ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/res.c
Revision: 4461
Committed: Wed Aug 13 17:05:26 2014 UTC (11 years ago) by michael
Content type: text/x-csrc
File size: 20627 byte(s)
Log Message:
- Removed stupid PF typedef in fdlist.h which prevented both gcc and clang from spitting out
  a warning about the first argument of s_bsd:ssl_handshake() being an 'int' when it really
  has to be a 'fde_t' pointer.
- Fixed first argument of s_bsd:ssl_handshake() which should be a 'fde_t' pointer instead of an 'int'.

File Contents

# User Rev Content
1 adx 30 /*
2 michael 2916 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3     *
4     * Copyright (c) 1997-2014 ircd-hybrid development team
5     *
6     * This program is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * This program is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with this program; if not, write to the Free Software
18     * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
19     * USA
20     */
21    
22 michael 3322 /*! \file res.c
23 michael 2916 * \brief ircd resolver functions
24     * \version $Id$
25     */
26    
27     /*
28 michael 4311 * A rewrite of Darren Reed's original res.c As there is nothing
29     * left of Darren's original code, this is now licensed by the hybrid group.
30 adx 30 * (Well, some of the function names are the same, and bits of the structs..)
31     * You can use it where it is useful, free even. Buy us a beer and stuff.
32     *
33     * The authors takes no responsibility for any damage or loss
34     * of property which results from the use of this software.
35     *
36     * July 1999 - Rewrote a bunch of stuff here. Change hostent builder code,
37     * added callbacks and reference counting of returned hostents.
38     * --Bleep (Thomas Helvey <tomh@inxpress.net>)
39     *
40     * This was all needlessly complicated for irc. Simplified. No more hostent
41 michael 4311 * All we really care about is the IP -> hostname mappings. That's all.
42 adx 30 *
43     * Apr 28, 2003 --cryogen and Dianora
44     */
45    
46     #include "stdinc.h"
47 michael 1011 #include "list.h"
48 adx 30 #include "client.h"
49     #include "event.h"
50     #include "irc_string.h"
51     #include "ircd.h"
52     #include "numeric.h"
53 michael 982 #include "rng_mt.h"
54 adx 30 #include "fdlist.h"
55     #include "s_bsd.h"
56 michael 1309 #include "log.h"
57 michael 3347 #include "misc.h"
58 adx 30 #include "send.h"
59     #include "memory.h"
60 michael 1654 #include "mempool.h"
61 michael 3322 #include "res.h"
62     #include "reslib.h"
63 adx 30
64     #if (CHAR_BIT != 8)
65 michael 2916 #error this code needs to be able to address individual octets
66 adx 30 #endif
67    
68 michael 4461 static void res_readreply(fde_t *, void *);
69 adx 30
70 michael 4311 #define MAXPACKET 1024 /**< rfc says 512 but we expand names so ... */
71     #define AR_TTL 600 /**< TTL in seconds for dns cache entries */
72 adx 30
73 michael 4311 /*
74     * RFC 1104/1105 wasn't very helpful about what these fields
75 adx 30 * should be named, so for now, we'll just name them this way.
76 michael 4311 * We probably should look at what named calls them or something.
77 adx 30 */
78     #define TYPE_SIZE (size_t)2
79     #define CLASS_SIZE (size_t)2
80     #define TTL_SIZE (size_t)4
81     #define RDLENGTH_SIZE (size_t)2
82     #define ANSWER_FIXED_SIZE (TYPE_SIZE + CLASS_SIZE + TTL_SIZE + RDLENGTH_SIZE)
83    
84 michael 2916 struct reslist
85 adx 30 {
86 michael 4423 dlink_node node; /**< Doubly linked list node. */
87     int id; /**< Request ID (from request header). */
88     int sent; /**< Number of requests sent */
89     char type; /**< Current request type. */
90     char retries; /**< Retry counter */
91     unsigned int sends; /**< Number of sends (>1 means resent). */
92     time_t sentat; /**< Timestamp we last sent this request. */
93     time_t timeout; /**< When this request times out. */
94     struct irc_ssaddr addr; /**< Address for this request. */
95     char name[RFC1035_MAX_DOMAIN_LENGTH + 1]; /**< Hostname for this request. */
96     size_t namelength; /**< Actual hostname length. */
97     dns_callback_fnc callback; /**< Callback function on completion. */
98     void *callback_ctx; /**< Context pointer for callback. */
99 adx 30 };
100    
101     static fde_t ResolverFileDescriptor;
102 michael 3235 static dlink_list request_list;
103     static mp_pool_t *dns_pool;
104 adx 30
105    
106 michael 4311 /*
107     * rem_request - remove a request from the list.
108     * This must also free any memory that has been allocated for
109     * temporary storage of DNS results.
110     */
111     static void
112     rem_request(struct reslist *request)
113     {
114     dlinkDelete(&request->node, &request_list);
115     mp_pool_release(request);
116     }
117    
118 adx 30 /*
119 michael 4311 * make_request - Create a DNS request record for the server.
120     */
121     static struct reslist *
122     make_request(dns_callback_fnc callback, void *ctx)
123     {
124     struct reslist *request = mp_pool_get(dns_pool);
125    
126     request->sentat = CurrentTime;
127     request->retries = 2;
128     request->timeout = 4; /* Start at 4 and exponential inc. */
129     request->callback = callback;
130     request->callback_ctx = ctx;
131    
132     dlinkAdd(request, &request->node, &request_list);
133     return request;
134     }
135    
136     /*
137 adx 30 * int
138     * res_ourserver(inp)
139     * looks up "inp" in irc_nsaddr_list[]
140     * returns:
141     * 0 : not found
142     * >0 : found
143     * author:
144     * paul vixie, 29may94
145     * revised for ircd, cryogen(stu) may03
146     */
147     static int
148 michael 2916 res_ourserver(const struct irc_ssaddr *inp)
149 adx 30 {
150 michael 992 const struct sockaddr_in6 *v6;
151     const struct sockaddr_in6 *v6in = (const struct sockaddr_in6 *)inp;
152     const struct sockaddr_in *v4;
153 michael 2916 const struct sockaddr_in *v4in = (const struct sockaddr_in *)inp;
154 adx 30
155 michael 3297 for (unsigned int i = 0; i < irc_nscount; ++i)
156 adx 30 {
157 michael 3235 const struct irc_ssaddr *srv = &irc_nsaddr_list[i];
158 michael 992 v6 = (const struct sockaddr_in6 *)srv;
159     v4 = (const struct sockaddr_in *)srv;
160 adx 30
161 michael 4311 /*
162     * Could probably just memcmp(srv, inp, srv.ss_len) here
163 adx 30 * but we'll air on the side of caution - stu
164     */
165     switch (srv->ss.ss_family)
166     {
167     case AF_INET6:
168     if (srv->ss.ss_family == inp->ss.ss_family)
169     if (v6->sin6_port == v6in->sin6_port)
170 michael 1346 if (!memcmp(&v6->sin6_addr.s6_addr, &v6in->sin6_addr.s6_addr,
171     sizeof(struct in6_addr)))
172 michael 1124 return 1;
173 adx 30 break;
174     case AF_INET:
175     if (srv->ss.ss_family == inp->ss.ss_family)
176     if (v4->sin_port == v4in->sin_port)
177 michael 1346 if (v4->sin_addr.s_addr == v4in->sin_addr.s_addr)
178 michael 1124 return 1;
179 adx 30 break;
180     default:
181     break;
182     }
183     }
184    
185 michael 1124 return 0;
186 adx 30 }
187    
188     /*
189     * start_resolver - do everything we need to read the resolv.conf file
190     * and initialize the resolver file descriptor if needed
191     */
192     static void
193     start_resolver(void)
194     {
195     irc_res_init();
196    
197     if (!ResolverFileDescriptor.flags.open)
198     {
199     if (comm_open(&ResolverFileDescriptor, irc_nsaddr_list[0].ss.ss_family,
200 michael 4448 SOCK_DGRAM, 0, "UDP resolver socket") == -1)
201 adx 30 return;
202    
203     /* At the moment, the resolver FD data is global .. */
204 michael 3298 comm_setselect(&ResolverFileDescriptor, COMM_SELECT_READ, res_readreply, NULL, 0);
205 adx 30 }
206     }
207    
208     /*
209     * restart_resolver - reread resolv.conf, reopen socket
210     */
211     void
212     restart_resolver(void)
213     {
214     fd_close(&ResolverFileDescriptor);
215     start_resolver();
216     }
217    
218     /*
219 michael 2916 * delete_resolver_queries - cleanup outstanding queries
220 adx 30 * for which there no longer exist clients or conf lines.
221     */
222     void
223 michael 992 delete_resolver_queries(const void *vptr)
224 adx 30 {
225 michael 3235 dlink_node *ptr = NULL, *ptr_next = NULL;
226 adx 30
227 michael 3235 DLINK_FOREACH_SAFE(ptr, ptr_next, request_list.head)
228 adx 30 {
229 michael 997 struct reslist *request = ptr->data;
230    
231     if (request->callback_ctx == vptr)
232     rem_request(request);
233 adx 30 }
234     }
235    
236     /*
237     * send_res_msg - sends msg to all nameservers found in the "_res" structure.
238     * This should reflect /etc/resolv.conf. We will get responses
239     * which arent needed but is easier than checking to see if nameserver
240 michael 4298 * isn't present. Returns number of messages successfully sent to
241 adx 30 * nameservers or -1 if no successful sends.
242     */
243     static int
244 michael 3297 send_res_msg(const char *msg, int len, unsigned int rcount)
245 adx 30 {
246     int sent = 0;
247 michael 3297 unsigned int max_queries = IRCD_MIN(irc_nscount, rcount);
248 adx 30
249     /* RES_PRIMARY option is not implemented
250     * if (res.options & RES_PRIMARY || 0 == max_queries)
251     */
252     if (max_queries == 0)
253     max_queries = 1;
254    
255 michael 3297 for (unsigned int i = 0; i < max_queries; ++i)
256 adx 30 {
257 michael 2916 if (sendto(ResolverFileDescriptor.fd, msg, len, 0,
258     (struct sockaddr*)&(irc_nsaddr_list[i]),
259     irc_nsaddr_list[i].ss_len) == len)
260 adx 30 ++sent;
261     }
262    
263 michael 1124 return sent;
264 adx 30 }
265    
266     /*
267     * find_id - find a dns request id (id is determined by dn_mkquery)
268     */
269     static struct reslist *
270     find_id(int id)
271     {
272 michael 1124 dlink_node *ptr = NULL;
273 adx 30
274     DLINK_FOREACH(ptr, request_list.head)
275     {
276 michael 1124 struct reslist *request = ptr->data;
277 adx 30
278     if (request->id == id)
279 michael 1124 return request;
280 adx 30 }
281    
282 michael 1124 return NULL;
283 adx 30 }
284    
285 michael 2916 /*
286 michael 4311 * query_name - generate a query based on class, type and name.
287 adx 30 */
288 michael 4311 static void
289     query_name(const char *name, int query_class, int type,
290     struct reslist *request)
291 adx 30 {
292 michael 4311 char buf[MAXPACKET];
293     int request_len = 0;
294 adx 30
295 michael 4311 memset(buf, 0, sizeof(buf));
296 adx 30
297 michael 4311 if ((request_len = irc_res_mkquery(name, query_class, type,
298     (unsigned char *)buf, sizeof(buf))) > 0)
299     {
300     HEADER *header = (HEADER *)buf;
301    
302     /*
303     * Generate an unique id.
304     * NOTE: we don't have to worry about converting this to and from
305     * network byte order, the nameserver does not interpret this value
306     * and returns it unchanged.
307     */
308     do
309     header->id = (header->id + genrand_int32()) & 0xFFFF;
310     while (find_id(header->id));
311    
312     request->id = header->id;
313     ++request->sends;
314    
315     request->sent += send_res_msg(buf, request_len, request->sends);
316     }
317 adx 30 }
318    
319     /*
320     * do_query_name - nameserver lookup name
321     */
322     static void
323 michael 992 do_query_name(dns_callback_fnc callback, void *ctx, const char *name,
324 adx 30 struct reslist *request, int type)
325     {
326 michael 4408 char host_name[RFC1035_MAX_DOMAIN_LENGTH + 1];
327 adx 30
328 michael 998 strlcpy(host_name, name, sizeof(host_name));
329 adx 30
330     if (request == NULL)
331     {
332 michael 4408 request = make_request(callback, ctx);
333     request->type = type;
334     request->namelength = strlcpy(request->name, host_name, sizeof(request->name));
335 adx 30 }
336    
337     request->type = type;
338     query_name(host_name, C_IN, type, request);
339     }
340    
341     /*
342     * do_query_number - Use this to do reverse IP# lookups.
343     */
344     static void
345 michael 992 do_query_number(dns_callback_fnc callback, void *ctx,
346     const struct irc_ssaddr *addr,
347 adx 30 struct reslist *request)
348     {
349 michael 3298 char ipbuf[128] = "";
350 michael 985
351 adx 30 if (addr->ss.ss_family == AF_INET)
352     {
353 michael 992 const struct sockaddr_in *v4 = (const struct sockaddr_in *)addr;
354 michael 3298 const unsigned char *cp = (const unsigned char *)&v4->sin_addr.s_addr;
355 adx 30
356 michael 1124 snprintf(ipbuf, sizeof(ipbuf), "%u.%u.%u.%u.in-addr.arpa.",
357     (unsigned int)(cp[3]), (unsigned int)(cp[2]),
358     (unsigned int)(cp[1]), (unsigned int)(cp[0]));
359 adx 30 }
360     else if (addr->ss.ss_family == AF_INET6)
361     {
362 michael 992 const struct sockaddr_in6 *v6 = (const struct sockaddr_in6 *)addr;
363 michael 3298 const unsigned char *cp = (const unsigned char *)&v6->sin6_addr.s6_addr;
364 adx 30
365 michael 1124 snprintf(ipbuf, sizeof(ipbuf),
366     "%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x."
367     "%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.%x.ip6.arpa.",
368     (unsigned int)(cp[15] & 0xf), (unsigned int)(cp[15] >> 4),
369     (unsigned int)(cp[14] & 0xf), (unsigned int)(cp[14] >> 4),
370     (unsigned int)(cp[13] & 0xf), (unsigned int)(cp[13] >> 4),
371     (unsigned int)(cp[12] & 0xf), (unsigned int)(cp[12] >> 4),
372     (unsigned int)(cp[11] & 0xf), (unsigned int)(cp[11] >> 4),
373     (unsigned int)(cp[10] & 0xf), (unsigned int)(cp[10] >> 4),
374     (unsigned int)(cp[9] & 0xf), (unsigned int)(cp[9] >> 4),
375     (unsigned int)(cp[8] & 0xf), (unsigned int)(cp[8] >> 4),
376     (unsigned int)(cp[7] & 0xf), (unsigned int)(cp[7] >> 4),
377     (unsigned int)(cp[6] & 0xf), (unsigned int)(cp[6] >> 4),
378     (unsigned int)(cp[5] & 0xf), (unsigned int)(cp[5] >> 4),
379     (unsigned int)(cp[4] & 0xf), (unsigned int)(cp[4] >> 4),
380     (unsigned int)(cp[3] & 0xf), (unsigned int)(cp[3] >> 4),
381     (unsigned int)(cp[2] & 0xf), (unsigned int)(cp[2] >> 4),
382     (unsigned int)(cp[1] & 0xf), (unsigned int)(cp[1] >> 4),
383     (unsigned int)(cp[0] & 0xf), (unsigned int)(cp[0] >> 4));
384 adx 30 }
385 michael 4415
386 adx 30 if (request == NULL)
387     {
388 michael 992 request = make_request(callback, ctx);
389 adx 30 request->type = T_PTR;
390     memcpy(&request->addr, addr, sizeof(struct irc_ssaddr));
391     }
392    
393     query_name(ipbuf, C_IN, T_PTR, request);
394     }
395    
396     /*
397 michael 4311 * gethost_byname_type - get host address from name
398     *
399 adx 30 */
400 michael 4311 void
401     gethost_byname_type(dns_callback_fnc callback, void *ctx, const char *name, int type)
402 adx 30 {
403 michael 4311 assert(name);
404     do_query_name(callback, ctx, name, NULL, type);
405     }
406 adx 30
407 michael 4311 /*
408     * gethost_byaddr - get host name from address
409     */
410     void
411     gethost_byaddr(dns_callback_fnc callback, void *ctx, const struct irc_ssaddr *addr)
412     {
413     do_query_number(callback, ctx, addr, NULL);
414 adx 30 }
415    
416     static void
417     resend_query(struct reslist *request)
418     {
419 michael 982 switch (request->type)
420 adx 30 {
421     case T_PTR:
422 michael 992 do_query_number(NULL, NULL, &request->addr, request);
423 adx 30 break;
424     case T_A:
425 michael 4449 case T_AAAA:
426 michael 992 do_query_name(NULL, NULL, request->name, request, request->type);
427 adx 30 break;
428     default:
429     break;
430     }
431     }
432    
433     /*
434     * proc_answer - process name server reply
435     */
436     static int
437 michael 4457 proc_answer(struct reslist *request, HEADER *header, unsigned char *buf, unsigned char *eob)
438 adx 30 {
439 michael 4408 char hostbuf[RFC1035_MAX_DOMAIN_LENGTH + 100]; /* working buffer */
440 michael 4457 unsigned char *current = buf + sizeof(HEADER); /* current position in buf */
441 michael 4456 unsigned int type = 0; /* answer type */
442     unsigned int rd_length = 0;
443 adx 30 int n; /* temp count */
444     struct sockaddr_in *v4; /* conversion */
445     struct sockaddr_in6 *v6;
446 michael 4415
447 adx 30 for (; header->qdcount > 0; --header->qdcount)
448     {
449 michael 4457 if ((n = irc_dn_skipname(current, eob)) < 0)
450 adx 30 break;
451    
452 michael 1124 current += (size_t)n + QFIXEDSZ;
453 adx 30 }
454    
455     /*
456 michael 4298 * Process each answer sent to us blech.
457 adx 30 */
458 michael 4457 while (header->ancount > 0 && current < eob)
459 adx 30 {
460     header->ancount--;
461    
462 michael 4457 n = irc_dn_expand(buf, eob, current, hostbuf, sizeof(hostbuf));
463 adx 30
464 michael 4298 if (n < 0 /* Broken message */ || n == 0 /* No more answers left */)
465 michael 1124 return 0;
466 adx 30
467 michael 4408 hostbuf[RFC1035_MAX_DOMAIN_LENGTH] = '\0';
468 adx 30
469 michael 4298 /*
470     * With Address arithmetic you have to be very anal
471 adx 30 * this code was not working on alpha due to that
472     * (spotted by rodder/jailbird/dianora)
473     */
474 michael 3298 current += (size_t)n;
475 adx 30
476 michael 4457 if (!((current + ANSWER_FIXED_SIZE) < eob))
477 adx 30 break;
478    
479     type = irc_ns_get16(current);
480     current += TYPE_SIZE;
481     current += CLASS_SIZE;
482     current += TTL_SIZE;
483     rd_length = irc_ns_get16(current);
484     current += RDLENGTH_SIZE;
485    
486 michael 2916 /*
487     * Wait to set request->type until we verify this structure
488 adx 30 */
489     switch (type)
490     {
491     case T_A:
492     if (request->type != T_A)
493 michael 1124 return 0;
494 adx 30
495     /*
496 michael 3298 * Check for invalid rd_length or too many addresses
497 adx 30 */
498     if (rd_length != sizeof(struct in_addr))
499 michael 1124 return 0;
500    
501 adx 30 v4 = (struct sockaddr_in *)&request->addr;
502     request->addr.ss_len = sizeof(struct sockaddr_in);
503     v4->sin_family = AF_INET;
504     memcpy(&v4->sin_addr, current, sizeof(struct in_addr));
505 michael 1124 return 1;
506 adx 30 break;
507     case T_AAAA:
508     if (request->type != T_AAAA)
509 michael 1124 return 0;
510    
511 adx 30 if (rd_length != sizeof(struct in6_addr))
512 michael 1124 return 0;
513    
514 adx 30 request->addr.ss_len = sizeof(struct sockaddr_in6);
515     v6 = (struct sockaddr_in6 *)&request->addr;
516     v6->sin6_family = AF_INET6;
517     memcpy(&v6->sin6_addr, current, sizeof(struct in6_addr));
518 michael 1124 return 1;
519 adx 30 break;
520     case T_PTR:
521     if (request->type != T_PTR)
522 michael 1124 return 0;
523    
524 michael 4457 n = irc_dn_expand(buf, eob, current, hostbuf, sizeof(hostbuf));
525 michael 4298 if (n < 0 /* Broken message */ || n == 0 /* No more answers left */)
526 michael 1124 return 0;
527 adx 30
528 michael 4408 request->namelength = strlcpy(request->name, hostbuf, sizeof(request->name));
529 michael 1124 return 1;
530 adx 30 break;
531 michael 4452 case T_CNAME:
532 adx 30 current += rd_length;
533     break;
534 michael 2916
535 adx 30 default:
536     /* XXX I'd rather just throw away the entire bogus thing
537     * but its possible its just a broken nameserver with still
538     * valid answers. But lets do some rudimentary logging for now...
539     */
540 michael 1247 ilog(LOG_TYPE_IRCD, "irc_res.c bogus type %d", type);
541 adx 30 break;
542     }
543     }
544    
545 michael 1124 return 1;
546 adx 30 }
547    
548     /*
549     * res_readreply - read a dns reply from the nameserver and process it.
550     */
551     static void
552     res_readreply(fde_t *fd, void *data)
553     {
554 michael 4457 unsigned char buf[sizeof(HEADER) + MAXPACKET];
555 adx 30 HEADER *header;
556     struct reslist *request = NULL;
557 michael 4303 ssize_t rc = 0;
558 adx 30 socklen_t len = sizeof(struct irc_ssaddr);
559     struct irc_ssaddr lsin;
560    
561 michael 4317 while ((rc = recvfrom(fd->fd, buf, sizeof(buf), 0, (struct sockaddr *)&lsin, &len)) != -1)
562     {
563     if (rc <= (ssize_t)sizeof(HEADER))
564     continue;
565 adx 30
566 michael 4317 /*
567     * Check against possibly fake replies
568     */
569     if (!res_ourserver(&lsin))
570     continue;
571 michael 984
572 michael 4317 /*
573     * Convert DNS reply reader from Network byte order to CPU byte order.
574     */
575     header = (HEADER *)buf;
576     header->ancount = ntohs(header->ancount);
577     header->qdcount = ntohs(header->qdcount);
578     header->nscount = ntohs(header->nscount);
579     header->arcount = ntohs(header->arcount);
580 adx 30
581 michael 4317 /*
582     * Response for an id which we have already received an answer for
583     * just ignore this response.
584     */
585     if ((request = find_id(header->id)) == NULL)
586     continue;
587 michael 4237
588 michael 4449 if (header->rcode != NO_ERRORS || header->ancount == 0)
589 michael 4317 {
590 michael 4449 /*
591     * If a bad error was returned, stop here and don't
592     * send any more (no retries granted).
593     */
594     (*request->callback)(request->callback_ctx, NULL, NULL, 0);
595     rem_request(request);
596 michael 4317 continue;
597     }
598 adx 30
599 michael 4317 /*
600     * If this fails there was an error decoding the received packet.
601     * We only give it one shot. If it fails, just leave the client
602     * unresolved.
603     */
604     if (!proc_answer(request, header, buf, buf + rc))
605 db 155 {
606 michael 4408 (*request->callback)(request->callback_ctx, NULL, NULL, 0);
607 michael 984 rem_request(request);
608 michael 4317 continue;
609 michael 984 }
610 michael 4317
611     if (request->type == T_PTR)
612 michael 984 {
613 michael 4408 if (request->namelength == 0)
614 michael 4317 {
615     /*
616     * Got a PTR response with no name, something bogus is happening
617     * don't bother trying again, the client address doesn't resolve
618     */
619 michael 4408 (*request->callback)(request->callback_ctx, NULL, NULL, 0);
620 michael 4317 rem_request(request);
621     continue;
622     }
623    
624 michael 2916 /*
625 michael 4317 * Lookup the 'authoritative' name that we were given for the ip#.
626 adx 30 */
627 michael 4317 if (request->addr.ss.ss_family == AF_INET6)
628     gethost_byname_type(request->callback, request->callback_ctx, request->name, T_AAAA);
629     else
630 michael 4415 gethost_byname_type(request->callback, request->callback_ctx, request->name, T_A);
631 michael 4317 rem_request(request);
632 michael 984 }
633 michael 4317 else
634 adx 30 {
635     /*
636 michael 4317 * Got a name and address response, client resolved
637 adx 30 */
638 michael 4408 (*request->callback)(request->callback_ctx, &request->addr, request->name, request->namelength);
639 adx 30 rem_request(request);
640     }
641 michael 4316
642 michael 4317 continue;
643 adx 30 }
644 michael 4317
645     comm_setselect(fd, COMM_SELECT_READ, res_readreply, NULL, 0);
646 adx 30 }
647    
648     void
649     report_dns_servers(struct Client *source_p)
650     {
651 michael 3235 char ipaddr[HOSTIPLEN + 1] = "";
652 adx 30
653 michael 3297 for (unsigned int i = 0; i < irc_nscount; ++i)
654 adx 30 {
655 michael 1123 getnameinfo((struct sockaddr *)&(irc_nsaddr_list[i]),
656     irc_nsaddr_list[i].ss_len, ipaddr,
657     sizeof(ipaddr), NULL, 0, NI_NUMERICHOST);
658 michael 3109 sendto_one_numeric(source_p, &me, RPL_STATSALINE, ipaddr);
659 adx 30 }
660     }
661 michael 4311
662     /*
663     * timeout_query_list - Remove queries from the list which have been
664     * there too long without being resolved.
665     */
666     static time_t
667     timeout_query_list(void)
668     {
669     dlink_node *ptr = NULL, *ptr_next = NULL;
670     struct reslist *request = NULL;
671     time_t next_time = 0;
672     time_t timeout = 0;
673    
674     DLINK_FOREACH_SAFE(ptr, ptr_next, request_list.head)
675     {
676     request = ptr->data;
677     timeout = request->sentat + request->timeout;
678    
679     if (CurrentTime >= timeout)
680     {
681     if (--request->retries <= 0)
682     {
683 michael 4408 (*request->callback)(request->callback_ctx, NULL, NULL, 0);
684 michael 4311 rem_request(request);
685     continue;
686     }
687     else
688     {
689     request->sentat = CurrentTime;
690     request->timeout += request->timeout;
691     resend_query(request);
692     }
693     }
694    
695     if (next_time == 0 || timeout < next_time)
696     next_time = timeout;
697     }
698    
699     return (next_time > CurrentTime) ? next_time : (CurrentTime + AR_TTL);
700     }
701    
702     /*
703     * timeout_resolver - check request list
704     */
705     static void
706 michael 4439 timeout_resolver(void *unused)
707 michael 4311 {
708     timeout_query_list();
709     }
710    
711     /*
712     * init_resolver - initialize resolver and resolver library
713     */
714     void
715     init_resolver(void)
716     {
717     static struct event event_timeout_resolver =
718     {
719     .name = "timeout_resolver",
720     .handler = timeout_resolver,
721     .when = 1
722     };
723    
724     dns_pool = mp_pool_new(sizeof(struct reslist), MP_CHUNK_SIZE_DNS);
725 michael 4420
726 michael 4311 start_resolver();
727     event_add(&event_timeout_resolver, NULL);
728     }

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision