|
|
/* dnsget.c
simple host/dig-like application using UDNS library
Copyright (C) 2005 Michael Tokarev <mjt@corpit.ru> This file is part of UDNS library, an async DNS stub resolver.
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License along with this library, in file named COPYING.LGPL; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#ifdef HAVE_CONFIG_H
# include "config.h"
#endif
#ifdef __MINGW32__
#include <windows.h>
#include <winsock2.h>
#else
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <sys/time.h>
#include <unistd.h>
#endif
#include <time.h>
#include <stdarg.h>
#include <errno.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "udns.h"
#ifndef HAVE_GETOPT
# include "getopt.c"
#endif
#ifndef AF_INET6
# define AF_INET6 10
#endif
static char *progname; static int verbose = 1; static int errors; static int notfound;
/* verbosity level:
* <0 - bare result * 0 - bare result and error messages * 1 - readable result * 2 - received packet contents and `trying ...' stuff * 3 - sent and received packet contents */
static void die(int errnum, const char *fmt, ...) { va_list ap; fprintf(stderr, "%s: ", progname); va_start(ap, fmt); vfprintf(stderr, fmt, ap); va_end(ap); if (errnum) fprintf(stderr, ": %s\n", strerror(errnum)); else putc('\n', stderr); fflush(stderr); exit(1); }
static const char *dns_xntop(int af, const void *src) { static char buf[6*5+4*4]; return dns_ntop(af, src, buf, sizeof(buf)); }
struct query { const char *name; /* original query string */ unsigned char *dn; /* the DN being looked up */ enum dns_type qtyp; /* type of the query */ };
static void query_free(struct query *q) { free(q->dn); free(q); }
static struct query * query_new(const char *name, const unsigned char *dn, enum dns_type qtyp) { struct query *q = malloc(sizeof(*q)); unsigned l = dns_dnlen(dn); unsigned char *cdn = malloc(l); if (!q || !cdn) die(0, "out of memory"); memcpy(cdn, dn, l); q->name = name; q->dn = cdn; q->qtyp = qtyp; return q; }
static enum dns_class qcls = DNS_C_IN;
static void dnserror(struct query *q, int errnum) { if (verbose >= 0) fprintf(stderr, "%s: unable to lookup %s record for %s: %s\n", progname, dns_typename(q->qtyp), dns_dntosp(q->dn), dns_strerror(errnum)); if (errnum == DNS_E_NXDOMAIN || errnum == DNS_E_NODATA) ++notfound; else ++errors; query_free(q); }
static const unsigned char * printtxt(const unsigned char *c) { unsigned n = *c++; const unsigned char *e = c + n; if (verbose > 0) while(c < e) { if (*c < ' ' || *c >= 127) printf("\\%03u", *c); else if (*c == '\\' || *c == '"') printf("\\%c", *c); else putchar(*c); ++c; } else fwrite(c, n, 1, stdout); return e; }
static void printhex(const unsigned char *c, const unsigned char *e) { while(c < e) printf("%02x", *c++); }
static unsigned char to_b64[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
static void printb64(const unsigned char *c, const unsigned char *e) { while(c < e) { putchar(to_b64[c[0] >> 2]); if (c+1 < e) { putchar(to_b64[(c[0] & 0x3) << 4 | c[1] >> 4]); if (c+2 < e) { putchar(to_b64[(c[1] & 0xf) << 2 | c[2] >> 6]); putchar(to_b64[c[2] & 0x3f]); } else { putchar(to_b64[(c[1] & 0xf) << 2]); putchar('='); break; } } else { putchar(to_b64[(c[0] & 0x3) << 4]); putchar('='); putchar('='); break; } c += 3; } }
static void printdate(time_t time) { struct tm *tm = gmtime(&time); printf("%04d%02d%02d%02d%02d%02d", tm->tm_year + 1900, tm->tm_mon + 1, tm->tm_mday, tm->tm_hour, tm->tm_min, tm->tm_sec); }
static void printrr(const struct dns_parse *p, struct dns_rr *rr) { const unsigned char *pkt = p->dnsp_pkt; const unsigned char *end = p->dnsp_end; const unsigned char *dptr = rr->dnsrr_dptr; const unsigned char *dend = rr->dnsrr_dend; unsigned char *dn = rr->dnsrr_dn; const unsigned char *c; unsigned n;
if (verbose > 0) { if (verbose > 1) { if (!p->dnsp_rrl && !rr->dnsrr_dn[0] && rr->dnsrr_typ == DNS_T_OPT) { printf(";EDNS%d OPT record (UDPsize: %d, ERcode: %d, Flags: 0x%02x): %d bytes\n", (rr->dnsrr_ttl>>16) & 0xff, /* version */ rr->dnsrr_cls, /* udp size */ (rr->dnsrr_ttl>>24) & 0xff, /* extended rcode */ rr->dnsrr_ttl & 0xffff, /* flags */ rr->dnsrr_dsz); return; } n = printf("%s.", dns_dntosp(rr->dnsrr_dn)); printf("%s%u\t%s\t%s\t", n > 15 ? "\t" : n > 7 ? "\t\t" : "\t\t\t", rr->dnsrr_ttl, dns_classname(rr->dnsrr_cls), dns_typename(rr->dnsrr_typ)); } else printf("%s. %s ", dns_dntosp(rr->dnsrr_dn), dns_typename(rr->dnsrr_typ)); }
switch(rr->dnsrr_typ) {
case DNS_T_CNAME: case DNS_T_PTR: case DNS_T_NS: case DNS_T_MB: case DNS_T_MD: case DNS_T_MF: case DNS_T_MG: case DNS_T_MR: if (dns_getdn(pkt, &dptr, end, dn, DNS_MAXDN) <= 0) goto xperr; printf("%s.", dns_dntosp(dn)); break;
case DNS_T_A: if (rr->dnsrr_dsz != 4) goto xperr; printf("%d.%d.%d.%d", dptr[0], dptr[1], dptr[2], dptr[3]); break;
case DNS_T_AAAA: if (rr->dnsrr_dsz != 16) goto xperr; printf("%s", dns_xntop(AF_INET6, dptr)); break;
case DNS_T_MX: c = dptr + 2; if (dns_getdn(pkt, &c, end, dn, DNS_MAXDN) <= 0 || c != dend) goto xperr; printf("%d %s.", dns_get16(dptr), dns_dntosp(dn)); break;
case DNS_T_TXT: /* first verify it */ for(c = dptr; c < dend; c += n) { n = *c++; if (c + n > dend) goto xperr; } c = dptr; n = 0; while (c < dend) { if (verbose > 0) printf(n++ ? "\" \"":"\""); c = printtxt(c); } if (verbose > 0) putchar('"'); break;
case DNS_T_HINFO: /* CPU, OS */ c = dptr; n = *c++; if ((c += n) >= dend) goto xperr; n = *c++; if ((c += n) != dend) goto xperr; c = dptr; if (verbose > 0) putchar('"'); c = printtxt(c); if (verbose > 0) printf("\" \""); else putchar(' '); printtxt(c); if (verbose > 0) putchar('"'); break;
case DNS_T_WKS: c = dptr; if (dptr + 4 + 2 >= end) goto xperr; printf("%s %d", dns_xntop(AF_INET, dptr), dptr[4]); c = dptr + 5; for (n = 0; c < dend; ++c, n += 8) { if (*c) { unsigned b; for (b = 0; b < 8; ++b) if (*c & (1 << (7-b))) printf(" %d", n + b); } } break;
case DNS_T_SRV: /* prio weight port targetDN */ c = dptr; c += 2 + 2 + 2; if (dns_getdn(pkt, &c, end, dn, DNS_MAXDN) <= 0 || c != dend) goto xperr; c = dptr; printf("%d %d %d %s.", dns_get16(c+0), dns_get16(c+2), dns_get16(c+4), dns_dntosp(dn)); break;
case DNS_T_NAPTR: /* order pref flags serv regexp repl */ c = dptr; c += 4; /* order, pref */ for (n = 0; n < 3; ++n) if (c >= dend) goto xperr; else c += *c + 1; if (dns_getdn(pkt, &c, end, dn, DNS_MAXDN) <= 0 || c != dend) goto xperr; c = dptr; printf("%u %u", dns_get16(c+0), dns_get16(c+2)); c += 4; for(n = 0; n < 3; ++n) { putchar(' '); if (verbose > 0) putchar('"'); c = printtxt(c); if (verbose > 0) putchar('"'); } printf(" %s.", dns_dntosp(dn)); break;
case DNS_T_KEY: case DNS_T_DNSKEY: /* flags(2) proto(1) algo(1) pubkey */ case DNS_T_DS: case DNS_T_DLV: /* ktag(2) proto(1) algo(1) pubkey */ c = dptr; if (c + 2 + 1 + 1 > dend) goto xperr; printf("%d %d %d", dns_get16(c), c[2], c[3]); c += 2 + 1 + 1; if (c < dend) { putchar(' '); printb64(c, dend); } break;
case DNS_T_SIG: case DNS_T_RRSIG: /* type(2) algo(1) labels(1) ottl(4) sexp(4) sinc(4) tag(2) sdn sig */ c = dptr; c += 2 + 1 + 1 + 4 + 4 + 4 + 2; if (dns_getdn(pkt, &c, end, dn, DNS_MAXDN) <= 0) goto xperr; printf("%s %u %u %u ", dns_typename(dns_get16(dptr)), dptr[2], dptr[3], dns_get32(dptr+4)); printdate(dns_get32(dptr+8)); putchar(' '); printdate(dns_get32(dptr+12)); printf(" %d %s. ", dns_get16(dptr+10), dns_dntosp(dn)); printb64(c, dend); break;
case DNS_T_SSHFP: /* algo(1), fp type(1), fp... */ if (dend < dptr + 3) goto xperr; printf("%u %u ", dptr[0], dptr[1]); /* algo, fp type */ printhex(dptr + 2, dend); break;
#if 0 /* unused RR types? */
case DNS_T_NSEC: /* nextDN bitmaps */ c = dptr; if (dns_getdn(pkt, &c, end, dn, DNS_MAXDN) <= 0) goto xperr; printf("%s.", dns_dntosp(dn)); unfinished. break; #endif
case DNS_T_SOA: c = dptr; if (dns_getdn(pkt, &c, end, dn, DNS_MAXDN) <= 0 || dns_getdn(pkt, &c, end, dn, DNS_MAXDN) <= 0 || c + 4*5 != dend) goto xperr; dns_getdn(pkt, &dptr, end, dn, DNS_MAXDN); printf("%s. ", dns_dntosp(dn)); dns_getdn(pkt, &dptr, end, dn, DNS_MAXDN); printf("%s. ", dns_dntosp(dn)); printf("%u %u %u %u %u", dns_get32(dptr), dns_get32(dptr+4), dns_get32(dptr+8), dns_get32(dptr+12), dns_get32(dptr+16)); break;
case DNS_T_MINFO: c = dptr; if (dns_getdn(pkt, &c, end, dn, DNS_MAXDN) <= 0 || dns_getdn(pkt, &c, end, dn, DNS_MAXDN) <= 0 || c != dend) goto xperr; dns_getdn(pkt, &dptr, end, dn, DNS_MAXDN); printf("%s. ", dns_dntosp(dn)); dns_getdn(pkt, &dptr, end, dn, DNS_MAXDN); printf("%s.", dns_dntosp(dn)); break;
case DNS_T_NULL: default: printhex(dptr, dend); break; } putchar('\n'); return;
xperr: printf("<parse error>\n"); ++errors; }
static int printsection(struct dns_parse *p, int nrr, const char *sname) { struct dns_rr rr; int r; if (!nrr) return 0; if (verbose > 1) printf("\n;; %s section (%d):\n", sname, nrr);
p->dnsp_rrl = nrr; while((r = dns_nextrr(p, &rr)) > 0) printrr(p, &rr); if (r < 0) printf("<<ERROR>>\n"); return r; }
/* dbgcb will only be called if verbose > 1 */ static void dbgcb(int code, const struct sockaddr *sa, unsigned slen, const unsigned char *pkt, int r, const struct dns_query *unused_q, void *unused_data) { struct dns_parse p; const unsigned char *cur, *end; int numqd;
if (code > 0) { printf(";; trying %s.\n", dns_dntosp(dns_payload(pkt))); printf(";; sending %d bytes query to ", r); } else printf(";; received %d bytes response from ", r); if (sa->sa_family == AF_INET && slen >= sizeof(struct sockaddr_in)) printf("%s port %d\n", dns_xntop(AF_INET, &((struct sockaddr_in*)sa)->sin_addr), htons(((struct sockaddr_in*)sa)->sin_port)); #ifdef HAVE_IPv6
else if (sa->sa_family == AF_INET6 && slen >= sizeof(struct sockaddr_in6)) printf("%s port %d\n", dns_xntop(AF_INET6, &((struct sockaddr_in6*)sa)->sin6_addr), htons(((struct sockaddr_in6*)sa)->sin6_port)); #endif
else printf("<<unknown socket type %d>>\n", sa->sa_family); if (code > 0 && verbose < 3) { putchar('\n'); return; }
if (code == -2) printf(";; reply from unexpected source\n"); if (code == -5) printf(";; reply to a query we didn't sent (or old)\n"); if (r < DNS_HSIZE) { printf(";; short packet (%d bytes)\n", r); return; } if (dns_opcode(pkt) != 0) printf(";; unexpected opcode %d\n", dns_opcode(pkt)); if (dns_tc(pkt) != 0) printf(";; warning: TC bit set, probably incomplete reply\n");
printf(";; ->>HEADER<<- opcode: "); switch(dns_opcode(pkt)) { case 0: printf("QUERY"); break; case 1: printf("IQUERY"); break; case 2: printf("STATUS"); break; default: printf("UNKNOWN(%u)", dns_opcode(pkt)); break; } printf(", status: %s, id: %d, size: %d\n;; flags:", dns_rcodename(dns_rcode(pkt)), dns_qid(pkt), r); if (dns_qr(pkt)) printf(" qr"); if (dns_aa(pkt)) printf(" aa"); if (dns_tc(pkt)) printf(" tc"); if (dns_rd(pkt)) printf(" rd"); if (dns_ra(pkt)) printf(" ra"); /* if (dns_z(pkt)) printf(" z"); only one reserved bit left */ if (dns_ad(pkt)) printf(" ad"); if (dns_cd(pkt)) printf(" cd"); numqd = dns_numqd(pkt); printf("; QUERY: %d, ANSWER: %d, AUTHORITY: %d, ADDITIONAL: %d\n", numqd, dns_numan(pkt), dns_numns(pkt), dns_numar(pkt)); if (numqd != 1) printf(";; unexpected number of entries in QUERY section: %d\n", numqd); printf("\n;; QUERY SECTION (%d):\n", numqd); cur = dns_payload(pkt); end = pkt + r; while(numqd--) { if (dns_getdn(pkt, &cur, end, p.dnsp_dnbuf, DNS_MAXDN) <= 0 || cur + 4 > end) { printf("; invalid query section\n"); return; } r = printf(";%s.", dns_dntosp(p.dnsp_dnbuf)); printf("%s%s\t%s\n", r > 23 ? "\t" : r > 15 ? "\t\t" : r > 7 ? "\t\t\t" : "\t\t\t\t", dns_classname(dns_get16(cur+2)), dns_typename(dns_get16(cur))); cur += 4; }
p.dnsp_pkt = pkt; p.dnsp_cur = p.dnsp_ans = cur; p.dnsp_end = end; p.dnsp_qdn = NULL; p.dnsp_qcls = p.dnsp_qtyp = 0; p.dnsp_ttl = 0xffffffffu; p.dnsp_nrr = 0;
r = printsection(&p, dns_numan(pkt), "ANSWER"); if (r == 0) r = printsection(&p, dns_numns(pkt), "AUTHORITY"); if (r == 0) r = printsection(&p, dns_numar(pkt), "ADDITIONAL"); putchar('\n'); }
static void dnscb(struct dns_ctx *ctx, void *result, void *data) { int r = dns_status(ctx); struct query *q = data; struct dns_parse p; struct dns_rr rr; unsigned nrr; unsigned char dn[DNS_MAXDN]; const unsigned char *pkt, *cur, *end; if (!result) { dnserror(q, r); return; } pkt = result; end = pkt + r; cur = dns_payload(pkt); dns_getdn(pkt, &cur, end, dn, sizeof(dn)); dns_initparse(&p, NULL, pkt, cur, end); p.dnsp_qcls = p.dnsp_qtyp = 0; nrr = 0; while((r = dns_nextrr(&p, &rr)) > 0) { if (!dns_dnequal(dn, rr.dnsrr_dn)) continue; if ((qcls == DNS_C_ANY || qcls == rr.dnsrr_cls) && (q->qtyp == DNS_T_ANY || q->qtyp == rr.dnsrr_typ)) ++nrr; else if (rr.dnsrr_typ == DNS_T_CNAME && !nrr) { if (dns_getdn(pkt, &rr.dnsrr_dptr, end, p.dnsp_dnbuf, sizeof(p.dnsp_dnbuf)) <= 0 || rr.dnsrr_dptr != rr.dnsrr_dend) { r = DNS_E_PROTOCOL; break; } else { if (verbose == 1) { printf("%s.", dns_dntosp(dn)); printf(" CNAME %s.\n", dns_dntosp(p.dnsp_dnbuf)); } dns_dntodn(p.dnsp_dnbuf, dn, sizeof(dn)); } } } if (!r && !nrr) r = DNS_E_NODATA; if (r < 0) { dnserror(q, r); free(result); return; } if (verbose < 2) { /* else it is already printed by dbgfn */ dns_rewind(&p, NULL); p.dnsp_qtyp = q->qtyp == DNS_T_ANY ? 0 : q->qtyp; p.dnsp_qcls = qcls == DNS_C_ANY ? 0 : qcls; while(dns_nextrr(&p, &rr)) printrr(&p, &rr); } free(result); query_free(q); }
int main(int argc, char **argv) { int i; int fd; fd_set fds; struct timeval tv; time_t now; char *ns[DNS_MAXSERV]; int nns = 0; struct query *q; enum dns_type qtyp = 0; struct dns_ctx *nctx = NULL; int flags = 0;
if (!(progname = strrchr(argv[0], '/'))) progname = argv[0]; else argv[0] = ++progname;
if (argc <= 1) die(0, "try `%s -h' for help", progname);
if (dns_init(NULL, 0) < 0 || !(nctx = dns_new(NULL))) die(errno, "unable to initialize dns library"); /* we keep two dns contexts: one may be needed to resolve
* nameservers if given as names, using default options. */
while((i = getopt(argc, argv, "vqt:c:an:o:f:h")) != EOF) switch(i) { case 'v': ++verbose; break; case 'q': --verbose; break; case 't': if (optarg[0] == '*' && !optarg[1]) i = DNS_T_ANY; else if ((i = dns_findtypename(optarg)) <= 0) die(0, "unrecognized query type `%s'", optarg); qtyp = i; break; case 'c': if (optarg[0] == '*' && !optarg[1]) i = DNS_C_ANY; else if ((i = dns_findclassname(optarg)) < 0) die(0, "unrecognized query class `%s'", optarg); qcls = i; break; case 'a': qtyp = DNS_T_ANY; ++verbose; break; case 'n': if (nns >= DNS_MAXSERV) die(0, "too many nameservers, %d max", DNS_MAXSERV); ns[nns++] = optarg; break; case 'o': case 'f': { char *opt; const char *const delim = " \t,;"; for(opt = strtok(optarg, delim); opt != NULL; opt = strtok(NULL, delim)) { if (dns_set_opts(NULL, optarg) == 0) ; else if (strcmp(opt, "aa") == 0) flags |= DNS_AAONLY; else if (strcmp(optarg, "nord") == 0) flags |= DNS_NORD; else if (strcmp(optarg, "dnssec") == 0) flags |= DNS_SET_DO; else if (strcmp(optarg, "do") == 0) flags |= DNS_SET_DO; else if (strcmp(optarg, "cd") == 0) flags |= DNS_SET_CD; else die(0, "invalid option: `%s'", opt); } break; } case 'h': printf( "%s: simple DNS query tool (using udns version %s)\n" "Usage: %s [options] domain-name...\n" "where options are:\n" " -h - print this help and exit\n" " -v - be more verbose\n" " -q - be less verbose\n" " -t type - set query type (A, AAA, PTR etc)\n" " -c class - set query class (IN (default), CH, HS, *)\n" " -a - equivalent to -t ANY -v\n" " -n ns - use given nameserver(s) instead of default\n" " (may be specified multiple times)\n" " -o opt,opt,... (comma- or space-separated list,\n" " may be specified more than once):\n" " set resovler options (the same as setting $RES_OPTIONS):\n" " timeout:sec - initial query timeout\n" " attempts:num - number of attempt to resovle a query\n" " ndots:num - if name has more than num dots, lookup it before search\n" " port:num - port number for queries instead of default 53\n" " udpbuf:num - size of UDP buffer (use EDNS0 if >512)\n" " or query flags:\n" " aa,nord,dnssec,do,cd - set query flag (auth-only, no recursion,\n" " enable DNSSEC (DNSSEC Ok), check disabled)\n" , progname, dns_version(), progname); return 0; default: die(0, "try `%s -h' for help", progname); }
argc -= optind; argv += optind; if (!argc) die(0, "no name(s) to query specified");
if (nns) { /* if nameservers given as names, resolve them.
* We only allow IPv4 nameservers as names for now. * Ok, it is easy enouth to try both AAAA and A, * but the question is what to do by default. */ struct sockaddr_in sin; int j, r = 0, opened = 0; memset(&sin, 0, sizeof(sin)); sin.sin_family = AF_INET; sin.sin_port = htons(dns_set_opt(NULL, DNS_OPT_PORT, -1)); dns_add_serv(NULL, NULL); for(i = 0; i < nns; ++i) { if (dns_pton(AF_INET, ns[i], &sin.sin_addr) <= 0) { struct dns_rr_a4 *rr; if (!opened) { if (dns_open(nctx) < 0) die(errno, "unable to initialize dns context"); opened = 1; } rr = dns_resolve_a4(nctx, ns[i], 0); if (!rr) die(0, "unable to resolve nameserver %s: %s", ns[i], dns_strerror(dns_status(nctx))); for(j = 0; j < rr->dnsa4_nrr; ++j) { sin.sin_addr = rr->dnsa4_addr[j]; if ((r = dns_add_serv_s(NULL, (struct sockaddr *)&sin)) < 0) break; } free(rr); } else r = dns_add_serv_s(NULL, (struct sockaddr *)&sin); if (r < 0) die(errno, "unable to add nameserver %s", dns_xntop(AF_INET, &sin.sin_addr)); } } dns_free(nctx);
fd = dns_open(NULL); if (fd < 0) die(errno, "unable to initialize dns context");
if (verbose > 1) dns_set_dbgfn(NULL, dbgcb);
if (flags) dns_set_opt(NULL, DNS_OPT_FLAGS, flags);
for (i = 0; i < argc; ++i) { char *name = argv[i]; union { struct in_addr addr; struct in6_addr addr6; } a; unsigned char dn[DNS_MAXDN]; enum dns_type l_qtyp = 0; int abs; if (dns_pton(AF_INET, name, &a.addr) > 0) { dns_a4todn(&a.addr, 0, dn, sizeof(dn)); l_qtyp = DNS_T_PTR; abs = 1; } #ifdef HAVE_IPv6
else if (dns_pton(AF_INET6, name, &a.addr6) > 0) { dns_a6todn(&a.addr6, 0, dn, sizeof(dn)); l_qtyp = DNS_T_PTR; abs = 1; } #endif
else if (!dns_ptodn(name, strlen(name), dn, sizeof(dn), &abs)) die(0, "invalid name `%s'\n", name); else l_qtyp = DNS_T_A; if (qtyp) l_qtyp = qtyp; q = query_new(name, dn, l_qtyp); if (abs) abs = DNS_NOSRCH; if (!dns_submit_dn(NULL, dn, qcls, l_qtyp, abs, 0, dnscb, q)) dnserror(q, dns_status(NULL)); }
FD_ZERO(&fds); now = 0; while((i = dns_timeouts(NULL, -1, now)) > 0) { FD_SET(fd, &fds); tv.tv_sec = i; tv.tv_usec = 0; i = select(fd+1, &fds, 0, 0, &tv); now = time(NULL); if (i > 0) dns_ioevent(NULL, now); }
return errors ? 1 : notfound ? 100 : 0; }
|