rdata.c revision 78838d3e0cd62423c23de5503910e01884d2104b
/*
* Copyright (C) 1998-2000 Internet Software Consortium.
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM
* DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL
* INTERNET SOFTWARE CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT,
* INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING
* FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
* NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
* WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
/* $Id: rdata.c,v 1.134 2000/12/11 19:24:18 bwelling Exp $ */
#include <config.h>
#include <ctype.h>
#include <dns/callbacks.h>
#include <dns/compress.h>
#include <dns/keyflags.h>
#include <dns/rdataclass.h>
#include <dns/rdatastruct.h>
#include <dns/rdatatype.h>
#include <dns/secproto.h>
#define RETERR(x) do { \
isc_result_t _r = (x); \
if (_r != ISC_R_SUCCESS) \
return (_r); \
} while (0)
#define ARGS_FREESTRUCT void *source
void *arg
/*
* Context structure for the totext_ functions.
* Contains formatting options for rdata-to-text
* conversion.
*/
typedef struct dns_rdata_textctx {
unsigned int flags; /* DNS_STYLEFLAG_* */
unsigned int width; /* Width of rdata column. */
const char *linebreak; /* Line break string. */
static isc_result_t
static isc_result_t
static isc_result_t
static isc_boolean_t
static unsigned int
static isc_result_t
static isc_boolean_t
static void
static isc_result_t
static isc_result_t
static isc_result_t
static isc_result_t
static isc_uint32_t
static isc_uint16_t
static isc_uint8_t
static isc_result_t
static int
static int
static int
static isc_result_t
static isc_result_t
static void
static void
static void
static isc_result_t
static inline isc_result_t
return (ISC_R_SUCCESS);
}
static inline void *
void *new;
return (source);
return (new);
}
static const char hexdigits[] = "0123456789abcdef";
static const char decdigits[] = "0123456789";
#include "code.h"
#define META 0x0001
#define RESERVED 0x0002
#define RCODENAMES \
/* standard rcodes */ \
{ dns_rcode_noerror, "NOERROR", 0}, \
{ dns_rcode_formerr, "FORMERR", 0}, \
{ dns_rcode_servfail, "SERVFAIL", 0}, \
{ dns_rcode_nxdomain, "NXDOMAIN", 0}, \
{ dns_rcode_notimp, "NOTIMP", 0}, \
{ dns_rcode_refused, "REFUSED", 0}, \
{ dns_rcode_yxdomain, "YXDOMAIN", 0}, \
{ dns_rcode_yxrrset, "YXRRSET", 0}, \
{ dns_rcode_nxrrset, "NXRRSET", 0}, \
{ dns_rcode_notauth, "NOTAUTH", 0}, \
{ dns_rcode_notzone, "NOTZONE", 0},
#define ERCODENAMES \
/* extended rcodes */ \
{ dns_rcode_badvers, "BADVERS", 0}, \
{ 0, NULL, 0 }
#define TSIGRCODENAMES \
/* extended rcodes */ \
{ dns_tsigerror_badsig, "BADSIG", 0}, \
{ dns_tsigerror_badkey, "BADKEY", 0}, \
{ dns_tsigerror_badtime, "BADTIME", 0}, \
{ dns_tsigerror_badmode, "BADMODE", 0}, \
{ dns_tsigerror_badname, "BADNAME", 0}, \
{ dns_tsigerror_badalg, "BADALG", 0}, \
{ 0, NULL, 0 }
/* RFC2538 section 2.1 */
#define CERTNAMES \
{ 1, "PKIX", 0}, \
{ 2, "SPKI", 0}, \
{ 3, "PGP", 0}, \
{ 253, "URI", 0}, \
{ 254, "OID", 0}, \
{ 0, NULL, 0}
/* RFC2535 section 7 */
#define SECALGNAMES \
{ 1, "RSAMD5", 0 }, \
{ 2, "DH", 0 }, \
{ 3, "DSA", 0 }, \
{ 4, "ECC", 0 }, \
{ 252, "INDIRECT", 0 }, \
{ 253, "PRIVATEDNS", 0 }, \
{ 254, "PRIVATEOID", 0 }, \
{ 0, NULL, 0}
/* RFC2535 section 7.1 */
#define SECPROTONAMES \
{ 0, "NONE", 0 }, \
{ 1, "TLS", 0 }, \
{ 2, "EMAIL", 0 }, \
{ 3, "DNSSEC", 0 }, \
{ 4, "IPSEC", 0 }, \
{ 255, "ALL", 0 }, \
{ 0, NULL, 0}
struct tbl {
unsigned int value;
const char *name;
int flags;
};
static struct keyflag {
const char *name;
unsigned int value;
unsigned int mask;
} keyflags[] = {
{ "NOCONF", 0x4000, 0xC000 },
{ "NOAUTH", 0x8000, 0xC000 },
{ "NOKEY", 0xC000, 0xC000 },
{ "FLAG2", 0x2000, 0x2000 },
{ "EXTEND", 0x1000, 0x1000 },
{ "FLAG4", 0x0800, 0x0800 },
{ "FLAG5", 0x0400, 0x0400 },
{ "USER", 0x0000, 0x0300 },
{ "ZONE", 0x0100, 0x0300 },
{ "HOST", 0x0200, 0x0300 },
{ "NTYP3", 0x0300, 0x0300 },
{ "FLAG8", 0x0080, 0x0080 },
{ "FLAG9", 0x0040, 0x0040 },
{ "FLAG10", 0x0020, 0x0020 },
{ "FLAG11", 0x0010, 0x0010 },
{ "SIG0", 0x0000, 0x000F },
{ "SIG1", 0x0001, 0x000F },
{ "SIG2", 0x0002, 0x000F },
{ "SIG3", 0x0003, 0x000F },
{ "SIG4", 0x0004, 0x000F },
{ "SIG5", 0x0005, 0x000F },
{ "SIG6", 0x0006, 0x000F },
{ "SIG7", 0x0007, 0x000F },
{ "SIG8", 0x0008, 0x000F },
{ "SIG9", 0x0009, 0x000F },
{ "SIG10", 0x000A, 0x000F },
{ "SIG11", 0x000B, 0x000F },
{ "SIG12", 0x000C, 0x000F },
{ "SIG13", 0x000D, 0x000F },
{ "SIG14", 0x000E, 0x000F },
{ "SIG15", 0x000F, 0x000F },
{ NULL, 0, 0 }
};
/***
*** Initialization
***/
void
/* ISC_LIST_INIT(rdata->list); */
}
#define DNS_RDATA_INITIALIZED(rdata) \
#define DNS_RDATA_VALIDFLAGS(rdata) \
void
}
/***
***
***/
void
}
/***
*** Comparisons
***/
int
int result = 0;
if (use_default) {
}
return (result);
}
/***
*** Conversions
***/
void
{
}
void
}
{
}
if (use_default) {
else {
}
}
/*
* We should have consumed all of our buffer.
*/
}
if (result != ISC_R_SUCCESS) {
}
return (result);
}
{
/*
* Some DynDNS meta-RRs have empty rdata.
*/
return (ISC_R_SUCCESS);
}
if (use_default) {
return (ISC_R_NOSPACE);
return (ISC_R_SUCCESS);
}
if (result != ISC_R_SUCCESS) {
}
return (result);
}
/*
* If the binary data in 'src' is valid uncompressed wire format
* rdata of class 'rdclass' and type 'type', return ISC_R_SUCCESS
* and copy the validated rdata to 'dest'. Otherwise return an error.
*/
static isc_result_t
{
return (result);
}
static isc_result_t
{
if (dns_rdatatype_ismeta(type))
return (DNS_R_METATYPE);
return (ISC_R_RANGE);
if (result != ISC_R_SUCCESS)
return (result);
if (result != ISC_R_SUCCESS)
goto failure;
goto failure;
}
if (dns_rdatatype_isknown(type)) {
} else {
isc_region_t r;
isc_buffer_usedregion(buf, &r);
}
if (result != ISC_R_SUCCESS)
goto failure;
return (ISC_R_SUCCESS);
return (result);
}
{
char *name;
unsigned long line;
void (*callback)(dns_rdatacallbacks_t *, const char *, ...);
}
if (result != ISC_R_SUCCESS)
return (result);
else {
}
else
/*
* Consume to end of line / file.
* If not at end of line initially set error code.
* Call callback via fromtext_error once if there was an error.
*/
do {
if (iresult != ISC_R_SUCCESS) {
if (result == ISC_R_SUCCESS) {
switch (iresult) {
case ISC_R_NOMEMORY:
break;
case ISC_R_NOSPACE:
break;
default:
"isc_lex_gettoken() failed: %s",
break;
}
}
break;
if (result == ISC_R_SUCCESS)
}
break;
} else {
break;
}
} while (1);
}
if (result != ISC_R_SUCCESS) {
}
return (result);
}
static isc_result_t
{
char buf[sizeof "65536"];
/*
* Some DynDNS meta-RRs have empty rdata.
*/
return (ISC_R_SUCCESS);
}
if (use_default) {
else
if (result == ISC_R_SUCCESS)
target);
if (result == ISC_R_SUCCESS &&
}
}
return (result);
}
{
/*
* Set up formatting options for single-line output.
*/
}
{
/*
* Set up formatting options for formatted output.
*/
if ((flags & DNS_STYLEFLAG_MULTILINE) != 0) {
} else {
}
}
{
}
if (use_default)
(void)NULL;
}
if (result != ISC_R_SUCCESS)
return (result);
}
if (use_default)
(void)NULL;
return (result);
}
void
dns_rdata_freestruct(void *source) {
}
void *arg)
{
/*
* Call 'add' for each name and type from 'rdata' which is subject to
* additional section processing.
*/
/* No additional processing for unknown types */
if (use_default)
return (result);
}
isc_region_t r;
/*
* Send 'rdata' in DNSSEC canonical form to 'digest'.
*/
if (use_default) {
dns_rdata_toregion(rdata, &r);
}
return (result);
}
unsigned int
{
if (type > 255)
return (DNS_RDATATYPEATTR_UNKNOWN);
}
static isc_result_t
{
int i;
unsigned int n;
char *e;
char buffer[NUMBERSIZE];
/*
* We have a potential number. Try to parse it with strtoul().
* strtoul() requires null termination, so we must make
* a copy.
*/
if (*e == 0) {
if (n > max)
return (ISC_R_RANGE);
*valuep = n;
return (ISC_R_SUCCESS);
}
/*
* It was not a number after all; fall through.
*/
}
unsigned int n;
return (ISC_R_SUCCESS);
}
}
return (DNS_R_UNKNOWN);
}
static isc_result_t
{
int i = 0;
char buf[sizeof "4294967296"];
}
i++;
}
}
/*
* This uses lots of hard coded values, but how often do we actually
* add classes?
*/
return (ISC_R_SUCCESS); \
}
case 'a':
break;
case 'c':
/*
* RFC1035 says the mnemonic for the CHAOS class is CH,
* but historical BIND practice is to call it CHAOS.
* We will accept both forms, but only generate CH.
*/
{
char *endp;
return (ISC_R_SUCCESS);
}
}
break;
case 'h':
break;
case 'i':
break;
case 'n':
break;
case 'r':
break;
}
return (DNS_R_UNKNOWN);
}
char buf[sizeof("CLASS65536")];
switch (rdclass) {
case dns_rdataclass_any:
case dns_rdataclass_chaos:
case dns_rdataclass_hs:
case dns_rdataclass_in:
case dns_rdataclass_none:
case dns_rdataclass_reserved0:
default:
}
}
void
{
/*
* Null terminate.
*/
if (result == ISC_R_SUCCESS) {
isc_buffer_putuint8(&buf, 0);
else
}
if (result != ISC_R_SUCCESS) {
}
}
unsigned int hash;
unsigned int n;
unsigned char a, b;
if (n == 0)
return (DNS_R_UNKNOWN);
hash = ((a + n) * b) % 256;
/*
* This switch block is inlined via #define, and will use "return"
* to return a result to the caller if it is a valid (known)
* rdatatype name.
*/
char *endp;
return (ISC_R_SUCCESS);
}
}
return (DNS_R_UNKNOWN);
}
char buf[sizeof "TYPE65536"];
if (type > 255) {
}
}
void
{
/*
* Null terminate.
*/
if (result == ISC_R_SUCCESS) {
isc_buffer_putuint8(&buf, 0);
else
}
if (result != ISC_R_SUCCESS) {
}
}
/* XXXRTH Should we use a hash table here? */
unsigned int value;
return (ISC_R_SUCCESS);
}
}
unsigned int value;
return (ISC_R_SUCCESS);
}
}
unsigned int value;
return (ISC_R_SUCCESS);
}
}
unsigned int value;
return (ISC_R_SUCCESS);
}
}
unsigned int value;
return (ISC_R_SUCCESS);
}
}
{
unsigned int n;
char *e;
char buffer[NUMBERSIZE];
/*
* We have a potential number. Try to parse it with strtoul().
* strtoul() requires null termination, so we must make
* a copy.
*/
if (*e == 0) {
if (n > 0xffff)
return (ISC_R_RANGE);
*flagsp = n;
return (ISC_R_SUCCESS);
}
/* It was not a number after all; fall through. */
}
struct keyflag *p;
unsigned int len;
else
break;
}
return (DNS_R_UNKNOWN);
#ifdef notyet
warn("overlapping key flags");
#endif
text++; /* Skip "|" */
}
return (ISC_R_SUCCESS);
}
/*
* Private function.
*/
static unsigned int
}
static isc_result_t
unsigned int tl;
unsigned int n;
unsigned char *sp;
char *tp;
n = *sp++;
if (tl < 1)
return (ISC_R_NOSPACE);
*tp++ = '"';
tl--;
while (n--) {
if (tl < 4)
return (ISC_R_NOSPACE);
tp += 4;
tl -= 4;
continue;
}
if (tl < 2)
return (ISC_R_NOSPACE);
*tp++ = '\\';
tl--;
}
if (tl < 1)
return (ISC_R_NOSPACE);
tl--;
}
if (tl < 1)
return (ISC_R_NOSPACE);
*tp++ = '"';
tl--;
return (ISC_R_SUCCESS);
}
static isc_result_t
unsigned int n, nrem;
char *s;
unsigned char *t;
int d;
int c;
if (nrem < 1)
return (ISC_R_NOSPACE);
/*
* Length byte.
*/
nrem--;
t++;
/*
* Maximum text string length.
*/
if (nrem > 255)
nrem = 255;
while (n-- != 0) {
c = (*s++)&0xff;
c = d;
if (n == 0)
return (DNS_R_SYNTAX);
n--;
if ((d = decvalue(*s++)) != -1)
c = c * 10 + d;
else
return (DNS_R_SYNTAX);
if (n == 0)
return (DNS_R_SYNTAX);
n--;
if ((d = decvalue(*s++)) != -1)
c = c * 10 + d;
else
return (DNS_R_SYNTAX);
if (c > 255)
return (DNS_R_SYNTAX);
} else if (!escape && c == '\\') {
continue;
}
if (nrem == 0)
return (ISC_R_NOSPACE);
*t++ = c;
nrem--;
}
if (escape)
return (DNS_R_SYNTAX);
return (ISC_R_SUCCESS);
}
static isc_result_t
unsigned int n;
return(ISC_R_UNEXPECTEDEND);
return (ISC_R_UNEXPECTEDEND);
return (ISC_R_NOSPACE);
isc_buffer_forward(source, n);
isc_buffer_add(target, n);
return (ISC_R_SUCCESS);
}
static isc_boolean_t
goto return_false;
goto return_false;
goto return_false;
goto return_false;
return (ISC_TRUE);
return (ISC_FALSE);
}
static isc_result_t
unsigned int l;
return (ISC_R_NOSPACE);
isc_buffer_add(target, l);
return (ISC_R_SUCCESS);
}
static isc_boolean_t
}
static void
}
static isc_result_t
return (ISC_R_NOSPACE);
return (ISC_R_SUCCESS);
}
static isc_result_t
if (value > 0xffff)
return (ISC_R_RANGE);
return (ISC_R_NOSPACE);
return (ISC_R_SUCCESS);
}
static isc_result_t
if (value > 0xff)
return (ISC_R_RANGE);
return (ISC_R_NOSPACE);
return (ISC_R_SUCCESS);
}
static isc_result_t
isc_region_t r;
dns_name_toregion(name, &r);
return (isc_buffer_copyregion(target, &r));
}
static isc_uint32_t
unsigned long value;
return(value);
}
static isc_uint16_t
}
static isc_uint8_t
}
static isc_result_t
return (ISC_R_NOSPACE);
return (ISC_R_SUCCESS);
}
static int
unsigned int l;
int result;
else
}
static int
char *s;
unsigned char c;
c = (unsigned char)value;
if (!isascii(c))
return (-1);
if (isupper(c))
c = tolower(c);
return (-1);
return (s - hexdigits);
}
static int
char *s;
/*
* isascii() is valid for full range of int values, no need to
* mask or cast.
*/
return (-1);
return (-1);
return (s - decdigits);
}
static const char atob_digits[86] =
"!\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`" \
"abcdefghijklmnopqrstu";
/*
* Subroutines to convert between 8 bit binary bytes and printable ASCII.
* Computes the number of bytes, and three kinds of simple checksums.
* Incoming bytes are collected into 32-bit words, then printed in base 85:
* exp(85,5) > exp(2,32)
* The ASCII characters used are between '!' and 'u';
* 'z' encodes 32-bit zero; 'x' is used to mark the end of encoded data.
*
* Originally by Paul Rutter (philabs!per) and Joe Orost (petsd!joe) for
* Modified by Mike Schwartz 8/19/86 for use in BIND.
* Modified to be re-entrant 3/2/99.
*/
struct state {
};
/*
* Decode ASCII-encoded byte c into binary representation and
* place into *bufp, advancing bufp.
*/
static isc_result_t
char *s;
if (c == 'z') {
if (bcount != 0)
return(DNS_R_SYNTAX);
else {
}
if (bcount == 0) {
word = s - atob_digits;
++bcount;
} else if (bcount < 4) {
word += s - atob_digits;
++bcount;
} else {
word += s - atob_digits;
word = 0;
bcount = 0;
}
} else
return(DNS_R_SYNTAX);
return(ISC_R_SUCCESS);
}
/*
* Compute checksum info and place c into target.
*/
static isc_result_t
Ceor ^= c;
Csum += c;
Csum += 1;
if ((Crot & 0x80000000)) {
Crot <<= 1;
Crot += 1;
} else {
Crot <<= 1;
}
Crot += c;
return (ISC_R_NOSPACE);
return (ISC_R_SUCCESS);
}
/*
* Read the ASCII-encoded data from inbuf, of length inbuflen, and convert
* it into T_UNSPEC (binary data) in outbuf, not to exceed outbuflen bytes;
* outbuflen must be divisible by 4. (Note: this is because outbuf is filled
* in 4 bytes at a time. If the actual data doesn't end on an even 4-byte
* boundary, there will be no problem...it will be padded with 0 bytes, and
* numbytes will indicate the correct number of bytes. The main point is
* that since the buffer is filled in 4 bytes at a time, even if there is
* not a full 4 bytes of data at the end, there has to be room to 0-pad the
* data, so the buffer must be of size divisible by 4). Place the number of
*/
static isc_result_t
char c;
char *e;
ISC_FALSE));
break;
} else
}
/*
* Number of bytes.
*/
ISC_FALSE));
/*
* Checksum.
*/
ISC_FALSE));
if (*e != 0)
return (DNS_R_SYNTAX);
/*
* Checksum.
*/
ISC_FALSE));
if (*e != 0)
return (DNS_R_SYNTAX);
/*
* Checksum.
*/
ISC_FALSE));
if (*e != 0)
return (DNS_R_SYNTAX);
return(DNS_R_BADCKSUM);
return (ISC_R_SUCCESS);
}
/*
* Encode binary byte c into ASCII representation and place into *bufp,
* advancing bufp.
*/
static isc_result_t
Ceor ^= c;
Csum += c;
Csum += 1;
if ((Crot & 0x80000000)) {
Crot <<= 1;
Crot += 1;
} else {
Crot <<= 1;
}
Crot += c;
word <<= 8;
word |= c;
if (bcount == 3) {
if (word == 0) {
return (ISC_R_NOSPACE);
} else {
register int tmp = 0;
if (tmpword < 0) {
/*
* Because some don't support u_long.
*/
tmp = 32;
}
if (tmpword < 0) {
tmp = 64;
}
return (ISC_R_NOSPACE);
+ tmp];
tmpword %= 85;
}
bcount = 0;
} else {
bcount += 1;
}
return (ISC_R_SUCCESS);
}
/*
* Encode the binary data from inbuf, of length inbuflen, into a
*/
static isc_result_t
int inc;
char buf[sizeof "x 2000000000 ffffffff ffffffff ffffffff"];
while (bcount != 0)
/*
* Put byte count and checksum information at end of buffer,
* delimited by 'x'
*/
}
static void
...)
{
}
static void
"%s:%lu: file does not end with newline",
}
static void
{
name = "UNKNOWN";
case isc_tokentype_eol:
break;
case isc_tokentype_eof:
break;
case isc_tokentype_number:
break;
case isc_tokentype_string:
case isc_tokentype_qstring:
break;
default:
break;
}
} else {
}
}
return (covers_sig(rdata));
}
return (ISC_TRUE);
return (ISC_FALSE);
}
!= 0)
return (ISC_TRUE);
return (ISC_FALSE);
}
!= 0)
return (ISC_TRUE);
return (ISC_FALSE);
}
!= 0)
return (ISC_TRUE);
return (ISC_FALSE);
}
if (rdclass == dns_rdataclass_reserved0
|| rdclass == dns_rdataclass_none
|| rdclass == dns_rdataclass_any)
return (ISC_TRUE);
return (ISC_FALSE); /* Assume it is not a meta class. */
}
return (ISC_TRUE);
return (ISC_FALSE);
}
if ((dns_rdatatype_attributes(type)
!= 0)
return (ISC_TRUE);
return (ISC_FALSE);
}
== 0)
return (ISC_TRUE);
return (ISC_FALSE);
}