2014-06-17 03:22:26 +02:00
|
|
|
/* dns.c
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* Copyright (C) 2014 Toxic All Rights Reserved.
|
|
|
|
*
|
|
|
|
* This file is part of Toxic.
|
|
|
|
*
|
|
|
|
* Toxic is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* Toxic is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with Toxic. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2014-08-03 09:44:48 +02:00
|
|
|
#include <sys/types.h> /* for u_char */
|
2014-06-17 03:22:26 +02:00
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <resolv.h>
|
|
|
|
|
2015-05-25 16:38:52 +02:00
|
|
|
#ifdef NO_GETTEXT
|
|
|
|
#define gettext(A) (A)
|
|
|
|
#else
|
|
|
|
#include <libintl.h>
|
|
|
|
#endif
|
|
|
|
|
2014-06-24 19:20:12 +02:00
|
|
|
#ifdef __APPLE__
|
2014-07-18 07:29:46 +02:00
|
|
|
#include <arpa/nameser_compat.h>
|
2014-06-24 19:20:12 +02:00
|
|
|
#else
|
2014-07-18 07:29:46 +02:00
|
|
|
#include <arpa/nameser.h>
|
2014-06-24 19:20:12 +02:00
|
|
|
#endif /* ifdef __APPLE__ */
|
|
|
|
|
2014-06-17 03:22:26 +02:00
|
|
|
#include <tox/toxdns.h>
|
|
|
|
|
|
|
|
#include "toxic.h"
|
|
|
|
#include "windows.h"
|
|
|
|
#include "line_info.h"
|
|
|
|
#include "dns.h"
|
2014-06-18 01:10:25 +02:00
|
|
|
#include "global_commands.h"
|
2014-06-18 19:10:20 +02:00
|
|
|
#include "misc_tools.h"
|
2014-08-11 03:40:19 +02:00
|
|
|
#include "configdir.h"
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
#define DNS3_KEY_SIZE 32
|
2014-08-11 07:59:01 +02:00
|
|
|
#define MAX_DNS_REQST_SIZE 255
|
2014-06-17 03:22:26 +02:00
|
|
|
#define TOX_DNS3_TXT_PREFIX "v=tox3;id="
|
|
|
|
|
2014-09-23 03:24:45 +02:00
|
|
|
extern struct Winthread Winthread;
|
2014-10-03 23:53:50 +02:00
|
|
|
extern struct dns3_servers dns3_servers;
|
2014-08-13 01:13:57 +02:00
|
|
|
extern struct arg_opts arg_opts;
|
2014-07-09 06:05:13 +02:00
|
|
|
|
2014-08-16 23:20:53 +02:00
|
|
|
#define NUM_DNS3_BACKUP_SERVERS 2
|
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
/* Hardcoded backup in case domain list is not loaded */
|
|
|
|
static struct dns3_server_backup {
|
2014-07-25 04:43:32 +02:00
|
|
|
const char *name;
|
2014-08-11 03:40:19 +02:00
|
|
|
char key[DNS3_KEY_SIZE];
|
|
|
|
} dns3_servers_backup[] = {
|
2014-06-17 03:22:26 +02:00
|
|
|
{
|
2014-06-19 19:50:41 +02:00
|
|
|
"utox.org",
|
|
|
|
{
|
2014-06-17 03:22:26 +02:00
|
|
|
0xD3, 0x15, 0x4F, 0x65, 0xD2, 0x8A, 0x5B, 0x41, 0xA0, 0x5D, 0x4A, 0xC7, 0xE4, 0xB3, 0x9C, 0x6B,
|
|
|
|
0x1C, 0x23, 0x3C, 0xC8, 0x57, 0xFB, 0x36, 0x5C, 0x56, 0xE8, 0x39, 0x27, 0x37, 0x46, 0x2A, 0x12
|
|
|
|
}
|
|
|
|
},
|
2014-06-19 02:22:26 +02:00
|
|
|
{
|
|
|
|
"toxme.se",
|
|
|
|
{
|
|
|
|
0x5D, 0x72, 0xC5, 0x17, 0xDF, 0x6A, 0xEC, 0x54, 0xF1, 0xE9, 0x77, 0xA6, 0xB6, 0xF2, 0x59, 0x14,
|
|
|
|
0xEA, 0x4C, 0xF7, 0x27, 0x7A, 0x85, 0x02, 0x7C, 0xD9, 0xF5, 0x19, 0x6D, 0xF1, 0x7E, 0x0B, 0x13
|
|
|
|
}
|
|
|
|
},
|
2014-06-17 03:22:26 +02:00
|
|
|
};
|
|
|
|
|
2014-10-03 23:53:50 +02:00
|
|
|
static struct thread_data {
|
2014-06-18 01:10:25 +02:00
|
|
|
ToxWindow *self;
|
2015-03-26 03:56:45 +01:00
|
|
|
char id_bin[TOX_ADDRESS_SIZE];
|
2014-07-07 04:15:35 +02:00
|
|
|
char addr[MAX_STR_SIZE];
|
|
|
|
char msg[MAX_STR_SIZE];
|
2014-06-18 01:10:25 +02:00
|
|
|
uint8_t busy;
|
|
|
|
Tox *m;
|
|
|
|
} t_data;
|
|
|
|
|
2014-10-03 23:53:50 +02:00
|
|
|
static struct dns_thread {
|
2014-06-18 01:10:25 +02:00
|
|
|
pthread_t tid;
|
2014-07-10 05:40:46 +02:00
|
|
|
pthread_attr_t attr;
|
2014-06-18 01:10:25 +02:00
|
|
|
} dns_thread;
|
|
|
|
|
2014-06-19 19:50:41 +02:00
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
#define MAX_DNS_SERVERS 50
|
2014-08-11 07:59:01 +02:00
|
|
|
#define MAX_DOMAIN_SIZE 32
|
|
|
|
#define MAX_DNS_LINE MAX_DOMAIN_SIZE + (DNS3_KEY_SIZE * 2) + 3
|
2014-08-11 03:40:19 +02:00
|
|
|
|
2014-10-03 23:53:50 +02:00
|
|
|
struct dns3_servers {
|
2014-08-11 03:40:19 +02:00
|
|
|
bool loaded;
|
|
|
|
int lines;
|
|
|
|
char names[MAX_DNS_SERVERS][MAX_DOMAIN_SIZE];
|
|
|
|
char keys[MAX_DNS_SERVERS][DNS3_KEY_SIZE];
|
|
|
|
} dns3_servers;
|
|
|
|
|
2014-08-13 01:13:57 +02:00
|
|
|
static int load_dns_domainlist(const char *path)
|
2014-08-11 03:40:19 +02:00
|
|
|
{
|
|
|
|
FILE *fp = fopen(path, "r");
|
|
|
|
|
|
|
|
if (fp == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
char line[MAX_DNS_LINE];
|
|
|
|
|
|
|
|
while (fgets(line, sizeof(line), fp) && dns3_servers.lines < MAX_DNS_SERVERS) {
|
2014-08-12 09:01:18 +02:00
|
|
|
int linelen = strlen(line);
|
|
|
|
|
|
|
|
if (linelen < DNS3_KEY_SIZE * 2 + 5)
|
2014-08-11 03:40:19 +02:00
|
|
|
continue;
|
|
|
|
|
2014-08-12 09:01:18 +02:00
|
|
|
if (line[linelen - 1] == '\n')
|
|
|
|
line[--linelen] = '\0';
|
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
const char *name = strtok(line, " ");
|
|
|
|
const char *keystr = strtok(NULL, " ");
|
|
|
|
|
|
|
|
if (name == NULL || keystr == NULL)
|
|
|
|
continue;
|
|
|
|
|
2014-08-12 09:01:18 +02:00
|
|
|
if (strlen(keystr) != DNS3_KEY_SIZE * 2)
|
|
|
|
continue;
|
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
snprintf(dns3_servers.names[dns3_servers.lines], sizeof(dns3_servers.names[dns3_servers.lines]), "%s", name);
|
2014-08-11 07:59:01 +02:00
|
|
|
int res = hex_string_to_bytes(dns3_servers.keys[dns3_servers.lines], DNS3_KEY_SIZE, keystr);
|
2014-08-11 03:40:19 +02:00
|
|
|
|
|
|
|
if (res == -1)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
++dns3_servers.lines;
|
|
|
|
}
|
|
|
|
|
|
|
|
fclose(fp);
|
|
|
|
|
|
|
|
if (dns3_servers.lines < 1)
|
|
|
|
return -2;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-07-25 04:43:32 +02:00
|
|
|
static int dns_error(ToxWindow *self, const char *errmsg)
|
2014-06-17 03:22:26 +02:00
|
|
|
{
|
2014-07-09 06:05:13 +02:00
|
|
|
pthread_mutex_lock(&Winthread.lock);
|
2015-05-25 16:38:52 +02:00
|
|
|
line_info_add(self, NULL, NULL, NULL, SYS_MSG, 0, 0, gettext("User lookup failed: %s"), errmsg);
|
2014-07-09 06:05:13 +02:00
|
|
|
pthread_mutex_unlock(&Winthread.lock);
|
2014-06-18 01:10:25 +02:00
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-10-03 23:53:50 +02:00
|
|
|
static void killdns_thread(void *dns_obj)
|
2014-06-18 01:10:25 +02:00
|
|
|
{
|
2014-06-17 03:22:26 +02:00
|
|
|
if (dns_obj)
|
|
|
|
tox_dns3_kill(dns_obj);
|
|
|
|
|
2014-10-03 23:53:50 +02:00
|
|
|
memset(&t_data, 0, sizeof(struct thread_data));
|
2014-07-10 05:40:46 +02:00
|
|
|
pthread_attr_destroy(&dns_thread.attr);
|
|
|
|
pthread_exit(NULL);
|
2014-06-17 03:22:26 +02:00
|
|
|
}
|
|
|
|
|
2014-06-18 01:10:25 +02:00
|
|
|
/* puts TXT from dns response in buf. Returns length of TXT on success, -1 on fail.*/
|
2014-07-07 04:15:35 +02:00
|
|
|
static int parse_dns_response(ToxWindow *self, u_char *answer, int ans_len, char *buf)
|
2014-06-17 03:22:26 +02:00
|
|
|
{
|
|
|
|
uint8_t *ans_pt = answer + sizeof(HEADER);
|
|
|
|
uint8_t *ans_end = answer + ans_len;
|
2014-07-07 04:15:35 +02:00
|
|
|
char exp_ans[PACKETSZ];
|
2015-03-26 03:56:45 +01:00
|
|
|
|
2014-06-17 03:22:26 +02:00
|
|
|
int len = dn_expand(answer, ans_end, ans_pt, exp_ans, sizeof(exp_ans));
|
|
|
|
|
|
|
|
if (len == -1)
|
2015-05-25 16:38:52 +02:00
|
|
|
return dns_error(self, gettext("dn_expand failed."));
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
ans_pt += len;
|
|
|
|
|
|
|
|
if (ans_pt > ans_end - 4)
|
2015-05-25 16:38:52 +02:00
|
|
|
return dns_error(self, gettext("DNS reply was too short."));
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
int type;
|
|
|
|
GETSHORT(type, ans_pt);
|
|
|
|
|
|
|
|
if (type != T_TXT)
|
2015-05-25 16:38:52 +02:00
|
|
|
return dns_error(self, gettext("Broken DNS reply."));
|
2015-03-26 03:56:45 +01:00
|
|
|
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
ans_pt += INT16SZ; /* class */
|
|
|
|
uint32_t size = 0;
|
|
|
|
|
|
|
|
/* recurse through CNAME rr's */
|
2015-03-26 03:56:45 +01:00
|
|
|
do {
|
2014-06-17 03:22:26 +02:00
|
|
|
ans_pt += size;
|
|
|
|
len = dn_expand(answer, ans_end, ans_pt, exp_ans, sizeof(exp_ans));
|
|
|
|
|
|
|
|
if (len == -1)
|
2015-05-25 16:38:52 +02:00
|
|
|
return dns_error(self, gettext("Second dn_expand failed."));
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
ans_pt += len;
|
|
|
|
|
|
|
|
if (ans_pt > ans_end - 10)
|
2015-05-25 16:38:52 +02:00
|
|
|
return dns_error(self, gettext("DNS reply was too short."));
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
GETSHORT(type, ans_pt);
|
|
|
|
ans_pt += INT16SZ;
|
|
|
|
ans_pt += 4;
|
|
|
|
GETSHORT(size, ans_pt);
|
|
|
|
|
|
|
|
if (ans_pt + size < answer || ans_pt + size > ans_end)
|
2015-05-25 16:38:52 +02:00
|
|
|
return dns_error(self, gettext("RR overflow."));
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
} while (type == T_CNAME);
|
|
|
|
|
|
|
|
if (type != T_TXT)
|
2015-05-25 16:38:52 +02:00
|
|
|
return dns_error(self, gettext("DNS response failed."));
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
uint32_t txt_len = *ans_pt;
|
|
|
|
|
2014-06-18 01:10:25 +02:00
|
|
|
if (!size || txt_len >= size || !txt_len)
|
2015-05-25 16:38:52 +02:00
|
|
|
return dns_error(self, gettext("No record found."));
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-08-11 07:59:01 +02:00
|
|
|
if (txt_len > MAX_DNS_REQST_SIZE)
|
2015-05-25 16:38:52 +02:00
|
|
|
return dns_error(self, gettext("Invalid DNS response."));
|
2014-08-11 07:59:01 +02:00
|
|
|
|
2014-06-17 03:22:26 +02:00
|
|
|
ans_pt++;
|
|
|
|
ans_pt[txt_len] = '\0';
|
|
|
|
memcpy(buf, ans_pt, txt_len + 1);
|
|
|
|
|
2014-06-18 01:10:25 +02:00
|
|
|
return txt_len;
|
2014-06-17 03:22:26 +02:00
|
|
|
}
|
|
|
|
|
2015-03-26 03:56:45 +01:00
|
|
|
/* Takes address addr in the form "username@domain", puts the username in namebuf,
|
2014-06-17 03:22:26 +02:00
|
|
|
and the domain in dombuf.
|
|
|
|
|
|
|
|
return length of username on success, -1 on failure */
|
2014-07-25 04:43:32 +02:00
|
|
|
static int parse_addr(const char *addr, char *namebuf, char *dombuf)
|
2014-06-17 03:22:26 +02:00
|
|
|
{
|
2014-07-07 04:15:35 +02:00
|
|
|
char tmpaddr[MAX_STR_SIZE];
|
|
|
|
char *tmpname, *tmpdom;
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
strcpy(tmpaddr, addr);
|
|
|
|
tmpname = strtok(tmpaddr, "@");
|
|
|
|
tmpdom = strtok(NULL, "");
|
|
|
|
|
|
|
|
if (tmpname == NULL || tmpdom == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2014-06-18 19:10:20 +02:00
|
|
|
str_to_lower(tmpdom);
|
2014-06-17 03:22:26 +02:00
|
|
|
strcpy(namebuf, tmpname);
|
|
|
|
strcpy(dombuf, tmpdom);
|
|
|
|
|
|
|
|
return strlen(namebuf);
|
|
|
|
}
|
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
/* matches input domain name with domains in list and obtains key. Return 0 on success, -1 on failure */
|
|
|
|
static int get_domain_match(char *pubkey, char *domain, const char *inputdomain)
|
|
|
|
{
|
|
|
|
/* check server list first */
|
|
|
|
int i;
|
|
|
|
bool match = false;
|
|
|
|
|
|
|
|
for (i = 0; i < dns3_servers.lines; ++i) {
|
|
|
|
if (strcmp(dns3_servers.names[i], inputdomain) == 0) {
|
|
|
|
memcpy(pubkey, dns3_servers.keys[i], DNS3_KEY_SIZE);
|
|
|
|
snprintf(domain, MAX_DOMAIN_SIZE, "%s", dns3_servers.names[i]);
|
|
|
|
match = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fall back to hard-coded domains on server list failure */
|
|
|
|
if (!match) {
|
|
|
|
for (i = 0; i < NUM_DNS3_BACKUP_SERVERS; ++i) {
|
|
|
|
if (strcmp(dns3_servers_backup[i].name, inputdomain) == 0) {
|
|
|
|
memcpy(pubkey, dns3_servers_backup[i].key, DNS3_KEY_SIZE);
|
|
|
|
snprintf(domain, MAX_DOMAIN_SIZE, "%s", dns3_servers_backup[i].name);
|
|
|
|
match = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!match)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-06-18 01:10:25 +02:00
|
|
|
/* Does DNS lookup for addr and puts resulting tox id in id_bin. */
|
|
|
|
void *dns3_lookup_thread(void *data)
|
2014-06-17 03:22:26 +02:00
|
|
|
{
|
2014-06-18 01:10:25 +02:00
|
|
|
ToxWindow *self = t_data.self;
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
char inputdomain[MAX_STR_SIZE];
|
2014-07-07 04:15:35 +02:00
|
|
|
char name[MAX_STR_SIZE];
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
int namelen = parse_addr(t_data.addr, name, inputdomain);
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-06-18 01:10:25 +02:00
|
|
|
if (namelen == -1) {
|
2015-05-25 16:38:52 +02:00
|
|
|
dns_error(self, gettext("Must be a Tox ID or an address in the form username@domain"));
|
2014-10-03 23:53:50 +02:00
|
|
|
killdns_thread(NULL);
|
2014-06-18 01:10:25 +02:00
|
|
|
}
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
char DNS_pubkey[DNS3_KEY_SIZE];
|
|
|
|
char domain[MAX_DOMAIN_SIZE];
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
int match = get_domain_match(DNS_pubkey, domain, inputdomain);
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
if (match == -1) {
|
2015-05-25 16:38:52 +02:00
|
|
|
dns_error(self, gettext("Domain not found."));
|
2014-10-03 23:53:50 +02:00
|
|
|
killdns_thread(NULL);
|
2014-06-18 01:10:25 +02:00
|
|
|
}
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-07-07 04:15:35 +02:00
|
|
|
void *dns_obj = tox_dns3_new((uint8_t *) DNS_pubkey);
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-06-18 01:10:25 +02:00
|
|
|
if (dns_obj == NULL) {
|
2015-05-25 16:38:52 +02:00
|
|
|
dns_error(self, gettext("Core failed to create DNS object."));
|
2014-10-03 23:53:50 +02:00
|
|
|
killdns_thread(NULL);
|
2014-06-18 01:10:25 +02:00
|
|
|
}
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-08-11 07:59:01 +02:00
|
|
|
char string[MAX_DNS_REQST_SIZE + 1];
|
2014-06-17 03:22:26 +02:00
|
|
|
uint32_t request_id;
|
|
|
|
|
2015-03-26 03:56:45 +01:00
|
|
|
int str_len = tox_generate_dns3_string(dns_obj, (uint8_t *) string, sizeof(string), &request_id,
|
2014-07-07 04:15:35 +02:00
|
|
|
(uint8_t *) name, namelen);
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-06-18 01:10:25 +02:00
|
|
|
if (str_len == -1) {
|
2015-05-25 16:38:52 +02:00
|
|
|
dns_error(self, gettext("Core failed to generate DNS3 string."));
|
2014-10-03 23:53:50 +02:00
|
|
|
killdns_thread(dns_obj);
|
2014-06-18 01:10:25 +02:00
|
|
|
}
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
string[str_len] = '\0';
|
|
|
|
|
|
|
|
u_char answer[PACKETSZ];
|
2014-08-11 07:59:01 +02:00
|
|
|
char d_string[MAX_DOMAIN_SIZE + MAX_DNS_REQST_SIZE + 10];
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
/* format string and create dns query */
|
2014-08-11 03:40:19 +02:00
|
|
|
snprintf(d_string, sizeof(d_string), "_%s._tox.%s", string, domain);
|
2014-06-17 03:22:26 +02:00
|
|
|
int ans_len = res_query(d_string, C_IN, T_TXT, answer, sizeof(answer));
|
|
|
|
|
2014-06-18 01:10:25 +02:00
|
|
|
if (ans_len <= 0) {
|
2015-05-25 16:38:52 +02:00
|
|
|
dns_error(self, gettext("DNS query failed."));
|
2014-10-03 23:53:50 +02:00
|
|
|
killdns_thread(dns_obj);
|
2014-06-18 01:10:25 +02:00
|
|
|
}
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-08-11 07:59:01 +02:00
|
|
|
char ans_id[MAX_DNS_REQST_SIZE + 1];
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
/* extract TXT from DNS response */
|
2014-06-18 19:10:20 +02:00
|
|
|
if (parse_dns_response(self, answer, ans_len, ans_id) == -1)
|
2014-10-03 23:53:50 +02:00
|
|
|
killdns_thread(dns_obj);
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-08-11 07:59:01 +02:00
|
|
|
char encrypted_id[MAX_DNS_REQST_SIZE + 1];
|
2014-06-17 03:22:26 +02:00
|
|
|
int prfx_len = strlen(TOX_DNS3_TXT_PREFIX);
|
|
|
|
|
|
|
|
/* extract the encrypted ID from TXT response */
|
2014-06-18 01:10:25 +02:00
|
|
|
if (strncmp(ans_id, TOX_DNS3_TXT_PREFIX, prfx_len) != 0) {
|
2015-05-25 16:38:52 +02:00
|
|
|
dns_error(self, gettext("Bad DNS3 TXT response."));
|
2014-10-03 23:53:50 +02:00
|
|
|
killdns_thread(dns_obj);
|
2014-06-18 01:10:25 +02:00
|
|
|
}
|
2014-06-17 03:22:26 +02:00
|
|
|
|
|
|
|
memcpy(encrypted_id, ans_id + prfx_len, ans_len - prfx_len);
|
|
|
|
|
2015-03-26 03:56:45 +01:00
|
|
|
if (tox_decrypt_dns3_TXT(dns_obj, (uint8_t *) t_data.id_bin, (uint8_t *) encrypted_id,
|
2014-07-09 06:05:13 +02:00
|
|
|
strlen(encrypted_id), request_id) == -1) {
|
2015-05-25 16:38:52 +02:00
|
|
|
dns_error(self, gettext("Core failed to decrypt DNS response."));
|
2014-10-03 23:53:50 +02:00
|
|
|
killdns_thread(dns_obj);
|
2014-06-18 01:10:25 +02:00
|
|
|
}
|
|
|
|
|
2014-07-09 06:05:13 +02:00
|
|
|
pthread_mutex_lock(&Winthread.lock);
|
2014-06-18 01:10:25 +02:00
|
|
|
cmd_add_helper(self, t_data.m, t_data.id_bin, t_data.msg);
|
2014-07-09 06:05:13 +02:00
|
|
|
pthread_mutex_unlock(&Winthread.lock);
|
2014-06-18 01:10:25 +02:00
|
|
|
|
2014-10-03 23:53:50 +02:00
|
|
|
killdns_thread(dns_obj);
|
2014-06-24 23:45:14 +02:00
|
|
|
return 0;
|
2014-06-18 01:10:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* creates new thread for dns3 lookup. Only allows one lookup at a time. */
|
2014-07-29 20:54:34 +02:00
|
|
|
void dns3_lookup(ToxWindow *self, Tox *m, const char *id_bin, const char *addr, const char *msg)
|
2014-06-18 01:10:25 +02:00
|
|
|
{
|
2015-03-26 03:56:45 +01:00
|
|
|
if (arg_opts.proxy_type != TOX_PROXY_TYPE_NONE && arg_opts.force_tcp) {
|
2015-05-25 16:38:52 +02:00
|
|
|
line_info_add(self, NULL, NULL, NULL, SYS_MSG, 0, 0, gettext("DNS lookups are disabled."));
|
2014-08-15 21:13:35 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-06-18 01:10:25 +02:00
|
|
|
if (t_data.busy) {
|
2015-05-25 16:38:52 +02:00
|
|
|
line_info_add(self, NULL, NULL, NULL, SYS_MSG, 0, 0, gettext("Please wait for previous user lookup to finish."));
|
2014-06-18 01:10:25 +02:00
|
|
|
return;
|
|
|
|
}
|
2014-06-17 03:22:26 +02:00
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
if (!dns3_servers.loaded) {
|
2014-08-13 01:13:57 +02:00
|
|
|
const char *path = arg_opts.dns_path[0] ? arg_opts.dns_path : PACKAGE_DATADIR "/DNSservers";
|
2014-08-11 03:40:19 +02:00
|
|
|
dns3_servers.loaded = true;
|
2014-08-13 01:13:57 +02:00
|
|
|
int ret = load_dns_domainlist(path);
|
2014-08-11 03:40:19 +02:00
|
|
|
|
|
|
|
if (ret < 0) {
|
2015-05-25 16:38:52 +02:00
|
|
|
const char *errmsg = gettext("DNS server list failed to load with error code %d. Falling back to hard-coded list.");
|
2014-08-11 03:40:19 +02:00
|
|
|
line_info_add(self, NULL, NULL, NULL, SYS_MSG, 0, 0, errmsg, ret);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-06-18 01:10:25 +02:00
|
|
|
snprintf(t_data.id_bin, sizeof(t_data.id_bin), "%s", id_bin);
|
|
|
|
snprintf(t_data.addr, sizeof(t_data.addr), "%s", addr);
|
|
|
|
snprintf(t_data.msg, sizeof(t_data.msg), "%s", msg);
|
2014-06-19 19:50:41 +02:00
|
|
|
t_data.self = self;
|
2014-06-18 01:10:25 +02:00
|
|
|
t_data.m = m;
|
|
|
|
t_data.busy = 1;
|
|
|
|
|
2014-10-09 22:39:01 +02:00
|
|
|
if (pthread_attr_init(&dns_thread.attr) != 0) {
|
2015-05-25 16:38:52 +02:00
|
|
|
line_info_add(self, NULL, NULL, NULL, SYS_MSG, 0, RED, gettext("Error: DNS thread attr failed to init"));
|
2014-10-09 22:39:01 +02:00
|
|
|
memset(&t_data, 0, sizeof(struct thread_data));
|
|
|
|
return;
|
|
|
|
}
|
2014-07-09 06:05:13 +02:00
|
|
|
|
2014-10-09 22:39:01 +02:00
|
|
|
if (pthread_attr_setdetachstate(&dns_thread.attr, PTHREAD_CREATE_DETACHED) != 0) {
|
2015-05-25 16:38:52 +02:00
|
|
|
line_info_add(self, NULL, NULL, NULL, SYS_MSG, 0, RED, gettext("Error: DNS thread attr failed to set"));
|
2014-10-09 22:39:01 +02:00
|
|
|
pthread_attr_destroy(&dns_thread.attr);
|
|
|
|
memset(&t_data, 0, sizeof(struct thread_data));
|
|
|
|
return;
|
|
|
|
}
|
2014-06-18 01:10:25 +02:00
|
|
|
|
2014-10-09 22:39:01 +02:00
|
|
|
if (pthread_create(&dns_thread.tid, &dns_thread.attr, dns3_lookup_thread, NULL) != 0) {
|
2015-05-25 16:38:52 +02:00
|
|
|
line_info_add(self, NULL, NULL, NULL, SYS_MSG, 0, RED, gettext("Error: DNS thread failed to init"));
|
2014-10-09 22:39:01 +02:00
|
|
|
pthread_attr_destroy(&dns_thread.attr);
|
|
|
|
memset(&t_data, 0, sizeof(struct thread_data));
|
|
|
|
return;
|
|
|
|
}
|
2014-06-17 03:22:26 +02:00
|
|
|
}
|