flex_dns/rdata/
nsec.rs

1use crate::{Buffer, DnsMessage, DnsMessageError, MutBuffer};
2use crate::characters::Characters;
3use crate::name::DnsName;
4use crate::parse::Parse;
5use crate::rdata::{RData, RDataParse};
6use crate::write::WriteBytes;
7
8/// # Next secure record
9/// This record is used to prove that a name does not exist in a zone.
10#[derive(Copy, Clone, Debug, PartialEq)]
11pub struct Nsec<'a> {
12    /// The next owner name in the canonical ordering of the zone.
13    pub next_domain_name: DnsName<'a>,
14    /// The set of RR types present at the NSEC RR's owner name.
15    pub type_bit_maps: Characters<'a>,
16}
17
18impl<'a> RDataParse<'a> for Nsec<'a> {
19    #[inline]
20    fn parse(rdata: &RData<'a>, i: &mut usize) -> Result<Self, DnsMessageError> {
21        let next_domain_name = DnsName::parse(rdata, i)?;
22        let type_bit_maps = Characters::parse(rdata, i)?;
23
24        Ok(Self {
25            next_domain_name,
26            type_bit_maps,
27        })
28    }
29}
30
31impl<'a> WriteBytes for Nsec<'a> {
32    #[inline]
33    fn write<
34        const PTR_STORAGE: usize,
35        const DNS_SECTION: usize,
36        B: MutBuffer + Buffer,
37    >(&self, message: &mut DnsMessage<PTR_STORAGE, DNS_SECTION, B>) -> Result<usize, DnsMessageError> {
38        let mut bytes = 0;
39
40        bytes += self.next_domain_name.write(message)?;
41        bytes += self.type_bit_maps.write(message)?;
42
43        Ok(bytes)
44    }
45}
46
47#[cfg(test)]
48mod test {
49    use crate::rdata::testutils::parse_write_test;
50
51    use super::*;
52
53    parse_write_test!(
54        9,
55        [
56            0x03, // length of "www"
57            b'w', b'w', b'w', // "www"
58            0x00, // end of name
59            0x03, // length of "www"
60            b'w', b'w', b'w', // "www"
61        ],
62        Nsec {
63            next_domain_name: unsafe { DnsName::new_unchecked(b"\x03www\x00") },
64            type_bit_maps: unsafe { Characters::new_unchecked(b"www") },
65        },
66    );
67}