summaryrefslogtreecommitdiff
path: root/src/dns_tlsa.c
blob: 66226a001a0fcc417dee3d49972602583989ff1a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
#include "byte.h"
#include "dnsresolv.h"
#include "logmsg.h"
#include "stralloc.h"
#include "uint_t.h"

#include "dns.h"

static char *q = 0;

static int dns_tlsa_packet(stralloc *out, const char *buf, unsigned int len)
{
  unsigned int pos;
  char header[12];
  uint16 datalen;
  uint16 numanswers;
  int ranswers = 0;

  if (!stralloc_copys(out, "")) return DNS_MEM;

  pos = dns_packet_copy(buf, len, 0, header, 12);
  if (!pos) return DNS_ERR;
  uint16_unpack_big(header + 6, &numanswers);
  pos = dns_packet_skipname(buf, len, pos);
  if (!pos) return DNS_ERR;
  pos += 4;

  while (numanswers--) {
    pos = dns_packet_skipname(buf, len, pos);
    if (!pos) return DNS_ERR;
    pos = dns_packet_copy(buf, len, pos, header, 10);
    if (!pos) return DNS_ERR;
    uint16_unpack_big(header + 8, &datalen);
    if (byte_equal(header, 2, DNS_T_TLSA)) {
      if (byte_equal(header + 2, 2, DNS_C_IN)) {
        if (pos + datalen > len) return DNS_ERR;
        if (!stralloc_catb(out, buf + pos, datalen)) return DNS_MEM;
      }
    }
    pos += datalen;
    ++ranswers;
  }
  if (!stralloc_0(out)) return DNS_MEM;

  return ranswers;
}

int dns_tlsa(stralloc *out, const stralloc *fqdn)
{
  int rc = 0;

  if (dns_domain_fromdot(&q, fqdn->s, fqdn->len) <= 0) return DNS_ERR;
  if (dns_resolve(q, DNS_T_TLSA) >= 0) {
    if ((rc = dns_tlsa_packet(out, dns_resolve_tx.packet, dns_resolve_tx.packetlen)) < 0) return DNS_ERR;
    dns_transmit_free(&dns_resolve_tx);
    dns_domain_free(&q);
  }

  return rc;
}