New public-facing functions for address/text conversions.
[adns] / src / adns.h
CommitLineData
5628df75 1/*
18d49d56 2 * adns.h
47a6797e 3 * - adns user-visible API
18d49d56 4 */
5/*
d942707d 6 *
7 * This file is
ae8cc977 8 * Copyright (C) 1997-2000,2003,2006 Ian Jackson
d942707d 9 *
10 * It is part of adns, which is
ae8cc977 11 * Copyright (C) 1997-2000,2003,2006 Ian Jackson
12 * Copyright (C) 1999-2000,2003,2006 Tony Finch
13 * Copyright (C) 1991 Massachusetts Institute of Technology
14 *
e576be50 15 * This program is free software; you can redistribute it and/or modify
16 * it under the terms of the GNU General Public License as published by
17 * the Free Software Foundation; either version 2, or (at your option)
18 * any later version.
19 *
20 * This program is distributed in the hope that it will be useful,
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
23 * GNU General Public License for more details.
d942707d 24 *
25 *
bef232ae 26 * For the benefit of certain LGPL'd `omnibus' software which
27 * provides a uniform interface to various things including adns, I
28 * make the following additional licence. I do this because the GPL
29 * would otherwise force either the omnibus software to be GPL'd or
30 * the adns-using part to be distributed separately.
d942707d 31 *
bef232ae 32 * So: you may also redistribute and/or modify adns.h (but only the
d942707d 33 * public header file adns.h and not any other part of adns) under the
34 * terms of the GNU Library General Public License as published by the
35 * Free Software Foundation; either version 2 of the License, or (at
36 * your option) any later version.
e576be50 37 *
d942707d 38 * Note that adns itself is GPL'd. Authors of adns-using applications
39 * with GPL-incompatible licences, and people who distribute adns with
40 * applications where the whole distribution is not GPL'd, are still
41 * likely to be in violation of the GPL. Anyone who wants to do this
42 * should contact Ian Jackson. Please note that to avoid encouraging
bef232ae 43 * people to infringe the GPL as it applies to the body of adns, Ian
44 * thinks that if you take advantage of the special exception to
45 * redistribute just adns.h under the LGPL, you should retain this
46 * paragraph in its place in the appropriate copyright statements.
d942707d 47 *
48 *
49 * You should have received a copy of the GNU General Public License,
50 * or the GNU Library General Public License, as appropriate, along
51 * with this program; if not, write to the Free Software Foundation,
a719a4be 52 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
53 *
d942707d 54 *
a719a4be 55 * $Id$
e576be50 56 */
a17d3a1d 57
58#ifndef ADNS_H_INCLUDED
59#define ADNS_H_INCLUDED
60
4353a5c4 61#include <stdio.h>
d3a102c4 62#include <stdarg.h>
4353a5c4 63
5aabad0d 64#include <sys/types.h>
964344fc 65#include <sys/socket.h>
66#include <netinet/in.h>
636b69b1 67#include <sys/time.h>
68#include <unistd.h>
5806b745 69#include <net/if.h>
964344fc 70
8fedcfeb 71#ifdef __cplusplus
72extern "C" { /* I really dislike this - iwj. */
73#endif
74
09957b1c 75/* All struct in_addr anywhere in adns are in NETWORK byte order. */
76
964344fc 77typedef struct adns__state *adns_state;
78typedef struct adns__query *adns_query;
a17d3a1d 79
deb1edb6 80typedef enum { /* In general, or together the desired flags: */
81 adns_if_none= 0x0000,/* no flags. nicer than 0 for some compilers */
b5bc5076 82 adns_if_noenv= 0x0001,/* do not look at environment */
83 adns_if_noerrprint= 0x0002,/* never print to stderr (_debug overrides) */
84 adns_if_noserverwarn=0x0004,/* do not warn to stderr about duff servers etc */
85 adns_if_debug= 0x0008,/* enable all output to stderr plus debug msgs */
86 adns_if_logpid= 0x0080,/* include pid in diagnostic output */
87 adns_if_noautosys= 0x0010,/* do not make syscalls at every opportunity */
88 adns_if_eintr= 0x0020,/* allow _wait and _synchronous to return EINTR */
89 adns_if_nosigpipe= 0x0040,/* applic has SIGPIPE ignored, do not protect */
90 adns_if_checkc_entex=0x0100,/* consistency checks on entry/exit to adns fns */
91 adns_if_checkc_freq= 0x0300 /* consistency checks very frequently (slow!) */
a17d3a1d 92} adns_initflags;
93
deb1edb6 94typedef enum { /* In general, or together the desired flags: */
95 adns_qf_none= 0x00000000,/* no flags */
b5bc5076 96 adns_qf_search= 0x00000001,/* use the searchlist */
97 adns_qf_usevc= 0x00000002,/* use a virtual circuit (TCP conn) */
98 adns_qf_owner= 0x00000004,/* fill in the owner field in the answer */
99 adns_qf_quoteok_query= 0x00000010,/* allow special chars in query domain */
100 adns_qf_quoteok_cname= 0x00000000,/* ... in CNAME we go via (now default) */
101 adns_qf_quoteok_anshost=0x00000040,/* ... in things supposedly hostnames */
102 adns_qf_quotefail_cname=0x00000080,/* refuse if quote-req chars in CNAME we go via */
103 adns_qf_cname_loose= 0x00000100,/* allow refs to CNAMEs - without, get _s_cname */
104 adns_qf_cname_forbid= 0x00000200,/* don't follow CNAMEs, instead give _s_cname */
5806b745
IJ
105 adns_qf_addrlit_scope_forbid=0x00002000,/* forbid %<scope> in IPv6 literals */
106 adns_qf_addrlit_scope_numeric=0x00004000,/* %<scope> may only be numeric */
107 adns_qf_addrlit_ipv4_quadonly=0x00008000,/* reject non-dotted-quad ipv4 */
b5bc5076 108 adns__qf_internalmask= 0x0ff00000
a17d3a1d 109} adns_queryflags;
110
111typedef enum {
2c6eb096 112 adns_rrt_typemask= 0x0ffff,
d24b603f 113 adns_rrt_reprmask= 0xffffff,
b0a32b17 114 adns__qtf_deref_bit=0x10000,/* internal version of ..._deref below */
2ed355aa 115 adns__qtf_mail822= 0x20000,/* return mailboxes in RFC822 rcpt field fmt */
2bd4b9f4 116
b0a32b17
MW
117 adns__qtf_bigaddr=0x1000000,/* use the new larger sockaddr union */
118
119 adns__qtf_deref= adns__qtf_deref_bit|adns__qtf_bigaddr
120 ,/* dereference domains; perhaps get extra data */
121
2bd4b9f4 122 adns_r_unknown= 0x40000,
123 /* To use this, ask for records of type <rr-type-code>|adns_r_unknown.
2c6eb096 124 * adns will not process the RDATA - you'll get adns_rr_byteblocks,
125 * where the int is the length and the unsigned char* points to the
126 * data. String representation of the RR data (by adns_rrinfo) is as in
127 * RFC3597. adns_rr_info will not return the type name in *rrtname_r
128 * (due to memory management problems); *fmtname_r will be set to
129 * "unknown".
2bd4b9f4 130 *
131 * Do not specify adns_r_unknown along with a known RR type which
2c6eb096 132 * requires domain name uncompression (see RFC3597 s4); domain names
133 * will not be uncompressed and the resulting data would be useless.
134 * Asking for meta-RR types via adns_r_unknown will not work properly
135 * either and may make adns complain about server misbehaviour, so don't
136 * do that.
137 *
138 * Don't forget adns_qf_quoteok if that's what you want. */
139
b5bc5076 140 adns_r_none= 0,
141
142 adns_r_a= 1,
143
144 adns_r_ns_raw= 2,
145 adns_r_ns= adns_r_ns_raw|adns__qtf_deref,
146
147 adns_r_cname= 5,
148
149 adns_r_soa_raw= 6,
150 adns_r_soa= adns_r_soa_raw|adns__qtf_mail822,
151
30d78b94 152 adns_r_ptr_raw= 12, /* do not mind PTR with wrong or missing A */
b5bc5076 153 adns_r_ptr= adns_r_ptr_raw|adns__qtf_deref,
154
155 adns_r_hinfo= 13,
156
157 adns_r_mx_raw= 15,
158 adns_r_mx= adns_r_mx_raw|adns__qtf_deref,
159
160 adns_r_txt= 16,
161
162 adns_r_rp_raw= 17,
163 adns_r_rp= adns_r_rp_raw|adns__qtf_mail822,
2ed355aa 164
165 /* For SRV records, query domain without _qf_quoteok_query must look
166 * as expected from SRV RFC with hostname-like Name. _With_
167 * _quoteok_query, any query domain is allowed. */
168 adns_r_srv_raw= 33,
169 adns_r_srv= adns_r_srv_raw|adns__qtf_deref,
b5bc5076 170
171 adns_r_addr= adns_r_a|adns__qtf_deref
172
a17d3a1d 173} adns_rrtype;
174
b365d68a 175/*
176 * In queries without qf_quoteok_*, all domains must have standard
177 * legal syntax, or you get adns_s_querydomainvalid (if the query
178 * domain contains bad characters) or adns_s_answerdomaininvalid (if
179 * the answer contains bad characters).
180 *
181 * In queries _with_ qf_quoteok_*, domains in the query or response
182 * may contain any characters, quoted according to RFC1035 5.1. On
183 * input to adns, the char* is a pointer to the interior of a "
8af5175d 184 * delimited string, except that " may appear in it unquoted. On
185 * output, the char* is a pointer to a string which would be legal
186 * either inside or outside " delimiters; any character which isn't
187 * legal in a hostname (ie alphanumeric or hyphen) or one of _ / +
188 * (the three other punctuation characters commonly abused in domain
189 * names) will be quoted, as \X if it is a printing ASCII character or
190 * \DDD otherwise.
191 *
b365d68a 192 * If the query goes via a CNAME then the canonical name (ie, the
193 * thing that the CNAME record refers to) is usually allowed to
194 * contain any characters, which will be quoted as above. With
195 * adns_qf_quotefail_cname you get adns_s_answerdomaininvalid when
196 * this happens. (This is a change from version 0.4 and earlier, in
197 * which failing the query was the default, and you had to say
198 * adns_qf_quoteok_cname to avoid this; that flag is now deprecated.)
199 *
200 * In version 0.4 and earlier, asking for _raw records containing
201 * mailboxes without specifying _qf_quoteok_anshost was silly. This
202 * is no longer the case. In this version only parts of responses
203 * that are actually supposed to be hostnames will be refused by
204 * default if quote-requiring characters are found.
205 */
206
207/*
208 * If you ask for an RR which contains domains which are actually
209 * encoded mailboxes, and don't ask for the _raw version, then adns
210 * returns the mailbox formatted suitably for an RFC822 recipient
211 * header field. The particular format used is that if the mailbox
212 * requires quoting according to the rules in RFC822 then the
213 * local-part is quoted in double quotes, which end at the next
7672a872 214 * unescaped double quote (\ is the escape char, and is doubled, and
215 * is used to escape only \ and "). If the local-part is legal
216 * without quoting according to RFC822, it is presented as-is. In any
217 * case the local-part is followed by an @ and the domain. The domain
218 * will not contain any characters not legal in hostnames.
219 *
220 * Unquoted local-parts may contain any printing 7-bit ASCII
221 * except the punctuation characters ( ) < > @ , ; : \ " [ ]
222 * I.e. they may contain alphanumerics, and the following
223 * punctuation characters: ! # % ^ & * - _ = + { } .
224 *
225 * adns will reject local parts containing control characters (byte
226 * values 0-31, 127-159, and 255) - these appear to be legal according
d0ac9ea0 227 * to RFC822 (at least 0-127) but are clearly a bad idea. RFC1035
228 * syntax does not make any distinction between a single RFC822
229 * quoted-string containing full stops, and a series of quoted-strings
230 * separated by full stops; adns will return anything that isn't all
231 * valid atoms as a single quoted-string. RFC822 does not allow
232 * high-bit-set characters at all, but adns does allow them in
233 * local-parts, treating them as needing quoting.
b365d68a 234 *
235 * If you ask for the domain with _raw then _no_ checking is done
236 * (even on the host part, regardless of adns_qf_quoteok_anshost), and
237 * you just get the domain name in master file format.
238 *
239 * If no mailbox is supplied the returned string will be `.' in either
d0ac9ea0 240 * case.
964344fc 241 */
242
a17d3a1d 243typedef enum {
b5bc5076 244 adns_s_ok,
245
246 /* locally induced errors */
247 adns_s_nomemory,
248 adns_s_unknownrrtype,
249 adns_s_systemfail,
250
251 adns_s_max_localfail= 29,
252
253 /* remotely induced errors, detected locally */
254 adns_s_timeout,
255 adns_s_allservfail,
256 adns_s_norecurse,
257 adns_s_invalidresponse,
258 adns_s_unknownformat,
259
260 adns_s_max_remotefail= 59,
261
262 /* remotely induced errors, reported by remote server to us */
263 adns_s_rcodeservfail,
264 adns_s_rcodeformaterror,
265 adns_s_rcodenotimplemented,
266 adns_s_rcoderefused,
267 adns_s_rcodeunknown,
268
269 adns_s_max_tempfail= 99,
270
271 /* remote configuration errors */
272 adns_s_inconsistent, /* PTR gives domain whose A does not exist and match */
273 adns_s_prohibitedcname, /* CNAME, but eg A expected (not if _qf_loosecname) */
274 adns_s_answerdomaininvalid,
275 adns_s_answerdomaintoolong,
276 adns_s_invaliddata,
277
278 adns_s_max_misconfig= 199,
279
280 /* permanent problems with the query */
281 adns_s_querydomainwrong,
282 adns_s_querydomaininvalid,
283 adns_s_querydomaintoolong,
284
285 adns_s_max_misquery= 299,
286
287 /* permanent errors */
288 adns_s_nxdomain,
289 adns_s_nodata,
290
291 adns_s_max_permfail= 499
292
a17d3a1d 293} adns_status;
294
b0a32b17
MW
295typedef union {
296 struct sockaddr sa;
297 struct sockaddr_in inet;
298} adns_sockaddr_v4only;
299
300typedef union {
301 struct sockaddr sa;
302 struct sockaddr_in inet;
303 struct sockaddr_in6 inet6;
304} adns_sockaddr;
305
e8c505a5 306typedef struct {
828d89bd 307 int len;
b0a32b17 308 adns_sockaddr addr;
551ff40f 309} adns_rr_addr;
828d89bd 310
311typedef struct {
b0a32b17
MW
312 /* the old v4-only structure; handy if you have complicated binary
313 * compatibility problems. */
314 int len;
315 adns_sockaddr_v4only addr;
316} adns_rr_addr_v4only;
317
318typedef struct {
1dfe95d8 319 char *host;
84fe28db 320 adns_status astatus;
321 int naddrs; /* temp fail => -1, perm fail => 0, s_ok => >0 */
551ff40f 322 adns_rr_addr *addrs;
c7836bc9 323} adns_rr_hostaddr;
4353a5c4 324
325typedef struct {
9ec44266 326 char *(array[2]);
4353a5c4 327} adns_rr_strpair;
328
329typedef struct {
330 int i;
1dfe95d8 331 adns_rr_hostaddr ha;
c7836bc9 332} adns_rr_inthostaddr;
4353a5c4 333
334typedef struct {
b5bc5076 335 /* Used both for mx_raw, in which case i is the preference and str
336 * the domain, and for txt, in which case each entry has i for the
337 * `text' length, and str for the data (which will have had an extra
338 * nul appended so that if it was plain text it is now a
339 * null-terminated string).
e062dcae 340 */
4353a5c4 341 int i;
342 char *str;
343} adns_rr_intstr;
344
345typedef struct {
9ec44266 346 adns_rr_intstr array[2];
347} adns_rr_intstrpair;
348
349typedef struct {
350 char *mname, *rname;
4353a5c4 351 unsigned long serial, refresh, retry, expire, minimum;
352} adns_rr_soa;
84fe28db 353
354typedef struct {
2ed355aa 355 int priority, weight, port;
356 char *host;
357} adns_rr_srvraw;
358
359typedef struct {
360 int priority, weight, port;
361 adns_rr_hostaddr ha;
401c256a 362} adns_rr_srvha;
2ed355aa 363
364typedef struct {
2c6eb096 365 int len;
366 unsigned char *data;
367} adns_rr_byteblock;
368
369typedef struct {
a17d3a1d 370 adns_status status;
371 char *cname; /* always NULL if query was for CNAME records */
b5bc5076 372 char *owner; /* only set if req'd in query flags; maybe 0 on error anyway */
86e7b8d9 373 adns_rrtype type; /* guaranteed to be same as in query */
b5bc5076 374 time_t expires;/*abs time. def only if _s_ok, nxdomain or nodata. NOT TTL!*/
b365d68a 375 int nrrs, rrsz; /* nrrs is 0 if an error occurs */
a17d3a1d 376 union {
8e5b0abb 377 void *untyped;
378 unsigned char *bytes;
b5bc5076 379 char *(*str); /* ns_raw, cname, ptr, ptr_raw */
380 adns_rr_intstr *(*manyistr); /* txt (list strs ends with i=-1, str=0)*/
381 adns_rr_addr *addr; /* addr */
382 struct in_addr *inaddr; /* a */
383 adns_rr_hostaddr *hostaddr; /* ns */
384 adns_rr_intstrpair *intstrpair; /* hinfo */
385 adns_rr_strpair *strpair; /* rp, rp_raw */
386 adns_rr_inthostaddr *inthostaddr;/* mx */
2c6eb096 387 adns_rr_intstr *intstr; /* mx_raw */
b5bc5076 388 adns_rr_soa *soa; /* soa, soa_raw */
2ed355aa 389 adns_rr_srvraw *srvraw; /* srv_raw */
401c256a 390 adns_rr_srvha *srvha;/* srv */
2c6eb096 391 adns_rr_byteblock *byteblock; /* ...|unknown */
a17d3a1d 392 } rrs;
e8c505a5 393} adns_answer;
a17d3a1d 394
395/* Memory management:
396 * adns_state and adns_query are actually pointers to malloc'd state;
397 * On submission questions are copied, including the owner domain;
4353a5c4 398 * Answers are malloc'd as a single piece of memory; pointers in the
399 * answer struct point into further memory in the answer.
a17d3a1d 400 * query_io:
401 * Must always be non-null pointer;
402 * If *query_io is 0 to start with then any query may be returned;
403 * If *query_io is !0 adns_query then only that query may be returned.
d3eea642 404 * If the call is successful, *query_io, *answer_r, and *context_r
405 * will all be set.
a17d3a1d 406 * Errors:
620c146d 407 * Return values are 0 or an errno value.
408 *
409 * For _init, _init_strcfg, _submit and _synchronous, system errors
410 * (eg, failure to create sockets, malloc failure, etc.) return errno
469fc855 411 * values. EINVAL from _init et al means the configuration file
412 * is erroneous and cannot be parsed.
620c146d 413 *
414 * For _wait and _check failures are reported in the answer
226c5eef 415 * structure, and only 0, ESRCH or (for _check) EAGAIN is
620c146d 416 * returned: if no (appropriate) requests are done adns_check returns
226c5eef 417 * EAGAIN; if no (appropriate) requests are outstanding both
620c146d 418 * adns_query and adns_wait return ESRCH.
419 *
420 * Additionally, _wait can return EINTR if you set adns_if_eintr.
421 *
422 * All other errors (nameserver failure, timed out connections, &c)
423 * are returned in the status field of the answer. After a
424 * successful _wait or _check, if status is nonzero then nrrs will be
425 * 0, otherwise it will be >0. type will always be the type
426 * requested.
a17d3a1d 427 */
428
47a6797e 429/* Threads:
430 * adns does not use any static modifiable state, so it
431 * is safe to call adns_init several times and then use the
432 * resulting adns_states concurrently.
433 * However, it is NOT safe to make simultaneous calls into
434 * adns using the same adns_state; a single adns_state must be used
435 * only by one thread at a time. You can solve this problem by
436 * having one adns_state per thread, or if that isn't feasible, you
437 * could maintain a pool of adns_states. Unfortunately neither of
438 * these approaches has optimal performance.
439 */
440
e563872a 441int adns_init(adns_state *newstate_r, adns_initflags flags,
36369543 442 FILE *diagfile /*0=>stderr*/);
443
e563872a 444int adns_init_strcfg(adns_state *newstate_r, adns_initflags flags,
36369543 445 FILE *diagfile /*0=>discard*/, const char *configtext);
c8c7c813 446
d3a102c4 447typedef void adns_logcallbackfn(adns_state ads, void *logfndata,
448 const char *fmt, va_list al);
4db1559f 449 /* Will be called perhaps several times for each message; when the
09ad6588 450 * message is complete, the string implied by fmt and al will end in
4db1559f 451 * a newline. Log messages start with `adns debug:' or `adns
452 * warning:' or `adns:' (for errors), or `adns debug [PID]:'
453 * etc. if adns_if_logpid is set. */
d3a102c4 454
455int adns_init_logfn(adns_state *newstate_r, adns_initflags flags,
456 const char *configtext /*0=>use default config files*/,
457 adns_logcallbackfn *logfn /*0=>logfndata is a FILE* */,
458 void *logfndata /*0 with logfn==0 => discard*/);
459
c8c7c813 460/* Configuration:
461 * adns_init reads /etc/resolv.conf, which is expected to be (broadly
fb7fbb66 462 * speaking) in the format expected by libresolv, and then
463 * /etc/resolv-adns.conf if it exists. adns_init_strcfg is instead
464 * passed a string which is interpreted as if it were the contents of
465 * resolv.conf or resolv-adns.conf. In general, configuration which
466 * is set later overrides any that is set earlier.
c8c7c813 467 *
fb7fbb66 468 * Standard directives understood in resolv[-adns].conf:
c8c7c813 469 *
470 * nameserver <address>
471 * Must be followed by the IP address of a nameserver. Several
472 * nameservers may be specified, and they will be tried in the order
473 * found. There is a compiled in limit, currently 5, on the number
474 * of nameservers. (libresolv supports only 3 nameservers.)
475 *
476 * search <domain> ...
477 * Specifies the search list for queries which specify
478 * adns_qf_search. This is a list of domains to append to the query
479 * domain. The query domain will be tried as-is either before all
480 * of these or after them, depending on the ndots option setting
481 * (see below).
482 *
483 * domain <domain>
484 * This is present only for backward compatibility with obsolete
485 * versions of libresolv. It should not be used, and is interpreted
486 * by adns as if it were `search' - note that this is subtly
487 * different to libresolv's interpretation of this directive.
488 *
489 * sortlist <addr>/<mask> ...
490 * Should be followed by a sequence of IP-address and netmask pairs,
491 * separated by spaces. They may be specified as
492 * eg. 172.30.206.0/24 or 172.30.206.0/255.255.255.0. Currently up
493 * to 15 pairs may be specified (but note that libresolv only
494 * supports up to 10).
495 *
496 * options
497 * Should followed by one or more options, separated by spaces.
498 * Each option consists of an option name, followed by optionally
499 * a colon and a value. Options are listed below.
500 *
fb7fbb66 501 * Non-standard directives understood in resolv[-adns].conf:
c8c7c813 502 *
503 * clearnameservers
504 * Clears the list of nameservers, so that further nameserver lines
505 * start again from the beginning.
506 *
507 * include <filename>
508 * The specified file will be read.
509 *
fb7fbb66 510 * Additionally, adns will ignore lines in resolv[-adns].conf which
511 * start with a #.
c8c7c813 512 *
513 * Standard options understood:
514 *
515 * debug
516 * Enables debugging output from the resolver, which will be written
517 * to stderr.
518 *
519 * ndots:<count>
520 * Affects whether queries with adns_qf_search will be tried first
521 * without adding domains from the searchlist, or whether the bare
522 * query domain will be tried last. Queries which contain at least
523 * <count> dots will be tried bare first. The default is 1.
524 *
525 * Non-standard options understood:
526 *
527 * adns_checkc:none
528 * adns_checkc:entex
529 * adns_checkc:freq
530 * Changes the consistency checking frequency; this overrides the
531 * setting of adns_if_check_entex, adns_if_check_freq, or neither,
532 * in the flags passed to adns_init.
533 *
534 * There are a number of environment variables which can modify the
535 * behaviour of adns. They take effect only if adns_init is used, and
536 * the caller of adns_init can disable them using adns_if_noenv. In
537 * each case there is both a FOO and an ADNS_FOO; the latter is
538 * interpreted later so that it can override the former. Unless
539 * otherwise stated, environment variables are interpreted after
fb7fbb66 540 * resolv[-adns].conf are read, in the order they are listed here.
c8c7c813 541 *
542 * RES_CONF, ADNS_RES_CONF
543 * A filename, whose contets are in the format of resolv.conf.
544 *
545 * RES_CONF_TEXT, ADNS_RES_CONF_TEXT
546 * A string in the format of resolv.conf.
547 *
548 * RES_OPTIONS, ADNS_RES_OPTIONS
549 * These are parsed as if they appeared in the `options' line of a
550 * resolv.conf. In addition to being parsed at this point in the
551 * sequence, they are also parsed at the very beginning before
552 * resolv.conf or any other environment variables are read, so that
553 * any debug option can affect the processing of the configuration.
554 *
555 * LOCALDOMAIN, ADNS_LOCALDOMAIN
556 * These are interpreted as if their contents appeared in a `search'
557 * line in resolv.conf.
558 */
a17d3a1d 559
560int adns_synchronous(adns_state ads,
561 const char *owner,
562 adns_rrtype type,
e563872a 563 adns_queryflags flags,
9d95094c 564 adns_answer **answer_r);
e8c505a5 565
566/* NB: if you set adns_if_noautosys then _submit and _check do not
620c146d 567 * make any system calls; you must use some of the asynch-io event
568 * processing functions to actually get things to happen.
e8c505a5 569 */
a17d3a1d 570
571int adns_submit(adns_state ads,
572 const char *owner,
573 adns_rrtype type,
e563872a 574 adns_queryflags flags,
a17d3a1d 575 void *context,
964344fc 576 adns_query *query_r);
a17d3a1d 577
3ccea6ee 578/* The owner should be quoted in master file format. */
579
964344fc 580int adns_check(adns_state ads,
a17d3a1d 581 adns_query *query_io,
9d95094c 582 adns_answer **answer_r,
583 void **context_r);
a17d3a1d 584
585int adns_wait(adns_state ads,
586 adns_query *query_io,
9d95094c 587 adns_answer **answer_r,
588 void **context_r);
a17d3a1d 589
940356bd 590/* same as adns_wait but uses poll(2) internally */
591int adns_wait_poll(adns_state ads,
592 adns_query *query_io,
593 adns_answer **answer_r,
594 void **context_r);
595
3955725c 596void adns_cancel(adns_query query);
a17d3a1d 597
620c146d 598/* The adns_query you get back from _submit is valid (ie, can be
599 * legitimately passed into adns functions) until it is returned by
600 * adns_check or adns_wait, or passed to adns_cancel. After that it
601 * must not be used. You can rely on it not being reused until the
602 * first adns_submit or _transact call using the same adns_state after
603 * it became invalid, so you may compare it for equality with other
604 * query handles until you next call _query or _transact.
636b69b1 605 *
606 * _submit and _synchronous return ENOSYS if they don't understand the
607 * query type.
e576be50 608 */
a17d3a1d 609
b365d68a 610int adns_submit_reverse(adns_state ads,
611 const struct sockaddr *addr,
612 adns_rrtype type,
e563872a 613 adns_queryflags flags,
b365d68a 614 void *context,
615 adns_query *query_r);
d7449548 616/* type must be _r_ptr or _r_ptr_raw. _qf_search is ignored.
617 * addr->sa_family must be AF_INET or you get ENOSYS.
618 */
b365d68a 619
2b1c6979 620int adns_submit_reverse_any(adns_state ads,
621 const struct sockaddr *addr,
622 const char *rzone,
623 adns_rrtype type,
624 adns_queryflags flags,
625 void *context,
626 adns_query *query_r);
627/* For RBL-style reverse `zone's; look up
628 * <reversed-address>.<zone>
629 * Any type is allowed. _qf_search is ignored.
630 * addr->sa_family must be AF_INET or you get ENOSYS.
631 */
632
620c146d 633void adns_finish(adns_state ads);
e576be50 634/* You may call this even if you have queries outstanding;
635 * they will be cancelled.
636 */
a17d3a1d 637
5806b745
IJ
638#define ADNS_ADDR2TEXT_BUFLEN \
639 (INET6_ADDRSTRLEN + 1/*%*/ \
640 + ((IF_NAMESIZE-1) > 9 ? (IF_NAMESIZE-1) : 9/*uint32*/) \
641 + 1/* nul; included in IF_NAMESIZE */)
642
643int adns_text2addr(const char *text, uint16_t port, adns_queryflags flags,
644 struct sockaddr *sa_r,
645 socklen_t *salen_io /* updated iff OK or ENOSPC */);
646int adns_addr2text(const struct sockaddr *sa, adns_queryflags flags,
647 char *buffer, int *buflen_io /* updated ONLY on ENOSPC */,
648 int *port_r /* may be 0 */);
649 /*
650 * port is always in host byte order and is simply copied to and
651 * from the appropriate sockaddr field (byteswapped as necessary).
652 *
653 * The only flags supported are adns_qf_addrlit_...; others are
654 * ignored.
655 *
656 * Error return values are:
657 *
658 * ENOSPC Output buffer is too small. Can only happen if
659 * *buflen_io < ADNS_ADDR2TEXT_BUFLEN or
660 * *salen_io < sizeof(adns_sockaddr). On return,
661 * *buflen_io or *salen_io has been updated by adns.
662 *
663 * EINVAL text has invalid syntax.
664 *
665 * text represents an address family not supported by
666 * this version of adns.
667 *
668 * Scoped address supplied (text contained "%" or
669 * sin6_scope_id nonzero) but caller specified
670 * adns_qf_addrlit_scope_forbid.
671 *
672 * Scope name (rather than number) supplied in text but
673 * caller specified adns_qf_addrlit_scope_numeric.
674 *
675 * EAFNOSUPPORT sa->sa_family is not supported (addr2text only).
676 *
677 * Only if neither adns_qf_addrlit_scope_forbid nor
678 * adns_qf_addrlit_scope_numeric are set:
679 *
680 * ENOSYS Scope name supplied in text but IPv6 address part of
681 * sockaddr is not a link local address.
682 *
683 * ENXIO Scope name supplied in text but if_nametoindex
684 * said it wasn't a valid local interface name.
685 *
686 * EIO Scoped address supplied but if_nametoindex failed
687 * in an unexpected way; adns has printed a message to
688 * stderr.
689 *
690 * any other if_nametoindex failed in a more-or-less expected way.
691 */
964344fc 692
958ad1f0 693void adns_forallqueries_begin(adns_state ads);
8ce38e76 694adns_query adns_forallqueries_next(adns_state ads, void **context_r);
620c146d 695/* Iterator functions, which you can use to loop over the outstanding
958ad1f0 696 * (submitted but not yet successfuly checked/waited) queries.
a8768e80 697 *
958ad1f0 698 * You can only have one iteration going at once. You may call _begin
699 * at any time; after that, an iteration will be in progress. You may
700 * only call _next when an iteration is in progress - anything else
701 * may coredump. The iteration remains in progress until _next
702 * returns 0, indicating that all the queries have been walked over,
703 * or ANY other adns function is called with the same adns_state (or a
704 * query in the same adns_state). There is no need to explicitly
705 * finish an iteration.
706 *
8ce38e76 707 * context_r may be 0. *context_r may not be set when _next returns 0.
964344fc 708 */
a17d3a1d 709
28de6442 710void adns_checkconsistency(adns_state ads, adns_query qu);
3e2e5fab 711/* Checks the consistency of adns's internal data structures.
712 * If any error is found, the program will abort().
28de6442 713 * You may pass 0 for qu; if you pass non-null then additional checks
714 * are done to make sure that qu is a valid query.
3e2e5fab 715 */
716
620c146d 717/*
718 * Example expected/legal calling sequence for submit/check/wait:
a17d3a1d 719 * adns_init
720 * adns_submit 1
721 * adns_submit 2
722 * adns_submit 3
723 * adns_wait 1
226c5eef 724 * adns_check 3 -> EAGAIN
a17d3a1d 725 * adns_wait 2
726 * adns_wait 3
727 * ....
728 * adns_finish
620c146d 729 */
730
731/*
732 * Entrypoints for generic asynch io:
733 * (these entrypoints are not very useful except in combination with *
734 * some of the other I/O model calls which can tell you which fds to
735 * be interested in):
736 *
737 * Note that any adns call may cause adns to open and close fds, so
738 * you must call beforeselect or beforepoll again just before
739 * blocking, or you may not have an up-to-date list of it's fds.
740 */
741
742int adns_processany(adns_state ads);
743/* Gives adns flow-of-control for a bit. This will never block, and
744 * can be used with any threading/asynch-io model. If some error
745 * occurred which might cause an event loop to spin then the errno
746 * value is returned.
747 */
748
749int adns_processreadable(adns_state ads, int fd, const struct timeval *now);
750int adns_processwriteable(adns_state ads, int fd, const struct timeval *now);
751int adns_processexceptional(adns_state ads, int fd, const struct timeval *now);
752/* Gives adns flow-of-control so that it can process incoming data
753 * from, or send outgoing data via, fd. Very like _processany. If it
754 * returns zero then fd will no longer be readable or writeable
755 * (unless of course more data has arrived since). adns will _only_
0a106d94 756 * use that fd and only in the manner specified, regardless of whether
620c146d 757 * adns_if_noautosys was specified.
758 *
759 * adns_processexceptional should be called when select(2) reports an
760 * exceptional condition, or poll(2) reports POLLPRI.
761 *
762 * It is fine to call _processreabable or _processwriteable when the
763 * fd is not ready, or with an fd that doesn't belong to adns; it will
764 * then just return 0.
765 *
766 * If some error occurred which might prevent an event loop to spin
767 * then the errno value is returned.
768 */
769
770void adns_processtimeouts(adns_state ads, const struct timeval *now);
771/* Gives adns flow-of-control so that it can process any timeouts
772 * which might have happened. Very like _processreadable/writeable.
773 *
774 * now may be 0; if it isn't, *now must be the current time, recently
775 * obtained from gettimeofday.
776 */
777
778void adns_firsttimeout(adns_state ads,
779 struct timeval **tv_mod, struct timeval *tv_buf,
780 struct timeval now);
781/* Asks adns when it would first like the opportunity to time
782 * something out. now must be the current time, from gettimeofday.
783 *
784 * If tv_mod points to 0 then tv_buf must be non-null, and
785 * _firsttimeout will fill in *tv_buf with the time until the first
786 * timeout, and make *tv_mod point to tv_buf. If adns doesn't have
787 * anything that might need timing out it will leave *tv_mod as 0.
788 *
789 * If *tv_mod is not 0 then tv_buf is not used. adns will update
790 * *tv_mod if it has any earlier timeout, and leave it alone if it
791 * doesn't.
792 *
793 * This call will not actually do any I/O, or change the fds that adns
794 * is using. It always succeeds and never blocks.
795 */
796
797void adns_globalsystemfailure(adns_state ads);
798/* If serious problem(s) happen which globally affect your ability to
799 * interact properly with adns, or adns's ability to function
800 * properly, you or adns can call this function.
801 *
802 * All currently outstanding queries will be made to fail with
803 * adns_s_systemfail, and adns will close any stream sockets it has
804 * open.
805 *
806 * This is used by adns, for example, if gettimeofday() fails.
807 * Without this the program's event loop might start to spin !
808 *
809 * This call will never block.
810 */
811
812/*
813 * Entrypoints for select-loop based asynch io:
814 */
815
816void adns_beforeselect(adns_state ads, int *maxfd, fd_set *readfds,
817 fd_set *writefds, fd_set *exceptfds,
818 struct timeval **tv_mod, struct timeval *tv_buf,
819 const struct timeval *now);
820/* Find out file descriptors adns is interested in, and when it would
821 * like the opportunity to time something out. If you do not plan to
822 * block then tv_mod may be 0. Otherwise, tv_mod and tv_buf are as
823 * for adns_firsttimeout. readfds, writefds, exceptfds and maxfd_io may
824 * not be 0.
825 *
d3a102c4 826 * If tv_mod is 0 on entry then this will never actually do any I/O,
827 * or change the fds that adns is using or the timeouts it wants. In
828 * any case it won't block, and it will set the timeout to zero if a
829 * query finishes in _beforeselect.
620c146d 830 */
831
832void adns_afterselect(adns_state ads, int maxfd, const fd_set *readfds,
833 const fd_set *writefds, const fd_set *exceptfds,
834 const struct timeval *now);
835/* Gives adns flow-of-control for a bit; intended for use after
836 * select. This is just a fancy way of calling adns_processreadable/
837 * writeable/timeouts as appropriate, as if select had returned the
838 * data being passed. Always succeeds.
839 */
840
841/*
842 * Example calling sequence:
a17d3a1d 843 *
e8c505a5 844 * adns_init _noautosys
a17d3a1d 845 * loop {
620c146d 846 * adns_beforeselect
a17d3a1d 847 * select
620c146d 848 * adns_afterselect
e8c505a5 849 * ...
850 * adns_submit / adns_check
851 * ...
a17d3a1d 852 * }
853 */
854
620c146d 855/*
856 * Entrypoints for poll-loop based asynch io:
857 */
858
859struct pollfd;
860/* In case your system doesn't have it or you forgot to include
861 * <sys/poll.h>, to stop the following declarations from causing
862 * problems. If your system doesn't have poll then the following
863 * entrypoints will not be defined in libadns. Sorry !
864 */
865
b5bc5076 866int adns_beforepoll(adns_state ads, struct pollfd *fds,
867 int *nfds_io, int *timeout_io,
620c146d 868 const struct timeval *now);
869/* Finds out which fd's adns is interested in, and when it would like
870 * to be able to time things out. This is in a form suitable for use
871 * with poll(2).
872 *
873 * On entry, usually fds should point to at least *nfds_io structs.
874 * adns will fill up to that many structs will information for poll,
875 * and record in *nfds_io how many structs it filled. If it wants to
876 * listen for more structs then *nfds_io will be set to the number
877 * required and _beforepoll will return ERANGE.
878 *
620c146d 879 * You may call _beforepoll with fds==0 and *nfds_io 0, in which case
880 * adns will fill in the number of fds that it might be interested in
fc6a52ae 881 * in *nfds_io, and always return either 0 (if it is not interested in
882 * any fds) or ERANGE (if it is).
883 *
c912639e 884 * NOTE that (unless now is 0) adns may acquire additional fds
fc6a52ae 885 * from one call to the next, so you must put adns_beforepoll in a
886 * loop, rather than assuming that the second call (with the buffer
887 * size requested by the first) will not return ERANGE.
620c146d 888 *
889 * adns only ever sets POLLIN, POLLOUT and POLLPRI in its pollfd
890 * structs, and only ever looks at those bits. POLLPRI is required to
fc6a52ae 891 * detect TCP Urgent Data (which should not be used by a DNS server)
620c146d 892 * so that adns can know that the TCP stream is now useless.
893 *
894 * In any case, *timeout_io should be a timeout value as for poll(2),
895 * which adns will modify downwards as required. If the caller does
fc6a52ae 896 * not plan to block then *timeout_io should be 0 on entry, or
897 * alternatively, timeout_io may be 0. (Alternatively, the caller may
898 * use _beforeselect with timeout_io==0 to find out about file
899 * descriptors, and use _firsttimeout is used to find out when adns
900 * might want to time something out.)
620c146d 901 *
902 * adns_beforepoll will return 0 on success, and will not fail for any
903 * reason other than the fds buffer being too small (ERANGE).
904 *
c912639e 905 * This call will never actually do any I/O. If you supply the
906 * current time it will not change the fds that adns is using or the
907 * timeouts it wants.
908 *
909 * In any case this call won't block.
620c146d 910 */
911
912#define ADNS_POLLFDS_RECOMMENDED 2
913/* If you allocate an fds buf with at least RECOMMENDED entries then
914 * you are unlikely to need to enlarge it. You are recommended to do
915 * so if it's convenient. However, you must be prepared for adns to
916 * require more space than this.
917 */
918
919void adns_afterpoll(adns_state ads, const struct pollfd *fds, int nfds,
920 const struct timeval *now);
921/* Gives adns flow-of-control for a bit; intended for use after
922 * poll(2). fds and nfds should be the results from poll(). pollfd
923 * structs mentioning fds not belonging to adns will be ignored.
924 */
925
926
86e7b8d9 927adns_status adns_rr_info(adns_rrtype type,
928 const char **rrtname_r, const char **fmtname_r,
929 int *len_r,
930 const void *datap, char **data_r);
b365d68a 931/*
b365d68a 932 * Get information about a query type, or convert reply data to a
933 * textual form. type must be specified, and the official name of the
934 * corresponding RR type will be returned in *rrtname_r, and
935 * information about the processing style in *fmtname_r. The length
936 * of the table entry in an answer for that type will be returned in
937 * in *len_r. Any or all of rrtname_r, fmtname_r and len_r may be 0.
938 * If fmtname_r is non-null then *fmtname_r may be null on return,
939 * indicating that no special processing is involved.
940 *
941 * data_r be must be non-null iff datap is. In this case *data_r will
942 * be set to point to a string pointing to a representation of the RR
943 * data in master file format. (The owner name, timeout, class and
944 * type will not be present - only the data part of the RR.) The
945 * memory will have been obtained from malloc() and must be freed by
946 * the caller.
86e7b8d9 947 *
948 * Usually this routine will succeed. Possible errors include:
949 * adns_s_nomemory
ea1e31e3 950 * adns_s_rrtypeunknown
86e7b8d9 951 * adns_s_invaliddata (*datap contained garbage)
952 * If an error occurs then no memory has been allocated,
953 * and *rrtname_r, *fmtname_r, *len_r and *data_r are undefined.
b365d68a 954 *
955 * There are some adns-invented data formats which are not official
956 * master file formats. These include:
957 *
958 * Mailboxes if __qtf_mail822: these are just included as-is.
959 *
960 * Addresses (adns_rr_addr): these may be of pretty much any type.
961 * The representation is in two parts: first, a word for the address
962 * family (ie, in AF_XXX, the XXX), and then one or more items for the
963 * address itself, depending on the format. For an IPv4 address the
964 * syntax is INET followed by the dotted quad (from inet_ntoa).
965 * Currently only IPv4 is supported.
966 *
a6f1dc92 967 * Text strings (as in adns_rr_txt) appear inside double quotes, and
968 * use \" and \\ to represent " and \, and \xHH to represent
969 * characters not in the range 32-126.
970 *
b365d68a 971 * Hostname with addresses (adns_rr_hostaddr): this consists of the
a6f1dc92 972 * hostname, as usual, followed by the adns_status value, as an
973 * abbreviation, and then a descriptive string (encoded as if it were
974 * a piece of text), for the address lookup, followed by zero or more
06f8e611 975 * addresses enclosed in ( and ). If the result was a temporary
b365d68a 976 * failure, then a single ? appears instead of the ( ). If the
06f8e611 977 * result was a permanent failure then an empty pair of parentheses
b365d68a 978 * appears (which a space in between). For example, one of the NS
a6f1dc92 979 * records for greenend.org.uk comes out like
980 * ns.chiark.greenend.org.uk ok "OK" ( INET 195.224.76.132 )
b365d68a 981 * an MX referring to a nonexistent host might come out like:
a6f1dc92 982 * 50 sun2.nsfnet-relay.ac.uk nxdomain "No such domain" ( )
b365d68a 983 * and if nameserver information is not available you might get:
a6f1dc92 984 * dns2.spong.dyn.ml.org timeout "DNS query timed out" ?
86e7b8d9 985 */
986
31144a72 987const char *adns_strerror(adns_status st);
9da4a044 988const char *adns_errabbrev(adns_status st);
ac77ffc1 989const char *adns_errtypeabbrev(adns_status st);
620c146d 990/* Like strerror but for adns_status values. adns_errabbrev returns
991 * the abbreviation of the error - eg, for adns_s_timeout it returns
ac77ffc1 992 * "timeout". adns_errtypeabbrev returns the abbreviation of the
993 * error class: ie, for values up to adns_s_max_XXX it will return the
994 * string XXX. You MUST NOT call these functions with status values
620c146d 995 * not returned by the same adns library.
996 */
31144a72 997
02b47faa 998#ifdef __cplusplus
999} /* end of extern "C" */
1000#endif
a17d3a1d 1001#endif