| // Copyright 2011 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/dns/dns_query.h" |
| |
| #include <cstdint> |
| #include <memory> |
| #include <string> |
| #include <tuple> |
| #include <vector> |
| |
| #include "base/containers/span.h" |
| #include "base/memory/scoped_refptr.h" |
| #include "net/base/io_buffer.h" |
| #include "net/dns/dns_names_util.h" |
| #include "net/dns/opt_record_rdata.h" |
| #include "net/dns/public/dns_protocol.h" |
| #include "net/dns/record_rdata.h" |
| #include "testing/gmock/include/gmock/gmock.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| #include "third_party/abseil-cpp/absl/types/optional.h" |
| |
| namespace net { |
| |
| namespace { |
| |
| using ::testing::ElementsAreArray; |
| |
| std::tuple<char*, size_t> AsTuple(const IOBufferWithSize* buf) { |
| return std::make_tuple(buf->data(), buf->size()); |
| } |
| |
| bool ParseAndCreateDnsQueryFromRawPacket(const uint8_t* data, |
| size_t length, |
| std::unique_ptr<DnsQuery>* out) { |
| auto packet = base::MakeRefCounted<IOBufferWithSize>(length); |
| memcpy(packet->data(), data, length); |
| *out = std::make_unique<DnsQuery>(packet); |
| return (*out)->Parse(length); |
| } |
| |
| // This includes \0 at the end. |
| const char kQNameData[] = |
| "\x03" |
| "www" |
| "\x07" |
| "example" |
| "\x03" |
| "com"; |
| const base::span<const uint8_t> kQName = |
| base::as_bytes(base::make_span(kQNameData)); |
| |
| TEST(DnsQueryTest, Constructor) { |
| // This includes \0 at the end. |
| const uint8_t query_data[] = { |
| // Header |
| 0xbe, 0xef, 0x01, 0x00, // Flags -- set RD (recursion desired) bit. |
| 0x00, 0x01, // Set QDCOUNT (question count) to 1, all the |
| // rest are 0 for a query. |
| 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, |
| |
| // Question |
| 0x03, 'w', 'w', 'w', // QNAME: www.example.com in DNS format. |
| 0x07, 'e', 'x', 'a', 'm', 'p', 'l', 'e', 0x03, 'c', 'o', 'm', 0x00, |
| |
| 0x00, 0x01, // QTYPE: A query. |
| 0x00, 0x01, // QCLASS: IN class. |
| }; |
| |
| DnsQuery q1(0xbeef, kQName, dns_protocol::kTypeA); |
| EXPECT_EQ(dns_protocol::kTypeA, q1.qtype()); |
| EXPECT_THAT(AsTuple(q1.io_buffer()), ElementsAreArray(query_data)); |
| EXPECT_THAT(q1.qname(), ElementsAreArray(kQName)); |
| |
| base::StringPiece question(reinterpret_cast<const char*>(query_data) + 12, |
| 21); |
| EXPECT_EQ(question, q1.question()); |
| } |
| |
| TEST(DnsQueryTest, CopiesAreIndependent) { |
| DnsQuery q1(26 /* id */, kQName, dns_protocol::kTypeAAAA); |
| |
| DnsQuery q2(q1); |
| |
| EXPECT_EQ(q1.id(), q2.id()); |
| EXPECT_EQ(base::StringPiece(q1.io_buffer()->data(), q1.io_buffer()->size()), |
| base::StringPiece(q2.io_buffer()->data(), q2.io_buffer()->size())); |
| EXPECT_NE(q1.io_buffer(), q2.io_buffer()); |
| } |
| |
| TEST(DnsQueryTest, Clone) { |
| DnsQuery q1(0, kQName, dns_protocol::kTypeA); |
| EXPECT_EQ(0, q1.id()); |
| std::unique_ptr<DnsQuery> q2 = q1.CloneWithNewId(42); |
| EXPECT_EQ(42, q2->id()); |
| EXPECT_EQ(q1.io_buffer()->size(), q2->io_buffer()->size()); |
| EXPECT_EQ(q1.qtype(), q2->qtype()); |
| EXPECT_EQ(q1.question(), q2->question()); |
| } |
| |
| TEST(DnsQueryTest, EDNS0) { |
| const uint8_t query_data[] = { |
| // Header |
| 0xbe, 0xef, 0x01, 0x00, // Flags -- set RD (recursion desired) bit. |
| // Set QDCOUNT (question count) and ARCOUNT (additional count) to 1, all |
| // the rest are 0 for a query. |
| 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, |
| // Question |
| 0x03, 'w', 'w', 'w', // QNAME: www.example.com in DNS format. |
| 0x07, 'e', 'x', 'a', 'm', 'p', 'l', 'e', 0x03, 'c', 'o', 'm', 0x00, |
| |
| 0x00, 0x01, // QTYPE: A query. |
| 0x00, 0x01, // QCLASS: IN class. |
| |
| // Additional |
| 0x00, // QNAME: empty (root domain) |
| 0x00, 0x29, // TYPE: OPT |
| 0x10, 0x00, // CLASS: max UDP payload size |
| 0x00, 0x00, 0x00, 0x00, // TTL: rcode, version and flags |
| 0x00, 0x08, // RDATA length |
| 0x00, 0xFF, // OPT code |
| 0x00, 0x04, // OPT data size |
| 0xDE, 0xAD, 0xBE, 0xEF // OPT data |
| }; |
| |
| OptRecordRdata opt_rdata; |
| opt_rdata.AddOpt( |
| OptRecordRdata::UnknownOpt::CreateForTesting(255, "\xde\xad\xbe\xef")); |
| DnsQuery q1(0xbeef, kQName, dns_protocol::kTypeA, &opt_rdata); |
| EXPECT_EQ(dns_protocol::kTypeA, q1.qtype()); |
| |
| EXPECT_THAT(AsTuple(q1.io_buffer()), ElementsAreArray(query_data)); |
| |
| base::StringPiece question(reinterpret_cast<const char*>(query_data) + 12, |
| 21); |
| EXPECT_EQ(question, q1.question()); |
| } |
| |
| TEST(DnsQueryTest, Block128Padding) { |
| DnsQuery query(46 /* id */, kQName, dns_protocol::kTypeAAAA, |
| nullptr /* opt_rdata */, |
| DnsQuery::PaddingStrategy::BLOCK_LENGTH_128); |
| |
| // Query is expected to be short and fit in a single 128-byte padded block. |
| EXPECT_EQ(128, query.io_buffer()->size()); |
| |
| // Ensure created query still parses as expected. |
| DnsQuery parsed_query(query.io_buffer()); |
| ASSERT_TRUE(parsed_query.Parse(query.io_buffer()->size())); |
| EXPECT_THAT(parsed_query.qname(), ElementsAreArray(kQName)); |
| EXPECT_EQ(parsed_query.qtype(), dns_protocol::kTypeAAAA); |
| } |
| |
| TEST(DnsQueryTest, Block128Padding_LongName) { |
| absl::optional<std::vector<uint8_t>> qname = |
| dns_names_util::DottedNameToNetwork( |
| "really.long.domain.name.that.will.push.us.past.the.128.byte.block." |
| "size.because.it.would.be.nice.to.test.something.realy.long.like." |
| "that.com"); |
| ASSERT_TRUE(qname.has_value()); |
| DnsQuery query(112 /* id */, qname.value(), dns_protocol::kTypeAAAA, |
| nullptr /* opt_rdata */, |
| DnsQuery::PaddingStrategy::BLOCK_LENGTH_128); |
| |
| // Query is expected to pad into a second 128-byte block. |
| EXPECT_EQ(query.io_buffer()->size(), 256); |
| EXPECT_THAT(query.qname(), ElementsAreArray(qname.value())); |
| |
| // Ensure created query still parses as expected. |
| DnsQuery parsed_query(query.io_buffer()); |
| ASSERT_TRUE(parsed_query.Parse(query.io_buffer()->size())); |
| EXPECT_THAT(parsed_query.qname(), ElementsAreArray(qname.value())); |
| EXPECT_EQ(parsed_query.qtype(), dns_protocol::kTypeAAAA); |
| } |
| |
| TEST(DnsQueryParseTest, SingleQuestionForTypeARecord) { |
| const uint8_t query_data[] = { |
| 0x12, 0x34, // ID |
| 0x00, 0x00, // flags |
| 0x00, 0x01, // number of questions |
| 0x00, 0x00, // number of answer rr |
| 0x00, 0x00, // number of name server rr |
| 0x00, 0x00, // number of additional rr |
| 0x03, 'w', 'w', 'w', 0x07, 'e', 'x', 'a', |
| 'm', 'p', 'l', 'e', 0x03, 'c', 'o', 'm', |
| 0x00, // null label |
| 0x00, 0x01, // type A Record |
| 0x00, 0x01, // class IN |
| }; |
| std::unique_ptr<DnsQuery> query; |
| EXPECT_TRUE(ParseAndCreateDnsQueryFromRawPacket(query_data, |
| sizeof(query_data), &query)); |
| EXPECT_EQ(query->id(), 0x1234); |
| EXPECT_THAT(query->qname(), ElementsAreArray(kQName)); |
| EXPECT_EQ(query->qtype(), dns_protocol::kTypeA); |
| } |
| |
| TEST(DnsQueryParseTest, SingleQuestionForTypeAAAARecord) { |
| const uint8_t query_data[] = { |
| 0x12, 0x34, // ID |
| 0x00, 0x00, // flags |
| 0x00, 0x01, // number of questions |
| 0x00, 0x00, // number of answer rr |
| 0x00, 0x00, // number of name server rr |
| 0x00, 0x00, // number of additional rr |
| 0x03, 'w', 'w', 'w', 0x07, 'e', 'x', 'a', |
| 'm', 'p', 'l', 'e', 0x03, 'c', 'o', 'm', |
| 0x00, // null label |
| 0x00, 0x1c, // type AAAA Record |
| 0x00, 0x01, // class IN |
| }; |
| std::unique_ptr<DnsQuery> query; |
| EXPECT_TRUE(ParseAndCreateDnsQueryFromRawPacket(query_data, |
| sizeof(query_data), &query)); |
| EXPECT_EQ(query->id(), 0x1234); |
| EXPECT_THAT(query->qname(), ElementsAreArray(kQName)); |
| EXPECT_EQ(query->qtype(), dns_protocol::kTypeAAAA); |
| } |
| |
| const uint8_t kQueryTruncatedQuestion[] = { |
| 0x12, 0x34, // ID |
| 0x00, 0x00, // flags |
| 0x00, 0x02, // number of questions |
| 0x00, 0x00, // number of answer rr |
| 0x00, 0x00, // number of name server rr |
| 0x00, 0x00, // number of additional rr |
| 0x03, 'w', 'w', 'w', 0x07, 'e', 'x', 'a', |
| 'm', 'p', 'l', 'e', 0x03, 'c', 'o', 'm', |
| 0x00, // null label |
| 0x00, 0x01, // type A Record |
| 0x00, // class IN, truncated |
| }; |
| |
| const uint8_t kQueryTwoQuestions[] = { |
| 0x12, 0x34, // ID |
| 0x00, 0x00, // flags |
| 0x00, 0x02, // number of questions |
| 0x00, 0x00, // number of answer rr |
| 0x00, 0x00, // number of name server rr |
| 0x00, 0x00, // number of additional rr |
| 0x03, 'w', 'w', 'w', 0x07, 'e', 'x', 'a', 'm', 'p', 'l', 'e', |
| 0x03, 'c', 'o', 'm', |
| 0x00, // null label |
| 0x00, 0x01, // type A Record |
| 0x00, 0x01, // class IN |
| 0x07, 'e', 'x', 'a', 'm', 'p', 'l', 'e', 0x03, 'o', 'r', 'g', |
| 0x00, // null label |
| 0x00, 0x1c, // type AAAA Record |
| 0x00, 0x01, // class IN |
| }; |
| |
| const uint8_t kQueryInvalidDNSDomainName1[] = { |
| 0x12, 0x34, // ID |
| 0x00, 0x00, // flags |
| 0x00, 0x01, // number of questions |
| 0x00, 0x00, // number of answer rr |
| 0x00, 0x00, // number of name server rr |
| 0x00, 0x00, // number of additional rr |
| 0x02, 'w', 'w', 'w', // wrong label length |
| 0x07, 'e', 'x', 'a', 'm', 'p', 'l', 'e', 0x03, 'c', 'o', 'm', |
| 0x00, // null label |
| 0x00, 0x01, // type A Record |
| 0x00, 0x01, // class IN |
| }; |
| |
| const uint8_t kQueryInvalidDNSDomainName2[] = { |
| 0x12, 0x34, // ID |
| 0x00, 0x00, // flags |
| 0x00, 0x01, // number of questions |
| 0x00, 0x00, // number of answer rr |
| 0x00, 0x00, // number of name server rr |
| 0x00, 0x00, // number of additional rr |
| 0xc0, 0x02, // illegal name pointer |
| 0x00, 0x01, // type A Record |
| 0x00, 0x01, // class IN |
| }; |
| |
| TEST(DnsQueryParseTest, FailsInvalidQueries) { |
| const struct TestCase { |
| const uint8_t* data; |
| size_t size; |
| } testcases[] = { |
| {kQueryTruncatedQuestion, std::size(kQueryTruncatedQuestion)}, |
| {kQueryTwoQuestions, std::size(kQueryTwoQuestions)}, |
| {kQueryInvalidDNSDomainName1, std::size(kQueryInvalidDNSDomainName1)}, |
| {kQueryInvalidDNSDomainName2, std::size(kQueryInvalidDNSDomainName2)}}; |
| std::unique_ptr<DnsQuery> query; |
| for (const auto& testcase : testcases) { |
| EXPECT_FALSE(ParseAndCreateDnsQueryFromRawPacket(testcase.data, |
| testcase.size, &query)); |
| } |
| } |
| |
| TEST(DnsQueryParseTest, ParsesLongName) { |
| const char kHeader[] = |
| "\x6f\x15" // ID |
| "\x00\x00" // FLAGS |
| "\x00\x01" // 1 question |
| "\x00\x00" // 0 answers |
| "\x00\x00" // 0 authority records |
| "\x00\x00"; // 0 additional records |
| |
| std::string long_name; |
| for (int i = 0; i <= dns_protocol::kMaxNameLength - 10; i += 10) { |
| long_name.append("\x09loongname"); |
| } |
| uint8_t remaining = dns_protocol::kMaxNameLength - long_name.size() - 1; |
| long_name.append(1, remaining); |
| for (int i = 0; i < remaining; ++i) { |
| long_name.append("a", 1); |
| } |
| ASSERT_LE(long_name.size(), |
| static_cast<size_t>(dns_protocol::kMaxNameLength)); |
| long_name.append("\x00", 1); |
| |
| std::string data(kHeader, sizeof(kHeader) - 1); |
| data.append(long_name); |
| data.append( |
| "\x00\x01" // TYPE=A |
| "\x00\x01", // CLASS=IN |
| 4); |
| |
| auto packet = base::MakeRefCounted<IOBufferWithSize>(data.size()); |
| memcpy(packet->data(), data.data(), data.size()); |
| DnsQuery query(packet); |
| |
| EXPECT_TRUE(query.Parse(data.size())); |
| } |
| |
| // Tests against incorrect name length validation, which is anti-pattern #3 from |
| // the "NAME:WRECK" report: |
| // https://www.forescout.com/company/resources/namewreck-breaking-and-fixing-dns-implementations/ |
| TEST(DnsQueryParseTest, FailsTooLongName) { |
| const char kHeader[] = |
| "\x5f\x15" // ID |
| "\x00\x00" // FLAGS |
| "\x00\x01" // 1 question |
| "\x00\x00" // 0 answers |
| "\x00\x00" // 0 authority records |
| "\x00\x00"; // 0 additional records |
| |
| std::string long_name; |
| for (int i = 0; i <= dns_protocol::kMaxNameLength; i += 10) { |
| long_name.append("\x09loongname"); |
| } |
| ASSERT_GT(long_name.size(), |
| static_cast<size_t>(dns_protocol::kMaxNameLength)); |
| long_name.append("\x00", 1); |
| |
| std::string data(kHeader, sizeof(kHeader) - 1); |
| data.append(long_name); |
| data.append( |
| "\x00\x01" // TYPE=A |
| "\x00\x01", // CLASS=IN |
| 4); |
| |
| auto packet = base::MakeRefCounted<IOBufferWithSize>(data.size()); |
| memcpy(packet->data(), data.data(), data.size()); |
| DnsQuery query(packet); |
| |
| EXPECT_FALSE(query.Parse(data.size())); |
| } |
| |
| // Tests against incorrect name length validation, which is anti-pattern #3 from |
| // the "NAME:WRECK" report: |
| // https://www.forescout.com/company/resources/namewreck-breaking-and-fixing-dns-implementations/ |
| TEST(DnsQueryParseTest, FailsTooLongSingleLabelName) { |
| const char kHeader[] = |
| "\x5f\x15" // ID |
| "\x00\x00" // FLAGS |
| "\x00\x01" // 1 question |
| "\x00\x00" // 0 answers |
| "\x00\x00" // 0 authority records |
| "\x00\x00"; // 0 additional records |
| |
| std::string long_name; |
| long_name.append(1, static_cast<char>(dns_protocol::kMaxNameLength)); |
| long_name.append(dns_protocol::kMaxNameLength, 'a'); |
| ASSERT_GT(long_name.size(), |
| static_cast<size_t>(dns_protocol::kMaxNameLength)); |
| long_name.append("\x00", 1); |
| |
| std::string data(kHeader, sizeof(kHeader) - 1); |
| data.append(long_name); |
| data.append( |
| "\x00\x01" // TYPE=A |
| "\x00\x01", // CLASS=IN |
| 4); |
| |
| auto packet = base::MakeRefCounted<IOBufferWithSize>(data.size()); |
| memcpy(packet->data(), data.data(), data.size()); |
| DnsQuery query(packet); |
| |
| EXPECT_FALSE(query.Parse(data.size())); |
| } |
| |
| // Test that a query cannot be parsed with a name extending past the end of the |
| // data. |
| // Tests against incorrect name length validation, which is anti-pattern #3 from |
| // the "NAME:WRECK" report: |
| // https://www.forescout.com/company/resources/namewreck-breaking-and-fixing-dns-implementations/ |
| TEST(DnsQueryParseTest, FailsNonendedName) { |
| const char kData[] = |
| "\x5f\x15" // ID |
| "\x00\x00" // FLAGS |
| "\x00\x01" // 1 question |
| "\x00\x00" // 0 answers |
| "\x00\x00" // 0 authority records |
| "\x00\x00" // 0 additional records |
| "\003www\006google\006test"; // Nonended name. |
| |
| auto packet = base::MakeRefCounted<IOBufferWithSize>(sizeof(kData) - 1); |
| memcpy(packet->data(), kData, sizeof(kData) - 1); |
| DnsQuery query(packet); |
| |
| EXPECT_FALSE(query.Parse(sizeof(kData) - 1)); |
| } |
| |
| // Test that a query cannot be parsed with a name without final null |
| // termination. Parsing should assume the name has not ended and find the first |
| // byte of the TYPE field instead, making the actual type unparsable. |
| // Tests against incorrect name null termination, which is anti-pattern #4 from |
| // the "NAME:WRECK" report: |
| // https://www.forescout.com/company/resources/namewreck-breaking-and-fixing-dns-implementations/ |
| TEST(DnsQueryParseTest, FailsNameWithoutTerminator) { |
| const char kData[] = |
| "\x5f\x15" // ID |
| "\x00\x00" // FLAGS |
| "\x00\x01" // 1 question |
| "\x00\x00" // 0 answers |
| "\x00\x00" // 0 authority records |
| "\x00\x00" // 0 additional records |
| "\003www\006google\004test" // Name without termination. |
| "\x00\x01" // TYPE=A |
| "\x00\x01"; // CLASS=IN |
| |
| auto packet = base::MakeRefCounted<IOBufferWithSize>(sizeof(kData) - 1); |
| memcpy(packet->data(), kData, sizeof(kData) - 1); |
| DnsQuery query(packet); |
| |
| EXPECT_FALSE(query.Parse(sizeof(kData) - 1)); |
| } |
| |
| TEST(DnsQueryParseTest, FailsQueryWithNoQuestions) { |
| const char kData[] = |
| "\x5f\x15" // ID |
| "\x00\x00" // FLAGS |
| "\x00\x00" // 0 questions |
| "\x00\x00" // 0 answers |
| "\x00\x00" // 0 authority records |
| "\x00\x00"; // 0 additional records |
| |
| auto packet = base::MakeRefCounted<IOBufferWithSize>(sizeof(kData) - 1); |
| memcpy(packet->data(), kData, sizeof(kData) - 1); |
| DnsQuery query(packet); |
| |
| EXPECT_FALSE(query.Parse(sizeof(kData) - 1)); |
| } |
| |
| TEST(DnsQueryParseTest, FailsQueryWithMultipleQuestions) { |
| const char kData[] = |
| "\x5f\x15" // ID |
| "\x00\x00" // FLAGS |
| "\x00\x02" // 2 questions |
| "\x00\x00" // 0 answers |
| "\x00\x00" // 0 authority records |
| "\x00\x00" // 0 additional records |
| "\003www\006google\004test\000" // www.google.test |
| "\x00\x01" // TYPE=A |
| "\x00\x01" // CLASS=IN |
| "\003www\006google\004test\000" // www.google.test |
| "\x00\x1c" // TYPE=AAAA |
| "\x00\x01"; // CLASS=IN |
| |
| auto packet = base::MakeRefCounted<IOBufferWithSize>(sizeof(kData) - 1); |
| memcpy(packet->data(), kData, sizeof(kData) - 1); |
| DnsQuery query(packet); |
| |
| EXPECT_FALSE(query.Parse(sizeof(kData) - 1)); |
| } |
| |
| // Test that if more questions are at the end of the buffer than the number of |
| // questions claimed in the query header, the extra questions are safely |
| // ignored. |
| TEST(DnsQueryParseTest, IgnoresExtraQuestion) { |
| const char kData[] = |
| "\x5f\x15" // ID |
| "\x00\x00" // FLAGS |
| "\x00\x01" // 1 question |
| "\x00\x00" // 0 answers |
| "\x00\x00" // 0 authority records |
| "\x00\x00" // 0 additional records |
| "\003www\006google\004test\000" // www.google.test |
| "\x00\x01" // TYPE=A |
| "\x00\x01" // CLASS=IN |
| "\003www\006google\004test\000" // www.google.test |
| "\x00\x1c" // TYPE=AAAA |
| "\x00\x01"; // CLASS=IN |
| |
| auto packet = base::MakeRefCounted<IOBufferWithSize>(sizeof(kData) - 1); |
| memcpy(packet->data(), kData, sizeof(kData) - 1); |
| DnsQuery query(packet); |
| |
| EXPECT_TRUE(query.Parse(sizeof(kData) - 1)); |
| |
| std::string expected_qname("\003www\006google\004test\000", 17); |
| EXPECT_THAT(query.qname(), ElementsAreArray(expected_qname)); |
| |
| EXPECT_EQ(query.qtype(), dns_protocol::kTypeA); |
| } |
| |
| // Test that the query fails to parse if it does not contain the number of |
| // questions claimed in the query header. |
| // Tests against incorrect record count field validation, which is anti-pattern |
| // #5 from the "NAME:WRECK" report: |
| // https://www.forescout.com/company/resources/namewreck-breaking-and-fixing-dns-implementations/ |
| TEST(DnsQueryParseTest, FailsQueryWithMissingQuestion) { |
| const char kData[] = |
| "\x5f\x15" // ID |
| "\x00\x00" // FLAGS |
| "\x00\x01" // 1 question |
| "\x00\x00" // 0 answers |
| "\x00\x00" // 0 authority records |
| "\x00\x00"; // 0 additional records |
| |
| auto packet = base::MakeRefCounted<IOBufferWithSize>(sizeof(kData) - 1); |
| memcpy(packet->data(), kData, sizeof(kData) - 1); |
| DnsQuery query(packet); |
| |
| EXPECT_FALSE(query.Parse(sizeof(kData) - 1)); |
| } |
| |
| // Test that DnsQuery parsing disallows name compression pointers (which should |
| // never be useful when only single-question queries are parsed). |
| // Indirectly tests against incorrect name compression pointer validation, which |
| // is anti-pattern #6 from the "NAME:WRECK" report: |
| // https://www.forescout.com/company/resources/namewreck-breaking-and-fixing-dns-implementations/ |
| TEST(DnsQueryParseTest, FailsQueryWithNamePointer) { |
| const char kData[] = |
| "\x5f\x15" // ID |
| "\x00\x00" // FLAGS |
| "\x00\x01" // 1 question |
| "\x00\x00" // 0 answers |
| "\x00\x00" // 0 authority records |
| "\x00\x00" // 0 additional records |
| "\003www\006google\300\035" // Name with pointer to byte 29 |
| "\x00\x01" // TYPE=A |
| "\x00\x01" // CLASS=IN |
| "\004test\000"; // Byte 29 (name pointer destination): test. |
| |
| auto packet = base::MakeRefCounted<IOBufferWithSize>(sizeof(kData) - 1); |
| memcpy(packet->data(), kData, sizeof(kData) - 1); |
| DnsQuery query(packet); |
| |
| EXPECT_FALSE(query.Parse(sizeof(kData) - 1)); |
| } |
| |
| } // namespace |
| |
| } // namespace net |