/* $NetBSD: ds_43.c,v 1.12 2025/01/26 16:25:31 christos Exp $ */ /* * Copyright (C) Internet Systems Consortium, Inc. ("ISC") * * SPDX-License-Identifier: MPL-2.0 * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, you can obtain one at https://mozilla.org/MPL/2.0/. * * See the COPYRIGHT file distributed with this work for additional * information regarding copyright ownership. */ /* RFC3658 */ #ifndef RDATA_GENERIC_DS_43_C #define RDATA_GENERIC_DS_43_C #define RRTYPE_DS_ATTRIBUTES \ (DNS_RDATATYPEATTR_DNSSEC | DNS_RDATATYPEATTR_ZONECUTAUTH | \ DNS_RDATATYPEATTR_ATPARENT) #include #include static isc_result_t generic_fromtext_ds(ARGS_FROMTEXT) { isc_token_t token; unsigned char c; int length; UNUSED(type); UNUSED(rdclass); UNUSED(origin); UNUSED(options); UNUSED(callbacks); /* * Key tag. */ RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_number, false)); if (token.value.as_ulong > 0xffffU) { RETTOK(ISC_R_RANGE); } RETERR(uint16_tobuffer(token.value.as_ulong, target)); /* * Algorithm. */ RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string, false)); RETTOK(dns_secalg_fromtext(&c, &token.value.as_textregion)); RETERR(mem_tobuffer(target, &c, 1)); /* * Digest type. */ RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string, false)); RETTOK(dns_dsdigest_fromtext(&c, &token.value.as_textregion)); RETERR(mem_tobuffer(target, &c, 1)); /* * Digest. */ switch (c) { case DNS_DSDIGEST_SHA1: length = ISC_SHA1_DIGESTLENGTH; break; case DNS_DSDIGEST_SHA256: length = ISC_SHA256_DIGESTLENGTH; break; case DNS_DSDIGEST_SHA384: length = ISC_SHA384_DIGESTLENGTH; break; default: length = -2; break; } return isc_hex_tobuffer(lexer, target, length); } static isc_result_t fromtext_ds(ARGS_FROMTEXT) { REQUIRE(type == dns_rdatatype_ds); return generic_fromtext_ds(CALL_FROMTEXT); } static isc_result_t generic_totext_ds(ARGS_TOTEXT) { isc_region_t sr; char buf[sizeof("64000 ")]; unsigned int n; REQUIRE(rdata->length != 0); UNUSED(tctx); dns_rdata_toregion(rdata, &sr); /* * Key tag. */ n = uint16_fromregion(&sr); isc_region_consume(&sr, 2); snprintf(buf, sizeof(buf), "%u ", n); RETERR(str_totext(buf, target)); /* * Algorithm. */ n = uint8_fromregion(&sr); isc_region_consume(&sr, 1); snprintf(buf, sizeof(buf), "%u ", n); RETERR(str_totext(buf, target)); /* * Digest type. */ n = uint8_fromregion(&sr); isc_region_consume(&sr, 1); snprintf(buf, sizeof(buf), "%u", n); RETERR(str_totext(buf, target)); /* * Digest. */ if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0) { RETERR(str_totext(" (", target)); } RETERR(str_totext(tctx->linebreak, target)); if ((tctx->flags & DNS_STYLEFLAG_NOCRYPTO) == 0) { if (tctx->width == 0) { /* No splitting */ RETERR(isc_hex_totext(&sr, 0, "", target)); } else { RETERR(isc_hex_totext(&sr, tctx->width - 2, tctx->linebreak, target)); } } else { RETERR(str_totext("[omitted]", target)); } if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0) { RETERR(str_totext(" )", target)); } return ISC_R_SUCCESS; } static isc_result_t totext_ds(ARGS_TOTEXT) { REQUIRE(rdata != NULL); REQUIRE(rdata->type == dns_rdatatype_ds); return generic_totext_ds(CALL_TOTEXT); } static isc_result_t generic_fromwire_ds(ARGS_FROMWIRE) { isc_region_t sr; UNUSED(type); UNUSED(rdclass); UNUSED(dctx); isc_buffer_activeregion(source, &sr); /* * Check digest lengths if we know them. */ if (sr.length < 5 || (sr.base[3] == DNS_DSDIGEST_SHA1 && sr.length < 4 + ISC_SHA1_DIGESTLENGTH) || (sr.base[3] == DNS_DSDIGEST_SHA256 && sr.length < 4 + ISC_SHA256_DIGESTLENGTH) || (sr.base[3] == DNS_DSDIGEST_SHA384 && sr.length < 4 + ISC_SHA384_DIGESTLENGTH)) { return ISC_R_UNEXPECTEDEND; } /* * Only copy digest lengths if we know them. * If there is extra data dns_rdata_fromwire() will * detect that. */ if (sr.base[3] == DNS_DSDIGEST_SHA1) { sr.length = 4 + ISC_SHA1_DIGESTLENGTH; } else if (sr.base[3] == DNS_DSDIGEST_SHA256) { sr.length = 4 + ISC_SHA256_DIGESTLENGTH; } else if (sr.base[3] == DNS_DSDIGEST_SHA384) { sr.length = 4 + ISC_SHA384_DIGESTLENGTH; } isc_buffer_forward(source, sr.length); return mem_tobuffer(target, sr.base, sr.length); } static isc_result_t fromwire_ds(ARGS_FROMWIRE) { REQUIRE(type == dns_rdatatype_ds); return generic_fromwire_ds(CALL_FROMWIRE); } static isc_result_t towire_ds(ARGS_TOWIRE) { isc_region_t sr; REQUIRE(rdata->type == dns_rdatatype_ds); REQUIRE(rdata->length != 0); UNUSED(cctx); dns_rdata_toregion(rdata, &sr); return mem_tobuffer(target, sr.base, sr.length); } static int compare_ds(ARGS_COMPARE) { isc_region_t r1; isc_region_t r2; REQUIRE(rdata1->type == rdata2->type); REQUIRE(rdata1->rdclass == rdata2->rdclass); REQUIRE(rdata1->type == dns_rdatatype_ds); REQUIRE(rdata1->length != 0); REQUIRE(rdata2->length != 0); dns_rdata_toregion(rdata1, &r1); dns_rdata_toregion(rdata2, &r2); return isc_region_compare(&r1, &r2); } static isc_result_t generic_fromstruct_ds(ARGS_FROMSTRUCT) { dns_rdata_ds_t *ds = source; REQUIRE(ds != NULL); REQUIRE(ds->common.rdtype == type); REQUIRE(ds->common.rdclass == rdclass); UNUSED(type); UNUSED(rdclass); switch (ds->digest_type) { case DNS_DSDIGEST_SHA1: REQUIRE(ds->length == ISC_SHA1_DIGESTLENGTH); break; case DNS_DSDIGEST_SHA256: REQUIRE(ds->length == ISC_SHA256_DIGESTLENGTH); break; case DNS_DSDIGEST_SHA384: REQUIRE(ds->length == ISC_SHA384_DIGESTLENGTH); break; } RETERR(uint16_tobuffer(ds->key_tag, target)); RETERR(uint8_tobuffer(ds->algorithm, target)); RETERR(uint8_tobuffer(ds->digest_type, target)); return mem_tobuffer(target, ds->digest, ds->length); } static isc_result_t fromstruct_ds(ARGS_FROMSTRUCT) { REQUIRE(type == dns_rdatatype_ds); return generic_fromstruct_ds(CALL_FROMSTRUCT); } static isc_result_t generic_tostruct_ds(ARGS_TOSTRUCT) { dns_rdata_ds_t *ds = target; isc_region_t region; REQUIRE(ds != NULL); REQUIRE(rdata->length != 0); REQUIRE(ds->common.rdtype == rdata->type); REQUIRE(ds->common.rdclass == rdata->rdclass); REQUIRE(!ISC_LINK_LINKED(&ds->common, link)); dns_rdata_toregion(rdata, ®ion); ds->key_tag = uint16_fromregion(®ion); isc_region_consume(®ion, 2); ds->algorithm = uint8_fromregion(®ion); isc_region_consume(®ion, 1); ds->digest_type = uint8_fromregion(®ion); isc_region_consume(®ion, 1); ds->length = region.length; ds->digest = mem_maybedup(mctx, region.base, region.length); ds->mctx = mctx; return ISC_R_SUCCESS; } static isc_result_t tostruct_ds(ARGS_TOSTRUCT) { dns_rdata_ds_t *ds = target; REQUIRE(rdata->type == dns_rdatatype_ds); REQUIRE(ds != NULL); ds->common.rdclass = rdata->rdclass; ds->common.rdtype = rdata->type; ISC_LINK_INIT(&ds->common, link); return generic_tostruct_ds(CALL_TOSTRUCT); } static void freestruct_ds(ARGS_FREESTRUCT) { dns_rdata_ds_t *ds = source; REQUIRE(ds != NULL); REQUIRE(ds->common.rdtype == dns_rdatatype_ds); if (ds->mctx == NULL) { return; } if (ds->digest != NULL) { isc_mem_free(ds->mctx, ds->digest); } ds->mctx = NULL; } static isc_result_t additionaldata_ds(ARGS_ADDLDATA) { REQUIRE(rdata->type == dns_rdatatype_ds); UNUSED(rdata); UNUSED(owner); UNUSED(add); UNUSED(arg); return ISC_R_SUCCESS; } static isc_result_t digest_ds(ARGS_DIGEST) { isc_region_t r; REQUIRE(rdata->type == dns_rdatatype_ds); dns_rdata_toregion(rdata, &r); return (digest)(arg, &r); } static bool checkowner_ds(ARGS_CHECKOWNER) { REQUIRE(type == dns_rdatatype_ds); UNUSED(name); UNUSED(type); UNUSED(rdclass); UNUSED(wildcard); return true; } static bool checknames_ds(ARGS_CHECKNAMES) { REQUIRE(rdata->type == dns_rdatatype_ds); UNUSED(rdata); UNUSED(owner); UNUSED(bad); return true; } static int casecompare_ds(ARGS_COMPARE) { return compare_ds(rdata1, rdata2); } #endif /* RDATA_GENERIC_DS_43_C */