2013-07-15 16:42:37 -05:00
|
|
|
/**
|
|
|
|
*
|
|
|
|
* /brief getdns contect management functions
|
|
|
|
*
|
|
|
|
* This is the meat of the API
|
|
|
|
* Originally taken from the getdns API description pseudo implementation.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
/* The MIT License (MIT)
|
|
|
|
* Copyright (c) 2013 Verisign, Inc.
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
* furnished to do so, subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be included in
|
|
|
|
* all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
* THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
2013-08-12 16:38:05 -05:00
|
|
|
#include <string.h>
|
2013-08-15 09:54:30 -05:00
|
|
|
#include "context.h"
|
2013-08-15 16:51:26 -05:00
|
|
|
#include "util-internal.h"
|
2013-08-12 18:47:33 -05:00
|
|
|
#include <ldns/ldns.h>
|
2013-07-15 16:42:37 -05:00
|
|
|
|
|
|
|
/* stuff to make it compile pedantically */
|
|
|
|
#define UNUSED_PARAM(x) ((void)(x))
|
|
|
|
|
2013-08-12 16:38:05 -05:00
|
|
|
/**
|
|
|
|
* Helper to get default lookup namespaces.
|
|
|
|
* TODO: Determine from OS
|
|
|
|
*/
|
|
|
|
static uint16_t* create_default_namespaces() {
|
|
|
|
uint16_t *result = malloc(2 * sizeof(uint16_t));
|
|
|
|
result[0] = GETDNS_CONTEXT_NAMESPACE_LOCALNAMES;
|
|
|
|
result[1] = GETDNS_CONTEXT_NAMESPACE_DNS;
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Helper to get the default root servers.
|
|
|
|
* TODO: Implement
|
|
|
|
*/
|
|
|
|
static struct getdns_list* create_default_root_servers() {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-08-12 18:47:33 -05:00
|
|
|
static struct getdns_dict* create_ipaddr_dict_from_rdf(ldns_rdf* rdf) {
|
|
|
|
ldns_rdf_type rt = ldns_rdf_get_type(rdf);
|
|
|
|
size_t sz = ldns_rdf_size(rdf);
|
|
|
|
getdns_dict *result = getdns_dict_create();
|
|
|
|
/* set type */
|
|
|
|
if (rt == LDNS_RDF_TYPE_A) {
|
2013-08-15 16:51:26 -05:00
|
|
|
getdns_dict_util_set_string(result, GETDNS_STR_ADDRESS_TYPE, GETDNS_STR_IPV4);
|
2013-08-12 18:47:33 -05:00
|
|
|
} else {
|
2013-08-15 16:51:26 -05:00
|
|
|
getdns_dict_util_set_string(result, GETDNS_STR_ADDRESS_TYPE, GETDNS_STR_IPV6);
|
2013-08-12 18:47:33 -05:00
|
|
|
}
|
|
|
|
/* set data */
|
|
|
|
getdns_bindata data_bin = { sz, ldns_rdf_data(rdf) };
|
|
|
|
getdns_dict_set_bindata(result, GETDNS_STR_ADDRESS_DATA, &data_bin);
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct getdns_list* create_from_ldns_list(ldns_rdf** ldns_list, size_t count) {
|
|
|
|
size_t i = 0;
|
|
|
|
size_t idx = 0;
|
|
|
|
struct getdns_list *result = getdns_list_create();
|
|
|
|
for (i = 0; i < count; ++i) {
|
|
|
|
ldns_rdf* rdf = ldns_list[i];
|
|
|
|
switch (ldns_rdf_get_type(rdf)) {
|
|
|
|
case LDNS_RDF_TYPE_A:
|
|
|
|
case LDNS_RDF_TYPE_AAAA:
|
|
|
|
{
|
|
|
|
getdns_dict *ipaddr = create_ipaddr_dict_from_rdf(rdf);
|
|
|
|
getdns_list_add_item(result, &idx);
|
|
|
|
getdns_list_set_dict(result, idx, ipaddr);
|
|
|
|
getdns_dict_destroy(ipaddr);
|
|
|
|
}
|
|
|
|
break;
|
2013-08-13 08:08:54 -05:00
|
|
|
|
2013-08-12 18:47:33 -05:00
|
|
|
case LDNS_RDF_TYPE_DNAME:
|
|
|
|
{
|
|
|
|
getdns_bindata item;
|
|
|
|
char* srch = ldns_rdf2str(rdf);
|
|
|
|
item.size = strlen(srch);
|
|
|
|
item.data = (uint8_t*) srch;
|
|
|
|
getdns_list_add_item(result, &idx);
|
|
|
|
getdns_list_set_bindata(result, idx, &item);
|
|
|
|
free(srch);
|
|
|
|
}
|
|
|
|
break;
|
2013-08-13 08:08:54 -05:00
|
|
|
|
2013-08-12 18:47:33 -05:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static getdns_return_t set_os_defaults(getdns_context_t context) {
|
|
|
|
ldns_resolver *lr = NULL;
|
|
|
|
if (ldns_resolver_new_frm_file(&lr, NULL) != LDNS_STATUS_OK) {
|
|
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
|
|
}
|
|
|
|
ldns_rdf **rdf_list= ldns_resolver_nameservers(lr);
|
|
|
|
size_t rdf_list_sz = ldns_resolver_nameserver_count(lr);
|
|
|
|
if (rdf_list_sz > 0) {
|
|
|
|
context->upstream_list = create_from_ldns_list(rdf_list, rdf_list_sz);
|
|
|
|
}
|
|
|
|
rdf_list = ldns_resolver_searchlist(lr);
|
|
|
|
rdf_list_sz = ldns_resolver_searchlist_count(lr);
|
|
|
|
if (rdf_list_sz > 0) {
|
|
|
|
context->suffix = create_from_ldns_list(rdf_list, rdf_list_sz);
|
|
|
|
}
|
|
|
|
/** cleanup **/
|
|
|
|
ldns_resolver_free(lr);
|
|
|
|
return GETDNS_RETURN_GOOD;
|
2013-08-12 16:38:05 -05:00
|
|
|
}
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
/*
|
|
|
|
* getdns_context_create
|
|
|
|
*
|
|
|
|
* call this to initialize the context that is used in other getdns calls
|
|
|
|
*/
|
2013-08-14 16:19:06 -05:00
|
|
|
getdns_return_t getdns_context_create(
|
2013-07-15 16:42:37 -05:00
|
|
|
getdns_context_t *context,
|
2013-08-14 16:19:06 -05:00
|
|
|
int set_from_os
|
2013-07-15 16:42:37 -05:00
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
getdns_context_t result = NULL;
|
2013-08-12 18:47:33 -05:00
|
|
|
|
2013-08-12 16:38:05 -05:00
|
|
|
if (context == NULL) {
|
|
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
|
|
}
|
|
|
|
|
2013-08-13 15:10:21 -05:00
|
|
|
getdns_dict *outbound_reqs = getdns_dict_create();
|
|
|
|
if (outbound_reqs == NULL) {
|
|
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
|
|
}
|
|
|
|
|
2013-08-12 18:47:33 -05:00
|
|
|
/** default init **/
|
2013-08-12 16:38:05 -05:00
|
|
|
result = malloc(sizeof(struct getdns_context_t));
|
|
|
|
result->resolution_type = GETDNS_CONTEXT_RECURSING;
|
|
|
|
result->namespaces = create_default_namespaces();
|
|
|
|
result->dns_transport = GETDNS_CONTEXT_UDP_FIRST_AND_FALL_BACK_TO_TCP;
|
|
|
|
result->limit_outstanding_queries = 0;
|
|
|
|
result->timeout = 5000;
|
|
|
|
result->follow_redirects = GETDNS_CONTEXT_FOLLOW_REDIRECTS;
|
|
|
|
result->dns_root_servers = create_default_root_servers();
|
|
|
|
result->append_name = GETDNS_CONTEXT_APPEND_NAME_ALWAYS;
|
|
|
|
result->suffix = NULL;
|
|
|
|
|
|
|
|
result->dnssec_trust_anchors = NULL;
|
|
|
|
result->dnssec_allow_skew = 0;
|
|
|
|
result->upstream_list = NULL;
|
|
|
|
result->edns_maximum_udp_payload_size = 512;
|
|
|
|
result->edns_extended_rcode = 0;
|
|
|
|
result->edns_version = 0;
|
|
|
|
result->edns_do_bit = 0;
|
|
|
|
|
2013-08-13 15:10:21 -05:00
|
|
|
result->event_base = NULL;
|
2013-08-14 16:19:06 -05:00
|
|
|
result->resolver_socket = 0;
|
2013-08-13 15:10:21 -05:00
|
|
|
result->outbound_reqs = outbound_reqs;
|
|
|
|
|
2013-08-12 16:38:05 -05:00
|
|
|
result->update_callback = NULL;
|
|
|
|
result->memory_allocator = malloc;
|
|
|
|
result->memory_deallocator = free;
|
|
|
|
result->memory_reallocator = realloc;
|
|
|
|
|
2013-08-12 18:47:33 -05:00
|
|
|
if (set_from_os) {
|
|
|
|
if (GETDNS_RETURN_GOOD != set_os_defaults(result)) {
|
|
|
|
getdns_context_destroy(result);
|
|
|
|
return GETDNS_RETURN_GENERIC_ERROR;
|
|
|
|
}
|
|
|
|
}
|
2013-08-12 16:38:05 -05:00
|
|
|
|
2013-08-12 18:47:33 -05:00
|
|
|
*context = result;
|
2013-07-15 16:42:37 -05:00
|
|
|
|
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_create */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_destroy
|
|
|
|
*
|
|
|
|
* call this to dispose of resources associated with a context once you
|
|
|
|
* are done with it
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
getdns_context_destroy(
|
|
|
|
getdns_context_t context
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
if (context == NULL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (context->namespaces) {
|
|
|
|
context->memory_deallocator(context->namespaces);
|
|
|
|
}
|
|
|
|
getdns_list_destroy(context->dns_root_servers);
|
|
|
|
getdns_list_destroy(context->suffix);
|
|
|
|
getdns_list_destroy(context->dnssec_trust_anchors);
|
|
|
|
getdns_list_destroy(context->upstream_list);
|
|
|
|
|
2013-08-13 15:10:21 -05:00
|
|
|
getdns_dict_destroy(context->outbound_reqs);
|
|
|
|
|
2013-08-14 16:19:06 -05:00
|
|
|
/* TODO: cancel all events */
|
|
|
|
|
|
|
|
if (context->resolver_socket != 0) {
|
|
|
|
evutil_closesocket(context->resolver_socket);
|
|
|
|
}
|
|
|
|
|
2013-08-12 16:38:05 -05:00
|
|
|
free(context);
|
|
|
|
return;
|
2013-07-15 16:42:37 -05:00
|
|
|
} /* getdns_context_destroy */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_context_update_callback
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_context_update_callback(
|
|
|
|
getdns_context_t context,
|
|
|
|
void (*value)(getdns_context_t context, uint16_t changed_item)
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
context->update_callback = value;
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_context_update_callback */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_context_update
|
2013-08-12 16:38:05 -05:00
|
|
|
*
|
2013-07-15 16:42:37 -05:00
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_context_update(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint16_t value
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UNUSED_PARAM(context);
|
|
|
|
UNUSED_PARAM(value);
|
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_context_update */
|
|
|
|
|
2013-08-12 16:38:05 -05:00
|
|
|
/**
|
|
|
|
* Helper to dispatch the updated callback
|
|
|
|
*/
|
|
|
|
static void dispatch_updated(getdns_context_t context,
|
|
|
|
uint16_t item) {
|
|
|
|
if (context->update_callback) {
|
|
|
|
context->update_callback(context, item);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
/*
|
|
|
|
* getdns_context_set_resolution_type
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_resolution_type(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint16_t value
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
if (value != GETDNS_CONTEXT_STUB &&
|
|
|
|
value != GETDNS_CONTEXT_RECURSING) {
|
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
context->resolution_type = value;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_RESOLUTION_TYPE);
|
2013-07-15 16:42:37 -05:00
|
|
|
|
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_resolution_type */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_namespaces
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_namespaces(
|
|
|
|
getdns_context_t context,
|
|
|
|
size_t namespace_count,
|
|
|
|
uint16_t *namespaces
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
size_t namespaces_size;
|
|
|
|
if (namespace_count == 0 || namespaces == NULL) {
|
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/** clean up old namespaces **/
|
|
|
|
context->memory_deallocator(context->namespaces);
|
|
|
|
|
|
|
|
/** duplicate **/
|
|
|
|
namespaces_size = namespace_count * sizeof(uint16_t);
|
|
|
|
context->namespaces = context->memory_allocator(namespaces_size);
|
|
|
|
memcpy(context->namespaces, namespaces, namespaces_size);
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_NAMESPACES);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_namespaces */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_dns_transport
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_dns_transport(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint16_t value
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
if (value != GETDNS_CONTEXT_UDP_FIRST_AND_FALL_BACK_TO_TCP &&
|
|
|
|
value != GETDNS_CONTEXT_UDP_ONLY &&
|
|
|
|
value != GETDNS_CONTEXT_TCP_ONLY &&
|
|
|
|
value != GETDNS_CONTEXT_TCP_ONLY_KEEP_CONNECTIONS_OPEN) {
|
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
|
|
|
}
|
2013-07-15 16:42:37 -05:00
|
|
|
|
2013-08-12 16:38:05 -05:00
|
|
|
context->dns_transport = value;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_DNS_TRANSPORT);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_dns_transport */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_limit_outstanding_queries
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_limit_outstanding_queries(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint16_t limit
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
context->limit_outstanding_queries = limit;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_LIMIT_OUTSTANDING_QUERIES);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_limit_outstanding_queries */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_timeout
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_timeout(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint16_t timeout
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
context->timeout = timeout;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_TIMEOUT);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_timeout */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_follow_redirects
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_follow_redirects(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint16_t value
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
context->follow_redirects = value;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_FOLLOW_REDIRECTS);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_follow_redirects */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_dns_root_servers
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_dns_root_servers(
|
|
|
|
getdns_context_t context,
|
|
|
|
struct getdns_list *addresses
|
|
|
|
)
|
|
|
|
{
|
2013-08-13 09:02:09 -05:00
|
|
|
getdns_list *copy = NULL;
|
|
|
|
if (addresses != NULL) {
|
|
|
|
if (getdns_list_copy(addresses, ©) != GETDNS_RETURN_GOOD) {
|
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
|
|
|
}
|
|
|
|
addresses = copy;
|
|
|
|
}
|
2013-08-12 16:38:05 -05:00
|
|
|
getdns_list_destroy(context->dns_root_servers);
|
|
|
|
context->dns_root_servers = addresses;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_DNS_ROOT_SERVERS);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_dns_root_servers */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_append_name
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_append_name(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint16_t value
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
if (value != GETDNS_CONTEXT_APPEND_NAME_ALWAYS &&
|
|
|
|
value != GETDNS_CONTEXT_APPEND_NAME_ONLY_TO_SINGLE_LABEL_AFTER_FAILURE &&
|
|
|
|
value != GETDNS_CONTEXT_APPEND_NAME_ONLY_TO_MULTIPLE_LABEL_NAME_AFTER_FAILURE &&
|
|
|
|
value != GETDNS_CONTEXT_DO_NOT_APPEND_NAMES) {
|
|
|
|
|
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
context->append_name = value;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_APPEND_NAME);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_append_name */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_suffix
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_suffix(
|
|
|
|
getdns_context_t context,
|
|
|
|
struct getdns_list *value
|
|
|
|
)
|
|
|
|
{
|
2013-08-13 09:02:09 -05:00
|
|
|
getdns_list *copy = NULL;
|
|
|
|
if (value != NULL) {
|
|
|
|
if (getdns_list_copy(value, ©) != GETDNS_RETURN_GOOD) {
|
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
|
|
|
}
|
|
|
|
value = copy;
|
|
|
|
}
|
2013-08-12 16:38:05 -05:00
|
|
|
getdns_list_destroy(context->suffix);
|
|
|
|
context->suffix = value;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_SUFFIX);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_suffix */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_dnssec_trust_anchors
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_dnssec_trust_anchors(
|
|
|
|
getdns_context_t context,
|
|
|
|
struct getdns_list *value
|
|
|
|
)
|
|
|
|
{
|
2013-08-13 09:02:09 -05:00
|
|
|
getdns_list *copy = NULL;
|
|
|
|
if (value != NULL) {
|
|
|
|
if (getdns_list_copy(value, ©) != GETDNS_RETURN_GOOD) {
|
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
|
|
|
}
|
|
|
|
value = copy;
|
|
|
|
}
|
2013-08-12 16:38:05 -05:00
|
|
|
getdns_list_destroy(context->dnssec_trust_anchors);
|
|
|
|
context->dnssec_trust_anchors = value;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_DNSSEC_TRUST_ANCHORS);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_dnssec_trust_anchors */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_dnssec_allowed_skew
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_dnssec_allowed_skew(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint16_t value
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
context->dnssec_allow_skew = value;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_DNSSEC_ALLOWED_SKEW);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_dnssec_allowed_skew */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_stub_resolution
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_stub_resolution(
|
|
|
|
getdns_context_t context,
|
|
|
|
struct getdns_list *upstream_list
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
if (upstream_list == NULL) {
|
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
|
|
|
}
|
2013-08-13 09:02:09 -05:00
|
|
|
getdns_list *copy = NULL;
|
|
|
|
if (getdns_list_copy(upstream_list, ©) != GETDNS_RETURN_GOOD) {
|
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
|
|
|
}
|
|
|
|
upstream_list = copy;
|
2013-08-12 16:38:05 -05:00
|
|
|
|
|
|
|
getdns_context_set_resolution_type(context, GETDNS_CONTEXT_STUB);
|
|
|
|
|
|
|
|
getdns_list_destroy(context->upstream_list);
|
|
|
|
context->upstream_list = upstream_list;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_UPSTREAM_RECURSIVE_SERVERS);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_stub_resolution */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_edns_maximum_udp_payload_size
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_edns_maximum_udp_payload_size(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint16_t value
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
/* check for < 512. uint16_t won't let it go above max) */
|
|
|
|
if (value < 512) {
|
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
context->edns_maximum_udp_payload_size = value;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_EDNS_MAXIMUM_UDP_PAYLOAD_SIZE);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_edns_maximum_udp_payload_size */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_edns_extended_rcode
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_edns_extended_rcode(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint8_t value
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
context->edns_extended_rcode = value;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_EDNS_EXTENDED_RCODE);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_edns_extended_rcode */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_edns_version
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_edns_version(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint8_t value
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
context->edns_version = value;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_EDNS_VERSION);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_edns_version */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_edns_do_bit
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_edns_do_bit(
|
|
|
|
getdns_context_t context,
|
|
|
|
uint8_t value
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
/* 0 or 1 */
|
|
|
|
if (value > 1) {
|
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
context->edns_do_bit = value;
|
|
|
|
|
|
|
|
dispatch_updated(context, GETDNS_CONTEXT_CODE_EDNS_DO_BIT);
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_context_set_edns_do_bit */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_memory_allocator
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_memory_allocator(
|
|
|
|
getdns_context_t context,
|
|
|
|
void (*value)(size_t somesize)
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UNUSED_PARAM(context);
|
|
|
|
UNUSED_PARAM(value);
|
2013-08-12 16:38:05 -05:00
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
2013-07-15 16:42:37 -05:00
|
|
|
} /* getdns_context_set_memory_allocator */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_memory_deallocator
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_memory_deallocator(
|
|
|
|
getdns_context_t context,
|
|
|
|
void (*value)(void*)
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UNUSED_PARAM(context);
|
|
|
|
UNUSED_PARAM(value);
|
2013-08-12 16:38:05 -05:00
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
2013-07-15 16:42:37 -05:00
|
|
|
} /* getdns_context_set_memory_deallocator */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_context_set_memory_reallocator
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_context_set_memory_reallocator(
|
|
|
|
getdns_context_t context,
|
|
|
|
void (*value)(void*)
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UNUSED_PARAM(context);
|
|
|
|
UNUSED_PARAM(value);
|
2013-08-12 16:38:05 -05:00
|
|
|
return GETDNS_RETURN_CONTEXT_UPDATE_FAIL;
|
2013-07-15 16:42:37 -05:00
|
|
|
} /* getdns_context_set_memory_reallocator */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* getdns_extension_set_libevent_base
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_extension_set_libevent_base(
|
|
|
|
getdns_context_t context,
|
|
|
|
struct event_base *this_event_base
|
|
|
|
)
|
|
|
|
{
|
2013-08-12 16:38:05 -05:00
|
|
|
/* TODO: cancel anything on an existing event base */
|
|
|
|
context->event_base = this_event_base;
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_extension_set_libevent_base */
|
|
|
|
|
2013-07-15 17:43:30 -05:00
|
|
|
/*
|
|
|
|
* getdns_cancel_callback
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
getdns_return_t
|
|
|
|
getdns_cancel_callback(
|
|
|
|
getdns_context_t context,
|
|
|
|
getdns_transaction_t transaction_id
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UNUSED_PARAM(context);
|
|
|
|
UNUSED_PARAM(transaction_id);
|
|
|
|
return GETDNS_RETURN_GOOD;
|
|
|
|
} /* getdns_cancel_callback */
|
|
|
|
|
2013-07-15 16:42:37 -05:00
|
|
|
/* getdns_context.c */
|