2013-07-15 17:43:30 -05:00
|
|
|
/**
|
|
|
|
*
|
2014-02-10 18:59:45 -06:00
|
|
|
* \file general.c
|
|
|
|
* @brief getdns_general and related support functions
|
2013-07-15 17:43:30 -05:00
|
|
|
*
|
2013-11-04 17:37:54 -06:00
|
|
|
* The getdns_general function is called by most of the other public entry
|
|
|
|
* points to the library. Private support functions are also included in this
|
|
|
|
* file where they are directly logically related to the getdns_general implementation.
|
2013-07-15 17:43:30 -05:00
|
|
|
*/
|
2013-11-04 17:37:54 -06:00
|
|
|
|
|
|
|
/*
|
2014-02-25 07:12:33 -06:00
|
|
|
* Copyright (c) 2013, NLnet Labs, Verisign, Inc.
|
2013-11-04 17:37:54 -06:00
|
|
|
* All rights reserved.
|
2014-01-10 09:28:28 -06:00
|
|
|
*
|
2013-11-04 17:37:54 -06:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
* * Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2014-02-25 07:23:19 -06:00
|
|
|
* * Neither the names of the copyright holders nor the
|
2013-11-04 17:37:54 -06:00
|
|
|
* names of its contributors may be used to endorse or promote products
|
|
|
|
* derived from this software without specific prior written permission.
|
2013-10-16 17:33:12 -05:00
|
|
|
*
|
2013-11-04 17:37:54 -06:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
|
|
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL Verisign, Inc. BE LIABLE FOR ANY
|
|
|
|
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
|
|
|
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
|
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
2013-07-15 17:43:30 -05:00
|
|
|
*/
|
|
|
|
|
2014-05-19 08:50:34 -05:00
|
|
|
#include <stdio.h>
|
2013-10-15 16:28:23 -05:00
|
|
|
#include <string.h>
|
|
|
|
#include <unbound.h>
|
|
|
|
#include <ldns/ldns.h>
|
2014-05-19 08:50:34 -05:00
|
|
|
#include "config.h"
|
2013-10-15 16:28:23 -05:00
|
|
|
#include "context.h"
|
2013-10-16 17:33:12 -05:00
|
|
|
#include "types-internal.h"
|
2013-08-15 11:33:05 -05:00
|
|
|
#include "util-internal.h"
|
2014-02-19 09:56:00 -06:00
|
|
|
#include "dnssec.h"
|
2014-10-15 08:12:16 -05:00
|
|
|
#include "stub.h"
|
|
|
|
#include "gldns/str2wire.h"
|
|
|
|
#include "gldns/pkthdr.h"
|
|
|
|
|
2013-07-15 17:43:30 -05:00
|
|
|
|
|
|
|
/* stuff to make it compile pedantically */
|
|
|
|
#define UNUSED_PARAM(x) ((void)(x))
|
|
|
|
|
2013-10-16 17:33:12 -05:00
|
|
|
/* declarations */
|
2014-01-21 14:31:22 -06:00
|
|
|
static void ub_resolve_callback(void* mydata, int err, struct ub_result* result);
|
2014-10-08 08:42:33 -05:00
|
|
|
static void ub_resolve_timeout(void *arg);
|
2013-11-05 14:03:44 -06:00
|
|
|
|
|
|
|
static void handle_network_request_error(getdns_network_req * netreq, int err);
|
|
|
|
static void handle_dns_request_complete(getdns_dns_req * dns_req);
|
2013-11-05 12:31:29 -06:00
|
|
|
|
2013-10-18 12:55:31 -05:00
|
|
|
/* cancel, cleanup and send timeout to callback */
|
2014-10-08 08:42:33 -05:00
|
|
|
static void
|
2014-01-31 13:43:02 -06:00
|
|
|
ub_resolve_timeout(void *arg)
|
2013-11-05 14:03:44 -06:00
|
|
|
{
|
|
|
|
getdns_dns_req *dns_req = (getdns_dns_req *) arg;
|
2014-10-08 08:42:33 -05:00
|
|
|
(void) getdns_context_request_timed_out(dns_req);
|
2013-10-18 12:55:31 -05:00
|
|
|
}
|
2013-10-16 17:33:12 -05:00
|
|
|
|
2014-02-03 16:34:55 -06:00
|
|
|
void priv_getdns_call_user_callback(getdns_dns_req *dns_req,
|
2014-01-27 15:01:37 -06:00
|
|
|
struct getdns_dict *response)
|
2013-11-05 14:03:44 -06:00
|
|
|
{
|
2013-12-06 08:54:06 -06:00
|
|
|
struct getdns_context *context = dns_req->context;
|
2013-11-05 14:03:44 -06:00
|
|
|
getdns_transaction_t trans_id = dns_req->trans_id;
|
|
|
|
getdns_callback_t cb = dns_req->user_callback;
|
|
|
|
void *user_arg = dns_req->user_pointer;
|
|
|
|
|
|
|
|
/* clean up */
|
|
|
|
getdns_context_clear_outbound_request(dns_req);
|
|
|
|
dns_req_free(dns_req);
|
|
|
|
|
2014-01-27 15:01:37 -06:00
|
|
|
cb(context,
|
|
|
|
(response ? GETDNS_CALLBACK_COMPLETE : GETDNS_CALLBACK_ERROR),
|
|
|
|
response, user_arg, trans_id);
|
2013-10-16 17:33:12 -05:00
|
|
|
}
|
|
|
|
|
2014-01-27 15:01:37 -06:00
|
|
|
/* cleanup and send an error to the user callback */
|
2013-11-05 14:03:44 -06:00
|
|
|
static void
|
2014-01-27 15:01:37 -06:00
|
|
|
handle_network_request_error(getdns_network_req * netreq, int err)
|
2013-11-05 14:03:44 -06:00
|
|
|
{
|
2014-02-03 16:34:55 -06:00
|
|
|
priv_getdns_call_user_callback(netreq->owner, NULL);
|
2014-01-27 15:01:37 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
/* cleanup and send the response to the user callback */
|
|
|
|
static void
|
|
|
|
handle_dns_request_complete(getdns_dns_req * dns_req)
|
|
|
|
{
|
2014-02-12 14:00:58 -06:00
|
|
|
if (is_extension_set(dns_req->extensions, "dnssec_return_validation_chain"))
|
2014-02-03 16:34:55 -06:00
|
|
|
priv_getdns_get_validation_chain(dns_req);
|
2014-01-27 15:01:37 -06:00
|
|
|
else
|
2014-02-03 16:34:55 -06:00
|
|
|
priv_getdns_call_user_callback(
|
|
|
|
dns_req, create_getdns_response(dns_req));
|
2013-10-16 17:33:12 -05:00
|
|
|
}
|
|
|
|
|
2014-10-15 08:12:16 -05:00
|
|
|
static void
|
|
|
|
stub_resolve_timeout_cb(void *userarg)
|
2013-11-05 14:03:44 -06:00
|
|
|
{
|
2014-10-15 08:12:16 -05:00
|
|
|
getdns_network_req *netreq = (getdns_network_req *)userarg;
|
2013-11-05 14:03:44 -06:00
|
|
|
getdns_dns_req *dns_req = netreq->owner;
|
2014-10-15 08:12:16 -05:00
|
|
|
|
|
|
|
(void) getdns_context_request_timed_out(dns_req);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
stub_resolve_read_cb(void *userarg)
|
|
|
|
{
|
|
|
|
getdns_network_req *netreq = (getdns_network_req *)userarg;
|
|
|
|
getdns_dns_req *dns_req = netreq->owner;
|
|
|
|
|
|
|
|
static size_t pkt_buf_len = 4096;
|
|
|
|
size_t pkt_len = pkt_buf_len;
|
|
|
|
uint8_t pkt_buf[pkt_buf_len];
|
|
|
|
uint8_t *pkt = pkt_buf;
|
|
|
|
|
|
|
|
size_t read;
|
|
|
|
|
|
|
|
dns_req->loop->vmt->clear(dns_req->loop, &netreq->event);
|
|
|
|
|
|
|
|
read = recvfrom(netreq->udp_fd, pkt, pkt_len, 0, NULL, NULL);
|
|
|
|
if (read < GLDNS_HEADER_SIZE)
|
|
|
|
return; /* Not DNS */
|
|
|
|
|
|
|
|
if (GLDNS_ID_WIRE(pkt) != netreq->query_id)
|
|
|
|
return; /* Cache poisoning attempt ;) */
|
|
|
|
|
|
|
|
close(netreq->udp_fd);
|
|
|
|
netreq->state = NET_REQ_FINISHED;
|
|
|
|
ldns_wire2pkt(&(netreq->result), pkt, read);
|
|
|
|
|
|
|
|
/* Do the dnssec here */
|
|
|
|
netreq->secure = 0;
|
|
|
|
netreq->bogus = 0;
|
|
|
|
|
|
|
|
netreq = dns_req->first_req;
|
|
|
|
while (netreq) {
|
|
|
|
if (netreq->state != NET_REQ_FINISHED &&
|
|
|
|
netreq->state != NET_REQ_CANCELED)
|
|
|
|
return;
|
|
|
|
netreq = netreq->next;
|
|
|
|
}
|
|
|
|
handle_dns_request_complete(dns_req);
|
|
|
|
}
|
|
|
|
|
|
|
|
static getdns_return_t
|
|
|
|
submit_stub_request(getdns_network_req *netreq)
|
|
|
|
{
|
|
|
|
getdns_dns_req *dns_req = netreq->owner;
|
|
|
|
static size_t pkt_buf_len = 4096;
|
|
|
|
size_t pkt_len = pkt_buf_len;
|
|
|
|
uint8_t pkt_buf[pkt_buf_len];
|
|
|
|
uint8_t *pkt = pkt_buf;
|
|
|
|
int s;
|
|
|
|
struct getdns_upstream *upstream;
|
|
|
|
ssize_t sent;
|
|
|
|
|
|
|
|
s = getdns_make_query_pkt_buf(dns_req->context, dns_req->name,
|
|
|
|
netreq->request_type, dns_req->extensions, pkt_buf, &pkt_len);
|
|
|
|
if (s == GLDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL) {
|
|
|
|
/* TODO: Allocate 64K and retry */
|
|
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
|
|
} else if (s)
|
|
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
|
|
|
|
|
|
netreq->query_id = ldns_get_random();
|
|
|
|
GLDNS_ID_SET(pkt, netreq->query_id);
|
|
|
|
|
|
|
|
upstream = &dns_req->upstreams->upstreams[dns_req->ns_index];
|
|
|
|
|
|
|
|
/* TODO: TCP */
|
|
|
|
if (dns_req->context->dns_transport != GETDNS_TRANSPORT_UDP_ONLY &&
|
|
|
|
dns_req->context->dns_transport !=
|
|
|
|
GETDNS_TRANSPORT_UDP_FIRST_AND_FALL_BACK_TO_TCP)
|
|
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
|
|
|
|
|
|
if ((netreq->udp_fd = socket(
|
|
|
|
upstream->addr.ss_family, SOCK_DGRAM, IPPROTO_UDP)) == -1)
|
|
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
|
|
|
|
|
|
sent = sendto(netreq->udp_fd, pkt, pkt_len, 0,
|
|
|
|
(struct sockaddr *)&upstream->addr, upstream->addr_len);
|
|
|
|
if (sent != pkt_len) {
|
|
|
|
close(netreq->udp_fd);
|
|
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
netreq->event.userarg = netreq;
|
|
|
|
netreq->event.read_cb = stub_resolve_read_cb;
|
|
|
|
netreq->event.write_cb = NULL;
|
|
|
|
netreq->event.timeout_cb = stub_resolve_timeout_cb;
|
|
|
|
netreq->event.ev = NULL;
|
|
|
|
dns_req->loop->vmt->schedule(dns_req->loop,
|
|
|
|
netreq->udp_fd, dns_req->context->timeout, &netreq->event);
|
|
|
|
|
|
|
|
if (s == GLDNS_WIREPARSE_ERR_BUFFER_TOO_SMALL) {
|
|
|
|
/* TODO: Free the 64K allocated buffer */
|
|
|
|
}
|
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
}
|
|
|
|
|
|
|
|
static getdns_return_t
|
|
|
|
submit_network_request(getdns_network_req *netreq)
|
|
|
|
{
|
|
|
|
getdns_return_t r;
|
|
|
|
getdns_dns_req *dns_req = netreq->owner;
|
|
|
|
|
|
|
|
if (dns_req->context->resolution_type == GETDNS_RESOLUTION_RECURSING ||
|
|
|
|
dns_req->context->dns_transport == GETDNS_TRANSPORT_TCP_ONLY ||
|
|
|
|
dns_req->context->dns_transport == GETDNS_TRANSPORT_TCP_ONLY_KEEP_CONNECTIONS_OPEN) {
|
|
|
|
|
|
|
|
/* schedule the timeout */
|
|
|
|
if (! dns_req->timeout.timeout_cb) {
|
|
|
|
dns_req->timeout.userarg = dns_req;
|
|
|
|
dns_req->timeout.read_cb = NULL;
|
|
|
|
dns_req->timeout.write_cb = NULL;
|
|
|
|
dns_req->timeout.timeout_cb = ub_resolve_timeout;
|
|
|
|
dns_req->timeout.ev = NULL;
|
|
|
|
if ((r = dns_req->loop->vmt->schedule(dns_req->loop, -1,
|
|
|
|
dns_req->context->timeout, &dns_req->timeout)))
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ub_resolve_async(dns_req->context->unbound_ctx,
|
|
|
|
dns_req->name, netreq->request_type, netreq->request_class,
|
|
|
|
netreq, ub_resolve_callback, &(netreq->unbound_id)) ?
|
|
|
|
GETDNS_RETURN_GENERIC_ERROR : GETDNS_RETURN_GOOD;
|
|
|
|
}
|
|
|
|
/* Submit with stub resolver */
|
|
|
|
return submit_stub_request(netreq);
|
2013-08-15 16:51:26 -05:00
|
|
|
}
|
|
|
|
|
2013-11-05 14:03:44 -06:00
|
|
|
static void
|
2014-01-21 14:31:22 -06:00
|
|
|
ub_resolve_callback(void* arg, int err, struct ub_result* ub_res)
|
|
|
|
// ub_resolve_callback(void *arg, int err, ldns_buffer * result, int sec,
|
|
|
|
// char *bogus)
|
2013-11-05 14:03:44 -06:00
|
|
|
{
|
2014-10-07 08:52:41 -05:00
|
|
|
getdns_network_req *netreq = (getdns_network_req *) arg;
|
2014-10-14 18:13:39 -05:00
|
|
|
getdns_dns_req *dns_req = netreq->owner;
|
2014-02-03 16:23:31 -06:00
|
|
|
|
2014-10-07 08:52:41 -05:00
|
|
|
netreq->state = NET_REQ_FINISHED;
|
|
|
|
if (err != 0) {
|
|
|
|
handle_network_request_error(netreq, err);
|
2013-11-05 14:03:44 -06:00
|
|
|
return;
|
|
|
|
}
|
2014-01-21 14:31:22 -06:00
|
|
|
/* parse */
|
2014-10-07 08:52:41 -05:00
|
|
|
if (getdns_apply_network_result(netreq, ub_res)) {
|
|
|
|
ub_resolve_free(ub_res);
|
|
|
|
handle_network_request_error(netreq, err);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
ub_resolve_free(ub_res);
|
|
|
|
|
2014-10-14 18:13:39 -05:00
|
|
|
netreq = dns_req->first_req;
|
2014-10-07 08:52:41 -05:00
|
|
|
while (netreq) {
|
|
|
|
if (netreq->state != NET_REQ_FINISHED &&
|
|
|
|
netreq->state != NET_REQ_CANCELED)
|
|
|
|
return;
|
|
|
|
netreq = netreq->next;
|
2013-11-05 14:03:44 -06:00
|
|
|
}
|
2014-10-14 18:13:39 -05:00
|
|
|
handle_dns_request_complete(dns_req);
|
2014-02-10 18:59:45 -06:00
|
|
|
} /* ub_resolve_callback */
|
2013-10-15 16:28:23 -05:00
|
|
|
|
|
|
|
getdns_return_t
|
2014-10-13 17:14:25 -05:00
|
|
|
getdns_general_ns(getdns_context *context, getdns_eventloop *loop,
|
|
|
|
const char *name, uint16_t request_type, getdns_dict *extensions,
|
|
|
|
void *userarg, getdns_transaction_t *transaction_id,
|
|
|
|
getdns_callback_t callbackfn, int usenamespaces)
|
2013-11-04 17:37:54 -06:00
|
|
|
{
|
2014-10-13 17:14:25 -05:00
|
|
|
getdns_return_t r = GETDNS_RETURN_GOOD;
|
2014-10-07 08:52:41 -05:00
|
|
|
getdns_network_req *netreq;
|
2014-10-13 17:14:25 -05:00
|
|
|
getdns_dns_req *req;
|
|
|
|
getdns_dict *localnames_response;
|
|
|
|
size_t i;
|
2013-11-05 14:03:44 -06:00
|
|
|
|
2014-10-14 18:13:39 -05:00
|
|
|
if (!context || !name || !callbackfn)
|
2014-01-15 15:25:46 -06:00
|
|
|
return GETDNS_RETURN_INVALID_PARAMETER;
|
2014-10-13 17:14:25 -05:00
|
|
|
|
|
|
|
if ((r = validate_dname(name)))
|
|
|
|
return r;
|
2013-11-05 14:03:44 -06:00
|
|
|
|
2014-10-13 17:14:25 -05:00
|
|
|
if (extensions && (r = validate_extensions(extensions)))
|
|
|
|
return r;
|
2013-11-05 14:03:44 -06:00
|
|
|
|
2014-10-13 17:14:25 -05:00
|
|
|
/* Set up the context assuming we won't use the specified namespaces.
|
|
|
|
This is (currently) identical to setting up a pure DNS namespace */
|
|
|
|
if ((r = getdns_context_prepare_for_resolution(context, 0)))
|
|
|
|
return r;
|
|
|
|
|
|
|
|
/* create the request */
|
|
|
|
if (!(req = dns_req_new(context, loop, name, request_type, extensions)))
|
|
|
|
return GETDNS_RETURN_MEMORY_ERROR;
|
2013-11-05 14:03:44 -06:00
|
|
|
|
|
|
|
req->user_pointer = userarg;
|
|
|
|
req->user_callback = callbackfn;
|
|
|
|
|
2014-10-13 17:14:25 -05:00
|
|
|
if (transaction_id)
|
2013-11-05 14:03:44 -06:00
|
|
|
*transaction_id = req->trans_id;
|
|
|
|
|
|
|
|
getdns_context_track_outbound_request(req);
|
|
|
|
|
2014-10-13 17:14:25 -05:00
|
|
|
if (!usenamespaces)
|
|
|
|
/* issue all network requests */
|
|
|
|
for (netreq = req->first_req; !r && netreq; netreq = netreq->next)
|
|
|
|
r = submit_network_request(netreq);
|
|
|
|
|
|
|
|
else for (i = 0; i < context->namespace_count; i++) {
|
|
|
|
if (context->namespaces[i] == GETDNS_NAMESPACE_LOCALNAMES) {
|
|
|
|
|
|
|
|
if (!(r = getdns_context_local_namespace_resolve(
|
2014-10-14 18:13:39 -05:00
|
|
|
req, &localnames_response, context))) {
|
2014-10-13 17:14:25 -05:00
|
|
|
|
|
|
|
priv_getdns_call_user_callback
|
|
|
|
( req, localnames_response);
|
2014-10-14 18:13:39 -05:00
|
|
|
break;
|
|
|
|
}
|
2014-10-13 17:14:25 -05:00
|
|
|
} else if (context->namespaces[i] == GETDNS_NAMESPACE_DNS) {
|
|
|
|
|
|
|
|
/* TODO: We will get a good return code here even if
|
|
|
|
the name is not found (NXDOMAIN). We should consider
|
|
|
|
if this means we go onto the next namespace instead
|
|
|
|
of returning */
|
2014-10-14 18:13:39 -05:00
|
|
|
r = GETDNS_RETURN_GOOD;
|
2014-10-13 17:14:25 -05:00
|
|
|
netreq = req->first_req;
|
|
|
|
while (!r && netreq) {
|
|
|
|
r = submit_network_request(netreq);
|
|
|
|
netreq = netreq->next;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
} else
|
|
|
|
r = GETDNS_RETURN_BAD_CONTEXT;
|
|
|
|
}
|
|
|
|
|
2013-11-05 14:03:44 -06:00
|
|
|
if (r != 0) {
|
|
|
|
/* clean up the request */
|
|
|
|
getdns_context_clear_outbound_request(req);
|
|
|
|
dns_req_free(req);
|
2014-10-13 17:14:25 -05:00
|
|
|
return r;
|
2013-11-05 14:03:44 -06:00
|
|
|
}
|
|
|
|
return GETDNS_RETURN_GOOD;
|
2014-10-13 17:14:25 -05:00
|
|
|
} /* getdns_general_ns */
|
2013-08-14 16:19:06 -05:00
|
|
|
|
2013-11-05 14:03:44 -06:00
|
|
|
getdns_return_t
|
2014-10-13 17:14:25 -05:00
|
|
|
getdns_general_loop(getdns_context *context, getdns_eventloop *loop,
|
|
|
|
const char *name, uint16_t request_type, getdns_dict *extensions,
|
|
|
|
void *userarg, getdns_transaction_t *transaction_id,
|
|
|
|
getdns_callback_t callback)
|
2013-11-04 17:37:54 -06:00
|
|
|
{
|
2014-10-13 17:14:25 -05:00
|
|
|
return getdns_general_ns(context, loop,
|
|
|
|
name, request_type, extensions,
|
|
|
|
userarg, transaction_id, callback, 0);
|
2013-11-05 14:03:44 -06:00
|
|
|
|
2014-10-13 17:14:25 -05:00
|
|
|
} /* getdns_general_loop */
|
2014-01-10 09:28:28 -06:00
|
|
|
|
2014-10-13 17:14:25 -05:00
|
|
|
getdns_return_t
|
|
|
|
getdns_address_loop(getdns_context *context, getdns_eventloop *loop,
|
|
|
|
const char *name, getdns_dict *extensions, void *userarg,
|
|
|
|
getdns_transaction_t *transaction_id, getdns_callback_t callback)
|
|
|
|
{
|
|
|
|
int cleanup_extensions = 0;
|
|
|
|
getdns_return_t r;
|
2014-01-27 18:32:54 -06:00
|
|
|
|
2014-10-13 17:14:25 -05:00
|
|
|
if (!extensions) {
|
|
|
|
if (!(extensions = getdns_dict_create_with_context(context)))
|
|
|
|
return GETDNS_RETURN_MEMORY_ERROR;
|
|
|
|
cleanup_extensions = 1;
|
|
|
|
}
|
|
|
|
if ((r = getdns_dict_set_int(extensions, "return_both_v4_and_v6",
|
|
|
|
GETDNS_EXTENSION_TRUE)))
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = getdns_general_ns(context, loop,
|
|
|
|
name, GETDNS_RRTYPE_A, extensions,
|
|
|
|
userarg, transaction_id, callback, 1);
|
2013-11-05 14:03:44 -06:00
|
|
|
|
2014-10-13 17:14:25 -05:00
|
|
|
if (cleanup_extensions)
|
|
|
|
getdns_dict_destroy(extensions);
|
2013-11-05 14:03:44 -06:00
|
|
|
|
2014-10-13 17:14:25 -05:00
|
|
|
return r;
|
|
|
|
} /* getdns_address_loop */
|
|
|
|
|
|
|
|
/**
|
|
|
|
* getdns_general
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_general(getdns_context *context,
|
|
|
|
const char *name, uint16_t request_type, getdns_dict *extensions,
|
|
|
|
void *userarg, getdns_transaction_t * transaction_id,
|
|
|
|
getdns_callback_t callback)
|
|
|
|
{
|
2014-10-14 18:13:39 -05:00
|
|
|
if (!context) return GETDNS_RETURN_INVALID_PARAMETER;
|
2014-10-13 17:14:25 -05:00
|
|
|
return getdns_general_loop(context, context->extension,
|
|
|
|
name, request_type, extensions,
|
|
|
|
userarg, transaction_id, callback);
|
2013-11-05 14:03:44 -06:00
|
|
|
|
|
|
|
} /* getdns_general */
|
2013-07-15 17:43:30 -05:00
|
|
|
|
2013-08-13 09:02:09 -05:00
|
|
|
/*
|
|
|
|
* getdns_address
|
|
|
|
*
|
|
|
|
*/
|
2013-11-05 14:03:44 -06:00
|
|
|
getdns_return_t
|
2014-10-13 17:14:25 -05:00
|
|
|
getdns_address(getdns_context *context,
|
|
|
|
const char *name, getdns_dict *extensions, void *userarg,
|
|
|
|
getdns_transaction_t *transaction_id, getdns_callback_t callback)
|
2013-11-05 14:03:44 -06:00
|
|
|
{
|
2014-10-14 18:13:39 -05:00
|
|
|
if (!context) return GETDNS_RETURN_INVALID_PARAMETER;
|
2014-10-13 17:14:25 -05:00
|
|
|
return getdns_address_loop(context, context->extension,
|
|
|
|
name, extensions, userarg,
|
|
|
|
transaction_id, callback);
|
2014-02-10 18:59:45 -06:00
|
|
|
} /* getdns_address */
|
2013-08-13 09:02:09 -05:00
|
|
|
|
2014-10-13 17:14:25 -05:00
|
|
|
|
2013-07-15 17:43:30 -05:00
|
|
|
/* getdns_general.c */
|