mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 04:13:28 +01:00
r17846@tombo: nickm | 2008-08-22 11:54:00 -0400
Make dns resolver code more robust: handle nameservers with IPv6 addresses, make sure names in replies match requested names, make sure origin address of reply matches the address we asked. svn:r16621
This commit is contained in:
parent
8f5642edbc
commit
fc52d85b7c
@ -3,6 +3,7 @@ Changes in version 0.2.1.5-alpha - 2008-08-??
|
||||
- Convert many internal address representations to optionally hold
|
||||
IPv6 addresses.
|
||||
- Generate and accept IPv6 addresses in many protocol elements.
|
||||
- Make resolver code handle nameservers located at ipv6 addresses.
|
||||
- Begin implementation of proposal 121 (Client authorization for
|
||||
hidden services): associate keys, client lists, and authorization
|
||||
types with hidden services.
|
||||
@ -34,6 +35,8 @@ Changes in version 0.2.1.5-alpha - 2008-08-??
|
||||
o Minor features
|
||||
- Rate-limit too-many-sockets messages: when they happen, they
|
||||
happen a lot. Resolves bug 748.
|
||||
- Resist DNS poisoning a little better by making sure that names
|
||||
in answer sections match.
|
||||
|
||||
|
||||
Changes in version 0.2.1.4-alpha - 2008-08-04
|
||||
|
@ -156,6 +156,7 @@ typedef unsigned int uint;
|
||||
|
||||
struct request {
|
||||
u8 *request; /* the dns packet data */
|
||||
char *name; /* the name we requested. */
|
||||
unsigned int request_len;
|
||||
int reissue_count;
|
||||
int tx_count; /* the number of times that this packet has been sent */
|
||||
@ -206,7 +207,7 @@ struct reply {
|
||||
|
||||
struct nameserver {
|
||||
int socket; /* a connected UDP socket */
|
||||
u32 address;
|
||||
struct sockaddr_storage address;
|
||||
int failed_times; /* number of times which we have given this server a chance */
|
||||
int timedout; /* number of times in a row a request has timed out */
|
||||
struct event event;
|
||||
@ -391,6 +392,22 @@ debug_ntoa(u32 address)
|
||||
(int)(u8)((a )&0xff));
|
||||
return buf;
|
||||
}
|
||||
static const char *
|
||||
debug_ntop(const struct sockaddr *sa)
|
||||
{
|
||||
if (sa->sa_family == AF_INET) {
|
||||
struct sockaddr_in *sin = (struct sockaddr_in *) sa;
|
||||
return debug_ntoa(ntohl(sin->sin_addr.s_addr));
|
||||
}
|
||||
if (sa->sa_family == AF_INET6) {
|
||||
/* Tor-specific. In libevent, add more check code. */
|
||||
static char buf[128];
|
||||
struct sockaddr_in6 *sin = (struct sockaddr_in6 *) sa;
|
||||
tor_inet_ntop(AF_INET6, &sin->sin6_addr, buf, sizeof(buf));
|
||||
return buf;
|
||||
}
|
||||
return "<unknown>";
|
||||
}
|
||||
#endif
|
||||
|
||||
static evdns_debug_log_fn_type evdns_log_fn = NULL;
|
||||
@ -428,6 +445,39 @@ _evdns_log(int warn, const char *fmt, ...)
|
||||
|
||||
#define log _evdns_log
|
||||
|
||||
static int
|
||||
sockaddr_eq(const struct sockaddr *sa1, const struct sockaddr *sa2,
|
||||
int include_port)
|
||||
{
|
||||
if (sa1->sa_family != sa2->sa_family)
|
||||
return 0;
|
||||
if (sa1->sa_family == AF_INET) {
|
||||
const struct sockaddr_in *sin1, *sin2;
|
||||
sin1 = (const struct sockaddr_in *)sa1;
|
||||
sin2 = (const struct sockaddr_in *)sa2;
|
||||
if (sin1->sin_addr.s_addr != sin2->sin_addr.s_addr)
|
||||
return 0;
|
||||
else if (include_port && sin1->sin_port != sin2->sin_port)
|
||||
return 0;
|
||||
else
|
||||
return 1;
|
||||
}
|
||||
#ifdef AF_INET6
|
||||
if (sa1->sa_family == AF_INET6) {
|
||||
const struct sockaddr_in6 *sin1, *sin2;
|
||||
sin1 = (const struct sockaddr_in6 *)sa1;
|
||||
sin2 = (const struct sockaddr_in6 *)sa2;
|
||||
if (memcmp(sin1->sin6_addr.s6_addr, sin2->sin6_addr.s6_addr, 16))
|
||||
return 0;
|
||||
else if (include_port && sin1->sin6_port != sin2->sin6_port)
|
||||
return 0;
|
||||
else
|
||||
return 1;
|
||||
}
|
||||
#endif
|
||||
return 1;
|
||||
}
|
||||
|
||||
/* This walks the list of inflight requests to find the */
|
||||
/* one with a matching transaction id. Returns NULL on */
|
||||
/* failure */
|
||||
@ -479,7 +529,7 @@ nameserver_probe_failed(struct nameserver *const ns) {
|
||||
if (evtimer_add(&ns->timeout_event, (struct timeval *) timeout) < 0) {
|
||||
log(EVDNS_LOG_WARN,
|
||||
"Error from libevent when adding timer event for %s",
|
||||
debug_ntoa(ns->address));
|
||||
debug_ntop((struct sockaddr *)&ns->address));
|
||||
/* ???? Do more? */
|
||||
}
|
||||
}
|
||||
@ -494,7 +544,7 @@ nameserver_failed(struct nameserver *const ns, const char *msg) {
|
||||
if (!ns->state) return;
|
||||
|
||||
log(EVDNS_LOG_WARN, "Nameserver %s has failed: %s",
|
||||
debug_ntoa(ns->address), msg);
|
||||
debug_ntop((struct sockaddr *)&ns->address), msg);
|
||||
global_good_nameservers--;
|
||||
assert(global_good_nameservers >= 0);
|
||||
if (global_good_nameservers == 0) {
|
||||
@ -508,7 +558,7 @@ nameserver_failed(struct nameserver *const ns, const char *msg) {
|
||||
if (evtimer_add(&ns->timeout_event, (struct timeval *) &global_nameserver_timeouts[0]) < 0) {
|
||||
log(EVDNS_LOG_WARN,
|
||||
"Error from libevent when adding timer event for %s",
|
||||
debug_ntoa(ns->address));
|
||||
debug_ntop((struct sockaddr *)&ns->address));
|
||||
/* ???? Do more? */
|
||||
}
|
||||
|
||||
@ -538,7 +588,7 @@ static void
|
||||
nameserver_up(struct nameserver *const ns) {
|
||||
if (ns->state) return;
|
||||
log(EVDNS_LOG_WARN, "Nameserver %s is back up",
|
||||
debug_ntoa(ns->address));
|
||||
debug_ntop((struct sockaddr *)&ns->address));
|
||||
evtimer_del(&ns->timeout_event);
|
||||
CLEAR(&ns->timeout_event);
|
||||
ns->state = 1;
|
||||
@ -724,7 +774,7 @@ reply_handle(struct request *const req, u16 flags, u32 ttl, struct reply *reply)
|
||||
/*XXXX refactor the parts of */
|
||||
log(EVDNS_LOG_DEBUG, "Got a SERVERFAILED from nameserver %s; "
|
||||
"will allow the request to time out.",
|
||||
debug_ntoa(req->ns->address));
|
||||
debug_ntop((struct sockaddr *)&req->ns->address));
|
||||
break;
|
||||
default:
|
||||
/* we got a good reply from the nameserver */
|
||||
@ -847,12 +897,12 @@ reply_parse(u8 *packet, int length) {
|
||||
}
|
||||
/* if (!answers) return; */ /* must have an answer of some form */
|
||||
|
||||
/* This macro skips a name in the DNS reply. */
|
||||
#define SKIP_NAME \
|
||||
/* This macro copies a name in the DNS reply into tmp_name */
|
||||
#define GET_NAME \
|
||||
do { tmp_name[0] = '\0'; \
|
||||
if (name_parse(packet, length, &j, tmp_name, sizeof(tmp_name))<0) \
|
||||
goto err; \
|
||||
} while(0);
|
||||
} while(0)
|
||||
|
||||
reply.type = req->request_type;
|
||||
|
||||
@ -861,7 +911,7 @@ reply_parse(u8 *packet, int length) {
|
||||
/* the question looks like
|
||||
* <label:name><u16:type><u16:class>
|
||||
*/
|
||||
SKIP_NAME;
|
||||
GET_NAME;
|
||||
j += 4;
|
||||
if (j >= length) goto err;
|
||||
}
|
||||
@ -872,15 +922,16 @@ reply_parse(u8 *packet, int length) {
|
||||
|
||||
for (i = 0; i < answers; ++i) {
|
||||
u16 type, class;
|
||||
int name_matches;
|
||||
|
||||
/* XXX I'd be more comfortable if we actually checked the name */
|
||||
/* here. -NM */
|
||||
SKIP_NAME;
|
||||
GET_NAME;
|
||||
GET16(type);
|
||||
GET16(class);
|
||||
GET32(ttl);
|
||||
GET16(datalength);
|
||||
|
||||
name_matches = !strcasecmp(req->name, tmp_name);
|
||||
|
||||
if (type == TYPE_A && class == CLASS_INET) {
|
||||
int addrcount, addrtocopy;
|
||||
if (req->request_type != TYPE_A) {
|
||||
@ -894,21 +945,25 @@ reply_parse(u8 *packet, int length) {
|
||||
ttl_r = MIN(ttl_r, ttl);
|
||||
/* we only bother with the first four addresses. */
|
||||
if (j + 4*addrtocopy > length) goto err;
|
||||
if (name_matches) {
|
||||
memcpy(&reply.data.a.addresses[reply.data.a.addrcount],
|
||||
packet + j, 4*addrtocopy);
|
||||
j += 4*addrtocopy;
|
||||
reply.data.a.addrcount += addrtocopy;
|
||||
reply.have_answer = 1;
|
||||
if (reply.data.a.addrcount == MAX_ADDRS) break;
|
||||
}
|
||||
j += 4*addrtocopy;
|
||||
} else if (type == TYPE_PTR && class == CLASS_INET) {
|
||||
if (req->request_type != TYPE_PTR) {
|
||||
j += datalength; continue;
|
||||
}
|
||||
if (name_parse(packet, length, &j, reply.data.ptr.name,
|
||||
sizeof(reply.data.ptr.name))<0)
|
||||
goto err;
|
||||
GET_NAME;
|
||||
if (name_matches) {
|
||||
strlcpy(reply.data.ptr.name, tmp_name,
|
||||
sizeof(reply.data.ptr.name));
|
||||
ttl_r = MIN(ttl_r, ttl);
|
||||
reply.have_answer = 1;
|
||||
}
|
||||
break;
|
||||
} else if (type == TYPE_AAAA && class == CLASS_INET) {
|
||||
int addrcount, addrtocopy;
|
||||
@ -923,12 +978,14 @@ reply_parse(u8 *packet, int length) {
|
||||
|
||||
/* we only bother with the first four addresses. */
|
||||
if (j + 16*addrtocopy > length) goto err;
|
||||
if (name_matches) {
|
||||
memcpy(&reply.data.aaaa.addresses[reply.data.aaaa.addrcount],
|
||||
packet + j, 16*addrtocopy);
|
||||
reply.data.aaaa.addrcount += addrtocopy;
|
||||
j += 16*addrtocopy;
|
||||
reply.have_answer = 1;
|
||||
if (reply.data.aaaa.addrcount == MAX_ADDRS) break;
|
||||
}
|
||||
j += 16*addrtocopy;
|
||||
} else {
|
||||
/* skip over any other type of resource */
|
||||
j += datalength;
|
||||
@ -1143,17 +1200,28 @@ nameserver_pick(void) {
|
||||
/* this is called when a namesever socket is ready for reading */
|
||||
static void
|
||||
nameserver_read(struct nameserver *ns) {
|
||||
struct sockaddr_storage ss;
|
||||
struct sockaddr *sa = (struct sockaddr *) &ss;
|
||||
socklen_t addrlen = sizeof(ss);
|
||||
u8 packet[1500];
|
||||
|
||||
for (;;) {
|
||||
const int r =
|
||||
(int)recv(ns->socket, packet,(socklen_t)sizeof(packet), 0);
|
||||
(int)recvfrom(ns->socket, packet, (socklen_t)sizeof(packet), 0,
|
||||
sa, &addrlen);
|
||||
if (r < 0) {
|
||||
int err = last_error(ns->socket);
|
||||
if (error_is_eagain(err)) return;
|
||||
nameserver_failed(ns, strerror(err));
|
||||
return;
|
||||
}
|
||||
/* XXX Match port too? */
|
||||
if (!sockaddr_eq(sa, (struct sockaddr*)&ns->address, 0)) {
|
||||
log(EVDNS_LOG_WARN,
|
||||
"Address mismatch on received DNS packet. Address was %s",
|
||||
debug_ntop(sa));
|
||||
return;
|
||||
}
|
||||
ns->timedout = 0;
|
||||
reply_parse(packet, r);
|
||||
}
|
||||
@ -1228,7 +1296,7 @@ nameserver_write_waiting(struct nameserver *ns, char waiting) {
|
||||
nameserver_ready_callback, ns);
|
||||
if (event_add(&ns->event, NULL) < 0) {
|
||||
log(EVDNS_LOG_WARN, "Error from libevent when adding event for %s",
|
||||
debug_ntoa(ns->address));
|
||||
debug_ntop((struct sockaddr *)&ns->address));
|
||||
/* ???? Do more? */
|
||||
}
|
||||
}
|
||||
@ -1983,7 +2051,7 @@ nameserver_send_probe(struct nameserver *const ns) {
|
||||
/* here we need to send a probe to a given nameserver */
|
||||
/* in the hope that it is up now. */
|
||||
|
||||
log(EVDNS_LOG_DEBUG, "Sending probe to %s", debug_ntoa(ns->address));
|
||||
log(EVDNS_LOG_DEBUG, "Sending probe to %s", debug_ntop((struct sockaddr *)&ns->address));
|
||||
|
||||
req = request_new(TYPE_A, "www.google.com", DNS_QUERY_NO_SEARCH, nameserver_probe_callback, ns);
|
||||
if (!req) return;
|
||||
@ -2095,19 +2163,23 @@ evdns_resume(void)
|
||||
}
|
||||
|
||||
static int
|
||||
_evdns_nameserver_add_impl(u32 address, int port) {
|
||||
_evdns_nameserver_add_impl(const struct sockaddr *address) {
|
||||
/* first check to see if we already have this nameserver */
|
||||
|
||||
const struct nameserver *server = server_head, *const started_at = server_head;
|
||||
struct nameserver *ns;
|
||||
struct sockaddr_in sin;
|
||||
|
||||
int err = 0;
|
||||
if (server) {
|
||||
do {
|
||||
if (server->address == address) return 3;
|
||||
if (!sockaddr_eq(address, (struct sockaddr *)&server->address, 1))
|
||||
return 3;
|
||||
server = server->next;
|
||||
} while (server != started_at);
|
||||
}
|
||||
if (address->sa_len > sizeof(ns->address)) {
|
||||
return 2;
|
||||
}
|
||||
|
||||
ns = (struct nameserver *) malloc(sizeof(struct nameserver));
|
||||
if (!ns) return -1;
|
||||
@ -2124,17 +2196,13 @@ _evdns_nameserver_add_impl(u32 address, int port) {
|
||||
#else
|
||||
fcntl(ns->socket, F_SETFL, O_NONBLOCK);
|
||||
#endif
|
||||
memset(&sin, 0, sizeof(sin));
|
||||
sin.sin_addr.s_addr = address;
|
||||
sin.sin_port = htons(port);
|
||||
sin.sin_family = AF_INET;
|
||||
if (connect(ns->socket, (struct sockaddr *) &sin,
|
||||
(socklen_t)sizeof(sin)) != 0) {
|
||||
|
||||
if (connect(ns->socket, address, address->sa_len) != 0) {
|
||||
err = 2;
|
||||
goto out2;
|
||||
}
|
||||
|
||||
ns->address = address;
|
||||
memcpy(&ns->address, address, address->sa_len);
|
||||
ns->state = 1;
|
||||
event_set(&ns->event, ns->socket, EV_READ | EV_PERSIST, nameserver_ready_callback, ns);
|
||||
if (event_add(&ns->event, NULL) < 0) {
|
||||
@ -2142,7 +2210,7 @@ _evdns_nameserver_add_impl(u32 address, int port) {
|
||||
goto out2;
|
||||
}
|
||||
|
||||
log(EVDNS_LOG_DEBUG, "Added nameserver %s", debug_ntoa(address));
|
||||
log(EVDNS_LOG_DEBUG, "Added nameserver %s", debug_ntop(address));
|
||||
|
||||
/* insert this nameserver into the list of them */
|
||||
if (!server_head) {
|
||||
@ -2166,44 +2234,102 @@ out2:
|
||||
out1:
|
||||
CLEAR(ns);
|
||||
free(ns);
|
||||
log(EVDNS_LOG_WARN, "Unable to add nameserver %s: error %d", debug_ntoa(address), err);
|
||||
log(EVDNS_LOG_WARN, "Unable to add nameserver %s: error %d", debug_ntop(address), err);
|
||||
return err;
|
||||
}
|
||||
|
||||
/* exported function */
|
||||
int
|
||||
evdns_nameserver_add(unsigned long int address) {
|
||||
return _evdns_nameserver_add_impl((u32)address, 53);
|
||||
struct sockaddr_in sin;
|
||||
sin.sin_len = sizeof(sin);
|
||||
sin.sin_addr.s_addr = htonl(address);
|
||||
sin.sin_port = 53;
|
||||
return _evdns_nameserver_add_impl((struct sockaddr*) &sin);
|
||||
}
|
||||
|
||||
/* exported function */
|
||||
int
|
||||
evdns_nameserver_ip_add(const char *ip_as_string) {
|
||||
struct in_addr ina;
|
||||
int port;
|
||||
char buf[20];
|
||||
const char *cp;
|
||||
char buf[128];
|
||||
const char *cp, *addr_part, *port_part;
|
||||
int is_ipv6;
|
||||
/* recognized formats are:
|
||||
* [ipv6]:port
|
||||
* ipv6
|
||||
* [ipv6]
|
||||
* ipv4:port
|
||||
* ipv4
|
||||
*/
|
||||
|
||||
cp = strchr(ip_as_string, ':');
|
||||
if (! cp) {
|
||||
cp = ip_as_string;
|
||||
port = 53;
|
||||
} else {
|
||||
port = strtoint(cp+1);
|
||||
if (port < 0 || port > 65535) {
|
||||
if (*ip_as_string == '[') {
|
||||
int len;
|
||||
if (!(cp = strchr(ip_as_string, ']')))
|
||||
return 4;
|
||||
}
|
||||
if ((cp-ip_as_string) >= (int)sizeof(buf)) {
|
||||
len = cp-(ip_as_string + 1);
|
||||
if (len > (int)sizeof(buf)-1)
|
||||
return 4;
|
||||
memcpy(buf, ip_as_string+1, len);
|
||||
buf[len] = '\0';
|
||||
addr_part = buf;
|
||||
if (cp[1] == ':')
|
||||
port_part = cp+2;
|
||||
else
|
||||
port_part = NULL;
|
||||
is_ipv6 = 1;
|
||||
} else if (cp && strchr(cp+1, ':')) {
|
||||
is_ipv6 = 1;
|
||||
addr_part = ip_as_string;
|
||||
port_part = NULL;
|
||||
} else if (cp) {
|
||||
is_ipv6 = 0;
|
||||
if (cp - ip_as_string > (int)sizeof(buf)-1)
|
||||
return 4;
|
||||
}
|
||||
assert(cp >= ip_as_string);
|
||||
memcpy(buf, ip_as_string, cp-ip_as_string);
|
||||
buf[cp-ip_as_string] = '\0';
|
||||
cp = buf;
|
||||
addr_part = buf;
|
||||
port_part = cp+1;
|
||||
} else {
|
||||
addr_part = ip_as_string;
|
||||
port_part = NULL;
|
||||
is_ipv6 = 0;
|
||||
}
|
||||
if (!inet_aton(cp, &ina)) {
|
||||
|
||||
if (port_part == NULL) {
|
||||
port = 53;
|
||||
} else {
|
||||
port = strtoint(port_part);
|
||||
if (port <= 0 || port > 65535) {
|
||||
return 4;
|
||||
}
|
||||
return _evdns_nameserver_add_impl(ina.s_addr, port);
|
||||
}
|
||||
|
||||
/* Tor-only. needs a more general fix. */
|
||||
assert(addr_part);
|
||||
if (is_ipv6) {
|
||||
struct sockaddr_in6 sin6;
|
||||
sin6.sin6_len = sizeof(struct sockaddr_in6);
|
||||
sin6.sin6_port = htons(port);
|
||||
if (1 != tor_inet_pton(AF_INET6, addr_part, &sin6.sin6_addr))
|
||||
return 4;
|
||||
return _evdns_nameserver_add_impl((struct sockaddr*)&sin6);
|
||||
} else {
|
||||
struct sockaddr_in sin;
|
||||
sin.sin_len = sizeof(struct sockaddr_in);
|
||||
sin.sin_port = htons(port);
|
||||
if (!inet_aton(addr_part, &sin.sin_addr))
|
||||
return 4;
|
||||
return _evdns_nameserver_add_impl((struct sockaddr*)&sin);
|
||||
}
|
||||
}
|
||||
|
||||
int
|
||||
evdns_nameserver_sockaddr_add(const struct sockaddr *sa, socklen_t len)
|
||||
{
|
||||
assert(sa->sa_len == len);
|
||||
return _evdns_nameserver_add_impl(sa);
|
||||
}
|
||||
|
||||
/* insert into the tail of the queue */
|
||||
@ -2242,7 +2368,8 @@ request_new(int type, const char *name, int flags,
|
||||
const u16 trans_id = issuing_now ? transaction_id_pick() : 0xffff;
|
||||
/* the request data is alloced in a single block with the header */
|
||||
struct request *const req =
|
||||
(struct request *) malloc(sizeof(struct request) + request_max_len);
|
||||
(struct request *) malloc(sizeof(struct request) + request_max_len
|
||||
+ name_len + 1);
|
||||
int rlen;
|
||||
(void) flags;
|
||||
|
||||
@ -2251,6 +2378,10 @@ request_new(int type, const char *name, int flags,
|
||||
|
||||
/* request data lives just after the header */
|
||||
req->request = ((u8 *) req) + sizeof(struct request);
|
||||
/* A copy of the name sits after the request data */
|
||||
req->name = ((char *)req) + sizeof(struct request) + request_max_len;
|
||||
strlcpy(req->name, name, name_len + 1);
|
||||
|
||||
/* denotes that the request data shouldn't be free()ed */
|
||||
req->request_appended = 1;
|
||||
rlen = evdns_request_data_build(name, name_len, trans_id,
|
||||
@ -2705,12 +2836,7 @@ resolv_conf_parse_line(char *const start, int flags) {
|
||||
|
||||
if (!strcmp(first_token, "nameserver") && (flags & DNS_OPTION_NAMESERVERS)) {
|
||||
const char *const nameserver = NEXT_TOKEN;
|
||||
struct in_addr ina;
|
||||
|
||||
if (inet_aton(nameserver, &ina)) {
|
||||
/* address is valid */
|
||||
evdns_nameserver_add(ina.s_addr);
|
||||
}
|
||||
evdns_nameserver_ip_add(nameserver);
|
||||
} else if (!strcmp(first_token, "domain") && (flags & DNS_OPTION_SEARCH)) {
|
||||
const char *const domain = NEXT_TOKEN;
|
||||
if (domain) {
|
||||
@ -2820,7 +2946,7 @@ evdns_nameserver_ip_add_line(const char *ips) {
|
||||
while (ISSPACE(*ips) || *ips == ',' || *ips == '\t')
|
||||
++ips;
|
||||
addr = ips;
|
||||
while (ISDIGIT(*ips) || *ips == '.' || *ips == ':')
|
||||
while (ISDIGIT(*ips) || *ips == '.' || *ips == ':' || *ips == '[' || *ips == ']')
|
||||
++ips;
|
||||
buf = malloc(ips-addr+1);
|
||||
if (!buf) return 4;
|
||||
|
@ -263,6 +263,7 @@ int evdns_count_nameservers(void);
|
||||
int evdns_clear_nameservers_and_suspend(void);
|
||||
int evdns_resume(void);
|
||||
int evdns_nameserver_ip_add(const char *ip_as_string);
|
||||
int evdns_nameserver_sockaddr_add(const struct sockaddr *sa, socklen_t len);
|
||||
int evdns_resolve_ipv4(const char *name, int flags, evdns_callback_type callback, void *ptr);
|
||||
int evdns_resolve_ipv6(const char *name, int flags, evdns_callback_type callback, void *ptr);
|
||||
struct in_addr;
|
||||
|
Loading…
Reference in New Issue
Block a user