/contrib/bind9/lib/dns/rdata/generic/dnskey_48.c
https://bitbucket.org/freebsd/freebsd-head/ · C · 349 lines · 230 code · 78 blank · 41 comment · 56 complexity · 9c892028c2332de970b8c9813b4819e3 MD5 · raw file
- /*
- * Copyright (C) 2004, 2005, 2007, 2009, 2012 Internet Systems Consortium, Inc. ("ISC")
- * Copyright (C) 2003 Internet Software Consortium.
- *
- * Permission to use, copy, modify, and/or distribute this software for any
- * purpose with or without fee is hereby granted, provided that the above
- * copyright notice and this permission notice appear in all copies.
- *
- * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
- * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
- * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
- * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
- * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
- * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
- * PERFORMANCE OF THIS SOFTWARE.
- */
- /* $Id$ */
- /*
- * Reviewed: Wed Mar 15 16:47:10 PST 2000 by halley.
- */
- /* RFC2535 */
- #ifndef RDATA_GENERIC_DNSKEY_48_C
- #define RDATA_GENERIC_DNSKEY_48_C
- #include <dst/dst.h>
- #define RRTYPE_DNSKEY_ATTRIBUTES (DNS_RDATATYPEATTR_DNSSEC)
- static inline isc_result_t
- fromtext_dnskey(ARGS_FROMTEXT) {
- isc_token_t token;
- dns_secalg_t alg;
- dns_secproto_t proto;
- dns_keyflags_t flags;
- REQUIRE(type == 48);
- UNUSED(type);
- UNUSED(rdclass);
- UNUSED(origin);
- UNUSED(options);
- UNUSED(callbacks);
- /* flags */
- RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
- ISC_FALSE));
- RETTOK(dns_keyflags_fromtext(&flags, &token.value.as_textregion));
- RETERR(uint16_tobuffer(flags, target));
- /* protocol */
- RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
- ISC_FALSE));
- RETTOK(dns_secproto_fromtext(&proto, &token.value.as_textregion));
- RETERR(mem_tobuffer(target, &proto, 1));
- /* algorithm */
- RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
- ISC_FALSE));
- RETTOK(dns_secalg_fromtext(&alg, &token.value.as_textregion));
- RETERR(mem_tobuffer(target, &alg, 1));
- /* No Key? */
- if ((flags & 0xc000) == 0xc000)
- return (ISC_R_SUCCESS);
- return (isc_base64_tobuffer(lexer, target, -1));
- }
- static inline isc_result_t
- totext_dnskey(ARGS_TOTEXT) {
- isc_region_t sr;
- char buf[sizeof("64000")];
- unsigned int flags;
- unsigned char algorithm;
- char namebuf[DNS_NAME_FORMATSIZE];
- REQUIRE(rdata->type == 48);
- REQUIRE(rdata->length != 0);
- dns_rdata_toregion(rdata, &sr);
- /* flags */
- flags = uint16_fromregion(&sr);
- isc_region_consume(&sr, 2);
- sprintf(buf, "%u", flags);
- RETERR(str_totext(buf, target));
- RETERR(str_totext(" ", target));
- /* protocol */
- sprintf(buf, "%u", sr.base[0]);
- isc_region_consume(&sr, 1);
- RETERR(str_totext(buf, target));
- RETERR(str_totext(" ", target));
- /* algorithm */
- algorithm = sr.base[0];
- sprintf(buf, "%u", algorithm);
- isc_region_consume(&sr, 1);
- RETERR(str_totext(buf, target));
- /* No Key? */
- if ((flags & 0xc000) == 0xc000)
- return (ISC_R_SUCCESS);
- if ((tctx->flags & DNS_STYLEFLAG_COMMENT) != 0 &&
- algorithm == DNS_KEYALG_PRIVATEDNS) {
- dns_name_t name;
- dns_name_init(&name, NULL);
- dns_name_fromregion(&name, &sr);
- dns_name_format(&name, namebuf, sizeof(namebuf));
- } else
- namebuf[0] = 0;
- /* key */
- if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
- RETERR(str_totext(" (", target));
- RETERR(str_totext(tctx->linebreak, target));
- RETERR(isc_base64_totext(&sr, tctx->width - 2,
- tctx->linebreak, target));
- if ((tctx->flags & DNS_STYLEFLAG_COMMENT) != 0)
- RETERR(str_totext(tctx->linebreak, target));
- else if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
- RETERR(str_totext(" ", target));
- if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
- RETERR(str_totext(")", target));
- if ((tctx->flags & DNS_STYLEFLAG_COMMENT) != 0) {
- isc_region_t tmpr;
- RETERR(str_totext(" ; key id = ", target));
- dns_rdata_toregion(rdata, &tmpr);
- sprintf(buf, "%u", dst_region_computeid(&tmpr, algorithm));
- RETERR(str_totext(buf, target));
- if (algorithm == DNS_KEYALG_PRIVATEDNS) {
- RETERR(str_totext(tctx->linebreak, target));
- RETERR(str_totext("; alg = ", target));
- RETERR(str_totext(namebuf, target));
- }
- }
- return (ISC_R_SUCCESS);
- }
- static inline isc_result_t
- fromwire_dnskey(ARGS_FROMWIRE) {
- unsigned char algorithm;
- isc_region_t sr;
- REQUIRE(type == 48);
- UNUSED(type);
- UNUSED(rdclass);
- UNUSED(dctx);
- UNUSED(options);
- isc_buffer_activeregion(source, &sr);
- if (sr.length < 4)
- return (ISC_R_UNEXPECTEDEND);
- algorithm = sr.base[3];
- RETERR(mem_tobuffer(target, sr.base, 4));
- isc_region_consume(&sr, 4);
- isc_buffer_forward(source, 4);
- if (algorithm == DNS_KEYALG_PRIVATEDNS) {
- dns_name_t name;
- dns_decompress_setmethods(dctx, DNS_COMPRESS_NONE);
- dns_name_init(&name, NULL);
- RETERR(dns_name_fromwire(&name, source, dctx, options, target));
- }
- isc_buffer_activeregion(source, &sr);
- isc_buffer_forward(source, sr.length);
- return (mem_tobuffer(target, sr.base, sr.length));
- }
- static inline isc_result_t
- towire_dnskey(ARGS_TOWIRE) {
- isc_region_t sr;
- REQUIRE(rdata->type == 48);
- REQUIRE(rdata->length != 0);
- UNUSED(cctx);
- dns_rdata_toregion(rdata, &sr);
- return (mem_tobuffer(target, sr.base, sr.length));
- }
- static inline int
- compare_dnskey(ARGS_COMPARE) {
- isc_region_t r1;
- isc_region_t r2;
- REQUIRE(rdata1->type == rdata2->type);
- REQUIRE(rdata1->rdclass == rdata2->rdclass);
- REQUIRE(rdata1->type == 48);
- REQUIRE(rdata1->length != 0);
- REQUIRE(rdata2->length != 0);
- dns_rdata_toregion(rdata1, &r1);
- dns_rdata_toregion(rdata2, &r2);
- return (isc_region_compare(&r1, &r2));
- }
- static inline isc_result_t
- fromstruct_dnskey(ARGS_FROMSTRUCT) {
- dns_rdata_dnskey_t *dnskey = source;
- REQUIRE(type == 48);
- REQUIRE(source != NULL);
- REQUIRE(dnskey->common.rdtype == type);
- REQUIRE(dnskey->common.rdclass == rdclass);
- UNUSED(type);
- UNUSED(rdclass);
- /* Flags */
- RETERR(uint16_tobuffer(dnskey->flags, target));
- /* Protocol */
- RETERR(uint8_tobuffer(dnskey->protocol, target));
- /* Algorithm */
- RETERR(uint8_tobuffer(dnskey->algorithm, target));
- /* Data */
- return (mem_tobuffer(target, dnskey->data, dnskey->datalen));
- }
- static inline isc_result_t
- tostruct_dnskey(ARGS_TOSTRUCT) {
- dns_rdata_dnskey_t *dnskey = target;
- isc_region_t sr;
- REQUIRE(rdata->type == 48);
- REQUIRE(target != NULL);
- REQUIRE(rdata->length != 0);
- dnskey->common.rdclass = rdata->rdclass;
- dnskey->common.rdtype = rdata->type;
- ISC_LINK_INIT(&dnskey->common, link);
- dns_rdata_toregion(rdata, &sr);
- /* Flags */
- if (sr.length < 2)
- return (ISC_R_UNEXPECTEDEND);
- dnskey->flags = uint16_fromregion(&sr);
- isc_region_consume(&sr, 2);
- /* Protocol */
- if (sr.length < 1)
- return (ISC_R_UNEXPECTEDEND);
- dnskey->protocol = uint8_fromregion(&sr);
- isc_region_consume(&sr, 1);
- /* Algorithm */
- if (sr.length < 1)
- return (ISC_R_UNEXPECTEDEND);
- dnskey->algorithm = uint8_fromregion(&sr);
- isc_region_consume(&sr, 1);
- /* Data */
- dnskey->datalen = sr.length;
- dnskey->data = mem_maybedup(mctx, sr.base, dnskey->datalen);
- if (dnskey->data == NULL)
- return (ISC_R_NOMEMORY);
- dnskey->mctx = mctx;
- return (ISC_R_SUCCESS);
- }
- static inline void
- freestruct_dnskey(ARGS_FREESTRUCT) {
- dns_rdata_dnskey_t *dnskey = (dns_rdata_dnskey_t *) source;
- REQUIRE(source != NULL);
- REQUIRE(dnskey->common.rdtype == 48);
- if (dnskey->mctx == NULL)
- return;
- if (dnskey->data != NULL)
- isc_mem_free(dnskey->mctx, dnskey->data);
- dnskey->mctx = NULL;
- }
- static inline isc_result_t
- additionaldata_dnskey(ARGS_ADDLDATA) {
- REQUIRE(rdata->type == 48);
- UNUSED(rdata);
- UNUSED(add);
- UNUSED(arg);
- return (ISC_R_SUCCESS);
- }
- static inline isc_result_t
- digest_dnskey(ARGS_DIGEST) {
- isc_region_t r;
- REQUIRE(rdata->type == 48);
- dns_rdata_toregion(rdata, &r);
- return ((digest)(arg, &r));
- }
- static inline isc_boolean_t
- checkowner_dnskey(ARGS_CHECKOWNER) {
- REQUIRE(type == 48);
- UNUSED(name);
- UNUSED(type);
- UNUSED(rdclass);
- UNUSED(wildcard);
- return (ISC_TRUE);
- }
- static inline isc_boolean_t
- checknames_dnskey(ARGS_CHECKNAMES) {
- REQUIRE(rdata->type == 48);
- UNUSED(rdata);
- UNUSED(owner);
- UNUSED(bad);
- return (ISC_TRUE);
- }
- static inline int
- casecompare_dnskey(ARGS_COMPARE) {
- /*
- * Treat ALG 253 (private DNS) subtype name case sensistively.
- */
- return (compare_dnskey(rdata1, rdata2));
- }
- #endif /* RDATA_GENERIC_DNSKEY_48_C */