]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/resolve/resolved-dns-packet.c
resolve: fix possible integer overflow
[thirdparty/systemd.git] / src / resolve / resolved-dns-packet.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
74b2466e 2
73a4cd17 3#if HAVE_GCRYPT
7e8facb3 4# include <gcrypt.h>
73a4cd17
MCO
5#endif
6
b5efdb8a 7#include "alloc-util.h"
4ad7f276 8#include "dns-domain.h"
0a970718 9#include "memory-util.h"
74b2466e 10#include "resolved-dns-packet.h"
2d34cf0c 11#include "set.h"
8b43440b
LP
12#include "string-table.h"
13#include "strv.h"
14#include "unaligned.h"
15#include "utf8.h"
16#include "util.h"
74b2466e 17
7586f4d1
TG
18#define EDNS0_OPT_DO (1<<15)
19
ab1a1ba5 20assert_cc(DNS_PACKET_SIZE_START > DNS_PACKET_HEADER_SIZE);
88795538 21
e18a3c73
ZJS
22typedef struct DnsPacketRewinder {
23 DnsPacket *packet;
24 size_t saved_rindex;
25} DnsPacketRewinder;
26
27static void rewind_dns_packet(DnsPacketRewinder *rewinder) {
28 if (rewinder->packet)
29 dns_packet_rewind(rewinder->packet, rewinder->saved_rindex);
30}
31
0c4f37f0
ZJS
32#define REWINDER_INIT(p) { \
33 .packet = (p), \
34 .saved_rindex = (p)->rindex, \
35 }
36#define CANCEL_REWINDER(rewinder) do { (rewinder).packet = NULL; } while (0)
e18a3c73 37
51027656
LP
38int dns_packet_new(
39 DnsPacket **ret,
40 DnsProtocol protocol,
41 size_t min_alloc_dsize,
42 size_t max_size) {
43
74b2466e
LP
44 DnsPacket *p;
45 size_t a;
46
47 assert(ret);
51027656
LP
48 assert(max_size >= DNS_PACKET_HEADER_SIZE);
49
50 if (max_size > DNS_PACKET_SIZE_MAX)
51 max_size = DNS_PACKET_SIZE_MAX;
74b2466e 52
46a58596
BR
53 /* The caller may not check what is going to be truly allocated, so do not allow to
54 * allocate a DNS packet bigger than DNS_PACKET_SIZE_MAX.
55 */
baaa35ad
ZJS
56 if (min_alloc_dsize > DNS_PACKET_SIZE_MAX)
57 return log_error_errno(SYNTHETIC_ERRNO(EFBIG),
58 "Requested packet data size too big: %zu",
59 min_alloc_dsize);
46a58596
BR
60
61 /* When dns_packet_new() is called with min_alloc_dsize == 0, allocate more than the
88795538
ZJS
62 * absolute minimum (which is the dns packet header size), to avoid
63 * resizing immediately again after appending the first data to the packet.
64 */
46a58596 65 if (min_alloc_dsize < DNS_PACKET_HEADER_SIZE)
88795538
ZJS
66 a = DNS_PACKET_SIZE_START;
67 else
46a58596 68 a = min_alloc_dsize;
74b2466e 69
c73ce96b
LP
70 /* round up to next page size */
71 a = PAGE_ALIGN(ALIGN(sizeof(DnsPacket)) + a) - ALIGN(sizeof(DnsPacket));
72
73 /* make sure we never allocate more than useful */
51027656
LP
74 if (a > max_size)
75 a = max_size;
c73ce96b 76
74b2466e
LP
77 p = malloc0(ALIGN(sizeof(DnsPacket)) + a);
78 if (!p)
79 return -ENOMEM;
80
1ed31408
LP
81 *p = (DnsPacket) {
82 .n_ref = 1,
83 .protocol = protocol,
84 .size = DNS_PACKET_HEADER_SIZE,
85 .rindex = DNS_PACKET_HEADER_SIZE,
86 .allocated = a,
87 .max_size = max_size,
f5fbe71d
YW
88 .opt_start = SIZE_MAX,
89 .opt_size = SIZE_MAX,
1ed31408 90 };
74b2466e
LP
91
92 *ret = p;
93
94 return 0;
95}
96
dbfbb6e7 97void dns_packet_set_flags(DnsPacket *p, bool dnssec_checking_disabled, bool truncated) {
74b2466e 98
dbfbb6e7 99 DnsPacketHeader *h;
74b2466e 100
dbfbb6e7 101 assert(p);
74b2466e
LP
102
103 h = DNS_PACKET_HEADER(p);
1716f6dc 104
79893116 105 switch (p->protocol) {
dbfbb6e7
DM
106 case DNS_PROTOCOL_LLMNR:
107 assert(!truncated);
108
069360a6
LP
109 h->flags = htobe16(DNS_PACKET_MAKE_FLAGS(0 /* qr */,
110 0 /* opcode */,
111 0 /* c */,
e5abebab 112 0 /* tc */,
069360a6
LP
113 0 /* t */,
114 0 /* ra */,
115 0 /* ad */,
116 0 /* cd */,
117 0 /* rcode */));
dbfbb6e7
DM
118 break;
119
120 case DNS_PROTOCOL_MDNS:
121 h->flags = htobe16(DNS_PACKET_MAKE_FLAGS(0 /* qr */,
122 0 /* opcode */,
123 0 /* aa */,
124 truncated /* tc */,
125 0 /* rd (ask for recursion) */,
126 0 /* ra */,
127 0 /* ad */,
128 0 /* cd */,
129 0 /* rcode */));
130 break;
131
132 default:
133 assert(!truncated);
134
069360a6
LP
135 h->flags = htobe16(DNS_PACKET_MAKE_FLAGS(0 /* qr */,
136 0 /* opcode */,
137 0 /* aa */,
138 0 /* tc */,
139 1 /* rd (ask for recursion) */,
140 0 /* ra */,
141 0 /* ad */,
24710c48 142 dnssec_checking_disabled /* cd */,
069360a6 143 0 /* rcode */));
dbfbb6e7
DM
144 }
145}
146
46a58596 147int dns_packet_new_query(DnsPacket **ret, DnsProtocol protocol, size_t min_alloc_dsize, bool dnssec_checking_disabled) {
dbfbb6e7
DM
148 DnsPacket *p;
149 int r;
150
151 assert(ret);
152
51027656 153 r = dns_packet_new(&p, protocol, min_alloc_dsize, DNS_PACKET_SIZE_MAX);
dbfbb6e7
DM
154 if (r < 0)
155 return r;
156
157 /* Always set the TC bit to 0 initially.
158 * If there are multiple packets later, we'll update the bit shortly before sending.
159 */
160 dns_packet_set_flags(p, dnssec_checking_disabled, false);
74b2466e
LP
161
162 *ret = p;
163 return 0;
164}
165
1a6cd020
LP
166int dns_packet_dup(DnsPacket **ret, DnsPacket *p) {
167 DnsPacket *c;
168 int r;
169
170 assert(ret);
171 assert(p);
172
173 r = dns_packet_validate(p);
174 if (r < 0)
175 return r;
176
177 c = malloc(ALIGN(sizeof(DnsPacket)) + p->size);
178 if (!c)
179 return -ENOMEM;
180
181 *c = (DnsPacket) {
182 .n_ref = 1,
183 .protocol = p->protocol,
184 .size = p->size,
185 .rindex = DNS_PACKET_HEADER_SIZE,
186 .allocated = p->size,
187 .max_size = p->max_size,
f5fbe71d
YW
188 .opt_start = SIZE_MAX,
189 .opt_size = SIZE_MAX,
1a6cd020
LP
190 };
191
192 memcpy(DNS_PACKET_DATA(c), DNS_PACKET_DATA(p), p->size);
193
194 *ret = c;
195 return 0;
196}
197
74b2466e
LP
198DnsPacket *dns_packet_ref(DnsPacket *p) {
199
200 if (!p)
201 return NULL;
202
a8812dd7
LP
203 assert(!p->on_stack);
204
74b2466e
LP
205 assert(p->n_ref > 0);
206 p->n_ref++;
207 return p;
208}
209
210static void dns_packet_free(DnsPacket *p) {
211 char *s;
212
213 assert(p);
214
faa133f3
LP
215 dns_question_unref(p->question);
216 dns_answer_unref(p->answer);
d75acfb0 217 dns_resource_record_unref(p->opt);
322345fd 218
74b2466e
LP
219 while ((s = hashmap_steal_first_key(p->names)))
220 free(s);
221 hashmap_free(p->names);
222
faa133f3 223 free(p->_data);
a8812dd7
LP
224
225 if (!p->on_stack)
226 free(p);
74b2466e
LP
227}
228
229DnsPacket *dns_packet_unref(DnsPacket *p) {
230 if (!p)
231 return NULL;
232
233 assert(p->n_ref > 0);
234
6728a58d 235 dns_packet_unref(p->more);
9c491563 236
74b2466e
LP
237 if (p->n_ref == 1)
238 dns_packet_free(p);
239 else
240 p->n_ref--;
241
242 return NULL;
243}
244
245int dns_packet_validate(DnsPacket *p) {
246 assert(p);
247
248 if (p->size < DNS_PACKET_HEADER_SIZE)
249 return -EBADMSG;
250
c73ce96b
LP
251 if (p->size > DNS_PACKET_SIZE_MAX)
252 return -EBADMSG;
253
623a4c97 254 return 1;
74b2466e
LP
255}
256
257int dns_packet_validate_reply(DnsPacket *p) {
74b2466e
LP
258 int r;
259
260 assert(p);
261
262 r = dns_packet_validate(p);
263 if (r < 0)
264 return r;
265
623a4c97
LP
266 if (DNS_PACKET_QR(p) != 1)
267 return 0;
268
269 if (DNS_PACKET_OPCODE(p) != 0)
74b2466e
LP
270 return -EBADMSG;
271
818ef443 272 switch (p->protocol) {
d75acfb0 273
818ef443
DM
274 case DNS_PROTOCOL_LLMNR:
275 /* RFC 4795, Section 2.1.1. says to discard all replies with QDCOUNT != 1 */
276 if (DNS_PACKET_QDCOUNT(p) != 1)
277 return -EBADMSG;
278
279 break;
280
4e5bf5e1
DM
281 case DNS_PROTOCOL_MDNS:
282 /* RFC 6762, Section 18 */
283 if (DNS_PACKET_RCODE(p) != 0)
284 return -EBADMSG;
285
286 break;
287
818ef443
DM
288 default:
289 break;
290 }
ea917db9 291
623a4c97
LP
292 return 1;
293}
294
295int dns_packet_validate_query(DnsPacket *p) {
296 int r;
297
298 assert(p);
299
300 r = dns_packet_validate(p);
301 if (r < 0)
302 return r;
303
304 if (DNS_PACKET_QR(p) != 0)
305 return 0;
306
3cb10d3a 307 if (DNS_PACKET_OPCODE(p) != 0)
74b2466e
LP
308 return -EBADMSG;
309
623a4c97
LP
310 if (DNS_PACKET_TC(p))
311 return -EBADMSG;
312
818ef443 313 switch (p->protocol) {
d75acfb0 314
818ef443 315 case DNS_PROTOCOL_LLMNR:
b30bf55d 316 case DNS_PROTOCOL_DNS:
818ef443
DM
317 /* RFC 4795, Section 2.1.1. says to discard all queries with QDCOUNT != 1 */
318 if (DNS_PACKET_QDCOUNT(p) != 1)
319 return -EBADMSG;
623a4c97 320
818ef443
DM
321 /* RFC 4795, Section 2.1.1. says to discard all queries with ANCOUNT != 0 */
322 if (DNS_PACKET_ANCOUNT(p) > 0)
323 return -EBADMSG;
623a4c97 324
818ef443
DM
325 /* RFC 4795, Section 2.1.1. says to discard all queries with NSCOUNT != 0 */
326 if (DNS_PACKET_NSCOUNT(p) > 0)
327 return -EBADMSG;
328
329 break;
330
4e5bf5e1 331 case DNS_PROTOCOL_MDNS:
2aaf3765
SB
332 /* RFC 6762, Section 18 specifies that messages with non-zero RCODE
333 * must be silently ignored, and that we must ignore the values of
334 * AA, RD, RA, AD, and CD bits. */
335 if (DNS_PACKET_RCODE(p) != 0)
4e5bf5e1
DM
336 return -EBADMSG;
337
338 break;
339
818ef443
DM
340 default:
341 break;
342 }
623a4c97
LP
343
344 return 1;
74b2466e
LP
345}
346
347static int dns_packet_extend(DnsPacket *p, size_t add, void **ret, size_t *start) {
348 assert(p);
349
c73ce96b 350 if (p->size + add > p->allocated) {
51027656 351 size_t a, ms;
c73ce96b
LP
352
353 a = PAGE_ALIGN((p->size + add) * 2);
51027656
LP
354
355 ms = dns_packet_size_max(p);
356 if (a > ms)
357 a = ms;
c73ce96b
LP
358
359 if (p->size + add > a)
360 return -EMSGSIZE;
361
faa133f3 362 if (p->_data) {
c73ce96b
LP
363 void *d;
364
faa133f3 365 d = realloc(p->_data, a);
c73ce96b
LP
366 if (!d)
367 return -ENOMEM;
368
faa133f3 369 p->_data = d;
c73ce96b 370 } else {
faa133f3
LP
371 p->_data = malloc(a);
372 if (!p->_data)
c73ce96b
LP
373 return -ENOMEM;
374
faa133f3
LP
375 memcpy(p->_data, (uint8_t*) p + ALIGN(sizeof(DnsPacket)), p->size);
376 memzero((uint8_t*) p->_data + p->size, a - p->size);
c73ce96b
LP
377 }
378
379 p->allocated = a;
380 }
74b2466e
LP
381
382 if (start)
383 *start = p->size;
384
385 if (ret)
386 *ret = (uint8_t*) DNS_PACKET_DATA(p) + p->size;
387
388 p->size += add;
389 return 0;
390}
391
9c5e12a4 392void dns_packet_truncate(DnsPacket *p, size_t sz) {
74b2466e
LP
393 char *s;
394 void *n;
395
396 assert(p);
397
398 if (p->size <= sz)
399 return;
400
90e74a66 401 HASHMAP_FOREACH_KEY(n, s, p->names) {
74b2466e
LP
402
403 if (PTR_TO_SIZE(n) < sz)
404 continue;
405
406 hashmap_remove(p->names, s);
407 free(s);
408 }
409
410 p->size = sz;
411}
412
623a4c97
LP
413int dns_packet_append_blob(DnsPacket *p, const void *d, size_t l, size_t *start) {
414 void *q;
415 int r;
416
417 assert(p);
418
419 r = dns_packet_extend(p, l, &q, start);
420 if (r < 0)
421 return r;
422
1f66559c 423 memcpy_safe(q, d, l);
623a4c97
LP
424 return 0;
425}
426
74b2466e
LP
427int dns_packet_append_uint8(DnsPacket *p, uint8_t v, size_t *start) {
428 void *d;
429 int r;
430
431 assert(p);
432
433 r = dns_packet_extend(p, sizeof(uint8_t), &d, start);
434 if (r < 0)
435 return r;
436
437 ((uint8_t*) d)[0] = v;
438
439 return 0;
440}
441
442int dns_packet_append_uint16(DnsPacket *p, uint16_t v, size_t *start) {
443 void *d;
444 int r;
445
446 assert(p);
447
448 r = dns_packet_extend(p, sizeof(uint16_t), &d, start);
449 if (r < 0)
450 return r;
451
725ca0e5 452 unaligned_write_be16(d, v);
623a4c97
LP
453
454 return 0;
455}
456
457int dns_packet_append_uint32(DnsPacket *p, uint32_t v, size_t *start) {
458 void *d;
459 int r;
460
461 assert(p);
462
463 r = dns_packet_extend(p, sizeof(uint32_t), &d, start);
464 if (r < 0)
465 return r;
466
725ca0e5 467 unaligned_write_be32(d, v);
74b2466e
LP
468
469 return 0;
470}
471
472int dns_packet_append_string(DnsPacket *p, const char *s, size_t *start) {
74b2466e
LP
473 assert(p);
474 assert(s);
475
c38a52da 476 return dns_packet_append_raw_string(p, s, strlen(s), start);
74b2466e
LP
477}
478
2001c805
LP
479int dns_packet_append_raw_string(DnsPacket *p, const void *s, size_t size, size_t *start) {
480 void *d;
481 int r;
482
483 assert(p);
484 assert(s || size == 0);
485
486 if (size > 255)
487 return -E2BIG;
488
489 r = dns_packet_extend(p, 1 + size, &d, start);
490 if (r < 0)
491 return r;
492
493 ((uint8_t*) d)[0] = (uint8_t) size;
494
75f32f04 495 memcpy_safe(((uint8_t*) d) + 1, s, size);
2001c805
LP
496
497 return 0;
498}
499
a3db237b 500int dns_packet_append_label(DnsPacket *p, const char *d, size_t l, bool canonical_candidate, size_t *start) {
a8812dd7 501 uint8_t *w;
74b2466e
LP
502 int r;
503
a3db237b
LP
504 /* Append a label to a packet. Optionally, does this in DNSSEC
505 * canonical form, if this label is marked as a candidate for
506 * it, and the canonical form logic is enabled for the
507 * packet */
508
74b2466e
LP
509 assert(p);
510 assert(d);
511
512 if (l > DNS_LABEL_MAX)
513 return -E2BIG;
514
a8812dd7 515 r = dns_packet_extend(p, 1 + l, (void**) &w, start);
74b2466e
LP
516 if (r < 0)
517 return r;
518
a8812dd7
LP
519 *(w++) = (uint8_t) l;
520
64ea42e9 521 if (p->canonical_form && canonical_candidate)
a8812dd7
LP
522 /* Generate in canonical form, as defined by DNSSEC
523 * RFC 4034, Section 6.2, i.e. all lower-case. */
64ea42e9 524 for (size_t i = 0; i < l; i++)
b577e3d5 525 w[i] = (uint8_t) ascii_tolower(d[i]);
64ea42e9 526 else
a8812dd7
LP
527 /* Otherwise, just copy the string unaltered. This is
528 * essential for DNS-SD, where the casing of labels
529 * matters and needs to be retained. */
530 memcpy(w, d, l);
74b2466e
LP
531
532 return 0;
533}
534
f6a5fec6
LP
535int dns_packet_append_name(
536 DnsPacket *p,
537 const char *name,
538 bool allow_compression,
a3db237b 539 bool canonical_candidate,
f6a5fec6
LP
540 size_t *start) {
541
74b2466e
LP
542 size_t saved_size;
543 int r;
544
545 assert(p);
546 assert(name);
547
f6a5fec6
LP
548 if (p->refuse_compression)
549 allow_compression = false;
550
74b2466e
LP
551 saved_size = p->size;
552
e48b9a64 553 while (!dns_name_is_root(name)) {
08f904fd 554 const char *z = name;
74b2466e 555 char label[DNS_LABEL_MAX];
151226ab 556 size_t n = 0;
74b2466e 557
151226ab
ZJS
558 if (allow_compression)
559 n = PTR_TO_SIZE(hashmap_get(p->names, name));
74b2466e
LP
560 if (n > 0) {
561 assert(n < p->size);
562
563 if (n < 0x4000) {
564 r = dns_packet_append_uint16(p, 0xC000 | n, NULL);
565 if (r < 0)
566 goto fail;
567
568 goto done;
569 }
570 }
571
7470cc4c 572 r = dns_label_unescape(&name, label, sizeof label, 0);
74b2466e
LP
573 if (r < 0)
574 goto fail;
575
a3db237b 576 r = dns_packet_append_label(p, label, r, canonical_candidate, &n);
74b2466e
LP
577 if (r < 0)
578 goto fail;
579
151226ab 580 if (allow_compression) {
08f904fd
LP
581 _cleanup_free_ char *s = NULL;
582
583 s = strdup(z);
584 if (!s) {
585 r = -ENOMEM;
586 goto fail;
587 }
588
3004fcd0 589 r = hashmap_ensure_put(&p->names, &dns_name_hash_ops, s, SIZE_TO_PTR(n));
151226ab
ZJS
590 if (r < 0)
591 goto fail;
74b2466e 592
daced748 593 TAKE_PTR(s);
151226ab 594 }
74b2466e
LP
595 }
596
597 r = dns_packet_append_uint8(p, 0, NULL);
598 if (r < 0)
599 return r;
600
601done:
602 if (start)
603 *start = saved_size;
604
605 return 0;
606
607fail:
608 dns_packet_truncate(p, saved_size);
609 return r;
610}
611
58ab31d5 612int dns_packet_append_key(DnsPacket *p, const DnsResourceKey *k, const DnsAnswerFlags flags, size_t *start) {
74b2466e 613 size_t saved_size;
58ab31d5 614 uint16_t class;
74b2466e
LP
615 int r;
616
617 assert(p);
618 assert(k);
619
620 saved_size = p->size;
621
1c02e7ba 622 r = dns_packet_append_name(p, dns_resource_key_name(k), true, true, NULL);
74b2466e
LP
623 if (r < 0)
624 goto fail;
625
626 r = dns_packet_append_uint16(p, k->type, NULL);
627 if (r < 0)
628 goto fail;
629
82d39576 630 class = flags & DNS_ANSWER_CACHE_FLUSH ? k->class | MDNS_RR_CACHE_FLUSH_OR_QU : k->class;
58ab31d5 631 r = dns_packet_append_uint16(p, class, NULL);
74b2466e
LP
632 if (r < 0)
633 goto fail;
634
635 if (start)
636 *start = saved_size;
637
638 return 0;
639
640fail:
641 dns_packet_truncate(p, saved_size);
642 return r;
643}
644
e1a9f1a8 645static int dns_packet_append_type_window(DnsPacket *p, uint8_t window, uint8_t length, const uint8_t *types, size_t *start) {
50f1e641
TG
646 size_t saved_size;
647 int r;
648
649 assert(p);
650 assert(types);
1792f223 651 assert(length > 0);
50f1e641 652
50f1e641
TG
653 saved_size = p->size;
654
1792f223
TG
655 r = dns_packet_append_uint8(p, window, NULL);
656 if (r < 0)
657 goto fail;
50f1e641 658
1792f223
TG
659 r = dns_packet_append_uint8(p, length, NULL);
660 if (r < 0)
661 goto fail;
6fa91901 662
1792f223
TG
663 r = dns_packet_append_blob(p, types, length, NULL);
664 if (r < 0)
665 goto fail;
50f1e641
TG
666
667 if (start)
668 *start = saved_size;
669
670 return 0;
671fail:
672 dns_packet_truncate(p, saved_size);
673 return r;
674}
675
676static int dns_packet_append_types(DnsPacket *p, Bitmap *types, size_t *start) {
677 uint8_t window = 0;
1792f223 678 uint8_t entry = 0;
50f1e641
TG
679 uint8_t bitmaps[32] = {};
680 unsigned n;
681 size_t saved_size;
682 int r;
683
684 assert(p);
50f1e641
TG
685
686 saved_size = p->size;
687
90e74a66 688 BITMAP_FOREACH(n, types) {
50f1e641
TG
689 assert(n <= 0xffff);
690
1792f223
TG
691 if ((n >> 8) != window && bitmaps[entry / 8] != 0) {
692 r = dns_packet_append_type_window(p, window, entry / 8 + 1, bitmaps, NULL);
50f1e641
TG
693 if (r < 0)
694 goto fail;
695
1792f223 696 zero(bitmaps);
50f1e641
TG
697 }
698
1792f223 699 window = n >> 8;
50f1e641
TG
700 entry = n & 255;
701
702 bitmaps[entry / 8] |= 1 << (7 - (entry % 8));
703 }
704
d0ae14ff
LP
705 if (bitmaps[entry / 8] != 0) {
706 r = dns_packet_append_type_window(p, window, entry / 8 + 1, bitmaps, NULL);
707 if (r < 0)
708 goto fail;
709 }
50f1e641
TG
710
711 if (start)
712 *start = saved_size;
713
714 return 0;
715fail:
716 dns_packet_truncate(p, saved_size);
717 return r;
718}
719
dc913c9a 720/* Append the OPT pseudo-RR described in RFC6891 */
c36d5b5b
LP
721int dns_packet_append_opt(
722 DnsPacket *p,
723 uint16_t max_udp_size,
724 bool edns0_do,
725 bool include_rfc6975,
4a6eb824 726 const char *nsid,
c36d5b5b 727 int rcode,
4a6eb824 728 size_t *ret_start) {
c36d5b5b 729
dc913c9a
TG
730 size_t saved_size;
731 int r;
732
733 assert(p);
734 /* we must never advertise supported packet size smaller than the legacy max */
735 assert(max_udp_size >= DNS_PACKET_UNICAST_SIZE_MAX);
f2ed4c69
LP
736 assert(rcode >= 0);
737 assert(rcode <= _DNS_RCODE_MAX);
dc913c9a 738
f5fbe71d 739 if (p->opt_start != SIZE_MAX)
519ef046
LP
740 return -EBUSY;
741
f5fbe71d 742 assert(p->opt_size == SIZE_MAX);
519ef046 743
dc913c9a
TG
744 saved_size = p->size;
745
746 /* empty name */
747 r = dns_packet_append_uint8(p, 0, NULL);
748 if (r < 0)
749 return r;
750
751 /* type */
752 r = dns_packet_append_uint16(p, DNS_TYPE_OPT, NULL);
753 if (r < 0)
754 goto fail;
755
f2ed4c69 756 /* class: maximum udp packet that can be received */
dc913c9a
TG
757 r = dns_packet_append_uint16(p, max_udp_size, NULL);
758 if (r < 0)
759 goto fail;
760
761 /* extended RCODE and VERSION */
f2ed4c69 762 r = dns_packet_append_uint16(p, ((uint16_t) rcode & 0x0FF0) << 4, NULL);
dc913c9a
TG
763 if (r < 0)
764 goto fail;
765
7586f4d1
TG
766 /* flags: DNSSEC OK (DO), see RFC3225 */
767 r = dns_packet_append_uint16(p, edns0_do ? EDNS0_OPT_DO : 0, NULL);
dc913c9a
TG
768 if (r < 0)
769 goto fail;
770
c36d5b5b
LP
771 if (edns0_do && include_rfc6975) {
772 /* If DO is on and this is requested, also append RFC6975 Algorithm data. This is supposed to
773 * be done on queries, not on replies, hencer callers should turn this off when finishing off
774 * replies. */
665408ac
LP
775
776 static const uint8_t rfc6975[] = {
777
778 0, 5, /* OPTION_CODE: DAU */
7e8facb3 779#if PREFER_OPENSSL || (HAVE_GCRYPT && GCRYPT_VERSION_NUMBER >= 0x010600)
73a4cd17
MCO
780 0, 7, /* LIST_LENGTH */
781#else
665408ac 782 0, 6, /* LIST_LENGTH */
73a4cd17 783#endif
665408ac
LP
784 DNSSEC_ALGORITHM_RSASHA1,
785 DNSSEC_ALGORITHM_RSASHA1_NSEC3_SHA1,
786 DNSSEC_ALGORITHM_RSASHA256,
787 DNSSEC_ALGORITHM_RSASHA512,
788 DNSSEC_ALGORITHM_ECDSAP256SHA256,
789 DNSSEC_ALGORITHM_ECDSAP384SHA384,
7e8facb3 790#if PREFER_OPENSSL || (HAVE_GCRYPT && GCRYPT_VERSION_NUMBER >= 0x010600)
73a4cd17
MCO
791 DNSSEC_ALGORITHM_ED25519,
792#endif
665408ac
LP
793
794 0, 6, /* OPTION_CODE: DHU */
795 0, 3, /* LIST_LENGTH */
796 DNSSEC_DIGEST_SHA1,
797 DNSSEC_DIGEST_SHA256,
798 DNSSEC_DIGEST_SHA384,
799
800 0, 7, /* OPTION_CODE: N3U */
801 0, 1, /* LIST_LENGTH */
802 NSEC3_ALGORITHM_SHA1,
803 };
804
4a6eb824
LP
805 r = dns_packet_append_uint16(p, sizeof(rfc6975), NULL); /* RDLENGTH */
806 if (r < 0)
807 goto fail;
808
809 r = dns_packet_append_blob(p, rfc6975, sizeof(rfc6975), NULL); /* the payload, as defined above */
810
811 } else if (nsid) {
812
813 if (strlen(nsid) > UINT16_MAX - 4) {
814 r = -E2BIG;
815 goto fail;
816 }
817
818 r = dns_packet_append_uint16(p, 4 + strlen(nsid), NULL); /* RDLENGTH */
665408ac
LP
819 if (r < 0)
820 goto fail;
821
4a6eb824
LP
822 r = dns_packet_append_uint16(p, 3, NULL); /* OPTION-CODE: NSID */
823 if (r < 0)
824 goto fail;
825
826 r = dns_packet_append_uint16(p, strlen(nsid), NULL); /* OPTION-LENGTH */
827 if (r < 0)
828 goto fail;
829
830 r = dns_packet_append_blob(p, nsid, strlen(nsid), NULL);
665408ac
LP
831 } else
832 r = dns_packet_append_uint16(p, 0, NULL);
dc913c9a
TG
833 if (r < 0)
834 goto fail;
835
519ef046
LP
836 DNS_PACKET_HEADER(p)->arcount = htobe16(DNS_PACKET_ARCOUNT(p) + 1);
837
838 p->opt_start = saved_size;
839 p->opt_size = p->size - saved_size;
840
4a6eb824
LP
841 if (ret_start)
842 *ret_start = saved_size;
dc913c9a
TG
843
844 return 0;
845
846fail:
847 dns_packet_truncate(p, saved_size);
848 return r;
849}
850
519ef046
LP
851int dns_packet_truncate_opt(DnsPacket *p) {
852 assert(p);
853
f5fbe71d
YW
854 if (p->opt_start == SIZE_MAX) {
855 assert(p->opt_size == SIZE_MAX);
519ef046
LP
856 return 0;
857 }
858
f5fbe71d 859 assert(p->opt_size != SIZE_MAX);
519ef046
LP
860 assert(DNS_PACKET_ARCOUNT(p) > 0);
861
862 if (p->opt_start + p->opt_size != p->size)
863 return -EBUSY;
864
865 dns_packet_truncate(p, p->opt_start);
866 DNS_PACKET_HEADER(p)->arcount = htobe16(DNS_PACKET_ARCOUNT(p) - 1);
f5fbe71d 867 p->opt_start = p->opt_size = SIZE_MAX;
519ef046
LP
868
869 return 1;
870}
871
58ab31d5 872int dns_packet_append_rr(DnsPacket *p, const DnsResourceRecord *rr, const DnsAnswerFlags flags, size_t *start, size_t *rdata_start) {
f471bc11 873
a8812dd7 874 size_t saved_size, rdlength_offset, end, rdlength, rds;
c3ae4188 875 uint32_t ttl;
623a4c97
LP
876 int r;
877
878 assert(p);
879 assert(rr);
880
881 saved_size = p->size;
882
58ab31d5 883 r = dns_packet_append_key(p, rr->key, flags, NULL);
623a4c97
LP
884 if (r < 0)
885 goto fail;
886
c3ae4188
DR
887 ttl = flags & DNS_ANSWER_GOODBYE ? 0 : rr->ttl;
888 r = dns_packet_append_uint32(p, ttl, NULL);
623a4c97
LP
889 if (r < 0)
890 goto fail;
891
892 /* Initially we write 0 here */
893 r = dns_packet_append_uint16(p, 0, &rdlength_offset);
894 if (r < 0)
895 goto fail;
896
a8812dd7
LP
897 rds = p->size - saved_size;
898
52e085af 899 switch (rr->unparsable ? _DNS_TYPE_INVALID : rr->key->type) {
623a4c97 900
9c92ce6d
LP
901 case DNS_TYPE_SRV:
902 r = dns_packet_append_uint16(p, rr->srv.priority, NULL);
903 if (r < 0)
904 goto fail;
905
906 r = dns_packet_append_uint16(p, rr->srv.weight, NULL);
907 if (r < 0)
908 goto fail;
909
910 r = dns_packet_append_uint16(p, rr->srv.port, NULL);
911 if (r < 0)
912 goto fail;
913
b2776a60
YW
914 /* RFC 2782 states "Unless and until permitted by future standards
915 * action, name compression is not to be used for this field." */
4e58741d 916 r = dns_packet_append_name(p, rr->srv.name, false, true, NULL);
9c92ce6d
LP
917 break;
918
623a4c97
LP
919 case DNS_TYPE_PTR:
920 case DNS_TYPE_NS:
921 case DNS_TYPE_CNAME:
8ac4e9e1 922 case DNS_TYPE_DNAME:
4e58741d 923 r = dns_packet_append_name(p, rr->ptr.name, true, true, NULL);
623a4c97
LP
924 break;
925
926 case DNS_TYPE_HINFO:
927 r = dns_packet_append_string(p, rr->hinfo.cpu, NULL);
928 if (r < 0)
929 goto fail;
930
931 r = dns_packet_append_string(p, rr->hinfo.os, NULL);
932 break;
933
9de3e329 934 case DNS_TYPE_SPF: /* exactly the same as TXT */
2001c805 935 case DNS_TYPE_TXT:
2e276efc 936
2001c805 937 if (!rr->txt.items) {
1ccda9b7
LP
938 /* RFC 6763, section 6.1 suggests to generate
939 * single empty string for an empty array. */
940
2001c805 941 r = dns_packet_append_raw_string(p, NULL, 0, NULL);
2e276efc
ZJS
942 if (r < 0)
943 goto fail;
03677889 944 } else
2001c805
LP
945 LIST_FOREACH(items, i, rr->txt.items) {
946 r = dns_packet_append_raw_string(p, i->data, i->length, NULL);
1ccda9b7
LP
947 if (r < 0)
948 goto fail;
949 }
2e276efc 950
6a6fc3df 951 r = 0;
2e276efc 952 break;
2e276efc 953
623a4c97
LP
954 case DNS_TYPE_A:
955 r = dns_packet_append_blob(p, &rr->a.in_addr, sizeof(struct in_addr), NULL);
956 break;
957
958 case DNS_TYPE_AAAA:
959 r = dns_packet_append_blob(p, &rr->aaaa.in6_addr, sizeof(struct in6_addr), NULL);
960 break;
961
962 case DNS_TYPE_SOA:
4e58741d 963 r = dns_packet_append_name(p, rr->soa.mname, true, true, NULL);
623a4c97
LP
964 if (r < 0)
965 goto fail;
966
4e58741d 967 r = dns_packet_append_name(p, rr->soa.rname, true, true, NULL);
623a4c97
LP
968 if (r < 0)
969 goto fail;
970
971 r = dns_packet_append_uint32(p, rr->soa.serial, NULL);
972 if (r < 0)
973 goto fail;
974
975 r = dns_packet_append_uint32(p, rr->soa.refresh, NULL);
976 if (r < 0)
977 goto fail;
978
979 r = dns_packet_append_uint32(p, rr->soa.retry, NULL);
980 if (r < 0)
981 goto fail;
982
983 r = dns_packet_append_uint32(p, rr->soa.expire, NULL);
984 if (r < 0)
985 goto fail;
986
987 r = dns_packet_append_uint32(p, rr->soa.minimum, NULL);
988 break;
989
990 case DNS_TYPE_MX:
946c7094
ZJS
991 r = dns_packet_append_uint16(p, rr->mx.priority, NULL);
992 if (r < 0)
993 goto fail;
994
4e58741d 995 r = dns_packet_append_name(p, rr->mx.exchange, true, true, NULL);
946c7094
ZJS
996 break;
997
0dae31d4
ZJS
998 case DNS_TYPE_LOC:
999 r = dns_packet_append_uint8(p, rr->loc.version, NULL);
1000 if (r < 0)
1001 goto fail;
1002
1003 r = dns_packet_append_uint8(p, rr->loc.size, NULL);
1004 if (r < 0)
1005 goto fail;
1006
1007 r = dns_packet_append_uint8(p, rr->loc.horiz_pre, NULL);
1008 if (r < 0)
1009 goto fail;
1010
1011 r = dns_packet_append_uint8(p, rr->loc.vert_pre, NULL);
1012 if (r < 0)
1013 goto fail;
1014
afbc4f26 1015 r = dns_packet_append_uint32(p, rr->loc.latitude, NULL);
0dae31d4
ZJS
1016 if (r < 0)
1017 goto fail;
1018
afbc4f26 1019 r = dns_packet_append_uint32(p, rr->loc.longitude, NULL);
0dae31d4
ZJS
1020 if (r < 0)
1021 goto fail;
1022
afbc4f26 1023 r = dns_packet_append_uint32(p, rr->loc.altitude, NULL);
0dae31d4
ZJS
1024 break;
1025
abf126a3
TG
1026 case DNS_TYPE_DS:
1027 r = dns_packet_append_uint16(p, rr->ds.key_tag, NULL);
1028 if (r < 0)
1029 goto fail;
1030
1031 r = dns_packet_append_uint8(p, rr->ds.algorithm, NULL);
1032 if (r < 0)
1033 goto fail;
1034
1035 r = dns_packet_append_uint8(p, rr->ds.digest_type, NULL);
1036 if (r < 0)
1037 goto fail;
1038
1039 r = dns_packet_append_blob(p, rr->ds.digest, rr->ds.digest_size, NULL);
1040 break;
1041
623a4c97 1042 case DNS_TYPE_SSHFP:
42cc2eeb
LP
1043 r = dns_packet_append_uint8(p, rr->sshfp.algorithm, NULL);
1044 if (r < 0)
1045 goto fail;
8db0d2f5 1046
42cc2eeb
LP
1047 r = dns_packet_append_uint8(p, rr->sshfp.fptype, NULL);
1048 if (r < 0)
1049 goto fail;
1050
549c1a25 1051 r = dns_packet_append_blob(p, rr->sshfp.fingerprint, rr->sshfp.fingerprint_size, NULL);
42cc2eeb
LP
1052 break;
1053
8db0d2f5 1054 case DNS_TYPE_DNSKEY:
f91dc240 1055 r = dns_packet_append_uint16(p, rr->dnskey.flags, NULL);
8db0d2f5
ZJS
1056 if (r < 0)
1057 goto fail;
1058
f91dc240 1059 r = dns_packet_append_uint8(p, rr->dnskey.protocol, NULL);
8db0d2f5
ZJS
1060 if (r < 0)
1061 goto fail;
1062
1063 r = dns_packet_append_uint8(p, rr->dnskey.algorithm, NULL);
1064 if (r < 0)
1065 goto fail;
1066
1067 r = dns_packet_append_blob(p, rr->dnskey.key, rr->dnskey.key_size, NULL);
1068 break;
1069
151226ab
ZJS
1070 case DNS_TYPE_RRSIG:
1071 r = dns_packet_append_uint16(p, rr->rrsig.type_covered, NULL);
1072 if (r < 0)
1073 goto fail;
1074
1075 r = dns_packet_append_uint8(p, rr->rrsig.algorithm, NULL);
1076 if (r < 0)
1077 goto fail;
1078
1079 r = dns_packet_append_uint8(p, rr->rrsig.labels, NULL);
1080 if (r < 0)
1081 goto fail;
1082
1083 r = dns_packet_append_uint32(p, rr->rrsig.original_ttl, NULL);
1084 if (r < 0)
1085 goto fail;
1086
1087 r = dns_packet_append_uint32(p, rr->rrsig.expiration, NULL);
1088 if (r < 0)
1089 goto fail;
1090
1091 r = dns_packet_append_uint32(p, rr->rrsig.inception, NULL);
1092 if (r < 0)
1093 goto fail;
1094
0b1b17d3 1095 r = dns_packet_append_uint16(p, rr->rrsig.key_tag, NULL);
151226ab
ZJS
1096 if (r < 0)
1097 goto fail;
1098
a3db237b 1099 r = dns_packet_append_name(p, rr->rrsig.signer, false, true, NULL);
151226ab
ZJS
1100 if (r < 0)
1101 goto fail;
1102
1103 r = dns_packet_append_blob(p, rr->rrsig.signature, rr->rrsig.signature_size, NULL);
1104 break;
1105
50f1e641 1106 case DNS_TYPE_NSEC:
a3db237b 1107 r = dns_packet_append_name(p, rr->nsec.next_domain_name, false, false, NULL);
50f1e641
TG
1108 if (r < 0)
1109 goto fail;
1110
1111 r = dns_packet_append_types(p, rr->nsec.types, NULL);
1112 if (r < 0)
1113 goto fail;
1114
5d45a880 1115 break;
d75acfb0 1116
5d45a880
TG
1117 case DNS_TYPE_NSEC3:
1118 r = dns_packet_append_uint8(p, rr->nsec3.algorithm, NULL);
1119 if (r < 0)
1120 goto fail;
1121
1122 r = dns_packet_append_uint8(p, rr->nsec3.flags, NULL);
1123 if (r < 0)
1124 goto fail;
1125
1126 r = dns_packet_append_uint16(p, rr->nsec3.iterations, NULL);
1127 if (r < 0)
1128 goto fail;
1129
1130 r = dns_packet_append_uint8(p, rr->nsec3.salt_size, NULL);
1131 if (r < 0)
1132 goto fail;
1133
1134 r = dns_packet_append_blob(p, rr->nsec3.salt, rr->nsec3.salt_size, NULL);
1135 if (r < 0)
1136 goto fail;
1137
1138 r = dns_packet_append_uint8(p, rr->nsec3.next_hashed_name_size, NULL);
1139 if (r < 0)
1140 goto fail;
1141
1142 r = dns_packet_append_blob(p, rr->nsec3.next_hashed_name, rr->nsec3.next_hashed_name_size, NULL);
1143 if (r < 0)
1144 goto fail;
1145
1146 r = dns_packet_append_types(p, rr->nsec3.types, NULL);
1147 if (r < 0)
1148 goto fail;
1149
50f1e641 1150 break;
d75acfb0 1151
48d45d2b
ZJS
1152 case DNS_TYPE_TLSA:
1153 r = dns_packet_append_uint8(p, rr->tlsa.cert_usage, NULL);
1154 if (r < 0)
1155 goto fail;
1156
1157 r = dns_packet_append_uint8(p, rr->tlsa.selector, NULL);
1158 if (r < 0)
1159 goto fail;
1160
1161 r = dns_packet_append_uint8(p, rr->tlsa.matching_type, NULL);
1162 if (r < 0)
1163 goto fail;
1164
1165 r = dns_packet_append_blob(p, rr->tlsa.data, rr->tlsa.data_size, NULL);
1166 break;
1167
95052df3
ZJS
1168 case DNS_TYPE_CAA:
1169 r = dns_packet_append_uint8(p, rr->caa.flags, NULL);
1170 if (r < 0)
1171 goto fail;
1172
1173 r = dns_packet_append_string(p, rr->caa.tag, NULL);
1174 if (r < 0)
1175 goto fail;
1176
1177 r = dns_packet_append_blob(p, rr->caa.value, rr->caa.value_size, NULL);
1178 break;
1179
d75acfb0 1180 case DNS_TYPE_OPT:
d93a16b8 1181 case DNS_TYPE_OPENPGPKEY:
52e085af 1182 case _DNS_TYPE_INVALID: /* unparsable */
623a4c97 1183 default:
0dae31d4 1184
a43a068a 1185 r = dns_packet_append_blob(p, rr->generic.data, rr->generic.data_size, NULL);
623a4c97
LP
1186 break;
1187 }
1188 if (r < 0)
1189 goto fail;
1190
1191 /* Let's calculate the actual data size and update the field */
1192 rdlength = p->size - rdlength_offset - sizeof(uint16_t);
1193 if (rdlength > 0xFFFF) {
555f5cdc 1194 r = -ENOSPC;
623a4c97
LP
1195 goto fail;
1196 }
1197
1198 end = p->size;
1199 p->size = rdlength_offset;
1200 r = dns_packet_append_uint16(p, rdlength, NULL);
1201 if (r < 0)
1202 goto fail;
1203 p->size = end;
1204
351e6342
LP
1205 if (start)
1206 *start = saved_size;
1207
a8812dd7
LP
1208 if (rdata_start)
1209 *rdata_start = rds;
1210
623a4c97
LP
1211 return 0;
1212
1213fail:
1214 dns_packet_truncate(p, saved_size);
1215 return r;
1216}
1217
f471bc11
LP
1218int dns_packet_append_question(DnsPacket *p, DnsQuestion *q) {
1219 DnsResourceKey *key;
1220 int r;
1221
1222 assert(p);
1223
1224 DNS_QUESTION_FOREACH(key, q) {
58ab31d5 1225 r = dns_packet_append_key(p, key, 0, NULL);
f471bc11
LP
1226 if (r < 0)
1227 return r;
1228 }
1229
1230 return 0;
1231}
1232
6f76e68a 1233int dns_packet_append_answer(DnsPacket *p, DnsAnswer *a, unsigned *completed) {
f471bc11 1234 DnsResourceRecord *rr;
58ab31d5 1235 DnsAnswerFlags flags;
f471bc11
LP
1236 int r;
1237
1238 assert(p);
1239
58ab31d5
DR
1240 DNS_ANSWER_FOREACH_FLAGS(rr, flags, a) {
1241 r = dns_packet_append_rr(p, rr, flags, NULL, NULL);
f471bc11
LP
1242 if (r < 0)
1243 return r;
6f76e68a
LP
1244
1245 if (completed)
1246 (*completed)++;
f471bc11
LP
1247 }
1248
1249 return 0;
1250}
1251
74b2466e
LP
1252int dns_packet_read(DnsPacket *p, size_t sz, const void **ret, size_t *start) {
1253 assert(p);
370999c0 1254 assert(p->rindex <= p->size);
74b2466e 1255
370999c0 1256 if (sz > p->size - p->rindex)
74b2466e
LP
1257 return -EMSGSIZE;
1258
1259 if (ret)
1260 *ret = (uint8_t*) DNS_PACKET_DATA(p) + p->rindex;
1261
1262 if (start)
1263 *start = p->rindex;
1264
1265 p->rindex += sz;
1266 return 0;
1267}
1268
8ba9fd9c 1269void dns_packet_rewind(DnsPacket *p, size_t idx) {
74b2466e
LP
1270 assert(p);
1271 assert(idx <= p->size);
1272 assert(idx >= DNS_PACKET_HEADER_SIZE);
1273
1274 p->rindex = idx;
1275}
1276
623a4c97
LP
1277int dns_packet_read_blob(DnsPacket *p, void *d, size_t sz, size_t *start) {
1278 const void *q;
1279 int r;
1280
1281 assert(p);
1282 assert(d);
1283
1284 r = dns_packet_read(p, sz, &q, start);
1285 if (r < 0)
1286 return r;
1287
1288 memcpy(d, q, sz);
1289 return 0;
1290}
1291
f5430a3e
LP
1292static int dns_packet_read_memdup(
1293 DnsPacket *p, size_t size,
1294 void **ret, size_t *ret_size,
1295 size_t *ret_start) {
1296
1297 const void *src;
1298 size_t start;
1299 int r;
1300
1301 assert(p);
1302 assert(ret);
1303
1304 r = dns_packet_read(p, size, &src, &start);
1305 if (r < 0)
1306 return r;
1307
1308 if (size <= 0)
1309 *ret = NULL;
1310 else {
1311 void *copy;
1312
1313 copy = memdup(src, size);
1314 if (!copy)
1315 return -ENOMEM;
1316
1317 *ret = copy;
1318 }
1319
1320 if (ret_size)
1321 *ret_size = size;
1322 if (ret_start)
1323 *ret_start = start;
1324
1325 return 0;
1326}
1327
74b2466e
LP
1328int dns_packet_read_uint8(DnsPacket *p, uint8_t *ret, size_t *start) {
1329 const void *d;
1330 int r;
1331
1332 assert(p);
1333
1334 r = dns_packet_read(p, sizeof(uint8_t), &d, start);
1335 if (r < 0)
1336 return r;
1337
1338 *ret = ((uint8_t*) d)[0];
1339 return 0;
1340}
1341
1342int dns_packet_read_uint16(DnsPacket *p, uint16_t *ret, size_t *start) {
1343 const void *d;
1344 int r;
1345
1346 assert(p);
1347
1348 r = dns_packet_read(p, sizeof(uint16_t), &d, start);
1349 if (r < 0)
1350 return r;
1351
81b4d94d
LP
1352 if (ret)
1353 *ret = unaligned_read_be16(d);
725ca0e5 1354
74b2466e
LP
1355 return 0;
1356}
1357
1358int dns_packet_read_uint32(DnsPacket *p, uint32_t *ret, size_t *start) {
1359 const void *d;
1360 int r;
1361
1362 assert(p);
1363
1364 r = dns_packet_read(p, sizeof(uint32_t), &d, start);
1365 if (r < 0)
1366 return r;
1367
725ca0e5 1368 *ret = unaligned_read_be32(d);
74b2466e
LP
1369
1370 return 0;
1371}
1372
1373int dns_packet_read_string(DnsPacket *p, char **ret, size_t *start) {
0c4f37f0
ZJS
1374 assert(p);
1375
1376 _cleanup_(rewind_dns_packet) DnsPacketRewinder rewinder = REWINDER_INIT(p);
74b2466e
LP
1377 const void *d;
1378 char *t;
1379 uint8_t c;
1380 int r;
1381
74b2466e
LP
1382 r = dns_packet_read_uint8(p, &c, NULL);
1383 if (r < 0)
e18a3c73 1384 return r;
74b2466e
LP
1385
1386 r = dns_packet_read(p, c, &d, NULL);
1387 if (r < 0)
e18a3c73 1388 return r;
74b2466e 1389
e18a3c73
ZJS
1390 if (memchr(d, 0, c))
1391 return -EBADMSG;
74b2466e 1392
beeab352 1393 t = memdup_suffix0(d, c);
e18a3c73
ZJS
1394 if (!t)
1395 return -ENOMEM;
74b2466e
LP
1396
1397 if (!utf8_is_valid(t)) {
1398 free(t);
e18a3c73 1399 return -EBADMSG;
74b2466e
LP
1400 }
1401
1402 *ret = t;
1403
1404 if (start)
e18a3c73
ZJS
1405 *start = rewinder.saved_rindex;
1406 CANCEL_REWINDER(rewinder);
74b2466e
LP
1407
1408 return 0;
74b2466e
LP
1409}
1410
2001c805 1411int dns_packet_read_raw_string(DnsPacket *p, const void **ret, size_t *size, size_t *start) {
0c4f37f0
ZJS
1412 assert(p);
1413
1414 _cleanup_(rewind_dns_packet) DnsPacketRewinder rewinder = REWINDER_INIT(p);
2001c805
LP
1415 uint8_t c;
1416 int r;
1417
2001c805
LP
1418 r = dns_packet_read_uint8(p, &c, NULL);
1419 if (r < 0)
e18a3c73 1420 return r;
2001c805
LP
1421
1422 r = dns_packet_read(p, c, ret, NULL);
1423 if (r < 0)
e18a3c73 1424 return r;
2001c805
LP
1425
1426 if (size)
1427 *size = c;
1428 if (start)
e18a3c73
ZJS
1429 *start = rewinder.saved_rindex;
1430 CANCEL_REWINDER(rewinder);
2001c805
LP
1431
1432 return 0;
2001c805
LP
1433}
1434
f6a5fec6
LP
1435int dns_packet_read_name(
1436 DnsPacket *p,
81b4d94d 1437 char **ret,
f6a5fec6 1438 bool allow_compression,
81b4d94d 1439 size_t *ret_start) {
f6a5fec6 1440
0c4f37f0
ZJS
1441 assert(p);
1442
1443 _cleanup_(rewind_dns_packet) DnsPacketRewinder rewinder = REWINDER_INIT(p);
1444 size_t after_rindex = 0, jump_barrier = p->rindex;
81b4d94d 1445 _cleanup_free_ char *name = NULL;
74b2466e 1446 bool first = true;
319a4f4b 1447 size_t n = 0;
74b2466e
LP
1448 int r;
1449
f6a5fec6
LP
1450 if (p->refuse_compression)
1451 allow_compression = false;
1452
74b2466e
LP
1453 for (;;) {
1454 uint8_t c, d;
1455
1456 r = dns_packet_read_uint8(p, &c, NULL);
1457 if (r < 0)
e18a3c73 1458 return r;
74b2466e
LP
1459
1460 if (c == 0)
1461 /* End of name */
1462 break;
1463 else if (c <= 63) {
74b2466e
LP
1464 const char *label;
1465
1466 /* Literal label */
1467 r = dns_packet_read(p, c, (const void**) &label, NULL);
1468 if (r < 0)
e18a3c73 1469 return r;
74b2466e 1470
319a4f4b 1471 if (!GREEDY_REALLOC(name, n + !first + DNS_LABEL_ESCAPED_MAX))
e18a3c73 1472 return -ENOMEM;
74b2466e 1473
422baca0 1474 if (first)
74b2466e 1475 first = false;
422baca0 1476 else
81b4d94d 1477 name[n++] = '.';
422baca0 1478
81b4d94d 1479 r = dns_label_escape(label, c, name + n, DNS_LABEL_ESCAPED_MAX);
422baca0 1480 if (r < 0)
e18a3c73 1481 return r;
74b2466e 1482
74b2466e
LP
1483 n += r;
1484 continue;
d7a0f1f4 1485 } else if (allow_compression && FLAGS_SET(c, 0xc0)) {
74b2466e
LP
1486 uint16_t ptr;
1487
1488 /* Pointer */
1489 r = dns_packet_read_uint8(p, &d, NULL);
1490 if (r < 0)
e18a3c73 1491 return r;
74b2466e
LP
1492
1493 ptr = (uint16_t) (c & ~0xc0) << 8 | (uint16_t) d;
e18a3c73
ZJS
1494 if (ptr < DNS_PACKET_HEADER_SIZE || ptr >= jump_barrier)
1495 return -EBADMSG;
74b2466e
LP
1496
1497 if (after_rindex == 0)
1498 after_rindex = p->rindex;
1499
f131770b 1500 /* Jumps are limited to a "prior occurrence" (RFC-1035 4.1.4) */
c75dbf9b 1501 jump_barrier = ptr;
74b2466e 1502 p->rindex = ptr;
e18a3c73
ZJS
1503 } else
1504 return -EBADMSG;
74b2466e
LP
1505 }
1506
319a4f4b 1507 if (!GREEDY_REALLOC(name, n + 1))
e18a3c73 1508 return -ENOMEM;
74b2466e 1509
81b4d94d 1510 name[n] = 0;
74b2466e
LP
1511
1512 if (after_rindex != 0)
1513 p->rindex= after_rindex;
1514
81b4d94d
LP
1515 if (ret)
1516 *ret = TAKE_PTR(name);
1517 if (ret_start)
1518 *ret_start = rewinder.saved_rindex;
74b2466e 1519
e18a3c73 1520 CANCEL_REWINDER(rewinder);
74b2466e
LP
1521
1522 return 0;
74b2466e
LP
1523}
1524
50f1e641 1525static int dns_packet_read_type_window(DnsPacket *p, Bitmap **types, size_t *start) {
0c4f37f0
ZJS
1526 assert(p);
1527 assert(types);
1528
1529 _cleanup_(rewind_dns_packet) DnsPacketRewinder rewinder = REWINDER_INIT(p);
1530 uint8_t window, length;
50f1e641 1531 const uint8_t *bitmap;
2ad613ad 1532 uint8_t bit = 0;
50f1e641 1533 bool found = false;
50f1e641
TG
1534 int r;
1535
50f1e641
TG
1536 r = bitmap_ensure_allocated(types);
1537 if (r < 0)
e18a3c73 1538 return r;
50f1e641
TG
1539
1540 r = dns_packet_read_uint8(p, &window, NULL);
1541 if (r < 0)
e18a3c73 1542 return r;
50f1e641
TG
1543
1544 r = dns_packet_read_uint8(p, &length, NULL);
1545 if (r < 0)
e18a3c73 1546 return r;
50f1e641
TG
1547
1548 if (length == 0 || length > 32)
1549 return -EBADMSG;
1550
1551 r = dns_packet_read(p, length, (const void **)&bitmap, NULL);
1552 if (r < 0)
e18a3c73 1553 return r;
50f1e641 1554
64ea42e9 1555 for (uint8_t i = 0; i < length; i++) {
50f1e641 1556 uint8_t bitmask = 1 << 7;
50f1e641
TG
1557
1558 if (!bitmap[i]) {
1559 found = false;
2ad613ad 1560 bit += 8;
50f1e641
TG
1561 continue;
1562 }
1563
1564 found = true;
1565
9f939335 1566 for (; bitmask; bit++, bitmask >>= 1)
50f1e641
TG
1567 if (bitmap[i] & bitmask) {
1568 uint16_t n;
1569
50f1e641
TG
1570 n = (uint16_t) window << 8 | (uint16_t) bit;
1571
8e6edc49
TG
1572 /* Ignore pseudo-types. see RFC4034 section 4.1.2 */
1573 if (dns_type_is_pseudo(n))
1574 continue;
1575
50f1e641
TG
1576 r = bitmap_set(*types, n);
1577 if (r < 0)
e18a3c73 1578 return r;
50f1e641 1579 }
50f1e641
TG
1580 }
1581
1582 if (!found)
1583 return -EBADMSG;
1584
1585 if (start)
e18a3c73
ZJS
1586 *start = rewinder.saved_rindex;
1587 CANCEL_REWINDER(rewinder);
50f1e641
TG
1588
1589 return 0;
50f1e641
TG
1590}
1591
89492aaf 1592static int dns_packet_read_type_windows(DnsPacket *p, Bitmap **types, size_t size, size_t *start) {
0c4f37f0 1593 _cleanup_(rewind_dns_packet) DnsPacketRewinder rewinder = REWINDER_INIT(p);
89492aaf
TG
1594 int r;
1595
370999c0 1596 while (p->rindex - rewinder.saved_rindex < size) {
89492aaf
TG
1597 r = dns_packet_read_type_window(p, types, NULL);
1598 if (r < 0)
e18a3c73 1599 return r;
89492aaf 1600
370999c0
YW
1601 assert(p->rindex >= rewinder.saved_rindex);
1602
89492aaf 1603 /* don't read past end of current RR */
370999c0 1604 if (p->rindex - rewinder.saved_rindex > size)
e18a3c73 1605 return -EBADMSG;
89492aaf
TG
1606 }
1607
370999c0 1608 if (p->rindex - rewinder.saved_rindex != size)
e18a3c73 1609 return -EBADMSG;
89492aaf
TG
1610
1611 if (start)
e18a3c73
ZJS
1612 *start = rewinder.saved_rindex;
1613 CANCEL_REWINDER(rewinder);
89492aaf
TG
1614
1615 return 0;
89492aaf
TG
1616}
1617
81b4d94d
LP
1618int dns_packet_read_key(
1619 DnsPacket *p,
1620 DnsResourceKey **ret,
82d39576 1621 bool *ret_cache_flush_or_qu,
81b4d94d
LP
1622 size_t *ret_start) {
1623
0c4f37f0
ZJS
1624 assert(p);
1625
1626 _cleanup_(rewind_dns_packet) DnsPacketRewinder rewinder = REWINDER_INIT(p);
faa133f3 1627 _cleanup_free_ char *name = NULL;
82d39576 1628 bool cache_flush_or_qu = false;
faa133f3 1629 uint16_t class, type;
74b2466e
LP
1630 int r;
1631
151226ab 1632 r = dns_packet_read_name(p, &name, true, NULL);
74b2466e 1633 if (r < 0)
e18a3c73 1634 return r;
74b2466e 1635
faa133f3 1636 r = dns_packet_read_uint16(p, &type, NULL);
74b2466e 1637 if (r < 0)
e18a3c73 1638 return r;
74b2466e 1639
faa133f3 1640 r = dns_packet_read_uint16(p, &class, NULL);
74b2466e 1641 if (r < 0)
e18a3c73 1642 return r;
74b2466e 1643
23502de3 1644 if (p->protocol == DNS_PROTOCOL_MDNS) {
82d39576 1645 /* See RFC6762, sections 5.4 and 10.2 */
23502de3 1646
82d39576
SB
1647 if (type != DNS_TYPE_OPT && (class & MDNS_RR_CACHE_FLUSH_OR_QU)) {
1648 class &= ~MDNS_RR_CACHE_FLUSH_OR_QU;
1649 cache_flush_or_qu = true;
d2579eec 1650 }
23502de3
DM
1651 }
1652
81b4d94d
LP
1653 if (ret) {
1654 DnsResourceKey *key;
faa133f3 1655
81b4d94d
LP
1656 key = dns_resource_key_new_consume(class, type, name);
1657 if (!key)
1658 return -ENOMEM;
1659
1660 TAKE_PTR(name);
1661 *ret = key;
1662 }
74b2466e 1663
82d39576
SB
1664 if (ret_cache_flush_or_qu)
1665 *ret_cache_flush_or_qu = cache_flush_or_qu;
81b4d94d
LP
1666 if (ret_start)
1667 *ret_start = rewinder.saved_rindex;
74b2466e 1668
81b4d94d 1669 CANCEL_REWINDER(rewinder);
74b2466e 1670 return 0;
74b2466e
LP
1671}
1672
afbc4f26
ZJS
1673static bool loc_size_ok(uint8_t size) {
1674 uint8_t m = size >> 4, e = size & 0xF;
1675
1676 return m <= 9 && e <= 9 && (m > 0 || e == 0);
1677}
1678
81b4d94d
LP
1679int dns_packet_read_rr(
1680 DnsPacket *p,
1681 DnsResourceRecord **ret,
1682 bool *ret_cache_flush,
1683 size_t *ret_start) {
1684
0c4f37f0
ZJS
1685 assert(p);
1686
1687 _cleanup_(rewind_dns_packet) DnsPacketRewinder rewinder = REWINDER_INIT(p);
faa133f3
LP
1688 _cleanup_(dns_resource_record_unrefp) DnsResourceRecord *rr = NULL;
1689 _cleanup_(dns_resource_key_unrefp) DnsResourceKey *key = NULL;
e18a3c73 1690 size_t offset;
74b2466e 1691 uint16_t rdlength;
d2579eec 1692 bool cache_flush;
74b2466e
LP
1693 int r;
1694
d2579eec 1695 r = dns_packet_read_key(p, &key, &cache_flush, NULL);
74b2466e 1696 if (r < 0)
e18a3c73 1697 return r;
74b2466e 1698
e18a3c73
ZJS
1699 if (!dns_class_is_valid_rr(key->class) || !dns_type_is_valid_rr(key->type))
1700 return -EBADMSG;
0e2bcd6a 1701
faa133f3 1702 rr = dns_resource_record_new(key);
e18a3c73
ZJS
1703 if (!rr)
1704 return -ENOMEM;
faa133f3 1705
74b2466e
LP
1706 r = dns_packet_read_uint32(p, &rr->ttl, NULL);
1707 if (r < 0)
e18a3c73 1708 return r;
74b2466e 1709
0d0b52d7
LP
1710 /* RFC 2181, Section 8, suggests to
1711 * treat a TTL with the MSB set as a zero TTL. */
1712 if (rr->ttl & UINT32_C(0x80000000))
1713 rr->ttl = 0;
1714
74b2466e
LP
1715 r = dns_packet_read_uint16(p, &rdlength, NULL);
1716 if (r < 0)
e18a3c73 1717 return r;
74b2466e 1718
370999c0 1719 if (rdlength > p->size - p->rindex)
e18a3c73 1720 return -EBADMSG;
74b2466e
LP
1721
1722 offset = p->rindex;
1723
faa133f3 1724 switch (rr->key->type) {
74b2466e 1725
9c92ce6d
LP
1726 case DNS_TYPE_SRV:
1727 r = dns_packet_read_uint16(p, &rr->srv.priority, NULL);
1728 if (r < 0)
e18a3c73 1729 return r;
9c92ce6d
LP
1730 r = dns_packet_read_uint16(p, &rr->srv.weight, NULL);
1731 if (r < 0)
e18a3c73 1732 return r;
9c92ce6d
LP
1733 r = dns_packet_read_uint16(p, &rr->srv.port, NULL);
1734 if (r < 0)
e18a3c73 1735 return r;
151226ab 1736 r = dns_packet_read_name(p, &rr->srv.name, true, NULL);
9c92ce6d
LP
1737 break;
1738
74b2466e
LP
1739 case DNS_TYPE_PTR:
1740 case DNS_TYPE_NS:
1741 case DNS_TYPE_CNAME:
8ac4e9e1 1742 case DNS_TYPE_DNAME:
151226ab 1743 r = dns_packet_read_name(p, &rr->ptr.name, true, NULL);
74b2466e
LP
1744 break;
1745
1746 case DNS_TYPE_HINFO:
1747 r = dns_packet_read_string(p, &rr->hinfo.cpu, NULL);
1748 if (r < 0)
e18a3c73 1749 return r;
74b2466e
LP
1750
1751 r = dns_packet_read_string(p, &rr->hinfo.os, NULL);
1752 break;
1753
9de3e329 1754 case DNS_TYPE_SPF: /* exactly the same as TXT */
1ccda9b7
LP
1755 case DNS_TYPE_TXT:
1756 if (rdlength <= 0) {
ebb779dc
DR
1757 r = dns_txt_item_new_empty(&rr->txt.items);
1758 if (r < 0)
1759 return r;
1ccda9b7 1760 } else {
2001c805
LP
1761 DnsTxtItem *last = NULL;
1762
370999c0 1763 while (p->rindex - offset < rdlength) {
2001c805
LP
1764 DnsTxtItem *i;
1765 const void *data;
1766 size_t sz;
2e276efc 1767
2001c805 1768 r = dns_packet_read_raw_string(p, &data, &sz, NULL);
1ccda9b7 1769 if (r < 0)
2001c805 1770 return r;
1ccda9b7 1771
2001c805
LP
1772 i = malloc0(offsetof(DnsTxtItem, data) + sz + 1); /* extra NUL byte at the end */
1773 if (!i)
1774 return -ENOMEM;
1775
1776 memcpy(i->data, data, sz);
1777 i->length = sz;
1778
1779 LIST_INSERT_AFTER(items, rr->txt.items, last, i);
1780 last = i;
1ccda9b7 1781 }
6a6fc3df
LP
1782 }
1783
1784 r = 0;
2e276efc 1785 break;
2e276efc 1786
74b2466e 1787 case DNS_TYPE_A:
623a4c97 1788 r = dns_packet_read_blob(p, &rr->a.in_addr, sizeof(struct in_addr), NULL);
74b2466e
LP
1789 break;
1790
1791 case DNS_TYPE_AAAA:
623a4c97 1792 r = dns_packet_read_blob(p, &rr->aaaa.in6_addr, sizeof(struct in6_addr), NULL);
74b2466e
LP
1793 break;
1794
7e8e0422 1795 case DNS_TYPE_SOA:
151226ab 1796 r = dns_packet_read_name(p, &rr->soa.mname, true, NULL);
7e8e0422 1797 if (r < 0)
e18a3c73 1798 return r;
7e8e0422 1799
151226ab 1800 r = dns_packet_read_name(p, &rr->soa.rname, true, NULL);
7e8e0422 1801 if (r < 0)
e18a3c73 1802 return r;
7e8e0422
LP
1803
1804 r = dns_packet_read_uint32(p, &rr->soa.serial, NULL);
1805 if (r < 0)
e18a3c73 1806 return r;
7e8e0422
LP
1807
1808 r = dns_packet_read_uint32(p, &rr->soa.refresh, NULL);
1809 if (r < 0)
e18a3c73 1810 return r;
7e8e0422
LP
1811
1812 r = dns_packet_read_uint32(p, &rr->soa.retry, NULL);
1813 if (r < 0)
e18a3c73 1814 return r;
7e8e0422
LP
1815
1816 r = dns_packet_read_uint32(p, &rr->soa.expire, NULL);
1817 if (r < 0)
e18a3c73 1818 return r;
7e8e0422
LP
1819
1820 r = dns_packet_read_uint32(p, &rr->soa.minimum, NULL);
1821 break;
1822
623a4c97 1823 case DNS_TYPE_MX:
946c7094
ZJS
1824 r = dns_packet_read_uint16(p, &rr->mx.priority, NULL);
1825 if (r < 0)
e18a3c73 1826 return r;
946c7094 1827
151226ab 1828 r = dns_packet_read_name(p, &rr->mx.exchange, true, NULL);
946c7094
ZJS
1829 break;
1830
0dae31d4
ZJS
1831 case DNS_TYPE_LOC: {
1832 uint8_t t;
1833 size_t pos;
1834
1835 r = dns_packet_read_uint8(p, &t, &pos);
1836 if (r < 0)
e18a3c73 1837 return r;
0dae31d4
ZJS
1838
1839 if (t == 0) {
1840 rr->loc.version = t;
1841
1842 r = dns_packet_read_uint8(p, &rr->loc.size, NULL);
1843 if (r < 0)
e18a3c73 1844 return r;
0dae31d4 1845
e18a3c73
ZJS
1846 if (!loc_size_ok(rr->loc.size))
1847 return -EBADMSG;
afbc4f26 1848
0dae31d4
ZJS
1849 r = dns_packet_read_uint8(p, &rr->loc.horiz_pre, NULL);
1850 if (r < 0)
e18a3c73 1851 return r;
0dae31d4 1852
e18a3c73
ZJS
1853 if (!loc_size_ok(rr->loc.horiz_pre))
1854 return -EBADMSG;
afbc4f26 1855
0dae31d4
ZJS
1856 r = dns_packet_read_uint8(p, &rr->loc.vert_pre, NULL);
1857 if (r < 0)
e18a3c73 1858 return r;
0dae31d4 1859
e18a3c73
ZJS
1860 if (!loc_size_ok(rr->loc.vert_pre))
1861 return -EBADMSG;
afbc4f26 1862
0dae31d4
ZJS
1863 r = dns_packet_read_uint32(p, &rr->loc.latitude, NULL);
1864 if (r < 0)
e18a3c73 1865 return r;
0dae31d4
ZJS
1866
1867 r = dns_packet_read_uint32(p, &rr->loc.longitude, NULL);
1868 if (r < 0)
e18a3c73 1869 return r;
0dae31d4
ZJS
1870
1871 r = dns_packet_read_uint32(p, &rr->loc.altitude, NULL);
1872 if (r < 0)
e18a3c73 1873 return r;
0dae31d4
ZJS
1874
1875 break;
1876 } else {
1877 dns_packet_rewind(p, pos);
52e085af
ZJS
1878 rr->unparsable = true;
1879 goto unparsable;
0dae31d4
ZJS
1880 }
1881 }
1882
abf126a3
TG
1883 case DNS_TYPE_DS:
1884 r = dns_packet_read_uint16(p, &rr->ds.key_tag, NULL);
1885 if (r < 0)
e18a3c73 1886 return r;
abf126a3
TG
1887
1888 r = dns_packet_read_uint8(p, &rr->ds.algorithm, NULL);
1889 if (r < 0)
e18a3c73 1890 return r;
abf126a3
TG
1891
1892 r = dns_packet_read_uint8(p, &rr->ds.digest_type, NULL);
1893 if (r < 0)
e18a3c73 1894 return r;
abf126a3 1895
8a0f6d1f
SL
1896 if (rdlength < 4)
1897 return -EBADMSG;
1898
f5430a3e
LP
1899 r = dns_packet_read_memdup(p, rdlength - 4,
1900 &rr->ds.digest, &rr->ds.digest_size,
1901 NULL);
abf126a3 1902 if (r < 0)
e18a3c73 1903 return r;
abf126a3 1904
e18a3c73 1905 if (rr->ds.digest_size <= 0)
f1d178cc
TG
1906 /* the accepted size depends on the algorithm, but for now
1907 just ensure that the value is greater than zero */
e18a3c73 1908 return -EBADMSG;
f1d178cc 1909
abf126a3 1910 break;
d75acfb0 1911
623a4c97 1912 case DNS_TYPE_SSHFP:
42cc2eeb
LP
1913 r = dns_packet_read_uint8(p, &rr->sshfp.algorithm, NULL);
1914 if (r < 0)
e18a3c73 1915 return r;
42cc2eeb
LP
1916
1917 r = dns_packet_read_uint8(p, &rr->sshfp.fptype, NULL);
1918 if (r < 0)
e18a3c73 1919 return r;
42cc2eeb 1920
8a0f6d1f
SL
1921 if (rdlength < 2)
1922 return -EBADMSG;
1923
f5430a3e 1924 r = dns_packet_read_memdup(p, rdlength - 2,
549c1a25 1925 &rr->sshfp.fingerprint, &rr->sshfp.fingerprint_size,
f5430a3e 1926 NULL);
f1d178cc 1927
e18a3c73 1928 if (rr->sshfp.fingerprint_size <= 0)
f1d178cc
TG
1929 /* the accepted size depends on the algorithm, but for now
1930 just ensure that the value is greater than zero */
e18a3c73 1931 return -EBADMSG;
f1d178cc 1932
8db0d2f5
ZJS
1933 break;
1934
f91dc240
LP
1935 case DNS_TYPE_DNSKEY:
1936 r = dns_packet_read_uint16(p, &rr->dnskey.flags, NULL);
8db0d2f5 1937 if (r < 0)
e18a3c73 1938 return r;
8db0d2f5 1939
f91dc240 1940 r = dns_packet_read_uint8(p, &rr->dnskey.protocol, NULL);
8db0d2f5 1941 if (r < 0)
e18a3c73 1942 return r;
8db0d2f5 1943
8db0d2f5
ZJS
1944 r = dns_packet_read_uint8(p, &rr->dnskey.algorithm, NULL);
1945 if (r < 0)
e18a3c73 1946 return r;
8db0d2f5 1947
8a0f6d1f
SL
1948 if (rdlength < 4)
1949 return -EBADMSG;
1950
f5430a3e
LP
1951 r = dns_packet_read_memdup(p, rdlength - 4,
1952 &rr->dnskey.key, &rr->dnskey.key_size,
1953 NULL);
f1d178cc 1954
e18a3c73 1955 if (rr->dnskey.key_size <= 0)
f1d178cc
TG
1956 /* the accepted size depends on the algorithm, but for now
1957 just ensure that the value is greater than zero */
e18a3c73 1958 return -EBADMSG;
f1d178cc 1959
42cc2eeb
LP
1960 break;
1961
151226ab
ZJS
1962 case DNS_TYPE_RRSIG:
1963 r = dns_packet_read_uint16(p, &rr->rrsig.type_covered, NULL);
1964 if (r < 0)
e18a3c73 1965 return r;
151226ab
ZJS
1966
1967 r = dns_packet_read_uint8(p, &rr->rrsig.algorithm, NULL);
1968 if (r < 0)
e18a3c73 1969 return r;
151226ab
ZJS
1970
1971 r = dns_packet_read_uint8(p, &rr->rrsig.labels, NULL);
1972 if (r < 0)
e18a3c73 1973 return r;
151226ab
ZJS
1974
1975 r = dns_packet_read_uint32(p, &rr->rrsig.original_ttl, NULL);
1976 if (r < 0)
e18a3c73 1977 return r;
151226ab
ZJS
1978
1979 r = dns_packet_read_uint32(p, &rr->rrsig.expiration, NULL);
1980 if (r < 0)
e18a3c73 1981 return r;
151226ab
ZJS
1982
1983 r = dns_packet_read_uint32(p, &rr->rrsig.inception, NULL);
1984 if (r < 0)
e18a3c73 1985 return r;
151226ab
ZJS
1986
1987 r = dns_packet_read_uint16(p, &rr->rrsig.key_tag, NULL);
1988 if (r < 0)
e18a3c73 1989 return r;
151226ab
ZJS
1990
1991 r = dns_packet_read_name(p, &rr->rrsig.signer, false, NULL);
1992 if (r < 0)
e18a3c73 1993 return r;
151226ab 1994
370999c0 1995 if (rdlength < p->rindex - offset)
8a0f6d1f
SL
1996 return -EBADMSG;
1997
f5430a3e
LP
1998 r = dns_packet_read_memdup(p, offset + rdlength - p->rindex,
1999 &rr->rrsig.signature, &rr->rrsig.signature_size,
2000 NULL);
f1d178cc 2001
e18a3c73 2002 if (rr->rrsig.signature_size <= 0)
f1d178cc
TG
2003 /* the accepted size depends on the algorithm, but for now
2004 just ensure that the value is greater than zero */
e18a3c73 2005 return -EBADMSG;
f1d178cc 2006
151226ab
ZJS
2007 break;
2008
d84e543d
DM
2009 case DNS_TYPE_NSEC: {
2010
2011 /*
5238e957 2012 * RFC6762, section 18.14 explicitly states mDNS should use name compression.
d84e543d
DM
2013 * This contradicts RFC3845, section 2.1.1
2014 */
2015
2016 bool allow_compressed = p->protocol == DNS_PROTOCOL_MDNS;
2017
2018 r = dns_packet_read_name(p, &rr->nsec.next_domain_name, allow_compressed, NULL);
50f1e641 2019 if (r < 0)
e18a3c73 2020 return r;
50f1e641 2021
370999c0
YW
2022 if (rdlength < p->rindex - offset)
2023 return -EBADMSG;
2024
89492aaf 2025 r = dns_packet_read_type_windows(p, &rr->nsec.types, offset + rdlength - p->rindex, NULL);
89492aaf 2026
09eaf68c
TG
2027 /* We accept empty NSEC bitmaps. The bit indicating the presence of the NSEC record itself
2028 * is redundant and in e.g., RFC4956 this fact is used to define a use for NSEC records
2029 * without the NSEC bit set. */
50f1e641
TG
2030
2031 break;
d84e543d 2032 }
5d45a880
TG
2033 case DNS_TYPE_NSEC3: {
2034 uint8_t size;
2035
2036 r = dns_packet_read_uint8(p, &rr->nsec3.algorithm, NULL);
2037 if (r < 0)
e18a3c73 2038 return r;
5d45a880
TG
2039
2040 r = dns_packet_read_uint8(p, &rr->nsec3.flags, NULL);
2041 if (r < 0)
e18a3c73 2042 return r;
5d45a880
TG
2043
2044 r = dns_packet_read_uint16(p, &rr->nsec3.iterations, NULL);
2045 if (r < 0)
e18a3c73 2046 return r;
5d45a880 2047
f1d178cc 2048 /* this may be zero */
5d45a880
TG
2049 r = dns_packet_read_uint8(p, &size, NULL);
2050 if (r < 0)
e18a3c73 2051 return r;
5d45a880 2052
f5430a3e 2053 r = dns_packet_read_memdup(p, size, &rr->nsec3.salt, &rr->nsec3.salt_size, NULL);
5d45a880 2054 if (r < 0)
e18a3c73 2055 return r;
5d45a880 2056
5d45a880
TG
2057 r = dns_packet_read_uint8(p, &size, NULL);
2058 if (r < 0)
e18a3c73 2059 return r;
5d45a880 2060
e18a3c73
ZJS
2061 if (size <= 0)
2062 return -EBADMSG;
f1d178cc 2063
e18a3c73
ZJS
2064 r = dns_packet_read_memdup(p, size,
2065 &rr->nsec3.next_hashed_name, &rr->nsec3.next_hashed_name_size,
2066 NULL);
5d45a880 2067 if (r < 0)
e18a3c73 2068 return r;
5d45a880 2069
370999c0
YW
2070 if (rdlength < p->rindex - offset)
2071 return -EBADMSG;
2072
6b9308d1 2073 r = dns_packet_read_type_windows(p, &rr->nsec3.types, offset + rdlength - p->rindex, NULL);
5d45a880 2074
0bbd72b2
TG
2075 /* empty non-terminals can have NSEC3 records, so empty bitmaps are allowed */
2076
5d45a880
TG
2077 break;
2078 }
d75acfb0 2079
48d45d2b
ZJS
2080 case DNS_TYPE_TLSA:
2081 r = dns_packet_read_uint8(p, &rr->tlsa.cert_usage, NULL);
2082 if (r < 0)
e18a3c73 2083 return r;
48d45d2b
ZJS
2084
2085 r = dns_packet_read_uint8(p, &rr->tlsa.selector, NULL);
2086 if (r < 0)
e18a3c73 2087 return r;
48d45d2b
ZJS
2088
2089 r = dns_packet_read_uint8(p, &rr->tlsa.matching_type, NULL);
2090 if (r < 0)
e18a3c73 2091 return r;
48d45d2b 2092
8a0f6d1f
SL
2093 if (rdlength < 3)
2094 return -EBADMSG;
2095
48d45d2b
ZJS
2096 r = dns_packet_read_memdup(p, rdlength - 3,
2097 &rr->tlsa.data, &rr->tlsa.data_size,
2098 NULL);
e18a3c73
ZJS
2099
2100 if (rr->tlsa.data_size <= 0)
48d45d2b
ZJS
2101 /* the accepted size depends on the algorithm, but for now
2102 just ensure that the value is greater than zero */
e18a3c73 2103 return -EBADMSG;
48d45d2b
ZJS
2104
2105 break;
2106
95052df3
ZJS
2107 case DNS_TYPE_CAA:
2108 r = dns_packet_read_uint8(p, &rr->caa.flags, NULL);
2109 if (r < 0)
2110 return r;
2111
2112 r = dns_packet_read_string(p, &rr->caa.tag, NULL);
2113 if (r < 0)
2114 return r;
2115
370999c0 2116 if (rdlength < p->rindex - offset)
8a0f6d1f
SL
2117 return -EBADMSG;
2118
95052df3
ZJS
2119 r = dns_packet_read_memdup(p,
2120 rdlength + offset - p->rindex,
2121 &rr->caa.value, &rr->caa.value_size, NULL);
48d45d2b
ZJS
2122
2123 break;
2124
d75acfb0 2125 case DNS_TYPE_OPT: /* we only care about the header of OPT for now. */
d93a16b8 2126 case DNS_TYPE_OPENPGPKEY:
74b2466e 2127 default:
52e085af 2128 unparsable:
a43a068a 2129 r = dns_packet_read_memdup(p, rdlength, &rr->generic.data, &rr->generic.data_size, NULL);
e18a3c73 2130
74b2466e
LP
2131 break;
2132 }
2133 if (r < 0)
e18a3c73 2134 return r;
370999c0 2135 if (p->rindex - offset != rdlength)
e18a3c73 2136 return -EBADMSG;
74b2466e 2137
81b4d94d
LP
2138 if (ret)
2139 *ret = TAKE_PTR(rr);
d2579eec
LP
2140 if (ret_cache_flush)
2141 *ret_cache_flush = cache_flush;
81b4d94d
LP
2142 if (ret_start)
2143 *ret_start = rewinder.saved_rindex;
74b2466e 2144
81b4d94d 2145 CANCEL_REWINDER(rewinder);
74b2466e 2146 return 0;
74b2466e
LP
2147}
2148
c3f7000e
LP
2149static bool opt_is_good(DnsResourceRecord *rr, bool *rfc6975) {
2150 const uint8_t* p;
2151 bool found_dau_dhu_n3u = false;
2152 size_t l;
2153
2154 /* Checks whether the specified OPT RR is well-formed and whether it contains RFC6975 data (which is not OK in
2155 * a reply). */
2156
2157 assert(rr);
2158 assert(rr->key->type == DNS_TYPE_OPT);
2159
2160 /* Check that the version is 0 */
b30bf55d
LP
2161 if (((rr->ttl >> 16) & UINT32_C(0xFF)) != 0) {
2162 *rfc6975 = false;
2163 return true; /* if it's not version 0, it's OK, but we will ignore the OPT field contents */
2164 }
c3f7000e
LP
2165
2166 p = rr->opt.data;
a43a068a 2167 l = rr->opt.data_size;
c3f7000e
LP
2168 while (l > 0) {
2169 uint16_t option_code, option_length;
2170
2171 /* At least four bytes for OPTION-CODE and OPTION-LENGTH are required */
2172 if (l < 4U)
2173 return false;
2174
2175 option_code = unaligned_read_be16(p);
2176 option_length = unaligned_read_be16(p + 2);
2177
2178 if (l < option_length + 4U)
2179 return false;
2180
2181 /* RFC 6975 DAU, DHU or N3U fields found. */
2182 if (IN_SET(option_code, 5, 6, 7))
2183 found_dau_dhu_n3u = true;
2184
2185 p += option_length + 4U;
2186 l -= option_length + 4U;
2187 }
2188
2189 *rfc6975 = found_dau_dhu_n3u;
2190 return true;
2191}
2192
4a49e560 2193static int dns_packet_extract_question(DnsPacket *p, DnsQuestion **ret_question) {
faa133f3 2194 _cleanup_(dns_question_unrefp) DnsQuestion *question = NULL;
64ea42e9 2195 unsigned n;
74b2466e
LP
2196 int r;
2197
3cb10d3a 2198 n = DNS_PACKET_QDCOUNT(p);
faa133f3
LP
2199 if (n > 0) {
2200 question = dns_question_new(n);
e18a3c73
ZJS
2201 if (!question)
2202 return -ENOMEM;
74b2466e 2203
2d34cf0c
ZJS
2204 _cleanup_set_free_ Set *keys = NULL; /* references to keys are kept by Question */
2205
2206 keys = set_new(&dns_resource_key_hash_ops);
2207 if (!keys)
2208 return log_oom();
2209
2210 r = set_reserve(keys, n * 2); /* Higher multipliers give slightly higher efficiency through
e9665ac2 2211 * hash collisions, but the gains quickly drop off after 2. */
2d34cf0c
ZJS
2212 if (r < 0)
2213 return r;
2214
64ea42e9 2215 for (unsigned i = 0; i < n; i++) {
faa133f3 2216 _cleanup_(dns_resource_key_unrefp) DnsResourceKey *key = NULL;
82d39576 2217 bool qu;
74b2466e 2218
82d39576 2219 r = dns_packet_read_key(p, &key, &qu, NULL);
faa133f3 2220 if (r < 0)
e18a3c73 2221 return r;
74b2466e 2222
e18a3c73
ZJS
2223 if (!dns_type_is_valid_query(key->type))
2224 return -EBADMSG;
c463eb78 2225
2d34cf0c
ZJS
2226 r = set_put(keys, key);
2227 if (r < 0)
2228 return r;
2229 if (r == 0)
2230 /* Already in the Question, let's skip */
2231 continue;
2232
82d39576 2233 r = dns_question_add_raw(question, key, qu ? DNS_QUESTION_WANTS_UNICAST_REPLY : 0);
faa133f3 2234 if (r < 0)
e18a3c73 2235 return r;
faa133f3
LP
2236 }
2237 }
322345fd 2238
1cc6c93a
YW
2239 *ret_question = TAKE_PTR(question);
2240
4a49e560
ZJS
2241 return 0;
2242}
2243
2244static int dns_packet_extract_answer(DnsPacket *p, DnsAnswer **ret_answer) {
2245 _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL;
64ea42e9 2246 unsigned n;
4a49e560
ZJS
2247 _cleanup_(dns_resource_record_unrefp) DnsResourceRecord *previous = NULL;
2248 bool bad_opt = false;
2249 int r;
2250
faa133f3 2251 n = DNS_PACKET_RRCOUNT(p);
4a49e560
ZJS
2252 if (n == 0)
2253 return 0;
c3f7000e 2254
4a49e560
ZJS
2255 answer = dns_answer_new(n);
2256 if (!answer)
2257 return -ENOMEM;
322345fd 2258
64ea42e9 2259 for (unsigned i = 0; i < n; i++) {
4a49e560
ZJS
2260 _cleanup_(dns_resource_record_unrefp) DnsResourceRecord *rr = NULL;
2261 bool cache_flush = false;
93748b26 2262 size_t start;
322345fd 2263
729c5deb 2264 if (p->rindex == p->size && p->opt) {
18674159
LP
2265 /* If we reached the end of the packet already, but there are still more RRs
2266 * declared, then that's a corrupt packet. Let's accept the packet anyway, since it's
2267 * apparently a common bug in routers. Let's however suppress OPT support in this
2268 * case, so that we force the rest of the logic into lowest DNS baseline support. Or
2269 * to say this differently: if the DNS server doesn't even get the RR counts right,
2270 * it's highly unlikely it gets EDNS right. */
2271 log_debug("More resource records declared in packet than included, suppressing OPT.");
2272 bad_opt = true;
2273 break;
2274 }
2275
93748b26 2276 r = dns_packet_read_rr(p, &rr, &cache_flush, &start);
4a49e560
ZJS
2277 if (r < 0)
2278 return r;
322345fd 2279
4a49e560
ZJS
2280 /* Try to reduce memory usage a bit */
2281 if (previous)
2282 dns_resource_key_reduce(&rr->key, &previous->key);
f57e3cd5 2283
4a49e560
ZJS
2284 if (rr->key->type == DNS_TYPE_OPT) {
2285 bool has_rfc6975;
c3f7000e 2286
4a49e560
ZJS
2287 if (p->opt || bad_opt) {
2288 /* Multiple OPT RRs? if so, let's ignore all, because there's
2289 * something wrong with the server, and if one is valid we wouldn't
2290 * know which one. */
2291 log_debug("Multiple OPT RRs detected, ignoring all.");
2292 bad_opt = true;
2293 continue;
2294 }
e6b57b37 2295
4a49e560
ZJS
2296 if (!dns_name_is_root(dns_resource_key_name(rr->key))) {
2297 /* If the OPT RR is not owned by the root domain, then it is bad,
2298 * let's ignore it. */
2299 log_debug("OPT RR is not owned by root domain, ignoring.");
2300 bad_opt = true;
2301 continue;
2302 }
c3f7000e 2303
4a49e560
ZJS
2304 if (i < DNS_PACKET_ANCOUNT(p) + DNS_PACKET_NSCOUNT(p)) {
2305 /* OPT RR is in the wrong section? Some Belkin routers do this. This
2306 * is a hint the EDNS implementation is borked, like the Belkin one
2307 * is, hence ignore it. */
2308 log_debug("OPT RR in wrong section, ignoring.");
2309 bad_opt = true;
2310 continue;
2311 }
2312
2313 if (!opt_is_good(rr, &has_rfc6975)) {
2314 log_debug("Malformed OPT RR, ignoring.");
2315 bad_opt = true;
2316 continue;
2317 }
2318
2319 if (DNS_PACKET_QR(p)) {
2320 /* Additional checks for responses */
2321
d7a0f1f4 2322 if (!DNS_RESOURCE_RECORD_OPT_VERSION_SUPPORTED(rr))
4a49e560
ZJS
2323 /* If this is a reply and we don't know the EDNS version
2324 * then something is weird... */
d7a0f1f4
FS
2325 return log_debug_errno(SYNTHETIC_ERRNO(EBADMSG),
2326 "EDNS version newer that our request, bad server.");
ff7febd5 2327
4a49e560
ZJS
2328 if (has_rfc6975) {
2329 /* If the OPT RR contains RFC6975 algorithm data, then this
2330 * is indication that the server just copied the OPT it got
2331 * from us (which contained that data) back into the reply.
2332 * If so, then it doesn't properly support EDNS, as RFC6975
2333 * makes it very clear that the algorithm data should only
2334 * be contained in questions, never in replies. Crappy
2335 * Belkin routers copy the OPT data for example, hence let's
2336 * detect this so that we downgrade early. */
dffb8277 2337 log_debug("OPT RR contains RFC6975 data, ignoring.");
c3f7000e
LP
2338 bad_opt = true;
2339 continue;
2340 }
4a49e560 2341 }
e6b57b37 2342
4a49e560 2343 p->opt = dns_resource_record_ref(rr);
93748b26
LP
2344 p->opt_start = start;
2345 assert(p->rindex >= start);
2346 p->opt_size = p->rindex - start;
4a49e560 2347 } else {
fa4e74b8
LP
2348 DnsAnswerFlags flags = 0;
2349
2350 if (p->protocol == DNS_PROTOCOL_MDNS && !cache_flush)
2351 flags |= DNS_ANSWER_SHARED_OWNER;
2352
2353 /* According to RFC 4795, section 2.9. only the RRs from the Answer section shall be
2354 * cached. Hence mark only those RRs as cacheable by default, but not the ones from
82af03c2
VCS
2355 * the Additional or Authority sections.
2356 * This restriction does not apply to mDNS records (RFC 6762). */
fa4e74b8
LP
2357 if (i < DNS_PACKET_ANCOUNT(p))
2358 flags |= DNS_ANSWER_CACHEABLE|DNS_ANSWER_SECTION_ANSWER;
2359 else if (i < DNS_PACKET_ANCOUNT(p) + DNS_PACKET_NSCOUNT(p))
2360 flags |= DNS_ANSWER_SECTION_AUTHORITY;
82af03c2 2361 else {
fa4e74b8 2362 flags |= DNS_ANSWER_SECTION_ADDITIONAL;
82af03c2
VCS
2363 if (p->protocol == DNS_PROTOCOL_MDNS)
2364 flags |= DNS_ANSWER_CACHEABLE;
2365 }
4a49e560 2366
04617bf8 2367 r = dns_answer_add(answer, rr, p->ifindex, flags, NULL);
4a49e560
ZJS
2368 if (r < 0)
2369 return r;
2370 }
d75acfb0 2371
b87fbe5f 2372 /* Remember this RR, so that we can potentially merge its ->key object with the
4a49e560
ZJS
2373 * next RR. Note that we only do this if we actually decided to keep the RR around.
2374 */
7daeec3e 2375 DNS_RR_REPLACE(previous, dns_resource_record_ref(rr));
4a49e560 2376 }
105e1512 2377
18674159 2378 if (bad_opt) {
4a49e560 2379 p->opt = dns_resource_record_unref(p->opt);
18674159
LP
2380 p->opt_start = p->opt_size = SIZE_MAX;
2381 }
105e1512 2382
1cc6c93a
YW
2383 *ret_answer = TAKE_PTR(answer);
2384
4a49e560
ZJS
2385 return 0;
2386}
ebc8a106 2387
4a49e560 2388int dns_packet_extract(DnsPacket *p) {
0c4f37f0 2389 assert(p);
c3f7000e 2390
4a49e560
ZJS
2391 if (p->extracted)
2392 return 0;
2393
0c4f37f0
ZJS
2394 _cleanup_(dns_question_unrefp) DnsQuestion *question = NULL;
2395 _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL;
fc44acc0 2396 _unused_ _cleanup_(rewind_dns_packet) DnsPacketRewinder rewinder = REWINDER_INIT(p);
0c4f37f0
ZJS
2397 int r;
2398
4a49e560
ZJS
2399 dns_packet_rewind(p, DNS_PACKET_HEADER_SIZE);
2400
2401 r = dns_packet_extract_question(p, &question);
2402 if (r < 0)
2403 return r;
2404
2405 r = dns_packet_extract_answer(p, &answer);
2406 if (r < 0)
2407 return r;
322345fd 2408
894c7b77
LP
2409 if (p->rindex < p->size) {
2410 log_debug("Trailing garbage in packet, suppressing OPT.");
2411 p->opt = dns_resource_record_unref(p->opt);
2412 p->opt_start = p->opt_size = SIZE_MAX;
2413 }
2414
1cc6c93a
YW
2415 p->question = TAKE_PTR(question);
2416 p->answer = TAKE_PTR(answer);
a4076574
LP
2417 p->extracted = true;
2418
e18a3c73
ZJS
2419 /* no CANCEL, always rewind */
2420 return 0;
322345fd
LP
2421}
2422
8af5b883
LP
2423int dns_packet_is_reply_for(DnsPacket *p, const DnsResourceKey *key) {
2424 int r;
2425
2426 assert(p);
2427 assert(key);
2428
2429 /* Checks if the specified packet is a reply for the specified
2430 * key and the specified key is the only one in the question
2431 * section. */
2432
2433 if (DNS_PACKET_QR(p) != 1)
2434 return 0;
2435
2436 /* Let's unpack the packet, if that hasn't happened yet. */
2437 r = dns_packet_extract(p);
2438 if (r < 0)
2439 return r;
2440
a924f43f
EV
2441 if (!p->question)
2442 return 0;
2443
8af5b883
LP
2444 if (p->question->n_keys != 1)
2445 return 0;
2446
ab715ddb 2447 return dns_resource_key_equal(dns_question_first_key(p->question), key);
8af5b883
LP
2448}
2449
93748b26
LP
2450int dns_packet_patch_max_udp_size(DnsPacket *p, uint16_t max_udp_size) {
2451 assert(p);
2452 assert(max_udp_size >= DNS_PACKET_UNICAST_SIZE_MAX);
2453
f5fbe71d 2454 if (p->opt_start == SIZE_MAX) /* No OPT section, nothing to patch */
93748b26
LP
2455 return 0;
2456
f5fbe71d 2457 assert(p->opt_size != SIZE_MAX);
93748b26
LP
2458 assert(p->opt_size >= 5);
2459
2460 unaligned_write_be16(DNS_PACKET_DATA(p) + p->opt_start + 3, max_udp_size);
2461 return 1;
2462}
2463
81b4d94d 2464static int patch_rr(DnsPacket *p, usec_t age) {
0c4f37f0 2465 _cleanup_(rewind_dns_packet) DnsPacketRewinder rewinder = REWINDER_INIT(p);
81b4d94d
LP
2466 size_t ttl_index;
2467 uint32_t ttl;
2468 uint16_t type, rdlength;
2469 int r;
2470
0f1f933b 2471 /* Patches the RR at the current rindex, subtracts the specified time from the TTL */
81b4d94d
LP
2472
2473 r = dns_packet_read_name(p, NULL, true, NULL);
2474 if (r < 0)
2475 return r;
2476
2477 r = dns_packet_read_uint16(p, &type, NULL);
2478 if (r < 0)
2479 return r;
2480
2481 r = dns_packet_read_uint16(p, NULL, NULL);
2482 if (r < 0)
2483 return r;
2484
2485 r = dns_packet_read_uint32(p, &ttl, &ttl_index);
2486 if (r < 0)
2487 return r;
2488
2489 if (type != DNS_TYPE_OPT) { /* The TTL of the OPT field is not actually a TTL, skip it */
2490 ttl = LESS_BY(ttl * USEC_PER_SEC, age) / USEC_PER_SEC;
2491 unaligned_write_be32(DNS_PACKET_DATA(p) + ttl_index, ttl);
2492 }
2493
2494 r = dns_packet_read_uint16(p, &rdlength, NULL);
2495 if (r < 0)
2496 return r;
2497
2498 r = dns_packet_read(p, rdlength, NULL, NULL);
2499 if (r < 0)
2500 return r;
2501
2502 CANCEL_REWINDER(rewinder);
2503 return 0;
2504}
2505
2506int dns_packet_patch_ttls(DnsPacket *p, usec_t timestamp) {
81b4d94d
LP
2507 assert(p);
2508 assert(timestamp_is_set(timestamp));
2509
2510 /* Adjusts all TTLs in the packet by subtracting the time difference between now and the specified timestamp */
2511
fc44acc0 2512 _unused_ _cleanup_(rewind_dns_packet) DnsPacketRewinder rewinder = REWINDER_INIT(p);
64ea42e9 2513 unsigned n;
0c4f37f0
ZJS
2514 usec_t k;
2515 int r;
2516
ba4e0427 2517 k = now(CLOCK_BOOTTIME);
81b4d94d
LP
2518 assert(k >= timestamp);
2519 k -= timestamp;
2520
81b4d94d
LP
2521 dns_packet_rewind(p, DNS_PACKET_HEADER_SIZE);
2522
2523 n = DNS_PACKET_QDCOUNT(p);
64ea42e9 2524 for (unsigned i = 0; i < n; i++) {
81b4d94d
LP
2525 r = dns_packet_read_key(p, NULL, NULL, NULL);
2526 if (r < 0)
2527 return r;
2528 }
2529
2530 n = DNS_PACKET_RRCOUNT(p);
64ea42e9 2531 for (unsigned i = 0; i < n; i++) {
81b4d94d
LP
2532
2533 /* DNS servers suck, hence the RR count is in many servers off. If we reached the end
2534 * prematurely, accept that, exit early */
2535 if (p->rindex == p->size)
2536 break;
2537
2538 r = patch_rr(p, k);
2539 if (r < 0)
2540 return r;
2541 }
2542
2543 return 0;
2544}
2545
7a08d314 2546static void dns_packet_hash_func(const DnsPacket *s, struct siphash *state) {
98767d75
IT
2547 assert(s);
2548
2549 siphash24_compress(&s->size, sizeof(s->size), state);
2550 siphash24_compress(DNS_PACKET_DATA((DnsPacket*) s), s->size, state);
2551}
2552
7a08d314 2553static int dns_packet_compare_func(const DnsPacket *x, const DnsPacket *y) {
a0edd02e 2554 int r;
98767d75 2555
a0edd02e
FB
2556 r = CMP(x->size, y->size);
2557 if (r != 0)
2558 return r;
98767d75
IT
2559
2560 return memcmp(DNS_PACKET_DATA((DnsPacket*) x), DNS_PACKET_DATA((DnsPacket*) y), x->size);
2561}
2562
7a08d314 2563DEFINE_HASH_OPS(dns_packet_hash_ops, DnsPacket, dns_packet_hash_func, dns_packet_compare_func);
98767d75 2564
a9fd8837
LP
2565bool dns_packet_equal(const DnsPacket *a, const DnsPacket *b) {
2566 return dns_packet_compare_func(a, b) == 0;
2567}
2568
4a6eb824
LP
2569int dns_packet_has_nsid_request(DnsPacket *p) {
2570 bool has_nsid = false;
2571 const uint8_t *d;
2572 size_t l;
2573
2574 assert(p);
2575
2576 if (!p->opt)
2577 return false;
2578
2579 d = p->opt->opt.data;
2580 l = p->opt->opt.data_size;
2581
2582 while (l > 0) {
2583 uint16_t code, length;
2584
2585 if (l < 4U)
2586 return log_debug_errno(SYNTHETIC_ERRNO(EBADMSG),
2587 "EDNS0 variable part has invalid size.");
2588
2589 code = unaligned_read_be16(d);
2590 length = unaligned_read_be16(d + 2);
2591
2592 if (l < 4U + length)
2593 return log_debug_errno(SYNTHETIC_ERRNO(EBADMSG),
2594 "Truncated option in EDNS0 variable part.");
2595
2596 if (code == 3) {
2597 if (has_nsid)
2598 return log_debug_errno(SYNTHETIC_ERRNO(EBADMSG),
2599 "Duplicate NSID option in EDNS0 variable part.");
2600
2601 if (length != 0)
2602 return log_debug_errno(SYNTHETIC_ERRNO(EBADMSG),
2603 "Non-empty NSID option in DNS request.");
2604
2605 has_nsid = true;
2606 }
2607
2608 d += 4U + length;
2609 l -= 4U + length;
2610 }
2611
2612 return has_nsid;
2613}
2614
acbf761b
LP
2615size_t dns_packet_size_unfragmented(DnsPacket *p) {
2616 assert(p);
2617
2618 if (p->fragsize == 0) /* Wasn't fragmented */
2619 return p->size;
2620
2621 /* The fragment size (p->fragsize) covers the whole (fragmented) IP packet, while the regular packet
2622 * size (p->size) only covers the DNS part. Thus, subtract the UDP header from the largest fragment
2623 * size, in order to determine which size of DNS packet would have gone through without
2624 * fragmenting. */
2625
2626 return LESS_BY(p->fragsize, udp_header_size(p->family));
2627}
2628
74b2466e 2629static const char* const dns_rcode_table[_DNS_RCODE_MAX_DEFINED] = {
e3e64a1a
ZJS
2630 [DNS_RCODE_SUCCESS] = "SUCCESS",
2631 [DNS_RCODE_FORMERR] = "FORMERR",
2632 [DNS_RCODE_SERVFAIL] = "SERVFAIL",
2633 [DNS_RCODE_NXDOMAIN] = "NXDOMAIN",
2634 [DNS_RCODE_NOTIMP] = "NOTIMP",
2635 [DNS_RCODE_REFUSED] = "REFUSED",
2636 [DNS_RCODE_YXDOMAIN] = "YXDOMAIN",
2637 [DNS_RCODE_YXRRSET] = "YRRSET",
2638 [DNS_RCODE_NXRRSET] = "NXRRSET",
2639 [DNS_RCODE_NOTAUTH] = "NOTAUTH",
2640 [DNS_RCODE_NOTZONE] = "NOTZONE",
2641 [DNS_RCODE_BADVERS] = "BADVERS",
2642 [DNS_RCODE_BADKEY] = "BADKEY",
2643 [DNS_RCODE_BADTIME] = "BADTIME",
2644 [DNS_RCODE_BADMODE] = "BADMODE",
2645 [DNS_RCODE_BADNAME] = "BADNAME",
2646 [DNS_RCODE_BADALG] = "BADALG",
2647 [DNS_RCODE_BADTRUNC] = "BADTRUNC",
6f21e066 2648 [DNS_RCODE_BADCOOKIE] = "BADCOOKIE",
74b2466e
LP
2649};
2650DEFINE_STRING_TABLE_LOOKUP(dns_rcode, int);
1716f6dc
LP
2651
2652static const char* const dns_protocol_table[_DNS_PROTOCOL_MAX] = {
e3e64a1a
ZJS
2653 [DNS_PROTOCOL_DNS] = "dns",
2654 [DNS_PROTOCOL_MDNS] = "mdns",
1716f6dc
LP
2655 [DNS_PROTOCOL_LLMNR] = "llmnr",
2656};
2657DEFINE_STRING_TABLE_LOOKUP(dns_protocol, DnsProtocol);