Per corrections suggested by [EMAIL PROTECTED], attached is a revised pacth to ext/standard/dns.c for addition of getanyrr() function.
--- dns.c Sat Nov 16 13:31:51 2002 +++ dns.c Sat Nov 16 15:04:07 2002 @@ -16,7 +16,7 @@ +----------------------------------------------------------------------+ */ -/* $Id: dns.c,v 1.44 2002/10/18 22:08:23 sniper Exp $ */ +/* $Id: dns.c,v 1.44 2002/11/16 14:51:58 pollita Exp $ */ /* {{{ includes */ @@ -276,6 +276,252 @@ #ifndef MAXHOSTNAMELEN #define MAXHOSTNAMELEN 256 #endif /* MAXHOSTNAMELEN */ + +#ifndef MAXRESOURCERECORDS +#define MAXRESOURCERECORDS 64 +#endif /* MAXRESOURCERECORDS */ + +/* {{{ php_parserr + */ +u_char *php_parserr(u_char *cp, querybuf *answer, int type_to_fetch, zval **subarray) +{ + u_short type, class, dlen; + u_long ttl; + long n, i; + char name[MAXHOSTNAMELEN]; + + n = dn_expand(answer->qb2,answer->qb2+65536,cp,name,(sizeof name) - 2); + if (n < 0) { + return NULL; + } + cp += n; + + GETSHORT(type,cp); + GETSHORT(class,cp); + GETLONG(ttl,cp); + GETSHORT(dlen,cp); + if (type_to_fetch != T_ANY && type != type_to_fetch) { + /* Should never actually occour */ + cp += dlen; + return NULL; + } + + MAKE_STD_ZVAL(*subarray); + if (array_init(*subarray) != SUCCESS) { + return NULL; + } + add_assoc_string(*subarray,"host",name,1); + + switch (type) { + case T_A: + add_assoc_string(*subarray,"type","A",1); + sprintf(name,"%d.%d.%d.%d",cp[0],cp[1],cp[2],cp[3]); + add_assoc_string(*subarray,"ip",name,1); + cp += dlen; + break; + case T_MX: + add_assoc_string(*subarray,"type","MX",1); + GETSHORT(n,cp); + add_assoc_long(*subarray,"pri",n); + case T_CNAME: + if (type == T_CNAME) + add_assoc_string(*subarray,"type","CNAME",1); + case T_NS: + if (type == T_NS) + add_assoc_string(*subarray,"type","NS",1); + case T_PTR: + if (type == T_PTR) + add_assoc_string(*subarray,"type","PTR",1); + n = dn_expand(answer->qb2,answer->qb2+65536,cp,name,(sizeof +name) - 2); + if (n < 0) { + return NULL; + } + cp += n; + add_assoc_string(*subarray,"target",name,1); + break; + case T_HINFO: + /* See RFC 1010 for values */ + GETSHORT(n,cp); + add_assoc_long(*subarray,"cpu",n); + GETSHORT(n,cp); + add_assoc_long(*subarray,"os",n); + break; + case T_TXT: + add_assoc_string(*subarray,"type","TXT",1); + n = cp[0]; + for(i=1; i<=n; i++) + name[i-1] = cp[i]; + name[i-1] = '\0'; + cp += dlen; + add_assoc_string(*subarray,"txt",name,1); + break; + case T_SOA: + add_assoc_string(*subarray,"type","SOA",1); + n = dn_expand(answer->qb2,answer->qb2+65536,cp,name,(sizeof +name) -2); + if (n < 0) { + return NULL; + } + cp += n; + add_assoc_string(*subarray,"mname",name,1); + n = dn_expand(answer->qb2,answer->qb2+65536,cp,name,(sizeof +name) -2); + if (n < 0) { + return NULL; + } + cp += n; + add_assoc_string(*subarray,"rname",name,1); + GETLONG(n,cp); + add_assoc_long(*subarray,"serial",n); + GETLONG(n,cp); + add_assoc_long(*subarray,"refresh",n); + GETLONG(n,cp); + add_assoc_long(*subarray,"retry",n); + GETLONG(n,cp); + add_assoc_long(*subarray,"expire",n); + GETLONG(n,cp); + add_assoc_long(*subarray,"minimum-ttl",n); + break; + default: + cp += dlen; + } + + add_assoc_string(*subarray,"class","IN",1); + add_assoc_long(*subarray,"ttl",ttl); + + return cp; +} +/* }}} */ + +/* {{{ proto array getanyrr(string hostname [, string type[, array authns, array +addtl]]) + Get any Resource Record corresponding to a given Internet host name */ +PHP_FUNCTION(getanyrr) +{ + zval *subarray[MAXRESOURCERECORDS]; + pval *addtl, *host, *authns, *fetch_type; + int addtl_recs = 0; + int alt_server = 0; + int type_to_fetch = T_ANY; + int current_subarray = 0; + struct __res_state res; + HEADER *hp; + querybuf buf, answer, *ans; + u_char *cp, *end; + long i, n, qd, an, ns, ar; + + /* Initialize the return array */ + if (array_init(return_value) != SUCCESS) { + RETURN_FALSE; + } + + switch (ZEND_NUM_ARGS()) { + case 1: + if (zend_get_parameters(ht, 1, &host) == FAILURE) { + WRONG_PARAM_COUNT; + } + break; + case 2: + if (zend_get_parameters(ht, 2, &host, &fetch_type) == FAILURE) +{ + WRONG_PARAM_COUNT; + } + if ( !strcasecmp("A", Z_STRVAL_P(fetch_type)) ) type_to_fetch += T_A; + else if ( !strcasecmp("NS", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_NS; + else if ( !strcasecmp("MX", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_MX; + else if ( !strcasecmp("ANY", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_ANY; + else if ( !strcasecmp("TXT", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_TXT; + else if ( !strcasecmp("CNAME", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_CNAME; + else if ( !strcasecmp("SOA", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_SOA; + else if ( !strcasecmp("PTR", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_PTR; + else { + php_error(E_WARNING, "%s(): Type '%s' not supported", +get_active_function_name(TSRMLS_C), Z_STRVAL_P(fetch_type)); + RETURN_FALSE; + } + break; + case 4: + if (zend_get_parameters(ht, 4, &host, &fetch_type, &authns, +&addtl) == FAILURE) { + WRONG_PARAM_COUNT; + } + pval_destructor(authns); + addtl_recs = 1; /* We want the additional Records */ + if (array_init(authns) != SUCCESS) { + RETURN_FALSE; + } + pval_destructor(addtl); + if (array_init(addtl) != SUCCESS) { + RETURN_FALSE; + } + if ( !strcasecmp("A", Z_STRVAL_P(fetch_type)) ) type_to_fetch += T_A; + else if ( !strcasecmp("NS", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_NS; + else if ( !strcasecmp("MX", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_MX; + else if ( !strcasecmp("ANY", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_ANY; + else if ( !strcasecmp("TXT", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_TXT; + else if ( !strcasecmp("CNAME", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_CNAME; + else if ( !strcasecmp("SOA", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_SOA; + else if ( !strcasecmp("PTR", Z_STRVAL_P(fetch_type)) ) +type_to_fetch = T_PTR; + else { + php_error(E_WARNING, "%s(): Type '%s' not supported", +get_active_function_name(TSRMLS_C), Z_STRVAL_P(fetch_type)); + RETURN_FALSE; + } + break; + default: + WRONG_PARAM_COUNT; + } + + + res_ninit(&res); + res.retrans = 5; + res.options &= ~RES_DEFNAMES; + + n = +res_nmkquery(&res,QUERY,Z_STRVAL_P(host),C_IN,type_to_fetch,NULL,0,NULL,buf.qb2,sizeof + buf); + if (n<0) { + RETURN_FALSE; + } + n = res_nsend(&res,buf.qb2,n,answer.qb2,sizeof answer); + if (n<0) { + RETURN_FALSE; + } + + cp = answer.qb2 + HFIXEDSZ; + end = answer.qb2 + n; + ans = &answer; + hp = (const HEADER *)ans; + qd = ntohs(hp->qdcount); + an = ntohs(hp->ancount); + ns = ntohs(hp->nscount); + ar = ntohs(hp->arcount); + + /* Skip QD entries, they're only used by dn_expand later on */ + while (qd-- > 0) { + n = dn_skipname(cp,end); + if (n < 0) { + RETURN_FALSE; + } + cp += n + QFIXEDSZ; + } + + /* YAY! Our real answers! */ + while (an-- && cp && cp < end) { + cp = php_parserr(cp,&answer,type_to_fetch,&subarray[current_subarray]); + if (subarray[current_subarray] != NULL) + zend_hash_next_index_insert(HASH_OF(return_value),(void +*)&subarray[current_subarray],sizeof(zval *),NULL); + current_subarray++; + } + + if (addtl_recs) { + /* List of Authoritative Name Servers */ + while (ns-- > 0 && cp && cp < end) { + cp = php_parserr(cp,&answer,T_ANY,&subarray[current_subarray]); + if (subarray[current_subarray] != NULL) + zend_hash_next_index_insert(HASH_OF(authns),(void +*)&subarray[current_subarray],sizeof(zval *),NULL); + current_subarray++; + } + /* Additional records associated with authoritative name servers */ + while (ar-- > 0 && cp && cp < end) { + cp = php_parserr(cp,&answer,T_ANY,&subarray[current_subarray]); + if (subarray[current_subarray] != NULL) + zend_hash_next_index_insert(HASH_OF(addtl),(void +*)&subarray[current_subarray],sizeof(zval *),NULL); + current_subarray++; + } + } +} +/* }}} */ /* {{{ proto int getmxrr(string hostname, array mxhosts [, array weight]) Get MX records corresponding to a given Internet host name */
-- PHP Development Mailing List <http://www.php.net/> To unsubscribe, visit: http://www.php.net/unsub.php