A C library for asynchronous DNS requests (grpc依赖)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
Brad House 80c2648f0a release-1.32.2 (#812) 5 months ago
.github Rework WinAFD event code (#811) 5 months ago
.reuse reuse compliance 6 months ago
LICENSES Apple: reimplement DNS configuration reading (#750) 7 months ago
ci Rework WinAFD event code (#811) 5 months ago
cmake remove unneeded warning disablement 5 months ago
docs DNS RR TXT strings should not be automatically concatenated (#801) 5 months ago
include release-1.32.2 (#812) 5 months ago
m4 Autotools: rework to simplify and fix recent issues (#674) 11 months ago
src ares_destroy() deadlock during cleanup of config change monitoring if a configuration change comes in during shutdown 5 months ago
test Rework WinAFD event code (#811) 5 months ago
.cirrus.yml CI: MacOS fix 6 months ago
.clang-format clang-format: fix structure alignment 1 year ago
.gitattributes recursive git attributes 1 year ago
.gitignore Watcom Portability Improvements (#509) 2 years ago
AUTHORS Avoid buffer overflow in RC4 loop comparison (#336) 4 years ago
CMakeLists.txt release-1.32.2 (#812) 5 months ago
CONTRIBUTING.md update base README 6 months ago
DEVELOPER-NOTES.md update base README 6 months ago
GIT-INFO Avoid buffer overflow in RC4 loop comparison (#336) 4 years ago
INSTALL.md update some build instructions 5 months ago
LICENSE.md force preservation of newline in license 6 months ago
Makefile.Watcom Fix Watt-32 compilation support (#781) 6 months ago
Makefile.am modernize basic files and docs in repo 6 months ago
Makefile.dj updates 5 months ago
Makefile.m32 don't try to install removed header ares_rules.h 5 months ago
Makefile.msvc don't try to install removed header ares_rules.h 5 months ago
Makefile.netware remove unused SEND_QUAL_ARG2 5 months ago
README.md fix coveralls badge 6 months ago
README.msvc remove acountry from built tools as nerd.dk is gone (#554) 1 year ago
RELEASE-NOTES.md release-1.32.2 (#812) 5 months ago
RELEASE-PROCEDURE.md modernize basic files and docs in repo 6 months ago
SECURITY.md Use gender-neutral language in SECURITY.md (#746) 7 months ago
appveyor.yml Rework WinAFD event code (#811) 5 months ago
buildconf provide SPDX identifiers and a REUSE CI job to verify 1 year ago
buildconf.bat provide SPDX identifiers and a REUSE CI job to verify 1 year ago
c-ares-config.cmake.in provide SPDX identifiers and a REUSE CI job to verify 1 year ago
configure.ac release-1.32.2 (#812) 5 months ago
libcares.pc.cmake Autotools: rework to simplify and fix recent issues (#674) 11 months ago
libcares.pc.in attempt to fix pkgconfig on windows for static builds 10 months ago
msvc_ver.inc provide SPDX identifiers and a REUSE CI job to verify 1 year ago
sonar-project.properties SonarCloud: Fix additional code smells 1 year ago

README.md

c-ares logo

Build Status Windows Build Status Coverage Status CII Best Practices Fuzzing Status Bugs Coverity Scan Status

Overview

c-ares is a modern DNS (stub) resolver library, written in C. It provides interfaces for asynchronous queries while trying to abstract the intricacies of the underlying DNS protocol. It was originally intended for applications which need to perform DNS queries without blocking, or need to perform multiple DNS queries in parallel.

One of the goals of c-ares is to be a better DNS resolver than is provided by your system, regardless of which system you use. We recommend using the c-ares library in all network applications even if the initial goal of asynchronous resolution is not necessary to your application.

c-ares will build with any C89 compiler and is MIT licensed, which makes it suitable for both free and commercial software. c-ares runs on Linux, FreeBSD, OpenBSD, MacOS, Solaris, AIX, Windows, Android, iOS and many more operating systems.

c-ares has a strong focus on security, implementing safe parsers and data builders used throughout the code, thus avoiding many of the common pitfalls of other C libraries. Through automated testing with our extensive testing framework, c-ares is constantly validated with a range of static and dynamic analyzers, as well as being constantly fuzzed by OSS Fuzz.

While c-ares has been around for over 20 years, it has been actively maintained both in regards to the latest DNS RFCs as well as updated to follow the latest best practices in regards to C coding standards.

Code

The full source code and revision history is available in our GitHub repository. Our signed releases are available in the release archives.

See the INSTALL.md file for build information.

Communication

Issues and Feature Requests should be reported to our GitHub Issues page.

Discussions around c-ares and its use, are held on GitHub Discussions or the Mailing List. Mailing List archive here. Please, do not mail volunteers privately about c-ares.

Security vulnerabilities are treated according to our Security Procedure, please email c-ares-security at haxx.se if you suspect one.

Release keys

Primary GPG keys for c-ares Releasers (some Releasers sign with subkeys):

To import the full set of trusted release keys (including subkeys possibly used to sign releases):

gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys 27EDEAF22F3ABCEB50DB9A125CC908FDB71E12C2 # Daniel Stenberg
gpg --keyserver hkps://keys.openpgp.org --recv-keys DA7D64E4C82C6294CB73A20E22E3D13B5411B7CA     # Brad House

Verifying signatures

For each release c-ares-X.Y.Z.tar.gz there is a corresponding c-ares-X.Y.Z.tar.gz.asc file which contains the detached signature for the release.

After fetching all of the possible valid signing keys and loading into your keychain as per the prior section, you can simply run the command below on the downloaded package and detached signature:

% gpg -v --verify c-ares-1.29.0.tar.gz.asc c-ares-1.29.0.tar.gz
gpg: enabled compatibility flags:
gpg: Signature made Fri May 24 02:50:38 2024 EDT
gpg:                using RSA key 27EDEAF22F3ABCEB50DB9A125CC908FDB71E12C2
gpg: using pgp trust model
gpg: Good signature from "Daniel Stenberg <daniel@haxx.se>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: 27ED EAF2 2F3A BCEB 50DB  9A12 5CC9 08FD B71E 12C2
gpg: binary signature, digest algorithm SHA512, key algorithm rsa2048