mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-23 02:28:55 +00:00
Replace dns_fixedname_init() calls followed by dns_fixedname_name() calls with calls to dns_fixedname_initname() where it is possible without affecting current behavior and/or performance. This patch was mostly prepared using Coccinelle and the following semantic patch: @@ expression fixedname, name; @@ - dns_fixedname_init(&fixedname); ... - name = dns_fixedname_name(&fixedname); + name = dns_fixedname_initname(&fixedname); The resulting set of changes was then manually reviewed to exclude false positives and apply minor tweaks. It is likely that more occurrences of this pattern can be refactored in an identical way. This commit only takes care of the low-hanging fruit.
153 lines
3.7 KiB
C
153 lines
3.7 KiB
C
/*
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
*
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
* information regarding copyright ownership.
|
|
*/
|
|
|
|
/* $Id: ds.c,v 1.13 2010/12/23 23:47:08 tbox Exp $ */
|
|
|
|
/*! \file */
|
|
|
|
#include <config.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <isc/buffer.h>
|
|
#include <isc/region.h>
|
|
#include <isc/sha1.h>
|
|
#include <isc/sha2.h>
|
|
#include <isc/util.h>
|
|
|
|
#include <dns/ds.h>
|
|
#include <dns/fixedname.h>
|
|
#include <dns/name.h>
|
|
#include <dns/rdata.h>
|
|
#include <dns/rdatastruct.h>
|
|
#include <dns/result.h>
|
|
|
|
#include <dst/dst.h>
|
|
|
|
#if defined(HAVE_OPENSSL_GOST) || defined(HAVE_PKCS11_GOST)
|
|
#include "dst_gost.h"
|
|
#endif
|
|
|
|
isc_result_t
|
|
dns_ds_buildrdata(dns_name_t *owner, dns_rdata_t *key,
|
|
unsigned int digest_type, unsigned char *buffer,
|
|
dns_rdata_t *rdata)
|
|
{
|
|
dns_fixedname_t fname;
|
|
dns_name_t *name;
|
|
unsigned char digest[ISC_SHA384_DIGESTLENGTH];
|
|
isc_region_t r;
|
|
isc_buffer_t b;
|
|
dns_rdata_ds_t ds;
|
|
isc_sha1_t sha1;
|
|
isc_sha256_t sha256;
|
|
isc_sha384_t sha384;
|
|
#if defined(HAVE_OPENSSL_GOST) || defined(HAVE_PKCS11_GOST)
|
|
isc_gost_t gost;
|
|
#endif
|
|
|
|
REQUIRE(key != NULL);
|
|
REQUIRE(key->type == dns_rdatatype_dnskey);
|
|
|
|
if (!dst_ds_digest_supported(digest_type))
|
|
return (ISC_R_NOTIMPLEMENTED);
|
|
|
|
name = dns_fixedname_initname(&fname);
|
|
(void)dns_name_downcase(owner, name, NULL);
|
|
|
|
memset(buffer, 0, DNS_DS_BUFFERSIZE);
|
|
isc_buffer_init(&b, buffer, DNS_DS_BUFFERSIZE);
|
|
|
|
switch (digest_type) {
|
|
case DNS_DSDIGEST_SHA1:
|
|
isc_sha1_init(&sha1);
|
|
dns_name_toregion(name, &r);
|
|
isc_sha1_update(&sha1, r.base, r.length);
|
|
dns_rdata_toregion(key, &r);
|
|
INSIST(r.length >= 4);
|
|
isc_sha1_update(&sha1, r.base, r.length);
|
|
isc_sha1_final(&sha1, digest);
|
|
break;
|
|
|
|
#if defined(HAVE_OPENSSL_GOST) || defined(HAVE_PKCS11_GOST)
|
|
#define RETERR(x) do { \
|
|
isc_result_t ret = (x); \
|
|
if (ret != ISC_R_SUCCESS) { \
|
|
isc_gost_invalidate(&gost); \
|
|
return (ret); \
|
|
} \
|
|
} while (0)
|
|
|
|
case DNS_DSDIGEST_GOST:
|
|
RETERR(isc_gost_init(&gost));
|
|
dns_name_toregion(name, &r);
|
|
RETERR(isc_gost_update(&gost, r.base, r.length));
|
|
dns_rdata_toregion(key, &r);
|
|
INSIST(r.length >= 4);
|
|
RETERR(isc_gost_update(&gost, r.base, r.length));
|
|
RETERR(isc_gost_final(&gost, digest));
|
|
break;
|
|
#endif
|
|
|
|
case DNS_DSDIGEST_SHA384:
|
|
isc_sha384_init(&sha384);
|
|
dns_name_toregion(name, &r);
|
|
isc_sha384_update(&sha384, r.base, r.length);
|
|
dns_rdata_toregion(key, &r);
|
|
INSIST(r.length >= 4);
|
|
isc_sha384_update(&sha384, r.base, r.length);
|
|
isc_sha384_final(digest, &sha384);
|
|
break;
|
|
|
|
case DNS_DSDIGEST_SHA256:
|
|
default:
|
|
isc_sha256_init(&sha256);
|
|
dns_name_toregion(name, &r);
|
|
isc_sha256_update(&sha256, r.base, r.length);
|
|
dns_rdata_toregion(key, &r);
|
|
INSIST(r.length >= 4);
|
|
isc_sha256_update(&sha256, r.base, r.length);
|
|
isc_sha256_final(digest, &sha256);
|
|
break;
|
|
}
|
|
|
|
ds.mctx = NULL;
|
|
ds.common.rdclass = key->rdclass;
|
|
ds.common.rdtype = dns_rdatatype_ds;
|
|
ds.algorithm = r.base[3];
|
|
ds.key_tag = dst_region_computeid(&r, ds.algorithm);
|
|
ds.digest_type = digest_type;
|
|
switch (digest_type) {
|
|
case DNS_DSDIGEST_SHA1:
|
|
ds.length = ISC_SHA1_DIGESTLENGTH;
|
|
break;
|
|
|
|
#if defined(HAVE_OPENSSL_GOST) || defined(HAVE_PKCS11_GOST)
|
|
case DNS_DSDIGEST_GOST:
|
|
ds.length = ISC_GOST_DIGESTLENGTH;
|
|
break;
|
|
#endif
|
|
|
|
case DNS_DSDIGEST_SHA384:
|
|
ds.length = ISC_SHA384_DIGESTLENGTH;
|
|
break;
|
|
|
|
case DNS_DSDIGEST_SHA256:
|
|
default:
|
|
ds.length = ISC_SHA256_DIGESTLENGTH;
|
|
break;
|
|
}
|
|
ds.digest = digest;
|
|
|
|
return (dns_rdata_fromstruct(rdata, key->rdclass, dns_rdatatype_ds,
|
|
&ds, &b));
|
|
}
|