blob: 7048d0ed833377895f0f811791dc4ef1c7e3ffe6 [file] [log] [blame]
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>
#include <net/if.h>
#include <arpa/inet.h>
#include <ctype.h>
#include <stdlib.h>
#include <string.h>
#include <fcntl.h>
#include <unistd.h>
#include <pthread.h>
#include <errno.h>
#include "lookup.h"
#include "stdio_impl.h"
#include "syscall.h"
static int is_valid_hostname(const char* host) {
const unsigned char* s;
if (strnlen(host, 255) - 1 >= 254 || mbstowcs(0, host, 0) == -1)
return 0;
for (s = (void*)host; *s >= 0x80 || *s == '.' || *s == '-' || isalnum(*s);
s++)
;
return !*s;
}
static int name_from_null(struct address buf[static 2],
const char* name,
int family,
int flags) {
int cnt = 0;
if (name)
return 0;
if (flags & AI_PASSIVE) {
if (family != AF_INET6)
buf[cnt++] = (struct address){.family = AF_INET};
if (family != AF_INET)
buf[cnt++] = (struct address){.family = AF_INET6};
} else {
if (family != AF_INET6)
buf[cnt++] = (struct address){.family = AF_INET, .addr = {127, 0, 0, 1}};
if (family != AF_INET)
buf[cnt++] = (struct address){.family = AF_INET6, .addr = {[15] = 1}};
}
return cnt;
}
static int name_from_numeric(struct address buf[static 1],
const char* name,
int family) {
return __lookup_ipliteral(buf, name, family);
}
static int name_from_hosts(struct address buf[static MAXADDRS],
char canon[static 256],
const char* name,
int family) {
char line[512];
size_t l = strlen(name);
int cnt = 0;
unsigned char _buf[1032];
FILE _f, *f = __fopen_rb_ca("/etc/hosts", &_f, _buf, sizeof _buf);
if (!f)
switch (errno) {
case ENOENT:
case ENOTDIR:
case EACCES:
return 0;
default:
return EAI_SYSTEM;
}
while (fgets(line, sizeof line, f) && cnt < MAXADDRS) {
char *p, *z;
if ((p = strchr(line, '#')))
*p++ = '\n', *p = 0;
for (p = line + 1;
(p = strstr(p, name)) && (!isspace(p[-1]) || !isspace(p[l])); p++)
;
if (!p)
continue;
/* Isolate IP address to parse */
for (p = line; *p && !isspace(*p); p++)
;
*p++ = 0;
if (name_from_numeric(buf + cnt, line, family))
cnt++;
/* Extract first name as canonical name */
for (; *p && isspace(*p); p++)
;
for (z = p; *z && !isspace(*z); z++)
;
*z = 0;
if (is_valid_hostname(p))
memcpy(canon, p, z - p + 1);
}
__fclose_ca(f);
return cnt;
}
struct dpc_ctx {
struct address* addrs;
char* canon;
int cnt;
};
int __dns_parse(const unsigned char*,
int,
int (*)(void*, int, const void*, int, const void*),
void*);
int __dn_expand(const unsigned char*,
const unsigned char*,
const unsigned char*,
char*,
int);
int __res_mkquery(int,
const char*,
int,
int,
const unsigned char*,
int,
const unsigned char*,
unsigned char*,
int);
int __res_msend_rc(int,
const unsigned char* const*,
const int*,
unsigned char* const*,
int*,
int,
const struct resolvconf*);
#define RR_A 1
#define RR_CNAME 5
#define RR_AAAA 28
static int dns_parse_callback(void* c,
int rr,
const void* data,
int len,
const void* packet) {
char tmp[256];
struct dpc_ctx* ctx = c;
switch (rr) {
case RR_A:
if (len != 4)
return -1;
ctx->addrs[ctx->cnt].family = AF_INET;
ctx->addrs[ctx->cnt].scopeid = 0;
memcpy(ctx->addrs[ctx->cnt++].addr, data, 4);
break;
case RR_AAAA:
if (len != 16)
return -1;
ctx->addrs[ctx->cnt].family = AF_INET6;
ctx->addrs[ctx->cnt].scopeid = 0;
memcpy(ctx->addrs[ctx->cnt++].addr, data, 16);
break;
case RR_CNAME:
if (__dn_expand(packet, (const unsigned char*)packet + 512, data, tmp,
sizeof tmp) > 0 &&
is_valid_hostname(tmp))
strcpy(ctx->canon, tmp);
break;
}
return 0;
}
static int name_from_dns(struct address buf[static MAXADDRS],
char canon[static 256],
const char* name,
int family,
const struct resolvconf* conf) {
unsigned char qbuf[2][280], abuf[2][512];
const unsigned char* qp[2] = {qbuf[0], qbuf[1]};
unsigned char* ap[2] = {abuf[0], abuf[1]};
int qlens[2], alens[2];
int i, nq = 0;
struct dpc_ctx ctx = {.addrs = buf, .canon = canon};
if (family != AF_INET6) {
qlens[nq] =
__res_mkquery(0, name, 1, RR_A, 0, 0, 0, qbuf[nq], sizeof *qbuf);
nq++;
}
if (family != AF_INET) {
qlens[nq] =
__res_mkquery(0, name, 1, RR_AAAA, 0, 0, 0, qbuf[nq], sizeof *qbuf);
nq++;
}
if (__res_msend_rc(nq, qp, qlens, ap, alens, sizeof *abuf, conf) < 0)
return EAI_SYSTEM;
for (i = 0; i < nq; i++)
__dns_parse(abuf[i], alens[i], dns_parse_callback, &ctx);
if (ctx.cnt)
return ctx.cnt;
if (alens[0] < 4 || (abuf[0][3] & 15) == 2)
return EAI_AGAIN;
if ((abuf[0][3] & 15) == 0)
return EAI_NONAME;
if ((abuf[0][3] & 15) == 3)
return 0;
return EAI_FAIL;
}
static int name_from_dns_search(struct address buf[static MAXADDRS],
char canon[static 256],
const char* name,
int family) {
char search[256];
struct resolvconf conf;
size_t l, dots;
char *p, *z;
if (__get_resolv_conf(&conf, search, sizeof search) < 0)
return -1;
/* Count dots, suppress search when >=ndots or name ends in
* a dot, which is an explicit request for global scope. */
for (dots = l = 0; name[l]; l++)
if (name[l] == '.')
dots++;
if (dots >= conf.ndots || name[l - 1] == '.')
*search = 0;
/* This can never happen; the caller already checked length. */
if (l >= 256)
return EAI_NONAME;
/* Name with search domain appended is setup in canon[]. This both
* provides the desired default canonical name (if the requested
* name is not a CNAME record) and serves as a buffer for passing
* the full requested name to name_from_dns. */
memcpy(canon, name, l);
canon[l] = '.';
for (p = search; *p; p = z) {
for (; isspace(*p); p++)
;
for (z = p; *z && !isspace(*z); z++)
;
if (z == p)
break;
if (z - p < 256 - l - 1) {
memcpy(canon + l + 1, p, z - p);
canon[z - p + 1 + l] = 0;
int cnt = name_from_dns(buf, canon, canon, family, &conf);
if (cnt)
return cnt;
}
}
canon[l] = 0;
return name_from_dns(buf, canon, name, family, &conf);
}
static const struct policy {
unsigned char addr[16];
unsigned char len, mask;
unsigned char prec, label;
} defpolicy[] = {
{"\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1", 15, 0xff, 50, 0},
{"\0\0\0\0\0\0\0\0\0\0\xff\xff", 11, 0xff, 35, 4},
{"\x20\2", 1, 0xff, 30, 2},
{"\x20\1", 3, 0xff, 5, 5},
{"\xfc", 0, 0xfe, 3, 13},
/* These are deprecated and/or returned to the address
* pool, so despite the RFC, treating them as special
* is probably wrong.
* {"", 11, 0xff, 1, 3},
* {"\xfe\xc0", 1, 0xc0, 1, 11},
* {"\x3f\xfe", 1, 0xff, 1, 12},
* Last rule must match all addresses to stop loop. */
{"", 0, 0, 40, 1},
};
static const struct policy* policyof(const struct in6_addr* a) {
int i;
for (i = 0;; i++) {
if (memcmp(a->s6_addr, defpolicy[i].addr, defpolicy[i].len))
continue;
if ((a->s6_addr[defpolicy[i].len] & defpolicy[i].mask) !=
defpolicy[i].addr[defpolicy[i].len])
continue;
return defpolicy + i;
}
}
static int labelof(const struct in6_addr* a) {
return policyof(a)->label;
}
static int scopeof(const struct in6_addr* a) {
if (IN6_IS_ADDR_MULTICAST(a))
return a->s6_addr[1] & 15;
if (IN6_IS_ADDR_LINKLOCAL(a))
return 2;
if (IN6_IS_ADDR_LOOPBACK(a))
return 2;
if (IN6_IS_ADDR_SITELOCAL(a))
return 5;
return 14;
}
static int prefixmatch(const struct in6_addr* s, const struct in6_addr* d) {
/* FIXME: The common prefix length should be limited to no greater
* than the nominal length of the prefix portion of the source
* address. However the definition of the source prefix length is
* not clear and thus this limiting is not yet implemented. */
unsigned i;
for (i = 0;
i < 128 && !((s->s6_addr[i / 8] ^ d->s6_addr[i / 8]) & (128 >> (i % 8)));
i++)
;
return i;
}
#define DAS_USABLE 0x40000000
#define DAS_MATCHINGSCOPE 0x20000000
#define DAS_MATCHINGLABEL 0x10000000
#define DAS_PREC_SHIFT 20
#define DAS_SCOPE_SHIFT 16
#define DAS_PREFIX_SHIFT 8
#define DAS_ORDER_SHIFT 0
static int addrcmp(const void* _a, const void* _b) {
const struct address *a = _a, *b = _b;
return b->sortkey - a->sortkey;
}
int __lookup_name(struct address buf[static MAXADDRS],
char canon[static 256],
const char* name,
int family,
int flags) {
int cnt = 0, i, j;
*canon = 0;
if (name) {
/* reject empty name and check len so it fits into temp bufs */
size_t l = strnlen(name, 255);
if (l - 1 >= 254)
return EAI_NONAME;
memcpy(canon, name, l + 1);
}
/* Procedurally, a request for v6 addresses with the v4-mapped
* flag set is like a request for unspecified family, followed
* by filtering of the results. */
if (flags & AI_V4MAPPED) {
if (family == AF_INET6)
family = AF_UNSPEC;
else
flags -= AI_V4MAPPED;
}
/* Try each backend until there's at least one result. */
cnt = name_from_null(buf, name, family, flags);
if (!cnt)
cnt = name_from_numeric(buf, name, family);
if (!cnt && !(flags & AI_NUMERICHOST)) {
cnt = name_from_hosts(buf, canon, name, family);
if (!cnt)
cnt = name_from_dns_search(buf, canon, name, family);
}
if (cnt <= 0)
return cnt ? cnt : EAI_NONAME;
/* Filter/transform results for v4-mapped lookup, if requested. */
if (flags & AI_V4MAPPED) {
if (!(flags & AI_ALL)) {
/* If any v6 results exist, remove v4 results. */
for (i = 0; i < cnt && buf[i].family != AF_INET6; i++)
;
if (i < cnt) {
for (j = 0; i < cnt; i++) {
if (buf[i].family == AF_INET6)
buf[j++] = buf[i];
}
cnt = i = j;
}
}
/* Translate any remaining v4 results to v6 */
for (i = 0; i < cnt; i++) {
if (buf[i].family != AF_INET)
continue;
memcpy(buf[i].addr + 12, buf[i].addr, 4);
memcpy(buf[i].addr, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12);
buf[i].family = AF_INET6;
}
}
/* No further processing is needed if there are fewer than 2
* results or if there are only IPv4 results. */
if (cnt < 2 || family == AF_INET)
return cnt;
for (i = 0; buf[i].family == AF_INET; i++)
if (i == cnt)
return cnt;
int cs;
pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, &cs);
/* The following implements a subset of RFC 3484/6724 destination
* address selection by generating a single 31-bit sort key for
* each address. Rules 3, 4, and 7 are omitted for having
* excessive runtime and code size cost and dubious benefit.
* So far the label/precedence table cannot be customized. */
for (i = 0; i < cnt; i++) {
int key = 0;
struct sockaddr_in6 sa, da = {.sin6_family = AF_INET6,
.sin6_scope_id = buf[i].scopeid,
.sin6_port = 65535};
if (buf[i].family == AF_INET6) {
memcpy(da.sin6_addr.s6_addr, buf[i].addr, 16);
} else {
memcpy(da.sin6_addr.s6_addr, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12);
memcpy(da.sin6_addr.s6_addr + 12, buf[i].addr, 4);
}
const struct policy* dpolicy = policyof(&da.sin6_addr);
int dscope = scopeof(&da.sin6_addr);
int dlabel = dpolicy->label;
int dprec = dpolicy->prec;
int prefixlen = 0;
int fd = socket(AF_INET6, SOCK_DGRAM | SOCK_CLOEXEC, IPPROTO_UDP);
if (fd >= 0) {
if (!connect(fd, (void*)&da, sizeof da)) {
key |= DAS_USABLE;
if (!getsockname(fd, (void*)&sa, &(socklen_t){sizeof sa})) {
if (dscope == scopeof(&sa.sin6_addr))
key |= DAS_MATCHINGSCOPE;
if (dlabel == labelof(&sa.sin6_addr))
key |= DAS_MATCHINGLABEL;
prefixlen = prefixmatch(&sa.sin6_addr, &da.sin6_addr);
}
}
close(fd);
}
key |= dprec << DAS_PREC_SHIFT;
key |= (15 - dscope) << DAS_SCOPE_SHIFT;
key |= prefixlen << DAS_PREFIX_SHIFT;
key |= (MAXADDRS - i) << DAS_ORDER_SHIFT;
buf[i].sortkey = key;
}
qsort(buf, cnt, sizeof *buf, addrcmp);
pthread_setcancelstate(cs, 0);
return cnt;
}