Config parsing: Provide a way to ignore unknown resolv.conf contents
[adns] / src / adns.h
1 /*
2 * adns.h
3 * - adns user-visible API
4 */
5 /*
6 *
7 * This file is
8 * Copyright (C) 1997-2000,2003,2006,2014 Ian Jackson
9 *
10 * It is part of adns, which is
11 * Copyright (C) 1997-2000,2003,2006,2014 Ian Jackson
12 * Copyright (C) 1999-2000,2003,2006 Tony Finch
13 * Copyright (C) 1991 Massachusetts Institute of Technology
14 *
15 * This program is free software; you can redistribute it and/or modify
16 * it under the terms of the GNU General Public License as published by
17 * the Free Software Foundation; either version 3, or (at your option)
18 * any later version.
19 *
20 * This program is distributed in the hope that it will be useful,
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
23 * GNU General Public License for more details.
24 *
25 *
26 * For the benefit of certain LGPL'd `omnibus' software which
27 * provides a uniform interface to various things including adns, I
28 * make the following additional licence. I do this because the GPL
29 * would otherwise force either the omnibus software to be GPL'd or
30 * the adns-using part to be distributed separately.
31 *
32 * So: you may also redistribute and/or modify adns.h (but only the
33 * public header file adns.h and not any other part of adns) under the
34 * terms of the GNU Library General Public License as published by the
35 * Free Software Foundation; either version 2 of the License, or (at
36 * your option) any later version.
37 *
38 * Note that adns itself is GPL'd. Authors of adns-using applications
39 * with GPL-incompatible licences, and people who distribute adns with
40 * applications where the whole distribution is not GPL'd, are still
41 * likely to be in violation of the GPL. Anyone who wants to do this
42 * should contact Ian Jackson. Please note that to avoid encouraging
43 * people to infringe the GPL as it applies to the body of adns, Ian
44 * thinks that if you take advantage of the special exception to
45 * redistribute just adns.h under the LGPL, you should retain this
46 * paragraph in its place in the appropriate copyright statements.
47 *
48 *
49 * You should have received a copy of the GNU General Public License,
50 * or the GNU Library General Public License, as appropriate, along
51 * with this program; if not, write to the Free Software Foundation.
52 *
53 */
54
55 #ifndef ADNS_H_INCLUDED
56 #define ADNS_H_INCLUDED
57
58 #include <stdio.h>
59 #include <stdarg.h>
60
61 #include <sys/types.h>
62 #include <sys/socket.h>
63 #include <netinet/in.h>
64 #include <sys/time.h>
65 #include <unistd.h>
66 #include <net/if.h>
67
68 #ifdef __cplusplus
69 extern "C" { /* I really dislike this - iwj. */
70 #endif
71
72 /* Whether to support address families other than IPv4 in responses which use
73 * the `adns_rr_addr' structure. This is a source-compatibility issue: old
74 * clients may not expect to find address families other than AF_INET in
75 * their query results. There's a separate binary compatibility issue to do
76 * with the size of the `adns_rr_addr' structure, but we'll assume you can
77 * cope with that because you have this header file. Define
78 * `ADNS_FEATURE_IPV4ONLY' if you only want to see AF_INET addresses by
79 * default, or `ADNS_FEATURE_MANYAF' to allow multiple address families; the
80 * default is currently to stick with AF_INET only, but this is likely to
81 * change in a later release of ADNS. Note that any adns_qf_want_... flags
82 * in your query are observed: this setting affects only the default address
83 * families.
84 */
85 #if !defined(ADNS_FEATURE_IPV4ONLY) && !defined(ADNS_FEATURE_MANYAF)
86 # define ADNS_FEATURE_IPV4ONLY
87 #elif defined(ADNS_FEATURE_IPV4ONLY) && defined(ADNS_FEATURE_MANYAF)
88 # error "Feature flags ADNS_FEATURE_IPV4ONLY and ..._MANYAF are incompatible"
89 #endif
90
91 /* All struct in_addr anywhere in adns are in NETWORK byte order. */
92
93 typedef struct adns__state *adns_state;
94 typedef struct adns__query *adns_query;
95
96 typedef enum { /* In general, or together the desired flags: */
97 adns_if_none= 0x0000,/* no flags. nicer than 0 for some compilers */
98 adns_if_noenv= 0x0001,/* do not look at environment */
99 adns_if_noerrprint= 0x0002,/* never print to stderr (_debug overrides) */
100 adns_if_noserverwarn=0x0004,/* do not warn to stderr about duff servers etc */
101 adns_if_debug= 0x0008,/* enable all output to stderr plus debug msgs */
102 adns_if_logpid= 0x0080,/* include pid in diagnostic output */
103 adns_if_noautosys= 0x0010,/* do not make syscalls at every opportunity */
104 adns_if_eintr= 0x0020,/* allow _wait and _synchronous to return EINTR */
105 adns_if_nosigpipe= 0x0040,/* applic has SIGPIPE ignored, do not protect */
106 adns_if_checkc_entex=0x0100,/* consistency checks on entry/exit to adns fns */
107 adns_if_checkc_freq= 0x0300,/* consistency checks very frequently (slow!) */
108
109 adns_if_permit_ipv4= 0x0400,/* allow _addr queries to return IPv4 addresses */
110 adns_if_permit_ipv6= 0x0800,/* allow _addr queries to return IPv6 addresses */
111 adns_if_afmask= 0x0c00,
112 /* These are policy flags, and overridden by the adns_af:... option in
113 * resolv.conf. If the adns_qf_want_... query flags are incompatible with
114 * these settings (in the sense that no address families are permitted at
115 * all) then the query flags take precedence; otherwise only records which
116 * satisfy all of the stated requirements are allowed.
117 */
118 adns__if_sizeforce= 0x7fff,
119 } adns_initflags;
120
121 typedef enum { /* In general, or together the desired flags: */
122 adns_qf_none= 0x00000000,/* no flags */
123 adns_qf_search= 0x00000001,/* use the searchlist */
124 adns_qf_usevc= 0x00000002,/* use a virtual circuit (TCP conn) */
125 adns_qf_owner= 0x00000004,/* fill in the owner field in the answer */
126 adns_qf_quoteok_query= 0x00000010,/* allow special chars in query domain */
127 adns_qf_quoteok_cname= 0x00000000,/* ... in CNAME we go via (now default) */
128 adns_qf_quoteok_anshost=0x00000040,/* ... in things supposedly hostnames */
129 adns_qf_quotefail_cname=0x00000080,/* refuse if quote-req chars in CNAME we go via */
130 adns_qf_cname_loose= 0x00000100,/* allow refs to CNAMEs - without, get _s_cname */
131 adns_qf_cname_strict= 0x00010000,/* forbid CNAME refs (default, currently) */
132 adns_qf_cname_forbid= 0x00000200,/* don't follow CNAMEs, instead give _s_cname */
133
134 adns_qf_want_ipv4= 0x00000400,/* try to return IPv4 addresses */
135 adns_qf_want_ipv6= 0x00000800,/* try to return IPv6 addresses */
136 adns_qf_want_allaf= 0x00000c00,/* all the above flag bits */
137 /* Without any of the _qf_want_... flags, _qtf_deref queries try to return
138 * all address families permitted by _if_permit_... (as overridden by the
139 * `adns_af:...' configuration option). Set flags to restrict the
140 * returned address families to the ones selected.
141 */
142 adns_qf_ipv6_mapv4= 0x00001000,/* ... return IPv4 addresses as v6-mapped */
143
144 adns_qf_addrlit_scope_forbid=0x00002000,/* forbid %<scope> in IPv6 literals */
145 adns_qf_addrlit_scope_numeric=0x00004000,/* %<scope> may only be numeric */
146 adns_qf_addrlit_ipv4_quadonly=0x00008000,/* reject non-dotted-quad ipv4 */
147
148 adns__qf_internalmask= 0x0ff00000,
149 adns__qf_sizeforce= 0x7fffffff
150 } adns_queryflags;
151
152 typedef enum {
153 adns_rrt_typemask= 0x0ffff,
154 adns_rrt_reprmask= 0xffffff,
155 adns__qtf_deref_bit=0x10000,/* internal version of ..._deref below */
156 adns__qtf_mail822= 0x20000,/* return mailboxes in RFC822 rcpt field fmt */
157
158 adns__qtf_bigaddr=0x1000000,/* use the new larger sockaddr union */
159 adns__qtf_manyaf= 0x2000000,/* permitted to return multiple address families */
160
161 adns__qtf_deref= adns__qtf_deref_bit|adns__qtf_bigaddr
162 #ifdef ADNS_FEATURE_MANYAF
163 |adns__qtf_manyaf
164 #endif
165 ,/* dereference domains; perhaps get extra data */
166
167 adns_r_unknown= 0x40000,
168 /* To use this, ask for records of type <rr-type-code>|adns_r_unknown.
169 * adns will not process the RDATA - you'll get adns_rr_byteblocks,
170 * where the int is the length and the unsigned char* points to the
171 * data. String representation of the RR data (by adns_rrinfo) is as in
172 * RFC3597. adns_rr_info will not return the type name in *rrtname_r
173 * (due to memory management problems); *fmtname_r will be set to
174 * "unknown".
175 *
176 * Do not specify adns_r_unknown along with a known RR type which
177 * requires domain name uncompression (see RFC3597 s4); domain names
178 * will not be uncompressed and the resulting data would be useless.
179 * Asking for meta-RR types via adns_r_unknown will not work properly
180 * either and may make adns complain about server misbehaviour, so don't
181 * do that.
182 *
183 * Don't forget adns_qf_quoteok if that's what you want. */
184
185 adns_r_none= 0,
186
187 adns_r_a= 1,
188
189 adns_r_ns_raw= 2,
190 adns_r_ns= adns_r_ns_raw|adns__qtf_deref,
191
192 adns_r_cname= 5,
193
194 adns_r_soa_raw= 6,
195 adns_r_soa= adns_r_soa_raw|adns__qtf_mail822,
196
197 adns_r_ptr_raw= 12, /* do not mind PTR with wrong or missing addr */
198 adns_r_ptr= adns_r_ptr_raw|adns__qtf_deref,
199
200 adns_r_hinfo= 13,
201
202 adns_r_mx_raw= 15,
203 adns_r_mx= adns_r_mx_raw|adns__qtf_deref,
204
205 adns_r_txt= 16,
206
207 adns_r_rp_raw= 17,
208 adns_r_rp= adns_r_rp_raw|adns__qtf_mail822,
209
210 adns_r_aaaa= 28,
211
212 /* For SRV records, query domain without _qf_quoteok_query must look
213 * as expected from SRV RFC with hostname-like Name. _With_
214 * _quoteok_query, any query domain is allowed. */
215 adns_r_srv_raw= 33,
216 adns_r_srv= adns_r_srv_raw|adns__qtf_deref,
217
218 adns_r_addr= adns_r_a|adns__qtf_deref,
219
220 adns__rrt_sizeforce= 0x7fffffff,
221
222 } adns_rrtype;
223
224 /*
225 * In queries without qf_quoteok_*, all domains must have standard
226 * legal syntax, or you get adns_s_querydomainvalid (if the query
227 * domain contains bad characters) or adns_s_answerdomaininvalid (if
228 * the answer contains bad characters).
229 *
230 * In queries _with_ qf_quoteok_*, domains in the query or response
231 * may contain any characters, quoted according to RFC1035 5.1. On
232 * input to adns, the char* is a pointer to the interior of a "
233 * delimited string, except that " may appear in it unquoted. On
234 * output, the char* is a pointer to a string which would be legal
235 * either inside or outside " delimiters; any character which isn't
236 * legal in a hostname (ie alphanumeric or hyphen) or one of _ / +
237 * (the three other punctuation characters commonly abused in domain
238 * names) will be quoted, as \X if it is a printing ASCII character or
239 * \DDD otherwise.
240 *
241 * If the query goes via a CNAME then the canonical name (ie, the
242 * thing that the CNAME record refers to) is usually allowed to
243 * contain any characters, which will be quoted as above. With
244 * adns_qf_quotefail_cname you get adns_s_answerdomaininvalid when
245 * this happens. (This is a change from version 0.4 and earlier, in
246 * which failing the query was the default, and you had to say
247 * adns_qf_quoteok_cname to avoid this; that flag is now deprecated.)
248 *
249 * In version 0.4 and earlier, asking for _raw records containing
250 * mailboxes without specifying _qf_quoteok_anshost was silly. This
251 * is no longer the case. In this version only parts of responses
252 * that are actually supposed to be hostnames will be refused by
253 * default if quote-requiring characters are found.
254 */
255
256 /*
257 * If you ask for an RR which contains domains which are actually
258 * encoded mailboxes, and don't ask for the _raw version, then adns
259 * returns the mailbox formatted suitably for an RFC822 recipient
260 * header field. The particular format used is that if the mailbox
261 * requires quoting according to the rules in RFC822 then the
262 * local-part is quoted in double quotes, which end at the next
263 * unescaped double quote (\ is the escape char, and is doubled, and
264 * is used to escape only \ and "). If the local-part is legal
265 * without quoting according to RFC822, it is presented as-is. In any
266 * case the local-part is followed by an @ and the domain. The domain
267 * will not contain any characters not legal in hostnames.
268 *
269 * Unquoted local-parts may contain any printing 7-bit ASCII
270 * except the punctuation characters ( ) < > @ , ; : \ " [ ]
271 * I.e. they may contain alphanumerics, and the following
272 * punctuation characters: ! # % ^ & * - _ = + { } .
273 *
274 * adns will reject local parts containing control characters (byte
275 * values 0-31, 127-159, and 255) - these appear to be legal according
276 * to RFC822 (at least 0-127) but are clearly a bad idea. RFC1035
277 * syntax does not make any distinction between a single RFC822
278 * quoted-string containing full stops, and a series of quoted-strings
279 * separated by full stops; adns will return anything that isn't all
280 * valid atoms as a single quoted-string. RFC822 does not allow
281 * high-bit-set characters at all, but adns does allow them in
282 * local-parts, treating them as needing quoting.
283 *
284 * If you ask for the domain with _raw then _no_ checking is done
285 * (even on the host part, regardless of adns_qf_quoteok_anshost), and
286 * you just get the domain name in master file format.
287 *
288 * If no mailbox is supplied the returned string will be `.' in either
289 * case.
290 */
291
292 typedef enum {
293 adns_s_ok,
294
295 /* locally induced errors */
296 adns_s_nomemory,
297 adns_s_unknownrrtype,
298 adns_s_systemfail,
299
300 adns_s_max_localfail= 29,
301
302 /* remotely induced errors, detected locally */
303 adns_s_timeout,
304 adns_s_allservfail,
305 adns_s_norecurse,
306 adns_s_invalidresponse,
307 adns_s_unknownformat,
308
309 adns_s_max_remotefail= 59,
310
311 /* remotely induced errors, reported by remote server to us */
312 adns_s_rcodeservfail,
313 adns_s_rcodeformaterror,
314 adns_s_rcodenotimplemented,
315 adns_s_rcoderefused,
316 adns_s_rcodeunknown,
317
318 adns_s_max_tempfail= 99,
319
320 /* remote configuration errors */
321 adns_s_inconsistent, /* PTR gives domain whose addr is missing or mismatch */
322 adns_s_prohibitedcname, /* CNAME, but eg A expected (not if _qf_cname_loose) */
323 adns_s_answerdomaininvalid,
324 adns_s_answerdomaintoolong,
325 adns_s_invaliddata,
326
327 adns_s_max_misconfig= 199,
328
329 /* permanent problems with the query */
330 adns_s_querydomainwrong,
331 adns_s_querydomaininvalid,
332 adns_s_querydomaintoolong,
333
334 adns_s_max_misquery= 299,
335
336 /* permanent errors */
337 adns_s_nxdomain,
338 adns_s_nodata,
339
340 adns_s_max_permfail= 499
341
342 } adns_status;
343
344 typedef union {
345 struct sockaddr sa;
346 struct sockaddr_in inet;
347 } adns_sockaddr_v4only;
348
349 typedef union {
350 struct sockaddr sa;
351 struct sockaddr_in inet;
352 struct sockaddr_in6 inet6;
353 } adns_sockaddr;
354
355 typedef struct {
356 int len;
357 adns_sockaddr addr;
358 } adns_rr_addr;
359
360 typedef struct {
361 /* the old v4-only structure; handy if you have complicated binary
362 * compatibility problems. */
363 int len;
364 adns_sockaddr_v4only addr;
365 } adns_rr_addr_v4only;
366
367 typedef struct {
368 char *host;
369 adns_status astatus;
370 int naddrs; /* temp fail => -1, perm fail => 0, s_ok => >0 */
371 adns_rr_addr *addrs;
372 } adns_rr_hostaddr;
373
374 typedef struct {
375 char *(array[2]);
376 } adns_rr_strpair;
377
378 typedef struct {
379 int i;
380 adns_rr_hostaddr ha;
381 } adns_rr_inthostaddr;
382
383 typedef struct {
384 /* Used both for mx_raw, in which case i is the preference and str
385 * the domain, and for txt, in which case each entry has i for the
386 * `text' length, and str for the data (which will have had an extra
387 * nul appended so that if it was plain text it is now a
388 * null-terminated string).
389 */
390 int i;
391 char *str;
392 } adns_rr_intstr;
393
394 typedef struct {
395 adns_rr_intstr array[2];
396 } adns_rr_intstrpair;
397
398 typedef struct {
399 char *mname, *rname;
400 unsigned long serial, refresh, retry, expire, minimum;
401 } adns_rr_soa;
402
403 typedef struct {
404 int priority, weight, port;
405 char *host;
406 } adns_rr_srvraw;
407
408 typedef struct {
409 int priority, weight, port;
410 adns_rr_hostaddr ha;
411 } adns_rr_srvha;
412
413 typedef struct {
414 int len;
415 unsigned char *data;
416 } adns_rr_byteblock;
417
418 typedef struct {
419 adns_status status;
420 char *cname; /* always NULL if query was for CNAME records */
421 char *owner; /* only set if req'd in query flags; maybe 0 on error anyway */
422 adns_rrtype type; /* guaranteed to be same as in query */
423 time_t expires;/*abs time. def only if _s_ok, nxdomain or nodata. NOT TTL!*/
424 int nrrs, rrsz; /* nrrs is 0 if an error occurs */
425 union {
426 void *untyped;
427 unsigned char *bytes;
428 char *(*str); /* ns_raw, cname, ptr, ptr_raw */
429 adns_rr_intstr *(*manyistr); /* txt (list strs ends with i=-1, str=0)*/
430 adns_rr_addr *addr; /* addr */
431 struct in_addr *inaddr; /* a */
432 struct in6_addr *in6addr; /* aaaa */
433 adns_rr_hostaddr *hostaddr; /* ns */
434 adns_rr_intstrpair *intstrpair; /* hinfo */
435 adns_rr_strpair *strpair; /* rp, rp_raw */
436 adns_rr_inthostaddr *inthostaddr;/* mx */
437 adns_rr_intstr *intstr; /* mx_raw */
438 adns_rr_soa *soa; /* soa, soa_raw */
439 adns_rr_srvraw *srvraw; /* srv_raw */
440 adns_rr_srvha *srvha;/* srv */
441 adns_rr_byteblock *byteblock; /* ...|unknown */
442 } rrs;
443 } adns_answer;
444
445 /* Memory management:
446 * adns_state and adns_query are actually pointers to malloc'd state;
447 * On submission questions are copied, including the owner domain;
448 * Answers are malloc'd as a single piece of memory; pointers in the
449 * answer struct point into further memory in the answer.
450 * query_io:
451 * Must always be non-null pointer;
452 * If *query_io is 0 to start with then any query may be returned;
453 * If *query_io is !0 adns_query then only that query may be returned.
454 * If the call is successful, *query_io, *answer_r, and *context_r
455 * will all be set.
456 * Errors:
457 * Return values are 0 or an errno value.
458 *
459 * For _init, _init_strcfg, _submit and _synchronous, system errors
460 * (eg, failure to create sockets, malloc failure, etc.) return errno
461 * values. EINVAL from _init et al means the configuration file
462 * is erroneous and cannot be parsed.
463 *
464 * For _wait and _check failures are reported in the answer
465 * structure, and only 0, ESRCH or (for _check) EAGAIN is
466 * returned: if no (appropriate) requests are done adns_check returns
467 * EAGAIN; if no (appropriate) requests are outstanding both
468 * adns_query and adns_wait return ESRCH.
469 *
470 * Additionally, _wait can return EINTR if you set adns_if_eintr.
471 *
472 * All other errors (nameserver failure, timed out connections, &c)
473 * are returned in the status field of the answer. After a
474 * successful _wait or _check, if status is nonzero then nrrs will be
475 * 0, otherwise it will be >0. type will always be the type
476 * requested.
477 */
478
479 /* Threads:
480 * adns does not use any static modifiable state, so it
481 * is safe to call adns_init several times and then use the
482 * resulting adns_states concurrently.
483 * However, it is NOT safe to make simultaneous calls into
484 * adns using the same adns_state; a single adns_state must be used
485 * only by one thread at a time. You can solve this problem by
486 * having one adns_state per thread, or if that isn't feasible, you
487 * could maintain a pool of adns_states. Unfortunately neither of
488 * these approaches has optimal performance.
489 */
490
491 int adns_init(adns_state *newstate_r, adns_initflags flags,
492 FILE *diagfile /*0=>stderr*/);
493
494 int adns_init_strcfg(adns_state *newstate_r, adns_initflags flags,
495 FILE *diagfile /*0=>discard*/, const char *configtext);
496
497 typedef void adns_logcallbackfn(adns_state ads, void *logfndata,
498 const char *fmt, va_list al);
499 /* Will be called perhaps several times for each message; when the
500 * message is complete, the string implied by fmt and al will end in
501 * a newline. Log messages start with `adns debug:' or `adns
502 * warning:' or `adns:' (for errors), or `adns debug [PID]:'
503 * etc. if adns_if_logpid is set. */
504
505 int adns_init_logfn(adns_state *newstate_r, adns_initflags flags,
506 const char *configtext /*0=>use default config files*/,
507 adns_logcallbackfn *logfn /*0=>logfndata is a FILE* */,
508 void *logfndata /*0 with logfn==0 => discard*/);
509
510 /* Configuration:
511 * adns_init reads /etc/resolv.conf, which is expected to be (broadly
512 * speaking) in the format expected by libresolv, and then
513 * /etc/resolv-adns.conf if it exists. adns_init_strcfg is instead
514 * passed a string which is interpreted as if it were the contents of
515 * resolv.conf or resolv-adns.conf. In general, configuration which
516 * is set later overrides any that is set earlier.
517 *
518 * Standard directives understood in resolv[-adns].conf:
519 *
520 * nameserver <address>
521 * Must be followed by the IP address of a nameserver. Several
522 * nameservers may be specified, and they will be tried in the order
523 * found. There is a compiled in limit, currently 5, on the number
524 * of nameservers. (libresolv supports only 3 nameservers.)
525 *
526 * search <domain> ...
527 * Specifies the search list for queries which specify
528 * adns_qf_search. This is a list of domains to append to the query
529 * domain. The query domain will be tried as-is either before all
530 * of these or after them, depending on the ndots option setting
531 * (see below).
532 *
533 * domain <domain>
534 * This is present only for backward compatibility with obsolete
535 * versions of libresolv. It should not be used, and is interpreted
536 * by adns as if it were `search' - note that this is subtly
537 * different to libresolv's interpretation of this directive.
538 *
539 * sortlist <addr>/<mask> ...
540 * Should be followed by a sequence of IP-address and netmask pairs,
541 * separated by spaces. They may be specified as
542 * eg. 172.30.206.0/24 or 172.30.206.0/255.255.255.0. Currently up
543 * to 15 pairs may be specified (but note that libresolv only
544 * supports up to 10).
545 *
546 * options
547 * Should followed by one or more options, separated by spaces.
548 * Each option consists of an option name, followed by optionally
549 * a colon and a value. Options are listed below.
550 *
551 * Non-standard directives understood in resolv[-adns].conf:
552 *
553 * clearnameservers
554 * Clears the list of nameservers, so that further nameserver lines
555 * start again from the beginning.
556 *
557 * include <filename>
558 * The specified file will be read.
559 *
560 * Additionally, adns will ignore lines in resolv[-adns].conf which
561 * start with a #.
562 *
563 * Standard options understood:
564 *
565 * debug
566 * Enables debugging output from the resolver, which will be written
567 * to stderr.
568 *
569 * ndots:<count>
570 * Affects whether queries with adns_qf_search will be tried first
571 * without adding domains from the searchlist, or whether the bare
572 * query domain will be tried last. Queries which contain at least
573 * <count> dots will be tried bare first. The default is 1.
574 *
575 * Non-standard options understood:
576 *
577 * adns_checkc:none
578 * adns_checkc:entex
579 * adns_checkc:freq
580 * Changes the consistency checking frequency; this overrides the
581 * setting of adns_if_check_entex, adns_if_check_freq, or neither,
582 * in the flags passed to adns_init.
583 *
584 * adns_af:{ipv4,ipv6},... adns_af:any
585 * Determines which address families ADNS looks up (either as an
586 * adns_r_addr query, or when dereferencing an answer yielding hostnames
587 * (e.g., adns_r_mx). The argument is a comma-separated list: only the
588 * address families listed will be looked up. The default is `any'.
589 * Lookups occur (logically) concurrently; use the `sortlist' directive to
590 * control the relative order of addresses in answers. This option
591 * overrides the corresponding init flags (covered by adns_if_afmask).
592 *
593 * adns_ignoreunkcfg
594 * Ignore unknown options and configuration directives, rather than
595 * logging them. To be effective, appear in the configuration
596 * before the unknown options. ADNS_RES_OPTIONS is generally early
597 * enough.
598 *
599 * There are a number of environment variables which can modify the
600 * behaviour of adns. They take effect only if adns_init is used, and
601 * the caller of adns_init can disable them using adns_if_noenv. In
602 * each case there is both a FOO and an ADNS_FOO; the latter is
603 * interpreted later so that it can override the former. Unless
604 * otherwise stated, environment variables are interpreted after
605 * resolv[-adns].conf are read, in the order they are listed here.
606 *
607 * RES_CONF, ADNS_RES_CONF
608 * A filename, whose contets are in the format of resolv.conf.
609 *
610 * RES_CONF_TEXT, ADNS_RES_CONF_TEXT
611 * A string in the format of resolv.conf.
612 *
613 * RES_OPTIONS, ADNS_RES_OPTIONS
614 * These are parsed as if they appeared in the `options' line of a
615 * resolv.conf. In addition to being parsed at this point in the
616 * sequence, they are also parsed at the very beginning before
617 * resolv.conf or any other environment variables are read, so that
618 * any debug option can affect the processing of the configuration.
619 *
620 * LOCALDOMAIN, ADNS_LOCALDOMAIN
621 * These are interpreted as if their contents appeared in a `search'
622 * line in resolv.conf.
623 */
624
625 int adns_synchronous(adns_state ads,
626 const char *owner,
627 adns_rrtype type,
628 adns_queryflags flags,
629 adns_answer **answer_r);
630
631 /* NB: if you set adns_if_noautosys then _submit and _check do not
632 * make any system calls; you must use some of the asynch-io event
633 * processing functions to actually get things to happen.
634 */
635
636 int adns_submit(adns_state ads,
637 const char *owner,
638 adns_rrtype type,
639 adns_queryflags flags,
640 void *context,
641 adns_query *query_r);
642
643 /* The owner should be quoted in master file format. */
644
645 int adns_check(adns_state ads,
646 adns_query *query_io,
647 adns_answer **answer_r,
648 void **context_r);
649
650 int adns_wait(adns_state ads,
651 adns_query *query_io,
652 adns_answer **answer_r,
653 void **context_r);
654
655 /* same as adns_wait but uses poll(2) internally */
656 int adns_wait_poll(adns_state ads,
657 adns_query *query_io,
658 adns_answer **answer_r,
659 void **context_r);
660
661 void adns_cancel(adns_query query);
662
663 /* The adns_query you get back from _submit is valid (ie, can be
664 * legitimately passed into adns functions) until it is returned by
665 * adns_check or adns_wait, or passed to adns_cancel. After that it
666 * must not be used. You can rely on it not being reused until the
667 * first adns_submit or _transact call using the same adns_state after
668 * it became invalid, so you may compare it for equality with other
669 * query handles until you next call _query or _transact.
670 *
671 * _submit and _synchronous return ENOSYS if they don't understand the
672 * query type.
673 */
674
675 int adns_submit_reverse(adns_state ads,
676 const struct sockaddr *addr,
677 adns_rrtype type,
678 adns_queryflags flags,
679 void *context,
680 adns_query *query_r);
681 /* type must be _r_ptr or _r_ptr_raw. _qf_search is ignored.
682 * addr->sa_family must be AF_INET or you get ENOSYS.
683 */
684
685 int adns_submit_reverse_any(adns_state ads,
686 const struct sockaddr *addr,
687 const char *rzone,
688 adns_rrtype type,
689 adns_queryflags flags,
690 void *context,
691 adns_query *query_r);
692 /* For RBL-style reverse `zone's; look up
693 * <reversed-address>.<zone>
694 * Any type is allowed. _qf_search is ignored.
695 * addr->sa_family must be AF_INET or you get ENOSYS.
696 */
697
698 void adns_finish(adns_state ads);
699 /* You may call this even if you have queries outstanding;
700 * they will be cancelled.
701 */
702
703 #define ADNS_ADDR2TEXT_BUFLEN \
704 (INET6_ADDRSTRLEN + 1/*%*/ \
705 + ((IF_NAMESIZE-1) > 9 ? (IF_NAMESIZE-1) : 9/*uint32*/) \
706 + 1/* nul; included in IF_NAMESIZE */)
707
708 int adns_text2addr(const char *text, uint16_t port, adns_queryflags flags,
709 struct sockaddr *sa_r,
710 socklen_t *salen_io /* updated iff OK or ENOSPC */);
711 int adns_addr2text(const struct sockaddr *sa, adns_queryflags flags,
712 char *buffer, int *buflen_io /* updated ONLY on ENOSPC */,
713 int *port_r /* may be 0 */);
714 /*
715 * port is always in host byte order and is simply copied to and
716 * from the appropriate sockaddr field (byteswapped as necessary).
717 *
718 * The only flags supported are adns_qf_addrlit_...
719 *
720 * Error return values are:
721 *
722 * ENOSPC Output buffer is too small. Can only happen if
723 * *buflen_io < ADNS_ADDR2TEXT_BUFLEN or
724 * *salen_io < sizeof(adns_sockaddr). On return,
725 * *buflen_io or *salen_io has been updated by adns.
726 *
727 * EINVAL text has invalid syntax.
728 *
729 * text represents an address family not supported by
730 * this version of adns.
731 *
732 * Scoped address supplied (text contained "%" or
733 * sin6_scope_id nonzero) but caller specified
734 * adns_qf_addrlit_scope_forbid.
735 *
736 * Scope name (rather than number) supplied in text but
737 * caller specified adns_qf_addrlit_scope_numeric.
738 *
739 * EAFNOSUPPORT sa->sa_family is not supported (addr2text only).
740 *
741 * ENOSYS Unsupported flags set.
742 *
743 * Only if neither adns_qf_addrlit_scope_forbid nor
744 * adns_qf_addrlit_scope_numeric are set:
745 *
746 * ENOSYS Scope name supplied in text but IPv6 address part of
747 * sockaddr is not a link local address.
748 *
749 * ENXIO Scope name supplied in text but if_nametoindex
750 * said it wasn't a valid local interface name.
751 *
752 * EIO Scoped address supplied but if_nametoindex failed
753 * in an unexpected way; adns has printed a message to
754 * stderr.
755 *
756 * any other if_nametoindex failed in a more-or-less expected way.
757 */
758
759 void adns_forallqueries_begin(adns_state ads);
760 adns_query adns_forallqueries_next(adns_state ads, void **context_r);
761 /* Iterator functions, which you can use to loop over the outstanding
762 * (submitted but not yet successfuly checked/waited) queries.
763 *
764 * You can only have one iteration going at once. You may call _begin
765 * at any time; after that, an iteration will be in progress. You may
766 * only call _next when an iteration is in progress - anything else
767 * may coredump. The iteration remains in progress until _next
768 * returns 0, indicating that all the queries have been walked over,
769 * or ANY other adns function is called with the same adns_state (or a
770 * query in the same adns_state). There is no need to explicitly
771 * finish an iteration.
772 *
773 * context_r may be 0. *context_r may not be set when _next returns 0.
774 */
775
776 void adns_checkconsistency(adns_state ads, adns_query qu);
777 /* Checks the consistency of adns's internal data structures.
778 * If any error is found, the program will abort().
779 * You may pass 0 for qu; if you pass non-null then additional checks
780 * are done to make sure that qu is a valid query.
781 */
782
783 /*
784 * Example expected/legal calling sequence for submit/check/wait:
785 * adns_init
786 * adns_submit 1
787 * adns_submit 2
788 * adns_submit 3
789 * adns_wait 1
790 * adns_check 3 -> EAGAIN
791 * adns_wait 2
792 * adns_wait 3
793 * ....
794 * adns_finish
795 */
796
797 /*
798 * Entrypoints for generic asynch io:
799 * (these entrypoints are not very useful except in combination with *
800 * some of the other I/O model calls which can tell you which fds to
801 * be interested in):
802 *
803 * Note that any adns call may cause adns to open and close fds, so
804 * you must call beforeselect or beforepoll again just before
805 * blocking, or you may not have an up-to-date list of it's fds.
806 */
807
808 int adns_processany(adns_state ads);
809 /* Gives adns flow-of-control for a bit. This will never block, and
810 * can be used with any threading/asynch-io model. If some error
811 * occurred which might cause an event loop to spin then the errno
812 * value is returned.
813 */
814
815 int adns_processreadable(adns_state ads, int fd, const struct timeval *now);
816 int adns_processwriteable(adns_state ads, int fd, const struct timeval *now);
817 int adns_processexceptional(adns_state ads, int fd, const struct timeval *now);
818 /* Gives adns flow-of-control so that it can process incoming data
819 * from, or send outgoing data via, fd. Very like _processany. If it
820 * returns zero then fd will no longer be readable or writeable
821 * (unless of course more data has arrived since). adns will _only_
822 * use that fd and only in the manner specified, regardless of whether
823 * adns_if_noautosys was specified.
824 *
825 * adns_processexceptional should be called when select(2) reports an
826 * exceptional condition, or poll(2) reports POLLPRI.
827 *
828 * It is fine to call _processreabable or _processwriteable when the
829 * fd is not ready, or with an fd that doesn't belong to adns; it will
830 * then just return 0.
831 *
832 * If some error occurred which might prevent an event loop to spin
833 * then the errno value is returned.
834 */
835
836 void adns_processtimeouts(adns_state ads, const struct timeval *now);
837 /* Gives adns flow-of-control so that it can process any timeouts
838 * which might have happened. Very like _processreadable/writeable.
839 *
840 * now may be 0; if it isn't, *now must be the current time, recently
841 * obtained from gettimeofday.
842 */
843
844 void adns_firsttimeout(adns_state ads,
845 struct timeval **tv_mod, struct timeval *tv_buf,
846 struct timeval now);
847 /* Asks adns when it would first like the opportunity to time
848 * something out. now must be the current time, from gettimeofday.
849 *
850 * If tv_mod points to 0 then tv_buf must be non-null, and
851 * _firsttimeout will fill in *tv_buf with the time until the first
852 * timeout, and make *tv_mod point to tv_buf. If adns doesn't have
853 * anything that might need timing out it will leave *tv_mod as 0.
854 *
855 * If *tv_mod is not 0 then tv_buf is not used. adns will update
856 * *tv_mod if it has any earlier timeout, and leave it alone if it
857 * doesn't.
858 *
859 * This call will not actually do any I/O, or change the fds that adns
860 * is using. It always succeeds and never blocks.
861 */
862
863 void adns_globalsystemfailure(adns_state ads);
864 /* If serious problem(s) happen which globally affect your ability to
865 * interact properly with adns, or adns's ability to function
866 * properly, you or adns can call this function.
867 *
868 * All currently outstanding queries will be made to fail with
869 * adns_s_systemfail, and adns will close any stream sockets it has
870 * open.
871 *
872 * This is used by adns, for example, if gettimeofday() fails.
873 * Without this the program's event loop might start to spin !
874 *
875 * This call will never block.
876 */
877
878 /*
879 * Entrypoints for select-loop based asynch io:
880 */
881
882 void adns_beforeselect(adns_state ads, int *maxfd, fd_set *readfds,
883 fd_set *writefds, fd_set *exceptfds,
884 struct timeval **tv_mod, struct timeval *tv_buf,
885 const struct timeval *now);
886 /* Find out file descriptors adns is interested in, and when it would
887 * like the opportunity to time something out. If you do not plan to
888 * block then tv_mod may be 0. Otherwise, tv_mod and tv_buf are as
889 * for adns_firsttimeout. readfds, writefds, exceptfds and maxfd_io may
890 * not be 0.
891 *
892 * If tv_mod is 0 on entry then this will never actually do any I/O,
893 * or change the fds that adns is using or the timeouts it wants. In
894 * any case it won't block, and it will set the timeout to zero if a
895 * query finishes in _beforeselect.
896 */
897
898 void adns_afterselect(adns_state ads, int maxfd, const fd_set *readfds,
899 const fd_set *writefds, const fd_set *exceptfds,
900 const struct timeval *now);
901 /* Gives adns flow-of-control for a bit; intended for use after
902 * select. This is just a fancy way of calling adns_processreadable/
903 * writeable/timeouts as appropriate, as if select had returned the
904 * data being passed. Always succeeds.
905 */
906
907 /*
908 * Example calling sequence:
909 *
910 * adns_init _noautosys
911 * loop {
912 * adns_beforeselect
913 * select
914 * adns_afterselect
915 * ...
916 * adns_submit / adns_check
917 * ...
918 * }
919 */
920
921 /*
922 * Entrypoints for poll-loop based asynch io:
923 */
924
925 struct pollfd;
926 /* In case your system doesn't have it or you forgot to include
927 * <sys/poll.h>, to stop the following declarations from causing
928 * problems. If your system doesn't have poll then the following
929 * entrypoints will not be defined in libadns. Sorry !
930 */
931
932 int adns_beforepoll(adns_state ads, struct pollfd *fds,
933 int *nfds_io, int *timeout_io,
934 const struct timeval *now);
935 /* Finds out which fd's adns is interested in, and when it would like
936 * to be able to time things out. This is in a form suitable for use
937 * with poll(2).
938 *
939 * On entry, usually fds should point to at least *nfds_io structs.
940 * adns will fill up to that many structs will information for poll,
941 * and record in *nfds_io how many structs it filled. If it wants to
942 * listen for more structs then *nfds_io will be set to the number
943 * required and _beforepoll will return ERANGE.
944 *
945 * You may call _beforepoll with fds==0 and *nfds_io 0, in which case
946 * adns will fill in the number of fds that it might be interested in
947 * in *nfds_io, and always return either 0 (if it is not interested in
948 * any fds) or ERANGE (if it is).
949 *
950 * NOTE that (unless now is 0) adns may acquire additional fds
951 * from one call to the next, so you must put adns_beforepoll in a
952 * loop, rather than assuming that the second call (with the buffer
953 * size requested by the first) will not return ERANGE.
954 *
955 * adns only ever sets POLLIN, POLLOUT and POLLPRI in its pollfd
956 * structs, and only ever looks at those bits. POLLPRI is required to
957 * detect TCP Urgent Data (which should not be used by a DNS server)
958 * so that adns can know that the TCP stream is now useless.
959 *
960 * In any case, *timeout_io should be a timeout value as for poll(2),
961 * which adns will modify downwards as required. If the caller does
962 * not plan to block then *timeout_io should be 0 on entry, or
963 * alternatively, timeout_io may be 0. (Alternatively, the caller may
964 * use _beforeselect with timeout_io==0 to find out about file
965 * descriptors, and use _firsttimeout is used to find out when adns
966 * might want to time something out.)
967 *
968 * adns_beforepoll will return 0 on success, and will not fail for any
969 * reason other than the fds buffer being too small (ERANGE).
970 *
971 * This call will never actually do any I/O. If you supply the
972 * current time it will not change the fds that adns is using or the
973 * timeouts it wants.
974 *
975 * In any case this call won't block.
976 */
977
978 #define ADNS_POLLFDS_RECOMMENDED 3
979 /* If you allocate an fds buf with at least RECOMMENDED entries then
980 * you are unlikely to need to enlarge it. You are recommended to do
981 * so if it's convenient. However, you must be prepared for adns to
982 * require more space than this.
983 */
984
985 void adns_afterpoll(adns_state ads, const struct pollfd *fds, int nfds,
986 const struct timeval *now);
987 /* Gives adns flow-of-control for a bit; intended for use after
988 * poll(2). fds and nfds should be the results from poll(). pollfd
989 * structs mentioning fds not belonging to adns will be ignored.
990 */
991
992
993 adns_status adns_rr_info(adns_rrtype type,
994 const char **rrtname_r, const char **fmtname_r,
995 int *len_r,
996 const void *datap, char **data_r);
997 /*
998 * Get information about a query type, or convert reply data to a
999 * textual form. type must be specified, and the official name of the
1000 * corresponding RR type will be returned in *rrtname_r, and
1001 * information about the processing style in *fmtname_r. The length
1002 * of the table entry in an answer for that type will be returned in
1003 * in *len_r. Any or all of rrtname_r, fmtname_r and len_r may be 0.
1004 * If fmtname_r is non-null then *fmtname_r may be null on return,
1005 * indicating that no special processing is involved.
1006 *
1007 * data_r be must be non-null iff datap is. In this case *data_r will
1008 * be set to point to a string pointing to a representation of the RR
1009 * data in master file format. (The owner name, timeout, class and
1010 * type will not be present - only the data part of the RR.) The
1011 * memory will have been obtained from malloc() and must be freed by
1012 * the caller.
1013 *
1014 * Usually this routine will succeed. Possible errors include:
1015 * adns_s_nomemory
1016 * adns_s_rrtypeunknown
1017 * adns_s_invaliddata (*datap contained garbage)
1018 * If an error occurs then no memory has been allocated,
1019 * and *rrtname_r, *fmtname_r, *len_r and *data_r are undefined.
1020 *
1021 * There are some adns-invented data formats which are not official
1022 * master file formats. These include:
1023 *
1024 * Mailboxes if __qtf_mail822: these are just included as-is.
1025 *
1026 * Addresses (adns_rr_addr): these may be of pretty much any type.
1027 * The representation is in two parts: first, a word for the address
1028 * family (ie, in AF_XXX, the XXX), and then one or more items for the
1029 * address itself, depending on the format. For an IPv4 address the
1030 * syntax is INET followed by the dotted quad (from inet_ntoa).
1031 * Currently only IPv4 is supported.
1032 *
1033 * Text strings (as in adns_rr_txt) appear inside double quotes, and
1034 * use \" and \\ to represent " and \, and \xHH to represent
1035 * characters not in the range 32-126.
1036 *
1037 * Hostname with addresses (adns_rr_hostaddr): this consists of the
1038 * hostname, as usual, followed by the adns_status value, as an
1039 * abbreviation, and then a descriptive string (encoded as if it were
1040 * a piece of text), for the address lookup, followed by zero or more
1041 * addresses enclosed in ( and ). If the result was a temporary
1042 * failure, then a single ? appears instead of the ( ). If the
1043 * result was a permanent failure then an empty pair of parentheses
1044 * appears (which a space in between). For example, one of the NS
1045 * records for greenend.org.uk comes out like
1046 * ns.chiark.greenend.org.uk ok "OK" ( INET 195.224.76.132 )
1047 * an MX referring to a nonexistent host might come out like:
1048 * 50 sun2.nsfnet-relay.ac.uk nxdomain "No such domain" ( )
1049 * and if nameserver information is not available you might get:
1050 * dns2.spong.dyn.ml.org timeout "DNS query timed out" ?
1051 */
1052
1053 const char *adns_strerror(adns_status st);
1054 const char *adns_errabbrev(adns_status st);
1055 const char *adns_errtypeabbrev(adns_status st);
1056 /* Like strerror but for adns_status values. adns_errabbrev returns
1057 * the abbreviation of the error - eg, for adns_s_timeout it returns
1058 * "timeout". adns_errtypeabbrev returns the abbreviation of the
1059 * error class: ie, for values up to adns_s_max_XXX it will return the
1060 * string XXX. You MUST NOT call these functions with status values
1061 * not returned by the same adns library.
1062 */
1063
1064 #ifdef __cplusplus
1065 } /* end of extern "C" */
1066 #endif
1067 #endif