oracular (3) udns.3.gz

Provided by: libudns-dev_0.6-1_amd64 bug

NAME

       udns - stub DNS resolver library

SYNOPSYS

       #include <udns.h>
       struct dns_ctx;
       struct dns_query;
       extern struct dns_ctx dns_defctx;
       struct dns_ctx *ctx;
       typedef void dns_query_fn(ctx, void *result, void *data);
       typedef int
       dns_parse_fn(const unsigned char *qnd,
              const unsigned char *pkt,
              const unsigned char *cur,
              const unsigned char *end,
              void **resultp);

       cc ... -ludns

DESCRIPTION

       The  DNS  library,  udns,  implements thread-safe stub DNS resolver functionality, which may be used both
       traditional, synchronous way and asynchronously, with application-supplied event loop.

       While DNS works with both TCP and UDP, performing UDP query first and if the result does not fit  in  UDP
       buffer (512 bytes max for original DNS protocol), retrying the query over TCP, the library uses UDP only,
       but uses EDNS0 (RFC2671) extensions which allows larger UDP buffers.

       The library uses single UDP socket to perform all operations even when asking multiple nameservers.  This
       way,  it is very simple to use the library in asynchronous event-loop applications: an application should
       add only single socket to the set of filedescriptors it monitors for I/O.

       The library uses two main objects, resolver context of type struct dns_ctx, and query structure  of  type
       struct dns_query,  both  are  opaque for an application.  Resolver context holds global information about
       the resolver, such as list of nameservers to use, list of active requests and the  like.   Query  objects
       holds  information about a single DNS query in progress and are allocated/processed/freed by the library.
       Pointer to query structure may be treated as an identifier of an in-progress query and  may  be  used  to
       cancel the asynchronous query or to wait for it to complete.

       Asynchronous interface works as follows.  An application initializes resolver context, submits any number
       of queries for it using one of supplied dns_submit_XXX() routines (each return the  query  identifier  as
       pointer  to  query  structure),  waits  for  input  on the UDP socket used by the library, and gives some
       control to the library by calling  dns_ioevent()  and  dns_timeouts()  routines  when  appropriate.   The
       library performs all necessary processing and executes application supplied callback routine when a query
       completes (either successefully or not), giving it the result if any, pointer  to  the  resolver  context
       (from  which completion status may be obtained), and the data pointer supplied by an application when the
       query has been submitted.  When submitting a query, an application requests how to handle the reply -- to
       either  return  raw  DNS  reply  packet for its own low-level processing, or it may provide an address of
       parsing routine of type dns_parse_fn to perform conversion of  on-wire  format  into  easy  to  use  data
       structure (the library provides parsing routines for several commonly used resource record types, as well
       as type-safe higher-level interface that requests parsing automatically).  The I/O monitoring and timeout
       handling  may  be  either  traditional  select() or poll() based, or any callback-driven technique may be
       used.

       Additionally, the library provides traditional  synchronous  interface,  which  may  be  intermixed  with
       asynchronous calls (during synchronous query processing, other asynchronous queries for the same resolver
       context continued to be processed as usual).  An  application  uses  one  of  numerous  dns_resolve_XXX()
       routines  provided by the library to perform a query.  As with asynchronous interface, an application may
       either request to return raw DNS packet or type-specific data structure by providing the parsing  routine
       to  handle  the  reply.   Every routine from dns_resolve_XXX() series return pointer to result or NULL in
       case of any error.  Query completion status (or length of the raw  DNS  packet)  is  available  from  the
       resolver context using dns_status() routine, the same way as for the asynchronous interface.

       Internally,  library  uses  on-wire format of domain names, referred to as DN format in this manual page.
       This is a series of domain labels with preceding length byte, terminated by zero-length  label  which  is
       integral  part  of the DN format.  There are several routines provided to convert from traditional asciiz
       string to DN and  back.   Higher-level  type-specific  query  interface  hides  the  DN  format  from  an
       application.

COMMON DEFINITIONS

       Every  DNS  Resource  Record (RR) has a type and a class.  The library defines several integer constants,
       DNS_C_XXX and DNS_T_XXX, to use as symbolic names for RR classes and types, such as DNS_C_IN for Internet
       class,  DNS_T_A  for IPv4 address record type and so on.  See udns.h header file for complete list of all
       such constants.

       The following constants are defined in udns.h header file:

       DNS_MAXDN (255 bytes)
              Maximum length of the domain name in internal (on-wire) DN format.

       DNS_MAXLABEL (63 bytes)
              Maximum length of a single label in DN format.

       DNS_MAXNAME (1024 bytes)
              Maximum length of asciiz format of a domain name.

       DNS_HSIZE (12 bytes)
              Size of header in DNS packet.

       DNS_PORT (53)
              Default port to use when contacting a DNS server.

       DNS_MAXSERV (6 servers)
              Maximum number of DNS servers to use.

       DNS_MAXPACKET (512 bytes)
              Maximum length of DNS UDP packet as specified by original DNS protocol

       DNS_EDNS0PACKET (4096 bytes)
              Default length of DNS UDP packet (with EDNS0 extensions) the library uses.   Note  that  recursive
              nameservers  usually  resides  near  the client asking them to resolve names, e.g. on the same LAN
              segment or even on the same host, so UDP packet fragmentation isn't a problem in most cases.  Note
              also that the size of actual packets will be as many bytes as actual reply size requires, which is
              smaller than this value in almost all cases.

       Additionally, several constants are defined to simplify work with raw DNS packets, such as  DNS  response
       codes  (DNS_R_XXX),  DNS  header  layout  (DNS_H_XXX)  and  others.  Again, see udns.h for complete list.
       Library error codes (DNS_E_XXX) are described later in this manual page.

RESOLVER CONTEXT

       Resolver context, of type struct dns_ctx, is an object  which  is  opaque  to  an  application.   Several
       routines  provided  by the library to initialize, copy and free resolver contexts.  Most other high-level
       routines in this library expects a pointer to resolver context, ctx, as the first argument.  There  is  a
       default  resolver  context available, named dns_defctx.  When the context pointer ctx passed to a routine
       is NULL, dns_defctx is used.  Several resolver contexts may be active at the same time, for example, when
       an application is multi-threaded and each thread uses resolver.

       In  order  to  use  the  library,  an application should initialize and open one or more resolver context
       objects.  These are two separate actions, performed  by  dns_init()  (or  dns_reset()),  and  dns_open().
       Between  the  two  calls,  an  application  is free to pefrorm additional initialisation, such as setting
       custom  nameservers,  options  or  domain  search  lists.   Optionally,  in  case  no  additional  custom
       initialisation is required, dns_init() may open the context if do_open argument (see below) is non-zero.

       When  initializing  resolver context, the library uses information from system file /etc/resolv.conf (see
       resolv.conf(5)), consults environment variables $LOCALDOMAIN, $NSCACHEIP, $NAMESERVERS and  $RES_OPTIONS,
       and  local  host  name  to obtain list of local nameservers, domain name search list and various resolver
       options.

       The following routines to initialize resolver context are available:

       void dns_reset(ctx)
       int dns_init(ctx, int do_open)
              dns_reset() resets a given resolver context to default  values,  preparing  it  to  be  opened  by
              dns_open().   It is ok to call this routine against opened and active context - all active queries
              will be dropped, sockets will be  closed  and  so  on.   This  routine  does  not  initialize  any
              parameters  from  system  configuration files, use dns_init() for this.  There's no error return -
              operation always succeeds.  dns_init() does everything dns_reset() does, plus initializes  various
              parameters of the context according to system configuration and process environment variables.  If
              do_open is non-zero, dns_init() calls dns_open(), so that  the  whole  library  initialisation  is
              performed in a single step.

       struct dns_ctx *dns_new(struct dns_ctx *copy)
       void dns_free(ctx)
              dns_new()  allocates  new  resolver context and copies all parameters for a given resolver context
              copy, or default context if copy is NULL, and returns pointer to the newly allocated context.  The
              context  being copied should be initialized.  dns_new() may fail if there's no memory available to
              make a copy of copy, in which case the routine will return NULL pointer.  dns_free()  is  used  to
              close associated socket and free resolver context resources and cancelling (abandoming) all active
              queries associated with it.  It's an error to free dns_defctx, only dynamically allocated contexts
              returned by dns_new() are allowed to be freed by dns_free().

       int dns_add_serv(ctx, const char *servaddr)
       int dns_add_serv_s(ctx, const struct sockaddr *sa)
       int dns_add_srch(ctx, const char *srch)
              Add  an  element  to  list  of  nameservers  (dns_add_serv(), as asciiz-string servaddr with an IP
              address of the nameserver, and dns_add_serv_s(), as initialized socket address sa), or search list
              (dns_add_srch(),  as a pointer to domain name) for the given context ctx.  If the last argument is
              a NULL pointer, the corresponding list (search or nameserver) is reset instead.  Upon  successeful
              completion,  each  routine  returns  new  number  of  elements in the list in question.  On error,
              negative value is returned and global variable errno is set appropriately.  It is an error to call
              any  of  this  functions  if  the  context is opened (after dns_open() or dns_init() with non-zero
              argument).

       int dns_set_opts(ctx, const char *opts)
              set resolver context options from opts string, in the same way as processing options statement  in
              resolv.conf  and $RES_OPTIONS environment variable.  Return number of unrecognized/invalid options
              found (all recognized and valid options gets processed).

       void dns_set_opt(ctx, int opt, val)
              TODO The flags argument is a bitmask with the following bits defined:

              DNS_NOSRCH
                     do not perform domain name search in search list.

              DNS_NORD
                     do not request recursion when performing queries (i.e. don't set RD flag in querues).

              DNS_AAONLY
                     request authoritative answers only (i.e. set AA flag in queries).

       int dns_open(ctx)
       int dns_sock(const ctx)
       void dns_close(ctx)
              dns_open() opens the UDP socket used for queries  if  not  already  open,  and  return  associated
              filedescriptor  (or  negative  value  in  case  of error).  Before any query can be submitted, the
              context should be  opened  using  this  routine.   And  before  opening,  the  context  should  be
              initialized.   dns_sock() return the UDP socket if open, or -1 if not.  dns_close() closes the UDP
              socket if it was open, and drops all active queries if any.

       int dns_active(const ctx)
              return number of active queries queued for the given context ctx, or zero if none.

       int dns_status(const ctx)
              return status code from last operation.  When using  synchronous  interface,  this  is  the  query
              completion  status  of  the  last  query.   With  asynchronous interface, from within the callback
              routine, this is the query completion status of the query for which the callback is being  called.
              When  query  submission  fails, this is the error code indicating failure reason.  All error codes
              are negative and are represented by DNS_E_XXX constants described below.

       void dns_ioevent(ctx, time_t now)
              this routine may be called by an application to process I/O events on the UDP socket used  by  the
              library,  as  returned by dns_sock().  The routine tries to receive incoming UDP datagram from the
              socket and process it.  The socket is set up to be non-blocking, so it is safe to call the routine
              even if there's no data to read.  The routine will process as many datagrams as are queued for the
              socket, so it is safe to use it with  either  level-triggered  or  edge-triggered  I/O  monitoring
              model.   The  now argument is either a current time as returned by time(), or 0, in which case the
              routine will obtain current time by it's own.

       int dns_timeouts(ctx, int maxwait, time_t now)
              process any pending timeouts and return number of secounds from current time (now if it is not  0)
              to  the  time  when  the  library  wants the application to pass it control to process more queued
              requests.  In case when there are no requests pending, this time is  -1.   The  routine  will  not
              request  a time larger than maxwait secounds if it is greather or equal to zero.  If now is 0, the
              routine will obtain current time by it's own; when it is not 0, it should contain current time  as
              returned by time().

       typedef void dns_utm_fn(ctx, int timeout, void *data)
       void dns_set_tmcbck(ctx, dns_utm_fn *utmfn, void *data)
              An application may use custom callback-based I/O multiplexing mechanism.  Usually such a mechanism
              have concept of a timer, and an ability to register a timer event in a form of a callback  routine
              which  will  be  executed  after certain amount of time.  In order to use such an event mechanism,
              udns provides an  ability  to  register  and  de-register  timer  events  necessary  for  internal
              processing  using  whatever event mechanism an application uses.  For this to work, it is possible
              to assotiate a pointer to a routine that will perform necessary  work  for  (de)registering  timer
              events  with  a  given  resolver  context,  and  udns will call that routine at appropriate times.
              Prototype of such a routine is shown by dns_utm_fn typedef above.  Libudns assotiates single timer
              with  resolver  context.   User-supplied  utmfn  routine  will  be  called by the library with the
              following arguments:

              ctx == NULL
                     delete user timer, at context free time or when an application changes user  timer  request
                     routine using dns_set_tmcbck();

              ctx != NULL, timeout < 0
                     don't fire timer anymore, when there are no active requests;

              ctx != NULL, timeout == 0
                     fire timer at the next possibility, but not immediately;

              ctx != NULL, timeout > 0
                     fire timer after timeout seconds after now.

              The data argument passed to the routine will be the same as passed to dns_set_tmcbck().

              When a timer expires, an application should call dns_timeouts() routine (see below).  Non-callback
              timer usage is provided too.

       XXXX TODO: some more resolver context routines, like dns_set_dbgfn() etc.

QUERY INTERFACE

       There are two ways to perform DNS queries: traditional  synchronous  way,  when  udns  performs  all  the
       necessary  processing  and  return  control  to  the  application  only  when  the  query  completes, and
       asynchronous way, when an application submits one or more queries to the  library  using  given  resolver
       context,  and  waits  for  completion  by  monitoring  filedescriptor used by library and calling library
       routines to process input on that filedescriptor.  Asynchronous mode works  with  callback  routines:  an
       application  supplies  an  address  of a routine to execute when the query completes, and a data pointer,
       which is passed to the callback routine.

       Queries are submitted to the library in a form of struct dns_query.  To perform  asynchronous  query,  an
       application  calls  one  of  the  dns_submit_XXX()  rounines,  and  provides  necessary information for a
       callback, together with  all  the  query  parameters.   When  the  query  completes,  library  will  call
       application-supplied  callback  routine,  giving  it  the  resolver context (which holds query completion
       status), dynamically allocated result (which will be either raw DNS packet or,  if  applicatin  requested
       parsing  the  result  by  specifying non-NULL parse routine, ready-to-use type-specific structure), and a
       data pointer provided by an application when it  submitted  the  query.   It  is  the  application  who's
       responsible for freeing the result memory.

       Generic query callback routine looks like this:
       typedef void
       dns_query_fn(ctx, void *result, void *data)
       Type-specific  query  interface expects similar form of callback routine with the only difference in type
       of result argument, which will be pointer to specific data structure (decoded reply) instead of this void
       pointer to raw DNS packet data.

       Result parsing routine looks like this:
       typedef int
       dns_parse_fn(const unsigned char *qdn,
             const unsigned char *pkt,
             const unsigned char *cur,
             const unsigned char *end,
             void **resultp);
       When called by the library, the arguments are as follows: pkt points to the start of the packet received;
       end points past the end of the packet received; cur points past the query DN in the query section of  the
       packet;  qdn  points  to  the original query DN.  The routine should allocate a single buffer to hold the
       result, parse the reply filling in the buffer, and return the buffer using resultp argument.  It  returns
       0  in  case  of  error, or udns error code (DNS_E_XXX constants) in case of error.  Note that by the time
       when the parse routine is called by the library, packet is already verified to be a reply to the original
       query, by matching query DN, query class and query type.

       Type-specific query interface supplies necessary parsing routines automatically.

       In  case  of  error,  query  completion  status  as  returned by dns_status(ctx), will contain one of the
       following values:

       positive value
              length of raw DNS packet if parsing is not requested.

       0      the query was successeful and the reply points to type-specific data structure.

       DNS_E_TEMPFAIL
              temporary error, the resolver nameserver was not able to process our query or timed out.

       DNS_E_PROTOCOL
              protocol error, a nameserver returned malformed reply.

       DNS_E_NXDOMAIN
              the domain name does not exist.

       DNS_E_NODATA
              there is no data of requested type found.

       DNS_E_NOMEM
              out of memory while processing request.

       DNS_E_BADQUERY
              some aspect of the query (most common is the domain name in question) is invalid, and the  library
              can't even start a query.

       Library  provides two series of routines which uses similar interface -- one for asynchronous queries and
       another for synchronous queries.  There are two general low-level  routines  in  each  series  to  submit
       (asynchronous  interface)  and  resolve (synchronous interface) queries, as well as several type-specific
       routines with more easy-to-use interfaces.  To submit an asynchronous query, use one of  dns_submit_XXX()
       routine,  each  of which accepts query parameters, pointers to callback routine and to callback data, and
       optional current time hint.  Note type-specific dns_submit_XXX() routines expects specific  type  of  the
       callback  routine  as  well,  which  accepts  reply  as  a pointer to corresponding structure, not a void
       pointer).   Every  dns_submit_XXX()  routine  return  pointer  to  internal  query  structure   of   type
       struct dns_query, used as an identifier for the given query.

       To  resolve  a  query  synchronously, use one of dns_resolve_XXX() routines, which accepts the same query
       parameters (but not the callback pointers)  as  corresponding  dns_submit_XXX(),  and  return  the  query
       result, which is the same as passed to the callback routine in case of asynchronous interface.

       In  either  case,  the  result memory (if the query completed successefully) is dynamically allocated and
       should be freed by an application.  If the query failed for any reason, the  result  will  be  NULL,  and
       error status will be available from dns_status(ctx) routine as shown above.

       struct dns_query *
       dns_submit_dn(ctx,
            const unsigned char *dn, qcls, qtyp, flags,
            parse, cbck, data)
       struct dns_query *
       dns_submit_p(ctx,
            const char *name, qcls, qtyp, flags,
            parse, cbck, data)
          enum dns_class qcls;
          enum dns_type qtyp;
          int flags;
          dns_parse_fn *parse;
          dns_query_fn *cbck;
          void *data;
              submit  a  query  for processing for the given resolver context ctx.  Two routines differs only in
              3rd argument, which is domain name in DN format (dn) or asciiz string (name).  The query  will  be
              performed  for  the  given  domain name, with type qtyp in class qcls, using option bits in flags,
              using RR parsing routine pointed by parse if not-NULL, and upon completion, cbck function will  be
              called  with  the  data  argument.   In  case  of successeful query submission, the routine return
              pointer to internal query structure which may be treated as an identifier of the query as used  by
              the library, and may be used as an argument for dns_cancel() routine.  In case of error, NULL will
              be returned, and context error status (available  using  dns_status()  routine)  will  be  set  to
              corresponding  error  code, which in this case may be DNS_E_BADQUERY if the name of dn is invalid,
              DNS_E_NOMEM if there's no memory available to allocate query structure, or  DNS_E_TEMPFAIL  if  an
              internal error occurred.

       void *dns_resolve_dn(ctx,
            const unsigned char *dn, qcls, qtyp, flags, parse);
       void *dns_resolve_p(ctx,
            const char *name, qcls, qtyp, flags, parse)
          enum dns_class qcls;
          enum dns_type qtyp;
          int flags;
          dns_parse_fn *parse;
              synchronous  interface.   The  routines perform all the steps necessary to resolve the given query
              and return the result.  If there's no positive result for any  reason,  all  the  routines  return
              NULL,  and  set  context error status (available using dns_status() routine) to indicate the error
              code.  If the query was successeful, context status code will contain either the length of the raw
              DNS  reply  packet  if  parse  argument was NULL (in which case the return value is pointer to the
              reply DNS packet), or 0 (in which case the return value is the result of parse routine).   If  the
              query successeful (return value is not NULL), the memory returned was dynamically allocated by the
              library and should be free()d by application after use.

       void *dns_resolve(ctx, struct dns_query *q)
              wait for the given query q, as returned by one of dns_submit_XXX() routines, for  completion,  and
              return the result.  The callback routine will not be called for this query.  After completion, the
              query identifier q is not valid. Both  dns_resolve_dn()  and  dns_resolve_p()  are  just  wrappers
              around corresponding submit routines and this dns_resolve() routine.

       void dns_cancel(ctx, struct dns_query *q)
              cancel  an  active  query  q,  without  calling  a  callback routine.  After completion, the query
              identifier q is not valid.

TYPE-SPECIFIC QUERIES

       In addition to the generic low-level query interface, the library provides a set of routines  to  perform
       specific  queries in a type-safe manner, as well as parsers for several well-known resource record types.
       The library implements high-level interface for A, AAAA, PTR, MX and TXT  records  and  DNSBL  and  RHSBL
       functionality.   These  routines returns specific types as result of a query, instead of raw DNS packets.
       The following types and routines are available.

       struct dns_rr_null {
         char *dnsn_qname;     /* original query name */
         char *dnsn_cname;     /* canonical name */
         unsigned dnsn_ttl;    /* Time-To-Live (TTL) value */
         int dnsn_nrr;         /* number of records in the set */
       };

       NULL RR set, used as a base for all other RR type structures.  Every RR structure as used by the  library
       have four standard fields as in struct dns_rr_null.

   IN A Queries
       struct dns_rr_a4 {       /* IN A RRset */
         char *dnsa4_qname;     /* original query name */
         char *dnsa4_cname;     /* canonical name */
         unsigned dnsa4_ttl;    /* Time-To-Live (TTL) value */
         int dnsa4_nrr;         /* number of addresses in the set */
         struct in_addr dnsa4_addr[]; /* array of addresses */
       };
       typedef void
         dns_query_a4_fn(ctx, struct dns_rr_a4 *result, data)
       dns_parse_fn dns_parse_a4;
       struct dns_query *
       dns_submit_a4(ctx, const char *name, int flags,
          dns_query_a4_fn *cbck, data);
       struct dns_rr_a4 *
       dns_resolve_a4(ctx, const char *name, int flags);

       The  dns_rr_a4  structure holds a result of an IN A query, which is an array of IPv4 addresses.  Callback
       routine for IN A queries expected to be of type  dns_query_a4_fn,  which  expects  pointer  to  dns_rr_a4
       structure as query result instead of raw DNS packet.  The dns_parse_a4() is used to convert raw DNS reply
       packet into dns_rr_a4 structure (it is used internally and may be used directly too  with  generic  query
       interface).   Routines  dns_submit_a4()  and dns_resolve_a4() are used to perform A IN queries in a type-
       safe manner.  The name parameter is the domain name in question, and flags is query flags  bitmask,  with
       one  bit,  DNS_NOSRCH,  of  practical  interest (if the name is absolute, that is, it ends up with a dot,
       DNS_NOSRCH flag will be set automatically).

   IN AAAA Queries
       struct dns_rr_a6 {       /* IN AAAA RRset */
         char *dnsa6_qname;     /* original query name */
         char *dnsa6_cname;     /* canonical name */
         unsigned dnsa6_ttl;    /* Time-To-Live (TTL) value */
         int dnsa6_nrr;         /* number of addresses in the set */
         struct in6_addr dnsa6_addr[]; /* array of addresses */
       };
       typedef void
         dns_query_a6_fn(ctx, struct dns_rr_a6 *result, data)
       dns_parse_fn dns_parse_a6;
       struct dns_query *
       dns_submit_a6(ctx, const char *name, int flags,
          dns_query_a6_fn *cbck, data);
       struct dns_rr_a6 *
       dns_resolve_a6(ctx, const char *name, int flags);

       The dns_rr_a6 structure holds a result of an IN  AAAA  query,  which  is  an  array  of  IPv6  addresses.
       Callback  routine  for  IN  AAAA queries expected to be of type dns_query_a6_fn, which expects pointer to
       dns_rr_a6 structure as query result instead of raw DNS packet.  The dns_parse_a6() is used to convert raw
       DNS  reply  packet  into  dns_rr_a6  structure  (it  is used internally and may be used directly too with
       generic query interface).  Routines dns_submit_a6() and dns_resolve_a6() are  used  to  perform  AAAA  IN
       queries  in  a  type-safe  manner.  The name parameter is the domain name in question, and flags is query
       flags bitmask, with one bit, DNS_NOSRCH, of practical interest (if the name is absolute, that is, it ends
       up with a dot, DNS_NOSRCH flag will be set automatically).

   IN PTR Queries
       struct dns_rr_ptr {       /* IN PTR RRset */
         char *dnsptr_qname;     /* original query name */
         char *dnsptr_cname;     /* canonical name */
         unsigned dnsptr_ttl;    /* Time-To-Live (TTL) value */
         int dnsptr_nrr;         /* number of domain name pointers */
         char *dnsptr_ptr[];     /* array of domain name pointers */
       };
       typedef void
         dns_query_ptr_fn(ctx, struct dns_rr_ptr *result, data)
       dns_parse_fn dns_parse_ptr;
       struct dns_query *
       dns_submit_a4ptr(ctx, const struct in_addr *addr,
          dns_query_ptr_fn *cbck, data);
       struct dns_rr_ptr *
       dns_resolve_a4ptr(ctx, const struct in_addr *addr);
       struct dns_query *
       dns_submit_a6ptr(ctx, const struct in6_addr *addr,
          dns_query_ptr_fn *cbck, data);
       struct dns_rr_ptr *
       dns_resolve_a6ptr(ctx, const struct in6_addr *addr);

       The dns_rr_ptr structure holds a result of an IN PTR query, which is an array of domain name pointers for
       a  given  IPv4  or  IPv6  address.   Callback  routine  for  IN  PTR  queries  expected  to  be  of  type
       dns_query_ptr_fn,  which  expects  pointer  to  dns_rr_ptr  structure  as query result instead of raw DNS
       packet.  The dns_parse_ptr() is used to convert raw DNS reply packet into  dns_rr_ptr  structure  (it  is
       used  internally and may be used directly too with generic query interface).  Routines dns_submit_a4ptr()
       and dns_resolve_a4ptr() are used to perform IN PTR queries for IPv4  addresses  in  a  type-safe  manner.
       Routines  dns_submit_a6ptr()  and  dns_resolve_a6ptr()  are  used  to  perform  IN  PTR  queries for IPv6
       addresses.

   IN MX Queries
       struct dns_mx {          /* single MX record */
         int priority;          /* priority value of this MX */
         char *name;            /* domain name of this MX */
       };
       struct dns_rr_mx {       /* IN MX RRset */
         char *dnsmx_qname;     /* original query name */
         char *dnsmx_cname;     /* canonical name */
         unsigned dnsmx_ttl;    /* Time-To-Live (TTL) value */
         int dnsmx_nrr;         /* number of mail exchangers in the set */
         struct dns_mx dnsmx_mx[]; /* array of mail exchangers */
       };
       typedef void
         dns_query_mx_fn(ctx, struct dns_rr_mx *result, data)
       dns_parse_fn dns_parse_mx;
       struct dns_query *
       dns_submit_mx(ctx, const char *name, int flags,
          dns_query_mx_fn *cbck, data);
       struct dns_rr_mx *
       dns_resolve_mx(ctx, const char *name, int flags);

       The dns_rr_mx structure holds a result of an IN MX query, which is an array  of  mail  exchangers  for  a
       given  domain.   Callback routine for IN MX queries expected to be of type dns_query_mx_fn, which expects
       pointer to dns_rr_mx structure as query result instead of raw DNS packet.  The dns_parse_mx() is used  to
       convert raw DNS reply packet into dns_rr_mx structure (it is used internally and may be used directly too
       with generic query interface).  Routines dns_submit_mx() and dns_resolve_mx() are used to perform  IN  MX
       queries  in  a  type-safe  manner.  The name parameter is the domain name in question, and flags is query
       flags bitmask, with one bit, DNS_NOSRCH, of practical interest (if the name is absolute, that is, it ends
       up with a dot, DNS_NOSRCH flag will be set automatically).

   TXT Queries
       struct dns_txt {          /* single TXT record */
         int len;                /* length of the text */
         unsigned char *txt;     /* pointer to the text */
       };
       struct dns_rr_txt {       /* TXT RRset */
         char *dnstxt_qname;     /* original query name */
         char *dnstxt_cname;     /* canonical name */
         unsigned dnstxt_ttl;    /* Time-To-Live (TTL) value */
         int dnstxt_nrr;         /* number of text records in the set */
         struct dns_txt dnstxt_txt[]; /* array of TXT records */
       };
       typedef void
         dns_query_txt_fn(ctx, struct dns_rr_txt *result, data)
       dns_parse_fn dns_parse_txt;
       struct dns_query *
       dns_submit_txt(ctx, const char *name, enum dns_class qcls,
          int flags, dns_query_txt_fn *cbck, data);
       struct dns_rr_txt *
       dns_resolve_txt(ctx, const char *name,
                    enum dns_class qcls, int flags);

       The  dns_rr_txt  structure  holds  a result of a TXT query, which is an array of text records for a given
       domain name.  Callback routine for TXT queries expected to be of  type  dns_query_txt_fn,  which  expects
       pointer  to  dns_rr_txt structure as query result instead of raw DNS packet.  The dns_parse_txt() is used
       to convert raw DNS reply packet into dns_rr_txt structure (it is used internally and may be used directly
       too  with  generic query interface).  Routines dns_submit_txt() and dns_resolve_txt() are used to perform
       IN MX queries in a type-safe manner.  The name parameter is the domain name in  question,  and  flags  is
       query  flags  bitmask, with one bit, DNS_NOSRCH, of practical interest (if the name is absolute, that is,
       it ends up with a dot, DNS_NOSRCH flag will  be  set  automatically).   Note  that  each  TXT  string  is
       represented by struct dns_txt, while zero-terminated (and the len field of the structure does not include
       the terminator), may contain embedded null characters -- content of TXT records is not interpreted by the
       library in any way.

   SRV Queries
       struct dns_srv {          /* single SRV record */
         int priority;           /* priority of the record */
         int weight;             /* weight of the record */
         int port;               /* the port number to connect to */
         char *name;             /* target host name */
       };
       struct dns_rr_srv {       /* SRV RRset */
         char *dnssrv_qname;     /* original query name */
         char *dnssrv_cname;     /* canonical name */
         unsigned dnssrv_ttl;    /* Time-To-Live (TTL) value */
         int dnssrv_nrr;         /* number of text records in the set */
         struct dns_srv dnssrv_srv[]; /* array of SRV records */
       };
       typedef void
         dns_query_srv_fn(ctx, struct dns_rr_srv *result, data)
       dns_parse_fn dns_parse_srv;
       struct dns_query *
       dns_submit_srv(ctx, const char *name, const char *service, const char *protocol,
          int flags, dns_query_txt_fn *cbck, data);
       struct dns_rr_srv *
       dns_resolve_srv(ctx, const char *name, const char *service, const char *protocol,
                    int flags);

       The  dns_rr_srv  structure  holds  a  result  of  an IN SRV (rfc2782) query, which is an array of servers
       (together with port numbers) which are performing operations for a given service using given protocol  on
       a target domain name.  Callback routine for IN SRV queries expected to be of type dns_query_srv_fn, which
       expects pointer to dns_rr_srv structure as query result instead of raw DNS packet.   The  dns_parse_srv()
       is  used to convert raw DNS reply packet into dns_rr_srv structure (it is used internally and may be used
       directly too with generic query interface).  Routines dns_submit_srv() and dns_resolve_srv() are used  to
       perform IN SRV queries in a type-safe manner.  The name parameter is the domain name in question, service
       and protocl specifies the service and the protocol in question  (the  library  will  construct  query  DN
       according  to  rfc2782  rules) and may be NULL (in this case the library assumes name parameter holds the
       complete SRV query), and flags is query flags bitmask, with one bit, DNS_NOSRCH,  of  practical  interest
       (if the name is absolute, that is, it ends up with a dot, DNS_NOSRCH flag will be set automatically).

   NAPTR Queries
       struct dns_naptr {        /* single NAPTR record */
         int order;              /* record order */
         int preference;         /* preference of this record */
         char *flags;            /* application-specific flags */
         char *service;          /* service parameter */
         char *regexp;           /* substitutional regular expression */
         char *replacement;      /* replacement string */
       };
       struct dns_rr_naptr {     /* NAPTR RRset */
         char *dnsnaptr_qname;   /* original query name */
         char *dnsnaptr_cname;   /* canonical name */
         unsigned dnsnaptr_ttl;  /* Time-To-Live (TTL) value */
         int dnsnaptr_nrr;       /* number of text records in the set */
         struct dns_naptr dnsnaptr_naptr[]; /* array of NAPTR records */
       };
       typedef void
         dns_query_naptr_fn(ctx, struct dns_rr_naptr *result, data)
       dns_parse_fn dns_parse_naptr;
       struct dns_query *
       dns_submit_naptr(ctx, const char *name, int flags,
          dns_query_txt_fn *cbck, data);
       struct dns_rr_naptr *
       dns_resolve_naptr(ctx, const char *name, int flags);

       The  dns_rr_naptr structure holds a result of an IN NAPTR (rfc3403) query.  Callback routine for IN NAPTR
       queries expected to be of type dns_query_naptr_fn, expects pointer to  dns_rr_naptr  structure  as  query
       result  instead  of  raw  DNS packet.  The dns_parse_naptr() is used to convert raw DNS reply packet into
       dns_rr_naptr structure (it is used internally and may be used directly too with generic query interface).
       Routines  dns_submit_naptr()  and dns_resolve_naptr() are used to perform IN NAPTR queries in a type-safe
       manner.  The name parameter is the domain name in question, and flags is query flags  bitmask,  with  one
       bit,  DNS_NOSRCH,  of  practical  interest  (if  the  name  is  absolute, that is, it ends up with a dot,
       DNS_NOSRCH flag will be set automatically).

   DNSBL Interface
       A DNS-based blocklists, or a DNSBLs, are in wide use nowadays, especially  to  protect  mailservers  from
       spammers.   The  library  provides  DNSBL interface, a set of routines to perform queries against DNSBLs.
       Routines accepts an IP address (IPv4 and IPv6 are  both  supported)  and  a  base  DNSBL  zone  as  query
       parameters,  and  returns either dns_rr_a4 or dns_rr_txt structure.  Note that IPv6 interface return IPv4
       RRset.

       struct dns_query *
       dns_submit_a4dnsbl(ctx,
         const struct in_addr *addr, const char *dnsbl,
         dns_query_a4_fn *cbck, void *data);
       struct dns_query *
       dns_submit_a4dnsbl_txt(ctx,
         const struct in_addr *addr, const char *dnsbl,
         dns_query_txt_fn *cbck, void *data);
       struct dns_query *
       dns_submit_a6dnsbl(ctx,
         const struct in6_addr *addr, const char *dnsbl,
         dns_query_a4_fn *cbck, void *data);
       struct dns_query *
       dns_submit_a6dnsbl_txt(ctx,
         const struct in6_addr *addr, const char *dnsbl,
         dns_query_txt_fn *cbck, void *data);
       struct dns_rr_a4 *dns_resolve_a4dnsbl(ctx,
         const struct in_addr *addr, const char *dnsbl)
       struct dns_rr_txt *dns_resolve_a4dnsbl_txt(ctx,
         const struct in_addr *addr, const char *dnsbl)
       struct dns_rr_a4 *dns_resolve_a6dnsbl(ctx,
         const struct in6_addr *addr, const char *dnsbl)
       struct dns_rr_txt *dns_resolve_a6dnsbl_txt(ctx,
         const struct in6_addr *addr, const char *dnsbl)
       Perform (submit or resolve) a DNSBL query for the  given  dnsbl  domain  and  an  IP  addr  in  question,
       requesting either A or TXT records.

   RHSBL Interface
       RHSBL is similar to DNSBL, but instead of an IP address, the parameter is a domain name.

       struct dns_query *
       dns_submit_rhsbl(ctx, const char *name, const char *rhsbl,
         dns_query_a4_fn *cbck, void *data);
       struct dns_query *
       dns_submit_rhsbl_txt(ctx, const char *name, const char *rhsbl,
         dns_query_txt_fn *cbck, void *data);
       struct dns_rr_a4 *
       dns_resolve_rhsbl(ctx, const char *name, const char *rhsbl);
       struct dns_rr_txt *
       dns_resolve_rhsbl_txt(ctx, const char *name, const char *rhsbl);
       Perform  (submit  or  resolve)  a RHSBL query for the given rhsbl domain and name in question, requesting
       either A or TXT records.

LOW-LEVEL INTERFACE

   Domain Names (DNs)
       A DN is a series of domain name labels each starts with length byte, followed by empty label (label  with
       zero length).  The following routines to work with DNs are provided.

       unsigned dns_dnlen(const unsigned char *dn)
              return length of the domain name dn, including the terminating label.

       unsigned dns_dnlabels(const unsigned char *dn)
              return number of non-zero labels in domain name dn.

       unsigned dns_dnequal(dn1, dn2)
         const unsigned char *dn1, *dn2;
              test whenever the two domain names, dn1 and dn2, are equal (case-insensitive).  Return domain name
              length if equal or 0 if not.

       unsigned dns_dntodn(sdn, ddn, dnsiz)
         const unsigned char *sdn;
         unsigned char *ddn;
         unsigned dnsiz;
              copies the source domain name sdn to destination buffer ddn of size  dnsiz.   Return  domain  name
              length or 0 if ddn is too small.

       int dns_ptodn(name, namelen, dn, dnsiz, isabs)
       int dns_sptodn(name, dn, dnsiz)
         const char *name; unsigned namelen;
         unsigned char *dn; unsigned dnsiz;
         int *isabs;
              convert  asciiz  name  name  of length namelen to DN format, placing result into buffer dn of size
              dnsiz.  Return length of the DN if successeful, 0 if the dn  buffer  supplied  is  too  small,  or
              negative  value  if  name is invalid.  If isabs is non-NULL and conversion was successeful, *isabs
              will be set to either 1 or 0 depending whenever name was absolute (i.e. ending with a dot) or not.
              Name  length,  namelength,  may  be  zero,  in which case strlen(name) will be used.  Second form,
              dns_sptodn(), is a simplified form of dns_ptodn(), equivalent to
              dns_ptodn(name, 0, dn, dnlen, 0).

       extern const unsigned char dns_inaddr_arpa_dn[]
       int dns_a4todn(const struct in_addr *addr, const unsigned char *tdn,
             unsigned char *dn, unsigned dnsiz)
       int dns_a4ptodn(const struct in_addr *addr, const char *tname,
             unsigned char *dn, unsigned dnsiz)
       extern const unsigned char dns_ip6_arpa_dn[]
       int dns_a6todn(const struct in6_addr *addr, const unsigned char *tdn,
             unsigned char *dn, unsigned dnsiz)
       int dns_a6ptodn(const struct in6_addr *addr, const char *tname,
             unsigned char *dn, unsigned dnsiz)
              several variants of routines to convert IPv4 and IPv6 address  addr  into  reverseDNS-like  domain
              name in DN format, storing result in dn of size dnsiz.  tdn (or tname) is the base zone name, like
              in-addr.arpa for IPv4 or in6.arpa for IPv6.  If tdn (or tname)  is  NULL,  dns_inaddr_arpa_dn  (or
              dns_ip6_arpa_dn)  will be used.  The routines may be used to construct a DN for a DNSBL lookup for
              example.  All routines return length of the resulting  DN  on  success,  -1  if  resulting  DN  is
              invalid,  or  0 if the dn buffer (dnsiz) is too small.  To hold standard rDNS DN, a buffer of size
              DNS_A4RSIZE (30 bytes)  for  IPv4  address,  or  DNS_A6RSIZE  (74  bytes)  for  IPv6  address,  is
              sufficient.

       int dns_dntop(dn, name, namesiz)
          const unsigned char *dn;
          const char *name; unsigned namesiz;
              convert  domain  name  dn  in  DN format to asciiz string, placing result into name buffer of size
              namesiz.  Maximum length of asciiz representation of domain  name  is  DNS_MAXNAME  (1024)  bytes.
              Root  domain  is  represented  as  empty  string.   Return length of the resulting name (including
              terminating character, i.e. strlen(name)+1) on success, 0 if the name  buffer  is  too  small,  or
              negative  value if dn is invalid (last case should never happen since all routines in this library
              which produce domain names ensure the DNs generated are valid).

       const char *dns_dntosp(const unsigned char *dn)
              convert domain name dn in DN format to asciiz string using static buffer.   Return  the  resulting
              asciiz  string  on  success or NULL on failure.  Note since this routine uses static buffer, it is
              not thread-safe.

       unsigned dns_dntop_size(const unsigned char *dn)
              return the buffer size needed to convert the dn domain name in DN format  to  asciiz  string,  for
              dns_dntop().   The  routine return either the size of buffer required, including the trailing zero
              byte, or 0 if dn is invalid.

   Working with DNS Packets
       The following routines are provided to  encode  and  decode  DNS  on-wire  packets.   This  is  low-level
       interface.

       DNS  response codes (returned by dns_rcode() routine) are defined as constants prefixed with DNS_R_.  See
       udns.h header file for the complete list.  In particular, constants  DNS_R_NOERROR  (0),  DNS_R_SERVFAIL,
       DNS_R_NXDOMAIN may be of interest to an application.

       unsigned dns_get16(const unsigned char *p)
       unsigned dns_get32(const unsigned char *p)
              helper routines, convert 16-bit or 32-bit integer in on-wire format pointed to by p to unsigned.

       unsigned char *dns_put16(unsigned char *d, unsigned n)
       unsigned char *dns_put32(unsigned char *d, unsigned n)
              helper routine, convert unsigned 16-bit or 32-bit integer n to on-wire format to buffer pointed to
              by d, return d+2 or d+4.

       DNS_HSIZE (12)
              defines size of DNS header.  Data section in the DNS packet immediately follows  the  header.   In
              the  header,  there  are  query  identifier  (id), various flags and codes, and number of resource
              records in various data sections.  See  udns.h  header  file  for  complete  list  of  DNS  header
              definitions.

       unsigned dns_qid(const unsigned char *pkt)
       int dns_rd(const unsigned char *pkt)
       int dns_tc(const unsigned char *pkt)
       int dns_aa(const unsigned char *pkt)
       int dns_qr(const unsigned char *pkt)
       int dns_ra(const unsigned char *pkt)
       unsigned dns_opcode(const unsigned char *pkt)
       unsigned dns_rcode(const unsigned char *pkt)
       unsigned dns_numqd(const unsigned char *pkt)
       unsigned dns_numan(const unsigned char *pkt)
       unsigned dns_numns(const unsigned char *pkt)
       unsigned dns_numar(const unsigned char *pkt)
       const unsigned char *dns_payload(const unsigned char *pkt)
              return  various  parts  from  the DNS packet header pkt: query identifier (qid), recursion desired
              (rd) flag, truncation occurred (tc) flag, authoritative answer  (aa)  flag,  query  response  (qr)
              flag,  recursion  available  (ra)  flag,  operation  code (opcode), result code (rcode), number of
              entries in question section (numqd), number  of  answers  (numan),  number  of  authority  records
              (numns), number of additional records (numar), and the pointer to the packet data (payload).

       int dns_getdn(pkt, curp, pkte, dn, dnsiz)
       const unsigned char *dns_skipdn(cur, pkte)
          const unsigned char *pkt, *pkte, **curp, *cur;
          unsigned char *dn; unsigned dnsiz;
              dns_getdn()  extract DN from DNS packet pkt which ends before pkte starting at position *curp into
              buffer pointed to by dn of size dnsiz.  Upon successeful completion, *curp will point to the  next
              byte  in  the packet after the extracted domain name.  It return positive number (length of the DN
              if dn) upon successeful completion, negative value on error  (when  the  packet  contains  invalid
              data),  or  zero  if  the  dnsiz  is  too  small  (maximum  length of a domain name is DNS_MAXDN).
              dns_skipdn() return pointer to the next byte in DNS packet which  ends  up  before  pkte  after  a
              domain  name which starts at the cur byte, or NULL if the packet is invalid.  dns_skipdn() is more
              or less equivalent to what dns_getdn() does, except it does not actually extract the  domain  name
              in question, and uses simpler interface.

       struct dns_rr {
         unsigned char dnsrr_dn[DNS_MAXDN]; /* the RR DN name */
         enum dns_class dnsrr_cls;          /* class of the RR */
         enum dns_type  dnsrr_typ;          /* type of the RR */
         unsigned dnsrr_ttl;                /* TTL value */
         unsigned dnsrr_dsz;                /* size of data in bytes */
         const unsigned char *dnsrr_dptr;   /* pointer to the first data byte */
         const unsigned char *dnsrr_dend;   /* next byte after RR */
       };
              The  dns_rr structure is used to hold information about single DNS Resource Record (RR) in an easy
              to use form.

       struct dns_parse {
         const unsigned char *dnsp_pkt; /* pointer to the packet being parsed */
         const unsigned char *dnsp_end; /* end of the packet pointer */
         const unsigned char *dnsp_cur; /* current packet position */
         const unsigned char *dnsp_ans; /* pointer to the answer section */
         int dnsp_rrl;                  /* number of RRs left */
         int dnsp_nrr;                  /* number of relevant RRs seen so far */
         unsigned dnsp_ttl;             /* TTL value so far */
         const unsigned char *dnsp_qdn; /* the domain of interest or NULL */
         enum dns_class dnsp_qcls;      /* class of interest or 0 for any */
         enum dns_type  dnsp_qtyp;      /* type of interest or 0 for any */
         unsigned char dnsp_dnbuf[DNS_MAXDN]; /* domain name buffer */
       };
              The dns_parse structure is used to parse DNS reply packet.  It holds information about the  packet
              being  parsed  (dnsp_pkt, dnsp_end and dnsp_cur fields), number of RRs in the current section left
              to do, and the information about specific RR which we're  looking  for  (dnsp_qdn,  dnsp_qcls  and
              dnsp_qtyp fields).

       int dns_initparse(struct dns_parse *p,
         const unsigned char *qdn,
         const unsigned char *pkt,
         const unsigned char *cur,
         const unsigned char *end)
              initializes  the  RR parsing structure p.  Arguments pkt, cur and end should describe the received
              packet: pkt is the start of the packet, end points to the next byte after the end of  the  packet,
              and  cur  points  past  the  query DN in query section (to query class+type information).  And qdn
              points to the query DN.  This is the arguments passed to dns_parse_fn()  routine.  dns_initparse()
              initializes  dnsp_pkt,  dnsp_end  and dnsp_qdn fields to the corresponding arguments, extracts and
              initializes dnsp_qcls and dnsp_qtyp fields  to  the  values  found  at  cur  pointer,  initializes
              dnsp_cur  and  dnsp_ans  fields  to  be  cur+4  (to  the start of answer section), and initializes
              dnsp_rrl field to be number of entries in answer section. dnsp_ttl will be set to max  TTL  value,
              0xffffffff, and dnsp_nrr to 0.

       int dns_nextrr(struct dns_parse *p, struct dns_rr *rr);
              searches  for  next RR in the packet based on the criteria provided in the p structure, filling in
              the rr structure and advancing p->dnsp_cur to the next RR in the packet.  RR selection is based on
              dnsp_qdn, dnsp_qcls and dnsp_qtyp fields in the dns_parse structure.  Any (or all) of the 3 fields
              may be 0, which means any actual value from the packet is acceptable.  In case the field  isn't  0
              (or NULL for dnsp_qdn), only RRs with corresponding characteristics are acceptable.  Additionally,
              when dnsp_qdn is non-NULL, dns_nextrr() performs automatic CNAME expansion.  Routine  will  return
              positive  value  on  success,  0  in  case  it  reached  the  end of current section in the packet
              (p->dnsp_rrl is zero), or negative value if next RR can not be decoded (packet format is invalid).
              The  routine  updates  p->dnsp_qdn  automatically  when  this  field is non-NULL and it encounters
              appropriate CNAME RRs (saving CNAME target  in  p->dnsp_dnbuf),  so  after  end  of  the  process,
              p->dnsp_qdn  will  point  to  canonical  name  of  the  domain  in  question.  The routine updates
              p->dnsp_ttl value to be the minimum TTL of all RRs found.

       void dns_rewind(struct dns_parse *p, const unsigned char *qdn)
              this routine "rewinds" the packet parse state structure to be at the same state as after a call to
              dns_initparse(),  i.e.  reposition  the  parse  structure  p  to  the  start of answer section and
              initialize p->dnsp_rrl to the number of entries in answer section.

       int dns_stdrr_size(const struct dns_parse *p);
              return size to hold standard RRset structure information, as shown in dns_rr_null  structure  (for
              the query and canonical names).  Used to calculate amount of memory to allocate for common part of
              type-specific RR structures in parsing routines.

       void *dns_stdrr_finish(struct dns_rr_null *ret, char *cp,
         const struct dns_parse *p);
              initializes standard RRset fields in ret structure using buffer pointed to  by  cp,  which  should
              have  at least as many bytes as dns_stdrr_size(p) returned.  Used to finalize common part of type-
              specific RR structures in parsing routines.

       See library source for usage examples of all the above  low-level  routines,  especially  source  of  the
       parsing routines.

   Auxilary Routines
       int dns_pton(int af, const char *src, void *dst);
              privides   functionality   similar   to   standard   inet_pton()  routine,  to  convert  printable
              representation of an IP address of family af (either AF_INET or AF_INET6) pointed to by  src  into
              binary  form  suitable for socket addresses and transmission over network, in buffer pointed to by
              dst.  The destination buffer should be of size 4 for AF_INET  family  or  16  for  AF_INET6.   The
              return  value is positive on success, 0 if src is not a valid text representation of an address of
              family af, or negative if the given address family is not supported.

       const char *dns_ntop(int af, const void *src,
           char *dst, int dstsize)
              privides functionality similar to standard inet_ntop() routine, to convert  binary  representation
              of  an  IP  address  of  family  af (either AF_INET or AF_INET6) pointed to by src (either 4 or 16
              bytes) into printable form in buffer in buffer pointed to by dst of size dstsize.  The destination
              buffer  should  be  at  least  of  size 16 bytes for AF_INET family or 46 bytes for AF_INET6.  The
              return value is either dst, or NULL pointer if dstsize is too small to hold this address or if the
              given address family is not supported.

AUTHOR

       The udns library has been written by Michael Tokarev, mjt+udns@tls.msk.ru.

VERSION

       This manual page corresponds to udns version 0.6, released Jul-2024.