summaryrefslogtreecommitdiffstats
path: root/net/base/dns_response.cc
diff options
context:
space:
mode:
authoragayev@chromium.org <agayev@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-06-03 18:09:06 +0000
committeragayev@chromium.org <agayev@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-06-03 18:09:06 +0000
commit4b17cfa0da8eabbeae36e95ae993ad20a02308ba (patch)
tree8216d7a724a10f9cf7723f2c07b904a1c3511c2e /net/base/dns_response.cc
parent60e5643d118305e76ec0f740396e7091476e7a09 (diff)
downloadchromium_src-4b17cfa0da8eabbeae36e95ae993ad20a02308ba.zip
chromium_src-4b17cfa0da8eabbeae36e95ae993ad20a02308ba.tar.gz
chromium_src-4b17cfa0da8eabbeae36e95ae993ad20a02308ba.tar.bz2
Added DnsQuery class
BUG=60149 TEST=dns_query_unittests Review URL: http://codereview.chromium.org/7008021 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@87809 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/dns_response.cc')
-rw-r--r--net/base/dns_response.cc103
1 files changed, 103 insertions, 0 deletions
diff --git a/net/base/dns_response.cc b/net/base/dns_response.cc
new file mode 100644
index 0000000..5ab7052
--- /dev/null
+++ b/net/base/dns_response.cc
@@ -0,0 +1,103 @@
+// Copyright (c) 2011 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/base/dns_response.h"
+
+#include "net/base/address_list.h"
+#include "net/base/dns_util.h"
+#include "net/base/net_errors.h"
+
+namespace net {
+
+// RFC 1035, section 4.2.1: Messages carried by UDP are restricted to 512
+// bytes (not counting the IP nor UDP headers).
+static const int kMaxResponseSize = 512;
+
+DnsResponse::DnsResponse(DnsQuery* query)
+ : query_(query),
+ io_buffer_(new IOBufferWithSize(kMaxResponseSize + 1)) {
+ DCHECK(query_);
+ DCHECK(query_->IsValid());
+}
+
+int DnsResponse::Parse(int nbytes, AddressList* results) {
+ DCHECK(query_->IsValid());
+
+ // Response includes query, it should be at least that size.
+ if (nbytes < query_->io_buffer()->size() || nbytes > kMaxResponseSize)
+ return ERR_DNS_MALFORMED_RESPONSE;
+
+ DnsResponseBuffer response(reinterpret_cast<uint8*>(io_buffer_->data()),
+ io_buffer_->size());
+ uint16 id;
+ if (!response.U16(&id) || id != query_->id()) // Make sure IDs match.
+ return ERR_DNS_MALFORMED_RESPONSE;
+
+ uint8 flags, rcode;
+ if (!response.U8(&flags) || !response.U8(&rcode))
+ return ERR_DNS_MALFORMED_RESPONSE;
+
+ if (flags & 2) // TC is set -- server wants TCP, we don't support it (yet?).
+ return ERR_DNS_SERVER_REQUIRES_TCP;
+
+ rcode &= 0x0f; // 3 means NXDOMAIN, the rest means server failed.
+ if (rcode && (rcode != 3))
+ return ERR_DNS_SERVER_FAILED;
+
+ uint16 query_count, answer_count, authority_count, additional_count;
+ if (!response.U16(&query_count) ||
+ !response.U16(&answer_count) ||
+ !response.U16(&authority_count) ||
+ !response.U16(&additional_count)) {
+ return ERR_DNS_MALFORMED_RESPONSE;
+ }
+
+ if (query_count != 1) // Sent a single question, shouldn't have changed.
+ return ERR_DNS_MALFORMED_RESPONSE;
+
+ std::string hostname;
+ uint16 qtype, qclass;
+ if (!response.DNSName(&hostname) ||
+ !response.U16(&qtype) ||
+ !response.U16(&qclass) ||
+ hostname != query_->hostname() || // Make sure Question section
+ qtype != query_->qtype() || // echoed back.
+ qclass != kClassIN) {
+ return ERR_DNS_MALFORMED_RESPONSE;
+ }
+
+ if (answer_count < 1)
+ return ERR_NAME_NOT_RESOLVED;
+
+ std::vector<IPAddressNumber> rdatas;
+ while (answer_count--) {
+ uint32 ttl;
+ uint16 rdlength;
+ if (!response.DNSName(NULL) ||
+ !response.U16(&qtype) ||
+ !response.U16(&qclass) ||
+ !response.U32(&ttl) ||
+ !response.U16(&rdlength)) {
+ return ERR_DNS_MALFORMED_RESPONSE;
+ }
+
+ if (qtype == query_->qtype() &&
+ qclass == kClassIN &&
+ (rdlength == kIPv4AddressSize || rdlength == kIPv6AddressSize)) {
+ base::StringPiece rdata;
+ if (!response.Block(&rdata, rdlength))
+ return ERR_DNS_MALFORMED_RESPONSE;
+ rdatas.push_back(IPAddressNumber(rdata.begin(), rdata.end()));
+ } else if (!response.Skip(rdlength))
+ return ERR_DNS_MALFORMED_RESPONSE;
+ }
+
+ if (rdatas.empty())
+ return ERR_NAME_NOT_RESOLVED;
+
+ *results = AddressList::CreateFromIPAddressList(rdatas, query_->port());
+ return OK;
+}
+
+} // namespace net