+ * Understand and sort of check OpenBSD `lookup' resolv.conf directive.
[adns] / src / adns.h
CommitLineData
5628df75 1/*
18d49d56 2 * adns.h
3 * - adns user-visible API (single-threaded, without any locking)
4 */
5/*
d942707d 6 *
7 * This file is
7672a872 8 * Copyright (C) 1997-2000 Ian Jackson <ian@davenant.greenend.org.uk>
d942707d 9 *
10 * It is part of adns, which is
3d5cde09 11 * Copyright (C) 1997-2000 Ian Jackson <ian@davenant.greenend.org.uk>
bef232ae 12 * Copyright (C) 1999-2000 Tony Finch <dot@dotat.at>
e576be50 13 *
14 * This program is free software; you can redistribute it and/or modify
15 * it under the terms of the GNU General Public License as published by
16 * the Free Software Foundation; either version 2, or (at your option)
17 * any later version.
18 *
19 * This program is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
d942707d 23 *
24 *
bef232ae 25 * For the benefit of certain LGPL'd `omnibus' software which
26 * provides a uniform interface to various things including adns, I
27 * make the following additional licence. I do this because the GPL
28 * would otherwise force either the omnibus software to be GPL'd or
29 * the adns-using part to be distributed separately.
d942707d 30 *
bef232ae 31 * So: you may also redistribute and/or modify adns.h (but only the
d942707d 32 * public header file adns.h and not any other part of adns) under the
33 * terms of the GNU Library General Public License as published by the
34 * Free Software Foundation; either version 2 of the License, or (at
35 * your option) any later version.
e576be50 36 *
d942707d 37 * Note that adns itself is GPL'd. Authors of adns-using applications
38 * with GPL-incompatible licences, and people who distribute adns with
39 * applications where the whole distribution is not GPL'd, are still
40 * likely to be in violation of the GPL. Anyone who wants to do this
41 * should contact Ian Jackson. Please note that to avoid encouraging
bef232ae 42 * people to infringe the GPL as it applies to the body of adns, Ian
43 * thinks that if you take advantage of the special exception to
44 * redistribute just adns.h under the LGPL, you should retain this
45 * paragraph in its place in the appropriate copyright statements.
d942707d 46 *
47 *
48 * You should have received a copy of the GNU General Public License,
49 * or the GNU Library General Public License, as appropriate, along
50 * with this program; if not, write to the Free Software Foundation,
a719a4be 51 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
52 *
d942707d 53 *
a719a4be 54 * $Id$
e576be50 55 */
a17d3a1d 56
57#ifndef ADNS_H_INCLUDED
58#define ADNS_H_INCLUDED
59
4353a5c4 60#include <stdio.h>
61
964344fc 62#include <sys/socket.h>
63#include <netinet/in.h>
636b69b1 64#include <sys/types.h>
65#include <sys/time.h>
66#include <unistd.h>
964344fc 67
8fedcfeb 68#ifdef __cplusplus
69extern "C" { /* I really dislike this - iwj. */
70#endif
71
09957b1c 72/* All struct in_addr anywhere in adns are in NETWORK byte order. */
73
964344fc 74typedef struct adns__state *adns_state;
75typedef struct adns__query *adns_query;
a17d3a1d 76
77typedef enum {
37e28fde 78 adns_if_noenv= 0x0001, /* do not look at environment */
79 adns_if_noerrprint= 0x0002, /* never print output to stderr (_debug overrides) */
80 adns_if_noserverwarn= 0x0004, /* do not warn to stderr about duff nameservers etc */
ddfda861 81 adns_if_debug= 0x0008, /* enable all output to stderr plus debug msgs */
5f67bb7b 82 adns_if_logpid= 0x0080, /* include pid in diagnostic output */
37e28fde 83 adns_if_noautosys= 0x0010, /* do not make syscalls at every opportunity */
88372443 84 adns_if_eintr= 0x0020, /* allow _wait and _synchronous to return EINTR */
ac868fa8 85 adns_if_nosigpipe= 0x0040, /* applic has SIGPIPE set to SIG_IGN, do not protect */
3e2e5fab 86 adns_if_checkc_entex= 0x0100, /* do consistency checks on entry/exit to adns funcs */
0aa7cba0 87 adns_if_checkc_freq= 0x0300 /* do consistency checks very frequently (slow!) */
a17d3a1d 88} adns_initflags;
89
90typedef enum {
b365d68a 91 adns_qf_search= 0x00000001, /* use the searchlist */
92 adns_qf_usevc= 0x00000002, /* use a virtual circuit (TCP connection) */
93 adns_qf_owner= 0x00000004, /* fill in the owner field in the answer */
8af5175d 94 adns_qf_quoteok_query= 0x00000010, /* allow special chars in query domain */
b365d68a 95 adns_qf_quoteok_cname= 0x00000000, /* allow ... in CNAME we go via - now default */
96 adns_qf_quoteok_anshost= 0x00000040, /* allow ... in things supposed to be hostnames */
97 adns_qf_quotefail_cname= 0x00000080, /* refuse if quote-req chars in CNAME we go via */
98 adns_qf_cname_loose= 0x00000100, /* allow refs to CNAMEs - without, get _s_cname */
99 adns_qf_cname_forbid= 0x00000200, /* don't follow CNAMEs, instead give _s_cname */
100 adns__qf_internalmask= 0x0ff00000
a17d3a1d 101} adns_queryflags;
102
103typedef enum {
350d37d9 104 adns__rrt_typemask= 0x0ffff,
ddfda861 105 adns__qtf_deref= 0x10000, /* dereference domains and perhaps produce extra data */
106 adns__qtf_mail822= 0x20000, /* make mailboxes be in RFC822 rcpt field format */
ddfda861 107
350d37d9 108 adns_r_none= 0,
ddfda861 109
350d37d9 110 adns_r_a= 1,
ddfda861 111
350d37d9 112 adns_r_ns_raw= 2,
113 adns_r_ns= adns_r_ns_raw|adns__qtf_deref,
ddfda861 114
350d37d9 115 adns_r_cname= 5,
ddfda861 116
350d37d9 117 adns_r_soa_raw= 6,
ddfda861 118 adns_r_soa= adns_r_soa_raw|adns__qtf_mail822,
ddfda861 119
350d37d9 120 adns_r_ptr_raw= 12,
121 adns_r_ptr= adns_r_ptr_raw|adns__qtf_deref,
ddfda861 122
350d37d9 123 adns_r_hinfo= 13,
ddfda861 124
350d37d9 125 adns_r_mx_raw= 15,
126 adns_r_mx= adns_r_mx_raw|adns__qtf_deref,
ddfda861 127
350d37d9 128 adns_r_txt= 16,
ddfda861 129
350d37d9 130 adns_r_rp_raw= 17,
4353a5c4 131 adns_r_rp= adns_r_rp_raw|adns__qtf_mail822,
828d89bd 132
133 adns_r_addr= adns_r_a|adns__qtf_deref
ddfda861 134
a17d3a1d 135} adns_rrtype;
136
b365d68a 137/*
138 * In queries without qf_quoteok_*, all domains must have standard
139 * legal syntax, or you get adns_s_querydomainvalid (if the query
140 * domain contains bad characters) or adns_s_answerdomaininvalid (if
141 * the answer contains bad characters).
142 *
143 * In queries _with_ qf_quoteok_*, domains in the query or response
144 * may contain any characters, quoted according to RFC1035 5.1. On
145 * input to adns, the char* is a pointer to the interior of a "
8af5175d 146 * delimited string, except that " may appear in it unquoted. On
147 * output, the char* is a pointer to a string which would be legal
148 * either inside or outside " delimiters; any character which isn't
149 * legal in a hostname (ie alphanumeric or hyphen) or one of _ / +
150 * (the three other punctuation characters commonly abused in domain
151 * names) will be quoted, as \X if it is a printing ASCII character or
152 * \DDD otherwise.
153 *
b365d68a 154 * If the query goes via a CNAME then the canonical name (ie, the
155 * thing that the CNAME record refers to) is usually allowed to
156 * contain any characters, which will be quoted as above. With
157 * adns_qf_quotefail_cname you get adns_s_answerdomaininvalid when
158 * this happens. (This is a change from version 0.4 and earlier, in
159 * which failing the query was the default, and you had to say
160 * adns_qf_quoteok_cname to avoid this; that flag is now deprecated.)
161 *
162 * In version 0.4 and earlier, asking for _raw records containing
163 * mailboxes without specifying _qf_quoteok_anshost was silly. This
164 * is no longer the case. In this version only parts of responses
165 * that are actually supposed to be hostnames will be refused by
166 * default if quote-requiring characters are found.
167 */
168
169/*
170 * If you ask for an RR which contains domains which are actually
171 * encoded mailboxes, and don't ask for the _raw version, then adns
172 * returns the mailbox formatted suitably for an RFC822 recipient
173 * header field. The particular format used is that if the mailbox
174 * requires quoting according to the rules in RFC822 then the
175 * local-part is quoted in double quotes, which end at the next
7672a872 176 * unescaped double quote (\ is the escape char, and is doubled, and
177 * is used to escape only \ and "). If the local-part is legal
178 * without quoting according to RFC822, it is presented as-is. In any
179 * case the local-part is followed by an @ and the domain. The domain
180 * will not contain any characters not legal in hostnames.
181 *
182 * Unquoted local-parts may contain any printing 7-bit ASCII
183 * except the punctuation characters ( ) < > @ , ; : \ " [ ]
184 * I.e. they may contain alphanumerics, and the following
185 * punctuation characters: ! # % ^ & * - _ = + { } .
186 *
187 * adns will reject local parts containing control characters (byte
188 * values 0-31, 127-159, and 255) - these appear to be legal according
d0ac9ea0 189 * to RFC822 (at least 0-127) but are clearly a bad idea. RFC1035
190 * syntax does not make any distinction between a single RFC822
191 * quoted-string containing full stops, and a series of quoted-strings
192 * separated by full stops; adns will return anything that isn't all
193 * valid atoms as a single quoted-string. RFC822 does not allow
194 * high-bit-set characters at all, but adns does allow them in
195 * local-parts, treating them as needing quoting.
b365d68a 196 *
197 * If you ask for the domain with _raw then _no_ checking is done
198 * (even on the host part, regardless of adns_qf_quoteok_anshost), and
199 * you just get the domain name in master file format.
200 *
201 * If no mailbox is supplied the returned string will be `.' in either
d0ac9ea0 202 * case.
964344fc 203 */
204
a17d3a1d 205typedef enum {
206 adns_s_ok,
ea1e31e3 207
208 /* locally induced errors */
209 adns_s_nomemory,
210 adns_s_unknownrrtype,
620c146d 211 adns_s_systemfail,
212
213 adns_s_max_localfail= 29,
ea1e31e3 214
215 /* remotely induced errors, detected locally */
37e28fde 216 adns_s_timeout,
4bec51a4 217 adns_s_allservfail,
ec477b9e 218 adns_s_norecurse,
ea1e31e3 219 adns_s_invalidresponse,
220 adns_s_unknownformat,
620c146d 221
222 adns_s_max_remotefail= 59,
ea1e31e3 223
224 /* remotely induced errors, reported by remote server to us */
225 adns_s_rcodeservfail,
226 adns_s_rcodeformaterror,
227 adns_s_rcodenotimplemented,
228 adns_s_rcoderefused,
229 adns_s_rcodeunknown,
620c146d 230
b9de380c 231 adns_s_max_tempfail= 99,
ea1e31e3 232
233 /* remote configuration errors */
234 adns_s_inconsistent, /* PTR gives domain whose A does not exist and match */
235 adns_s_prohibitedcname, /* CNAME found where eg A expected (not if _qf_loosecname) */
236 adns_s_answerdomaininvalid,
237 adns_s_answerdomaintoolong,
238 adns_s_invaliddata,
239
240 adns_s_max_misconfig= 199,
241
ea1e31e3 242 /* permanent problems with the query */
243 adns_s_querydomainwrong,
244 adns_s_querydomaininvalid,
245 adns_s_querydomaintoolong,
246
247 adns_s_max_misquery= 299,
248
249 /* permanent errors */
a17d3a1d 250 adns_s_nxdomain,
226c5eef 251 adns_s_nodata,
252
253 adns_s_max_permfail= 499
ea1e31e3 254
a17d3a1d 255} adns_status;
256
e8c505a5 257typedef struct {
828d89bd 258 int len;
259 union {
260 struct sockaddr sa;
261 struct sockaddr_in inet;
262 } addr;
551ff40f 263} adns_rr_addr;
828d89bd 264
265typedef struct {
1dfe95d8 266 char *host;
84fe28db 267 adns_status astatus;
268 int naddrs; /* temp fail => -1, perm fail => 0, s_ok => >0 */
551ff40f 269 adns_rr_addr *addrs;
c7836bc9 270} adns_rr_hostaddr;
4353a5c4 271
272typedef struct {
9ec44266 273 char *(array[2]);
4353a5c4 274} adns_rr_strpair;
275
276typedef struct {
277 int i;
1dfe95d8 278 adns_rr_hostaddr ha;
c7836bc9 279} adns_rr_inthostaddr;
4353a5c4 280
281typedef struct {
e062dcae 282 /* Used both for mx_raw, in which case i is the preference and str the domain,
283 * and for txt, in which case each entry has i for the `text' length,
284 * and str for the data (which will have had an extra nul appended
285 * so that if it was plain text it is now a null-terminated string).
286 */
4353a5c4 287 int i;
288 char *str;
289} adns_rr_intstr;
290
291typedef struct {
9ec44266 292 adns_rr_intstr array[2];
293} adns_rr_intstrpair;
294
295typedef struct {
296 char *mname, *rname;
4353a5c4 297 unsigned long serial, refresh, retry, expire, minimum;
298} adns_rr_soa;
84fe28db 299
300typedef struct {
a17d3a1d 301 adns_status status;
302 char *cname; /* always NULL if query was for CNAME records */
4b2c4f8a 303 char *owner; /* only set if requested in query flags, and may be 0 on error anyway */
86e7b8d9 304 adns_rrtype type; /* guaranteed to be same as in query */
73dba56e 305 time_t expires; /* expiry time, defined only if _s_ok, nxdomain or nodata. NOT TTL! */
b365d68a 306 int nrrs, rrsz; /* nrrs is 0 if an error occurs */
a17d3a1d 307 union {
8e5b0abb 308 void *untyped;
309 unsigned char *bytes;
c7836bc9 310 char *(*str); /* ns_raw, cname, ptr, ptr_raw */
311 adns_rr_intstr *(*manyistr); /* txt (list of strings ends with i=-1, str=0) */
551ff40f 312 adns_rr_addr *addr; /* addr */
c7836bc9 313 struct in_addr *inaddr; /* a */
314 adns_rr_hostaddr *hostaddr; /* ns */
9ec44266 315 adns_rr_intstrpair *intstrpair; /* hinfo */
316 adns_rr_strpair *strpair; /* rp, rp_raw */
c7836bc9 317 adns_rr_inthostaddr *inthostaddr; /* mx */
318 adns_rr_intstr *intstr; /* mx_raw */
319 adns_rr_soa *soa; /* soa, soa_raw */
a17d3a1d 320 } rrs;
e8c505a5 321} adns_answer;
a17d3a1d 322
323/* Memory management:
324 * adns_state and adns_query are actually pointers to malloc'd state;
325 * On submission questions are copied, including the owner domain;
4353a5c4 326 * Answers are malloc'd as a single piece of memory; pointers in the
327 * answer struct point into further memory in the answer.
a17d3a1d 328 * query_io:
329 * Must always be non-null pointer;
330 * If *query_io is 0 to start with then any query may be returned;
331 * If *query_io is !0 adns_query then only that query may be returned.
d3eea642 332 * If the call is successful, *query_io, *answer_r, and *context_r
333 * will all be set.
a17d3a1d 334 * Errors:
620c146d 335 * Return values are 0 or an errno value.
336 *
337 * For _init, _init_strcfg, _submit and _synchronous, system errors
338 * (eg, failure to create sockets, malloc failure, etc.) return errno
339 * values.
340 *
341 * For _wait and _check failures are reported in the answer
226c5eef 342 * structure, and only 0, ESRCH or (for _check) EAGAIN is
620c146d 343 * returned: if no (appropriate) requests are done adns_check returns
226c5eef 344 * EAGAIN; if no (appropriate) requests are outstanding both
620c146d 345 * adns_query and adns_wait return ESRCH.
346 *
347 * Additionally, _wait can return EINTR if you set adns_if_eintr.
348 *
349 * All other errors (nameserver failure, timed out connections, &c)
350 * are returned in the status field of the answer. After a
351 * successful _wait or _check, if status is nonzero then nrrs will be
352 * 0, otherwise it will be >0. type will always be the type
353 * requested.
a17d3a1d 354 */
355
e563872a 356int adns_init(adns_state *newstate_r, adns_initflags flags,
36369543 357 FILE *diagfile /*0=>stderr*/);
358
e563872a 359int adns_init_strcfg(adns_state *newstate_r, adns_initflags flags,
36369543 360 FILE *diagfile /*0=>discard*/, const char *configtext);
c8c7c813 361
362/* Configuration:
363 * adns_init reads /etc/resolv.conf, which is expected to be (broadly
fb7fbb66 364 * speaking) in the format expected by libresolv, and then
365 * /etc/resolv-adns.conf if it exists. adns_init_strcfg is instead
366 * passed a string which is interpreted as if it were the contents of
367 * resolv.conf or resolv-adns.conf. In general, configuration which
368 * is set later overrides any that is set earlier.
c8c7c813 369 *
fb7fbb66 370 * Standard directives understood in resolv[-adns].conf:
c8c7c813 371 *
372 * nameserver <address>
373 * Must be followed by the IP address of a nameserver. Several
374 * nameservers may be specified, and they will be tried in the order
375 * found. There is a compiled in limit, currently 5, on the number
376 * of nameservers. (libresolv supports only 3 nameservers.)
377 *
378 * search <domain> ...
379 * Specifies the search list for queries which specify
380 * adns_qf_search. This is a list of domains to append to the query
381 * domain. The query domain will be tried as-is either before all
382 * of these or after them, depending on the ndots option setting
383 * (see below).
384 *
385 * domain <domain>
386 * This is present only for backward compatibility with obsolete
387 * versions of libresolv. It should not be used, and is interpreted
388 * by adns as if it were `search' - note that this is subtly
389 * different to libresolv's interpretation of this directive.
390 *
391 * sortlist <addr>/<mask> ...
392 * Should be followed by a sequence of IP-address and netmask pairs,
393 * separated by spaces. They may be specified as
394 * eg. 172.30.206.0/24 or 172.30.206.0/255.255.255.0. Currently up
395 * to 15 pairs may be specified (but note that libresolv only
396 * supports up to 10).
397 *
398 * options
399 * Should followed by one or more options, separated by spaces.
400 * Each option consists of an option name, followed by optionally
401 * a colon and a value. Options are listed below.
402 *
fb7fbb66 403 * Non-standard directives understood in resolv[-adns].conf:
c8c7c813 404 *
405 * clearnameservers
406 * Clears the list of nameservers, so that further nameserver lines
407 * start again from the beginning.
408 *
409 * include <filename>
410 * The specified file will be read.
411 *
fb7fbb66 412 * Additionally, adns will ignore lines in resolv[-adns].conf which
413 * start with a #.
c8c7c813 414 *
415 * Standard options understood:
416 *
417 * debug
418 * Enables debugging output from the resolver, which will be written
419 * to stderr.
420 *
421 * ndots:<count>
422 * Affects whether queries with adns_qf_search will be tried first
423 * without adding domains from the searchlist, or whether the bare
424 * query domain will be tried last. Queries which contain at least
425 * <count> dots will be tried bare first. The default is 1.
426 *
427 * Non-standard options understood:
428 *
429 * adns_checkc:none
430 * adns_checkc:entex
431 * adns_checkc:freq
432 * Changes the consistency checking frequency; this overrides the
433 * setting of adns_if_check_entex, adns_if_check_freq, or neither,
434 * in the flags passed to adns_init.
435 *
436 * There are a number of environment variables which can modify the
437 * behaviour of adns. They take effect only if adns_init is used, and
438 * the caller of adns_init can disable them using adns_if_noenv. In
439 * each case there is both a FOO and an ADNS_FOO; the latter is
440 * interpreted later so that it can override the former. Unless
441 * otherwise stated, environment variables are interpreted after
fb7fbb66 442 * resolv[-adns].conf are read, in the order they are listed here.
c8c7c813 443 *
444 * RES_CONF, ADNS_RES_CONF
445 * A filename, whose contets are in the format of resolv.conf.
446 *
447 * RES_CONF_TEXT, ADNS_RES_CONF_TEXT
448 * A string in the format of resolv.conf.
449 *
450 * RES_OPTIONS, ADNS_RES_OPTIONS
451 * These are parsed as if they appeared in the `options' line of a
452 * resolv.conf. In addition to being parsed at this point in the
453 * sequence, they are also parsed at the very beginning before
454 * resolv.conf or any other environment variables are read, so that
455 * any debug option can affect the processing of the configuration.
456 *
457 * LOCALDOMAIN, ADNS_LOCALDOMAIN
458 * These are interpreted as if their contents appeared in a `search'
459 * line in resolv.conf.
460 */
a17d3a1d 461
462int adns_synchronous(adns_state ads,
463 const char *owner,
464 adns_rrtype type,
e563872a 465 adns_queryflags flags,
9d95094c 466 adns_answer **answer_r);
e8c505a5 467
468/* NB: if you set adns_if_noautosys then _submit and _check do not
620c146d 469 * make any system calls; you must use some of the asynch-io event
470 * processing functions to actually get things to happen.
e8c505a5 471 */
a17d3a1d 472
473int adns_submit(adns_state ads,
474 const char *owner,
475 adns_rrtype type,
e563872a 476 adns_queryflags flags,
a17d3a1d 477 void *context,
964344fc 478 adns_query *query_r);
a17d3a1d 479
3ccea6ee 480/* The owner should be quoted in master file format. */
481
964344fc 482int adns_check(adns_state ads,
a17d3a1d 483 adns_query *query_io,
9d95094c 484 adns_answer **answer_r,
485 void **context_r);
a17d3a1d 486
487int adns_wait(adns_state ads,
488 adns_query *query_io,
9d95094c 489 adns_answer **answer_r,
490 void **context_r);
a17d3a1d 491
940356bd 492/* same as adns_wait but uses poll(2) internally */
493int adns_wait_poll(adns_state ads,
494 adns_query *query_io,
495 adns_answer **answer_r,
496 void **context_r);
497
3955725c 498void adns_cancel(adns_query query);
a17d3a1d 499
620c146d 500/* The adns_query you get back from _submit is valid (ie, can be
501 * legitimately passed into adns functions) until it is returned by
502 * adns_check or adns_wait, or passed to adns_cancel. After that it
503 * must not be used. You can rely on it not being reused until the
504 * first adns_submit or _transact call using the same adns_state after
505 * it became invalid, so you may compare it for equality with other
506 * query handles until you next call _query or _transact.
636b69b1 507 *
508 * _submit and _synchronous return ENOSYS if they don't understand the
509 * query type.
e576be50 510 */
a17d3a1d 511
b365d68a 512int adns_submit_reverse(adns_state ads,
513 const struct sockaddr *addr,
514 adns_rrtype type,
e563872a 515 adns_queryflags flags,
b365d68a 516 void *context,
517 adns_query *query_r);
d7449548 518/* type must be _r_ptr or _r_ptr_raw. _qf_search is ignored.
519 * addr->sa_family must be AF_INET or you get ENOSYS.
520 */
b365d68a 521
2b1c6979 522int adns_submit_reverse_any(adns_state ads,
523 const struct sockaddr *addr,
524 const char *rzone,
525 adns_rrtype type,
526 adns_queryflags flags,
527 void *context,
528 adns_query *query_r);
529/* For RBL-style reverse `zone's; look up
530 * <reversed-address>.<zone>
531 * Any type is allowed. _qf_search is ignored.
532 * addr->sa_family must be AF_INET or you get ENOSYS.
533 */
534
620c146d 535void adns_finish(adns_state ads);
e576be50 536/* You may call this even if you have queries outstanding;
537 * they will be cancelled.
538 */
a17d3a1d 539
964344fc 540
958ad1f0 541void adns_forallqueries_begin(adns_state ads);
8ce38e76 542adns_query adns_forallqueries_next(adns_state ads, void **context_r);
620c146d 543/* Iterator functions, which you can use to loop over the outstanding
958ad1f0 544 * (submitted but not yet successfuly checked/waited) queries.
a8768e80 545 *
958ad1f0 546 * You can only have one iteration going at once. You may call _begin
547 * at any time; after that, an iteration will be in progress. You may
548 * only call _next when an iteration is in progress - anything else
549 * may coredump. The iteration remains in progress until _next
550 * returns 0, indicating that all the queries have been walked over,
551 * or ANY other adns function is called with the same adns_state (or a
552 * query in the same adns_state). There is no need to explicitly
553 * finish an iteration.
554 *
8ce38e76 555 * context_r may be 0. *context_r may not be set when _next returns 0.
964344fc 556 */
a17d3a1d 557
28de6442 558void adns_checkconsistency(adns_state ads, adns_query qu);
3e2e5fab 559/* Checks the consistency of adns's internal data structures.
560 * If any error is found, the program will abort().
28de6442 561 * You may pass 0 for qu; if you pass non-null then additional checks
562 * are done to make sure that qu is a valid query.
3e2e5fab 563 */
564
620c146d 565/*
566 * Example expected/legal calling sequence for submit/check/wait:
a17d3a1d 567 * adns_init
568 * adns_submit 1
569 * adns_submit 2
570 * adns_submit 3
571 * adns_wait 1
226c5eef 572 * adns_check 3 -> EAGAIN
a17d3a1d 573 * adns_wait 2
574 * adns_wait 3
575 * ....
576 * adns_finish
620c146d 577 */
578
579/*
580 * Entrypoints for generic asynch io:
581 * (these entrypoints are not very useful except in combination with *
582 * some of the other I/O model calls which can tell you which fds to
583 * be interested in):
584 *
585 * Note that any adns call may cause adns to open and close fds, so
586 * you must call beforeselect or beforepoll again just before
587 * blocking, or you may not have an up-to-date list of it's fds.
588 */
589
590int adns_processany(adns_state ads);
591/* Gives adns flow-of-control for a bit. This will never block, and
592 * can be used with any threading/asynch-io model. If some error
593 * occurred which might cause an event loop to spin then the errno
594 * value is returned.
595 */
596
597int adns_processreadable(adns_state ads, int fd, const struct timeval *now);
598int adns_processwriteable(adns_state ads, int fd, const struct timeval *now);
599int adns_processexceptional(adns_state ads, int fd, const struct timeval *now);
600/* Gives adns flow-of-control so that it can process incoming data
601 * from, or send outgoing data via, fd. Very like _processany. If it
602 * returns zero then fd will no longer be readable or writeable
603 * (unless of course more data has arrived since). adns will _only_
0a106d94 604 * use that fd and only in the manner specified, regardless of whether
620c146d 605 * adns_if_noautosys was specified.
606 *
607 * adns_processexceptional should be called when select(2) reports an
608 * exceptional condition, or poll(2) reports POLLPRI.
609 *
610 * It is fine to call _processreabable or _processwriteable when the
611 * fd is not ready, or with an fd that doesn't belong to adns; it will
612 * then just return 0.
613 *
614 * If some error occurred which might prevent an event loop to spin
615 * then the errno value is returned.
616 */
617
618void adns_processtimeouts(adns_state ads, const struct timeval *now);
619/* Gives adns flow-of-control so that it can process any timeouts
620 * which might have happened. Very like _processreadable/writeable.
621 *
622 * now may be 0; if it isn't, *now must be the current time, recently
623 * obtained from gettimeofday.
624 */
625
626void adns_firsttimeout(adns_state ads,
627 struct timeval **tv_mod, struct timeval *tv_buf,
628 struct timeval now);
629/* Asks adns when it would first like the opportunity to time
630 * something out. now must be the current time, from gettimeofday.
631 *
632 * If tv_mod points to 0 then tv_buf must be non-null, and
633 * _firsttimeout will fill in *tv_buf with the time until the first
634 * timeout, and make *tv_mod point to tv_buf. If adns doesn't have
635 * anything that might need timing out it will leave *tv_mod as 0.
636 *
637 * If *tv_mod is not 0 then tv_buf is not used. adns will update
638 * *tv_mod if it has any earlier timeout, and leave it alone if it
639 * doesn't.
640 *
641 * This call will not actually do any I/O, or change the fds that adns
642 * is using. It always succeeds and never blocks.
643 */
644
645void adns_globalsystemfailure(adns_state ads);
646/* If serious problem(s) happen which globally affect your ability to
647 * interact properly with adns, or adns's ability to function
648 * properly, you or adns can call this function.
649 *
650 * All currently outstanding queries will be made to fail with
651 * adns_s_systemfail, and adns will close any stream sockets it has
652 * open.
653 *
654 * This is used by adns, for example, if gettimeofday() fails.
655 * Without this the program's event loop might start to spin !
656 *
657 * This call will never block.
658 */
659
660/*
661 * Entrypoints for select-loop based asynch io:
662 */
663
664void adns_beforeselect(adns_state ads, int *maxfd, fd_set *readfds,
665 fd_set *writefds, fd_set *exceptfds,
666 struct timeval **tv_mod, struct timeval *tv_buf,
667 const struct timeval *now);
668/* Find out file descriptors adns is interested in, and when it would
669 * like the opportunity to time something out. If you do not plan to
670 * block then tv_mod may be 0. Otherwise, tv_mod and tv_buf are as
671 * for adns_firsttimeout. readfds, writefds, exceptfds and maxfd_io may
672 * not be 0.
673 *
6c68a593 674 * If now is not 0 then this will never actually do any I/O, or change
675 * the fds that adns is using or the timeouts it wants. In any case
676 * it won't block, and it will set the timeout to zero if a query
677 * finishes in _beforeselect.
620c146d 678 */
679
680void adns_afterselect(adns_state ads, int maxfd, const fd_set *readfds,
681 const fd_set *writefds, const fd_set *exceptfds,
682 const struct timeval *now);
683/* Gives adns flow-of-control for a bit; intended for use after
684 * select. This is just a fancy way of calling adns_processreadable/
685 * writeable/timeouts as appropriate, as if select had returned the
686 * data being passed. Always succeeds.
687 */
688
689/*
690 * Example calling sequence:
a17d3a1d 691 *
e8c505a5 692 * adns_init _noautosys
a17d3a1d 693 * loop {
620c146d 694 * adns_beforeselect
a17d3a1d 695 * select
620c146d 696 * adns_afterselect
e8c505a5 697 * ...
698 * adns_submit / adns_check
699 * ...
a17d3a1d 700 * }
701 */
702
620c146d 703/*
704 * Entrypoints for poll-loop based asynch io:
705 */
706
707struct pollfd;
708/* In case your system doesn't have it or you forgot to include
709 * <sys/poll.h>, to stop the following declarations from causing
710 * problems. If your system doesn't have poll then the following
711 * entrypoints will not be defined in libadns. Sorry !
712 */
713
714int adns_beforepoll(adns_state ads, struct pollfd *fds, int *nfds_io, int *timeout_io,
715 const struct timeval *now);
716/* Finds out which fd's adns is interested in, and when it would like
717 * to be able to time things out. This is in a form suitable for use
718 * with poll(2).
719 *
720 * On entry, usually fds should point to at least *nfds_io structs.
721 * adns will fill up to that many structs will information for poll,
722 * and record in *nfds_io how many structs it filled. If it wants to
723 * listen for more structs then *nfds_io will be set to the number
724 * required and _beforepoll will return ERANGE.
725 *
620c146d 726 * You may call _beforepoll with fds==0 and *nfds_io 0, in which case
727 * adns will fill in the number of fds that it might be interested in
fc6a52ae 728 * in *nfds_io, and always return either 0 (if it is not interested in
729 * any fds) or ERANGE (if it is).
730 *
c912639e 731 * NOTE that (unless now is 0) adns may acquire additional fds
fc6a52ae 732 * from one call to the next, so you must put adns_beforepoll in a
733 * loop, rather than assuming that the second call (with the buffer
734 * size requested by the first) will not return ERANGE.
620c146d 735 *
736 * adns only ever sets POLLIN, POLLOUT and POLLPRI in its pollfd
737 * structs, and only ever looks at those bits. POLLPRI is required to
fc6a52ae 738 * detect TCP Urgent Data (which should not be used by a DNS server)
620c146d 739 * so that adns can know that the TCP stream is now useless.
740 *
741 * In any case, *timeout_io should be a timeout value as for poll(2),
742 * which adns will modify downwards as required. If the caller does
fc6a52ae 743 * not plan to block then *timeout_io should be 0 on entry, or
744 * alternatively, timeout_io may be 0. (Alternatively, the caller may
745 * use _beforeselect with timeout_io==0 to find out about file
746 * descriptors, and use _firsttimeout is used to find out when adns
747 * might want to time something out.)
620c146d 748 *
749 * adns_beforepoll will return 0 on success, and will not fail for any
750 * reason other than the fds buffer being too small (ERANGE).
751 *
c912639e 752 * This call will never actually do any I/O. If you supply the
753 * current time it will not change the fds that adns is using or the
754 * timeouts it wants.
755 *
756 * In any case this call won't block.
620c146d 757 */
758
759#define ADNS_POLLFDS_RECOMMENDED 2
760/* If you allocate an fds buf with at least RECOMMENDED entries then
761 * you are unlikely to need to enlarge it. You are recommended to do
762 * so if it's convenient. However, you must be prepared for adns to
763 * require more space than this.
764 */
765
766void adns_afterpoll(adns_state ads, const struct pollfd *fds, int nfds,
767 const struct timeval *now);
768/* Gives adns flow-of-control for a bit; intended for use after
769 * poll(2). fds and nfds should be the results from poll(). pollfd
770 * structs mentioning fds not belonging to adns will be ignored.
771 */
772
773
86e7b8d9 774adns_status adns_rr_info(adns_rrtype type,
775 const char **rrtname_r, const char **fmtname_r,
776 int *len_r,
777 const void *datap, char **data_r);
b365d68a 778/*
b365d68a 779 * Get information about a query type, or convert reply data to a
780 * textual form. type must be specified, and the official name of the
781 * corresponding RR type will be returned in *rrtname_r, and
782 * information about the processing style in *fmtname_r. The length
783 * of the table entry in an answer for that type will be returned in
784 * in *len_r. Any or all of rrtname_r, fmtname_r and len_r may be 0.
785 * If fmtname_r is non-null then *fmtname_r may be null on return,
786 * indicating that no special processing is involved.
787 *
788 * data_r be must be non-null iff datap is. In this case *data_r will
789 * be set to point to a string pointing to a representation of the RR
790 * data in master file format. (The owner name, timeout, class and
791 * type will not be present - only the data part of the RR.) The
792 * memory will have been obtained from malloc() and must be freed by
793 * the caller.
86e7b8d9 794 *
795 * Usually this routine will succeed. Possible errors include:
796 * adns_s_nomemory
ea1e31e3 797 * adns_s_rrtypeunknown
86e7b8d9 798 * adns_s_invaliddata (*datap contained garbage)
799 * If an error occurs then no memory has been allocated,
800 * and *rrtname_r, *fmtname_r, *len_r and *data_r are undefined.
b365d68a 801 *
802 * There are some adns-invented data formats which are not official
803 * master file formats. These include:
804 *
805 * Mailboxes if __qtf_mail822: these are just included as-is.
806 *
807 * Addresses (adns_rr_addr): these may be of pretty much any type.
808 * The representation is in two parts: first, a word for the address
809 * family (ie, in AF_XXX, the XXX), and then one or more items for the
810 * address itself, depending on the format. For an IPv4 address the
811 * syntax is INET followed by the dotted quad (from inet_ntoa).
812 * Currently only IPv4 is supported.
813 *
a6f1dc92 814 * Text strings (as in adns_rr_txt) appear inside double quotes, and
815 * use \" and \\ to represent " and \, and \xHH to represent
816 * characters not in the range 32-126.
817 *
b365d68a 818 * Hostname with addresses (adns_rr_hostaddr): this consists of the
a6f1dc92 819 * hostname, as usual, followed by the adns_status value, as an
820 * abbreviation, and then a descriptive string (encoded as if it were
821 * a piece of text), for the address lookup, followed by zero or more
06f8e611 822 * addresses enclosed in ( and ). If the result was a temporary
b365d68a 823 * failure, then a single ? appears instead of the ( ). If the
06f8e611 824 * result was a permanent failure then an empty pair of parentheses
b365d68a 825 * appears (which a space in between). For example, one of the NS
a6f1dc92 826 * records for greenend.org.uk comes out like
827 * ns.chiark.greenend.org.uk ok "OK" ( INET 195.224.76.132 )
b365d68a 828 * an MX referring to a nonexistent host might come out like:
a6f1dc92 829 * 50 sun2.nsfnet-relay.ac.uk nxdomain "No such domain" ( )
b365d68a 830 * and if nameserver information is not available you might get:
a6f1dc92 831 * dns2.spong.dyn.ml.org timeout "DNS query timed out" ?
86e7b8d9 832 */
833
31144a72 834const char *adns_strerror(adns_status st);
9da4a044 835const char *adns_errabbrev(adns_status st);
ac77ffc1 836const char *adns_errtypeabbrev(adns_status st);
620c146d 837/* Like strerror but for adns_status values. adns_errabbrev returns
838 * the abbreviation of the error - eg, for adns_s_timeout it returns
ac77ffc1 839 * "timeout". adns_errtypeabbrev returns the abbreviation of the
840 * error class: ie, for values up to adns_s_max_XXX it will return the
841 * string XXX. You MUST NOT call these functions with status values
620c146d 842 * not returned by the same adns library.
843 */
31144a72 844
02b47faa 845#ifdef __cplusplus
846} /* end of extern "C" */
847#endif
a17d3a1d 848#endif