2006-06-05 13:38:10 +00:00
|
|
|
/*
|
2006-06-05 14:15:53 +00:00
|
|
|
* Copyright (c) 2006 Bjorn Andersson <flex@kryo.se>, Erik Ekman <yarrick@kryo.se>
|
2006-06-05 13:38:10 +00:00
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <arpa/nameser.h>
|
2006-06-24 23:38:22 +00:00
|
|
|
#ifdef DARWIN
|
|
|
|
#include <arpa/nameser8_compat.h>
|
|
|
|
#endif
|
2006-06-05 14:13:32 +00:00
|
|
|
#include <netdb.h>
|
2006-06-05 13:38:10 +00:00
|
|
|
#include <time.h>
|
|
|
|
#include <err.h>
|
|
|
|
#include <stdio.h>
|
2006-11-07 22:54:29 +00:00
|
|
|
#include <stdint.h>
|
2006-06-05 13:38:10 +00:00
|
|
|
#include <stdlib.h>
|
2006-06-24 21:11:16 +00:00
|
|
|
#include <stdint.h>
|
2006-06-05 13:38:10 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
|
2006-06-11 19:34:34 +00:00
|
|
|
#include "structs.h"
|
|
|
|
#include "dns.h"
|
2006-08-12 23:24:59 +00:00
|
|
|
#include "encoding.h"
|
2006-08-16 18:12:15 +00:00
|
|
|
#include "read.h"
|
2006-06-05 13:38:10 +00:00
|
|
|
|
2006-08-13 18:58:54 +00:00
|
|
|
// For FreeBSD
|
|
|
|
#ifndef MIN
|
|
|
|
#define MIN(a,b) ((a)<(b)?(a):(b))
|
|
|
|
#endif
|
2006-06-24 11:33:57 +00:00
|
|
|
|
2006-08-16 18:12:15 +00:00
|
|
|
|
2006-06-11 16:13:40 +00:00
|
|
|
static int dns_write(int, int, char *, int, char);
|
2006-08-16 18:12:15 +00:00
|
|
|
static void dns_query(int, int, char *, int);
|
2007-01-28 06:47:51 +00:00
|
|
|
static int decodepacket(const char*, char*, int);
|
2006-06-05 14:37:58 +00:00
|
|
|
|
2007-01-28 04:30:43 +00:00
|
|
|
static struct sockaddr_in peer;
|
|
|
|
static char topdomain[256];
|
2006-06-05 14:13:32 +00:00
|
|
|
|
2006-06-05 20:05:11 +00:00
|
|
|
// Current IP packet
|
2007-01-28 04:30:43 +00:00
|
|
|
static char activepacket[4096];
|
|
|
|
static int lastlen;
|
|
|
|
static int packetpos;
|
|
|
|
static int packetlen;
|
|
|
|
static uint16_t chunkid;
|
2006-06-05 20:05:11 +00:00
|
|
|
|
2007-01-28 04:30:43 +00:00
|
|
|
static uint16_t pingid;
|
2006-06-06 11:55:21 +00:00
|
|
|
|
2006-06-11 17:23:26 +00:00
|
|
|
|
2006-06-05 13:38:10 +00:00
|
|
|
int
|
2006-08-11 22:52:36 +00:00
|
|
|
open_dns(const char *domain, int localport, in_addr_t listen_ip)
|
2006-06-05 13:38:10 +00:00
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
int flag;
|
|
|
|
struct sockaddr_in addr;
|
|
|
|
|
2006-11-08 21:45:28 +00:00
|
|
|
memset(&addr, 0, sizeof(addr));
|
2006-06-05 13:38:10 +00:00
|
|
|
addr.sin_family = AF_INET;
|
2006-06-11 19:54:23 +00:00
|
|
|
addr.sin_port = htons(localport);
|
2006-08-16 18:12:15 +00:00
|
|
|
/* listen_ip already in network byte order from inet_addr, or 0 */
|
|
|
|
addr.sin_addr.s_addr = listen_ip;
|
2006-06-05 13:38:10 +00:00
|
|
|
|
2006-08-11 22:52:36 +00:00
|
|
|
fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
2006-06-05 13:38:10 +00:00
|
|
|
if(fd < 0) {
|
2006-06-05 15:33:29 +00:00
|
|
|
warn("socket");
|
2006-06-11 14:42:19 +00:00
|
|
|
return -1;
|
2006-06-05 13:38:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
flag = 1;
|
|
|
|
#ifdef SO_REUSEPORT
|
|
|
|
setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &flag, sizeof(flag));
|
|
|
|
#endif
|
|
|
|
setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &flag, sizeof(flag));
|
|
|
|
|
|
|
|
if(bind(fd, (struct sockaddr*)&addr, sizeof(addr)) < 0) {
|
2006-06-05 15:33:29 +00:00
|
|
|
warn("bind");
|
2006-06-11 14:42:19 +00:00
|
|
|
return -1;
|
2006-06-05 13:38:10 +00:00
|
|
|
}
|
|
|
|
|
2006-06-11 19:54:23 +00:00
|
|
|
// Save top domain used
|
2006-08-16 18:12:15 +00:00
|
|
|
strncpy(topdomain, domain, sizeof(topdomain) - 1);
|
|
|
|
topdomain[sizeof(topdomain) - 1] = '\0';
|
2006-06-11 19:54:23 +00:00
|
|
|
|
2006-06-05 13:38:10 +00:00
|
|
|
printf("Opened UDP socket\n");
|
2006-08-16 18:12:15 +00:00
|
|
|
|
2006-06-11 19:54:23 +00:00
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
dns_settarget(const char *host)
|
|
|
|
{
|
|
|
|
struct hostent *h;
|
2006-06-05 13:38:10 +00:00
|
|
|
|
2006-06-05 17:22:35 +00:00
|
|
|
// Init dns target struct
|
|
|
|
h = gethostbyname(host);
|
|
|
|
if (!h) {
|
2006-06-11 13:05:41 +00:00
|
|
|
printf("Could not resolve name %s, exiting\n", host);
|
2006-06-11 14:42:19 +00:00
|
|
|
return -1;
|
2006-06-05 17:22:35 +00:00
|
|
|
}
|
2006-06-11 19:54:23 +00:00
|
|
|
|
2006-11-08 21:45:28 +00:00
|
|
|
memset(&peer, 0, sizeof(peer));
|
2006-06-05 17:22:35 +00:00
|
|
|
peer.sin_family = AF_INET;
|
|
|
|
peer.sin_port = htons(53);
|
|
|
|
peer.sin_addr = *((struct in_addr *) h->h_addr);
|
|
|
|
|
2006-06-05 20:05:11 +00:00
|
|
|
// Init chunk id
|
|
|
|
chunkid = 0;
|
2006-06-06 11:55:21 +00:00
|
|
|
pingid = 0;
|
2006-06-05 20:05:11 +00:00
|
|
|
|
2006-06-11 19:54:23 +00:00
|
|
|
return 0;
|
2006-06-11 13:13:20 +00:00
|
|
|
}
|
|
|
|
|
2006-06-05 13:38:10 +00:00
|
|
|
void
|
|
|
|
close_dns(int fd)
|
|
|
|
{
|
|
|
|
close(fd);
|
|
|
|
}
|
2006-06-05 14:13:32 +00:00
|
|
|
|
2006-06-05 20:05:11 +00:00
|
|
|
int
|
|
|
|
dns_sending()
|
|
|
|
{
|
|
|
|
return (packetlen != 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
dns_send_chunk(int fd)
|
|
|
|
{
|
|
|
|
int avail;
|
|
|
|
char *p;
|
|
|
|
|
|
|
|
p = activepacket;
|
|
|
|
p += packetpos;
|
|
|
|
avail = packetlen - packetpos;
|
2006-06-06 15:40:06 +00:00
|
|
|
lastlen = dns_write(fd, ++chunkid, p, avail, 0);
|
2006-06-05 20:05:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
dns_handle_tun(int fd, char *data, int len)
|
|
|
|
{
|
|
|
|
memcpy(activepacket, data, MIN(len, sizeof(activepacket)));
|
|
|
|
lastlen = 0;
|
|
|
|
packetpos = 0;
|
|
|
|
packetlen = len;
|
|
|
|
|
|
|
|
dns_send_chunk(fd);
|
|
|
|
}
|
|
|
|
|
2006-06-05 14:43:04 +00:00
|
|
|
void
|
2006-06-05 15:13:30 +00:00
|
|
|
dns_ping(int dns_fd)
|
2006-06-05 14:43:04 +00:00
|
|
|
{
|
2006-06-06 17:17:05 +00:00
|
|
|
char data[2];
|
2006-06-05 20:05:11 +00:00
|
|
|
if (dns_sending()) {
|
2006-06-06 11:55:21 +00:00
|
|
|
lastlen = 0;
|
|
|
|
packetpos = 0;
|
|
|
|
packetlen = 0;
|
2006-06-05 20:05:11 +00:00
|
|
|
}
|
2006-06-06 17:17:05 +00:00
|
|
|
data[0] = (pingid & 0xFF00) >> 8;
|
|
|
|
data[1] = (pingid & 0xFF);
|
2006-06-11 16:13:40 +00:00
|
|
|
dns_write(dns_fd, ++pingid, data, 2, 'P');
|
|
|
|
}
|
|
|
|
|
2006-11-18 16:08:47 +00:00
|
|
|
void
|
|
|
|
dns_login(int dns_fd, char *login, int len)
|
|
|
|
{
|
|
|
|
char data[18];
|
|
|
|
memcpy(data, login, MIN(len, 16));
|
|
|
|
data[16] = (pingid & 0xFF00) >> 8;
|
|
|
|
data[17] = (pingid & 0xFF);
|
|
|
|
dns_write(dns_fd, ++pingid, data, 18, 'L');
|
|
|
|
}
|
|
|
|
|
2006-06-11 16:13:40 +00:00
|
|
|
void
|
2006-11-18 16:08:47 +00:00
|
|
|
dns_send_version(int dns_fd, int version)
|
2006-06-11 16:13:40 +00:00
|
|
|
{
|
2006-11-18 16:08:47 +00:00
|
|
|
char data[6];
|
|
|
|
int v;
|
|
|
|
|
|
|
|
v = htonl(version);
|
|
|
|
memcpy(data, &v, 4);
|
|
|
|
data[4] = (pingid & 0xFF00) >> 8;
|
|
|
|
data[5] = (pingid & 0xFF);
|
|
|
|
dns_write(dns_fd, ++pingid, data, 6, 'V');
|
2006-06-05 14:43:04 +00:00
|
|
|
}
|
|
|
|
|
2007-01-28 05:10:19 +00:00
|
|
|
int
|
|
|
|
dns_encode(char *buf, size_t buflen, struct query *q, int qr, char *data, size_t datalen)
|
2006-06-05 14:37:58 +00:00
|
|
|
{
|
2007-01-28 05:10:19 +00:00
|
|
|
HEADER *header;
|
|
|
|
short name;
|
2006-06-05 14:37:58 +00:00
|
|
|
char *p;
|
|
|
|
int len;
|
|
|
|
|
2007-01-28 05:10:19 +00:00
|
|
|
memset(buf, 0, buflen);
|
2006-06-05 14:37:58 +00:00
|
|
|
|
2007-01-28 05:10:19 +00:00
|
|
|
header = (HEADER*)buf;
|
|
|
|
|
|
|
|
header->id = htons(q->id);
|
|
|
|
header->qr = qr;
|
2006-06-05 14:37:58 +00:00
|
|
|
header->opcode = 0;
|
2007-01-28 05:10:19 +00:00
|
|
|
header->aa = (qr == QR_ANSWER);
|
2006-06-05 14:37:58 +00:00
|
|
|
header->tc = 0;
|
2007-01-28 05:10:19 +00:00
|
|
|
header->rd = (qr == QR_QUERY);
|
2006-06-05 14:37:58 +00:00
|
|
|
header->ra = 0;
|
|
|
|
|
|
|
|
p = buf + sizeof(HEADER);
|
|
|
|
|
2007-01-28 05:10:19 +00:00
|
|
|
switch (qr) {
|
|
|
|
case QR_ANSWER:
|
|
|
|
header->ancount = htons(1);
|
|
|
|
header->qdcount = htons(1);
|
|
|
|
|
|
|
|
name = 0xc000 | ((p - buf) & 0x3fff);
|
|
|
|
p += dns_encode_hostname(q->name, p, strlen(q->name));
|
|
|
|
putshort(&p, q->type);
|
|
|
|
putshort(&p, C_IN);
|
|
|
|
|
|
|
|
putshort(&p, name);
|
|
|
|
putshort(&p, q->type);
|
|
|
|
putshort(&p, C_IN);
|
|
|
|
putlong(&p, 0);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX: This is jidder! This is used to detect if there's packets to be sent.
|
|
|
|
*/
|
|
|
|
q->id = 0;
|
|
|
|
|
|
|
|
putshort(&p, datalen);
|
|
|
|
putdata(&p, data, datalen);
|
|
|
|
break;
|
|
|
|
case QR_QUERY:
|
|
|
|
header->qdcount = htons(1);
|
|
|
|
header->arcount = htons(1);
|
|
|
|
|
|
|
|
p += dns_encode_hostname(data, p, datalen);
|
|
|
|
|
|
|
|
putshort(&p, q->type);
|
|
|
|
putshort(&p, C_IN);
|
|
|
|
|
|
|
|
// EDNS0
|
|
|
|
putbyte(&p, 0x00); //Root
|
|
|
|
putshort(&p, 0x0029); // OPT
|
|
|
|
putshort(&p, 0x1000); // Payload size: 4096
|
|
|
|
putshort(&p, 0x0000); // Higher bits/edns version
|
|
|
|
putshort(&p, 0x8000); // Z
|
|
|
|
putshort(&p, 0x0000); // Data length
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
errx(1, "dns_encode: qr is wrong!!!");
|
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
|
|
|
|
|
|
|
len = p - buf;
|
2006-06-05 14:37:58 +00:00
|
|
|
|
2007-01-28 05:10:19 +00:00
|
|
|
return len;
|
|
|
|
}
|
2006-06-06 13:11:29 +00:00
|
|
|
|
2007-01-28 06:47:51 +00:00
|
|
|
int
|
|
|
|
dns_decode(char *buf, size_t buflen, struct query *q, int qr, char *packet, size_t packetlen)
|
|
|
|
{
|
|
|
|
char rdata[4*1024];
|
|
|
|
HEADER *header;
|
|
|
|
short qdcount;
|
|
|
|
short ancount;
|
|
|
|
char name[255];
|
|
|
|
uint32_t ttl;
|
|
|
|
short class;
|
|
|
|
short type;
|
|
|
|
char *data;
|
|
|
|
short rlen;
|
|
|
|
int id;
|
|
|
|
int rv;
|
|
|
|
|
|
|
|
rv = 0;
|
|
|
|
header = (HEADER*)packet;
|
|
|
|
|
|
|
|
if (header->qr != qr) {
|
|
|
|
warnx("header->qr does not match the requested qr");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
data = packet + sizeof(HEADER);
|
|
|
|
qdcount = ntohs(header->qdcount);
|
|
|
|
ancount = ntohs(header->ancount);
|
|
|
|
|
|
|
|
id = ntohs(header->id);
|
|
|
|
|
|
|
|
rlen = 0;
|
|
|
|
|
|
|
|
switch (qr) {
|
|
|
|
case QR_ANSWER:
|
|
|
|
if(qdcount != 1 || ancount != 1) {
|
|
|
|
warnx("no query or answer in answer");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
readname(packet, packetlen, &data, name, sizeof(name));
|
|
|
|
readshort(packet, &data, &type);
|
|
|
|
readshort(packet, &data, &class);
|
|
|
|
|
|
|
|
readname(packet, packetlen, &data, name, sizeof(name));
|
|
|
|
readshort(packet, &data, &type);
|
|
|
|
readshort(packet, &data, &class);
|
|
|
|
readlong(packet, &data, &ttl);
|
|
|
|
readshort(packet, &data, &rlen);
|
|
|
|
rv = MIN(rlen, sizeof(rdata));
|
|
|
|
readdata(packet, &data, rdata, rv);
|
|
|
|
|
|
|
|
if(type == T_NULL && rv > 2) {
|
|
|
|
rv = MIN(rv, buflen);
|
|
|
|
memcpy(buf, rdata, rv);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case QR_QUERY:
|
|
|
|
if (qdcount != 1) {
|
|
|
|
warnx("no query on query");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
readname(packet, packetlen, &data, name, sizeof(name) -1);
|
|
|
|
name[256] = 0;
|
|
|
|
readshort(packet, &data, &type);
|
|
|
|
readshort(packet, &data, &class);
|
|
|
|
|
|
|
|
strncpy(q->name, name, 257);
|
|
|
|
q->type = type;
|
|
|
|
q->id = id;
|
|
|
|
|
|
|
|
rv = decodepacket(name, buf, buflen);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
2007-01-28 05:10:19 +00:00
|
|
|
static void
|
|
|
|
dns_query(int fd, int id, char *host, int type)
|
|
|
|
{
|
|
|
|
char buf[1024];
|
|
|
|
struct query q;
|
|
|
|
int peerlen;
|
|
|
|
int len;
|
2006-06-05 14:37:58 +00:00
|
|
|
|
2007-01-28 05:10:19 +00:00
|
|
|
q.id = id;
|
|
|
|
q.type = type;
|
|
|
|
|
|
|
|
len = dns_encode(buf, sizeof(buf), &q, QR_QUERY, host, strlen(host));
|
|
|
|
|
|
|
|
peerlen = sizeof(peer);
|
2006-06-05 20:05:11 +00:00
|
|
|
sendto(fd, buf, len, 0, (struct sockaddr*)&peer, peerlen);
|
2006-06-05 14:37:58 +00:00
|
|
|
}
|
|
|
|
|
2006-06-11 16:13:40 +00:00
|
|
|
static int
|
|
|
|
dns_write(int fd, int id, char *buf, int len, char flag)
|
2006-06-05 18:36:34 +00:00
|
|
|
{
|
|
|
|
int avail;
|
2006-08-12 23:24:59 +00:00
|
|
|
int written;
|
|
|
|
int encoded;
|
2006-06-05 20:21:49 +00:00
|
|
|
char data[257];
|
2006-06-05 18:36:34 +00:00
|
|
|
char *d;
|
|
|
|
|
|
|
|
avail = 0xFF - strlen(topdomain) - 2;
|
2006-11-08 21:45:28 +00:00
|
|
|
memset(data, 0, sizeof(data));
|
2006-06-05 18:36:34 +00:00
|
|
|
d = data;
|
2006-08-12 23:24:59 +00:00
|
|
|
written = encode_data(buf, len, avail, d, flag);
|
|
|
|
encoded = strlen(data);
|
|
|
|
d += encoded;
|
2006-06-05 23:34:44 +00:00
|
|
|
if (*d != '.') {
|
|
|
|
*d++ = '.';
|
|
|
|
}
|
2006-06-05 20:21:49 +00:00
|
|
|
strncpy(d, topdomain, strlen(topdomain)+1);
|
2006-06-05 18:36:34 +00:00
|
|
|
|
2006-06-06 02:07:29 +00:00
|
|
|
dns_query(fd, id, data, T_NULL);
|
2006-08-12 23:24:59 +00:00
|
|
|
return written;
|
2006-06-05 18:36:34 +00:00
|
|
|
}
|
|
|
|
|
2006-06-05 15:13:30 +00:00
|
|
|
int
|
2006-06-05 15:36:13 +00:00
|
|
|
dns_read(int fd, char *buf, int buflen)
|
2006-06-05 15:13:30 +00:00
|
|
|
{
|
|
|
|
int r;
|
2006-08-24 21:30:19 +00:00
|
|
|
socklen_t addrlen;
|
|
|
|
char packet[64*1024];
|
|
|
|
struct sockaddr_in from;
|
|
|
|
HEADER *header;
|
|
|
|
|
|
|
|
addrlen = sizeof(struct sockaddr);
|
|
|
|
r = recvfrom(fd, packet, sizeof(packet), 0, (struct sockaddr*)&from, &addrlen);
|
|
|
|
if(r == -1) {
|
|
|
|
perror("recvfrom");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
header = (HEADER*)packet;
|
|
|
|
if (dns_sending() && chunkid == ntohs(header->id)) {
|
|
|
|
/* Got ACK on sent packet */
|
|
|
|
packetpos += lastlen;
|
|
|
|
if (packetpos == packetlen) {
|
|
|
|
/* Packet completed */
|
|
|
|
packetpos = 0;
|
|
|
|
packetlen = 0;
|
|
|
|
lastlen = 0;
|
|
|
|
} else {
|
|
|
|
/* More to send */
|
|
|
|
dns_send_chunk(fd);
|
|
|
|
}
|
|
|
|
}
|
2007-01-28 06:47:51 +00:00
|
|
|
return dns_decode(buf, buflen, NULL, QR_ANSWER, packet, r);
|
2006-06-05 15:13:30 +00:00
|
|
|
}
|
|
|
|
|
2006-11-05 11:44:43 +00:00
|
|
|
int
|
|
|
|
dns_encode_hostname(const char *host, char *buffer, int size)
|
2006-06-05 14:37:58 +00:00
|
|
|
{
|
|
|
|
char *h;
|
|
|
|
char *p;
|
|
|
|
char *word;
|
2006-11-05 11:44:43 +00:00
|
|
|
int left;
|
2006-06-05 14:37:58 +00:00
|
|
|
|
|
|
|
h = strdup(host);
|
|
|
|
memset(buffer, 0, size);
|
|
|
|
p = buffer;
|
2006-11-05 11:44:43 +00:00
|
|
|
left = size;
|
2006-06-05 14:37:58 +00:00
|
|
|
|
|
|
|
word = strtok(h, ".");
|
|
|
|
while(word) {
|
2006-11-05 11:44:43 +00:00
|
|
|
if (strlen(word) > 63 || strlen(word) > left) {
|
2007-01-28 02:01:39 +00:00
|
|
|
free(h);
|
2006-11-05 11:44:43 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
left -= (strlen(word) + 1);
|
2006-06-05 14:37:58 +00:00
|
|
|
*p++ = (char)strlen(word);
|
|
|
|
memcpy(p, word, strlen(word));
|
|
|
|
p += strlen(word);
|
|
|
|
|
|
|
|
word = strtok(NULL, ".");
|
|
|
|
}
|
|
|
|
|
|
|
|
*p++ = 0;
|
|
|
|
|
|
|
|
free(h);
|
|
|
|
|
|
|
|
return p - buffer;
|
|
|
|
}
|
2006-06-11 12:57:29 +00:00
|
|
|
|
2007-01-28 05:10:19 +00:00
|
|
|
|
2006-06-11 12:57:29 +00:00
|
|
|
void
|
2006-06-11 19:34:34 +00:00
|
|
|
dnsd_send(int fd, struct query *q, char *data, int datalen)
|
2006-06-11 12:57:29 +00:00
|
|
|
{
|
|
|
|
char buf[64*1024];
|
2007-01-28 05:10:19 +00:00
|
|
|
int len;
|
2006-06-11 12:57:29 +00:00
|
|
|
|
2007-01-28 05:10:19 +00:00
|
|
|
len = dns_encode(buf, sizeof(buf), q, QR_ANSWER, data, datalen);
|
2006-06-11 12:57:29 +00:00
|
|
|
|
2006-06-11 19:34:34 +00:00
|
|
|
sendto(fd, buf, len, 0, (struct sockaddr*)&q->from, q->fromlen);
|
2006-06-11 12:57:29 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2006-06-11 18:07:26 +00:00
|
|
|
decodepacket(const char *name, char *buf, int buflen)
|
2006-06-11 12:57:29 +00:00
|
|
|
{
|
|
|
|
int len;
|
|
|
|
char *domain;
|
|
|
|
|
|
|
|
domain = strstr(name, topdomain);
|
|
|
|
|
2006-08-12 23:24:59 +00:00
|
|
|
len = decode_data(buf, buflen, name, domain);
|
2006-06-11 18:07:26 +00:00
|
|
|
if (len == buflen)
|
|
|
|
return -1;
|
2006-06-11 12:57:29 +00:00
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2006-06-11 19:34:34 +00:00
|
|
|
dnsd_read(int fd, struct query *q, char *buf, int buflen)
|
2006-06-11 12:57:29 +00:00
|
|
|
{
|
|
|
|
struct sockaddr_in from;
|
2007-01-28 06:47:51 +00:00
|
|
|
char packet[64*1024];
|
|
|
|
socklen_t addrlen;
|
|
|
|
int len;
|
|
|
|
int rv;
|
|
|
|
int r;
|
2006-06-11 12:57:29 +00:00
|
|
|
|
|
|
|
addrlen = sizeof(struct sockaddr);
|
|
|
|
r = recvfrom(fd, packet, sizeof(packet), 0, (struct sockaddr*)&from, &addrlen);
|
|
|
|
|
2006-06-24 12:44:26 +00:00
|
|
|
if (r >= sizeof(HEADER)) {
|
2007-01-28 06:47:51 +00:00
|
|
|
len = dns_decode(buf, buflen, q, QR_QUERY, packet, r);
|
2006-06-11 12:57:29 +00:00
|
|
|
|
2007-01-28 06:47:51 +00:00
|
|
|
q->fromlen = addrlen;
|
|
|
|
memcpy((struct sockaddr*)&q->from, (struct sockaddr*)&from, addrlen);
|
|
|
|
rv = len;
|
2006-11-06 19:30:35 +00:00
|
|
|
} else if (r < 0) { // Error
|
2006-06-24 12:44:26 +00:00
|
|
|
perror("recvfrom");
|
2006-08-16 18:12:15 +00:00
|
|
|
rv = 0;
|
2006-11-06 19:30:35 +00:00
|
|
|
} else { // Packet too small to be dns protocol
|
|
|
|
rv = 0;
|
2006-06-11 12:57:29 +00:00
|
|
|
}
|
|
|
|
|
2006-08-16 18:12:15 +00:00
|
|
|
return rv;
|
2006-06-11 12:57:29 +00:00
|
|
|
}
|
2007-01-28 05:10:19 +00:00
|
|
|
|