ASSERT_EQ(memcmp(DNS_PACKET_DATA(packet), data, sizeof(data)), 0);
}
+/* ================================================================
+ * dns_packet_append_answer()
+ * ================================================================ */
+
+TEST(packet_append_answer_single_a) {
+ _cleanup_(dns_packet_unrefp) DnsPacket *packet = NULL;
+ _cleanup_(dns_answer_unrefp) DnsAnswer *answer = NULL;
+ DnsResourceRecord *rr = NULL;
+
+ answer = dns_answer_new(1);
+ ASSERT_NOT_NULL(answer);
+
+ rr = dns_resource_record_new_full(DNS_CLASS_IN, DNS_TYPE_A, "example.com");
+ ASSERT_NOT_NULL(rr);
+ rr->ttl = 3601;
+ rr->a.in_addr.s_addr = htobe32(0xc0a8017f);
+ dns_answer_add(answer, rr, 1, 0, NULL);
+ dns_resource_record_unref(rr);
+
+ ASSERT_OK(dns_packet_new(&packet, DNS_PROTOCOL_DNS, 0, DNS_PACKET_SIZE_MAX));
+ ASSERT_NOT_NULL(packet);
+
+ DNS_PACKET_ID(packet) = htobe16(42);
+ DNS_PACKET_HEADER(packet)->flags = htobe16(DNS_PACKET_MAKE_FLAGS(1, 0, 1, 0, 1, 1, 0, 0, DNS_RCODE_SUCCESS));
+ DNS_PACKET_HEADER(packet)->ancount = htobe16(dns_answer_size(answer));
+
+ ASSERT_OK(dns_packet_append_answer(packet, answer, NULL));
+
+ const uint8_t data[] = {
+ 0x00, 0x2a, BIT_QR | BIT_AA | BIT_RD, BIT_RA | DNS_RCODE_SUCCESS,
+ 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00,
+
+ /* name */ 0x07, 'e', 'x', 'a', 'm', 'p', 'l', 'e',
+ 0x03, 'c', 'o', 'm',
+ 0x00,
+ /* A */ 0x00, 0x01,
+ /* IN */ 0x00, 0x01,
+ /* ttl */ 0x00, 0x00, 0x0e, 0x11,
+ /* rdata */ 0x00, 0x04,
+ /* ip */ 0xc0, 0xa8, 0x01, 0x7f
+ };
+
+ ASSERT_EQ(packet->size, sizeof(data));
+ ASSERT_EQ(memcmp(DNS_PACKET_DATA(packet), data, sizeof(data)), 0);
+}
+
DEFINE_TEST_MAIN(LOG_DEBUG)