Linux中的nslookup 实现源码

下面为 nslookup 实现源码,已被我改造为之返回第一个IP。
dns server固定指定为
223.5.5.5
114.114.114.114
119.29.29.29

#include <stdio.h>	
#include <string.h>	
#include <stdlib.h>	
#include <sys/socket.h>	
#include <sys/time.h>
#include <arpa/inet.h>	
#include <netinet/in.h>
#include <unistd.h>	

char dns_servers[3][100];	/*primary,seconday and user specified DNS*/
static char * nslookAPI (unsigned char* FunjsqHost);
#define T_A 1 			/*Ipv4 address*/
#define T_NS 2 			/*Nameserver*/
#define T_CNAME 5 		/*canonical name*/
#define T_SOA 6 		/*start of authority zone */
#define T_PTR 12 		/*domain name pointer */
#define T_MX 15 		/*Mail server*/

static void reverseIP(char *,char *);
static char * ngethost (unsigned char* , int);
static char * nslookAPI (unsigned char* );
static void removeDotsFromName(unsigned char*,unsigned char*);
static unsigned char* ReadName (unsigned char*,unsigned char*,int*);

/*The structure of the DNS packet will be:
  16 bits:ID
  16 bits:header
  16 bits:question
  16 bits:answer
  16 bits:authoritative answer
  16 bits:additional info*/

/*DNS header*/
struct DNS_HEADER
{
	unsigned short id; 	// identification number

# if __BYTE_ORDER == __LITTLE_ENDIAN
	unsigned char rd :1; 	// recursion desired
	unsigned char tc :1; 	// truncated message
	unsigned char aa :1; 	// authoritive answer
	unsigned char opcode :4; // purpose of message
	unsigned char qr :1; 	// query/response flag

	unsigned char rcode :4; // response code
	unsigned char cd :1; 	// checking disabled
	unsigned char ad :1; 	// authenticated data
	unsigned char z :1; 	// reserved and unused
	unsigned char ra :1; 	// recursion available
# endif
# if __BYTE_ORDER == __BIG_ENDIAN
	unsigned char qr :1;
	unsigned char opcode :4;
	unsigned char aa :1;
	unsigned char tc :1;
	unsigned char rd :1;

	unsigned char ra :1;
	unsigned char z :1;
	unsigned char ad :1;
	unsigned char cd :1;
	unsigned char rcode :4;
# endif

	unsigned short q_count; // number of question entries
	unsigned short ans_count; // number of answer entries
	unsigned short auth_count; // number of authority entries
	unsigned short add_count; // number of resource entries
};

struct QUESTION				/*QUESTION DATA*/
{
	unsigned short qtype;		/*query type:IN,NS,CNAME,SOA,PTR,MX*/
	unsigned short qclass;		/*query class:IN or CHAOS*/
};


#pragma pack(push, 1)
struct R_DATA				/*RESOURCE RECORD DATA*/
{
	unsigned short type;
	unsigned short _class;
	unsigned int ttl;
	unsigned short data_len;
};
#pragma pack(pop)


struct RES_RECORD			/*RESOURCE RECORD FIELD:AUTHORITATIVE,ANSWER or ADDITIONAL*/
{
	unsigned char *name;
	struct R_DATA *resource;
	unsigned char *rdata;
};

typedef struct				/*QUESTION FIELD*/
{
	unsigned char *name;
	struct QUESTION *ques;
} QUERY;

int main( int argc , char *argv[])
{

	if(argc<2)
	{
		/*		printf("USAGE:lookup <HOSTNAME/HOSTIP>  \n");
				printf("QUERY TYPES:\n");
				printf("IPV4 : 1\n");
				printf("NAMESERVER : 2\n");
				printf("CANONICAL NAME : 5\n");
				printf("START OF AUTHORITY : 6\n");
				printf("REVERSE QUERY : 12\n");
				printf("MESSAGE EXCHANGE : 15\n");
				*/
		return 0;
	}
	nslookAPI(argv[1]);
	return 0;	
}


char* nslookAPI(unsigned char *FunjsqHost)
{
	unsigned char hostname[100];
	char *reverse;
	int qtype=T_A;

	strcpy(dns_servers[0] , "119.29.29.29");	/*DEFAULT PRIMARY DNS*/
	strcpy(dns_servers[1] , "114.114.114.114");		/*DEFAULT SECONDARY DNS*/
	strcpy(dns_servers[2] , "223.5.5.5");		/*USER SPECIFIED DNS*/

	char *tmpIP=NULL;

	tmpIP=ngethost(FunjsqHost ,qtype);

	char ResultIP[32];
	strcpy(ResultIP,tmpIP);


	printf("%s",ResultIP);

	return ResultIP;
}

void reverseIP(char *addr, char *tar )		/*change a.b.c.d to d.c.b.a.in-addr.arpa*/
{
	int i,j,count_dots=0,pos=0;
	char buffer[10];
	for(i=strlen(addr)-1;i>=0;i--)
	{
		if(addr[i]=='.')
		{
			for(j=count_dots-1;j>=0;j--)
			{
				*(tar+pos)=buffer[j];
				pos++;
			}
			*(tar+pos)='.';
			pos++;
			count_dots=0;
		}
		else
		{
			buffer[count_dots]=addr[i];
			count_dots++;
		}
	}
	for(j=count_dots-1;j>=0;j--)
	{
		*(tar+pos)=buffer[j];
		pos++;
	}			
	char *arpa = ".in-addr.arpa";
	for(i=0;i<14;i++)
	{
		*(tar+pos) = *arpa;
		pos++;
		arpa++;
	}
}

/*perform nslookup*/
char* ngethost(unsigned char *host , int query_type)
{
	unsigned char buf[65536],*qname,*reader;
	int i , j , stop , s;

	struct sockaddr_in a,dest;
	struct timeval timeout;
	timeout.tv_sec = 3; 
	timeout.tv_usec = 0; 

	struct RES_RECORD answers[50],auth[50],addinfo[50]; 

	struct DNS_HEADER *dns = NULL;
	struct QUESTION *qinfo = NULL;

	//加static否则在64位机位会挂掉
	static char NSResultIP[32]="NoIP"; 
//	printf("Resolving %s\n" , host);

	s = socket(AF_INET , SOCK_DGRAM , IPPROTO_UDP); 
	setsockopt(s, SOL_SOCKET, SO_RCVTIMEO, &timeout, sizeof(timeout));	/*set timeout on this socket*/

	dest.sin_family = AF_INET;
	dest.sin_port = htons(53);
	dest.sin_addr.s_addr = inet_addr(dns_servers[0]); 

	dns = (struct DNS_HEADER *)&buf;			/*DNS HEADER*/

	dns->id = (unsigned short) htons(getpid());
	dns->qr = 0; 
	dns->opcode = 0; 				/*standard query*/
	dns->aa = 0; 			
	dns->tc = 1; 
	dns->rd = 1; 					/*recursion desired*/
	dns->ra = 0; 
	dns->z = 0;
	dns->ad = 0;
	dns->cd = 0;
	dns->rcode = 0;
	dns->q_count = htons(1); 
	dns->ans_count = 0;
	dns->auth_count = 0;
	dns->add_count = 0;

	qname =(unsigned char*)&buf[sizeof(struct DNS_HEADER)];					     /*DNS QUESTION NAME.ANY JUNK VALUE WILL DO*/

	removeDotsFromName(qname , host);
	qinfo =(struct QUESTION*)&buf[sizeof(struct DNS_HEADER) + (strlen((const char*)qname) + 1)]; /*DNS QUESTION TYPE AND CLASS*/

	qinfo->qtype = htons( query_type ); 
	qinfo->qclass = htons(1); 

//	printf("\nSending Packet to %s \n",dns_servers[0]);
	if( sendto(s,(char*)buf,sizeof(struct DNS_HEADER) + (strlen((const char*)qname)+1) + sizeof(struct QUESTION),0,(struct sockaddr*)&dest,sizeof(dest)) < 0)
	{
//		printf("\nSending Packet to %s success\n",dns_servers[0]);
	}
	else
	{
//		printf("\nSending Packet to %s fail\n",dns_servers[0]);
//		printf("sendto failed on DNS %s.Attempting to send via %s \n",dns_servers[0],dns_servers[1]);
		dest.sin_addr.s_addr = inet_addr(dns_servers[1]);
		if( sendto(s,(char*)buf,sizeof(struct DNS_HEADER) + (strlen((const char*)qname)+1) + sizeof(struct QUESTION),0,(struct sockaddr*)&dest,sizeof(dest)) < 0)
		{
//			printf("\nSending Packet to %s success\n",dns_servers[1]);
		}
		else
		{
			dest.sin_addr.s_addr = inet_addr(dns_servers[2]);
//			printf("Final attempt on secondary DNS \n");
			if( sendto(s,(char*)buf,sizeof(struct DNS_HEADER) + (strlen((const char*)qname)+1) + sizeof(struct QUESTION),0,(struct sockaddr*)&dest,sizeof(dest)) < 0)
			{
//				printf("Failed yet again..Aborting. dns_servers[2] \n");
				return  "NoIP";
			}
		}
	}

//	printf("Querying done\n");
//	printf("Receiving answer...\n");
	i=sizeof(dest);
	if(recvfrom (s,(char*)buf , 65536 , 0 , (struct sockaddr*)&dest , (socklen_t*)&i ) < 0)
	{
//		perror("recvfrom failed\n");
		return  "NoIP";
	}
///	printf("Answer received\n");
	dns = (struct DNS_HEADER*) buf;

	if(dns->ra==0)
	{
//		printf("Recursion not supported..quitting\n");
		return  "NoIP";
	}

	/*	
		if(dns->aa==0)
		printf("The server used is a non-authoritative server in the domain\n");
		else
		printf("The server used is an authoritative server in the domain\n");
		*/

	if(dns->rcode==0)
	{
//		printf("dns->rcode==0\n");
		reader = &buf[sizeof(struct DNS_HEADER) + (strlen((const char*)qname)+1) + sizeof(struct QUESTION)];	/*THE RESPONSE*/
		/*
		   printf("\nThe response contains : ");
		   printf("\n %d Questions.",ntohs(dns->q_count));
		   printf("\n %d Answers.",ntohs(dns->ans_count));
		   printf("\n %d Authoritative Servers.",ntohs(dns->auth_count));
		   printf("\n %d Additional records.\n\n",ntohs(dns->add_count));
		   */
		stop=0;

		for(i=0;i<ntohs(dns->ans_count);i++)
		{
			answers[i].name=ReadName(reader,buf,&stop);	
			reader = reader + stop;

			answers[i].resource = (struct R_DATA*)(reader);
			reader = reader + sizeof(struct R_DATA);

			if(ntohs(answers[i].resource->type) == 1) 	/*read address*/
			{
				answers[i].rdata = (unsigned char*)malloc(ntohs(answers[i].resource->data_len));

				for(j=0 ; j<ntohs(answers[i].resource->data_len) ; j++)
					answers[i].rdata[j]=reader[j];

				answers[i].rdata[ntohs(answers[i].resource->data_len)] = '\0';

				reader = reader + ntohs(answers[i].resource->data_len);
			}
			else						/*read name*/
			{
				answers[i].rdata = ReadName(reader,buf,&stop);
				reader = reader + stop;
			}
		}

		//read authorities
//		printf("read authorities\n");
		for(i=0;i<ntohs(dns->auth_count);i++)			
		{
			auth[i].name=ReadName(reader,buf,&stop);
			reader+=stop;

			auth[i].resource=(struct R_DATA*)(reader);
			reader+=sizeof(struct R_DATA);

			if(ntohs(auth[i].resource->type)==1)		/*read address*/
			{
				auth[i].rdata = (unsigned char*)malloc(ntohs(auth[i].resource->data_len));
				for(j=0;j<ntohs(auth[i].resource->data_len);j++)
					auth[i].rdata[j]=reader[j];

				auth[i].rdata[ntohs(auth[i].resource->data_len)]='\0';
				reader+=ntohs(auth[i].resource->data_len);
			}
			else						/*read name*/
			{
				auth[i].rdata=ReadName(reader,buf,&stop);
				reader+=stop;
			}

		}

		//read additional
//		printf("read additional\n");
		for(i=0;i<ntohs(dns->add_count);i++)
		{
			addinfo[i].name=ReadName(reader,buf,&stop);
			reader+=stop;

			addinfo[i].resource=(struct R_DATA*)(reader);
			reader+=sizeof(struct R_DATA);

			if(ntohs(addinfo[i].resource->type)==1)				/*read address*/
			{
				addinfo[i].rdata = (unsigned char*)malloc(ntohs(addinfo[i].resource->data_len));
				for(j=0;j<ntohs(addinfo[i].resource->data_len);j++)
					addinfo[i].rdata[j]=reader[j];

				addinfo[i].rdata[ntohs(addinfo[i].resource->data_len)]='\0';
				reader+=ntohs(addinfo[i].resource->data_len);
			}
			else								/*read name*/
			{
				addinfo[i].rdata=ReadName(reader,buf,&stop);
				reader+=stop;
			}
		}

		//print answers
//		printf("\nAnswer Records : %d \n" , ntohs(dns->ans_count) );
		for(i=0 ; i < ntohs(dns->ans_count) ; i++)
		{
/*
			printf("----------ntohs(dns->ans_count)--------------\n");
			if(ntohs(answers[i].resource->type) == 12)
				printf("Address : %s \n",answers[i].name);
			else
				printf("Name : %s \n",answers[i].name);
*/

			if( ntohs(answers[i].resource->type) == T_A) //IPv4 address
			{
				
//				printf("---ntohs(answers[i].resource->type) == T_A--\n");
				long *p;
				p=(long*)answers[i].rdata;
				a.sin_addr.s_addr=(*p); 
				//				printf("has IPv4 address : %s \n",inet_ntoa(a.sin_addr));
				//				char NSResultIP[32];

				strcpy(NSResultIP,inet_ntoa(a.sin_addr));

				return NSResultIP;


			}
			/*			else if(ntohs(answers[i].resource->type)==5) 
						printf("has alias name : %s",answers[i].rdata);
						else if(ntohs(answers[i].resource->type)==12)
						printf("has domain name :%s",answers[i].rdata);
						printf("\n");
						*/
		}

		return	"NoIP";		
/*
		//print authorities
		printf("\nAuthoritive Records : %d \n" , ntohs(dns->auth_count) );
		for( i=0 ; i < ntohs(dns->auth_count) ; i++)
		{

			printf("Name : %s ",auth[i].name);
			if(ntohs(auth[i].resource->type)==2)
				printf("has nameserver : %s",auth[i].rdata);
			else if(ntohs(auth[i].resource->type)==6)
				printf("has start of authority : %s",auth[i].rdata);
			else if(ntohs(auth[i].resource->type)==12)
				printf("has domain name : %s",auth[i].rdata);
			printf("\n");
		}

		//print additional resource records
		printf("\nAdditional Records : %d \n" , ntohs(dns->add_count) );
		for(i=0; i < ntohs(dns->add_count) ; i++)
		{
			printf("Name : %s \n",addinfo[i].name);
			if(ntohs(addinfo[i].resource->type)==1)
			{
				long *p;
				p=(long*)addinfo[i].rdata;
				a.sin_addr.s_addr=(*p);
				printf("has IPv4 address : %s",inet_ntoa(a.sin_addr));
			}
			printf("\n");
		}
*/
	}
	else
	{
		//	printf("%s",NSResultIP);
		return  "NoIP";
/*
		if(dns->rcode==1)
			printf("The name server was unable to interpret the query\n");
		else if(dns->rcode==2)
			printf("The name server was unable to process this query due to a problem with the name server.\n");
		else if(dns->rcode==3)
			printf("domain name referenced in the query does not exist\n");
		else if(dns->rcode==4)
			printf("The name server does not support the requested kind of query.\n");
		else if(dns->rcode==5)
			printf("The server refused to answer\n");
		else if(dns->rcode==6)
			printf("A name exists when it should not\n");
		else if(dns->rcode==7)
			printf("A resource record set exists that should not\n");
		else if(dns->rcode==8)
			printf("A resource record set that should exist does not\n");
		else if(dns->rcode==9)
			printf("The name server receiving the query is not authoritative for the zone specified\n");
		else if(dns->rcode==10)
			printf("A name specified in the message is not within the zone specified in the message\n");
		else
			printf("Unknown error\n");
*/
	}


	return "NoIP";
}

u_char* ReadName(unsigned char* reader,unsigned char* buffer,int* count)
{
	unsigned char *name;
	unsigned int p=0,jumped=0,offset;
	int i , j;

	*count = 1;
	name = (unsigned char*)malloc(256);		/*maximum allowed length is 256*/

	name[0]='\0';

	while(*reader!=0)
	{
		if(*reader>=192)
		{
			offset = (*reader)*256 + *(reader+1) - 49152;
			reader = buffer + offset - 1;
			jumped = 1; 
		}
		else
			name[p++]=*reader;
		reader = reader+1;
		if(jumped==0)
			*count = *count + 1;
	}

	name[p]='\0';
	if(jumped==1)
		*count = *count + 1;

	for(i=0;i<(int)strlen((const char*)name);i++) 
	{
		p=name[i];
		for(j=0;j<(int)p;j++) 
		{
			name[i]=name[i+1];
			i=i+1;
		}
		name[i]='.';
	}
	name[i-1]='\0';
	return name;
}

void removeDotsFromName(unsigned char* dns,unsigned char* host) 
{
	int lock = 0 , i;
	strcat((char*)host,".");
	for(i = 0 ; i < strlen((char*)host) ; i++) 
	{
		if(host[i]=='.') 
		{
			*dns++ = i-lock;		/*replace the dot with the number of characters after it before the next dot*/
			for(;lock<i;lock++) 
				*dns++=host[lock];
			lock++; 
		}
	}
	*dns++='\0';
}

  • 1
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 7
    评论
评论 7
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值