2 * Copyright (c) 2014 Andreas Schneider <asn@samba.org>
3 * Copyright (c) 2014 Jakub Hrozek <jakub.hrozek@gmail.com>
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
18 * 3. Neither the name of the author nor the names of its contributors
19 * may be used to endorse or promote products derived from this software
20 * without specific prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38 #include <arpa/inet.h>
39 #include <netinet/in.h>
40 #include <sys/types.h>
51 /* GCC has printf type attribute check. */
52 #ifdef HAVE_ATTRIBUTE_PRINTF_FORMAT
53 #define PRINTF_ATTRIBUTE(a,b) __attribute__ ((__format__ (__printf__, a, b)))
55 #define PRINTF_ATTRIBUTE(a,b)
56 #endif /* HAVE_ATTRIBUTE_PRINTF_FORMAT */
58 #ifdef HAVE_DESTRUCTOR_ATTRIBUTE
59 #define DESTRUCTOR_ATTRIBUTE __attribute__ ((destructor))
61 #define DESTRUCTOR_ATTRIBUTE
62 #endif /* HAVE_DESTRUCTOR_ATTRIBUTE */
64 #ifndef RWRAP_DEFAULT_FAKE_TTL
65 #define RWRAP_DEFAULT_FAKE_TTL 600
66 #endif /* RWRAP_DEFAULT_FAKE_TTL */
76 # define RWRAP_LOG(...)
79 static void rwrap_log(enum rwrap_dbglvl_e dbglvl, const char *func, const char *format, ...) PRINTF_ATTRIBUTE(3, 4);
80 # define RWRAP_LOG(dbglvl, ...) rwrap_log((dbglvl), __func__, __VA_ARGS__)
82 static void rwrap_log(enum rwrap_dbglvl_e dbglvl,
84 const char *format, ...)
92 d = getenv("RESOLV_WRAPPER_DEBUGLEVEL");
98 vsnprintf(buffer, sizeof(buffer), format, va);
103 case RWRAP_LOG_ERROR:
105 "RWRAP_ERROR(%d) - %s: %s\n",
110 "RWRAP_WARN(%d) - %s: %s\n",
113 case RWRAP_LOG_DEBUG:
115 "RWRAP_DEBUG(%d) - %s: %s\n",
118 case RWRAP_LOG_TRACE:
120 "RWRAP_TRACE(%d) - %s: %s\n",
126 #endif /* NDEBUG RWRAP_LOG */
129 #define SAFE_FREE(x) do { if ((x) != NULL) {free(x); (x)=NULL;} } while(0)
132 #define NEXT_KEY(buf, key) do { \
133 (key) = (buf) ? strpbrk((buf), " \t") : NULL; \
134 if ((key) != NULL) { \
138 while ((key) != NULL \
139 && (isblank((int)(key)[0]))) { \
145 /* Prepares a fake header with a single response. Advances header_blob */
146 static ssize_t rwrap_fake_header(uint8_t **header_blob, size_t remaining,
153 /* If rdata_size is zero, the answer is empty */
154 answers = rdata_size > 0 ? 1 : 0;
156 if (remaining < NS_HFIXEDSZ) {
157 RWRAP_LOG(RWRAP_LOG_ERROR, "Buffer too small!\n");
162 memset(hb, 0, NS_HFIXEDSZ);
165 h->id = res_randomid(); /* random query ID */
166 h->qr = 1; /* response flag */
167 h->rd = 1; /* recursion desired */
168 h->ra = 1; /* resursion available */
170 h->qdcount = htons(1); /* no. of questions */
171 h->ancount = htons(answers); /* no. of answers */
173 hb += NS_HFIXEDSZ; /* move past the header */
179 static ssize_t rwrap_fake_question(const char *question,
181 uint8_t **question_ptr,
184 uint8_t *qb = *question_ptr;
187 n = ns_name_compress(question, qb, remaining, NULL, NULL);
189 RWRAP_LOG(RWRAP_LOG_ERROR,
190 "Failed to compress [%s]\n", question);
197 if (remaining < 2 * sizeof(uint16_t)) {
198 RWRAP_LOG(RWRAP_LOG_ERROR, "Buffer too small!\n");
203 NS_PUT16(ns_c_in, qb);
206 return n + 2 * sizeof(uint16_t);
209 static ssize_t rwrap_fake_rdata_common(uint16_t type,
215 uint8_t *rd = *rdata_ptr;
218 written = ns_name_compress(key, rd, remaining, NULL, NULL);
220 RWRAP_LOG(RWRAP_LOG_ERROR,
221 "Failed to compress [%s]\n", key);
225 remaining -= written;
227 if (remaining < 3 * sizeof(uint16_t) + sizeof(uint32_t)) {
228 RWRAP_LOG(RWRAP_LOG_ERROR, "Buffer too small\n");
233 NS_PUT16(ns_c_in, rd);
234 NS_PUT32(RWRAP_DEFAULT_FAKE_TTL, rd);
235 NS_PUT16(rdata_size, rd);
237 if (remaining < rdata_size) {
238 RWRAP_LOG(RWRAP_LOG_ERROR, "Buffer too small\n");
243 return written + 3 * sizeof(uint16_t) + sizeof(uint32_t);
246 static ssize_t rwrap_fake_common(uint16_t type,
247 const char *question,
249 uint8_t **answer_ptr,
252 uint8_t *a = *answer_ptr;
258 written = rwrap_fake_header(&a, remaining, rdata_size);
262 remaining -= written;
264 written = rwrap_fake_question(question, type, &a, remaining);
268 remaining -= written;
270 /* rdata_size = 0 denotes an empty answer */
271 if (rdata_size > 0) {
272 written = rwrap_fake_rdata_common(type, rdata_size, question,
283 static int rwrap_fake_a(const char *key,
288 uint8_t *a = answer_ptr;
289 struct in_addr a_rec;
294 RWRAP_LOG(RWRAP_LOG_ERROR, "Malformed record, no value!\n");
298 rc = rwrap_fake_common(ns_t_a, key, sizeof(a_rec), &a, anslen);
303 ok = inet_pton(AF_INET, value, &a_rec);
305 RWRAP_LOG(RWRAP_LOG_ERROR,
306 "Failed to convert [%s] to binary\n", value);
309 memcpy(a, &a_rec, sizeof(struct in_addr));
314 static int rwrap_fake_aaaa(const char *key,
320 struct in6_addr aaaa_rec;
325 RWRAP_LOG(RWRAP_LOG_ERROR, "Malformed record, no value!\n");
329 rc = rwrap_fake_common(ns_t_aaaa, key, sizeof(aaaa_rec), &a, anslen);
334 ok = inet_pton(AF_INET6, value, &aaaa_rec);
336 RWRAP_LOG(RWRAP_LOG_ERROR,
337 "Failed to convert [%s] to binary\n", value);
340 memcpy(a, &aaaa_rec, sizeof(struct in6_addr));
346 * Priority and weight can be omitted from the hosts file, but need to be part
349 #define DFL_SRV_PRIO 1
350 #define DFL_SRV_WEIGHT 100
352 static int rwrap_fake_srv(const char *key,
363 const char *hostname;
364 unsigned char hostname_compressed[MAXDNAME];
365 ssize_t compressed_len;
368 * Parse the value into priority, weight, port and hostname
369 * and check the validity.
372 NEXT_KEY(hostname, str_port);
373 NEXT_KEY(str_port, str_prio);
374 NEXT_KEY(str_prio, str_weight);
375 if (str_port == NULL || hostname == NULL) {
376 RWRAP_LOG(RWRAP_LOG_ERROR,
377 "Malformed SRV entry [%s]\n", value);
380 rdata_size = 3 * sizeof(uint16_t);
382 /* Prepare the data to write */
383 compressed_len = ns_name_compress(hostname,
384 hostname_compressed, MAXDNAME,
386 if (compressed_len < 0) {
389 rdata_size += compressed_len;
391 rv = rwrap_fake_common(ns_t_srv, key, rdata_size, &a, anslen);
397 NS_PUT16(atoi(str_prio), a);
399 NS_PUT16(DFL_SRV_PRIO, a);
402 NS_PUT16(atoi(str_weight), a);
404 NS_PUT16(DFL_SRV_WEIGHT, a);
406 NS_PUT16(atoi(str_port), a);
407 memcpy(a, hostname_compressed, compressed_len);
412 static int rwrap_fake_soa(const char *key,
419 const char *nameserver;
427 unsigned char nameser_compressed[MAXDNAME];
428 ssize_t compressed_ns_len;
429 unsigned char mailbox_compressed[MAXDNAME];
430 ssize_t compressed_mb_len;
433 * parse the value into nameserver, mailbox, serial, refresh,
434 * retry, expire, minimum and check the validity
437 NEXT_KEY(nameserver, mailbox);
438 NEXT_KEY(mailbox, str_serial);
439 NEXT_KEY(str_serial, str_refresh);
440 NEXT_KEY(str_refresh, str_retry);
441 NEXT_KEY(str_retry, str_expire);
442 NEXT_KEY(str_expire, str_minimum);
443 if (nameserver == NULL || mailbox == NULL || str_serial == NULL ||
444 str_refresh == NULL || str_retry == NULL || str_expire == NULL ||
447 RWRAP_LOG(RWRAP_LOG_ERROR,
448 "Malformed SOA entry [%s]\n", value);
451 rdata_size = 5 * sizeof(uint16_t);
453 compressed_ns_len = ns_name_compress(nameserver, nameser_compressed,
454 MAXDNAME, NULL, NULL);
455 if (compressed_ns_len < 0) {
458 rdata_size += compressed_ns_len;
460 compressed_mb_len = ns_name_compress(mailbox, mailbox_compressed,
461 MAXDNAME, NULL, NULL);
462 if (compressed_mb_len < 0) {
465 rdata_size += compressed_mb_len;
467 rv = rwrap_fake_common(ns_t_soa, key, rdata_size, &a, anslen);
472 memcpy(a, nameser_compressed, compressed_ns_len);
473 a += compressed_ns_len;
474 memcpy(a, mailbox_compressed, compressed_mb_len);
475 a += compressed_mb_len;
476 NS_PUT32(atoi(str_serial), a);
477 NS_PUT32(atoi(str_refresh), a);
478 NS_PUT32(atoi(str_retry), a);
479 NS_PUT32(atoi(str_expire), a);
480 NS_PUT32(atoi(str_minimum), a);
485 static int rwrap_fake_cname(const char *key,
492 unsigned char hostname_compressed[MAXDNAME];
496 RWRAP_LOG(RWRAP_LOG_ERROR, "Malformed record, no value!\n");
500 /* Prepare the data to write */
501 rdata_size = ns_name_compress(value,
502 hostname_compressed, MAXDNAME,
504 if (rdata_size < 0) {
508 rv = rwrap_fake_common(ns_t_cname, key, rdata_size, &a, anslen);
513 memcpy(a, hostname_compressed, rdata_size);
518 static int rwrap_fake_empty_query(const char *key,
525 rc = rwrap_fake_common(type, key, 0, &answer, anslen);
533 #define RESOLV_MATCH(line, name) \
534 (strncmp(line, name, sizeof(name) - 1) == 0 && \
535 (line[sizeof(name) - 1] == ' ' || \
536 line[sizeof(name) - 1] == '\t'))
538 #define TYPE_MATCH(type, ns_type, rec_type, str_type, key, query) \
539 ((type) == (ns_type) && \
540 (strncmp((rec_type), (str_type), sizeof(str_type)) == 0) && \
541 (strcasecmp(key, query)) == 0)
544 /* Reads in a file in the following format:
547 * Malformed entried are silently skipped.
548 * Allocates answer buffer of size anslen that has to be freed after use.
550 static int rwrap_res_fake_hosts(const char *hostfile,
553 unsigned char *answer,
561 char *query_name = NULL;
562 size_t qlen = strlen(query);
564 RWRAP_LOG(RWRAP_LOG_TRACE,
565 "Searching in fake hosts file %s\n", hostfile);
567 fp = fopen(hostfile, "r");
569 RWRAP_LOG(RWRAP_LOG_ERROR,
570 "Opening %s failed: %s",
571 hostfile, strerror(errno));
575 if (qlen > 0 && query[qlen-1] == '.') {
579 query_name = strndup(query, qlen);
580 if (query_name == NULL) {
584 while (fgets(buf, sizeof(buf), fp) != NULL) {
591 NEXT_KEY(rec_type, key);
592 NEXT_KEY(key, value);
595 while(q[0] != '\n' && q[0] != '\0') {
600 if (key == NULL || value == NULL) {
601 RWRAP_LOG(RWRAP_LOG_WARN,
602 "Malformed line: not enough parts, use \"rec_type key data\n"
603 "For example \"A cwrap.org 10.10.10.10\"");
607 if (TYPE_MATCH(type, ns_t_a, rec_type, "A", key, query_name)) {
608 rc = rwrap_fake_a(key, value, answer, anslen);
610 } else if (TYPE_MATCH(type, ns_t_aaaa,
611 rec_type, "AAAA", key, query_name)) {
612 rc = rwrap_fake_aaaa(key, value, answer, anslen);
614 } else if (TYPE_MATCH(type, ns_t_srv,
615 rec_type, "SRV", key, query_name)) {
616 rc = rwrap_fake_srv(key, value, answer, anslen);
618 } else if (TYPE_MATCH(type, ns_t_soa,
619 rec_type, "SOA", key, query_name)) {
620 rc = rwrap_fake_soa(key, value, answer, anslen);
622 } else if (TYPE_MATCH(type, ns_t_cname,
623 rec_type, "CNAME", key, query_name)) {
624 rc = rwrap_fake_cname(key, value, answer, anslen);
631 RWRAP_LOG(RWRAP_LOG_TRACE,
632 "Successfully faked answer for [%s]\n", query_name);
635 RWRAP_LOG(RWRAP_LOG_ERROR,
636 "Error faking answer for [%s]\n", query_name);
639 RWRAP_LOG(RWRAP_LOG_TRACE,
640 "Record for [%s] not found\n", query_name);
641 rc = rwrap_fake_empty_query(key, type, answer, anslen);
650 /*********************************************************
651 * RWRAP LOADING LIBC FUNCTIONS
652 *********************************************************/
656 struct rwrap_libc_fns {
657 int (*libc_res_init)(void);
658 int (*libc___res_init)(void);
659 int (*libc_res_ninit)(struct __res_state *state);
660 int (*libc___res_ninit)(struct __res_state *state);
661 void (*libc_res_nclose)(struct __res_state *state);
662 void (*libc___res_nclose)(struct __res_state *state);
663 void (*libc_res_close)(void);
664 void (*libc___res_close)(void);
665 int (*libc_res_nquery)(struct __res_state *state,
669 unsigned char *answer,
671 int (*libc___res_nquery)(struct __res_state *state,
675 unsigned char *answer,
677 int (*libc_res_nsearch)(struct __res_state *state,
681 unsigned char *answer,
683 int (*libc___res_nsearch)(struct __res_state *state,
687 unsigned char *answer,
693 void *libresolv_handle;
700 struct rwrap_libc_fns fns;
703 static struct rwrap rwrap;
711 static const char *rwrap_str_lib(enum rwrap_lib lib)
716 case RWRAP_LIBRESOLV:
720 /* Compiler would warn us about unhandled enum value if we get here */
725 static void *rwrap_load_lib_handle(enum rwrap_lib lib)
727 int flags = RTLD_LAZY;
732 flags |= RTLD_DEEPBIND;
736 case RWRAP_LIBRESOLV:
737 #ifdef HAVE_LIBRESOLV
738 handle = rwrap.libresolv_handle;
739 if (handle == NULL) {
740 for (i = 10; i >= 0; i--) {
741 char soname[256] = {0};
743 snprintf(soname, sizeof(soname), "libresolv.so.%d", i);
744 handle = dlopen(soname, flags);
745 if (handle != NULL) {
750 rwrap.libresolv_handle = handle;
756 handle = rwrap.libc_handle;
758 if (handle == NULL) {
759 handle = dlopen(LIBC_SO, flags);
761 rwrap.libc_handle = handle;
764 if (handle == NULL) {
765 for (i = 10; i >= 0; i--) {
766 char soname[256] = {0};
768 snprintf(soname, sizeof(soname), "libc.so.%d", i);
769 handle = dlopen(soname, flags);
770 if (handle != NULL) {
775 rwrap.libc_handle = handle;
780 if (handle == NULL) {
782 handle = rwrap.libc_handle = rwrap.libresolv_handle = RTLD_NEXT;
784 RWRAP_LOG(RWRAP_LOG_ERROR,
785 "Failed to dlopen library: %s\n",
794 static void *_rwrap_load_lib_function(enum rwrap_lib lib, const char *fn_name)
799 handle = rwrap_load_lib_handle(lib);
801 func = dlsym(handle, fn_name);
803 RWRAP_LOG(RWRAP_LOG_ERROR,
804 "Failed to find %s: %s\n",
809 RWRAP_LOG(RWRAP_LOG_TRACE,
811 fn_name, rwrap_str_lib(lib));
815 #define rwrap_load_lib_function(lib, fn_name) \
816 if (rwrap.fns.libc_##fn_name == NULL) { \
817 *(void **) (&rwrap.fns.libc_##fn_name) = \
818 _rwrap_load_lib_function(lib, #fn_name); \
824 * Functions especially from libc need to be loaded individually, you can't load
825 * all at once or gdb will segfault at startup. The same applies to valgrind and
826 * has probably something todo with with the linker.
827 * So we need load each function at the point it is called the first time.
830 static int libc_res_init(void)
832 #if defined(HAVE_RES_INIT)
833 rwrap_load_lib_function(RWRAP_LIBRESOLV, res_init);
835 return rwrap.fns.libc_res_init();
836 #elif defined(HAVE___RES_INIT)
837 rwrap_load_lib_function(RWRAP_LIBRESOLV, __res_init);
839 return rwrap.fns.libc___res_init();
844 static int libc_res_ninit(struct __res_state *state)
846 #if defined(HAVE_RES_NINIT)
848 #if defined(HAVE_RES_NINIT_IN_LIBRESOLV)
849 rwrap_load_lib_function(RWRAP_LIBRESOLV, res_ninit);
850 #else /* HAVE_RES_NINIT_IN_LIBRESOLV */
851 rwrap_load_lib_function(RWRAP_LIBC, res_ninit);
852 #endif /* HAVE_RES_NINIT_IN_LIBRESOLV */
854 return rwrap.fns.libc_res_ninit(state);
855 #elif defined(HAVE___RES_NINIT)
856 rwrap_load_lib_function(RWRAP_LIBC, __res_ninit);
858 return rwrap.fns.libc___res_ninit(state);
860 #error "No res_ninit function"
864 static void libc_res_nclose(struct __res_state *state)
866 #if defined(HAVE_RES_NCLOSE)
868 #if defined(HAVE_RES_NCLOSE_IN_LIBRESOLV)
869 rwrap_load_lib_function(RWRAP_LIBRESOLV, res_nclose);
870 #else /* HAVE_RES_NCLOSE_IN_LIBRESOLV */
871 rwrap_load_lib_function(RWRAP_LIBC, res_nclose);
872 #endif /* HAVE_RES_NCLOSE_IN_LIBRESOLV */
874 rwrap.fns.libc_res_nclose(state);
875 #elif defined(HAVE___RES_NCLOSE)
876 rwrap_load_lib_function(RWRAP_LIBC, __res_nclose);
878 rwrap.fns.libc___res_nclose(state);
880 #error "No res_nclose function"
884 static int libc_res_nquery(struct __res_state *state,
888 unsigned char *answer,
891 #if defined(HAVE_RES_NQUERY)
892 rwrap_load_lib_function(RWRAP_LIBRESOLV, res_nquery);
894 return rwrap.fns.libc_res_nquery(state,
900 #elif defined(HAVE___RES_NQUERY)
901 rwrap_load_lib_function(RWRAP_LIBRESOLV, __res_nquery);
903 return rwrap.fns.libc___res_nquery(state,
910 #error "No res_nquery function"
914 static int libc_res_nsearch(struct __res_state *state,
918 unsigned char *answer,
921 #if defined(HAVE_RES_NSEARCH)
922 rwrap_load_lib_function(RWRAP_LIBRESOLV, res_nsearch);
924 return rwrap.fns.libc_res_nsearch(state,
930 #elif defined(HAVE___RES_NSEARCH)
931 rwrap_load_lib_function(RWRAP_LIBRESOLV, __res_nsearch);
933 return rwrap.fns.libc___res_nsearch(state,
940 #error "No res_nsearch function"
944 /****************************************************************************
946 ***************************************************************************/
948 static int rwrap_parse_resolv_conf(struct __res_state *state,
949 const char *resolv_conf)
955 fp = fopen(resolv_conf, "r");
957 RWRAP_LOG(RWRAP_LOG_ERROR,
958 "Opening %s failed: %s",
959 resolv_conf, strerror(errno));
963 while(fgets(buf, sizeof(buf), fp) != NULL) {
966 /* Ignore comments */
967 if (buf[0] == '#' || buf[0] == ';') {
971 if (RESOLV_MATCH(buf, "nameserver") && nserv < MAXNS) {
976 p = buf + strlen("nameserver");
978 /* Skip spaces and tabs */
979 while(isblank((int)p[0])) {
984 while(q[0] != '\n' && q[0] != '\0') {
989 ok = inet_pton(AF_INET, p, &a);
991 state->nsaddr_list[state->nscount] = (struct sockaddr_in) {
992 .sin_family = AF_INET,
994 .sin_port = htons(53),
1001 #ifdef HAVE_RESOLV_IPV6_NSADDRS
1004 ok = inet_pton(AF_INET6, p, &a6);
1006 struct sockaddr_in6 *sa6;
1008 sa6 = malloc(sizeof(*sa6));
1014 sa6->sin6_family = AF_INET6;
1015 sa6->sin6_port = htons(53);
1016 sa6->sin6_flowinfo = 0;
1017 sa6->sin6_addr = a6;
1019 state->_u._ext.nsaddrs[state->_u._ext.nscount] = sa6;
1020 state->_u._ext.nssocks[state->_u._ext.nscount] = -1;
1021 state->_u._ext.nsmap[state->_u._ext.nscount] = MAXNS + 1;
1023 state->_u._ext.nscount++;
1026 RWRAP_LOG(RWRAP_LOG_ERROR,
1027 "Malformed DNS server");
1030 #else /* !HAVE_RESOLV_IPV6_NSADDRS */
1032 * BSD uses an opaque structure to store the
1033 * IPv6 addresses. So we can not simply store
1034 * these addresses the same way as above.
1036 RWRAP_LOG(RWRAP_LOG_WARN,
1037 "resolve_wrapper does not support "
1038 "IPv6 on this platform");
1043 } /* TODO: match other keywords */
1047 RWRAP_LOG(RWRAP_LOG_ERROR,
1048 "Reading from %s failed",
1058 /****************************************************************************
1060 ***************************************************************************/
1062 static int rwrap_res_ninit(struct __res_state *state)
1066 rc = libc_res_ninit(state);
1068 const char *resolv_conf = getenv("RESOLV_WRAPPER_CONF");
1070 if (resolv_conf != NULL) {
1073 (void)i; /* maybe unused */
1075 /* Delete name servers */
1077 memset(state->nsaddr_list, 0, sizeof(state->nsaddr_list));
1079 state->_u._ext.nscount = 0;
1080 #ifdef HAVE_RESOLV_IPV6_NSADDRS
1081 for (i = 0; i < state->_u._ext.nscount; i++) {
1082 SAFE_FREE(state->_u._ext.nsaddrs[i]);
1086 rc = rwrap_parse_resolv_conf(state, resolv_conf);
1093 #if defined(HAVE_RES_NINIT)
1094 int res_ninit(struct __res_state *state)
1095 #elif defined(HAVE___RES_NINIT)
1096 int __res_ninit(struct __res_state *state)
1099 return rwrap_res_ninit(state);
1102 /****************************************************************************
1104 ***************************************************************************/
1106 static struct __res_state rwrap_res_state;
1108 static int rwrap_res_init(void)
1112 rc = rwrap_res_ninit(&rwrap_res_state);
1117 #if defined(HAVE_RES_INIT)
1119 #elif defined(HAVE___RES_INIT)
1120 int __res_init(void)
1123 return rwrap_res_init();
1126 /****************************************************************************
1128 ***************************************************************************/
1130 static void rwrap_res_nclose(struct __res_state *state)
1132 #ifdef HAVE_RESOLV_IPV6_NSADDRS
1136 libc_res_nclose(state);
1138 #ifdef HAVE_RESOLV_IPV6_NSADDRS
1139 if (state != NULL) {
1140 for (i = 0; i < state->_u._ext.nscount; i++) {
1141 SAFE_FREE(state->_u._ext.nsaddrs[i]);
1147 #if defined(HAVE_RES_NCLOSE)
1148 void res_nclose(struct __res_state *state)
1149 #elif defined(HAVE___RES_NCLOSE)
1150 void __res_nclose(struct __res_state *state)
1153 rwrap_res_nclose(state);
1156 /****************************************************************************
1158 ***************************************************************************/
1160 static void rwrap_res_close(void)
1162 rwrap_res_nclose(&rwrap_res_state);
1165 #if defined(HAVE_RES_CLOSE)
1166 void res_close(void)
1167 #elif defined(HAVE___RES_CLOSE)
1168 void __res_close(void)
1174 /****************************************************************************
1176 ***************************************************************************/
1178 static int rwrap_res_nquery(struct __res_state *state,
1182 unsigned char *answer,
1186 const char *fake_hosts;
1191 RWRAP_LOG(RWRAP_LOG_TRACE,
1192 "Resolve the domain name [%s] - class=%d, type=%d",
1193 dname, class, type);
1195 for (i = 0; i < state->nscount; i++) {
1196 char ip[INET6_ADDRSTRLEN];
1198 inet_ntop(AF_INET, &state->nsaddr_list[i].sin_addr, ip, sizeof(ip));
1199 RWRAP_LOG(RWRAP_LOG_TRACE,
1205 fake_hosts = getenv("RESOLV_WRAPPER_HOSTS");
1206 if (fake_hosts != NULL) {
1207 rc = rwrap_res_fake_hosts(fake_hosts, dname, type, answer, anslen);
1209 rc = libc_res_nquery(state, dname, class, type, answer, anslen);
1213 RWRAP_LOG(RWRAP_LOG_TRACE,
1214 "The returned response length is: %d",
1220 #if defined(HAVE_RES_NQUERY)
1221 int res_nquery(struct __res_state *state,
1225 unsigned char *answer,
1227 #elif defined(HAVE___RES_NQUERY)
1228 int __res_nquery(struct __res_state *state,
1232 unsigned char *answer,
1236 return rwrap_res_nquery(state, dname, class, type, answer, anslen);
1239 /****************************************************************************
1241 ***************************************************************************/
1243 static int rwrap_res_query(const char *dname,
1246 unsigned char *answer,
1251 rc = rwrap_res_ninit(&rwrap_res_state);
1256 rc = rwrap_res_nquery(&rwrap_res_state,
1266 #if defined(HAVE_RES_QUERY)
1267 int res_query(const char *dname,
1270 unsigned char *answer,
1272 #elif defined(HAVE___RES_QUERY)
1273 int __res_query(const char *dname,
1276 unsigned char *answer,
1280 return rwrap_res_query(dname, class, type, answer, anslen);
1283 /****************************************************************************
1285 ***************************************************************************/
1287 static int rwrap_res_nsearch(struct __res_state *state,
1291 unsigned char *answer,
1295 const char *fake_hosts;
1300 RWRAP_LOG(RWRAP_LOG_TRACE,
1301 "Resolve the domain name [%s] - class=%d, type=%d",
1302 dname, class, type);
1304 for (i = 0; i < state->nscount; i++) {
1305 char ip[INET6_ADDRSTRLEN];
1307 inet_ntop(AF_INET, &state->nsaddr_list[i].sin_addr, ip, sizeof(ip));
1308 RWRAP_LOG(RWRAP_LOG_TRACE,
1314 fake_hosts = getenv("RESOLV_WRAPPER_HOSTS");
1315 if (fake_hosts != NULL) {
1316 rc = rwrap_res_fake_hosts(fake_hosts, dname, type, answer, anslen);
1318 rc = libc_res_nsearch(state, dname, class, type, answer, anslen);
1321 RWRAP_LOG(RWRAP_LOG_TRACE,
1322 "The returned response length is: %d",
1328 #if defined(HAVE_RES_NSEARCH)
1329 int res_nsearch(struct __res_state *state,
1333 unsigned char *answer,
1335 #elif defined(HAVE___RES_NSEARCH)
1336 int __res_nsearch(struct __res_state *state,
1340 unsigned char *answer,
1344 return rwrap_res_nsearch(state, dname, class, type, answer, anslen);
1347 /****************************************************************************
1349 ***************************************************************************/
1351 static int rwrap_res_search(const char *dname,
1354 unsigned char *answer,
1359 rc = rwrap_res_ninit(&rwrap_res_state);
1364 rc = rwrap_res_nsearch(&rwrap_res_state,
1374 #if defined(HAVE_RES_SEARCH)
1375 int res_search(const char *dname,
1378 unsigned char *answer,
1380 #elif defined(HAVE___RES_SEARCH)
1381 int __res_search(const char *dname,
1384 unsigned char *answer,
1388 return rwrap_res_search(dname, class, type, answer, anslen);