1/*
2 * util/data/msgencode.c - Encode DNS messages, queries and replies.
3 *
4 * Copyright (c) 2007, NLnet Labs. All rights reserved.
5 *
6 * This software is open source.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 *
15 * Redistributions in binary form must reproduce the above copyright notice,
16 * this list of conditions and the following disclaimer in the documentation
17 * and/or other materials provided with the distribution.
18 *
19 * Neither the name of the NLNET LABS nor the names of its contributors may
20 * be used to endorse or promote products derived from this software without
21 * specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
24 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
25 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
26 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
27 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
28 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
29 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
30 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 */
35
36/**
37 * \file
38 *
39 * This file contains a routines to encode DNS messages.
40 */
41
42#include "config.h"
43#include "util/data/msgencode.h"
44#include "util/data/msgreply.h"
45#include "util/data/msgparse.h"
46#include "util/data/dname.h"
47#include "util/log.h"
48#include "util/regional.h"
49#include "util/net_help.h"
50#include "sldns/sbuffer.h"
51
52/** return code that means the function ran out of memory. negative so it does
53 * not conflict with DNS rcodes. */
54#define RETVAL_OUTMEM	-2
55/** return code that means the data did not fit (completely) in the packet */
56#define RETVAL_TRUNC	-4
57/** return code that means all is peachy keen. Equal to DNS rcode NOERROR */
58#define RETVAL_OK	0
59
60/**
61 * Data structure to help domain name compression in outgoing messages.
62 * A tree of dnames and their offsets in the packet is kept.
63 * It is kept sorted, not canonical, but by label at least, so that after
64 * a lookup of a name you know its closest match, and the parent from that
65 * closest match. These are possible compression targets.
66 *
67 * It is a binary tree, not a rbtree or balanced tree, as the effort
68 * of keeping it balanced probably outweighs usefulness (given typical
69 * DNS packet size).
70 */
71struct compress_tree_node {
72	/** left node in tree, all smaller to this */
73	struct compress_tree_node* left;
74	/** right node in tree, all larger than this */
75	struct compress_tree_node* right;
76
77	/** the parent node - not for tree, but zone parent. One less label */
78	struct compress_tree_node* parent;
79	/** the domain name for this node. Pointer to uncompressed memory. */
80	uint8_t* dname;
81	/** number of labels in domain name, kept to help compare func. */
82	int labs;
83	/** offset in packet that points to this dname */
84	size_t offset;
85};
86
87/**
88 * Find domain name in tree, returns exact and closest match.
89 * @param tree: root of tree.
90 * @param dname: pointer to uncompressed dname.
91 * @param labs: number of labels in domain name.
92 * @param match: closest or exact match.
93 *	guaranteed to be smaller or equal to the sought dname.
94 *	can be null if the tree is empty.
95 * @param matchlabels: number of labels that match with closest match.
96 *	can be zero is there is no match.
97 * @param insertpt: insert location for dname, if not found.
98 * @return: 0 if no exact match.
99 */
100static int
101compress_tree_search(struct compress_tree_node** tree, uint8_t* dname,
102	int labs, struct compress_tree_node** match, int* matchlabels,
103	struct compress_tree_node*** insertpt)
104{
105	int c, n, closen=0;
106	struct compress_tree_node* p = *tree;
107	struct compress_tree_node* close = 0;
108	struct compress_tree_node** prev = tree;
109	while(p) {
110		if((c = dname_lab_cmp(dname, labs, p->dname, p->labs, &n))
111			== 0) {
112			*matchlabels = n;
113			*match = p;
114			return 1;
115		}
116		if(c<0) {
117			prev = &p->left;
118			p = p->left;
119		} else	{
120			closen = n;
121			close = p; /* p->dname is smaller than dname */
122			prev = &p->right;
123			p = p->right;
124		}
125	}
126	*insertpt = prev;
127	*matchlabels = closen;
128	*match = close;
129	return 0;
130}
131
132/**
133 * Lookup a domain name in compression tree.
134 * @param tree: root of tree (not the node with '.').
135 * @param dname: pointer to uncompressed dname.
136 * @param labs: number of labels in domain name.
137 * @param insertpt: insert location for dname, if not found.
138 * @return: 0 if not found or compress treenode with best compression.
139 */
140static struct compress_tree_node*
141compress_tree_lookup(struct compress_tree_node** tree, uint8_t* dname,
142	int labs, struct compress_tree_node*** insertpt)
143{
144	struct compress_tree_node* p;
145	int m;
146	if(labs <= 1)
147		return 0; /* do not compress root node */
148	if(compress_tree_search(tree, dname, labs, &p, &m, insertpt)) {
149		/* exact match */
150		return p;
151	}
152	/* return some ancestor of p that compresses well. */
153	if(m>1) {
154		/* www.example.com. (labs=4) matched foo.example.com.(labs=4)
155		 * then matchcount = 3. need to go up. */
156		while(p && p->labs > m)
157			p = p->parent;
158		return p;
159	}
160	return 0;
161}
162
163/**
164 * Create node for domain name compression tree.
165 * @param dname: pointer to uncompressed dname (stored in tree).
166 * @param labs: number of labels in dname.
167 * @param offset: offset into packet for dname.
168 * @param region: how to allocate memory for new node.
169 * @return new node or 0 on malloc failure.
170 */
171static struct compress_tree_node*
172compress_tree_newnode(uint8_t* dname, int labs, size_t offset,
173	struct regional* region)
174{
175	struct compress_tree_node* n = (struct compress_tree_node*)
176		regional_alloc(region, sizeof(struct compress_tree_node));
177	if(!n) return 0;
178	n->left = 0;
179	n->right = 0;
180	n->parent = 0;
181	n->dname = dname;
182	n->labs = labs;
183	n->offset = offset;
184	return n;
185}
186
187/**
188 * Store domain name and ancestors into compression tree.
189 * @param dname: pointer to uncompressed dname (stored in tree).
190 * @param labs: number of labels in dname.
191 * @param offset: offset into packet for dname.
192 * @param region: how to allocate memory for new node.
193 * @param closest: match from previous lookup, used to compress dname.
194 *	may be NULL if no previous match.
195 *	if the tree has an ancestor of dname already, this must be it.
196 * @param insertpt: where to insert the dname in tree.
197 * @return: 0 on memory error.
198 */
199static int
200compress_tree_store(uint8_t* dname, int labs, size_t offset,
201	struct regional* region, struct compress_tree_node* closest,
202	struct compress_tree_node** insertpt)
203{
204	uint8_t lablen;
205	struct compress_tree_node* newnode;
206	struct compress_tree_node* prevnode = NULL;
207	int uplabs = labs-1; /* does not store root in tree */
208	if(closest) uplabs = labs - closest->labs;
209	log_assert(uplabs >= 0);
210	/* algorithms builds up a vine of dname-labels to hang into tree */
211	while(uplabs--) {
212		if(offset > PTR_MAX_OFFSET) {
213			/* insertion failed, drop vine */
214			return 1; /* compression pointer no longer useful */
215		}
216		if(!(newnode = compress_tree_newnode(dname, labs, offset,
217			region))) {
218			/* insertion failed, drop vine */
219			return 0;
220		}
221
222		if(prevnode) {
223			/* chain nodes together, last one has one label more,
224			 * so is larger than newnode, thus goes right. */
225			newnode->right = prevnode;
226			prevnode->parent = newnode;
227		}
228
229		/* next label */
230		lablen = *dname++;
231		dname += lablen;
232		offset += lablen+1;
233		prevnode = newnode;
234		labs--;
235	}
236	/* if we have a vine, hang the vine into the tree */
237	if(prevnode) {
238		*insertpt = prevnode;
239		prevnode->parent = closest;
240	}
241	return 1;
242}
243
244/** compress a domain name */
245static int
246write_compressed_dname(sldns_buffer* pkt, uint8_t* dname, int labs,
247	struct compress_tree_node* p)
248{
249	/* compress it */
250	int labcopy = labs - p->labs;
251	uint8_t lablen;
252	uint16_t ptr;
253
254	if(labs == 1) {
255		/* write root label */
256		if(sldns_buffer_remaining(pkt) < 1)
257			return 0;
258		sldns_buffer_write_u8(pkt, 0);
259		return 1;
260	}
261
262	/* copy the first couple of labels */
263	while(labcopy--) {
264		lablen = *dname++;
265		if(sldns_buffer_remaining(pkt) < (size_t)lablen+1)
266			return 0;
267		sldns_buffer_write_u8(pkt, lablen);
268		sldns_buffer_write(pkt, dname, lablen);
269		dname += lablen;
270	}
271	/* insert compression ptr */
272	if(sldns_buffer_remaining(pkt) < 2)
273		return 0;
274	ptr = PTR_CREATE(p->offset);
275	sldns_buffer_write_u16(pkt, ptr);
276	return 1;
277}
278
279/** compress owner name of RR, return RETVAL_OUTMEM RETVAL_TRUNC */
280static int
281compress_owner(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
282	struct regional* region, struct compress_tree_node** tree,
283	size_t owner_pos, uint16_t* owner_ptr, int owner_labs)
284{
285	struct compress_tree_node* p;
286	struct compress_tree_node** insertpt = NULL;
287	if(!*owner_ptr) {
288		/* compress first time dname */
289		if((p = compress_tree_lookup(tree, key->rk.dname,
290			owner_labs, &insertpt))) {
291			if(p->labs == owner_labs)
292				/* avoid ptr chains, since some software is
293				 * not capable of decoding ptr after a ptr. */
294				*owner_ptr = htons(PTR_CREATE(p->offset));
295			if(!write_compressed_dname(pkt, key->rk.dname,
296				owner_labs, p))
297				return RETVAL_TRUNC;
298			/* check if typeclass+4 ttl + rdatalen is available */
299			if(sldns_buffer_remaining(pkt) < 4+4+2)
300				return RETVAL_TRUNC;
301		} else {
302			/* no compress */
303			if(sldns_buffer_remaining(pkt) < key->rk.dname_len+4+4+2)
304				return RETVAL_TRUNC;
305			sldns_buffer_write(pkt, key->rk.dname,
306				key->rk.dname_len);
307			if(owner_pos <= PTR_MAX_OFFSET)
308				*owner_ptr = htons(PTR_CREATE(owner_pos));
309		}
310		if(!compress_tree_store(key->rk.dname, owner_labs,
311			owner_pos, region, p, insertpt))
312			return RETVAL_OUTMEM;
313	} else {
314		/* always compress 2nd-further RRs in RRset */
315		if(owner_labs == 1) {
316			if(sldns_buffer_remaining(pkt) < 1+4+4+2)
317				return RETVAL_TRUNC;
318			sldns_buffer_write_u8(pkt, 0);
319		} else {
320			if(sldns_buffer_remaining(pkt) < 2+4+4+2)
321				return RETVAL_TRUNC;
322			sldns_buffer_write(pkt, owner_ptr, 2);
323		}
324	}
325	return RETVAL_OK;
326}
327
328/** compress any domain name to the packet, return RETVAL_* */
329static int
330compress_any_dname(uint8_t* dname, sldns_buffer* pkt, int labs,
331	struct regional* region, struct compress_tree_node** tree)
332{
333	struct compress_tree_node* p;
334	struct compress_tree_node** insertpt = NULL;
335	size_t pos = sldns_buffer_position(pkt);
336	if((p = compress_tree_lookup(tree, dname, labs, &insertpt))) {
337		if(!write_compressed_dname(pkt, dname, labs, p))
338			return RETVAL_TRUNC;
339	} else {
340		if(!dname_buffer_write(pkt, dname))
341			return RETVAL_TRUNC;
342	}
343	if(!compress_tree_store(dname, labs, pos, region, p, insertpt))
344		return RETVAL_OUTMEM;
345	return RETVAL_OK;
346}
347
348/** return true if type needs domain name compression in rdata */
349static const sldns_rr_descriptor*
350type_rdata_compressable(struct ub_packed_rrset_key* key)
351{
352	uint16_t t = ntohs(key->rk.type);
353	if(sldns_rr_descript(t) &&
354		sldns_rr_descript(t)->_compress == LDNS_RR_COMPRESS)
355		return sldns_rr_descript(t);
356	return 0;
357}
358
359/** compress domain names in rdata, return RETVAL_* */
360static int
361compress_rdata(sldns_buffer* pkt, uint8_t* rdata, size_t todolen,
362	struct regional* region, struct compress_tree_node** tree,
363	const sldns_rr_descriptor* desc)
364{
365	int labs, r, rdf = 0;
366	size_t dname_len, len, pos = sldns_buffer_position(pkt);
367	uint8_t count = desc->_dname_count;
368
369	sldns_buffer_skip(pkt, 2); /* rdata len fill in later */
370	/* space for rdatalen checked for already */
371	rdata += 2;
372	todolen -= 2;
373	while(todolen > 0 && count) {
374		switch(desc->_wireformat[rdf]) {
375		case LDNS_RDF_TYPE_DNAME:
376			labs = dname_count_size_labels(rdata, &dname_len);
377			if((r=compress_any_dname(rdata, pkt, labs, region,
378				tree)) != RETVAL_OK)
379				return r;
380			rdata += dname_len;
381			todolen -= dname_len;
382			count--;
383			len = 0;
384			break;
385		case LDNS_RDF_TYPE_STR:
386			len = *rdata + 1;
387			break;
388		default:
389			len = get_rdf_size(desc->_wireformat[rdf]);
390		}
391		if(len) {
392			/* copy over */
393			if(sldns_buffer_remaining(pkt) < len)
394				return RETVAL_TRUNC;
395			sldns_buffer_write(pkt, rdata, len);
396			todolen -= len;
397			rdata += len;
398		}
399		rdf++;
400	}
401	/* copy remainder */
402	if(todolen > 0) {
403		if(sldns_buffer_remaining(pkt) < todolen)
404			return RETVAL_TRUNC;
405		sldns_buffer_write(pkt, rdata, todolen);
406	}
407
408	/* set rdata len */
409	sldns_buffer_write_u16_at(pkt, pos, sldns_buffer_position(pkt)-pos-2);
410	return RETVAL_OK;
411}
412
413/** Returns true if RR type should be included */
414static int
415rrset_belongs_in_reply(sldns_pkt_section s, uint16_t rrtype, uint16_t qtype,
416	int dnssec)
417{
418	if(dnssec)
419		return 1;
420	/* skip non DNSSEC types, except if directly queried for */
421	if(s == LDNS_SECTION_ANSWER) {
422		if(qtype == LDNS_RR_TYPE_ANY || qtype == rrtype)
423			return 1;
424	}
425	/* check DNSSEC-ness */
426	switch(rrtype) {
427		case LDNS_RR_TYPE_SIG:
428		case LDNS_RR_TYPE_KEY:
429		case LDNS_RR_TYPE_NXT:
430		case LDNS_RR_TYPE_DS:
431		case LDNS_RR_TYPE_RRSIG:
432		case LDNS_RR_TYPE_NSEC:
433		case LDNS_RR_TYPE_DNSKEY:
434		case LDNS_RR_TYPE_NSEC3:
435		case LDNS_RR_TYPE_NSEC3PARAMS:
436			return 0;
437	}
438	return 1;
439}
440
441/** store rrset in buffer in wireformat, return RETVAL_* */
442static int
443packed_rrset_encode(struct ub_packed_rrset_key* key, sldns_buffer* pkt,
444	uint16_t* num_rrs, time_t timenow, struct regional* region,
445	int do_data, int do_sig, struct compress_tree_node** tree,
446	sldns_pkt_section s, uint16_t qtype, int dnssec, size_t rr_offset)
447{
448	size_t i, j, owner_pos;
449	int r, owner_labs;
450	uint16_t owner_ptr = 0;
451	struct packed_rrset_data* data = (struct packed_rrset_data*)
452		key->entry.data;
453
454	/* does this RR type belong in the answer? */
455	if(!rrset_belongs_in_reply(s, ntohs(key->rk.type), qtype, dnssec))
456		return RETVAL_OK;
457
458	owner_labs = dname_count_labels(key->rk.dname);
459	owner_pos = sldns_buffer_position(pkt);
460
461	if(do_data) {
462		const sldns_rr_descriptor* c = type_rdata_compressable(key);
463		for(i=0; i<data->count; i++) {
464			/* rrset roundrobin */
465			j = (i + rr_offset) % data->count;
466			if((r=compress_owner(key, pkt, region, tree,
467				owner_pos, &owner_ptr, owner_labs))
468				!= RETVAL_OK)
469				return r;
470			sldns_buffer_write(pkt, &key->rk.type, 2);
471			sldns_buffer_write(pkt, &key->rk.rrset_class, 2);
472			if(data->rr_ttl[j] < timenow)
473				sldns_buffer_write_u32(pkt, 0);
474			else 	sldns_buffer_write_u32(pkt,
475					data->rr_ttl[j]-timenow);
476			if(c) {
477				if((r=compress_rdata(pkt, data->rr_data[j],
478					data->rr_len[j], region, tree, c))
479					!= RETVAL_OK)
480					return r;
481			} else {
482				if(sldns_buffer_remaining(pkt) < data->rr_len[j])
483					return RETVAL_TRUNC;
484				sldns_buffer_write(pkt, data->rr_data[j],
485					data->rr_len[j]);
486			}
487		}
488	}
489	/* insert rrsigs */
490	if(do_sig && dnssec) {
491		size_t total = data->count+data->rrsig_count;
492		for(i=data->count; i<total; i++) {
493			if(owner_ptr && owner_labs != 1) {
494				if(sldns_buffer_remaining(pkt) <
495					2+4+4+data->rr_len[i])
496					return RETVAL_TRUNC;
497				sldns_buffer_write(pkt, &owner_ptr, 2);
498			} else {
499				if((r=compress_any_dname(key->rk.dname,
500					pkt, owner_labs, region, tree))
501					!= RETVAL_OK)
502					return r;
503				if(sldns_buffer_remaining(pkt) <
504					4+4+data->rr_len[i])
505					return RETVAL_TRUNC;
506			}
507			sldns_buffer_write_u16(pkt, LDNS_RR_TYPE_RRSIG);
508			sldns_buffer_write(pkt, &key->rk.rrset_class, 2);
509			if(data->rr_ttl[i] < timenow)
510				sldns_buffer_write_u32(pkt, 0);
511			else 	sldns_buffer_write_u32(pkt,
512					data->rr_ttl[i]-timenow);
513			/* rrsig rdata cannot be compressed, perform 100+ byte
514			 * memcopy. */
515			sldns_buffer_write(pkt, data->rr_data[i],
516				data->rr_len[i]);
517		}
518	}
519	/* change rrnum only after we are sure it fits */
520	if(do_data)
521		*num_rrs += data->count;
522	if(do_sig && dnssec)
523		*num_rrs += data->rrsig_count;
524
525	return RETVAL_OK;
526}
527
528/** store msg section in wireformat buffer, return RETVAL_* */
529static int
530insert_section(struct reply_info* rep, size_t num_rrsets, uint16_t* num_rrs,
531	sldns_buffer* pkt, size_t rrsets_before, time_t timenow,
532	struct regional* region, struct compress_tree_node** tree,
533	sldns_pkt_section s, uint16_t qtype, int dnssec, size_t rr_offset)
534{
535	int r;
536	size_t i, setstart;
537	*num_rrs = 0;
538	if(s != LDNS_SECTION_ADDITIONAL) {
539		if(s == LDNS_SECTION_ANSWER && qtype == LDNS_RR_TYPE_ANY)
540			dnssec = 1; /* include all types in ANY answer */
541	  	for(i=0; i<num_rrsets; i++) {
542			setstart = sldns_buffer_position(pkt);
543			if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i],
544				pkt, num_rrs, timenow, region, 1, 1, tree,
545				s, qtype, dnssec, rr_offset))
546				!= RETVAL_OK) {
547				/* Bad, but if due to size must set TC bit */
548				/* trim off the rrset neatly. */
549				sldns_buffer_set_position(pkt, setstart);
550				return r;
551			}
552		}
553	} else {
554	  	for(i=0; i<num_rrsets; i++) {
555			setstart = sldns_buffer_position(pkt);
556			if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i],
557				pkt, num_rrs, timenow, region, 1, 0, tree,
558				s, qtype, dnssec, rr_offset))
559				!= RETVAL_OK) {
560				sldns_buffer_set_position(pkt, setstart);
561				return r;
562			}
563		}
564		if(dnssec)
565	  	  for(i=0; i<num_rrsets; i++) {
566			setstart = sldns_buffer_position(pkt);
567			if((r=packed_rrset_encode(rep->rrsets[rrsets_before+i],
568				pkt, num_rrs, timenow, region, 0, 1, tree,
569				s, qtype, dnssec, rr_offset))
570				!= RETVAL_OK) {
571				sldns_buffer_set_position(pkt, setstart);
572				return r;
573			}
574		  }
575	}
576	return RETVAL_OK;
577}
578
579/** store query section in wireformat buffer, return RETVAL */
580static int
581insert_query(struct query_info* qinfo, struct compress_tree_node** tree,
582	sldns_buffer* buffer, struct regional* region)
583{
584	if(sldns_buffer_remaining(buffer) <
585		qinfo->qname_len+sizeof(uint16_t)*2)
586		return RETVAL_TRUNC; /* buffer too small */
587	/* the query is the first name inserted into the tree */
588	if(!compress_tree_store(qinfo->qname,
589		dname_count_labels(qinfo->qname),
590		sldns_buffer_position(buffer), region, NULL, tree))
591		return RETVAL_OUTMEM;
592	if(sldns_buffer_current(buffer) == qinfo->qname)
593		sldns_buffer_skip(buffer, (ssize_t)qinfo->qname_len);
594	else	sldns_buffer_write(buffer, qinfo->qname, qinfo->qname_len);
595	sldns_buffer_write_u16(buffer, qinfo->qtype);
596	sldns_buffer_write_u16(buffer, qinfo->qclass);
597	return RETVAL_OK;
598}
599
600static int
601positive_answer(struct reply_info* rep, uint16_t qtype) {
602	size_t i;
603	if (FLAGS_GET_RCODE(rep->flags) != LDNS_RCODE_NOERROR)
604		return 0;
605
606	for(i=0;i<rep->an_numrrsets; i++) {
607		if(ntohs(rep->rrsets[i]->rk.type) == qtype) {
608			/* in case it is a wildcard with DNSSEC, there will
609			 * be NSEC/NSEC3 records in the authority section
610			 * that we cannot remove */
611			for(i=rep->an_numrrsets; i<rep->an_numrrsets+
612				rep->ns_numrrsets; i++) {
613				if(ntohs(rep->rrsets[i]->rk.type) ==
614					LDNS_RR_TYPE_NSEC ||
615				   ntohs(rep->rrsets[i]->rk.type) ==
616				   	LDNS_RR_TYPE_NSEC3)
617					return 0;
618			}
619			return 1;
620		}
621	}
622	return 0;
623}
624
625int
626reply_info_encode(struct query_info* qinfo, struct reply_info* rep,
627	uint16_t id, uint16_t flags, sldns_buffer* buffer, time_t timenow,
628	struct regional* region, uint16_t udpsize, int dnssec)
629{
630	uint16_t ancount=0, nscount=0, arcount=0;
631	struct compress_tree_node* tree = 0;
632	int r;
633	size_t rr_offset;
634
635	sldns_buffer_clear(buffer);
636	if(udpsize < sldns_buffer_limit(buffer))
637		sldns_buffer_set_limit(buffer, udpsize);
638	if(sldns_buffer_remaining(buffer) < LDNS_HEADER_SIZE)
639		return 0;
640
641	sldns_buffer_write(buffer, &id, sizeof(uint16_t));
642	sldns_buffer_write_u16(buffer, flags);
643	sldns_buffer_write_u16(buffer, rep->qdcount);
644	/* set an, ns, ar counts to zero in case of small packets */
645	sldns_buffer_write(buffer, "\000\000\000\000\000\000", 6);
646
647	/* insert query section */
648	if(rep->qdcount) {
649		if((r=insert_query(qinfo, &tree, buffer, region)) !=
650			RETVAL_OK) {
651			if(r == RETVAL_TRUNC) {
652				/* create truncated message */
653				sldns_buffer_write_u16_at(buffer, 4, 0);
654				LDNS_TC_SET(sldns_buffer_begin(buffer));
655				sldns_buffer_flip(buffer);
656				return 1;
657			}
658			return 0;
659		}
660	}
661	/* roundrobin offset. using query id for random number.  With ntohs
662	 * for different roundrobins for sequential id client senders. */
663	rr_offset = RRSET_ROUNDROBIN?ntohs(id):0;
664
665	/* insert answer section */
666	if((r=insert_section(rep, rep->an_numrrsets, &ancount, buffer,
667		0, timenow, region, &tree, LDNS_SECTION_ANSWER, qinfo->qtype,
668		dnssec, rr_offset)) != RETVAL_OK) {
669		if(r == RETVAL_TRUNC) {
670			/* create truncated message */
671			sldns_buffer_write_u16_at(buffer, 6, ancount);
672			LDNS_TC_SET(sldns_buffer_begin(buffer));
673			sldns_buffer_flip(buffer);
674			return 1;
675		}
676		return 0;
677	}
678	sldns_buffer_write_u16_at(buffer, 6, ancount);
679
680	/* if response is positive answer, auth/add sections are not required */
681	if( ! (MINIMAL_RESPONSES && positive_answer(rep, qinfo->qtype)) ) {
682		/* insert auth section */
683		if((r=insert_section(rep, rep->ns_numrrsets, &nscount, buffer,
684			rep->an_numrrsets, timenow, region, &tree,
685			LDNS_SECTION_AUTHORITY, qinfo->qtype,
686			dnssec, rr_offset)) != RETVAL_OK) {
687			if(r == RETVAL_TRUNC) {
688				/* create truncated message */
689				sldns_buffer_write_u16_at(buffer, 8, nscount);
690				LDNS_TC_SET(sldns_buffer_begin(buffer));
691				sldns_buffer_flip(buffer);
692				return 1;
693			}
694			return 0;
695		}
696		sldns_buffer_write_u16_at(buffer, 8, nscount);
697
698		/* insert add section */
699		if((r=insert_section(rep, rep->ar_numrrsets, &arcount, buffer,
700			rep->an_numrrsets + rep->ns_numrrsets, timenow, region,
701			&tree, LDNS_SECTION_ADDITIONAL, qinfo->qtype,
702			dnssec, rr_offset)) != RETVAL_OK) {
703			if(r == RETVAL_TRUNC) {
704				/* no need to set TC bit, this is the additional */
705				sldns_buffer_write_u16_at(buffer, 10, arcount);
706				sldns_buffer_flip(buffer);
707				return 1;
708			}
709			return 0;
710		}
711		sldns_buffer_write_u16_at(buffer, 10, arcount);
712	}
713	sldns_buffer_flip(buffer);
714	return 1;
715}
716
717uint16_t
718calc_edns_field_size(struct edns_data* edns)
719{
720	if(!edns || !edns->edns_present)
721		return 0;
722	/* domain root '.' + type + class + ttl + rdatalen(=0) */
723	return 1 + 2 + 2 + 4 + 2;
724}
725
726void
727attach_edns_record(sldns_buffer* pkt, struct edns_data* edns)
728{
729	size_t len;
730	if(!edns || !edns->edns_present)
731		return;
732	/* inc additional count */
733	sldns_buffer_write_u16_at(pkt, 10,
734		sldns_buffer_read_u16_at(pkt, 10) + 1);
735	len = sldns_buffer_limit(pkt);
736	sldns_buffer_clear(pkt);
737	sldns_buffer_set_position(pkt, len);
738	/* write EDNS record */
739	sldns_buffer_write_u8(pkt, 0); /* '.' label */
740	sldns_buffer_write_u16(pkt, LDNS_RR_TYPE_OPT); /* type */
741	sldns_buffer_write_u16(pkt, edns->udp_size); /* class */
742	sldns_buffer_write_u8(pkt, edns->ext_rcode); /* ttl */
743	sldns_buffer_write_u8(pkt, edns->edns_version);
744	sldns_buffer_write_u16(pkt, edns->bits);
745	sldns_buffer_write_u16(pkt, 0); /* rdatalen */
746	sldns_buffer_flip(pkt);
747}
748
749int
750reply_info_answer_encode(struct query_info* qinf, struct reply_info* rep,
751	uint16_t id, uint16_t qflags, sldns_buffer* pkt, time_t timenow,
752	int cached, struct regional* region, uint16_t udpsize,
753	struct edns_data* edns, int dnssec, int secure)
754{
755	uint16_t flags;
756	int attach_edns = 1;
757
758	if(!cached || rep->authoritative) {
759		/* original flags, copy RD and CD bits from query. */
760		flags = rep->flags | (qflags & (BIT_RD|BIT_CD));
761	} else {
762		/* remove AA bit, copy RD and CD bits from query. */
763		flags = (rep->flags & ~BIT_AA) | (qflags & (BIT_RD|BIT_CD));
764	}
765	if(secure && (dnssec || (qflags&BIT_AD)))
766		flags |= BIT_AD;
767	log_assert(flags & BIT_QR); /* QR bit must be on in our replies */
768	if(udpsize < LDNS_HEADER_SIZE)
769		return 0;
770	if(udpsize < LDNS_HEADER_SIZE + calc_edns_field_size(edns)) {
771		/* packet too small to contain edns, omit it. */
772		attach_edns = 0;
773	} else {
774		/* reserve space for edns record */
775		udpsize -= calc_edns_field_size(edns);
776	}
777
778	if(!reply_info_encode(qinf, rep, id, flags, pkt, timenow, region,
779		udpsize, dnssec)) {
780		log_err("reply encode: out of memory");
781		return 0;
782	}
783	if(attach_edns)
784		attach_edns_record(pkt, edns);
785	return 1;
786}
787
788void
789qinfo_query_encode(sldns_buffer* pkt, struct query_info* qinfo)
790{
791	uint16_t flags = 0; /* QUERY, NOERROR */
792	sldns_buffer_clear(pkt);
793	log_assert(sldns_buffer_remaining(pkt) >= 12+255+4/*max query*/);
794	sldns_buffer_skip(pkt, 2); /* id done later */
795	sldns_buffer_write_u16(pkt, flags);
796	sldns_buffer_write_u16(pkt, 1); /* query count */
797	sldns_buffer_write(pkt, "\000\000\000\000\000\000", 6); /* counts */
798	sldns_buffer_write(pkt, qinfo->qname, qinfo->qname_len);
799	sldns_buffer_write_u16(pkt, qinfo->qtype);
800	sldns_buffer_write_u16(pkt, qinfo->qclass);
801	sldns_buffer_flip(pkt);
802}
803
804void
805error_encode(sldns_buffer* buf, int r, struct query_info* qinfo,
806	uint16_t qid, uint16_t qflags, struct edns_data* edns)
807{
808	uint16_t flags;
809
810	sldns_buffer_clear(buf);
811	sldns_buffer_write(buf, &qid, sizeof(uint16_t));
812	flags = (uint16_t)(BIT_QR | BIT_RA | r); /* QR and retcode*/
813	flags |= (qflags & (BIT_RD|BIT_CD)); /* copy RD and CD bit */
814	sldns_buffer_write_u16(buf, flags);
815	if(qinfo) flags = 1;
816	else	flags = 0;
817	sldns_buffer_write_u16(buf, flags);
818	flags = 0;
819	sldns_buffer_write(buf, &flags, sizeof(uint16_t));
820	sldns_buffer_write(buf, &flags, sizeof(uint16_t));
821	sldns_buffer_write(buf, &flags, sizeof(uint16_t));
822	if(qinfo) {
823		if(sldns_buffer_current(buf) == qinfo->qname)
824			sldns_buffer_skip(buf, (ssize_t)qinfo->qname_len);
825		else	sldns_buffer_write(buf, qinfo->qname, qinfo->qname_len);
826		sldns_buffer_write_u16(buf, qinfo->qtype);
827		sldns_buffer_write_u16(buf, qinfo->qclass);
828	}
829	sldns_buffer_flip(buf);
830	if(edns) {
831		struct edns_data es = *edns;
832		es.edns_version = EDNS_ADVERTISED_VERSION;
833		es.udp_size = EDNS_ADVERTISED_SIZE;
834		es.ext_rcode = 0;
835		es.bits &= EDNS_DO;
836		if(sldns_buffer_limit(buf) + calc_edns_field_size(&es) >
837			edns->udp_size)
838			return;
839		attach_edns_record(buf, &es);
840	}
841}
842