1238106Sdes/*
2238106Sdes * iterator/iter_delegpt.c - delegation point with NS and address information.
3238106Sdes *
4238106Sdes * Copyright (c) 2007, NLnet Labs. All rights reserved.
5238106Sdes *
6238106Sdes * This software is open source.
7238106Sdes *
8238106Sdes * Redistribution and use in source and binary forms, with or without
9238106Sdes * modification, are permitted provided that the following conditions
10238106Sdes * are met:
11238106Sdes *
12238106Sdes * Redistributions of source code must retain the above copyright notice,
13238106Sdes * this list of conditions and the following disclaimer.
14238106Sdes *
15238106Sdes * Redistributions in binary form must reproduce the above copyright notice,
16238106Sdes * this list of conditions and the following disclaimer in the documentation
17238106Sdes * and/or other materials provided with the distribution.
18238106Sdes *
19238106Sdes * Neither the name of the NLNET LABS nor the names of its contributors may
20238106Sdes * be used to endorse or promote products derived from this software without
21238106Sdes * specific prior written permission.
22238106Sdes *
23238106Sdes * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24266114Sdes * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25266114Sdes * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26266114Sdes * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27266114Sdes * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28266114Sdes * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29266114Sdes * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30266114Sdes * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31266114Sdes * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32266114Sdes * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33266114Sdes * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34238106Sdes */
35238106Sdes
36238106Sdes/**
37238106Sdes * \file
38238106Sdes *
39238106Sdes * This file implements the Delegation Point. It contains a list of name servers
40238106Sdes * and their addresses if known.
41238106Sdes */
42238106Sdes#include "config.h"
43238106Sdes#include "iterator/iter_delegpt.h"
44238106Sdes#include "services/cache/dns.h"
45238106Sdes#include "util/regional.h"
46238106Sdes#include "util/data/dname.h"
47238106Sdes#include "util/data/packed_rrset.h"
48238106Sdes#include "util/data/msgreply.h"
49238106Sdes#include "util/net_help.h"
50287917Sdes#include "sldns/rrdef.h"
51287917Sdes#include "sldns/sbuffer.h"
52238106Sdes
53238106Sdesstruct delegpt*
54238106Sdesdelegpt_create(struct regional* region)
55238106Sdes{
56238106Sdes	struct delegpt* dp=(struct delegpt*)regional_alloc(
57238106Sdes		region, sizeof(*dp));
58238106Sdes	if(!dp)
59238106Sdes		return NULL;
60238106Sdes	memset(dp, 0, sizeof(*dp));
61238106Sdes	return dp;
62238106Sdes}
63238106Sdes
64238106Sdesstruct delegpt* delegpt_copy(struct delegpt* dp, struct regional* region)
65238106Sdes{
66238106Sdes	struct delegpt* copy = delegpt_create(region);
67238106Sdes	struct delegpt_ns* ns;
68238106Sdes	struct delegpt_addr* a;
69238106Sdes	if(!copy)
70238106Sdes		return NULL;
71238106Sdes	if(!delegpt_set_name(copy, region, dp->name))
72238106Sdes		return NULL;
73238106Sdes	copy->bogus = dp->bogus;
74238106Sdes	copy->has_parent_side_NS = dp->has_parent_side_NS;
75238106Sdes	for(ns = dp->nslist; ns; ns = ns->next) {
76266114Sdes		if(!delegpt_add_ns(copy, region, ns->name, ns->lame))
77238106Sdes			return NULL;
78238106Sdes		copy->nslist->resolved = ns->resolved;
79238106Sdes		copy->nslist->got4 = ns->got4;
80238106Sdes		copy->nslist->got6 = ns->got6;
81238106Sdes		copy->nslist->done_pside4 = ns->done_pside4;
82238106Sdes		copy->nslist->done_pside6 = ns->done_pside6;
83238106Sdes	}
84238106Sdes	for(a = dp->target_list; a; a = a->next_target) {
85238106Sdes		if(!delegpt_add_addr(copy, region, &a->addr, a->addrlen,
86238106Sdes			a->bogus, a->lame))
87238106Sdes			return NULL;
88238106Sdes	}
89238106Sdes	return copy;
90238106Sdes}
91238106Sdes
92238106Sdesint
93238106Sdesdelegpt_set_name(struct delegpt* dp, struct regional* region, uint8_t* name)
94238106Sdes{
95238106Sdes	log_assert(!dp->dp_type_mlc);
96238106Sdes	dp->namelabs = dname_count_size_labels(name, &dp->namelen);
97238106Sdes	dp->name = regional_alloc_init(region, name, dp->namelen);
98238106Sdes	return dp->name != 0;
99238106Sdes}
100238106Sdes
101238106Sdesint
102238106Sdesdelegpt_add_ns(struct delegpt* dp, struct regional* region, uint8_t* name,
103266114Sdes	uint8_t lame)
104238106Sdes{
105238106Sdes	struct delegpt_ns* ns;
106238106Sdes	size_t len;
107238106Sdes	(void)dname_count_size_labels(name, &len);
108238106Sdes	log_assert(!dp->dp_type_mlc);
109238106Sdes	/* slow check for duplicates to avoid counting failures when
110238106Sdes	 * adding the same server as a dependency twice */
111238106Sdes	if(delegpt_find_ns(dp, name, len))
112238106Sdes		return 1;
113238106Sdes	ns = (struct delegpt_ns*)regional_alloc(region,
114238106Sdes		sizeof(struct delegpt_ns));
115238106Sdes	if(!ns)
116238106Sdes		return 0;
117238106Sdes	ns->next = dp->nslist;
118238106Sdes	ns->namelen = len;
119238106Sdes	dp->nslist = ns;
120238106Sdes	ns->name = regional_alloc_init(region, name, ns->namelen);
121238106Sdes	ns->resolved = 0;
122238106Sdes	ns->got4 = 0;
123238106Sdes	ns->got6 = 0;
124266114Sdes	ns->lame = lame;
125238106Sdes	ns->done_pside4 = 0;
126238106Sdes	ns->done_pside6 = 0;
127238106Sdes	return ns->name != 0;
128238106Sdes}
129238106Sdes
130238106Sdesstruct delegpt_ns*
131238106Sdesdelegpt_find_ns(struct delegpt* dp, uint8_t* name, size_t namelen)
132238106Sdes{
133238106Sdes	struct delegpt_ns* p = dp->nslist;
134238106Sdes	while(p) {
135238106Sdes		if(namelen == p->namelen &&
136238106Sdes			query_dname_compare(name, p->name) == 0) {
137238106Sdes			return p;
138238106Sdes		}
139238106Sdes		p = p->next;
140238106Sdes	}
141238106Sdes	return NULL;
142238106Sdes}
143238106Sdes
144238106Sdesstruct delegpt_addr*
145238106Sdesdelegpt_find_addr(struct delegpt* dp, struct sockaddr_storage* addr,
146238106Sdes	socklen_t addrlen)
147238106Sdes{
148238106Sdes	struct delegpt_addr* p = dp->target_list;
149238106Sdes	while(p) {
150276605Sdes		if(sockaddr_cmp_addr(addr, addrlen, &p->addr, p->addrlen)==0
151276605Sdes			&& ((struct sockaddr_in*)addr)->sin_port ==
152276605Sdes			   ((struct sockaddr_in*)&p->addr)->sin_port) {
153238106Sdes			return p;
154238106Sdes		}
155238106Sdes		p = p->next_target;
156238106Sdes	}
157238106Sdes	return NULL;
158238106Sdes}
159238106Sdes
160238106Sdesint
161238106Sdesdelegpt_add_target(struct delegpt* dp, struct regional* region,
162238106Sdes	uint8_t* name, size_t namelen, struct sockaddr_storage* addr,
163266114Sdes	socklen_t addrlen, uint8_t bogus, uint8_t lame)
164238106Sdes{
165238106Sdes	struct delegpt_ns* ns = delegpt_find_ns(dp, name, namelen);
166238106Sdes	log_assert(!dp->dp_type_mlc);
167238106Sdes	if(!ns) {
168238106Sdes		/* ignore it */
169238106Sdes		return 1;
170238106Sdes	}
171238106Sdes	if(!lame) {
172238106Sdes		if(addr_is_ip6(addr, addrlen))
173238106Sdes			ns->got6 = 1;
174238106Sdes		else	ns->got4 = 1;
175238106Sdes		if(ns->got4 && ns->got6)
176238106Sdes			ns->resolved = 1;
177238106Sdes	}
178238106Sdes	return delegpt_add_addr(dp, region, addr, addrlen, bogus, lame);
179238106Sdes}
180238106Sdes
181238106Sdesint
182238106Sdesdelegpt_add_addr(struct delegpt* dp, struct regional* region,
183266114Sdes	struct sockaddr_storage* addr, socklen_t addrlen, uint8_t bogus,
184266114Sdes	uint8_t lame)
185238106Sdes{
186238106Sdes	struct delegpt_addr* a;
187238106Sdes	log_assert(!dp->dp_type_mlc);
188238106Sdes	/* check for duplicates */
189238106Sdes	if((a = delegpt_find_addr(dp, addr, addrlen))) {
190238106Sdes		if(bogus)
191238106Sdes			a->bogus = bogus;
192238106Sdes		if(!lame)
193238106Sdes			a->lame = 0;
194238106Sdes		return 1;
195238106Sdes	}
196238106Sdes
197238106Sdes	a = (struct delegpt_addr*)regional_alloc(region,
198238106Sdes		sizeof(struct delegpt_addr));
199238106Sdes	if(!a)
200238106Sdes		return 0;
201238106Sdes	a->next_target = dp->target_list;
202238106Sdes	dp->target_list = a;
203238106Sdes	a->next_result = 0;
204238106Sdes	a->next_usable = dp->usable_list;
205238106Sdes	dp->usable_list = a;
206238106Sdes	memcpy(&a->addr, addr, addrlen);
207238106Sdes	a->addrlen = addrlen;
208238106Sdes	a->attempts = 0;
209238106Sdes	a->bogus = bogus;
210238106Sdes	a->lame = lame;
211266114Sdes	a->dnsseclame = 0;
212238106Sdes	return 1;
213238106Sdes}
214238106Sdes
215238106Sdesvoid
216238106Sdesdelegpt_count_ns(struct delegpt* dp, size_t* numns, size_t* missing)
217238106Sdes{
218238106Sdes	struct delegpt_ns* ns;
219238106Sdes	*numns = 0;
220238106Sdes	*missing = 0;
221238106Sdes	for(ns = dp->nslist; ns; ns = ns->next) {
222238106Sdes		(*numns)++;
223238106Sdes		if(!ns->resolved)
224238106Sdes			(*missing)++;
225238106Sdes	}
226238106Sdes}
227238106Sdes
228238106Sdesvoid
229238106Sdesdelegpt_count_addr(struct delegpt* dp, size_t* numaddr, size_t* numres,
230238106Sdes	size_t* numavail)
231238106Sdes{
232238106Sdes	struct delegpt_addr* a;
233238106Sdes	*numaddr = 0;
234238106Sdes	*numres = 0;
235238106Sdes	*numavail = 0;
236238106Sdes	for(a = dp->target_list; a; a = a->next_target) {
237238106Sdes		(*numaddr)++;
238238106Sdes	}
239238106Sdes	for(a = dp->result_list; a; a = a->next_result) {
240238106Sdes		(*numres)++;
241238106Sdes	}
242238106Sdes	for(a = dp->usable_list; a; a = a->next_usable) {
243238106Sdes		(*numavail)++;
244238106Sdes	}
245238106Sdes}
246238106Sdes
247238106Sdesvoid delegpt_log(enum verbosity_value v, struct delegpt* dp)
248238106Sdes{
249238106Sdes	char buf[LDNS_MAX_DOMAINLEN+1];
250238106Sdes	struct delegpt_ns* ns;
251238106Sdes	struct delegpt_addr* a;
252238106Sdes	size_t missing=0, numns=0, numaddr=0, numres=0, numavail=0;
253238106Sdes	if(verbosity < v)
254238106Sdes		return;
255238106Sdes	dname_str(dp->name, buf);
256238106Sdes	if(dp->nslist == NULL && dp->target_list == NULL) {
257238106Sdes		log_info("DelegationPoint<%s>: empty", buf);
258238106Sdes		return;
259238106Sdes	}
260238106Sdes	delegpt_count_ns(dp, &numns, &missing);
261238106Sdes	delegpt_count_addr(dp, &numaddr, &numres, &numavail);
262238106Sdes	log_info("DelegationPoint<%s>: %u names (%u missing), "
263238106Sdes		"%u addrs (%u result, %u avail)%s",
264238106Sdes		buf, (unsigned)numns, (unsigned)missing,
265238106Sdes		(unsigned)numaddr, (unsigned)numres, (unsigned)numavail,
266238106Sdes		(dp->has_parent_side_NS?" parentNS":" cacheNS"));
267238106Sdes	if(verbosity >= VERB_ALGO) {
268238106Sdes		for(ns = dp->nslist; ns; ns = ns->next) {
269238106Sdes			dname_str(ns->name, buf);
270238106Sdes			log_info("  %s %s%s%s%s%s%s%s", buf,
271238106Sdes			(ns->resolved?"*":""),
272238106Sdes			(ns->got4?" A":""), (ns->got6?" AAAA":""),
273238106Sdes			(dp->bogus?" BOGUS":""), (ns->lame?" PARENTSIDE":""),
274238106Sdes			(ns->done_pside4?" PSIDE_A":""),
275238106Sdes			(ns->done_pside6?" PSIDE_AAAA":""));
276238106Sdes		}
277238106Sdes		for(a = dp->target_list; a; a = a->next_target) {
278238106Sdes			const char* str = "  ";
279238106Sdes			if(a->bogus && a->lame) str = "  BOGUS ADDR_LAME ";
280238106Sdes			else if(a->bogus) str = "  BOGUS ";
281238106Sdes			else if(a->lame) str = "  ADDR_LAME ";
282238106Sdes			log_addr(VERB_ALGO, str, &a->addr, a->addrlen);
283238106Sdes		}
284238106Sdes	}
285238106Sdes}
286238106Sdes
287238106Sdesvoid
288238106Sdesdelegpt_add_unused_targets(struct delegpt* dp)
289238106Sdes{
290238106Sdes	struct delegpt_addr* usa = dp->usable_list;
291238106Sdes	dp->usable_list = NULL;
292238106Sdes	while(usa) {
293238106Sdes		usa->next_result = dp->result_list;
294238106Sdes		dp->result_list = usa;
295238106Sdes		usa = usa->next_usable;
296238106Sdes	}
297238106Sdes}
298238106Sdes
299238106Sdessize_t
300238106Sdesdelegpt_count_targets(struct delegpt* dp)
301238106Sdes{
302238106Sdes	struct delegpt_addr* a;
303238106Sdes	size_t n = 0;
304238106Sdes	for(a = dp->target_list; a; a = a->next_target)
305238106Sdes		n++;
306238106Sdes	return n;
307238106Sdes}
308238106Sdes
309238106Sdessize_t
310238106Sdesdelegpt_count_missing_targets(struct delegpt* dp)
311238106Sdes{
312238106Sdes	struct delegpt_ns* ns;
313238106Sdes	size_t n = 0;
314238106Sdes	for(ns = dp->nslist; ns; ns = ns->next)
315238106Sdes		if(!ns->resolved)
316238106Sdes			n++;
317238106Sdes	return n;
318238106Sdes}
319238106Sdes
320238106Sdes/** find NS rrset in given list */
321238106Sdesstatic struct ub_packed_rrset_key*
322238106Sdesfind_NS(struct reply_info* rep, size_t from, size_t to)
323238106Sdes{
324238106Sdes	size_t i;
325238106Sdes	for(i=from; i<to; i++) {
326238106Sdes		if(ntohs(rep->rrsets[i]->rk.type) == LDNS_RR_TYPE_NS)
327238106Sdes			return rep->rrsets[i];
328238106Sdes	}
329238106Sdes	return NULL;
330238106Sdes}
331238106Sdes
332238106Sdesstruct delegpt*
333238106Sdesdelegpt_from_message(struct dns_msg* msg, struct regional* region)
334238106Sdes{
335238106Sdes	struct ub_packed_rrset_key* ns_rrset = NULL;
336238106Sdes	struct delegpt* dp;
337238106Sdes	size_t i;
338238106Sdes	/* look for NS records in the authority section... */
339238106Sdes	ns_rrset = find_NS(msg->rep, msg->rep->an_numrrsets,
340238106Sdes		msg->rep->an_numrrsets+msg->rep->ns_numrrsets);
341238106Sdes
342238106Sdes	/* In some cases (even legitimate, perfectly legal cases), the
343238106Sdes	 * NS set for the "referral" might be in the answer section. */
344238106Sdes	if(!ns_rrset)
345238106Sdes		ns_rrset = find_NS(msg->rep, 0, msg->rep->an_numrrsets);
346238106Sdes
347238106Sdes	/* If there was no NS rrset in the authority section, then this
348238106Sdes	 * wasn't a referral message. (It might not actually be a
349238106Sdes	 * referral message anyway) */
350238106Sdes	if(!ns_rrset)
351238106Sdes		return NULL;
352238106Sdes
353238106Sdes	/* If we found any, then Yay! we have a delegation point. */
354238106Sdes	dp = delegpt_create(region);
355238106Sdes	if(!dp)
356238106Sdes		return NULL;
357238106Sdes	dp->has_parent_side_NS = 1; /* created from message */
358238106Sdes	if(!delegpt_set_name(dp, region, ns_rrset->rk.dname))
359238106Sdes		return NULL;
360238106Sdes	if(!delegpt_rrset_add_ns(dp, region, ns_rrset, 0))
361238106Sdes		return NULL;
362238106Sdes
363238106Sdes	/* add glue, A and AAAA in answer and additional section */
364238106Sdes	for(i=0; i<msg->rep->rrset_count; i++) {
365238106Sdes		struct ub_packed_rrset_key* s = msg->rep->rrsets[i];
366238106Sdes		/* skip auth section. FIXME really needed?*/
367238106Sdes		if(msg->rep->an_numrrsets <= i &&
368238106Sdes			i < (msg->rep->an_numrrsets+msg->rep->ns_numrrsets))
369238106Sdes			continue;
370238106Sdes
371238106Sdes		if(ntohs(s->rk.type) == LDNS_RR_TYPE_A) {
372238106Sdes			if(!delegpt_add_rrset_A(dp, region, s, 0))
373238106Sdes				return NULL;
374238106Sdes		} else if(ntohs(s->rk.type) == LDNS_RR_TYPE_AAAA) {
375238106Sdes			if(!delegpt_add_rrset_AAAA(dp, region, s, 0))
376238106Sdes				return NULL;
377238106Sdes		}
378238106Sdes	}
379238106Sdes	return dp;
380238106Sdes}
381238106Sdes
382238106Sdesint
383238106Sdesdelegpt_rrset_add_ns(struct delegpt* dp, struct regional* region,
384266114Sdes        struct ub_packed_rrset_key* ns_rrset, uint8_t lame)
385238106Sdes{
386238106Sdes	struct packed_rrset_data* nsdata = (struct packed_rrset_data*)
387238106Sdes		ns_rrset->entry.data;
388238106Sdes	size_t i;
389238106Sdes	log_assert(!dp->dp_type_mlc);
390238106Sdes	if(nsdata->security == sec_status_bogus)
391238106Sdes		dp->bogus = 1;
392238106Sdes	for(i=0; i<nsdata->count; i++) {
393238106Sdes		if(nsdata->rr_len[i] < 2+1) continue; /* len + root label */
394238106Sdes		if(dname_valid(nsdata->rr_data[i]+2, nsdata->rr_len[i]-2) !=
395266114Sdes			(size_t)sldns_read_uint16(nsdata->rr_data[i]))
396238106Sdes			continue; /* bad format */
397238106Sdes		/* add rdata of NS (= wirefmt dname), skip rdatalen bytes */
398238106Sdes		if(!delegpt_add_ns(dp, region, nsdata->rr_data[i]+2, lame))
399238106Sdes			return 0;
400238106Sdes	}
401238106Sdes	return 1;
402238106Sdes}
403238106Sdes
404238106Sdesint
405238106Sdesdelegpt_add_rrset_A(struct delegpt* dp, struct regional* region,
406266114Sdes	struct ub_packed_rrset_key* ak, uint8_t lame)
407238106Sdes{
408238106Sdes        struct packed_rrset_data* d=(struct packed_rrset_data*)ak->entry.data;
409238106Sdes        size_t i;
410238106Sdes        struct sockaddr_in sa;
411238106Sdes        socklen_t len = (socklen_t)sizeof(sa);
412238106Sdes	log_assert(!dp->dp_type_mlc);
413238106Sdes        memset(&sa, 0, len);
414238106Sdes        sa.sin_family = AF_INET;
415238106Sdes        sa.sin_port = (in_port_t)htons(UNBOUND_DNS_PORT);
416238106Sdes        for(i=0; i<d->count; i++) {
417238106Sdes                if(d->rr_len[i] != 2 + INET_SIZE)
418238106Sdes                        continue;
419238106Sdes                memmove(&sa.sin_addr, d->rr_data[i]+2, INET_SIZE);
420238106Sdes                if(!delegpt_add_target(dp, region, ak->rk.dname,
421238106Sdes                        ak->rk.dname_len, (struct sockaddr_storage*)&sa,
422238106Sdes                        len, (d->security==sec_status_bogus), lame))
423238106Sdes                        return 0;
424238106Sdes        }
425238106Sdes        return 1;
426238106Sdes}
427238106Sdes
428238106Sdesint
429238106Sdesdelegpt_add_rrset_AAAA(struct delegpt* dp, struct regional* region,
430266114Sdes	struct ub_packed_rrset_key* ak, uint8_t lame)
431238106Sdes{
432238106Sdes        struct packed_rrset_data* d=(struct packed_rrset_data*)ak->entry.data;
433238106Sdes        size_t i;
434238106Sdes        struct sockaddr_in6 sa;
435238106Sdes        socklen_t len = (socklen_t)sizeof(sa);
436238106Sdes	log_assert(!dp->dp_type_mlc);
437238106Sdes        memset(&sa, 0, len);
438238106Sdes        sa.sin6_family = AF_INET6;
439238106Sdes        sa.sin6_port = (in_port_t)htons(UNBOUND_DNS_PORT);
440238106Sdes        for(i=0; i<d->count; i++) {
441238106Sdes                if(d->rr_len[i] != 2 + INET6_SIZE) /* rdatalen + len of IP6 */
442238106Sdes                        continue;
443238106Sdes                memmove(&sa.sin6_addr, d->rr_data[i]+2, INET6_SIZE);
444238106Sdes                if(!delegpt_add_target(dp, region, ak->rk.dname,
445238106Sdes                        ak->rk.dname_len, (struct sockaddr_storage*)&sa,
446238106Sdes                        len, (d->security==sec_status_bogus), lame))
447238106Sdes                        return 0;
448238106Sdes        }
449238106Sdes        return 1;
450238106Sdes}
451238106Sdes
452238106Sdesint
453238106Sdesdelegpt_add_rrset(struct delegpt* dp, struct regional* region,
454266114Sdes        struct ub_packed_rrset_key* rrset, uint8_t lame)
455238106Sdes{
456238106Sdes	if(!rrset)
457238106Sdes		return 1;
458238106Sdes	if(ntohs(rrset->rk.type) == LDNS_RR_TYPE_NS)
459238106Sdes		return delegpt_rrset_add_ns(dp, region, rrset, lame);
460238106Sdes	else if(ntohs(rrset->rk.type) == LDNS_RR_TYPE_A)
461238106Sdes		return delegpt_add_rrset_A(dp, region, rrset, lame);
462238106Sdes	else if(ntohs(rrset->rk.type) == LDNS_RR_TYPE_AAAA)
463238106Sdes		return delegpt_add_rrset_AAAA(dp, region, rrset, lame);
464238106Sdes	log_warn("Unknown rrset type added to delegpt");
465238106Sdes	return 1;
466238106Sdes}
467238106Sdes
468238106Sdesvoid delegpt_add_neg_msg(struct delegpt* dp, struct msgreply_entry* msg)
469238106Sdes{
470238106Sdes	struct reply_info* rep = (struct reply_info*)msg->entry.data;
471238106Sdes	if(!rep) return;
472238106Sdes
473238106Sdes	/* if error or no answers */
474238106Sdes	if(FLAGS_GET_RCODE(rep->flags) != 0 || rep->an_numrrsets == 0) {
475238106Sdes		struct delegpt_ns* ns = delegpt_find_ns(dp, msg->key.qname,
476238106Sdes			msg->key.qname_len);
477238106Sdes		if(ns) {
478238106Sdes			if(msg->key.qtype == LDNS_RR_TYPE_A)
479238106Sdes				ns->got4 = 1;
480238106Sdes			else if(msg->key.qtype == LDNS_RR_TYPE_AAAA)
481238106Sdes				ns->got6 = 1;
482238106Sdes			if(ns->got4 && ns->got6)
483238106Sdes				ns->resolved = 1;
484238106Sdes		}
485238106Sdes	}
486238106Sdes}
487238106Sdes
488238106Sdesvoid delegpt_no_ipv6(struct delegpt* dp)
489238106Sdes{
490238106Sdes	struct delegpt_ns* ns;
491238106Sdes	for(ns = dp->nslist; ns; ns = ns->next) {
492238106Sdes		/* no ipv6, so only ipv4 is enough to resolve a nameserver */
493238106Sdes		if(ns->got4)
494238106Sdes			ns->resolved = 1;
495238106Sdes	}
496238106Sdes}
497238106Sdes
498238106Sdesvoid delegpt_no_ipv4(struct delegpt* dp)
499238106Sdes{
500238106Sdes	struct delegpt_ns* ns;
501238106Sdes	for(ns = dp->nslist; ns; ns = ns->next) {
502238106Sdes		/* no ipv4, so only ipv6 is enough to resolve a nameserver */
503238106Sdes		if(ns->got6)
504238106Sdes			ns->resolved = 1;
505238106Sdes	}
506238106Sdes}
507238106Sdes
508238106Sdesstruct delegpt* delegpt_create_mlc(uint8_t* name)
509238106Sdes{
510238106Sdes	struct delegpt* dp=(struct delegpt*)calloc(1, sizeof(*dp));
511238106Sdes	if(!dp)
512238106Sdes		return NULL;
513238106Sdes	dp->dp_type_mlc = 1;
514238106Sdes	if(name) {
515238106Sdes		dp->namelabs = dname_count_size_labels(name, &dp->namelen);
516238106Sdes		dp->name = memdup(name, dp->namelen);
517238106Sdes		if(!dp->name) {
518238106Sdes			free(dp);
519238106Sdes			return NULL;
520238106Sdes		}
521238106Sdes	}
522238106Sdes	return dp;
523238106Sdes}
524238106Sdes
525238106Sdesvoid delegpt_free_mlc(struct delegpt* dp)
526238106Sdes{
527238106Sdes	struct delegpt_ns* n, *nn;
528238106Sdes	struct delegpt_addr* a, *na;
529238106Sdes	if(!dp) return;
530238106Sdes	log_assert(dp->dp_type_mlc);
531238106Sdes	n = dp->nslist;
532238106Sdes	while(n) {
533238106Sdes		nn = n->next;
534238106Sdes		free(n->name);
535238106Sdes		free(n);
536238106Sdes		n = nn;
537238106Sdes	}
538238106Sdes	a = dp->target_list;
539238106Sdes	while(a) {
540238106Sdes		na = a->next_target;
541238106Sdes		free(a);
542238106Sdes		a = na;
543238106Sdes	}
544238106Sdes	free(dp->name);
545238106Sdes	free(dp);
546238106Sdes}
547238106Sdes
548238106Sdesint delegpt_set_name_mlc(struct delegpt* dp, uint8_t* name)
549238106Sdes{
550238106Sdes	log_assert(dp->dp_type_mlc);
551238106Sdes	dp->namelabs = dname_count_size_labels(name, &dp->namelen);
552238106Sdes	dp->name = memdup(name, dp->namelen);
553238106Sdes	return (dp->name != NULL);
554238106Sdes}
555238106Sdes
556266114Sdesint delegpt_add_ns_mlc(struct delegpt* dp, uint8_t* name, uint8_t lame)
557238106Sdes{
558238106Sdes	struct delegpt_ns* ns;
559238106Sdes	size_t len;
560238106Sdes	(void)dname_count_size_labels(name, &len);
561238106Sdes	log_assert(dp->dp_type_mlc);
562238106Sdes	/* slow check for duplicates to avoid counting failures when
563238106Sdes	 * adding the same server as a dependency twice */
564238106Sdes	if(delegpt_find_ns(dp, name, len))
565238106Sdes		return 1;
566238106Sdes	ns = (struct delegpt_ns*)malloc(sizeof(struct delegpt_ns));
567238106Sdes	if(!ns)
568238106Sdes		return 0;
569238106Sdes	ns->namelen = len;
570238106Sdes	ns->name = memdup(name, ns->namelen);
571238106Sdes	if(!ns->name) {
572238106Sdes		free(ns);
573238106Sdes		return 0;
574238106Sdes	}
575238106Sdes	ns->next = dp->nslist;
576238106Sdes	dp->nslist = ns;
577238106Sdes	ns->resolved = 0;
578238106Sdes	ns->got4 = 0;
579238106Sdes	ns->got6 = 0;
580238106Sdes	ns->lame = (uint8_t)lame;
581238106Sdes	ns->done_pside4 = 0;
582238106Sdes	ns->done_pside6 = 0;
583238106Sdes	return 1;
584238106Sdes}
585238106Sdes
586238106Sdesint delegpt_add_addr_mlc(struct delegpt* dp, struct sockaddr_storage* addr,
587266114Sdes	socklen_t addrlen, uint8_t bogus, uint8_t lame)
588238106Sdes{
589238106Sdes	struct delegpt_addr* a;
590238106Sdes	log_assert(dp->dp_type_mlc);
591238106Sdes	/* check for duplicates */
592238106Sdes	if((a = delegpt_find_addr(dp, addr, addrlen))) {
593238106Sdes		if(bogus)
594238106Sdes			a->bogus = bogus;
595238106Sdes		if(!lame)
596238106Sdes			a->lame = 0;
597238106Sdes		return 1;
598238106Sdes	}
599238106Sdes
600238106Sdes	a = (struct delegpt_addr*)malloc(sizeof(struct delegpt_addr));
601238106Sdes	if(!a)
602238106Sdes		return 0;
603238106Sdes	a->next_target = dp->target_list;
604238106Sdes	dp->target_list = a;
605238106Sdes	a->next_result = 0;
606238106Sdes	a->next_usable = dp->usable_list;
607238106Sdes	dp->usable_list = a;
608238106Sdes	memcpy(&a->addr, addr, addrlen);
609238106Sdes	a->addrlen = addrlen;
610238106Sdes	a->attempts = 0;
611238106Sdes	a->bogus = bogus;
612238106Sdes	a->lame = lame;
613266114Sdes	a->dnsseclame = 0;
614238106Sdes	return 1;
615238106Sdes}
616238106Sdes
617238106Sdesint delegpt_add_target_mlc(struct delegpt* dp, uint8_t* name, size_t namelen,
618266114Sdes	struct sockaddr_storage* addr, socklen_t addrlen, uint8_t bogus,
619266114Sdes	uint8_t lame)
620238106Sdes{
621238106Sdes	struct delegpt_ns* ns = delegpt_find_ns(dp, name, namelen);
622238106Sdes	log_assert(dp->dp_type_mlc);
623238106Sdes	if(!ns) {
624238106Sdes		/* ignore it */
625238106Sdes		return 1;
626238106Sdes	}
627238106Sdes	if(!lame) {
628238106Sdes		if(addr_is_ip6(addr, addrlen))
629238106Sdes			ns->got6 = 1;
630238106Sdes		else	ns->got4 = 1;
631238106Sdes		if(ns->got4 && ns->got6)
632238106Sdes			ns->resolved = 1;
633238106Sdes	}
634238106Sdes	return delegpt_add_addr_mlc(dp, addr, addrlen, bogus, lame);
635238106Sdes}
636238106Sdes
637238106Sdessize_t delegpt_get_mem(struct delegpt* dp)
638238106Sdes{
639238106Sdes	struct delegpt_ns* ns;
640238106Sdes	size_t s;
641238106Sdes	if(!dp) return 0;
642238106Sdes	s = sizeof(*dp) + dp->namelen +
643238106Sdes		delegpt_count_targets(dp)*sizeof(struct delegpt_addr);
644238106Sdes	for(ns=dp->nslist; ns; ns=ns->next)
645238106Sdes		s += sizeof(*ns)+ns->namelen;
646238106Sdes	return s;
647238106Sdes}
648