improve bindings maintainability
This commit is contained in:
parent
4259085e0f
commit
8a106c66a2
|
@ -1,9 +1,7 @@
|
||||||
#![allow(dead_code)]
|
#![allow(dead_code)]
|
||||||
use crate::bindings::{
|
use crate::bindings::{
|
||||||
self, config_file, dns_msg, infra_cache, key_cache, lruhash_entry, module_env, module_ev,
|
self, module_env, module_ev, module_ext_state, module_qstate, rrset_id_type, rrset_trust,
|
||||||
module_ext_state, module_qstate, outbound_entry, packed_rrset_data, packed_rrset_key,
|
sec_status, sldns_enum_ede_code,
|
||||||
query_info, reply_info, rrset_cache, rrset_id_type, rrset_trust, sec_status, slabhash,
|
|
||||||
sldns_enum_ede_code, ub_packed_rrset_key,
|
|
||||||
};
|
};
|
||||||
use std::{
|
use std::{
|
||||||
ffi::CStr,
|
ffi::CStr,
|
||||||
|
@ -16,7 +14,12 @@ use std::{
|
||||||
|
|
||||||
macro_rules! create_struct {
|
macro_rules! create_struct {
|
||||||
($ptr:tt, $name:tt, $mut:tt) => {
|
($ptr:tt, $name:tt, $mut:tt) => {
|
||||||
pub struct $name<'a>(pub(crate) *mut $ptr, pub(crate) PhantomData<&'a $ptr>);
|
#[repr(transparent)]
|
||||||
|
pub struct $name<'a>(
|
||||||
|
pub(crate) *mut bindings::$ptr,
|
||||||
|
pub(crate) PhantomData<&'a bindings::$ptr>,
|
||||||
|
);
|
||||||
|
#[repr(transparent)]
|
||||||
pub struct $mut<'a>(pub(crate) $name<'a>);
|
pub struct $mut<'a>(pub(crate) $name<'a>);
|
||||||
impl<'a> Deref for $mut<'a> {
|
impl<'a> Deref for $mut<'a> {
|
||||||
type Target = $name<'a>;
|
type Target = $name<'a>;
|
||||||
|
@ -25,29 +28,68 @@ macro_rules! create_struct {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
impl<'a> $name<'a> {
|
impl<'a> $name<'a> {
|
||||||
pub const fn as_ptr(&self) -> *const $ptr {
|
pub const fn as_ptr(&self) -> *const bindings::$ptr {
|
||||||
self.0.cast_const()
|
self.0.cast_const()
|
||||||
}
|
}
|
||||||
pub unsafe fn from_raw(raw: *const $ptr) -> Option<Self> {
|
pub unsafe fn from_raw(raw: *const bindings::$ptr) -> Option<Self> {
|
||||||
(!raw.is_null()).then_some(Self(raw.cast_mut(), PhantomData))
|
(!raw.is_null()).then_some(Self(raw.cast_mut(), PhantomData))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
impl<'a> $mut<'a> {
|
impl<'a> $mut<'a> {
|
||||||
pub fn as_mut_ptr(&mut self) -> *mut $ptr {
|
pub fn as_mut_ptr(&mut self) -> *mut bindings::$ptr {
|
||||||
self.0 .0
|
self.0 .0
|
||||||
}
|
}
|
||||||
pub unsafe fn from_raw(raw: *mut $ptr) -> Option<Self> {
|
pub unsafe fn from_raw(raw: *mut bindings::$ptr) -> Option<Self> {
|
||||||
(!raw.is_null()).then_some(Self($name(raw, PhantomData)))
|
(!raw.is_null()).then_some(Self($name(raw, PhantomData)))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
|
macro_rules! create_enums {
|
||||||
|
{
|
||||||
|
$(#[repr($repr:ident/$typ:ty)]
|
||||||
|
enum $name:ident {
|
||||||
|
$($(#[doc = $doc:literal])?
|
||||||
|
$member:ident = $value:ident,)*
|
||||||
|
})*
|
||||||
|
} => {
|
||||||
|
$(
|
||||||
|
#[non_exhaustive]
|
||||||
|
#[repr($repr)]
|
||||||
|
#[derive(Copy, Clone, Debug, Eq, PartialEq, Hash)]
|
||||||
|
pub enum $name {
|
||||||
|
$($(#[doc = $doc])?
|
||||||
|
$member = bindings::$value,)*
|
||||||
|
#[doc(hidden)]
|
||||||
|
Unknown = 9999,
|
||||||
|
}
|
||||||
|
impl From<$typ> for $name {
|
||||||
|
fn from(x: $typ) -> Self {
|
||||||
|
match x {
|
||||||
|
$(bindings::$value => Self::$member,)*
|
||||||
|
_ => Self::Unknown,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
)*
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
create_struct!(config_file, ConfigFile, ConfigFileMut);
|
create_struct!(config_file, ConfigFile, ConfigFileMut);
|
||||||
create_struct!(slabhash, SlabHash, SlabHashMut);
|
create_struct!(slabhash, SlabHash, SlabHashMut);
|
||||||
create_struct!(rrset_cache, RrsetCache, RrsetCacheMut);
|
create_struct!(rrset_cache, RrsetCache, RrsetCacheMut);
|
||||||
create_struct!(infra_cache, InfraCache, InfraCacheMut);
|
create_struct!(infra_cache, InfraCache, InfraCacheMut);
|
||||||
create_struct!(key_cache, KeyCache, KeyCacheMut);
|
create_struct!(key_cache, KeyCache, KeyCacheMut);
|
||||||
|
create_struct!(outbound_entry, OutboundEntry, OutboundEntryMut);
|
||||||
|
create_struct!(query_info, QueryInfo, QueryInfoMut);
|
||||||
|
create_struct!(dns_msg, DnsMsg, DnsMsgMut);
|
||||||
|
create_struct!(reply_info, ReplyInfo, ReplyInfoMut);
|
||||||
|
create_struct!(ub_packed_rrset_key, UbPackedRrsetKey, UbPackedRrsetKeyMut);
|
||||||
|
create_struct!(lruhash_entry, LruHashEntry, LruHashEntryMut);
|
||||||
|
create_struct!(packed_rrset_key, PackedRrsetKey, PackedRrsetKeyMut);
|
||||||
|
create_struct!(packed_rrset_data, PackedRrsetData, PackedRrsetDataMut);
|
||||||
|
|
||||||
pub struct ModuleEnv<'a, T>(
|
pub struct ModuleEnv<'a, T>(
|
||||||
pub(crate) *mut module_env,
|
pub(crate) *mut module_env,
|
||||||
pub(crate) c_int,
|
pub(crate) c_int,
|
||||||
|
@ -72,14 +114,6 @@ impl<'a, T> Deref for ModuleQstateMut<'a, T> {
|
||||||
&self.0
|
&self.0
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
create_struct!(outbound_entry, OutboundEntry, OutboundEntryMut);
|
|
||||||
create_struct!(query_info, QueryInfo, QueryInfoMut);
|
|
||||||
create_struct!(dns_msg, DnsMsg, DnsMsgMut);
|
|
||||||
create_struct!(reply_info, ReplyInfo, ReplyInfoMut);
|
|
||||||
create_struct!(ub_packed_rrset_key, UbPackedRrsetKey, UbPackedRrsetKeyMut);
|
|
||||||
create_struct!(lruhash_entry, LruHashEntry, LruHashEntryMut);
|
|
||||||
create_struct!(packed_rrset_key, PackedRrsetKey, PackedRrsetKeyMut);
|
|
||||||
create_struct!(packed_rrset_data, PackedRrsetData, PackedRrsetDataMut);
|
|
||||||
|
|
||||||
impl<'a> QueryInfo<'a> {
|
impl<'a> QueryInfo<'a> {
|
||||||
pub fn qname(&self) -> &CStr {
|
pub fn qname(&self) -> &CStr {
|
||||||
|
@ -443,208 +477,118 @@ impl PackedRrsetData<'_> {
|
||||||
|
|
||||||
type RrsetIdType = rrset_id_type;
|
type RrsetIdType = rrset_id_type;
|
||||||
|
|
||||||
#[non_exhaustive]
|
create_enums! {
|
||||||
#[repr(u32)]
|
#[repr(u32/module_ev)]
|
||||||
#[derive(Copy, Clone, Debug, Eq, PartialEq, Hash)]
|
enum ModuleEvent {
|
||||||
pub enum ModuleEvent {
|
#[doc = " new query"]
|
||||||
/// new query
|
New = module_ev_module_event_new,
|
||||||
New = bindings::module_ev_module_event_new,
|
#[doc = " query passed by other module"]
|
||||||
/// query passed by other module
|
Pass = module_ev_module_event_pass,
|
||||||
Pass = bindings::module_ev_module_event_pass,
|
#[doc = " reply inbound from server"]
|
||||||
/// reply inbound from server
|
Reply = module_ev_module_event_reply,
|
||||||
Reply = bindings::module_ev_module_event_reply,
|
#[doc = " no reply, timeout or other error"]
|
||||||
/// no reply, timeout or other error
|
NoReply = module_ev_module_event_noreply,
|
||||||
NoReply = bindings::module_ev_module_event_noreply,
|
#[doc = " reply is there, but capitalisation check failed"]
|
||||||
/// reply is there, but capitalisation check failed
|
CapsFail = module_ev_module_event_capsfail,
|
||||||
CapsFail = bindings::module_ev_module_event_capsfail,
|
#[doc = " next module is done, and its reply is awaiting you"]
|
||||||
/// next module is done, and its reply is awaiting you
|
ModDone = module_ev_module_event_moddone,
|
||||||
ModDone = bindings::module_ev_module_event_moddone,
|
#[doc = " error"]
|
||||||
/// error
|
Error = module_ev_module_event_error,
|
||||||
Error = bindings::module_ev_module_event_error,
|
|
||||||
Unknown = 99,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl From<module_ev> for ModuleEvent {
|
|
||||||
fn from(value: module_ev) -> Self {
|
|
||||||
match value {
|
|
||||||
bindings::module_ev_module_event_new => Self::New,
|
|
||||||
bindings::module_ev_module_event_pass => Self::Pass,
|
|
||||||
bindings::module_ev_module_event_reply => Self::Reply,
|
|
||||||
bindings::module_ev_module_event_noreply => Self::NoReply,
|
|
||||||
bindings::module_ev_module_event_capsfail => Self::CapsFail,
|
|
||||||
bindings::module_ev_module_event_moddone => Self::ModDone,
|
|
||||||
bindings::module_ev_module_event_error => Self::Error,
|
|
||||||
_ => Self::Unknown,
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
#[non_exhaustive]
|
#[repr(u32/sec_status)]
|
||||||
#[repr(u32)]
|
enum SecStatus {
|
||||||
#[derive(Copy, Clone, Debug, Eq, PartialEq, Hash)]
|
#[doc = " UNCHECKED means that object has yet to be validated."]
|
||||||
pub enum SecStatus {
|
Unchecked = sec_status_sec_status_unchecked,
|
||||||
/// UNCHECKED means that object has yet to be validated.
|
#[doc = " BOGUS means that the object (RRset or message) failed to validate\n (according to local policy), but should have validated."]
|
||||||
Unchecked = bindings::sec_status_sec_status_unchecked,
|
Bogus = sec_status_sec_status_bogus,
|
||||||
/// BOGUS means that the object (RRset or message) failed to validate\n (according to local policy), but should have validated.
|
#[doc = " INDETERMINATE means that the object is insecure, but not\n authoritatively so. Generally this means that the RRset is not\n below a configured trust anchor."]
|
||||||
Bogus = bindings::sec_status_sec_status_bogus,
|
Indeterminate = sec_status_sec_status_indeterminate,
|
||||||
/// INDETERMINATE means that the object is insecure, but not\n authoritatively so. Generally this means that the RRset is not\n below a configured trust anchor.
|
#[doc = " INSECURE means that the object is authoritatively known to be\n insecure. Generally this means that this RRset is below a trust\n anchor, but also below a verified, insecure delegation."]
|
||||||
Indeterminate = bindings::sec_status_sec_status_indeterminate,
|
Insecure = sec_status_sec_status_insecure,
|
||||||
/// INSECURE means that the object is authoritatively known to be\n insecure. Generally this means that this RRset is below a trust\n anchor, but also below a verified, insecure delegation.
|
#[doc = " SECURE_SENTINEL_FAIL means that the object (RRset or message)\n validated according to local policy but did not succeed in the root\n KSK sentinel test (draft-ietf-dnsop-kskroll-sentinel)."]
|
||||||
Insecure = bindings::sec_status_sec_status_insecure,
|
SecureSentinelFail = sec_status_sec_status_secure_sentinel_fail,
|
||||||
/// SECURE_SENTINEL_FAIL means that the object (RRset or message)\n validated according to local policy but did not succeed in the root\n KSK sentinel test (draft-ietf-dnsop-kskroll-sentinel).
|
#[doc = " SECURE means that the object (RRset or message) validated\n according to local policy."]
|
||||||
SecureSentinelFail = bindings::sec_status_sec_status_secure_sentinel_fail,
|
Secure = sec_status_sec_status_secure,
|
||||||
/// SECURE means that the object (RRset or message) validated\n according to local policy.
|
|
||||||
Secure = bindings::sec_status_sec_status_secure,
|
|
||||||
Unknown = 99,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl From<sec_status> for SecStatus {
|
|
||||||
fn from(value: module_ev) -> Self {
|
|
||||||
match value {
|
|
||||||
bindings::sec_status_sec_status_unchecked => Self::Unchecked,
|
|
||||||
bindings::sec_status_sec_status_bogus => Self::Bogus,
|
|
||||||
bindings::sec_status_sec_status_indeterminate => Self::Indeterminate,
|
|
||||||
bindings::sec_status_sec_status_insecure => Self::Insecure,
|
|
||||||
bindings::sec_status_sec_status_secure_sentinel_fail => Self::SecureSentinelFail,
|
|
||||||
bindings::sec_status_sec_status_secure => Self::Secure,
|
|
||||||
_ => Self::Unknown,
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
#[non_exhaustive]
|
#[repr(i32/sldns_enum_ede_code)]
|
||||||
#[repr(i32)]
|
enum SldnsEdeCode {
|
||||||
#[derive(Copy, Clone, Debug, Eq, PartialEq, Hash)]
|
None = sldns_enum_ede_code_LDNS_EDE_NONE,
|
||||||
pub enum SldnsEdeCode {
|
Other = sldns_enum_ede_code_LDNS_EDE_OTHER,
|
||||||
None = -1,
|
UnsupportedDnskeyAlg = sldns_enum_ede_code_LDNS_EDE_UNSUPPORTED_DNSKEY_ALG,
|
||||||
Other = 0,
|
UnsupportedDsDigest = sldns_enum_ede_code_LDNS_EDE_UNSUPPORTED_DS_DIGEST,
|
||||||
UnsupportedDnskeyAlg = 1,
|
StaleAnswer = sldns_enum_ede_code_LDNS_EDE_STALE_ANSWER,
|
||||||
UnsupportedDsDigest = 2,
|
ForgedAnswer = sldns_enum_ede_code_LDNS_EDE_FORGED_ANSWER,
|
||||||
StaleAnswer = 3,
|
DnssecIndeterminate = sldns_enum_ede_code_LDNS_EDE_DNSSEC_INDETERMINATE,
|
||||||
ForgedAnswer = 4,
|
DnssecBogus = sldns_enum_ede_code_LDNS_EDE_DNSSEC_BOGUS,
|
||||||
DnssecIndeterminate = 5,
|
SignatureExpired = sldns_enum_ede_code_LDNS_EDE_SIGNATURE_EXPIRED,
|
||||||
DnssecBogus = 6,
|
SignatureNotYetValid = sldns_enum_ede_code_LDNS_EDE_SIGNATURE_NOT_YET_VALID,
|
||||||
SignatureExpired = 7,
|
DnskeyMissing = sldns_enum_ede_code_LDNS_EDE_DNSKEY_MISSING,
|
||||||
SignatureNotYetValid = 8,
|
RrsigsMissing = sldns_enum_ede_code_LDNS_EDE_RRSIGS_MISSING,
|
||||||
DnskeyMissing = 9,
|
NoZoneKeyBitSet = sldns_enum_ede_code_LDNS_EDE_NO_ZONE_KEY_BIT_SET,
|
||||||
RrsigsMissing = 10,
|
NsecMissing = sldns_enum_ede_code_LDNS_EDE_NSEC_MISSING,
|
||||||
NoZoneKeyBitSet = 11,
|
CachedError = sldns_enum_ede_code_LDNS_EDE_CACHED_ERROR,
|
||||||
NsecMissing = 12,
|
NotReady = sldns_enum_ede_code_LDNS_EDE_NOT_READY,
|
||||||
CachedError = 13,
|
Blocked = sldns_enum_ede_code_LDNS_EDE_BLOCKED,
|
||||||
NotReady = 14,
|
Censored = sldns_enum_ede_code_LDNS_EDE_CENSORED,
|
||||||
Blocked = 15,
|
Filtered = sldns_enum_ede_code_LDNS_EDE_FILTERED,
|
||||||
Censored = 16,
|
Prohibited = sldns_enum_ede_code_LDNS_EDE_PROHIBITED,
|
||||||
Filtered = 17,
|
StaleNxdomainAnswer = sldns_enum_ede_code_LDNS_EDE_STALE_NXDOMAIN_ANSWER,
|
||||||
Prohibited = 18,
|
NotAuthoritative = sldns_enum_ede_code_LDNS_EDE_NOT_AUTHORITATIVE,
|
||||||
StaleNxdomainAnswer = 19,
|
NotSupported = sldns_enum_ede_code_LDNS_EDE_NOT_SUPPORTED,
|
||||||
NotAuthoritative = 20,
|
NoReachableAuthority = sldns_enum_ede_code_LDNS_EDE_NO_REACHABLE_AUTHORITY,
|
||||||
NotSupported = 21,
|
NetworkError = sldns_enum_ede_code_LDNS_EDE_NETWORK_ERROR,
|
||||||
NoReachableAuthority = 22,
|
InvalidData = sldns_enum_ede_code_LDNS_EDE_INVALID_DATA,
|
||||||
NetworkError = 23,
|
|
||||||
InvalidData = 24,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl From<sldns_enum_ede_code> for SldnsEdeCode {
|
|
||||||
fn from(value: sldns_enum_ede_code) -> Self {
|
|
||||||
match value {
|
|
||||||
-1 => Self::None,
|
|
||||||
0 => Self::Other,
|
|
||||||
1 => Self::UnsupportedDnskeyAlg,
|
|
||||||
2 => Self::UnsupportedDsDigest,
|
|
||||||
3 => Self::StaleAnswer,
|
|
||||||
4 => Self::ForgedAnswer,
|
|
||||||
5 => Self::DnssecIndeterminate,
|
|
||||||
6 => Self::DnssecBogus,
|
|
||||||
7 => Self::SignatureExpired,
|
|
||||||
8 => Self::SignatureNotYetValid,
|
|
||||||
9 => Self::DnskeyMissing,
|
|
||||||
10 => Self::RrsigsMissing,
|
|
||||||
11 => Self::NoZoneKeyBitSet,
|
|
||||||
12 => Self::NsecMissing,
|
|
||||||
13 => Self::CachedError,
|
|
||||||
14 => Self::NotReady,
|
|
||||||
15 => Self::Blocked,
|
|
||||||
16 => Self::Censored,
|
|
||||||
17 => Self::Filtered,
|
|
||||||
18 => Self::Prohibited,
|
|
||||||
19 => Self::StaleNxdomainAnswer,
|
|
||||||
20 => Self::NotAuthoritative,
|
|
||||||
21 => Self::NotSupported,
|
|
||||||
22 => Self::NoReachableAuthority,
|
|
||||||
23 => Self::NetworkError,
|
|
||||||
24 => Self::InvalidData,
|
|
||||||
_ => Self::Other,
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
#[non_exhaustive]
|
#[repr(u32/rrset_trust)]
|
||||||
#[repr(u32)]
|
enum RrsetTrust {
|
||||||
#[derive(Copy, Clone, Debug, Eq, PartialEq, Hash)]
|
#[doc = " initial value for trust"]
|
||||||
pub enum RrsetTrust {
|
None = rrset_trust_rrset_trust_none,
|
||||||
/// Initial value for trust
|
#[doc = " Additional information from non-authoritative answers"]
|
||||||
None = bindings::rrset_trust_rrset_trust_none,
|
AddNoAa = rrset_trust_rrset_trust_add_noAA,
|
||||||
/// Additional information from non-authoritative answers
|
#[doc = " Data from the authority section of a non-authoritative answer"]
|
||||||
AddNoAa = bindings::rrset_trust_rrset_trust_add_noAA,
|
AuthNoAa = rrset_trust_rrset_trust_auth_noAA,
|
||||||
/// Data from the authority section of a non-authoritative answer
|
#[doc = " Additional information from an authoritative answer"]
|
||||||
AuthNoAa = bindings::rrset_trust_rrset_trust_auth_noAA,
|
AddAa = rrset_trust_rrset_trust_add_AA,
|
||||||
/// Additional information from an authoritative answer
|
#[doc = " non-authoritative data from the answer section of authoritative\n answers"]
|
||||||
AddAa = bindings::rrset_trust_rrset_trust_add_AA,
|
NonauthAnsAa = rrset_trust_rrset_trust_nonauth_ans_AA,
|
||||||
/// non-authoritative data from the answer section of authoritative answers
|
#[doc = " Data from the answer section of a non-authoritative answer"]
|
||||||
NonauthAnsAa = bindings::rrset_trust_rrset_trust_nonauth_ans_AA,
|
AnsNoAa = rrset_trust_rrset_trust_ans_noAA,
|
||||||
/// Data from the answer section of a non-authoritative answer
|
#[doc = " Glue from a primary zone, or glue from a zone transfer"]
|
||||||
AnsNoAa = bindings::rrset_trust_rrset_trust_ans_noAA,
|
Glue = rrset_trust_rrset_trust_glue,
|
||||||
/// Glue from a primary zone, or glue from a zone transfer
|
#[doc = " Data from the authority section of an authoritative answer"]
|
||||||
Glue = bindings::rrset_trust_rrset_trust_glue,
|
AuthAa = rrset_trust_rrset_trust_auth_AA,
|
||||||
/// Data from the authority section of an authoritative answer
|
#[doc = " The authoritative data included in the answer section of an\n authoritative reply"]
|
||||||
AuthAa = bindings::rrset_trust_rrset_trust_auth_AA,
|
AnsAa = rrset_trust_rrset_trust_ans_AA,
|
||||||
/// The authoritative data included in the answer section of an\n authoritative reply
|
#[doc = " Data from a zone transfer, other than glue"]
|
||||||
AnsAa = bindings::rrset_trust_rrset_trust_ans_AA,
|
SecNoglue = rrset_trust_rrset_trust_sec_noglue,
|
||||||
/// Data from a zone transfer, other than glue
|
#[doc = " Data from a primary zone file, other than glue data"]
|
||||||
SecNoglue = bindings::rrset_trust_rrset_trust_sec_noglue,
|
PrimNoglue = rrset_trust_rrset_trust_prim_noglue,
|
||||||
/// Data from a primary zone file, other than glue data
|
#[doc = " DNSSEC(rfc4034) validated with trusted keys"]
|
||||||
PrimNoglue = bindings::rrset_trust_rrset_trust_prim_noglue,
|
Validated = rrset_trust_rrset_trust_validated,
|
||||||
/// DNSSEC(rfc4034) validated with trusted keys
|
#[doc = " ultimately trusted, no more trust is possible;\n trusted keys from the unbound configuration setup."]
|
||||||
Validated = bindings::rrset_trust_rrset_trust_validated,
|
Ultimate = rrset_trust_rrset_trust_ultimate,
|
||||||
/// Ultimately trusted, no more trust is possible,
|
|
||||||
/// trusted keys from the unbound configuration setup.
|
|
||||||
Ultimate = bindings::rrset_trust_rrset_trust_ultimate,
|
|
||||||
Unknown = 99,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl From<rrset_trust> for RrsetTrust {
|
|
||||||
fn from(value: rrset_trust) -> Self {
|
|
||||||
match value {
|
|
||||||
bindings::rrset_trust_rrset_trust_none => Self::None,
|
|
||||||
bindings::rrset_trust_rrset_trust_add_noAA => Self::AddNoAa,
|
|
||||||
bindings::rrset_trust_rrset_trust_auth_noAA => Self::AuthNoAa,
|
|
||||||
bindings::rrset_trust_rrset_trust_add_AA => Self::AddAa,
|
|
||||||
bindings::rrset_trust_rrset_trust_nonauth_ans_AA => Self::NonauthAnsAa,
|
|
||||||
bindings::rrset_trust_rrset_trust_ans_noAA => Self::AnsNoAa,
|
|
||||||
bindings::rrset_trust_rrset_trust_glue => Self::Glue,
|
|
||||||
bindings::rrset_trust_rrset_trust_auth_AA => Self::AuthAa,
|
|
||||||
bindings::rrset_trust_rrset_trust_ans_AA => Self::AnsAa,
|
|
||||||
bindings::rrset_trust_rrset_trust_sec_noglue => Self::SecNoglue,
|
|
||||||
bindings::rrset_trust_rrset_trust_prim_noglue => Self::PrimNoglue,
|
|
||||||
bindings::rrset_trust_rrset_trust_validated => Self::Validated,
|
|
||||||
bindings::rrset_trust_rrset_trust_ultimate => Self::Ultimate,
|
|
||||||
_ => Self::Unknown,
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
#[non_exhaustive]
|
#[repr(u32/module_ext_state)]
|
||||||
#[repr(u32)]
|
enum ModuleExtState {
|
||||||
#[derive(Copy, Clone, Debug, Eq, PartialEq, Hash)]
|
#[doc = " initial state - new query"]
|
||||||
pub enum ModuleExtState {
|
InitialState = module_ext_state_module_state_initial,
|
||||||
InitialState = bindings::module_ext_state_module_state_initial,
|
#[doc = " waiting for reply to outgoing network query"]
|
||||||
WaitReply = bindings::module_ext_state_module_wait_reply,
|
WaitReply = module_ext_state_module_wait_reply,
|
||||||
WaitModule = bindings::module_ext_state_module_wait_module,
|
#[doc = " module is waiting for another module"]
|
||||||
RestartNext = bindings::module_ext_state_module_restart_next,
|
WaitModule = module_ext_state_module_wait_module,
|
||||||
WaitSubquery = bindings::module_ext_state_module_wait_subquery,
|
#[doc = " module is waiting for another module; that other is restarted"]
|
||||||
Error = bindings::module_ext_state_module_error,
|
RestartNext = module_ext_state_module_restart_next,
|
||||||
Finished = bindings::module_ext_state_module_finished,
|
#[doc = " module is waiting for sub-query"]
|
||||||
Unknown = 99,
|
WaitSubquery = module_ext_state_module_wait_subquery,
|
||||||
|
#[doc = " module could not finish the query"]
|
||||||
|
Error = module_ext_state_module_error,
|
||||||
|
#[doc = " module is finished with query"]
|
||||||
|
Finished = module_ext_state_module_finished,
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl ModuleExtState {
|
impl ModuleExtState {
|
||||||
|
@ -662,21 +606,6 @@ impl ModuleExtState {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl From<module_ext_state> for ModuleExtState {
|
|
||||||
fn from(value: module_ext_state) -> Self {
|
|
||||||
match value {
|
|
||||||
bindings::module_ext_state_module_state_initial => Self::InitialState,
|
|
||||||
bindings::module_ext_state_module_wait_reply => Self::WaitReply,
|
|
||||||
bindings::module_ext_state_module_wait_module => Self::WaitModule,
|
|
||||||
bindings::module_ext_state_module_restart_next => Self::RestartNext,
|
|
||||||
bindings::module_ext_state_module_wait_subquery => Self::WaitSubquery,
|
|
||||||
bindings::module_ext_state_module_error => Self::Error,
|
|
||||||
bindings::module_ext_state_module_finished => Self::Finished,
|
|
||||||
_ => Self::Unknown,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub mod rr_class {
|
pub mod rr_class {
|
||||||
use crate::bindings;
|
use crate::bindings;
|
||||||
/// the Internet
|
/// the Internet
|
||||||
|
@ -692,175 +621,181 @@ pub mod rr_class {
|
||||||
}
|
}
|
||||||
|
|
||||||
pub mod rr_type {
|
pub mod rr_type {
|
||||||
pub const A: u16 = 1;
|
use crate::bindings;
|
||||||
/// An authoritative name server
|
#[doc = " a host address"]
|
||||||
pub const NS: u16 = 2;
|
pub const A: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_A as u16;
|
||||||
/// A mail destination (Obsolete - use MX)
|
#[doc = " an authoritative name server"]
|
||||||
pub const MD: u16 = 3;
|
pub const NS: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NS as u16;
|
||||||
/// A mail forwarder (Obsolete - use MX)
|
#[doc = " a mail destination (Obsolete - use MX)"]
|
||||||
pub const MF: u16 = 4;
|
pub const MD: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_MD as u16;
|
||||||
/// The canonical name for an alias
|
#[doc = " a mail forwarder (Obsolete - use MX)"]
|
||||||
pub const CNAME: u16 = 5;
|
pub const MF: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_MF as u16;
|
||||||
/// Marks the start of a zone of authority
|
#[doc = " the canonical name for an alias"]
|
||||||
pub const SOA: u16 = 6;
|
pub const CNAME: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_CNAME as u16;
|
||||||
/// A mailbox domain name (EXPERIMENTAL)
|
#[doc = " marks the start of a zone of authority"]
|
||||||
pub const MB: u16 = 7;
|
pub const SOA: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_SOA as u16;
|
||||||
/// A mail group member (EXPERIMENTAL)
|
#[doc = " a mailbox domain name (EXPERIMENTAL)"]
|
||||||
pub const MG: u16 = 8;
|
pub const MB: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_MB as u16;
|
||||||
/// A mail rename domain name (EXPERIMENTAL)
|
#[doc = " a mail group member (EXPERIMENTAL)"]
|
||||||
pub const MR: u16 = 9;
|
pub const MG: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_MG as u16;
|
||||||
/// A null RR (EXPERIMENTAL)
|
#[doc = " a mail rename domain name (EXPERIMENTAL)"]
|
||||||
pub const NULL: u16 = 10;
|
pub const MR: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_MR as u16;
|
||||||
/// A well known service description
|
#[doc = " a null RR (EXPERIMENTAL)"]
|
||||||
pub const WKS: u16 = 11;
|
pub const NULL: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NULL as u16;
|
||||||
/// A domain name pointer
|
#[doc = " a well known service description"]
|
||||||
pub const PTR: u16 = 12;
|
pub const WKS: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_WKS as u16;
|
||||||
/// Host information
|
#[doc = " a domain name pointer"]
|
||||||
pub const HINFO: u16 = 13;
|
pub const PTR: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_PTR as u16;
|
||||||
/// Mailbox or mail list information
|
#[doc = " host information"]
|
||||||
pub const MINFO: u16 = 14;
|
pub const HINFO: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_HINFO as u16;
|
||||||
/// Mail exchange
|
#[doc = " mailbox or mail list information"]
|
||||||
pub const MX: u16 = 15;
|
pub const MINFO: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_MINFO as u16;
|
||||||
/// Text strings
|
#[doc = " mail exchange"]
|
||||||
pub const TXT: u16 = 16;
|
pub const MX: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_MX as u16;
|
||||||
/// rFC1183
|
#[doc = " text strings"]
|
||||||
pub const RP: u16 = 17;
|
pub const TXT: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_TXT as u16;
|
||||||
/// rFC1183
|
#[doc = " RFC1183"]
|
||||||
pub const AFSDB: u16 = 18;
|
pub const RP: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_RP as u16;
|
||||||
/// rFC1183
|
#[doc = " RFC1183"]
|
||||||
pub const X25: u16 = 19;
|
pub const AFSDB: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_AFSDB as u16;
|
||||||
/// rFC1183
|
#[doc = " RFC1183"]
|
||||||
pub const ISDN: u16 = 20;
|
pub const X25: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_X25 as u16;
|
||||||
/// rFC1183
|
#[doc = " RFC1183"]
|
||||||
pub const RT: u16 = 21;
|
pub const ISDN: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_ISDN as u16;
|
||||||
/// rFC1706
|
#[doc = " RFC1183"]
|
||||||
pub const NSAP: u16 = 22;
|
pub const RT: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_RT as u16;
|
||||||
/// rFC1348
|
#[doc = " RFC1706"]
|
||||||
pub const NSAP_PTR: u16 = 23;
|
pub const NSAP: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NSAP as u16;
|
||||||
/// 2535typecode
|
#[doc = " RFC1348"]
|
||||||
pub const SIG: u16 = 24;
|
pub const NSAP_PTR: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NSAP_PTR as u16;
|
||||||
/// 2535typecode
|
#[doc = " 2535typecode"]
|
||||||
pub const KEY: u16 = 25;
|
pub const SIG: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_SIG as u16;
|
||||||
/// rFC2163
|
#[doc = " 2535typecode"]
|
||||||
pub const PX: u16 = 26;
|
pub const KEY: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_KEY as u16;
|
||||||
/// rFC1712
|
#[doc = " RFC2163"]
|
||||||
pub const GPOS: u16 = 27;
|
pub const PX: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_PX as u16;
|
||||||
/// Ipv6 address
|
#[doc = " RFC1712"]
|
||||||
pub const AAAA: u16 = 28;
|
pub const GPOS: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_GPOS as u16;
|
||||||
/// lOC record RFC1876
|
#[doc = " ipv6 address"]
|
||||||
pub const LOC: u16 = 29;
|
pub const AAAA: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_AAAA as u16;
|
||||||
/// 2535typecode
|
#[doc = " LOC record RFC1876"]
|
||||||
pub const NXT: u16 = 30;
|
pub const LOC: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_LOC as u16;
|
||||||
/// Draft-ietf-nimrod-dns-01.txt
|
#[doc = " 2535typecode"]
|
||||||
pub const EID: u16 = 31;
|
pub const NXT: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NXT as u16;
|
||||||
/// Draft-ietf-nimrod-dns-01.txt
|
#[doc = " draft-ietf-nimrod-dns-01.txt"]
|
||||||
pub const NIMLOC: u16 = 32;
|
pub const EID: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_EID as u16;
|
||||||
/// sRV record RFC2782
|
#[doc = " draft-ietf-nimrod-dns-01.txt"]
|
||||||
pub const SRV: u16 = 33;
|
pub const NIMLOC: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NIMLOC as u16;
|
||||||
/// Http://www.jhsoft.com/rfc/af-saa-0069.000.rtf
|
#[doc = " SRV record RFC2782"]
|
||||||
pub const ATMA: u16 = 34;
|
pub const SRV: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_SRV as u16;
|
||||||
/// rFC2915
|
#[doc = " http://www.jhsoft.com/rfc/af-saa-0069.000.rtf"]
|
||||||
pub const NAPTR: u16 = 35;
|
pub const ATMA: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_ATMA as u16;
|
||||||
/// rFC2230
|
#[doc = " RFC2915"]
|
||||||
pub const KX: u16 = 36;
|
pub const NAPTR: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NAPTR as u16;
|
||||||
/// rFC2538
|
#[doc = " RFC2230"]
|
||||||
pub const CERT: u16 = 37;
|
pub const KX: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_KX as u16;
|
||||||
/// rFC2874
|
#[doc = " RFC2538"]
|
||||||
pub const A6: u16 = 38;
|
pub const CERT: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_CERT as u16;
|
||||||
/// rFC2672
|
#[doc = " RFC2874"]
|
||||||
pub const DNAME: u16 = 39;
|
pub const A6: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_A6 as u16;
|
||||||
/// Dnsind-kitchen-sink-02.txt
|
#[doc = " RFC2672"]
|
||||||
pub const SINK: u16 = 40;
|
pub const DNAME: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_DNAME as u16;
|
||||||
/// pseudo OPT record...
|
#[doc = " dnsind-kitchen-sink-02.txt"]
|
||||||
pub const OPT: u16 = 41;
|
pub const SINK: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_SINK as u16;
|
||||||
/// rFC3123
|
#[doc = " Pseudo OPT record..."]
|
||||||
pub const APL: u16 = 42;
|
pub const OPT: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_OPT as u16;
|
||||||
/// rFC4034, RFC3658
|
#[doc = " RFC3123"]
|
||||||
pub const DS: u16 = 43;
|
pub const APL: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_APL as u16;
|
||||||
/// sSH Key Fingerprint
|
#[doc = " RFC4034, RFC3658"]
|
||||||
pub const SSHFP: u16 = 44;
|
pub const DS: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_DS as u16;
|
||||||
/// iPsec Key
|
#[doc = " SSH Key Fingerprint"]
|
||||||
pub const IPSECKEY: u16 = 45;
|
pub const SSHFP: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_SSHFP as u16;
|
||||||
/// dNSSEC
|
#[doc = " IPsec Key"]
|
||||||
pub const RRSIG: u16 = 46;
|
pub const IPSECKEY: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_IPSECKEY as u16;
|
||||||
/// dNSSEC
|
#[doc = " DNSSEC"]
|
||||||
pub const NSEC: u16 = 47;
|
pub const RRSIG: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_RRSIG as u16;
|
||||||
/// dNSSEC
|
#[doc = " DNSSEC"]
|
||||||
pub const DNSKEY: u16 = 48;
|
pub const NSEC: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NSEC as u16;
|
||||||
/// dNSSEC
|
#[doc = " DNSSEC"]
|
||||||
pub const DHCID: u16 = 49;
|
pub const DNSKEY: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_DNSKEY as u16;
|
||||||
/// dNSSEC
|
#[doc = " DNSSEC"]
|
||||||
pub const NSEC3: u16 = 50;
|
pub const DHCID: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_DHCID as u16;
|
||||||
/// dNSSEC
|
#[doc = " DNSSEC"]
|
||||||
pub const NSEC3PARAM: u16 = 51;
|
pub const NSEC3: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NSEC3 as u16;
|
||||||
/// dNSSEC
|
#[doc = " DNSSEC"]
|
||||||
pub const NSEC3PARAMS: u16 = 51;
|
pub const NSEC3PARAM: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NSEC3PARAM as u16;
|
||||||
/// dNSSEC
|
#[doc = " DNSSEC"]
|
||||||
pub const TLSA: u16 = 52;
|
pub const NSEC3PARAMS: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NSEC3PARAMS as u16;
|
||||||
/// dNSSEC
|
#[doc = " DNSSEC"]
|
||||||
pub const SMIMEA: u16 = 53;
|
pub const TLSA: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_TLSA as u16;
|
||||||
/// dNSSEC
|
#[doc = " DNSSEC"]
|
||||||
pub const HIP: u16 = 55;
|
pub const SMIMEA: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_SMIMEA as u16;
|
||||||
///draft-reid-dnsext-zs
|
#[doc = " DNSSEC"]
|
||||||
pub const NINFO: u16 = 56;
|
pub const HIP: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_HIP as u16;
|
||||||
///draft-reid-dnsext-rkey
|
#[doc = " draft-reid-dnsext-zs"]
|
||||||
pub const RKEY: u16 = 57;
|
pub const NINFO: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NINFO as u16;
|
||||||
///draft-ietf-dnsop-trust-history
|
#[doc = " draft-reid-dnsext-rkey"]
|
||||||
pub const TALINK: u16 = 58;
|
pub const RKEY: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_RKEY as u16;
|
||||||
///draft-ietf-dnsop-trust-history
|
#[doc = " draft-ietf-dnsop-trust-history"]
|
||||||
pub const CDS: u16 = 59;
|
pub const TALINK: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_TALINK as u16;
|
||||||
///RFC 7344
|
#[doc = " draft-ietf-dnsop-trust-history"]
|
||||||
pub const CDNSKEY: u16 = 60;
|
pub const CDS: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_CDS as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const OPENPGPKEY: u16 = 61;
|
pub const CDNSKEY: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_CDNSKEY as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const CSYNC: u16 = 62;
|
pub const OPENPGPKEY: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_OPENPGPKEY as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const ZONEMD: u16 = 63;
|
pub const CSYNC: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_CSYNC as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const SVCB: u16 = 64;
|
pub const ZONEMD: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_ZONEMD as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const HTTPS: u16 = 65;
|
pub const SVCB: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_SVCB as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const SPF: u16 = 99;
|
pub const HTTPS: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_HTTPS as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const UINFO: u16 = 100;
|
pub const SPF: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_SPF as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const UID: u16 = 101;
|
pub const UINFO: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_UINFO as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const GID: u16 = 102;
|
pub const UID: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_UID as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const UNSPEC: u16 = 103;
|
pub const GID: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_GID as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const NID: u16 = 104;
|
pub const UNSPEC: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_UNSPEC as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const L32: u16 = 105;
|
pub const NID: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_NID as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const L64: u16 = 106;
|
pub const L32: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_L32 as u16;
|
||||||
///RFC 7344
|
#[doc = " RFC 7344"]
|
||||||
pub const LP: u16 = 107;
|
pub const L64: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_L64 as u16;
|
||||||
///draft-jabley-dnsext-eui48-eui64-rrtypes
|
#[doc = " RFC 7344"]
|
||||||
pub const EUI48: u16 = 108;
|
pub const LP: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_LP as u16;
|
||||||
///draft-jabley-dnsext-eui48-eui64-rrtypes
|
#[doc = " draft-jabley-dnsext-eui48-eui64-rrtypes"]
|
||||||
pub const EUI64: u16 = 109;
|
pub const EUI48: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_EUI48 as u16;
|
||||||
///draft-jabley-dnsext-eui48-eui64-rrtypes
|
#[doc = " draft-jabley-dnsext-eui48-eui64-rrtypes"]
|
||||||
pub const TKEY: u16 = 249;
|
pub const EUI64: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_EUI64 as u16;
|
||||||
///draft-jabley-dnsext-eui48-eui64-rrtypes
|
#[doc = " draft-jabley-dnsext-eui48-eui64-rrtypes"]
|
||||||
pub const TSIG: u16 = 250;
|
pub const TKEY: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_TKEY as u16;
|
||||||
///draft-jabley-dnsext-eui48-eui64-rrtypes
|
#[doc = " draft-jabley-dnsext-eui48-eui64-rrtypes"]
|
||||||
pub const IXFR: u16 = 251;
|
pub const TSIG: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_TSIG as u16;
|
||||||
///draft-jabley-dnsext-eui48-eui64-rrtypes
|
#[doc = " draft-jabley-dnsext-eui48-eui64-rrtypes"]
|
||||||
pub const AXFR: u16 = 252;
|
pub const IXFR: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_IXFR as u16;
|
||||||
/// a request for mailbox-related records (MB, MG or MR)
|
#[doc = " draft-jabley-dnsext-eui48-eui64-rrtypes"]
|
||||||
pub const MAILB: u16 = 253;
|
pub const AXFR: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_AXFR as u16;
|
||||||
/// a request for mail agent RRs (Obsolete - see MX)
|
#[doc = " A request for mailbox-related records (MB, MG or MR)"]
|
||||||
pub const MAILA: u16 = 254;
|
pub const MAILB: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_MAILB as u16;
|
||||||
/// Any type (wildcard)
|
#[doc = " A request for mail agent RRs (Obsolete - see MX)"]
|
||||||
pub const ANY: u16 = 255;
|
pub const MAILA: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_MAILA as u16;
|
||||||
pub const URI: u16 = 256;
|
#[doc = " any type (wildcard)"]
|
||||||
pub const CAA: u16 = 257;
|
pub const ANY: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_ANY as u16;
|
||||||
pub const AVC: u16 = 258;
|
#[doc = " any type (wildcard)"]
|
||||||
///DNSSEC trust Authorities
|
pub const URI: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_URI as u16;
|
||||||
pub const TA: u16 = 32768;
|
#[doc = " any type (wildcard)"]
|
||||||
pub const DLV: u16 = 32769;
|
pub const CAA: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_CAA as u16;
|
||||||
|
#[doc = " any type (wildcard)"]
|
||||||
|
pub const AVC: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_AVC as u16;
|
||||||
|
#[doc = " DNSSEC Trust Authorities"]
|
||||||
|
pub const TA: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_TA as u16;
|
||||||
|
#[doc = " DNSSEC Trust Authorities"]
|
||||||
|
pub const DLV: u16 = bindings::sldns_enum_rr_type_LDNS_RR_TYPE_DLV as u16;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue