Commit Graph

165 Commits

Author SHA1 Message Date
jad 30043d2ba5 corrected name 2015-11-01 13:09:18 +09:00
jad 51eb2fdf55 working prototype 6 2015-11-01 12:47:49 +09:00
Willem Toorop ae2cc39a36 Full roadblock avoidance functionality 2015-11-01 12:28:43 +09:00
jad f5662bbf32 working prototype 5 2015-11-01 11:43:12 +09:00
jad 25f7f2182b working prototype 3 2015-11-01 11:04:03 +09:00
jad 80864655d7 Working prototype 2 2015-11-01 10:51:00 +09:00
jad a85b17c885 working prototype 1 2015-11-01 10:24:02 +09:00
Willem Toorop 58885e04d7 dnssec_roadblock_avoidance extension 2015-10-31 21:04:08 +09:00
Willem Toorop ca50a984c8 1 level JSON pointer reference lookup 2015-09-30 16:05:19 +02:00
Willem Toorop 015e387ea5 Final internal symbols rename to _getdns prefix 2015-08-19 16:33:19 +02:00
Willem Toorop b9e8455e27 Internal symbols always prefixed with _getdns 2015-08-19 16:30:15 +02:00
Willem Toorop fcd595298a Rename all priv_getdns internal symbols to _getdns 2015-08-19 16:22:38 +02:00
Willem Toorop 6350b4fad4 --without-libunbound option to configure 2015-08-19 10:47:46 +02:00
Willem Toorop 972ebf55d0 Merge branch 'features/str_without0byte' into develop 2015-08-17 16:30:54 +02:00
Willem Toorop 898fc15b6b Zero size only for non-repeating remaining data 2015-07-18 18:04:11 +02:00
Willem Toorop c7d40e2cbc Strings in bindata's without '\0' byte 2015-07-13 15:41:40 +02:00
Willem Toorop d4849dc0ba Fix read of uninitialized memory
Not a dangerous one though, but still...
2015-07-08 15:36:39 +02:00
Willem Toorop 201b6af9a2 clang compiler warnings + 1 bug!
Bug is countring insecure answers in util-internal.c
found by clang warning reporting
2015-07-08 13:07:24 +02:00
Willem Toorop d47c533b64 getdns_validate_dnssec validate replies in turn 2015-07-02 15:31:31 +02:00
Willem Toorop 6cffc4792b Validate replies with getdns_validate_dnssec
You can feed it the replies_tree as the records to validate list
2015-07-02 00:25:41 +02:00
Willem Toorop 41cf772fb3 Trust anchors in wireformat in context 2015-06-30 14:43:52 +02:00
Willem Toorop 8d5ac3afde Store dnsreq->name in wire format 2015-06-29 23:32:49 +02:00
Willem Toorop 407ecffb67 dnssec_status in netreqs 2015-06-29 22:23:01 +02:00
Willem Toorop f6c1a48b6e Validaton of wildcard answers 2015-06-27 23:28:23 +02:00
Willem Toorop 3631cd658a get_val_chain for all possible scenarios 2015-06-23 00:00:20 +02:00
Willem Toorop 129e340e8e Collect validation chains for RRs without sigs 2015-06-17 14:46:44 +02:00
Willem Toorop 39639a86c4 Make dname_equal reusable
+ some symbol renames
2015-06-16 16:11:51 +02:00
Willem Toorop 97f0dddb1e remove ldns dependency from rr-dict.c
Only dnssec.c left
2015-06-12 13:51:36 +02:00
Willem Toorop fd385454b4 rm a few more leftover ldns references 2015-06-11 12:04:59 +02:00
Willem Toorop 3aea9da626 edns_cookies extension 2015-03-20 21:37:54 +01:00
Willem Toorop d2345285a6 dnssec_return_validation_chain with stub resolving 2015-03-18 23:45:26 +01:00
Willem Toorop fa782d1043 --enable-broken-native-stub-dnssec
Still needs a little more work for wildcards and NODATA answers...
2015-03-18 14:45:06 +01:00
Willem Toorop 70cb26bb00 Read trust anchor file without ldns 2015-03-15 21:25:38 +01:00
Willem Toorop ebb519919a Get rid of ldns usage, and a malloc/free 2015-03-12 23:09:04 +01:00
Willem Toorop c02f895358 Miscelaneous cleanups
as a consequence of ldns elemination with local-hosts
2015-03-12 22:41:39 +01:00
Willem Toorop d48c509bfc Fix single repeat dict case 2015-03-09 23:31:49 +01:00
Willem Toorop d72151ed51 rdata_raw for unknown rr types 2015-03-06 16:12:51 +01:00
Willem Toorop fe10123323 header bits are 1 or 0 2015-03-05 15:26:06 +01:00
Willem Toorop 5575b9e31f Miscellaneous memory issues found with valgrind 2015-03-05 15:03:40 +01:00
Willem Toorop 9b90ced595 Make special handlers for rdf work
+ bugfix in repetition of rdf blocks
2015-02-18 20:39:56 +01:00
Willem Toorop f78fdd0594 Fix canonical_name at root of response dict
It will be the first canonical name in the replies.
2015-02-18 14:46:55 +01:00
Willem Toorop a77f156d08 Remote the ldns_pkt result from the netreq
Proving that we don't need ldns_pkt any more
2015-02-18 12:36:42 +01:00
Willem Toorop 05cc557de0 Special handling for OPT 2015-02-17 22:59:47 +01:00
Willem Toorop b1bf4a6741 canonical_name in reply dict + lose debug printing 2015-02-17 22:36:57 +01:00
Willem Toorop 7fecb7d922 Get rid of debugging info 2015-02-17 21:44:01 +01:00
Willem Toorop 73776bcd48 dname's as decompressed bindata's 2015-02-17 21:28:39 +01:00
Willem Toorop 1fea8d3d1f Don't forget to handle canonical name & dname's! 2015-02-17 11:58:51 +01:00
Willem Toorop ced873a80d Start with rdf iterators to rdata dict conversion
Todo:  OPT
2015-02-17 11:53:01 +01:00
Willem Toorop 177ee2046a Wireformat rdata field iterator 2015-02-14 21:42:25 +01:00
Willem Toorop 2dcc0a0da6 Prefix private types with priv_ too 2015-02-14 12:30:51 +01:00
Willem Toorop 37def257ee Start with wireformat RR iterator 2015-02-11 23:51:20 +01:00
Willem Toorop 6a16a56717 create response header from wireformat 2015-02-11 16:59:47 +01:00
Willem Toorop f01ed133f5 ldns_wire2pkt at create_getdns_response time only
This break priv_get_validation_chain
2015-02-11 14:55:22 +01:00
Willem Toorop aedc4366ff Wireformat debugging 2015-02-03 11:38:11 +01:00
Willem Toorop de2e0b1157 transfer wiredata with unbound requests too 2015-02-03 11:23:30 +01:00
Willem Toorop f1b916aac8 Store wireformat queries in netreq's too 2015-02-03 10:46:44 +01:00
Willem Toorop 3f046cf573 Embed netreqs in dns_reqs and wire_data in netreqs
TODO: make sure the wire_data buffer is filled with the response
2015-01-29 12:30:40 +01:00
Willem Toorop 736f5ff157 No executable flags on source files
Thanks Paul Wouters
2015-01-20 12:16:49 +01:00
Willem Toorop 4a3d7fd8b2 Replace ldns_rbtree with getdns_rbtree
As much as possible.
In dnssec ldns_rbtree is inderectly used via the dnssec_zone struct

This change forces use to embed the data in the nodes as getdns_rbtree does not have a data attribute. This is good because lesser allocs and free's and thus slightly faster and less likely to leak memory.
2014-10-23 23:00:30 +02:00
Willem Toorop 432092311e fix: Responses without question RRs (i.e. REFUSED) 2014-10-23 16:02:34 +02:00
saradickinson d9addba883 Second pass at implementing per query namespaces! 2014-09-25 15:59:05 +00:00
Willem Toorop 772efb1186 [API 0.506] GETDNS_RESPSTATUS_ALL_BOGUS_ANSWERS
return code for with the dnssec_return_only_secure extension
2014-09-03 16:09:50 +02:00
Willem Toorop fc2f091f05 timed synchronous resolves
Also returns an response dict with status GETDNS_RESPSTATUS_ALL_TIMEOUT on timeout
2014-07-01 23:31:40 +02:00
John Dickinson 06bec6645b Added code to construct a fake packet to allow the RCODE to be returned when libunbound refuses a query 2014-05-22 15:25:36 +00:00
Willem Toorop 57b51a5dcc prefer includes local to builddir 2014-05-19 15:50:34 +02:00
Willem Toorop a1351147da context->return_dnssec_status uninitialized
in getdns_context_create.

Also fix memory leak on create_default_namespaces error.
2014-03-07 11:18:23 +01:00
Willem Toorop d2c890ab6a Fill in <organization> place holder.
s/the name of the <organization>/the names of the copyright holders/g
2014-02-25 14:23:19 +01:00
Willem Toorop 8d77505219 s/Versign/Verisign/g in all files 2014-02-25 14:12:33 +01:00
Glen Wiley 6dd03b1cdc fixed spelling of NLnet in licenses, fixed make clean errs in docs 2014-02-24 09:26:20 -05:00
Neel Goyal 48fea8d9e0 Add getdns_context_set_return_dnssec_status 2014-02-20 15:42:10 -05:00
Glen Wiley 344893f87f fixed license and copyright notices 2014-02-20 09:12:19 -05:00
Willem Toorop 8a2e3937c6 Handle DNSSEC policies on the packet/reply level
- All DNSSEC extension add the "dnssec_status" to the reply dicts.

- With "dnssec_return_status" and "dnssec_return_only_secure", the
  "status" in the response dict is GETDNS_RESPSTATUS_NO_NAME when all
  replies are NXDOMAIN and/or BOGUS.

- With "dnssec_return_only_secure", the "status" in the response dict
  is GETDNS_RESPSTATUS_NO_SECURE_ANSWERS when non of the replies are
  SECURE, even when all were NXDOMAIN.

- When "dnssec_return_validation_chain" is set, besides the validation
  chain, all replies are returned, even when other DNSSEC extensions
  are set that would otherwise exclude these replies.  This is the only
  modus were one can observe the "dnssec_status" to be
  GETDNS_DNSSEC_BOGUS.

- When the "dnssec_return_status" extension is set (and
  "dnssec_return_validation_chain" is not), only non-bogus replies
  are returned.

- When the "dnssec_return_only_secure" extension is set (and
  "dnssec_return_validation_chain" is not), only secure
  replies are returned.
2014-02-17 14:54:13 +01:00
Willem Toorop 758b6279b2 GETDNS_RESPSTATUS_NO_NAME only with none NOERROR
So you can have zero answers and a GETDNS_RESPSTATUS_GOOD return status.
2014-02-13 10:19:16 +01:00
Neel Goyal ec7fc42ce0 Merge branch 'develop' of github.com:verisign/getdns into develop 2014-02-12 16:40:10 -05:00
Neel Goyal 22fa1101bb Add OPT Record parsing support 2014-02-12 16:39:55 -05:00
Willem Toorop b6c9b25fc7 dnssec_status & dnssec_return_only_secure exts. 2014-02-12 21:00:58 +01:00
Willem Toorop c51e597410 Configure option for trust anchor & dnssec_status 2014-02-11 22:42:21 +01:00
Glen Wiley bdff98ffb3 steps toward proper support of namespaces and system files 2014-02-10 19:59:45 -05:00
Willem Toorop 9c1b79b751 Make validate_dname rfc 4343 2.1 comformant 2014-02-05 17:00:37 +01:00
Neel Goyal c171b1ccc4 Remove |= and replace with do while(0) 2014-02-04 17:36:57 -05:00
Neel Goyal 3a694c2b02 Ensure domain name has at least a single character. hack. 2014-02-04 10:39:04 -05:00
Willem Toorop 4316a36a7c memory leak in getdns_apply_network_result 2014-02-04 15:14:51 +01:00
Neel Goyal 81c5de26ea Merge in develop. 2014-01-31 14:50:38 -05:00
Neel Goyal 1f847b0d96 Add timeout support 2014-01-31 14:43:02 -05:00
Willem Toorop 102a9b3be1 qnames also in dname wire format 2014-01-31 00:32:39 +01:00
Willem Toorop e759fb80cf Start with all section 5.3 types rr-dict creation
I guess for static functions and structs it is okay to give them any name,
but the private inter-object symbols should be distinguishable from the
non-private symbols (to export non-private ones later in one go with libtool)
2014-01-30 17:04:43 +01:00
Neel Goyal eb43d9fb02 Merge in develop latest 2014-01-28 10:04:10 -05:00
Willem Toorop f0f755ec86 Merge branch 'feature/return_validation_chain' into develop 2014-01-28 10:42:12 +01:00
Neel Goyal 4c0e13ac76 Attempt to address issue #46 2014-01-27 19:32:54 -05:00
Willem Toorop 4782c9b7cc Return validation chain when requested 2014-01-27 22:01:37 +01:00
Willem Toorop 232ce99558 Add dnssec test
+rename dnssec_return_supporting_responses to dnssec_return_validation_chain
2014-01-27 10:51:27 +01:00
Neel Goyal 2bcfedcf78 Initial pass at using unbound stock 2014-01-21 15:31:22 -05:00
Neel Goyal cc8fc8aaf7 Fix a typo for issue #43 fix 2013-12-12 14:01:37 -05:00
Neel Goyal 52befefdf8 Merge branch 'develop' of github.com:verisign/getdns into develop 2013-12-12 14:00:04 -05:00
Neel Goyal 93211cc99a Fix for issue #43 - add additional header fields 2013-12-12 13:59:53 -05:00
Willem Toorop 51f0299137 Fix example-reverse (and reverse_address)
From the example it is clear that network format addresses are expected for getdns_hostname*
2013-12-11 23:41:21 +01:00
Willem Toorop 8a8accea42 Copied examples from spec and fixed everything ;)
Well.. fixed the examples so they work and free memory
and fixed our code to return correct dict format with "just_address_answers"

Now tests are probably broken, and also the example-reverse needs some attention
2013-12-11 16:21:49 +01:00
Willem Toorop 3829dca0cc Get rid of typedefs for structs 2013-12-06 15:54:06 +01:00
Willem Toorop 7158291e05 Custom memory management functions in context 2013-11-11 23:10:22 +01:00
Neel Goyal f8380ff862 Ran indent with the indent.pro committed 2013-11-05 15:03:44 -05:00