3 * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
8 * locate LDAP servers using DNS SRV records.
9 * Location code based on MIT Kerberos KDC location code.
15 #include <ac/stdlib.h>
18 #include <ac/socket.h>
19 #include <ac/string.h>
24 #ifdef HAVE_ARPA_NAMESER_H
25 #include <arpa/nameser.h>
31 /* Sometimes this is not defined. */
37 LDAP_CONST char *dn_in,
44 assert( dn_in != NULL );
45 assert( domainp != NULL );
47 dn = ldap_explode_dn( dn_in, 0 );
53 for( i=0; dn[i] != NULL; i++ ) {
54 char ** rdn = ldap_explode_rdn( dn[i], 0 );
56 if( rdn == NULL || *rdn == NULL ) {
64 if( rdn[1] == NULL ) {
71 #define LDAP_DCOID "0.9.2342.19200300.100.1.25="
73 if( strncasecmp( rdn[0],
74 LDAP_DC, sizeof(LDAP_DC)-1 ) == 0 )
76 dc = &rdn[0][sizeof(LDAP_DC)-1];
78 } else if( strncmp( rdn[0],
79 LDAP_DCOID, sizeof(LDAP_DCOID)-1 ) == 0 )
81 dc = &rdn[0][sizeof(LDAP_DCOID)-1];
91 /* dc value is empty! */
99 ndomain = LDAP_REALLOC( domain,
100 ( domain == NULL ? 0 : strlen(domain) )
101 + strlen(dc) + sizeof(".") );
103 if( ndomain == NULL ) {
111 if( domain == NULL ) {
114 strcat( ndomain, "." );
117 strcat( ndomain, dc );
125 * multi-valued RDN or fall thru
133 if( domain != NULL && *domain == '\0' ) {
143 LDAP_CONST char *domain_in,
146 char *domain, *s, *tok_r, *dn;
149 assert( domain_in != NULL );
150 assert( dnp != NULL );
152 domain = LDAP_STRDUP(domain_in);
153 if (domain == NULL) {
154 return LDAP_NO_MEMORY;
159 for (s = ldap_pvt_strtok(domain, ".", &tok_r);
161 s = ldap_pvt_strtok(NULL, ".", &tok_r)) {
162 size_t len = strlen(s);
164 dn = (char *) LDAP_REALLOC(dn, loc + sizeof(",dc=") + len );
167 return LDAP_NO_MEMORY;
170 /* not first time. */
171 strcpy(dn + loc, ",");
174 strcpy(dn + loc, "dc=");
175 loc += sizeof("dc=")-1;
189 * Lookup and return LDAP servers for domain (using the DNS
190 * SRV record _ldap._tcp.domain).
192 int ldap_domain2hostlist(
193 LDAP_CONST char *domain,
196 #ifdef HAVE_RES_QUERY
198 char *hostlist = NULL;
199 int rc, len, cur = 0;
200 unsigned char reply[1024];
202 assert( domain != NULL );
203 assert( list != NULL );
205 if( *domain == '\0' ) {
206 return LDAP_PARAM_ERROR;
209 request = LDAP_MALLOC(strlen(domain) + sizeof("_ldap._tcp."));
210 if (request == NULL) {
211 return LDAP_NO_MEMORY;
213 sprintf(request, "_ldap._tcp.%s", domain);
215 #ifdef LDAP_R_COMPILE
216 ldap_pvt_thread_mutex_lock(&ldap_int_resolv_mutex);
219 rc = LDAP_UNAVAILABLE;
220 len = res_query(request, C_IN, T_SRV, reply, sizeof(reply));
226 /* int priority, weight; */
228 /* Parse out query */
231 status = dn_expand(reply, reply + len, p, host, sizeof(host));
238 while (p < reply + len) {
239 int type, class, ttl, size;
240 status = dn_expand(reply, reply + len, p, host, sizeof(host));
245 type = (p[0] << 8) | p[1];
247 class = (p[0] << 8) | p[1];
249 ttl = (p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3];
251 size = (p[0] << 8) | p[1];
255 status = dn_expand(reply, reply + len, p + 6, host, sizeof(host));
259 /* ignore priority and weight for now */
260 /* priority = (p[0] << 8) | p[1]; */
261 /* weight = (p[2] << 8) | p[3]; */
262 port = (p[4] << 8) | p[5];
264 buflen = strlen(host) + sizeof(":65355");
265 hostlist = (char *) LDAP_REALLOC(hostlist, cur + buflen);
266 if (hostlist == NULL) {
271 /* not first time around */
272 hostlist[cur++] = ' ';
274 cur += sprintf(&hostlist[cur], "%s:%hd", host, port);
279 if (hostlist == NULL) {
280 /* No LDAP servers found in DNS. */
281 rc = LDAP_UNAVAILABLE;
289 #ifdef LDAP_R_COMPILE
290 ldap_pvt_thread_mutex_unlock(&ldap_int_resolv_mutex);
293 if (request != NULL) {
296 if (rc != LDAP_SUCCESS && hostlist != NULL) {
301 return LDAP_NOT_SUPPORTED;
302 #endif /* HAVE_RES_QUERY */