369 lines
11 KiB
C
369 lines
11 KiB
C
/*
|
|
* Copyright (c) 2016 Intel Corporation
|
|
*
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*/
|
|
|
|
#ifndef _DNS_PACK_H_
|
|
#define _DNS_PACK_H_
|
|
|
|
#include <net/net_ip.h>
|
|
#include <net/buf.h>
|
|
|
|
#include <zephyr/types.h>
|
|
#include <stddef.h>
|
|
#include <errno.h>
|
|
|
|
/* See RFC 1035, 4.1.1 Header section format
|
|
* DNS Message Header is always 12 bytes
|
|
*/
|
|
#define DNS_MSG_HEADER_SIZE 12
|
|
|
|
/**
|
|
* DNS message structure for DNS responses
|
|
*
|
|
* Structure that points to the buffer containing the DNS message. It also
|
|
* contains some decodified message's properties that can not be recovered
|
|
* easily:
|
|
* - cname_offset
|
|
* - query_offset
|
|
* - answer_offset:
|
|
* + response_type: It indicates the response's content type. It could be
|
|
* an IP address, a CNAME with IP (two answers), a CNAME with no IP
|
|
* address. See enum dns_response_type for more details.
|
|
* + response_position: this is an offset. It holds the starting byte of
|
|
* the field containing the desired info. For example an IPv4 address.
|
|
* + response_length: this is an offset. It holds the response's length.
|
|
*/
|
|
struct dns_msg_t {
|
|
u8_t *msg;
|
|
u16_t msg_size;
|
|
|
|
int response_type;
|
|
u16_t response_position;
|
|
u16_t response_length;
|
|
|
|
u16_t query_offset;
|
|
u16_t answer_offset;
|
|
};
|
|
|
|
#define DNS_MSG_INIT(b, s) {.msg = b, .msg_size = s, \
|
|
.response_type = -EINVAL}
|
|
|
|
|
|
enum dns_rr_type {
|
|
DNS_RR_TYPE_INVALID = 0,
|
|
DNS_RR_TYPE_A = 1, /* IPv4 */
|
|
DNS_RR_TYPE_CNAME = 5, /* CNAME */
|
|
DNS_RR_TYPE_AAAA = 28 /* IPv6 */
|
|
};
|
|
|
|
enum dns_response_type {
|
|
DNS_RESPONSE_INVALID = -EINVAL,
|
|
DNS_RESPONSE_IP,
|
|
DNS_RESPONSE_CNAME_WITH_IP,
|
|
DNS_RESPONSE_CNAME_NO_IP
|
|
};
|
|
|
|
enum dns_class {
|
|
DNS_CLASS_INVALID = 0,
|
|
DNS_CLASS_IN,
|
|
};
|
|
|
|
enum dns_msg_type {
|
|
DNS_QUERY = 0,
|
|
DNS_RESPONSE
|
|
};
|
|
|
|
enum dns_header_rcode {
|
|
DNS_HEADER_NOERROR = 0,
|
|
DNS_HEADER_FORMATERROR,
|
|
DNS_HEADER_SERVERFAILURE,
|
|
DNS_HEADER_NAMEERROR,
|
|
DNS_HEADER_NOTIMPLEMENTED,
|
|
DNS_HEADER_REFUSED
|
|
};
|
|
|
|
/** It returns the ID field in the DNS msg header */
|
|
static inline int dns_header_id(u8_t *header)
|
|
{
|
|
return htons(UNALIGNED_GET((u16_t *)(header)));
|
|
}
|
|
|
|
/* inline unpack routines are used to unpack data from network
|
|
* order to cpu. Similar routines without the unpack prefix are
|
|
* used for cpu to network order.
|
|
*/
|
|
static inline int dns_unpack_header_id(u8_t *header)
|
|
{
|
|
return ntohs(UNALIGNED_GET((u16_t *)(header)));
|
|
}
|
|
|
|
/** It returns the QR field in the DNS msg header */
|
|
static inline int dns_header_qr(u8_t *header)
|
|
{
|
|
return ((*(header + 2)) & 0x80) ? 1 : 0;
|
|
}
|
|
|
|
/** It returns the OPCODE field in the DNS msg header */
|
|
static inline int dns_header_opcode(u8_t *header)
|
|
{
|
|
return ((*(header + 2)) & 0x70) >> 1;
|
|
}
|
|
|
|
/** It returns the AA field in the DNS msg header */
|
|
static inline int dns_header_aa(u8_t *header)
|
|
{
|
|
return ((*(header + 2)) & 0x04) ? 1 : 0;
|
|
}
|
|
|
|
/** It returns the TC field in the DNS msg header */
|
|
static inline int dns_header_tc(u8_t *header)
|
|
{
|
|
return ((*(header + 2)) & 0x02) ? 1 : 0;
|
|
}
|
|
|
|
/** It returns the RD field in the DNS msg header */
|
|
static inline int dns_header_rd(u8_t *header)
|
|
{
|
|
return ((*(header + 2)) & 0x01) ? 1 : 0;
|
|
}
|
|
|
|
/** It returns the RA field in the DNS msg header */
|
|
static inline int dns_header_ra(u8_t *header)
|
|
{
|
|
return ((*(header + 3)) & 0x80) >> 7;
|
|
}
|
|
|
|
/** It returns the Z field in the DNS msg header */
|
|
static inline int dns_header_z(u8_t *header)
|
|
{
|
|
return ((*(header + 3)) & 0x70) >> 4;
|
|
}
|
|
|
|
/** It returns the RCODE field in the DNS msg header */
|
|
static inline int dns_header_rcode(u8_t *header)
|
|
{
|
|
return ((*(header + 3)) & 0x0F);
|
|
}
|
|
|
|
/** It returns the QDCOUNT field in the DNS msg header */
|
|
static inline int dns_header_qdcount(u8_t *header)
|
|
{
|
|
return htons(UNALIGNED_GET((u16_t *)(header + 4)));
|
|
}
|
|
|
|
static inline int dns_unpack_header_qdcount(u8_t *header)
|
|
{
|
|
return ntohs(UNALIGNED_GET((u16_t *)(header + 4)));
|
|
}
|
|
|
|
/** It returns the ANCOUNT field in the DNS msg header */
|
|
static inline int dns_header_ancount(u8_t *header)
|
|
{
|
|
return htons(UNALIGNED_GET((u16_t *)(header + 6)));
|
|
}
|
|
|
|
static inline int dns_unpack_header_ancount(u8_t *header)
|
|
{
|
|
return ntohs(UNALIGNED_GET((u16_t *)(header + 6)));
|
|
}
|
|
|
|
/** It returns the NSCOUNT field in the DNS msg header */
|
|
static inline int dns_header_nscount(u8_t *header)
|
|
{
|
|
return htons(UNALIGNED_GET((u16_t *)(header + 8)));
|
|
}
|
|
|
|
/** It returns the ARCOUNT field in the DNS msg header */
|
|
static inline int dns_header_arcount(u8_t *header)
|
|
{
|
|
return htons(UNALIGNED_GET((u16_t *)(header + 10)));
|
|
}
|
|
|
|
static inline int dns_query_qtype(u8_t *question)
|
|
{
|
|
return htons(UNALIGNED_GET((u16_t *)(question + 0)));
|
|
}
|
|
|
|
static inline int dns_unpack_query_qtype(const u8_t *question)
|
|
{
|
|
return ntohs(UNALIGNED_GET((u16_t *)(question + 0)));
|
|
}
|
|
|
|
static inline int dns_query_qclass(u8_t *question)
|
|
{
|
|
return htons(UNALIGNED_GET((u16_t *)(question + 2)));
|
|
}
|
|
|
|
static inline int dns_unpack_query_qclass(const u8_t *question)
|
|
{
|
|
return ntohs(UNALIGNED_GET((u16_t *)(question + 2)));
|
|
}
|
|
|
|
static inline int dns_answer_type(u16_t dname_size, u8_t *answer)
|
|
{
|
|
/** Future versions must consider byte 0
|
|
* 4.1.3. Resource record format
|
|
* *(answer + dname_size + 0);
|
|
*/
|
|
return *(answer + dname_size + 1);
|
|
}
|
|
|
|
static inline int dns_answer_class(u16_t dname_size, u8_t *answer)
|
|
{
|
|
/** Future versions must consider byte 2
|
|
* 4.1.3. Resource record format
|
|
* *(answer + dname_size + 2);
|
|
*/
|
|
return *(answer + dname_size + 3);
|
|
}
|
|
|
|
static inline int dns_answer_ttl(u16_t dname_size, u8_t *answer)
|
|
{
|
|
return ntohl(UNALIGNED_GET((u32_t *)(answer + dname_size + 4)));
|
|
}
|
|
|
|
static inline int dns_answer_rdlength(u16_t dname_size,
|
|
u8_t *answer)
|
|
{
|
|
return ntohs(UNALIGNED_GET((u16_t *)(answer + dname_size + 8)));
|
|
}
|
|
|
|
/**
|
|
* @brief Packs a QNAME
|
|
*
|
|
* @param len Bytes used by this function
|
|
* @param buf Buffer
|
|
* @param sizeof Buffer's size
|
|
* @param domain_name Something like www.example.com
|
|
* @retval 0 on success
|
|
* @retval -ENOMEM if there is no enough space to store the resultant QNAME
|
|
* @retval -EINVAL if an invalid parameter was passed as an argument
|
|
*/
|
|
int dns_msg_pack_qname(u16_t *len, u8_t *buf, u16_t size,
|
|
const char *domain_name);
|
|
|
|
/**
|
|
* @brief Unpacks an answer message
|
|
*
|
|
* @param dns_msg Structure
|
|
* @param dname_ptr An index to the previous CNAME. For example for the
|
|
* first answer, ptr must be 0x0c, the DNAME at the question.
|
|
* @param ttl TTL answer parameter.
|
|
* @retval 0 on success
|
|
* @retval -ENOMEM on error
|
|
*/
|
|
int dns_unpack_answer(struct dns_msg_t *dns_msg, int dname_ptr, u32_t *ttl);
|
|
|
|
/**
|
|
* @brief Unpacks the header's response.
|
|
*
|
|
* @param msg Structure containing the response.
|
|
* @param src_id Transaction id, it must match the id used in the query
|
|
* datagram sent to the DNS server.
|
|
* @retval 0 on success
|
|
* @retval -ENOMEM if the buffer in msg has no enough space to store the header.
|
|
* The header is always 12 bytes length.
|
|
* @retval -EINVAL if the src_id does not match the header's id, or if the
|
|
* header's QR value is not DNS_RESPONSE or if the header's OPCODE
|
|
* value is not DNS_QUERY, or if the header's Z value is not 0 or if
|
|
* the question counter is not 1 or the answer counter is less than 1.
|
|
* @retval RFC 1035 RCODEs (> 0) 1 Format error, 2 Server failure, 3 Name Error,
|
|
* 4 Not Implemented and 5 Refused.
|
|
*/
|
|
int dns_unpack_response_header(struct dns_msg_t *msg, int src_id);
|
|
|
|
/**
|
|
* @brief Packs the query message
|
|
*
|
|
* @param buf Buffer that will contain the resultant query
|
|
* @param len Number of bytes used to encode the query
|
|
* @param size Buffer size
|
|
* @param qname Domain name represented as a sequence of labels.
|
|
* See RFC 1035, 4.1.2. Question section format.
|
|
* @param qname_len Number of octets in qname.
|
|
* @param id Transaction Identifier
|
|
* @param qtype Query type: AA, AAAA. See enum dns_rr_type
|
|
* @retval 0 on success
|
|
* @retval On error, a negative value is returned.
|
|
* See: dns_msg_pack_query_header and dns_msg_pack_qname.
|
|
*/
|
|
int dns_msg_pack_query(u8_t *buf, u16_t *len, u16_t size,
|
|
u8_t *qname, u16_t qname_len, u16_t id,
|
|
enum dns_rr_type qtype);
|
|
|
|
/**
|
|
* @brief Unpacks the response's query.
|
|
*
|
|
* @details RFC 1035 states that the response's query comes after the first
|
|
* 12 bytes i.e., after the message's header. This function computes
|
|
* the answer_offset field.
|
|
*
|
|
* @param dns_msg Structure containing the message.
|
|
* @retval 0 on success
|
|
* @retval -ENOMEM if the null label is not found after traversing the buffer
|
|
* or if QCLASS and QTYPE are not found.
|
|
* @retval -EINVAL if QTYPE is not "A" (IPv4) or "AAAA" (IPv6) or if QCLASS
|
|
* is not "IN".
|
|
*/
|
|
int dns_unpack_response_query(struct dns_msg_t *dns_msg);
|
|
|
|
/**
|
|
* @brief Copies the qname from dns_msg to buf
|
|
*
|
|
* @details This routine implements the algorithm described in RFC 1035, 4.1.4.
|
|
* Message compression to copy the qname (perhaps containing pointers
|
|
* with offset) to the linear buffer buf. Pointers are removed and
|
|
* only the "true" labels are copied.
|
|
*
|
|
* @param buf Output buffer
|
|
* @param len Output buffer's length
|
|
* @param size Output buffer's size
|
|
* @param dns_msg Structure containing the message
|
|
* @param pos QNAME's position in dns_msg->msg
|
|
* @retval 0 on success
|
|
* @retval -EINVAL if an invalid parameter was passed as an argument
|
|
* @retval -ENOMEM if the label's size is corrupted
|
|
*/
|
|
int dns_copy_qname(u8_t *buf, u16_t *len, u16_t size,
|
|
struct dns_msg_t *dns_msg, u16_t pos);
|
|
|
|
/**
|
|
* @brief Unpacks the mDNS query. This is special version for multicast DNS
|
|
* as it skips checks to various fields as described in RFC 6762
|
|
* chapter 18.
|
|
*
|
|
* @param msg Structure containing the response.
|
|
* @param src_id Transaction id, this is returned to the caller.
|
|
* @retval 0 on success, <0 if error
|
|
* @retval -ENOMEM if the buffer in msg has no enough space to store the header.
|
|
* The header is always 12 bytes length.
|
|
* @retval -EINVAL if the src_id does not match the header's id, or if the
|
|
* header's QR value is not DNS_RESPONSE or if the header's OPCODE
|
|
* value is not DNS_QUERY, or if the header's Z value is not 0 or if
|
|
* the question counter is not 1 or the answer counter is less than 1.
|
|
* @retval RFC 1035 RCODEs (> 0) 1 Format error, 2 Server failure, 3 Name Error,
|
|
* 4 Not Implemented and 5 Refused.
|
|
*/
|
|
int mdns_unpack_query_header(struct dns_msg_t *msg, u16_t *src_id);
|
|
|
|
/**
|
|
* @brief Unpacks the query.
|
|
*
|
|
* @param dns_msg Structure containing the message.
|
|
* @param buf Result buf
|
|
* @param qtype Query type is returned to caller
|
|
* @param qclass Query class is returned to caller
|
|
* @retval 0 on success
|
|
* @retval -ENOMEM if the null label is not found after traversing the buffer
|
|
* or if QCLASS and QTYPE are not found.
|
|
* @retval -EINVAL if QTYPE is not "A" (IPv4) or "AAAA" (IPv6) or if QCLASS
|
|
* is not "IN".
|
|
*/
|
|
int dns_unpack_query(struct dns_msg_t *dns_msg, struct net_buf *buf,
|
|
enum dns_rr_type *qtype,
|
|
enum dns_class *qclass);
|
|
|
|
#endif
|