Compare commits
4 Commits
data_drive
...
d491ea12a5
Author | SHA1 | Date | |
---|---|---|---|
d491ea12a5 | |||
d0e4bea3e8 | |||
46629d2aad | |||
ce12fddbe9 |
263
src/proto.rs
263
src/proto.rs
@ -140,10 +140,10 @@ pub struct DNSHeader {
|
|||||||
pub recursion_desired: bool,
|
pub recursion_desired: bool,
|
||||||
/// denotes whether recursive query support is available in the name server
|
/// denotes whether recursive query support is available in the name server
|
||||||
pub recursion_available: bool,
|
pub recursion_available: bool,
|
||||||
/// TODO: add documuentation about this flag
|
// no support of rfc4035 at the moment
|
||||||
pub authentic_data: bool,
|
//pub authentic_data: bool,
|
||||||
/// TODO: add documuentation about this flag
|
// no support of rfc4035 at the moment
|
||||||
pub checking_disabled: bool,
|
//pub checking_disabled: bool,
|
||||||
pub response_code: DNSRCode,
|
pub response_code: DNSRCode,
|
||||||
/// TODO: add documuentation about this count
|
/// TODO: add documuentation about this count
|
||||||
pub query_count: u16,
|
pub query_count: u16,
|
||||||
@ -171,8 +171,9 @@ impl DNSHeader {
|
|||||||
const RD_MASK: u8 = 0b00000001;
|
const RD_MASK: u8 = 0b00000001;
|
||||||
|
|
||||||
const RA_MASK: u8 = 0b10000000;
|
const RA_MASK: u8 = 0b10000000;
|
||||||
const AD_MASK: u8 = 0b00100000;
|
// no support of rfc4035 at the moment
|
||||||
const CD_MASK: u8 = 0b00010000;
|
//const AD_MASK: u8 = 0b00100000;
|
||||||
|
//const CD_MASK: u8 = 0b00010000;
|
||||||
const RCODE_MASK: u8 = 0b00001111;
|
const RCODE_MASK: u8 = 0b00001111;
|
||||||
|
|
||||||
const OPCODE_OFFSET: u8 = 3;
|
const OPCODE_OFFSET: u8 = 3;
|
||||||
@ -186,15 +187,17 @@ impl DNSHeader {
|
|||||||
|
|
||||||
let message_type = DNSMessageType::from(datagram[2] & Self::QR_MASK != 0);
|
let message_type = DNSMessageType::from(datagram[2] & Self::QR_MASK != 0);
|
||||||
let opcode = DNSOpCode::try_from((datagram[2] & Self::OPCODE_MASK) >> Self::OPCODE_OFFSET)?;
|
let opcode = DNSOpCode::try_from((datagram[2] & Self::OPCODE_MASK) >> Self::OPCODE_OFFSET)?;
|
||||||
|
|
||||||
let authorative_answer = (datagram[2] & Self::AA_MASK) != 0;
|
let authorative_answer = (datagram[2] & Self::AA_MASK) != 0;
|
||||||
let truncated = (datagram[2] & Self::TC_MASK) != 0;
|
let truncated = (datagram[2] & Self::TC_MASK) != 0;
|
||||||
let recursion_desired = (datagram[2] & Self::RD_MASK) != 0;
|
let recursion_desired = (datagram[2] & Self::RD_MASK) != 0;
|
||||||
|
let recursion_available = (datagram[3] & Self::RA_MASK) != 0;
|
||||||
|
|
||||||
|
// no support for rfc4035 at the moment
|
||||||
|
//let authentic_data = (datagram[2] & Self::AD_MASK) != 0;
|
||||||
|
//let checking_disabled = (datagram[2] & Self::CD_MASK) != 0;
|
||||||
|
|
||||||
let recursion_available = (datagram[2] & Self::RA_MASK) != 0;
|
|
||||||
let authentic_data = (datagram[2] & Self::AD_MASK) != 0;
|
|
||||||
let checking_disabled = (datagram[2] & Self::CD_MASK) != 0;
|
|
||||||
let response_code = DNSRCode::try_from(datagram[3] & Self::RCODE_MASK)?;
|
let response_code = DNSRCode::try_from(datagram[3] & Self::RCODE_MASK)?;
|
||||||
|
|
||||||
let query_count = u16::from_be_bytes((datagram[4..6]).try_into().unwrap());
|
let query_count = u16::from_be_bytes((datagram[4..6]).try_into().unwrap());
|
||||||
let answer_count = u16::from_be_bytes((datagram[6..8]).try_into().unwrap());
|
let answer_count = u16::from_be_bytes((datagram[6..8]).try_into().unwrap());
|
||||||
let name_server_count = u16::from_be_bytes((datagram[8..10]).try_into().unwrap());
|
let name_server_count = u16::from_be_bytes((datagram[8..10]).try_into().unwrap());
|
||||||
@ -208,8 +211,8 @@ impl DNSHeader {
|
|||||||
truncated,
|
truncated,
|
||||||
recursion_desired,
|
recursion_desired,
|
||||||
recursion_available,
|
recursion_available,
|
||||||
authentic_data,
|
//authentic_data, // no support of rfc4035 at the moment
|
||||||
checking_disabled,
|
//checking_disabled, // no support of rfc4035 at the moment
|
||||||
response_code,
|
response_code,
|
||||||
query_count,
|
query_count,
|
||||||
answer_count,
|
answer_count,
|
||||||
@ -329,7 +332,7 @@ mod tests {
|
|||||||
let invalid_rcodes = [11, 12, 13, 14, 15];
|
let invalid_rcodes = [11, 12, 13, 14, 15];
|
||||||
|
|
||||||
for rcode in invalid_rcodes {
|
for rcode in invalid_rcodes {
|
||||||
dns_query[3] = (rcode as u8) << 0;
|
dns_query[3] = rcode;
|
||||||
|
|
||||||
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
|
||||||
@ -365,7 +368,7 @@ mod tests {
|
|||||||
];
|
];
|
||||||
|
|
||||||
for (rcode, parsed_rcode) in valid_rcodes {
|
for (rcode, parsed_rcode) in valid_rcodes {
|
||||||
dns_query[3] = rcode << 0;
|
dns_query[3] = rcode;
|
||||||
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
assert_eq!(
|
assert_eq!(
|
||||||
parse_result?.response_code, parsed_rcode,
|
parse_result?.response_code, parsed_rcode,
|
||||||
@ -376,5 +379,237 @@ mod tests {
|
|||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
mod query_count {
|
||||||
|
use super::super::super::*;
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn zero() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.query_count, 0);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn one() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.query_count, 1);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn max_value() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.query_count, 65535);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
mod answer_count {
|
||||||
|
use super::super::super::*;
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn zero() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.answer_count, 0);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn one() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.answer_count, 1);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn max_value() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0x00, 0x00, 0xff, 0xff, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.answer_count, 65535);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
mod name_server_count {
|
||||||
|
use super::super::super::*;
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn zero() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.name_server_count, 0);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn one() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.name_server_count, 1);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn max_value() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.name_server_count, 65535);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
mod additional_count {
|
||||||
|
use super::super::super::*;
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn zero() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.additional_count, 0);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn one() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.additional_count, 1);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn max_value() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0xff, 0xff,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert_eq!(parse_result?.additional_count, 65535);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
mod authorative_answer {
|
||||||
|
use super::super::super::*;
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn yes() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert!(parse_result?.authorative_answer);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn no() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert!(!parse_result?.authorative_answer);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
mod truncated {
|
||||||
|
use super::super::super::*;
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn yes() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert!(parse_result?.truncated);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn no() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert!(!parse_result?.truncated);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
mod recursion_desired {
|
||||||
|
use super::super::super::*;
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn yes() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert!(parse_result?.recursion_desired);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn no() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert!(!parse_result?.recursion_desired);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
mod recursion_available {
|
||||||
|
use super::super::super::*;
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn yes() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x00, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert!(parse_result?.recursion_available);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn no() -> Result<(), DNSParseError> {
|
||||||
|
let dns_query = [
|
||||||
|
0xff, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
||||||
|
];
|
||||||
|
let parse_result = DNSHeader::from_udp_datagram(&dns_query);
|
||||||
|
assert!(!parse_result?.recursion_available);
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user