dns-type.c revision d07b43a18e2234e8abebc1cd4d93bfd78ab62001
/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
/***
This file is part of systemd.
Copyright 2014 Zbigniew Jędrzejewski-Szmek
under the terms of the GNU Lesser General Public License as published by
the Free Software Foundation; either version 2.1 of the License, or
(at your option) any later version.
systemd is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public License
along with systemd; If not, see <http://www.gnu.org/licenses/>.
***/
#include "dns-type.h"
#include "string-util.h"
typedef const struct {
const char *name;
} dns_type;
static const struct dns_type_name *
#include "dns_type-from-name.h"
#include "dns_type-to-name.h"
int dns_type_from_string(const char *s) {
const struct dns_type_name *sc;
assert(s);
if (!sc)
return _DNS_TYPE_INVALID;
}
/* Checks whether the specified type is a "pseudo-type". What
* a "pseudo-type" precisely is, is defined only very weakly,
* but apparently entails all RR types that are not actually
* stored as RRs on the server and should hence also not be
* cached. We use this list primarily to validate NSEC type
* bitfields, and to verify what to cache. */
0, /* A Pseudo RR type, according to RFC 2931 */
);
}
return class == DNS_TYPE_ANY;
}
/* The types valid as questions in packets */
0,
/* RRSIG are technically valid as questions, but we refuse doing explicit queries for them, as
* they aren't really payload, but signatures for payload, and cannot be validated on their
* own. After all they are the signatures, and have no signatures of their own validating
* them. */
}
/* The types valid as RR in packets (but not necessarily
* stored on servers). */
}
return class != DNS_CLASS_ANY;
}
/* The following record types should never be redirected using
* <https://tools.ietf.org/html/rfc4035#section-2.5>. */
if (dns_type_is_pseudo(type))
return false;
}
/* The following records may not be expanded from wildcard RRsets */
if (dns_type_is_pseudo(type))
return false;
/* Prohibited by https://tools.ietf.org/html/rfc4592#section-4.4 */
}
/* Returns true for all RR types that may only appear signed in a zone apex */
DNS_TYPE_NS, /* this one can appear elsewhere, too, but not signed */
}
}
/* Obsoleted by RFC 973 */
/* Kinda obsoleted by RFC 2505 */
/* RFC1127 kinda obsoleted this by recommending against its use */
/* Declared historical by RFC 6563 */
/* Obsoleted by DNSSEC-bis */
/* RFC 1035 removed support for concepts that needed this from RFC 883 */
}
int dns_type_to_af(uint16_t t) {
switch (t) {
case DNS_TYPE_A:
return AF_INET;
case DNS_TYPE_AAAA:
return AF_INET6;
case DNS_TYPE_ANY:
return AF_UNSPEC;
default:
return -EINVAL;
}
}
switch (class) {
case DNS_CLASS_IN:
return "IN";
case DNS_CLASS_ANY:
return "ANY";
}
return NULL;
}
int dns_class_from_string(const char *s) {
if (!s)
return _DNS_CLASS_INVALID;
if (strcaseeq(s, "IN"))
return DNS_CLASS_IN;
else if (strcaseeq(s, "ANY"))
return DNS_CLASS_ANY;
return _DNS_CLASS_INVALID;
}