File: | s2check/s2dns.c |
Warning: | line 472, column 12 Although the value stored to 'prefix' is used in the enclosing expression, the value is never actually read from 'prefix' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* ---------------------------------------------------------------------- */ |
2 | /* S2 DNS server */ |
3 | |
4 | #include <sofia-sip/sresolv.h> |
5 | #include <sofia-resolv/sres_record.h> |
6 | #include <sofia-sip/url.h> |
7 | |
8 | #include "s2dns.h" |
9 | |
10 | #include <string.h> |
11 | #include <stdlib.h> |
12 | #include <assert.h> |
13 | |
14 | extern uint16_t _sres_default_port; /* Ugly hack */ |
15 | |
16 | static struct s2dns { |
17 | su_root_t *root; |
18 | su_socket_t socket; |
19 | su_wait_t wait[1]; |
20 | int reg; |
21 | int (*filter)(void *data, size_t len, void *userdata); |
22 | void *userdata; |
23 | } s2dns; |
24 | |
25 | static |
26 | struct s2_dns_response { |
27 | struct s2_dns_response *next; |
28 | uint16_t qlen, dlen; |
29 | struct m_header { |
30 | /* Header defined in RFC 1035 section 4.1.1 (page 26) */ |
31 | uint16_t mh_id; /* Query ID */ |
32 | uint16_t mh_flags; /* Flags */ |
33 | uint16_t mh_qdcount; /* Question record count */ |
34 | uint16_t mh_ancount; /* Answer record count */ |
35 | uint16_t mh_nscount; /* Authority records count */ |
36 | uint16_t mh_arcount; /* Additional records count */ |
37 | } header[1]; |
38 | uint8_t data[1500]; |
39 | } *zonedata; |
40 | |
41 | enum { |
42 | FLAGS_QR = (1 << 15), |
43 | FLAGS_QUERY = (0 << 11), |
44 | FLAGS_IQUERY = (1 << 11), |
45 | FLAGS_STATUS = (2 << 11), |
46 | FLAGS_OPCODE = (15 << 11), /* mask */ |
47 | FLAGS_AA = (1 << 10), /* */ |
48 | FLAGS_TC = (1 << 9), |
49 | FLAGS_RD = (1 << 8), |
50 | FLAGS_RA = (1 << 7), |
51 | |
52 | FLAGS_RCODE = (15 << 0), /* mask of return code */ |
53 | |
54 | FLAGS_OK = 0, /* No error condition. */ |
55 | FLAGS_FORMAT_ERR = 1, /* Server could not interpret query. */ |
56 | FLAGS_SERVER_ERR = 2, /* Server error. */ |
57 | FLAGS_NAME_ERR = 3, /* No domain name. */ |
58 | FLAGS_UNIMPL_ERR = 4, /* Not implemented. */ |
59 | FLAGS_AUTH_ERR = 5, /* Refused */ |
60 | }; |
61 | |
62 | uint32_t s2_dns_ttl = 3600; |
63 | |
64 | static int s2_dns_query(su_root_magic_t *magic, |
65 | su_wait_t *w, |
66 | su_wakeup_arg_t *arg); |
67 | |
68 | void s2_dns_setup(su_root_t *root) |
69 | { |
70 | int n; |
71 | su_socket_t socket; |
72 | su_wait_t *wait; |
73 | su_sockaddr_t su[1]; |
74 | socklen_t sulen = sizeof su->su_sin; |
75 | |
76 | assert(root)((void) sizeof ((root) ? 1 : 0), __extension__ ({ if (root) ; else __assert_fail ("root", "s2dns.c", 76, __extension__ __PRETTY_FUNCTION__ ); })); |
77 | |
78 | memset(su, 0, sulen); |
79 | su->su_lensu_array[0] = sulen; |
80 | su->su_familysu_sa.sa_family = AF_INET2; |
81 | |
82 | /* su->su_port = htons(1053); */ |
83 | |
84 | socket = su_socket(su->su_familysu_sa.sa_family, SOCK_DGRAMSOCK_DGRAM, 0); |
85 | |
86 | n = bind(socket, &su->su_sa, sulen); assert(n == 0)((void) sizeof ((n == 0) ? 1 : 0), __extension__ ({ if (n == 0 ) ; else __assert_fail ("n == 0", "s2dns.c", 86, __extension__ __PRETTY_FUNCTION__); })); |
87 | n = getsockname(socket, &su->su_sa, &sulen); assert(n == 0)((void) sizeof ((n == 0) ? 1 : 0), __extension__ ({ if (n == 0 ) ; else __assert_fail ("n == 0", "s2dns.c", 87, __extension__ __PRETTY_FUNCTION__); })); |
88 | |
89 | _sres_default_port = ntohs(su->su_portsu_sin.sin_port); |
90 | |
91 | s2dns.root = root; |
92 | wait = s2dns.wait; |
93 | n = su_wait_create(wait, socket, SU_WAIT_IN(0x001)); assert(n == 0)((void) sizeof ((n == 0) ? 1 : 0), __extension__ ({ if (n == 0 ) ; else __assert_fail ("n == 0", "s2dns.c", 93, __extension__ __PRETTY_FUNCTION__); })); |
94 | s2dns.reg = su_root_register(root, wait, s2_dns_query, NULL((void*)0), 0); |
95 | assert(s2dns.reg > 0)((void) sizeof ((s2dns.reg > 0) ? 1 : 0), __extension__ ({ if (s2dns.reg > 0) ; else __assert_fail ("s2dns.reg > 0" , "s2dns.c", 95, __extension__ __PRETTY_FUNCTION__); })); |
96 | s2dns.socket = socket; |
97 | } |
98 | |
99 | /* Set filter function */ |
100 | void |
101 | s2_dns_set_filter(int (*filter)(void *data, size_t len, void *userdata), |
102 | void *userdata) |
103 | { |
104 | s2dns.filter = filter; |
105 | s2dns.userdata = userdata; |
106 | } |
107 | |
108 | void |
109 | s2_dns_teardown(void) |
110 | { |
111 | struct s2_dns_response *r, *next; |
112 | su_root_deregister(s2dns.root, s2dns.reg), s2dns.reg = -1; |
113 | su_close(s2dns.socket), s2dns.socket = -1; |
114 | s2dns.root = NULL((void*)0); |
115 | |
116 | for (r = zonedata, zonedata = NULL((void*)0); r; r = next) { |
117 | next = r->next; |
118 | free(r); |
119 | } |
120 | } |
121 | |
122 | static int |
123 | s2_dns_query(su_root_magic_t *magic, |
124 | su_wait_t *w, |
125 | su_wakeup_arg_t *arg) |
126 | { |
127 | union { |
128 | struct m_header header[1]; |
129 | uint8_t buffer[1500]; |
130 | } request; |
131 | ssize_t len; |
132 | |
133 | su_socket_t socket; |
134 | su_sockaddr_t su[1]; |
135 | socklen_t sulen = sizeof su; |
136 | uint16_t flags; |
137 | struct s2_dns_response *r; |
138 | size_t const hlen = sizeof r->header; |
139 | |
140 | (void)arg; |
141 | |
142 | socket = s2dns.socket; |
143 | |
144 | len = su_recvfrom(socket, request.buffer, sizeof request.buffer, 0,recvfrom((socket),(request.buffer),(sizeof request.buffer),(0 ),(void *)(&su->su_sa),(&sulen)) |
145 | &su->su_sa, &sulen)recvfrom((socket),(request.buffer),(sizeof request.buffer),(0 ),(void *)(&su->su_sa),(&sulen)); |
146 | |
147 | flags = ntohs(request.header->mh_flags); |
148 | |
149 | if (len < (ssize_t)hlen) |
150 | return 0; |
151 | if ((flags & FLAGS_QR) == FLAGS_QR) |
152 | return 0; |
153 | if ((flags & FLAGS_RCODE) != FLAGS_OK) |
154 | return 0; |
155 | |
156 | if ((flags & FLAGS_OPCODE) != FLAGS_QUERY |
157 | || ntohs(request.header->mh_qdcount) != 1) { |
158 | flags |= FLAGS_QR | FLAGS_UNIMPL_ERR; |
159 | request.header->mh_flags = htons(flags); |
160 | if (!s2dns.filter || s2dns.filter(request.buffer, len, s2dns.userdata)) |
161 | su_sendto(socket, request.buffer, len, 0, &su->su_sa, sulen)sendto((socket),(request.buffer),(len),(0),(void const*)(& su->su_sa),(sulen)); |
162 | return 0; |
163 | } |
164 | |
165 | for (r = zonedata; r; r = r->next) { |
166 | if (memcmp(r->data, request.buffer + hlen, r->qlen) == 0) |
167 | break; |
168 | } |
169 | |
170 | if (r) { |
171 | flags |= FLAGS_QR | FLAGS_AA | FLAGS_OK; |
172 | request.header->mh_flags = htons(flags); |
173 | request.header->mh_ancount = htons(r->header->mh_ancount); |
174 | request.header->mh_nscount = htons(r->header->mh_nscount); |
175 | request.header->mh_arcount = htons(r->header->mh_arcount); |
176 | memcpy(request.buffer + hlen + r->qlen, |
177 | r->data + r->qlen, |
178 | r->dlen - r->qlen); |
179 | len = hlen + r->dlen; |
180 | } |
181 | else { |
182 | flags |= FLAGS_QR | FLAGS_AA | FLAGS_NAME_ERR; |
183 | } |
184 | |
185 | request.header->mh_flags = htons(flags); |
186 | if (!s2dns.filter || s2dns.filter(request.buffer, len, s2dns.userdata)) |
187 | su_sendto(socket, request.buffer, len, 0, &su->su_sa, sulen)sendto((socket),(request.buffer),(len),(0),(void const*)(& su->su_sa),(sulen)); |
188 | return 0; |
189 | } |
190 | |
191 | static char const *default_domain; |
192 | |
193 | /** Set default domain suffix used with s2_dns_record() */ |
194 | char const * |
195 | s2_dns_default(char const *domain) |
196 | { |
197 | assert(domain == NULL || strlen(domain))((void) sizeof ((domain == ((void*)0) || strlen(domain)) ? 1 : 0), __extension__ ({ if (domain == ((void*)0) || strlen(domain )) ; else __assert_fail ("domain == NULL || strlen(domain)", "s2dns.c" , 197, __extension__ __PRETTY_FUNCTION__); })); |
198 | assert(domain == NULL || domain[strlen(domain) - 1] == '.')((void) sizeof ((domain == ((void*)0) || domain[strlen(domain ) - 1] == '.') ? 1 : 0), __extension__ ({ if (domain == ((void *)0) || domain[strlen(domain) - 1] == '.') ; else __assert_fail ("domain == NULL || domain[strlen(domain) - 1] == '.'", "s2dns.c" , 198, __extension__ __PRETTY_FUNCTION__); })); |
199 | return default_domain = domain; |
200 | } |
201 | |
202 | static void put_uint16(struct s2_dns_response *m, uint16_t h) |
203 | { |
204 | uint8_t *p = m->data + m->dlen; |
205 | |
206 | assert(m->dlen + (sizeof h) < sizeof m->data)((void) sizeof ((m->dlen + (sizeof h) < sizeof m->data ) ? 1 : 0), __extension__ ({ if (m->dlen + (sizeof h) < sizeof m->data) ; else __assert_fail ("m->dlen + (sizeof h) < sizeof m->data" , "s2dns.c", 206, __extension__ __PRETTY_FUNCTION__); })); |
207 | p[0] = h >> 8; p[1] = h; |
208 | m->dlen += (sizeof h); |
209 | } |
210 | |
211 | static void put_uint32(struct s2_dns_response *m, uint32_t w) |
212 | { |
213 | uint8_t *p = m->data + m->dlen; |
214 | |
215 | assert(m->dlen + (sizeof w) < sizeof m->data)((void) sizeof ((m->dlen + (sizeof w) < sizeof m->data ) ? 1 : 0), __extension__ ({ if (m->dlen + (sizeof w) < sizeof m->data) ; else __assert_fail ("m->dlen + (sizeof w) < sizeof m->data" , "s2dns.c", 215, __extension__ __PRETTY_FUNCTION__); })); |
216 | p[0] = w >> 24; p[1] = w >> 16; p[2] = w >> 8; p[3] = w; |
217 | m->dlen += (sizeof w); |
218 | } |
219 | |
220 | static void put_domain(struct s2_dns_response *m, char const *domain) |
221 | { |
222 | char const *label; |
223 | size_t llen; |
224 | |
225 | if (domain && domain[0] == 0) |
226 | domain = default_domain; |
227 | |
228 | /* Copy domain into query label at a time */ |
229 | for (label = domain; label && label[0]; label += llen) { |
230 | assert(!(label[0] == '.' && label[1] != '\0'))((void) sizeof ((!(label[0] == '.' && label[1] != '\0' )) ? 1 : 0), __extension__ ({ if (!(label[0] == '.' && label[1] != '\0')) ; else __assert_fail ("!(label[0] == '.' && label[1] != '\\0')" , "s2dns.c", 230, __extension__ __PRETTY_FUNCTION__); })); |
231 | llen = strcspn(label, "."); |
232 | assert(llen < 64)((void) sizeof ((llen < 64) ? 1 : 0), __extension__ ({ if ( llen < 64) ; else __assert_fail ("llen < 64", "s2dns.c" , 232, __extension__ __PRETTY_FUNCTION__); })); |
233 | assert(m->dlen + llen + 1 < sizeof m->data)((void) sizeof ((m->dlen + llen + 1 < sizeof m->data ) ? 1 : 0), __extension__ ({ if (m->dlen + llen + 1 < sizeof m->data) ; else __assert_fail ("m->dlen + llen + 1 < sizeof m->data" , "s2dns.c", 233, __extension__ __PRETTY_FUNCTION__); })); |
234 | m->data[m->dlen++] = (uint8_t)llen; |
235 | if (llen == 0) |
236 | return; |
237 | |
238 | memcpy(m->data + m->dlen, label, llen); |
239 | m->dlen += (uint16_t)llen; |
240 | |
241 | if (label[llen] == '\0') { |
242 | if (default_domain) { |
243 | label = default_domain, llen = 0; |
244 | continue; |
245 | } |
246 | break; |
247 | } |
248 | if (label[llen + 1]) |
249 | llen++; |
250 | } |
251 | |
252 | assert(m->dlen < sizeof m->data)((void) sizeof ((m->dlen < sizeof m->data) ? 1 : 0), __extension__ ({ if (m->dlen < sizeof m->data) ; else __assert_fail ("m->dlen < sizeof m->data", "s2dns.c" , 252, __extension__ __PRETTY_FUNCTION__); })); |
253 | m->data[m->dlen++] = '\0'; |
254 | } |
255 | |
256 | static void put_string(struct s2_dns_response *m, char const *string) |
257 | { |
258 | uint8_t *p = m->data + m->dlen; |
259 | size_t len = strlen(string); |
260 | |
261 | assert(len <= 255)((void) sizeof ((len <= 255) ? 1 : 0), __extension__ ({ if (len <= 255) ; else __assert_fail ("len <= 255", "s2dns.c" , 261, __extension__ __PRETTY_FUNCTION__); })); |
262 | assert(m->dlen + len + 1 < sizeof m->data)((void) sizeof ((m->dlen + len + 1 < sizeof m->data) ? 1 : 0), __extension__ ({ if (m->dlen + len + 1 < sizeof m->data) ; else __assert_fail ("m->dlen + len + 1 < sizeof m->data" , "s2dns.c", 262, __extension__ __PRETTY_FUNCTION__); })); |
263 | |
264 | *p++ = (uint8_t)len; |
265 | memcpy(p, string, len); |
266 | m->dlen += len + 1; |
267 | } |
268 | |
269 | static uint16_t put_len_at(struct s2_dns_response *m) |
270 | { |
271 | uint16_t at = m->dlen; |
272 | assert(m->dlen + sizeof(at) < sizeof m->data)((void) sizeof ((m->dlen + sizeof(at) < sizeof m->data ) ? 1 : 0), __extension__ ({ if (m->dlen + sizeof(at) < sizeof m->data) ; else __assert_fail ("m->dlen + sizeof(at) < sizeof m->data" , "s2dns.c", 272, __extension__ __PRETTY_FUNCTION__); })); |
273 | memset(m->data + m->dlen, 0, sizeof(at)); |
274 | m->dlen += sizeof(at); |
275 | return at; |
276 | } |
277 | |
278 | static void put_len(struct s2_dns_response *m, uint16_t start) |
279 | { |
280 | uint8_t *p = m->data + start; |
281 | uint16_t len = m->dlen - (start + 2); |
282 | p[0] = len >> 8; p[1] = len; |
283 | } |
284 | |
285 | static void put_data(struct s2_dns_response *m, void const *data, uint16_t len) |
286 | { |
287 | assert(m->dlen + len < sizeof m->data)((void) sizeof ((m->dlen + len < sizeof m->data) ? 1 : 0), __extension__ ({ if (m->dlen + len < sizeof m-> data) ; else __assert_fail ("m->dlen + len < sizeof m->data" , "s2dns.c", 287, __extension__ __PRETTY_FUNCTION__); })); |
288 | memcpy(m->data + m->dlen, data, len); |
289 | m->dlen += len; |
290 | } |
291 | |
292 | static void put_query(struct s2_dns_response *m, char const *domain, |
293 | uint16_t qtype) |
294 | { |
295 | assert(m->header->mh_qdcount == 0)((void) sizeof ((m->header->mh_qdcount == 0) ? 1 : 0), __extension__ ({ if (m->header->mh_qdcount == 0) ; else __assert_fail ("m->header->mh_qdcount == 0", "s2dns.c", 295, __extension__ __PRETTY_FUNCTION__); })); |
296 | put_domain(m, domain), put_uint16(m, qtype), put_uint16(m, sres_class_in); |
297 | m->header->mh_qdcount++; |
298 | m->qlen = m->dlen; |
299 | } |
300 | |
301 | static void put_a_record(struct s2_dns_response *m, |
302 | char const *domain, |
303 | struct in_addr addr) |
304 | { |
305 | uint16_t start; |
306 | |
307 | put_domain(m, domain); |
308 | put_uint16(m, sres_type_a); |
309 | put_uint16(m, sres_class_in); |
310 | put_uint32(m, s2_dns_ttl); |
311 | start = put_len_at(m); |
312 | |
313 | put_data(m, &addr, sizeof addr); |
314 | put_len(m, start); |
315 | } |
316 | |
317 | static void put_aaaa_record(struct s2_dns_response *m, |
318 | char const *domain, |
319 | struct in6_addr addr) |
320 | { |
321 | uint16_t start; |
322 | |
323 | put_domain(m, domain); |
324 | put_uint16(m, sres_type_aaaa); |
325 | put_uint16(m, sres_class_in); |
326 | put_uint32(m, s2_dns_ttl); |
327 | start = put_len_at(m); |
328 | |
329 | put_data(m, &addr, sizeof addr); |
330 | put_len(m, start); |
331 | } |
332 | |
333 | static void put_cname_record(struct s2_dns_response *m, |
334 | char const *domain, |
335 | char const *cname) |
336 | { |
337 | uint16_t start; |
338 | |
339 | put_domain(m, domain); |
340 | put_uint16(m, sres_type_cname); |
341 | put_uint16(m, sres_class_in); |
342 | put_uint32(m, s2_dns_ttl); |
343 | start = put_len_at(m); |
344 | |
345 | put_domain(m, cname); |
346 | put_len(m, start); |
347 | } |
348 | |
349 | static void put_srv_record(struct s2_dns_response *m, |
350 | char const *domain, |
351 | uint16_t prio, uint16_t weight, |
352 | uint16_t port, char const *target) |
353 | { |
354 | uint16_t start; |
355 | put_domain(m, domain); |
356 | put_uint16(m, sres_type_srv); |
357 | put_uint16(m, sres_class_in); |
358 | put_uint32(m, s2_dns_ttl); |
359 | start = put_len_at(m); |
360 | |
361 | put_uint16(m, prio); |
362 | put_uint16(m, weight); |
363 | put_uint16(m, port); |
364 | put_domain(m, target); |
365 | put_len(m, start); |
366 | } |
367 | |
368 | static void put_naptr_record(struct s2_dns_response *m, |
369 | char const *domain, |
370 | uint16_t order, uint16_t preference, |
371 | char const *flags, |
372 | char const *services, |
373 | char const *regexp, |
374 | char const *replace) |
375 | { |
376 | uint16_t start; |
377 | put_domain(m, domain); |
378 | put_uint16(m, sres_type_naptr); |
379 | put_uint16(m, sres_class_in); |
380 | put_uint32(m, s2_dns_ttl); |
381 | start = put_len_at(m); |
382 | |
383 | put_uint16(m, order); |
384 | put_uint16(m, preference); |
385 | put_string(m, flags); |
386 | put_string(m, services); |
387 | put_string(m, regexp); |
388 | put_domain(m, replace); |
389 | put_len(m, start); |
390 | } |
391 | |
392 | static void put_srv_record_from_uri(struct s2_dns_response *m, |
393 | char const *base, |
394 | uint16_t prio, uint16_t weight, |
395 | url_t const *uri, char const *server) |
396 | { |
397 | char domain[1024] = "none"; |
398 | char const *service = url_port(uri); |
399 | uint16_t port; |
400 | |
401 | if (uri->url_type == url_sips) { |
402 | strcpy(domain, "_sips._tcp."); |
403 | } |
404 | else if (uri->url_type == url_sip) { |
405 | if (url_has_param(uri, "transport=udp")) { |
406 | strcpy(domain, "_sip._udp."); |
407 | } |
408 | else if (url_has_param(uri, "transport=tcp")) { |
409 | strcpy(domain, "_sip._tcp."); |
410 | } |
411 | } |
412 | |
413 | assert(strcmp(domain, "none"))((void) sizeof ((strcmp(domain, "none")) ? 1 : 0), __extension__ ({ if (strcmp(domain, "none")) ; else __assert_fail ("strcmp(domain, \"none\")" , "s2dns.c", 413, __extension__ __PRETTY_FUNCTION__); })); |
414 | |
415 | strcat(domain, base); |
416 | |
417 | if (m->header->mh_qdcount == 0) |
418 | put_query(m, domain, sres_type_srv); |
419 | |
420 | port = (uint16_t)strtoul(service, NULL((void*)0), 10); |
421 | |
422 | put_srv_record(m, domain, prio, weight, port, server); |
423 | } |
424 | |
425 | static |
426 | void s2_add_to_zone(struct s2_dns_response *_r) |
427 | { |
428 | size_t size = offsetof(struct s2_dns_response, data[_r->dlen])__builtin_offsetof(struct s2_dns_response, data[_r->dlen]); |
429 | struct s2_dns_response *r = malloc(size); assert(r)((void) sizeof ((r) ? 1 : 0), __extension__ ({ if (r) ; else __assert_fail ("r", "s2dns.c", 429, __extension__ __PRETTY_FUNCTION__); }) ); |
430 | |
431 | memcpy(r, _r, size); |
432 | r->next = zonedata; |
433 | zonedata = r; |
434 | } |
435 | |
436 | |
437 | static void make_server(char *server, char const *prefix, char const *domain) |
438 | { |
439 | strcpy(server, prefix); |
440 | |
441 | if (strlen(server) == 0 || server[strlen(server) - 1] != '.') { |
442 | strcat(server, "."); |
443 | strcat(server, domain); |
444 | } |
445 | } |
446 | |
447 | /** Set up records for SIP server */ |
448 | void s2_dns_domain(char const *domain, int use_naptr, |
449 | /* char *prefix, int priority, url_t const *uri, */ |
450 | ...) |
451 | { |
452 | struct s2_dns_response m[1]; |
453 | |
454 | char server[1024], target[1024]; |
455 | |
456 | va_list va0, va; |
457 | char const *prefix; int priority; url_t const *uri; |
458 | struct in_addr localhost; |
459 | |
460 | assert(s2dns.reg != 0)((void) sizeof ((s2dns.reg != 0) ? 1 : 0), __extension__ ({ if (s2dns.reg != 0) ; else __assert_fail ("s2dns.reg != 0", "s2dns.c" , 460, __extension__ __PRETTY_FUNCTION__); })); |
461 | |
462 | su_inet_ptoninet_pton(AF_INET2, "127.0.0.1", &localhost); |
463 | |
464 | va_start(va0, use_naptr)__builtin_va_start(va0, use_naptr); |
465 | |
466 | if (use_naptr) { |
467 | memset(m, 0, sizeof m); |
468 | put_query(m, domain, sres_type_naptr); |
469 | |
470 | va_copy(va, va0)__builtin_va_copy(va, va0); |
471 | |
472 | for (;(prefix = va_arg(va, char *)__builtin_va_arg(va, char *));) { |
Although the value stored to 'prefix' is used in the enclosing expression, the value is never actually read from 'prefix' | |
473 | char *services = NULL((void*)0); |
474 | |
475 | priority = va_arg(va, int)__builtin_va_arg(va, int); |
476 | uri = va_arg(va, url_t *)__builtin_va_arg(va, url_t *); |
477 | if (uri == NULL((void*)0)) |
478 | continue; |
479 | |
480 | if (uri->url_type == url_sips) { |
481 | services = "SIPS+D2T"; |
482 | strcpy(target, "_sips._tcp."); |
483 | } |
484 | else if (uri->url_type == url_sip) { |
485 | if (url_has_param(uri, "transport=udp")) { |
486 | services = "SIP+D2U"; |
487 | strcpy(target, "_sip._udp."); |
488 | } |
489 | else if (url_has_param(uri, "transport=tcp")) { |
490 | services = "SIP+D2T"; |
491 | strcpy(target, "_sip._tcp."); |
492 | } |
493 | } |
494 | |
495 | strcat(target, domain); |
496 | assert(services)((void) sizeof ((services) ? 1 : 0), __extension__ ({ if (services ) ; else __assert_fail ("services", "s2dns.c", 496, __extension__ __PRETTY_FUNCTION__); })); |
497 | put_naptr_record(m, domain, 1, priority, "s", services, "", target); |
498 | m->header->mh_ancount++; |
499 | } |
500 | |
501 | va_end(va)__builtin_va_end(va); |
502 | va_copy(va, va0)__builtin_va_copy(va, va0); |
503 | |
504 | for (;(prefix = va_arg(va, char *)__builtin_va_arg(va, char *));) { |
505 | priority = va_arg(va, int)__builtin_va_arg(va, int); |
506 | uri = va_arg(va, url_t *)__builtin_va_arg(va, url_t *); |
507 | if (uri == NULL((void*)0)) |
508 | continue; |
509 | |
510 | make_server(server, prefix, domain); |
511 | |
512 | put_srv_record_from_uri(m, domain, priority, 10, uri, server); |
513 | m->header->mh_arcount++; |
514 | |
515 | put_a_record(m, server, localhost); |
516 | m->header->mh_arcount++; |
517 | } |
518 | va_end(va)__builtin_va_end(va); |
519 | |
520 | s2_add_to_zone(m); |
521 | } |
522 | |
523 | /* Add SRV records */ |
524 | va_copy(va, va0)__builtin_va_copy(va, va0); |
525 | for (;(prefix = va_arg(va, char *)__builtin_va_arg(va, char *));) { |
526 | priority = va_arg(va, int)__builtin_va_arg(va, int); |
527 | uri = va_arg(va, url_t *)__builtin_va_arg(va, url_t *); |
528 | if (uri == NULL((void*)0)) |
529 | continue; |
530 | |
531 | make_server(server, prefix, domain); |
532 | |
533 | memset(m, 0, sizeof m); |
534 | put_srv_record_from_uri(m, domain, priority, 10, uri, server); |
535 | m->header->mh_ancount++; |
536 | |
537 | strcpy(server, prefix); strcat(server, domain); |
538 | |
539 | put_a_record(m, server, localhost); |
540 | m->header->mh_arcount++; |
541 | |
542 | s2_add_to_zone(m); |
543 | } |
544 | va_end(va)__builtin_va_end(va); |
545 | |
546 | /* Add A records */ |
547 | va_copy(va, va0)__builtin_va_copy(va, va0); |
548 | for (;(prefix = va_arg(va, char *)__builtin_va_arg(va, char *));) { |
549 | (void)va_arg(va, int)__builtin_va_arg(va, int); |
550 | if (va_arg(va, url_t *)__builtin_va_arg(va, url_t *) == NULL((void*)0)) |
551 | continue; |
552 | |
553 | memset(m, 0, sizeof m); |
554 | make_server(server, prefix, domain); |
555 | |
556 | put_query(m, server, sres_type_a); |
557 | put_a_record(m, server, localhost); |
558 | m->header->mh_ancount++; |
559 | |
560 | s2_add_to_zone(m); |
561 | } |
562 | va_end(va)__builtin_va_end(va); |
563 | |
564 | va_end(va0)__builtin_va_end(va0); |
565 | } |
566 | |
567 | /** Insert DNS response. |
568 | |
569 | s2_dns_record("example.com", sres_type_naptr, |
570 | // order priority flags services regexp target |
571 | "", sres_type_naptr, 20, 50, "a", "SIP+D2U", "", "sip00", |
572 | "", sres_type_naptr, 20, 50, "a", "SIP+D2T", "", "sip00", |
573 | "", sres_type_naptr, 20, 50, "a", "SIPS+D2T", "", "sip00", |
574 | "sip00", sres_type_a, "12.13.14.15", |
575 | NULL); |
576 | */ |
577 | void s2_dns_record( |
578 | char const *qdomain, unsigned qtype, |
579 | /* unsigned atype, domain, */ |
580 | ...) |
581 | { |
582 | struct s2_dns_response m[1]; |
583 | char const *domain; |
584 | va_list va; |
585 | unsigned atype; |
586 | unsigned ancount = 0, arcount = 0; |
587 | |
588 | memset(m, 0, (sizeof m)); |
589 | |
590 | va_start(va, qtype)__builtin_va_start(va, qtype); |
591 | |
592 | put_query(m, qdomain, qtype); |
593 | |
594 | for (domain = va_arg(va, char const *)__builtin_va_arg(va, char const *); domain; domain = va_arg(va, char const *)__builtin_va_arg(va, char const *)) { |
595 | if (!domain[0]) |
596 | domain = qdomain; |
597 | |
598 | if (strcmp(domain, "@") == 0) |
599 | domain = default_domain; |
600 | |
601 | atype = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
602 | |
603 | if (arcount == 0 && |
604 | (atype == qtype || atype == sres_type_cname) && |
605 | strcmp(qdomain, domain) == 0) |
606 | ancount++; |
607 | else |
608 | arcount++; |
609 | |
610 | switch(atype) { |
611 | case sres_type_naptr: |
612 | { |
613 | unsigned order = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
614 | unsigned priority = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
615 | char const *flags = va_arg(va, char const *)__builtin_va_arg(va, char const *); |
616 | char const *services = va_arg(va, char const *)__builtin_va_arg(va, char const *); |
617 | char const *regexp = va_arg(va, char const *)__builtin_va_arg(va, char const *); |
618 | char const *target = va_arg(va, char const *)__builtin_va_arg(va, char const *); |
619 | |
620 | put_naptr_record(m, domain, order, priority, |
621 | flags, services, regexp, target); |
622 | } |
623 | break; |
624 | case sres_type_srv: |
625 | { |
626 | unsigned priority = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
627 | unsigned weight = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
628 | unsigned port = va_arg(va, unsigned)__builtin_va_arg(va, unsigned); |
629 | char const *target = va_arg(va, char const *)__builtin_va_arg(va, char const *); |
630 | |
631 | put_srv_record(m, domain, priority, weight, port, target); |
632 | } |
633 | break; |
634 | case sres_type_aaaa: |
635 | #if SU_HAVE_IN61 |
636 | { |
637 | char const *address = va_arg(va, char const *)__builtin_va_arg(va, char const *); /* target */ |
638 | struct in6_addr aaaa; |
639 | |
640 | inet_pton(AF_INET610, address, &aaaa); |
641 | |
642 | put_aaaa_record(m, domain, aaaa); |
643 | } |
644 | break; |
645 | #endif |
646 | case sres_type_a: |
647 | { |
648 | char const *address = va_arg(va, char const *)__builtin_va_arg(va, char const *); /* target */ |
649 | struct in_addr a; |
650 | |
651 | inet_pton(AF_INET2, address, &a); |
652 | |
653 | put_a_record(m, domain, a); |
654 | } |
655 | break; |
656 | case sres_type_cname: |
657 | put_cname_record(m, domain, va_arg(va, char const *)__builtin_va_arg(va, char const *)); |
658 | } |
659 | } |
660 | |
661 | m->header->mh_ancount = ancount; |
662 | m->header->mh_arcount = arcount; |
663 | |
664 | s2_add_to_zone(m); |
665 | |
666 | va_end(va)__builtin_va_end(va); |
667 | } |