You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
701 lines
17 KiB
701 lines
17 KiB
/*
|
|
* libwebsockets - small server side websockets and web server implementation
|
|
*
|
|
* Copyright (C) 2010 - 2019 Andy Green <andy@warmcat.com>
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
* of this software and associated documentation files (the "Software"), to
|
|
* deal in the Software without restriction, including without limitation the
|
|
* rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
|
|
* sell copies of the Software, and to permit persons to whom the Software is
|
|
* furnished to do so, subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included in
|
|
* all copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
|
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
|
* IN THE SOFTWARE.
|
|
*/
|
|
|
|
#include "private-lib-core.h"
|
|
#include "private-lib-async-dns.h"
|
|
|
|
|
|
/* updates *dest, returns chars used from ls directly, else -1 for fail */
|
|
|
|
static int
|
|
lws_adns_parse_label(const uint8_t *pkt, int len, const uint8_t *ls, int budget,
|
|
char **dest, int dl)
|
|
{
|
|
const uint8_t *e = pkt + len, *ols = ls;
|
|
char pointer = 0, first = 1;
|
|
uint8_t ll;
|
|
int n;
|
|
|
|
if (budget < 1)
|
|
return 0;
|
|
|
|
/* caller must catch end of labels */
|
|
assert(*ls);
|
|
|
|
again1:
|
|
if (ls >= e)
|
|
return -1;
|
|
|
|
if (((*ls) & 0xc0) == 0xc0) {
|
|
if (budget < 2)
|
|
return -1;
|
|
/* pointer into message pkt to name to actually use */
|
|
n = lws_ser_ru16be(ls) & 0x3fff;
|
|
if (n >= len) {
|
|
lwsl_notice("%s: illegal name pointer\n", __func__);
|
|
|
|
return -1;
|
|
}
|
|
|
|
/* dereference the label pointer */
|
|
ls = pkt + n;
|
|
|
|
/* are we being fuzzed or messed with? */
|
|
if (((*ls) & 0xc0) == 0xc0) {
|
|
/* ... pointer to pointer is unreasonable */
|
|
lwsl_notice("%s: label ptr to ptr invalid\n", __func__);
|
|
|
|
return -1;
|
|
}
|
|
pointer = 1;
|
|
}
|
|
|
|
if (ls >= e)
|
|
return -1;
|
|
|
|
ll = *ls++;
|
|
if (ls + ll + 1 > e) {
|
|
lwsl_notice("%s: label len invalid, %d vs %d\n", __func__,
|
|
lws_ptr_diff((ls + ll + 1), pkt), lws_ptr_diff(e, pkt));
|
|
|
|
return -1;
|
|
}
|
|
if (ll > budget) {
|
|
lwsl_notice("%s: label too long %d vs %d\n", __func__, ll, budget);
|
|
|
|
return -1;
|
|
}
|
|
|
|
if (ll + 2 > dl) {
|
|
lwsl_notice("%s: qname too large\n", __func__);
|
|
|
|
return -1;
|
|
}
|
|
|
|
/* copy the label content into place */
|
|
|
|
memcpy(*dest, ls, ll);
|
|
(*dest)[ll] = '.';
|
|
(*dest)[ll + 1] = '\0';
|
|
*dest += ll + 1;
|
|
ls += ll;
|
|
|
|
if (pointer) {
|
|
if (*ls)
|
|
goto again1;
|
|
|
|
/*
|
|
* special fun rule... if whole qname was a pointer label,
|
|
* it has no 00 terminator afterwards
|
|
*/
|
|
if (first)
|
|
return 2; /* we just took the 16-bit pointer */
|
|
|
|
return 3;
|
|
}
|
|
|
|
first = 0;
|
|
|
|
if (*ls)
|
|
goto again1;
|
|
|
|
ls++;
|
|
|
|
return ls - ols;
|
|
}
|
|
|
|
typedef int (*lws_async_dns_find_t)(const char *name, void *opaque,
|
|
uint32_t ttl, adns_query_type_t type,
|
|
const uint8_t *payload);
|
|
|
|
/* locally query the response packet */
|
|
|
|
struct label_stack {
|
|
char name[DNS_MAX];
|
|
int enl;
|
|
const uint8_t *p;
|
|
};
|
|
|
|
/*
|
|
* Walk the response packet, calling back to the user-provided callback for each
|
|
* A (and AAAA if LWS_IPV6=1) record with a matching name found in there.
|
|
*
|
|
* Able to recurse using an explicit non-CPU stack to resolve CNAME usages
|
|
*
|
|
* Return -1: unexpectedly failed
|
|
* 0: found
|
|
* 1: didn't find anything matching
|
|
*/
|
|
|
|
static int
|
|
lws_adns_iterate(lws_adns_q_t *q, const uint8_t *pkt, int len,
|
|
const char *expname, lws_async_dns_find_t cb, void *opaque)
|
|
{
|
|
const uint8_t *e = pkt + len, *p, *pay;
|
|
struct label_stack stack[4];
|
|
int n = 0, stp = 0, ansc, m;
|
|
uint16_t rrtype, rrpaylen;
|
|
char *sp, inq;
|
|
uint32_t ttl;
|
|
|
|
lws_strncpy(stack[0].name, expname, sizeof(stack[0].name));
|
|
stack[0].enl = strlen(expname);
|
|
|
|
start:
|
|
ansc = lws_ser_ru16be(pkt + DHO_NANSWERS);
|
|
p = pkt + DHO_SIZEOF;
|
|
inq = 1;
|
|
|
|
/*
|
|
* The response also includes the query... and we have to parse it
|
|
* so we can understand we reached the response... there's a QNAME
|
|
* made up of labels and then 2 x 16-bit fields, for query type and
|
|
* query class
|
|
*/
|
|
|
|
|
|
while (p + 14 < e && (inq || ansc)) {
|
|
|
|
if (!inq && !stp)
|
|
ansc--;
|
|
|
|
/*
|
|
* First is the name the query applies to... two main
|
|
* formats can appear here, one is a pointer to
|
|
* elsewhere in the message, the other separately
|
|
* provides len / data for each dotted "label", so for
|
|
* "warmcat.com" warmcat and com are given each with a
|
|
* prepended length byte. Any of those may be a pointer
|
|
* to somewhere else in the packet :-/
|
|
*
|
|
* Paranoia is appropriate since the name length must be
|
|
* parsed out before the rest of the RR can be used and
|
|
* we can be attacked with absolutely any crafted
|
|
* content easily via UDP.
|
|
*
|
|
* So parse the name and additionally confirm it matches
|
|
* what the query the TID belongs to actually asked for.
|
|
*/
|
|
|
|
sp = stack[0].name;
|
|
|
|
/* while we have more labels */
|
|
|
|
n = lws_adns_parse_label(pkt, len, p, len, &sp,
|
|
sizeof(stack[0].name) -
|
|
lws_ptr_diff(sp, stack[0].name));
|
|
/* includes case name won't fit */
|
|
if (n < 0)
|
|
return -1;
|
|
|
|
p += n;
|
|
|
|
if (p + (inq ? 5 : 14) > e)
|
|
return -1;
|
|
|
|
/*
|
|
* p is now just after the decoded RR name, pointing at: type
|
|
*
|
|
* We sent class = 1 = IN query... response must match
|
|
*/
|
|
|
|
if (lws_ser_ru16be(&p[2]) != 1) {
|
|
lwsl_err("%s: non-IN response 0x%x\n", __func__,
|
|
lws_ser_ru16be(&p[2]));
|
|
|
|
return -1;
|
|
}
|
|
|
|
if (inq) {
|
|
lwsl_debug("%s: reached end of inq\n", __func__);
|
|
inq = 0;
|
|
p += 4;
|
|
continue;
|
|
}
|
|
|
|
/* carefully validate the claimed RR payload length */
|
|
|
|
rrpaylen = lws_ser_ru16be(&p[8]);
|
|
if (p + 10 + rrpaylen > e) { /* it may be == e */
|
|
lwsl_notice("%s: invalid RR data length\n", __func__);
|
|
|
|
return -1;
|
|
}
|
|
|
|
ttl = lws_ser_ru32be(&p[4]);
|
|
rrtype = lws_ser_ru16be(&p[0]);
|
|
p += 10; /* point to the payload */
|
|
pay = p;
|
|
|
|
/*
|
|
* Compare the RR names, allowing for the decoded labelname
|
|
* to have an extra '.' at the end.
|
|
*/
|
|
|
|
n = lws_ptr_diff(sp, stack[0].name);
|
|
if (stack[0].name[n - 1] == '.')
|
|
n--;
|
|
|
|
m = stack[stp].enl;
|
|
if (stack[stp].name[m - 1] == '.')
|
|
m--;
|
|
|
|
if (n < 1 || n != m ||
|
|
strncmp(stack[0].name, stack[stp].name, n)) {
|
|
lwsl_notice("%s: skipping %s vs %s\n", __func__,
|
|
stack[0].name, stack[stp].name);
|
|
goto skip;
|
|
}
|
|
|
|
/*
|
|
* It's something we could be interested in...
|
|
*
|
|
* We can skip RRs we don't understand. But we need to deal
|
|
* with at least these and their payloads:
|
|
*
|
|
* A: 4: ipv4 address
|
|
* AAAA: 16: ipv6 address (if asked for AAAA)
|
|
* CNAME: ?: labelized name
|
|
*
|
|
* If we hit a CNAME we need to try to dereference it with
|
|
* stuff that is in the same response packet and judge it
|
|
* from that, without losing our place here. CNAMEs may
|
|
* point to CNAMEs to whatever depth we're willing to handle.
|
|
*/
|
|
|
|
switch (rrtype) {
|
|
|
|
case LWS_ADNS_RECORD_AAAA:
|
|
if (rrpaylen != 16) {
|
|
lwsl_err("%s: unexpected rrpaylen\n", __func__);
|
|
return -1;
|
|
}
|
|
#if defined(LWS_WITH_IPV6)
|
|
goto do_cb;
|
|
#else
|
|
break;
|
|
#endif
|
|
|
|
case LWS_ADNS_RECORD_A:
|
|
if (rrpaylen != 4) {
|
|
lwsl_err("%s: unexpected rrpaylen4\n", __func__);
|
|
|
|
return -1;
|
|
}
|
|
#if defined(LWS_WITH_IPV6)
|
|
do_cb:
|
|
#endif
|
|
cb(stack[0].name, opaque, ttl, rrtype, p);
|
|
break;
|
|
|
|
case LWS_ADNS_RECORD_CNAME:
|
|
/*
|
|
* The name the CNAME refers to MAY itself be
|
|
* included elsewhere in the response packet.
|
|
*
|
|
* So switch tack, stack where to resume from and
|
|
* search for the decoded CNAME label name definition
|
|
* instead.
|
|
*
|
|
* First decode the CNAME label payload into the next
|
|
* stack level buffer for it.
|
|
*/
|
|
|
|
if (++stp == (int)LWS_ARRAY_SIZE(stack)) {
|
|
lwsl_notice("%s: CNAMEs too deep\n", __func__);
|
|
|
|
return -1;
|
|
}
|
|
sp = stack[stp].name;
|
|
/* get the cname alias */
|
|
n = lws_adns_parse_label(pkt, len, p, rrpaylen, &sp,
|
|
sizeof(stack[stp].name) -
|
|
lws_ptr_diff(sp, stack[stp].name));
|
|
/* includes case name won't fit */
|
|
if (n < 0)
|
|
return -1;
|
|
|
|
p += n;
|
|
|
|
if (p + 14 > e)
|
|
return -1;
|
|
#if 0
|
|
/* it should have exactly reached rrpaylen if only one
|
|
* CNAME, else somewhere in the middle */
|
|
|
|
if (p != pay + rrpaylen) {
|
|
lwsl_err("%s: cname name bad len %d\n", __func__, rrpaylen);
|
|
|
|
return -1;
|
|
}
|
|
#endif
|
|
lwsl_notice("%s: recursing looking for %s\n", __func__, stack[stp].name);
|
|
|
|
lwsl_info("%s: recursing looking for %s\n", __func__,
|
|
stack[stp].name);
|
|
|
|
stack[stp].enl = lws_ptr_diff(sp, stack[stp].name);
|
|
/* when we unstack, resume from here */
|
|
stack[stp].p = pay + rrpaylen;
|
|
goto start;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
skip:
|
|
p += rrpaylen;
|
|
}
|
|
|
|
if (!stp)
|
|
return 1; /* we didn't find anything, but we didn't error */
|
|
|
|
lwsl_info("%s: '%s' -> CNAME '%s' resolution not provided, recursing\n",
|
|
__func__, ((const char *)&q[1]) + DNS_MAX,
|
|
stack[stp].name);
|
|
|
|
/*
|
|
* This implies there wasn't any usable definition for the
|
|
* CNAME in the end, eg, only AAAA when we needed an A.
|
|
*
|
|
* It's also legit if the DNS just returns the CNAME, and that server
|
|
* did not directly know the next step in resolution of the CNAME, so
|
|
* instead of putting the resolution elsewhere in the response, has
|
|
* told us just the CNAME and left it to us to find out its resolution
|
|
* separately.
|
|
*
|
|
* Reset this request to be for the CNAME, and restart the request
|
|
* action with a new tid.
|
|
*/
|
|
|
|
if (lws_async_dns_get_new_tid(q->context, q))
|
|
return -1;
|
|
|
|
q->tid &= 0xfffe;
|
|
q->asked = q->responded = 0;
|
|
#if defined(LWS_WITH_IPV6)
|
|
q->sent[1] = 0;
|
|
#endif
|
|
q->sent[0] = 0;
|
|
q->recursion++;
|
|
if (q->recursion == DNS_RECURSION_LIMIT) {
|
|
lwsl_err("%s: recursion overflow\n", __func__);
|
|
|
|
return -1;
|
|
}
|
|
|
|
if (q->firstcache)
|
|
lws_adns_cache_destroy(q->firstcache);
|
|
q->firstcache = NULL;
|
|
|
|
/* overwrite the query name with the CNAME */
|
|
|
|
n = 0;
|
|
{
|
|
char *cp = (char *)&q[1];
|
|
|
|
while (stack[stp].name[n])
|
|
*cp++ = tolower(stack[stp].name[n++]);
|
|
/* trim the following . if any */
|
|
if (n && cp[-1] == '.')
|
|
cp--;
|
|
*cp = '\0';
|
|
}
|
|
|
|
lws_callback_on_writable(q->dns->wsi);
|
|
|
|
return 2;
|
|
}
|
|
|
|
int
|
|
lws_async_dns_estimate(const char *name, void *opaque, uint32_t ttl,
|
|
adns_query_type_t type, const uint8_t *payload)
|
|
{
|
|
size_t *est = (size_t *)opaque, my;
|
|
|
|
my = sizeof(struct addrinfo);
|
|
if (type == LWS_ADNS_RECORD_AAAA)
|
|
my += sizeof(struct sockaddr_in6);
|
|
else
|
|
my += sizeof(struct sockaddr_in);
|
|
|
|
*est += my;
|
|
|
|
return 0;
|
|
}
|
|
|
|
struct adstore {
|
|
const char *name;
|
|
struct addrinfo *pos;
|
|
struct addrinfo *prev;
|
|
int ctr;
|
|
uint32_t smallest_ttl;
|
|
uint8_t flags;
|
|
};
|
|
|
|
/*
|
|
* Callback for each A or AAAA record, creating getaddrinfo-compatible results
|
|
* into the preallocated exact-sized storage.
|
|
*/
|
|
int
|
|
lws_async_dns_store(const char *name, void *opaque, uint32_t ttl,
|
|
adns_query_type_t type, const uint8_t *payload)
|
|
{
|
|
struct adstore *adst = (struct adstore *)opaque;
|
|
#if defined(_DEBUG)
|
|
char buf[48];
|
|
#endif
|
|
size_t i;
|
|
|
|
if (ttl < adst->smallest_ttl || !adst->ctr)
|
|
adst->smallest_ttl = ttl;
|
|
|
|
if (adst->prev)
|
|
adst->prev->ai_next = adst->pos;
|
|
adst->prev = adst->pos;
|
|
|
|
adst->pos->ai_flags = 0;
|
|
adst->pos->ai_family = type == LWS_ADNS_RECORD_AAAA ?
|
|
AF_INET6 : AF_INET;
|
|
adst->pos->ai_socktype = SOCK_STREAM;
|
|
adst->pos->ai_protocol = IPPROTO_UDP; /* no meaning */
|
|
adst->pos->ai_addrlen = type == LWS_ADNS_RECORD_AAAA ?
|
|
sizeof(struct sockaddr_in6) :
|
|
sizeof(struct sockaddr_in);
|
|
adst->pos->ai_canonname = (char *)adst->name;
|
|
adst->pos->ai_addr = (struct sockaddr *)&adst->pos[1];
|
|
adst->pos->ai_next = NULL;
|
|
|
|
#if defined(LWS_WITH_IPV6)
|
|
if (type == LWS_ADNS_RECORD_AAAA) {
|
|
struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)&adst->pos[1];
|
|
|
|
i = sizeof(*in6);
|
|
memset(in6, 0, i);
|
|
in6->sin6_family = adst->pos->ai_family;
|
|
memcpy(in6->sin6_addr.s6_addr, payload, 16);
|
|
adst->flags |= 2;
|
|
} else
|
|
#endif
|
|
{
|
|
struct sockaddr_in *in = (struct sockaddr_in *)&adst->pos[1];
|
|
|
|
i = sizeof(*in);
|
|
memset(in, 0, i);
|
|
in->sin_family = adst->pos->ai_family;
|
|
memcpy(&in->sin_addr.s_addr, payload, 4);
|
|
adst->flags |= 1;
|
|
}
|
|
|
|
adst->pos = (struct addrinfo *)((uint8_t *)adst->pos +
|
|
sizeof(struct addrinfo) + i);
|
|
|
|
#if defined(_DEBUG)
|
|
if (lws_write_numeric_address(payload,
|
|
type == LWS_ADNS_RECORD_AAAA ? 16 : 4,
|
|
buf, sizeof(buf)) > 0)
|
|
lwsl_info("%s: %d: %s: %s\n", __func__, adst->ctr,
|
|
adst->name, buf);
|
|
#endif
|
|
adst->ctr++;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* We want to parse out all A or AAAA records
|
|
*/
|
|
|
|
void
|
|
lws_adns_parse_udp(lws_async_dns_t *dns, const uint8_t *pkt, size_t len)
|
|
{
|
|
const char *nm, *nmcname;
|
|
lws_adns_cache_t *c;
|
|
struct adstore adst;
|
|
lws_adns_q_t *q;
|
|
int n, ncname;
|
|
size_t est;
|
|
|
|
// lwsl_hexdump_notice(pkt, len);
|
|
|
|
/* we have to at least have the header */
|
|
|
|
if (len < DHO_SIZEOF)
|
|
return;
|
|
|
|
/* we asked with one query, so anything else is bogus */
|
|
|
|
if (lws_ser_ru16be(pkt + DHO_NQUERIES) != 1)
|
|
return;
|
|
|
|
/* match both A and AAAA queries if any */
|
|
|
|
q = lws_adns_get_query(dns, 0, &dns->waiting,
|
|
lws_ser_ru16be(pkt + DHO_TID), NULL);
|
|
if (!q) {
|
|
lwsl_notice("%s: dropping unknown query tid 0x%x\n",
|
|
__func__, lws_ser_ru16be(pkt + DHO_TID));
|
|
|
|
return;
|
|
}
|
|
|
|
/* we can get dups... drop any that have already happened */
|
|
|
|
n = 1 << (lws_ser_ru16be(pkt + DHO_TID) & 1);
|
|
if (q->responded & n) {
|
|
lwsl_notice("%s: dup\n", __func__);
|
|
goto fail_out;
|
|
}
|
|
|
|
q->responded |= n;
|
|
|
|
/* we want to confirm the results against what we last requested... */
|
|
|
|
nmcname = ((const char *)&q[1]);
|
|
|
|
/*
|
|
* First walk the packet figuring out the allocation needed for all
|
|
* the results. Produce the following layout at c
|
|
*
|
|
* lws_adns_cache_t: new cache object
|
|
* [struct addrinfo + struct sockaddr_in or _in6]: for each A or AAAA
|
|
* char []: copy of resolved name
|
|
*/
|
|
|
|
ncname = strlen(nmcname) + 1;
|
|
|
|
est = sizeof(lws_adns_cache_t) + ncname;
|
|
if (lws_ser_ru16be(pkt + DHO_NANSWERS)) {
|
|
int ir = lws_adns_iterate(q, pkt, len, nmcname,
|
|
lws_async_dns_estimate, &est);
|
|
if (ir < 0)
|
|
goto fail_out;
|
|
|
|
if (ir == 2) /* CNAME recursive resolution */
|
|
return;
|
|
}
|
|
|
|
/* but we want to create the cache entry against the original request */
|
|
|
|
nm = ((const char *)&q[1]) + DNS_MAX;
|
|
n = strlen(nm) + 1;
|
|
|
|
lwsl_info("%s: create cache entry for %s, %zu\n", __func__, nm,
|
|
est - sizeof(lws_adns_cache_t));
|
|
c = lws_malloc(est, "async-dns-entry");
|
|
if (!c) {
|
|
lwsl_err("%s: OOM %zu\n", __func__, est);
|
|
goto fail_out;
|
|
}
|
|
memset(c, 0, sizeof(*c));
|
|
|
|
/* place it at end, no need to care about alignment padding */
|
|
adst.name = ((const char *)c) + est - n;
|
|
memcpy((char *)adst.name, nm, n);
|
|
|
|
/*
|
|
* Then walk the packet again, placing the objects we accounted for
|
|
* the first time into the result allocation after the cache object
|
|
* and copy of the name
|
|
*/
|
|
|
|
adst.pos = (struct addrinfo *)&c[1];
|
|
adst.prev = NULL;
|
|
adst.ctr = 0;
|
|
adst.smallest_ttl = 3600;
|
|
adst.flags = 0;
|
|
|
|
/*
|
|
* smallest_ttl applies as it is to empty results (NXDOMAIN), or is
|
|
* set to the minimum ttl seen in all the results.
|
|
*/
|
|
|
|
if (lws_ser_ru16be(pkt + DHO_NANSWERS) &&
|
|
lws_adns_iterate(q, pkt, len, nmcname, lws_async_dns_store, &adst) < 0) {
|
|
lws_free(c);
|
|
goto fail_out;
|
|
}
|
|
|
|
if (lws_ser_ru16be(pkt + DHO_NANSWERS)) {
|
|
c->results = (struct addrinfo *)&c[1];
|
|
if (q->last) /* chain the second one on */
|
|
*q->last = c->results;
|
|
else /* first one had no results, set first guy's c->results */
|
|
if (q->firstcache)
|
|
q->firstcache->results = c->results;
|
|
}
|
|
|
|
if (adst.prev) /* so we know where to continue the addrinfo list */
|
|
/* can be NULL if first resp empty */
|
|
q->last = &adst.prev->ai_next;
|
|
|
|
if (q->firstcache) { /* also need to free chain when we free this guy */
|
|
q->firstcache->chain = c;
|
|
c->firstcache = q->firstcache;
|
|
} else {
|
|
|
|
q->firstcache = c;
|
|
c->incomplete = q->responded != q->asked;
|
|
|
|
/*
|
|
* Only register the first one into the cache...
|
|
* Trim the oldest cache entry if necessary
|
|
*/
|
|
|
|
lws_async_dns_trim_cache(dns);
|
|
|
|
/*
|
|
* cache the first results object... if a second one comes,
|
|
* we won't directly register it but will chain it on to this
|
|
* first one and continue to addinfo ai_next linked list from
|
|
* the first into the second
|
|
*/
|
|
|
|
c->flags = adst.flags;
|
|
lws_dll2_add_head(&c->list, &dns->cached);
|
|
lws_sul_schedule(q->context, 0, &c->sul, sul_cb_expire,
|
|
lws_now_usecs() +
|
|
(adst.smallest_ttl * LWS_US_PER_SEC));
|
|
}
|
|
|
|
if (q->responded != q->asked)
|
|
return;
|
|
|
|
/*
|
|
* Now we captured everything into the new object, return the
|
|
* addrinfo results, if any, to all interested wsi, if any...
|
|
*/
|
|
|
|
c->incomplete = 0;
|
|
lws_async_dns_complete(q, q->firstcache);
|
|
|
|
/*
|
|
* the query is completely finished with
|
|
*/
|
|
|
|
fail_out:
|
|
lws_adns_q_destroy(q);
|
|
}
|
|
|