From vladimir.levijev at gmail.com Tue Jul 2 14:09:42 2013 From: vladimir.levijev at gmail.com (Vladimir Levijev) Date: Tue, 2 Jul 2013 17:09:42 +0300 Subject: [ldns-users] ldns_verify() leaking memory Message-ID: Hi, I have a program to verify digital signatures of a domain (attached). As soon as I execute ldns_verify() I get memory leak (checking with valgrind). If I do not execute next piece of code (by adding a "goto" before calling ldns_verify()): [...] goto out; if (LDNS_STATUS_OK != (status = ldns_verify(rrset, rrsig, keys, NULL))) { printf("cannot verify \"%s\" signature from \"%s\" (%s)", subdomain, ns, ldns_get_errorstr_by_id(status)); goto out; } out: [...] my program is not leaking memory: $ gcc -Wall -ggdb -lldns ldns-verify-test.c -o ldns-verify-test && valgrind ./ldns-verify-test 199.249.120.1 org. icann.org. 2>&1 | grep 'heap usage' ==25756== total heap usage: 873 allocs, 873 frees, 434,116 bytes allocated If I remove the "goto" above and ldns_verify() gets called I get memory leak: $ gcc -Wall -ggdb -lldns ldns-verify-test.c -o ldns-verify-test && valgrind ./ldns-verify-test 199.249.120.1 org. icann.org. 2>&1 | grep 'heap usage' ==25950== total heap usage: 1,028 allocs, 1,022 frees, 637,482 bytes allocated It looks like ldns_verify() is leaking memory unless I'm doing something wrong. According to valgrind output (attached) it happens in libcrypto, that ldns is using. $ cat /etc/debian_version 7.0 $ dpkg -S /usr/lib/libldns.so libldns-dev: /usr/lib/libldns.so $ dpkg -l libldns-dev ii libldns-dev 1.6.13-1 i386 ldns library for DNS programming $ ldd /usr/lib/libldns.so linux-gate.so.1 => (0xb7790000) libcrypto.so.1.0.0 => /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0 (0xb7563000) libc.so.6 => /lib/i386-linux-gnu/i686/cmov/libc.so.6 (0xb7400000) libdl.so.2 => /lib/i386-linux-gnu/i686/cmov/libdl.so.2 (0xb73fb000) libz.so.1 => /lib/i386-linux-gnu/libz.so.1 (0xb73e2000) /lib/ld-linux.so.2 (0xb7791000) Cheers, dimir -------------- next part -------------- A non-text attachment was scrubbed... Name: ldns-verify-test.c Type: text/x-csrc Size: 3448 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: ldns-verify-test-valgrind.out Type: application/octet-stream Size: 9486 bytes Desc: not available URL: From willem at nlnetlabs.nl Thu Jul 4 09:40:08 2013 From: willem at nlnetlabs.nl (Willem Toorop) Date: Thu, 04 Jul 2013 11:40:08 +0200 Subject: [ldns-users] ldns_verify() leaking memory In-Reply-To: References: Message-ID: <51D542F8.7070902@nlnetlabs.nl> Hi Vladimir, Same thing has been noticed before by others. Openssl uses some global data that is allocated on the first call of a crypto function (RSA_new in our case). It is harmless and will not grow (or leak). You can free those globals by calling CRYPTO_cleanup_all_ex_data() just before program termination, but maybe it is safest to just leave it. --- ldns-verify-test.c.orig 2013-07-04 11:36:29.601978203 +0200 +++ ldns-verify-test.c 2013-07-04 11:36:57.533978040 +0200 @@ -1,4 +1,5 @@ #include +#include int main(int argc, char *argv[]) { @@ -128,5 +129,7 @@ if (NULL != ns_rdf) ldns_rdf_deep_free(ns_rdf); + CRYPTO_cleanup_all_ex_data(); + return 0; } $ gcc -I$HOME/local/include -Wall -ggdb ldns-verify-test.c -o ldns-verify-test -L$HOME/local/lib -lldns && valgrind ./ldns-verify-test 199.249.120.1 org. icann.org. 2>&1 | grep 'heap usage' ==3963== total heap usage: 1,029 allocs, 1,029 frees, 648,346 bytes allocated Cheers, -- Willem Op 02-07-13 16:09, Vladimir Levijev schreef: > Hi, > > I have a program to verify digital signatures of a domain (attached). > As soon as I execute ldns_verify() I get memory leak (checking with > valgrind). > > If I do not execute next piece of code (by adding a "goto" before > calling ldns_verify()): > > [...] > goto out; > > if (LDNS_STATUS_OK != (status = ldns_verify(rrset, rrsig, keys, NULL))) > { > printf("cannot verify \"%s\" signature from \"%s\" > (%s)", subdomain, ns, ldns_get_errorstr_by_id(status)); > goto out; > } > > out: > [...] > > my program is not leaking memory: > > $ gcc -Wall -ggdb -lldns ldns-verify-test.c -o ldns-verify-test && > valgrind ./ldns-verify-test 199.249.120.1 org. icann.org. 2>&1 | grep > 'heap usage' > ==25756== total heap usage: 873 allocs, 873 frees, 434,116 bytes allocated > > If I remove the "goto" above and ldns_verify() gets called I get memory leak: > > $ gcc -Wall -ggdb -lldns ldns-verify-test.c -o ldns-verify-test && > valgrind ./ldns-verify-test 199.249.120.1 org. icann.org. 2>&1 | grep > 'heap usage' > ==25950== total heap usage: 1,028 allocs, 1,022 frees, 637,482 bytes allocated > > It looks like ldns_verify() is leaking memory unless I'm doing > something wrong. According to valgrind output (attached) it happens in > libcrypto, that ldns is using. > > $ cat /etc/debian_version > 7.0 > > $ dpkg -S /usr/lib/libldns.so > libldns-dev: /usr/lib/libldns.so > > $ dpkg -l libldns-dev > ii libldns-dev 1.6.13-1 > i386 ldns library for > DNS programming > > $ ldd /usr/lib/libldns.so > linux-gate.so.1 => (0xb7790000) > libcrypto.so.1.0.0 => > /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0 (0xb7563000) > libc.so.6 => /lib/i386-linux-gnu/i686/cmov/libc.so.6 (0xb7400000) > libdl.so.2 => /lib/i386-linux-gnu/i686/cmov/libdl.so.2 (0xb73fb000) > libz.so.1 => /lib/i386-linux-gnu/libz.so.1 (0xb73e2000) > /lib/ld-linux.so.2 (0xb7791000) > > Cheers, > > dimir > > > > _______________________________________________ > ldns-users mailing list > ldns-users at open.nlnetlabs.nl > http://open.nlnetlabs.nl/mailman/listinfo/ldns-users > From vladimir.levijev at gmail.com Thu Jul 4 11:56:29 2013 From: vladimir.levijev at gmail.com (Vladimir Levijev) Date: Thu, 4 Jul 2013 14:56:29 +0300 Subject: [ldns-users] ldns_verify() leaking memory In-Reply-To: <51D542F8.7070902@nlnetlabs.nl> References: <51D542F8.7070902@nlnetlabs.nl> Message-ID: On 4 July 2013 12:40, Willem Toorop wrote: Hi Willem, > Same thing has been noticed before by others. Openssl uses some global > data that is allocated on the first call of a crypto function (RSA_new > in our case). It is harmless and will not grow (or leak). You can free > those globals by calling CRYPTO_cleanup_all_ex_data() just before > program termination, but maybe it is safest to just leave it. > > > --- ldns-verify-test.c.orig 2013-07-04 11:36:29.601978203 +0200 > +++ ldns-verify-test.c 2013-07-04 11:36:57.533978040 +0200 > @@ -1,4 +1,5 @@ > #include > +#include > > int main(int argc, char *argv[]) > { > @@ -128,5 +129,7 @@ > if (NULL != ns_rdf) > ldns_rdf_deep_free(ns_rdf); > > + CRYPTO_cleanup_all_ex_data(); > + > return 0; > } > > > $ gcc -I$HOME/local/include -Wall -ggdb ldns-verify-test.c -o > ldns-verify-test -L$HOME/local/lib -lldns && valgrind ./ldns-verify-test > 199.249.120.1 org. icann.org. 2>&1 | grep 'heap usage' > ==3963== total heap usage: 1,029 allocs, 1,029 frees, 648,346 bytes > allocated Thank you for a detailed reply, it's clear now. :-) Cheers, dimir > Op 02-07-13 16:09, Vladimir Levijev schreef: >> Hi, >> >> I have a program to verify digital signatures of a domain (attached). >> As soon as I execute ldns_verify() I get memory leak (checking with >> valgrind). >> >> If I do not execute next piece of code (by adding a "goto" before >> calling ldns_verify()): >> >> [...] >> goto out; >> >> if (LDNS_STATUS_OK != (status = ldns_verify(rrset, rrsig, keys, NULL))) >> { >> printf("cannot verify \"%s\" signature from \"%s\" >> (%s)", subdomain, ns, ldns_get_errorstr_by_id(status)); >> goto out; >> } >> >> out: >> [...] >> >> my program is not leaking memory: >> >> $ gcc -Wall -ggdb -lldns ldns-verify-test.c -o ldns-verify-test && >> valgrind ./ldns-verify-test 199.249.120.1 org. icann.org. 2>&1 | grep >> 'heap usage' >> ==25756== total heap usage: 873 allocs, 873 frees, 434,116 bytes allocated >> >> If I remove the "goto" above and ldns_verify() gets called I get memory leak: >> >> $ gcc -Wall -ggdb -lldns ldns-verify-test.c -o ldns-verify-test && >> valgrind ./ldns-verify-test 199.249.120.1 org. icann.org. 2>&1 | grep >> 'heap usage' >> ==25950== total heap usage: 1,028 allocs, 1,022 frees, 637,482 bytes allocated >> >> It looks like ldns_verify() is leaking memory unless I'm doing >> something wrong. According to valgrind output (attached) it happens in >> libcrypto, that ldns is using. >> >> $ cat /etc/debian_version >> 7.0 >> >> $ dpkg -S /usr/lib/libldns.so >> libldns-dev: /usr/lib/libldns.so >> >> $ dpkg -l libldns-dev >> ii libldns-dev 1.6.13-1 >> i386 ldns library for >> DNS programming >> >> $ ldd /usr/lib/libldns.so >> linux-gate.so.1 => (0xb7790000) >> libcrypto.so.1.0.0 => >> /usr/lib/i386-linux-gnu/i686/cmov/libcrypto.so.1.0.0 (0xb7563000) >> libc.so.6 => /lib/i386-linux-gnu/i686/cmov/libc.so.6 (0xb7400000) >> libdl.so.2 => /lib/i386-linux-gnu/i686/cmov/libdl.so.2 (0xb73fb000) >> libz.so.1 => /lib/i386-linux-gnu/libz.so.1 (0xb73e2000) >> /lib/ld-linux.so.2 (0xb7791000) From ondrej at sury.org Tue Jul 16 05:36:25 2013 From: ondrej at sury.org (=?UTF-8?B?T25kxZllaiBTdXLDvQ==?=) Date: Tue, 16 Jul 2013 07:36:25 +0200 Subject: [ldns-users] [Opendnssec-user] RE: after update In-Reply-To: <3bc0908ddae84b5c981c43b80b0d05cb@SRV07.dikkenberg.local> References: <01dd1ba6dc1f42bdbe463ac262b00c9b@SRV04.dikkenberg.local> <3bc0908ddae84b5c981c43b80b0d05cb@SRV07.dikkenberg.local> Message-ID: That means that ldns has to bump the SONAME. I saw the missing symbols, but I thought that nobody was using the symbols since it was not a public API. Willem, could you please release new ldns with bumped SONAME? (Or reintroduce the symbols back.) It breaks the linked software since ABI has changed. O. On Mon, Jul 15, 2013 at 10:09 PM, Bas van den Dikkenberg wrote: > I found the problem .**** > > ** ** > > The versio that was build in the ppa was build against the ldns that is in > ubuntu repo **** > > ** ** > > I used the that was in in ppa ** ** > > Get:8 http://ppa.launchpad.net/pkg-opendnssec/ppa/ubuntu/ precise/main > dh-autoreconf all 7~precise+1 [15.4 kB]**** > > Get:9 http://ppa.launchpad.net/pkg-opendnssec/ppa/ubuntu/ precise/main > libldns1 i386 1.6.16-1~precise+1 [166 kB]**** > > Get:10 http://ppa.launchpad.net/pkg-opendnssec/ppa/ubuntu/ precise/main > libldns-dev i386 1.6.16-1~precise+1 [623 kB]**** > > ** ** > > That solved the isue so maybe ondrej could rebuild and use its own > version of ldns instead of the one in the repo .**** > > ** ** > > If you want to take a look i have buil dit also in my own ppa see: > https://launchpad.net/~bas-dikkenberg/+archive/opendnssec**** > > ** ** > > ** ** > > ** ** > > Met vriendelijke groet,**** > > ** ** > > Bas van den Dikkenberg**** > > ** ** > > ** ** > > *Van:* opendnssec-user-bounces at lists.opendnssec.org [mailto: > opendnssec-user-bounces at lists.opendnssec.org] *Namens *Bas van den > Dikkenberg > *Verzonden:* zaterdag 13 juli 2013 17:40 > *Aan:* opendnssec-user at lists.opendnssec.org > *Onderwerp:* [Opendnssec-user] after update **** > > ** ** > > The ppa for ubuntu was updated this week.**** > > But when update opendnssec the signer won?t start any more.**** > > The messages is get is:**** > > ** ** > > /usr/sbin/ods-signerd: symbol lookup error: /usr/sbin/ods-signerd: > undefined symbol: strlcpy**** > > ** ** > > Any sugestion would be welkome**** > > ** ** > > With kind regards,**** > > ** ** > > Bas van den Dikkenberg**** > > _______________________________________________ > Opendnssec-user mailing list > Opendnssec-user at lists.opendnssec.org > https://lists.opendnssec.org/mailman/listinfo/opendnssec-user > > -- ?Ond?ej Sur? -------------- next part -------------- An HTML attachment was scrubbed... URL: From willem at nlnetlabs.nl Tue Jul 16 12:42:34 2013 From: willem at nlnetlabs.nl (Willem Toorop) Date: Tue, 16 Jul 2013 14:42:34 +0200 Subject: [ldns-users] [Opendnssec-user] RE: after update In-Reply-To: References: <01dd1ba6dc1f42bdbe463ac262b00c9b@SRV04.dikkenberg.local> <3bc0908ddae84b5c981c43b80b0d05cb@SRV07.dikkenberg.local> Message-ID: <51E53FBA.4080101@nlnetlabs.nl> Hi Ond?ej, Bas, This is unfortunate. Those symbols disappeared in 1.6.14 when addressing bugfix #459. (https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=459) B.t.w. I cannot reproduce myself. When I compile OpenDNSSEC 1.3.14 or 1.3.4 with ldns 1.6.11, configure detects the absence of strlcpy and compiles and links the replacement function via libcompat.a (even though strlcpy is also available in libldns.so.1 !). This is with gcc 4.6.3. It would be interesting to see the output of the build process, to see where it differs. I am reluctant to release current trunk (actually HEAD :) as ldns-1.7.0 with soname libldns.so.2, because it still has some issues I have to take care of. Also, next week I will be on vacation for three weeks, so I can only properly do it (including reviews from our dev-crew) after august 12th. I could just take 1.6.16, modify it so it installs with soname libldns.so.2 and release it as 1.6.17. This would resolve your issue, but would cause problems with FreeBSD (and other ports like packaging systems). With such systems, a version number increase in a shared library means rebuilding everything dependent on it. This is not automatically detected. That is quite a dramatic change for a minor release. Even more so because FreeBSD did not have the problem in the first place; strlcpy is provided in its libc! Most convenient for me would be to postpone the soname bumping release (1.7.0) until the end of August (to be on the safe side). Would that be acceptable for you? It means that the libldns1 package may not be updated to 1.6.14 or beyond until that time. Alternatively you could package a patched libldns1 1.6.16 that does export the strlcpy symbol (nasty). I have attached a patch that does just that. I wonder if other Linux systems (fedora) have the same problem... Paul? -- Willem PS. Yes, I have also thought about only bumping soname to .so.2 when strlcpy is absent, but that is a bit wild. Lets explore other possibilities first... Op 16-07-13 07:36, Ond?ej Sur? schreef: > That means that ldns has to bump the SONAME. I saw the missing symbols, > but I thought that nobody was using the symbols since it was not a > public API. > > Willem, could you please release new ldns with bumped SONAME? (Or > reintroduce the symbols back.) It breaks the linked software since ABI > has changed. > > O. > > > On Mon, Jul 15, 2013 at 10:09 PM, Bas van den Dikkenberg > > wrote: > > I found the problem .____ > > __ __ > > The versio that was build in the ppa was build against the ldns that > is in ubuntu repo ____ > > __ __ > > I used the that was in in ppa __ __ > > Get:8 http://ppa.launchpad.net/pkg-opendnssec/ppa/ubuntu/ > precise/main dh-autoreconf all 7~precise+1 [15.4 kB]____ > > Get:9 http://ppa.launchpad.net/pkg-opendnssec/ppa/ubuntu/ > precise/main libldns1 i386 1.6.16-1~precise+1 [166 kB]____ > > Get:10 http://ppa.launchpad.net/pkg-opendnssec/ppa/ubuntu/ > precise/main libldns-dev i386 1.6.16-1~precise+1 [623 kB]____ > > __ __ > > That solved the isue so maybe ondrej could rebuild and use its own > version of ldns instead of the one in the repo .____ > > __ __ > > If you want to take a look i have buil dit also in my own ppa see: > https://launchpad.net/~bas-dikkenberg/+archive/opendnssec____ > > __ __ > > __ __ > > __ __ > > Met vriendelijke groet,____ > > __ __ > > Bas van den Dikkenberg____ > > __ __ > > __ __ > > *Van:*opendnssec-user-bounces at lists.opendnssec.org > > [mailto:opendnssec-user-bounces at lists.opendnssec.org > ] *Namens *Bas > van den Dikkenberg > *Verzonden:* zaterdag 13 juli 2013 17:40 > *Aan:* opendnssec-user at lists.opendnssec.org > > *Onderwerp:* [Opendnssec-user] after update ____ > > __ __ > > The ppa for ubuntu was updated this week.____ > > But when update opendnssec the signer won?t start any more.____ > > The messages is get is:____ > > __ __ > > /usr/sbin/ods-signerd: symbol lookup error: /usr/sbin/ods-signerd: > undefined symbol: strlcpy____ > > __ __ > > Any sugestion would be welkome____ > > __ __ > > With kind regards,____ > > __ __ > > Bas van den Dikkenberg____ > > > _______________________________________________ > Opendnssec-user mailing list > Opendnssec-user at lists.opendnssec.org > > https://lists.opendnssec.org/mailman/listinfo/opendnssec-user > > > > > -- > ?Ond?ej Sur? > -------------- next part -------------- A non-text attachment was scrubbed... Name: ldns-1.6.16-export-strlcpy.patch Type: text/x-patch Size: 1320 bytes Desc: not available URL: From paul at nohats.ca Wed Jul 17 03:27:15 2013 From: paul at nohats.ca (Paul Wouters) Date: Tue, 16 Jul 2013 23:27:15 -0400 (EDT) Subject: [ldns-users] [Opendnssec-user] RE: after update In-Reply-To: <51E53FBA.4080101@nlnetlabs.nl> References: <01dd1ba6dc1f42bdbe463ac262b00c9b@SRV04.dikkenberg.local> <3bc0908ddae84b5c981c43b80b0d05cb@SRV07.dikkenberg.local> <51E53FBA.4080101@nlnetlabs.nl> Message-ID: On Tue, 16 Jul 2013, Willem Toorop wrote: > I am reluctant to release current trunk (actually HEAD :) as ldns-1.7.0 Ohh. git finally. good! > Most convenient for me would be to postpone the soname bumping release > (1.7.0) until the end of August (to be on the safe side). Would that be > acceptable for you? It means that the libldns1 package may not be > updated to 1.6.14 or beyond until that time. Alternatively you could > package a patched libldns1 1.6.16 that does export the strlcpy symbol > (nasty). I have attached a patch that does just that. > > I wonder if other Linux systems (fedora) have the same problem... Paul? I did not experience problems or heard of any bugs. Paul From ondrej at sury.org Wed Jul 17 06:35:57 2013 From: ondrej at sury.org (=?UTF-8?B?T25kxZllaiBTdXLDvQ==?=) Date: Wed, 17 Jul 2013 08:35:57 +0200 Subject: [ldns-users] [Opendnssec-user] RE: after update In-Reply-To: <51E53FBA.4080101@nlnetlabs.nl> References: <01dd1ba6dc1f42bdbe463ac262b00c9b@SRV04.dikkenberg.local> <3bc0908ddae84b5c981c43b80b0d05cb@SRV07.dikkenberg.local> <51E53FBA.4080101@nlnetlabs.nl> Message-ID: Hi Willem, On Tue, Jul 16, 2013 at 2:42 PM, Willem Toorop wrote: > Hi Ond?ej, Bas, > > This is unfortunate. > Those symbols disappeared in 1.6.14 when addressing bugfix #459. > (https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=459) > > B.t.w. I cannot reproduce myself. When I compile OpenDNSSEC 1.3.14 or > 1.3.4 with ldns 1.6.11, configure detects the absence of strlcpy and > compiles and links the replacement function via libcompat.a (even though > strlcpy is also available in libldns.so.1 !). This is with gcc 4.6.3. It > would be interesting to see the output of the build process, to see > where it differs. > All build logs are here (also my analysis could be just wrong): https://launchpad.net/~pkg-opendnssec/+archive/ppa/+builds?build_state=built > [...] > Most convenient for me would be to postpone the soname bumping release > (1.7.0) until the end of August (to be on the safe side). Would that be > acceptable for you? It means that the libldns1 package may not be > updated to 1.6.14 or beyond until that time. Alternatively you could > package a patched libldns1 1.6.16 that does export the strlcpy symbol > (nasty). I have attached a patch that does just that. > I will just add hard build dependency on ldns >= 1.6.14 and that will fix the problem. And let's hope it will not pop-out somewhere else. Ondrej -- ?Ond?ej Sur? -------------- next part -------------- An HTML attachment was scrubbed... URL: From thozza at redhat.com Thu Jul 18 14:18:53 2013 From: thozza at redhat.com (Tomas Hozza) Date: Thu, 18 Jul 2013 10:18:53 -0400 (EDT) Subject: [ldns-users] [PATCH] Fixes for missing/not used options in man pages of examples In-Reply-To: <214119610.1256107.1374155841759.JavaMail.root@redhat.com> Message-ID: <1804499850.1265913.1374157133619.JavaMail.root@redhat.com> Hi. We did a man page and usage output scan of ldns binaries packaged in Fedora and found some mistakes. The list of mistakes is as follows: ** /usr/bin/ldns-compare-zones: Usage message OMITS 1 supported option(s): * -h ** /usr/bin/ldns-key2ds: Option '-f' was reported only by help message ** /usr/bin/ldns-keygen: Usage message and man page OMIT 2 supported option(s): * -2 * -5 ** /usr/bin/ldns-read-zone: Man page OMITS 1 supported option(s): * -b ** /usr/bin/ldns-signzone: Usage message and man page OMITS 1 supported option(s): * -l ** /usr/bin/ldns-walk: Only 2 options are documented in man page: * -f * -s ** /usr/bin/ldns-zcat: Usage message OMITS 1 supported option(s): * -n Man page OMITS 2 supported option(s): * -n * -v ** /usr/bin/ldns-zsplit: Man page OMITS 1 supported option(s): * -v Patches for these mistakes are attached. Regards, Tomas Hozza -------------- next part -------------- A non-text attachment was scrubbed... Name: 0001-ldns-compare-add-missing-options-into-usage.patch Type: text/x-patch Size: 848 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: 0002-ldns-key2ds-Add-f-option-into-man-page.patch Type: text/x-patch Size: 704 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: 0003-ldns-keygen-remove-unused-options.patch Type: text/x-patch Size: 781 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: 0004-ldns-read-zone-document-b-option-in-man-page.patch Type: text/x-patch Size: 1572 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: 0005-ldns-sigzone-remove-unused-l-option.patch Type: text/x-patch Size: 808 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: 0006-ldns-walk-add-missing-options-into-man-page.patch Type: text/x-patch Size: 1077 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: 0007-ldns-zcat-remove-unused-option-n-and-document-option.patch Type: text/x-patch Size: 1221 bytes Desc: not available URL: -------------- next part -------------- A non-text attachment was scrubbed... Name: 0008-ldns-zsplit-document-v-option-in-man-page.patch Type: text/x-patch Size: 717 bytes Desc: not available URL: From vladimir.levijev at gmail.com Mon Jul 29 15:16:54 2013 From: vladimir.levijev at gmail.com (Vladimir Levijev) Date: Mon, 29 Jul 2013 18:16:54 +0300 Subject: [ldns-users] Resolve host to both IPv4 and IPv6 addresses Message-ID: Hi, Do I need to make a 2 separate ldns_resolver_query() calls first with RR typeLDNS_RR_TYPE_A, second with LDNS_RR_TYPE_AAAA in order to fetch both IPv4 and IPv6 addresses? Or can I e. g. make one call with LDNS_RR_TYPE_A and then fetch them twice from the packet using ldns_pkt_rr_list_by_type() first with RR type A and then AAAA? Cheers, VL From ondrej at sury.org Mon Jul 29 15:23:18 2013 From: ondrej at sury.org (=?UTF-8?B?T25kxZllaiBTdXLDvQ==?=) Date: Mon, 29 Jul 2013 17:23:18 +0200 Subject: [ldns-users] Resolve host to both IPv4 and IPv6 addresses In-Reply-To: References: Message-ID: On Mon, Jul 29, 2013 at 5:16 PM, Vladimir Levijev < vladimir.levijev at gmail.com> wrote: > Hi, > > Do I need to make a 2 separate ldns_resolver_query() calls first with > RR typeLDNS_RR_TYPE_A, second with LDNS_RR_TYPE_AAAA in order to fetch > both IPv4 and IPv6 addresses? > Yes, there's no A+AAAA query type. > Or can I e. g. make one call with LDNS_RR_TYPE_A and then fetch them > twice from the packet using ldns_pkt_rr_list_by_type() first with RR > type A and then AAAA? > > Cheers, > > VL > _______________________________________________ > ldns-users mailing list > ldns-users at open.nlnetlabs.nl > http://open.nlnetlabs.nl/mailman/listinfo/ldns-users > -- ?Ond?ej Sur? -------------- next part -------------- An HTML attachment was scrubbed... URL: