395 lines
8.3 KiB
C
395 lines
8.3 KiB
C
/*
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
*
|
|
* SPDX-License-Identifier: MPL-2.0
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
|
*
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
* information regarding copyright ownership.
|
|
*/
|
|
|
|
#ifndef RDATA_IN_1_WKS_11_C
|
|
#define RDATA_IN_1_WKS_11_C
|
|
|
|
#include <limits.h>
|
|
#include <netdb.h>
|
|
|
|
#include <isc/ascii.h>
|
|
#include <isc/net.h>
|
|
#include <isc/once.h>
|
|
|
|
#define RRTYPE_WKS_ATTRIBUTES (0)
|
|
|
|
static isc_mutex_t wks_lock;
|
|
|
|
static void
|
|
init_lock(void) {
|
|
isc_mutex_init(&wks_lock);
|
|
}
|
|
|
|
static bool
|
|
mygetprotobyname(const char *name, long *proto) {
|
|
struct protoent *pe;
|
|
|
|
LOCK(&wks_lock);
|
|
pe = getprotobyname(name);
|
|
if (pe != NULL) {
|
|
*proto = pe->p_proto;
|
|
}
|
|
UNLOCK(&wks_lock);
|
|
return pe != NULL;
|
|
}
|
|
|
|
static bool
|
|
mygetservbyname(const char *name, const char *proto, long *port) {
|
|
struct servent *se;
|
|
|
|
LOCK(&wks_lock);
|
|
se = getservbyname(name, proto);
|
|
if (se != NULL) {
|
|
*port = ntohs(se->s_port);
|
|
}
|
|
UNLOCK(&wks_lock);
|
|
return se != NULL;
|
|
}
|
|
|
|
static isc_result_t
|
|
fromtext_in_wks(ARGS_FROMTEXT) {
|
|
static isc_once_t once = ISC_ONCE_INIT;
|
|
isc_token_t token;
|
|
isc_region_t region;
|
|
struct in_addr addr;
|
|
char *e = NULL;
|
|
long proto;
|
|
unsigned char bm[8 * 1024]; /* 64k bits */
|
|
long port;
|
|
long maxport = -1;
|
|
const char *ps = NULL;
|
|
unsigned int n;
|
|
char service[32];
|
|
isc_result_t result;
|
|
|
|
REQUIRE(type == dns_rdatatype_wks);
|
|
REQUIRE(rdclass == dns_rdataclass_in);
|
|
|
|
UNUSED(type);
|
|
UNUSED(origin);
|
|
UNUSED(options);
|
|
UNUSED(rdclass);
|
|
UNUSED(callbacks);
|
|
|
|
isc_once_do(&once, init_lock);
|
|
|
|
/*
|
|
* IPv4 dotted quad.
|
|
*/
|
|
CHECK(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
|
|
false));
|
|
|
|
isc_buffer_availableregion(target, ®ion);
|
|
if (inet_pton(AF_INET, DNS_AS_STR(token), &addr) != 1) {
|
|
CHECKTOK(DNS_R_BADDOTTEDQUAD);
|
|
}
|
|
if (region.length < 4) {
|
|
return ISC_R_NOSPACE;
|
|
}
|
|
memmove(region.base, &addr, 4);
|
|
isc_buffer_add(target, 4);
|
|
|
|
/*
|
|
* Protocol.
|
|
*/
|
|
CHECK(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
|
|
false));
|
|
|
|
proto = strtol(DNS_AS_STR(token), &e, 10);
|
|
if (*e != '\0' && !mygetprotobyname(DNS_AS_STR(token), &proto)) {
|
|
CHECKTOK(DNS_R_UNKNOWNPROTO);
|
|
}
|
|
|
|
if (proto < 0 || proto > 0xff) {
|
|
CHECKTOK(ISC_R_RANGE);
|
|
}
|
|
|
|
if (proto == IPPROTO_TCP) {
|
|
ps = "tcp";
|
|
} else if (proto == IPPROTO_UDP) {
|
|
ps = "udp";
|
|
}
|
|
|
|
CHECK(uint8_tobuffer(proto, target));
|
|
|
|
memset(bm, 0, sizeof(bm));
|
|
do {
|
|
CHECK(isc_lex_getmastertoken(lexer, &token,
|
|
isc_tokentype_string, true));
|
|
if (token.type != isc_tokentype_string) {
|
|
break;
|
|
}
|
|
|
|
/*
|
|
* Lowercase the service string as some getservbyname() are
|
|
* case sensitive and the database is usually in lowercase.
|
|
*/
|
|
strlcpy(service, DNS_AS_STR(token), sizeof(service));
|
|
isc_ascii_strtolower(service);
|
|
|
|
port = strtol(DNS_AS_STR(token), &e, 10);
|
|
if (*e != 0 && !mygetservbyname(service, ps, &port) &&
|
|
!mygetservbyname(DNS_AS_STR(token), ps, &port))
|
|
{
|
|
CHECKTOK(DNS_R_UNKNOWNSERVICE);
|
|
}
|
|
if (port < 0 || port > 0xffff) {
|
|
CHECKTOK(ISC_R_RANGE);
|
|
}
|
|
if (port > maxport) {
|
|
maxport = port;
|
|
}
|
|
bm[port / 8] |= (0x80 >> (port % 8));
|
|
} while (1);
|
|
|
|
/*
|
|
* Let upper layer handle eol/eof.
|
|
*/
|
|
isc_lex_ungettoken(lexer, &token);
|
|
|
|
n = (maxport + 8) / 8;
|
|
result = mem_tobuffer(target, bm, n);
|
|
|
|
cleanup:
|
|
return result;
|
|
}
|
|
|
|
static isc_result_t
|
|
totext_in_wks(ARGS_TOTEXT) {
|
|
isc_region_t sr;
|
|
unsigned short proto;
|
|
char buf[sizeof("65535")];
|
|
unsigned int i, j;
|
|
|
|
UNUSED(tctx);
|
|
|
|
REQUIRE(rdata->type == dns_rdatatype_wks);
|
|
REQUIRE(rdata->rdclass == dns_rdataclass_in);
|
|
REQUIRE(rdata->length >= 5);
|
|
|
|
dns_rdata_toregion(rdata, &sr);
|
|
RETERR(inet_totext(AF_INET, tctx->flags, &sr, target));
|
|
isc_region_consume(&sr, 4);
|
|
|
|
proto = uint8_fromregion(&sr);
|
|
snprintf(buf, sizeof(buf), "%u", proto);
|
|
RETERR(str_totext(" ", target));
|
|
RETERR(str_totext(buf, target));
|
|
isc_region_consume(&sr, 1);
|
|
|
|
INSIST(sr.length <= 8 * 1024);
|
|
for (i = 0; i < sr.length; i++) {
|
|
if (sr.base[i] != 0) {
|
|
for (j = 0; j < 8; j++) {
|
|
if ((sr.base[i] & (0x80 >> j)) != 0) {
|
|
{
|
|
snprintf(buf, sizeof(buf), "%u",
|
|
i * 8 + j);
|
|
RETERR(str_totext(" ", target));
|
|
RETERR(str_totext(buf, target));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return ISC_R_SUCCESS;
|
|
}
|
|
|
|
static isc_result_t
|
|
fromwire_in_wks(ARGS_FROMWIRE) {
|
|
isc_region_t sr;
|
|
isc_region_t tr;
|
|
|
|
REQUIRE(type == dns_rdatatype_wks);
|
|
REQUIRE(rdclass == dns_rdataclass_in);
|
|
|
|
UNUSED(type);
|
|
UNUSED(dctx);
|
|
UNUSED(rdclass);
|
|
|
|
isc_buffer_activeregion(source, &sr);
|
|
isc_buffer_availableregion(target, &tr);
|
|
|
|
if (sr.length < 5) {
|
|
return ISC_R_UNEXPECTEDEND;
|
|
}
|
|
if (sr.length > 8 * 1024 + 5) {
|
|
return DNS_R_EXTRADATA;
|
|
}
|
|
if (sr.length > 5 && sr.base[sr.length - 1] == 0) {
|
|
return DNS_R_FORMERR;
|
|
}
|
|
if (tr.length < sr.length) {
|
|
return ISC_R_NOSPACE;
|
|
}
|
|
|
|
memmove(tr.base, sr.base, sr.length);
|
|
isc_buffer_add(target, sr.length);
|
|
isc_buffer_forward(source, sr.length);
|
|
|
|
return ISC_R_SUCCESS;
|
|
}
|
|
|
|
static isc_result_t
|
|
towire_in_wks(ARGS_TOWIRE) {
|
|
isc_region_t sr;
|
|
|
|
UNUSED(cctx);
|
|
|
|
REQUIRE(rdata->type == dns_rdatatype_wks);
|
|
REQUIRE(rdata->rdclass == dns_rdataclass_in);
|
|
REQUIRE(rdata->length != 0);
|
|
|
|
dns_rdata_toregion(rdata, &sr);
|
|
return mem_tobuffer(target, sr.base, sr.length);
|
|
}
|
|
|
|
static int
|
|
compare_in_wks(ARGS_COMPARE) {
|
|
isc_region_t r1;
|
|
isc_region_t r2;
|
|
|
|
REQUIRE(rdata1->type == rdata2->type);
|
|
REQUIRE(rdata1->rdclass == rdata2->rdclass);
|
|
REQUIRE(rdata1->type == dns_rdatatype_wks);
|
|
REQUIRE(rdata1->rdclass == dns_rdataclass_in);
|
|
REQUIRE(rdata1->length != 0);
|
|
REQUIRE(rdata2->length != 0);
|
|
|
|
dns_rdata_toregion(rdata1, &r1);
|
|
dns_rdata_toregion(rdata2, &r2);
|
|
return isc_region_compare(&r1, &r2);
|
|
}
|
|
|
|
static isc_result_t
|
|
fromstruct_in_wks(ARGS_FROMSTRUCT) {
|
|
dns_rdata_in_wks_t *wks = source;
|
|
uint32_t a;
|
|
|
|
REQUIRE(type == dns_rdatatype_wks);
|
|
REQUIRE(rdclass == dns_rdataclass_in);
|
|
REQUIRE(wks != NULL);
|
|
REQUIRE(wks->common.rdtype == type);
|
|
REQUIRE(wks->common.rdclass == rdclass);
|
|
REQUIRE((wks->map != NULL && wks->map_len <= 8 * 1024) ||
|
|
wks->map_len == 0);
|
|
|
|
UNUSED(type);
|
|
UNUSED(rdclass);
|
|
|
|
a = ntohl(wks->in_addr.s_addr);
|
|
RETERR(uint32_tobuffer(a, target));
|
|
RETERR(uint8_tobuffer(wks->protocol, target));
|
|
return mem_tobuffer(target, wks->map, wks->map_len);
|
|
}
|
|
|
|
static isc_result_t
|
|
tostruct_in_wks(ARGS_TOSTRUCT) {
|
|
dns_rdata_in_wks_t *wks = target;
|
|
uint32_t n;
|
|
isc_region_t region;
|
|
|
|
REQUIRE(wks != NULL);
|
|
REQUIRE(rdata->type == dns_rdatatype_wks);
|
|
REQUIRE(rdata->rdclass == dns_rdataclass_in);
|
|
REQUIRE(rdata->length != 0);
|
|
|
|
wks->common.rdclass = rdata->rdclass;
|
|
wks->common.rdtype = rdata->type;
|
|
ISC_LINK_INIT(&wks->common, link);
|
|
|
|
dns_rdata_toregion(rdata, ®ion);
|
|
n = uint32_fromregion(®ion);
|
|
wks->in_addr.s_addr = htonl(n);
|
|
isc_region_consume(®ion, 4);
|
|
wks->protocol = uint8_fromregion(®ion);
|
|
isc_region_consume(®ion, 1);
|
|
wks->map_len = region.length;
|
|
wks->map = mem_maybedup(mctx, region.base, region.length);
|
|
wks->mctx = mctx;
|
|
return ISC_R_SUCCESS;
|
|
}
|
|
|
|
static void
|
|
freestruct_in_wks(ARGS_FREESTRUCT) {
|
|
dns_rdata_in_wks_t *wks = source;
|
|
|
|
REQUIRE(wks != NULL);
|
|
REQUIRE(wks->common.rdtype == dns_rdatatype_wks);
|
|
REQUIRE(wks->common.rdclass == dns_rdataclass_in);
|
|
|
|
if (wks->mctx == NULL) {
|
|
return;
|
|
}
|
|
|
|
if (wks->map != NULL) {
|
|
isc_mem_free(wks->mctx, wks->map);
|
|
}
|
|
wks->mctx = NULL;
|
|
}
|
|
|
|
static isc_result_t
|
|
additionaldata_in_wks(ARGS_ADDLDATA) {
|
|
REQUIRE(rdata->type == dns_rdatatype_wks);
|
|
REQUIRE(rdata->rdclass == dns_rdataclass_in);
|
|
|
|
UNUSED(rdata);
|
|
UNUSED(owner);
|
|
UNUSED(add);
|
|
UNUSED(arg);
|
|
|
|
return ISC_R_SUCCESS;
|
|
}
|
|
|
|
static isc_result_t
|
|
digest_in_wks(ARGS_DIGEST) {
|
|
isc_region_t r;
|
|
|
|
REQUIRE(rdata->type == dns_rdatatype_wks);
|
|
REQUIRE(rdata->rdclass == dns_rdataclass_in);
|
|
|
|
dns_rdata_toregion(rdata, &r);
|
|
|
|
return (digest)(arg, &r);
|
|
}
|
|
|
|
static bool
|
|
checkowner_in_wks(ARGS_CHECKOWNER) {
|
|
REQUIRE(type == dns_rdatatype_wks);
|
|
REQUIRE(rdclass == dns_rdataclass_in);
|
|
|
|
UNUSED(type);
|
|
UNUSED(rdclass);
|
|
|
|
return dns_name_ishostname(name, wildcard);
|
|
}
|
|
|
|
static bool
|
|
checknames_in_wks(ARGS_CHECKNAMES) {
|
|
REQUIRE(rdata->type == dns_rdatatype_wks);
|
|
REQUIRE(rdata->rdclass == dns_rdataclass_in);
|
|
|
|
UNUSED(rdata);
|
|
UNUSED(owner);
|
|
UNUSED(bad);
|
|
|
|
return true;
|
|
}
|
|
|
|
static int
|
|
casecompare_in_wks(ARGS_COMPARE) {
|
|
return compare_in_wks(rdata1, rdata2);
|
|
}
|
|
|
|
#endif /* RDATA_IN_1_WKS_11_C */
|