mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-27 12:38:24 +00:00
It's wasteful to use 20 bytes and a pointer indirection to represent two bits of information, so turn the struct into an enum. And change the names of the enumeration constants to make the intent more clear. This change introduces some inline functions into another header, which confuses `gcovr` when it is trying to collect code coverage statistics. So, in the CI job, copy more header files into a directory where `gcovr` looks for them.
282 lines
6.3 KiB
C
282 lines
6.3 KiB
C
/*
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
*
|
|
* SPDX-License-Identifier: MPL-2.0
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
|
*
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
* information regarding copyright ownership.
|
|
*/
|
|
|
|
/* RFC 3845 */
|
|
|
|
#ifndef RDATA_GENERIC_NSEC_47_C
|
|
#define RDATA_GENERIC_NSEC_47_C
|
|
|
|
/*
|
|
* The attributes do not include DNS_RDATATYPEATTR_SINGLETON
|
|
* because we must be able to handle a parent/child NSEC pair.
|
|
*/
|
|
#define RRTYPE_NSEC_ATTRIBUTES \
|
|
(DNS_RDATATYPEATTR_DNSSEC | DNS_RDATATYPEATTR_ZONECUTAUTH | \
|
|
DNS_RDATATYPEATTR_ATCNAME)
|
|
|
|
static isc_result_t
|
|
fromtext_nsec(ARGS_FROMTEXT) {
|
|
isc_token_t token;
|
|
dns_name_t name;
|
|
isc_buffer_t buffer;
|
|
|
|
REQUIRE(type == dns_rdatatype_nsec);
|
|
|
|
UNUSED(type);
|
|
UNUSED(rdclass);
|
|
UNUSED(callbacks);
|
|
|
|
/*
|
|
* Next domain.
|
|
*/
|
|
RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
|
|
false));
|
|
dns_name_init(&name, NULL);
|
|
buffer_fromregion(&buffer, &token.value.as_region);
|
|
if (origin == NULL) {
|
|
origin = dns_rootname;
|
|
}
|
|
RETTOK(dns_name_fromtext(&name, &buffer, origin, options, target));
|
|
|
|
return (typemap_fromtext(lexer, target, false));
|
|
}
|
|
|
|
static isc_result_t
|
|
totext_nsec(ARGS_TOTEXT) {
|
|
isc_region_t sr;
|
|
dns_name_t name;
|
|
|
|
REQUIRE(rdata->type == dns_rdatatype_nsec);
|
|
REQUIRE(rdata->length != 0);
|
|
|
|
UNUSED(tctx);
|
|
|
|
dns_name_init(&name, NULL);
|
|
dns_rdata_toregion(rdata, &sr);
|
|
dns_name_fromregion(&name, &sr);
|
|
isc_region_consume(&sr, name_length(&name));
|
|
RETERR(dns_name_totext(&name, false, target));
|
|
/*
|
|
* Don't leave a trailing space when there's no typemap present.
|
|
*/
|
|
if (sr.length > 0) {
|
|
RETERR(str_totext(" ", target));
|
|
}
|
|
return (typemap_totext(&sr, NULL, target));
|
|
}
|
|
|
|
static isc_result_t
|
|
fromwire_nsec(ARGS_FROMWIRE) {
|
|
isc_region_t sr;
|
|
dns_name_t name;
|
|
|
|
REQUIRE(type == dns_rdatatype_nsec);
|
|
|
|
UNUSED(type);
|
|
UNUSED(rdclass);
|
|
|
|
dctx = dns_decompress_setpermitted(dctx, false);
|
|
|
|
dns_name_init(&name, NULL);
|
|
RETERR(dns_name_fromwire(&name, source, dctx, options, target));
|
|
|
|
isc_buffer_activeregion(source, &sr);
|
|
RETERR(typemap_test(&sr, false));
|
|
RETERR(mem_tobuffer(target, sr.base, sr.length));
|
|
isc_buffer_forward(source, sr.length);
|
|
return (ISC_R_SUCCESS);
|
|
}
|
|
|
|
static isc_result_t
|
|
towire_nsec(ARGS_TOWIRE) {
|
|
isc_region_t sr;
|
|
dns_name_t name;
|
|
dns_offsets_t offsets;
|
|
|
|
REQUIRE(rdata->type == dns_rdatatype_nsec);
|
|
REQUIRE(rdata->length != 0);
|
|
|
|
dns_compress_setpermitted(cctx, false);
|
|
dns_name_init(&name, offsets);
|
|
dns_rdata_toregion(rdata, &sr);
|
|
dns_name_fromregion(&name, &sr);
|
|
isc_region_consume(&sr, name_length(&name));
|
|
RETERR(dns_name_towire(&name, cctx, target));
|
|
|
|
return (mem_tobuffer(target, sr.base, sr.length));
|
|
}
|
|
|
|
static int
|
|
compare_nsec(ARGS_COMPARE) {
|
|
isc_region_t r1;
|
|
isc_region_t r2;
|
|
|
|
REQUIRE(rdata1->type == rdata2->type);
|
|
REQUIRE(rdata1->rdclass == rdata2->rdclass);
|
|
REQUIRE(rdata1->type == dns_rdatatype_nsec);
|
|
REQUIRE(rdata1->length != 0);
|
|
REQUIRE(rdata2->length != 0);
|
|
|
|
dns_rdata_toregion(rdata1, &r1);
|
|
dns_rdata_toregion(rdata2, &r2);
|
|
return (isc_region_compare(&r1, &r2));
|
|
}
|
|
|
|
static isc_result_t
|
|
fromstruct_nsec(ARGS_FROMSTRUCT) {
|
|
dns_rdata_nsec_t *nsec = source;
|
|
isc_region_t region;
|
|
|
|
REQUIRE(type == dns_rdatatype_nsec);
|
|
REQUIRE(nsec != NULL);
|
|
REQUIRE(nsec->common.rdtype == type);
|
|
REQUIRE(nsec->common.rdclass == rdclass);
|
|
REQUIRE(nsec->typebits != NULL || nsec->len == 0);
|
|
|
|
UNUSED(type);
|
|
UNUSED(rdclass);
|
|
|
|
dns_name_toregion(&nsec->next, ®ion);
|
|
RETERR(isc_buffer_copyregion(target, ®ion));
|
|
|
|
region.base = nsec->typebits;
|
|
region.length = nsec->len;
|
|
RETERR(typemap_test(®ion, false));
|
|
return (mem_tobuffer(target, nsec->typebits, nsec->len));
|
|
}
|
|
|
|
static isc_result_t
|
|
tostruct_nsec(ARGS_TOSTRUCT) {
|
|
isc_region_t region;
|
|
dns_rdata_nsec_t *nsec = target;
|
|
dns_name_t name;
|
|
|
|
REQUIRE(rdata->type == dns_rdatatype_nsec);
|
|
REQUIRE(nsec != NULL);
|
|
REQUIRE(rdata->length != 0);
|
|
|
|
nsec->common.rdclass = rdata->rdclass;
|
|
nsec->common.rdtype = rdata->type;
|
|
ISC_LINK_INIT(&nsec->common, link);
|
|
|
|
dns_name_init(&name, NULL);
|
|
dns_rdata_toregion(rdata, ®ion);
|
|
dns_name_fromregion(&name, ®ion);
|
|
isc_region_consume(®ion, name_length(&name));
|
|
dns_name_init(&nsec->next, NULL);
|
|
name_duporclone(&name, mctx, &nsec->next);
|
|
|
|
nsec->len = region.length;
|
|
nsec->typebits = mem_maybedup(mctx, region.base, region.length);
|
|
nsec->mctx = mctx;
|
|
return (ISC_R_SUCCESS);
|
|
}
|
|
|
|
static void
|
|
freestruct_nsec(ARGS_FREESTRUCT) {
|
|
dns_rdata_nsec_t *nsec = source;
|
|
|
|
REQUIRE(nsec != NULL);
|
|
REQUIRE(nsec->common.rdtype == dns_rdatatype_nsec);
|
|
|
|
if (nsec->mctx == NULL) {
|
|
return;
|
|
}
|
|
|
|
dns_name_free(&nsec->next, nsec->mctx);
|
|
if (nsec->typebits != NULL) {
|
|
isc_mem_free(nsec->mctx, nsec->typebits);
|
|
}
|
|
nsec->mctx = NULL;
|
|
}
|
|
|
|
static isc_result_t
|
|
additionaldata_nsec(ARGS_ADDLDATA) {
|
|
REQUIRE(rdata->type == dns_rdatatype_nsec);
|
|
|
|
UNUSED(rdata);
|
|
UNUSED(owner);
|
|
UNUSED(add);
|
|
UNUSED(arg);
|
|
|
|
return (ISC_R_SUCCESS);
|
|
}
|
|
|
|
static isc_result_t
|
|
digest_nsec(ARGS_DIGEST) {
|
|
isc_region_t r;
|
|
|
|
REQUIRE(rdata->type == dns_rdatatype_nsec);
|
|
|
|
dns_rdata_toregion(rdata, &r);
|
|
return ((digest)(arg, &r));
|
|
}
|
|
|
|
static bool
|
|
checkowner_nsec(ARGS_CHECKOWNER) {
|
|
REQUIRE(type == dns_rdatatype_nsec);
|
|
|
|
UNUSED(name);
|
|
UNUSED(type);
|
|
UNUSED(rdclass);
|
|
UNUSED(wildcard);
|
|
|
|
return (true);
|
|
}
|
|
|
|
static bool
|
|
checknames_nsec(ARGS_CHECKNAMES) {
|
|
REQUIRE(rdata->type == dns_rdatatype_nsec);
|
|
|
|
UNUSED(rdata);
|
|
UNUSED(owner);
|
|
UNUSED(bad);
|
|
|
|
return (true);
|
|
}
|
|
|
|
static int
|
|
casecompare_nsec(ARGS_COMPARE) {
|
|
isc_region_t region1;
|
|
isc_region_t region2;
|
|
dns_name_t name1;
|
|
dns_name_t name2;
|
|
int order;
|
|
|
|
REQUIRE(rdata1->type == rdata2->type);
|
|
REQUIRE(rdata1->rdclass == rdata2->rdclass);
|
|
REQUIRE(rdata1->type == dns_rdatatype_nsec);
|
|
REQUIRE(rdata1->length != 0);
|
|
REQUIRE(rdata2->length != 0);
|
|
|
|
dns_name_init(&name1, NULL);
|
|
dns_name_init(&name2, NULL);
|
|
|
|
dns_rdata_toregion(rdata1, ®ion1);
|
|
dns_rdata_toregion(rdata2, ®ion2);
|
|
|
|
dns_name_fromregion(&name1, ®ion1);
|
|
dns_name_fromregion(&name2, ®ion2);
|
|
|
|
order = dns_name_rdatacompare(&name1, &name2);
|
|
if (order != 0) {
|
|
return (order);
|
|
}
|
|
|
|
isc_region_consume(®ion1, name_length(&name1));
|
|
isc_region_consume(®ion2, name_length(&name2));
|
|
|
|
return (isc_region_compare(®ion1, ®ion2));
|
|
}
|
|
#endif /* RDATA_GENERIC_NSEC_47_C */
|