aboutsummaryrefslogtreecommitdiff
path: root/contrib/unbound/testcode/doqclient.c
diff options
context:
space:
mode:
Diffstat (limited to 'contrib/unbound/testcode/doqclient.c')
-rw-r--r--contrib/unbound/testcode/doqclient.c2764
1 files changed, 2764 insertions, 0 deletions
diff --git a/contrib/unbound/testcode/doqclient.c b/contrib/unbound/testcode/doqclient.c
new file mode 100644
index 000000000000..238a9380306d
--- /dev/null
+++ b/contrib/unbound/testcode/doqclient.c
@@ -0,0 +1,2764 @@
+/*
+ * testcode/doqclient.c - debug program. Perform multiple DNS queries using DoQ.
+ *
+ * Copyright (c) 2022, NLnet Labs. All rights reserved.
+ *
+ * This software is open source.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ *
+ * Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ *
+ * Neither the name of the NLNET LABS nor the names of its contributors may
+ * be used to endorse or promote products derived from this software without
+ * specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
+ * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
+ * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+/**
+ * \file
+ *
+ * Simple DNS-over-QUIC client. For testing and debugging purposes.
+ * No authentication of TLS cert.
+ */
+
+#include "config.h"
+#ifdef HAVE_GETOPT_H
+#include <getopt.h>
+#endif
+
+#ifdef HAVE_NGTCP2
+#include <ngtcp2/ngtcp2.h>
+#include <ngtcp2/ngtcp2_crypto.h>
+#ifdef HAVE_NGTCP2_NGTCP2_CRYPTO_OSSL_H
+#include <ngtcp2/ngtcp2_crypto_ossl.h>
+#elif defined(HAVE_NGTCP2_NGTCP2_CRYPTO_QUICTLS_H)
+#include <ngtcp2/ngtcp2_crypto_quictls.h>
+#elif defined(HAVE_NGTCP2_NGTCP2_CRYPTO_OPENSSL_H)
+#include <ngtcp2/ngtcp2_crypto_openssl.h>
+#define MAKE_QUIC_METHOD 1
+#endif
+#include <openssl/ssl.h>
+#include <openssl/rand.h>
+#ifdef HAVE_TIME_H
+#include <time.h>
+#endif
+#include <sys/time.h>
+#include "util/locks.h"
+#include "util/net_help.h"
+#include "sldns/sbuffer.h"
+#include "sldns/str2wire.h"
+#include "sldns/wire2str.h"
+#include "util/data/msgreply.h"
+#include "util/data/msgencode.h"
+#include "util/data/msgparse.h"
+#include "util/data/dname.h"
+#include "util/random.h"
+#include "util/ub_event.h"
+struct doq_client_stream_list;
+struct doq_client_stream;
+
+/** the local client data for the DoQ connection */
+struct doq_client_data {
+ /** file descriptor */
+ int fd;
+ /** the event base for the events */
+ struct ub_event_base* base;
+ /** the ub event */
+ struct ub_event* ev;
+ /** the expiry timer */
+ struct ub_event* expire_timer;
+ /** is the expire_timer added */
+ int expire_timer_added;
+ /** the ngtcp2 connection information */
+ struct ngtcp2_conn* conn;
+ /** random state */
+ struct ub_randstate* rnd;
+ /** server connected to as a string */
+ const char* svr;
+ /** the static secret */
+ uint8_t* static_secret_data;
+ /** the static secret size */
+ size_t static_secret_size;
+ /** destination address sockaddr */
+ struct sockaddr_storage dest_addr;
+ /** length of dest addr */
+ socklen_t dest_addr_len;
+ /** local address sockaddr */
+ struct sockaddr_storage local_addr;
+ /** length of local addr */
+ socklen_t local_addr_len;
+ /** SSL context */
+ SSL_CTX* ctx;
+ /** SSL object */
+ SSL* ssl;
+#if defined(USE_NGTCP2_CRYPTO_OSSL) || defined(HAVE_NGTCP2_CRYPTO_QUICTLS_CONFIGURE_CLIENT_CONTEXT)
+ /** the connection reference for ngtcp2_conn and userdata in ssl */
+ struct ngtcp2_crypto_conn_ref conn_ref;
+#endif
+#ifdef USE_NGTCP2_CRYPTO_OSSL
+ /** the per-connection state for ngtcp2_crypto_ossl */
+ struct ngtcp2_crypto_ossl_ctx* ossl_ctx;
+#endif
+ /** the quic version to use */
+ uint32_t quic_version;
+ /** the last error */
+#ifdef HAVE_NGTCP2_CCERR_DEFAULT
+ struct ngtcp2_ccerr ccerr;
+#else
+ struct ngtcp2_connection_close_error last_error;
+#endif
+ /** the recent tls alert error code */
+ uint8_t tls_alert;
+ /** the buffer for packet operations */
+ struct sldns_buffer* pkt_buf;
+ /** The list of queries to start. They have no stream associated.
+ * Once they do, they move to the send list. */
+ struct doq_client_stream_list* query_list_start;
+ /** The list of queries to send. They have a stream, and they are
+ * sending data. Data could also be received, like errors. */
+ struct doq_client_stream_list* query_list_send;
+ /** The list of queries to receive. They have a stream, and the
+ * send is done, it is possible to read data. */
+ struct doq_client_stream_list* query_list_receive;
+ /** The list of queries that are stopped. They have no stream
+ * active any more. Write and read are done. The query is done,
+ * and it may be in error and then have no answer or partial answer. */
+ struct doq_client_stream_list* query_list_stop;
+ /** is there a blocked packet in the blocked_pkt buffer */
+ int have_blocked_pkt;
+ /** store blocked packet, a packet that could not be sent on the
+ * nonblocking socket. */
+ struct sldns_buffer* blocked_pkt;
+ /** ecn info for the blocked packet */
+ struct ngtcp2_pkt_info blocked_pkt_pi;
+ /** the congestion control algorithm */
+ ngtcp2_cc_algo cc_algo;
+ /** the transport parameters file, for early data transmission */
+ const char* transport_file;
+ /** the tls session file, for session resumption */
+ const char* session_file;
+ /** if early data is enabled for the connection */
+ int early_data_enabled;
+ /** how quiet is the output */
+ int quiet;
+ /** the configured port for the destination */
+ int port;
+};
+
+/** the local client stream list, for appending streams to */
+struct doq_client_stream_list {
+ /** first and last members of the list */
+ struct doq_client_stream* first, *last;
+};
+
+/** the local client data for a DoQ stream */
+struct doq_client_stream {
+ /** next stream in list, and prev in list */
+ struct doq_client_stream* next, *prev;
+ /** the data buffer */
+ uint8_t* data;
+ /** length of the data buffer */
+ size_t data_len;
+ /** if the client query has a stream, that is active, associated with
+ * it. The stream_id is in stream_id. */
+ int has_stream;
+ /** the stream id */
+ int64_t stream_id;
+ /** data written position */
+ size_t nwrite;
+ /** the data length for write, in network format */
+ uint16_t data_tcplen;
+ /** if the write of the query data is done. That means the
+ * write channel has FIN, is closed for writing. */
+ int write_is_done;
+ /** data read position */
+ size_t nread;
+ /** the answer length, in network byte order */
+ uint16_t answer_len;
+ /** the answer buffer */
+ struct sldns_buffer* answer;
+ /** the answer is complete */
+ int answer_is_complete;
+ /** the query has an error, it has no answer, or no complete answer */
+ int query_has_error;
+ /** if the query is done */
+ int query_is_done;
+};
+
+#ifdef MAKE_QUIC_METHOD
+/** the quic method struct, must remain valid during the QUIC connection. */
+static SSL_QUIC_METHOD quic_method;
+#endif
+
+#if defined(USE_NGTCP2_CRYPTO_OSSL) || defined(HAVE_NGTCP2_CRYPTO_QUICTLS_CONFIGURE_CLIENT_CONTEXT)
+/** Get the connection ngtcp2_conn from the ssl app data
+ * ngtcp2_crypto_conn_ref */
+static ngtcp2_conn* conn_ref_get_conn(ngtcp2_crypto_conn_ref* conn_ref)
+{
+ struct doq_client_data* data = (struct doq_client_data*)
+ conn_ref->user_data;
+ return data->conn;
+}
+#endif
+
+static void
+set_app_data(SSL* ssl, struct doq_client_data* data)
+{
+#if defined(USE_NGTCP2_CRYPTO_OSSL) || defined(HAVE_NGTCP2_CRYPTO_QUICTLS_CONFIGURE_CLIENT_CONTEXT)
+ data->conn_ref.get_conn = &conn_ref_get_conn;
+ data->conn_ref.user_data = data;
+ SSL_set_app_data(ssl, &data->conn_ref);
+#else
+ SSL_set_app_data(ssl, data);
+#endif
+}
+
+static struct doq_client_data*
+get_app_data(SSL* ssl)
+{
+ struct doq_client_data* data;
+#if defined(USE_NGTCP2_CRYPTO_OSSL) || defined(HAVE_NGTCP2_CRYPTO_QUICTLS_CONFIGURE_CLIENT_CONTEXT)
+ data = (struct doq_client_data*)((struct ngtcp2_crypto_conn_ref*)
+ SSL_get_app_data(ssl))->user_data;
+#else
+ data = (struct doq_client_data*) SSL_get_app_data(ssl);
+#endif
+ return data;
+}
+
+
+
+/** write handle routine */
+static void on_write(struct doq_client_data* data);
+/** update the timer */
+static void update_timer(struct doq_client_data* data);
+/** disconnect we are done */
+static void disconnect(struct doq_client_data* data);
+/** fetch and write the transport file */
+static void early_data_write_transport(struct doq_client_data* data);
+
+/** usage of doqclient */
+static void usage(char* argv[])
+{
+ printf("usage: %s [options] name type class ...\n", argv[0]);
+ printf(" sends the name-type-class queries over "
+ "DNS-over-QUIC.\n");
+ printf("-s server IP address to send the queries to, "
+ "default: 127.0.0.1\n");
+ printf("-p Port to connect to, default: %d\n",
+ UNBOUND_DNS_OVER_QUIC_PORT);
+ printf("-v verbose output\n");
+ printf("-q quiet, short output of answer\n");
+ printf("-x file transport file, for read/write of transport parameters.\n\t\tIf it exists, it is used to send early data. It is then\n\t\twritten to contain the last used transport parameters.\n\t\tAlso -y must be enabled for early data to succeed.\n");
+ printf("-y file session file, for read/write of TLS session. If it exists,\n\t\tit is used for TLS session resumption. It is then written\n\t\tto contain the last session used.\n\t\tOn its own, without also -x, resumes TLS session.\n");
+ printf("-h This help text\n");
+ exit(1);
+}
+
+/** get the dest address */
+static void
+get_dest_addr(struct doq_client_data* data, const char* svr, int port)
+{
+ if(!ipstrtoaddr(svr, port, &data->dest_addr, &data->dest_addr_len)) {
+ printf("fatal: bad server specs '%s'\n", svr);
+ exit(1);
+ }
+}
+
+/** open UDP socket to svr */
+static int
+open_svr_udp(struct doq_client_data* data)
+{
+ int fd = -1;
+ int r;
+ fd = socket(addr_is_ip6(&data->dest_addr, data->dest_addr_len)?
+ PF_INET6:PF_INET, SOCK_DGRAM, 0);
+ if(fd == -1) {
+ perror("socket() error");
+ exit(1);
+ }
+ r = connect(fd, (struct sockaddr*)&data->dest_addr,
+ data->dest_addr_len);
+ if(r < 0 && r != EINPROGRESS) {
+ perror("connect() error");
+ exit(1);
+ }
+ fd_set_nonblock(fd);
+ return fd;
+}
+
+/** get the local address of the connection */
+static void
+get_local_addr(struct doq_client_data* data)
+{
+ memset(&data->local_addr, 0, sizeof(data->local_addr));
+ data->local_addr_len = (socklen_t)sizeof(data->local_addr);
+ if(getsockname(data->fd, (struct sockaddr*)&data->local_addr,
+ &data->local_addr_len) == -1) {
+ perror("getsockname() error");
+ exit(1);
+ }
+ log_addr(1, "local_addr", &data->local_addr, data->local_addr_len);
+ log_addr(1, "dest_addr", &data->dest_addr, data->dest_addr_len);
+}
+
+static sldns_buffer*
+make_query(char* qname, char* qtype, char* qclass)
+{
+ struct query_info qinfo;
+ struct edns_data edns;
+ sldns_buffer* buf = sldns_buffer_new(65553);
+ if(!buf) fatal_exit("out of memory");
+ qinfo.qname = sldns_str2wire_dname(qname, &qinfo.qname_len);
+ if(!qinfo.qname) {
+ printf("cannot parse query name: '%s'\n", qname);
+ exit(1);
+ }
+
+ qinfo.qtype = sldns_get_rr_type_by_name(qtype);
+ qinfo.qclass = sldns_get_rr_class_by_name(qclass);
+ qinfo.local_alias = NULL;
+
+ qinfo_query_encode(buf, &qinfo); /* flips buffer */
+ free(qinfo.qname);
+ sldns_buffer_write_u16_at(buf, 0, 0x0000);
+ sldns_buffer_write_u16_at(buf, 2, BIT_RD);
+ memset(&edns, 0, sizeof(edns));
+ edns.edns_present = 1;
+ edns.bits = EDNS_DO;
+ edns.udp_size = 4096;
+ if(sldns_buffer_capacity(buf) >=
+ sldns_buffer_limit(buf)+calc_edns_field_size(&edns))
+ attach_edns_record(buf, &edns);
+ return buf;
+}
+
+/** create client stream structure */
+static struct doq_client_stream*
+client_stream_create(struct sldns_buffer* query_data)
+{
+ struct doq_client_stream* str = calloc(1, sizeof(*str));
+ if(!str)
+ fatal_exit("calloc failed: out of memory");
+ str->data = memdup(sldns_buffer_begin(query_data),
+ sldns_buffer_limit(query_data));
+ if(!str->data)
+ fatal_exit("alloc data failed: out of memory");
+ str->data_len = sldns_buffer_limit(query_data);
+ str->stream_id = -1;
+ return str;
+}
+
+/** free client stream structure */
+static void
+client_stream_free(struct doq_client_stream* str)
+{
+ if(!str)
+ return;
+ free(str->data);
+ sldns_buffer_free(str->answer);
+ free(str);
+}
+
+/** setup the stream to start the write process */
+static void
+client_stream_start_setup(struct doq_client_stream* str, int64_t stream_id)
+{
+ str->has_stream = 1;
+ str->stream_id = stream_id;
+ str->nwrite = 0;
+ str->nread = 0;
+ str->answer_len = 0;
+ str->query_is_done = 0;
+ str->answer_is_complete = 0;
+ str->query_has_error = 0;
+ if(str->answer) {
+ sldns_buffer_free(str->answer);
+ str->answer = NULL;
+ }
+}
+
+/** Return string for log purposes with query name. */
+static char*
+client_stream_string(struct doq_client_stream* str)
+{
+ char* s;
+ size_t dname_len;
+ char dname[256], tpstr[32], result[256+32+16];
+ uint16_t tp;
+ if(str->data_len <= LDNS_HEADER_SIZE) {
+ s = strdup("query_with_no_question");
+ if(!s)
+ fatal_exit("strdup failed: out of memory");
+ return s;
+ }
+ dname_len = dname_valid(str->data+LDNS_HEADER_SIZE,
+ str->data_len-LDNS_HEADER_SIZE);
+ if(!dname_len) {
+ s = strdup("query_dname_not_valid");
+ if(!s)
+ fatal_exit("strdup failed: out of memory");
+ return s;
+ }
+ (void)sldns_wire2str_dname_buf(str->data+LDNS_HEADER_SIZE, dname_len,
+ dname, sizeof(dname));
+ tp = sldns_wirerr_get_type(str->data+LDNS_HEADER_SIZE,
+ str->data_len-LDNS_HEADER_SIZE, dname_len);
+ (void)sldns_wire2str_type_buf(tp, tpstr, sizeof(tpstr));
+ snprintf(result, sizeof(result), "%s %s", dname, tpstr);
+ s = strdup(result);
+ if(!s)
+ fatal_exit("strdup failed: out of memory");
+ return s;
+}
+
+/** create query stream list */
+static struct doq_client_stream_list*
+stream_list_create(void)
+{
+ struct doq_client_stream_list* list = calloc(1, sizeof(*list));
+ if(!list)
+ fatal_exit("calloc failed: out of memory");
+ return list;
+}
+
+/** free the query stream list */
+static void
+stream_list_free(struct doq_client_stream_list* list)
+{
+ struct doq_client_stream* str;
+ if(!list)
+ return;
+ str = list->first;
+ while(str) {
+ struct doq_client_stream* next = str->next;
+ client_stream_free(str);
+ str = next;
+ }
+ free(list);
+}
+
+/** append item to list */
+static void
+stream_list_append(struct doq_client_stream_list* list,
+ struct doq_client_stream* str)
+{
+ if(list->last) {
+ str->prev = list->last;
+ list->last->next = str;
+ } else {
+ str->prev = NULL;
+ list->first = str;
+ }
+ str->next = NULL;
+ list->last = str;
+}
+
+/** delete the item from the list */
+static void
+stream_list_delete(struct doq_client_stream_list* list,
+ struct doq_client_stream* str)
+{
+ if(str->next) {
+ str->next->prev = str->prev;
+ } else {
+ list->last = str->prev;
+ }
+ if(str->prev) {
+ str->prev->next = str->next;
+ } else {
+ list->first = str->next;
+ }
+ str->prev = NULL;
+ str->next = NULL;
+}
+
+/** move the item from list1 to list2 */
+static void
+stream_list_move(struct doq_client_stream* str,
+ struct doq_client_stream_list* list1,
+ struct doq_client_stream_list* list2)
+{
+ stream_list_delete(list1, str);
+ stream_list_append(list2, str);
+}
+
+/** allocate stream data buffer, then answer length is complete */
+static void
+client_stream_datalen_complete(struct doq_client_stream* str)
+{
+ verbose(1, "answer length %d", (int)ntohs(str->answer_len));
+ str->answer = sldns_buffer_new(ntohs(str->answer_len));
+ if(!str->answer)
+ fatal_exit("sldns_buffer_new failed: out of memory");
+ sldns_buffer_set_limit(str->answer, ntohs(str->answer_len));
+}
+
+/** print the answer rrs */
+static void
+print_answer_rrs(uint8_t* pkt, size_t pktlen)
+{
+ char buf[65535];
+ char* str;
+ size_t str_len;
+ int i, qdcount, ancount;
+ uint8_t* data = pkt;
+ size_t data_len = pktlen;
+ int comprloop = 0;
+ if(data_len < LDNS_HEADER_SIZE)
+ return;
+ qdcount = LDNS_QDCOUNT(data);
+ ancount = LDNS_ANCOUNT(data);
+ data += LDNS_HEADER_SIZE;
+ data_len -= LDNS_HEADER_SIZE;
+
+ for(i=0; i<qdcount; i++) {
+ str = buf;
+ str_len = sizeof(buf);
+ (void)sldns_wire2str_rrquestion_scan(&data, &data_len,
+ &str, &str_len, pkt, pktlen, &comprloop);
+ }
+ for(i=0; i<ancount; i++) {
+ str = buf;
+ str_len = sizeof(buf);
+ (void)sldns_wire2str_rr_scan(&data, &data_len, &str, &str_len,
+ pkt, pktlen, &comprloop);
+ /* terminate string */
+ if(str_len == 0)
+ buf[sizeof(buf)-1] = 0;
+ else *str = 0;
+ printf("%s", buf);
+ }
+}
+
+/** short output of answer, short error or rcode or answer section RRs. */
+static void
+client_stream_print_short(struct doq_client_stream* str)
+{
+ int rcode, ancount;
+ if(str->query_has_error) {
+ char* logs = client_stream_string(str);
+ printf("%s has error, there is no answer\n", logs);
+ free(logs);
+ return;
+ }
+ if(sldns_buffer_limit(str->answer) < LDNS_HEADER_SIZE) {
+ char* logs = client_stream_string(str);
+ printf("%s received short packet, smaller than header\n",
+ logs);
+ free(logs);
+ return;
+ }
+ rcode = LDNS_RCODE_WIRE(sldns_buffer_begin(str->answer));
+ if(rcode != 0) {
+ char* logs = client_stream_string(str);
+ char rc[16];
+ (void)sldns_wire2str_rcode_buf(rcode, rc, sizeof(rc));
+ printf("%s rcode %s\n", logs, rc);
+ free(logs);
+ return;
+ }
+ ancount = LDNS_ANCOUNT(sldns_buffer_begin(str->answer));
+ if(ancount == 0) {
+ char* logs = client_stream_string(str);
+ printf("%s nodata answer\n", logs);
+ free(logs);
+ return;
+ }
+ print_answer_rrs(sldns_buffer_begin(str->answer),
+ sldns_buffer_limit(str->answer));
+}
+
+/** print the stream output answer */
+static void
+client_stream_print_long(struct doq_client_data* data,
+ struct doq_client_stream* str)
+{
+ char* s;
+ if(str->query_has_error) {
+ char* logs = client_stream_string(str);
+ printf("%s has error, there is no answer\n", logs);
+ free(logs);
+ return;
+ }
+ s = sldns_wire2str_pkt(sldns_buffer_begin(str->answer),
+ sldns_buffer_limit(str->answer));
+ printf("%s", (s?s:";sldns_wire2str_pkt failed\n"));
+ printf(";; SERVER: %s %d\n", data->svr, data->port);
+ free(s);
+}
+
+/** the stream has completed the data */
+static void
+client_stream_data_complete(struct doq_client_stream* str)
+{
+ verbose(1, "received all answer content");
+ if(verbosity > 0) {
+ char* logs = client_stream_string(str);
+ char* s;
+ log_buf(1, "received answer", str->answer);
+ s = sldns_wire2str_pkt(sldns_buffer_begin(str->answer),
+ sldns_buffer_limit(str->answer));
+ if(!s) verbose(1, "could not sldns_wire2str_pkt");
+ else verbose(1, "query %s received:\n%s", logs, s);
+ free(s);
+ free(logs);
+ }
+ str->answer_is_complete = 1;
+}
+
+/** the stream has completed but with an error */
+static void
+client_stream_answer_error(struct doq_client_stream* str)
+{
+ if(verbosity > 0) {
+ char* logs = client_stream_string(str);
+ if(str->answer)
+ verbose(1, "query %s has an error. received %d/%d bytes.",
+ logs, (int)sldns_buffer_position(str->answer),
+ (int)sldns_buffer_limit(str->answer));
+ else
+ verbose(1, "query %s has an error. received no data.",
+ logs);
+ free(logs);
+ }
+ str->query_has_error = 1;
+}
+
+/** receive data for a stream */
+static void
+client_stream_recv_data(struct doq_client_stream* str, const uint8_t* data,
+ size_t datalen)
+{
+ int got_data = 0;
+ /* read the tcplength uint16_t at the start of the DNS message */
+ if(str->nread < 2) {
+ size_t to_move = datalen;
+ if(datalen > 2-str->nread)
+ to_move = 2-str->nread;
+ memmove(((uint8_t*)&str->answer_len)+str->nread, data,
+ to_move);
+ str->nread += to_move;
+ data += to_move;
+ datalen -= to_move;
+ if(str->nread == 2) {
+ /* we can allocate the data buffer */
+ client_stream_datalen_complete(str);
+ }
+ }
+ /* if we have data bytes */
+ if(datalen > 0) {
+ size_t to_write = datalen;
+ if(datalen > sldns_buffer_remaining(str->answer))
+ to_write = sldns_buffer_remaining(str->answer);
+ if(to_write > 0) {
+ sldns_buffer_write(str->answer, data, to_write);
+ str->nread += to_write;
+ data += to_write;
+ datalen -= to_write;
+ got_data = 1;
+ }
+ }
+ /* extra received bytes after end? */
+ if(datalen > 0) {
+ verbose(1, "extra bytes after end of DNS length");
+ if(verbosity > 0)
+ log_hex("extradata", (void*)data, datalen);
+ }
+ /* are we done with it? */
+ if(got_data && str->nread >= (size_t)(ntohs(str->answer_len))+2) {
+ client_stream_data_complete(str);
+ }
+}
+
+/** receive FIN from remote end on client stream, no more data to be
+ * received on the stream. */
+static void
+client_stream_recv_fin(struct doq_client_data* data,
+ struct doq_client_stream* str, int is_fin)
+{
+ if(verbosity > 0) {
+ char* logs = client_stream_string(str);
+ if(is_fin)
+ verbose(1, "query %s: received FIN from remote", logs);
+ else
+ verbose(1, "query %s: stream reset from remote", logs);
+ free(logs);
+ }
+ if(str->write_is_done)
+ stream_list_move(str, data->query_list_receive,
+ data->query_list_stop);
+ else
+ stream_list_move(str, data->query_list_send,
+ data->query_list_stop);
+ if(!str->answer_is_complete) {
+ client_stream_answer_error(str);
+ }
+ str->query_is_done = 1;
+ if(data->quiet)
+ client_stream_print_short(str);
+ else client_stream_print_long(data, str);
+ if(data->query_list_send->first==NULL &&
+ data->query_list_receive->first==NULL)
+ disconnect(data);
+}
+
+/** fill a buffer with random data */
+static void fill_rand(struct ub_randstate* rnd, uint8_t* buf, size_t len)
+{
+ if(RAND_bytes(buf, len) != 1) {
+ size_t i;
+ for(i=0; i<len; i++)
+ buf[i] = ub_random(rnd)&0xff;
+ }
+}
+
+/** create the static secret */
+static void generate_static_secret(struct doq_client_data* data, size_t len)
+{
+ data->static_secret_data = malloc(len);
+ if(!data->static_secret_data)
+ fatal_exit("malloc failed: out of memory");
+ data->static_secret_size = len;
+ fill_rand(data->rnd, data->static_secret_data, len);
+}
+
+/** fill cid structure with random data */
+static void cid_randfill(struct ngtcp2_cid* cid, size_t datalen,
+ struct ub_randstate* rnd)
+{
+ uint8_t buf[32];
+ if(datalen > sizeof(buf))
+ datalen = sizeof(buf);
+ fill_rand(rnd, buf, datalen);
+ ngtcp2_cid_init(cid, buf, datalen);
+}
+
+/** send buf on the client stream */
+static int
+client_bidi_stream(struct doq_client_data* data, int64_t* ret_stream_id,
+ void* stream_user_data)
+{
+ int64_t stream_id;
+ int rv;
+
+ /* open new bidirectional stream */
+ rv = ngtcp2_conn_open_bidi_stream(data->conn, &stream_id,
+ stream_user_data);
+ if(rv != 0) {
+ if(rv == NGTCP2_ERR_STREAM_ID_BLOCKED) {
+ /* no bidi stream count for this new stream */
+ return 0;
+ }
+ fatal_exit("could not ngtcp2_conn_open_bidi_stream: %s",
+ ngtcp2_strerror(rv));
+ }
+ *ret_stream_id = stream_id;
+ return 1;
+}
+
+/** See if we can start query streams, by creating bidirectional streams
+ * on the QUIC transport for them. */
+static void
+query_streams_start(struct doq_client_data* data)
+{
+ while(data->query_list_start->first) {
+ struct doq_client_stream* str = data->query_list_start->first;
+ int64_t stream_id = 0;
+ if(!client_bidi_stream(data, &stream_id, str)) {
+ /* no more bidi streams allowed */
+ break;
+ }
+ if(verbosity > 0) {
+ char* logs = client_stream_string(str);
+ verbose(1, "query %s start on bidi stream id %lld",
+ logs, (long long int)stream_id);
+ free(logs);
+ }
+ /* setup the stream to start */
+ client_stream_start_setup(str, stream_id);
+ /* move the query entry to the send list to write it */
+ stream_list_move(str, data->query_list_start,
+ data->query_list_send);
+ }
+}
+
+/** the rand callback routine from ngtcp2 */
+static void rand_cb(uint8_t* dest, size_t destlen,
+ const ngtcp2_rand_ctx* rand_ctx)
+{
+ struct ub_randstate* rnd = (struct ub_randstate*)
+ rand_ctx->native_handle;
+ fill_rand(rnd, dest, destlen);
+}
+
+/** the get_new_connection_id callback routine from ngtcp2 */
+static int get_new_connection_id_cb(struct ngtcp2_conn* ATTR_UNUSED(conn),
+ struct ngtcp2_cid* cid, uint8_t* token, size_t cidlen, void* user_data)
+{
+ struct doq_client_data* data = (struct doq_client_data*)user_data;
+ cid_randfill(cid, cidlen, data->rnd);
+ if(ngtcp2_crypto_generate_stateless_reset_token(token,
+ data->static_secret_data, data->static_secret_size, cid) != 0)
+ return NGTCP2_ERR_CALLBACK_FAILURE;
+ return 0;
+}
+
+/** handle that early data is rejected */
+static void
+early_data_is_rejected(struct doq_client_data* data)
+{
+ int rv;
+ verbose(1, "early data was rejected by the server");
+#ifdef HAVE_NGTCP2_CONN_TLS_EARLY_DATA_REJECTED
+ rv = ngtcp2_conn_tls_early_data_rejected(data->conn);
+#else
+ rv = ngtcp2_conn_early_data_rejected(data->conn);
+#endif
+ if(rv != 0) {
+ log_err("ngtcp2_conn_early_data_rejected failed: %s",
+ ngtcp2_strerror(rv));
+ return;
+ }
+ /* move the streams back to the start state */
+ while(data->query_list_send->first) {
+ struct doq_client_stream* str = data->query_list_send->first;
+ /* move it back to the start list */
+ stream_list_move(str, data->query_list_send,
+ data->query_list_start);
+ str->has_stream = 0;
+ /* remove stream id */
+ str->stream_id = 0;
+ /* initialise other members, in case they are altered,
+ * but unlikely, because early streams are rejected. */
+ str->nwrite = 0;
+ str->nread = 0;
+ str->answer_len = 0;
+ str->query_is_done = 0;
+ str->answer_is_complete = 0;
+ str->query_has_error = 0;
+ if(str->answer) {
+ sldns_buffer_free(str->answer);
+ str->answer = NULL;
+ }
+ }
+}
+
+/** the handshake completed callback from ngtcp2 */
+static int
+handshake_completed(ngtcp2_conn* ATTR_UNUSED(conn), void* user_data)
+{
+ struct doq_client_data* data = (struct doq_client_data*)user_data;
+ verbose(1, "handshake_completed callback");
+ verbose(1, "ngtcp2_conn_get_max_data_left is %d",
+ (int)ngtcp2_conn_get_max_data_left(data->conn));
+#ifdef HAVE_NGTCP2_CONN_GET_MAX_LOCAL_STREAMS_UNI
+ verbose(1, "ngtcp2_conn_get_max_local_streams_uni is %d",
+ (int)ngtcp2_conn_get_max_local_streams_uni(data->conn));
+#endif
+ verbose(1, "ngtcp2_conn_get_streams_uni_left is %d",
+ (int)ngtcp2_conn_get_streams_uni_left(data->conn));
+ verbose(1, "ngtcp2_conn_get_streams_bidi_left is %d",
+ (int)ngtcp2_conn_get_streams_bidi_left(data->conn));
+ verbose(1, "negotiated cipher name is %s",
+ SSL_get_cipher_name(data->ssl));
+ if(verbosity > 0) {
+ const unsigned char* alpn = NULL;
+ unsigned int alpnlen = 0;
+ char alpnstr[128];
+ SSL_get0_alpn_selected(data->ssl, &alpn, &alpnlen);
+ if(alpnlen > sizeof(alpnstr)-1)
+ alpnlen = sizeof(alpnstr)-1;
+ memmove(alpnstr, alpn, alpnlen);
+ alpnstr[alpnlen]=0;
+ verbose(1, "negotiated ALPN is '%s'", alpnstr);
+ }
+ /* The SSL_get_early_data_status call works after the handshake
+ * completes. */
+ if(data->early_data_enabled) {
+ if(SSL_get_early_data_status(data->ssl) !=
+ SSL_EARLY_DATA_ACCEPTED) {
+ early_data_is_rejected(data);
+ } else {
+ verbose(1, "early data was accepted by the server");
+ }
+ }
+#if defined(USE_NGTCP2_CRYPTO_OSSL) || defined(HAVE_NGTCP2_CRYPTO_QUICTLS_CONFIGURE_CLIENT_CONTEXT)
+ if(data->transport_file) {
+ early_data_write_transport(data);
+ }
+#endif
+ return 0;
+}
+
+/** the extend_max_local_streams_bidi callback from ngtcp2 */
+static int
+extend_max_local_streams_bidi(ngtcp2_conn* ATTR_UNUSED(conn),
+ uint64_t max_streams, void* user_data)
+{
+ struct doq_client_data* data = (struct doq_client_data*)user_data;
+ verbose(1, "extend_max_local_streams_bidi callback, %d max_streams",
+ (int)max_streams);
+ verbose(1, "ngtcp2_conn_get_max_data_left is %d",
+ (int)ngtcp2_conn_get_max_data_left(data->conn));
+#ifdef HAVE_NGTCP2_CONN_GET_MAX_LOCAL_STREAMS_UNI
+ verbose(1, "ngtcp2_conn_get_max_local_streams_uni is %d",
+ (int)ngtcp2_conn_get_max_local_streams_uni(data->conn));
+#endif
+ verbose(1, "ngtcp2_conn_get_streams_uni_left is %d",
+ (int)ngtcp2_conn_get_streams_uni_left(data->conn));
+ verbose(1, "ngtcp2_conn_get_streams_bidi_left is %d",
+ (int)ngtcp2_conn_get_streams_bidi_left(data->conn));
+ query_streams_start(data);
+ return 0;
+}
+
+/** the recv_stream_data callback from ngtcp2 */
+static int
+recv_stream_data(ngtcp2_conn* ATTR_UNUSED(conn), uint32_t flags,
+ int64_t stream_id, uint64_t offset, const uint8_t* data,
+ size_t datalen, void* user_data, void* stream_user_data)
+{
+ struct doq_client_data* doqdata = (struct doq_client_data*)user_data;
+ struct doq_client_stream* str = (struct doq_client_stream*)
+ stream_user_data;
+ verbose(1, "recv_stream_data stream %d offset %d datalen %d%s%s",
+ (int)stream_id, (int)offset, (int)datalen,
+ ((flags&NGTCP2_STREAM_DATA_FLAG_FIN)!=0?" FIN":""),
+#ifdef NGTCP2_STREAM_DATA_FLAG_0RTT
+ ((flags&NGTCP2_STREAM_DATA_FLAG_0RTT)!=0?" 0RTT":"")
+#else
+ ((flags&NGTCP2_STREAM_DATA_FLAG_EARLY)!=0?" EARLY":"")
+#endif
+ );
+ if(verbosity > 0)
+ log_hex("data", (void*)data, datalen);
+ if(verbosity > 0) {
+ char* logs = client_stream_string(str);
+ verbose(1, "the stream_user_data is %s stream id %d, nread %d",
+ logs, (int)str->stream_id, (int)str->nread);
+ free(logs);
+ }
+
+ /* append the data, if there is data */
+ if(datalen > 0) {
+ client_stream_recv_data(str, data, datalen);
+ }
+ if((flags&NGTCP2_STREAM_DATA_FLAG_FIN)!=0) {
+ client_stream_recv_fin(doqdata, str, 1);
+ }
+ ngtcp2_conn_extend_max_stream_offset(doqdata->conn, stream_id, datalen);
+ ngtcp2_conn_extend_max_offset(doqdata->conn, datalen);
+ return 0;
+}
+
+/** the stream reset callback from ngtcp2 */
+static int
+stream_reset(ngtcp2_conn* ATTR_UNUSED(conn), int64_t stream_id,
+ uint64_t final_size, uint64_t app_error_code, void* user_data,
+ void* stream_user_data)
+{
+ struct doq_client_data* doqdata = (struct doq_client_data*)user_data;
+ struct doq_client_stream* str = (struct doq_client_stream*)
+ stream_user_data;
+ verbose(1, "stream reset for stream %d final size %d app error code %d",
+ (int)stream_id, (int)final_size, (int)app_error_code);
+ client_stream_recv_fin(doqdata, str, 0);
+ return 0;
+}
+
+/** copy sockaddr into ngtcp2 addr */
+static void
+copy_ngaddr(struct ngtcp2_addr* ngaddr, struct sockaddr_storage* addr,
+ socklen_t addrlen)
+{
+ if(addr_is_ip6(addr, addrlen)) {
+#if defined(NGTCP2_USE_GENERIC_SOCKADDR) || defined(NGTCP2_USE_GENERIC_IPV6_SOCKADDR)
+ struct sockaddr_in* i6 = (struct sockaddr_in6*)addr;
+ struct ngtcp2_sockaddr_in6 a6;
+ ngaddr->addr = calloc(1, sizeof(a6));
+ if(!ngaddr->addr) fatal_exit("calloc failed: out of memory");
+ ngaddr->addrlen = sizeof(a6);
+ memset(&a6, 0, sizeof(a6));
+ a6.sin6_family = i6->sin6_family;
+ a6.sin6_port = i6->sin6_port;
+ a6.sin6_flowinfo = i6->sin6_flowinfo;
+ memmove(&a6.sin6_addr, i6->sin6_addr, sizeof(a6.sin6_addr);
+ a6.sin6_scope_id = i6->sin6_scope_id;
+ memmove(ngaddr->addr, &a6, sizeof(a6));
+#else
+ ngaddr->addr = (ngtcp2_sockaddr*)addr;
+ ngaddr->addrlen = addrlen;
+#endif
+ } else {
+#ifdef NGTCP2_USE_GENERIC_SOCKADDR
+ struct sockaddr_in* i4 = (struct sockaddr_in*)addr;
+ struct ngtcp2_sockaddr_in a4;
+ ngaddr->addr = calloc(1, sizeof(a4));
+ if(!ngaddr->addr) fatal_exit("calloc failed: out of memory");
+ ngaddr->addrlen = sizeof(a4);
+ memset(&a4, 0, sizeof(a4));
+ a4.sin_family = i4->sin_family;
+ a4.sin_port = i4->sin_port;
+ memmove(&a4.sin_addr, i4->sin_addr, sizeof(a4.sin_addr);
+ memmove(ngaddr->addr, &a4, sizeof(a4));
+#else
+ ngaddr->addr = (ngtcp2_sockaddr*)addr;
+ ngaddr->addrlen = addrlen;
+#endif
+ }
+}
+
+/** debug log printf for ngtcp2 connections */
+static void log_printf_for_doq(void* ATTR_UNUSED(user_data),
+ const char* fmt, ...)
+{
+ va_list ap;
+ va_start(ap, fmt);
+ fprintf(stderr, "libngtcp2: ");
+ vfprintf(stderr, fmt, ap);
+ va_end(ap);
+ fprintf(stderr, "\n");
+}
+
+/** get a timestamp in nanoseconds */
+static ngtcp2_tstamp get_timestamp_nanosec(void)
+{
+#ifdef CLOCK_REALTIME
+ struct timespec tp;
+ memset(&tp, 0, sizeof(tp));
+#ifdef CLOCK_MONOTONIC
+ if(clock_gettime(CLOCK_MONOTONIC, &tp) == -1) {
+#endif
+ if(clock_gettime(CLOCK_REALTIME, &tp) == -1) {
+ log_err("clock_gettime failed: %s", strerror(errno));
+ }
+#ifdef CLOCK_MONOTONIC
+ }
+#endif
+ return ((uint64_t)tp.tv_sec)*((uint64_t)1000000000) +
+ ((uint64_t)tp.tv_nsec);
+#else
+ struct timeval tv;
+ if(gettimeofday(&tv, NULL) < 0) {
+ log_err("gettimeofday failed: %s", strerror(errno));
+ }
+ return ((uint64_t)tv.tv_sec)*((uint64_t)1000000000) +
+ ((uint64_t)tv.tv_usec)*((uint64_t)1000);
+#endif /* CLOCK_REALTIME */
+}
+
+/** create ngtcp2 client connection and set up. */
+static struct ngtcp2_conn* conn_client_setup(struct doq_client_data* data)
+{
+ struct ngtcp2_conn* conn = NULL;
+ int rv;
+ struct ngtcp2_cid dcid, scid;
+ struct ngtcp2_path path;
+ uint32_t client_chosen_version = NGTCP2_PROTO_VER_V1;
+ struct ngtcp2_callbacks cbs;
+ struct ngtcp2_settings settings;
+ struct ngtcp2_transport_params params;
+
+ memset(&cbs, 0, sizeof(cbs));
+ memset(&settings, 0, sizeof(settings));
+ memset(&params, 0, sizeof(params));
+ memset(&dcid, 0, sizeof(dcid));
+ memset(&scid, 0, sizeof(scid));
+ memset(&path, 0, sizeof(path));
+
+ data->quic_version = client_chosen_version;
+ ngtcp2_settings_default(&settings);
+ if(str_is_ip6(data->svr)) {
+#ifdef HAVE_STRUCT_NGTCP2_SETTINGS_MAX_TX_UDP_PAYLOAD_SIZE
+ settings.max_tx_udp_payload_size = 1232;
+#else
+ settings.max_udp_payload_size = 1232;
+#endif
+ }
+ settings.rand_ctx.native_handle = data->rnd;
+ if(verbosity > 0) {
+ /* make debug logs */
+ settings.log_printf = log_printf_for_doq;
+ }
+ settings.initial_ts = get_timestamp_nanosec();
+ ngtcp2_transport_params_default(&params);
+ params.initial_max_stream_data_bidi_local = 256*1024;
+ params.initial_max_stream_data_bidi_remote = 256*1024;
+ params.initial_max_stream_data_uni = 256*1024;
+ params.initial_max_data = 1024*1024;
+ params.initial_max_streams_bidi = 0;
+ params.initial_max_streams_uni = 100;
+ params.max_idle_timeout = 30*NGTCP2_SECONDS;
+ params.active_connection_id_limit = 7;
+ cid_randfill(&dcid, 16, data->rnd);
+ cid_randfill(&scid, 16, data->rnd);
+ cbs.client_initial = ngtcp2_crypto_client_initial_cb;
+ cbs.recv_crypto_data = ngtcp2_crypto_recv_crypto_data_cb;
+ cbs.encrypt = ngtcp2_crypto_encrypt_cb;
+ cbs.decrypt = ngtcp2_crypto_decrypt_cb;
+ cbs.hp_mask = ngtcp2_crypto_hp_mask_cb;
+ cbs.recv_retry = ngtcp2_crypto_recv_retry_cb;
+ cbs.update_key = ngtcp2_crypto_update_key_cb;
+ cbs.delete_crypto_aead_ctx = ngtcp2_crypto_delete_crypto_aead_ctx_cb;
+ cbs.delete_crypto_cipher_ctx =
+ ngtcp2_crypto_delete_crypto_cipher_ctx_cb;
+ cbs.get_path_challenge_data = ngtcp2_crypto_get_path_challenge_data_cb;
+ cbs.version_negotiation = ngtcp2_crypto_version_negotiation_cb;
+ cbs.get_new_connection_id = get_new_connection_id_cb;
+ cbs.handshake_completed = handshake_completed;
+ cbs.extend_max_local_streams_bidi = extend_max_local_streams_bidi;
+ cbs.rand = rand_cb;
+ cbs.recv_stream_data = recv_stream_data;
+ cbs.stream_reset = stream_reset;
+ copy_ngaddr(&path.local, &data->local_addr, data->local_addr_len);
+ copy_ngaddr(&path.remote, &data->dest_addr, data->dest_addr_len);
+
+ rv = ngtcp2_conn_client_new(&conn, &dcid, &scid, &path,
+ client_chosen_version, &cbs, &settings, &params,
+ NULL, /* ngtcp2_mem allocator, use default */
+ data /* callback argument */);
+ if(!conn) fatal_exit("could not ngtcp2_conn_client_new: %s",
+ ngtcp2_strerror(rv));
+ data->cc_algo = settings.cc_algo;
+ return conn;
+}
+
+#ifndef HAVE_NGTCP2_CONN_ENCODE_0RTT_TRANSPORT_PARAMS
+/** write the transport file */
+static void
+transport_file_write(const char* file, struct ngtcp2_transport_params* params)
+{
+ FILE* out;
+ out = fopen(file, "w");
+ if(!out) {
+ perror(file);
+ return;
+ }
+ fprintf(out, "initial_max_streams_bidi=%u\n",
+ (unsigned)params->initial_max_streams_bidi);
+ fprintf(out, "initial_max_streams_uni=%u\n",
+ (unsigned)params->initial_max_streams_uni);
+ fprintf(out, "initial_max_stream_data_bidi_local=%u\n",
+ (unsigned)params->initial_max_stream_data_bidi_local);
+ fprintf(out, "initial_max_stream_data_bidi_remote=%u\n",
+ (unsigned)params->initial_max_stream_data_bidi_remote);
+ fprintf(out, "initial_max_stream_data_uni=%u\n",
+ (unsigned)params->initial_max_stream_data_uni);
+ fprintf(out, "initial_max_data=%u\n",
+ (unsigned)params->initial_max_data);
+ fprintf(out, "active_connection_id_limit=%u\n",
+ (unsigned)params->active_connection_id_limit);
+ fprintf(out, "max_datagram_frame_size=%u\n",
+ (unsigned)params->max_datagram_frame_size);
+ if(ferror(out)) {
+ verbose(1, "There was an error writing %s: %s",
+ file, strerror(errno));
+ fclose(out);
+ return;
+ }
+ fclose(out);
+}
+#endif /* HAVE_NGTCP2_CONN_ENCODE_0RTT_TRANSPORT_PARAMS */
+
+/** fetch and write the transport file */
+static void
+early_data_write_transport(struct doq_client_data* data)
+{
+#ifdef HAVE_NGTCP2_CONN_ENCODE_0RTT_TRANSPORT_PARAMS
+ FILE* out;
+ uint8_t buf[1024];
+ ngtcp2_ssize len = ngtcp2_conn_encode_0rtt_transport_params(data->conn,
+ buf, sizeof(buf));
+ if(len < 0) {
+ log_err("ngtcp2_conn_encode_0rtt_transport_params failed: %s",
+ ngtcp2_strerror(len));
+ return;
+ }
+ out = fopen(data->transport_file, "w");
+ if(!out) {
+ perror(data->transport_file);
+ return;
+ }
+ if(fwrite(buf, 1, len, out) != (size_t)len) {
+ log_err("fwrite %s failed: %s", data->transport_file,
+ strerror(errno));
+ }
+ if(ferror(out)) {
+ verbose(1, "There was an error writing %s: %s",
+ data->transport_file, strerror(errno));
+ }
+ fclose(out);
+#else
+ struct ngtcp2_transport_params params;
+ memset(&params, 0, sizeof(params));
+ ngtcp2_conn_get_remote_transport_params(data->conn, &params);
+ transport_file_write(data->transport_file, &params);
+#endif
+}
+
+#ifdef MAKE_QUIC_METHOD
+/** applicatation rx key callback, this is where the rx key is set,
+ * and streams can be opened, like http3 unidirectional streams, like
+ * the http3 control and http3 qpack encode and decoder streams. */
+static int
+application_rx_key_cb(struct doq_client_data* data)
+{
+ verbose(1, "application_rx_key_cb callback");
+ verbose(1, "ngtcp2_conn_get_max_data_left is %d",
+ (int)ngtcp2_conn_get_max_data_left(data->conn));
+#ifdef HAVE_NGTCP2_CONN_GET_MAX_LOCAL_STREAMS_UNI
+ verbose(1, "ngtcp2_conn_get_max_local_streams_uni is %d",
+ (int)ngtcp2_conn_get_max_local_streams_uni(data->conn));
+#endif
+ verbose(1, "ngtcp2_conn_get_streams_uni_left is %d",
+ (int)ngtcp2_conn_get_streams_uni_left(data->conn));
+ verbose(1, "ngtcp2_conn_get_streams_bidi_left is %d",
+ (int)ngtcp2_conn_get_streams_bidi_left(data->conn));
+ if(data->transport_file) {
+ early_data_write_transport(data);
+ }
+ return 1;
+}
+
+/** quic_method set_encryption_secrets function */
+static int
+set_encryption_secrets(SSL *ssl, OSSL_ENCRYPTION_LEVEL ossl_level,
+ const uint8_t *read_secret, const uint8_t *write_secret,
+ size_t secret_len)
+{
+ struct doq_client_data* data = get_app_data(ssl);
+#ifdef HAVE_NGTCP2_ENCRYPTION_LEVEL
+ ngtcp2_encryption_level
+#else
+ ngtcp2_crypto_level
+#endif
+ level =
+#ifdef HAVE_NGTCP2_CRYPTO_QUICTLS_FROM_OSSL_ENCRYPTION_LEVEL
+ ngtcp2_crypto_quictls_from_ossl_encryption_level(ossl_level);
+#else
+ ngtcp2_crypto_openssl_from_ossl_encryption_level(ossl_level);
+#endif
+
+ if(read_secret) {
+ if(ngtcp2_crypto_derive_and_install_rx_key(data->conn, NULL,
+ NULL, NULL, level, read_secret, secret_len) != 0) {
+ log_err("ngtcp2_crypto_derive_and_install_rx_key failed");
+ return 0;
+ }
+ if(level == NGTCP2_CRYPTO_LEVEL_APPLICATION) {
+ if(!application_rx_key_cb(data))
+ return 0;
+ }
+ }
+
+ if(write_secret) {
+ if(ngtcp2_crypto_derive_and_install_tx_key(data->conn, NULL,
+ NULL, NULL, level, write_secret, secret_len) != 0) {
+ log_err("ngtcp2_crypto_derive_and_install_tx_key failed");
+ return 0;
+ }
+ }
+ return 1;
+}
+
+/** quic_method add_handshake_data function */
+static int
+add_handshake_data(SSL *ssl, OSSL_ENCRYPTION_LEVEL ossl_level,
+ const uint8_t *data, size_t len)
+{
+ struct doq_client_data* doqdata = get_app_data(ssl);
+#ifdef HAVE_NGTCP2_ENCRYPTION_LEVEL
+ ngtcp2_encryption_level
+#else
+ ngtcp2_crypto_level
+#endif
+ level =
+#ifdef HAVE_NGTCP2_CRYPTO_QUICTLS_FROM_OSSL_ENCRYPTION_LEVEL
+ ngtcp2_crypto_quictls_from_ossl_encryption_level(ossl_level);
+#else
+ ngtcp2_crypto_openssl_from_ossl_encryption_level(ossl_level);
+#endif
+ int rv;
+
+ rv = ngtcp2_conn_submit_crypto_data(doqdata->conn, level, data, len);
+ if(rv != 0) {
+ log_err("ngtcp2_conn_submit_crypto_data failed: %s",
+ ngtcp2_strerror(rv));
+ ngtcp2_conn_set_tls_error(doqdata->conn, rv);
+ return 0;
+ }
+ return 1;
+}
+
+/** quic_method flush_flight function */
+static int
+flush_flight(SSL* ATTR_UNUSED(ssl))
+{
+ return 1;
+}
+
+/** quic_method send_alert function */
+static int
+send_alert(SSL *ssl, enum ssl_encryption_level_t ATTR_UNUSED(level),
+ uint8_t alert)
+{
+ struct doq_client_data* data = get_app_data(ssl);
+ data->tls_alert = alert;
+ return 1;
+}
+#endif /* MAKE_QUIC_METHOD */
+
+/** new session callback. We can write it to file for resumption later. */
+static int
+new_session_cb(SSL* ssl, SSL_SESSION* session)
+{
+ struct doq_client_data* data = get_app_data(ssl);
+ BIO *f;
+ log_assert(data->session_file);
+ verbose(1, "new session cb: the ssl session max_early_data_size is %u",
+ (unsigned)SSL_SESSION_get_max_early_data(session));
+ f = BIO_new_file(data->session_file, "w");
+ if(!f) {
+ log_err("Could not open %s: %s", data->session_file,
+ strerror(errno));
+ return 0;
+ }
+ PEM_write_bio_SSL_SESSION(f, session);
+ BIO_free(f);
+ verbose(1, "written tls session to %s", data->session_file);
+ return 0;
+}
+
+/** setup the TLS context */
+static SSL_CTX*
+ctx_client_setup(void)
+{
+ SSL_CTX* ctx = SSL_CTX_new(TLS_client_method());
+ if(!ctx) {
+ log_crypto_err("Could not SSL_CTX_new");
+ exit(1);
+ }
+ SSL_CTX_set_min_proto_version(ctx, TLS1_3_VERSION);
+ SSL_CTX_set_max_proto_version(ctx, TLS1_3_VERSION);
+ SSL_CTX_set_default_verify_paths(ctx);
+#ifdef HAVE_NGTCP2_CRYPTO_QUICTLS_CONFIGURE_CLIENT_CONTEXT
+ if(ngtcp2_crypto_quictls_configure_client_context(ctx) != 0) {
+ log_err("ngtcp2_crypto_quictls_configure_client_context failed");
+ exit(1);
+ }
+#elif defined(MAKE_QUIC_METHOD)
+ memset(&quic_method, 0, sizeof(quic_method));
+ quic_method.set_encryption_secrets = &set_encryption_secrets;
+ quic_method.add_handshake_data = &add_handshake_data;
+ quic_method.flush_flight = &flush_flight;
+ quic_method.send_alert = &send_alert;
+ SSL_CTX_set_quic_method(ctx, &quic_method);
+#endif
+ return ctx;
+}
+
+
+/* setup the TLS object */
+static SSL*
+ssl_client_setup(struct doq_client_data* data)
+{
+#ifdef USE_NGTCP2_CRYPTO_OSSL
+ int ret;
+#endif
+ SSL* ssl = SSL_new(data->ctx);
+ if(!ssl) {
+ log_crypto_err("Could not SSL_new");
+ exit(1);
+ }
+#ifdef USE_NGTCP2_CRYPTO_OSSL
+ if((ret=ngtcp2_crypto_ossl_ctx_new(&data->ossl_ctx, NULL)) != 0) {
+ log_err("ngtcp2_crypto_ossl_ctx_new failed: %s",
+ ngtcp2_strerror(ret));
+ exit(1);
+ }
+ ngtcp2_crypto_ossl_ctx_set_ssl(data->ossl_ctx, ssl);
+ if(ngtcp2_crypto_ossl_configure_client_session(ssl) != 0) {
+ log_err("ngtcp2_crypto_ossl_configure_client_session failed");
+ exit(1);
+ }
+#endif
+ set_app_data(ssl, data);
+ SSL_set_connect_state(ssl);
+ if(!SSL_set_fd(ssl, data->fd)) {
+ log_crypto_err("Could not SSL_set_fd");
+ exit(1);
+ }
+#ifndef USE_NGTCP2_CRYPTO_OSSL
+ if((data->quic_version & 0xff000000) == 0xff000000) {
+ SSL_set_quic_use_legacy_codepoint(ssl, 1);
+ } else {
+ SSL_set_quic_use_legacy_codepoint(ssl, 0);
+ }
+#endif
+ SSL_set_alpn_protos(ssl, (const unsigned char *)"\x03""doq", 4);
+ /* send the SNI host name */
+ SSL_set_tlsext_host_name(ssl, "localhost");
+ return ssl;
+}
+
+/** get packet ecn information */
+static uint32_t
+msghdr_get_ecn(struct msghdr* msg, int family)
+{
+#ifndef S_SPLINT_S
+ struct cmsghdr* cmsg;
+ if(family == AF_INET6) {
+ for(cmsg = CMSG_FIRSTHDR(msg); cmsg != NULL;
+ cmsg = CMSG_NXTHDR(msg, cmsg)) {
+ if(cmsg->cmsg_level == IPPROTO_IPV6 &&
+ cmsg->cmsg_type == IPV6_TCLASS &&
+ cmsg->cmsg_len != 0) {
+ uint8_t* ecn = (uint8_t*)CMSG_DATA(cmsg);
+ return *ecn;
+ }
+ }
+ return 0;
+ }
+ for(cmsg = CMSG_FIRSTHDR(msg); cmsg != NULL;
+ cmsg = CMSG_NXTHDR(msg, cmsg)) {
+ if(cmsg->cmsg_level == IPPROTO_IP &&
+ cmsg->cmsg_type == IP_TOS &&
+ cmsg->cmsg_len != 0) {
+ uint8_t* ecn = (uint8_t*)CMSG_DATA(cmsg);
+ return *ecn;
+ }
+ }
+ return 0;
+#endif /* S_SPLINT_S */
+}
+
+/** set the ecn on the transmission */
+static void
+set_ecn(int fd, int family, uint32_t ecn)
+{
+ unsigned int val = ecn;
+ if(family == AF_INET6) {
+ if(setsockopt(fd, IPPROTO_IPV6, IPV6_TCLASS, &val,
+ (socklen_t)sizeof(val)) == -1) {
+ log_err("setsockopt(.. IPV6_TCLASS ..): %s",
+ strerror(errno));
+ }
+ return;
+ }
+ if(setsockopt(fd, IPPROTO_IP, IP_TOS, &val,
+ (socklen_t)sizeof(val)) == -1) {
+ log_err("setsockopt(.. IP_TOS ..): %s",
+ strerror(errno));
+ }
+}
+
+/** send a packet */
+static int
+doq_client_send_pkt(struct doq_client_data* data, uint32_t ecn, uint8_t* buf,
+ size_t buf_len, int is_blocked_pkt, int* send_is_blocked)
+{
+ struct msghdr msg;
+ struct iovec iov[1];
+ ssize_t ret;
+ iov[0].iov_base = buf;
+ iov[0].iov_len = buf_len;
+ memset(&msg, 0, sizeof(msg));
+ msg.msg_name = (void*)&data->dest_addr;
+ msg.msg_namelen = data->dest_addr_len;
+ msg.msg_iov = iov;
+ msg.msg_iovlen = 1;
+ set_ecn(data->fd, data->dest_addr.ss_family, ecn);
+
+ for(;;) {
+ ret = sendmsg(data->fd, &msg, MSG_DONTWAIT);
+ if(ret == -1 && errno == EINTR)
+ continue;
+ break;
+ }
+ if(ret == -1) {
+ if(errno == EAGAIN) {
+ if(buf_len >
+ sldns_buffer_capacity(data->blocked_pkt))
+ return 0; /* Cannot store it, but the buffers
+ are equal length and large enough, so this
+ should not happen. */
+ data->have_blocked_pkt = 1;
+ if(send_is_blocked)
+ *send_is_blocked = 1;
+ /* If we already send the previously blocked packet,
+ * no need to copy it, otherwise store the packet for
+ * later. */
+ if(!is_blocked_pkt) {
+ data->blocked_pkt_pi.ecn = ecn;
+ sldns_buffer_clear(data->blocked_pkt);
+ sldns_buffer_write(data->blocked_pkt, buf,
+ buf_len);
+ sldns_buffer_flip(data->blocked_pkt);
+ }
+ return 0;
+ }
+ log_err("doq sendmsg: %s", strerror(errno));
+#ifdef HAVE_NGTCP2_CCERR_DEFAULT
+ ngtcp2_ccerr_set_application_error(&data->ccerr, -1, NULL, 0);
+#else
+ ngtcp2_connection_close_error_set_application_error(&data->last_error, -1, NULL, 0);
+#endif
+ return 0;
+ }
+ return 1;
+}
+
+/** change event write on fd to when we have data or when congested */
+static void
+event_change_write(struct doq_client_data* data, int do_write)
+{
+ ub_event_del(data->ev);
+ if(do_write) {
+ ub_event_add_bits(data->ev, UB_EV_WRITE);
+ } else {
+ ub_event_del_bits(data->ev, UB_EV_WRITE);
+ }
+ if(ub_event_add(data->ev, NULL) != 0) {
+ fatal_exit("could not ub_event_add");
+ }
+}
+
+/** write the connection close, with possible error */
+static void
+write_conn_close(struct doq_client_data* data)
+{
+ struct ngtcp2_path_storage ps;
+ struct ngtcp2_pkt_info pi;
+ ngtcp2_ssize ret;
+ if(!data->conn ||
+#ifdef HAVE_NGTCP2_CONN_IN_CLOSING_PERIOD
+ ngtcp2_conn_in_closing_period(data->conn) ||
+#else
+ ngtcp2_conn_is_in_closing_period(data->conn) ||
+#endif
+#ifdef HAVE_NGTCP2_CONN_IN_DRAINING_PERIOD
+ ngtcp2_conn_in_draining_period(data->conn)
+#else
+ ngtcp2_conn_is_in_draining_period(data->conn)
+#endif
+ )
+ return;
+ /* Drop blocked packet if there is one, the connection is being
+ * closed. And thus no further data traffic. */
+ data->have_blocked_pkt = 0;
+ if(
+#ifdef HAVE_NGTCP2_CCERR_DEFAULT
+ data->ccerr.type == NGTCP2_CCERR_TYPE_IDLE_CLOSE
+#else
+ data->last_error.type ==
+ NGTCP2_CONNECTION_CLOSE_ERROR_CODE_TYPE_TRANSPORT_IDLE_CLOSE
+#endif
+ ) {
+ /* do not call ngtcp2_conn_write_connection_close on the
+ * connection because the ngtcp2_conn_handle_expiry call
+ * has returned NGTCP2_ERR_IDLE_CLOSE. But continue to close
+ * the connection. */
+ return;
+ }
+ verbose(1, "write connection close");
+ ngtcp2_path_storage_zero(&ps);
+ sldns_buffer_clear(data->pkt_buf);
+ ret = ngtcp2_conn_write_connection_close(
+ data->conn, &ps.path, &pi, sldns_buffer_begin(data->pkt_buf),
+ sldns_buffer_remaining(data->pkt_buf),
+#ifdef HAVE_NGTCP2_CCERR_DEFAULT
+ &data->ccerr
+#else
+ &data->last_error
+#endif
+ , get_timestamp_nanosec());
+ if(ret < 0) {
+ log_err("ngtcp2_conn_write_connection_close failed: %s",
+ ngtcp2_strerror(ret));
+ return;
+ }
+ verbose(1, "write connection close packet length %d", (int)ret);
+ if(ret == 0)
+ return;
+ doq_client_send_pkt(data, pi.ecn, sldns_buffer_begin(data->pkt_buf),
+ ret, 0, NULL);
+}
+
+/** disconnect we are done */
+static void
+disconnect(struct doq_client_data* data)
+{
+ verbose(1, "disconnect");
+ write_conn_close(data);
+ ub_event_base_loopexit(data->base);
+}
+
+/** the expire timer callback */
+void doq_client_timer_cb(int ATTR_UNUSED(fd),
+ short ATTR_UNUSED(bits), void* arg)
+{
+ struct doq_client_data* data = (struct doq_client_data*)arg;
+ ngtcp2_tstamp now = get_timestamp_nanosec();
+ int rv;
+
+ verbose(1, "doq expire_timer");
+ data->expire_timer_added = 0;
+ rv = ngtcp2_conn_handle_expiry(data->conn, now);
+ if(rv != 0) {
+ log_err("ngtcp2_conn_handle_expiry failed: %s",
+ ngtcp2_strerror(rv));
+#ifdef HAVE_NGTCP2_CCERR_DEFAULT
+ ngtcp2_ccerr_set_liberr(&data->ccerr, rv, NULL, 0);
+#else
+ ngtcp2_connection_close_error_set_transport_error_liberr(
+ &data->last_error, rv, NULL, 0);
+#endif
+ disconnect(data);
+ return;
+ }
+ update_timer(data);
+ on_write(data);
+}
+
+/** update the timers */
+static void
+update_timer(struct doq_client_data* data)
+{
+ ngtcp2_tstamp expiry = ngtcp2_conn_get_expiry(data->conn);
+ ngtcp2_tstamp now = get_timestamp_nanosec();
+ ngtcp2_tstamp t;
+ struct timeval tv;
+
+ if(expiry <= now) {
+ /* the timer has already expired, add with zero timeout */
+ t = 0;
+ } else {
+ t = expiry - now;
+ }
+
+ /* set the timer */
+ if(data->expire_timer_added) {
+ ub_timer_del(data->expire_timer);
+ data->expire_timer_added = 0;
+ }
+ memset(&tv, 0, sizeof(tv));
+ tv.tv_sec = t / NGTCP2_SECONDS;
+ tv.tv_usec = (t / NGTCP2_MICROSECONDS)%1000000;
+ verbose(1, "update_timer in %d.%6.6d secs", (int)tv.tv_sec,
+ (int)tv.tv_usec);
+ if(ub_timer_add(data->expire_timer, data->base,
+ &doq_client_timer_cb, data, &tv) != 0) {
+ log_err("timer_add failed: could not add expire timer");
+ return;
+ }
+ data->expire_timer_added = 1;
+}
+
+/** perform read operations on fd */
+static void
+on_read(struct doq_client_data* data)
+{
+ struct sockaddr_storage addr;
+ struct iovec iov[1];
+ struct msghdr msg;
+ union {
+ struct cmsghdr hdr;
+ char buf[256];
+ } ancil;
+ int i;
+ ssize_t rcv;
+ ngtcp2_pkt_info pi;
+ int rv;
+ struct ngtcp2_path path;
+
+ for(i=0; i<10; i++) {
+ msg.msg_name = &addr;
+ msg.msg_namelen = (socklen_t)sizeof(addr);
+ iov[0].iov_base = sldns_buffer_begin(data->pkt_buf);
+ iov[0].iov_len = sldns_buffer_remaining(data->pkt_buf);
+ msg.msg_iov = iov;
+ msg.msg_iovlen = 1;
+ msg.msg_control = ancil.buf;
+#ifndef S_SPLINT_S
+ msg.msg_controllen = sizeof(ancil.buf);
+#endif /* S_SPLINT_S */
+ msg.msg_flags = 0;
+
+ rcv = recvmsg(data->fd, &msg, MSG_DONTWAIT);
+ if(rcv == -1) {
+ if(errno == EINTR || errno == EAGAIN)
+ break;
+ log_err_addr("doq recvmsg", strerror(errno),
+ &data->dest_addr, sizeof(data->dest_addr_len));
+ break;
+ }
+
+ pi.ecn = msghdr_get_ecn(&msg, addr.ss_family);
+ verbose(1, "recvmsg %d ecn=0x%x", (int)rcv, (int)pi.ecn);
+
+ memset(&path, 0, sizeof(path));
+ path.local.addr = (void*)&data->local_addr;
+ path.local.addrlen = data->local_addr_len;
+ path.remote.addr = (void*)msg.msg_name;
+ path.remote.addrlen = msg.msg_namelen;
+ rv = ngtcp2_conn_read_pkt(data->conn, &path, &pi,
+ iov[0].iov_base, rcv, get_timestamp_nanosec());
+ if(rv != 0) {
+ log_err("ngtcp2_conn_read_pkt failed: %s",
+ ngtcp2_strerror(rv));
+ if(
+#ifdef HAVE_NGTCP2_CCERR_DEFAULT
+ data->ccerr.error_code == 0
+#else
+ data->last_error.error_code == 0
+#endif
+ ) {
+ if(rv == NGTCP2_ERR_CRYPTO) {
+ /* in picotls the tls alert may need
+ * to be copied, but this is with
+ * openssl. And we have the value
+ * data.tls_alert. */
+#ifdef HAVE_NGTCP2_CCERR_DEFAULT
+ ngtcp2_ccerr_set_tls_alert(
+ &data->ccerr, data->tls_alert,
+ NULL, 0);
+#else
+ ngtcp2_connection_close_error_set_transport_error_tls_alert(
+ &data->last_error,
+ data->tls_alert, NULL, 0);
+#endif
+ } else {
+#ifdef HAVE_NGTCP2_CCERR_DEFAULT
+ ngtcp2_ccerr_set_liberr(&data->ccerr,
+ rv, NULL, 0);
+#else
+ ngtcp2_connection_close_error_set_transport_error_liberr(
+ &data->last_error, rv, NULL,
+ 0);
+#endif
+ }
+ }
+ disconnect(data);
+ return;
+ }
+ }
+
+ update_timer(data);
+}
+
+/** the write of this query has completed, it has spooled to packets,
+ * set it to have the write done and move it to the list of receive streams. */
+static void
+query_write_is_done(struct doq_client_data* data,
+ struct doq_client_stream* str)
+{
+ if(verbosity > 0) {
+ char* logs = client_stream_string(str);
+ verbose(1, "query %s write is done", logs);
+ free(logs);
+ }
+ str->write_is_done = 1;
+ stream_list_move(str, data->query_list_send, data->query_list_receive);
+}
+
+/** write the data streams, if possible */
+static int
+write_streams(struct doq_client_data* data)
+{
+ ngtcp2_path_storage ps;
+ ngtcp2_tstamp ts = get_timestamp_nanosec();
+ struct doq_client_stream* str, *next;
+ uint32_t flags;
+ /* number of bytes that can be sent without packet pacing */
+ size_t send_quantum = ngtcp2_conn_get_send_quantum(data->conn);
+ /* Overhead is the stream overhead of adding a header onto the data,
+ * this make sure the number of bytes to send in data bytes plus
+ * the overhead overshoots the target quantum by a smaller margin,
+ * and then it stops sending more bytes. With zero it would overshoot
+ * more, an accurate number would not overshoot. It is based on the
+ * stream frame header size. */
+ size_t accumulated_send = 0, overhead_stream = 24, overhead_pkt = 60,
+ max_packet_size = 1200;
+ size_t num_packets = 0, max_packets = 65535;
+ ngtcp2_path_storage_zero(&ps);
+ str = data->query_list_send->first;
+
+ if(data->cc_algo != NGTCP2_CC_ALGO_BBR
+#ifdef NGTCP2_CC_ALGO_BBR_V2
+ && data->cc_algo != NGTCP2_CC_ALGO_BBR_V2
+#endif
+#ifdef NGTCP2_CC_ALGO_BBR2
+ && data->cc_algo != NGTCP2_CC_ALGO_BBR2
+#endif
+ ) {
+ /* If we do not have a packet pacing congestion control
+ * algorithm, limit the number of packets. */
+ max_packets = 10;
+ }
+
+ /* loop like this, because at the start, the send list is empty,
+ * and we want to send handshake packets. But when there is a
+ * send_list, loop through that. */
+ for(;;) {
+ int64_t stream_id;
+ ngtcp2_pkt_info pi;
+ ngtcp2_vec datav[2];
+ size_t datav_count = 0;
+ int fin;
+ ngtcp2_ssize ret;
+ ngtcp2_ssize ndatalen = 0;
+ int send_is_blocked = 0;
+
+ if(str) {
+ /* pick up next in case this one is deleted */
+ next = str->next;
+ if(verbosity > 0) {
+ char* logs = client_stream_string(str);
+ verbose(1, "query %s write stream", logs);
+ free(logs);
+ }
+ stream_id = str->stream_id;
+ fin = 1;
+ if(str->nwrite < 2) {
+ str->data_tcplen = htons(str->data_len);
+ datav[0].base = ((uint8_t*)&str->data_tcplen)+str->nwrite;
+ datav[0].len = 2-str->nwrite;
+ datav[1].base = str->data;
+ datav[1].len = str->data_len;
+ datav_count = 2;
+ } else {
+ datav[0].base = str->data + (str->nwrite-2);
+ datav[0].len = str->data_len - (str->nwrite-2);
+ datav_count = 1;
+ }
+ } else {
+ next = NULL;
+ verbose(1, "write stream -1.");
+ stream_id = -1;
+ fin = 0;
+ datav[0].base = NULL;
+ datav[0].len = 0;
+ datav_count = 1;
+ }
+
+ /* Does the first data entry fit into the send quantum? */
+ /* Check if the data size sent, with a max of one full packet,
+ * with added stream header and packet header is allowed
+ * within the send quantum number of bytes. If not, it does
+ * not fit, and wait. */
+ if(accumulated_send == 0 && ((datav_count == 1 &&
+ (datav[0].len>max_packet_size?max_packet_size:
+ datav[0].len)+overhead_stream+overhead_pkt >
+ send_quantum) ||
+ (datav_count == 2 &&
+ (datav[0].len+datav[1].len>max_packet_size?
+ max_packet_size:datav[0].len+datav[1].len)
+ +overhead_stream+overhead_pkt > send_quantum))) {
+ /* congestion limited */
+ ngtcp2_conn_update_pkt_tx_time(data->conn, ts);
+ event_change_write(data, 0);
+ /* update the timer to wait until it is possible to
+ * write again */
+ update_timer(data);
+ return 0;
+ }
+ flags = 0;
+ if(str && str->next != NULL) {
+ /* Coalesce more data from more streams into this
+ * packet, if possible */
+ /* There is more than one data entry in this send
+ * quantum, does the next one fit in the quantum? */
+ size_t this_send, possible_next_send;
+ if(datav_count == 1)
+ this_send = datav[0].len;
+ else this_send = datav[0].len + datav[1].len;
+ if(this_send > max_packet_size)
+ this_send = max_packet_size;
+ if(str->next->nwrite < 2)
+ possible_next_send = (2-str->next->nwrite) +
+ str->next->data_len;
+ else possible_next_send = str->next->data_len -
+ (str->next->nwrite - 2);
+ if(possible_next_send > max_packet_size)
+ possible_next_send = max_packet_size;
+ /* Check if the data lengths that writev returned
+ * with stream headers added up so far, in
+ * accumulated_send, with added the data length
+ * of this send, with a max of one full packet, and
+ * the data length of the next possible send, with
+ * a max of one full packet, with a stream header for
+ * this_send and a stream header for the next possible
+ * send and a packet header, fit in the send quantum
+ * number of bytes. If so, ask to add more content
+ * to the packet with the more flag. */
+ if(accumulated_send + this_send + possible_next_send
+ +2*overhead_stream+ overhead_pkt < send_quantum)
+ flags |= NGTCP2_WRITE_STREAM_FLAG_MORE;
+ }
+ if(fin) {
+ /* This is the final part of data for this stream */
+ flags |= NGTCP2_WRITE_STREAM_FLAG_FIN;
+ }
+ sldns_buffer_clear(data->pkt_buf);
+ ret = ngtcp2_conn_writev_stream(data->conn, &ps.path, &pi,
+ sldns_buffer_begin(data->pkt_buf),
+ sldns_buffer_remaining(data->pkt_buf), &ndatalen,
+ flags, stream_id, datav, datav_count, ts);
+ if(ret < 0) {
+ if(ret == NGTCP2_ERR_WRITE_MORE) {
+ if(str) {
+ str->nwrite += ndatalen;
+ if(str->nwrite >= str->data_len+2)
+ query_write_is_done(data, str);
+ str = next;
+ accumulated_send += ndatalen + overhead_stream;
+ continue;
+ }
+ }
+ log_err("ngtcp2_conn_writev_stream failed: %s",
+ ngtcp2_strerror(ret));
+#ifdef HAVE_NGTCP2_CCERR_DEFAULT
+ ngtcp2_ccerr_set_liberr(&data->ccerr, ret, NULL, 0);
+#else
+ ngtcp2_connection_close_error_set_transport_error_liberr(
+ &data->last_error, ret, NULL, 0);
+#endif
+ disconnect(data);
+ return 0;
+ }
+ verbose(1, "writev_stream pkt size %d ndatawritten %d",
+ (int)ret, (int)ndatalen);
+ if(ndatalen >= 0 && str) {
+ /* add the new write offset */
+ str->nwrite += ndatalen;
+ if(str->nwrite >= str->data_len+2)
+ query_write_is_done(data, str);
+ }
+ if(ret == 0) {
+ /* congestion limited */
+ ngtcp2_conn_update_pkt_tx_time(data->conn, ts);
+ event_change_write(data, 0);
+ /* update the timer to wait until it is possible to
+ * write again */
+ update_timer(data);
+ return 0;
+ }
+ if(!doq_client_send_pkt(data, pi.ecn,
+ sldns_buffer_begin(data->pkt_buf), ret, 0,
+ &send_is_blocked)) {
+ if(send_is_blocked) {
+ /* Blocked packet, wait until it is possible
+ * to write again and also set a timer. */
+ event_change_write(data, 1);
+ update_timer(data);
+ return 0;
+ }
+ /* Packet could not be sent. Like lost and timeout. */
+ ngtcp2_conn_update_pkt_tx_time(data->conn, ts);
+ event_change_write(data, 0);
+ update_timer(data);
+ return 0;
+ }
+ /* continue */
+ if((size_t)ret >= send_quantum)
+ break;
+ send_quantum -= ret;
+ accumulated_send = 0;
+ str = next;
+ if(str == NULL)
+ break;
+ if(++num_packets == max_packets)
+ break;
+ }
+ ngtcp2_conn_update_pkt_tx_time(data->conn, ts);
+ event_change_write(data, 1);
+ return 1;
+}
+
+/** send the blocked packet now that the stream is writable again. */
+static int
+send_blocked_pkt(struct doq_client_data* data)
+{
+ ngtcp2_tstamp ts = get_timestamp_nanosec();
+ int send_is_blocked = 0;
+ if(!doq_client_send_pkt(data, data->blocked_pkt_pi.ecn,
+ sldns_buffer_begin(data->pkt_buf),
+ sldns_buffer_limit(data->pkt_buf), 1, &send_is_blocked)) {
+ if(send_is_blocked) {
+ /* Send was blocked, again. Wait, again to retry. */
+ event_change_write(data, 1);
+ /* make sure the timer is set while waiting */
+ update_timer(data);
+ return 0;
+ }
+ /* The packed could not be sent. Like it was lost, timeout. */
+ data->have_blocked_pkt = 0;
+ ngtcp2_conn_update_pkt_tx_time(data->conn, ts);
+ event_change_write(data, 0);
+ update_timer(data);
+ return 0;
+ }
+ /* The blocked packet has been sent, the holding buffer can be
+ * cleared. */
+ data->have_blocked_pkt = 0;
+ ngtcp2_conn_update_pkt_tx_time(data->conn, ts);
+ return 1;
+}
+
+/** perform write operations, if any, on fd */
+static void
+on_write(struct doq_client_data* data)
+{
+ if(data->have_blocked_pkt) {
+ if(!send_blocked_pkt(data))
+ return;
+ }
+ if(
+#ifdef HAVE_NGTCP2_CONN_IN_CLOSING_PERIOD
+ ngtcp2_conn_in_closing_period(data->conn)
+#else
+ ngtcp2_conn_is_in_closing_period(data->conn)
+#endif
+ )
+ return;
+ if(!write_streams(data))
+ return;
+ update_timer(data);
+}
+
+/** callback for main listening file descriptor */
+void
+doq_client_event_cb(int ATTR_UNUSED(fd), short bits, void* arg)
+{
+ struct doq_client_data* data = (struct doq_client_data*)arg;
+ verbose(1, "doq_client_event_cb %s%s%s",
+ ((bits&UB_EV_READ)!=0?"EV_READ":""),
+ ((bits&(UB_EV_READ|UB_EV_WRITE))==(UB_EV_READ|UB_EV_WRITE)?
+ " ":""),
+ ((bits&UB_EV_WRITE)!=0?"EV_WRITE":""));
+ if((bits&UB_EV_READ)) {
+ on_read(data);
+ }
+ /* Perform the write operation anyway. The read operation may
+ * have produced data, or there is content waiting and it is possible
+ * to write that. */
+ on_write(data);
+}
+
+/** read the TLS session from file */
+static int
+early_data_setup_session(struct doq_client_data* data)
+{
+ SSL_SESSION* session;
+ BIO* f = BIO_new_file(data->session_file, "r");
+ if(f == NULL) {
+ if(errno == ENOENT) {
+ verbose(1, "session file %s does not exist",
+ data->session_file);
+ return 0;
+ }
+ log_err("Could not read %s: %s", data->session_file,
+ strerror(errno));
+ return 0;
+ }
+ session = PEM_read_bio_SSL_SESSION(f, NULL, 0, NULL);
+ if(session == NULL) {
+ log_crypto_err("Could not read session file with PEM_read_bio_SSL_SESSION");
+ BIO_free(f);
+ return 0;
+ }
+ BIO_free(f);
+ if(!SSL_set_session(data->ssl, session)) {
+ log_crypto_err("Could not SSL_set_session");
+ SSL_SESSION_free(session);
+ return 0;
+ }
+ if(SSL_SESSION_get_max_early_data(session) == 0) {
+ log_err("TLS session early data is 0");
+ SSL_SESSION_free(session);
+ return 0;
+ }
+#ifdef USE_NGTCP2_CRYPTO_OSSL
+ SSL_set_quic_tls_early_data_enabled(data->ssl, 1);
+#else
+ SSL_set_quic_early_data_enabled(data->ssl, 1);
+#endif
+ SSL_SESSION_free(session);
+ return 1;
+}
+
+#ifndef HAVE_NGTCP2_CONN_ENCODE_0RTT_TRANSPORT_PARAMS
+/** parse one line from the transport file */
+static int
+transport_parse_line(struct ngtcp2_transport_params* params, char* line)
+{
+ if(strncmp(line, "initial_max_streams_bidi=", 25) == 0) {
+ params->initial_max_streams_bidi = atoi(line+25);
+ return 1;
+ }
+ if(strncmp(line, "initial_max_streams_uni=", 24) == 0) {
+ params->initial_max_streams_uni = atoi(line+24);
+ return 1;
+ }
+ if(strncmp(line, "initial_max_stream_data_bidi_local=", 35) == 0) {
+ params->initial_max_stream_data_bidi_local = atoi(line+35);
+ return 1;
+ }
+ if(strncmp(line, "initial_max_stream_data_bidi_remote=", 36) == 0) {
+ params->initial_max_stream_data_bidi_remote = atoi(line+36);
+ return 1;
+ }
+ if(strncmp(line, "initial_max_stream_data_uni=", 28) == 0) {
+ params->initial_max_stream_data_uni = atoi(line+28);
+ return 1;
+ }
+ if(strncmp(line, "initial_max_data=", 17) == 0) {
+ params->initial_max_data = atoi(line+17);
+ return 1;
+ }
+ if(strncmp(line, "active_connection_id_limit=", 27) == 0) {
+ params->active_connection_id_limit = atoi(line+27);
+ return 1;
+ }
+ if(strncmp(line, "max_datagram_frame_size=", 24) == 0) {
+ params->max_datagram_frame_size = atoi(line+24);
+ return 1;
+ }
+ return 0;
+}
+#endif /* HAVE_NGTCP2_CONN_ENCODE_0RTT_TRANSPORT_PARAMS */
+
+/** setup the early data transport file and read it */
+static int
+early_data_setup_transport(struct doq_client_data* data)
+{
+#ifdef HAVE_NGTCP2_CONN_ENCODE_0RTT_TRANSPORT_PARAMS
+ FILE* in;
+ uint8_t buf[1024];
+ size_t len;
+ int rv;
+ in = fopen(data->transport_file, "r");
+ if(!in) {
+ if(errno == ENOENT) {
+ verbose(1, "transport file %s does not exist",
+ data->transport_file);
+ return 0;
+ }
+ perror(data->transport_file);
+ return 0;
+ }
+ len = fread(buf, 1, sizeof(buf), in);
+ if(ferror(in)) {
+ log_err("%s: read failed: %s", data->transport_file,
+ strerror(errno));
+ fclose(in);
+ return 0;
+ }
+ fclose(in);
+ rv = ngtcp2_conn_decode_and_set_0rtt_transport_params(data->conn,
+ buf, len);
+ if(rv != 0) {
+ log_err("ngtcp2_conn_decode_and_set_0rtt_transport_params failed: %s",
+ ngtcp2_strerror(rv));
+ return 0;
+ }
+ return 1;
+#else
+ FILE* in;
+ char buf[1024];
+ struct ngtcp2_transport_params params;
+ memset(&params, 0, sizeof(params));
+ in = fopen(data->transport_file, "r");
+ if(!in) {
+ if(errno == ENOENT) {
+ verbose(1, "transport file %s does not exist",
+ data->transport_file);
+ return 0;
+ }
+ perror(data->transport_file);
+ return 0;
+ }
+ while(!feof(in)) {
+ if(!fgets(buf, sizeof(buf), in)) {
+ log_err("%s: read failed: %s", data->transport_file,
+ strerror(errno));
+ fclose(in);
+ return 0;
+ }
+ if(!transport_parse_line(&params, buf)) {
+ log_err("%s: could not parse line '%s'",
+ data->transport_file, buf);
+ fclose(in);
+ return 0;
+ }
+ }
+ fclose(in);
+ ngtcp2_conn_set_early_remote_transport_params(data->conn, &params);
+#endif
+ return 1;
+}
+
+/** setup for early data, read the transport file and session file */
+static void
+early_data_setup(struct doq_client_data* data)
+{
+ if(!early_data_setup_session(data)) {
+ verbose(1, "TLS session resumption failed, early data is disabled");
+ data->early_data_enabled = 0;
+ return;
+ }
+ if(!early_data_setup_transport(data)) {
+ verbose(1, "Transport parameters set failed, early data is disabled");
+ data->early_data_enabled = 0;
+ return;
+ }
+}
+
+/** start the early data transmission */
+static void
+early_data_start(struct doq_client_data* data)
+{
+ query_streams_start(data);
+ on_write(data);
+}
+
+/** create doq_client_data */
+static struct doq_client_data*
+create_doq_client_data(const char* svr, int port, struct ub_event_base* base,
+ const char* transport_file, const char* session_file, int quiet)
+{
+ struct doq_client_data* data;
+ data = calloc(1, sizeof(*data));
+ if(!data) fatal_exit("calloc failed: out of memory");
+ data->base = base;
+#ifdef USE_NGTCP2_CRYPTO_OSSL
+ /* Initialize the ossl crypto, it is harmless to call twice,
+ * and this is before use of doq connections. */
+ if(ngtcp2_crypto_ossl_init() != 0)
+ fatal_exit("ngtcp2_crypto_oss_init failed");
+#elif defined(HAVE_NGTCP2_CRYPTO_QUICTLS_INIT)
+ if(ngtcp2_crypto_quictls_init() != 0)
+ fatal_exit("ngtcp2_crypto_quictls_init failed");
+#endif
+ data->rnd = ub_initstate(NULL);
+ if(!data->rnd) fatal_exit("ub_initstate failed: out of memory");
+ data->svr = svr;
+ get_dest_addr(data, svr, port);
+ data->port = port;
+ data->quiet = quiet;
+ data->pkt_buf = sldns_buffer_new(65552);
+ if(!data->pkt_buf)
+ fatal_exit("sldns_buffer_new failed: out of memory");
+ data->blocked_pkt = sldns_buffer_new(65552);
+ if(!data->blocked_pkt)
+ fatal_exit("sldns_buffer_new failed: out of memory");
+ data->fd = open_svr_udp(data);
+ get_local_addr(data);
+ data->conn = conn_client_setup(data);
+#ifdef HAVE_NGTCP2_CCERR_DEFAULT
+ ngtcp2_ccerr_default(&data->ccerr);
+#else
+ ngtcp2_connection_close_error_default(&data->last_error);
+#endif
+ data->transport_file = transport_file;
+ data->session_file = session_file;
+ if(data->transport_file && data->session_file)
+ data->early_data_enabled = 1;
+
+ generate_static_secret(data, 32);
+ data->ctx = ctx_client_setup();
+ if(data->session_file) {
+ SSL_CTX_set_session_cache_mode(data->ctx,
+ SSL_SESS_CACHE_CLIENT |
+ SSL_SESS_CACHE_NO_INTERNAL_STORE);
+ SSL_CTX_sess_set_new_cb(data->ctx, new_session_cb);
+ }
+ data->ssl = ssl_client_setup(data);
+#ifdef USE_NGTCP2_CRYPTO_OSSL
+ ngtcp2_conn_set_tls_native_handle(data->conn, data->ossl_ctx);
+#else
+ ngtcp2_conn_set_tls_native_handle(data->conn, data->ssl);
+#endif
+ if(data->early_data_enabled)
+ early_data_setup(data);
+
+ data->ev = ub_event_new(base, data->fd, UB_EV_READ | UB_EV_WRITE |
+ UB_EV_PERSIST, doq_client_event_cb, data);
+ if(!data->ev) {
+ fatal_exit("could not ub_event_new");
+ }
+ if(ub_event_add(data->ev, NULL) != 0) {
+ fatal_exit("could not ub_event_add");
+ }
+ data->expire_timer = ub_event_new(data->base, -1,
+ UB_EV_TIMEOUT, &doq_client_timer_cb, data);
+ if(!data->expire_timer)
+ fatal_exit("could not ub_event_new");
+ data->query_list_start = stream_list_create();
+ data->query_list_send = stream_list_create();
+ data->query_list_receive = stream_list_create();
+ data->query_list_stop = stream_list_create();
+ return data;
+}
+
+/** delete doq_client_data */
+static void
+delete_doq_client_data(struct doq_client_data* data)
+{
+ if(!data)
+ return;
+#if defined(NGTCP2_USE_GENERIC_SOCKADDR) || defined(NGTCP2_USE_GENERIC_IPV6_SOCKADDR)
+ if(data->conn && data->dest_addr_len != 0) {
+ if(addr_is_ip6(&data->dest_addr, data->dest_addr_len)) {
+# if defined(NGTCP2_USE_GENERIC_SOCKADDR) || defined(NGTCP2_USE_GENERIC_IPV6_SOCKADDR)
+ const struct ngtcp2_path* path6 = ngtcp2_conn_get_path(data->conn);
+ free(path6->local.addr);
+ free(path6->remote.addr);
+# endif
+ } else {
+# if defined(NGTCP2_USE_GENERIC_SOCKADDR)
+ const struct ngtcp2_path* path = ngtcp2_conn_get_path(data->conn);
+ free(path->local.addr);
+ free(path->remote.addr);
+# endif
+ }
+ }
+#endif
+ /* Remove the app data from ngtcp2 before SSL_free of conn->ssl,
+ * because the ngtcp2 conn is deleted. */
+ SSL_set_app_data(data->ssl, NULL);
+ SSL_free(data->ssl);
+#ifdef USE_NGTCP2_CRYPTO_OSSL
+ ngtcp2_crypto_ossl_ctx_del(data->ossl_ctx);
+#endif
+ ngtcp2_conn_del(data->conn);
+ sldns_buffer_free(data->pkt_buf);
+ sldns_buffer_free(data->blocked_pkt);
+ if(data->fd != -1)
+ sock_close(data->fd);
+ SSL_CTX_free(data->ctx);
+ stream_list_free(data->query_list_start);
+ stream_list_free(data->query_list_send);
+ stream_list_free(data->query_list_receive);
+ stream_list_free(data->query_list_stop);
+ ub_randfree(data->rnd);
+ if(data->ev) {
+ ub_event_del(data->ev);
+ ub_event_free(data->ev);
+ }
+ if(data->expire_timer_added)
+ ub_timer_del(data->expire_timer);
+ ub_event_free(data->expire_timer);
+ free(data->static_secret_data);
+ free(data);
+}
+
+/** create the event base that registers events and timers */
+static struct ub_event_base*
+create_event_base(time_t* secs, struct timeval* now)
+{
+ struct ub_event_base* base;
+ const char *evnm="event", *evsys="", *evmethod="";
+
+ memset(now, 0, sizeof(*now));
+ base = ub_default_event_base(1, secs, now);
+ if(!base) fatal_exit("could not create ub_event base");
+
+ ub_get_event_sys(base, &evnm, &evsys, &evmethod);
+ if(verbosity) log_info("%s %s uses %s method", evnm, evsys, evmethod);
+
+ return base;
+}
+
+/** enter a query into the query list */
+static void
+client_enter_query_buf(struct doq_client_data* data, struct sldns_buffer* buf)
+{
+ struct doq_client_stream* str;
+ str = client_stream_create(buf);
+ if(!str)
+ fatal_exit("client_stream_create failed: out of memory");
+ stream_list_append(data->query_list_start, str);
+}
+
+/** enter the queries into the query list */
+static void
+client_enter_queries(struct doq_client_data* data, char** qs, int count)
+{
+ int i;
+ for(i=0; i<count; i+=3) {
+ struct sldns_buffer* buf = NULL;
+ buf = make_query(qs[i], qs[i+1], qs[i+2]);
+ if(verbosity > 0) {
+ char* str;
+ log_buf(1, "send query", buf);
+ str = sldns_wire2str_pkt(sldns_buffer_begin(buf),
+ sldns_buffer_limit(buf));
+ if(!str) verbose(1, "could not sldns_wire2str_pkt");
+ else verbose(1, "send query:\n%s", str);
+ free(str);
+ }
+ client_enter_query_buf(data, buf);
+ sldns_buffer_free(buf);
+ }
+}
+
+/** run the dohclient queries */
+static void run(const char* svr, int port, char** qs, int count,
+ const char* transport_file, const char* session_file, int quiet)
+{
+ time_t secs = 0;
+ struct timeval now;
+ struct ub_event_base* base;
+ struct doq_client_data* data;
+
+ /* setup */
+ base = create_event_base(&secs, &now);
+ data = create_doq_client_data(svr, port, base, transport_file,
+ session_file, quiet);
+ client_enter_queries(data, qs, count);
+ if(data->early_data_enabled)
+ early_data_start(data);
+
+ /* run the queries */
+ ub_event_base_dispatch(base);
+
+ /* cleanup */
+ delete_doq_client_data(data);
+ ub_event_base_free(base);
+}
+#endif /* HAVE_NGTCP2 */
+
+#ifdef HAVE_NGTCP2
+/** getopt global, in case header files fail to declare it. */
+extern int optind;
+/** getopt global, in case header files fail to declare it. */
+extern char* optarg;
+int main(int ATTR_UNUSED(argc), char** ATTR_UNUSED(argv))
+{
+ int c;
+ int port = UNBOUND_DNS_OVER_QUIC_PORT, quiet = 0;
+ const char* svr = "127.0.0.1", *transport_file = NULL,
+ *session_file = NULL;
+#ifdef USE_WINSOCK
+ WSADATA wsa_data;
+ if(WSAStartup(MAKEWORD(2,2), &wsa_data) != 0) {
+ printf("WSAStartup failed\n");
+ return 1;
+ }
+#endif
+ checklock_set_output_name("ublocktrace-doqclient");
+ checklock_start();
+ log_init(0, 0, 0);
+ log_ident_set("doqclient");
+
+ while((c=getopt(argc, argv, "hp:qs:vx:y:")) != -1) {
+ switch(c) {
+ case 'p':
+ if(atoi(optarg)==0 && strcmp(optarg,"0")!=0) {
+ printf("error parsing port, "
+ "number expected: %s\n", optarg);
+ return 1;
+ }
+ port = atoi(optarg);
+ break;
+ case 'q':
+ quiet++;
+ break;
+ case 's':
+ svr = optarg;
+ break;
+ case 'v':
+ verbosity++;
+ break;
+ case 'x':
+ transport_file = optarg;
+ break;
+ case 'y':
+ session_file = optarg;
+ break;
+ case 'h':
+ case '?':
+ default:
+ usage(argv);
+ }
+ }
+
+ argc -= optind;
+ argv += optind;
+
+ if(argc%3!=0) {
+ printf("Invalid input. Specify qname, qtype, and qclass.\n");
+ return 1;
+ }
+ if(port == 53) {
+ printf("Error: port number 53 not for DNS over QUIC. Port number 53 is not allowed to be used with DNS over QUIC. It is used for DNS datagrams.\n");
+ return 1;
+ }
+
+ run(svr, port, argv, argc, transport_file, session_file, quiet);
+
+ checklock_stop();
+#ifdef USE_WINSOCK
+ WSACleanup();
+#endif
+ return 0;
+}
+#else /* HAVE_NGTCP2 */
+int main(int ATTR_UNUSED(argc), char** ATTR_UNUSED(argv))
+{
+ printf("Compiled without ngtcp2 for QUIC, cannot run doqclient.\n");
+ return 1;
+}
+#endif /* HAVE_NGTCP2 */
+
+/***--- definitions to make fptr_wlist work. ---***/
+/* These are callbacks, similar to smallapp callbacks, except the debug
+ * tool callbacks are not in it */
+struct tube;
+struct query_info;
+#include "util/data/packed_rrset.h"
+#include "daemon/worker.h"
+#include "daemon/remote.h"
+#include "util/fptr_wlist.h"
+#include "libunbound/context.h"
+
+void worker_handle_control_cmd(struct tube* ATTR_UNUSED(tube),
+ uint8_t* ATTR_UNUSED(buffer), size_t ATTR_UNUSED(len),
+ int ATTR_UNUSED(error), void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+int worker_handle_request(struct comm_point* ATTR_UNUSED(c),
+ void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
+ struct comm_reply* ATTR_UNUSED(repinfo))
+{
+ log_assert(0);
+ return 0;
+}
+
+int worker_handle_service_reply(struct comm_point* ATTR_UNUSED(c),
+ void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
+ struct comm_reply* ATTR_UNUSED(reply_info))
+{
+ log_assert(0);
+ return 0;
+}
+
+int remote_accept_callback(struct comm_point* ATTR_UNUSED(c),
+ void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
+ struct comm_reply* ATTR_UNUSED(repinfo))
+{
+ log_assert(0);
+ return 0;
+}
+
+int remote_control_callback(struct comm_point* ATTR_UNUSED(c),
+ void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
+ struct comm_reply* ATTR_UNUSED(repinfo))
+{
+ log_assert(0);
+ return 0;
+}
+
+void worker_sighandler(int ATTR_UNUSED(sig), void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+struct outbound_entry* worker_send_query(
+ struct query_info* ATTR_UNUSED(qinfo), uint16_t ATTR_UNUSED(flags),
+ int ATTR_UNUSED(dnssec), int ATTR_UNUSED(want_dnssec),
+ int ATTR_UNUSED(nocaps), int ATTR_UNUSED(check_ratelimit),
+ struct sockaddr_storage* ATTR_UNUSED(addr),
+ socklen_t ATTR_UNUSED(addrlen), uint8_t* ATTR_UNUSED(zone),
+ size_t ATTR_UNUSED(zonelen), int ATTR_UNUSED(tcp_upstream),
+ int ATTR_UNUSED(ssl_upstream), char* ATTR_UNUSED(tls_auth_name),
+ struct module_qstate* ATTR_UNUSED(q), int* ATTR_UNUSED(was_ratelimited))
+{
+ log_assert(0);
+ return 0;
+}
+
+#ifdef UB_ON_WINDOWS
+void
+worker_win_stop_cb(int ATTR_UNUSED(fd), short ATTR_UNUSED(ev), void*
+ ATTR_UNUSED(arg)) {
+ log_assert(0);
+}
+
+void
+wsvc_cron_cb(void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+#endif /* UB_ON_WINDOWS */
+
+void
+worker_alloc_cleanup(void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+struct outbound_entry* libworker_send_query(
+ struct query_info* ATTR_UNUSED(qinfo), uint16_t ATTR_UNUSED(flags),
+ int ATTR_UNUSED(dnssec), int ATTR_UNUSED(want_dnssec),
+ int ATTR_UNUSED(nocaps), int ATTR_UNUSED(check_ratelimit),
+ struct sockaddr_storage* ATTR_UNUSED(addr),
+ socklen_t ATTR_UNUSED(addrlen), uint8_t* ATTR_UNUSED(zone),
+ size_t ATTR_UNUSED(zonelen), int ATTR_UNUSED(tcp_upstream),
+ int ATTR_UNUSED(ssl_upstream), char* ATTR_UNUSED(tls_auth_name),
+ struct module_qstate* ATTR_UNUSED(q), int* ATTR_UNUSED(was_ratelimited))
+{
+ log_assert(0);
+ return 0;
+}
+
+int libworker_handle_service_reply(struct comm_point* ATTR_UNUSED(c),
+ void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
+ struct comm_reply* ATTR_UNUSED(reply_info))
+{
+ log_assert(0);
+ return 0;
+}
+
+void libworker_handle_control_cmd(struct tube* ATTR_UNUSED(tube),
+ uint8_t* ATTR_UNUSED(buffer), size_t ATTR_UNUSED(len),
+ int ATTR_UNUSED(error), void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+void libworker_fg_done_cb(void* ATTR_UNUSED(arg), int ATTR_UNUSED(rcode),
+ struct sldns_buffer* ATTR_UNUSED(buf), enum sec_status ATTR_UNUSED(s),
+ char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
+{
+ log_assert(0);
+}
+
+void libworker_bg_done_cb(void* ATTR_UNUSED(arg), int ATTR_UNUSED(rcode),
+ struct sldns_buffer* ATTR_UNUSED(buf), enum sec_status ATTR_UNUSED(s),
+ char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
+{
+ log_assert(0);
+}
+
+void libworker_event_done_cb(void* ATTR_UNUSED(arg), int ATTR_UNUSED(rcode),
+ struct sldns_buffer* ATTR_UNUSED(buf), enum sec_status ATTR_UNUSED(s),
+ char* ATTR_UNUSED(why_bogus), int ATTR_UNUSED(was_ratelimited))
+{
+ log_assert(0);
+}
+
+int context_query_cmp(const void* ATTR_UNUSED(a), const void* ATTR_UNUSED(b))
+{
+ log_assert(0);
+ return 0;
+}
+
+void worker_stat_timer_cb(void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+void worker_probe_timer_cb(void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+void worker_start_accept(void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+void worker_stop_accept(void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+/** keep track of lock id in lock-verify application */
+struct order_id {
+ /** the thread id that created it */
+ int thr;
+ /** the instance number of creation */
+ int instance;
+};
+
+int order_lock_cmp(const void* e1, const void* e2)
+{
+ const struct order_id* o1 = e1;
+ const struct order_id* o2 = e2;
+ if(o1->thr < o2->thr) return -1;
+ if(o1->thr > o2->thr) return 1;
+ if(o1->instance < o2->instance) return -1;
+ if(o1->instance > o2->instance) return 1;
+ return 0;
+}
+
+int
+codeline_cmp(const void* a, const void* b)
+{
+ return strcmp(a, b);
+}
+
+int replay_var_compare(const void* ATTR_UNUSED(a), const void* ATTR_UNUSED(b))
+{
+ log_assert(0);
+ return 0;
+}
+
+void remote_get_opt_ssl(char* ATTR_UNUSED(str), void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+#ifdef USE_DNSTAP
+void dtio_tap_callback(int ATTR_UNUSED(fd), short ATTR_UNUSED(ev),
+ void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+#endif
+
+#ifdef USE_DNSTAP
+void dtio_mainfdcallback(int ATTR_UNUSED(fd), short ATTR_UNUSED(ev),
+ void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+#endif
+
+void fast_reload_service_cb(int ATTR_UNUSED(fd), short ATTR_UNUSED(ev),
+ void* ATTR_UNUSED(arg))
+{
+ log_assert(0);
+}
+
+int fast_reload_client_callback(struct comm_point* ATTR_UNUSED(c),
+ void* ATTR_UNUSED(arg), int ATTR_UNUSED(error),
+ struct comm_reply* ATTR_UNUSED(repinfo))
+{
+ log_assert(0);
+ return 0;
+}