2006-05-09 10:47:06 +02:00
|
|
|
/*
|
|
|
|
* DNS support
|
|
|
|
*
|
|
|
|
* Copyright (C) 2006 Hans Leidekker
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
2006-05-18 14:49:52 +02:00
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
2006-05-09 10:47:06 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
#include "wine/port.h"
|
|
|
|
#include "wine/debug.h"
|
|
|
|
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
|
|
|
|
#ifdef HAVE_NETINET_IN_H
|
|
|
|
# include <netinet/in.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_ARPA_NAMESER_H
|
|
|
|
# include <arpa/nameser.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_RESOLV_H
|
|
|
|
# include <resolv.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_NETDB_H
|
|
|
|
# include <netdb.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "windef.h"
|
|
|
|
#include "winbase.h"
|
|
|
|
#include "winerror.h"
|
|
|
|
#include "winnls.h"
|
|
|
|
#include "windns.h"
|
2006-05-31 15:46:58 +02:00
|
|
|
#include "nb30.h"
|
2006-05-09 10:47:06 +02:00
|
|
|
|
|
|
|
#include "dnsapi.h"
|
|
|
|
|
|
|
|
WINE_DEFAULT_DEBUG_CHANNEL(dnsapi);
|
|
|
|
|
|
|
|
#ifdef HAVE_RESOLV
|
|
|
|
|
|
|
|
static CRITICAL_SECTION resolver_cs;
|
|
|
|
static CRITICAL_SECTION_DEBUG resolver_cs_debug =
|
|
|
|
{
|
|
|
|
0, 0, &resolver_cs,
|
|
|
|
{ &resolver_cs_debug.ProcessLocksList,
|
|
|
|
&resolver_cs_debug.ProcessLocksList },
|
|
|
|
0, 0, { (DWORD_PTR)(__FILE__ ": resolver_cs") }
|
|
|
|
};
|
|
|
|
static CRITICAL_SECTION resolver_cs = { &resolver_cs_debug, -1, 0, 0, 0, 0 };
|
|
|
|
|
|
|
|
#define LOCK_RESOLVER() do { EnterCriticalSection( &resolver_cs ); } while (0)
|
|
|
|
#define UNLOCK_RESOLVER() do { LeaveCriticalSection( &resolver_cs ); } while (0)
|
|
|
|
|
2007-04-18 20:39:33 +02:00
|
|
|
static int resolver_initialised;
|
|
|
|
|
2007-04-30 02:06:11 +02:00
|
|
|
/* call res_init() just once because of a bug in Mac OS X 10.4 */
|
2007-04-18 20:39:33 +02:00
|
|
|
static void initialise_resolver( void )
|
|
|
|
{
|
|
|
|
if (!resolver_initialised)
|
|
|
|
{
|
|
|
|
res_init();
|
|
|
|
resolver_initialised = 1;
|
|
|
|
}
|
|
|
|
}
|
2006-05-09 10:47:06 +02:00
|
|
|
|
2006-05-29 12:47:31 +02:00
|
|
|
static const char *dns_section_to_str( ns_sect section )
|
|
|
|
{
|
|
|
|
switch (section)
|
|
|
|
{
|
|
|
|
case ns_s_qd: return "Question";
|
|
|
|
case ns_s_an: return "Answer";
|
|
|
|
case ns_s_ns: return "Authority";
|
|
|
|
case ns_s_ar: return "Additional";
|
|
|
|
default:
|
|
|
|
{
|
|
|
|
static char tmp[5];
|
|
|
|
FIXME( "unknown section: 0x%02x\n", section );
|
|
|
|
sprintf( tmp, "0x%02x", section );
|
|
|
|
return tmp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned long dns_map_options( DWORD options )
|
|
|
|
{
|
|
|
|
unsigned long ret = 0;
|
|
|
|
|
2006-06-17 15:13:28 +02:00
|
|
|
if (options == DNS_QUERY_STANDARD)
|
|
|
|
return RES_DEFAULT;
|
|
|
|
|
2006-05-29 12:47:31 +02:00
|
|
|
if (options & DNS_QUERY_ACCEPT_TRUNCATED_RESPONSE)
|
|
|
|
ret |= RES_IGNTC;
|
|
|
|
if (options & DNS_QUERY_USE_TCP_ONLY)
|
|
|
|
ret |= RES_USEVC;
|
|
|
|
if (options & DNS_QUERY_NO_RECURSION)
|
|
|
|
ret &= ~RES_RECURSE;
|
|
|
|
if (options & DNS_QUERY_NO_LOCAL_NAME)
|
|
|
|
ret &= ~RES_DNSRCH;
|
|
|
|
if (options & DNS_QUERY_NO_HOSTS_FILE)
|
|
|
|
ret |= RES_NOALIASES;
|
|
|
|
if (options & DNS_QUERY_TREAT_AS_FQDN)
|
|
|
|
ret &= ~RES_DEFNAMES;
|
|
|
|
|
|
|
|
if (options & DNS_QUERY_DONT_RESET_TTL_VALUES)
|
|
|
|
FIXME( "option DNS_QUERY_DONT_RESET_TTL_VALUES not implemented\n" );
|
|
|
|
if (options & DNS_QUERY_RESERVED)
|
|
|
|
FIXME( "option DNS_QUERY_RESERVED not implemented\n" );
|
|
|
|
if (options & DNS_QUERY_WIRE_ONLY)
|
|
|
|
FIXME( "option DNS_QUERY_WIRE_ONLY not implemented\n" );
|
|
|
|
if (options & DNS_QUERY_NO_WIRE_QUERY)
|
|
|
|
FIXME( "option DNS_QUERY_NO_WIRE_QUERY not implemented\n" );
|
|
|
|
if (options & DNS_QUERY_BYPASS_CACHE)
|
|
|
|
FIXME( "option DNS_QUERY_BYPASS_CACHE not implemented\n" );
|
|
|
|
if (options & DNS_QUERY_RETURN_MESSAGE)
|
|
|
|
FIXME( "option DNS_QUERY_RETURN_MESSAGE not implemented\n" );
|
|
|
|
|
|
|
|
if (options & DNS_QUERY_NO_NETBT)
|
|
|
|
TRACE( "netbios query disabled\n" );
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static DNS_STATUS dns_map_error( int error )
|
|
|
|
{
|
|
|
|
switch (error)
|
|
|
|
{
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_r_noerror: return ERROR_SUCCESS;
|
|
|
|
case ns_r_formerr: return DNS_ERROR_RCODE_FORMAT_ERROR;
|
|
|
|
case ns_r_servfail: return DNS_ERROR_RCODE_SERVER_FAILURE;
|
|
|
|
case ns_r_nxdomain: return DNS_ERROR_RCODE_NAME_ERROR;
|
|
|
|
case ns_r_notimpl: return DNS_ERROR_RCODE_NOT_IMPLEMENTED;
|
|
|
|
case ns_r_refused: return DNS_ERROR_RCODE_REFUSED;
|
|
|
|
case ns_r_yxdomain: return DNS_ERROR_RCODE_YXDOMAIN;
|
|
|
|
case ns_r_yxrrset: return DNS_ERROR_RCODE_YXRRSET;
|
|
|
|
case ns_r_nxrrset: return DNS_ERROR_RCODE_NXRRSET;
|
|
|
|
case ns_r_notauth: return DNS_ERROR_RCODE_NOTAUTH;
|
|
|
|
case ns_r_notzone: return DNS_ERROR_RCODE_NOTZONE;
|
2006-05-29 12:47:31 +02:00
|
|
|
default:
|
|
|
|
FIXME( "unmapped error code: %d\n", error );
|
|
|
|
return DNS_ERROR_RCODE_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static DNS_STATUS dns_map_h_errno( int error )
|
|
|
|
{
|
|
|
|
switch (error)
|
|
|
|
{
|
|
|
|
case NO_DATA:
|
|
|
|
case HOST_NOT_FOUND: return DNS_ERROR_RCODE_NAME_ERROR;
|
|
|
|
case TRY_AGAIN: return DNS_ERROR_RCODE_SERVER_FAILURE;
|
|
|
|
case NO_RECOVERY: return DNS_ERROR_RCODE_REFUSED;
|
|
|
|
case NETDB_INTERNAL: return DNS_ERROR_RCODE;
|
|
|
|
default:
|
|
|
|
FIXME( "unmapped error code: %d\n", error );
|
|
|
|
return DNS_ERROR_RCODE_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *dns_dname_from_msg( ns_msg msg, const unsigned char *pos )
|
|
|
|
{
|
|
|
|
int len;
|
|
|
|
char *str, dname[NS_MAXDNAME] = ".";
|
|
|
|
|
|
|
|
/* returns *compressed* length, ignore it */
|
|
|
|
len = dns_ns_name_uncompress( ns_msg_base( msg ), ns_msg_end( msg ),
|
|
|
|
pos, dname, sizeof(dname) );
|
|
|
|
|
|
|
|
len = strlen( dname );
|
|
|
|
str = dns_alloc( len + 1 );
|
|
|
|
if (str) strcpy( str, dname );
|
|
|
|
return str;
|
|
|
|
}
|
|
|
|
|
|
|
|
static char *dns_str_from_rdata( const unsigned char *rdata )
|
|
|
|
{
|
|
|
|
char *str;
|
|
|
|
unsigned int len = rdata[0];
|
|
|
|
|
|
|
|
str = dns_alloc( len + 1 );
|
|
|
|
if (str)
|
|
|
|
{
|
|
|
|
memcpy( str, ++rdata, len );
|
|
|
|
str[len] = '\0';
|
|
|
|
}
|
|
|
|
return str;
|
|
|
|
}
|
|
|
|
|
2007-04-25 22:41:05 +02:00
|
|
|
static unsigned int dns_get_record_size( const ns_rr *rr )
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
const unsigned char *pos = rr->rdata;
|
|
|
|
unsigned int num = 0, size = sizeof(DNS_RECORDA);
|
|
|
|
|
|
|
|
switch (rr->type)
|
|
|
|
{
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_key:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
pos += sizeof(WORD) + sizeof(BYTE) + sizeof(BYTE);
|
|
|
|
size += rr->rdata + rr->rdlength - pos - 1;
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_sig:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
pos += sizeof(PCHAR) + sizeof(WORD) + 2 * sizeof(BYTE);
|
|
|
|
pos += 3 * sizeof(DWORD) + 2 * sizeof(WORD);
|
|
|
|
size += rr->rdata + rr->rdlength - pos - 1;
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_hinfo:
|
|
|
|
case ns_t_isdn:
|
|
|
|
case ns_t_txt:
|
|
|
|
case ns_t_x25:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
while (pos[0] && pos < rr->rdata + rr->rdlength)
|
|
|
|
{
|
|
|
|
num++;
|
|
|
|
pos += pos[0] + 1;
|
|
|
|
}
|
|
|
|
size += (num - 1) * sizeof(PCHAR);
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_null:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
size += rr->rdlength - 1;
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_nxt:
|
|
|
|
case ns_t_wks:
|
2006-05-29 12:47:31 +02:00
|
|
|
case 0xff01: /* WINS */
|
|
|
|
{
|
|
|
|
FIXME( "unhandled type: %s\n", dns_type_to_str( rr->type ) );
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
2007-04-25 22:41:05 +02:00
|
|
|
static DNS_STATUS dns_copy_rdata( ns_msg msg, const ns_rr *rr, DNS_RECORDA *r, WORD *dlen )
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
DNS_STATUS ret = ERROR_SUCCESS;
|
|
|
|
const unsigned char *pos = rr->rdata;
|
|
|
|
unsigned int i, size;
|
|
|
|
|
|
|
|
switch (rr->type)
|
|
|
|
{
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_a:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
2006-09-09 18:10:21 +02:00
|
|
|
r->Data.A.IpAddress = *(const DWORD *)pos;
|
2006-05-29 12:47:31 +02:00
|
|
|
*dlen = sizeof(DNS_A_DATA);
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_aaaa:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
for (i = 0; i < sizeof(IP6_ADDRESS)/sizeof(DWORD); i++)
|
|
|
|
{
|
2006-09-09 18:10:21 +02:00
|
|
|
r->Data.AAAA.Ip6Address.IP6Dword[i] = *(const DWORD *)pos;
|
2006-05-29 12:47:31 +02:00
|
|
|
pos += sizeof(DWORD);
|
|
|
|
}
|
|
|
|
|
|
|
|
*dlen = sizeof(DNS_AAAA_DATA);
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_key:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
/* FIXME: byte order? */
|
2006-09-09 18:10:21 +02:00
|
|
|
r->Data.KEY.wFlags = *(const WORD *)pos; pos += sizeof(WORD);
|
|
|
|
r->Data.KEY.chProtocol = *(const BYTE *)pos++;
|
|
|
|
r->Data.KEY.chAlgorithm = *(const BYTE *)pos++;
|
2006-05-29 12:47:31 +02:00
|
|
|
|
|
|
|
size = rr->rdata + rr->rdlength - pos;
|
|
|
|
|
|
|
|
for (i = 0; i < size; i++)
|
2006-09-09 18:10:21 +02:00
|
|
|
r->Data.KEY.Key[i] = *(const BYTE *)pos++;
|
2006-05-29 12:47:31 +02:00
|
|
|
|
|
|
|
*dlen = sizeof(DNS_KEY_DATA) + (size - 1) * sizeof(BYTE);
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_rp:
|
|
|
|
case ns_t_minfo:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
r->Data.MINFO.pNameMailbox = dns_dname_from_msg( msg, pos );
|
|
|
|
if (!r->Data.MINFO.pNameMailbox) return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
|
|
|
|
if (dns_ns_name_skip( &pos, ns_msg_end( msg ) ) < 0)
|
|
|
|
return DNS_ERROR_BAD_PACKET;
|
|
|
|
|
|
|
|
r->Data.MINFO.pNameErrorsMailbox = dns_dname_from_msg( msg, pos );
|
|
|
|
if (!r->Data.MINFO.pNameErrorsMailbox)
|
|
|
|
{
|
|
|
|
dns_free( r->Data.MINFO.pNameMailbox );
|
|
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
}
|
|
|
|
|
|
|
|
*dlen = sizeof(DNS_MINFO_DATAA);
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_afsdb:
|
|
|
|
case ns_t_rt:
|
|
|
|
case ns_t_mx:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
2006-09-09 18:10:21 +02:00
|
|
|
r->Data.MX.wPreference = ntohs( *(const WORD *)pos );
|
2006-05-29 12:47:31 +02:00
|
|
|
r->Data.MX.pNameExchange = dns_dname_from_msg( msg, pos + sizeof(WORD) );
|
|
|
|
if (!r->Data.MX.pNameExchange) return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
|
|
|
|
*dlen = sizeof(DNS_MX_DATAA);
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_null:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
r->Data.Null.dwByteCount = rr->rdlength;
|
|
|
|
memcpy( r->Data.Null.Data, rr->rdata, rr->rdlength );
|
|
|
|
|
|
|
|
*dlen = sizeof(DNS_NULL_DATA) + rr->rdlength - 1;
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_cname:
|
|
|
|
case ns_t_ns:
|
|
|
|
case ns_t_mb:
|
|
|
|
case ns_t_md:
|
|
|
|
case ns_t_mf:
|
|
|
|
case ns_t_mg:
|
|
|
|
case ns_t_mr:
|
|
|
|
case ns_t_ptr:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
r->Data.PTR.pNameHost = dns_dname_from_msg( msg, pos );
|
|
|
|
if (!r->Data.PTR.pNameHost) return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
|
|
|
|
*dlen = sizeof(DNS_PTR_DATAA);
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_sig:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
r->Data.SIG.pNameSigner = dns_dname_from_msg( msg, pos );
|
|
|
|
if (!r->Data.SIG.pNameSigner) return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
|
|
|
|
if (dns_ns_name_skip( &pos, ns_msg_end( msg ) ) < 0)
|
|
|
|
return DNS_ERROR_BAD_PACKET;
|
|
|
|
|
|
|
|
/* FIXME: byte order? */
|
2006-09-09 18:10:21 +02:00
|
|
|
r->Data.SIG.wTypeCovered = *(const WORD *)pos; pos += sizeof(WORD);
|
|
|
|
r->Data.SIG.chAlgorithm = *(const BYTE *)pos++;
|
|
|
|
r->Data.SIG.chLabelCount = *(const BYTE *)pos++;
|
|
|
|
r->Data.SIG.dwOriginalTtl = *(const DWORD *)pos; pos += sizeof(DWORD);
|
|
|
|
r->Data.SIG.dwExpiration = *(const DWORD *)pos; pos += sizeof(DWORD);
|
|
|
|
r->Data.SIG.dwTimeSigned = *(const DWORD *)pos; pos += sizeof(DWORD);
|
|
|
|
r->Data.SIG.wKeyTag = *(const WORD *)pos;
|
2006-05-29 12:47:31 +02:00
|
|
|
|
|
|
|
size = rr->rdata + rr->rdlength - pos;
|
|
|
|
|
|
|
|
for (i = 0; i < size; i++)
|
2006-09-09 18:10:21 +02:00
|
|
|
r->Data.SIG.Signature[i] = *(const BYTE *)pos++;
|
2006-05-29 12:47:31 +02:00
|
|
|
|
|
|
|
*dlen = sizeof(DNS_SIG_DATAA) + (size - 1) * sizeof(BYTE);
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_soa:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
r->Data.SOA.pNamePrimaryServer = dns_dname_from_msg( msg, pos );
|
|
|
|
if (!r->Data.SOA.pNamePrimaryServer) return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
|
|
|
|
if (dns_ns_name_skip( &pos, ns_msg_end( msg ) ) < 0)
|
|
|
|
return DNS_ERROR_BAD_PACKET;
|
|
|
|
|
|
|
|
r->Data.SOA.pNameAdministrator = dns_dname_from_msg( msg, pos );
|
|
|
|
if (!r->Data.SOA.pNameAdministrator)
|
|
|
|
{
|
|
|
|
dns_free( r->Data.SOA.pNamePrimaryServer );
|
|
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dns_ns_name_skip( &pos, ns_msg_end( msg ) ) < 0)
|
|
|
|
return DNS_ERROR_BAD_PACKET;
|
|
|
|
|
2006-09-09 18:10:21 +02:00
|
|
|
r->Data.SOA.dwSerialNo = ntohl( *(const DWORD *)pos ); pos += sizeof(DWORD);
|
|
|
|
r->Data.SOA.dwRefresh = ntohl( *(const DWORD *)pos ); pos += sizeof(DWORD);
|
|
|
|
r->Data.SOA.dwRetry = ntohl( *(const DWORD *)pos ); pos += sizeof(DWORD);
|
|
|
|
r->Data.SOA.dwExpire = ntohl( *(const DWORD *)pos ); pos += sizeof(DWORD);
|
|
|
|
r->Data.SOA.dwDefaultTtl = ntohl( *(const DWORD *)pos ); pos += sizeof(DWORD);
|
2006-05-29 12:47:31 +02:00
|
|
|
|
|
|
|
*dlen = sizeof(DNS_SOA_DATAA);
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_srv:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
2006-09-09 18:10:21 +02:00
|
|
|
r->Data.SRV.wPriority = ntohs( *(const WORD *)pos ); pos += sizeof(WORD);
|
|
|
|
r->Data.SRV.wWeight = ntohs( *(const WORD *)pos ); pos += sizeof(WORD);
|
|
|
|
r->Data.SRV.wPort = ntohs( *(const WORD *)pos ); pos += sizeof(WORD);
|
2006-05-29 12:47:31 +02:00
|
|
|
|
|
|
|
r->Data.SRV.pNameTarget = dns_dname_from_msg( msg, pos );
|
|
|
|
if (!r->Data.SRV.pNameTarget) return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
|
|
|
|
*dlen = sizeof(DNS_SRV_DATAA);
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_hinfo:
|
|
|
|
case ns_t_isdn:
|
|
|
|
case ns_t_x25:
|
|
|
|
case ns_t_txt:
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
i = 0;
|
|
|
|
while (pos[0] && pos < rr->rdata + rr->rdlength)
|
|
|
|
{
|
|
|
|
r->Data.TXT.pStringArray[i] = dns_str_from_rdata( pos );
|
|
|
|
if (!r->Data.TXT.pStringArray[i])
|
|
|
|
{
|
2007-07-12 17:32:07 +02:00
|
|
|
while (i > 0) dns_free( r->Data.TXT.pStringArray[--i] );
|
2006-05-29 12:47:31 +02:00
|
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
}
|
|
|
|
i++;
|
|
|
|
pos += pos[0] + 1;
|
|
|
|
}
|
|
|
|
r->Data.TXT.dwStringCount = i;
|
|
|
|
*dlen = sizeof(DNS_TXT_DATAA) + (i - 1) * sizeof(PCHAR);
|
|
|
|
break;
|
|
|
|
}
|
2006-05-31 14:17:04 +02:00
|
|
|
case ns_t_atma:
|
|
|
|
case ns_t_loc:
|
|
|
|
case ns_t_nxt:
|
|
|
|
case ns_t_tsig:
|
|
|
|
case ns_t_wks:
|
2006-05-29 12:47:31 +02:00
|
|
|
case 0x00f9: /* TKEY */
|
|
|
|
case 0xff01: /* WINS */
|
|
|
|
case 0xff02: /* WINSR */
|
|
|
|
default:
|
|
|
|
FIXME( "unhandled type: %s\n", dns_type_to_str( rr->type ) );
|
|
|
|
return DNS_ERROR_RCODE_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static DNS_STATUS dns_copy_record( ns_msg msg, ns_sect section,
|
|
|
|
unsigned short num, DNS_RECORDA **recp )
|
|
|
|
{
|
|
|
|
DNS_STATUS ret;
|
|
|
|
DNS_RECORDA *record;
|
|
|
|
WORD dlen;
|
|
|
|
ns_rr rr;
|
|
|
|
|
|
|
|
if (dns_ns_parserr( &msg, section, num, &rr ) < 0)
|
|
|
|
return DNS_ERROR_BAD_PACKET;
|
|
|
|
|
|
|
|
if (!(record = dns_zero_alloc( dns_get_record_size( &rr ) )))
|
|
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
|
|
|
|
record->pName = dns_strdup_u( rr.name );
|
|
|
|
if (!record->pName)
|
|
|
|
{
|
|
|
|
dns_free( record );
|
|
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
}
|
|
|
|
|
|
|
|
record->wType = rr.type;
|
|
|
|
record->Flags.S.Section = section;
|
|
|
|
record->Flags.S.CharSet = DnsCharSetUtf8;
|
|
|
|
record->dwTtl = rr.ttl;
|
|
|
|
|
|
|
|
if ((ret = dns_copy_rdata( msg, &rr, record, &dlen )))
|
|
|
|
{
|
|
|
|
dns_free( record->pName );
|
|
|
|
dns_free( record );
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
record->wDataLength = dlen;
|
|
|
|
*recp = record;
|
|
|
|
|
|
|
|
TRACE( "found %s record in %s section\n",
|
|
|
|
dns_type_to_str( rr.type ), dns_section_to_str( section ) );
|
|
|
|
return ERROR_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2006-05-31 15:46:58 +02:00
|
|
|
#define DEFAULT_TTL 1200
|
|
|
|
|
|
|
|
static DNS_STATUS dns_do_query_netbios( PCSTR name, DNS_RECORDA **recp )
|
|
|
|
{
|
|
|
|
NCB ncb;
|
|
|
|
UCHAR ret;
|
|
|
|
DNS_RRSET rrset;
|
|
|
|
FIND_NAME_BUFFER *buffer;
|
|
|
|
FIND_NAME_HEADER *header;
|
|
|
|
DNS_RECORDA *record = NULL;
|
|
|
|
unsigned int i, len;
|
2006-09-13 14:36:49 +02:00
|
|
|
DNS_STATUS status = ERROR_INVALID_NAME;
|
2006-05-31 15:46:58 +02:00
|
|
|
|
|
|
|
len = strlen( name );
|
|
|
|
if (len >= NCBNAMSZ) return DNS_ERROR_RCODE_NAME_ERROR;
|
|
|
|
|
|
|
|
DNS_RRSET_INIT( rrset );
|
|
|
|
|
|
|
|
memset( &ncb, 0, sizeof(ncb) );
|
|
|
|
ncb.ncb_command = NCBFINDNAME;
|
|
|
|
|
|
|
|
memset( ncb.ncb_callname, ' ', sizeof(ncb.ncb_callname) );
|
|
|
|
memcpy( ncb.ncb_callname, name, len );
|
2006-07-10 22:18:50 +02:00
|
|
|
ncb.ncb_callname[NCBNAMSZ - 1] = '\0';
|
2006-05-31 15:46:58 +02:00
|
|
|
|
|
|
|
ret = Netbios( &ncb );
|
|
|
|
if (ret != NRC_GOODRET) return ERROR_INVALID_NAME;
|
|
|
|
|
|
|
|
header = (FIND_NAME_HEADER *)ncb.ncb_buffer;
|
|
|
|
buffer = (FIND_NAME_BUFFER *)((char *)header + sizeof(FIND_NAME_HEADER));
|
|
|
|
|
|
|
|
for (i = 0; i < header->node_count; i++)
|
|
|
|
{
|
|
|
|
record = dns_zero_alloc( sizeof(DNS_RECORDA) );
|
|
|
|
if (!record)
|
|
|
|
{
|
2006-09-13 14:36:49 +02:00
|
|
|
status = ERROR_NOT_ENOUGH_MEMORY;
|
2006-05-31 15:46:58 +02:00
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
record->pName = dns_strdup_u( name );
|
|
|
|
if (!record->pName)
|
|
|
|
{
|
2006-09-13 14:36:49 +02:00
|
|
|
status = ERROR_NOT_ENOUGH_MEMORY;
|
2006-05-31 15:46:58 +02:00
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
record->wType = DNS_TYPE_A;
|
|
|
|
record->Flags.S.Section = DnsSectionAnswer;
|
|
|
|
record->Flags.S.CharSet = DnsCharSetUtf8;
|
|
|
|
record->dwTtl = DEFAULT_TTL;
|
|
|
|
|
|
|
|
/* FIXME: network byte order? */
|
|
|
|
record->Data.A.IpAddress = *(DWORD *)((char *)buffer[i].destination_addr + 2);
|
|
|
|
|
|
|
|
DNS_RRSET_ADD( rrset, (DNS_RECORD *)record );
|
|
|
|
}
|
|
|
|
}
|
2007-01-01 12:42:44 +01:00
|
|
|
status = ERROR_SUCCESS;
|
2006-05-31 15:46:58 +02:00
|
|
|
|
|
|
|
exit:
|
|
|
|
DNS_RRSET_TERMINATE( rrset );
|
|
|
|
|
2006-09-13 14:36:49 +02:00
|
|
|
if (status != ERROR_SUCCESS)
|
2006-06-17 15:24:32 +02:00
|
|
|
DnsRecordListFree( rrset.pFirstRR, DnsFreeRecordList );
|
2006-05-31 15:46:58 +02:00
|
|
|
else
|
|
|
|
*recp = (DNS_RECORDA *)rrset.pFirstRR;
|
|
|
|
|
2006-09-13 14:36:49 +02:00
|
|
|
return status;
|
2006-05-31 15:46:58 +02:00
|
|
|
}
|
|
|
|
|
2006-05-29 12:47:31 +02:00
|
|
|
/* The resolver lock must be held and res_init() must have been
|
|
|
|
* called before calling these three functions.
|
2006-05-09 10:47:06 +02:00
|
|
|
*/
|
2007-04-25 22:41:05 +02:00
|
|
|
static DNS_STATUS dns_set_serverlist( const IP4_ARRAY *addrs )
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
if (addrs->AddrCount > MAXNS)
|
|
|
|
{
|
2006-09-30 12:07:06 +02:00
|
|
|
WARN( "too many servers: %d only using the first: %d\n",
|
2006-05-29 12:47:31 +02:00
|
|
|
addrs->AddrCount, MAXNS );
|
|
|
|
_res.nscount = MAXNS;
|
|
|
|
}
|
|
|
|
else _res.nscount = addrs->AddrCount;
|
|
|
|
|
|
|
|
for (i = 0; i < _res.nscount; i++)
|
|
|
|
_res.nsaddr_list[i].sin_addr.s_addr = addrs->AddrArray[i];
|
|
|
|
|
|
|
|
return ERROR_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2006-05-09 10:47:06 +02:00
|
|
|
static DNS_STATUS dns_get_serverlist( PIP4_ARRAY addrs, PDWORD len )
|
|
|
|
{
|
|
|
|
unsigned int i, size;
|
|
|
|
|
|
|
|
size = sizeof(IP4_ARRAY) + sizeof(IP4_ADDRESS) * (_res.nscount - 1);
|
|
|
|
if (!addrs || *len < size)
|
|
|
|
{
|
|
|
|
*len = size;
|
|
|
|
return ERROR_INSUFFICIENT_BUFFER;
|
|
|
|
}
|
|
|
|
|
|
|
|
addrs->AddrCount = _res.nscount;
|
|
|
|
|
|
|
|
for (i = 0; i < _res.nscount; i++)
|
|
|
|
addrs->AddrArray[i] = _res.nsaddr_list[i].sin_addr.s_addr;
|
|
|
|
|
|
|
|
return ERROR_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2006-05-29 12:47:31 +02:00
|
|
|
static DNS_STATUS dns_do_query( PCSTR name, WORD type, DWORD options,
|
|
|
|
PDNS_RECORDA *result )
|
|
|
|
{
|
|
|
|
DNS_STATUS ret = DNS_ERROR_RCODE_NOT_IMPLEMENTED;
|
|
|
|
|
|
|
|
unsigned int i, num;
|
|
|
|
unsigned char answer[NS_PACKETSZ];
|
|
|
|
ns_sect sections[] = { ns_s_an, ns_s_ar };
|
|
|
|
ns_msg msg;
|
|
|
|
|
|
|
|
DNS_RECORDA *record = NULL;
|
|
|
|
DNS_RRSET rrset;
|
|
|
|
int len;
|
|
|
|
|
|
|
|
DNS_RRSET_INIT( rrset );
|
|
|
|
|
2006-05-31 14:17:04 +02:00
|
|
|
len = res_query( name, ns_c_in, type, answer, sizeof(answer) );
|
2006-05-29 12:47:31 +02:00
|
|
|
if (len < 0)
|
|
|
|
{
|
|
|
|
ret = dns_map_h_errno( h_errno );
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dns_ns_initparse( answer, len, &msg ) < 0)
|
|
|
|
{
|
|
|
|
ret = DNS_ERROR_BAD_PACKET;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2006-05-31 14:25:49 +02:00
|
|
|
#define RCODE_MASK 0x0f
|
|
|
|
if ((msg._flags & RCODE_MASK) != ns_r_noerror)
|
2006-05-29 12:47:31 +02:00
|
|
|
{
|
2006-05-31 14:25:49 +02:00
|
|
|
ret = dns_map_error( msg._flags & RCODE_MASK );
|
2006-05-29 12:47:31 +02:00
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < sizeof(sections)/sizeof(sections[0]); i++)
|
|
|
|
{
|
|
|
|
for (num = 0; num < ns_msg_count( msg, sections[i] ); num++)
|
|
|
|
{
|
|
|
|
ret = dns_copy_record( msg, sections[i], num, &record );
|
|
|
|
if (ret != ERROR_SUCCESS) goto exit;
|
|
|
|
|
|
|
|
DNS_RRSET_ADD( rrset, (DNS_RECORD *)record );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
exit:
|
|
|
|
DNS_RRSET_TERMINATE( rrset );
|
|
|
|
|
|
|
|
if (ret != ERROR_SUCCESS)
|
|
|
|
DnsRecordListFree( rrset.pFirstRR, DnsFreeRecordList );
|
|
|
|
else
|
|
|
|
*result = (DNS_RECORDA *)rrset.pFirstRR;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-05-09 10:47:06 +02:00
|
|
|
#endif /* HAVE_RESOLV */
|
|
|
|
|
2006-05-29 12:47:31 +02:00
|
|
|
/******************************************************************************
|
|
|
|
* DnsQuery_A [DNSAPI.@]
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
DNS_STATUS WINAPI DnsQuery_A( PCSTR name, WORD type, DWORD options, PIP4_ARRAY servers,
|
|
|
|
PDNS_RECORDA *result, PVOID *reserved )
|
|
|
|
{
|
|
|
|
WCHAR *nameW;
|
|
|
|
DNS_RECORDW *resultW;
|
|
|
|
DNS_STATUS status;
|
|
|
|
|
2006-09-30 12:07:06 +02:00
|
|
|
TRACE( "(%s,%s,0x%08x,%p,%p,%p)\n", debugstr_a(name), dns_type_to_str( type ),
|
2006-05-29 12:47:31 +02:00
|
|
|
options, servers, result, reserved );
|
|
|
|
|
|
|
|
if (!name || !result)
|
|
|
|
return ERROR_INVALID_PARAMETER;
|
|
|
|
|
|
|
|
nameW = dns_strdup_aw( name );
|
|
|
|
if (!nameW) return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
|
|
|
|
status = DnsQuery_W( nameW, type, options, servers, &resultW, reserved );
|
|
|
|
|
|
|
|
if (status == ERROR_SUCCESS)
|
|
|
|
{
|
|
|
|
*result = (DNS_RECORDA *)DnsRecordSetCopyEx(
|
|
|
|
(DNS_RECORD *)resultW, DnsCharSetUnicode, DnsCharSetAnsi );
|
|
|
|
|
|
|
|
if (!*result) status = ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
DnsRecordListFree( (DNS_RECORD *)resultW, DnsFreeRecordList );
|
|
|
|
}
|
|
|
|
|
|
|
|
dns_free( nameW );
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************
|
|
|
|
* DnsQuery_UTF8 [DNSAPI.@]
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
DNS_STATUS WINAPI DnsQuery_UTF8( PCSTR name, WORD type, DWORD options, PIP4_ARRAY servers,
|
|
|
|
PDNS_RECORDA *result, PVOID *reserved )
|
|
|
|
{
|
|
|
|
DNS_STATUS ret = DNS_ERROR_RCODE_NOT_IMPLEMENTED;
|
|
|
|
#ifdef HAVE_RESOLV
|
|
|
|
|
2006-09-30 12:07:06 +02:00
|
|
|
TRACE( "(%s,%s,0x%08x,%p,%p,%p)\n", debugstr_a(name), dns_type_to_str( type ),
|
2006-05-29 12:47:31 +02:00
|
|
|
options, servers, result, reserved );
|
|
|
|
|
|
|
|
if (!name || !result)
|
|
|
|
return ERROR_INVALID_PARAMETER;
|
|
|
|
|
|
|
|
LOCK_RESOLVER();
|
|
|
|
|
2007-04-18 20:39:33 +02:00
|
|
|
initialise_resolver();
|
2006-05-29 12:47:31 +02:00
|
|
|
_res.options |= dns_map_options( options );
|
|
|
|
|
|
|
|
if (servers && (ret = dns_set_serverlist( servers )))
|
2006-05-30 23:39:30 +02:00
|
|
|
{
|
|
|
|
UNLOCK_RESOLVER();
|
2006-05-29 12:47:31 +02:00
|
|
|
return ret;
|
2006-05-30 23:39:30 +02:00
|
|
|
}
|
2006-05-29 12:47:31 +02:00
|
|
|
|
|
|
|
ret = dns_do_query( name, type, options, result );
|
|
|
|
|
2006-05-31 15:46:58 +02:00
|
|
|
if (ret == DNS_ERROR_RCODE_NAME_ERROR && type == DNS_TYPE_A &&
|
|
|
|
!(options & DNS_QUERY_NO_NETBT))
|
|
|
|
{
|
|
|
|
TRACE( "dns lookup failed, trying netbios query\n" );
|
|
|
|
ret = dns_do_query_netbios( name, result );
|
|
|
|
}
|
|
|
|
|
2006-05-29 12:47:31 +02:00
|
|
|
UNLOCK_RESOLVER();
|
|
|
|
|
|
|
|
#endif
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************
|
|
|
|
* DnsQuery_W [DNSAPI.@]
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
DNS_STATUS WINAPI DnsQuery_W( PCWSTR name, WORD type, DWORD options, PIP4_ARRAY servers,
|
|
|
|
PDNS_RECORDW *result, PVOID *reserved )
|
|
|
|
{
|
|
|
|
char *nameU;
|
|
|
|
DNS_RECORDA *resultA;
|
|
|
|
DNS_STATUS status;
|
|
|
|
|
2006-09-30 12:07:06 +02:00
|
|
|
TRACE( "(%s,%s,0x%08x,%p,%p,%p)\n", debugstr_w(name), dns_type_to_str( type ),
|
2006-05-29 12:47:31 +02:00
|
|
|
options, servers, result, reserved );
|
|
|
|
|
|
|
|
if (!name || !result)
|
|
|
|
return ERROR_INVALID_PARAMETER;
|
|
|
|
|
|
|
|
nameU = dns_strdup_wu( name );
|
|
|
|
if (!nameU) return ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
|
|
|
|
status = DnsQuery_UTF8( nameU, type, options, servers, &resultA, reserved );
|
|
|
|
|
|
|
|
if (status == ERROR_SUCCESS)
|
|
|
|
{
|
|
|
|
*result = (DNS_RECORDW *)DnsRecordSetCopyEx(
|
|
|
|
(DNS_RECORD *)resultA, DnsCharSetUtf8, DnsCharSetUnicode );
|
|
|
|
|
|
|
|
if (!*result) status = ERROR_NOT_ENOUGH_MEMORY;
|
|
|
|
DnsRecordListFree( (DNS_RECORD *)resultA, DnsFreeRecordList );
|
|
|
|
}
|
|
|
|
|
|
|
|
dns_free( nameU );
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2006-05-09 10:47:06 +02:00
|
|
|
static DNS_STATUS dns_get_hostname_a( COMPUTER_NAME_FORMAT format,
|
|
|
|
LPSTR buffer, PDWORD len )
|
|
|
|
{
|
|
|
|
char name[256];
|
|
|
|
DWORD size = sizeof(name);
|
|
|
|
|
|
|
|
if (!GetComputerNameExA( format, name, &size ))
|
|
|
|
return DNS_ERROR_NAME_DOES_NOT_EXIST;
|
|
|
|
|
|
|
|
if (!buffer || (size = lstrlenA( name ) + 1) > *len)
|
|
|
|
{
|
|
|
|
*len = size;
|
|
|
|
return ERROR_INSUFFICIENT_BUFFER;
|
|
|
|
}
|
|
|
|
|
|
|
|
lstrcpyA( buffer, name );
|
|
|
|
return ERROR_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
static DNS_STATUS dns_get_hostname_w( COMPUTER_NAME_FORMAT format,
|
|
|
|
LPWSTR buffer, PDWORD len )
|
|
|
|
{
|
|
|
|
WCHAR name[256];
|
|
|
|
DWORD size = sizeof(name);
|
|
|
|
|
|
|
|
if (!GetComputerNameExW( format, name, &size ))
|
|
|
|
return DNS_ERROR_NAME_DOES_NOT_EXIST;
|
|
|
|
|
|
|
|
if (!buffer || (size = lstrlenW( name ) + 1) > *len)
|
|
|
|
{
|
|
|
|
*len = size;
|
|
|
|
return ERROR_INSUFFICIENT_BUFFER;
|
|
|
|
}
|
|
|
|
|
|
|
|
lstrcpyW( buffer, name );
|
|
|
|
return ERROR_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************
|
|
|
|
* DnsQueryConfig [DNSAPI.@]
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
DNS_STATUS WINAPI DnsQueryConfig( DNS_CONFIG_TYPE config, DWORD flag, PWSTR adapter,
|
|
|
|
PVOID reserved, PVOID buffer, PDWORD len )
|
|
|
|
{
|
|
|
|
DNS_STATUS ret = ERROR_INVALID_PARAMETER;
|
|
|
|
|
2006-09-30 12:07:06 +02:00
|
|
|
TRACE( "(%d,0x%08x,%s,%p,%p,%p)\n", config, flag, debugstr_w(adapter),
|
2006-05-09 10:47:06 +02:00
|
|
|
reserved, buffer, len );
|
|
|
|
|
|
|
|
if (!len) return ERROR_INVALID_PARAMETER;
|
|
|
|
|
|
|
|
switch (config)
|
|
|
|
{
|
|
|
|
case DnsConfigDnsServerList:
|
|
|
|
{
|
|
|
|
#ifdef HAVE_RESOLV
|
|
|
|
LOCK_RESOLVER();
|
|
|
|
|
2007-04-18 20:39:33 +02:00
|
|
|
initialise_resolver();
|
2006-09-13 14:36:49 +02:00
|
|
|
ret = dns_get_serverlist( buffer, len );
|
2006-05-09 10:47:06 +02:00
|
|
|
|
|
|
|
UNLOCK_RESOLVER();
|
|
|
|
break;
|
|
|
|
#else
|
|
|
|
WARN( "compiled without resolver support\n" );
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
case DnsConfigHostName_A:
|
|
|
|
case DnsConfigHostName_UTF8:
|
|
|
|
return dns_get_hostname_a( ComputerNameDnsHostname, buffer, len );
|
|
|
|
|
|
|
|
case DnsConfigFullHostName_A:
|
|
|
|
case DnsConfigFullHostName_UTF8:
|
|
|
|
return dns_get_hostname_a( ComputerNameDnsFullyQualified, buffer, len );
|
|
|
|
|
|
|
|
case DnsConfigPrimaryDomainName_A:
|
|
|
|
case DnsConfigPrimaryDomainName_UTF8:
|
|
|
|
return dns_get_hostname_a( ComputerNameDnsDomain, buffer, len );
|
|
|
|
|
|
|
|
case DnsConfigHostName_W:
|
|
|
|
return dns_get_hostname_w( ComputerNameDnsHostname, buffer, len );
|
|
|
|
|
|
|
|
case DnsConfigFullHostName_W:
|
|
|
|
return dns_get_hostname_w( ComputerNameDnsFullyQualified, buffer, len );
|
|
|
|
|
|
|
|
case DnsConfigPrimaryDomainName_W:
|
|
|
|
return dns_get_hostname_w( ComputerNameDnsDomain, buffer, len );
|
|
|
|
|
|
|
|
case DnsConfigAdapterDomainName_A:
|
|
|
|
case DnsConfigAdapterDomainName_W:
|
|
|
|
case DnsConfigAdapterDomainName_UTF8:
|
|
|
|
case DnsConfigSearchList:
|
|
|
|
case DnsConfigAdapterInfo:
|
|
|
|
case DnsConfigPrimaryHostNameRegistrationEnabled:
|
|
|
|
case DnsConfigAdapterHostNameRegistrationEnabled:
|
|
|
|
case DnsConfigAddressRegistrationMaxCount:
|
|
|
|
FIXME( "unimplemented config type %d\n", config );
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
WARN( "unknown config type: %d\n", config );
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|