tkey.c revision 84ac4c606462387e8287cd60dc9bf86d736f9425
/*
* Copyright (C) 1999 Internet Software Consortium.
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS
* ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE
* CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL
* DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
* PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
* ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
* SOFTWARE.
*/
/*
* $Id: tkey.c,v 1.3 1999/10/26 19:32:37 bwelling Exp $
* Principal Author: Brian Wellington
*/
#include <config.h>
#include <stdlib.h>
#include <string.h>
#include <isc/assertions.h>
#include <dns/keyvalues.h>
#include <dns/rdatalist.h>
#include <dns/rdataset.h>
#include <dns/rdatastruct.h>
#define dns_tsigerror_badalg 21
#define RETERR(x) do { \
result = (x); \
if (result != ISC_R_SUCCESS) \
goto failure; \
} while (0)
char *s;
int n;
isc_buffer_t b, *namebuf;
s = NULL;
if (result == ISC_R_NOTFOUND)
return ISC_R_SUCCESS;
mctx, &tkey_dhkey));
s = NULL;
if (tkey_domain == NULL)
return (ISC_R_NOMEMORY);
isc_buffer_add(&b, strlen(s));
namebuf));
return (ISC_R_SUCCESS);
if (tkey_dhkey != NULL) {
tkey_dhkey = NULL;
}
if (tkey_domain != NULL) {
tkey_domain = NULL;
}
return (result);
}
static isc_result_t
{
isc_region_t r, newr;
dns_rdata_toregion(rdata, &r);
dns_name_toregion(name, &r);
return (ISC_R_SUCCESS);
return (result);
}
static isc_result_t
{
isc_region_t r, ourkeyr;
unsigned char keydata[DST_KEY_MAXSIZE];
unsigned char namedata[1024];
unsigned int secretsize;
/* Look for a DH KEY record that will work with ours */
while (result == ISC_R_SUCCESS) {
&keyset);
if (result == ISC_R_SUCCESS) {
while (result == ISC_R_SUCCESS) {
&keyrdata,
&pubkey);
if (result != ISC_R_SUCCESS) {
continue;
}
{
goto got_key;
}
else
}
}
}
}
if (!found_key) {
if (found_incompatible) {
return ISC_R_SUCCESS;
}
return DNS_R_FORMERR;
}
namelist));
&ournameout));
ourttl = 0;
#if 0
/* Not sure how to do this without a view... */
if (result == ISC_R_SUCCESS) {
DNS_DBFIND_NOWILD, 0, NULL,
if (result == ISC_R_SUCCESS) {
}
}
#endif
namelist));
if (result != ISC_R_SUCCESS) {
goto failure;
}
isc_buffer_used(secret, &r);
if (result == ISC_R_NOTFOUND) {
return (ISC_R_SUCCESS);
}
if (result != ISC_R_SUCCESS) {
goto failure;
}
/* This key is good for a long time */
return (ISC_R_SUCCESS);
if (!ISC_LIST_EMPTY(*namelist)) {
}
}
return (result);
}
static isc_result_t
{
/* Unused variables */
if (result != ISC_R_SUCCESS)
/*
* Only allow a delete if the message is signed by the key to
* be deleted or a key with the same creator.
*/
return (DNS_R_REFUSED);
return (DNS_R_REFUSED);
}
/* If tsigkey->creator is NULL, log a warning here... */
/*
* Set the key to be deleted when no references are left. If the key
* was not generated with TKEY and is in the config file, it may be
* reloaded later.
*/
/* Release the reference */
return (result);
}
/* Need to do this to determine if this should be freed later */
/* Interpret the question section */
/* Look for a TKEY record that matches the question */
if (result != ISC_R_SUCCESS) {
goto failure;
}
if (result != ISC_R_SUCCESS) {
goto failure;
}
goto failure;
}
/*
* A delete operation must have a fully specified key name. If not,
* we do the following:
* if qname is a subdomain of defaultdomain
* keyname = qname.
* else if (qname != ".")
* keyname = qname + defaultdomain
* else
* keyname = <random hex> + defaultdomain
*/
unsigned char tdata[64];
unsigned int n = dns_name_countlabels(qname);
}
else {
unsigned char randomtext[32];
isc_buffer_t b, b2;
int i;
if (result != ISC_R_SUCCESS) {
goto failure;
}
}
isc_buffer_add(&b, sizeof(randomtext));
if (result != ISC_R_SUCCESS) {
goto failure;
}
}
if (result != ISC_R_SUCCESS)
goto failure;
if (result == ISC_R_SUCCESS) {
goto failure_with_tkey;
}
else if (result != ISC_R_NOTFOUND)
goto failure;
}
else
goto failure_with_tkey;
}
break;
case DNS_TKEYMODE_DELETE:
break;
case DNS_TKEYMODE_GSSAPI:
goto failure;
default:
}
if (result != ISC_R_SUCCESS)
goto failure;
}
return (ISC_R_SUCCESS);
return (result);
}
static isc_result_t
{
return (ISC_R_SUCCESS);
return (result);
}
{
isc_region_t r;
isc_buffer_used(dynbuf, &r);
dns_rdatatype_key, &r);
dynbuf));
return (ISC_R_SUCCESS);
return (result);
}
}
static isc_result_t
while (result == ISC_R_SUCCESS) {
&tkeyset);
if (result == ISC_R_SUCCESS) {
if (result != ISC_R_SUCCESS)
return (result);
return (ISC_R_SUCCESS);
}
}
if (result == ISC_R_NOMORE)
return (ISC_R_NOTFOUND);
return (result);
}
{
unsigned char keydata[1024];
unsigned int secretsize;
isc_region_t r;
{
goto failure;
}
ourkeyname = NULL;
dns_rdatatype_key, 0, &ourkeyname,
&ourkeyset));
while (result == ISC_R_SUCCESS) {
theirkeyname = NULL;
&theirkeyname);
goto next;
theirkeyset = NULL;
0, &theirkeyset);
if (result == ISC_R_SUCCESS) {
break;
}
next:
}
if (theirkeyset == NULL) {
goto failure;
}
if (result != ISC_R_SUCCESS)
goto failure;
isc_buffer_used(secret, &r);
return (result);
return (result);
}
{
goto failure;
}
/* Mark the key as deleted */
/* Release the reference */
return (result);
}