mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-29 05:28:00 +00:00
The additional processing method has been expanded to take the owner name of the record, as HTTPS and SVBC need it to process "." in service form. The additional section callback can now return the RRset that was added. We use this when adding CNAMEs. Previously, the recursion would stop if it detected that a record you added already exists. With CNAMEs this rule doesn't work, as you ultimately care about the RRset at the target of the CNAME and not the presence of the CNAME itself. Returning the record allows the caller to restart with the target name. As CNAMEs can form loops, loop protection was added. As HTTPS and SVBC can produce infinite chains, we prevent this by tracking recursion depth and stopping if we go too deep.
385 lines
8.2 KiB
C
385 lines
8.2 KiB
C
/*
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
|
*
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
* information regarding copyright ownership.
|
|
*/
|
|
|
|
/* RFC3658 */
|
|
|
|
#ifndef RDATA_GENERIC_DS_43_C
|
|
#define RDATA_GENERIC_DS_43_C
|
|
|
|
#define RRTYPE_DS_ATTRIBUTES \
|
|
(DNS_RDATATYPEATTR_DNSSEC | DNS_RDATATYPEATTR_ZONECUTAUTH | \
|
|
DNS_RDATATYPEATTR_ATPARENT)
|
|
|
|
#include <isc/md.h>
|
|
|
|
#include <dns/ds.h>
|
|
|
|
static inline isc_result_t
|
|
generic_fromtext_ds(ARGS_FROMTEXT) {
|
|
isc_token_t token;
|
|
unsigned char c;
|
|
int length;
|
|
|
|
UNUSED(type);
|
|
UNUSED(rdclass);
|
|
UNUSED(origin);
|
|
UNUSED(options);
|
|
UNUSED(callbacks);
|
|
|
|
/*
|
|
* Key tag.
|
|
*/
|
|
RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_number,
|
|
false));
|
|
if (token.value.as_ulong > 0xffffU) {
|
|
RETTOK(ISC_R_RANGE);
|
|
}
|
|
RETERR(uint16_tobuffer(token.value.as_ulong, target));
|
|
|
|
/*
|
|
* Algorithm.
|
|
*/
|
|
RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
|
|
false));
|
|
RETTOK(dns_secalg_fromtext(&c, &token.value.as_textregion));
|
|
RETERR(mem_tobuffer(target, &c, 1));
|
|
|
|
/*
|
|
* Digest type.
|
|
*/
|
|
RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
|
|
false));
|
|
RETTOK(dns_dsdigest_fromtext(&c, &token.value.as_textregion));
|
|
RETERR(mem_tobuffer(target, &c, 1));
|
|
|
|
/*
|
|
* Digest.
|
|
*/
|
|
switch (c) {
|
|
case DNS_DSDIGEST_SHA1:
|
|
length = ISC_SHA1_DIGESTLENGTH;
|
|
break;
|
|
case DNS_DSDIGEST_SHA256:
|
|
length = ISC_SHA256_DIGESTLENGTH;
|
|
break;
|
|
case DNS_DSDIGEST_SHA384:
|
|
length = ISC_SHA384_DIGESTLENGTH;
|
|
break;
|
|
default:
|
|
length = -2;
|
|
break;
|
|
}
|
|
return (isc_hex_tobuffer(lexer, target, length));
|
|
}
|
|
|
|
static inline isc_result_t
|
|
fromtext_ds(ARGS_FROMTEXT) {
|
|
REQUIRE(type == dns_rdatatype_ds);
|
|
|
|
return (generic_fromtext_ds(CALL_FROMTEXT));
|
|
}
|
|
|
|
static inline isc_result_t
|
|
generic_totext_ds(ARGS_TOTEXT) {
|
|
isc_region_t sr;
|
|
char buf[sizeof("64000 ")];
|
|
unsigned int n;
|
|
|
|
REQUIRE(rdata->length != 0);
|
|
|
|
UNUSED(tctx);
|
|
|
|
dns_rdata_toregion(rdata, &sr);
|
|
|
|
/*
|
|
* Key tag.
|
|
*/
|
|
n = uint16_fromregion(&sr);
|
|
isc_region_consume(&sr, 2);
|
|
snprintf(buf, sizeof(buf), "%u ", n);
|
|
RETERR(str_totext(buf, target));
|
|
|
|
/*
|
|
* Algorithm.
|
|
*/
|
|
n = uint8_fromregion(&sr);
|
|
isc_region_consume(&sr, 1);
|
|
snprintf(buf, sizeof(buf), "%u ", n);
|
|
RETERR(str_totext(buf, target));
|
|
|
|
/*
|
|
* Digest type.
|
|
*/
|
|
n = uint8_fromregion(&sr);
|
|
isc_region_consume(&sr, 1);
|
|
snprintf(buf, sizeof(buf), "%u", n);
|
|
RETERR(str_totext(buf, target));
|
|
|
|
/*
|
|
* Digest.
|
|
*/
|
|
if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0) {
|
|
RETERR(str_totext(" (", target));
|
|
}
|
|
RETERR(str_totext(tctx->linebreak, target));
|
|
if ((tctx->flags & DNS_STYLEFLAG_NOCRYPTO) == 0) {
|
|
if (tctx->width == 0) { /* No splitting */
|
|
RETERR(isc_hex_totext(&sr, 0, "", target));
|
|
} else {
|
|
RETERR(isc_hex_totext(&sr, tctx->width - 2,
|
|
tctx->linebreak, target));
|
|
}
|
|
} else {
|
|
RETERR(str_totext("[omitted]", target));
|
|
}
|
|
if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0) {
|
|
RETERR(str_totext(" )", target));
|
|
}
|
|
return (ISC_R_SUCCESS);
|
|
}
|
|
|
|
static inline isc_result_t
|
|
totext_ds(ARGS_TOTEXT) {
|
|
REQUIRE(rdata != NULL);
|
|
REQUIRE(rdata->type == dns_rdatatype_ds);
|
|
|
|
return (generic_totext_ds(CALL_TOTEXT));
|
|
}
|
|
|
|
static inline isc_result_t
|
|
generic_fromwire_ds(ARGS_FROMWIRE) {
|
|
isc_region_t sr;
|
|
|
|
UNUSED(type);
|
|
UNUSED(rdclass);
|
|
UNUSED(dctx);
|
|
UNUSED(options);
|
|
|
|
isc_buffer_activeregion(source, &sr);
|
|
|
|
/*
|
|
* Check digest lengths if we know them.
|
|
*/
|
|
if (sr.length < 5 ||
|
|
(sr.base[3] == DNS_DSDIGEST_SHA1 &&
|
|
sr.length < 4 + ISC_SHA1_DIGESTLENGTH) ||
|
|
(sr.base[3] == DNS_DSDIGEST_SHA256 &&
|
|
sr.length < 4 + ISC_SHA256_DIGESTLENGTH) ||
|
|
(sr.base[3] == DNS_DSDIGEST_SHA384 &&
|
|
sr.length < 4 + ISC_SHA384_DIGESTLENGTH))
|
|
{
|
|
return (ISC_R_UNEXPECTEDEND);
|
|
}
|
|
|
|
/*
|
|
* Only copy digest lengths if we know them.
|
|
* If there is extra data dns_rdata_fromwire() will
|
|
* detect that.
|
|
*/
|
|
if (sr.base[3] == DNS_DSDIGEST_SHA1) {
|
|
sr.length = 4 + ISC_SHA1_DIGESTLENGTH;
|
|
} else if (sr.base[3] == DNS_DSDIGEST_SHA256) {
|
|
sr.length = 4 + ISC_SHA256_DIGESTLENGTH;
|
|
} else if (sr.base[3] == DNS_DSDIGEST_SHA384) {
|
|
sr.length = 4 + ISC_SHA384_DIGESTLENGTH;
|
|
}
|
|
|
|
isc_buffer_forward(source, sr.length);
|
|
return (mem_tobuffer(target, sr.base, sr.length));
|
|
}
|
|
|
|
static inline isc_result_t
|
|
fromwire_ds(ARGS_FROMWIRE) {
|
|
REQUIRE(type == dns_rdatatype_ds);
|
|
|
|
return (generic_fromwire_ds(CALL_FROMWIRE));
|
|
}
|
|
|
|
static inline isc_result_t
|
|
towire_ds(ARGS_TOWIRE) {
|
|
isc_region_t sr;
|
|
|
|
REQUIRE(rdata->type == dns_rdatatype_ds);
|
|
REQUIRE(rdata->length != 0);
|
|
|
|
UNUSED(cctx);
|
|
|
|
dns_rdata_toregion(rdata, &sr);
|
|
return (mem_tobuffer(target, sr.base, sr.length));
|
|
}
|
|
|
|
static inline int
|
|
compare_ds(ARGS_COMPARE) {
|
|
isc_region_t r1;
|
|
isc_region_t r2;
|
|
|
|
REQUIRE(rdata1->type == rdata2->type);
|
|
REQUIRE(rdata1->rdclass == rdata2->rdclass);
|
|
REQUIRE(rdata1->type == dns_rdatatype_ds);
|
|
REQUIRE(rdata1->length != 0);
|
|
REQUIRE(rdata2->length != 0);
|
|
|
|
dns_rdata_toregion(rdata1, &r1);
|
|
dns_rdata_toregion(rdata2, &r2);
|
|
return (isc_region_compare(&r1, &r2));
|
|
}
|
|
|
|
static inline isc_result_t
|
|
generic_fromstruct_ds(ARGS_FROMSTRUCT) {
|
|
dns_rdata_ds_t *ds = source;
|
|
|
|
REQUIRE(ds != NULL);
|
|
REQUIRE(ds->common.rdtype == type);
|
|
REQUIRE(ds->common.rdclass == rdclass);
|
|
|
|
UNUSED(type);
|
|
UNUSED(rdclass);
|
|
|
|
switch (ds->digest_type) {
|
|
case DNS_DSDIGEST_SHA1:
|
|
REQUIRE(ds->length == ISC_SHA1_DIGESTLENGTH);
|
|
break;
|
|
case DNS_DSDIGEST_SHA256:
|
|
REQUIRE(ds->length == ISC_SHA256_DIGESTLENGTH);
|
|
break;
|
|
case DNS_DSDIGEST_SHA384:
|
|
REQUIRE(ds->length == ISC_SHA384_DIGESTLENGTH);
|
|
break;
|
|
}
|
|
|
|
RETERR(uint16_tobuffer(ds->key_tag, target));
|
|
RETERR(uint8_tobuffer(ds->algorithm, target));
|
|
RETERR(uint8_tobuffer(ds->digest_type, target));
|
|
|
|
return (mem_tobuffer(target, ds->digest, ds->length));
|
|
}
|
|
|
|
static inline isc_result_t
|
|
fromstruct_ds(ARGS_FROMSTRUCT) {
|
|
REQUIRE(type == dns_rdatatype_ds);
|
|
|
|
return (generic_fromstruct_ds(CALL_FROMSTRUCT));
|
|
}
|
|
|
|
static inline isc_result_t
|
|
generic_tostruct_ds(ARGS_TOSTRUCT) {
|
|
dns_rdata_ds_t *ds = target;
|
|
isc_region_t region;
|
|
|
|
REQUIRE(ds != NULL);
|
|
REQUIRE(rdata->length != 0);
|
|
REQUIRE(ds->common.rdtype == rdata->type);
|
|
REQUIRE(ds->common.rdclass == rdata->rdclass);
|
|
REQUIRE(!ISC_LINK_LINKED(&ds->common, link));
|
|
|
|
dns_rdata_toregion(rdata, ®ion);
|
|
|
|
ds->key_tag = uint16_fromregion(®ion);
|
|
isc_region_consume(®ion, 2);
|
|
ds->algorithm = uint8_fromregion(®ion);
|
|
isc_region_consume(®ion, 1);
|
|
ds->digest_type = uint8_fromregion(®ion);
|
|
isc_region_consume(®ion, 1);
|
|
ds->length = region.length;
|
|
|
|
ds->digest = mem_maybedup(mctx, region.base, region.length);
|
|
if (ds->digest == NULL) {
|
|
return (ISC_R_NOMEMORY);
|
|
}
|
|
|
|
ds->mctx = mctx;
|
|
return (ISC_R_SUCCESS);
|
|
}
|
|
|
|
static inline isc_result_t
|
|
tostruct_ds(ARGS_TOSTRUCT) {
|
|
dns_rdata_ds_t *ds = target;
|
|
|
|
REQUIRE(rdata->type == dns_rdatatype_ds);
|
|
REQUIRE(ds != NULL);
|
|
|
|
ds->common.rdclass = rdata->rdclass;
|
|
ds->common.rdtype = rdata->type;
|
|
ISC_LINK_INIT(&ds->common, link);
|
|
|
|
return (generic_tostruct_ds(CALL_TOSTRUCT));
|
|
}
|
|
|
|
static inline void
|
|
freestruct_ds(ARGS_FREESTRUCT) {
|
|
dns_rdata_ds_t *ds = source;
|
|
|
|
REQUIRE(ds != NULL);
|
|
REQUIRE(ds->common.rdtype == dns_rdatatype_ds);
|
|
|
|
if (ds->mctx == NULL) {
|
|
return;
|
|
}
|
|
|
|
if (ds->digest != NULL) {
|
|
isc_mem_free(ds->mctx, ds->digest);
|
|
}
|
|
ds->mctx = NULL;
|
|
}
|
|
|
|
static inline isc_result_t
|
|
additionaldata_ds(ARGS_ADDLDATA) {
|
|
REQUIRE(rdata->type == dns_rdatatype_ds);
|
|
|
|
UNUSED(rdata);
|
|
UNUSED(owner);
|
|
UNUSED(add);
|
|
UNUSED(arg);
|
|
|
|
return (ISC_R_SUCCESS);
|
|
}
|
|
|
|
static inline isc_result_t
|
|
digest_ds(ARGS_DIGEST) {
|
|
isc_region_t r;
|
|
|
|
REQUIRE(rdata->type == dns_rdatatype_ds);
|
|
|
|
dns_rdata_toregion(rdata, &r);
|
|
|
|
return ((digest)(arg, &r));
|
|
}
|
|
|
|
static inline bool
|
|
checkowner_ds(ARGS_CHECKOWNER) {
|
|
REQUIRE(type == dns_rdatatype_ds);
|
|
|
|
UNUSED(name);
|
|
UNUSED(type);
|
|
UNUSED(rdclass);
|
|
UNUSED(wildcard);
|
|
|
|
return (true);
|
|
}
|
|
|
|
static inline bool
|
|
checknames_ds(ARGS_CHECKNAMES) {
|
|
REQUIRE(rdata->type == dns_rdatatype_ds);
|
|
|
|
UNUSED(rdata);
|
|
UNUSED(owner);
|
|
UNUSED(bad);
|
|
|
|
return (true);
|
|
}
|
|
|
|
static inline int
|
|
casecompare_ds(ARGS_COMPARE) {
|
|
return (compare_ds(rdata1, rdata2));
|
|
}
|
|
|
|
#endif /* RDATA_GENERIC_DS_43_C */
|