2002-09-03 13:52:59 +02:00
|
|
|
/***************************************************************************
|
1999-12-29 15:20:26 +01:00
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2004-01-07 10:19:33 +01:00
|
|
|
* Copyright (C) 1998 - 2004, Daniel Stenberg, <daniel@haxx.se>, et al.
|
1999-12-29 15:20:26 +01:00
|
|
|
*
|
2002-09-03 13:52:59 +02:00
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
|
|
|
* are also available at http://curl.haxx.se/docs/copyright.html.
|
|
|
|
*
|
2001-01-03 10:29:33 +01:00
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
2002-09-03 13:52:59 +02:00
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
1999-12-29 15:20:26 +01:00
|
|
|
*
|
2001-01-03 10:29:33 +01:00
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
1999-12-29 15:20:26 +01:00
|
|
|
*
|
2001-01-03 10:29:33 +01:00
|
|
|
* $Id$
|
2002-09-03 13:52:59 +02:00
|
|
|
***************************************************************************/
|
1999-12-29 15:20:26 +01:00
|
|
|
|
2000-08-24 16:26:33 +02:00
|
|
|
#include "setup.h"
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
#include <string.h>
|
2000-08-23 09:23:42 +02:00
|
|
|
#include <errno.h>
|
1999-12-29 15:20:26 +01:00
|
|
|
|
2000-08-23 09:23:42 +02:00
|
|
|
#define _REENTRANT
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
#if defined(WIN32) && !defined(__GNUC__) || defined(__MINGW32__)
|
2003-10-14 14:00:45 +02:00
|
|
|
#include <malloc.h>
|
1999-12-29 15:20:26 +01:00
|
|
|
#else
|
|
|
|
#ifdef HAVE_SYS_TYPES_H
|
|
|
|
#include <sys/types.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_SYS_SOCKET_H
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#endif
|
2000-08-23 09:23:42 +02:00
|
|
|
#ifdef HAVE_NETINET_IN_H
|
1999-12-29 15:20:26 +01:00
|
|
|
#include <netinet/in.h>
|
2000-08-23 09:23:42 +02:00
|
|
|
#endif
|
|
|
|
#ifdef HAVE_NETDB_H
|
1999-12-29 15:20:26 +01:00
|
|
|
#include <netdb.h>
|
2000-08-23 09:23:42 +02:00
|
|
|
#endif
|
1999-12-29 15:20:26 +01:00
|
|
|
#ifdef HAVE_ARPA_INET_H
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#endif
|
2001-12-04 14:03:08 +01:00
|
|
|
#ifdef HAVE_STDLIB_H
|
|
|
|
#include <stdlib.h> /* required for free() prototypes */
|
|
|
|
#endif
|
2001-08-06 14:19:26 +02:00
|
|
|
#ifdef VMS
|
2002-02-20 14:46:53 +01:00
|
|
|
#include <in.h>
|
2001-08-06 14:19:26 +02:00
|
|
|
#include <inet.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#endif
|
1999-12-29 15:20:26 +01:00
|
|
|
#endif
|
|
|
|
|
2002-06-11 17:10:18 +02:00
|
|
|
#ifdef HAVE_SETJMP_H
|
|
|
|
#include <setjmp.h>
|
|
|
|
#endif
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
#include "urldata.h"
|
|
|
|
#include "sendf.h"
|
2001-09-28 09:05:26 +02:00
|
|
|
#include "hostip.h"
|
2002-01-03 11:22:59 +01:00
|
|
|
#include "hash.h"
|
2003-02-05 00:48:46 +01:00
|
|
|
#include "share.h"
|
2003-08-05 16:40:59 +02:00
|
|
|
#include "url.h"
|
1999-12-29 15:20:26 +01:00
|
|
|
|
2002-01-17 09:03:48 +01:00
|
|
|
#define _MPRINTF_REPLACE /* use our functions only */
|
|
|
|
#include <curl/mprintf.h>
|
|
|
|
|
2000-08-24 14:33:16 +02:00
|
|
|
#if defined(HAVE_INET_NTOA_R) && !defined(HAVE_INET_NTOA_R_DECL)
|
2000-05-30 00:51:13 +02:00
|
|
|
#include "inet_ntoa_r.h"
|
|
|
|
#endif
|
|
|
|
|
2000-10-09 13:12:34 +02:00
|
|
|
/* The last #include file should be: */
|
2003-06-26 13:22:12 +02:00
|
|
|
#ifdef CURLDEBUG
|
2000-10-09 13:12:34 +02:00
|
|
|
#include "memdebug.h"
|
|
|
|
#endif
|
|
|
|
|
2002-01-03 11:22:59 +01:00
|
|
|
static curl_hash hostname_cache;
|
2002-01-07 21:52:32 +01:00
|
|
|
static int host_cache_initialized;
|
2002-01-03 11:22:59 +01:00
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
static Curl_addrinfo *my_getaddrinfo(struct connectdata *conn,
|
|
|
|
char *hostname,
|
|
|
|
int port,
|
|
|
|
int *waitp);
|
|
|
|
#if !defined(HAVE_GETHOSTBYNAME_R) || defined(USE_ARES)
|
|
|
|
static struct hostent* pack_hostent(char** buf, struct hostent* orig);
|
|
|
|
#endif
|
2002-11-05 11:51:41 +01:00
|
|
|
|
2002-01-07 21:52:32 +01:00
|
|
|
void Curl_global_host_cache_init(void)
|
2002-01-03 11:22:59 +01:00
|
|
|
{
|
2002-01-07 21:52:32 +01:00
|
|
|
if (!host_cache_initialized) {
|
2002-11-26 10:41:54 +01:00
|
|
|
Curl_hash_init(&hostname_cache, 7, Curl_freednsinfo);
|
2002-01-07 21:52:32 +01:00
|
|
|
host_cache_initialized = 1;
|
|
|
|
}
|
2002-01-03 11:22:59 +01:00
|
|
|
}
|
|
|
|
|
2002-01-07 21:52:32 +01:00
|
|
|
curl_hash *Curl_global_host_cache_get(void)
|
2002-01-03 11:22:59 +01:00
|
|
|
{
|
2002-01-07 21:52:32 +01:00
|
|
|
return &hostname_cache;
|
2002-01-03 11:22:59 +01:00
|
|
|
}
|
|
|
|
|
2002-01-07 21:52:32 +01:00
|
|
|
void Curl_global_host_cache_dtor(void)
|
|
|
|
{
|
|
|
|
if (host_cache_initialized) {
|
2002-04-27 15:07:51 +02:00
|
|
|
Curl_hash_clean(&hostname_cache);
|
2002-01-07 21:55:35 +01:00
|
|
|
host_cache_initialized = 0;
|
2002-01-07 21:52:32 +01:00
|
|
|
}
|
|
|
|
}
|
2002-01-03 11:22:59 +01:00
|
|
|
|
2002-01-17 08:38:25 +01:00
|
|
|
/* count the number of characters that an integer takes up */
|
2002-01-17 07:55:37 +01:00
|
|
|
static int _num_chars(int i)
|
|
|
|
{
|
|
|
|
int chars = 0;
|
|
|
|
|
2002-01-17 08:38:25 +01:00
|
|
|
/* While the number divided by 10 is greater than one,
|
|
|
|
* re-divide the number by 10, and increment the number of
|
|
|
|
* characters by 1.
|
|
|
|
*
|
|
|
|
* this relies on the fact that for every multiple of 10,
|
|
|
|
* a new digit is added onto every number
|
|
|
|
*/
|
2002-01-17 07:55:37 +01:00
|
|
|
do {
|
|
|
|
chars++;
|
|
|
|
|
|
|
|
i = (int) i / 10;
|
2002-01-31 08:51:06 +01:00
|
|
|
} while (i >= 1);
|
2002-01-17 07:55:37 +01:00
|
|
|
|
|
|
|
return chars;
|
|
|
|
}
|
|
|
|
|
2002-01-17 08:38:25 +01:00
|
|
|
/* Create a hostcache id */
|
2002-01-17 07:55:37 +01:00
|
|
|
static char *
|
2002-11-05 11:51:41 +01:00
|
|
|
create_hostcache_id(char *server, int port, ssize_t *entry_len)
|
2002-01-17 07:55:37 +01:00
|
|
|
{
|
|
|
|
char *id = NULL;
|
|
|
|
|
2002-01-17 08:38:25 +01:00
|
|
|
/* Get the length of the new entry id */
|
2003-08-05 16:40:59 +02:00
|
|
|
*entry_len = *entry_len + /* Hostname length */
|
|
|
|
1 + /* ':' seperator */
|
|
|
|
_num_chars(port); /* number of characters the port will take up */
|
2002-01-17 08:38:25 +01:00
|
|
|
|
|
|
|
/* Allocate the new entry id */
|
|
|
|
id = malloc(*entry_len + 1);
|
2003-08-05 16:40:59 +02:00
|
|
|
if (!id)
|
2002-01-17 07:55:37 +01:00
|
|
|
return NULL;
|
|
|
|
|
2002-01-17 08:38:25 +01:00
|
|
|
/* Create the new entry */
|
|
|
|
/* If sprintf() doesn't return the entry length, that signals failure */
|
|
|
|
if (sprintf(id, "%s:%d", server, port) != *entry_len) {
|
|
|
|
/* Free the allocated id, set length to zero and return NULL */
|
|
|
|
*entry_len = 0;
|
2002-01-17 07:55:37 +01:00
|
|
|
free(id);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return id;
|
|
|
|
}
|
|
|
|
|
2002-04-27 15:07:51 +02:00
|
|
|
struct hostcache_prune_data {
|
2002-04-17 22:13:55 +02:00
|
|
|
int cache_timeout;
|
|
|
|
int now;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
2002-11-05 11:51:41 +01:00
|
|
|
hostcache_timestamp_remove(void *datap, void *hc)
|
2002-04-17 22:13:55 +02:00
|
|
|
{
|
2002-04-27 15:07:51 +02:00
|
|
|
struct hostcache_prune_data *data =
|
|
|
|
(struct hostcache_prune_data *) datap;
|
2002-11-05 11:51:41 +01:00
|
|
|
struct Curl_dns_entry *c = (struct Curl_dns_entry *) hc;
|
2002-04-17 22:13:55 +02:00
|
|
|
|
2002-11-05 11:51:41 +01:00
|
|
|
if ((data->now - c->timestamp < data->cache_timeout) ||
|
|
|
|
c->inuse) {
|
|
|
|
/* please don't remove */
|
2002-04-17 22:13:55 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2002-11-05 11:51:41 +01:00
|
|
|
/* fine, remove */
|
2002-04-17 22:13:55 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2002-04-27 15:07:51 +02:00
|
|
|
hostcache_prune(curl_hash *hostcache, int cache_timeout, int now)
|
2002-04-17 22:13:55 +02:00
|
|
|
{
|
2002-04-27 15:07:51 +02:00
|
|
|
struct hostcache_prune_data user;
|
2002-04-17 22:13:55 +02:00
|
|
|
|
|
|
|
user.cache_timeout = cache_timeout;
|
|
|
|
user.now = now;
|
|
|
|
|
2002-04-27 15:07:51 +02:00
|
|
|
Curl_hash_clean_with_criterium(hostcache,
|
2002-04-17 22:13:55 +02:00
|
|
|
(void *) &user,
|
2002-11-05 11:51:41 +01:00
|
|
|
hostcache_timestamp_remove);
|
2002-04-17 22:13:55 +02:00
|
|
|
}
|
|
|
|
|
2003-12-15 18:33:49 +01:00
|
|
|
void Curl_hostcache_prune(struct SessionHandle *data)
|
|
|
|
{
|
|
|
|
time_t now;
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_lock(data, CURL_LOCK_DATA_DNS, CURL_LOCK_ACCESS_SINGLE);
|
|
|
|
|
|
|
|
time(&now);
|
|
|
|
|
|
|
|
/* Remove outdated and unused entries from the hostcache */
|
|
|
|
hostcache_prune(data->hostcache,
|
|
|
|
data->set.dns_cache_timeout,
|
|
|
|
now);
|
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
|
|
|
|
}
|
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
#ifdef HAVE_SIGSETJMP
|
|
|
|
/* Beware this is a global and unique instance */
|
|
|
|
sigjmp_buf curl_jmpenv;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
/* When calling Curl_resolv() has resulted in a response with a returned
|
|
|
|
address, we call this function to store the information in the dns
|
|
|
|
cache etc */
|
|
|
|
|
|
|
|
static struct Curl_dns_entry *
|
|
|
|
cache_resolv_response(struct SessionHandle *data,
|
|
|
|
Curl_addrinfo *addr,
|
|
|
|
char *hostname,
|
|
|
|
int port)
|
2002-11-05 11:51:41 +01:00
|
|
|
{
|
2003-08-05 16:40:59 +02:00
|
|
|
char *entry_id;
|
2003-08-22 14:25:47 +02:00
|
|
|
ssize_t entry_len;
|
2003-08-05 16:40:59 +02:00
|
|
|
struct Curl_dns_entry *dns;
|
|
|
|
time_t now;
|
|
|
|
|
|
|
|
/* Create an entry id, based upon the hostname and port */
|
|
|
|
entry_len = strlen(hostname);
|
|
|
|
entry_id = create_hostcache_id(hostname, port, &entry_len);
|
|
|
|
/* If we can't create the entry id, fail */
|
|
|
|
if (!entry_id)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
/* Create a new cache entry */
|
|
|
|
dns = (struct Curl_dns_entry *) malloc(sizeof(struct Curl_dns_entry));
|
|
|
|
if (!dns) {
|
|
|
|
Curl_freeaddrinfo(addr);
|
|
|
|
free(entry_id);
|
|
|
|
return NULL;
|
2002-11-05 11:51:41 +01:00
|
|
|
}
|
|
|
|
|
2003-09-14 23:17:54 +02:00
|
|
|
dns->inuse = 0; /* init to not used */
|
|
|
|
dns->addr = addr; /* this is the address(es) */
|
|
|
|
|
|
|
|
/* Store the resolved data in our DNS cache. This function may return a
|
|
|
|
pointer to an existing struct already present in the hash, and it may
|
|
|
|
return the same argument we pass in. Make no assumptions. */
|
2003-12-15 16:22:10 +01:00
|
|
|
dns = Curl_hash_add(data->hostcache, entry_id, entry_len+1, (void *)dns);
|
2003-09-14 23:17:54 +02:00
|
|
|
if(!dns) {
|
2003-12-15 16:22:10 +01:00
|
|
|
/* Major badness, run away. When this happens, the 'dns' data has
|
|
|
|
already been cleared up by Curl_hash_add(). */
|
2003-09-14 23:17:54 +02:00
|
|
|
free(entry_id);
|
|
|
|
return NULL;
|
|
|
|
}
|
2003-08-05 16:40:59 +02:00
|
|
|
time(&now);
|
|
|
|
|
2003-09-14 23:17:54 +02:00
|
|
|
dns->timestamp = now; /* used now */
|
2003-08-05 16:40:59 +02:00
|
|
|
dns->inuse++; /* mark entry as in-use */
|
|
|
|
|
|
|
|
/* free the allocated entry_id again */
|
|
|
|
free(entry_id);
|
|
|
|
|
|
|
|
return dns;
|
2002-01-17 08:38:25 +01:00
|
|
|
}
|
2002-01-17 07:55:37 +01:00
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
/* Resolve a name and return a pointer in the 'entry' argument if one
|
|
|
|
is available.
|
2002-06-11 17:10:18 +02:00
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
Return codes:
|
|
|
|
|
|
|
|
-1 = error, no pointer
|
|
|
|
0 = OK, pointer provided
|
|
|
|
1 = waiting for response, no pointer
|
|
|
|
*/
|
|
|
|
int Curl_resolv(struct connectdata *conn,
|
|
|
|
char *hostname,
|
|
|
|
int port,
|
|
|
|
struct Curl_dns_entry **entry)
|
2002-01-03 11:22:59 +01:00
|
|
|
{
|
2002-01-17 08:38:25 +01:00
|
|
|
char *entry_id = NULL;
|
2002-11-05 11:51:41 +01:00
|
|
|
struct Curl_dns_entry *dns = NULL;
|
2002-01-17 09:03:48 +01:00
|
|
|
ssize_t entry_len;
|
2003-08-05 16:40:59 +02:00
|
|
|
int wait;
|
|
|
|
struct SessionHandle *data = conn->data;
|
2003-11-14 12:56:15 +01:00
|
|
|
CURLcode result;
|
2003-08-05 16:40:59 +02:00
|
|
|
|
|
|
|
/* default to failure */
|
|
|
|
int rc = -1;
|
|
|
|
*entry = NULL;
|
2002-01-08 05:26:47 +01:00
|
|
|
|
2002-06-11 17:10:18 +02:00
|
|
|
#ifdef HAVE_SIGSETJMP
|
2002-11-05 11:51:41 +01:00
|
|
|
/* this allows us to time-out from the name resolver, as the timeout
|
|
|
|
will generate a signal and we will siglongjmp() from that here */
|
|
|
|
if(!data->set.no_signal && sigsetjmp(curl_jmpenv, 1)) {
|
2002-06-11 17:10:18 +02:00
|
|
|
/* this is coming from a siglongjmp() */
|
2003-04-03 18:11:47 +02:00
|
|
|
failf(data, "name lookup timed out");
|
2003-08-05 16:40:59 +02:00
|
|
|
return -1;
|
2002-06-11 17:10:18 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2002-01-17 08:38:25 +01:00
|
|
|
/* Create an entry id, based upon the hostname and port */
|
|
|
|
entry_len = strlen(hostname);
|
2002-11-05 11:51:41 +01:00
|
|
|
entry_id = create_hostcache_id(hostname, port, &entry_len);
|
|
|
|
/* If we can't create the entry id, fail */
|
|
|
|
if (!entry_id)
|
2003-08-05 16:40:59 +02:00
|
|
|
return -1;
|
2003-02-05 00:48:46 +01:00
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_lock(data, CURL_LOCK_DATA_DNS, CURL_LOCK_ACCESS_SINGLE);
|
|
|
|
|
2002-01-08 05:26:47 +01:00
|
|
|
/* See if its already in our dns cache */
|
2002-11-05 11:51:41 +01:00
|
|
|
dns = Curl_hash_pick(data->hostcache, entry_id, entry_len+1);
|
2003-10-12 15:57:41 +02:00
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
|
2002-01-08 05:26:47 +01:00
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
/* free the allocated entry_id again */
|
|
|
|
free(entry_id);
|
|
|
|
|
2002-11-05 11:51:41 +01:00
|
|
|
if (!dns) {
|
2003-08-05 16:40:59 +02:00
|
|
|
/* The entry was not in the cache. Resolve it to IP address */
|
|
|
|
|
|
|
|
/* If my_getaddrinfo() returns NULL, 'wait' might be set to a non-zero
|
|
|
|
value indicating that we need to wait for the response to the resolve
|
|
|
|
call */
|
|
|
|
Curl_addrinfo *addr = my_getaddrinfo(conn, hostname, port, &wait);
|
2002-11-05 11:51:41 +01:00
|
|
|
|
|
|
|
if (!addr) {
|
2003-10-04 16:50:45 +02:00
|
|
|
if(wait) {
|
2003-08-05 16:40:59 +02:00
|
|
|
/* the response to our resolve call will come asynchronously at
|
|
|
|
a later time, good or bad */
|
2003-10-04 16:50:45 +02:00
|
|
|
/* First, check that we haven't received the info by now */
|
2003-11-14 12:56:15 +01:00
|
|
|
result = Curl_is_resolved(conn, &dns);
|
|
|
|
if(result) /* error detected */
|
|
|
|
return -1;
|
2003-10-04 16:50:45 +02:00
|
|
|
if(dns)
|
|
|
|
rc = 0; /* pointer provided */
|
|
|
|
else
|
|
|
|
rc = 1; /* no info yet */
|
|
|
|
}
|
2002-11-05 11:51:41 +01:00
|
|
|
}
|
2003-08-05 16:40:59 +02:00
|
|
|
else
|
2003-10-12 15:57:41 +02:00
|
|
|
{
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_lock(data, CURL_LOCK_DATA_DNS, CURL_LOCK_ACCESS_SINGLE);
|
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
/* we got a response, store it in the cache */
|
|
|
|
dns = cache_resolv_response(data, addr, hostname, port);
|
2003-10-12 15:57:41 +02:00
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
|
2003-10-24 14:57:23 +02:00
|
|
|
|
|
|
|
if(!dns) {
|
|
|
|
/* returned failure, bail out nicely */
|
|
|
|
Curl_freeaddrinfo(addr);
|
|
|
|
}
|
2003-12-03 08:55:51 +01:00
|
|
|
else
|
|
|
|
rc = 0;
|
2003-10-12 15:57:41 +02:00
|
|
|
}
|
2002-01-17 08:38:25 +01:00
|
|
|
}
|
2002-01-08 05:26:47 +01:00
|
|
|
|
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
*entry = dns;
|
2002-01-03 11:22:59 +01:00
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
return rc;
|
2002-01-03 11:22:59 +01:00
|
|
|
}
|
|
|
|
|
2003-02-05 00:48:46 +01:00
|
|
|
void Curl_resolv_unlock(struct SessionHandle *data, struct Curl_dns_entry *dns)
|
|
|
|
{
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_lock(data, CURL_LOCK_DATA_DNS, CURL_LOCK_ACCESS_SINGLE);
|
2003-07-23 14:55:24 +02:00
|
|
|
|
2003-02-05 00:48:46 +01:00
|
|
|
dns->inuse--;
|
2003-07-23 14:55:24 +02:00
|
|
|
|
2003-02-05 00:48:46 +01:00
|
|
|
if(data->share)
|
|
|
|
Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
|
2003-07-23 14:55:24 +02:00
|
|
|
|
2003-02-05 00:48:46 +01:00
|
|
|
}
|
|
|
|
|
2001-10-04 15:36:11 +02:00
|
|
|
/*
|
|
|
|
* This is a wrapper function for freeing name information in a protocol
|
|
|
|
* independent way. This takes care of using the appropriate underlaying
|
2002-11-26 10:41:54 +01:00
|
|
|
* function.
|
2001-10-04 15:36:11 +02:00
|
|
|
*/
|
2002-11-26 10:41:54 +01:00
|
|
|
void Curl_freeaddrinfo(Curl_addrinfo *p)
|
2001-10-04 15:36:11 +02:00
|
|
|
{
|
|
|
|
#ifdef ENABLE_IPV6
|
2002-11-26 10:41:54 +01:00
|
|
|
freeaddrinfo(p);
|
2001-10-04 15:36:11 +02:00
|
|
|
#else
|
2003-08-05 16:40:59 +02:00
|
|
|
free(p); /* works fine for the ARES case too */
|
2001-10-04 15:36:11 +02:00
|
|
|
#endif
|
2002-11-26 10:41:54 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Free a cache dns entry.
|
|
|
|
*/
|
|
|
|
void Curl_freednsinfo(void *freethis)
|
|
|
|
{
|
|
|
|
struct Curl_dns_entry *p = (struct Curl_dns_entry *) freethis;
|
|
|
|
|
|
|
|
Curl_freeaddrinfo(p->addr);
|
2002-01-08 05:26:47 +01:00
|
|
|
|
|
|
|
free(p);
|
2001-10-04 15:36:11 +02:00
|
|
|
}
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
/* --- resolve name or IP-number --- */
|
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
/* Allocate enough memory to hold the full name information structs and
|
|
|
|
* everything. OSF1 is known to require at least 8872 bytes. The buffer
|
|
|
|
* required for storing all possible aliases and IP numbers is according to
|
|
|
|
* Stevens' Unix Network Programming 2nd edition, p. 304: 8192 bytes!
|
|
|
|
*/
|
|
|
|
#define CURL_NAMELOOKUP_SIZE 9000
|
|
|
|
|
|
|
|
#ifdef USE_ARES
|
|
|
|
|
|
|
|
CURLcode Curl_multi_ares_fdset(struct connectdata *conn,
|
|
|
|
fd_set *read_fd_set,
|
|
|
|
fd_set *write_fd_set,
|
|
|
|
int *max_fdp)
|
|
|
|
|
|
|
|
{
|
|
|
|
int max = ares_fds(conn->data->state.areschannel,
|
|
|
|
read_fd_set, write_fd_set);
|
|
|
|
*max_fdp = max;
|
|
|
|
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* called to check if the name is resolved now */
|
2003-10-04 16:50:45 +02:00
|
|
|
CURLcode Curl_is_resolved(struct connectdata *conn,
|
|
|
|
struct Curl_dns_entry **dns)
|
2003-08-05 16:40:59 +02:00
|
|
|
{
|
|
|
|
fd_set read_fds, write_fds;
|
|
|
|
static const struct timeval tv={0,0};
|
|
|
|
int count;
|
|
|
|
struct SessionHandle *data = conn->data;
|
2003-09-11 23:27:19 +02:00
|
|
|
int nfds;
|
|
|
|
|
|
|
|
FD_ZERO(&read_fds);
|
|
|
|
FD_ZERO(&write_fds);
|
|
|
|
nfds = ares_fds(data->state.areschannel, &read_fds, &write_fds);
|
2003-08-05 16:40:59 +02:00
|
|
|
|
|
|
|
count = select(nfds, &read_fds, &write_fds, NULL,
|
|
|
|
(struct timeval *)&tv);
|
|
|
|
|
|
|
|
if(count)
|
|
|
|
ares_process(data->state.areschannel, &read_fds, &write_fds);
|
|
|
|
|
2003-10-04 16:50:45 +02:00
|
|
|
*dns = NULL;
|
2003-08-20 01:23:45 +02:00
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
if(conn->async.done) {
|
2003-11-15 11:29:43 +01:00
|
|
|
/* we're done, kill the ares handle */
|
|
|
|
ares_destroy(data->state.areschannel);
|
2003-08-05 16:40:59 +02:00
|
|
|
if(!conn->async.dns)
|
|
|
|
return CURLE_COULDNT_RESOLVE_HOST;
|
2003-10-04 16:50:45 +02:00
|
|
|
*dns = conn->async.dns;
|
2003-08-05 16:40:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This is a function that locks and waits until the name resolve operation
|
|
|
|
has completed.
|
|
|
|
|
|
|
|
If 'entry' is non-NULL, make it point to the resolved dns entry
|
|
|
|
|
|
|
|
Return CURLE_COULDNT_RESOLVE_HOST if the host was not resolved, and
|
|
|
|
CURLE_OPERATION_TIMEDOUT if a time-out occurred.
|
|
|
|
*/
|
|
|
|
CURLcode Curl_wait_for_resolv(struct connectdata *conn,
|
|
|
|
struct Curl_dns_entry **entry)
|
|
|
|
{
|
|
|
|
CURLcode rc=CURLE_OK;
|
|
|
|
struct SessionHandle *data = conn->data;
|
|
|
|
|
|
|
|
/* Wait for the name resolve query to complete. */
|
|
|
|
while (1) {
|
|
|
|
int nfds=0;
|
|
|
|
fd_set read_fds, write_fds;
|
|
|
|
struct timeval *tvp, tv;
|
|
|
|
int count;
|
|
|
|
|
|
|
|
FD_ZERO(&read_fds);
|
|
|
|
FD_ZERO(&write_fds);
|
|
|
|
nfds = ares_fds(data->state.areschannel, &read_fds, &write_fds);
|
|
|
|
if (nfds == 0)
|
|
|
|
break;
|
|
|
|
tvp = ares_timeout(data->state.areschannel,
|
|
|
|
NULL, /* pass in our maximum time here */
|
|
|
|
&tv);
|
|
|
|
count = select(nfds, &read_fds, &write_fds, NULL, tvp);
|
|
|
|
if (count < 0 && errno != EINVAL)
|
|
|
|
break;
|
|
|
|
|
|
|
|
ares_process(data->state.areschannel, &read_fds, &write_fds);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Operation complete, if the lookup was successful we now have the entry
|
|
|
|
in the cache. */
|
|
|
|
|
|
|
|
/* this destroys the channel and we cannot use it anymore after this */
|
|
|
|
ares_destroy(data->state.areschannel);
|
|
|
|
|
|
|
|
if(entry)
|
|
|
|
*entry = conn->async.dns;
|
|
|
|
|
|
|
|
if(!conn->async.dns) {
|
|
|
|
/* a name was not resolved */
|
2003-09-01 10:21:08 +02:00
|
|
|
if(conn->async.done) {
|
|
|
|
failf(data, "Could not resolve host: %s", conn->name);
|
2003-08-05 16:40:59 +02:00
|
|
|
rc = CURLE_COULDNT_RESOLVE_HOST;
|
2003-09-01 10:21:08 +02:00
|
|
|
}
|
2003-08-05 16:40:59 +02:00
|
|
|
else
|
|
|
|
rc = CURLE_OPERATION_TIMEDOUT;
|
|
|
|
|
|
|
|
/* close the connection, since we can't return failure here without
|
|
|
|
cleaning up this connection properly */
|
|
|
|
Curl_disconnect(conn);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* this function gets called by ares when we got the name resolved */
|
|
|
|
static void host_callback(void *arg, /* "struct connectdata *" */
|
|
|
|
int status,
|
|
|
|
struct hostent *hostent)
|
|
|
|
{
|
|
|
|
struct connectdata *conn = (struct connectdata *)arg;
|
|
|
|
struct Curl_dns_entry *dns = NULL;
|
|
|
|
|
|
|
|
conn->async.done = TRUE;
|
|
|
|
conn->async.status = status;
|
|
|
|
|
|
|
|
if(ARES_SUCCESS == status) {
|
|
|
|
/* we got a resolved name in 'hostent' */
|
|
|
|
char *bufp = (char *)malloc(CURL_NAMELOOKUP_SIZE);
|
|
|
|
if(bufp) {
|
|
|
|
|
|
|
|
/* pack_hostent() copies to and shrinks the target buffer */
|
|
|
|
struct hostent *he = pack_hostent(&bufp, hostent);
|
|
|
|
|
2003-10-20 10:45:33 +02:00
|
|
|
struct SessionHandle *data = conn->data;
|
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_lock(data, CURL_LOCK_DATA_DNS, CURL_LOCK_ACCESS_SINGLE);
|
|
|
|
|
|
|
|
dns = cache_resolv_response(data, he,
|
2003-08-05 16:40:59 +02:00
|
|
|
conn->async.hostname, conn->async.port);
|
2003-10-20 10:45:33 +02:00
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
|
2003-08-05 16:40:59 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
conn->async.dns = dns;
|
|
|
|
|
|
|
|
/* The input hostent struct will be freed by ares when we return from this
|
|
|
|
function */
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Return name information about the given hostname and port number. If
|
|
|
|
* successful, the 'hostent' is returned and the forth argument will point to
|
|
|
|
* memory we need to free after use. That meory *MUST* be freed with
|
|
|
|
* Curl_freeaddrinfo(), nothing else.
|
|
|
|
*/
|
|
|
|
static Curl_addrinfo *my_getaddrinfo(struct connectdata *conn,
|
|
|
|
char *hostname,
|
|
|
|
int port,
|
|
|
|
int *waitp)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
char *bufp;
|
|
|
|
struct SessionHandle *data = conn->data;
|
|
|
|
|
|
|
|
rc = ares_init(&data->state.areschannel);
|
|
|
|
|
|
|
|
*waitp = FALSE;
|
|
|
|
|
|
|
|
if(!rc) {
|
|
|
|
/* only if success */
|
|
|
|
|
|
|
|
bufp = strdup(hostname);
|
|
|
|
|
|
|
|
if(bufp) {
|
|
|
|
Curl_safefree(conn->async.hostname);
|
|
|
|
conn->async.hostname = bufp;
|
|
|
|
conn->async.port = port;
|
|
|
|
conn->async.done = FALSE; /* not done */
|
|
|
|
conn->async.status = 0; /* clear */
|
|
|
|
conn->async.dns = NULL; /* clear */
|
|
|
|
|
|
|
|
ares_gethostbyname(data->state.areschannel, hostname, PF_INET,
|
|
|
|
host_callback, conn);
|
|
|
|
|
2003-10-04 16:50:45 +02:00
|
|
|
|
|
|
|
*waitp = TRUE; /* please wait for the response */
|
2003-08-05 16:40:59 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
ares_destroy(data->state.areschannel);
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL; /* no struct yet */
|
|
|
|
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
/* For builds without ARES, Curl_resolv() can never return wait==TRUE,
|
|
|
|
so this function will never be called. If it still gets called, we
|
|
|
|
return failure at once. */
|
|
|
|
CURLcode Curl_wait_for_resolv(struct connectdata *conn,
|
|
|
|
struct Curl_dns_entry **entry)
|
|
|
|
{
|
|
|
|
(void)conn;
|
|
|
|
*entry=NULL;
|
|
|
|
return CURLE_COULDNT_RESOLVE_HOST;
|
|
|
|
}
|
2003-08-06 17:26:02 +02:00
|
|
|
|
|
|
|
CURLcode Curl_multi_ares_fdset(struct connectdata *conn,
|
|
|
|
fd_set *read_fd_set,
|
|
|
|
fd_set *write_fd_set,
|
|
|
|
int *max_fdp)
|
|
|
|
{
|
|
|
|
(void)conn;
|
|
|
|
(void)read_fd_set;
|
|
|
|
(void)write_fd_set;
|
|
|
|
(void)max_fdp;
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
2003-10-04 16:50:45 +02:00
|
|
|
CURLcode Curl_is_resolved(struct connectdata *conn,
|
|
|
|
struct Curl_dns_entry **dns)
|
2003-08-06 17:26:02 +02:00
|
|
|
{
|
|
|
|
(void)conn;
|
2003-10-04 16:50:45 +02:00
|
|
|
*dns = NULL;
|
2003-08-06 17:26:02 +02:00
|
|
|
|
2003-10-04 16:50:45 +02:00
|
|
|
return CURLE_COULDNT_RESOLVE_HOST;
|
2003-08-06 17:26:02 +02:00
|
|
|
}
|
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(ENABLE_IPV6) && !defined(USE_ARES)
|
2001-10-04 15:25:12 +02:00
|
|
|
|
2003-06-26 13:22:12 +02:00
|
|
|
#ifdef CURLDEBUG
|
2001-10-04 15:25:12 +02:00
|
|
|
/* These two are strictly for memory tracing and are using the same
|
|
|
|
* style as the family otherwise present in memdebug.c. I put these ones
|
|
|
|
* here since they require a bunch of struct types I didn't wanna include
|
|
|
|
* in memdebug.c
|
|
|
|
*/
|
|
|
|
int curl_getaddrinfo(char *hostname, char *service,
|
|
|
|
struct addrinfo *hints,
|
|
|
|
struct addrinfo **result,
|
|
|
|
int line, const char *source)
|
|
|
|
{
|
|
|
|
int res=(getaddrinfo)(hostname, service, hints, result);
|
2001-10-17 14:33:35 +02:00
|
|
|
if(0 == res) {
|
2001-10-04 15:25:12 +02:00
|
|
|
/* success */
|
2001-10-17 14:33:35 +02:00
|
|
|
if(logfile)
|
|
|
|
fprintf(logfile, "ADDR %s:%d getaddrinfo() = %p\n",
|
2002-01-08 08:06:07 +01:00
|
|
|
source, line, (void *)*result);
|
2001-10-17 14:33:35 +02:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
if(logfile)
|
|
|
|
fprintf(logfile, "ADDR %s:%d getaddrinfo() failed\n",
|
|
|
|
source, line);
|
|
|
|
}
|
2001-10-04 15:25:12 +02:00
|
|
|
return res;
|
|
|
|
}
|
2001-10-17 14:33:35 +02:00
|
|
|
|
2001-10-04 15:25:12 +02:00
|
|
|
void curl_freeaddrinfo(struct addrinfo *freethis,
|
|
|
|
int line, const char *source)
|
|
|
|
{
|
|
|
|
(freeaddrinfo)(freethis);
|
2001-10-17 14:33:35 +02:00
|
|
|
if(logfile)
|
|
|
|
fprintf(logfile, "ADDR %s:%d freeaddrinfo(%p)\n",
|
2002-01-08 08:06:07 +01:00
|
|
|
source, line, (void *)freethis);
|
2001-10-04 15:25:12 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Return name information about the given hostname and port number. If
|
|
|
|
* successful, the 'addrinfo' is returned and the forth argument will point to
|
|
|
|
* memory we need to free after use. That meory *MUST* be freed with
|
|
|
|
* Curl_freeaddrinfo(), nothing else.
|
|
|
|
*/
|
2003-08-05 16:40:59 +02:00
|
|
|
static Curl_addrinfo *my_getaddrinfo(struct connectdata *conn,
|
2002-11-05 11:51:41 +01:00
|
|
|
char *hostname,
|
|
|
|
int port,
|
2003-08-05 16:40:59 +02:00
|
|
|
int *waitp)
|
2001-02-06 00:04:44 +01:00
|
|
|
{
|
|
|
|
struct addrinfo hints, *res;
|
|
|
|
int error;
|
|
|
|
char sbuf[NI_MAXSERV];
|
2003-09-19 17:16:47 +02:00
|
|
|
int s, pf;
|
2003-08-05 16:40:59 +02:00
|
|
|
struct SessionHandle *data = conn->data;
|
2002-03-15 10:54:30 +01:00
|
|
|
|
2003-08-06 17:26:02 +02:00
|
|
|
*waitp=0; /* don't wait, we have the response now */
|
|
|
|
|
2002-03-15 10:54:30 +01:00
|
|
|
/* see if we have an IPv6 stack */
|
|
|
|
s = socket(PF_INET6, SOCK_DGRAM, 0);
|
|
|
|
if (s < 0)
|
|
|
|
/* Some non-IPv6 stacks have been found to make very slow name resolves
|
|
|
|
* when PF_UNSPEC is used, so thus we switch to a mere PF_INET lookup if
|
|
|
|
* the stack seems to be a non-ipv6 one. */
|
|
|
|
pf = PF_INET;
|
2003-09-19 17:16:47 +02:00
|
|
|
else {
|
2002-03-15 10:54:30 +01:00
|
|
|
/* This seems to be an IPv6-capable stack, use PF_UNSPEC for the widest
|
|
|
|
* possible checks. And close the socket again.
|
|
|
|
*/
|
2002-04-23 01:53:49 +02:00
|
|
|
sclose(s);
|
2003-09-19 17:16:47 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Check if a more limited name resolve has been requested.
|
|
|
|
*/
|
|
|
|
switch(data->set.ip_version) {
|
|
|
|
case CURL_IPRESOLVE_V4:
|
|
|
|
pf = PF_INET;
|
|
|
|
break;
|
|
|
|
case CURL_IPRESOLVE_V6:
|
|
|
|
pf = PF_INET6;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
pf = PF_UNSPEC;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2002-03-15 10:54:30 +01:00
|
|
|
|
2001-02-06 00:04:44 +01:00
|
|
|
memset(&hints, 0, sizeof(hints));
|
2002-03-15 10:54:30 +01:00
|
|
|
hints.ai_family = pf;
|
2001-02-06 00:04:44 +01:00
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
hints.ai_flags = AI_CANONNAME;
|
|
|
|
snprintf(sbuf, sizeof(sbuf), "%d", port);
|
|
|
|
error = getaddrinfo(hostname, sbuf, &hints, &res);
|
|
|
|
if (error) {
|
2002-06-10 15:26:02 +02:00
|
|
|
infof(data, "getaddrinfo(3) failed for %s:%d\n", hostname, port);
|
2001-02-06 00:04:44 +01:00
|
|
|
return NULL;
|
|
|
|
}
|
2001-10-04 15:25:12 +02:00
|
|
|
|
2001-02-06 00:04:44 +01:00
|
|
|
return res;
|
|
|
|
}
|
2001-09-28 09:05:26 +02:00
|
|
|
#else /* following code is IPv4-only */
|
2001-02-06 00:04:44 +01:00
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
#if !defined(HAVE_GETHOSTBYNAME_R) || defined(USE_ARES)
|
2002-05-17 09:49:28 +02:00
|
|
|
static void hostcache_fixoffset(struct hostent *h, int offset);
|
2003-08-05 16:40:59 +02:00
|
|
|
/*
|
2001-10-23 14:11:43 +02:00
|
|
|
* Performs a "deep" copy of a hostent into a buffer (returns a pointer to the
|
|
|
|
* copy). Make absolutely sure the destination buffer is big enough!
|
2003-08-05 16:40:59 +02:00
|
|
|
*/
|
2002-04-22 15:31:16 +02:00
|
|
|
static struct hostent* pack_hostent(char** buf, struct hostent* orig)
|
2001-10-03 23:42:04 +02:00
|
|
|
{
|
2002-05-17 09:49:28 +02:00
|
|
|
char *bufptr;
|
|
|
|
char *newbuf;
|
2001-10-03 23:42:04 +02:00
|
|
|
struct hostent* copy;
|
|
|
|
|
|
|
|
int i;
|
2002-05-17 09:49:28 +02:00
|
|
|
char *str;
|
2001-10-03 23:42:04 +02:00
|
|
|
int len;
|
|
|
|
|
2002-04-22 15:31:16 +02:00
|
|
|
bufptr = *buf;
|
2001-10-03 23:42:04 +02:00
|
|
|
copy = (struct hostent*)bufptr;
|
|
|
|
|
|
|
|
bufptr += sizeof(struct hostent);
|
|
|
|
copy->h_name = bufptr;
|
|
|
|
len = strlen(orig->h_name) + 1;
|
|
|
|
strncpy(bufptr, orig->h_name, len);
|
|
|
|
bufptr += len;
|
|
|
|
|
2001-10-23 14:11:43 +02:00
|
|
|
/* we align on even 64bit boundaries for safety */
|
2002-04-19 13:00:26 +02:00
|
|
|
#define MEMALIGN(x) ((x)+(8-(((unsigned long)(x))&0x7)))
|
2001-10-23 14:11:43 +02:00
|
|
|
|
|
|
|
/* This must be aligned properly to work on many CPU architectures! */
|
2002-04-19 13:00:26 +02:00
|
|
|
bufptr = MEMALIGN(bufptr);
|
|
|
|
|
|
|
|
copy->h_aliases = (char**)bufptr;
|
2001-10-03 23:42:04 +02:00
|
|
|
|
|
|
|
/* Figure out how many aliases there are */
|
2003-05-20 11:41:39 +02:00
|
|
|
for (i = 0; orig->h_aliases && orig->h_aliases[i]; ++i);
|
2001-10-03 23:42:04 +02:00
|
|
|
|
|
|
|
/* Reserve room for the array */
|
|
|
|
bufptr += (i + 1) * sizeof(char*);
|
|
|
|
|
2001-10-23 14:11:43 +02:00
|
|
|
/* Clone all known aliases */
|
2003-05-20 11:41:39 +02:00
|
|
|
if(orig->h_aliases) {
|
|
|
|
for(i = 0; (str = orig->h_aliases[i]); i++) {
|
|
|
|
len = strlen(str) + 1;
|
|
|
|
strncpy(bufptr, str, len);
|
|
|
|
copy->h_aliases[i] = bufptr;
|
|
|
|
bufptr += len;
|
|
|
|
}
|
2001-10-03 23:42:04 +02:00
|
|
|
}
|
2003-05-20 11:41:39 +02:00
|
|
|
/* if(!orig->h_aliases) i was already set to 0 */
|
|
|
|
|
2001-10-23 14:11:43 +02:00
|
|
|
/* Terminate the alias list with a NULL */
|
2001-10-03 23:42:04 +02:00
|
|
|
copy->h_aliases[i] = NULL;
|
|
|
|
|
|
|
|
copy->h_addrtype = orig->h_addrtype;
|
|
|
|
copy->h_length = orig->h_length;
|
|
|
|
|
2001-10-23 14:11:43 +02:00
|
|
|
/* align it for (at least) 32bit accesses */
|
2002-04-19 13:00:26 +02:00
|
|
|
bufptr = MEMALIGN(bufptr);
|
2001-10-23 14:11:43 +02:00
|
|
|
|
2001-10-03 23:42:04 +02:00
|
|
|
copy->h_addr_list = (char**)bufptr;
|
|
|
|
|
|
|
|
/* Figure out how many addresses there are */
|
|
|
|
for (i = 0; orig->h_addr_list[i] != NULL; ++i);
|
|
|
|
|
|
|
|
/* Reserve room for the array */
|
|
|
|
bufptr += (i + 1) * sizeof(char*);
|
|
|
|
|
|
|
|
i = 0;
|
|
|
|
len = orig->h_length;
|
|
|
|
str = orig->h_addr_list[i];
|
|
|
|
while (str != NULL) {
|
|
|
|
memcpy(bufptr, str, len);
|
|
|
|
copy->h_addr_list[i] = bufptr;
|
|
|
|
bufptr += len;
|
|
|
|
str = orig->h_addr_list[++i];
|
|
|
|
}
|
|
|
|
copy->h_addr_list[i] = NULL;
|
|
|
|
|
2002-05-17 09:49:28 +02:00
|
|
|
/* now, shrink the allocated buffer to the size we actually need, which
|
|
|
|
most often is only a fraction of the original alloc */
|
|
|
|
newbuf=(char *)realloc(*buf, (int)bufptr-(int)(*buf));
|
|
|
|
|
|
|
|
/* if the alloc moved, we need to adjust things again */
|
|
|
|
if(newbuf != *buf)
|
|
|
|
hostcache_fixoffset((struct hostent*)newbuf, (int)newbuf-(int)*buf);
|
|
|
|
|
|
|
|
/* setup the return */
|
|
|
|
*buf = newbuf;
|
|
|
|
copy = (struct hostent*)newbuf;
|
|
|
|
|
2001-10-03 23:42:04 +02:00
|
|
|
return copy;
|
|
|
|
}
|
2001-10-04 15:36:11 +02:00
|
|
|
#endif
|
2001-10-03 23:42:04 +02:00
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
static void hostcache_fixoffset(struct hostent *h, int offset)
|
|
|
|
{
|
|
|
|
int i=0;
|
2003-08-21 14:07:47 +02:00
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
h->h_name=(char *)((long)h->h_name+offset);
|
2003-08-21 14:07:47 +02:00
|
|
|
if(h->h_aliases) {
|
|
|
|
/* only relocate aliases if there are any! */
|
2003-10-05 17:03:21 +02:00
|
|
|
h->h_aliases=(char **)((long)h->h_aliases+offset);
|
|
|
|
while(h->h_aliases[i]) {
|
|
|
|
h->h_aliases[i]=(char *)((long)h->h_aliases[i]+offset);
|
|
|
|
i++;
|
|
|
|
}
|
2003-08-21 14:07:47 +02:00
|
|
|
}
|
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
h->h_addr_list=(char **)((long)h->h_addr_list+offset);
|
|
|
|
i=0;
|
|
|
|
while(h->h_addr_list[i]) {
|
|
|
|
h->h_addr_list[i]=(char *)((long)h->h_addr_list[i]+offset);
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef USE_ARES
|
|
|
|
|
2003-03-19 10:16:59 +01:00
|
|
|
static char *MakeIP(unsigned long num, char *addr, int addr_len)
|
2001-09-28 09:46:39 +02:00
|
|
|
{
|
|
|
|
#if defined(HAVE_INET_NTOA) || defined(HAVE_INET_NTOA_R)
|
|
|
|
struct in_addr in;
|
|
|
|
in.s_addr = htonl(num);
|
|
|
|
|
|
|
|
#if defined(HAVE_INET_NTOA_R)
|
|
|
|
inet_ntoa_r(in,addr,addr_len);
|
|
|
|
#else
|
|
|
|
strncpy(addr,inet_ntoa(in),addr_len);
|
|
|
|
#endif
|
|
|
|
#else
|
|
|
|
unsigned char *paddr;
|
|
|
|
|
|
|
|
num = htonl(num); /* htonl() added to avoid endian probs */
|
|
|
|
paddr = (unsigned char *)#
|
|
|
|
sprintf(addr, "%u.%u.%u.%u", paddr[0], paddr[1], paddr[2], paddr[3]);
|
|
|
|
#endif
|
|
|
|
return (addr);
|
|
|
|
}
|
|
|
|
|
2002-05-01 13:36:13 +02:00
|
|
|
/* The original code to this function was once stolen from the Dancer source
|
|
|
|
code, written by Bjorn Reese, it has since been patched and modified
|
|
|
|
considerably. */
|
2003-08-05 16:40:59 +02:00
|
|
|
static Curl_addrinfo *my_getaddrinfo(struct connectdata *conn,
|
2002-11-05 11:51:41 +01:00
|
|
|
char *hostname,
|
|
|
|
int port,
|
2003-08-05 16:40:59 +02:00
|
|
|
int *waitp)
|
1999-12-29 15:20:26 +01:00
|
|
|
{
|
|
|
|
struct hostent *h = NULL;
|
2002-01-02 11:06:47 +01:00
|
|
|
in_addr_t in;
|
2000-11-21 10:29:21 +01:00
|
|
|
int ret; /* this variable is unused on several platforms but used on some */
|
2003-08-05 16:40:59 +02:00
|
|
|
struct SessionHandle *data = conn->data;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
(void)port; /* unused in IPv4 code */
|
2001-05-30 13:06:33 +02:00
|
|
|
ret = 0; /* to prevent the compiler warning */
|
|
|
|
|
2003-08-05 16:40:59 +02:00
|
|
|
*waitp = 0; /* don't wait, we act synchronously */
|
|
|
|
|
2003-05-13 14:12:17 +02:00
|
|
|
in=inet_addr(hostname);
|
|
|
|
if (in != CURL_INADDR_NONE) {
|
2000-05-30 00:51:13 +02:00
|
|
|
struct in_addr *addrentry;
|
2002-06-26 10:03:46 +02:00
|
|
|
struct namebuf {
|
|
|
|
struct hostent hostentry;
|
|
|
|
char *h_addr_list[2];
|
|
|
|
struct in_addr addrentry;
|
2002-06-26 17:39:23 +02:00
|
|
|
char h_name[128];
|
|
|
|
} *buf = (struct namebuf *)malloc(sizeof(struct namebuf));
|
2002-04-22 15:31:16 +02:00
|
|
|
if(!buf)
|
|
|
|
return NULL; /* major failure */
|
2000-05-30 00:51:13 +02:00
|
|
|
|
2002-06-26 10:03:46 +02:00
|
|
|
h = &buf->hostentry;
|
|
|
|
h->h_addr_list = &buf->h_addr_list[0];
|
|
|
|
addrentry = &buf->addrentry;
|
2000-05-30 00:51:13 +02:00
|
|
|
addrentry->s_addr = in;
|
|
|
|
h->h_addr_list[0] = (char*)addrentry;
|
|
|
|
h->h_addr_list[1] = NULL;
|
|
|
|
h->h_addrtype = AF_INET;
|
|
|
|
h->h_length = sizeof(*addrentry);
|
2002-06-26 10:03:46 +02:00
|
|
|
h->h_name = &buf->h_name[0];
|
2003-03-19 10:16:59 +01:00
|
|
|
MakeIP(ntohl(in), (char *)h->h_name, sizeof(buf->h_name));
|
2000-05-30 00:51:13 +02:00
|
|
|
}
|
2000-08-04 13:27:17 +02:00
|
|
|
#if defined(HAVE_GETHOSTBYNAME_R)
|
2000-05-30 00:51:13 +02:00
|
|
|
else {
|
|
|
|
int h_errnop;
|
2002-04-22 15:31:16 +02:00
|
|
|
int res=ERANGE;
|
|
|
|
int step_size=200;
|
|
|
|
int *buf = (int *)malloc(CURL_NAMELOOKUP_SIZE);
|
|
|
|
if(!buf)
|
|
|
|
return NULL; /* major failure */
|
|
|
|
|
2000-09-21 10:47:48 +02:00
|
|
|
/* Workaround for gethostbyname_r bug in qnx nto. It is also _required_
|
|
|
|
for some of these functions. */
|
|
|
|
memset(buf, 0, CURL_NAMELOOKUP_SIZE);
|
2000-08-04 13:27:17 +02:00
|
|
|
#ifdef HAVE_GETHOSTBYNAME_R_5
|
2000-05-31 00:27:39 +02:00
|
|
|
/* Solaris, IRIX and more */
|
2002-08-30 13:10:50 +02:00
|
|
|
(void)res; /* prevent compiler warning */
|
2002-04-22 15:31:16 +02:00
|
|
|
while(!h) {
|
|
|
|
h = gethostbyname_r(hostname,
|
|
|
|
(struct hostent *)buf,
|
|
|
|
(char *)buf + sizeof(struct hostent),
|
|
|
|
step_size - sizeof(struct hostent),
|
|
|
|
&h_errnop);
|
|
|
|
|
|
|
|
/* If the buffer is too small, it returns NULL and sets errno to
|
|
|
|
ERANGE. The errno is thread safe if this is compiled with
|
|
|
|
-D_REENTRANT as then the 'errno' variable is a macro defined to
|
|
|
|
get used properly for threads. */
|
|
|
|
|
|
|
|
if(h || (errno != ERANGE))
|
|
|
|
break;
|
|
|
|
|
|
|
|
step_size+=200;
|
|
|
|
}
|
|
|
|
|
2003-06-26 13:22:12 +02:00
|
|
|
#ifdef CURLDEBUG
|
2002-04-22 15:31:16 +02:00
|
|
|
infof(data, "gethostbyname_r() uses %d bytes\n", step_size);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if(h) {
|
2002-05-01 13:36:13 +02:00
|
|
|
int offset;
|
|
|
|
h=(struct hostent *)realloc(buf, step_size);
|
2002-06-05 15:41:33 +02:00
|
|
|
offset=(long)h-(long)buf;
|
2002-05-01 13:36:13 +02:00
|
|
|
hostcache_fixoffset(h, offset);
|
|
|
|
buf=(int *)h;
|
2002-04-22 15:31:16 +02:00
|
|
|
}
|
|
|
|
else
|
2003-08-21 14:07:47 +02:00
|
|
|
#endif /* HAVE_GETHOSTBYNAME_R_5 */
|
2000-08-04 13:27:17 +02:00
|
|
|
#ifdef HAVE_GETHOSTBYNAME_R_6
|
|
|
|
/* Linux */
|
2002-10-21 15:20:30 +02:00
|
|
|
do {
|
|
|
|
res=gethostbyname_r(hostname,
|
|
|
|
(struct hostent *)buf,
|
|
|
|
(char *)buf + sizeof(struct hostent),
|
|
|
|
step_size - sizeof(struct hostent),
|
|
|
|
&h, /* DIFFERENCE */
|
|
|
|
&h_errnop);
|
|
|
|
/* Redhat 8, using glibc 2.2.93 changed the behavior. Now all of a
|
2002-12-16 12:33:44 +01:00
|
|
|
sudden this function returns EAGAIN if the given buffer size is too
|
|
|
|
small. Previous versions are known to return ERANGE for the same
|
|
|
|
problem.
|
|
|
|
|
|
|
|
This wouldn't be such a big problem if older versions wouldn't
|
|
|
|
sometimes return EAGAIN on a common failure case. Alas, we can't
|
|
|
|
assume that EAGAIN *or* ERANGE means ERANGE for any given version of
|
|
|
|
glibc.
|
|
|
|
|
|
|
|
For now, we do that and thus we may call the function repeatedly and
|
|
|
|
fail for older glibc versions that return EAGAIN, until we run out
|
|
|
|
of buffer size (step_size grows beyond CURL_NAMELOOKUP_SIZE).
|
|
|
|
|
|
|
|
If anyone has a better fix, please tell us!
|
2003-10-28 14:06:15 +01:00
|
|
|
|
|
|
|
-------------------------------------------------------------------
|
|
|
|
|
|
|
|
On October 23rd 2003, Dan C dug up more details on the mysteries of
|
|
|
|
gethostbyname_r() in glibc:
|
|
|
|
|
|
|
|
In glibc 2.2.5 the interface is different (this has also been
|
|
|
|
discovered in glibc 2.1.1-6 as shipped by Redhat 6). What I can't
|
|
|
|
explain, is that tests performed on glibc 2.2.4-34 and 2.2.4-32
|
|
|
|
(shipped/upgraded by Redhat 7.2) don't show this behavior!
|
|
|
|
|
|
|
|
In this "buggy" version, the return code is -1 on error and 'errno'
|
|
|
|
is set to the ERANGE or EAGAIN code. Note that 'errno' is not a
|
|
|
|
thread-safe variable.
|
|
|
|
|
2002-12-16 12:33:44 +01:00
|
|
|
*/
|
2002-10-21 15:20:30 +02:00
|
|
|
|
2003-10-28 14:06:15 +01:00
|
|
|
if(((ERANGE == res) || (EAGAIN == res)) ||
|
|
|
|
((res<0) && ((ERANGE == errno) || (EAGAIN == errno))))
|
2002-10-21 15:20:30 +02:00
|
|
|
step_size+=200;
|
2003-10-28 14:06:15 +01:00
|
|
|
else
|
|
|
|
break;
|
2002-12-16 12:33:44 +01:00
|
|
|
} while(step_size <= CURL_NAMELOOKUP_SIZE);
|
2002-10-21 15:20:30 +02:00
|
|
|
|
2002-09-30 10:07:16 +02:00
|
|
|
if(!h) /* failure */
|
|
|
|
res=1;
|
2002-04-22 15:31:16 +02:00
|
|
|
|
2003-06-26 13:22:12 +02:00
|
|
|
#ifdef CURLDEBUG
|
2002-04-22 15:31:16 +02:00
|
|
|
infof(data, "gethostbyname_r() uses %d bytes\n", step_size);
|
|
|
|
#endif
|
|
|
|
if(!res) {
|
2002-05-01 13:36:13 +02:00
|
|
|
int offset;
|
|
|
|
h=(struct hostent *)realloc(buf, step_size);
|
2002-06-05 15:41:33 +02:00
|
|
|
offset=(long)h-(long)buf;
|
2002-05-01 13:36:13 +02:00
|
|
|
hostcache_fixoffset(h, offset);
|
|
|
|
buf=(int *)h;
|
2002-04-22 15:31:16 +02:00
|
|
|
}
|
|
|
|
else
|
2003-08-21 14:07:47 +02:00
|
|
|
#endif/* HAVE_GETHOSTBYNAME_R_6 */
|
2000-08-04 13:27:17 +02:00
|
|
|
#ifdef HAVE_GETHOSTBYNAME_R_3
|
2000-08-17 23:07:22 +02:00
|
|
|
/* AIX, Digital Unix, HPUX 10, more? */
|
2000-08-04 13:27:17 +02:00
|
|
|
|
2003-03-03 23:23:48 +01:00
|
|
|
/* For AIX 4.3 or later, we don't use gethostbyname_r() at all, because of
|
|
|
|
the plain fact that it does not return unique full buffers on each
|
|
|
|
call, but instead several of the pointers in the hostent structs will
|
|
|
|
point to the same actual data! This have the unfortunate down-side that
|
|
|
|
our caching system breaks down horribly. Luckily for us though, AIX 4.3
|
|
|
|
and more recent versions have a completely thread-safe libc where all
|
|
|
|
the data is stored in thread-specific memory areas making calls to the
|
|
|
|
plain old gethostbyname() work fine even for multi-threaded programs.
|
|
|
|
|
|
|
|
This AIX 4.3 or later detection is all made in the configure script.
|
|
|
|
|
|
|
|
Troels Walsted Hansen helped us work this out on March 3rd, 2003. */
|
|
|
|
|
2000-09-21 10:47:48 +02:00
|
|
|
if(CURL_NAMELOOKUP_SIZE >=
|
|
|
|
(sizeof(struct hostent)+sizeof(struct hostent_data)))
|
2000-08-04 13:27:17 +02:00
|
|
|
|
2000-09-21 10:47:48 +02:00
|
|
|
/* August 22nd, 2000: Albert Chin-A-Young brought an updated version
|
|
|
|
* that should work! September 20: Richard Prescott worked on the buffer
|
|
|
|
* size dilemma. */
|
2000-08-23 09:23:42 +02:00
|
|
|
|
2000-09-21 10:47:48 +02:00
|
|
|
ret = gethostbyname_r(hostname,
|
2002-04-22 15:31:16 +02:00
|
|
|
(struct hostent *)buf,
|
2003-03-03 23:23:48 +01:00
|
|
|
(struct hostent_data *)((char *)buf +
|
|
|
|
sizeof(struct hostent)));
|
2000-09-21 10:47:48 +02:00
|
|
|
else
|
|
|
|
ret = -1; /* failure, too smallish buffer size */
|
|
|
|
|
2000-08-23 09:23:42 +02:00
|
|
|
/* result expected in h */
|
|
|
|
h = (struct hostent*)buf;
|
2000-08-17 23:07:22 +02:00
|
|
|
h_errnop= errno; /* we don't deal with this, but set it anyway */
|
2000-08-23 09:23:42 +02:00
|
|
|
if(ret)
|
2003-08-21 14:07:47 +02:00
|
|
|
#endif /* HAVE_GETHOSTBYNAME_R_3 */
|
2000-05-31 00:27:39 +02:00
|
|
|
{
|
2000-05-30 00:51:13 +02:00
|
|
|
infof(data, "gethostbyname_r(2) failed for %s\n", hostname);
|
2000-09-18 23:16:27 +02:00
|
|
|
h = NULL; /* set return code to NULL */
|
2000-09-21 10:47:48 +02:00
|
|
|
free(buf);
|
2000-05-30 00:51:13 +02:00
|
|
|
}
|
2003-08-21 14:07:47 +02:00
|
|
|
#else /* HAVE_GETHOSTBYNAME_R */
|
2000-05-30 00:51:13 +02:00
|
|
|
else {
|
|
|
|
if ((h = gethostbyname(hostname)) == NULL ) {
|
|
|
|
infof(data, "gethostbyname(2) failed for %s\n", hostname);
|
|
|
|
}
|
2001-10-03 23:42:04 +02:00
|
|
|
else
|
2002-04-22 15:31:16 +02:00
|
|
|
{
|
|
|
|
char *buf=(char *)malloc(CURL_NAMELOOKUP_SIZE);
|
2001-10-03 23:42:04 +02:00
|
|
|
/* we make a copy of the hostent right now, right here, as the
|
|
|
|
static one we got a pointer to might get removed when we don't
|
|
|
|
want/expect that */
|
2002-04-22 15:31:16 +02:00
|
|
|
h = pack_hostent(&buf, h);
|
|
|
|
}
|
2003-08-21 14:07:47 +02:00
|
|
|
#endif /*HAVE_GETHOSTBYNAME_R */
|
1999-12-29 15:20:26 +01:00
|
|
|
}
|
2003-08-21 14:07:47 +02:00
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
return (h);
|
|
|
|
}
|
2001-09-07 06:01:32 +02:00
|
|
|
|
2001-09-28 09:05:26 +02:00
|
|
|
#endif /* end of IPv4-specific code */
|
2003-08-05 16:40:59 +02:00
|
|
|
|
|
|
|
#endif /* end of !USE_ARES */
|