]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/resolve/dns-type.h
resolved: add missing error code check when initializing DNS-over-TLS
[thirdparty/systemd.git] / src / resolve / dns-type.h
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
0ef6f454
LP
2#pragma once
3
7263f724
ZJS
4#include "macro.h"
5
7263f724
ZJS
6/* DNS record types, taken from
7 * http://www.iana.org/assignments/dns-parameters/dns-parameters.xhtml.
8 */
9enum {
10 /* Normal records */
11 DNS_TYPE_A = 0x01,
12 DNS_TYPE_NS,
13 DNS_TYPE_MD,
14 DNS_TYPE_MF,
15 DNS_TYPE_CNAME,
16 DNS_TYPE_SOA,
17 DNS_TYPE_MB,
18 DNS_TYPE_MG,
19 DNS_TYPE_MR,
20 DNS_TYPE_NULL,
21 DNS_TYPE_WKS,
22 DNS_TYPE_PTR,
23 DNS_TYPE_HINFO,
24 DNS_TYPE_MINFO,
25 DNS_TYPE_MX,
26 DNS_TYPE_TXT,
27 DNS_TYPE_RP,
28 DNS_TYPE_AFSDB,
29 DNS_TYPE_X25,
30 DNS_TYPE_ISDN,
31 DNS_TYPE_RT,
32 DNS_TYPE_NSAP,
33 DNS_TYPE_NSAP_PTR,
34 DNS_TYPE_SIG,
35 DNS_TYPE_KEY,
36 DNS_TYPE_PX,
37 DNS_TYPE_GPOS,
38 DNS_TYPE_AAAA,
39 DNS_TYPE_LOC,
40 DNS_TYPE_NXT,
41 DNS_TYPE_EID,
42 DNS_TYPE_NIMLOC,
43 DNS_TYPE_SRV,
44 DNS_TYPE_ATMA,
45 DNS_TYPE_NAPTR,
46 DNS_TYPE_KX,
47 DNS_TYPE_CERT,
48 DNS_TYPE_A6,
49 DNS_TYPE_DNAME,
50 DNS_TYPE_SINK,
51 DNS_TYPE_OPT, /* EDNS0 option */
52 DNS_TYPE_APL,
53 DNS_TYPE_DS,
54 DNS_TYPE_SSHFP,
55 DNS_TYPE_IPSECKEY,
56 DNS_TYPE_RRSIG,
57 DNS_TYPE_NSEC,
58 DNS_TYPE_DNSKEY,
59 DNS_TYPE_DHCID,
60 DNS_TYPE_NSEC3,
61 DNS_TYPE_NSEC3PARAM,
62 DNS_TYPE_TLSA,
63
64 DNS_TYPE_HIP = 0x37,
65 DNS_TYPE_NINFO,
66 DNS_TYPE_RKEY,
67 DNS_TYPE_TALINK,
68 DNS_TYPE_CDS,
69 DNS_TYPE_CDNSKEY,
d93a16b8 70 DNS_TYPE_OPENPGPKEY,
7263f724
ZJS
71
72 DNS_TYPE_SPF = 0x63,
73 DNS_TYPE_NID,
74 DNS_TYPE_L32,
75 DNS_TYPE_L64,
76 DNS_TYPE_LP,
77 DNS_TYPE_EUI48,
78 DNS_TYPE_EUI64,
79
80 DNS_TYPE_TKEY = 0xF9,
81 DNS_TYPE_TSIG,
82 DNS_TYPE_IXFR,
83 DNS_TYPE_AXFR,
84 DNS_TYPE_MAILB,
85 DNS_TYPE_MAILA,
86 DNS_TYPE_ANY,
87 DNS_TYPE_URI,
88 DNS_TYPE_CAA,
89 DNS_TYPE_TA = 0x8000,
90 DNS_TYPE_DLV,
91
92 _DNS_TYPE_MAX,
93 _DNS_TYPE_INVALID = -1
94};
95
96assert_cc(DNS_TYPE_SSHFP == 44);
97assert_cc(DNS_TYPE_TLSA == 52);
98assert_cc(DNS_TYPE_ANY == 255);
4b548ef3
LP
99
100/* DNS record classes, see RFC 1035 */
101enum {
102 DNS_CLASS_IN = 0x01,
103 DNS_CLASS_ANY = 0xFF,
222148b6 104
4b548ef3
LP
105 _DNS_CLASS_MAX,
106 _DNS_CLASS_INVALID = -1
107};
108
202b76ae
ZJS
109#define _DNS_CLASS_STRING_MAX (sizeof "CLASS" + DECIMAL_STR_MAX(uint16_t))
110#define _DNS_TYPE_STRING_MAX (sizeof "CLASS" + DECIMAL_STR_MAX(uint16_t))
111
222148b6
LP
112bool dns_type_is_pseudo(uint16_t type);
113bool dns_type_is_valid_query(uint16_t type);
114bool dns_type_is_valid_rr(uint16_t type);
d3c7e913 115bool dns_type_may_redirect(uint16_t type);
91adc4db 116bool dns_type_is_dnssec(uint16_t type);
d0129ddb 117bool dns_type_is_obsolete(uint16_t type);
e8233bce 118bool dns_type_may_wildcard(uint16_t type);
588c53d0 119bool dns_type_apex_only(uint16_t type);
41815a4a 120bool dns_type_needs_authentication(uint16_t type);
6ebd1e33 121bool dns_type_is_zone_transer(uint16_t type);
5259c055 122int dns_type_to_af(uint16_t type);
222148b6 123
4b548ef3
LP
124bool dns_class_is_pseudo(uint16_t class);
125bool dns_class_is_valid_rr(uint16_t class);
126
869b3b67 127/* TYPE?? follows http://tools.ietf.org/html/rfc3597#section-5 */
222148b6
LP
128const char *dns_type_to_string(int type);
129int dns_type_from_string(const char *s);
130
5259c055 131const char *dns_class_to_string(uint16_t class);
4b548ef3 132int dns_class_from_string(const char *name);
cfb90da3
ZJS
133
134/* https://tools.ietf.org/html/draft-ietf-dane-protocol-23#section-7.2 */
135const char *tlsa_cert_usage_to_string(uint8_t cert_usage);
136
137/* https://tools.ietf.org/html/draft-ietf-dane-protocol-23#section-7.3 */
138const char *tlsa_selector_to_string(uint8_t selector);
139
140/* https://tools.ietf.org/html/draft-ietf-dane-protocol-23#section-7.4 */
141const char *tlsa_matching_type_to_string(uint8_t selector);
718af59e
ZJS
142
143/* https://tools.ietf.org/html/rfc6844#section-5.1 */
144#define CAA_FLAG_CRITICAL (1u << 7)