Index: fusl/src/network/getnameinfo.c |
diff --git a/fusl/src/network/getnameinfo.c b/fusl/src/network/getnameinfo.c |
new file mode 100644 |
index 0000000000000000000000000000000000000000..5e6fae3ed0e517e4a8a76c9b8ca5e75b99a31c3a |
--- /dev/null |
+++ b/fusl/src/network/getnameinfo.c |
@@ -0,0 +1,202 @@ |
+#include <netdb.h> |
+#include <limits.h> |
+#include <string.h> |
+#include <stdio.h> |
+#include <sys/socket.h> |
+#include <netinet/in.h> |
+#include <arpa/inet.h> |
+#include <net/if.h> |
+#include <ctype.h> |
+#include "lookup.h" |
+#include "stdio_impl.h" |
+ |
+int __dns_parse(const unsigned char *, int, int (*)(void *, int, const void *, int, const void *), void *); |
+int __dn_expand(const unsigned char *, const unsigned char *, const unsigned char *, char *, int); |
+int __res_mkquery(int, const char *, int, int, const unsigned char *, int, const unsigned char*, unsigned char *, int); |
+int __res_send(const unsigned char *, int, unsigned char *, int); |
+ |
+#define PTR_MAX (64 + sizeof ".in-addr.arpa") |
+#define RR_PTR 12 |
+ |
+static char *itoa(char *p, unsigned x) { |
+ p += 3*sizeof(int); |
+ *--p = 0; |
+ do { |
+ *--p = '0' + x % 10; |
+ x /= 10; |
+ } while (x); |
+ return p; |
+} |
+ |
+static void mkptr4(char *s, const unsigned char *ip) |
+{ |
+ sprintf(s, "%d.%d.%d.%d.in-addr.arpa", |
+ ip[3], ip[2], ip[1], ip[0]); |
+} |
+ |
+static void mkptr6(char *s, const unsigned char *ip) |
+{ |
+ static const char xdigits[] = "0123456789abcdef"; |
+ int i; |
+ for (i=15; i>=0; i--) { |
+ *s++ = xdigits[ip[i]&15]; *s++ = '.'; |
+ *s++ = xdigits[ip[i]>>4]; *s++ = '.'; |
+ } |
+ strcpy(s, "ip6.arpa"); |
+} |
+ |
+static void reverse_hosts(char *buf, const unsigned char *a, unsigned scopeid, int family) |
+{ |
+ char line[512], *p, *z; |
+ unsigned char _buf[1032], atmp[16]; |
+ struct address iplit; |
+ FILE _f, *f = __fopen_rb_ca("/etc/hosts", &_f, _buf, sizeof _buf); |
+ if (!f) return; |
+ if (family == AF_INET) { |
+ memcpy(atmp+12, a, 4); |
+ memcpy(atmp, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12); |
+ a = atmp; |
+ } |
+ while (fgets(line, sizeof line, f)) { |
+ if ((p=strchr(line, '#'))) *p++='\n', *p=0; |
+ |
+ for (p=line; *p && !isspace(*p); p++); |
+ *p++ = 0; |
+ if (__lookup_ipliteral(&iplit, line, AF_UNSPEC)<=0) |
+ continue; |
+ |
+ if (iplit.family == AF_INET) { |
+ memcpy(iplit.addr+12, iplit.addr, 4); |
+ memcpy(iplit.addr, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12); |
+ iplit.scopeid = 0; |
+ } |
+ |
+ if (memcmp(a, iplit.addr, 16) || iplit.scopeid != scopeid) |
+ continue; |
+ |
+ for (; *p && isspace(*p); p++); |
+ for (z=p; *z && !isspace(*z); z++); |
+ *z = 0; |
+ if (z-p < 256) { |
+ memcpy(buf, p, z-p+1); |
+ break; |
+ } |
+ } |
+ __fclose_ca(f); |
+} |
+ |
+static void reverse_services(char *buf, int port, int dgram) |
+{ |
+ unsigned long svport; |
+ char line[128], *p, *z; |
+ unsigned char _buf[1032]; |
+ FILE _f, *f = __fopen_rb_ca("/etc/services", &_f, _buf, sizeof _buf); |
+ if (!f) return; |
+ while (fgets(line, sizeof line, f)) { |
+ if ((p=strchr(line, '#'))) *p++='\n', *p=0; |
+ |
+ for (p=line; *p && !isspace(*p); p++); |
+ if (!*p) continue; |
+ *p++ = 0; |
+ svport = strtoul(p, &z, 10); |
+ |
+ if (svport != port || z==p) continue; |
+ if (dgram && strncmp(z, "/udp", 4)) continue; |
+ if (!dgram && strncmp(z, "/tcp", 4)) continue; |
+ if (p-line > 32) continue; |
+ |
+ memcpy(buf, line, p-line); |
+ break; |
+ } |
+ __fclose_ca(f); |
+} |
+ |
+static int dns_parse_callback(void *c, int rr, const void *data, int len, const void *packet) |
+{ |
+ if (rr != RR_PTR) return 0; |
+ if (__dn_expand(packet, (const unsigned char *)packet + 512, |
+ data, c, 256) <= 0) |
+ *(char *)c = 0; |
+ return 0; |
+ |
+} |
+ |
+int getnameinfo(const struct sockaddr *restrict sa, socklen_t sl, |
+ char *restrict node, socklen_t nodelen, |
+ char *restrict serv, socklen_t servlen, |
+ int flags) |
+{ |
+ char ptr[PTR_MAX]; |
+ char buf[256], num[3*sizeof(int)+1]; |
+ int af = sa->sa_family; |
+ unsigned char *a; |
+ unsigned scopeid; |
+ |
+ switch (af) { |
+ case AF_INET: |
+ a = (void *)&((struct sockaddr_in *)sa)->sin_addr; |
+ if (sl < sizeof(struct sockaddr_in)) return EAI_FAMILY; |
+ mkptr4(ptr, a); |
+ scopeid = 0; |
+ break; |
+ case AF_INET6: |
+ a = (void *)&((struct sockaddr_in6 *)sa)->sin6_addr; |
+ if (sl < sizeof(struct sockaddr_in6)) return EAI_FAMILY; |
+ if (memcmp(a, "\0\0\0\0\0\0\0\0\0\0\xff\xff", 12)) |
+ mkptr6(ptr, a); |
+ else |
+ mkptr4(ptr, a+12); |
+ scopeid = ((struct sockaddr_in6 *)sa)->sin6_scope_id; |
+ break; |
+ default: |
+ return EAI_FAMILY; |
+ } |
+ |
+ if (node && nodelen) { |
+ buf[0] = 0; |
+ if (!(flags & NI_NUMERICHOST)) { |
+ reverse_hosts(buf, a, scopeid, af); |
+ } |
+ if (!*buf && !(flags & NI_NUMERICHOST)) { |
+ unsigned char query[18+PTR_MAX], reply[512]; |
+ int qlen = __res_mkquery(0, ptr, 1, RR_PTR, |
+ 0, 0, 0, query, sizeof query); |
+ int rlen = __res_send(query, qlen, reply, sizeof reply); |
+ buf[0] = 0; |
+ if (rlen > 0) |
+ __dns_parse(reply, rlen, dns_parse_callback, buf); |
+ } |
+ if (!*buf) { |
+ if (flags & NI_NAMEREQD) return EAI_NONAME; |
+ inet_ntop(af, a, buf, sizeof buf); |
+ if (scopeid) { |
+ char *p = 0, tmp[IF_NAMESIZE+1]; |
+ if (!(flags & NI_NUMERICSCOPE) && |
+ (IN6_IS_ADDR_LINKLOCAL(a) || |
+ IN6_IS_ADDR_MC_LINKLOCAL(a))) |
+ p = if_indextoname(scopeid, tmp+1); |
+ if (!p) |
+ p = itoa(num, scopeid); |
+ *--p = '%'; |
+ strcat(buf, p); |
+ } |
+ } |
+ if (strlen(buf) >= nodelen) return EAI_OVERFLOW; |
+ strcpy(node, buf); |
+ } |
+ |
+ if (serv && servlen) { |
+ char *p = buf; |
+ int port = ntohs(((struct sockaddr_in *)sa)->sin_port); |
+ buf[0] = 0; |
+ if (!(flags & NI_NUMERICSERV)) |
+ reverse_services(buf, port, flags & NI_DGRAM); |
+ if (!*p) |
+ p = itoa(num, port); |
+ if (strlen(p) >= servlen) |
+ return EAI_OVERFLOW; |
+ strcpy(serv, p); |
+ } |
+ |
+ return 0; |
+} |