diff options
author | Timo Teras <timo.teras@iki.fi> | 2009-09-18 14:18:15 +0300 |
---|---|---|
committer | Timo Teras <timo.teras@iki.fi> | 2009-09-18 14:19:27 +0300 |
commit | 844dee36ba6e1f696e26bf26260e45d5f355a94a (patch) | |
tree | 3f5b9848273ea17a3953143d30b9a38b4a2aefa3 /main/djbdns | |
parent | 529426cca93f7466eda8392b82e9dd4bc97b54ea (diff) | |
download | aports-844dee36ba6e1f696e26bf26260e45d5f355a94a.tar.bz2 aports-844dee36ba6e1f696e26bf26260e45d5f355a94a.tar.xz |
main/tinydns: add jumbo patch and srv/naptr support
Adds a patch which combines the following patches:
- Claudiu Costin's jumbo-p13.patch
http://www.ro.kde.org/djbdns/mywork/jumbo/jumbo-p13.patch.gz
- Guilherme Balena Versiani's djbdns SRV+NAPTR combined patch
http://mywebpage.netscape.com/guibv/djbdns-1.05-srvnaptr.diff
Patch taken from:
http://lizzy.dyndns.org/~jos/djbdns-1.05-jumbo-josb.patch
Diffstat (limited to 'main/djbdns')
-rw-r--r-- | main/djbdns/APKBUILD | 4 | ||||
-rw-r--r-- | main/djbdns/djbdns-1.05-jumbo-josb.patch | 1858 |
2 files changed, 1861 insertions, 1 deletions
diff --git a/main/djbdns/APKBUILD b/main/djbdns/APKBUILD index dd8010c0a5..cfb7100558 100644 --- a/main/djbdns/APKBUILD +++ b/main/djbdns/APKBUILD @@ -1,7 +1,7 @@ # Maintainer: Natanael Copa <ncopa@alpinelinux.org> pkgname=djbdns pkgver=1.05 -pkgrel=31 +pkgrel=32 pkgdesc="Excellent high-performance DNS services" url="http://cr.yp.to/djbdns.html" license="public-domain" @@ -11,6 +11,7 @@ source="http://cr.yp.to/djbdns/$pkgname-$pkgver.tar.gz headtail.patch dnsroots.patch dnstracesort.patch + djbdns-1.05-jumbo-josb.patch $pkgver-errno.patch $pkgver-response.patch tinydns.pre-install @@ -76,6 +77,7 @@ md5sums="3147c5cd56832aa3b41955c7a51cbeb2 djbdns-1.05.tar.gz 0d2adaf9f1626043e8702b825cdccdd6 headtail.patch 7565048ebc981238879122c7f88cc143 dnsroots.patch 6fe7f473233f1c86b76261afd8345bf0 dnstracesort.patch +adb6745606cae593eb5ea6870fc27bd4 djbdns-1.05-jumbo-josb.patch c7be73fe2fb4ae02d5096fa2c1f55a68 1.05-errno.patch 1292500c04baba3995d9753fe40fdc94 1.05-response.patch 7695bf50559c09798ec852b578ac8698 tinydns.pre-install diff --git a/main/djbdns/djbdns-1.05-jumbo-josb.patch b/main/djbdns/djbdns-1.05-jumbo-josb.patch new file mode 100644 index 0000000000..c1a685aef4 --- /dev/null +++ b/main/djbdns/djbdns-1.05-jumbo-josb.patch @@ -0,0 +1,1858 @@ +Downloaded from: +http://lizzy.dyndns.org/~jos/djbdns-1.05-jumbo-josb.patch + +This patch combines the following patches: +- Claudiu Costin's jumbo-p13.patch + http://www.ro.kde.org/djbdns/mywork/jumbo/jumbo-p13.patch.gz +- Guilherme Balena Versiani's djbdns SRV+NAPTR combined patch + http://mywebpage.netscape.com/guibv/djbdns-1.05-srvnaptr.diff + +diff -ruN djbdns-1.05-dist/CHANGES djbdns-1.05/CHANGES +--- djbdns-1.05-dist/CHANGES 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/CHANGES 2008-08-11 19:33:30.000000000 -0700 +@@ -374,3 +374,5 @@ + ui: servers print starting message. + internal: some respond() declarations. + version: djbdns 1.05. ++20010313 ++ patch: to dump and reload the cache +diff -ruN djbdns-1.05-dist/Makefile djbdns-1.05/Makefile +--- djbdns-1.05-dist/Makefile 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/Makefile 2008-08-11 19:33:30.000000000 -0700 +@@ -4,6 +4,8 @@ + + default: it + ++include Makefile.sig ++ + alloc.a: \ + makelib alloc.o alloc_re.o getln.o getln2.o stralloc_cat.o \ + stralloc_catb.o stralloc_cats.o stralloc_copy.o stralloc_eady.o \ +@@ -149,13 +151,13 @@ + + cache.o: \ + compile cache.c alloc.h byte.h uint32.h exit.h tai.h uint64.h cache.h \ +-uint32.h uint64.h ++uint32.h uint64.h env.h error.h open.h openreadclose.h + ./compile cache.c + + cachetest: \ +-load cachetest.o cache.o libtai.a buffer.a alloc.a unix.a byte.a +- ./load cachetest cache.o libtai.a buffer.a alloc.a unix.a \ +- byte.a ++load cachetest.o cache.o libtai.a buffer.a alloc.a unix.a byte.a env.a ++ ./load cachetest cache.o libtai.a buffer.a unix.a env.a \ ++ alloc.a byte.a dns.a + + cachetest.o: \ + compile cachetest.c buffer.h exit.h cache.h uint32.h uint64.h str.h +@@ -228,11 +230,11 @@ + dns.a: \ + makelib dns_dfd.o dns_domain.o dns_dtda.o dns_ip.o dns_ipq.o dns_mx.o \ + dns_name.o dns_nd.o dns_packet.o dns_random.o dns_rcip.o dns_rcrw.o \ +-dns_resolve.o dns_sortip.o dns_transmit.o dns_txt.o ++dns_resolve.o dns_rotateip.o dns_sortip.o dns_transmit.o dns_txt.o + ./makelib dns.a dns_dfd.o dns_domain.o dns_dtda.o dns_ip.o \ + dns_ipq.o dns_mx.o dns_name.o dns_nd.o dns_packet.o \ + dns_random.o dns_rcip.o dns_rcrw.o dns_resolve.o \ +- dns_sortip.o dns_transmit.o dns_txt.o ++ dns_rotateip.o dns_sortip.o dns_transmit.o dns_txt.o + + dns_dfd.o: \ + compile dns_dfd.c error.h alloc.h byte.h dns.h stralloc.h gen_alloc.h \ +@@ -301,6 +303,10 @@ + dns.h stralloc.h gen_alloc.h iopause.h taia.h + ./compile dns_resolve.c + ++dns_rotateip.o: \ ++compile dns_rotateip.c byte.h dns.h stralloc.h gen_alloc.h ++ ./compile dns_rotateip.c ++ + dns_sortip.o: \ + compile dns_sortip.c byte.h dns.h stralloc.h gen_alloc.h iopause.h \ + taia.h tai.h uint64.h taia.h +@@ -320,10 +326,10 @@ + dnscache: \ + load dnscache.o droproot.o okclient.o log.o cache.o query.o \ + response.o dd.o roots.o iopause.o prot.o dns.a env.a alloc.a buffer.a \ +-libtai.a unix.a byte.a socket.lib ++libtai.a unix.a byte.a sig.a socket.lib + ./load dnscache droproot.o okclient.o log.o cache.o \ + query.o response.o dd.o roots.o iopause.o prot.o dns.a \ +- env.a alloc.a buffer.a libtai.a unix.a byte.a `cat \ ++ env.a alloc.a buffer.a libtai.a unix.a byte.a sig.a `cat \ + socket.lib` + + dnscache-conf: \ +@@ -626,9 +632,9 @@ + ./compile parsetype.c + + pickdns: \ +-load pickdns.o server.o response.o droproot.o qlog.o prot.o dns.a \ ++load pickdns.o server.o iopause.o response.o droproot.o qlog.o prot.o dns.a \ + env.a libtai.a cdb.a alloc.a buffer.a unix.a byte.a socket.lib +- ./load pickdns server.o response.o droproot.o qlog.o \ ++ ./load pickdns server.o iopause.o response.o droproot.o qlog.o \ + prot.o dns.a env.a libtai.a cdb.a alloc.a buffer.a unix.a \ + byte.a `cat socket.lib` + +@@ -704,9 +710,9 @@ + ./compile random-ip.c + + rbldns: \ +-load rbldns.o server.o response.o dd.o droproot.o qlog.o prot.o dns.a \ ++load rbldns.o server.o iopause.o response.o dd.o droproot.o qlog.o prot.o dns.a \ + env.a libtai.a cdb.a alloc.a buffer.a unix.a byte.a socket.lib +- ./load rbldns server.o response.o dd.o droproot.o qlog.o \ ++ ./load rbldns server.o iopause.o response.o dd.o droproot.o qlog.o \ + prot.o dns.a env.a libtai.a cdb.a alloc.a buffer.a unix.a \ + byte.a `cat socket.lib` + +@@ -774,7 +780,7 @@ + compile server.c byte.h case.h env.h buffer.h strerr.h ip4.h uint16.h \ + ndelay.h socket.h uint16.h droproot.h qlog.h uint16.h response.h \ + uint32.h dns.h stralloc.h gen_alloc.h iopause.h taia.h tai.h uint64.h \ +-taia.h ++taia.h iopause.h alloc.h + ./compile server.c + + setup: \ +@@ -979,10 +985,10 @@ + ./compile timeoutwrite.c + + tinydns: \ +-load tinydns.o server.o droproot.o tdlookup.o response.o qlog.o \ ++load tinydns.o server.o iopause.o droproot.o tdlookup.o response.o qlog.o \ + prot.o dns.a libtai.a env.a cdb.a alloc.a buffer.a unix.a byte.a \ + socket.lib +- ./load tinydns server.o droproot.o tdlookup.o response.o \ ++ ./load tinydns server.o iopause.o droproot.o tdlookup.o response.o \ + qlog.o prot.o dns.a libtai.a env.a cdb.a alloc.a buffer.a \ + unix.a byte.a `cat socket.lib` + +@@ -1084,10 +1090,10 @@ + ./compile utime.c + + walldns: \ +-load walldns.o server.o response.o droproot.o qlog.o prot.o dd.o \ ++load walldns.o server.o iopause.o response.o droproot.o qlog.o prot.o dd.o \ + dns.a env.a cdb.a alloc.a buffer.a unix.a byte.a socket.lib +- ./load walldns server.o response.o droproot.o qlog.o \ +- prot.o dd.o dns.a env.a cdb.a alloc.a buffer.a unix.a \ ++ ./load walldns server.o iopause.o response.o droproot.o qlog.o \ ++ prot.o dd.o dns.a libtai.a env.a cdb.a alloc.a buffer.a unix.a \ + byte.a `cat socket.lib` + + walldns-conf: \ +diff -ruN djbdns-1.05-dist/Makefile.sig djbdns-1.05/Makefile.sig +--- djbdns-1.05-dist/Makefile.sig 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/Makefile.sig 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1,27 @@ ++sig.o: \ ++compile sig.c sig.h ++ ./compile sig.c ++ ++sig_block.o: \ ++compile sig_block.c sig.h hassgprm.h ++ ./compile sig_block.c ++ ++sig_catch.o: \ ++compile sig_catch.c sig.h hassgact.h ++ ./compile sig_catch.c ++ ++sig_pause.o: \ ++compile sig_pause.c sig.h hassgprm.h ++ ./compile sig_pause.c ++ ++sig.a: \ ++makelib sig.o sig_block.o sig_catch.o sig_pause.o ++ ./makelib sig.a sig.o sig_block.o sig_catch.o sig_pause.o ++ ++hassgact.h: \ ++choose compile load trysgact.c hassgact.h1 hassgact.h2 ++ ./choose cl trysgact hassgact.h1 hassgact.h2 > hassgact.h ++ ++hassgprm.h: \ ++choose compile load trysgprm.c hassgprm.h1 hassgprm.h2 ++ ./choose cl trysgprm hassgprm.h1 hassgprm.h2 > hassgprm.h +diff -ruN djbdns-1.05-dist/README djbdns-1.05/README +--- djbdns-1.05-dist/README 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/README 2008-08-11 19:33:30.000000000 -0700 +@@ -1,3 +1,9 @@ ++patchlevel fg1 ++20010313 ++by Florent Guillaume <florent.guillaume@mail.com> ++patch home page: http://mapage.noos.fr/efgeor/djbdns/index.html ++Uses parts of Felix von Leitner's djb-0.5.2 package: http://www.fefe.de/djb/ ++ + djbdns 1.05 + 20010211 + Copyright 2001 +diff -ruN djbdns-1.05-dist/SYSDEPS djbdns-1.05/SYSDEPS +--- djbdns-1.05-dist/SYSDEPS 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/SYSDEPS 2008-08-11 19:33:30.000000000 -0700 +@@ -7,4 +7,6 @@ + direntry.h + hasshsgr.h + hasdevtcp.h ++hassgact.h ++hassgprm.h + socket.lib +diff -ruN djbdns-1.05-dist/TARGETS djbdns-1.05/TARGETS +--- djbdns-1.05-dist/TARGETS 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/TARGETS 2008-08-11 19:33:30.000000000 -0700 +@@ -214,3 +214,10 @@ + it + setup + check ++sig.o ++sig.a ++sig_catch.o ++sig_block.o ++hassgact.h ++hassgprm.h ++sig_pause.o +diff -ruN djbdns-1.05-dist/VERSION djbdns-1.05/VERSION +--- djbdns-1.05-dist/VERSION 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/VERSION 2008-08-11 19:33:30.000000000 -0700 +@@ -1 +1 @@ +-djbdns 1.05 ++djbdns 1.05-fg1 +diff -ruN djbdns-1.05-dist/auto_home.c djbdns-1.05/auto_home.c +--- djbdns-1.05-dist/auto_home.c 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/auto_home.c 2008-08-12 09:17:21.000000000 -0700 +@@ -0,0 +1,3 @@ ++const char auto_home[] = "\ ++\057\165\163\162\057\154\157\143\141\154\ ++"; +diff -ruN djbdns-1.05-dist/axfr-get.c djbdns-1.05/axfr-get.c +--- djbdns-1.05-dist/axfr-get.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/axfr-get.c 2008-08-11 22:49:05.000000000 -0700 +@@ -209,6 +209,57 @@ + if (!stralloc_cats(&line,".:")) return 0; + if (!stralloc_catulong0(&line,dist,0)) return 0; + } ++ else if (byte_equal(data,2,DNS_T_SRV)) { ++ uint16 priority, weight, port; ++ if (!stralloc_copys(&line,"S")) return 0; ++ if (!dns_domain_todot_cat(&line,d1)) return 0; ++ if (!stralloc_cats(&line,"::")) return 0; ++ pos = x_copy(buf,len,pos,data,2); ++ uint16_unpack_big(data,&priority); ++ pos = x_copy(buf,len,pos,data,2); ++ uint16_unpack_big(data,&weight); ++ pos = x_copy(buf,len,pos,data,2); ++ uint16_unpack_big(data,&port); ++ x_getname(buf,len,pos,&d1); ++ if (!dns_domain_todot_cat(&line,d1)) return 0; ++ if (!stralloc_cats(&line,".:")) return 0; ++ if (!stralloc_catulong0(&line,port,0)) return 0; ++ if (!stralloc_cats(&line,":")) return 0; ++ if (!stralloc_catulong0(&line,priority,0)) return 0; ++ if (!stralloc_cats(&line,":")) return 0; ++ if (!stralloc_catulong0(&line,weight,0)) return 0; ++ } ++ else if (byte_equal(data,2,DNS_T_NAPTR)) { ++ uint16 order, preference; ++ char flags[255], service[255], regexp[255]; ++ char fs, ss, rs; ++ if (!stralloc_copys(&line,"N")) return 0; ++ if (!dns_domain_todot_cat(&line,d1)) return 0; ++ if (!stralloc_cats(&line,":")) return 0; ++ pos = x_copy(buf,len,pos,data,2); ++ uint16_unpack_big(data,&order); ++ pos = x_copy(buf,len,pos,data,2); ++ uint16_unpack_big(data,&preference); ++ pos = x_copy(buf,len,pos,&fs,1); ++ pos = x_copy(buf,len,pos,flags,fs); ++ pos = x_copy(buf,len,pos,&ss,1); ++ pos = x_copy(buf,len,pos,service,ss); ++ pos = x_copy(buf,len,pos,&rs,1); ++ pos = x_copy(buf,len,pos,regexp,rs); ++ x_getname(buf,len,pos,&d1); ++ if (!stralloc_catulong0(&line,order,0)) return 0; ++ if (!stralloc_cats(&line,":")) return 0; ++ if (!stralloc_catulong0(&line,preference,0)) return 0; ++ if (!stralloc_cats(&line,":")) return 0; ++ if (!stralloc_catb(&line,flags,fs)) return 0; ++ if (!stralloc_cats(&line,":")) return 0; ++ if (!stralloc_catb(&line,service,ss)) return 0; ++ if (!stralloc_cats(&line,":")) return 0; ++ if (!stralloc_catb(&line,regexp,rs)) return 0; ++ if (!stralloc_cats(&line,":")) return 0; ++ if (!dns_domain_todot_cat(&line,d1)) return 0; ++ if (!stralloc_cats(&line,".")) return 0; ++ } + else if (byte_equal(data,2,DNS_T_A) && (dlen == 4)) { + char ipstr[IP4_FMT]; + if (!stralloc_copys(&line,"+")) return 0; +@@ -217,6 +268,14 @@ + x_copy(buf,len,pos,data,4); + if (!stralloc_catb(&line,ipstr,ip4_fmt(ipstr,data))) return 0; + } ++ else if (byte_equal(data,2,DNS_T_PTR)) { ++ if (!stralloc_copys(&line,"^")) return 0; ++ if (!dns_domain_todot_cat(&line,d1)) return 0; ++ if (!stralloc_cats(&line,":")) return 0; ++ x_getname(buf,len,pos,&d1); ++ if (!dns_domain_todot_cat(&line,d1)) return 0; ++ if (!stralloc_cats(&line,".")) return 0; ++ } + else { + unsigned char ch; + unsigned char ch2; +diff -ruN djbdns-1.05-dist/cache.c djbdns-1.05/cache.c +--- djbdns-1.05-dist/cache.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/cache.c 2008-08-11 19:33:30.000000000 -0700 +@@ -1,12 +1,23 @@ ++#ifdef DUMPCACHE ++#include <stdio.h> ++#include <unistd.h> ++#include "env.h" ++#include "error.h" ++#include "open.h" ++#include "openreadclose.h" ++#endif + #include "alloc.h" + #include "byte.h" + #include "uint32.h" + #include "exit.h" + #include "tai.h" + #include "cache.h" ++#include "dns.h" ++#include "buffer.h" + + uint64 cache_motion = 0; + ++static char *rrobin; + static char *x = 0; + static uint32 size; + static uint32 hsize; +@@ -87,6 +98,12 @@ + uint32 u; + unsigned int loop; + double d; ++ static int trigger=0; ++ ++ if (!trigger) { ++ rrobin = env_get("ROUNDROBIN"); ++ trigger++; ++ } + + if (!x) return 0; + if (keylen > MAXKEYLEN) return 0; +@@ -111,7 +128,11 @@ + u = get4(pos + 8); + if (u > size - pos - 20 - keylen) cache_impossible(); + *datalen = u; +- ++ if (byte_equal(key,2,DNS_T_A)) { ++ if (rrobin) { ++ dns_rotateip(x + pos + 20 + keylen,u); ++ } ++ } + return x + pos + 20 + keylen; + } + } +@@ -205,3 +226,97 @@ + + return 1; + } ++ ++#ifdef DUMPCACHE ++static int fd; ++ ++static int cache_writeline(const char *buf, unsigned int len) ++{ ++ int w; ++ ++ while (len) { ++ w = write(fd,buf,len); ++ if (w == -1) { ++ if (errno == error_intr) continue; ++ close(fd); ++ return -1; ++ } ++ buf += w; ++ len -= w; ++ } ++ return 0; ++} ++ ++int cache_dump(void) ++{ ++ static char *fn; ++ static char *fntmp; ++ uint32 pos; ++ unsigned int len; ++ ++ fn = env_get("DUMPCACHE"); ++ if (!fn) return 999; ++ fntmp = env_get("DUMPCACHETMP"); ++ if (!fntmp) return 999; ++ fd = open_trunc(fntmp); ++ if (fd == -1) return -1; ++ ++ pos = oldest; ++ while (pos < unused) { ++ len = get4(pos + 4) + get4(pos + 8) + 16; ++ if (cache_writeline(x + pos + 4, len)) return -1; ++ pos += 4 + len; ++ } ++ pos = hsize; ++ while (pos < writer) { ++ len = get4(pos + 4) + get4(pos + 8) + 16; ++ if (cache_writeline(x + pos + 4, len)) return -1; ++ pos += 4 + len; ++ } ++ ++ if (fsync(fd) == -1) return -1; ++ if (close(fd) == -1) return -1; ++ if (rename(fntmp,fn) == -1) return -1; ++ return 0; ++} ++ ++int cache_slurp(const char *fn) ++{ ++ static stralloc buf = {0}; ++ char *p; ++ uint32 pos; ++ unsigned int len; ++ uint32 keylen; ++ uint32 datalen; ++ struct tai now; ++ struct tai expire; ++ int nb; ++ ++ if (openreadclose(fn,&buf,16384) != 1) goto DIE; ++ tai_now(&now); ++ p = buf.s; ++ pos = 0; ++ len = buf.len; ++ nb = 0; ++ while (pos + 16 <= len) { ++ uint32_unpack(p + pos, &keylen); ++ uint32_unpack(p + pos + 4, &datalen); ++ tai_unpack(p + pos + 8, &expire); ++ pos += 16; ++ if (pos + keylen + datalen > len) break; /* missing data */ ++ if (!tai_less(&expire,&now)) { ++ tai_sub(&expire,&expire,&now); ++ cache_set(p + pos, keylen, p + pos + keylen, datalen, (unsigned int)expire.x); ++ } ++ pos += keylen + datalen; ++ nb++; ++ } ++ alloc_free(buf.s); buf.s = 0; ++ return nb; ++ ++ DIE: ++ alloc_free(buf.s); buf.s = 0; ++ if (errno == error_noent) return 0; ++ return -1; ++} ++#endif +diff -ruN djbdns-1.05-dist/cache.h djbdns-1.05/cache.h +--- djbdns-1.05-dist/cache.h 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/cache.h 2008-08-11 19:33:30.000000000 -0700 +@@ -8,5 +8,9 @@ + extern int cache_init(unsigned int); + extern void cache_set(const char *,unsigned int,const char *,unsigned int,uint32); + extern char *cache_get(const char *,unsigned int,unsigned int *,uint32 *); ++#ifdef DUMPCACHE ++extern int cache_dump(void); ++extern int cache_slurp(const char *); ++#endif + + #endif +diff -ruN djbdns-1.05-dist/chkshsgr.c djbdns-1.05/chkshsgr.c +--- djbdns-1.05-dist/chkshsgr.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/chkshsgr.c 2008-08-11 19:33:30.000000000 -0700 +@@ -1,4 +1,6 @@ + #include "exit.h" ++#include <grp.h> ++#include <unistd.h> + + int main() + { +diff -ruN djbdns-1.05-dist/direntry.h djbdns-1.05/direntry.h +--- djbdns-1.05-dist/direntry.h 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/direntry.h 2008-08-11 22:55:14.000000000 -0700 +@@ -0,0 +1,10 @@ ++#ifndef DIRENTRY_H ++#define DIRENTRY_H ++ ++/* sysdep: +dirent */ ++ ++#include <sys/types.h> ++#include <dirent.h> ++#define direntry struct dirent ++ ++#endif +diff -ruN djbdns-1.05-dist/dns.h djbdns-1.05/dns.h +--- djbdns-1.05-dist/dns.h 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/dns.h 2008-08-11 22:49:25.000000000 -0700 +@@ -20,6 +20,8 @@ + #define DNS_T_SIG "\0\30" + #define DNS_T_KEY "\0\31" + #define DNS_T_AAAA "\0\34" ++#define DNS_T_SRV "\0\41" ++#define DNS_T_NAPTR "\0\43" + #define DNS_T_AXFR "\0\374" + #define DNS_T_ANY "\0\377" + +@@ -43,6 +45,7 @@ + extern unsigned int dns_random(unsigned int); + + extern void dns_sortip(char *,unsigned int); ++extern void dns_rotateip(char *,unsigned int); + + extern void dns_domain_free(char **); + extern int dns_domain_copy(char **,const char *); +diff -ruN djbdns-1.05-dist/dns_rotateip.c djbdns-1.05/dns_rotateip.c +--- djbdns-1.05-dist/dns_rotateip.c 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/dns_rotateip.c 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1,15 @@ ++#include "byte.h" ++ ++void dns_rotateip(char *s, unsigned int n) ++{ ++ unsigned int i; ++ char tmp[4]; ++ ++ i = n >> 2; ++ while (i > 1) { ++ --i; ++ byte_copy(tmp,4,s + (i << 2)); ++ byte_copy(s + (i << 2),4,s); ++ byte_copy(s,4,tmp); ++ } ++} +diff -ruN djbdns-1.05-dist/dnscache-conf.c djbdns-1.05/dnscache-conf.c +--- djbdns-1.05-dist/dnscache-conf.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/dnscache-conf.c 2008-08-11 19:33:30.000000000 -0700 +@@ -32,6 +32,10 @@ + char *user; + char *loguser; + struct passwd *pw; ++#ifdef DUMPCACHE ++int useruid; ++int usergid; ++#endif + const char *myip; + + uint32 seed[32]; +@@ -81,6 +85,14 @@ + myip = argv[4]; + if (!myip) myip = "127.0.0.1"; + ++#ifdef DUMPCACHE ++ pw = getpwnam(user); ++ seed_addtime(); ++ if (!pw) ++ strerr_die3x(111,FATAL,"unknown account ",user); ++ useruid = pw->pw_uid; ++ usergid = pw->pw_gid; ++#endif + pw = getpwnam(loguser); + seed_addtime(); + if (!pw) +@@ -120,6 +132,14 @@ + seed_addtime(); perm(0644); + seed_addtime(); start("env/DATALIMIT"); outs("3000000\n"); finish(); + seed_addtime(); perm(0644); ++#ifdef DUMPCACHE ++ seed_addtime(); start("env/SLURPCACHE"); outs("dump/slurpcache\n"); finish(); ++ seed_addtime(); perm(0644); ++ seed_addtime(); start("env/DUMPCACHE"); outs("dump/dumpcache\n"); finish(); ++ seed_addtime(); perm(0644); ++ seed_addtime(); start("env/DUMPCACHETMP"); outs("dump/dumpcache.tmp\n"); finish(); ++ seed_addtime(); perm(0644); ++#endif + seed_addtime(); start("run"); + outs("#!/bin/sh\nexec 2>&1\nexec <seed\nexec envdir ./env sh -c '\n exec envuidgid "); outs(user); + outs(" softlimit -o250 -d \"$DATALIMIT\" "); +@@ -131,6 +151,11 @@ + seed_addtime(); perm(0755); + seed_addtime(); makedir("root"); + seed_addtime(); perm(02755); ++#ifdef DUMPCACHE ++ seed_addtime(); makedir("root/dump"); ++ seed_addtime(); owner(useruid,usergid); ++ seed_addtime(); perm(02755); ++#endif + seed_addtime(); makedir("root/ip"); + seed_addtime(); perm(02755); + seed_addtime(); start("root/ip/127.0.0.1"); finish(); +diff -ruN djbdns-1.05-dist/dnscache.c djbdns-1.05/dnscache.c +--- djbdns-1.05-dist/dnscache.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/dnscache.c 2008-08-11 19:33:30.000000000 -0700 +@@ -5,6 +5,7 @@ + #include "strerr.h" + #include "error.h" + #include "ip4.h" ++#include "str.h" + #include "uint16.h" + #include "uint64.h" + #include "socket.h" +@@ -22,6 +23,7 @@ + #include "log.h" + #include "okclient.h" + #include "droproot.h" ++#include "sig.h" + + static int packetquery(char *buf,unsigned int len,char **q,char qtype[2],char qclass[2],char id[2]) + { +@@ -47,12 +49,20 @@ + + + static char myipoutgoing[4]; +-static char myipincoming[4]; + static char buf[1024]; + uint64 numqueries = 0; + ++struct interf { ++ char ip[4]; ++ int udp53; ++ int tcp53; ++ iopause_fd *udp53io; ++ iopause_fd *tcp53io; ++ ++ struct interf *next; ++} ; + +-static int udp53; ++struct interf *interhead = 0; + + #define MAXUDP 200 + static struct udpclient { +@@ -60,6 +70,7 @@ + struct taia start; + uint64 active; /* query number, if active; otherwise 0 */ + iopause_fd *io; ++ int fd; + char ip[4]; + uint16 port; + char id[2]; +@@ -78,12 +89,12 @@ + if (!u[j].active) return; + response_id(u[j].id); + if (response_len > 512) response_tc(); +- socket_send4(udp53,response,response_len,u[j].ip,u[j].port); ++ socket_send4(u[j].fd,response,response_len,u[j].ip,u[j].port); + log_querydone(&u[j].active,response_len); + u[j].active = 0; --uactive; + } + +-void u_new(void) ++void u_new(int fd) + { + int j; + int i; +@@ -108,8 +119,9 @@ + + x = u + j; + taia_now(&x->start); ++ x->fd = fd; + +- len = socket_recv4(udp53,buf,sizeof buf,x->ip,&x->port); ++ len = socket_recv4(x->fd,buf,sizeof buf,x->ip,&x->port); + if (len == -1) return; + if (len >= sizeof buf) return; + if (x->port < 1024) if (x->port != 53) return; +@@ -129,8 +141,6 @@ + } + + +-static int tcp53; +- + #define MAXTCP 20 + struct tcpclient { + struct query q; +@@ -138,6 +148,7 @@ + struct taia timeout; + uint64 active; /* query number or 1, if active; otherwise 0 */ + iopause_fd *io; ++ int fd; + char ip[4]; /* send response to this address */ + uint16 port; /* send response to this port */ + char id[2]; +@@ -266,7 +277,7 @@ + x->state = 0; + } + +-void t_new(void) ++void t_new(int fd) + { + int i; + int j; +@@ -290,8 +301,9 @@ + + x = t + j; + taia_now(&x->start); ++ x->fd = fd; + +- x->tcp = socket_accept4(tcp53,x->ip,&x->port); ++ x->tcp = socket_accept4(x->fd,x->ip,&x->port); + if (x->tcp == -1) return; + if (x->port < 1024) if (x->port != 53) { close(x->tcp); return; } + if (!okclient(x->ip)) { close(x->tcp); return; } +@@ -304,19 +316,44 @@ + log_tcpopen(x->ip,x->port); + } + ++#ifdef DUMPCACHE ++static void do_dump(void) ++{ ++ int r; ++ r = cache_dump(); ++ if (r < 0) ++ r = errno; ++ log_dump(r); ++} ++#endif ++ ++#define FATAL "dnscache: fatal: " ++ ++iopause_fd *io = 0; ++int numio; ++ ++void hup_me() ++{ ++ if (!roots_init()) ++ strerr_die2sys(111,FATAL,"unable to read servers: "); ++ ++ log_reread(); ++} + +-iopause_fd io[3 + MAXUDP + MAXTCP]; +-iopause_fd *udp53io; +-iopause_fd *tcp53io; + + static void doit(void) + { + int j; + struct taia deadline; + struct taia stamp; ++ struct interf *inter; + int iolen; + int r; + ++ io = (iopause_fd *) alloc((numio + 1 + MAXUDP + MAXTCP) * sizeof(iopause_fd)); ++ if (!io) ++ strerr_die2sys(111,FATAL,"unable to alloc io: "); ++ + for (;;) { + taia_now(&stamp); + taia_uint(&deadline,120); +@@ -324,13 +361,15 @@ + + iolen = 0; + +- udp53io = io + iolen++; +- udp53io->fd = udp53; +- udp53io->events = IOPAUSE_READ; +- +- tcp53io = io + iolen++; +- tcp53io->fd = tcp53; +- tcp53io->events = IOPAUSE_READ; ++ for (inter = interhead; inter != 0; inter = inter->next) { ++ inter->udp53io = io + iolen++; ++ inter->udp53io->fd = inter->udp53; ++ inter->udp53io->events = IOPAUSE_READ; ++ ++ inter->tcp53io = io + iolen++; ++ inter->tcp53io->fd = inter->tcp53; ++ inter->tcp53io->events = IOPAUSE_READ; ++ } + + for (j = 0;j < MAXUDP;++j) + if (u[j].active) { +@@ -372,46 +411,83 @@ + t_rw(j); + } + +- if (udp53io) +- if (udp53io->revents) +- u_new(); +- +- if (tcp53io) +- if (tcp53io->revents) +- t_new(); ++ for (inter = interhead; inter != 0; inter = inter->next) { ++ if (inter->udp53io) ++ if (inter->udp53io->revents) ++ u_new(inter->udp53); ++ ++ if (inter->tcp53io) ++ if (inter->tcp53io->revents) ++ t_new(inter->tcp53); ++ } + } + } + +-#define FATAL "dnscache: fatal: " +- + char seed[128]; + + int main() + { + char *x; ++ char nxdip[4]; ++ int len; ++ int pos; ++ int oldpos; ++ char iptmp[4]; ++ char iperr[IP4_FMT]; ++ struct interf *inter; ++ struct interf *itmp; + unsigned long cachesize; + + x = env_get("IP"); + if (!x) + strerr_die2x(111,FATAL,"$IP not set"); +- if (!ip4_scan(x,myipincoming)) +- strerr_die3x(111,FATAL,"unable to parse IP address ",x); + +- udp53 = socket_udp(); +- if (udp53 == -1) +- strerr_die2sys(111,FATAL,"unable to create UDP socket: "); +- if (socket_bind4_reuse(udp53,myipincoming,53) == -1) +- strerr_die2sys(111,FATAL,"unable to bind UDP socket: "); +- +- tcp53 = socket_tcp(); +- if (tcp53 == -1) +- strerr_die2sys(111,FATAL,"unable to create TCP socket: "); +- if (socket_bind4_reuse(tcp53,myipincoming,53) == -1) +- strerr_die2sys(111,FATAL,"unable to bind TCP socket: "); ++ len = str_len(x); ++ numio = pos = oldpos = 0; ++ ++ while (pos < len) { ++ if (pos) oldpos = pos + 1; ++ pos = oldpos + str_chr(x + oldpos,'/'); ++ x[pos] = 0; ++ if (!str_len(x + oldpos)) continue; ++ ++ if (!ip4_scan(x + oldpos,iptmp)) ++ strerr_die3x(111,FATAL,"unable to parse IP address ",x + oldpos); ++ ++ inter = (struct interf *) alloc(sizeof(struct interf)); ++ ++ if (interhead == 0) interhead = inter; ++ else if (interhead->next == 0) interhead->next = inter; ++ else { ++ for (itmp = interhead; itmp->next != 0; itmp = itmp->next); ++ itmp->next = inter; ++ } ++ ++ inter->next = 0; ++ ++ inter->udp53 = socket_udp(); ++ if (inter->udp53 == -1) ++ strerr_die4sys(111,FATAL,"unable to create UDP socket for IP address ",x + oldpos,": "); ++ if (socket_bind4_reuse(inter->udp53,iptmp,53) == -1) ++ strerr_die4sys(111,FATAL,"unable to bind UDP socket for IP address ",x + oldpos,": "); ++ ++ inter->tcp53 = socket_tcp(); ++ if (inter->tcp53 == -1) ++ strerr_die4sys(111,FATAL,"unable to create TCP socket for IP address ",x + oldpos,": "); ++ if (socket_bind4_reuse(inter->tcp53,iptmp,53) == -1) ++ strerr_die4sys(111,FATAL,"unable to bind TCP socket for IP address ",x + oldpos,": "); ++ ++ numio++; ++ log_listen(iptmp); ++ } ++ ++ if (interhead == 0) ++ strerr_die2x(111,FATAL,"no interfaces to listen on"); + + droproot(FATAL); + +- socket_tryreservein(udp53,131072); ++ for (inter = interhead; inter != 0; inter = inter->next) ++ socket_tryreservein(inter->udp53,131072); + + byte_zero(seed,sizeof seed); + read(0,seed,sizeof seed); +@@ -430,17 +506,42 @@ + scan_ulong(x,&cachesize); + if (!cache_init(cachesize)) + strerr_die3x(111,FATAL,"not enough memory for cache of size ",x); ++#ifdef DUMPCACHE ++ x = env_get("SLURPCACHE"); ++ if (x) { ++ int nb = cache_slurp(x); ++ if (nb < 0) ++ strerr_die4sys(111,FATAL,"unable to slurp cache ",x," : "); ++ else ++ log_slurp(nb); ++ } ++#endif + + if (env_get("HIDETTL")) + response_hidettl(); + if (env_get("FORWARDONLY")) + query_forwardonly(); + ++ x = env_get("NXDSPECIAL"); ++ if (x) { ++ if (!ip4_scan(x,nxdip)) ++ strerr_die3x(111,FATAL,"unable to parse NXDSPECIAL IP address ",x); ++ query_nxdspecial(nxdip); ++ } ++ + if (!roots_init()) + strerr_die2sys(111,FATAL,"unable to read servers: "); + +- if (socket_listen(tcp53,20) == -1) +- strerr_die2sys(111,FATAL,"unable to listen on TCP socket: "); ++ for (inter = interhead; inter != 0; inter = inter->next) ++ if (socket_listen(inter->tcp53,20) == -1) { ++ iperr[ip4_fmt(iperr,inter->ip)] = 0; ++ strerr_die4sys(111,FATAL,"unable to listen on TCP socket for IP ",iperr,": "); ++ } ++ ++#ifdef DUMPCACHE ++ sig_catch(sig_alarm,do_dump); ++#endif ++ sig_catch(sig_hangup, hup_me); + + log_startup(); + doit(); +diff -ruN djbdns-1.05-dist/dnsfilter.c djbdns-1.05/dnsfilter.c +--- djbdns-1.05-dist/dnsfilter.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/dnsfilter.c 2008-08-11 19:33:30.000000000 -0700 +@@ -41,6 +41,7 @@ + iopause_fd *inio; + int flag0 = 1; + ++int opt_replace = 0; + iopause_fd *io; + int iolen; + +@@ -51,12 +52,16 @@ + void errout(int i) + { + int j; +- +- if (!stralloc_copys(&x[i].middle,":")) nomem(); +- if (!stralloc_cats(&x[i].middle,error_str(errno))) nomem(); +- for (j = 0;j < x[i].middle.len;++j) +- if (x[i].middle.s[j] == ' ') +- x[i].middle.s[j] = '-'; ++ ++ if (opt_replace) ++ x[i].middle.len=0; ++ else { ++ if (!stralloc_copys(&x[i].middle,":")) nomem(); ++ if (!stralloc_cats(&x[i].middle,error_str(errno))) nomem(); ++ for (j = 0;j < x[i].middle.len;++j) ++ if (x[i].middle.s[j] == ' ') ++ x[i].middle.s[j] = '-'; ++ } + } + + int main(int argc,char **argv) +@@ -69,7 +74,7 @@ + int j; + int r; + +- while ((opt = getopt(argc,argv,"c:l:")) != opteof) ++ while ((opt = getopt(argc,argv,"c:l:r")) != opteof) + switch(opt) { + case 'c': + scan_ulong(optarg,&u); +@@ -83,8 +88,11 @@ + if (u > 1000000) u = 1000000; + xmax = u; + break; ++ case 'r': ++ opt_replace = 1; ++ break; + default: +- strerr_die1x(111,"dnsfilter: usage: dnsfilter [ -c concurrency ] [ -l lines ]"); ++ strerr_die1x(111,"dnsfilter: usage: dnsfilter [ -c concurrency ] [ -l lines ] [-r]"); + } + + x = (struct line *) alloc(xmax * sizeof(struct line)); +@@ -140,8 +148,13 @@ + else if (r == 1) { + if (dns_name_packet(&x[i].middle,x[i].dt.packet,x[i].dt.packetlen) == -1) + errout(i); +- if (x[i].middle.len) +- if (!stralloc_cats(&x[i].left,"=")) nomem(); ++ if (x[i].middle.len) { ++ if (opt_replace) { ++ if (!stralloc_copys(&x[i].left, "")) nomem(); ++ } else { ++ if (!stralloc_cats(&x[i].left, "=")) nomem(); ++ } ++ } + x[i].flagactive = 0; + --numactive; + } +diff -ruN djbdns-1.05-dist/hasdevtcp.h djbdns-1.05/hasdevtcp.h +--- djbdns-1.05-dist/hasdevtcp.h 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/hasdevtcp.h 2008-08-11 22:55:09.000000000 -0700 +@@ -0,0 +1 @@ ++/* sysdep: -devtcp */ +diff -ruN djbdns-1.05-dist/hassgact.h djbdns-1.05/hassgact.h +--- djbdns-1.05-dist/hassgact.h 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/hassgact.h 2008-08-11 22:55:16.000000000 -0700 +@@ -0,0 +1,2 @@ ++/* sysdep: +sigaction */ ++#define HASSIGACTION 1 +diff -ruN djbdns-1.05-dist/hassgact.h1 djbdns-1.05/hassgact.h1 +--- djbdns-1.05-dist/hassgact.h1 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/hassgact.h1 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1 @@ ++/* sysdep: -sigaction */ +diff -ruN djbdns-1.05-dist/hassgact.h2 djbdns-1.05/hassgact.h2 +--- djbdns-1.05-dist/hassgact.h2 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/hassgact.h2 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1,2 @@ ++/* sysdep: +sigaction */ ++#define HASSIGACTION 1 +diff -ruN djbdns-1.05-dist/hassgprm.h djbdns-1.05/hassgprm.h +--- djbdns-1.05-dist/hassgprm.h 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/hassgprm.h 2008-08-11 22:55:15.000000000 -0700 +@@ -0,0 +1,2 @@ ++/* sysdep: +sigprocmask */ ++#define HASSIGPROCMASK 1 +diff -ruN djbdns-1.05-dist/hassgprm.h1 djbdns-1.05/hassgprm.h1 +--- djbdns-1.05-dist/hassgprm.h1 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/hassgprm.h1 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1 @@ ++/* sysdep: -sigprocmask */ +diff -ruN djbdns-1.05-dist/hassgprm.h2 djbdns-1.05/hassgprm.h2 +--- djbdns-1.05-dist/hassgprm.h2 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/hassgprm.h2 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1,2 @@ ++/* sysdep: +sigprocmask */ ++#define HASSIGPROCMASK 1 +diff -ruN djbdns-1.05-dist/hasshsgr.h djbdns-1.05/hasshsgr.h +--- djbdns-1.05-dist/hasshsgr.h 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/hasshsgr.h 2008-08-12 09:17:24.000000000 -0700 +@@ -0,0 +1 @@ ++/* sysdep: -shortsetgroups */ +diff -ruN djbdns-1.05-dist/iopause.h djbdns-1.05/iopause.h +--- djbdns-1.05-dist/iopause.h 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/iopause.h 2008-08-11 22:55:12.000000000 -0700 +@@ -0,0 +1,18 @@ ++#ifndef IOPAUSE_H ++#define IOPAUSE_H ++ ++/* sysdep: +poll */ ++#define IOPAUSE_POLL ++ ++#include <sys/types.h> ++#include <poll.h> ++ ++typedef struct pollfd iopause_fd; ++#define IOPAUSE_READ POLLIN ++#define IOPAUSE_WRITE POLLOUT ++ ++#include "taia.h" ++ ++extern void iopause(iopause_fd *,unsigned int,struct taia *,struct taia *); ++ ++#endif +diff -ruN djbdns-1.05-dist/log.c djbdns-1.05/log.c +--- djbdns-1.05-dist/log.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/log.c 2008-08-11 19:33:30.000000000 -0700 +@@ -88,12 +88,39 @@ + } + } + ++void log_reread(void) ++{ ++ string("rereading servers configuration"); ++ line(); ++} ++ + void log_startup(void) + { + string("starting"); + line(); + } + ++void log_listen(const char addr[4]) ++{ ++ string("listening on "); ++ ip(addr); ++ line(); ++} ++ ++#ifdef DUMPCACHE ++void log_slurp(int nb) ++{ ++ string("slurp "); number(nb); ++ line(); ++} ++ ++void log_dump(int err) ++{ ++ string("dump err "); number(err); ++ line(); ++} ++#endif ++ + void log_query(uint64 *qnum,const char client[4],unsigned int port,const char id[2],const char *q,const char qtype[2]) + { + string("query "); number(*qnum); space(); +diff -ruN djbdns-1.05-dist/log.h djbdns-1.05/log.h +--- djbdns-1.05-dist/log.h 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/log.h 2008-08-11 19:33:30.000000000 -0700 +@@ -4,6 +4,12 @@ + #include "uint64.h" + + extern void log_startup(void); ++extern void log_listen(const char *); ++#ifdef DUMPCACHE ++extern void log_slurp(int); ++extern void log_dump(int); ++#endif ++extern void log_reread(void); + + extern void log_query(uint64 *,const char *,unsigned int,const char *,const char *,const char *); + extern void log_querydrop(uint64 *); +diff -ruN djbdns-1.05-dist/okclient.c djbdns-1.05/okclient.c +--- djbdns-1.05-dist/okclient.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/okclient.c 2008-08-11 19:33:30.000000000 -0700 +@@ -1,5 +1,6 @@ + #include <sys/types.h> + #include <sys/stat.h> ++#include "env.h" + #include "str.h" + #include "ip4.h" + #include "okclient.h" +@@ -10,6 +11,14 @@ + { + struct stat st; + int i; ++ static int init_done=0; ++ if (!init_done) { ++ if (env_get("OKCLIENT")) { ++ init_done=1; ++ } else ++ init_done=2; ++ } ++ if (init_done==1) return 1; + + fn[0] = 'i'; + fn[1] = 'p'; +diff -ruN djbdns-1.05-dist/parsetype.c djbdns-1.05/parsetype.c +--- djbdns-1.05-dist/parsetype.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/parsetype.c 2008-08-11 22:49:52.000000000 -0700 +@@ -24,6 +24,8 @@ + else if (case_equals(s,"key")) byte_copy(type,2,DNS_T_KEY); + else if (case_equals(s,"aaaa")) byte_copy(type,2,DNS_T_AAAA); + else if (case_equals(s,"axfr")) byte_copy(type,2,DNS_T_AXFR); ++ else if (case_equals(s,"srv")) byte_copy(type,2,DNS_T_SRV); ++ else if (case_equals(s,"naptr")) byte_copy(type,2,DNS_T_NAPTR); + else + return 0; + +diff -ruN djbdns-1.05-dist/printrecord.c djbdns-1.05/printrecord.c +--- djbdns-1.05-dist/printrecord.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/printrecord.c 2008-08-11 23:10:20.000000000 -0700 +@@ -82,6 +82,56 @@ + if (!stralloc_catulong0(out,ch,0)) return 0; + } + } ++ else if (byte_equal(misc,2,DNS_T_SRV)) { ++ if (!stralloc_cats(out," SRV ")) return 0; ++ pos = dns_packet_copy(buf,len,pos,misc,2); if (!pos) return 0; ++ uint16_unpack_big(misc,&u16); ++ if (!stralloc_catulong0(out,u16,0)) return 0; ++ if (!stralloc_cats(out," ")) return 0; ++ pos = dns_packet_copy(buf,len,pos,misc,2); if (!pos) return 0; ++ uint16_unpack_big(misc,&u16); ++ if (!stralloc_catulong0(out,u16,0)) return 0; ++ if (!stralloc_cats(out," ")) return 0; ++ pos = dns_packet_copy(buf,len,pos,misc,2); if (!pos) return 0; ++ uint16_unpack_big(misc,&u16); ++ if (!stralloc_catulong0(out,u16,0)) return 0; ++ if (!stralloc_cats(out," ")) return 0; ++ pos = dns_packet_getname(buf,len,pos,&d); if (!pos) return 0; ++ if (!dns_domain_todot_cat(out,d)) return 0; ++ } ++ else if (byte_equal(misc,2,DNS_T_NAPTR)) { ++ char str[255]; ++ unsigned int oldpos; ++ if (!stralloc_cats(out," NAPTR ")) return 0; ++ pos = dns_packet_copy(buf,len,pos,misc,2); if (!pos) return 0; ++ uint16_unpack_big(misc,&u16); ++ if (!stralloc_catulong0(out,u16,0)) return 0; ++ if (!stralloc_cats(out," ")) return 0; ++ pos = dns_packet_copy(buf,len,pos,misc,2); if (!pos) return 0; ++ uint16_unpack_big(misc,&u16); ++ if (!stralloc_catulong0(out,u16,0)) return 0; ++ if (!stralloc_cats(out," ")) return 0; ++ pos = dns_packet_copy(buf,len,pos,&ch,1); if (!pos) return 0; ++ pos = dns_packet_copy(buf,len,pos,str,ch); if (!pos) return 0; ++ if (!stralloc_cats(out,"\"")) return 0; ++ if (!stralloc_catb(out,str,ch)) return 0; ++ if (!stralloc_cats(out,"\" ")) return 0; ++ pos = dns_packet_copy(buf,len,pos,&ch,1); if (!pos) return 0; ++ pos = dns_packet_copy(buf,len,pos,str,ch); if (!pos) return 0; ++ if (!stralloc_cats(out,"\"")) return 0; ++ if (!stralloc_catb(out,str,ch)) return 0; ++ if (!stralloc_cats(out,"\" ")) return 0; ++ pos = dns_packet_copy(buf,len,pos,&ch,1); if (!pos) return 0; ++ pos = dns_packet_copy(buf,len,pos,str,ch); if (!pos) return 0; ++ if (!stralloc_cats(out,"\"")) return 0; ++ if (!stralloc_catb(out,str,ch)) return 0; ++ if (!stralloc_cats(out,"\" ")) return 0; ++ pos = dns_packet_getname(buf,len,pos,&d); if (!pos) return 0; ++ oldpos = out->len; ++ if (!dns_domain_todot_cat(out,d)) return 0; ++ if (out->len == oldpos) ++ if (!stralloc_cats(out,".")) return 0; ++ } + else { + if (!stralloc_cats(out," ")) return 0; + uint16_unpack_big(misc,&u16); +diff -ruN djbdns-1.05-dist/prot.c djbdns-1.05/prot.c +--- djbdns-1.05-dist/prot.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/prot.c 2008-08-11 19:33:30.000000000 -0700 +@@ -1,5 +1,7 @@ + #include "hasshsgr.h" + #include "prot.h" ++#include <grp.h> ++#include <unistd.h> + + int prot_gid(int gid) + { +diff -ruN djbdns-1.05-dist/query.c djbdns-1.05/query.c +--- djbdns-1.05-dist/query.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/query.c 2008-08-11 19:33:30.000000000 -0700 +@@ -20,6 +20,15 @@ + flagforwardonly = 1; + } + ++static int flagnxdspecial = 0; ++static char nxdip[4]; ++ ++void query_nxdspecial(const char ip[4]) ++{ ++ byte_copy(nxdip,4,ip); ++ flagnxdspecial = 1; ++} ++ + static void cachegeneric(const char type[2],const char *d,const char *data,unsigned int datalen,uint32 ttl) + { + unsigned int len; +@@ -246,6 +255,7 @@ + case_lowerb(key + 2,dlen); + cached = cache_get(key,dlen + 2,&cachedlen,&ttl); + if (cached) { ++ soattl = rcode = 0; + log_cachednxdomain(d); + goto NXDOMAIN; + } +@@ -695,7 +705,12 @@ + NXDOMAIN: + if (z->level) goto LOWERLEVEL; + if (!rqa(z)) goto DIE; +- response_nxdomain(); ++ if (flagnxdspecial && typematch(DNS_T_A,dtype)) { ++ if (!response_rstart(d,DNS_T_A,rcode == 3 ? soattl : ttl)) goto DIE; ++ if (!response_addbytes(nxdip,4)) goto DIE; ++ response_rfinish(RESPONSE_ANSWER); ++ } else ++ response_nxdomain(); + cleanup(z); + return 1; + } +diff -ruN djbdns-1.05-dist/query.h djbdns-1.05/query.h +--- djbdns-1.05-dist/query.h 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/query.h 2008-08-11 19:33:30.000000000 -0700 +@@ -28,5 +28,6 @@ + extern int query_get(struct query *,iopause_fd *,struct taia *); + + extern void query_forwardonly(void); ++extern void query_nxdspecial(const char *); + + #endif +diff -ruN djbdns-1.05-dist/seek_set.c djbdns-1.05/seek_set.c +--- djbdns-1.05-dist/seek_set.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/seek_set.c 2008-08-11 19:33:30.000000000 -0700 +@@ -1,4 +1,5 @@ + #include <sys/types.h> ++#include <unistd.h> + #include "seek.h" + + #define SET 0 /* sigh */ +diff -ruN djbdns-1.05-dist/select.h djbdns-1.05/select.h +--- djbdns-1.05-dist/select.h 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/select.h 2008-08-11 22:55:14.000000000 -0700 +@@ -0,0 +1,11 @@ ++#ifndef SELECT_H ++#define SELECT_H ++ ++/* sysdep: +sysselect */ ++ ++#include <sys/types.h> ++#include <sys/time.h> ++#include <sys/select.h> ++extern int select(); ++ ++#endif +diff -ruN djbdns-1.05-dist/server.c djbdns-1.05/server.c +--- djbdns-1.05-dist/server.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/server.c 2008-08-11 19:33:30.000000000 -0700 +@@ -11,6 +11,8 @@ + #include "qlog.h" + #include "response.h" + #include "dns.h" ++#include "alloc.h" ++#include "iopause.h" + + extern char *fatal; + extern char *starting; +@@ -25,6 +27,44 @@ + + static char *q; + ++ ++static void hex(unsigned char c) ++{ ++ buffer_put(buffer_2,"0123456789abcdef" + (c >> 4),1); ++ buffer_put(buffer_2,"0123456789abcdef" + (c & 15),1); ++} ++ ++static void put_ip(const char i[4]) ++{ ++ hex(i[0]); ++ hex(i[1]); ++ hex(i[2]); ++ hex(i[3]); ++} ++ ++static void string(const char *s) ++{ ++ buffer_puts(buffer_2,s); ++} ++ ++static void line(void) ++{ ++ string("\n"); ++ buffer_flush(buffer_2); ++} ++ ++void log_listen(const char addr[4]) ++{ ++ string("listening on "); ++ put_ip(addr); ++ line(); ++} ++ ++void nomem() ++{ ++ strerr_die2x(111,fatal,"out of memory"); ++} ++ + static int doit(void) + { + unsigned int pos; +@@ -51,6 +91,13 @@ + response[3] &= ~128; + if (!(header[2] & 1)) response[2] &= ~1; + ++ if ((header[2] & 126) == 0x24) /* NOTIFY + AA */ ++ if (byte_equal(qtype,2,DNS_T_SOA)) { ++ response[2] |= 0x20; /* NOTIFY */ ++ qlog(ip,port,header,q,qtype," N "); ++ return 1; ++ } ++ + if (header[2] & 126) goto NOTIMP; + if (byte_equal(qtype,2,DNS_T_AXFR)) goto NOTIMP; + +@@ -59,7 +106,12 @@ + qlog(ip,port,header,q,qtype," - "); + return 0; + } +- qlog(ip,port,header,q,qtype," + "); ++ ++ if ((response[2] & 4) && (response[3] & 3)) ++ qlog(ip,port,header,q,qtype," X "); ++ else ++ qlog(ip,port,header,q,qtype," + "); ++ + return 1; + + NOTIMP: +@@ -82,35 +134,75 @@ + int main() + { + char *x; +- int udp53; ++ int *udp53; ++ unsigned int off; ++ unsigned int cnt; ++ iopause_fd *iop; + + x = env_get("IP"); + if (!x) + strerr_die2x(111,fatal,"$IP not set"); +- if (!ip4_scan(x,ip)) +- strerr_die3x(111,fatal,"unable to parse IP address ",x); +- +- udp53 = socket_udp(); +- if (udp53 == -1) +- strerr_die2sys(111,fatal,"unable to create UDP socket: "); +- if (socket_bind4_reuse(udp53,ip,53) == -1) +- strerr_die2sys(111,fatal,"unable to bind UDP socket: "); ++ off=0; ++ cnt=0; ++ while (x[off]) { ++ unsigned int l; ++ char dummy[4]; ++ l=ip4_scan(x+off,dummy); ++ if (!l) ++ strerr_die3x(111,fatal,"unable to parse IP address ",x+off); ++ cnt++; ++ if (!x[off+l]) break; ++ if (x[off+l]!='/') ++ strerr_die3x(111,fatal,"unable to parse IP address ",x+off); ++ off+=l+1; ++ } ++ udp53=(int *) alloc(sizeof(int) *cnt); ++ if (!udp53) nomem(); ++ iop=(iopause_fd *) alloc(sizeof(*iop) * cnt); ++ if (!iop) nomem(); ++ ++ off=0; ++ cnt=0; ++ while (x[off]) { ++ unsigned int l; ++ l=ip4_scan(x+off,ip); ++ udp53[cnt] = socket_udp(); ++ if (udp53[cnt] == -1) ++ strerr_die2sys(111,fatal,"unable to create UDP socket: "); ++ if (socket_bind4_reuse(udp53[cnt],ip,53) == -1) ++ strerr_die2sys(111,fatal,"unable to bind UDP socket: "); ++ ndelay_off(udp53[cnt]); ++ socket_tryreservein(udp53[cnt],65536); ++ iop[cnt].fd=udp53[cnt]; ++ iop[cnt].events=IOPAUSE_READ; ++ log_listen(ip); ++ cnt++; ++ if (!x[off+l]) break; ++ off+=l+1; ++ } + + droproot(fatal); + + initialize(); +- +- ndelay_off(udp53); +- socket_tryreservein(udp53,65536); + + buffer_putsflush(buffer_2,starting); +- ++ + for (;;) { +- len = socket_recv4(udp53,buf,sizeof buf,ip,&port); +- if (len < 0) continue; +- if (!doit()) continue; +- if (response_len > 512) response_tc(); +- socket_send4(udp53,response,response_len,ip,port); +- /* may block for buffer space; if it fails, too bad */ ++ struct taia stamp; ++ struct taia deadline; ++ unsigned int i; ++ taia_now(&stamp); ++ taia_uint(&deadline,300); ++ taia_add(&deadline,&deadline,&stamp); ++ iopause(iop,cnt,&deadline,&stamp); ++ for (i=0;i<cnt;i++) ++ if (iop[i].revents) { ++ len = socket_recv4(udp53[i],buf,sizeof buf,ip,&port); ++ if (len < 0) continue; ++ if (!doit()) continue; ++ if (response_len > 512) response_tc(); ++ socket_send4(udp53[i],response,response_len,ip,port); ++ /* may block for buffer space; if it fails, too bad */ ++ } + } + } +diff -ruN djbdns-1.05-dist/sig.c djbdns-1.05/sig.c +--- djbdns-1.05-dist/sig.c 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/sig.c 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1,12 @@ ++#include <signal.h> ++#include "sig.h" ++ ++int sig_alarm = SIGALRM; ++int sig_child = SIGCHLD; ++int sig_cont = SIGCONT; ++int sig_hangup = SIGHUP; ++int sig_pipe = SIGPIPE; ++int sig_term = SIGTERM; ++ ++void (*sig_defaulthandler)() = SIG_DFL; ++void (*sig_ignorehandler)() = SIG_IGN; +diff -ruN djbdns-1.05-dist/sig.h djbdns-1.05/sig.h +--- djbdns-1.05-dist/sig.h 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/sig.h 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1,25 @@ ++#ifndef SIG_H ++#define SIG_H ++ ++extern int sig_alarm; ++extern int sig_child; ++extern int sig_cont; ++extern int sig_hangup; ++extern int sig_pipe; ++extern int sig_term; ++ ++extern void (*sig_defaulthandler)(); ++extern void (*sig_ignorehandler)(); ++ ++extern void sig_catch(int,void (*)()); ++#define sig_ignore(s) (sig_catch((s),sig_ignorehandler)) ++#define sig_uncatch(s) (sig_catch((s),sig_defaulthandler)) ++ ++extern void sig_block(int); ++extern void sig_unblock(int); ++extern void sig_blocknone(void); ++extern void sig_pause(void); ++ ++extern void sig_dfl(int); ++ ++#endif +diff -ruN djbdns-1.05-dist/sig_block.c djbdns-1.05/sig_block.c +--- djbdns-1.05-dist/sig_block.c 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/sig_block.c 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1,38 @@ ++#include <signal.h> ++#include "sig.h" ++#include "hassgprm.h" ++ ++void sig_block(int sig) ++{ ++#ifdef HASSIGPROCMASK ++ sigset_t ss; ++ sigemptyset(&ss); ++ sigaddset(&ss,sig); ++ sigprocmask(SIG_BLOCK,&ss,(sigset_t *) 0); ++#else ++ sigblock(1 << (sig - 1)); ++#endif ++} ++ ++void sig_unblock(int sig) ++{ ++#ifdef HASSIGPROCMASK ++ sigset_t ss; ++ sigemptyset(&ss); ++ sigaddset(&ss,sig); ++ sigprocmask(SIG_UNBLOCK,&ss,(sigset_t *) 0); ++#else ++ sigsetmask(sigsetmask(~0) & ~(1 << (sig - 1))); ++#endif ++} ++ ++void sig_blocknone(void) ++{ ++#ifdef HASSIGPROCMASK ++ sigset_t ss; ++ sigemptyset(&ss); ++ sigprocmask(SIG_SETMASK,&ss,(sigset_t *) 0); ++#else ++ sigsetmask(0); ++#endif ++} +diff -ruN djbdns-1.05-dist/sig_catch.c djbdns-1.05/sig_catch.c +--- djbdns-1.05-dist/sig_catch.c 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/sig_catch.c 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1,16 @@ ++#include <signal.h> ++#include "sig.h" ++#include "hassgact.h" ++ ++void sig_catch(int sig,void (*f)()) ++{ ++#ifdef HASSIGACTION ++ struct sigaction sa; ++ sa.sa_handler = f; ++ sa.sa_flags = 0; ++ sigemptyset(&sa.sa_mask); ++ sigaction(sig,&sa,(struct sigaction *) 0); ++#else ++ signal(sig,f); /* won't work under System V, even nowadays---dorks */ ++#endif ++} +diff -ruN djbdns-1.05-dist/sig_pause.c djbdns-1.05/sig_pause.c +--- djbdns-1.05-dist/sig_pause.c 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/sig_pause.c 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1,14 @@ ++#include <signal.h> ++#include "sig.h" ++#include "hassgprm.h" ++ ++void sig_pause(void) ++{ ++#ifdef HASSIGPROCMASK ++ sigset_t ss; ++ sigemptyset(&ss); ++ sigsuspend(&ss); ++#else ++ sigpause(0); ++#endif ++} +diff -ruN djbdns-1.05-dist/tinydns-data.c djbdns-1.05/tinydns-data.c +--- djbdns-1.05-dist/tinydns-data.c 2008-08-11 19:32:53.000000000 -0700 ++++ djbdns-1.05/tinydns-data.c 2008-08-11 22:56:09.000000000 -0700 +@@ -159,11 +159,7 @@ + die_datatmp(); + } + +-buffer b; +-char bspace[1024]; +- + static stralloc line; +-int match = 1; + unsigned long linenum = 0; + + #define NUMFIELDS 15 +@@ -171,6 +167,8 @@ + + static char *d1; + static char *d2; ++static char *contact; ++ + char dptr[DNS_NAME4_DOMAIN]; + + char strnum[FMT_ULONG]; +@@ -181,7 +179,7 @@ + strerr_die4x(111,FATAL,"unable to parse data line ",strnum,why); + } + +-int main() ++int load(const char *fname) + { + int fddata; + int i; +@@ -196,20 +194,20 @@ + char type[2]; + char soa[20]; + char buf[4]; ++ char naptr[4]; ++ char srv[6]; ++ int match; ++ buffer b; ++ char bspace[1024]; + +- umask(022); +- +- fddata = open_read("data"); ++ fddata = open_read(fname); + if (fddata == -1) +- strerr_die2sys(111,FATAL,"unable to open data: "); ++ strerr_die4sys(111,FATAL,"unable to open ",fname,": "); + defaultsoa_init(fddata); + + buffer_init(&b,buffer_unixread,fddata,bspace,sizeof bspace); + +- fdcdb = open_trunc("data.tmp"); +- if (fdcdb == -1) die_datatmp(); +- if (cdb_make_start(&cdb,fdcdb) == -1) die_datatmp(); +- ++ match = 1; + while (match) { + ++linenum; + if (getln(&b,&line,&match,'\n') == -1) +@@ -247,6 +245,11 @@ + die_datatmp(); + break; + ++ case 'D': ++ if (!dns_domain_fromdot(&contact,f[0].s,f[0].len)) nomem(); ++ if (f[0].len == 0) contact = NULL; ++ break; ++ + case 'Z': + if (!dns_domain_fromdot(&d1,f[0].s,f[0].len)) nomem(); + +@@ -298,8 +301,13 @@ + if (line.s[0] == '.') { + rr_start(DNS_T_SOA,ttl ? TTL_NEGATIVE : 0,ttd,loc); + rr_addname(d2); +- rr_add("\12hostmaster",11); +- rr_addname(d1); ++ if (!contact) { ++ rr_add("\12hostmaster",11); ++ rr_addname(d1); ++ } else { ++ rr_addname(contact); ++ } ++ + rr_add(defaultsoa,20); + rr_finish(d1); + } +@@ -369,6 +377,43 @@ + rr_finish(d2); + } + break; ++ ++ case 'S': ++ if (!dns_domain_fromdot(&d1,f[0].s,f[0].len)) nomem(); ++ if (!stralloc_0(&f[6])) nomem(); ++ if (!scan_ulong(f[6].s,&ttl)) ttl = TTL_POSITIVE; ++ ttdparse(&f[7],ttd); ++ locparse(&f[8],loc); ++ ++ if (!stralloc_0(&f[1])) nomem(); ++ ++ if (byte_chr(f[2].s,f[2].len,'.') >= f[2].len) { ++ if (!stralloc_cats(&f[2],".srv.")) nomem(); ++ if (!stralloc_catb(&f[2],f[0].s,f[0].len)) nomem(); ++ } ++ if (!dns_domain_fromdot(&d2,f[2].s,f[2].len)) nomem(); ++ ++ if (!stralloc_0(&f[4])) nomem(); ++ if (!scan_ulong(f[4].s,&u)) u = 0; ++ uint16_pack_big(srv,u); ++ if (!stralloc_0(&f[5])) nomem(); ++ if (!scan_ulong(f[5].s,&u)) u = 0; ++ uint16_pack_big(srv + 2,u); ++ if (!stralloc_0(&f[3])) nomem(); ++ if (!scan_ulong(f[3].s,&u)) nomem(); ++ uint16_pack_big(srv + 4,u); ++ ++ rr_start(DNS_T_SRV,ttl,ttd,loc); ++ rr_add(srv,6); ++ rr_addname(d2); ++ rr_finish(d1); ++ ++ if (ip4_scan(f[1].s,ip)) { ++ rr_start(DNS_T_A,ttl,ttd,loc); ++ rr_add(ip,4); ++ rr_finish(d2); ++ } ++ break; + + case '^': case 'C': + if (!dns_domain_fromdot(&d1,f[0].s,f[0].len)) nomem(); +@@ -441,10 +486,61 @@ + rr_finish(d1); + break; + ++ case 'N': ++ if (!dns_domain_fromdot(&d1,f[0].s,f[0].len)) nomem(); ++ if (!dns_domain_fromdot(&d2,f[6].s,f[6].len)) nomem(); ++ if (!stralloc_0(&f[7])) nomem(); ++ if (!scan_ulong(f[7].s,&ttl)) ttl = TTL_POSITIVE; ++ ttdparse(&f[8],ttd); ++ locparse(&f[9],loc); ++ ++ if (!stralloc_0(&f[1])) nomem(); ++ if (!scan_ulong(f[1].s,&u)) u = 0; ++ uint16_pack_big(naptr,u); ++ if (!stralloc_0(&f[2])) nomem(); ++ if (!scan_ulong(f[2].s,&u)) u = 0; ++ uint16_pack_big(naptr + 2,u); ++ ++ txtparse(&f[3]); if (f[3].len > 255) ++ syntaxerror(": it is not allowed more than 255 chars in a label"); ++ txtparse(&f[4]); if (f[4].len > 255) ++ syntaxerror(": it is not allowed more than 255 chars in a label"); ++ txtparse(&f[5]); if (f[5].len > 255) ++ syntaxerror(": it is not allowed more than 255 chars in a label"); ++ ++ rr_start(DNS_T_NAPTR,ttl,ttd,loc); ++ rr_add(naptr,4); ++ ++ ch = f[3].len; rr_add(&ch,1); ++ rr_add(f[3].s, f[3].len); ++ ch = f[4].len; rr_add(&ch,1); ++ rr_add(f[4].s, f[4].len); ++ ch = f[5].len; rr_add(&ch,1); ++ rr_add(f[5].s, f[5].len); ++ ++ rr_addname(d2); ++ rr_finish(d1); ++ break; ++ + default: + syntaxerror(": unrecognized leading character"); + } + } ++ close(fddata); ++} ++ ++int main(int argc, char **argv) ++{ ++ umask(022); ++ fdcdb = open_trunc("data.tmp"); ++ if (fdcdb == -1) die_datatmp(); ++ if (cdb_make_start(&cdb,fdcdb) == -1) die_datatmp(); ++ ++ if (argc == 1) ++ load("data"); ++ while(--argc) { ++ load(argv[argc]); ++ } + + if (cdb_make_finish(&cdb) == -1) die_datatmp(); + if (fsync(fdcdb) == -1) die_datatmp(); +diff -ruN djbdns-1.05-dist/trysgact.c djbdns-1.05/trysgact.c +--- djbdns-1.05-dist/trysgact.c 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/trysgact.c 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1,10 @@ ++#include <signal.h> ++ ++main() ++{ ++ struct sigaction sa; ++ sa.sa_handler = 0; ++ sa.sa_flags = 0; ++ sigemptyset(&sa.sa_mask); ++ sigaction(0,&sa,(struct sigaction *) 0); ++} +diff -ruN djbdns-1.05-dist/trysgprm.c djbdns-1.05/trysgprm.c +--- djbdns-1.05-dist/trysgprm.c 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/trysgprm.c 2008-08-11 19:33:30.000000000 -0700 +@@ -0,0 +1,10 @@ ++#include <signal.h> ++ ++main() ++{ ++ sigset_t ss; ++ ++ sigemptyset(&ss); ++ sigaddset(&ss,SIGCHLD); ++ sigprocmask(SIG_SETMASK,&ss,(sigset_t *) 0); ++} +diff -ruN djbdns-1.05-dist/uint32.h djbdns-1.05/uint32.h +--- djbdns-1.05-dist/uint32.h 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/uint32.h 2008-08-11 22:55:10.000000000 -0700 +@@ -0,0 +1,11 @@ ++#ifndef UINT32_H ++#define UINT32_H ++ ++typedef unsigned long uint32; ++ ++extern void uint32_pack(char *,uint32); ++extern void uint32_pack_big(char *,uint32); ++extern void uint32_unpack(const char *,uint32 *); ++extern void uint32_unpack_big(const char *,uint32 *); ++ ++#endif +diff -ruN djbdns-1.05-dist/uint64.h djbdns-1.05/uint64.h +--- djbdns-1.05-dist/uint64.h 1969-12-31 16:00:00.000000000 -0800 ++++ djbdns-1.05/uint64.h 2008-08-11 22:55:10.000000000 -0700 +@@ -0,0 +1,8 @@ ++#ifndef UINT64_H ++#define UINT64_H ++ ++/* sysdep: -ulong64 */ ++ ++typedef unsigned long long uint64; ++ ++#endif |