Added TODO file.
[adns] / src / internal.h
CommitLineData
e576be50 1/*
2 * internal.h
3 * - declarations of private objects with external linkage (adns__*)
4 * - definitons of internal macros
5 * - comments regarding library data structures
6 */
7/*
a719a4be 8 * This file is part of adns, which is Copyright (C) 1997-1999 Ian Jackson
e576be50 9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2, or (at your option)
13 * any later version.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software Foundation,
22 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
23 */
37e28fde 24
25#ifndef ADNS_INTERNAL_H_INCLUDED
26#define ADNS_INTERNAL_H_INCLUDED
27
11b35193 28#include "config.h"
4353a5c4 29typedef unsigned char byte;
30
31#include <stdarg.h>
32#include <assert.h>
33#include <unistd.h>
ac868fa8 34#include <signal.h>
4353a5c4 35
37e28fde 36#include <sys/time.h>
37
38#include "adns.h"
39
40/* Configuration and constants */
41
42#define MAXSERVERS 5
09957b1c 43#define MAXSORTLIST 15
4b707d8b 44#define UDPMAXRETRIES 15
37e28fde 45#define UDPRETRYMS 2000
46#define TCPMS 30000
47#define LOCALRESOURCEMS 20
73dba56e 48#define MAXTTLBELIEVE (7*86400) /* any TTL > 7 days is capped */
b9de380c 49
98a3f706 50#define DNS_PORT 53
b9de380c 51#define DNS_MAXUDP 512
52#define DNS_MAXDOMAIN 255
53#define DNS_HDRSIZE 12
660d7d3b 54#define DNS_IDOFFSET 0
b9de380c 55#define DNS_CLASS_IN 1
37e28fde 56
a6536d8b 57#define DNS_INADDR_ARPA "in-addr", "arpa"
58
98a3f706 59typedef enum {
60 rcode_noerror,
61 rcode_formaterror,
62 rcode_servfail,
63 rcode_nxdomain,
64 rcode_notimp,
65 rcode_refused
66} dns_rcode;
67
37e28fde 68/* Shared data structures */
69
4353a5c4 70typedef union {
37e28fde 71 adns_status status;
72 char *cp;
73 adns_rrtype type;
4353a5c4 74 int i;
37e28fde 75 struct in_addr ia;
76 unsigned long ul;
4353a5c4 77} rr_align;
78
79typedef struct {
80 int used, avail;
81 byte *buf;
82} vbuf;
83
0ba0614a 84typedef struct {
1dfe95d8 85 adns_state ads;
c7836bc9 86 adns_query qu;
1dfe95d8 87 int serv;
c7836bc9 88 const byte *dgram;
1dfe95d8 89 int dglen, nsstart, nscount, arcount;
7da21070 90 struct timeval now;
c7836bc9 91} parseinfo;
92
93typedef struct {
0ba0614a 94 adns_rrtype type;
86e7b8d9 95 const char *rrtname;
96 const char *fmtname;
98a3f706 97 int rrsz;
8e5b0abb 98
86e7b8d9 99 void (*makefinal)(adns_query qu, void *data);
100 /* Change memory management of *data.
101 * Previously, used alloc_interim, now use alloc_final.
102 */
103
104 adns_status (*convstring)(vbuf *vb, const void *data);
105 /* Converts the RR data to a string representation in vbuf.
106 * vbuf will be appended to (it must have been initialised),
107 * and will not be null-terminated by convstring.
108 */
109
1dfe95d8 110 adns_status (*parse)(const parseinfo *pai, int cbyte, int max, void *store_r);
31144a72 111 /* Parse one RR, in dgram of length dglen, starting at cbyte and
112 * extending until at most max.
113 *
114 * The RR should be stored at *store_r, of length qu->typei->rrsz.
115 *
116 * If there is an overrun which might indicate truncation, it should set
117 * *rdstart to -1; otherwise it may set it to anything else positive.
88372443 118 *
c7836bc9 119 * nsstart is the offset of the authority section.
8e5b0abb 120 */
e062dcae 121
09957b1c 122 int (*diff_needswap)(adns_state ads, const void *datap_a, const void *datap_b);
88372443 123 /* Returns !0 if RR a should be strictly after RR b in the sort order,
e062dcae 124 * 0 otherwise. Must not fail.
125 */
0ba0614a 126} typeinfo;
127
8e5b0abb 128typedef struct allocnode {
551ff40f 129 struct allocnode *next, *back;
8e5b0abb 130} allocnode;
131
132union maxalign {
133 byte d[1];
134 struct in_addr ia;
135 long l;
136 void *p;
137 void (*fp)(void);
138 union maxalign *up;
139} data;
140
a6536d8b 141typedef struct {
142 void *ext;
143 void (*callback)(adns_query parent, adns_query child);
144 union {
145 adns_rr_addr ptr_parent_addr;
146 adns_rr_hostaddr *hostaddr;
147 } info;
148} qcontext;
149
37e28fde 150struct adns__query {
3955725c 151 adns_state ads;
ddfda861 152 enum { query_udp, query_tcpwait, query_tcpsent, query_child, query_done } state;
4353a5c4 153 adns_query back, next, parent;
37e28fde 154 struct { adns_query head, tail; } children;
155 struct { adns_query back, next; } siblings;
551ff40f 156 struct { allocnode *head, *tail; } allocations;
68442019 157 int interim_allocd;
158 void *final_allocspace;
0ba0614a 159
160 const typeinfo *typei;
e062dcae 161 byte *query_dgram;
8e5b0abb 162 int query_dglen;
31144a72 163
8e5b0abb 164 vbuf vb;
165 /* General-purpose messing-about buffer.
166 * Wherever a `big' interface is crossed, this may be corrupted/changed
167 * unless otherwise specified.
168 */
169
170 adns_answer *answer;
171 /* This is allocated when a query is submitted, to avoid being unable
172 * to relate errors to queries if we run out of memory. During
173 * query processing status, rrs is 0. cname is set if
174 * we found a cname (this corresponds to cname_dgram in the query
175 * structure). type is set from the word go. nrrs and rrs
176 * are set together, when we find how many rrs there are.
22181a31 177 * owner is set during querying unless we're doing searchlist,
178 * in which case it is set only when we find an answer.
8e5b0abb 179 */
31144a72 180
31144a72 181 byte *cname_dgram;
182 int cname_dglen, cname_begin;
3955725c 183 /* If non-0, has been allocated using . */
32af6b2a 184
185 vbuf search_vb;
186 int search_origlen, search_pos, search_doneabs;
187 /* Used by the searching algorithm. The query domain in textual form
188 * is copied into the vbuf, and _origlen set to its length. Then
189 * we walk the searchlist, if we want to. _pos says where we are
190 * (next entry to try), and _doneabs says whether we've done the
660d7d3b 191 * absolute query yet (0=not yet, 1=done, -1=must do straight away,
192 * but not done yet). If flags doesn't have adns_qf_search then
32af6b2a 193 * the vbuf is initialised but empty and everything else is zero.
32af6b2a 194 */
31144a72 195
ddfda861 196 int id, flags, udpretries;
4353a5c4 197 int udpnextserver;
198 unsigned long udpsent, tcpfailed; /* bitmap indexed by server */
37e28fde 199 struct timeval timeout;
73dba56e 200 time_t expires; /* Earliest expiry time of any record we used. */
a6536d8b 201
202 qcontext ctx;
ddfda861 203
37e28fde 204 /* Possible states:
ddfda861 205 *
8e5b0abb 206 * state Queue child id nextudpserver sentudp failedtcp
207 *
208 * udp NONE null >=0 0 zero zero
209 * udp timew null >=0 any nonzero zero
210 * udp NONE null >=0 any nonzero zero
211 *
212 * tcpwait timew null >=0 irrelevant zero any
213 * tcpsent timew null >=0 irrelevant zero any
214 *
215 * child childw set >=0 irrelevant irrelevant irrelevant
216 * done output null -1 irrelevant irrelevant irrelevant
ddfda861 217 *
218 * +------------------------+
219 * START -----> | udp/NONE |
220 * +------------------------+
221 * / |\ \
222 * too big for UDP / UDP timeout \ \ send via UDP
223 * do this ASAP! / more retries \ \ do this ASAP!
224 * |_ desired \ _|
225 * +---------------+ +-----------+
226 * | tcpwait/timew | ____ | udp/timew |
227 * +---------------+ \ +-----------+
228 * | ^ | | |
229 * TCP conn'd; | | TCP died | | |
230 * send via TCP | | more | UDP timeout | |
231 * do this ASAP! | | servers | no more | |
232 * v | to try | retries | |
233 * +---------------+ | desired | |
234 * | tcpsent/timew | ____ | | |
235 * +---------------+ \| | |
236 * \ \ TCP died | TCP | |
237 * \ \ no more | timeout / |
238 * \ \ servers | / |
239 * \ \ to try | / |
240 * got \ \ v |_ / got
241 * reply \ _| +------------------+ / reply
242 * \ | done/output FAIL | /
243 * \ +------------------+ /
244 * \ /
245 * _| |_
246 * (..... got reply ....)
247 * / \
248 * need child query/ies / \ no child query
249 * / \
250 * |_ _|
251 * +--------------+ +----------------+
252 * | child/childw | ----------------> | done/output OK |
253 * +--------------+ children done +----------------+
37e28fde 254 */
255};
256
37e28fde 257struct adns__state {
37e28fde 258 adns_initflags iflags;
259 FILE *diagfile;
36369543 260 int configerrno;
ddfda861 261 struct { adns_query head, tail; } timew, childw, output;
4353a5c4 262 int nextid, udpsocket, tcpsocket;
8e5b0abb 263 vbuf tcpsend, tcprecv;
660d7d3b 264 int nservers, nsortlist, nsearchlist, searchndots, tcpserver;
8402e34c 265 enum adns__tcpstate { server_disconnected, server_connecting, server_ok } tcpstate;
37e28fde 266 struct timeval tcptimeout;
ac868fa8 267 struct sigaction stdsigpipe;
268 sigset_t stdsigmask;
37e28fde 269 struct server {
270 struct in_addr addr;
271 } servers[MAXSERVERS];
09957b1c 272 struct sortlist {
273 struct in_addr base, mask;
274 } sortlist[MAXSORTLIST];
32af6b2a 275 char **searchlist;
37e28fde 276};
277
278/* From setup.c: */
279
e576be50 280int adns__setnonblock(adns_state ads, int fd); /* => errno value */
281
282/* From general.c: */
283
4353a5c4 284void adns__vdiag(adns_state ads, const char *pfx, adns_initflags prevent,
68442019 285 int serv, adns_query qu, const char *fmt, va_list al);
31144a72 286
287void adns__debug(adns_state ads, int serv, adns_query qu,
68442019 288 const char *fmt, ...) PRINTFFORMAT(4,5);
31144a72 289void adns__warn(adns_state ads, int serv, adns_query qu,
68442019 290 const char *fmt, ...) PRINTFFORMAT(4,5);
31144a72 291void adns__diag(adns_state ads, int serv, adns_query qu,
68442019 292 const char *fmt, ...) PRINTFFORMAT(4,5);
37e28fde 293
4353a5c4 294int adns__vbuf_ensure(vbuf *vb, int want);
9557e604 295int adns__vbuf_appendstr(vbuf *vb, const char *data); /* does not include nul */
4353a5c4 296int adns__vbuf_append(vbuf *vb, const byte *data, int len);
ddfda861 297/* 1=>success, 0=>realloc failed */
4353a5c4 298void adns__vbuf_appendq(vbuf *vb, const byte *data, int len);
299void adns__vbuf_init(vbuf *vb);
8e5b0abb 300void adns__vbuf_free(vbuf *vb);
4353a5c4 301
828d89bd 302const char *adns__diag_domain(adns_state ads, int serv, adns_query qu,
303 vbuf *vb, const byte *dgram, int dglen, int cbyte);
e576be50 304/* Unpicks a domain in a datagram and returns a string suitable for
305 * printing it as. Never fails - if an error occurs, it will
306 * return some kind of string describing the error.
307 *
3955725c 308 * serv may be -1 and qu may be 0. vb must have been initialised,
e576be50 309 * and will be left in an arbitrary consistent state.
310 *
311 * Returns either vb->buf, or a pointer to a string literal. Do not modify
312 * vb before using the return value.
313 */
314
88372443 315void adns__isort(void *array, int nobjs, int sz, void *tempbuf,
09957b1c 316 int (*needswap)(void *context, const void *a, const void *b),
317 void *context);
88372443 318/* Does an insertion sort of array which must contain nobjs objects
319 * each sz bytes long. tempbuf must point to a buffer at least
320 * sz bytes long. needswap should return !0 if a>b (strictly, ie
321 * wrong order) 0 if a<=b (ie, order is fine).
322 */
ac868fa8 323
324void adns__sigpipe_protect(adns_state);
325void adns__sigpipe_unprotect(adns_state);
326/* If SIGPIPE protection is not disabled, will block all signals except
327 * SIGPIPE, and set SIGPIPE's disposition to SIG_IGN. (And then restore.)
328 * Each call to _protect must be followed by a call to _unprotect before
329 * any significant amount of code gets to run.
330 */
331
e576be50 332/* From transmit.c: */
ddfda861 333
3955725c 334adns_status adns__mkquery(adns_state ads, vbuf *vb, int *id_r,
335 const char *owner, int ol,
e576be50 336 const typeinfo *typei, adns_queryflags flags);
660d7d3b 337/* Assembles a query packet in vb. A new id is allocated and returned.
338 */
e576be50 339
e062dcae 340adns_status adns__mkquery_frdgram(adns_state ads, vbuf *vb, int *id_r,
341 const byte *qd_dgram, int qd_dglen, int qd_begin,
342 adns_rrtype type, adns_queryflags flags);
343/* Same as adns__mkquery, but takes the owner domain from an existing datagram.
344 * That domain must be correct and untruncated.
345 */
346
3955725c 347void adns__query_tcp(adns_query qu, struct timeval now);
e576be50 348/* Query must be in state tcpwait/timew; it will be moved to a new state
349 * if possible and no further processing can be done on it for now.
350 * (Resulting state is one of tcpwait/timew (if server not connected),
351 * tcpsent/timew, child/childw or done/output.)
352 *
353 * adns__tcp_tryconnect should already have been called - _tcp
354 * will only use an existing connection (if there is one), which it
355 * may break. If the conn list lost then the caller is responsible for any
356 * reestablishment and retry.
357 */
358
3955725c 359void adns__query_udp(adns_query qu, struct timeval now);
e576be50 360/* Query must be in state udp/NONE; it will be moved to a new state,
361 * and no further processing can be done on it for now.
362 * (Resulting state is one of udp/timew, tcpwait/timew (if server not connected),
363 * tcpsent/timew, child/childw or done/output.)
364 */
365
366/* From query.c: */
37e28fde 367
660d7d3b 368adns_status adns__internal_submit(adns_state ads, adns_query *query_r,
369 const typeinfo *typei, vbuf *qumsg_vb, int id,
370 adns_queryflags flags, struct timeval now,
371 const qcontext *ctx);
8e5b0abb 372/* Submits a query (for internal use, called during external submits).
373 *
374 * The new query is returned in *query_r, or we return adns_s_nomemory.
375 *
68442019 376 * The query datagram should already have been assembled in qumsg_vb;
377 * the memory for it is _taken over_ by this routine whether it
378 * succeeds or fails (if it succeeds, the vbuf is reused for qu->vb).
8e5b0abb 379 *
7da21070 380 * *ctx is copied byte-for-byte into the query.
8e5b0abb 381 */
382
660d7d3b 383void adns__search_next(adns_state ads, adns_query qu, struct timeval now);
384/* Walks down the searchlist for a query with adns_qf_search.
385 * The query should have just had a negative response, or not had
386 * any queries sent yet, and should not be on any queue.
387 * The query_dgram if any will be freed and forgotten and a new
388 * one constructed from the search_* members of the query.
389 *
390 * Cannot fail (in case of error, calls adns__query_fail).
391 */
392
8e5b0abb 393void *adns__alloc_interim(adns_query qu, size_t sz);
394/* Allocates some memory, and records which query it came from
395 * and how much there was.
396 *
397 * If an error occurs in the query, all its memory is simply freed.
398 *
399 * If the query succeeds, one large buffer will be made which is
400 * big enough for all these allocations, and then adns__alloc_final
401 * will get memory from this buffer.
402 *
e062dcae 403 * _alloc_interim can fail (and return 0).
404 * The caller must ensure that the query is failed.
a49a6d7b 405 *
e062dcae 406 * adns__alloc_interim_{only,fail}(qu,0) will not return 0,
407 * but it will not necessarily return a distinct pointer each time.
8e5b0abb 408 */
409
551ff40f 410void adns__transfer_interim(adns_query from, adns_query to, void *block, size_t sz);
411/* Transfers an interim allocation from one query to another, so that
412 * the `to' query will have room for the data when we get to makefinal
413 * and so that the free will happen when the `to' query is freed
414 * rather than the `from' query.
415 *
416 * It is legal to call adns__transfer_interim with a null pointer; this
417 * has no effect.
73dba56e 418 *
419 * _transfer_interim also ensures that the expiry time of the `to' query
420 * is no later than that of the `from' query, so that child queries'
421 * TTLs get inherited by their parents.
551ff40f 422 */
423
3955725c 424void *adns__alloc_mine(adns_query qu, size_t sz);
425/* Like _interim, but does not record the length for later
426 * copying into the answer. This just ensures that the memory
427 * will be freed when we're done with the query.
428 */
429
8e5b0abb 430void *adns__alloc_final(adns_query qu, size_t sz);
a49a6d7b 431/* Cannot fail, and cannot return 0.
8e5b0abb 432 */
37e28fde 433
68442019 434void adns__makefinal_block(adns_query qu, void **blpp, size_t sz);
435void adns__makefinal_str(adns_query qu, char **strp);
436
3955725c 437void adns__reset_cnameonly(adns_query qu);
68442019 438/* Resets all of the memory management stuff etc. to
439 * take account of only the CNAME. Used when we find an error somewhere
440 * and want to just report the error (with perhaps CNAME info), and also
441 * when we're halfway through RRs in a datagram and discover that we
442 * need to retry the query.
443 */
e576be50 444
3955725c 445void adns__query_done(adns_query qu);
446void adns__query_fail(adns_query qu, adns_status stat);
68442019 447
4353a5c4 448/* From reply.c: */
449
98a3f706 450void adns__procdgram(adns_state ads, const byte *dgram, int len,
451 int serv, struct timeval now);
452
453/* From types.c: */
454
455const typeinfo *adns__findtype(adns_rrtype type);
456
457/* From parse.c: */
458
f1e474dd 459typedef struct {
68442019 460 adns_state ads;
3955725c 461 adns_query qu;
68442019 462 int serv;
f1e474dd 463 const byte *dgram;
464 int dglen, max, cbyte, namelen;
3955725c 465 int *dmend_r;
f1e474dd 466} findlabel_state;
467
3955725c 468void adns__findlabel_start(findlabel_state *fls, adns_state ads,
469 int serv, adns_query qu,
f1e474dd 470 const byte *dgram, int dglen, int max,
471 int dmbegin, int *dmend_rlater);
472/* Finds labels in a domain in a datagram.
473 *
474 * Call this routine first.
3955725c 475 * dmend_rlater may be null. ads (and of course fls) may not be.
476 * serv may be -1, qu may be null - they are for error reporting.
f1e474dd 477 */
478
3955725c 479adns_status adns__findlabel_next(findlabel_state *fls, int *lablen_r, int *labstart_r);
f1e474dd 480/* Then, call this one repeatedly.
481 *
482 * It will return adns_s_ok if all is well, and tell you the length
483 * and start of successive labels. labstart_r may be null, but
484 * lablen_r must not be.
485 *
486 * After the last label, it will return with *lablen_r zero.
487 * Do not then call it again; instead, just throw away the findlabel_state.
488 *
489 * *dmend_rlater will have been set to point to the next part of
490 * the datagram after the label (or after the uncompressed part,
491 * if compression was used). *namelen_rlater will have been set
492 * to the length of the domain name (total length of labels plus
493 * 1 for each intervening dot).
494 *
495 * If the datagram appears to be truncated, *lablen_r will be -1.
496 * *dmend_rlater, *labstart_r and *namelen_r may contain garbage.
497 * Do not call _next again.
498 *
499 * There may also be errors, in which case *dmend_rlater,
500 * *namelen_rlater, *lablen_r and *labstart_r may contain garbage.
501 * Do not then call findlabel_next again.
502 */
503
828d89bd 504typedef enum {
505 pdf_quoteok= 0x001
506} parsedomain_flags;
507
3955725c 508adns_status adns__parse_domain(adns_state ads, int serv, adns_query qu,
828d89bd 509 vbuf *vb, parsedomain_flags flags,
3955725c 510 const byte *dgram, int dglen, int *cbyte_io, int max);
f1e474dd 511/* vb must already have been initialised; it will be reset if necessary.
512 * If there is truncation, vb->used will be set to 0; otherwise
513 * (if there is no error) vb will be null-terminated.
514 * If there is an error vb and *cbyte_io may be left indeterminate.
3955725c 515 *
516 * serv may be -1 and qu may be 0 - they are used for error reporting only.
f1e474dd 517 */
518
eaa44731 519adns_status adns__parse_domain_more(findlabel_state *fls, adns_state ads,
520 adns_query qu, vbuf *vb, parsedomain_flags flags,
521 const byte *dgram);
522/* Like adns__parse_domain, but you pass it a pre-initialised findlabel_state,
523 * for continuing an existing domain or some such of some kind. Also, unlike
524 * _parse_domain, the domain data will be appended to vb, rather than replacing
525 * the existing contents.
526 */
527
3955725c 528adns_status adns__findrr(adns_query qu, int serv,
f1e474dd 529 const byte *dgram, int dglen, int *cbyte_io,
73dba56e 530 int *type_r, int *class_r, unsigned long *ttl_r,
531 int *rdlen_r, int *rdstart_r,
3955725c 532 int *ownermatchedquery_r);
c7836bc9 533/* Finds the extent and some of the contents of an RR in a datagram
534 * and does some checks. The datagram is *dgram, length dglen, and
535 * the RR starts at *cbyte_io (which is updated afterwards to point
536 * to the end of the RR).
537 *
73dba56e 538 * The type, class, TTL and RRdata length and start are returned iff
539 * the corresponding pointer variables are not null. type_r, class_r
540 * and ttl_r may not be null. The TTL will be capped.
c7836bc9 541 *
542 * If ownermatchedquery_r != 0 then the owner domain of this
543 * RR will be compared with that in the query (or, if the query
544 * has gone to a CNAME lookup, with the canonical name).
545 * In this case, *ownermatchedquery_r will be set to 0 or 1.
546 * The query datagram (or CNAME datagram) MUST be valid and not truncated.
547 *
548 * If there is truncation then *type_r will be set to -1 and
549 * *cbyte_io, *class_r, *rdlen_r, *rdstart_r and *eo_matched_r will be
550 * undefined.
551 *
552 * qu must obviously be non-null.
553 *
554 * If an error is returned then *type_r will be undefined too.
555 */
556
1dfe95d8 557adns_status adns__findrr_anychk(adns_query qu, int serv,
558 const byte *dgram, int dglen, int *cbyte_io,
73dba56e 559 int *type_r, int *class_r, unsigned long *ttl_r,
560 int *rdlen_r, int *rdstart_r,
1dfe95d8 561 const byte *eo_dgram, int eo_dglen, int eo_cbyte,
562 int *eo_matched_r);
c7836bc9 563/* Like adns__findrr_checked, except that the datagram and
564 * owner to compare with can be specified explicitly.
565 *
566 * If the caller thinks they know what the owner of the RR ought to
567 * be they can pass in details in eo_*: this is another (or perhaps
568 * the same datagram), and a pointer to where the putative owner
569 * starts in that datagram. In this case *eo_matched_r will be set
570 * to 1 if the datagram matched or 0 if it did not. Either
571 * both eo_dgram and eo_matched_r must both be non-null, or they
572 * must both be null (in which case eo_dglen and eo_cbyte will be ignored).
573 * The eo datagram and contained owner domain MUST be valid and
574 * untruncated.
575 */
98a3f706 576
73dba56e 577void adns__update_expires(adns_query qu, unsigned long ttl, struct timeval now);
578/* Updates the `expires' field in the query, so that it doesn't exceed
579 * now + ttl.
580 */
581
f1e474dd 582int vbuf__append_quoted1035(vbuf *vb, const byte *buf, int len);
8402e34c 583
584/* From event.c: */
4353a5c4 585
8402e34c 586void adns__tcp_broken(adns_state ads, const char *what, const char *why);
4353a5c4 587void adns__tcp_tryconnect(adns_state ads, struct timeval now);
e576be50 588
4353a5c4 589void adns__autosys(adns_state ads, struct timeval now);
e576be50 590/* Make all the system calls we want to if the application wants us to. */
37e28fde 591
592/* Useful static inline functions: */
593
594static inline void timevaladd(struct timeval *tv_io, long ms) {
595 struct timeval tmp;
596 assert(ms>=0);
597 tmp= *tv_io;
94436798 598 tmp.tv_usec += (ms%1000)*1000000;
37e28fde 599 tmp.tv_sec += ms/1000;
94436798 600 if (tmp.tv_usec >= 1000000) { tmp.tv_sec++; tmp.tv_usec -= 1000; }
37e28fde 601 *tv_io= tmp;
ddfda861 602}
37e28fde 603
604static inline int ctype_whitespace(int c) { return c==' ' || c=='\n' || c=='\t'; }
605static inline int ctype_digit(int c) { return c>='0' && c<='9'; }
98a3f706 606static inline int ctype_alpha(int c) {
607 return (c >= 'a' && c <= 'z') || (c >= 'A' || c <= 'Z');
608}
37e28fde 609
610/* Useful macros */
611
8e5b0abb 612#define MEM_ROUND(sz) \
613 (( ((sz)+sizeof(union maxalign)-1) / sizeof(union maxalign) ) \
614 * sizeof(union maxalign) )
615
4353a5c4 616#define LIST_INIT(list) ((list).head= (list).tail= 0)
660d7d3b 617#define LINK_INIT(link) ((link).next= (link).back= 0)
4353a5c4 618
37e28fde 619#define LIST_UNLINK_PART(list,node,part) \
620 do { \
551ff40f 621 if ((node)->part back) (node)->part back->part next= (node)->part next; \
622 else (list).head= (node)->part next; \
623 if ((node)->part next) (node)->part next->part back= (node)->part back; \
624 else (list).tail= (node)->part back; \
37e28fde 625 } while(0)
626
627#define LIST_LINK_TAIL_PART(list,node,part) \
628 do { \
86e7b8d9 629 (node)->part next= 0; \
630 (node)->part back= (list).tail; \
7da21070 631 if ((list).tail) (list).tail->part next= (node); else (list).head= (node); \
37e28fde 632 (list).tail= (node); \
633 } while(0)
634
635#define LIST_UNLINK(list,node) LIST_UNLINK_PART(list,node,)
4353a5c4 636#define LIST_LINK_TAIL(list,node) LIST_LINK_TAIL_PART(list,node,)
37e28fde 637
86e7b8d9 638#define GETIL_B(cb) (((dgram)[(cb)++]) & 0x0ff)
98a3f706 639#define GET_B(cb,tv) ((tv)= GETIL_B((cb)))
640#define GET_W(cb,tv) ((tv)=0, (tv)|=(GETIL_B((cb))<<8), (tv)|=GETIL_B(cb), (tv))
73dba56e 641#define GET_L(cb,tv) ( (tv)=0, \
642 (tv)|=(GETIL_B((cb))<<24), \
643 (tv)|=(GETIL_B((cb))<<16), \
644 (tv)|=(GETIL_B((cb))<<8), \
645 (tv)|=GETIL_B(cb), \
646 (tv) )
98a3f706 647
37e28fde 648#endif