2 * util/data/msgreply.c - store message and reply data.
4 * Copyright (c) 2007, NLnet Labs. All rights reserved.
6 * This software is open source.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
15 * Redistributions in binary form must reproduce the above copyright notice,
16 * this list of conditions and the following disclaimer in the documentation
17 * and/or other materials provided with the distribution.
19 * Neither the name of the NLNET LABS nor the names of its contributors may
20 * be used to endorse or promote products derived from this software without
21 * specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
39 * This file contains a data structure to store a message and its reply.
43 #include "util/data/msgreply.h"
44 #include "util/storage/lookup3.h"
46 #include "util/alloc.h"
47 #include "util/netevent.h"
48 #include "util/net_help.h"
49 #include "util/data/dname.h"
50 #include "util/regional.h"
51 #include "util/data/msgparse.h"
52 #include "util/data/msgencode.h"
53 #include "sldns/sbuffer.h"
54 #include "sldns/wire2str.h"
56 /** MAX TTL default for messages and rrsets */
57 time_t MAX_TTL = 3600 * 24 * 10; /* ten days */
58 /** MIN TTL default for messages and rrsets */
60 /** MAX Negative TTL, for SOA records in authority section */
61 time_t MAX_NEG_TTL = 3600; /* one hour */
63 /** allocate qinfo, return 0 on error */
65 parse_create_qinfo(sldns_buffer* pkt, struct msg_parse* msg,
66 struct query_info* qinf, struct regional* region)
70 qinf->qname = (uint8_t*)regional_alloc(region,
72 else qinf->qname = (uint8_t*)malloc(msg->qname_len);
73 if(!qinf->qname) return 0;
74 dname_pkt_copy(pkt, qinf->qname, msg->qname);
75 } else qinf->qname = 0;
76 qinf->qname_len = msg->qname_len;
77 qinf->qtype = msg->qtype;
78 qinf->qclass = msg->qclass;
82 /** constructor for replyinfo */
84 construct_reply_info_base(struct regional* region, uint16_t flags, size_t qd,
85 time_t ttl, time_t prettl, size_t an, size_t ns, size_t ar,
86 size_t total, enum sec_status sec)
88 struct reply_info* rep;
89 /* rrset_count-1 because the first ref is part of the struct. */
90 size_t s = sizeof(struct reply_info) - sizeof(struct rrset_ref) +
91 sizeof(struct ub_packed_rrset_key*) * total;
92 if(total >= RR_COUNT_MAX) return NULL; /* sanity check on numRRS*/
94 rep = (struct reply_info*)regional_alloc(region, s);
95 else rep = (struct reply_info*)malloc(s +
96 sizeof(struct rrset_ref) * (total));
102 rep->prefetch_ttl = prettl;
103 rep->an_numrrsets = an;
104 rep->ns_numrrsets = ns;
105 rep->ar_numrrsets = ar;
106 rep->rrset_count = total;
108 rep->authoritative = 0;
109 /* array starts after the refs */
111 rep->rrsets = (struct ub_packed_rrset_key**)&(rep->ref[0]);
112 else rep->rrsets = (struct ub_packed_rrset_key**)&(rep->ref[total]);
113 /* zero the arrays to assist cleanup in case of malloc failure */
114 memset( rep->rrsets, 0, sizeof(struct ub_packed_rrset_key*) * total);
116 memset( &rep->ref[0], 0, sizeof(struct rrset_ref) * total);
120 /** allocate replyinfo, return 0 on error */
122 parse_create_repinfo(struct msg_parse* msg, struct reply_info** rep,
123 struct regional* region)
125 *rep = construct_reply_info_base(region, msg->flags, msg->qdcount, 0,
126 0, msg->an_rrsets, msg->ns_rrsets, msg->ar_rrsets,
127 msg->rrset_count, sec_status_unchecked);
133 /** allocate (special) rrset keys, return 0 on error */
135 repinfo_alloc_rrset_keys(struct reply_info* rep, struct alloc_cache* alloc,
136 struct regional* region)
139 for(i=0; i<rep->rrset_count; i++) {
141 rep->rrsets[i] = (struct ub_packed_rrset_key*)
142 regional_alloc(region,
143 sizeof(struct ub_packed_rrset_key));
145 memset(rep->rrsets[i], 0,
146 sizeof(struct ub_packed_rrset_key));
147 rep->rrsets[i]->entry.key = rep->rrsets[i];
150 else rep->rrsets[i] = alloc_special_obtain(alloc);
153 rep->rrsets[i]->entry.data = NULL;
158 /** find the minimumttl in the rdata of SOA record */
160 soa_find_minttl(struct rr_parse* rr)
162 uint16_t rlen = sldns_read_uint16(rr->ttl_data+4);
164 return 0; /* rdata too small for SOA (dname, dname, 5*32bit) */
165 /* minimum TTL is the last 32bit value in the rdata of the record */
166 /* at position ttl_data + 4(ttl) + 2(rdatalen) + rdatalen - 4(timeval)*/
167 return (time_t)sldns_read_uint32(rr->ttl_data+6+rlen-4);
170 /** do the rdata copy */
172 rdata_copy(sldns_buffer* pkt, struct packed_rrset_data* data, uint8_t* to,
173 struct rr_parse* rr, time_t* rr_ttl, uint16_t type,
174 sldns_pkt_section section)
177 const sldns_rr_descriptor* desc;
179 *rr_ttl = sldns_read_uint32(rr->ttl_data);
180 /* RFC 2181 Section 8. if msb of ttl is set treat as if zero. */
181 if(*rr_ttl & 0x80000000U)
183 if(type == LDNS_RR_TYPE_SOA && section == LDNS_SECTION_AUTHORITY) {
184 /* negative response. see if TTL of SOA record larger than the
185 * minimum-ttl in the rdata of the SOA record */
186 if(*rr_ttl > soa_find_minttl(rr))
187 *rr_ttl = soa_find_minttl(rr);
188 if(*rr_ttl > MAX_NEG_TTL)
189 *rr_ttl = MAX_NEG_TTL;
191 if(*rr_ttl < MIN_TTL)
193 if(*rr_ttl < data->ttl)
196 if(rr->outside_packet) {
197 /* uncompressed already, only needs copy */
198 memmove(to, rr->ttl_data+sizeof(uint32_t), rr->size);
202 sldns_buffer_set_position(pkt, (size_t)
203 (rr->ttl_data - sldns_buffer_begin(pkt) + sizeof(uint32_t)));
204 /* insert decompressed size into rdata len stored in memory */
205 /* -2 because rdatalen bytes are not included. */
206 pkt_len = htons(rr->size - 2);
207 memmove(to, &pkt_len, sizeof(uint16_t));
209 /* read packet rdata len */
210 pkt_len = sldns_buffer_read_u16(pkt);
211 if(sldns_buffer_remaining(pkt) < pkt_len)
213 desc = sldns_rr_descript(type);
214 if(pkt_len > 0 && desc && desc->_dname_count > 0) {
215 int count = (int)desc->_dname_count;
219 /* decompress dnames. */
220 while(pkt_len > 0 && count) {
221 switch(desc->_wireformat[rdf]) {
222 case LDNS_RDF_TYPE_DNAME:
223 oldpos = sldns_buffer_position(pkt);
224 dname_pkt_copy(pkt, to,
225 sldns_buffer_current(pkt));
226 to += pkt_dname_len(pkt);
227 pkt_len -= sldns_buffer_position(pkt)-oldpos;
231 case LDNS_RDF_TYPE_STR:
232 len = sldns_buffer_current(pkt)[0] + 1;
235 len = get_rdf_size(desc->_wireformat[rdf]);
239 memmove(to, sldns_buffer_current(pkt), len);
241 sldns_buffer_skip(pkt, (ssize_t)len);
242 log_assert(len <= pkt_len);
248 /* copy remaining rdata */
250 memmove(to, sldns_buffer_current(pkt), pkt_len);
255 /** copy over the data into packed rrset */
257 parse_rr_copy(sldns_buffer* pkt, struct rrset_parse* pset,
258 struct packed_rrset_data* data)
261 struct rr_parse* rr = pset->rr_first;
263 size_t total = pset->rr_count + pset->rrsig_count;
265 data->count = pset->rr_count;
266 data->rrsig_count = pset->rrsig_count;
267 data->trust = rrset_trust_none;
268 data->security = sec_status_unchecked;
269 /* layout: struct - rr_len - rr_data - rr_ttl - rdata - rrsig */
270 data->rr_len = (size_t*)((uint8_t*)data +
271 sizeof(struct packed_rrset_data));
272 data->rr_data = (uint8_t**)&(data->rr_len[total]);
273 data->rr_ttl = (time_t*)&(data->rr_data[total]);
274 nextrdata = (uint8_t*)&(data->rr_ttl[total]);
275 for(i=0; i<data->count; i++) {
276 data->rr_len[i] = rr->size;
277 data->rr_data[i] = nextrdata;
278 nextrdata += rr->size;
279 if(!rdata_copy(pkt, data, data->rr_data[i], rr,
280 &data->rr_ttl[i], pset->type, pset->section))
284 /* if rrsig, its rdata is at nextrdata */
285 rr = pset->rrsig_first;
286 for(i=data->count; i<total; i++) {
287 data->rr_len[i] = rr->size;
288 data->rr_data[i] = nextrdata;
289 nextrdata += rr->size;
290 if(!rdata_copy(pkt, data, data->rr_data[i], rr,
291 &data->rr_ttl[i], LDNS_RR_TYPE_RRSIG, pset->section))
298 /** create rrset return 0 on failure */
300 parse_create_rrset(sldns_buffer* pkt, struct rrset_parse* pset,
301 struct packed_rrset_data** data, struct regional* region)
305 if(pset->rr_count > RR_COUNT_MAX || pset->rrsig_count > RR_COUNT_MAX ||
306 pset->size > RR_COUNT_MAX)
307 return 0; /* protect against integer overflow */
308 s = sizeof(struct packed_rrset_data) +
309 (pset->rr_count + pset->rrsig_count) *
310 (sizeof(size_t)+sizeof(uint8_t*)+sizeof(time_t)) +
313 *data = regional_alloc(region, s);
314 else *data = malloc(s);
317 /* copy & decompress */
318 if(!parse_rr_copy(pkt, pset, *data)) {
319 if(!region) free(*data);
325 /** get trust value for rrset */
326 static enum rrset_trust
327 get_rrset_trust(struct msg_parse* msg, struct rrset_parse* rrset)
329 uint16_t AA = msg->flags & BIT_AA;
330 if(rrset->section == LDNS_SECTION_ANSWER) {
332 /* RFC2181 says remainder of CNAME chain is nonauth*/
333 if(msg->rrset_first &&
334 msg->rrset_first->section==LDNS_SECTION_ANSWER
335 && msg->rrset_first->type==LDNS_RR_TYPE_CNAME){
336 if(rrset == msg->rrset_first)
337 return rrset_trust_ans_AA;
338 else return rrset_trust_ans_noAA;
340 if(msg->rrset_first &&
341 msg->rrset_first->section==LDNS_SECTION_ANSWER
342 && msg->rrset_first->type==LDNS_RR_TYPE_DNAME){
343 if(rrset == msg->rrset_first ||
344 rrset == msg->rrset_first->rrset_all_next)
345 return rrset_trust_ans_AA;
346 else return rrset_trust_ans_noAA;
348 return rrset_trust_ans_AA;
350 else return rrset_trust_ans_noAA;
351 } else if(rrset->section == LDNS_SECTION_AUTHORITY) {
352 if(AA) return rrset_trust_auth_AA;
353 else return rrset_trust_auth_noAA;
356 if(AA) return rrset_trust_add_AA;
357 else return rrset_trust_add_noAA;
360 return rrset_trust_none;
364 parse_copy_decompress_rrset(sldns_buffer* pkt, struct msg_parse* msg,
365 struct rrset_parse *pset, struct regional* region,
366 struct ub_packed_rrset_key* pk)
368 struct packed_rrset_data* data;
369 pk->rk.flags = pset->flags;
370 pk->rk.dname_len = pset->dname_len;
372 pk->rk.dname = (uint8_t*)regional_alloc(
373 region, pset->dname_len);
375 (uint8_t*)malloc(pset->dname_len);
378 /** copy & decompress dname */
379 dname_pkt_copy(pkt, pk->rk.dname, pset->dname);
380 /** copy over type and class */
381 pk->rk.type = htons(pset->type);
382 pk->rk.rrset_class = pset->rrset_class;
383 /** read data part. */
384 if(!parse_create_rrset(pkt, pset, &data, region))
386 pk->entry.data = (void*)data;
387 pk->entry.key = (void*)pk;
388 pk->entry.hash = pset->hash;
389 data->trust = get_rrset_trust(msg, pset);
394 * Copy and decompress rrs
395 * @param pkt: the packet for compression pointer resolution.
396 * @param msg: the parsed message
397 * @param rep: reply info to put rrs into.
398 * @param region: if not NULL, used for allocation.
399 * @return 0 on failure.
402 parse_copy_decompress(sldns_buffer* pkt, struct msg_parse* msg,
403 struct reply_info* rep, struct regional* region)
406 struct rrset_parse *pset = msg->rrset_first;
407 struct packed_rrset_data* data;
410 rep->security = sec_status_unchecked;
411 if(rep->rrset_count == 0)
414 for(i=0; i<rep->rrset_count; i++) {
415 if(!parse_copy_decompress_rrset(pkt, msg, pset, region,
418 data = (struct packed_rrset_data*)rep->rrsets[i]->entry.data;
419 if(data->ttl < rep->ttl)
420 rep->ttl = data->ttl;
422 pset = pset->rrset_all_next;
424 rep->prefetch_ttl = PREFETCH_TTL_CALC(rep->ttl);
429 parse_create_msg(sldns_buffer* pkt, struct msg_parse* msg,
430 struct alloc_cache* alloc, struct query_info* qinf,
431 struct reply_info** rep, struct regional* region)
433 log_assert(pkt && msg);
434 if(!parse_create_qinfo(pkt, msg, qinf, region))
436 if(!parse_create_repinfo(msg, rep, region))
438 if(!repinfo_alloc_rrset_keys(*rep, alloc, region))
440 if(!parse_copy_decompress(pkt, msg, *rep, region))
445 int reply_info_parse(sldns_buffer* pkt, struct alloc_cache* alloc,
446 struct query_info* qinf, struct reply_info** rep,
447 struct regional* region, struct edns_data* edns)
449 /* use scratch pad region-allocator during parsing. */
450 struct msg_parse* msg;
455 if(!(msg = regional_alloc(region, sizeof(*msg)))) {
456 return LDNS_RCODE_SERVFAIL;
458 memset(msg, 0, sizeof(*msg));
460 sldns_buffer_set_position(pkt, 0);
461 if((ret = parse_packet(pkt, msg, region)) != 0) {
464 if((ret = parse_extract_edns(msg, edns)) != 0)
467 /* parse OK, allocate return structures */
468 /* this also performs dname decompression */
469 if(!parse_create_msg(pkt, msg, alloc, qinf, rep, NULL)) {
470 query_info_clear(qinf);
471 reply_info_parsedelete(*rep, alloc);
473 return LDNS_RCODE_SERVFAIL;
478 /** helper compare function to sort in lock order */
480 reply_info_sortref_cmp(const void* a, const void* b)
482 struct rrset_ref* x = (struct rrset_ref*)a;
483 struct rrset_ref* y = (struct rrset_ref*)b;
484 if(x->key < y->key) return -1;
485 if(x->key > y->key) return 1;
490 reply_info_sortref(struct reply_info* rep)
492 qsort(&rep->ref[0], rep->rrset_count, sizeof(struct rrset_ref),
493 reply_info_sortref_cmp);
497 reply_info_set_ttls(struct reply_info* rep, time_t timenow)
501 rep->prefetch_ttl += timenow;
502 for(i=0; i<rep->rrset_count; i++) {
503 struct packed_rrset_data* data = (struct packed_rrset_data*)
504 rep->ref[i].key->entry.data;
505 if(i>0 && rep->ref[i].key == rep->ref[i-1].key)
507 data->ttl += timenow;
508 for(j=0; j<data->count + data->rrsig_count; j++) {
509 data->rr_ttl[j] += timenow;
515 reply_info_parsedelete(struct reply_info* rep, struct alloc_cache* alloc)
520 /* no need to lock, since not shared in hashtables. */
521 for(i=0; i<rep->rrset_count; i++) {
522 ub_packed_rrset_parsedelete(rep->rrsets[i], alloc);
528 query_info_parse(struct query_info* m, sldns_buffer* query)
530 uint8_t* q = sldns_buffer_begin(query);
531 /* minimum size: header + \0 + qtype + qclass */
532 if(sldns_buffer_limit(query) < LDNS_HEADER_SIZE + 5)
534 if(LDNS_OPCODE_WIRE(q) != LDNS_PACKET_QUERY ||
535 LDNS_QDCOUNT(q) != 1 || sldns_buffer_position(query) != 0)
537 sldns_buffer_skip(query, LDNS_HEADER_SIZE);
538 m->qname = sldns_buffer_current(query);
539 if((m->qname_len = query_dname_len(query)) == 0)
540 return 0; /* parse error */
541 if(sldns_buffer_remaining(query) < 4)
542 return 0; /* need qtype, qclass */
543 m->qtype = sldns_buffer_read_u16(query);
544 m->qclass = sldns_buffer_read_u16(query);
548 /** tiny subroutine for msgreply_compare */
549 #define COMPARE_IT(x, y) \
550 if( (x) < (y) ) return -1; \
551 else if( (x) > (y) ) return +1; \
552 log_assert( (x) == (y) );
555 query_info_compare(void* m1, void* m2)
557 struct query_info* msg1 = (struct query_info*)m1;
558 struct query_info* msg2 = (struct query_info*)m2;
560 /* from most different to least different for speed */
561 COMPARE_IT(msg1->qtype, msg2->qtype);
562 if((mc = query_dname_compare(msg1->qname, msg2->qname)) != 0)
564 log_assert(msg1->qname_len == msg2->qname_len);
565 COMPARE_IT(msg1->qclass, msg2->qclass);
571 query_info_clear(struct query_info* m)
578 msgreply_sizefunc(void* k, void* d)
580 struct msgreply_entry* q = (struct msgreply_entry*)k;
581 struct reply_info* r = (struct reply_info*)d;
582 size_t s = sizeof(struct msgreply_entry) + sizeof(struct reply_info)
583 + q->key.qname_len + lock_get_mem(&q->entry.lock)
584 - sizeof(struct rrset_ref);
585 s += r->rrset_count * sizeof(struct rrset_ref);
586 s += r->rrset_count * sizeof(struct ub_packed_rrset_key*);
591 query_entry_delete(void *k, void* ATTR_UNUSED(arg))
593 struct msgreply_entry* q = (struct msgreply_entry*)k;
594 lock_rw_destroy(&q->entry.lock);
595 query_info_clear(&q->key);
600 reply_info_delete(void* d, void* ATTR_UNUSED(arg))
602 struct reply_info* r = (struct reply_info*)d;
607 query_info_hash(struct query_info *q, uint16_t flags)
609 hashvalue_t h = 0xab;
610 h = hashlittle(&q->qtype, sizeof(q->qtype), h);
611 if(q->qtype == LDNS_RR_TYPE_AAAA && (flags&BIT_CD))
613 h = hashlittle(&q->qclass, sizeof(q->qclass), h);
614 h = dname_query_hash(q->qname, h);
618 struct msgreply_entry*
619 query_info_entrysetup(struct query_info* q, struct reply_info* r,
622 struct msgreply_entry* e = (struct msgreply_entry*)malloc(
623 sizeof(struct msgreply_entry));
625 memcpy(&e->key, q, sizeof(*q));
629 lock_rw_init(&e->entry.lock);
630 lock_protect(&e->entry.lock, &e->key, sizeof(e->key));
631 lock_protect(&e->entry.lock, &e->entry.hash, sizeof(e->entry.hash) +
632 sizeof(e->entry.key) + sizeof(e->entry.data));
633 lock_protect(&e->entry.lock, e->key.qname, e->key.qname_len);
638 /** copy rrsets from replyinfo to dest replyinfo */
640 repinfo_copy_rrsets(struct reply_info* dest, struct reply_info* from,
641 struct regional* region)
644 struct packed_rrset_data* fd, *dd;
645 struct ub_packed_rrset_key* fk, *dk;
646 for(i=0; i<dest->rrset_count; i++) {
647 fk = from->rrsets[i];
648 dk = dest->rrsets[i];
649 fd = (struct packed_rrset_data*)fk->entry.data;
650 dk->entry.hash = fk->entry.hash;
654 dk->rk.dname = (uint8_t*)regional_alloc_init(region,
655 fk->rk.dname, fk->rk.dname_len);
657 dk->rk.dname = (uint8_t*)memdup(fk->rk.dname,
661 s = packed_rrset_sizeof(fd);
663 dd = (struct packed_rrset_data*)regional_alloc_init(
665 else dd = (struct packed_rrset_data*)memdup(fd, s);
668 packed_rrset_ptr_fixup(dd);
669 dk->entry.data = (void*)dd;
675 reply_info_copy(struct reply_info* rep, struct alloc_cache* alloc,
676 struct regional* region)
678 struct reply_info* cp;
679 cp = construct_reply_info_base(region, rep->flags, rep->qdcount,
680 rep->ttl, rep->prefetch_ttl, rep->an_numrrsets,
681 rep->ns_numrrsets, rep->ar_numrrsets, rep->rrset_count,
685 /* allocate ub_key structures special or not */
686 if(!repinfo_alloc_rrset_keys(cp, alloc, region)) {
688 reply_info_parsedelete(cp, alloc);
691 if(!repinfo_copy_rrsets(cp, rep, region)) {
693 reply_info_parsedelete(cp, alloc);
700 reply_find_final_cname_target(struct query_info* qinfo, struct reply_info* rep)
702 uint8_t* sname = qinfo->qname;
703 size_t snamelen = qinfo->qname_len;
705 for(i=0; i<rep->an_numrrsets; i++) {
706 struct ub_packed_rrset_key* s = rep->rrsets[i];
707 /* follow CNAME chain (if any) */
708 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME &&
709 ntohs(s->rk.rrset_class) == qinfo->qclass &&
710 snamelen == s->rk.dname_len &&
711 query_dname_compare(sname, s->rk.dname) == 0) {
712 get_cname_target(s, &sname, &snamelen);
715 if(sname != qinfo->qname)
720 struct ub_packed_rrset_key*
721 reply_find_answer_rrset(struct query_info* qinfo, struct reply_info* rep)
723 uint8_t* sname = qinfo->qname;
724 size_t snamelen = qinfo->qname_len;
726 for(i=0; i<rep->an_numrrsets; i++) {
727 struct ub_packed_rrset_key* s = rep->rrsets[i];
728 /* first match type, for query of qtype cname */
729 if(ntohs(s->rk.type) == qinfo->qtype &&
730 ntohs(s->rk.rrset_class) == qinfo->qclass &&
731 snamelen == s->rk.dname_len &&
732 query_dname_compare(sname, s->rk.dname) == 0) {
735 /* follow CNAME chain (if any) */
736 if(ntohs(s->rk.type) == LDNS_RR_TYPE_CNAME &&
737 ntohs(s->rk.rrset_class) == qinfo->qclass &&
738 snamelen == s->rk.dname_len &&
739 query_dname_compare(sname, s->rk.dname) == 0) {
740 get_cname_target(s, &sname, &snamelen);
746 struct ub_packed_rrset_key* reply_find_rrset_section_an(struct reply_info* rep,
747 uint8_t* name, size_t namelen, uint16_t type, uint16_t dclass)
750 for(i=0; i<rep->an_numrrsets; i++) {
751 struct ub_packed_rrset_key* s = rep->rrsets[i];
752 if(ntohs(s->rk.type) == type &&
753 ntohs(s->rk.rrset_class) == dclass &&
754 namelen == s->rk.dname_len &&
755 query_dname_compare(name, s->rk.dname) == 0) {
762 struct ub_packed_rrset_key* reply_find_rrset_section_ns(struct reply_info* rep,
763 uint8_t* name, size_t namelen, uint16_t type, uint16_t dclass)
766 for(i=rep->an_numrrsets; i<rep->an_numrrsets+rep->ns_numrrsets; i++) {
767 struct ub_packed_rrset_key* s = rep->rrsets[i];
768 if(ntohs(s->rk.type) == type &&
769 ntohs(s->rk.rrset_class) == dclass &&
770 namelen == s->rk.dname_len &&
771 query_dname_compare(name, s->rk.dname) == 0) {
778 struct ub_packed_rrset_key* reply_find_rrset(struct reply_info* rep,
779 uint8_t* name, size_t namelen, uint16_t type, uint16_t dclass)
782 for(i=0; i<rep->rrset_count; i++) {
783 struct ub_packed_rrset_key* s = rep->rrsets[i];
784 if(ntohs(s->rk.type) == type &&
785 ntohs(s->rk.rrset_class) == dclass &&
786 namelen == s->rk.dname_len &&
787 query_dname_compare(name, s->rk.dname) == 0) {
795 log_dns_msg(const char* str, struct query_info* qinfo, struct reply_info* rep)
797 /* not particularly fast but flexible, make wireformat and print */
798 sldns_buffer* buf = sldns_buffer_new(65535);
799 struct regional* region = regional_create();
800 if(!reply_info_encode(qinfo, rep, 0, rep->flags, buf, 0,
802 log_info("%s: log_dns_msg: out of memory", str);
804 char* s = sldns_wire2str_pkt(sldns_buffer_begin(buf),
805 sldns_buffer_limit(buf));
807 log_info("%s: log_dns_msg: ldns tostr failed", str);
809 log_info("%s %s", str, s);
813 sldns_buffer_free(buf);
814 regional_destroy(region);
818 log_query_info(enum verbosity_value v, const char* str,
819 struct query_info* qinf)
821 log_nametypeclass(v, str, qinf->qname, qinf->qtype, qinf->qclass);
825 reply_check_cname_chain(struct query_info* qinfo, struct reply_info* rep)
827 /* check only answer section rrs for matching cname chain.
828 * the cache may return changed rdata, but owner names are untouched.*/
830 uint8_t* sname = qinfo->qname;
831 size_t snamelen = qinfo->qname_len;
832 for(i=0; i<rep->an_numrrsets; i++) {
833 uint16_t t = ntohs(rep->rrsets[i]->rk.type);
834 if(t == LDNS_RR_TYPE_DNAME)
835 continue; /* skip dnames; note TTL 0 not cached */
836 /* verify that owner matches current sname */
837 if(query_dname_compare(sname, rep->rrsets[i]->rk.dname) != 0){
838 /* cname chain broken */
841 /* if this is a cname; move on */
842 if(t == LDNS_RR_TYPE_CNAME) {
843 get_cname_target(rep->rrsets[i], &sname, &snamelen);
850 reply_all_rrsets_secure(struct reply_info* rep)
853 for(i=0; i<rep->rrset_count; i++) {
854 if( ((struct packed_rrset_data*)rep->rrsets[i]->entry.data)
855 ->security != sec_status_secure )