2002-09-03 07:52:59 -04:00
|
|
|
/***************************************************************************
|
1999-12-29 09:20:26 -05:00
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2004-01-07 04:19:33 -05:00
|
|
|
* Copyright (C) 1998 - 2004, Daniel Stenberg, <daniel@haxx.se>, et al.
|
1999-12-29 09:20:26 -05:00
|
|
|
*
|
2002-09-03 07:52:59 -04:00
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
|
|
|
* are also available at http://curl.haxx.se/docs/copyright.html.
|
|
|
|
*
|
2001-01-03 04:29:33 -05:00
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
2002-09-03 07:52:59 -04:00
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
1999-12-29 09:20:26 -05:00
|
|
|
*
|
2001-01-03 04:29:33 -05:00
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
1999-12-29 09:20:26 -05:00
|
|
|
*
|
2001-01-03 04:29:33 -05:00
|
|
|
* $Id$
|
2002-09-03 07:52:59 -04:00
|
|
|
***************************************************************************/
|
1999-12-29 09:20:26 -05:00
|
|
|
|
2000-08-24 10:26:33 -04:00
|
|
|
#include "setup.h"
|
|
|
|
|
1999-12-29 09:20:26 -05:00
|
|
|
#include <string.h>
|
2000-08-23 03:23:42 -04:00
|
|
|
#include <errno.h>
|
1999-12-29 09:20:26 -05:00
|
|
|
|
2000-08-23 03:23:42 -04:00
|
|
|
#define _REENTRANT
|
|
|
|
|
1999-12-29 09:20:26 -05:00
|
|
|
#if defined(WIN32) && !defined(__GNUC__) || defined(__MINGW32__)
|
2003-10-14 08:00:45 -04:00
|
|
|
#include <malloc.h>
|
1999-12-29 09:20:26 -05:00
|
|
|
#else
|
|
|
|
#ifdef HAVE_SYS_TYPES_H
|
|
|
|
#include <sys/types.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_SYS_SOCKET_H
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#endif
|
2000-08-23 03:23:42 -04:00
|
|
|
#ifdef HAVE_NETINET_IN_H
|
1999-12-29 09:20:26 -05:00
|
|
|
#include <netinet/in.h>
|
2000-08-23 03:23:42 -04:00
|
|
|
#endif
|
|
|
|
#ifdef HAVE_NETDB_H
|
1999-12-29 09:20:26 -05:00
|
|
|
#include <netdb.h>
|
2000-08-23 03:23:42 -04:00
|
|
|
#endif
|
1999-12-29 09:20:26 -05:00
|
|
|
#ifdef HAVE_ARPA_INET_H
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#endif
|
2001-12-04 08:03:08 -05:00
|
|
|
#ifdef HAVE_STDLIB_H
|
|
|
|
#include <stdlib.h> /* required for free() prototypes */
|
|
|
|
#endif
|
2001-08-06 08:19:26 -04:00
|
|
|
#ifdef VMS
|
2002-02-20 08:46:53 -05:00
|
|
|
#include <in.h>
|
2001-08-06 08:19:26 -04:00
|
|
|
#include <inet.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#endif
|
1999-12-29 09:20:26 -05:00
|
|
|
#endif
|
|
|
|
|
2002-06-11 11:10:18 -04:00
|
|
|
#ifdef HAVE_SETJMP_H
|
|
|
|
#include <setjmp.h>
|
|
|
|
#endif
|
|
|
|
|
2004-04-06 10:51:14 -04:00
|
|
|
#ifdef WIN32
|
|
|
|
#include <process.h>
|
|
|
|
#endif
|
|
|
|
|
2004-03-17 07:46:42 -05:00
|
|
|
#if (defined(NETWARE) && defined(__NOVELL_LIBC__))
|
|
|
|
#undef in_addr_t
|
|
|
|
#define in_addr_t unsigned long
|
|
|
|
#endif
|
|
|
|
|
1999-12-29 09:20:26 -05:00
|
|
|
#include "urldata.h"
|
|
|
|
#include "sendf.h"
|
2001-09-28 03:05:26 -04:00
|
|
|
#include "hostip.h"
|
2002-01-03 05:22:59 -05:00
|
|
|
#include "hash.h"
|
2003-02-04 18:48:46 -05:00
|
|
|
#include "share.h"
|
2004-04-06 10:51:14 -04:00
|
|
|
#include "strerror.h"
|
2003-08-05 10:40:59 -04:00
|
|
|
#include "url.h"
|
1999-12-29 09:20:26 -05:00
|
|
|
|
2002-01-17 03:03:48 -05:00
|
|
|
#define _MPRINTF_REPLACE /* use our functions only */
|
|
|
|
#include <curl/mprintf.h>
|
|
|
|
|
2000-08-24 08:33:16 -04:00
|
|
|
#if defined(HAVE_INET_NTOA_R) && !defined(HAVE_INET_NTOA_R_DECL)
|
2000-05-29 18:51:13 -04:00
|
|
|
#include "inet_ntoa_r.h"
|
|
|
|
#endif
|
|
|
|
|
2000-10-09 07:12:34 -04:00
|
|
|
/* The last #include file should be: */
|
2003-06-26 07:22:12 -04:00
|
|
|
#ifdef CURLDEBUG
|
2000-10-09 07:12:34 -04:00
|
|
|
#include "memdebug.h"
|
|
|
|
#endif
|
|
|
|
|
2004-02-20 11:41:50 -05:00
|
|
|
#ifndef ARES_SUCCESS
|
|
|
|
#define ARES_SUCCESS CURLE_OK
|
|
|
|
#endif
|
|
|
|
|
2004-03-31 07:55:24 -05:00
|
|
|
#define CURL_TIMEOUT_RESOLVE 300 /* when using asynch methods, we allow this
|
|
|
|
many seconds for a name resolve */
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/* These two symbols are for the global DNS cache */
|
2002-01-03 05:22:59 -05:00
|
|
|
static curl_hash hostname_cache;
|
2002-01-07 15:52:32 -05:00
|
|
|
static int host_cache_initialized;
|
2002-01-03 05:22:59 -05:00
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
|
|
|
|
static void freednsentry(void *freethis);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* my_getaddrinfo() is the generic low-level name resolve API within this
|
|
|
|
* source file. There exist three versions of this function - for different
|
|
|
|
* name resolve layers (selected at build-time). They all take this same set
|
|
|
|
* of arguments
|
|
|
|
*/
|
2003-08-05 10:40:59 -04:00
|
|
|
static Curl_addrinfo *my_getaddrinfo(struct connectdata *conn,
|
|
|
|
char *hostname,
|
|
|
|
int port,
|
|
|
|
int *waitp);
|
2004-04-06 10:51:14 -04:00
|
|
|
|
2004-04-06 11:09:43 -04:00
|
|
|
#if (!defined(HAVE_GETHOSTBYNAME_R) || defined(USE_ARES) || \
|
|
|
|
defined(USE_THREADING_GETHOSTBYNAME)) && \
|
|
|
|
!defined(ENABLE_IPV6)
|
2003-08-05 10:40:59 -04:00
|
|
|
static struct hostent* pack_hostent(char** buf, struct hostent* orig);
|
2004-04-06 11:09:43 -04:00
|
|
|
#endif
|
2002-11-05 05:51:41 -05:00
|
|
|
|
2004-02-20 11:41:50 -05:00
|
|
|
#ifdef USE_THREADING_GETHOSTBYNAME
|
2004-03-09 16:42:43 -05:00
|
|
|
#ifdef DEBUG_THREADING_GETHOSTBYNAME
|
|
|
|
/* If this is defined, provide tracing */
|
2004-02-20 11:41:50 -05:00
|
|
|
#define TRACE(args) \
|
|
|
|
do { trace_it("%u: ", __LINE__); trace_it args; } while (0)
|
|
|
|
|
|
|
|
static void trace_it (const char *fmt, ...);
|
2004-03-09 16:42:43 -05:00
|
|
|
#else
|
|
|
|
#define TRACE(x)
|
|
|
|
#endif
|
|
|
|
|
2004-02-20 11:41:50 -05:00
|
|
|
static bool init_gethostbyname_thread (struct connectdata *conn,
|
|
|
|
const char *hostname, int port);
|
|
|
|
struct thread_data {
|
|
|
|
HANDLE thread_hnd;
|
2004-04-06 10:51:14 -04:00
|
|
|
unsigned thread_id;
|
2004-02-20 11:41:50 -05:00
|
|
|
DWORD thread_status;
|
2004-04-13 09:59:12 -04:00
|
|
|
curl_socket_t dummy_sock; /* dummy for Curl_multi_ares_fdset() */
|
2004-02-20 11:41:50 -05:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Curl_global_host_cache_init() initializes and sets up a global DNS cache.
|
|
|
|
* Global DNS cache is general badness. Do not use. This will be removed in
|
|
|
|
* a future version. Use the share interface instead!
|
|
|
|
*/
|
2002-01-07 15:52:32 -05:00
|
|
|
void Curl_global_host_cache_init(void)
|
2002-01-03 05:22:59 -05:00
|
|
|
{
|
2002-01-07 15:52:32 -05:00
|
|
|
if (!host_cache_initialized) {
|
2004-03-30 08:02:07 -05:00
|
|
|
Curl_hash_init(&hostname_cache, 7, freednsentry);
|
2002-01-07 15:52:32 -05:00
|
|
|
host_cache_initialized = 1;
|
|
|
|
}
|
2002-01-03 05:22:59 -05:00
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Return a pointer to the global cache
|
|
|
|
*/
|
2002-01-07 15:52:32 -05:00
|
|
|
curl_hash *Curl_global_host_cache_get(void)
|
2002-01-03 05:22:59 -05:00
|
|
|
{
|
2002-01-07 15:52:32 -05:00
|
|
|
return &hostname_cache;
|
2002-01-03 05:22:59 -05:00
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Destroy and cleanup the global DNS cache
|
|
|
|
*/
|
2002-01-07 15:52:32 -05:00
|
|
|
void Curl_global_host_cache_dtor(void)
|
|
|
|
{
|
|
|
|
if (host_cache_initialized) {
|
2002-04-27 09:07:51 -04:00
|
|
|
Curl_hash_clean(&hostname_cache);
|
2002-01-07 15:55:35 -05:00
|
|
|
host_cache_initialized = 0;
|
2002-01-07 15:52:32 -05:00
|
|
|
}
|
|
|
|
}
|
2002-01-03 05:22:59 -05:00
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Minor utility-function:
|
|
|
|
* Count the number of characters that an integer takes up.
|
|
|
|
*/
|
2002-01-17 01:55:37 -05:00
|
|
|
static int _num_chars(int i)
|
|
|
|
{
|
|
|
|
int chars = 0;
|
|
|
|
|
2002-01-17 02:38:25 -05:00
|
|
|
/* While the number divided by 10 is greater than one,
|
|
|
|
* re-divide the number by 10, and increment the number of
|
|
|
|
* characters by 1.
|
|
|
|
*
|
|
|
|
* this relies on the fact that for every multiple of 10,
|
|
|
|
* a new digit is added onto every number
|
|
|
|
*/
|
2002-01-17 01:55:37 -05:00
|
|
|
do {
|
|
|
|
chars++;
|
|
|
|
|
|
|
|
i = (int) i / 10;
|
2002-01-31 02:51:06 -05:00
|
|
|
} while (i >= 1);
|
2002-01-17 01:55:37 -05:00
|
|
|
|
|
|
|
return chars;
|
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Minor utility-function:
|
|
|
|
* Create a hostcache id string for the DNS caching.
|
|
|
|
*/
|
2002-01-17 01:55:37 -05:00
|
|
|
static char *
|
2004-02-23 03:35:57 -05:00
|
|
|
create_hostcache_id(char *server, int port, size_t *entry_len)
|
2002-01-17 01:55:37 -05:00
|
|
|
{
|
|
|
|
char *id = NULL;
|
|
|
|
|
2002-01-17 02:38:25 -05:00
|
|
|
/* Get the length of the new entry id */
|
2004-02-23 03:35:57 -05:00
|
|
|
*entry_len = strlen(server) + /* Hostname length */
|
|
|
|
1 + /* ':' seperator */
|
|
|
|
_num_chars(port); /* number of characters the port will take up */
|
2002-01-17 02:38:25 -05:00
|
|
|
|
|
|
|
/* Allocate the new entry id */
|
2004-02-23 03:35:57 -05:00
|
|
|
id = malloc(*entry_len + 1); /* 1 extra for the zero terminator */
|
2003-08-05 10:40:59 -04:00
|
|
|
if (!id)
|
2002-01-17 01:55:37 -05:00
|
|
|
return NULL;
|
|
|
|
|
2002-01-17 02:38:25 -05:00
|
|
|
/* Create the new entry */
|
2004-02-23 03:35:57 -05:00
|
|
|
sprintf(id, "%s:%d", server, port);
|
2002-01-17 01:55:37 -05:00
|
|
|
|
2004-02-23 03:35:57 -05:00
|
|
|
return id; /* return pointer to the string */
|
2002-01-17 01:55:37 -05:00
|
|
|
}
|
|
|
|
|
2002-04-27 09:07:51 -04:00
|
|
|
struct hostcache_prune_data {
|
2002-04-17 16:13:55 -04:00
|
|
|
int cache_timeout;
|
2004-03-10 04:36:43 -05:00
|
|
|
time_t now;
|
2002-04-17 16:13:55 -04:00
|
|
|
};
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* This function is set as a callback to be called for every entry in the DNS
|
|
|
|
* cache when we want to prune old unused entries.
|
|
|
|
*
|
|
|
|
* Returning non-zero means remove the entry, return 0 to keep it in the
|
|
|
|
* cache.
|
|
|
|
*/
|
2002-04-17 16:13:55 -04:00
|
|
|
static int
|
2002-11-05 05:51:41 -05:00
|
|
|
hostcache_timestamp_remove(void *datap, void *hc)
|
2002-04-17 16:13:55 -04:00
|
|
|
{
|
2002-04-27 09:07:51 -04:00
|
|
|
struct hostcache_prune_data *data =
|
|
|
|
(struct hostcache_prune_data *) datap;
|
2002-11-05 05:51:41 -05:00
|
|
|
struct Curl_dns_entry *c = (struct Curl_dns_entry *) hc;
|
2002-04-17 16:13:55 -04:00
|
|
|
|
2002-11-05 05:51:41 -05:00
|
|
|
if ((data->now - c->timestamp < data->cache_timeout) ||
|
|
|
|
c->inuse) {
|
|
|
|
/* please don't remove */
|
2002-04-17 16:13:55 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2002-11-05 05:51:41 -05:00
|
|
|
/* fine, remove */
|
2002-04-17 16:13:55 -04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Prune the DNS cache. This assumes that a lock has already been taken.
|
|
|
|
*/
|
2002-04-17 16:13:55 -04:00
|
|
|
static void
|
2004-03-10 04:36:43 -05:00
|
|
|
hostcache_prune(curl_hash *hostcache, int cache_timeout, time_t now)
|
2002-04-17 16:13:55 -04:00
|
|
|
{
|
2002-04-27 09:07:51 -04:00
|
|
|
struct hostcache_prune_data user;
|
2002-04-17 16:13:55 -04:00
|
|
|
|
|
|
|
user.cache_timeout = cache_timeout;
|
|
|
|
user.now = now;
|
2004-02-15 11:57:53 -05:00
|
|
|
|
2002-04-27 09:07:51 -04:00
|
|
|
Curl_hash_clean_with_criterium(hostcache,
|
2002-04-17 16:13:55 -04:00
|
|
|
(void *) &user,
|
2002-11-05 05:51:41 -05:00
|
|
|
hostcache_timestamp_remove);
|
2002-04-17 16:13:55 -04:00
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Library-wide function for pruning the DNS cache. This function takes and
|
|
|
|
* returns the appropriate locks.
|
|
|
|
*/
|
2003-12-15 12:33:49 -05:00
|
|
|
void Curl_hostcache_prune(struct SessionHandle *data)
|
|
|
|
{
|
|
|
|
time_t now;
|
2004-02-18 02:56:18 -05:00
|
|
|
|
|
|
|
if(data->set.dns_cache_timeout == -1)
|
|
|
|
/* cache forever means never prune! */
|
|
|
|
return;
|
|
|
|
|
2003-12-15 12:33:49 -05:00
|
|
|
if(data->share)
|
|
|
|
Curl_share_lock(data, CURL_LOCK_DATA_DNS, CURL_LOCK_ACCESS_SINGLE);
|
|
|
|
|
|
|
|
time(&now);
|
|
|
|
|
|
|
|
/* Remove outdated and unused entries from the hostcache */
|
|
|
|
hostcache_prune(data->hostcache,
|
|
|
|
data->set.dns_cache_timeout,
|
|
|
|
now);
|
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
|
|
|
|
}
|
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
#ifdef HAVE_SIGSETJMP
|
2004-03-30 08:02:07 -05:00
|
|
|
/* Beware this is a global and unique instance. This is used to store the
|
|
|
|
return address that we can jump back to from inside a signal handler. This
|
|
|
|
is not thread-safe stuff. */
|
2003-08-05 10:40:59 -04:00
|
|
|
sigjmp_buf curl_jmpenv;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* cache_resolv_response() stores a 'Curl_addrinfo' struct in the DNS cache.
|
|
|
|
*
|
|
|
|
* When calling Curl_resolv() has resulted in a response with a returned
|
|
|
|
* address, we call this function to store the information in the dns
|
|
|
|
* cache etc
|
|
|
|
*
|
|
|
|
* Returns the Curl_dns_entry entry pointer or NULL if the storage failed.
|
|
|
|
*/
|
2003-08-05 10:40:59 -04:00
|
|
|
static struct Curl_dns_entry *
|
|
|
|
cache_resolv_response(struct SessionHandle *data,
|
|
|
|
Curl_addrinfo *addr,
|
|
|
|
char *hostname,
|
|
|
|
int port)
|
2002-11-05 05:51:41 -05:00
|
|
|
{
|
2003-08-05 10:40:59 -04:00
|
|
|
char *entry_id;
|
2004-02-23 03:35:57 -05:00
|
|
|
size_t entry_len;
|
2003-08-05 10:40:59 -04:00
|
|
|
struct Curl_dns_entry *dns;
|
|
|
|
time_t now;
|
|
|
|
|
|
|
|
/* Create an entry id, based upon the hostname and port */
|
|
|
|
entry_id = create_hostcache_id(hostname, port, &entry_len);
|
|
|
|
/* If we can't create the entry id, fail */
|
|
|
|
if (!entry_id)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
/* Create a new cache entry */
|
|
|
|
dns = (struct Curl_dns_entry *) malloc(sizeof(struct Curl_dns_entry));
|
|
|
|
if (!dns) {
|
|
|
|
Curl_freeaddrinfo(addr);
|
|
|
|
free(entry_id);
|
|
|
|
return NULL;
|
2002-11-05 05:51:41 -05:00
|
|
|
}
|
|
|
|
|
2003-09-14 17:17:54 -04:00
|
|
|
dns->inuse = 0; /* init to not used */
|
|
|
|
dns->addr = addr; /* this is the address(es) */
|
|
|
|
|
|
|
|
/* Store the resolved data in our DNS cache. This function may return a
|
|
|
|
pointer to an existing struct already present in the hash, and it may
|
|
|
|
return the same argument we pass in. Make no assumptions. */
|
2003-12-15 10:22:10 -05:00
|
|
|
dns = Curl_hash_add(data->hostcache, entry_id, entry_len+1, (void *)dns);
|
2003-09-14 17:17:54 -04:00
|
|
|
if(!dns) {
|
2003-12-15 10:22:10 -05:00
|
|
|
/* Major badness, run away. When this happens, the 'dns' data has
|
|
|
|
already been cleared up by Curl_hash_add(). */
|
2003-09-14 17:17:54 -04:00
|
|
|
free(entry_id);
|
|
|
|
return NULL;
|
|
|
|
}
|
2003-08-05 10:40:59 -04:00
|
|
|
time(&now);
|
|
|
|
|
2003-09-14 17:17:54 -04:00
|
|
|
dns->timestamp = now; /* used now */
|
2003-08-05 10:40:59 -04:00
|
|
|
dns->inuse++; /* mark entry as in-use */
|
|
|
|
|
|
|
|
/* free the allocated entry_id again */
|
|
|
|
free(entry_id);
|
|
|
|
|
|
|
|
return dns;
|
2002-01-17 02:38:25 -05:00
|
|
|
}
|
2002-01-17 01:55:37 -05:00
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Curl_resolv() is the main name resolve function within libcurl. It resolves
|
|
|
|
* a name and returns a pointer to the entry in the 'entry' argument (if one
|
|
|
|
* is provided). This function might return immediately if we're using asynch
|
|
|
|
* resolves. See the return codes.
|
|
|
|
*
|
|
|
|
* The cache entry we return will get its 'inuse' counter increased when this
|
|
|
|
* function is used. You MUST call Curl_resolv_unlock() later (when you're
|
|
|
|
* done using this struct) to decrease the counter again.
|
|
|
|
*
|
|
|
|
* Return codes:
|
|
|
|
*
|
|
|
|
* -1 = error, no pointer
|
|
|
|
* 0 = OK, pointer provided
|
|
|
|
* 1 = waiting for response, no pointer
|
|
|
|
*/
|
2003-08-05 10:40:59 -04:00
|
|
|
int Curl_resolv(struct connectdata *conn,
|
|
|
|
char *hostname,
|
|
|
|
int port,
|
|
|
|
struct Curl_dns_entry **entry)
|
2002-01-03 05:22:59 -05:00
|
|
|
{
|
2002-01-17 02:38:25 -05:00
|
|
|
char *entry_id = NULL;
|
2002-11-05 05:51:41 -05:00
|
|
|
struct Curl_dns_entry *dns = NULL;
|
2004-02-23 03:35:57 -05:00
|
|
|
size_t entry_len;
|
2003-08-05 10:40:59 -04:00
|
|
|
int wait;
|
|
|
|
struct SessionHandle *data = conn->data;
|
2003-11-14 06:56:15 -05:00
|
|
|
CURLcode result;
|
2003-08-05 10:40:59 -04:00
|
|
|
|
|
|
|
/* default to failure */
|
|
|
|
int rc = -1;
|
|
|
|
*entry = NULL;
|
2002-01-07 23:26:47 -05:00
|
|
|
|
2002-06-11 11:10:18 -04:00
|
|
|
#ifdef HAVE_SIGSETJMP
|
2002-11-05 05:51:41 -05:00
|
|
|
/* this allows us to time-out from the name resolver, as the timeout
|
|
|
|
will generate a signal and we will siglongjmp() from that here */
|
|
|
|
if(!data->set.no_signal && sigsetjmp(curl_jmpenv, 1)) {
|
2002-06-11 11:10:18 -04:00
|
|
|
/* this is coming from a siglongjmp() */
|
2003-04-03 11:11:47 -05:00
|
|
|
failf(data, "name lookup timed out");
|
2003-08-05 10:40:59 -04:00
|
|
|
return -1;
|
2002-06-11 11:10:18 -04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2002-01-17 02:38:25 -05:00
|
|
|
/* Create an entry id, based upon the hostname and port */
|
2002-11-05 05:51:41 -05:00
|
|
|
entry_id = create_hostcache_id(hostname, port, &entry_len);
|
|
|
|
/* If we can't create the entry id, fail */
|
|
|
|
if (!entry_id)
|
2003-08-05 10:40:59 -04:00
|
|
|
return -1;
|
2003-02-04 18:48:46 -05:00
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_lock(data, CURL_LOCK_DATA_DNS, CURL_LOCK_ACCESS_SINGLE);
|
|
|
|
|
2002-01-07 23:26:47 -05:00
|
|
|
/* See if its already in our dns cache */
|
2002-11-05 05:51:41 -05:00
|
|
|
dns = Curl_hash_pick(data->hostcache, entry_id, entry_len+1);
|
2003-10-12 09:57:41 -04:00
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
|
2002-01-07 23:26:47 -05:00
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
/* free the allocated entry_id again */
|
|
|
|
free(entry_id);
|
|
|
|
|
2002-11-05 05:51:41 -05:00
|
|
|
if (!dns) {
|
2003-08-05 10:40:59 -04:00
|
|
|
/* The entry was not in the cache. Resolve it to IP address */
|
|
|
|
|
|
|
|
/* If my_getaddrinfo() returns NULL, 'wait' might be set to a non-zero
|
|
|
|
value indicating that we need to wait for the response to the resolve
|
|
|
|
call */
|
|
|
|
Curl_addrinfo *addr = my_getaddrinfo(conn, hostname, port, &wait);
|
2002-11-05 05:51:41 -05:00
|
|
|
|
|
|
|
if (!addr) {
|
2003-10-04 10:50:45 -04:00
|
|
|
if(wait) {
|
2003-08-05 10:40:59 -04:00
|
|
|
/* the response to our resolve call will come asynchronously at
|
|
|
|
a later time, good or bad */
|
2003-10-04 10:50:45 -04:00
|
|
|
/* First, check that we haven't received the info by now */
|
2003-11-14 06:56:15 -05:00
|
|
|
result = Curl_is_resolved(conn, &dns);
|
|
|
|
if(result) /* error detected */
|
|
|
|
return -1;
|
2003-10-04 10:50:45 -04:00
|
|
|
if(dns)
|
|
|
|
rc = 0; /* pointer provided */
|
|
|
|
else
|
|
|
|
rc = 1; /* no info yet */
|
|
|
|
}
|
2002-11-05 05:51:41 -05:00
|
|
|
}
|
2004-01-14 04:05:54 -05:00
|
|
|
else {
|
2003-10-12 09:57:41 -04:00
|
|
|
if(data->share)
|
|
|
|
Curl_share_lock(data, CURL_LOCK_DATA_DNS, CURL_LOCK_ACCESS_SINGLE);
|
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
/* we got a response, store it in the cache */
|
|
|
|
dns = cache_resolv_response(data, addr, hostname, port);
|
2003-10-12 09:57:41 -04:00
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
|
2003-10-24 08:57:23 -04:00
|
|
|
|
2004-01-14 04:05:54 -05:00
|
|
|
if(!dns)
|
2003-10-24 08:57:23 -04:00
|
|
|
/* returned failure, bail out nicely */
|
|
|
|
Curl_freeaddrinfo(addr);
|
2003-12-03 02:55:51 -05:00
|
|
|
else
|
|
|
|
rc = 0;
|
2003-10-12 09:57:41 -04:00
|
|
|
}
|
2002-01-17 02:38:25 -05:00
|
|
|
}
|
2004-02-15 11:57:53 -05:00
|
|
|
else {
|
|
|
|
dns->inuse++; /* we use it! */
|
2004-01-14 04:05:54 -05:00
|
|
|
rc = 0;
|
2004-02-15 11:57:53 -05:00
|
|
|
}
|
2002-01-07 23:26:47 -05:00
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
*entry = dns;
|
2002-01-03 05:22:59 -05:00
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
return rc;
|
2002-01-03 05:22:59 -05:00
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Curl_resolv_unlock() unlocks the given cached DNS entry. When this has been
|
|
|
|
* made, the struct may be destroyed due to pruning. It is important that only
|
|
|
|
* one unlock is made for each Curl_resolv() call.
|
|
|
|
*/
|
2003-02-04 18:48:46 -05:00
|
|
|
void Curl_resolv_unlock(struct SessionHandle *data, struct Curl_dns_entry *dns)
|
|
|
|
{
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_lock(data, CURL_LOCK_DATA_DNS, CURL_LOCK_ACCESS_SINGLE);
|
2003-07-23 08:55:24 -04:00
|
|
|
|
2003-02-04 18:48:46 -05:00
|
|
|
dns->inuse--;
|
2003-07-23 08:55:24 -04:00
|
|
|
|
2004-02-15 11:57:53 -05:00
|
|
|
#ifdef CURLDEBUG
|
|
|
|
if(dns->inuse < 0) {
|
|
|
|
infof(data, "Interal host cache screw-up!");
|
|
|
|
*(char **)0=NULL;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2003-02-04 18:48:46 -05:00
|
|
|
if(data->share)
|
|
|
|
Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
|
|
|
|
}
|
|
|
|
|
2001-10-04 09:36:11 -04:00
|
|
|
/*
|
|
|
|
* This is a wrapper function for freeing name information in a protocol
|
|
|
|
* independent way. This takes care of using the appropriate underlaying
|
2002-11-26 04:41:54 -05:00
|
|
|
* function.
|
2001-10-04 09:36:11 -04:00
|
|
|
*/
|
2002-11-26 04:41:54 -05:00
|
|
|
void Curl_freeaddrinfo(Curl_addrinfo *p)
|
2001-10-04 09:36:11 -04:00
|
|
|
{
|
|
|
|
#ifdef ENABLE_IPV6
|
2002-11-26 04:41:54 -05:00
|
|
|
freeaddrinfo(p);
|
2001-10-04 09:36:11 -04:00
|
|
|
#else
|
2003-08-05 10:40:59 -04:00
|
|
|
free(p); /* works fine for the ARES case too */
|
2001-10-04 09:36:11 -04:00
|
|
|
#endif
|
2002-11-26 04:41:54 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2004-03-30 08:02:07 -05:00
|
|
|
* File-internal: free a cache dns entry.
|
2002-11-26 04:41:54 -05:00
|
|
|
*/
|
2004-03-30 08:02:07 -05:00
|
|
|
static void freednsentry(void *freethis)
|
2002-11-26 04:41:54 -05:00
|
|
|
{
|
|
|
|
struct Curl_dns_entry *p = (struct Curl_dns_entry *) freethis;
|
|
|
|
|
|
|
|
Curl_freeaddrinfo(p->addr);
|
2002-01-07 23:26:47 -05:00
|
|
|
|
|
|
|
free(p);
|
2001-10-04 09:36:11 -04:00
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Curl_mk_dnscache() creates a new DNS cache and returns the handle for it.
|
|
|
|
*/
|
|
|
|
curl_hash *Curl_mk_dnscache(void)
|
|
|
|
{
|
|
|
|
return Curl_hash_alloc(7, freednsentry);
|
|
|
|
}
|
|
|
|
|
1999-12-29 09:20:26 -05:00
|
|
|
/* --- resolve name or IP-number --- */
|
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
/* Allocate enough memory to hold the full name information structs and
|
|
|
|
* everything. OSF1 is known to require at least 8872 bytes. The buffer
|
|
|
|
* required for storing all possible aliases and IP numbers is according to
|
|
|
|
* Stevens' Unix Network Programming 2nd edition, p. 304: 8192 bytes!
|
|
|
|
*/
|
|
|
|
#define CURL_NAMELOOKUP_SIZE 9000
|
|
|
|
|
|
|
|
#ifdef USE_ARES
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Curl_multi_ares_fdset() is called when someone from the outside world
|
|
|
|
* (using curl_multi_fdset()) wants to get our fd_set setup and we're talking
|
|
|
|
* with ares. The caller must make sure that this function is only called when
|
|
|
|
* we have a working ares channel.
|
|
|
|
*
|
|
|
|
* Returns: CURLE_OK always!
|
|
|
|
*/
|
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
CURLcode Curl_multi_ares_fdset(struct connectdata *conn,
|
|
|
|
fd_set *read_fd_set,
|
|
|
|
fd_set *write_fd_set,
|
|
|
|
int *max_fdp)
|
|
|
|
|
|
|
|
{
|
|
|
|
int max = ares_fds(conn->data->state.areschannel,
|
|
|
|
read_fd_set, write_fd_set);
|
|
|
|
*max_fdp = max;
|
|
|
|
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Curl_is_resolved() is called repeatedly to check if a previous name resolve
|
|
|
|
* request has completed. It should also make sure to time-out if the
|
|
|
|
* operation seems to take too long.
|
|
|
|
*
|
|
|
|
* Returns normal CURLcode errors.
|
|
|
|
*/
|
2003-10-04 10:50:45 -04:00
|
|
|
CURLcode Curl_is_resolved(struct connectdata *conn,
|
|
|
|
struct Curl_dns_entry **dns)
|
2003-08-05 10:40:59 -04:00
|
|
|
{
|
|
|
|
fd_set read_fds, write_fds;
|
2004-03-29 16:29:24 -05:00
|
|
|
struct timeval tv={0,0};
|
2003-08-05 10:40:59 -04:00
|
|
|
int count;
|
|
|
|
struct SessionHandle *data = conn->data;
|
2003-09-11 17:27:19 -04:00
|
|
|
int nfds;
|
|
|
|
|
|
|
|
FD_ZERO(&read_fds);
|
|
|
|
FD_ZERO(&write_fds);
|
2004-03-30 08:02:07 -05:00
|
|
|
|
2003-09-11 17:27:19 -04:00
|
|
|
nfds = ares_fds(data->state.areschannel, &read_fds, &write_fds);
|
2003-08-05 10:40:59 -04:00
|
|
|
|
|
|
|
count = select(nfds, &read_fds, &write_fds, NULL,
|
|
|
|
(struct timeval *)&tv);
|
|
|
|
|
2004-03-31 15:50:01 -05:00
|
|
|
/* Call ares_process() unconditonally here, even if we simply timed out
|
|
|
|
above, as otherwise the ares name resolve won't timeout! */
|
|
|
|
ares_process(data->state.areschannel, &read_fds, &write_fds);
|
2003-08-05 10:40:59 -04:00
|
|
|
|
2003-10-04 10:50:45 -04:00
|
|
|
*dns = NULL;
|
2003-08-19 19:23:45 -04:00
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
if(conn->async.done) {
|
2003-11-15 05:29:43 -05:00
|
|
|
/* we're done, kill the ares handle */
|
2003-08-05 10:40:59 -04:00
|
|
|
if(!conn->async.dns)
|
|
|
|
return CURLE_COULDNT_RESOLVE_HOST;
|
2003-10-04 10:50:45 -04:00
|
|
|
*dns = conn->async.dns;
|
2003-08-05 10:40:59 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Curl_wait_for_resolv() waits for a resolve to finish. This function should
|
|
|
|
* be avoided since using this risk getting the multi interface to "hang".
|
|
|
|
*
|
|
|
|
* If 'entry' is non-NULL, make it point to the resolved dns entry
|
|
|
|
*
|
|
|
|
* Returns CURLE_COULDNT_RESOLVE_HOST if the host was not resolved, and
|
|
|
|
* CURLE_OPERATION_TIMEDOUT if a time-out occurred.
|
|
|
|
*/
|
2003-08-05 10:40:59 -04:00
|
|
|
CURLcode Curl_wait_for_resolv(struct connectdata *conn,
|
|
|
|
struct Curl_dns_entry **entry)
|
|
|
|
{
|
|
|
|
CURLcode rc=CURLE_OK;
|
|
|
|
struct SessionHandle *data = conn->data;
|
2004-03-31 07:55:24 -05:00
|
|
|
long timeout = CURL_TIMEOUT_RESOLVE; /* default name resolve timeout */
|
2004-02-02 05:15:22 -05:00
|
|
|
|
|
|
|
/* now, see if there's a connect timeout or a regular timeout to
|
|
|
|
use instead of the default one */
|
|
|
|
if(conn->data->set.connecttimeout)
|
|
|
|
timeout = conn->data->set.connecttimeout;
|
|
|
|
else if(conn->data->set.timeout)
|
|
|
|
timeout = conn->data->set.timeout;
|
|
|
|
|
2004-04-14 07:43:26 -04:00
|
|
|
/* We convert the number of seconds into number of milliseconds here: */
|
|
|
|
if(timeout < 2147483)
|
|
|
|
/* maximum amount of seconds that can be multiplied with 1000 and
|
|
|
|
still fit within 31 bits */
|
|
|
|
timeout *= 1000;
|
|
|
|
else
|
|
|
|
timeout = 0x7fffffff; /* ridiculous amount of time anyway */
|
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
/* Wait for the name resolve query to complete. */
|
2004-04-01 03:40:36 -05:00
|
|
|
while (1) {
|
2003-08-05 10:40:59 -04:00
|
|
|
int nfds=0;
|
|
|
|
fd_set read_fds, write_fds;
|
2004-02-02 05:15:22 -05:00
|
|
|
struct timeval *tvp, tv, store;
|
2003-08-05 10:40:59 -04:00
|
|
|
int count;
|
2004-03-31 08:19:41 -05:00
|
|
|
struct timeval now = Curl_tvnow();
|
2004-04-14 07:43:26 -04:00
|
|
|
long timediff;
|
2004-02-02 05:15:22 -05:00
|
|
|
|
2004-04-14 07:43:26 -04:00
|
|
|
store.tv_sec = (int)timeout/1000;
|
|
|
|
store.tv_usec = (timeout%1000)*1000;
|
2003-08-05 10:40:59 -04:00
|
|
|
|
|
|
|
FD_ZERO(&read_fds);
|
|
|
|
FD_ZERO(&write_fds);
|
|
|
|
nfds = ares_fds(data->state.areschannel, &read_fds, &write_fds);
|
|
|
|
if (nfds == 0)
|
2004-03-31 07:45:26 -05:00
|
|
|
/* no file descriptors means we're done waiting */
|
2003-08-05 10:40:59 -04:00
|
|
|
break;
|
2004-03-31 07:45:26 -05:00
|
|
|
tvp = ares_timeout(data->state.areschannel, &store, &tv);
|
2003-08-05 10:40:59 -04:00
|
|
|
count = select(nfds, &read_fds, &write_fds, NULL, tvp);
|
|
|
|
if (count < 0 && errno != EINVAL)
|
|
|
|
break;
|
2004-03-31 07:45:26 -05:00
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
ares_process(data->state.areschannel, &read_fds, &write_fds);
|
2004-02-02 05:15:22 -05:00
|
|
|
|
2004-04-14 07:43:26 -04:00
|
|
|
timediff = Curl_tvdiff(Curl_tvnow(), now); /* spent time */
|
|
|
|
timeout -= timediff?timediff:1; /* always deduct at least 1 */
|
2004-04-01 03:40:36 -05:00
|
|
|
if (timeout < 0) {
|
|
|
|
/* our timeout, so we cancel the ares operation */
|
|
|
|
ares_cancel(data->state.areschannel);
|
|
|
|
break;
|
|
|
|
}
|
2003-08-05 10:40:59 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Operation complete, if the lookup was successful we now have the entry
|
|
|
|
in the cache. */
|
|
|
|
|
|
|
|
if(entry)
|
|
|
|
*entry = conn->async.dns;
|
|
|
|
|
|
|
|
if(!conn->async.dns) {
|
|
|
|
/* a name was not resolved */
|
2004-03-31 07:45:26 -05:00
|
|
|
if((timeout < 0) || (conn->async.status == ARES_ETIMEOUT)) {
|
2004-02-02 05:15:22 -05:00
|
|
|
failf(data, "Resolving host timed out: %s", conn->name);
|
|
|
|
rc = CURLE_OPERATION_TIMEDOUT;
|
|
|
|
}
|
|
|
|
else if(conn->async.done) {
|
2004-02-02 10:53:50 -05:00
|
|
|
failf(data, "Could not resolve host: %s (%s)", conn->name,
|
2004-02-02 11:00:31 -05:00
|
|
|
ares_strerror(conn->async.status));
|
2003-08-05 10:40:59 -04:00
|
|
|
rc = CURLE_COULDNT_RESOLVE_HOST;
|
2003-09-01 04:21:08 -04:00
|
|
|
}
|
2003-08-05 10:40:59 -04:00
|
|
|
else
|
|
|
|
rc = CURLE_OPERATION_TIMEDOUT;
|
|
|
|
|
|
|
|
/* close the connection, since we can't return failure here without
|
|
|
|
cleaning up this connection properly */
|
|
|
|
Curl_disconnect(conn);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
2004-02-20 11:41:50 -05:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(USE_ARES) || defined(USE_THREADING_GETHOSTBYNAME)
|
2003-08-05 10:40:59 -04:00
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* host_callback() gets called by ares/gethostbyname_thread() when we got the
|
|
|
|
* name resolved (or not!).
|
|
|
|
*
|
|
|
|
* If the status argument is ARES_SUCCESS, we must copy the hostent field
|
|
|
|
* since ares will free it when this function returns. This operation stores
|
|
|
|
* the resolved data in the DNS cache.
|
|
|
|
*
|
|
|
|
* The storage operation locks and unlocks the DNS cache.
|
|
|
|
*/
|
2003-08-05 10:40:59 -04:00
|
|
|
static void host_callback(void *arg, /* "struct connectdata *" */
|
|
|
|
int status,
|
|
|
|
struct hostent *hostent)
|
|
|
|
{
|
|
|
|
struct connectdata *conn = (struct connectdata *)arg;
|
|
|
|
struct Curl_dns_entry *dns = NULL;
|
|
|
|
|
|
|
|
conn->async.done = TRUE;
|
|
|
|
conn->async.status = status;
|
|
|
|
|
|
|
|
if(ARES_SUCCESS == status) {
|
|
|
|
/* we got a resolved name in 'hostent' */
|
|
|
|
char *bufp = (char *)malloc(CURL_NAMELOOKUP_SIZE);
|
|
|
|
if(bufp) {
|
|
|
|
|
|
|
|
/* pack_hostent() copies to and shrinks the target buffer */
|
|
|
|
struct hostent *he = pack_hostent(&bufp, hostent);
|
|
|
|
|
2003-10-20 04:45:33 -04:00
|
|
|
struct SessionHandle *data = conn->data;
|
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_lock(data, CURL_LOCK_DATA_DNS, CURL_LOCK_ACCESS_SINGLE);
|
|
|
|
|
|
|
|
dns = cache_resolv_response(data, he,
|
2003-08-05 10:40:59 -04:00
|
|
|
conn->async.hostname, conn->async.port);
|
2003-10-20 04:45:33 -04:00
|
|
|
|
|
|
|
if(data->share)
|
|
|
|
Curl_share_unlock(data, CURL_LOCK_DATA_DNS);
|
2003-08-05 10:40:59 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
conn->async.dns = dns;
|
|
|
|
|
|
|
|
/* The input hostent struct will be freed by ares when we return from this
|
|
|
|
function */
|
|
|
|
}
|
2004-02-20 11:41:50 -05:00
|
|
|
#endif
|
2003-08-05 10:40:59 -04:00
|
|
|
|
2004-02-20 11:41:50 -05:00
|
|
|
#ifdef USE_ARES
|
2003-08-05 10:40:59 -04:00
|
|
|
/*
|
2004-03-30 08:02:07 -05:00
|
|
|
* my_getaddrinfo() when using ares for name resolves.
|
|
|
|
*
|
|
|
|
* Returns name information about the given hostname and port number. If
|
2003-08-05 10:40:59 -04:00
|
|
|
* successful, the 'hostent' is returned and the forth argument will point to
|
2004-03-30 08:02:07 -05:00
|
|
|
* memory we need to free after use. That memory *MUST* be freed with
|
2003-08-05 10:40:59 -04:00
|
|
|
* Curl_freeaddrinfo(), nothing else.
|
|
|
|
*/
|
|
|
|
static Curl_addrinfo *my_getaddrinfo(struct connectdata *conn,
|
|
|
|
char *hostname,
|
|
|
|
int port,
|
|
|
|
int *waitp)
|
|
|
|
{
|
|
|
|
char *bufp;
|
|
|
|
struct SessionHandle *data = conn->data;
|
|
|
|
|
|
|
|
*waitp = FALSE;
|
|
|
|
|
2004-04-14 08:10:44 -04:00
|
|
|
if(data->set.ip_version == CURL_IPRESOLVE_V6)
|
|
|
|
/* an ipv6 address was requested and we can't get/use one */
|
|
|
|
return NULL;
|
|
|
|
|
2004-02-16 10:24:22 -05:00
|
|
|
bufp = strdup(hostname);
|
2003-08-05 10:40:59 -04:00
|
|
|
|
2004-02-16 10:24:22 -05:00
|
|
|
if(bufp) {
|
|
|
|
Curl_safefree(conn->async.hostname);
|
|
|
|
conn->async.hostname = bufp;
|
|
|
|
conn->async.port = port;
|
|
|
|
conn->async.done = FALSE; /* not done */
|
|
|
|
conn->async.status = 0; /* clear */
|
|
|
|
conn->async.dns = NULL; /* clear */
|
2003-08-05 10:40:59 -04:00
|
|
|
|
2004-02-16 10:24:22 -05:00
|
|
|
/* areschannel is already setup in the Curl_open() function */
|
|
|
|
ares_gethostbyname(data->state.areschannel, hostname, PF_INET,
|
|
|
|
host_callback, conn);
|
2003-10-04 10:50:45 -04:00
|
|
|
|
2004-02-16 10:24:22 -05:00
|
|
|
*waitp = TRUE; /* please wait for the response */
|
2003-08-05 10:40:59 -04:00
|
|
|
}
|
|
|
|
return NULL; /* no struct yet */
|
|
|
|
}
|
2004-02-20 11:41:50 -05:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#if !defined(USE_ARES) && !defined(USE_THREADING_GETHOSTBYNAME)
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Curl_wait_for_resolv() for builds without ARES and threaded gethostbyname,
|
|
|
|
* Curl_resolv() can never return wait==TRUE, so this function will never be
|
|
|
|
* called. If it still gets called, we return failure at once.
|
|
|
|
*
|
|
|
|
* We provide this function only to allow multi.c to remain unaware if we are
|
|
|
|
* doing asynch resolves or not.
|
|
|
|
*/
|
2003-08-05 10:40:59 -04:00
|
|
|
CURLcode Curl_wait_for_resolv(struct connectdata *conn,
|
|
|
|
struct Curl_dns_entry **entry)
|
|
|
|
{
|
|
|
|
(void)conn;
|
|
|
|
*entry=NULL;
|
|
|
|
return CURLE_COULDNT_RESOLVE_HOST;
|
|
|
|
}
|
2003-08-06 11:26:02 -04:00
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* This function will never be called when built with ares or threaded
|
|
|
|
* resolves. If it still gets called, we return failure at once.
|
|
|
|
*
|
|
|
|
* We provide this function only to allow multi.c to remain unaware if we are
|
|
|
|
* doing asynch resolves or not.
|
|
|
|
*/
|
2004-02-20 11:41:50 -05:00
|
|
|
CURLcode Curl_is_resolved(struct connectdata *conn,
|
|
|
|
struct Curl_dns_entry **dns)
|
|
|
|
{
|
|
|
|
(void)conn;
|
|
|
|
*dns = NULL;
|
|
|
|
|
|
|
|
return CURLE_COULDNT_RESOLVE_HOST;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if !defined(USE_ARES)
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
2004-04-13 09:59:12 -04:00
|
|
|
* Non-ares build. If we are using threading gethostbyname, then this must
|
|
|
|
* set the fd_set for the threaded resolve socket. If not, we just return OK.
|
2004-03-30 08:02:07 -05:00
|
|
|
*/
|
2003-08-06 11:26:02 -04:00
|
|
|
CURLcode Curl_multi_ares_fdset(struct connectdata *conn,
|
|
|
|
fd_set *read_fd_set,
|
|
|
|
fd_set *write_fd_set,
|
|
|
|
int *max_fdp)
|
|
|
|
{
|
2004-04-13 09:59:12 -04:00
|
|
|
#ifdef USE_THREADING_GETHOSTBYNAME
|
|
|
|
const struct thread_data *td =
|
|
|
|
(const struct thread_data *) conn->async.os_specific;
|
|
|
|
|
|
|
|
if (td && td->dummy_sock != CURL_SOCKET_BAD) {
|
|
|
|
FD_SET(td->dummy_sock,write_fd_set);
|
|
|
|
*max_fdp = td->dummy_sock;
|
|
|
|
}
|
|
|
|
#else /* if not USE_THREADING_GETHOSTBYNAME */
|
2003-08-06 11:26:02 -04:00
|
|
|
(void)conn;
|
|
|
|
(void)read_fd_set;
|
|
|
|
(void)write_fd_set;
|
|
|
|
(void)max_fdp;
|
2004-04-13 09:59:12 -04:00
|
|
|
#endif
|
2003-08-06 11:26:02 -04:00
|
|
|
return CURLE_OK;
|
|
|
|
}
|
2004-04-13 09:59:12 -04:00
|
|
|
#endif /* !USE_ARES */
|
2003-08-05 10:40:59 -04:00
|
|
|
|
|
|
|
#if defined(ENABLE_IPV6) && !defined(USE_ARES)
|
2001-10-04 09:25:12 -04:00
|
|
|
|
2003-06-26 07:22:12 -04:00
|
|
|
#ifdef CURLDEBUG
|
2001-10-04 09:25:12 -04:00
|
|
|
/* These two are strictly for memory tracing and are using the same
|
|
|
|
* style as the family otherwise present in memdebug.c. I put these ones
|
|
|
|
* here since they require a bunch of struct types I didn't wanna include
|
|
|
|
* in memdebug.c
|
|
|
|
*/
|
|
|
|
int curl_getaddrinfo(char *hostname, char *service,
|
|
|
|
struct addrinfo *hints,
|
|
|
|
struct addrinfo **result,
|
|
|
|
int line, const char *source)
|
|
|
|
{
|
|
|
|
int res=(getaddrinfo)(hostname, service, hints, result);
|
2001-10-17 08:33:35 -04:00
|
|
|
if(0 == res) {
|
2001-10-04 09:25:12 -04:00
|
|
|
/* success */
|
2001-10-17 08:33:35 -04:00
|
|
|
if(logfile)
|
|
|
|
fprintf(logfile, "ADDR %s:%d getaddrinfo() = %p\n",
|
2002-01-08 02:06:07 -05:00
|
|
|
source, line, (void *)*result);
|
2001-10-17 08:33:35 -04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
if(logfile)
|
|
|
|
fprintf(logfile, "ADDR %s:%d getaddrinfo() failed\n",
|
|
|
|
source, line);
|
|
|
|
}
|
2001-10-04 09:25:12 -04:00
|
|
|
return res;
|
|
|
|
}
|
2001-10-17 08:33:35 -04:00
|
|
|
|
2001-10-04 09:25:12 -04:00
|
|
|
void curl_freeaddrinfo(struct addrinfo *freethis,
|
|
|
|
int line, const char *source)
|
|
|
|
{
|
|
|
|
(freeaddrinfo)(freethis);
|
2001-10-17 08:33:35 -04:00
|
|
|
if(logfile)
|
|
|
|
fprintf(logfile, "ADDR %s:%d freeaddrinfo(%p)\n",
|
2002-01-08 02:06:07 -05:00
|
|
|
source, line, (void *)freethis);
|
2001-10-04 09:25:12 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
2004-03-30 08:02:07 -05:00
|
|
|
* my_getaddrinfo() when built ipv6-enabled.
|
|
|
|
*
|
|
|
|
* Returns name information about the given hostname and port number. If
|
2001-10-04 09:25:12 -04:00
|
|
|
* successful, the 'addrinfo' is returned and the forth argument will point to
|
2004-03-30 08:02:07 -05:00
|
|
|
* memory we need to free after use. That memory *MUST* be freed with
|
2001-10-04 09:25:12 -04:00
|
|
|
* Curl_freeaddrinfo(), nothing else.
|
|
|
|
*/
|
2003-08-05 10:40:59 -04:00
|
|
|
static Curl_addrinfo *my_getaddrinfo(struct connectdata *conn,
|
2002-11-05 05:51:41 -05:00
|
|
|
char *hostname,
|
|
|
|
int port,
|
2003-08-05 10:40:59 -04:00
|
|
|
int *waitp)
|
2001-02-05 18:04:44 -05:00
|
|
|
{
|
|
|
|
struct addrinfo hints, *res;
|
|
|
|
int error;
|
|
|
|
char sbuf[NI_MAXSERV];
|
2003-09-19 11:16:47 -04:00
|
|
|
int s, pf;
|
2003-08-05 10:40:59 -04:00
|
|
|
struct SessionHandle *data = conn->data;
|
2002-03-15 04:54:30 -05:00
|
|
|
|
2003-08-06 11:26:02 -04:00
|
|
|
*waitp=0; /* don't wait, we have the response now */
|
|
|
|
|
2002-03-15 04:54:30 -05:00
|
|
|
/* see if we have an IPv6 stack */
|
|
|
|
s = socket(PF_INET6, SOCK_DGRAM, 0);
|
2004-04-14 08:10:44 -04:00
|
|
|
if (s < 0) {
|
2002-03-15 04:54:30 -05:00
|
|
|
/* Some non-IPv6 stacks have been found to make very slow name resolves
|
|
|
|
* when PF_UNSPEC is used, so thus we switch to a mere PF_INET lookup if
|
|
|
|
* the stack seems to be a non-ipv6 one. */
|
2004-04-14 08:10:44 -04:00
|
|
|
|
|
|
|
if(data->set.ip_version == CURL_IPRESOLVE_V6)
|
|
|
|
/* an ipv6 address was requested and we can't get/use one */
|
|
|
|
return NULL;
|
|
|
|
|
2002-03-15 04:54:30 -05:00
|
|
|
pf = PF_INET;
|
2004-04-14 08:10:44 -04:00
|
|
|
}
|
2003-09-19 11:16:47 -04:00
|
|
|
else {
|
2002-03-15 04:54:30 -05:00
|
|
|
/* This seems to be an IPv6-capable stack, use PF_UNSPEC for the widest
|
|
|
|
* possible checks. And close the socket again.
|
|
|
|
*/
|
2002-04-22 19:53:49 -04:00
|
|
|
sclose(s);
|
2003-09-19 11:16:47 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Check if a more limited name resolve has been requested.
|
|
|
|
*/
|
|
|
|
switch(data->set.ip_version) {
|
|
|
|
case CURL_IPRESOLVE_V4:
|
|
|
|
pf = PF_INET;
|
|
|
|
break;
|
|
|
|
case CURL_IPRESOLVE_V6:
|
|
|
|
pf = PF_INET6;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
pf = PF_UNSPEC;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2002-03-15 04:54:30 -05:00
|
|
|
|
2001-02-05 18:04:44 -05:00
|
|
|
memset(&hints, 0, sizeof(hints));
|
2002-03-15 04:54:30 -05:00
|
|
|
hints.ai_family = pf;
|
2001-02-05 18:04:44 -05:00
|
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
|
|
hints.ai_flags = AI_CANONNAME;
|
|
|
|
snprintf(sbuf, sizeof(sbuf), "%d", port);
|
|
|
|
error = getaddrinfo(hostname, sbuf, &hints, &res);
|
|
|
|
if (error) {
|
2002-06-10 09:26:02 -04:00
|
|
|
infof(data, "getaddrinfo(3) failed for %s:%d\n", hostname, port);
|
2001-02-05 18:04:44 -05:00
|
|
|
return NULL;
|
|
|
|
}
|
2001-10-04 09:25:12 -04:00
|
|
|
|
2001-02-05 18:04:44 -05:00
|
|
|
return res;
|
|
|
|
}
|
2001-09-28 03:05:26 -04:00
|
|
|
#else /* following code is IPv4-only */
|
2001-02-05 18:04:44 -05:00
|
|
|
|
2004-04-06 11:09:43 -04:00
|
|
|
#if !defined(HAVE_GETHOSTBYNAME_R) || defined(USE_ARES) || \
|
|
|
|
defined(USE_THREADING_GETHOSTBYNAME)
|
2004-02-12 11:02:55 -05:00
|
|
|
static void hostcache_fixoffset(struct hostent *h, long offset);
|
2004-03-30 08:02:07 -05:00
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
/*
|
2004-03-30 08:02:07 -05:00
|
|
|
* pack_hostent() is a file-local function that performs a "deep" copy of a
|
|
|
|
* hostent into a buffer (returns a pointer to the copy). Make absolutely sure
|
|
|
|
* the destination buffer is big enough!
|
2003-08-05 10:40:59 -04:00
|
|
|
*/
|
2002-04-22 09:31:16 -04:00
|
|
|
static struct hostent* pack_hostent(char** buf, struct hostent* orig)
|
2001-10-03 17:42:04 -04:00
|
|
|
{
|
2002-05-17 03:49:28 -04:00
|
|
|
char *bufptr;
|
|
|
|
char *newbuf;
|
2001-10-03 17:42:04 -04:00
|
|
|
struct hostent* copy;
|
|
|
|
|
|
|
|
int i;
|
2002-05-17 03:49:28 -04:00
|
|
|
char *str;
|
2004-02-23 03:38:49 -05:00
|
|
|
size_t len;
|
2001-10-03 17:42:04 -04:00
|
|
|
|
2002-04-22 09:31:16 -04:00
|
|
|
bufptr = *buf;
|
2001-10-03 17:42:04 -04:00
|
|
|
copy = (struct hostent*)bufptr;
|
|
|
|
|
|
|
|
bufptr += sizeof(struct hostent);
|
|
|
|
copy->h_name = bufptr;
|
|
|
|
len = strlen(orig->h_name) + 1;
|
|
|
|
strncpy(bufptr, orig->h_name, len);
|
|
|
|
bufptr += len;
|
|
|
|
|
2001-10-23 08:11:43 -04:00
|
|
|
/* we align on even 64bit boundaries for safety */
|
2002-04-19 07:00:26 -04:00
|
|
|
#define MEMALIGN(x) ((x)+(8-(((unsigned long)(x))&0x7)))
|
2001-10-23 08:11:43 -04:00
|
|
|
|
|
|
|
/* This must be aligned properly to work on many CPU architectures! */
|
2002-04-19 07:00:26 -04:00
|
|
|
bufptr = MEMALIGN(bufptr);
|
|
|
|
|
|
|
|
copy->h_aliases = (char**)bufptr;
|
2001-10-03 17:42:04 -04:00
|
|
|
|
|
|
|
/* Figure out how many aliases there are */
|
2003-05-20 05:41:39 -04:00
|
|
|
for (i = 0; orig->h_aliases && orig->h_aliases[i]; ++i);
|
2001-10-03 17:42:04 -04:00
|
|
|
|
|
|
|
/* Reserve room for the array */
|
|
|
|
bufptr += (i + 1) * sizeof(char*);
|
|
|
|
|
2001-10-23 08:11:43 -04:00
|
|
|
/* Clone all known aliases */
|
2003-05-20 05:41:39 -04:00
|
|
|
if(orig->h_aliases) {
|
|
|
|
for(i = 0; (str = orig->h_aliases[i]); i++) {
|
|
|
|
len = strlen(str) + 1;
|
|
|
|
strncpy(bufptr, str, len);
|
|
|
|
copy->h_aliases[i] = bufptr;
|
|
|
|
bufptr += len;
|
|
|
|
}
|
2001-10-03 17:42:04 -04:00
|
|
|
}
|
2003-05-20 05:41:39 -04:00
|
|
|
/* if(!orig->h_aliases) i was already set to 0 */
|
|
|
|
|
2001-10-23 08:11:43 -04:00
|
|
|
/* Terminate the alias list with a NULL */
|
2001-10-03 17:42:04 -04:00
|
|
|
copy->h_aliases[i] = NULL;
|
|
|
|
|
|
|
|
copy->h_addrtype = orig->h_addrtype;
|
|
|
|
copy->h_length = orig->h_length;
|
|
|
|
|
2001-10-23 08:11:43 -04:00
|
|
|
/* align it for (at least) 32bit accesses */
|
2002-04-19 07:00:26 -04:00
|
|
|
bufptr = MEMALIGN(bufptr);
|
2001-10-23 08:11:43 -04:00
|
|
|
|
2001-10-03 17:42:04 -04:00
|
|
|
copy->h_addr_list = (char**)bufptr;
|
|
|
|
|
|
|
|
/* Figure out how many addresses there are */
|
|
|
|
for (i = 0; orig->h_addr_list[i] != NULL; ++i);
|
|
|
|
|
|
|
|
/* Reserve room for the array */
|
|
|
|
bufptr += (i + 1) * sizeof(char*);
|
|
|
|
|
|
|
|
i = 0;
|
|
|
|
len = orig->h_length;
|
|
|
|
str = orig->h_addr_list[i];
|
|
|
|
while (str != NULL) {
|
|
|
|
memcpy(bufptr, str, len);
|
|
|
|
copy->h_addr_list[i] = bufptr;
|
|
|
|
bufptr += len;
|
|
|
|
str = orig->h_addr_list[++i];
|
|
|
|
}
|
|
|
|
copy->h_addr_list[i] = NULL;
|
|
|
|
|
2002-05-17 03:49:28 -04:00
|
|
|
/* now, shrink the allocated buffer to the size we actually need, which
|
|
|
|
most often is only a fraction of the original alloc */
|
2004-04-12 02:55:25 -04:00
|
|
|
newbuf=(char *)realloc(*buf, (long)(bufptr-*buf));
|
2002-05-17 03:49:28 -04:00
|
|
|
|
|
|
|
/* if the alloc moved, we need to adjust things again */
|
|
|
|
if(newbuf != *buf)
|
2004-04-12 02:55:25 -04:00
|
|
|
hostcache_fixoffset((struct hostent*)newbuf, (long)(newbuf-*buf));
|
2002-05-17 03:49:28 -04:00
|
|
|
|
|
|
|
/* setup the return */
|
|
|
|
*buf = newbuf;
|
|
|
|
copy = (struct hostent*)newbuf;
|
|
|
|
|
2001-10-03 17:42:04 -04:00
|
|
|
return copy;
|
|
|
|
}
|
2001-10-04 09:36:11 -04:00
|
|
|
#endif
|
2001-10-03 17:42:04 -04:00
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* hostcache_fixoffset() is a utility-function that corrects all pointers in
|
|
|
|
* the given hostent struct according to the offset. This is typically used
|
|
|
|
* when a hostent has been reallocated and needs to be setup properly on the
|
|
|
|
* new address.
|
|
|
|
*/
|
2004-02-12 11:02:55 -05:00
|
|
|
static void hostcache_fixoffset(struct hostent *h, long offset)
|
2003-08-05 10:40:59 -04:00
|
|
|
{
|
|
|
|
int i=0;
|
2003-08-21 08:07:47 -04:00
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
h->h_name=(char *)((long)h->h_name+offset);
|
2003-08-21 08:07:47 -04:00
|
|
|
if(h->h_aliases) {
|
|
|
|
/* only relocate aliases if there are any! */
|
2003-10-05 11:03:21 -04:00
|
|
|
h->h_aliases=(char **)((long)h->h_aliases+offset);
|
|
|
|
while(h->h_aliases[i]) {
|
|
|
|
h->h_aliases[i]=(char *)((long)h->h_aliases[i]+offset);
|
|
|
|
i++;
|
|
|
|
}
|
2003-08-21 08:07:47 -04:00
|
|
|
}
|
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
h->h_addr_list=(char **)((long)h->h_addr_list+offset);
|
|
|
|
i=0;
|
|
|
|
while(h->h_addr_list[i]) {
|
|
|
|
h->h_addr_list[i]=(char *)((long)h->h_addr_list[i]+offset);
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef USE_ARES
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* MakeIP() converts the input binary ipv4-address to an ascii string in the
|
|
|
|
* dotted numerical format. 'addr' is a pointer to a buffer that is 'addr_len'
|
|
|
|
* bytes big. 'num' is the 32 bit IP number.
|
|
|
|
*/
|
2003-03-19 04:16:59 -05:00
|
|
|
static char *MakeIP(unsigned long num, char *addr, int addr_len)
|
2001-09-28 03:46:39 -04:00
|
|
|
{
|
|
|
|
#if defined(HAVE_INET_NTOA) || defined(HAVE_INET_NTOA_R)
|
|
|
|
struct in_addr in;
|
|
|
|
in.s_addr = htonl(num);
|
|
|
|
|
|
|
|
#if defined(HAVE_INET_NTOA_R)
|
|
|
|
inet_ntoa_r(in,addr,addr_len);
|
|
|
|
#else
|
|
|
|
strncpy(addr,inet_ntoa(in),addr_len);
|
|
|
|
#endif
|
|
|
|
#else
|
|
|
|
unsigned char *paddr;
|
|
|
|
|
|
|
|
num = htonl(num); /* htonl() added to avoid endian probs */
|
|
|
|
paddr = (unsigned char *)#
|
|
|
|
sprintf(addr, "%u.%u.%u.%u", paddr[0], paddr[1], paddr[2], paddr[3]);
|
|
|
|
#endif
|
|
|
|
return (addr);
|
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* my_getaddrinfo() - the ipv4 "traditional" version.
|
|
|
|
*
|
|
|
|
* The original code to this function was once stolen from the Dancer source
|
|
|
|
* code, written by Bjorn Reese, it has since been patched and modified
|
|
|
|
* considerably.
|
|
|
|
*/
|
2003-08-05 10:40:59 -04:00
|
|
|
static Curl_addrinfo *my_getaddrinfo(struct connectdata *conn,
|
2002-11-05 05:51:41 -05:00
|
|
|
char *hostname,
|
|
|
|
int port,
|
2003-08-05 10:40:59 -04:00
|
|
|
int *waitp)
|
1999-12-29 09:20:26 -05:00
|
|
|
{
|
|
|
|
struct hostent *h = NULL;
|
2002-01-02 05:06:47 -05:00
|
|
|
in_addr_t in;
|
2003-08-05 10:40:59 -04:00
|
|
|
struct SessionHandle *data = conn->data;
|
|
|
|
(void)port; /* unused in IPv4 code */
|
2001-05-30 07:06:33 -04:00
|
|
|
|
2003-08-05 10:40:59 -04:00
|
|
|
*waitp = 0; /* don't wait, we act synchronously */
|
|
|
|
|
2004-04-14 08:10:44 -04:00
|
|
|
if(data->set.ip_version == CURL_IPRESOLVE_V6)
|
|
|
|
/* an ipv6 address was requested and we can't get/use one */
|
|
|
|
return NULL;
|
|
|
|
|
2003-05-13 08:12:17 -04:00
|
|
|
in=inet_addr(hostname);
|
|
|
|
if (in != CURL_INADDR_NONE) {
|
2000-05-29 18:51:13 -04:00
|
|
|
struct in_addr *addrentry;
|
2002-06-26 04:03:46 -04:00
|
|
|
struct namebuf {
|
|
|
|
struct hostent hostentry;
|
|
|
|
char *h_addr_list[2];
|
|
|
|
struct in_addr addrentry;
|
2002-06-26 11:39:23 -04:00
|
|
|
char h_name[128];
|
|
|
|
} *buf = (struct namebuf *)malloc(sizeof(struct namebuf));
|
2002-04-22 09:31:16 -04:00
|
|
|
if(!buf)
|
|
|
|
return NULL; /* major failure */
|
2000-05-29 18:51:13 -04:00
|
|
|
|
2002-06-26 04:03:46 -04:00
|
|
|
h = &buf->hostentry;
|
|
|
|
h->h_addr_list = &buf->h_addr_list[0];
|
|
|
|
addrentry = &buf->addrentry;
|
2000-05-29 18:51:13 -04:00
|
|
|
addrentry->s_addr = in;
|
|
|
|
h->h_addr_list[0] = (char*)addrentry;
|
|
|
|
h->h_addr_list[1] = NULL;
|
|
|
|
h->h_addrtype = AF_INET;
|
|
|
|
h->h_length = sizeof(*addrentry);
|
2002-06-26 04:03:46 -04:00
|
|
|
h->h_name = &buf->h_name[0];
|
2003-03-19 04:16:59 -05:00
|
|
|
MakeIP(ntohl(in), (char *)h->h_name, sizeof(buf->h_name));
|
2000-05-29 18:51:13 -04:00
|
|
|
}
|
2000-08-04 07:27:17 -04:00
|
|
|
#if defined(HAVE_GETHOSTBYNAME_R)
|
2000-05-29 18:51:13 -04:00
|
|
|
else {
|
|
|
|
int h_errnop;
|
2002-04-22 09:31:16 -04:00
|
|
|
int res=ERANGE;
|
|
|
|
int step_size=200;
|
|
|
|
int *buf = (int *)malloc(CURL_NAMELOOKUP_SIZE);
|
|
|
|
if(!buf)
|
|
|
|
return NULL; /* major failure */
|
|
|
|
|
2000-09-21 04:47:48 -04:00
|
|
|
/* Workaround for gethostbyname_r bug in qnx nto. It is also _required_
|
|
|
|
for some of these functions. */
|
|
|
|
memset(buf, 0, CURL_NAMELOOKUP_SIZE);
|
2000-08-04 07:27:17 -04:00
|
|
|
#ifdef HAVE_GETHOSTBYNAME_R_5
|
2000-05-30 18:27:39 -04:00
|
|
|
/* Solaris, IRIX and more */
|
2002-08-30 07:10:50 -04:00
|
|
|
(void)res; /* prevent compiler warning */
|
2002-04-22 09:31:16 -04:00
|
|
|
while(!h) {
|
|
|
|
h = gethostbyname_r(hostname,
|
|
|
|
(struct hostent *)buf,
|
|
|
|
(char *)buf + sizeof(struct hostent),
|
|
|
|
step_size - sizeof(struct hostent),
|
|
|
|
&h_errnop);
|
|
|
|
|
|
|
|
/* If the buffer is too small, it returns NULL and sets errno to
|
|
|
|
ERANGE. The errno is thread safe if this is compiled with
|
|
|
|
-D_REENTRANT as then the 'errno' variable is a macro defined to
|
|
|
|
get used properly for threads. */
|
|
|
|
|
|
|
|
if(h || (errno != ERANGE))
|
|
|
|
break;
|
|
|
|
|
|
|
|
step_size+=200;
|
|
|
|
}
|
|
|
|
|
2003-06-26 07:22:12 -04:00
|
|
|
#ifdef CURLDEBUG
|
2002-04-22 09:31:16 -04:00
|
|
|
infof(data, "gethostbyname_r() uses %d bytes\n", step_size);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if(h) {
|
2002-05-01 07:36:13 -04:00
|
|
|
int offset;
|
|
|
|
h=(struct hostent *)realloc(buf, step_size);
|
2002-06-05 09:41:33 -04:00
|
|
|
offset=(long)h-(long)buf;
|
2002-05-01 07:36:13 -04:00
|
|
|
hostcache_fixoffset(h, offset);
|
|
|
|
buf=(int *)h;
|
2002-04-22 09:31:16 -04:00
|
|
|
}
|
|
|
|
else
|
2003-08-21 08:07:47 -04:00
|
|
|
#endif /* HAVE_GETHOSTBYNAME_R_5 */
|
2000-08-04 07:27:17 -04:00
|
|
|
#ifdef HAVE_GETHOSTBYNAME_R_6
|
|
|
|
/* Linux */
|
2002-10-21 09:20:30 -04:00
|
|
|
do {
|
|
|
|
res=gethostbyname_r(hostname,
|
|
|
|
(struct hostent *)buf,
|
|
|
|
(char *)buf + sizeof(struct hostent),
|
|
|
|
step_size - sizeof(struct hostent),
|
|
|
|
&h, /* DIFFERENCE */
|
|
|
|
&h_errnop);
|
|
|
|
/* Redhat 8, using glibc 2.2.93 changed the behavior. Now all of a
|
2002-12-16 06:33:44 -05:00
|
|
|
sudden this function returns EAGAIN if the given buffer size is too
|
|
|
|
small. Previous versions are known to return ERANGE for the same
|
|
|
|
problem.
|
|
|
|
|
|
|
|
This wouldn't be such a big problem if older versions wouldn't
|
|
|
|
sometimes return EAGAIN on a common failure case. Alas, we can't
|
|
|
|
assume that EAGAIN *or* ERANGE means ERANGE for any given version of
|
|
|
|
glibc.
|
|
|
|
|
|
|
|
For now, we do that and thus we may call the function repeatedly and
|
|
|
|
fail for older glibc versions that return EAGAIN, until we run out
|
|
|
|
of buffer size (step_size grows beyond CURL_NAMELOOKUP_SIZE).
|
|
|
|
|
|
|
|
If anyone has a better fix, please tell us!
|
2003-10-28 08:06:15 -05:00
|
|
|
|
|
|
|
-------------------------------------------------------------------
|
|
|
|
|
|
|
|
On October 23rd 2003, Dan C dug up more details on the mysteries of
|
|
|
|
gethostbyname_r() in glibc:
|
|
|
|
|
|
|
|
In glibc 2.2.5 the interface is different (this has also been
|
|
|
|
discovered in glibc 2.1.1-6 as shipped by Redhat 6). What I can't
|
|
|
|
explain, is that tests performed on glibc 2.2.4-34 and 2.2.4-32
|
|
|
|
(shipped/upgraded by Redhat 7.2) don't show this behavior!
|
|
|
|
|
|
|
|
In this "buggy" version, the return code is -1 on error and 'errno'
|
|
|
|
is set to the ERANGE or EAGAIN code. Note that 'errno' is not a
|
|
|
|
thread-safe variable.
|
|
|
|
|
2002-12-16 06:33:44 -05:00
|
|
|
*/
|
2002-10-21 09:20:30 -04:00
|
|
|
|
2003-10-28 08:06:15 -05:00
|
|
|
if(((ERANGE == res) || (EAGAIN == res)) ||
|
|
|
|
((res<0) && ((ERANGE == errno) || (EAGAIN == errno))))
|
2002-10-21 09:20:30 -04:00
|
|
|
step_size+=200;
|
2003-10-28 08:06:15 -05:00
|
|
|
else
|
|
|
|
break;
|
2002-12-16 06:33:44 -05:00
|
|
|
} while(step_size <= CURL_NAMELOOKUP_SIZE);
|
2002-10-21 09:20:30 -04:00
|
|
|
|
2002-09-30 04:07:16 -04:00
|
|
|
if(!h) /* failure */
|
|
|
|
res=1;
|
2002-04-22 09:31:16 -04:00
|
|
|
|
2003-06-26 07:22:12 -04:00
|
|
|
#ifdef CURLDEBUG
|
2002-04-22 09:31:16 -04:00
|
|
|
infof(data, "gethostbyname_r() uses %d bytes\n", step_size);
|
|
|
|
#endif
|
|
|
|
if(!res) {
|
2002-05-01 07:36:13 -04:00
|
|
|
int offset;
|
|
|
|
h=(struct hostent *)realloc(buf, step_size);
|
2002-06-05 09:41:33 -04:00
|
|
|
offset=(long)h-(long)buf;
|
2002-05-01 07:36:13 -04:00
|
|
|
hostcache_fixoffset(h, offset);
|
|
|
|
buf=(int *)h;
|
2002-04-22 09:31:16 -04:00
|
|
|
}
|
|
|
|
else
|
2003-08-21 08:07:47 -04:00
|
|
|
#endif/* HAVE_GETHOSTBYNAME_R_6 */
|
2000-08-04 07:27:17 -04:00
|
|
|
#ifdef HAVE_GETHOSTBYNAME_R_3
|
2004-02-18 05:05:17 -05:00
|
|
|
/* AIX, Digital Unix/Tru64, HPUX 10, more? */
|
2000-08-04 07:27:17 -04:00
|
|
|
|
2003-03-03 17:23:48 -05:00
|
|
|
/* For AIX 4.3 or later, we don't use gethostbyname_r() at all, because of
|
|
|
|
the plain fact that it does not return unique full buffers on each
|
|
|
|
call, but instead several of the pointers in the hostent structs will
|
|
|
|
point to the same actual data! This have the unfortunate down-side that
|
|
|
|
our caching system breaks down horribly. Luckily for us though, AIX 4.3
|
|
|
|
and more recent versions have a completely thread-safe libc where all
|
|
|
|
the data is stored in thread-specific memory areas making calls to the
|
|
|
|
plain old gethostbyname() work fine even for multi-threaded programs.
|
|
|
|
|
|
|
|
This AIX 4.3 or later detection is all made in the configure script.
|
|
|
|
|
|
|
|
Troels Walsted Hansen helped us work this out on March 3rd, 2003. */
|
|
|
|
|
2000-09-21 04:47:48 -04:00
|
|
|
if(CURL_NAMELOOKUP_SIZE >=
|
2004-02-18 05:05:17 -05:00
|
|
|
(sizeof(struct hostent)+sizeof(struct hostent_data))) {
|
2000-08-04 07:27:17 -04:00
|
|
|
|
2000-09-21 04:47:48 -04:00
|
|
|
/* August 22nd, 2000: Albert Chin-A-Young brought an updated version
|
|
|
|
* that should work! September 20: Richard Prescott worked on the buffer
|
|
|
|
* size dilemma. */
|
2000-08-23 03:23:42 -04:00
|
|
|
|
2004-02-18 05:05:17 -05:00
|
|
|
res = gethostbyname_r(hostname,
|
2002-04-22 09:31:16 -04:00
|
|
|
(struct hostent *)buf,
|
2003-03-03 17:23:48 -05:00
|
|
|
(struct hostent_data *)((char *)buf +
|
|
|
|
sizeof(struct hostent)));
|
2004-02-18 05:05:17 -05:00
|
|
|
h_errnop= errno; /* we don't deal with this, but set it anyway */
|
|
|
|
}
|
|
|
|
else
|
|
|
|
res = -1; /* failure, too smallish buffer size */
|
|
|
|
|
|
|
|
if(!res) { /* success */
|
|
|
|
|
|
|
|
h = (struct hostent*)buf; /* result expected in h */
|
|
|
|
|
|
|
|
/* This is the worst kind of the different gethostbyname_r() interfaces.
|
|
|
|
Since we don't know how big buffer this particular lookup required,
|
|
|
|
we can't realloc down the huge alloc without doing closer analysis of
|
|
|
|
the returned data. Thus, we always use CURL_NAMELOOKUP_SIZE for every
|
|
|
|
name lookup. Fixing this would require an extra malloc() and then
|
|
|
|
calling pack_hostent() that subsequent realloc()s down the new memory
|
|
|
|
area to the actually used amount. */
|
|
|
|
}
|
2000-09-21 04:47:48 -04:00
|
|
|
else
|
2003-08-21 08:07:47 -04:00
|
|
|
#endif /* HAVE_GETHOSTBYNAME_R_3 */
|
2000-05-30 18:27:39 -04:00
|
|
|
{
|
2000-05-29 18:51:13 -04:00
|
|
|
infof(data, "gethostbyname_r(2) failed for %s\n", hostname);
|
2000-09-18 17:16:27 -04:00
|
|
|
h = NULL; /* set return code to NULL */
|
2000-09-21 04:47:48 -04:00
|
|
|
free(buf);
|
2000-05-29 18:51:13 -04:00
|
|
|
}
|
2003-08-21 08:07:47 -04:00
|
|
|
#else /* HAVE_GETHOSTBYNAME_R */
|
2000-05-29 18:51:13 -04:00
|
|
|
else {
|
2004-02-20 11:41:50 -05:00
|
|
|
|
|
|
|
#ifdef USE_THREADING_GETHOSTBYNAME
|
2004-03-30 08:02:07 -05:00
|
|
|
/* fire up a new resolver thread! */
|
2004-02-20 11:41:50 -05:00
|
|
|
if (init_gethostbyname_thread(conn,hostname,port)) {
|
2004-03-30 08:02:07 -05:00
|
|
|
*waitp = TRUE; /* please wait for the response */
|
|
|
|
return NULL;
|
2004-02-20 11:41:50 -05:00
|
|
|
}
|
|
|
|
infof(data, "init_gethostbyname_thread() failed for %s; code %lu\n",
|
|
|
|
hostname, GetLastError());
|
|
|
|
#endif
|
2004-02-18 05:05:17 -05:00
|
|
|
h = gethostbyname(hostname);
|
|
|
|
if (!h)
|
2000-05-29 18:51:13 -04:00
|
|
|
infof(data, "gethostbyname(2) failed for %s\n", hostname);
|
2004-02-18 05:05:17 -05:00
|
|
|
else {
|
2002-04-22 09:31:16 -04:00
|
|
|
char *buf=(char *)malloc(CURL_NAMELOOKUP_SIZE);
|
2004-02-18 05:05:17 -05:00
|
|
|
/* we make a copy of the hostent right now, right here, as the static
|
|
|
|
one we got a pointer to might get removed when we don't want/expect
|
|
|
|
that */
|
2002-04-22 09:31:16 -04:00
|
|
|
h = pack_hostent(&buf, h);
|
|
|
|
}
|
2003-08-21 08:07:47 -04:00
|
|
|
#endif /*HAVE_GETHOSTBYNAME_R */
|
1999-12-29 09:20:26 -05:00
|
|
|
}
|
2003-08-21 08:07:47 -04:00
|
|
|
|
2004-02-18 05:05:17 -05:00
|
|
|
return h;
|
1999-12-29 09:20:26 -05:00
|
|
|
}
|
2001-09-07 00:01:32 -04:00
|
|
|
|
2001-09-28 03:05:26 -04:00
|
|
|
#endif /* end of IPv4-specific code */
|
2003-08-05 10:40:59 -04:00
|
|
|
|
|
|
|
#endif /* end of !USE_ARES */
|
2004-02-20 11:41:50 -05:00
|
|
|
|
|
|
|
|
|
|
|
#if defined(USE_THREADING_GETHOSTBYNAME)
|
2004-03-09 16:42:43 -05:00
|
|
|
#ifdef DEBUG_THREADING_GETHOSTBYNAME
|
2004-02-20 11:41:50 -05:00
|
|
|
static void trace_it (const char *fmt, ...)
|
|
|
|
{
|
|
|
|
static int do_trace = -1;
|
|
|
|
va_list args;
|
|
|
|
|
2004-04-06 10:51:14 -04:00
|
|
|
if (do_trace == -1) {
|
|
|
|
const char *env = getenv("CURL_TRACE");
|
|
|
|
do_trace = (env && atoi(env) > 0);
|
|
|
|
}
|
2004-02-20 11:41:50 -05:00
|
|
|
if (!do_trace)
|
2004-03-09 16:42:43 -05:00
|
|
|
return;
|
2004-02-20 11:41:50 -05:00
|
|
|
va_start (args, fmt);
|
|
|
|
vfprintf (stderr, fmt, args);
|
2004-04-13 09:59:12 -04:00
|
|
|
/*fflush (stderr); */ /* seems a bad idea in a multi-threaded app */
|
2004-02-20 11:41:50 -05:00
|
|
|
va_end (args);
|
|
|
|
}
|
2004-03-09 16:42:43 -05:00
|
|
|
#endif
|
2004-02-20 11:41:50 -05:00
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* gethostbyname_thread() resolves a name, calls the host_callback and then
|
|
|
|
* exits.
|
|
|
|
*
|
|
|
|
* For builds without ARES/USE_IPV6, create a resolver thread and wait on it.
|
2004-02-20 11:41:50 -05:00
|
|
|
*/
|
2004-04-06 10:51:14 -04:00
|
|
|
static unsigned __stdcall gethostbyname_thread (void *arg)
|
2004-02-20 11:41:50 -05:00
|
|
|
{
|
|
|
|
struct connectdata *conn = (struct connectdata*) arg;
|
|
|
|
struct hostent *he;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
WSASetLastError (conn->async.status = NO_DATA); /* pending status */
|
|
|
|
he = gethostbyname (conn->async.hostname);
|
|
|
|
if (he) {
|
|
|
|
host_callback(conn, ARES_SUCCESS, he);
|
|
|
|
rc = 1;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
host_callback(conn, (int)WSAGetLastError(), NULL);
|
|
|
|
rc = 0;
|
|
|
|
}
|
|
|
|
TRACE(("Winsock-error %d, addr %s\n", conn->async.status,
|
|
|
|
he ? inet_ntoa(*(struct in_addr*)he->h_addr) : "unknown"));
|
|
|
|
return (rc);
|
2004-04-06 10:51:14 -04:00
|
|
|
/* An implicit _endthreadex() here */
|
2004-02-20 11:41:50 -05:00
|
|
|
}
|
|
|
|
|
2004-04-06 10:51:14 -04:00
|
|
|
/*
|
|
|
|
* destroy_thread_data() cleans up async resolver data.
|
|
|
|
* Complementary of ares_destroy.
|
2004-02-20 11:41:50 -05:00
|
|
|
*/
|
2004-04-06 10:51:14 -04:00
|
|
|
static void destroy_thread_data (struct Curl_async *async)
|
2004-02-20 11:41:50 -05:00
|
|
|
{
|
2004-04-06 10:51:14 -04:00
|
|
|
if (async->hostname)
|
|
|
|
free(async->hostname);
|
2004-04-13 09:59:12 -04:00
|
|
|
|
|
|
|
if (async->os_specific) {
|
|
|
|
curl_socket_t sock = ((const struct thread_data*)async->os_specific)->dummy_sock;
|
|
|
|
|
|
|
|
if (sock != CURL_SOCKET_BAD)
|
|
|
|
sclose(sock);
|
2004-04-06 10:51:14 -04:00
|
|
|
free(async->os_specific);
|
2004-04-13 09:59:12 -04:00
|
|
|
}
|
2004-04-06 10:51:14 -04:00
|
|
|
async->hostname = NULL;
|
|
|
|
async->os_specific = NULL;
|
2004-02-20 11:41:50 -05:00
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* init_gethostbyname_thread() starts a new thread that performs
|
|
|
|
* the actual resolve. This function returns before the resolve is done.
|
|
|
|
*/
|
2004-02-20 11:41:50 -05:00
|
|
|
static bool init_gethostbyname_thread (struct connectdata *conn,
|
|
|
|
const char *hostname, int port)
|
|
|
|
{
|
2004-04-06 10:51:14 -04:00
|
|
|
struct thread_data *td = calloc(sizeof(*td), 1);
|
2004-02-20 11:41:50 -05:00
|
|
|
|
|
|
|
if (!td) {
|
|
|
|
SetLastError(ENOMEM);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
Curl_safefree(conn->async.hostname);
|
|
|
|
conn->async.hostname = strdup(hostname);
|
|
|
|
if (!conn->async.hostname) {
|
|
|
|
free(td);
|
|
|
|
SetLastError(ENOMEM);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
conn->async.port = port;
|
|
|
|
conn->async.done = FALSE;
|
|
|
|
conn->async.status = 0;
|
|
|
|
conn->async.dns = NULL;
|
|
|
|
conn->async.os_specific = (void*) td;
|
|
|
|
|
2004-04-13 09:59:12 -04:00
|
|
|
td->dummy_sock = CURL_SOCKET_BAD;
|
2004-04-06 10:51:14 -04:00
|
|
|
td->thread_hnd = (HANDLE) _beginthreadex(NULL, 0, gethostbyname_thread,
|
2004-02-20 11:41:50 -05:00
|
|
|
conn, 0, &td->thread_id);
|
|
|
|
if (!td->thread_hnd) {
|
2004-04-06 10:51:14 -04:00
|
|
|
SetLastError(errno);
|
|
|
|
TRACE(("_beginthreadex() failed; %s\n", Curl_strerror(conn,errno)));
|
|
|
|
destroy_thread_data(&conn->async);
|
2004-02-20 11:41:50 -05:00
|
|
|
return (0);
|
|
|
|
}
|
2004-04-13 09:59:12 -04:00
|
|
|
/* This socket is only to keep Curl_multi_ares_fdset() and select() happy;
|
|
|
|
* should never become signalled for read/write since it's unbound but
|
|
|
|
* Windows needs atleast 1 socket in select().
|
|
|
|
*/
|
|
|
|
td->dummy_sock = socket(AF_INET, SOCK_DGRAM, 0);
|
2004-02-20 11:41:50 -05:00
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Curl_wait_for_resolv() waits for a resolve to finish. This function should
|
|
|
|
* be avoided since using this risk getting the multi interface to "hang".
|
|
|
|
*
|
|
|
|
* If 'entry' is non-NULL, make it point to the resolved dns entry
|
|
|
|
*
|
|
|
|
* This is the version for resolves-in-a-thread.
|
|
|
|
*/
|
2004-02-20 11:41:50 -05:00
|
|
|
CURLcode Curl_wait_for_resolv(struct connectdata *conn,
|
|
|
|
struct Curl_dns_entry **entry)
|
|
|
|
{
|
|
|
|
struct thread_data *td = (struct thread_data*) conn->async.os_specific;
|
|
|
|
struct SessionHandle *data = conn->data;
|
|
|
|
long timeout;
|
|
|
|
DWORD status, ticks;
|
|
|
|
CURLcode rc;
|
|
|
|
|
|
|
|
curlassert (conn && td);
|
|
|
|
|
|
|
|
/* now, see if there's a connect timeout or a regular timeout to
|
|
|
|
use instead of the default one */
|
2004-03-31 07:55:24 -05:00
|
|
|
timeout =
|
|
|
|
conn->data->set.connecttimeout ? conn->data->set.connecttimeout :
|
|
|
|
conn->data->set.timeout ? conn->data->set.timeout :
|
|
|
|
CURL_TIMEOUT_RESOLVE; /* default name resolve timeout */
|
2004-02-20 11:41:50 -05:00
|
|
|
ticks = GetTickCount();
|
|
|
|
|
|
|
|
status = WaitForSingleObject(td->thread_hnd, 1000UL*timeout);
|
|
|
|
if (status == WAIT_OBJECT_0 || status == WAIT_ABANDONED) {
|
2004-04-06 10:51:14 -04:00
|
|
|
/* Thread finished before timeout; propagate Winsock error to this thread.
|
|
|
|
* 'conn->async.done = TRUE' is set in host_callback().
|
|
|
|
*/
|
2004-02-20 11:41:50 -05:00
|
|
|
WSASetLastError(conn->async.status);
|
|
|
|
GetExitCodeThread(td->thread_hnd, &td->thread_status);
|
2004-04-06 10:51:14 -04:00
|
|
|
TRACE(("gethostbyname_thread() status %lu, thread retval %lu, ",
|
|
|
|
status, td->thread_status));
|
2004-02-20 11:41:50 -05:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
conn->async.done = TRUE;
|
|
|
|
td->thread_status = (DWORD)-1;
|
2004-04-06 10:51:14 -04:00
|
|
|
TRACE(("gethostbyname_thread() timeout, "));
|
2004-02-20 11:41:50 -05:00
|
|
|
}
|
|
|
|
|
2004-04-06 10:51:14 -04:00
|
|
|
TRACE(("elapsed %lu ms\n", GetTickCount()-ticks));
|
|
|
|
|
|
|
|
CloseHandle(td->thread_hnd);
|
2004-02-20 11:41:50 -05:00
|
|
|
|
|
|
|
if(entry)
|
|
|
|
*entry = conn->async.dns;
|
|
|
|
|
|
|
|
rc = CURLE_OK;
|
|
|
|
|
|
|
|
if (!conn->async.dns) {
|
|
|
|
/* a name was not resolved */
|
|
|
|
if (td->thread_status == (DWORD)-1 || conn->async.status == NO_DATA) {
|
|
|
|
failf(data, "Resolving host timed out: %s", conn->name);
|
|
|
|
rc = CURLE_OPERATION_TIMEDOUT;
|
|
|
|
}
|
|
|
|
else if(conn->async.done) {
|
2004-04-06 10:51:14 -04:00
|
|
|
failf(data, "Could not resolve host: %s; %s",
|
|
|
|
conn->name, Curl_strerror(conn,conn->async.status));
|
2004-02-20 11:41:50 -05:00
|
|
|
rc = CURLE_COULDNT_RESOLVE_HOST;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
rc = CURLE_OPERATION_TIMEDOUT;
|
|
|
|
|
2004-04-06 10:51:14 -04:00
|
|
|
destroy_thread_data(&conn->async);
|
2004-02-20 11:41:50 -05:00
|
|
|
/* close the connection, since we can't return failure here without
|
|
|
|
cleaning up this connection properly */
|
|
|
|
Curl_disconnect(conn);
|
|
|
|
}
|
|
|
|
return (rc);
|
|
|
|
}
|
|
|
|
|
2004-03-30 08:02:07 -05:00
|
|
|
/*
|
|
|
|
* Curl_is_resolved() is called repeatedly to check if a previous name resolve
|
|
|
|
* request has completed. It should also make sure to time-out if the
|
|
|
|
* operation seems to take too long.
|
|
|
|
*/
|
2004-02-20 11:41:50 -05:00
|
|
|
CURLcode Curl_is_resolved(struct connectdata *conn,
|
|
|
|
struct Curl_dns_entry **entry)
|
|
|
|
{
|
|
|
|
*entry = NULL;
|
|
|
|
|
|
|
|
if (conn->async.done) {
|
|
|
|
/* we're done */
|
2004-04-06 10:51:14 -04:00
|
|
|
destroy_thread_data(&conn->async);
|
2004-02-20 11:41:50 -05:00
|
|
|
if (!conn->async.dns) {
|
|
|
|
TRACE(("Curl_is_resolved(): CURLE_COULDNT_RESOLVE_HOST\n"));
|
|
|
|
return CURLE_COULDNT_RESOLVE_HOST;
|
|
|
|
}
|
|
|
|
*entry = conn->async.dns;
|
|
|
|
TRACE(("resolved okay, dns %p\n", *entry));
|
|
|
|
}
|
|
|
|
else
|
|
|
|
TRACE(("not yet\n"));
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|