Object
The header portion of a DNS packet
RFC 1035 Section 4.1.1
The Authenticated Data flag Relevant in DNSSEC context. (The AD bit is only set on answers where signatures have been cryptographically verified or the server is authoritative for the data and is allowed to set the bit by policy.)
# File lib/Dnsruby/message.rb, line 778 778: def Header.decrement_arcount_encoded(bytes) 779: header = Header.new 780: header_end = 0 781: MessageDecoder.new(bytes) {|msg| 782: header.decode(msg) 783: header_end = msg.index 784: } 785: header.arcount = header.arcount - 1 786: bytes[0,header_end]=MessageEncoder.new {|msg| 787: header.encode(msg)}.to_s 788: return bytes 789: end
# File lib/Dnsruby/message.rb, line 718 718: def initialize(*args) 719: if (args.length == 0) 720: @id = rand(MAX_ID) 721: @qr = false 722: @opcode=OpCode.Query 723: @aa = false 724: @ad=false 725: @tc = false 726: @rd = false # recursion desired 727: @ra = false # recursion available 728: @cd=false 729: @rcode=RCode.NoError 730: @qdcount = 0 731: @nscount = 0 732: @ancount = 0 733: @arcount = 0 734: elsif (args.length == 1) 735: decode(args[0]) 736: end 737: end
# File lib/Dnsruby/message.rb, line 791 791: def ==(other) 792: return @qr == other.qr && 793: @opcode == other.opcode && 794: @aa == other.aa && 795: @tc == other.tc && 796: @rd == other.rd && 797: @ra == other.ra && 798: @cd == other.cd && 799: @ad == other.ad && 800: @rcode == other.get_header_rcode 801: end
# File lib/Dnsruby/message.rb, line 754 754: def data 755: return MessageEncoder.new {|msg| 756: self.encode(msg) 757: }.to_s 758: end
# File lib/Dnsruby/message.rb, line 840 840: def decode(msg) 841: @id, flag, @qdcount, @ancount, @nscount, @arcount = 842: msg.get_unpack('nnnnnn') 843: @qr = (((flag >> 15)&1)==1)?true:false 844: @opcode = OpCode.new((flag >> 11) & 15) 845: @aa = (((flag >> 10)&1)==1)?true:false 846: @tc = (((flag >> 9)&1)==1)?true:false 847: @rd = (((flag >> 8)&1)==1)?true:false 848: @ra = (((flag >> 7)&1)==1)?true:false 849: @ad = (((flag >> 5)&1)==1)?true:false 850: @cd = (((flag >> 4)&1)==1)?true:false 851: @rcode = RCode.new(flag & 15) 852: end
# File lib/Dnsruby/message.rb, line 760 760: def encode(msg) 761: msg.put_pack('nnnnnn', 762: @id, 763: (@qr ? 1:0) << 15 | 764: (@opcode.code & 15) << 11 | 765: (@aa ? 1:0) << 10 | 766: (@tc ? 1:0) << 9 | 767: (@rd ? 1:0) << 8 | 768: (@ra ? 1:0) << 7 | 769: (@ad ? 1:0) << 5 | 770: (@cd ? 1:0) << 4 | 771: (@rcode.code & 15), 772: @qdcount, 773: @ancount, 774: @nscount, 775: @arcount) 776: end
This new get_header_rcode method is intended for use only by the Message class. This is because the Message OPT section may contain an extended rcode (see RFC 2671 section 4.6). Using the header rcode only ignores this extension, and is not recommended.
# File lib/Dnsruby/message.rb, line 702 702: def get_header_rcode 703: @rcode 704: end
# File lib/Dnsruby/message.rb, line 739 739: def opcode=(op) 740: @opcode = OpCode.new(op) 741: end
# File lib/Dnsruby/message.rb, line 743 743: def rcode=(rcode) 744: @rcode = RCode.new(rcode) 745: end
# File lib/Dnsruby/message.rb, line 803 803: def to_s 804: to_s_with_rcode(@rcode) 805: end
# File lib/Dnsruby/message.rb, line 807 807: def to_s_with_rcode(rcode) 808: retval = ";; id = #{@id}\n"; 809: 810: if (@opcode == OpCode::Update) 811: retval += ";; qr = #{@qr} " + "opcode = #{@opcode.string} "+ "rcode = #{@rcode.string}\n"; 812: 813: retval += ";; zocount = #{@qdcount} "+ "prcount = #{@ancount} " + "upcount = #{@nscount} " + "adcount = #{@arcount}\n"; 814: else 815: retval += ";; qr = #{@qr} " + "opcode = #{@opcode.string} " + "aa = #{@aa} " + "tc = #{@tc} " + "rd = #{@rd}\n"; 816: 817: retval += ";; ra = #{@ra} " + "ad = #{@ad} " + "cd = #{@cd} " + "rcode = #{rcode.string}\n"; 818: 819: retval += ";; qdcount = #{@qdcount} " + "ancount = #{@ancount} " + "nscount = #{@nscount} " + "arcount = #{@arcount}\n"; 820: end 821: 822: return retval; 823: end
Disabled; run with --debug to generate this.
Generated with the Darkfish Rdoc Generator 1.1.6.