1
0
Fork 0
bind9/lib/dns/rdata/in_1/apl_42.c
Daniel Baumann f66ff7eae6
Adding upstream version 1:9.20.9.
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
2025-06-21 13:32:37 +02:00

479 lines
10 KiB
C

/*
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
*
* SPDX-License-Identifier: MPL-2.0
*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
*
* See the COPYRIGHT file distributed with this work for additional
* information regarding copyright ownership.
*/
/* RFC3123 */
#ifndef RDATA_IN_1_APL_42_C
#define RDATA_IN_1_APL_42_C
#define RRTYPE_APL_ATTRIBUTES (0)
static isc_result_t
fromtext_in_apl(ARGS_FROMTEXT) {
isc_token_t token;
unsigned char addr[16];
unsigned long afi;
uint8_t prefix;
uint8_t len;
bool neg;
char *cp, *ap, *slash;
int n;
REQUIRE(type == dns_rdatatype_apl);
REQUIRE(rdclass == dns_rdataclass_in);
UNUSED(type);
UNUSED(rdclass);
UNUSED(origin);
UNUSED(options);
UNUSED(callbacks);
do {
RETERR(isc_lex_getmastertoken(lexer, &token,
isc_tokentype_string, true));
if (token.type != isc_tokentype_string) {
break;
}
cp = DNS_AS_STR(token);
neg = (*cp == '!');
if (neg) {
cp++;
}
afi = strtoul(cp, &ap, 10);
if (*ap++ != ':' || cp == ap) {
RETTOK(DNS_R_SYNTAX);
}
if (afi > 0xffffU) {
RETTOK(ISC_R_RANGE);
}
slash = strchr(ap, '/');
if (slash == NULL || slash == ap) {
RETTOK(DNS_R_SYNTAX);
}
RETTOK(isc_parse_uint8(&prefix, slash + 1, 10));
switch (afi) {
case 1:
*slash = '\0';
n = inet_pton(AF_INET, ap, addr);
*slash = '/';
if (n != 1) {
RETTOK(DNS_R_BADDOTTEDQUAD);
}
if (prefix > 32) {
RETTOK(ISC_R_RANGE);
}
for (len = 4; len > 0; len--) {
if (addr[len - 1] != 0) {
break;
}
}
break;
case 2:
*slash = '\0';
n = inet_pton(AF_INET6, ap, addr);
*slash = '/';
if (n != 1) {
RETTOK(DNS_R_BADAAAA);
}
if (prefix > 128) {
RETTOK(ISC_R_RANGE);
}
for (len = 16; len > 0; len--) {
if (addr[len - 1] != 0) {
break;
}
}
break;
default:
RETTOK(ISC_R_NOTIMPLEMENTED);
}
RETERR(uint16_tobuffer(afi, target));
RETERR(uint8_tobuffer(prefix, target));
RETERR(uint8_tobuffer(len | ((neg) ? 0x80 : 0), target));
RETERR(mem_tobuffer(target, addr, len));
} while (1);
/*
* Let upper layer handle eol/eof.
*/
isc_lex_ungettoken(lexer, &token);
return ISC_R_SUCCESS;
}
static isc_result_t
totext_in_apl(ARGS_TOTEXT) {
isc_region_t sr;
isc_region_t ir;
uint16_t afi;
uint8_t prefix;
uint8_t len;
bool neg;
unsigned char buf[16];
char txt[sizeof(" !64000:")];
const char *sep = "";
int n;
REQUIRE(rdata->type == dns_rdatatype_apl);
REQUIRE(rdata->rdclass == dns_rdataclass_in);
UNUSED(tctx);
dns_rdata_toregion(rdata, &sr);
ir.base = buf;
ir.length = sizeof(buf);
while (sr.length > 0) {
INSIST(sr.length >= 4);
afi = uint16_fromregion(&sr);
isc_region_consume(&sr, 2);
prefix = *sr.base;
isc_region_consume(&sr, 1);
len = (*sr.base & 0x7f);
neg = (*sr.base & 0x80);
isc_region_consume(&sr, 1);
INSIST(len <= sr.length);
n = snprintf(txt, sizeof(txt), "%s%s%u:", sep, neg ? "!" : "",
afi);
INSIST(n < (int)sizeof(txt));
RETERR(str_totext(txt, target));
switch (afi) {
case 1:
INSIST(len <= 4);
INSIST(prefix <= 32);
memset(buf, 0, sizeof(buf));
memmove(buf, sr.base, len);
RETERR(inet_totext(AF_INET, tctx->flags, &ir, target));
break;
case 2:
INSIST(len <= 16);
INSIST(prefix <= 128);
memset(buf, 0, sizeof(buf));
memmove(buf, sr.base, len);
RETERR(inet_totext(AF_INET6, tctx->flags, &ir, target));
break;
default:
return ISC_R_NOTIMPLEMENTED;
}
n = snprintf(txt, sizeof(txt), "/%u", prefix);
INSIST(n < (int)sizeof(txt));
RETERR(str_totext(txt, target));
isc_region_consume(&sr, len);
sep = " ";
}
return ISC_R_SUCCESS;
}
static isc_result_t
fromwire_in_apl(ARGS_FROMWIRE) {
isc_region_t sr, sr2;
isc_region_t tr;
uint16_t afi;
uint8_t prefix;
uint8_t len;
REQUIRE(type == dns_rdatatype_apl);
REQUIRE(rdclass == dns_rdataclass_in);
UNUSED(type);
UNUSED(dctx);
UNUSED(rdclass);
isc_buffer_activeregion(source, &sr);
isc_buffer_availableregion(target, &tr);
if (sr.length > tr.length) {
return ISC_R_NOSPACE;
}
sr2 = sr;
/* Zero or more items */
while (sr.length > 0) {
if (sr.length < 4) {
return ISC_R_UNEXPECTEDEND;
}
afi = uint16_fromregion(&sr);
isc_region_consume(&sr, 2);
prefix = *sr.base;
isc_region_consume(&sr, 1);
len = (*sr.base & 0x7f);
isc_region_consume(&sr, 1);
if (len > sr.length) {
return ISC_R_UNEXPECTEDEND;
}
switch (afi) {
case 1:
if (prefix > 32 || len > 4) {
return ISC_R_RANGE;
}
break;
case 2:
if (prefix > 128 || len > 16) {
return ISC_R_RANGE;
}
}
if (len > 0 && sr.base[len - 1] == 0) {
return DNS_R_FORMERR;
}
isc_region_consume(&sr, len);
}
isc_buffer_forward(source, sr2.length);
return mem_tobuffer(target, sr2.base, sr2.length);
}
static isc_result_t
towire_in_apl(ARGS_TOWIRE) {
UNUSED(cctx);
REQUIRE(rdata->type == dns_rdatatype_apl);
REQUIRE(rdata->rdclass == dns_rdataclass_in);
return mem_tobuffer(target, rdata->data, rdata->length);
}
static int
compare_in_apl(ARGS_COMPARE) {
isc_region_t r1;
isc_region_t r2;
REQUIRE(rdata1->type == rdata2->type);
REQUIRE(rdata1->rdclass == rdata2->rdclass);
REQUIRE(rdata1->type == dns_rdatatype_apl);
REQUIRE(rdata1->rdclass == dns_rdataclass_in);
dns_rdata_toregion(rdata1, &r1);
dns_rdata_toregion(rdata2, &r2);
return isc_region_compare(&r1, &r2);
}
static isc_result_t
fromstruct_in_apl(ARGS_FROMSTRUCT) {
dns_rdata_in_apl_t *apl = source;
isc_buffer_t b;
REQUIRE(type == dns_rdatatype_apl);
REQUIRE(rdclass == dns_rdataclass_in);
REQUIRE(apl != NULL);
REQUIRE(apl->common.rdtype == type);
REQUIRE(apl->common.rdclass == rdclass);
REQUIRE(apl->apl != NULL || apl->apl_len == 0);
isc_buffer_init(&b, apl->apl, apl->apl_len);
isc_buffer_add(&b, apl->apl_len);
isc_buffer_setactive(&b, apl->apl_len);
return fromwire_in_apl(rdclass, type, &b, DNS_DECOMPRESS_DEFAULT,
target);
}
static isc_result_t
tostruct_in_apl(ARGS_TOSTRUCT) {
dns_rdata_in_apl_t *apl = target;
isc_region_t r;
REQUIRE(apl != NULL);
REQUIRE(rdata->type == dns_rdatatype_apl);
REQUIRE(rdata->rdclass == dns_rdataclass_in);
apl->common.rdclass = rdata->rdclass;
apl->common.rdtype = rdata->type;
ISC_LINK_INIT(&apl->common, link);
dns_rdata_toregion(rdata, &r);
apl->apl_len = r.length;
apl->apl = mem_maybedup(mctx, r.base, r.length);
apl->offset = 0;
apl->mctx = mctx;
return ISC_R_SUCCESS;
}
static void
freestruct_in_apl(ARGS_FREESTRUCT) {
dns_rdata_in_apl_t *apl = source;
REQUIRE(apl != NULL);
REQUIRE(apl->common.rdtype == dns_rdatatype_apl);
REQUIRE(apl->common.rdclass == dns_rdataclass_in);
if (apl->mctx == NULL) {
return;
}
if (apl->apl != NULL) {
isc_mem_free(apl->mctx, apl->apl);
}
apl->mctx = NULL;
}
isc_result_t
dns_rdata_apl_first(dns_rdata_in_apl_t *apl) {
uint32_t length;
REQUIRE(apl != NULL);
REQUIRE(apl->common.rdtype == dns_rdatatype_apl);
REQUIRE(apl->common.rdclass == dns_rdataclass_in);
REQUIRE(apl->apl != NULL || apl->apl_len == 0);
/*
* If no APL return ISC_R_NOMORE.
*/
if (apl->apl == NULL) {
return ISC_R_NOMORE;
}
/*
* Sanity check data.
*/
INSIST(apl->apl_len > 3U);
length = apl->apl[apl->offset + 3] & 0x7f;
INSIST(4 + length <= apl->apl_len);
apl->offset = 0;
return ISC_R_SUCCESS;
}
isc_result_t
dns_rdata_apl_next(dns_rdata_in_apl_t *apl) {
uint32_t length;
REQUIRE(apl != NULL);
REQUIRE(apl->common.rdtype == dns_rdatatype_apl);
REQUIRE(apl->common.rdclass == dns_rdataclass_in);
REQUIRE(apl->apl != NULL || apl->apl_len == 0);
/*
* No APL or have already reached the end return ISC_R_NOMORE.
*/
if (apl->apl == NULL || apl->offset == apl->apl_len) {
return ISC_R_NOMORE;
}
/*
* Sanity check data.
*/
INSIST(apl->offset < apl->apl_len);
INSIST(apl->apl_len > 3U);
INSIST(apl->offset <= apl->apl_len - 4U);
length = apl->apl[apl->offset + 3] & 0x7f;
/*
* 16 to 32 bits promotion as 'length' is 32 bits so there is
* no overflow problems.
*/
INSIST(4 + length + apl->offset <= apl->apl_len);
apl->offset += 4 + length;
return (apl->offset < apl->apl_len) ? ISC_R_SUCCESS : ISC_R_NOMORE;
}
isc_result_t
dns_rdata_apl_current(dns_rdata_in_apl_t *apl, dns_rdata_apl_ent_t *ent) {
uint32_t length;
REQUIRE(apl != NULL);
REQUIRE(apl->common.rdtype == dns_rdatatype_apl);
REQUIRE(apl->common.rdclass == dns_rdataclass_in);
REQUIRE(ent != NULL);
REQUIRE(apl->apl != NULL || apl->apl_len == 0);
REQUIRE(apl->offset <= apl->apl_len);
if (apl->offset == apl->apl_len) {
return ISC_R_NOMORE;
}
/*
* Sanity check data.
*/
INSIST(apl->apl_len > 3U);
INSIST(apl->offset <= apl->apl_len - 4U);
length = (apl->apl[apl->offset + 3] & 0x7f);
/*
* 16 to 32 bits promotion as 'length' is 32 bits so there is
* no overflow problems.
*/
INSIST(4 + length + apl->offset <= apl->apl_len);
ent->family = (apl->apl[apl->offset] << 8) + apl->apl[apl->offset + 1];
ent->prefix = apl->apl[apl->offset + 2];
ent->length = length;
ent->negative = (apl->apl[apl->offset + 3] & 0x80);
if (ent->length != 0) {
ent->data = &apl->apl[apl->offset + 4];
} else {
ent->data = NULL;
}
return ISC_R_SUCCESS;
}
unsigned int
dns_rdata_apl_count(const dns_rdata_in_apl_t *apl) {
return apl->apl_len;
}
static isc_result_t
additionaldata_in_apl(ARGS_ADDLDATA) {
REQUIRE(rdata->type == dns_rdatatype_apl);
REQUIRE(rdata->rdclass == dns_rdataclass_in);
UNUSED(rdata);
UNUSED(owner);
UNUSED(add);
UNUSED(arg);
return ISC_R_SUCCESS;
}
static isc_result_t
digest_in_apl(ARGS_DIGEST) {
isc_region_t r;
REQUIRE(rdata->type == dns_rdatatype_apl);
REQUIRE(rdata->rdclass == dns_rdataclass_in);
dns_rdata_toregion(rdata, &r);
return (digest)(arg, &r);
}
static bool
checkowner_in_apl(ARGS_CHECKOWNER) {
REQUIRE(type == dns_rdatatype_apl);
REQUIRE(rdclass == dns_rdataclass_in);
UNUSED(name);
UNUSED(type);
UNUSED(rdclass);
UNUSED(wildcard);
return true;
}
static bool
checknames_in_apl(ARGS_CHECKNAMES) {
REQUIRE(rdata->type == dns_rdatatype_apl);
REQUIRE(rdata->rdclass == dns_rdataclass_in);
UNUSED(rdata);
UNUSED(owner);
UNUSED(bad);
return true;
}
static int
casecompare_in_apl(ARGS_COMPARE) {
return compare_in_apl(rdata1, rdata2);
}
#endif /* RDATA_IN_1_APL_42_C */