2 * testpkts. Data file parse for test packets, and query matching.
4 * Data storage for specially crafted replies for testing purposes.
6 * (c) NLnet Labs, 2005, 2006, 2007, 2008
7 * See the file LICENSE for the license
12 * This is a debugging aid. It is not efficient, especially
13 * with a long config file, but it can give any reply to any query.
14 * This can help the developer pre-script replies for queries.
16 * You can specify a packet RR by RR with header flags to return.
19 * - matching content different from reply content.
20 * - find way to adjust mangled packets?
24 struct sockaddr_storage;
28 #include "testcode/testpkts.h"
29 #include "util/net_help.h"
30 #include "sldns/sbuffer.h"
31 #include "sldns/rrdef.h"
32 #include "sldns/pkthdr.h"
33 #include "sldns/str2wire.h"
34 #include "sldns/wire2str.h"
36 /** max size of a packet */
37 #define MAX_PACKETLEN 65536
38 /** max line length */
39 #define MAX_LINE 10240
40 /** string to show in warnings and errors */
41 static const char* prog_name = "testpkts";
44 /** verbosity definition for compat */
45 enum verbosity_value { NO_VERBOSE=0 };
47 /** logging routine, provided by caller */
48 void verbose(enum verbosity_value lvl, const char* msg, ...) ATTR_FORMAT(printf, 2, 3);
49 static void error(const char* msg, ...) ATTR_NORETURN;
51 /** print error and exit */
52 static void error(const char* msg, ...)
56 fprintf(stderr, "%s error: ", prog_name);
57 vfprintf(stderr, msg, args);
58 fprintf(stderr, "\n");
64 /** return if string is empty or comment */
65 static int isendline(char c)
67 if(c == ';' || c == '#'
68 || c == '\n' || c == 0)
73 /** true if the string starts with the keyword given. Moves the str ahead.
74 * @param str: before keyword, afterwards after keyword and spaces.
75 * @param keyword: the keyword to match
76 * @return: true if keyword present. False otherwise, and str unchanged.
78 static int str_keyword(char** str, const char* keyword)
80 size_t len = strlen(keyword);
81 assert(str && keyword);
82 if(strncmp(*str, keyword, len) != 0)
85 while(isspace((unsigned char)**str))
90 /** Add reply packet to entry */
91 static struct reply_packet*
92 entry_add_reply(struct entry* entry)
94 struct reply_packet* pkt = (struct reply_packet*)malloc(
95 sizeof(struct reply_packet));
96 struct reply_packet ** p = &entry->reply_list;
97 if(!pkt) error("out of memory");
99 pkt->packet_sleep = 0;
100 pkt->reply_pkt = NULL;
101 pkt->reply_from_hex = NULL;
102 pkt->raw_ednsdata = NULL;
110 /** parse MATCH line */
111 static void matchline(char* line, struct entry* e)
115 if(isendline(*parse))
117 if(str_keyword(&parse, "opcode")) {
119 } else if(str_keyword(&parse, "qtype")) {
121 } else if(str_keyword(&parse, "qname")) {
123 } else if(str_keyword(&parse, "rcode")) {
125 } else if(str_keyword(&parse, "question")) {
126 e->match_question = 1;
127 } else if(str_keyword(&parse, "answer")) {
129 } else if(str_keyword(&parse, "subdomain")) {
130 e->match_subdomain = 1;
131 } else if(str_keyword(&parse, "all")) {
133 } else if(str_keyword(&parse, "ttl")) {
135 } else if(str_keyword(&parse, "DO")) {
137 } else if(str_keyword(&parse, "noedns")) {
139 } else if(str_keyword(&parse, "ednsdata")) {
140 e->match_ednsdata_raw = 1;
141 } else if(str_keyword(&parse, "UDP")) {
142 e->match_transport = transport_udp;
143 } else if(str_keyword(&parse, "TCP")) {
144 e->match_transport = transport_tcp;
145 } else if(str_keyword(&parse, "serial")) {
147 if(*parse != '=' && *parse != ':')
148 error("expected = or : in MATCH: %s", line);
150 e->ixfr_soa_serial = (uint32_t)strtol(parse, (char**)&parse, 10);
151 while(isspace((unsigned char)*parse))
154 error("could not parse MATCH: '%s'", parse);
159 /** parse REPLY line */
160 static void replyline(char* line, uint8_t* reply, size_t reply_len,
164 if(reply_len < LDNS_HEADER_SIZE) error("packet too short for header");
166 if(isendline(*parse))
169 if(str_keyword(&parse, "QUERY")) {
170 LDNS_OPCODE_SET(reply, LDNS_PACKET_QUERY);
171 } else if(str_keyword(&parse, "IQUERY")) {
172 LDNS_OPCODE_SET(reply, LDNS_PACKET_IQUERY);
173 } else if(str_keyword(&parse, "STATUS")) {
174 LDNS_OPCODE_SET(reply, LDNS_PACKET_STATUS);
175 } else if(str_keyword(&parse, "NOTIFY")) {
176 LDNS_OPCODE_SET(reply, LDNS_PACKET_NOTIFY);
177 } else if(str_keyword(&parse, "UPDATE")) {
178 LDNS_OPCODE_SET(reply, LDNS_PACKET_UPDATE);
180 } else if(str_keyword(&parse, "NOERROR")) {
181 LDNS_RCODE_SET(reply, LDNS_RCODE_NOERROR);
182 } else if(str_keyword(&parse, "FORMERR")) {
183 LDNS_RCODE_SET(reply, LDNS_RCODE_FORMERR);
184 } else if(str_keyword(&parse, "SERVFAIL")) {
185 LDNS_RCODE_SET(reply, LDNS_RCODE_SERVFAIL);
186 } else if(str_keyword(&parse, "NXDOMAIN")) {
187 LDNS_RCODE_SET(reply, LDNS_RCODE_NXDOMAIN);
188 } else if(str_keyword(&parse, "NOTIMPL")) {
189 LDNS_RCODE_SET(reply, LDNS_RCODE_NOTIMPL);
190 } else if(str_keyword(&parse, "REFUSED")) {
191 LDNS_RCODE_SET(reply, LDNS_RCODE_REFUSED);
192 } else if(str_keyword(&parse, "YXDOMAIN")) {
193 LDNS_RCODE_SET(reply, LDNS_RCODE_YXDOMAIN);
194 } else if(str_keyword(&parse, "YXRRSET")) {
195 LDNS_RCODE_SET(reply, LDNS_RCODE_YXRRSET);
196 } else if(str_keyword(&parse, "NXRRSET")) {
197 LDNS_RCODE_SET(reply, LDNS_RCODE_NXRRSET);
198 } else if(str_keyword(&parse, "NOTAUTH")) {
199 LDNS_RCODE_SET(reply, LDNS_RCODE_NOTAUTH);
200 } else if(str_keyword(&parse, "NOTZONE")) {
201 LDNS_RCODE_SET(reply, LDNS_RCODE_NOTZONE);
203 } else if(str_keyword(&parse, "QR")) {
205 } else if(str_keyword(&parse, "AA")) {
207 } else if(str_keyword(&parse, "TC")) {
209 } else if(str_keyword(&parse, "RD")) {
211 } else if(str_keyword(&parse, "CD")) {
213 } else if(str_keyword(&parse, "RA")) {
215 } else if(str_keyword(&parse, "AD")) {
217 } else if(str_keyword(&parse, "DO")) {
220 error("could not parse REPLY: '%s'", parse);
225 /** parse ADJUST line */
226 static void adjustline(char* line, struct entry* e,
227 struct reply_packet* pkt)
231 if(isendline(*parse))
233 if(str_keyword(&parse, "copy_id")) {
235 } else if(str_keyword(&parse, "copy_query")) {
237 } else if(str_keyword(&parse, "copy_ednsdata_assume_clientsubnet")) {
238 e->copy_ednsdata_assume_clientsubnet = 1;
239 } else if(str_keyword(&parse, "increment_ecs_scope")) {
240 e->increment_ecs_scope = 1;
241 } else if(str_keyword(&parse, "sleep=")) {
242 e->sleeptime = (unsigned int) strtol(parse, (char**)&parse, 10);
243 while(isspace((unsigned char)*parse))
245 } else if(str_keyword(&parse, "packet_sleep=")) {
246 pkt->packet_sleep = (unsigned int) strtol(parse, (char**)&parse, 10);
247 while(isspace((unsigned char)*parse))
250 error("could not parse ADJUST: '%s'", parse);
255 /** create new entry */
256 static struct entry* new_entry(void)
258 struct entry* e = (struct entry*)malloc(sizeof(struct entry));
259 if(!e) error("out of memory");
260 memset(e, 0, sizeof(*e));
265 e->match_question = 0;
267 e->match_subdomain = 0;
273 e->ixfr_soa_serial = 0;
274 e->match_transport = transport_any;
275 e->reply_list = NULL;
278 e->copy_ednsdata_assume_clientsubnet = 0;
279 e->increment_ecs_scope = 0;
286 * Converts a hex string to binary data
287 * @param hexstr: string of hex.
288 * @param len: is the length of the string
289 * @param buf: is the buffer to store the result in
290 * @param offset: is the starting position in the result buffer
291 * @param buf_len: is the length of buf.
292 * @return This function returns the length of the result
295 hexstr2bin(char *hexstr, int len, uint8_t *buf, size_t offset, size_t buf_len)
307 for (i=0; i<len; i++) {
310 /* case insensitive, skip spaces */
312 if (c >= '0' && c <= '9') {
314 } else if (c >= 'a' && c <= 'z') {
315 int8 += (c & 0x0f) + 9;
316 } else if (c >= 'A' && c <= 'Z') {
317 int8 += (c & 0x0f) + 9;
326 if (bufpos + offset + 1 <= buf_len) {
327 buf[bufpos+offset] = int8;
332 fprintf(stderr, "Buffer too small in hexstr2bin");
340 /** convert hex buffer to binary buffer */
341 static sldns_buffer *
342 hex_buffer2wire(sldns_buffer *data_buffer)
344 sldns_buffer *wire_buffer = NULL;
349 * 1 = comment (skip to end of line)
350 * 2 = unprintable character found, read binary data directly
352 size_t data_buf_pos = 0;
357 uint8_t *data_wire = (uint8_t *) sldns_buffer_begin(data_buffer);
358 uint8_t *wire = (uint8_t*)malloc(MAX_PACKETLEN);
359 if(!wire) error("out of memory");
361 hexbuf = (uint8_t*)malloc(MAX_PACKETLEN);
362 if(!hexbuf) error("out of memory");
363 for (data_buf_pos = 0; data_buf_pos < sldns_buffer_position(data_buffer); data_buf_pos++) {
364 c = (int) data_wire[data_buf_pos];
366 if (state < 2 && !isascii((unsigned char)c)) {
367 /*verbose("non ascii character found in file: (%d) switching to raw mode\n", c);*/
372 if ( (c >= '0' && c <= '9') ||
373 (c >= 'a' && c <= 'f') ||
374 (c >= 'A' && c <= 'F') )
376 if (hexbufpos >= MAX_PACKETLEN) {
377 error("buffer overflow");
382 hexbuf[hexbufpos] = (uint8_t) c;
384 } else if (c == ';') {
386 } else if (c == ' ' || c == '\t' || c == '\n') {
387 /* skip whitespace */
391 if (c == '\n' || c == EOF) {
396 if (hexbufpos >= MAX_PACKETLEN) {
397 error("buffer overflow");
401 hexbuf[hexbufpos] = (uint8_t) c;
407 if (hexbufpos >= MAX_PACKETLEN) {
408 /*verbose("packet size reached\n");*/
411 /* lenient mode: length must be multiple of 2 */
412 if (hexbufpos % 2 != 0) {
413 if (hexbufpos >= MAX_PACKETLEN) {
414 error("buffer overflow");
418 hexbuf[hexbufpos] = (uint8_t) '0';
423 wirelen = hexstr2bin((char *) hexbuf, hexbufpos, wire, 0, MAX_PACKETLEN);
424 wire_buffer = sldns_buffer_new(wirelen);
425 sldns_buffer_new_frm_data(wire_buffer, wire, wirelen);
427 error("Incomplete hex data, not at byte boundary\n");
436 get_origin(const char* name, struct sldns_file_parse_state* pstate, char* parse)
438 /* snip off rest of the text so as to make the parse work in ldns */
444 while(!isspace((unsigned char)*end) && !isendline(*end))
448 verbose(3, "parsing '%s'\n", parse);
449 status = sldns_str2wire_dname_buf(parse, pstate->origin,
450 &pstate->origin_len);
453 error("%s line %d:\n\t%s: %s", name, pstate->lineno,
454 sldns_get_errorstr_parse(status), parse);
457 /** add RR to packet */
458 static void add_rr(char* rrstr, uint8_t* pktbuf, size_t pktsize,
459 size_t* pktlen, struct sldns_file_parse_state* pstate,
460 sldns_pkt_section add_section, const char* fname)
462 /* it must be a RR, parse and add to packet. */
463 size_t rr_len = pktsize - *pktlen;
464 size_t dname_len = 0;
466 uint8_t* origin = pstate->origin_len?pstate->origin:0;
467 uint8_t* prev = pstate->prev_rr_len?pstate->prev_rr:0;
468 if(*pktlen > pktsize || *pktlen < LDNS_HEADER_SIZE)
469 error("packet overflow");
472 if(add_section == LDNS_SECTION_QUESTION)
473 status = sldns_str2wire_rr_question_buf(rrstr, pktbuf+*pktlen,
474 &rr_len, &dname_len, origin, pstate->origin_len,
475 prev, pstate->prev_rr_len);
476 else status = sldns_str2wire_rr_buf(rrstr, pktbuf+*pktlen, &rr_len,
477 &dname_len, pstate->default_ttl, origin,
478 pstate->origin_len, prev, pstate->prev_rr_len);
480 error("%s line %d:%d %s\n\t%s", fname, pstate->lineno,
481 LDNS_WIREPARSE_OFFSET(status),
482 sldns_get_errorstr_parse(status), rrstr);
485 /* increase RR count */
486 if(add_section == LDNS_SECTION_QUESTION)
487 sldns_write_uint16(pktbuf+4, LDNS_QDCOUNT(pktbuf)+1);
488 else if(add_section == LDNS_SECTION_ANSWER)
489 sldns_write_uint16(pktbuf+6, LDNS_ANCOUNT(pktbuf)+1);
490 else if(add_section == LDNS_SECTION_AUTHORITY)
491 sldns_write_uint16(pktbuf+8, LDNS_NSCOUNT(pktbuf)+1);
492 else if(add_section == LDNS_SECTION_ADDITIONAL)
493 sldns_write_uint16(pktbuf+10, LDNS_ARCOUNT(pktbuf)+1);
494 else error("internal error bad section %d", (int)add_section);
497 /* add EDNS 4096 opt record */
499 add_edns(uint8_t* pktbuf, size_t pktsize, int do_flag, uint8_t *ednsdata,
500 uint16_t ednslen, size_t* pktlen)
502 uint8_t edns[] = {0x00, /* root label */
503 0x00, LDNS_RR_TYPE_OPT, /* type */
504 0x04, 0xD0, /* class is UDPSIZE 1232 */
505 0x00, /* TTL[0] is ext rcode */
506 0x00, /* TTL[1] is edns version */
507 (uint8_t)(do_flag?0x80:0x00), 0x00, /* TTL[2-3] is edns flags, DO */
508 (uint8_t)((ednslen >> 8) & 0xff),
509 (uint8_t)(ednslen & 0xff), /* rdatalength */
511 if(*pktlen < LDNS_HEADER_SIZE)
513 if(*pktlen + sizeof(edns) + ednslen > pktsize)
514 error("not enough space for EDNS OPT record");
515 memmove(pktbuf+*pktlen, edns, sizeof(edns));
516 if(ednsdata && ednslen)
517 memmove(pktbuf+*pktlen+sizeof(edns), ednsdata, ednslen);
518 sldns_write_uint16(pktbuf+10, LDNS_ARCOUNT(pktbuf)+1);
519 *pktlen += (sizeof(edns) + ednslen);
522 /* Reads one entry from file. Returns entry or NULL on error. */
524 read_entry(FILE* in, const char* name, struct sldns_file_parse_state* pstate,
527 struct entry* current = NULL;
530 sldns_pkt_section add_section = LDNS_SECTION_QUESTION;
531 struct reply_packet *cur_reply = NULL;
533 int reading_hex_ednsdata = 0;
534 sldns_buffer* hex_data_buffer = NULL;
535 sldns_buffer* hex_ednsdata_buffer = NULL;
536 uint8_t pktbuf[MAX_PACKETLEN];
537 size_t pktlen = LDNS_HEADER_SIZE;
538 int do_flag = 0; /* DO flag in EDNS */
539 memset(pktbuf, 0, pktlen); /* ID = 0, FLAGS="", and rr counts 0 */
541 while(fgets(line, (int)sizeof(line), in) != NULL) {
542 line[MAX_LINE-1] = 0;
546 while(isspace((unsigned char)*parse))
548 /* test for keywords */
549 if(isendline(*parse))
550 continue; /* skip comment and empty lines */
551 if(str_keyword(&parse, "ENTRY_BEGIN")) {
553 error("%s line %d: previous entry does not ENTRY_END",
554 name, pstate->lineno);
556 current = new_entry();
557 current->lineno = pstate->lineno;
558 cur_reply = entry_add_reply(current);
560 } else if(str_keyword(&parse, "$ORIGIN")) {
561 get_origin(name, pstate, parse);
563 } else if(str_keyword(&parse, "$TTL")) {
564 pstate->default_ttl = (uint32_t)atoi(parse);
568 /* working inside an entry */
570 error("%s line %d: expected ENTRY_BEGIN but got %s",
571 name, pstate->lineno, line);
573 if(str_keyword(&parse, "MATCH")) {
574 matchline(parse, current);
575 } else if(str_keyword(&parse, "REPLY")) {
576 replyline(parse, pktbuf, pktlen, &do_flag);
577 } else if(str_keyword(&parse, "ADJUST")) {
578 adjustline(parse, current, cur_reply);
579 } else if(str_keyword(&parse, "EXTRA_PACKET")) {
580 /* copy current packet into buffer */
581 cur_reply->reply_pkt = memdup(pktbuf, pktlen);
582 cur_reply->reply_len = pktlen;
583 if(!cur_reply->reply_pkt)
584 error("out of memory");
585 cur_reply = entry_add_reply(current);
586 /* clear for next packet */
587 pktlen = LDNS_HEADER_SIZE;
588 memset(pktbuf, 0, pktlen); /* ID = 0, FLAGS="", and rr counts 0 */
589 } else if(str_keyword(&parse, "SECTION")) {
590 if(str_keyword(&parse, "QUESTION"))
591 add_section = LDNS_SECTION_QUESTION;
592 else if(str_keyword(&parse, "ANSWER"))
593 add_section = LDNS_SECTION_ANSWER;
594 else if(str_keyword(&parse, "AUTHORITY"))
595 add_section = LDNS_SECTION_AUTHORITY;
596 else if(str_keyword(&parse, "ADDITIONAL"))
597 add_section = LDNS_SECTION_ADDITIONAL;
598 else error("%s line %d: bad section %s", name, pstate->lineno, parse);
599 } else if(str_keyword(&parse, "HEX_ANSWER_BEGIN")) {
600 hex_data_buffer = sldns_buffer_new(MAX_PACKETLEN);
602 } else if(str_keyword(&parse, "HEX_ANSWER_END")) {
604 error("%s line %d: HEX_ANSWER_END read but no HEX_ANSWER_BEGIN keyword seen", name, pstate->lineno);
607 cur_reply->reply_from_hex = hex_buffer2wire(hex_data_buffer);
608 sldns_buffer_free(hex_data_buffer);
609 hex_data_buffer = NULL;
610 } else if(reading_hex) {
611 sldns_buffer_printf(hex_data_buffer, "%s", line);
612 } else if(str_keyword(&parse, "HEX_EDNSDATA_BEGIN")) {
613 hex_ednsdata_buffer = sldns_buffer_new(MAX_PACKETLEN);
614 reading_hex_ednsdata = 1;
615 } else if(str_keyword(&parse, "HEX_EDNSDATA_END")) {
616 if (!reading_hex_ednsdata) {
617 error("%s line %d: HEX_EDNSDATA_END read but no"
618 "HEX_EDNSDATA_BEGIN keyword seen", name, pstate->lineno);
620 reading_hex_ednsdata = 0;
621 cur_reply->raw_ednsdata = hex_buffer2wire(hex_ednsdata_buffer);
622 sldns_buffer_free(hex_ednsdata_buffer);
623 hex_ednsdata_buffer = NULL;
624 } else if(reading_hex_ednsdata) {
625 sldns_buffer_printf(hex_ednsdata_buffer, "%s", line);
626 } else if(str_keyword(&parse, "ENTRY_END")) {
628 sldns_buffer_free(hex_data_buffer);
629 if(hex_ednsdata_buffer)
630 sldns_buffer_free(hex_ednsdata_buffer);
632 if(do_flag || cur_reply->raw_ednsdata) {
633 if(cur_reply->raw_ednsdata &&
634 sldns_buffer_limit(cur_reply->raw_ednsdata))
635 add_edns(pktbuf, sizeof(pktbuf), do_flag,
636 sldns_buffer_begin(cur_reply->raw_ednsdata),
637 (uint16_t)sldns_buffer_limit(cur_reply->raw_ednsdata),
640 add_edns(pktbuf, sizeof(pktbuf), do_flag,
643 cur_reply->reply_pkt = memdup(pktbuf, pktlen);
644 cur_reply->reply_len = pktlen;
645 if(!cur_reply->reply_pkt)
646 error("out of memory");
650 add_rr(skip_whitespace?parse:line, pktbuf,
651 sizeof(pktbuf), &pktlen, pstate, add_section,
657 error("%s: End of file reached while still reading hex, "
658 "missing HEX_ANSWER_END\n", name);
660 if(reading_hex_ednsdata) {
661 error("%s: End of file reached while still reading edns data, "
662 "missing HEX_EDNSDATA_END\n", name);
665 error("%s: End of file reached while reading entry. "
666 "missing ENTRY_END\n", name);
671 /* reads the canned reply file and returns a list of structs */
673 read_datafile(const char* name, int skip_whitespace)
675 struct entry* list = NULL;
676 struct entry* last = NULL;
677 struct entry* current = NULL;
679 struct sldns_file_parse_state pstate;
681 memset(&pstate, 0, sizeof(pstate));
683 if((in=fopen(name, "r")) == NULL) {
684 error("could not open file %s: %s", name, strerror(errno));
687 while((current = read_entry(in, name, &pstate, skip_whitespace)))
690 last->next = current;
695 verbose(1, "%s: Read %d entries\n", prog_name, entry_num);
701 /** get qtype from packet */
702 static sldns_rr_type get_qtype(uint8_t* pkt, size_t pktlen)
708 if(pktlen < LDNS_HEADER_SIZE)
710 if(LDNS_QDCOUNT(pkt) == 0)
712 /* skip over dname with dname-scan routine */
713 d = pkt+LDNS_HEADER_SIZE;
714 dl = pktlen-LDNS_HEADER_SIZE;
715 (void)sldns_wire2str_dname_scan(&d, &dl, &snull, &sl, pkt, pktlen, &comprloop);
718 return sldns_read_uint16(d);
721 /** get qtype from packet */
722 static size_t get_qname_len(uint8_t* pkt, size_t pktlen)
728 if(pktlen < LDNS_HEADER_SIZE)
730 if(LDNS_QDCOUNT(pkt) == 0)
732 /* skip over dname with dname-scan routine */
733 d = pkt+LDNS_HEADER_SIZE;
734 dl = pktlen-LDNS_HEADER_SIZE;
735 (void)sldns_wire2str_dname_scan(&d, &dl, &snull, &sl, pkt, pktlen, &comprloop);
736 return pktlen-dl-LDNS_HEADER_SIZE;
739 /** returns owner from packet */
740 static uint8_t* get_qname(uint8_t* pkt, size_t pktlen)
742 if(pktlen < LDNS_HEADER_SIZE)
744 if(LDNS_QDCOUNT(pkt) == 0)
746 return pkt+LDNS_HEADER_SIZE;
749 /** returns opcode from packet */
750 static int get_opcode(uint8_t* pkt, size_t pktlen)
752 if(pktlen < LDNS_HEADER_SIZE)
754 return (int)LDNS_OPCODE_WIRE(pkt);
757 /** returns rcode from packet */
758 static int get_rcode(uint8_t* pkt, size_t pktlen)
760 if(pktlen < LDNS_HEADER_SIZE)
762 return (int)LDNS_RCODE_WIRE(pkt);
765 /** get authority section SOA serial value */
766 static uint32_t get_serial(uint8_t* p, size_t plen)
769 size_t walk_len = plen, sl=0;
774 if(walk_len < LDNS_HEADER_SIZE)
776 walk += LDNS_HEADER_SIZE;
777 walk_len -= LDNS_HEADER_SIZE;
779 /* skip other records with wire2str_scan */
780 for(i=0; i < LDNS_QDCOUNT(p); i++)
781 (void)sldns_wire2str_rrquestion_scan(&walk, &walk_len,
782 &snull, &sl, p, plen, &comprloop);
783 for(i=0; i < LDNS_ANCOUNT(p); i++)
784 (void)sldns_wire2str_rr_scan(&walk, &walk_len, &snull, &sl,
785 p, plen, &comprloop);
787 /* walk through authority section */
788 for(i=0; i < LDNS_NSCOUNT(p); i++) {
789 /* if this is SOA then get serial, skip compressed dname */
790 uint8_t* dstart = walk;
791 size_t dlen = walk_len;
792 (void)sldns_wire2str_dname_scan(&dstart, &dlen, &snull, &sl,
793 p, plen, &comprloop);
794 if(dlen >= 2 && sldns_read_uint16(dstart) == LDNS_RR_TYPE_SOA) {
795 /* skip type, class, TTL, rdatalen */
798 if(dlen < 10 + (size_t)sldns_read_uint16(dstart+8))
802 /* check third rdf */
803 (void)sldns_wire2str_dname_scan(&dstart, &dlen, &snull,
804 &sl, p, plen, &comprloop);
805 (void)sldns_wire2str_dname_scan(&dstart, &dlen, &snull,
806 &sl, p, plen, &comprloop);
809 verbose(3, "found serial %u in msg. ",
810 (int)sldns_read_uint32(dstart));
811 return sldns_read_uint32(dstart);
813 /* move to next RR */
814 (void)sldns_wire2str_rr_scan(&walk, &walk_len, &snull, &sl,
815 p, plen, &comprloop);
820 /** get ptr to EDNS OPT record (and remaining length); behind the type u16 */
822 pkt_find_edns_opt(uint8_t** p, size_t* plen)
824 /* walk over the packet with scan routines */
826 size_t wlen = *plen, sl=0;
831 if(wlen < LDNS_HEADER_SIZE)
833 w += LDNS_HEADER_SIZE;
834 wlen -= LDNS_HEADER_SIZE;
836 /* skip other records with wire2str_scan */
837 for(i=0; i < LDNS_QDCOUNT(*p); i++)
838 (void)sldns_wire2str_rrquestion_scan(&w, &wlen, &snull, &sl,
839 *p, *plen, &comprloop);
840 for(i=0; i < LDNS_ANCOUNT(*p); i++)
841 (void)sldns_wire2str_rr_scan(&w, &wlen, &snull, &sl, *p, *plen, &comprloop);
842 for(i=0; i < LDNS_NSCOUNT(*p); i++)
843 (void)sldns_wire2str_rr_scan(&w, &wlen, &snull, &sl, *p, *plen, &comprloop);
845 /* walk through additional section */
846 for(i=0; i < LDNS_ARCOUNT(*p); i++) {
847 /* if this is OPT then done */
850 (void)sldns_wire2str_dname_scan(&dstart, &dlen, &snull, &sl,
851 *p, *plen, &comprloop);
852 if(dlen >= 2 && sldns_read_uint16(dstart) == LDNS_RR_TYPE_OPT) {
857 /* move to next RR */
858 (void)sldns_wire2str_rr_scan(&w, &wlen, &snull, &sl, *p, *plen, &comprloop);
863 /** return true if the packet has EDNS OPT record */
865 get_has_edns(uint8_t* pkt, size_t len)
867 /* use arguments as temporary variables */
868 return pkt_find_edns_opt(&pkt, &len);
871 /** return true if the DO flag is set */
873 get_do_flag(uint8_t* pkt, size_t len)
877 size_t walk_len = len;
878 if(!pkt_find_edns_opt(&walk, &walk_len)) {
882 return 0; /* malformed */
883 edns_bits = sldns_read_uint16(walk+4);
884 return (int)(edns_bits&LDNS_EDNS_MASK_DO_BIT);
887 /** zero TTLs in packet */
889 zerottls(uint8_t* pkt, size_t pktlen)
892 size_t walk_len = pktlen, sl=0;
895 uint16_t num = LDNS_ANCOUNT(pkt)+LDNS_NSCOUNT(pkt)+LDNS_ARCOUNT(pkt);
897 if(walk_len < LDNS_HEADER_SIZE)
899 walk += LDNS_HEADER_SIZE;
900 walk_len -= LDNS_HEADER_SIZE;
901 for(i=0; i < LDNS_QDCOUNT(pkt); i++)
902 (void)sldns_wire2str_rrquestion_scan(&walk, &walk_len,
903 &snull, &sl, pkt, pktlen, &comprloop);
904 for(i=0; i < num; i++) {
906 uint8_t* dstart = walk;
907 size_t dlen = walk_len;
908 (void)sldns_wire2str_dname_scan(&dstart, &dlen, &snull, &sl,
909 pkt, pktlen, &comprloop);
912 sldns_write_uint32(dstart+4, 0);
914 (void)sldns_wire2str_rr_scan(&walk, &walk_len, &snull, &sl,
915 pkt, pktlen, &comprloop);
919 /** get one line (\n) from a string, move next to after the \n, zero \n */
921 get_line(char** s, char** n)
923 /* at end of string? end */
924 if(*n == NULL || **n == 0)
926 /* result starts at next string */
928 /* find \n after that */
929 *n = strchr(*s, '\n');
938 /** match two RR sections without ordering */
940 match_noloc_section(char** q, char** nq, char** p, char** np, uint16_t num)
942 /* for max number of RRs in packet */
943 const uint16_t numarray = 3000;
944 char* qlines[numarray], *plines[numarray];
945 uint16_t i, j, numq=0, nump=0;
946 if(num > numarray) fatal_exit("too many RRs");
948 for(i=0; i<num; i++) {
954 /* see if they are all present in the other */
955 for(i=0; i<num; i++) {
957 for(j=0; j<num; j++) {
958 if(strcmp(qlines[i], plines[j]) == 0) {
964 verbose(3, "comparenoloc: failed for %s", qlines[i]);
971 /** match two strings for unordered equality of RRs and everything else */
973 match_noloc(char* q, char* p, uint8_t* q_pkt, size_t q_pkt_len,
974 uint8_t* p_pkt, size_t p_pkt_len)
976 char* nq = q, *np = p;
977 /* if no header, compare bytes */
978 if(p_pkt_len < LDNS_HEADER_SIZE || q_pkt_len < LDNS_HEADER_SIZE) {
979 if(p_pkt_len != q_pkt_len) return 0;
980 return memcmp(p, q, p_pkt_len);
982 /* compare RR counts */
983 if(LDNS_QDCOUNT(p_pkt) != LDNS_QDCOUNT(q_pkt))
985 if(LDNS_ANCOUNT(p_pkt) != LDNS_ANCOUNT(q_pkt))
987 if(LDNS_NSCOUNT(p_pkt) != LDNS_NSCOUNT(q_pkt))
989 if(LDNS_ARCOUNT(p_pkt) != LDNS_ARCOUNT(q_pkt))
991 /* get a line from both; compare; at sections do section */
994 if(strcmp(q, p) != 0) {
995 /* header line opcode, rcode, id */
1000 if(strcmp(q, p) != 0) {
1001 /* header flags, rr counts */
1004 /* ;; QUESTION SECTION */
1007 if(strcmp(q, p) != 0) return 0;
1008 if(!match_noloc_section(&q, &nq, &p, &np, LDNS_QDCOUNT(p_pkt)))
1011 /* empty line and ;; ANSWER SECTION */
1014 if(strcmp(q, p) != 0) return 0;
1017 if(strcmp(q, p) != 0) return 0;
1018 if(!match_noloc_section(&q, &nq, &p, &np, LDNS_ANCOUNT(p_pkt)))
1021 /* empty line and ;; AUTHORITY SECTION */
1024 if(strcmp(q, p) != 0) return 0;
1027 if(strcmp(q, p) != 0) return 0;
1028 if(!match_noloc_section(&q, &nq, &p, &np, LDNS_NSCOUNT(p_pkt)))
1031 /* empty line and ;; ADDITIONAL SECTION */
1034 if(strcmp(q, p) != 0) return 0;
1037 if(strcmp(q, p) != 0) return 0;
1038 if(!match_noloc_section(&q, &nq, &p, &np, LDNS_ARCOUNT(p_pkt)))
1044 /** lowercase domain name - does not follow compression pointers */
1045 static void lowercase_dname(uint8_t** p, size_t* remain)
1048 if(*remain == 0) return;
1051 if((**p & 0xc0) == 0xc0) {
1056 llen = (unsigned int)**p;
1060 llen = (unsigned int)*remain;
1061 for(i=0; i<llen; i++) {
1062 (*p)[i] = (uint8_t)tolower((int)(*p)[i]);
1066 if(*remain == 0) return;
1068 /* skip root label */
1073 /** lowercase rdata of type */
1074 static void lowercase_rdata(uint8_t** p, size_t* remain,
1075 uint16_t rdatalen, uint16_t t)
1077 const sldns_rr_descriptor *desc = sldns_rr_descript(t);
1078 uint8_t dname_count = 0;
1080 size_t rdataremain = rdatalen;
1084 *remain -= rdatalen;
1087 while(dname_count < desc->_dname_count) {
1088 sldns_rdf_type f = sldns_rr_descriptor_field_type(desc, i++);
1089 if(f == LDNS_RDF_TYPE_DNAME) {
1090 lowercase_dname(p, &rdataremain);
1092 } else if(f == LDNS_RDF_TYPE_STR) {
1094 if(rdataremain == 0) return;
1097 rdataremain -= len+1;
1101 case LDNS_RDF_TYPE_CLASS:
1102 case LDNS_RDF_TYPE_ALG:
1103 case LDNS_RDF_TYPE_INT8:
1106 case LDNS_RDF_TYPE_INT16:
1107 case LDNS_RDF_TYPE_TYPE:
1108 case LDNS_RDF_TYPE_CERT_ALG:
1111 case LDNS_RDF_TYPE_INT32:
1112 case LDNS_RDF_TYPE_TIME:
1113 case LDNS_RDF_TYPE_A:
1114 case LDNS_RDF_TYPE_PERIOD:
1117 case LDNS_RDF_TYPE_TSIGTIME:
1120 case LDNS_RDF_TYPE_AAAA:
1123 default: error("bad rdf type in lowercase %d", (int)f);
1129 /* skip remainder of rdata */
1131 *remain -= rdatalen;
1134 /** lowercase all names in the message */
1135 static void lowercase_pkt(uint8_t* pkt, size_t pktlen)
1139 size_t remain = pktlen;
1140 uint16_t t, rdatalen;
1141 if(pktlen < LDNS_HEADER_SIZE)
1143 p += LDNS_HEADER_SIZE;
1144 remain -= LDNS_HEADER_SIZE;
1145 for(i=0; i<LDNS_QDCOUNT(pkt); i++) {
1146 lowercase_dname(&p, &remain);
1147 if(remain < 4) return;
1151 for(i=0; i<LDNS_ANCOUNT(pkt)+LDNS_NSCOUNT(pkt)+LDNS_ARCOUNT(pkt); i++) {
1152 lowercase_dname(&p, &remain);
1153 if(remain < 10) return;
1154 t = sldns_read_uint16(p);
1155 rdatalen = sldns_read_uint16(p+8);
1158 if(remain < rdatalen) return;
1159 lowercase_rdata(&p, &remain, rdatalen, t);
1163 /** match question section of packet */
1165 match_question(uint8_t* q, size_t qlen, uint8_t* p, size_t plen, int mttl)
1167 char* qstr, *pstr, *s, *qcmpstr, *pcmpstr;
1168 uint8_t* qb = q, *pb = p;
1171 qb = memdup(q, qlen);
1172 pb = memdup(p, plen);
1173 if(!qb || !pb) error("out of memory");
1178 lowercase_pkt(qb, qlen);
1179 lowercase_pkt(pb, plen);
1180 qstr = sldns_wire2str_pkt(qb, qlen);
1181 pstr = sldns_wire2str_pkt(pb, plen);
1182 if(!qstr || !pstr) error("cannot pkt2string");
1184 /* remove before ;; QUESTION */
1185 s = strstr(qstr, ";; QUESTION SECTION");
1187 s = strstr(pstr, ";; QUESTION SECTION");
1189 if(!qcmpstr && !pcmpstr) {
1196 if(!qcmpstr || !pcmpstr) {
1204 /* remove after answer section, (;; AUTH, ;; ADD, ;; MSG size ..) */
1205 s = strstr(qcmpstr, ";; ANSWER SECTION");
1206 if(!s) s = strstr(qcmpstr, ";; AUTHORITY SECTION");
1207 if(!s) s = strstr(qcmpstr, ";; ADDITIONAL SECTION");
1208 if(!s) s = strstr(qcmpstr, ";; MSG SIZE");
1210 s = strstr(pcmpstr, ";; ANSWER SECTION");
1211 if(!s) s = strstr(pcmpstr, ";; AUTHORITY SECTION");
1212 if(!s) s = strstr(pcmpstr, ";; ADDITIONAL SECTION");
1213 if(!s) s = strstr(pcmpstr, ";; MSG SIZE");
1216 r = (strcmp(qcmpstr, pcmpstr) == 0);
1219 verbose(3, "mismatch question section '%s' and '%s'",
1230 /** match answer section of packet */
1232 match_answer(uint8_t* q, size_t qlen, uint8_t* p, size_t plen, int mttl)
1234 char* qstr, *pstr, *s, *qcmpstr, *pcmpstr;
1235 uint8_t* qb = q, *pb = p;
1238 qb = memdup(q, qlen);
1239 pb = memdup(p, plen);
1240 if(!qb || !pb) error("out of memory");
1245 lowercase_pkt(qb, qlen);
1246 lowercase_pkt(pb, plen);
1247 qstr = sldns_wire2str_pkt(qb, qlen);
1248 pstr = sldns_wire2str_pkt(pb, plen);
1249 if(!qstr || !pstr) error("cannot pkt2string");
1251 /* remove before ;; ANSWER */
1252 s = strstr(qstr, ";; ANSWER SECTION");
1254 s = strstr(pstr, ";; ANSWER SECTION");
1256 if(!qcmpstr && !pcmpstr) {
1263 if(!qcmpstr || !pcmpstr) {
1271 /* remove after answer section, (;; AUTH, ;; ADD, ;; MSG size ..) */
1272 s = strstr(qcmpstr, ";; AUTHORITY SECTION");
1273 if(!s) s = strstr(qcmpstr, ";; ADDITIONAL SECTION");
1274 if(!s) s = strstr(qcmpstr, ";; MSG SIZE");
1276 s = strstr(pcmpstr, ";; AUTHORITY SECTION");
1277 if(!s) s = strstr(pcmpstr, ";; ADDITIONAL SECTION");
1278 if(!s) s = strstr(pcmpstr, ";; MSG SIZE");
1281 r = (strcmp(qcmpstr, pcmpstr) == 0);
1284 verbose(3, "mismatch answer section '%s' and '%s'",
1295 /** match all of the packet */
1297 match_all(uint8_t* q, size_t qlen, uint8_t* p, size_t plen, int mttl,
1301 uint8_t* qb = q, *pb = p;
1304 qb = memdup(q, qlen);
1305 pb = memdup(p, plen);
1306 if(!qb || !pb) error("out of memory");
1311 lowercase_pkt(qb, qlen);
1312 lowercase_pkt(pb, plen);
1313 qstr = sldns_wire2str_pkt(qb, qlen);
1314 pstr = sldns_wire2str_pkt(pb, plen);
1315 if(!qstr || !pstr) error("cannot pkt2string");
1316 r = (strcmp(qstr, pstr) == 0);
1318 /* remove ;; MSG SIZE (at end of string) */
1319 char* s = strstr(qstr, ";; MSG SIZE");
1321 s = strstr(pstr, ";; MSG SIZE");
1323 r = (strcmp(qstr, pstr) == 0);
1325 /* we are going to fail see if it is because of EDNS */
1326 char* a = strstr(qstr, "; EDNS");
1327 char* b = strstr(pstr, "; EDNS");
1328 if( (a&&!b) || (b&&!a) ) {
1329 verbose(3, "mismatch in EDNS\n");
1334 /* check for reordered sections */
1335 r = match_noloc(qstr, pstr, q, qlen, p, plen);
1338 verbose(3, "mismatch pkt '%s' and '%s'", qstr, pstr);
1347 /** see if domain names are equal */
1348 static int equal_dname(uint8_t* q, size_t qlen, uint8_t* p, size_t plen)
1350 uint8_t* qn = get_qname(q, qlen);
1351 uint8_t* pn = get_qname(p, plen);
1352 char qs[512], ps[512];
1353 size_t qslen = sizeof(qs), pslen = sizeof(ps);
1354 char* qss = qs, *pss = ps;
1358 (void)sldns_wire2str_dname_scan(&qn, &qlen, &qss, &qslen, q, qlen, &comprloop);
1359 (void)sldns_wire2str_dname_scan(&pn, &plen, &pss, &pslen, p, plen, &comprloop);
1360 return (strcmp(qs, ps) == 0);
1363 /** see if domain names are subdomain q of p */
1364 static int subdomain_dname(uint8_t* q, size_t qlen, uint8_t* p, size_t plen)
1366 /* we use the tostring routines so as to test unbound's routines
1367 * with something else */
1368 uint8_t* qn = get_qname(q, qlen);
1369 uint8_t* pn = get_qname(p, plen);
1370 char qs[5120], ps[5120];
1371 size_t qslen = sizeof(qs), pslen = sizeof(ps);
1372 char* qss = qs, *pss = ps;
1376 /* decompresses domain names */
1377 (void)sldns_wire2str_dname_scan(&qn, &qlen, &qss, &qslen, q, qlen, &comprloop);
1378 (void)sldns_wire2str_dname_scan(&pn, &plen, &pss, &pslen, p, plen, &comprloop);
1379 /* same: false, (strict subdomain check)??? */
1380 if(strcmp(qs, ps) == 0)
1382 /* qs must end in ps, at a dot, without \ in front */
1385 if(qslen > pslen && strcmp(qs + (qslen-pslen), ps) == 0 &&
1386 qslen + 2 >= pslen && /* space for label and dot */
1387 qs[qslen-pslen-1] == '.') {
1388 unsigned int slashcount = 0;
1389 size_t i = qslen-pslen-2;
1390 while(i>0 && qs[i]=='\\') {
1394 if(slashcount%1 == 1) return 0; /* . preceded by \ */
1400 /** Match OPT RDATA (not the EDNS payload size or flags) */
1402 match_ednsdata(uint8_t* q, size_t qlen, uint8_t* p, size_t plen)
1404 uint8_t* walk_q = q;
1405 size_t walk_qlen = qlen;
1406 uint8_t* walk_p = p;
1407 size_t walk_plen = plen;
1409 if(!pkt_find_edns_opt(&walk_q, &walk_qlen))
1411 if(!pkt_find_edns_opt(&walk_p, &walk_plen))
1414 /* class + ttl + rdlen = 8 */
1415 if(walk_qlen <= 8 && walk_plen <= 8) {
1416 verbose(3, "NO edns opt, move on");
1419 if(walk_qlen != walk_plen)
1422 return (memcmp(walk_p+8, walk_q+8, walk_qlen-8) == 0);
1425 /* finds entry in list, or returns NULL */
1427 find_match(struct entry* entries, uint8_t* query_pkt, size_t len,
1428 enum transport_type transport)
1430 struct entry* p = entries;
1433 for(p=entries; p; p=p->next) {
1434 verbose(3, "comparepkt: ");
1435 reply = p->reply_list->reply_pkt;
1436 rlen = p->reply_list->reply_len;
1437 if(p->match_opcode && get_opcode(query_pkt, len) !=
1438 get_opcode(reply, rlen)) {
1439 verbose(3, "bad opcode\n");
1442 if(p->match_qtype && get_qtype(query_pkt, len) !=
1443 get_qtype(reply, rlen)) {
1444 verbose(3, "bad qtype %d %d\n", get_qtype(query_pkt, len), get_qtype(reply, rlen));
1447 if(p->match_qname) {
1448 if(!equal_dname(query_pkt, len, reply, rlen)) {
1449 verbose(3, "bad qname\n");
1453 if(p->match_rcode) {
1454 if(get_rcode(query_pkt, len) != get_rcode(reply, rlen)) {
1455 char *r1 = sldns_wire2str_rcode(get_rcode(query_pkt, len));
1456 char *r2 = sldns_wire2str_rcode(get_rcode(reply, rlen));
1457 verbose(3, "bad rcode %s instead of %s\n",
1464 if(p->match_question) {
1465 if(!match_question(query_pkt, len, reply, rlen,
1466 (int)p->match_ttl)) {
1467 verbose(3, "bad question section\n");
1471 if(p->match_answer) {
1472 if(!match_answer(query_pkt, len, reply, rlen,
1473 (int)p->match_ttl)) {
1474 verbose(3, "bad answer section\n");
1478 if(p->match_subdomain) {
1479 if(!subdomain_dname(query_pkt, len, reply, rlen)) {
1480 verbose(3, "bad subdomain\n");
1484 if(p->match_serial && get_serial(query_pkt, len) != p->ixfr_soa_serial) {
1485 verbose(3, "bad serial\n");
1488 if(p->match_do && !get_do_flag(query_pkt, len)) {
1489 verbose(3, "no DO bit set\n");
1492 if(p->match_noedns && get_has_edns(query_pkt, len)) {
1493 verbose(3, "bad; EDNS OPT present\n");
1496 if(p->match_ednsdata_raw &&
1497 !match_ednsdata(query_pkt, len, reply, rlen)) {
1498 verbose(3, "bad EDNS data match.\n");
1501 if(p->match_transport != transport_any && p->match_transport != transport) {
1502 verbose(3, "bad transport\n");
1505 if(p->match_all && !match_all(query_pkt, len, reply, rlen,
1506 (int)p->match_ttl, 0)) {
1507 verbose(3, "bad allmatch\n");
1510 verbose(3, "match!\n");
1517 adjust_packet(struct entry* match, uint8_t** answer_pkt, size_t *answer_len,
1518 uint8_t* query_pkt, size_t query_len)
1520 uint8_t* orig = *answer_pkt;
1521 size_t origlen = *answer_len;
1525 /* perform the copy; if possible; must be uncompressed */
1526 if(match->copy_query && origlen >= LDNS_HEADER_SIZE &&
1527 query_len >= LDNS_HEADER_SIZE && LDNS_QDCOUNT(query_pkt)!=0
1528 && LDNS_QDCOUNT(orig)==0) {
1529 /* no qname in output packet, insert it */
1530 size_t dlen = get_qname_len(query_pkt, query_len);
1531 reslen = origlen + dlen + 4;
1532 res = (uint8_t*)malloc(reslen);
1534 verbose(1, "out of memory; send without adjust\n");
1537 /* copy the header, query, remainder */
1538 memcpy(res, orig, LDNS_HEADER_SIZE);
1539 memmove(res+LDNS_HEADER_SIZE, query_pkt+LDNS_HEADER_SIZE,
1541 memmove(res+LDNS_HEADER_SIZE+dlen+4, orig+LDNS_HEADER_SIZE,
1542 reslen-(LDNS_HEADER_SIZE+dlen+4));
1544 sldns_write_uint16(res+4, 1);
1545 } else if(match->copy_query && origlen >= LDNS_HEADER_SIZE &&
1546 query_len >= LDNS_HEADER_SIZE && LDNS_QDCOUNT(query_pkt)!=0
1547 && get_qname_len(orig, origlen) == 0) {
1548 /* QDCOUNT(orig)!=0 but qlen == 0, therefore, an error */
1549 verbose(1, "error: malformed qname; send without adjust\n");
1550 res = memdup(orig, origlen);
1552 } else if(match->copy_query && origlen >= LDNS_HEADER_SIZE &&
1553 query_len >= LDNS_HEADER_SIZE && LDNS_QDCOUNT(query_pkt)!=0
1554 && LDNS_QDCOUNT(orig)!=0) {
1555 /* in this case olen != 0 and QDCOUNT(orig)!=0 */
1556 /* copy query section */
1557 size_t dlen = get_qname_len(query_pkt, query_len);
1558 size_t olen = get_qname_len(orig, origlen);
1559 reslen = origlen + dlen - olen;
1560 res = (uint8_t*)malloc(reslen);
1562 verbose(1, "out of memory; send without adjust\n");
1565 /* copy the header, query, remainder */
1566 memcpy(res, orig, LDNS_HEADER_SIZE);
1567 memmove(res+LDNS_HEADER_SIZE, query_pkt+LDNS_HEADER_SIZE,
1569 memmove(res+LDNS_HEADER_SIZE+dlen+4,
1570 orig+LDNS_HEADER_SIZE+olen+4,
1571 reslen-(LDNS_HEADER_SIZE+dlen+4));
1573 res = memdup(orig, origlen);
1577 verbose(1, "out of memory; send without adjust\n");
1581 if(match->copy_id && reslen >= 2 && query_len >= 2)
1582 res[1] = query_pkt[1];
1583 if(match->copy_id && reslen >= 1 && query_len >= 1)
1584 res[0] = query_pkt[0];
1586 if(match->copy_ednsdata_assume_clientsubnet) {
1587 /** Assume there is only one EDNS option, which is ECS.
1588 * Copy source mask from query to scope mask in reply. Assume
1589 * rest of ECS data in response (eg address) matches the query.
1591 uint8_t* walk_q = orig;
1592 size_t walk_qlen = origlen;
1593 uint8_t* walk_p = res;
1594 size_t walk_plen = reslen;
1596 if(!pkt_find_edns_opt(&walk_q, &walk_qlen)) {
1599 if(!pkt_find_edns_opt(&walk_p, &walk_plen)) {
1602 /* class + ttl + rdlen + optcode + optlen + ecs fam + ecs source
1603 * + ecs scope = index 15 */
1604 if(walk_qlen >= 15 && walk_plen >= 15) {
1605 walk_p[15] = walk_q[14];
1607 if(match->increment_ecs_scope) {
1612 if(match->sleeptime > 0) {
1613 verbose(3, "sleeping for %d seconds\n", match->sleeptime);
1615 sleep(match->sleeptime);
1617 Sleep(match->sleeptime * 1000);
1621 *answer_len = reslen;
1625 * Parses data buffer to a query, finds the correct answer
1626 * and calls the given function for every packet to send.
1629 handle_query(uint8_t* inbuf, ssize_t inlen, struct entry* entries, int* count,
1630 enum transport_type transport, void (*sendfunc)(uint8_t*, size_t, void*),
1631 void* userdata, FILE* verbose_out)
1633 struct reply_packet *p;
1634 uint8_t *outbuf = NULL;
1636 struct entry* entry = NULL;
1638 verbose(1, "query %d: id %d: %s %d bytes: ", ++(*count),
1639 (int)(inlen>=2?LDNS_ID_WIRE(inbuf):0),
1640 (transport==transport_tcp)?"TCP":"UDP", (int)inlen);
1642 char* out = sldns_wire2str_pkt(inbuf, (size_t)inlen);
1643 printf("%s\n", out);
1647 /* fill up answer packet */
1648 entry = find_match(entries, inbuf, (size_t)inlen, transport);
1649 if(!entry || !entry->reply_list) {
1650 verbose(1, "no answer packet for this query, no reply.\n");
1653 for(p = entry->reply_list; p; p = p->next)
1655 verbose(3, "Answer pkt:\n");
1656 if (p->reply_from_hex) {
1657 /* try to adjust the hex packet, if it can be
1658 * parsed, we can use adjust rules. if not,
1659 * send packet literally */
1660 /* still try to adjust ID if others fail */
1661 outlen = sldns_buffer_limit(p->reply_from_hex);
1662 outbuf = sldns_buffer_begin(p->reply_from_hex);
1664 outbuf = p->reply_pkt;
1665 outlen = p->reply_len;
1668 verbose(1, "out of memory\n");
1671 /* copies outbuf in memory allocation */
1672 adjust_packet(entry, &outbuf, &outlen, inbuf, (size_t)inlen);
1673 verbose(1, "Answer packet size: %u bytes.\n", (unsigned int)outlen);
1675 char* out = sldns_wire2str_pkt(outbuf, outlen);
1676 printf("%s\n", out);
1679 if(p->packet_sleep) {
1680 verbose(3, "sleeping for next packet %d secs\n",
1683 sleep(p->packet_sleep);
1685 Sleep(p->packet_sleep * 1000);
1687 verbose(3, "wakeup for next packet "
1688 "(slept %d secs)\n", p->packet_sleep);
1690 sendfunc(outbuf, outlen, userdata);
1697 /** delete the list of reply packets */
1698 void delete_replylist(struct reply_packet* replist)
1700 struct reply_packet *p=replist, *np;
1704 sldns_buffer_free(p->reply_from_hex);
1705 sldns_buffer_free(p->raw_ednsdata);
1711 void delete_entry(struct entry* list)
1713 struct entry *p=list, *np;
1716 delete_replylist(p->reply_list);