ASSERT_EQ(dns_answer_size(packet->answer), 0u);
}
+/* ================================================================
+ * reply: bad keys
+ * ================================================================ */
+
+TEST(packet_reply_cannot_use_class_any) {
+ _cleanup_(dns_packet_unrefp) DnsPacket *packet = NULL;
+
+ ASSERT_OK(dns_packet_new(&packet, DNS_PROTOCOL_DNS, 0, DNS_PACKET_SIZE_MAX));
+ ASSERT_NOT_NULL(packet);
+ dns_packet_truncate(packet, 0);
+
+ const uint8_t data[] = {
+ 0x00, 0x42, BIT_QR | BIT_AA, DNS_RCODE_SUCCESS,
+ 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00,
+
+ /* name */ 0x07, 'e', 'x', 'a', 'm', 'p', 'l', 'e',
+ 0x03, 'c', 'o', 'm',
+ 0x00,
+ /* A */ 0x00, 0x01,
+ /* ANY */ 0x00, 0xff,
+ /* ttl */ 0x00, 0x00, 0x0e, 0x10,
+ /* rdata */ 0x00, 0x04,
+ /* ip */ 0xc0, 0xa8, 0x01, 0x7f
+ };
+
+ ASSERT_OK(dns_packet_append_blob(packet, data, sizeof(data), NULL));
+
+ ASSERT_ERROR(dns_packet_extract(packet), EBADMSG);
+ ASSERT_EQ(dns_question_size(packet->question), 0u);
+ ASSERT_EQ(dns_answer_size(packet->answer), 0u);
+}
+
+TEST(packet_reply_cannot_use_type_any) {
+ _cleanup_(dns_packet_unrefp) DnsPacket *packet = NULL;
+
+ ASSERT_OK(dns_packet_new(&packet, DNS_PROTOCOL_DNS, 0, DNS_PACKET_SIZE_MAX));
+ ASSERT_NOT_NULL(packet);
+ dns_packet_truncate(packet, 0);
+
+ const uint8_t data[] = {
+ 0x00, 0x42, BIT_QR | BIT_AA, DNS_RCODE_SUCCESS,
+ 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00,
+
+ /* name */ 0x07, 'e', 'x', 'a', 'm', 'p', 'l', 'e',
+ 0x03, 'c', 'o', 'm',
+ 0x00,
+ /* ANY */ 0x00, 0xff,
+ /* IN */ 0x00, 0x01,
+ /* ttl */ 0x00, 0x00, 0x0e, 0x10,
+ /* rdata */ 0x00, 0x04,
+ /* ip */ 0xc0, 0xa8, 0x01, 0x7f
+ };
+
+ ASSERT_OK(dns_packet_append_blob(packet, data, sizeof(data), NULL));
+
+ ASSERT_ERROR(dns_packet_extract(packet), EBADMSG);
+ ASSERT_EQ(dns_question_size(packet->question), 0u);
+ ASSERT_EQ(dns_answer_size(packet->answer), 0u);
+}
+
/* ================================================================
* reply: A
* ================================================================ */