1 2 /* Copyright 1998 by the Massachusetts Institute of Technology. 3 * 4 * Permission to use, copy, modify, and distribute this 5 * software and its documentation for any purpose and without 6 * fee is hereby granted, provided that the above copyright 7 * notice appear in all copies and that both that copyright 8 * notice and this permission notice appear in supporting 9 * documentation, and that the name of M.I.T. not be used in 10 * advertising or publicity pertaining to distribution of the 11 * software without specific, written prior permission. 12 * M.I.T. makes no representations about the suitability of 13 * this software for any purpose. It is provided "as is" 14 * without express or implied warranty. 15 */ 16 17 #include "ares_setup.h" 18 19 #ifdef HAVE_SYS_SOCKET_H 20 # include <sys/socket.h> 21 #endif 22 #ifdef HAVE_NETINET_IN_H 23 # include <netinet/in.h> 24 #endif 25 #ifdef HAVE_ARPA_NAMESER_H 26 # include <arpa/nameser.h> 27 #else 28 # include "nameser.h" 29 #endif 30 #ifdef HAVE_ARPA_NAMESER_COMPAT_H 31 # include <arpa/nameser_compat.h> 32 #endif 33 34 #include <stdlib.h> 35 #include <string.h> 36 #include "ares.h" 37 #include "ares_dns.h" 38 #include "ares_private.h" 39 40 /* Header format, from RFC 1035: 41 * 1 1 1 1 1 1 42 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 43 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ 44 * | ID | 45 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ 46 * |QR| Opcode |AA|TC|RD|RA| Z | RCODE | 47 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ 48 * | QDCOUNT | 49 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ 50 * | ANCOUNT | 51 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ 52 * | NSCOUNT | 53 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ 54 * | ARCOUNT | 55 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ 56 * 57 * AA, TC, RA, and RCODE are only set in responses. Brief description 58 * of the remaining fields: 59 * ID Identifier to match responses with queries 60 * QR Query (0) or response (1) 61 * Opcode For our purposes, always QUERY 62 * RD Recursion desired 63 * Z Reserved (zero) 64 * QDCOUNT Number of queries 65 * ANCOUNT Number of answers 66 * NSCOUNT Number of name server records 67 * ARCOUNT Number of additional records 68 * 69 * Question format, from RFC 1035: 70 * 1 1 1 1 1 1 71 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 72 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ 73 * | | 74 * / QNAME / 75 * / / 76 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ 77 * | QTYPE | 78 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ 79 * | QCLASS | 80 * +--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+--+ 81 * 82 * The query name is encoded as a series of labels, each represented 83 * as a one-byte length (maximum 63) followed by the text of the 84 * label. The list is terminated by a label of length zero (which can 85 * be thought of as the root domain). 86 */ 87 88 int ares_mkquery(const char *name, int dnsclass, int type, unsigned short id, 89 int rd, unsigned char **buf, int *buflen) 90 { 91 int len; 92 unsigned char *q; 93 const char *p; 94 95 /* Set our results early, in case we bail out early with an error. */ 96 *buflen = 0; 97 *buf = NULL; 98 99 /* Compute the length of the encoded name so we can check buflen. 100 * Start counting at 1 for the zero-length label at the end. */ 101 len = 1; 102 for (p = name; *p; p++) 103 { 104 if (*p == '\\' && *(p + 1) != 0) 105 p++; 106 len++; 107 } 108 /* If there are n periods in the name, there are n + 1 labels, and 109 * thus n + 1 length fields, unless the name is empty or ends with a 110 * period. So add 1 unless name is empty or ends with a period. 111 */ 112 if (*name && *(p - 1) != '.') 113 len++; 114 115 /* Immediately reject names that are longer than the maximum of 255 116 * bytes that's specified in RFC 1035 ("To simplify implementations, 117 * the total length of a domain name (i.e., label octets and label 118 * length octets) is restricted to 255 octets or less."). We aren't 119 * doing this just to be a stickler about RFCs. For names that are 120 * too long, 'dnscache' closes its TCP connection to us immediately 121 * (when using TCP) and ignores the request when using UDP, and 122 * BIND's named returns ServFail (TCP or UDP). Sending a request 123 * that we know will cause 'dnscache' to close the TCP connection is 124 * painful, since that makes any other outstanding requests on that 125 * connection fail. And sending a UDP request that we know 126 * 'dnscache' will ignore is bad because resources will be tied up 127 * until we time-out the request. 128 */ 129 if (len > MAXCDNAME) 130 return ARES_EBADNAME; 131 132 *buflen = len + HFIXEDSZ + QFIXEDSZ; 133 *buf = malloc(*buflen); 134 if (!*buf) 135 return ARES_ENOMEM; 136 137 /* Set up the header. */ 138 q = *buf; 139 memset(q, 0, HFIXEDSZ); 140 DNS_HEADER_SET_QID(q, id); 141 DNS_HEADER_SET_OPCODE(q, QUERY); 142 if (rd) { 143 DNS_HEADER_SET_RD(q, 1); 144 } 145 else { 146 DNS_HEADER_SET_RD(q, 0); 147 } 148 DNS_HEADER_SET_QDCOUNT(q, 1); 149 150 /* A name of "." is a screw case for the loop below, so adjust it. */ 151 if (strcmp(name, ".") == 0) 152 name++; 153 154 /* Start writing out the name after the header. */ 155 q += HFIXEDSZ; 156 while (*name) 157 { 158 if (*name == '.') 159 return ARES_EBADNAME; 160 161 /* Count the number of bytes in this label. */ 162 len = 0; 163 for (p = name; *p && *p != '.'; p++) 164 { 165 if (*p == '\\' && *(p + 1) != 0) 166 p++; 167 len++; 168 } 169 if (len > MAXLABEL) 170 return ARES_EBADNAME; 171 172 /* Encode the length and copy the data. */ 173 *q++ = (unsigned char)len; 174 for (p = name; *p && *p != '.'; p++) 175 { 176 if (*p == '\\' && *(p + 1) != 0) 177 p++; 178 *q++ = *p; 179 } 180 181 /* Go to the next label and repeat, unless we hit the end. */ 182 if (!*p) 183 break; 184 name = p + 1; 185 } 186 187 /* Add the zero-length label at the end. */ 188 *q++ = 0; 189 190 /* Finish off the question with the type and class. */ 191 DNS_QUESTION_SET_TYPE(q, type); 192 DNS_QUESTION_SET_CLASS(q, dnsclass); 193 194 return ARES_SUCCESS; 195 } 196