2 * Copyright (C) 2004 Internet Systems Consortium, Inc. ("ISC")
3 * Copyright (C) 1999-2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
18 /* $Id: dispatch.h,v 1.45.2.2.4.2.26.1 2007/06/26 04:14:56 marka Exp $ */
20 #ifndef DNS_DISPATCH_H
21 #define DNS_DISPATCH_H 1
28 * DNS Dispatch Management
30 * Shared UDP and single-use TCP dispatches for queries and responses.
34 * All locking is performed internally to each dispatch.
35 * Restrictions apply to dns_dispatch_removeresponse().
43 * Depends on the isc_socket_t and dns_message_t for prevention of
55 #include <isc/buffer.h>
57 #include <isc/socket.h>
58 #include <dns/types.h>
60 #include <dns/types.h>
65 * This event is sent to a task when a response comes in.
66 * No part of this structure should ever be modified by the caller,
67 * other than parts of the buffer. The holy parts of the buffer are
68 * the base and size of the buffer. All other parts of the buffer may
69 * be used. On event delivery the used region contains the packet.
71 * "id" is the received message id,
73 * "addr" is the host that sent it to us,
75 * "buffer" holds state on the received data.
77 * The "free" routine for this event will clean up itself as well as
78 * any buffer space allocated from common pools.
81 struct dns_dispatchevent {
82 ISC_EVENT_COMMON(dns_dispatchevent_t); /* standard event common */
83 isc_result_t result; /* result code */
84 isc_int32_t id; /* message id */
85 isc_sockaddr_t addr; /* address recv'd from */
86 struct in6_pktinfo pktinfo; /* reply info for v6 */
87 isc_buffer_t buffer; /* data buffer */
88 isc_uint32_t attributes; /* mirrored from socket.h */
92 * Attributes for added dispatchers.
94 * Values with the mask 0xffff0000 are application defined.
95 * Values with the mask 0x0000ffff are library defined.
97 * Insane values (like setting both TCP and UDP) are not caught. Don't
101 * The dispatcher cannot be shared.
104 * The dispatcher is a TCP or UDP socket.
107 * The dispatcher uses an ipv4 or ipv6 socket.
110 * The dispatcher should not listen on the socket.
113 * The dispatcher can be used to issue queries to other servers, and
114 * accept replies from them.
116 #define DNS_DISPATCHATTR_PRIVATE 0x00000001U
117 #define DNS_DISPATCHATTR_TCP 0x00000002U
118 #define DNS_DISPATCHATTR_UDP 0x00000004U
119 #define DNS_DISPATCHATTR_IPV4 0x00000008U
120 #define DNS_DISPATCHATTR_IPV6 0x00000010U
121 #define DNS_DISPATCHATTR_NOLISTEN 0x00000020U
122 #define DNS_DISPATCHATTR_MAKEQUERY 0x00000040U
123 #define DNS_DISPATCHATTR_CONNECTED 0x00000080U
126 dns_dispatchmgr_create(isc_mem_t *mctx, isc_entropy_t *entropy,
127 dns_dispatchmgr_t **mgrp);
129 * Creates a new dispatchmgr object.
132 * "mctx" be a valid memory context.
134 * mgrp != NULL && *mgrp == NULL
136 * "entropy" may be NULL, in which case an insecure random generator
137 * will be used. If it is non-NULL, it must be a valid entropy
141 * ISC_R_SUCCESS -- all ok
143 * anything else -- failure
148 dns_dispatchmgr_destroy(dns_dispatchmgr_t **mgrp);
150 * Destroys the dispatchmgr when it becomes empty. This could be
154 * mgrp != NULL && *mgrp is a valid dispatchmgr.
159 dns_dispatchmgr_setblackhole(dns_dispatchmgr_t *mgr, dns_acl_t *blackhole);
161 * Sets the dispatcher's "blackhole list," a list of addresses that will
162 * be ignored by all dispatchers created by the dispatchmgr.
165 * mgrp is a valid dispatchmgr
166 * blackhole is a valid acl
171 dns_dispatchmgr_getblackhole(dns_dispatchmgr_t *mgr);
173 * Gets a pointer to the dispatcher's current blackhole list,
174 * without incrementing its reference count.
177 * mgr is a valid dispatchmgr
179 * A pointer to the current blackhole list, or NULL.
183 dns_dispatchmgr_setblackportlist(dns_dispatchmgr_t *mgr,
184 dns_portlist_t *portlist);
186 * Sets a list of UDP ports that won't be used when creating a udp
187 * dispatch with a wildcard port.
190 * mgr is a valid dispatchmgr
191 * portlist to be NULL or a valid port list.
195 dns_dispatchmgr_getblackportlist(dns_dispatchmgr_t *mgr);
197 * Return the current port list.
200 * mgr is a valid dispatchmgr
206 dns_dispatch_getudp(dns_dispatchmgr_t *mgr, isc_socketmgr_t *sockmgr,
207 isc_taskmgr_t *taskmgr, isc_sockaddr_t *localaddr,
208 unsigned int buffersize,
209 unsigned int maxbuffers, unsigned int maxrequests,
210 unsigned int buckets, unsigned int increment,
211 unsigned int attributes, unsigned int mask,
212 dns_dispatch_t **dispp);
214 * Attach to existing dns_dispatch_t if one is found with dns_dispatchmgr_find,
215 * otherwise create a new UDP dispatch.
218 * All pointer parameters be valid for their respective types.
220 * dispp != NULL && *disp == NULL
222 * 512 <= buffersize <= 64k
228 * increment > buckets
230 * (attributes & DNS_DISPATCHATTR_TCP) == 0
233 * ISC_R_SUCCESS -- success.
235 * Anything else -- failure.
239 dns_dispatch_createtcp(dns_dispatchmgr_t *mgr, isc_socket_t *sock,
240 isc_taskmgr_t *taskmgr, unsigned int buffersize,
241 unsigned int maxbuffers, unsigned int maxrequests,
242 unsigned int buckets, unsigned int increment,
243 unsigned int attributes, dns_dispatch_t **dispp);
245 * Create a new dns_dispatch and attach it to the provided isc_socket_t.
247 * For all dispatches, "buffersize" is the maximum packet size we will
250 * "maxbuffers" and "maxrequests" control the number of buffers in the
251 * overall system and the number of buffers which can be allocated to
254 * "buckets" is the number of buckets to use, and should be prime.
256 * "increment" is used in a collision avoidance function, and needs to be
257 * a prime > buckets, and not 2.
261 * mgr is a valid dispatch manager.
265 * task is a valid task that can be used internally to this dispatcher.
267 * 512 <= buffersize <= 64k
271 * maxrequests <= maxbuffers.
273 * buckets < 2097169 (the next prime after 65536 * 32)
275 * increment > buckets (and prime).
277 * attributes includes DNS_DISPATCHATTR_TCP and does not include
278 * DNS_DISPATCHATTR_UDP.
281 * ISC_R_SUCCESS -- success.
283 * Anything else -- failure.
287 dns_dispatch_attach(dns_dispatch_t *disp, dns_dispatch_t **dispp);
289 * Attach to a dispatch handle.
294 * dispp != NULL && *dispp == NULL
298 dns_dispatch_detach(dns_dispatch_t **dispp);
300 * Detaches from the dispatch.
303 * dispp != NULL and *dispp be a valid dispatch.
307 dns_dispatch_starttcp(dns_dispatch_t *disp);
309 * Start processing of a TCP dispatch once the socket connects.
316 dns_dispatch_addresponse(dns_dispatch_t *disp, isc_sockaddr_t *dest,
317 isc_task_t *task, isc_taskaction_t action, void *arg,
318 isc_uint16_t *idp, dns_dispentry_t **resp);
320 * Add a response entry for this dispatch.
322 * "*idp" is filled in with the assigned message ID, and *resp is filled in
323 * to contain the magic token used to request event flow stop.
325 * Arranges for the given task to get a callback for response packets. When
326 * the event is delivered, it must be returned using dns_dispatch_freeevent()
327 * or through dns_dispatch_removeresponse() for another to be delivered.
332 * "task" "action" and "arg" be set as appropriate.
334 * "dest" be non-NULL and valid.
336 * "resp" be non-NULL and *resp be NULL
340 * <id, dest> is a unique tuple. That means incoming messages
345 * ISC_R_SUCCESS -- all is well.
346 * ISC_R_NOMEMORY -- memory could not be allocated.
347 * ISC_R_NOMORE -- no more message ids can be allocated
348 * for this destination.
353 dns_dispatch_removeresponse(dns_dispentry_t **resp,
354 dns_dispatchevent_t **sockevent);
356 * Stops the flow of responses for the provided id and destination.
357 * If "sockevent" is non-NULL, the dispatch event and associated buffer is
358 * also returned to the system.
361 * "resp" != NULL and "*resp" contain a value previously allocated
362 * by dns_dispatch_addresponse();
364 * May only be called from within the task given as the 'task'
365 * argument to dns_dispatch_addresponse() when allocating '*resp'.
370 dns_dispatch_getsocket(dns_dispatch_t *disp);
372 * Return the socket associated with this dispatcher.
378 * The socket the dispatcher is using.
382 dns_dispatch_getlocaladdress(dns_dispatch_t *disp, isc_sockaddr_t *addrp);
384 * Return the local address for this dispatch.
385 * This currently only works for dispatches using UDP sockets.
389 * addrp to be non null.
393 * ISC_R_NOTIMPLEMENTED
397 dns_dispatch_cancel(dns_dispatch_t *disp);
399 * cancel outstanding clients
406 dns_dispatch_changeattributes(dns_dispatch_t *disp,
407 unsigned int attributes, unsigned int mask);
409 * Set the bits described by "mask" to the corresponding values in
414 * new = (old & ~mask) | (attributes & mask)
416 * This function has a side effect when DNS_DISPATCHATTR_NOLISTEN changes.
417 * When the flag becomes off, the dispatch will start receiving on the
418 * corresponding socket. When the flag becomes on, receive events on the
419 * corresponding socket will be canceled.
424 * attributes are reasonable for the dispatch. That is, setting the UDP
425 * attribute on a TCP socket isn't reasonable.
429 dns_dispatch_importrecv(dns_dispatch_t *disp, isc_event_t *event);
431 * Inform the dispatcher of a socket receive. This is used for sockets
432 * shared between dispatchers and clients. If the dispatcher fails to copy
433 * or send the event, nothing happens.
436 * disp is valid, and the attribute DNS_DISPATCHATTR_NOLISTEN is set.
441 dns_dispatch_hash(void *data, size_t len);
443 * Feed 'data' to the dispatch query id generator where 'len' is the size
449 #endif /* DNS_DISPATCH_H */