| 1 | 158 | chris | #if !defined(__rtems__)
 | 
      
         | 2 |  |  | #if !defined(lint) && !defined(SABER)
 | 
      
         | 3 | 208 | chris | static char rcsid[] = "$Id: res_update.c,v 1.2 2001-09-27 12:01:53 chris Exp $";
 | 
      
         | 4 | 158 | chris | #endif /* not lint */
 | 
      
         | 5 |  |  | #endif /* not rtems */
 | 
      
         | 6 |  |  |  
 | 
      
         | 7 |  |  | /*
 | 
      
         | 8 |  |  |  * Copyright (c) 1996 by Internet Software Consortium.
 | 
      
         | 9 |  |  |  *
 | 
      
         | 10 |  |  |  * Permission to use, copy, modify, and distribute this software for any
 | 
      
         | 11 |  |  |  * purpose with or without fee is hereby granted, provided that the above
 | 
      
         | 12 |  |  |  * copyright notice and this permission notice appear in all copies.
 | 
      
         | 13 |  |  |  *
 | 
      
         | 14 |  |  |  * THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
 | 
      
         | 15 |  |  |  * ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
 | 
      
         | 16 |  |  |  * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
 | 
      
         | 17 |  |  |  * CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
 | 
      
         | 18 |  |  |  * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
 | 
      
         | 19 |  |  |  * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
 | 
      
         | 20 |  |  |  * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
 | 
      
         | 21 |  |  |  * SOFTWARE.
 | 
      
         | 22 |  |  |  */
 | 
      
         | 23 |  |  |  
 | 
      
         | 24 |  |  | /*
 | 
      
         | 25 |  |  |  * Based on the Dynamic DNS reference implementation by Viraj Bais
 | 
      
         | 26 |  |  |  * <viraj_bais@ccm.fm.intel.com>
 | 
      
         | 27 |  |  |  */
 | 
      
         | 28 |  |  |  
 | 
      
         | 29 |  |  | #include <sys/param.h>
 | 
      
         | 30 |  |  | #include <sys/socket.h>
 | 
      
         | 31 |  |  | #include <sys/time.h>
 | 
      
         | 32 |  |  | #include <netinet/in.h>
 | 
      
         | 33 |  |  | #include <arpa/inet.h>
 | 
      
         | 34 |  |  | #include <arpa/nameser.h>
 | 
      
         | 35 |  |  | #include <errno.h>
 | 
      
         | 36 |  |  | #include <limits.h>
 | 
      
         | 37 |  |  | #include <netdb.h>
 | 
      
         | 38 |  |  | #include <resolv.h>
 | 
      
         | 39 |  |  | #include <stdio.h>
 | 
      
         | 40 |  |  | #include <stdlib.h>
 | 
      
         | 41 |  |  | #include <string.h>
 | 
      
         | 42 |  |  |  
 | 
      
         | 43 |  |  | /*
 | 
      
         | 44 |  |  |  * Separate a linked list of records into groups so that all records
 | 
      
         | 45 |  |  |  * in a group will belong to a single zone on the nameserver.
 | 
      
         | 46 |  |  |  * Create a dynamic update packet for each zone and send it to the
 | 
      
         | 47 |  |  |  * nameservers for that zone, and await answer.
 | 
      
         | 48 |  |  |  * Abort if error occurs in updating any zone.
 | 
      
         | 49 |  |  |  * Return the number of zones updated on success, < 0 on error.
 | 
      
         | 50 |  |  |  *
 | 
      
         | 51 |  |  |  * On error, caller must deal with the unsynchronized zones
 | 
      
         | 52 |  |  |  * eg. an A record might have been successfully added to the forward
 | 
      
         | 53 |  |  |  * zone but the corresponding PTR record would be missing if error
 | 
      
         | 54 |  |  |  * was encountered while updating the reverse zone.
 | 
      
         | 55 |  |  |  */
 | 
      
         | 56 |  |  |  
 | 
      
         | 57 |  |  | #define NSMAX 16
 | 
      
         | 58 |  |  |  
 | 
      
         | 59 |  |  | struct ns1 {
 | 
      
         | 60 |  |  |         char nsname[MAXDNAME];
 | 
      
         | 61 |  |  |         struct in_addr nsaddr1;
 | 
      
         | 62 |  |  | };
 | 
      
         | 63 |  |  |  
 | 
      
         | 64 |  |  | struct zonegrp {
 | 
      
         | 65 |  |  |         char            z_origin[MAXDNAME];
 | 
      
         | 66 |  |  |         int16_t         z_class;
 | 
      
         | 67 |  |  |         char            z_soardata[MAXDNAME + 5 * INT32SZ];
 | 
      
         | 68 |  |  |         struct ns1      z_ns[NSMAX];
 | 
      
         | 69 |  |  |         int             z_nscount;
 | 
      
         | 70 |  |  |         ns_updrec *     z_rr;
 | 
      
         | 71 |  |  |         struct zonegrp *z_next;
 | 
      
         | 72 |  |  | };
 | 
      
         | 73 |  |  |  
 | 
      
         | 74 |  |  |  
 | 
      
         | 75 |  |  | int
 | 
      
         | 76 |  |  | res_update(ns_updrec *rrecp_in) {
 | 
      
         | 77 |  |  |         ns_updrec *rrecp, *tmprrecp;
 | 
      
         | 78 |  |  |         u_char buf[PACKETSZ], answer[PACKETSZ], packet[2*PACKETSZ];
 | 
      
         | 79 |  |  |         char name[MAXDNAME], zname[MAXDNAME], primary[MAXDNAME],
 | 
      
         | 80 |  |  |              mailaddr[MAXDNAME];
 | 
      
         | 81 |  |  |         u_char soardata[2*MAXCDNAME+5*INT32SZ];
 | 
      
         | 82 |  |  |         char *dname, *svdname, *cp1, *target;
 | 
      
         | 83 |  |  |         u_char *cp, *eom;
 | 
      
         | 84 |  |  |         HEADER *hp = (HEADER *) answer;
 | 
      
         | 85 |  |  |         struct zonegrp *zptr = NULL, *tmpzptr, *prevzptr, *zgrp_start = NULL;
 | 
      
         | 86 |  |  |         int i, j, k = 0, n, ancount, nscount, arcount, rcode, rdatasize,
 | 
      
         | 87 |  |  |             newgroup, done, myzone, seen_before, numzones = 0;
 | 
      
         | 88 |  |  |         u_int16_t dlen, class, qclass, type, qtype;
 | 
      
         | 89 |  |  |         u_int32_t ttl;
 | 
      
         | 90 |  |  |  
 | 
      
         | 91 |  |  |         if ((_res.options & RES_INIT) == 0 && res_init() == -1) {
 | 
      
         | 92 |  |  |                 h_errno = NETDB_INTERNAL;
 | 
      
         | 93 |  |  |                 return (-1);
 | 
      
         | 94 |  |  |         }
 | 
      
         | 95 |  |  |  
 | 
      
         | 96 |  |  |         for (rrecp = rrecp_in; rrecp; rrecp = rrecp->r_next) {
 | 
      
         | 97 |  |  |                 dname = rrecp->r_dname;
 | 
      
         | 98 |  |  |                 n = strlen(dname);
 | 
      
         | 99 |  |  |                 if (dname[n-1] == '.')
 | 
      
         | 100 |  |  |                         dname[n-1] = '\0';
 | 
      
         | 101 |  |  |                 qtype = T_SOA;
 | 
      
         | 102 |  |  |                 qclass = rrecp->r_class;
 | 
      
         | 103 |  |  |                 done = 0;
 | 
      
         | 104 |  |  |                 seen_before = 0;
 | 
      
         | 105 |  |  |  
 | 
      
         | 106 |  |  |                 while (!done && dname) {
 | 
      
         | 107 |  |  |                     if (qtype == T_SOA) {
 | 
      
         | 108 |  |  |                         for (tmpzptr = zgrp_start;
 | 
      
         | 109 |  |  |                              tmpzptr && !seen_before;
 | 
      
         | 110 |  |  |                              tmpzptr = tmpzptr->z_next) {
 | 
      
         | 111 |  |  |                                 if (strcasecmp(dname,
 | 
      
         | 112 |  |  |                                                tmpzptr->z_origin) == 0 &&
 | 
      
         | 113 |  |  |                                     tmpzptr->z_class == qclass)
 | 
      
         | 114 |  |  |                                         seen_before++;
 | 
      
         | 115 |  |  |                                 for (tmprrecp = tmpzptr->z_rr;
 | 
      
         | 116 |  |  |                                      tmprrecp && !seen_before;
 | 
      
         | 117 |  |  |                                      tmprrecp = tmprrecp->r_grpnext)
 | 
      
         | 118 |  |  |                                 if (strcasecmp(dname, tmprrecp->r_dname) == 0
 | 
      
         | 119 |  |  |                                     && tmprrecp->r_class == qclass) {
 | 
      
         | 120 |  |  |                                         seen_before++;
 | 
      
         | 121 |  |  |                                         break;
 | 
      
         | 122 |  |  |                                 }
 | 
      
         | 123 |  |  |                                 if (seen_before) {
 | 
      
         | 124 |  |  |                                         /*
 | 
      
         | 125 |  |  |                                          * Append to the end of
 | 
      
         | 126 |  |  |                                          * current group.
 | 
      
         | 127 |  |  |                                          */
 | 
      
         | 128 |  |  |                                         for (tmprrecp = tmpzptr->z_rr;
 | 
      
         | 129 |  |  |                                              tmprrecp->r_grpnext;
 | 
      
         | 130 |  |  |                                              tmprrecp = tmprrecp->r_grpnext)
 | 
      
         | 131 |  |  |                                                 (void)NULL;
 | 
      
         | 132 |  |  |                                         tmprrecp->r_grpnext = rrecp;
 | 
      
         | 133 |  |  |                                         rrecp->r_grpnext = NULL;
 | 
      
         | 134 |  |  |                                         done = 1;
 | 
      
         | 135 |  |  |                                         break;
 | 
      
         | 136 |  |  |                                 }
 | 
      
         | 137 |  |  |                         }
 | 
      
         | 138 |  |  |                 } else if (qtype == T_A) {
 | 
      
         | 139 |  |  |                     for (tmpzptr = zgrp_start;
 | 
      
         | 140 |  |  |                          tmpzptr && !done;
 | 
      
         | 141 |  |  |                          tmpzptr = tmpzptr->z_next)
 | 
      
         | 142 |  |  |                             for (i = 0; i < tmpzptr->z_nscount; i++)
 | 
      
         | 143 |  |  |                                 if (tmpzptr->z_class == qclass &&
 | 
      
         | 144 |  |  |                                     strcasecmp(tmpzptr->z_ns[i].nsname,
 | 
      
         | 145 |  |  |                                                dname) == 0 &&
 | 
      
         | 146 |  |  |                                     tmpzptr->z_ns[i].nsaddr1.s_addr != 0) {
 | 
      
         | 147 |  |  |                                         zptr->z_ns[k].nsaddr1.s_addr =
 | 
      
         | 148 |  |  |                                          tmpzptr->z_ns[i].nsaddr1.s_addr;
 | 
      
         | 149 |  |  |                                         done = 1;
 | 
      
         | 150 |  |  |                                         break;
 | 
      
         | 151 |  |  |                                 }
 | 
      
         | 152 |  |  |                 }
 | 
      
         | 153 |  |  |                 if (done)
 | 
      
         | 154 |  |  |                     break;
 | 
      
         | 155 |  |  |                 n = res_mkquery(QUERY, dname, qclass, qtype, NULL,
 | 
      
         | 156 |  |  |                                 0, NULL, buf, sizeof buf);
 | 
      
         | 157 |  |  |                 if (n <= 0) {
 | 
      
         | 158 |  |  |                     fprintf(stderr, "res_update: mkquery failed\n");
 | 
      
         | 159 |  |  |                     return (n);
 | 
      
         | 160 |  |  |                 }
 | 
      
         | 161 |  |  |                 n = res_send(buf, n, answer, sizeof answer);
 | 
      
         | 162 |  |  |                 if (n < 0) {
 | 
      
         | 163 |  |  |                     fprintf(stderr, "res_update: send error for %s\n",
 | 
      
         | 164 |  |  |                             rrecp->r_dname);
 | 
      
         | 165 |  |  |                     return (n);
 | 
      
         | 166 |  |  |                 }
 | 
      
         | 167 |  |  |                 if (n < HFIXEDSZ)
 | 
      
         | 168 |  |  |                         return (-1);
 | 
      
         | 169 |  |  |                 ancount = ntohs(hp->ancount);
 | 
      
         | 170 |  |  |                 nscount = ntohs(hp->nscount);
 | 
      
         | 171 |  |  |                 arcount = ntohs(hp->arcount);
 | 
      
         | 172 |  |  |                 rcode = hp->rcode;
 | 
      
         | 173 |  |  |                 cp = answer + HFIXEDSZ;
 | 
      
         | 174 |  |  |                 eom = answer + n;
 | 
      
         | 175 |  |  |                 /* skip the question section */
 | 
      
         | 176 |  |  |                 n = dn_skipname(cp, eom);
 | 
      
         | 177 |  |  |                 if (n < 0 || cp + n + 2 * INT16SZ > eom)
 | 
      
         | 178 |  |  |                         return (-1);
 | 
      
         | 179 |  |  |                 cp += n + 2 * INT16SZ;
 | 
      
         | 180 |  |  |  
 | 
      
         | 181 |  |  |                 if (qtype == T_SOA) {
 | 
      
         | 182 |  |  |                     if (ancount == 0 && nscount == 0 && arcount == 0) {
 | 
      
         | 183 |  |  |                         /*
 | 
      
         | 184 |  |  |                          * if (rcode == NOERROR) then the dname exists but
 | 
      
         | 185 |  |  |                          * has no soa record associated with it.
 | 
      
         | 186 |  |  |                          * if (rcode == NXDOMAIN) then the dname does not
 | 
      
         | 187 |  |  |                          * exist and the server is replying out of NCACHE.
 | 
      
         | 188 |  |  |                          * in either case, proceed with the next try
 | 
      
         | 189 |  |  |                          */
 | 
      
         | 190 |  |  |                         dname = strchr(dname, '.');
 | 
      
         | 191 |  |  |                         if (dname != NULL)
 | 
      
         | 192 |  |  |                                 dname++;
 | 
      
         | 193 |  |  |                         continue;
 | 
      
         | 194 |  |  |                     } else if ((rcode == NOERROR || rcode == NXDOMAIN) &&
 | 
      
         | 195 |  |  |                                ancount == 0 &&
 | 
      
         | 196 |  |  |                                nscount == 1 && arcount == 0) {
 | 
      
         | 197 |  |  |                         /*
 | 
      
         | 198 |  |  |                          * name/data does not exist, soa record supplied in the
 | 
      
         | 199 |  |  |                          * authority section
 | 
      
         | 200 |  |  |                          */
 | 
      
         | 201 |  |  |                         /* authority section must contain the soa record */
 | 
      
         | 202 |  |  |                         if ((n = dn_expand(answer, eom, cp, zname,
 | 
      
         | 203 |  |  |                                         sizeof zname)) < 0)
 | 
      
         | 204 |  |  |                             return (n);
 | 
      
         | 205 |  |  |                         cp += n;
 | 
      
         | 206 |  |  |                         if (cp + 2 * INT16SZ > eom)
 | 
      
         | 207 |  |  |                                 return (-1);
 | 
      
         | 208 |  |  |                         GETSHORT(type, cp);
 | 
      
         | 209 |  |  |                         GETSHORT(class, cp);
 | 
      
         | 210 |  |  |                         if (type != T_SOA || class != qclass) {
 | 
      
         | 211 |  |  |                             fprintf(stderr, "unknown answer\n");
 | 
      
         | 212 |  |  |                             return (-1);
 | 
      
         | 213 |  |  |                         }
 | 
      
         | 214 |  |  |                         myzone = 0;
 | 
      
         | 215 |  |  |                         svdname = dname;
 | 
      
         | 216 |  |  |                         while (dname)
 | 
      
         | 217 |  |  |                             if (strcasecmp(dname, zname) == 0) {
 | 
      
         | 218 |  |  |                                 myzone = 1;
 | 
      
         | 219 |  |  |                                 break;
 | 
      
         | 220 |  |  |                             } else if ((dname = strchr(dname, '.')) != NULL)
 | 
      
         | 221 |  |  |                                 dname++;
 | 
      
         | 222 |  |  |                         if (!myzone) {
 | 
      
         | 223 |  |  |                             dname = strchr(svdname, '.');
 | 
      
         | 224 |  |  |                             if (dname != NULL)
 | 
      
         | 225 |  |  |                                 dname++;
 | 
      
         | 226 |  |  |                             continue;
 | 
      
         | 227 |  |  |                         }
 | 
      
         | 228 |  |  |                         nscount = 0;
 | 
      
         | 229 |  |  |                         /* fallthrough */
 | 
      
         | 230 |  |  |                     } else if (rcode == NOERROR && ancount == 1) {
 | 
      
         | 231 |  |  |                         /*
 | 
      
         | 232 |  |  |                          * found the zone name
 | 
      
         | 233 |  |  |                          * new servers will supply NS records for the zone
 | 
      
         | 234 |  |  |                          * in authority section and A records for those
 | 
      
         | 235 |  |  |                          * nameservers in the additional section
 | 
      
         | 236 |  |  |                          * older servers have to be explicitly queried for
 | 
      
         | 237 |  |  |                          * NS records for the zone
 | 
      
         | 238 |  |  |                          */
 | 
      
         | 239 |  |  |                         /* answer section must contain the soa record */
 | 
      
         | 240 |  |  |                         if ((n = dn_expand(answer, eom, cp, zname,
 | 
      
         | 241 |  |  |                                            sizeof zname)) < 0)
 | 
      
         | 242 |  |  |                                 return (n);
 | 
      
         | 243 |  |  |                         else
 | 
      
         | 244 |  |  |                                 cp += n;
 | 
      
         | 245 |  |  |                         if (cp + 2 * INT16SZ > eom)
 | 
      
         | 246 |  |  |                                 return (-1);
 | 
      
         | 247 |  |  |                         GETSHORT(type, cp);
 | 
      
         | 248 |  |  |                         GETSHORT(class, cp);
 | 
      
         | 249 |  |  |                         if (type == T_CNAME) {
 | 
      
         | 250 |  |  |                                 dname = strchr(dname, '.');
 | 
      
         | 251 |  |  |                                 if (dname != NULL)
 | 
      
         | 252 |  |  |                                         dname++;
 | 
      
         | 253 |  |  |                                 continue;
 | 
      
         | 254 |  |  |                         }
 | 
      
         | 255 |  |  |                         if (strcasecmp(dname, zname) != 0 ||
 | 
      
         | 256 |  |  |                             type != T_SOA ||
 | 
      
         | 257 |  |  |                             class != rrecp->r_class) {
 | 
      
         | 258 |  |  |                                 fprintf(stderr, "unknown answer\n");
 | 
      
         | 259 |  |  |                                 return (-1);
 | 
      
         | 260 |  |  |                         }
 | 
      
         | 261 |  |  |                         /* FALLTHROUGH */
 | 
      
         | 262 |  |  |                     } else {
 | 
      
         | 263 |  |  |                         fprintf(stderr,
 | 
      
         | 264 |  |  |                 "unknown response: ans=%d, auth=%d, add=%d, rcode=%d\n",
 | 
      
         | 265 |  |  |                                 ancount, nscount, arcount, hp->rcode);
 | 
      
         | 266 |  |  |                         return (-1);
 | 
      
         | 267 |  |  |                     }
 | 
      
         | 268 |  |  |                     if (cp + INT32SZ + INT16SZ > eom)
 | 
      
         | 269 |  |  |                             return (-1);
 | 
      
         | 270 |  |  |                     /* continue processing the soa record */
 | 
      
         | 271 |  |  |                     GETLONG(ttl, cp);
 | 
      
         | 272 |  |  |                     GETSHORT(dlen, cp);
 | 
      
         | 273 |  |  |                     if (cp + dlen > eom)
 | 
      
         | 274 |  |  |                             return (-1);
 | 
      
         | 275 |  |  |                     newgroup = 1;
 | 
      
         | 276 |  |  |                     zptr = zgrp_start;
 | 
      
         | 277 |  |  |                     prevzptr = NULL;
 | 
      
         | 278 |  |  |                     while (zptr) {
 | 
      
         | 279 |  |  |                         if (strcasecmp(zname, zptr->z_origin) == 0 &&
 | 
      
         | 280 |  |  |                             type == T_SOA && class == qclass) {
 | 
      
         | 281 |  |  |                                 newgroup = 0;
 | 
      
         | 282 |  |  |                                 break;
 | 
      
         | 283 |  |  |                         }
 | 
      
         | 284 |  |  |                         prevzptr = zptr;
 | 
      
         | 285 |  |  |                         zptr = zptr->z_next;
 | 
      
         | 286 |  |  |                     }
 | 
      
         | 287 |  |  |                     if (!newgroup) {
 | 
      
         | 288 |  |  |                         for (tmprrecp = zptr->z_rr;
 | 
      
         | 289 |  |  |                              tmprrecp->r_grpnext;
 | 
      
         | 290 |  |  |                              tmprrecp = tmprrecp->r_grpnext)
 | 
      
         | 291 |  |  |                                     ;
 | 
      
         | 292 |  |  |                         tmprrecp->r_grpnext = rrecp;
 | 
      
         | 293 |  |  |                         rrecp->r_grpnext = NULL;
 | 
      
         | 294 |  |  |                         done = 1;
 | 
      
         | 295 |  |  |                         cp += dlen;
 | 
      
         | 296 |  |  |                         break;
 | 
      
         | 297 |  |  |                     } else {
 | 
      
         | 298 |  |  |                         if ((n = dn_expand(answer, eom, cp, primary,
 | 
      
         | 299 |  |  |                                            sizeof primary)) < 0)
 | 
      
         | 300 |  |  |                             return (n);
 | 
      
         | 301 |  |  |                         cp += n;
 | 
      
         | 302 |  |  |                         /*
 | 
      
         | 303 |  |  |                          * We don't have to bounds check here because the
 | 
      
         | 304 |  |  |                          * next use of 'cp' is in dn_expand().
 | 
      
         | 305 |  |  |                          */
 | 
      
         | 306 |  |  |                         cp1 = (char *)soardata;
 | 
      
         | 307 |  |  |                         strcpy(cp1, primary);
 | 
      
         | 308 |  |  |                         cp1 += strlen(cp1) + 1;
 | 
      
         | 309 |  |  |                         if ((n = dn_expand(answer, eom, cp, mailaddr,
 | 
      
         | 310 |  |  |                                            sizeof mailaddr)) < 0)
 | 
      
         | 311 |  |  |                             return (n);
 | 
      
         | 312 |  |  |                         cp += n;
 | 
      
         | 313 |  |  |                         strcpy(cp1, mailaddr);
 | 
      
         | 314 |  |  |                         cp1 += strlen(cp1) + 1;
 | 
      
         | 315 |  |  |                         if (cp + 5*INT32SZ > eom)
 | 
      
         | 316 |  |  |                                 return (-1);
 | 
      
         | 317 |  |  |                         memcpy(cp1, cp, 5*INT32SZ);
 | 
      
         | 318 |  |  |                         cp += 5*INT32SZ;
 | 
      
         | 319 |  |  |                         cp1 += 5*INT32SZ;
 | 
      
         | 320 |  |  |                         rdatasize = (u_char *)cp1 - soardata;
 | 
      
         | 321 |  |  |                         zptr = calloc(1, sizeof(struct zonegrp));
 | 
      
         | 322 |  |  |                         if (zptr == NULL)
 | 
      
         | 323 |  |  |                             return (-1);
 | 
      
         | 324 |  |  |                         if (zgrp_start == NULL)
 | 
      
         | 325 |  |  |                             zgrp_start = zptr;
 | 
      
         | 326 |  |  |                         else
 | 
      
         | 327 |  |  |                             prevzptr->z_next = zptr;
 | 
      
         | 328 |  |  |                         zptr->z_rr = rrecp;
 | 
      
         | 329 |  |  |                         rrecp->r_grpnext = NULL;
 | 
      
         | 330 |  |  |                         strcpy(zptr->z_origin, zname);
 | 
      
         | 331 |  |  |                         zptr->z_class = class;
 | 
      
         | 332 |  |  |                         memcpy(zptr->z_soardata, soardata, rdatasize);
 | 
      
         | 333 |  |  |                         /* fallthrough to process NS and A records */
 | 
      
         | 334 |  |  |                     }
 | 
      
         | 335 |  |  |                 } else if (qtype == T_NS) {
 | 
      
         | 336 |  |  |                     if (rcode == NOERROR && ancount > 0) {
 | 
      
         | 337 |  |  |                         strcpy(zname, dname);
 | 
      
         | 338 |  |  |                         for (zptr = zgrp_start; zptr; zptr = zptr->z_next) {
 | 
      
         | 339 |  |  |                             if (strcasecmp(zname, zptr->z_origin) == 0)
 | 
      
         | 340 |  |  |                                 break;
 | 
      
         | 341 |  |  |                         }
 | 
      
         | 342 |  |  |                         if (zptr == NULL)
 | 
      
         | 343 |  |  |                             /* should not happen */
 | 
      
         | 344 |  |  |                             return (-1);
 | 
      
         | 345 |  |  |                         if (nscount > 0) {
 | 
      
         | 346 |  |  |                             /*
 | 
      
         | 347 |  |  |                              * answer and authority sections contain
 | 
      
         | 348 |  |  |                              * the same information, skip answer section
 | 
      
         | 349 |  |  |                              */
 | 
      
         | 350 |  |  |                             for (j = 0; j < ancount; j++) {
 | 
      
         | 351 |  |  |                                 n = dn_skipname(cp, eom);
 | 
      
         | 352 |  |  |                                 if (n < 0)
 | 
      
         | 353 |  |  |                                         return (-1);
 | 
      
         | 354 |  |  |                                 n += 2*INT16SZ + INT32SZ;
 | 
      
         | 355 |  |  |                                 if (cp + n + INT16SZ > eom)
 | 
      
         | 356 |  |  |                                         return (-1);
 | 
      
         | 357 |  |  |                                 cp += n;
 | 
      
         | 358 |  |  |                                 GETSHORT(dlen, cp);
 | 
      
         | 359 |  |  |                                 cp += dlen;
 | 
      
         | 360 |  |  |                             }
 | 
      
         | 361 |  |  |                         } else
 | 
      
         | 362 |  |  |                             nscount = ancount;
 | 
      
         | 363 |  |  |                         /* fallthrough to process NS and A records */
 | 
      
         | 364 |  |  |                     } else {
 | 
      
         | 365 |  |  |                         fprintf(stderr, "cannot determine nameservers for %s:\
 | 
      
         | 366 |  |  | ans=%d, auth=%d, add=%d, rcode=%d\n",
 | 
      
         | 367 |  |  |                                 dname, ancount, nscount, arcount, hp->rcode);
 | 
      
         | 368 |  |  |                         return (-1);
 | 
      
         | 369 |  |  |                     }
 | 
      
         | 370 |  |  |                 } else if (qtype == T_A) {
 | 
      
         | 371 |  |  |                     if (rcode == NOERROR && ancount > 0) {
 | 
      
         | 372 |  |  |                         arcount = ancount;
 | 
      
         | 373 |  |  |                         ancount = nscount = 0;
 | 
      
         | 374 |  |  |                         /* fallthrough to process A records */
 | 
      
         | 375 |  |  |                     } else {
 | 
      
         | 376 |  |  |                         fprintf(stderr, "cannot determine address for %s:\
 | 
      
         | 377 |  |  | ans=%d, auth=%d, add=%d, rcode=%d\n",
 | 
      
         | 378 |  |  |                                 dname, ancount, nscount, arcount, hp->rcode);
 | 
      
         | 379 |  |  |                         return (-1);
 | 
      
         | 380 |  |  |                     }
 | 
      
         | 381 |  |  |                 }
 | 
      
         | 382 |  |  |                 /* process NS records for the zone */
 | 
      
         | 383 |  |  |                 j = 0;
 | 
      
         | 384 |  |  |                 for (i = 0; i < nscount; i++) {
 | 
      
         | 385 |  |  |                     if ((n = dn_expand(answer, eom, cp, name,
 | 
      
         | 386 |  |  |                                         sizeof name)) < 0)
 | 
      
         | 387 |  |  |                         return (n);
 | 
      
         | 388 |  |  |                     cp += n;
 | 
      
         | 389 |  |  |                     if (cp + 3 * INT16SZ + INT32SZ > eom)
 | 
      
         | 390 |  |  |                             return (-1);
 | 
      
         | 391 |  |  |                     GETSHORT(type, cp);
 | 
      
         | 392 |  |  |                     GETSHORT(class, cp);
 | 
      
         | 393 |  |  |                     GETLONG(ttl, cp);
 | 
      
         | 394 |  |  |                     GETSHORT(dlen, cp);
 | 
      
         | 395 |  |  |                     if (cp + dlen > eom)
 | 
      
         | 396 |  |  |                         return (-1);
 | 
      
         | 397 |  |  |                     if (strcasecmp(name, zname) == 0 &&
 | 
      
         | 398 |  |  |                         type == T_NS && class == qclass) {
 | 
      
         | 399 |  |  |                                 if ((n = dn_expand(answer, eom, cp,
 | 
      
         | 400 |  |  |                                                    name, sizeof name)) < 0)
 | 
      
         | 401 |  |  |                                         return (n);
 | 
      
         | 402 |  |  |                             target = zptr->z_ns[j++].nsname;
 | 
      
         | 403 |  |  |                             strcpy(target, name);
 | 
      
         | 404 |  |  |                     }
 | 
      
         | 405 |  |  |                     cp += dlen;
 | 
      
         | 406 |  |  |                 }
 | 
      
         | 407 |  |  |                 if (zptr->z_nscount == 0)
 | 
      
         | 408 |  |  |                     zptr->z_nscount = j;
 | 
      
         | 409 |  |  |                 /* get addresses for the nameservers */
 | 
      
         | 410 |  |  |                 for (i = 0; i < arcount; i++) {
 | 
      
         | 411 |  |  |                     if ((n = dn_expand(answer, eom, cp, name,
 | 
      
         | 412 |  |  |                                         sizeof name)) < 0)
 | 
      
         | 413 |  |  |                         return (n);
 | 
      
         | 414 |  |  |                     cp += n;
 | 
      
         | 415 |  |  |                     if (cp + 3 * INT16SZ + INT32SZ > eom)
 | 
      
         | 416 |  |  |                         return (-1);
 | 
      
         | 417 |  |  |                     GETSHORT(type, cp);
 | 
      
         | 418 |  |  |                     GETSHORT(class, cp);
 | 
      
         | 419 |  |  |                     GETLONG(ttl, cp);
 | 
      
         | 420 |  |  |                     GETSHORT(dlen, cp);
 | 
      
         | 421 |  |  |                     if (cp + dlen > eom)
 | 
      
         | 422 |  |  |                             return (-1);
 | 
      
         | 423 |  |  |                     if (type == T_A && dlen == INT32SZ && class == qclass) {
 | 
      
         | 424 |  |  |                         for (j = 0; j < zptr->z_nscount; j++)
 | 
      
         | 425 |  |  |                             if (strcasecmp(name, zptr->z_ns[j].nsname) == 0) {
 | 
      
         | 426 |  |  |                                 memcpy(&zptr->z_ns[j].nsaddr1.s_addr, cp,
 | 
      
         | 427 |  |  |                                        INT32SZ);
 | 
      
         | 428 |  |  |                                 break;
 | 
      
         | 429 |  |  |                             }
 | 
      
         | 430 |  |  |                     }
 | 
      
         | 431 |  |  |                     cp += dlen;
 | 
      
         | 432 |  |  |                 }
 | 
      
         | 433 |  |  |                 if (zptr->z_nscount == 0) {
 | 
      
         | 434 |  |  |                     dname = zname;
 | 
      
         | 435 |  |  |                     qtype = T_NS;
 | 
      
         | 436 |  |  |                     continue;
 | 
      
         | 437 |  |  |                 }
 | 
      
         | 438 |  |  |                 done = 1;
 | 
      
         | 439 |  |  |                 for (k = 0; k < zptr->z_nscount; k++)
 | 
      
         | 440 |  |  |                     if (zptr->z_ns[k].nsaddr1.s_addr == 0) {
 | 
      
         | 441 |  |  |                         done = 0;
 | 
      
         | 442 |  |  |                         dname = zptr->z_ns[k].nsname;
 | 
      
         | 443 |  |  |                         qtype = T_A;
 | 
      
         | 444 |  |  |                     }
 | 
      
         | 445 |  |  |  
 | 
      
         | 446 |  |  |             } /* while */
 | 
      
         | 447 |  |  |         }
 | 
      
         | 448 |  |  |  
 | 
      
         | 449 |  |  |         _res.options |= RES_DEBUG;
 | 
      
         | 450 |  |  |         for (zptr = zgrp_start; zptr; zptr = zptr->z_next) {
 | 
      
         | 451 |  |  |  
 | 
      
         | 452 |  |  |                 /* append zone section */
 | 
      
         | 453 |  |  |                 rrecp = res_mkupdrec(ns_s_zn, zptr->z_origin,
 | 
      
         | 454 |  |  |                                      zptr->z_class, ns_t_soa, 0);
 | 
      
         | 455 |  |  |                 if (rrecp == NULL) {
 | 
      
         | 456 |  |  |                         fprintf(stderr, "saverrec error\n");
 | 
      
         | 457 |  |  |                         fflush(stderr);
 | 
      
         | 458 |  |  |                         return (-1);
 | 
      
         | 459 |  |  |                 }
 | 
      
         | 460 |  |  |                 rrecp->r_grpnext = zptr->z_rr;
 | 
      
         | 461 |  |  |                 zptr->z_rr = rrecp;
 | 
      
         | 462 |  |  |  
 | 
      
         | 463 |  |  |                 n = res_mkupdate(zptr->z_rr, packet, sizeof packet);
 | 
      
         | 464 |  |  |                 if (n < 0) {
 | 
      
         | 465 |  |  |                         fprintf(stderr, "res_mkupdate error\n");
 | 
      
         | 466 |  |  |                         fflush(stderr);
 | 
      
         | 467 |  |  |                         return (-1);
 | 
      
         | 468 |  |  |                 } else
 | 
      
         | 469 |  |  |                         fprintf(stdout, "res_mkupdate: packet size = %d\n", n);
 | 
      
         | 470 |  |  |  
 | 
      
         | 471 |  |  |                 /*
 | 
      
         | 472 |  |  |                  * Override the list of NS records from res_init() with
 | 
      
         | 473 |  |  |                  * the authoritative nameservers for the zone being updated.
 | 
      
         | 474 |  |  |                  * Sort primary to be the first in the list of nameservers.
 | 
      
         | 475 |  |  |                  */
 | 
      
         | 476 |  |  |                 for (i = 0; i < zptr->z_nscount; i++) {
 | 
      
         | 477 |  |  |                         if (strcasecmp(zptr->z_ns[i].nsname,
 | 
      
         | 478 |  |  |                                        zptr->z_soardata) == 0) {
 | 
      
         | 479 |  |  |                                 struct in_addr tmpaddr;
 | 
      
         | 480 |  |  |  
 | 
      
         | 481 |  |  |                                 if (i != 0) {
 | 
      
         | 482 |  |  |                                         strcpy(zptr->z_ns[i].nsname,
 | 
      
         | 483 |  |  |                                                zptr->z_ns[0].nsname);
 | 
      
         | 484 |  |  |                                         strcpy(zptr->z_ns[0].nsname,
 | 
      
         | 485 |  |  |                                                zptr->z_soardata);
 | 
      
         | 486 |  |  |                                         tmpaddr = zptr->z_ns[i].nsaddr1;
 | 
      
         | 487 |  |  |                                         zptr->z_ns[i].nsaddr1 =
 | 
      
         | 488 |  |  |                                                 zptr->z_ns[0].nsaddr1;
 | 
      
         | 489 |  |  |                                         zptr->z_ns[0].nsaddr1 = tmpaddr;
 | 
      
         | 490 |  |  |                                 }
 | 
      
         | 491 |  |  |                                 break;
 | 
      
         | 492 |  |  |                         }
 | 
      
         | 493 |  |  |                 }
 | 
      
         | 494 |  |  |                 for (i = 0; i < MAXNS; i++) {
 | 
      
         | 495 |  |  |                         _res.nsaddr_list[i].sin_addr = zptr->z_ns[i].nsaddr1;
 | 
      
         | 496 |  |  |                         _res.nsaddr_list[i].sin_family = AF_INET;
 | 
      
         | 497 |  |  |                         _res.nsaddr_list[i].sin_port = htons(NAMESERVER_PORT);
 | 
      
         | 498 |  |  |                 }
 | 
      
         | 499 |  |  |                 _res.nscount = (zptr->z_nscount < MAXNS) ?
 | 
      
         | 500 |  |  |                                         zptr->z_nscount : MAXNS;
 | 
      
         | 501 |  |  |                 n = res_send(packet, n, answer, sizeof(answer));
 | 
      
         | 502 |  |  |                 if (n < 0) {
 | 
      
         | 503 |  |  |                         fprintf(stderr, "res_send: send error, n=%d\n", n);
 | 
      
         | 504 |  |  |                         break;
 | 
      
         | 505 |  |  |                 } else
 | 
      
         | 506 |  |  |                         numzones++;
 | 
      
         | 507 |  |  |         }
 | 
      
         | 508 |  |  |  
 | 
      
         | 509 |  |  |         /* free malloc'ed memory */
 | 
      
         | 510 |  |  |         while(zgrp_start) {
 | 
      
         | 511 |  |  |                 zptr = zgrp_start;
 | 
      
         | 512 |  |  |                 zgrp_start = zgrp_start->z_next;
 | 
      
         | 513 |  |  |                 res_freeupdrec(zptr->z_rr);  /* Zone section we allocated. */
 | 
      
         | 514 |  |  |                 free((char *)zptr);
 | 
      
         | 515 |  |  |         }
 | 
      
         | 516 |  |  |  
 | 
      
         | 517 |  |  |         return (numzones);
 | 
      
         | 518 |  |  | }
 |