buffer),(0 ),(void *)(&su->su_sa),(&sulen)) |
| 145 | &su->su_sa, &sulen)recvfrom((socket),(request.buffer),(sizeof request.buffer),(0 ),(void *)(&su->su_sa),(&sulen)); |
| 146 | |
| 147 | flags = ntohs(request.header->mh_flags); |
| 148 | |
| 149 | if (len < (ssize_t)hlen) |
| 150 | return 0; |
| 151 | if ((flags & FLAGS_QR) == FLAGS_QR) |
| 152 | return 0; |
| 153 | if ((flags & FLAGS_RCODE) != FLAGS_OK) |
| 154 | return 0; |
| 155 | |
| 156 | if ((flags & FLAGS_OPCODE) != FLAGS_QUERY |
| 157 | || ntohs(request.header->mh_qdcount) != 1) { |
| 158 | flags |= FLAGS_QR | FLAGS_UNIMPL_ERR; |
| 159 | request.header->mh_flags = htons(flags); |
| 160 | if (!s2dns.filter || s2dns.filter(request.buffer, len, s2dns.userdata)) |
| 161 | su_sendto(socket, request.buffer, len, 0, &su->su_sa, sulen)sendto((socket),(request.buffer),(len),(0),(void const*)(& su->su_sa),(sulen)); |
| 162 | return 0; |
| 163 | } |
| 164 | |
| 165 | for (r = zonedata; r; r = r->next) { |
| 166 | if (memcmp(r->data, request.buffer + hlen, r->qlen) == 0) |
| 167 | break; |
| 168 | } |
| 169 | |
| 170 | if (r) { |
| 171 | flags |= FLAGS_QR | FLAGS_AA | FLAGS_OK; |
| 172 | request.header->mh_flags = htons(flags); |
| 173 | request.header->mh_ancount = htons(r->header->mh_ancount); |
| 174 | request.header->mh_nscount = htons(r->header->mh_nscount); |
| 175 | request.header->mh_arcount = htons(r->header->mh_arcount); |
| 176 | memcpy(request.buffer + hlen + r->qlen, |
| 177 | r->data + r->qlen, |
| 178 | r->dlen - r->qlen); |
| 179 | len = hlen + r->dlen; |
| 180 | } |
| 181 | else { |
| 182 | flags |= FLAGS_QR | FLAGS_AA | FLAGS_NAME_ERR; |
| 183 | } |
| 184 | |
| 185 | request.header->mh_flags = htons(flags); |
| 186 | if (!s2dns.filter || s2dns.filter(request.buffer, len, s2dns.userdata)) |
| 187 | su_sendto(socket, request.buffer, len, 0, &su->su_sa, sulen)sendto((socket),(request.buffer),(len),(0),(void const*)(& su->su_sa),(sulen)); |
| 188 | return 0; |
| 189 | } |
| 190 | |
| 191 | static char const *default_domain; |
| 192 | |
| 193 | /** Set default domain suffix used with s2_dns_record() */ |
| 194 | char const * |
| 195 | s2_dns_default(char const *domain) |
| 196 | { |
| 197 | assert(domain == NULL || strlen(domain))((void) sizeof ((domain == ((void*)0) || strlen(domain)) ? 1 : 0), __extension__ ({ if (domain == ((void*)0) || strlen(domain )) ; else __assert_fail ("domain == NULL || strlen(domain)", "s2dns.c" , 197, __extension__ __PRETTY_FUNCTION__); })); |
| 198 | assert(domain == NULL || domain[strlen(domain) - 1] == '.')((void) sizeof ((domain == ((void*)0) || domain[strlen(domain ) - 1] == '.') ? 1 : 0), __extension__ ({ if (domain == ((void *)0) || domain[strlen(domain) - 1] == '.') ; else __assert_fail ("domain == NULL || domain[strlen(domain) - 1] == '.'", "s2dns.c" , 198, __extension__ __PRETTY_FUNCTION__); })); |
| 199 | return default_domain = domain; |
| 200 | } |
| 201 | |
| 202 | static void put_uint16(struct s2_dns_response *m, uint16_t h) |
| 203 | { |
| 204 | uint8_t *p = m->data + m->dlen; |
| 205 | |
| 206 | assert(m->dlen + (sizeof h) < sizeof m->data)((void) sizeof ((m->dlen + (sizeof h) < sizeof m->data ) ? 1 : 0), __extension__ ({ if (m->dlen + (sizeof h) < sizeof m->data) ; else __assert_fail ("m->dlen + (sizeof h) < sizeof m->data" , "s2dns.c", 206, __extension__ __PRETTY_FUNCTION__); })); |
| 207 | p[0] = h >> 8; p[1] = h; |
| 208 | m->dlen += (sizeof h); |
| 209 | } |
| 210 | |
| 211 | static void put_uint32(struct s2_dns_response *m, uint32_t w) |
| 212 | { |
| 213 | uint8_t *p = m->data + m->dlen; |
| 214 | |
| 215 | assert(m->dlen + (sizeof w) < sizeof m->data)((void) sizeof ((m->dlen + (sizeof w) < sizeof m->data ) ? 1 : 0), __extension__ ({ if (m->dlen + (sizeof w) < sizeof m->data) ; else __assert_fail ("m->dlen + (sizeof w) < sizeof m->data" , "s2dns.c", 215, __extension__ __PRETTY_FUNCTION__); })); |
| 216 | p[0] = w >> 24; p[1] = w >> 16; p[2] = w >> 8; p[3] = w; |
| 217 | m->dlen += (sizeof w); |
| 218 | } |
| 219 | |
| 220 | static void put_domain(struct s2_dns_response *m, char const *domain) |
| 221 | { |
| 222 | char const *label; |
| 223 | size_t llen; |
| 224 | |
| 225 | if (domain && domain[0] == 0) |
| 226 | domain = default_domain; |
| 227 | |
| 228 | /* Copy domain into query label at a time */ |
| 229 | for (label = domain; label && label[0]; label += llen) { |
| 230 | assert(!(label[0] == '.' && label[1] != '\0'))((void) sizeof ((!(label[0] == '.' && label[1] != '\0' )) ? 1 : 0), __extension__ ({ if (!(label[0] == '.' && label[1] != '\0')) ; else __assert_fail ("!(label[0] == '.' && label[1] != '\\0')" , "s2dns.c", 230, __extension__ __PRETTY_FUNCTION__); })); |
| 231 | llen = strcspn(label, "."); |
| 232 | assert(llen < 64)((void) sizeof ((llen < 64) ? 1 : 0), __extension__ ({ if ( llen < 64) ; else __assert_fail ("llen < 64", "s2dns.c" , 232, __extension__ __PRETTY_FUNCTION__); })); |
| 233 | assert(m->dlen + llen + 1 < sizeof m->data)((void) sizeof ((m->dlen + llen + 1 < sizeof m->data ) ? 1 : 0), __extension__ ({ if (m->dlen + llen + 1 < sizeof m->data) ; else __assert_fail ("m->dlen + llen + 1 < sizeof m->data" , "s2dns.c", 233, __extension__ __PRETTY_FUNCTION__); })); |
| 234 | m->data[m->dlen++] = (uint8_t)llen; |
| 235 | if (llen == 0) |
| 236 | return; |
| 237 | |
| 238 | memcpy(m->data + m->dlen, label, llen); |
| 239 | m->dlen += (uint16_t)llen; |
| 240 | |
| 241 | if (label[llen] == '\0') { |
| 242 | if (default_domain) { |
| 243 | label = default_domain, llen = 0; |
| 244 | continue; |
| 245 | } |
| 246 | break; |
| 247 | } |
| 248 | if (label[llen + 1]) |
| 249 | llen++; |
| 250 | } |
| 251 | |
| 252 | assert(m->dlen < sizeof m->data)((void) sizeof ((m->dlen < sizeof m->data) ? 1 : 0), __extension__ ({ if (m->dlen < sizeof m->data) ; else __assert_fail ("m->dlen < sizeof m->data", "s2dns.c" , 252, __extension__ __PRETTY_FUNCTION__); })); |
| 253 | m->data[m->dlen++] = '\0'; |
| 254 | } |
| 255 | |
| 256 | static void put_string(struct s2_dns_response *m, char const *string) |
| 257 | { |
| 258 | uint8_t *p = m->data + m->dlen; |
| 259 | size_t len = strlen(string); |
| 260 | |
| 261 | assert(len <= 255)((void) sizeof ((len <= 255) ? 1 : 0), __extension__ ({ if (len <= 255) ; else __assert_fail ("len <= 255", "s2dns.c" , 261, __extension__ __PRETTY_FUNCTION__); })); |
| 262 | assert(m->dlen + len + 1 < sizeof m->data)((void) sizeof ((m->dlen + len + 1 < sizeof m->data) ? 1 : 0), __extension__ ({ if (m->dlen + len + 1 < sizeof m->data) ; else __assert_fail ("m->dlen + len + 1 < sizeof m->data" , "s2dns.c", 262, __extension__ __PRETTY_FUNCTION__); })); |
| 263 | |
| 264 | *p++ = (uint8_t)len; |
| 265 | memcpy(p, string, len); |
| 266 | m->dlen += len + 1; |
| 267 | } |
| 268 | |
| 269 | static uint16_t put_len_at(struct s2_dns_response *m) |
| 270 | { |
| 271 | uint16_t at = m->dlen; |
| 272 | assert(m->dlen + sizeof(at) < sizeof m->data)((void) sizeof ((m->dlen + sizeof(at) < sizeof m->data ) ? 1 : 0), __extension__ ({ if (m->dlen + sizeof(at) < sizeof m->data) ; else __assert_fail ("m->dlen + sizeof(at) < sizeof m->data" , "s2dns.c", 272, __extension__ __PRETTY_FUNCTION__); })); |
| 273 | memset(m->data + m->dlen, 0, sizeof(at)); |
| 274 | m->dlen += sizeof(at); |
| 275 | return at; |
| 276 | } |
| 277 | |
| 278 | static void put_len(struct s2_dns_response *m, uint16_t start) |
| 279 | { |
| 280 | uint8_t *p = m->data + start; |
| 281 | uint16_t len = m->dlen - (start + 2); |
| 282 | p[0] = len >> 8; p[1] = len; |
| 283 | } |
| 284 | |
| 285 | static void put_data(struct s2_dns_response *m, void const *data, uint16_t len) |
| 286 | { |
| 287 | assert(m->dlen + len < sizeof m->data)((void) sizeof ((m->dlen + len < sizeof m->data) ? 1 : 0), __extension__ ({ if (m->dlen + len < sizeof m-> data) ; else __assert_fail ("m->dlen + len < sizeof m->data" , "s2dns.c", 287, __extension__ __PRETTY_FUNCTION__); })); |
| 288 | memcpy(m->data + m->dlen, data, len); |
| 289 | m->dlen += len; |
| 290 | } |
| 291 | |
| 292 | static void put_query(struct s2_dns_response *m, char const *domain, |
| 293 | uint16_t qtype) |
| 294 | { |
| 295 | assert(m->header->mh_qdcount == 0)((void) sizeof ((m->header->mh_qdcount == 0) ? 1 : 0), __extension__ ({ if (m->header->mh_qdcount == 0) ; else __assert_fail ("m->header->mh_qdcount == 0", "s2dns.c", 295, __extension__ __PRETTY_FUNCTION__); })); |
| 296 | put_domain(m, domain), put_uint16(m, qtype), put_uint16(m, sres_class_in); |
| 297 | m->header->mh_qdcount++; |
| 298 | m->qlen = m->dlen; |
| 299 | } |
| 300 | |
| 301 | static void put_a_record(struct s2_dns_response *m, |
| 302 | char const *domain, |
| 303 | struct in_addr addr) |
| 304 | { |
| 305 | uint16_t start; |
| 306 | |
| 307 | put_domain(m, domain); |
| 308 | put_uint16(m, sres_type_a); |
| 309 | put_uint16(m, sres_class_in); |
| 310 | put_uint32(m, s2_dns_ttl); |
| 311 | start = put_len_at(m); |
| 312 | |
| 313 | put_data(m, &addr, sizeof addr); |
| 314 | put_len(m, start); |
| 315 | } |
| 316 | |
| 317 | static void put_aaaa_record(struct s2_dns_response *m, |
| 318 | char const *domain, |
| 319 | struct in6_addr addr) |
| 320 | { |
| 321 | uint16_t start; |
| 322 | |
| 323 | put_domain(m, domain); |
| 324 | put_uint16(m, sres_type_aaaa); |
| 325 | put_uint16(m, sres_class_in); |
| 326 | put_uint32(m, s2_dns_ttl); |
| 327 | start = put_len_at(m); |
| 328 | |
| 329 | put_data(m, &addr, sizeof addr); |
| 330 | put_len(m, start); |
| 331 | } |
| 332 | |
| 333 | static void put_cname_record(struct s2_dns_response *m, |
| 334 | char const *domain, |
| 335 | char const *cname) |
| 336 | { |
| 337 | uint16_t start; |
| 338 | |
| 339 | put_domain(m, domain); |
| 340 | put_uint16(m, sres_type_cname); |
| 341 | put_uint16(m, sres_class_in); |
| 342 | put_uint32(m, s2_dns_ttl); |
| 343 | start = put_len_at(m); |
| 344 | |
| 345 | put_domain(m, cname); |
| 346 | put_len(m, start); |
| 347 | } |
| 348 | |
| 349 | static void put_srv_record(struct s2_dns_response *m, |
| 350 | char const *domain, |
| 351 | uint16_t prio, uint16_t weight, |
| 352 | uint16_t port, char const *target) |
| 353 | { |
| 354 | uint16_t start; |
| 355 | put_domain(m, domain); |
| 356 | put_uint16(m, sres_type_srv); |
| 357 | put_uint16(m, sres_class_in); |
| 358 | put_uint32(m, s2_dns_ttl); |
| 359 | start = put_len_at(m); |
| 360 | |
| 361 | put_uint16(m, prio); |
| 362 | put_uint16(m, weight); |
| 363 | put_uint16(m, port); |
| 364 | put_domain(m, target); |
| 365 | put_len(m, start); |
| 366 | } |
| 367 | |
| 368 | static void put_naptr_record(struct s2_dns_response *m, |
| 369 | char const *domain, |
| 370 | uint16_t order, uint16_t preference, |
| 371 | char const *flags, |
| 372 | char const *services, |
| 373 | char const *regexp, |
| 374 | char const *replace) |
| 375 | { |
| 376 | uint16_t start; |
| 377 | put_domain(m, domain); |
| 378 | put_uint16(m, sres_type_naptr); |
| 379 | put_uint16(m, sres_class_in); |
| 380 | put_uint32(m, s2_dns_ttl); |
| 381 | start = put_len_at(m); |
| 382 | |
| 383 | put_uint16(m, order); |
| 384 | put_uint16(m, preference); |
| 385 | put_string(m, flags); |
| 386 | put_string(m, services); |
| 387 | put_string(m, regexp); |
| 388 | put_domain(m, replace); |
| 389 | put_len(m, start); |
| 390 | } |
| 391 | |
| 392 | static void put_srv_record_from_uri(struct s2_dns_response *m, |
| 393 | char const *base, |
| 394 | uint16_t prio, uint16_t weight, |
| 395 | url_t const *uri, char const *server) |
| 396 | { |
| 397 | char domain[1024] = "none"; |
| 398 | char const *service = url_port(uri); |
| 399 | uint16_t port; |
| 400 | |
| 401 | if (uri->url_type == url_sips) { |
| 402 | strcpy(domain, "_sips._tcp."); |
| 403 | } |
| 404 | else if (uri->url_type == url_sip) { |
| 405 | if (url_has_param(uri, "transport=udp")) { |
| 406 | strcpy(domain, "_sip._udp."); |
| 407 | } |
| 408 | else if (url_has_param(uri, "transport=tcp")) { |
| 409 | strcpy(domain, "_sip._tcp."); |
| 410 | } |
| 411 | } |
| 412 | |
| 413 | assert(strcmp(domain, "none"))((void) sizeof ((strcmp(domain, "none")) ? 1 : 0), __extension__ ({ if (strcmp(domain, "none")) ; else __assert_fail ("strcmp(domain, \"none\")" , "s2dns.c", 413, __extension__ __PRETTY_FUNCTION__); })); |
| 414 | |
| 415 | strcat(domain, base); |
| 416 | |
| 417 | if (m->header->mh_qdcount == 0) |
| 418 | put_query(m, domain, sres_type_srv); |
| 419 | |
| 420 | port = (uint16_t)strtoul(service, NULL((void*)0), 10); |
| 421 | |
| 422 | put_srv_record(m, domain, prio, weight, port, server); |
| 423 | } |
| 424 | |
| 425 | static |
| 426 | void s2_add_to_zone(struct s2_dns_response *_r) |
| 427 | { |
| 428 | size_t size = offsetof(struct s2_dns_response, data[_r->dlen])__builtin_offsetof(struct s2_dns_response, data[_r->dlen]); |
| 429 | struct s2_dns_response *r = malloc(size); assert(r)((void) sizeof ((r) ? 1 : 0), __extension__ ({ if (r) ; else __assert_fail ("r", "s2dns.c", 429, __extension__ __PRETTY_FUNCTION__); }) ); |
| 430 | |
| 431 | memcpy(r, _r, size); |
| 432 | r->next = zonedata; |
| 433 | zonedata = r; |
| 434 | } |
| 435 | |
| 436 | |
| 437 | static void make_server(char *server, char const *prefix, char const *domain) |
| 438 | { |
| 439 | strcpy(server, prefix); |
| 440 | |
| 441 | if (strlen(server) == 0 || server[strlen(server) - 1] != '.') { |
| 442 | strcat(server, "."); |
| 443 | strcat(server, domain); |
| 444 | } |
| 445 | } |
| 446 | |
| 447 | /** Set up records for SIP server */ |
| 448 | void s2_dns_domain(char const *domain, int use_naptr, |
| 449 | /* char *prefix, int priority, url_t const *uri, */ |
| 450 | ...) |
| 451 | { |
| 452 | struct s2_dns_response m[1]; |
| 453 | |
| 454 | char server[1024], target[1024]; |
| 455 | |
| 456 | va_list va0, va; |
| 457 | char const *prefix; int priority; url_t const *uri; |
| 458 | struct in_addr localhost; |
| 459 | |
| 460 | assert(s2dns.reg != 0)((void) sizeof ((s2dns.reg != 0) ? 1 : 0), __extension__ ({ if (s2dns.reg != 0) ; else __assert_fail ("s2dns.reg != 0", "s2dns.c" , 460, __extension__ __PRETTY_FUNCTION__); })); |
| 461 | |
| 462 | su_inet_ptoninet_pton(AF_INET2, "127.0.0.1", &localhost); |
| 463 | |
| 464 | va_start(va0, use_naptr)__builtin_va_start(va0, use_naptr); |
| 465 | |
| 466 | if (use_naptr) { |
| 467 | memset(m, 0, sizeof m); |
| 468 | put_query(m, domain, sres_type_naptr); |
| 469 | |
| 470 | va_copy(va, va0)__builtin_va_copy(va, va0); |
| 471 | |
| 472 | for (;(prefix = va_arg(va, char *)__builtin_va_arg(va, char *));) { |
Although the value stored to 'prefix' is used in the enclosing expression, the value is never actually read from 'prefix' | |
| 473 | char *services = NULL((void*)0); |
| 474 | |
| 475 | priority = va_arg(va, int)__builtin_va_arg(va, int); |
| 476 | uri = va_arg(va, url_t *)__builtin_va_arg(va, url_t *); |
| 477 | if (uri == NULL((void*)0)) |
| 478 | continue; |
| 479 | |
| 480 | if (uri->url_type == url_sips) { |
| 481 | services = "SIPS+D2T"; |
| 482 | strcpy(target, "_sips._tcp."); |
| 483 | } |
| 484 | else if (uri->url_type == url_sip) { |
| 485 | if (url_has_param(uri, "transport=udp")) { |
| 486 | services = "SIP+D2U"; |
| 487 | strcpy(target, "_sip._udp."); |
| 488 | } |
| 489 | else if (url_has_param(uri, "transport=tcp")) { |
| 490 | services = "SIP+D2T"; |
| 491 | strcpy(target, "_sip._tcp."); |
| 492 | } |
| 493 | } |
| 494 | |
| 495 | strcat(target, domain); |
| 496 | assert(services)((void) sizeof ((services) ? 1 : 0), __extension__ ({ if (services ) ; else __assert_fail ("services", "s2dns.c", 496, __extension__ __PRETTY_FUNCTION__); })); |
| 497 | put_naptr_record(m, domain, 1, priority, "s", services, "", target); |
| 498 | m->header->mh_ancount++; |
| 499 | } |
| 500 | |
| 501 | va_end(va)__builtin_va_end(va); |
| 502 | va_copy(va, va0)__builtin_va_copy(va, va0); |
| 503 | |
| 504 | for (;(prefix = va_arg(va, char *)__builtin_va_arg(va, char *));) { |
| 505 | priority = va_arg(va, int)__builtin_va_arg(va, int); |
| 506 | uri = va_arg(va, url_t *)__builtin_va_arg(va, url_t *); |
| 507 | if (uri == NULL((void*)0)) |
| 508 | continue; |
| 509 | |
| 510 | make_server(server, prefix, domain); |
| 511 | |
| 512 | put_srv_record_from_uri(m, domain, priority, 10, uri, server); |
| 513 | m->header->mh_arcount++; |
| 514 | |
| 515 | put_a_record(m, server, localhost); |
| 516 | m->header->mh_arcount++; |
| 517 | } |
| 518 | va_end(va)__builtin_va_end(va); |
| 519 | |
| 520 | s2_add_to_zone(m); |
| 521 | } |
| 522 | |
| 523 | /* Add SRV records */ |
| 524 | va_copy(va, va0)__builtin_va_copy(va, va0); |
| 525 | for (;(prefix = va_arg(va, char *)__builtin_va_arg(va, char *));) { |
| 526 | priority = va_arg(va, int)__builtin_va_arg(va, int); |
| 527 | uri = va_arg(va, url_t *)__builtin_va_arg(va, url_t *); |
| 528 | if (uri == NULL((void*)0)) |
| 529 | continue; |
| 530 | |
| 531 | make_server(server, prefix, domain); |
| 532 | |
| 533 | memset(m, 0, sizeof m); |
| 534 | put_srv_record_from_uri(m, domain, priority, 10, uri, server); |
| 535 | m->header->mh_ancount++; |
| 536 | |
| 537 | strcpy(server, prefix); strcat(server, domain); |
| 538 | |
| 539 | put_a_record(m, server, localhost); |
| 540 | m->header->mh_arcount++; |
| 541 | |
| 542 | s2_add_to_zone(m); |
| 543 | } |
| 544 | va_end(va)__builtin_va_end(va); |
| 545 | |
| 546 | /* Add A records */ |
| 547 | va_copy(va, va0)__builtin_va_copy(va, va0); |
| 548 | for (;(prefix = va_arg(va, char *)__builtin_va_arg(va, char *));) { |
| 549 | (void)va_arg(va, int)__builtin_va_arg(va, int); |
| 550 | if (va_arg(va, url_t *)__builtin_va_arg(va, url_t *) == NULL((void*)0)) |
| 551 | continue; |
| 552 | |
| 553 | memset(m, 0, sizeof m); |
| 554 | make_server(server, prefix, domain); |
| 555 | |
| 556 | put_query(m, server, sres_type_a); |
| 557 | put_a_record(m, server, localhost); |
| 558 | m->header->mh_ancount++; |
| 559 | |
| 560 | s2_add_to_zone(m); |
| 561 | } |
| 562 | va_end(va)__builtin_va_end(va); |
| 563 | |
| 564 | va_end(va0)__builtin_va_end(va0); |
| 565 | } |
| 566 | |
| 567 | /** Insert DNS response. |
| 568 | |
| 569 | s2_dns_record("example.com", sres_type_naptr, |
| 570 | // order priority flags services regexp target |
| 571 | "", sres_type_naptr, 20, 50, "a", "SIP+D2U", "", "sip00", |
| 572 | "", sres_type_naptr, 20, 50, "a", "SIP+D2T", "", "sip00", |
| 573 | "", sres_type_naptr, 20, 50, "a", "SIPS+D2T", "", "sip00", |
| 574 | "sip00", sres_type_a, "12.13.14.15", |
| 575 | NULL); |
| 576 | */ |
| 577 | void s2_dns_record( |
| 578 | char const *qdomain, unsigned qtype, |
| 579 | /* unsigned atype, domain, */ |
| 580 | ...) |
| 581 | { |
| 582 | struct s2_dns_response m[1]; |
| 583 | char const *domain; |
| 584 | va_list va; |
| 585 | unsigned atype; |
| 586 | unsigned ancount = 0, arcount = 0; |
| 587 | |
| 588 | memset(m, 0, (sizeof m)); |
| 589 | |
| 590 | va_start(va, qtype)__builtin_va_start(va, qtype); |
| 591 | |
| 592 | put_query(m, qdomain, qtype); |
| 593 | |
| 594 | for (domain = va_arg(va, char const *)__builtin_va_arg(va, char const *); domain; domain = va_arg(va, char const *)__builtin_va_arg(va, char const *)) { |
| 595 | if (!domain[0]) |
| 596 | domain = qdomain; |
| 597 | |
| 598 | if (strcmp(domain, "@") == 0) |
| 599 | domain = default_domain; |
| 600 | |
| 601 | atype = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
| 602 | |
| 603 | if (arcount == 0 && |
| 604 | (atype == qtype || atype == sres_type_cname) && |
| 605 | strcmp(qdomain, domain) == 0) |
| 606 | ancount++; |
| 607 | else |
| 608 | arcount++; |
| 609 | |
| 610 | switch(atype) { |
| 611 | case sres_type_naptr: |
| 612 | { |
| 613 | unsigned order = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
| 614 | unsigned priority = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
| 615 | char const *flags = va_arg(va, char const *)__builtin_va_arg(va, char const *); |
| 616 | char const *services = va_arg(va, char const *)__builtin_va_arg(va, char const *); |
| 617 | char const *regexp = va_arg(va, char const *)__builtin_va_arg(va, char const *); |
| 618 | char const *target = va_arg(va, char const *)__builtin_va_arg(va, char const *); |
| 619 | |
| 620 | put_naptr_record(m, domain, order, priority, |
| 621 | flags, services, regexp, target); |
| 622 | } |
| 623 | break; |
| 624 | case sres_type_srv: |
| 625 | { |
| 626 | unsigned priority = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
| 627 | unsigned weight = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
| 628 | unsigned port = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
| 629 | char const *target = va_arg(va, char const *)__builtin_va_arg(va, char const *); |
| 630 | |
| 631 | put_srv_record(m, domain, priority, weight, port, target); |
| 632 | } |
| 633 | break; |
| 634 | case sres_type_aaaa: |
| 635 | #if SU_HAVE_IN61 |
| 636 | { |
| 637 | char const *address = va_arg(va, char const *)__builtin_va_arg(va, char const *); /* target */ |
| 638 | struct in6_addr aaaa; |
| 639 | |
| 640 | inet_pton(AF_INET610, address, &aaaa); |
| 641 | |
| 642 | put_aaaa_record(m, domain, aaaa); |
| 643 | } |
| 644 | break; |
| 645 | #endif |
| 646 | case sres_type_a: |
| 647 | { |
| 648 | char const *address = va_arg(va, char const *)__builtin_va_arg(va, char const *); /* target */ |
| 649 | struct in_addr a; |
| 650 | |
| 651 | inet_pton(AF_INET2, address, &a); |
| 652 | |
| 653 | put_a_record(m, domain, a); |
| 654 | } |
| 655 | break; |
| 656 | case sres_type_cname: |
| 657 | put_cname_record(m, domain, va_arg(va, char const *)__builtin_va_arg(va, char const *)); |
| 658 | } |
| 659 | } |
| 660 | |
| 661 | m->header->mh_ancount = ancount; |
| 662 | m->header->mh_arcount = arcount; |
| 663 | |
| 664 | s2_add_to_zone(m); |
| 665 | |
| 666 | va_end(va)__builtin_va_end(va); |
| 667 | } |