1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
|
/* Copyright (C) CZ.NIC, z.s.p.o. <knot-resolver@labs.nic.cz>
* SPDX-License-Identifier: GPL-3.0-or-later
*/
#include <libdnssec/binary.h>
#include <libdnssec/crypto.h>
#include <libdnssec/error.h>
#include <libdnssec/key.h>
#include <libdnssec/sign.h>
#include <libknot/descriptor.h>
#include <libknot/packet/wire.h>
#include <libknot/rdataset.h>
#include <libknot/rrset.h>
#include <libknot/rrtype/dnskey.h>
#include <libknot/rrtype/nsec.h>
#include <libknot/rrtype/rrsig.h>
#include "contrib/cleanup.h"
#include "lib/defines.h"
#include "lib/dnssec/nsec.h"
#include "lib/dnssec/nsec3.h"
#include "lib/dnssec/signature.h"
#include "lib/dnssec.h"
#include "lib/resolve.h"
/* forward */
static int kr_rrset_validate_with_key(kr_rrset_validation_ctx_t *vctx,
knot_rrset_t *covered, size_t key_pos, const struct dnssec_key *key);
void kr_crypto_init(void)
{
dnssec_crypto_init();
}
void kr_crypto_cleanup(void)
{
dnssec_crypto_cleanup();
}
void kr_crypto_reinit(void)
{
dnssec_crypto_reinit();
}
#define FLG_WILDCARD_EXPANSION 0x01 /**< Possibly generated by using wildcard expansion. */
/**
* Check the RRSIG RR validity according to RFC4035 5.3.1 .
* @param flags The flags are going to be set according to validation result.
* @param cov_labels Covered RRSet owner label count.
* @param rrsigs rdata containing the signatures.
* @param key_alg DNSKEY's algorithm.
* @param keytag Used key tag.
* @param vctx->zone_name The name of the zone cut (and the DNSKEY).
* @param vctx->timestamp Validation time.
*/
static int validate_rrsig_rr(int *flags, int cov_labels,
const knot_rdata_t *rrsigs,
uint8_t key_alg,
uint16_t keytag,
kr_rrset_validation_ctx_t *vctx)
{
if (kr_fails_assert(flags && rrsigs && vctx && vctx->zone_name)) {
return kr_error(EINVAL);
}
/* bullet 5 */
if (knot_rrsig_sig_expiration(rrsigs) < vctx->timestamp) {
vctx->rrs_counters.expired++;
return kr_error(EINVAL);
}
/* bullet 6 */
if (knot_rrsig_sig_inception(rrsigs) > vctx->timestamp) {
vctx->rrs_counters.notyet++;
return kr_error(EINVAL);
}
/* bullet 2 */
const knot_dname_t *signer_name = knot_rrsig_signer_name(rrsigs);
if (!signer_name || !knot_dname_is_equal(signer_name, vctx->zone_name)) {
vctx->rrs_counters.signer_invalid++;
return kr_error(EAGAIN);
}
/* bullet 4 */
{
int rrsig_labels = knot_rrsig_labels(rrsigs);
if (rrsig_labels > cov_labels) {
vctx->rrs_counters.labels_invalid++;
return kr_error(EINVAL);
}
if (rrsig_labels < cov_labels) {
*flags |= FLG_WILDCARD_EXPANSION;
}
}
/* bullet 7
* Part checked elsewhere: key owner matching the zone_name. */
if (key_alg != knot_rrsig_alg(rrsigs) || keytag != knot_rrsig_key_tag(rrsigs)) {
vctx->rrs_counters.key_invalid++;
return kr_error(EINVAL);
}
/* bullet 8 */
/* Checked somewhere else. */
/* bullet 9 and 10 */
/* One of the requirements should be always fulfilled. */
return kr_ok();
}
/**
* Returns the number of labels that have been added by wildcard expansion.
* @param expanded Expanded wildcard.
* @param rrsigs RRSet containing the signatures.
* @param sig_pos Specifies the signature within the RRSIG RRSet.
* @return Number of added labels, -1 on error.
*/
static inline int wildcard_radix_len_diff(const knot_dname_t *expanded,
const knot_rdata_t *rrsig)
{
if (!expanded || !rrsig) {
return -1;
}
return knot_dname_labels(expanded, NULL) - knot_rrsig_labels(rrsig);
}
int kr_rrset_validate(kr_rrset_validation_ctx_t *vctx, knot_rrset_t *covered)
{
if (!vctx) {
return kr_error(EINVAL);
}
if (!vctx->pkt || !covered || !vctx->keys || !vctx->zone_name) {
return kr_error(EINVAL);
}
memset(&vctx->rrs_counters, 0, sizeof(vctx->rrs_counters));
for (unsigned i = 0; i < vctx->keys->rrs.count; ++i) {
int ret = kr_rrset_validate_with_key(vctx, covered, i, NULL);
if (ret == 0 || ret == kr_error(E2BIG)) {
return ret;
}
}
return kr_error(ENOENT);
}
/** Assuming `rrs` was validated with `sig`, trim its TTL in case it's over-extended. */
static bool trim_ttl(knot_rrset_t *rrs, const knot_rdata_t *sig,
const kr_rrset_validation_ctx_t *vctx)
{
/* The trimming logic is a bit complicated.
*
* We respect configured ttl_min over the (signed) original TTL,
* but we very much want to avoid TTLs over signature expiration,
* as that could cause serious issues with downstream validators.
*/
const uint32_t ttl_max = MIN(
MAX(knot_rrsig_original_ttl(sig), vctx->ttl_min),
knot_rrsig_sig_expiration(sig) - vctx->timestamp
);
if (likely(rrs->ttl <= ttl_max))
return false;
if (kr_log_is_debug_qry(VALIDATOR, vctx->log_qry)) {
auto_free char *name_str = kr_dname_text(rrs->owner),
*type_str = kr_rrtype_text(rrs->type);
kr_log_q(vctx->log_qry, VALIDATOR, "trimming TTL of %s %s: %d -> %d\n",
name_str, type_str, (int)rrs->ttl, (int)ttl_max);
}
rrs->ttl = ttl_max;
return true;
}
typedef struct {
struct dnssec_key *key;
uint8_t alg;
uint16_t tag;
} kr_svldr_key_t;
struct kr_svldr_ctx {
kr_rrset_validation_ctx_t vctx;
array_t(kr_svldr_key_t) keys; // owned(malloc), also insides via svldr_key_*
};
static int svldr_key_new(const knot_rdata_t *rdata, const knot_dname_t *owner,
kr_svldr_key_t *result)
{
result->alg = knot_dnskey_alg(rdata);
result->key = NULL; // just silence analyzers
int ret = kr_dnssec_key_from_rdata(&result->key, owner, rdata->data, rdata->len);
if (likely(ret == 0))
result->tag = dnssec_key_get_keytag(result->key);
return ret;
}
static inline void svldr_key_del(kr_svldr_key_t *skey)
{
kr_dnssec_key_free(&skey->key);
}
void kr_svldr_free_ctx(struct kr_svldr_ctx *ctx)
{
if (!ctx) return;
for (ssize_t i = 0; i < ctx->keys.len; ++i)
svldr_key_del(&ctx->keys.at[i]);
array_clear(ctx->keys);
free_const(ctx->vctx.zone_name);
free(ctx);
}
struct kr_svldr_ctx * kr_svldr_new_ctx(const knot_rrset_t *ds, knot_rrset_t *dnskey,
const knot_rdataset_t *dnskey_sigs, uint32_t timestamp,
kr_rrset_validation_ctx_t *err_ctx)
{
// Basic init.
struct kr_svldr_ctx *ctx = calloc(1, sizeof(*ctx));
if (unlikely(!ctx))
return NULL;
ctx->vctx.timestamp = timestamp; // .ttl_min is implicitly zero
ctx->vctx.zone_name = knot_dname_copy(ds->owner, NULL);
if (unlikely(!ctx->vctx.zone_name))
goto fail;
// Validate the DNSKEY set.
ctx->vctx.keys = dnskey;
if (kr_dnskeys_trusted(&ctx->vctx, dnskey_sigs, ds) != 0)
goto fail;
// Put usable DNSKEYs into ctx->keys. (Some duplication of work happens, but OK.)
array_init(ctx->keys);
array_reserve(ctx->keys, dnskey->rrs.count);
knot_rdata_t *krr = dnskey->rrs.rdata;
for (int i = 0; i < dnskey->rrs.count; ++i, krr = knot_rdataset_next(krr)) {
if (!kr_dnssec_key_zsk(krr->data) || kr_dnssec_key_revoked(krr->data))
continue; // key not usable for this
kr_svldr_key_t key;
if (unlikely(svldr_key_new(krr, NULL/*seems OK here*/, &key) != 0))
goto fail;
array_push(ctx->keys, key);
}
return ctx;
fail:
if (err_ctx)
memcpy(err_ctx, &ctx->vctx, sizeof(*err_ctx));
kr_svldr_free_ctx(ctx);
return NULL;
}
/** Checks whether we want to allow yet another crypto-validation and if yes,
* decrements the remaining number of allowed validations.
*
* Returns `true` if the crypto-validation is allowed; otherwise false */
static bool account_crypto_limit(kr_rrset_validation_ctx_t *vctx)
{
if (vctx->limit_crypto_remains == NULL)
return true; // no limiting
if (*vctx->limit_crypto_remains > 0) {
--*vctx->limit_crypto_remains;
return true;
}
// We got over limit. There are optional actions to do.
if (vctx->log_qry && kr_log_is_debug_qry(VALIDATOR, vctx->log_qry)) {
auto_free char *name_str = kr_dname_text(vctx->zone_name);
kr_log_q(vctx->log_qry, VALIDATOR,
"expensive crypto limited, mitigating CVE-2023-50387, current zone: %s\n",
name_str);
}
if (vctx->log_qry && vctx->log_qry->request) {
kr_request_set_extended_error(vctx->log_qry->request, KNOT_EDNS_EDE_BOGUS,
"EAIE: expensive crypto limited, mitigating CVE-2023-50387");
}
return false;
}
static int kr_svldr_rrset_with_key(knot_rrset_t *rrs, const knot_rdataset_t *rrsigs,
kr_rrset_validation_ctx_t *vctx, const kr_svldr_key_t *key)
{
const int covered_labels = knot_dname_labels(rrs->owner, NULL)
- knot_dname_is_wildcard(rrs->owner);
knot_rdata_t *rdata_j = rrsigs->rdata;
for (uint16_t j = 0; j < rrsigs->count; ++j, rdata_j = knot_rdataset_next(rdata_j)) {
if (kr_fails_assert(knot_rrsig_type_covered(rdata_j) == rrs->type))
continue; //^^ not a problem but no reason to allow them in the API
int val_flgs = 0;
int retv = validate_rrsig_rr(&val_flgs, covered_labels, rdata_j,
key->alg, key->tag, vctx);
if (retv == kr_error(EAGAIN)) {
vctx->result = retv;
return vctx->result;
} else if (retv != 0) {
continue;
}
if (!account_crypto_limit(vctx))
return vctx->result = kr_error(E2BIG);
// We only expect non-expanded wildcard records in input;
// that also means we don't need to perform non-existence proofs.
const int trim_labels = (val_flgs & FLG_WILDCARD_EXPANSION) ? 1 : 0;
if (kr_check_signature(rdata_j, key->key, rrs, trim_labels) == 0) {
trim_ttl(rrs, rdata_j, vctx);
vctx->result = kr_ok();
return vctx->result;
} else {
vctx->rrs_counters.crypto_invalid++;
}
}
vctx->result = kr_error(ENOENT);
return vctx->result;
}
/* The implementation basically performs "parts of" kr_rrset_validate(). */
int kr_svldr_rrset(knot_rrset_t *rrs, const knot_rdataset_t *rrsigs,
struct kr_svldr_ctx *ctx)
{
if (knot_dname_in_bailiwick(rrs->owner, ctx->vctx.zone_name) < 0) {
ctx->vctx.result = kr_error(EAGAIN);
return ctx->vctx.result;
}
for (ssize_t i = 0; i < ctx->keys.len; ++i) {
kr_svldr_rrset_with_key(rrs, rrsigs, &ctx->vctx, &ctx->keys.at[i]);
if (ctx->vctx.result == 0 || ctx->vctx.result == kr_error(E2BIG))
break;
}
return ctx->vctx.result;
}
/**
* Validate RRSet using a specific key.
* @param vctx Pointer to validation context.
* @param covered RRSet covered by a signature. It must be in canonical format.
* TTL may get lowered.
* @param key_pos Position of the key to be validated with.
* @param key Key to be used to validate.
* If NULL, then key from DNSKEY RRSet is used.
* @return 0 or error code, same as vctx->result.
*/
static int kr_rrset_validate_with_key(kr_rrset_validation_ctx_t *vctx,
knot_rrset_t *covered,
size_t key_pos, const struct dnssec_key *key)
{
const knot_pkt_t *pkt = vctx->pkt;
const knot_rrset_t *keys = vctx->keys;
const knot_dname_t *zone_name = vctx->zone_name;
bool has_nsec3 = vctx->has_nsec3;
struct dnssec_key *created_key = NULL;
if (!knot_dname_is_equal(keys->owner, zone_name)
/* It's just caller's approximation that the RR is in that particular zone,
* so we verify that in the following condition.
* We MUST guard against attempts of zones signing out-of-bailiwick records. */
|| knot_dname_in_bailiwick(covered->owner, zone_name) < 0) {
vctx->result = kr_error(ENOENT);
return vctx->result;
}
const knot_rdata_t *key_rdata = knot_rdataset_at(&keys->rrs, key_pos);
if (key == NULL) {
int ret = kr_dnssec_key_from_rdata(&created_key, keys->owner,
key_rdata->data, key_rdata->len);
if (ret != 0) {
vctx->result = ret;
return vctx->result;
}
key = created_key;
}
uint16_t keytag = dnssec_key_get_keytag(key);
const uint8_t key_alg = knot_dnskey_alg(key_rdata);
/* The asterisk does not count, RFC4034 3.1.3, paragraph 3. */
const int covered_labels = knot_dname_labels(covered->owner, NULL)
- knot_dname_is_wildcard(covered->owner);
for (uint16_t i = 0; i < vctx->rrs->len; ++i) {
/* Consider every RRSIG that matches and comes from the same query. */
const knot_rrset_t *rrsig = vctx->rrs->at[i]->rr;
const bool ok = vctx->rrs->at[i]->qry_uid == vctx->qry_uid
&& rrsig->type == KNOT_RRTYPE_RRSIG
&& rrsig->rclass == covered->rclass
&& knot_dname_is_equal(rrsig->owner, covered->owner);
if (!ok)
continue;
knot_rdata_t *rdata_j = rrsig->rrs.rdata;
for (uint16_t j = 0; j < rrsig->rrs.count; ++j, rdata_j = knot_rdataset_next(rdata_j)) {
int val_flgs = 0;
int trim_labels = 0;
if (knot_rrsig_type_covered(rdata_j) != covered->type) {
continue;
}
kr_rank_set(&vctx->rrs->at[i]->rank, KR_RANK_BOGUS); /* defensive style */
vctx->rrs_counters.matching_name_type++;
int retv = validate_rrsig_rr(&val_flgs, covered_labels, rdata_j,
key_alg, keytag, vctx);
if (retv == kr_error(EAGAIN)) {
vctx->result = retv;
goto finish;
} else if (retv != 0) {
continue;
}
if (val_flgs & FLG_WILDCARD_EXPANSION) {
trim_labels = wildcard_radix_len_diff(covered->owner, rdata_j);
if (trim_labels < 0) {
break;
}
}
if (!account_crypto_limit(vctx)) {
vctx->result = kr_error(E2BIG);
goto finish;
}
if (kr_check_signature(rdata_j, key, covered, trim_labels) != 0) {
vctx->rrs_counters.crypto_invalid++;
continue;
}
if (val_flgs & FLG_WILDCARD_EXPANSION) {
int ret = 0;
if (!has_nsec3) {
ret = kr_nsec_wildcard_answer_response_check(pkt, KNOT_AUTHORITY, covered->owner);
} else {
ret = kr_nsec3_wildcard_answer_response_check(pkt, KNOT_AUTHORITY, covered->owner, trim_labels - 1);
if (ret == kr_error(KNOT_ERANGE)) {
ret = 0;
vctx->flags |= KR_DNSSEC_VFLG_OPTOUT;
}
}
if (ret != 0) {
vctx->rrs_counters.nsec_invalid++;
continue;
}
vctx->flags |= KR_DNSSEC_VFLG_WEXPAND;
}
trim_ttl(covered, rdata_j, vctx);
kr_rank_set(&vctx->rrs->at[i]->rank, KR_RANK_SECURE); /* upgrade from bogus */
vctx->result = kr_ok();
goto finish;
}
}
/* No applicable key found, cannot be validated. */
vctx->result = kr_error(ENOENT);
finish:
kr_dnssec_key_free(&created_key);
return vctx->result;
}
bool kr_ds_algo_support(const knot_rrset_t *ta)
{
if (kr_fails_assert(ta && ta->type == KNOT_RRTYPE_DS && ta->rclass == KNOT_CLASS_IN))
return false;
/* Check if at least one DS has a usable algorithm pair. */
knot_rdata_t *rdata_i = ta->rrs.rdata;
for (uint16_t i = 0; i < ta->rrs.count;
++i, rdata_i = knot_rdataset_next(rdata_i)) {
if (dnssec_algorithm_digest_support(knot_ds_digest_type(rdata_i))
&& dnssec_algorithm_key_support(knot_ds_alg(rdata_i))) {
return true;
}
}
return false;
}
int kr_dnskeys_trusted(kr_rrset_validation_ctx_t *vctx, const knot_rdataset_t *sigs,
const knot_rrset_t *ta)
{
knot_rrset_t *keys = vctx->keys;
const bool ok = keys && ta && ta->rrs.count && ta->rrs.rdata
&& ta->type == KNOT_RRTYPE_DS
&& knot_dname_is_equal(ta->owner, keys->owner);
if (kr_fails_assert(ok))
return kr_error(EINVAL);
/* RFC4035 5.2, bullet 1
* The supplied DS record has been authenticated.
* It has been validated or is part of a configured trust anchor.
*/
knot_rdata_t *krr = keys->rrs.rdata;
for (int i = 0; i < keys->rrs.count; ++i, krr = knot_rdataset_next(krr)) {
/* RFC4035 5.3.1, bullet 8 */ /* ZSK */
if (!kr_dnssec_key_zsk(krr->data) || kr_dnssec_key_revoked(krr->data))
continue;
kr_svldr_key_t key;
if (svldr_key_new(krr, keys->owner, &key) != 0)
continue; // it might e.g. be malformed
int ret = kr_authenticate_referral(ta, key.key);
if (ret == 0)
ret = kr_svldr_rrset_with_key(keys, sigs, vctx, &key);
svldr_key_del(&key);
if (ret == 0 || ret == kr_error(E2BIG)) {
kr_assert(vctx->result == ret);
return vctx->result;
}
}
/* No useable key found */
vctx->result = kr_error(ENOENT);
return vctx->result;
}
bool kr_dnssec_key_zsk(const uint8_t *dnskey_rdata)
{
return knot_wire_read_u16(dnskey_rdata) & 0x0100;
}
bool kr_dnssec_key_ksk(const uint8_t *dnskey_rdata)
{
return knot_wire_read_u16(dnskey_rdata) & 0x0001;
}
/** Return true if the DNSKEY is revoked. */
bool kr_dnssec_key_revoked(const uint8_t *dnskey_rdata)
{
return knot_wire_read_u16(dnskey_rdata) & 0x0080;
}
int kr_dnssec_key_tag(uint16_t rrtype, const uint8_t *rdata, size_t rdlen)
{
if (!rdata || rdlen == 0 || (rrtype != KNOT_RRTYPE_DS && rrtype != KNOT_RRTYPE_DNSKEY)) {
return kr_error(EINVAL);
}
if (rrtype == KNOT_RRTYPE_DS) {
return knot_wire_read_u16(rdata);
} else if (rrtype == KNOT_RRTYPE_DNSKEY) {
struct dnssec_key *key = NULL;
int ret = kr_dnssec_key_from_rdata(&key, NULL, rdata, rdlen);
if (ret != 0) {
return ret;
}
uint16_t keytag = dnssec_key_get_keytag(key);
kr_dnssec_key_free(&key);
return keytag;
} else {
return kr_error(EINVAL);
}
}
int kr_dnssec_key_match(const uint8_t *key_a_rdata, size_t key_a_rdlen,
const uint8_t *key_b_rdata, size_t key_b_rdlen)
{
dnssec_key_t *key_a = NULL, *key_b = NULL;
int ret = kr_dnssec_key_from_rdata(&key_a, NULL, key_a_rdata, key_a_rdlen);
if (ret != 0) {
return ret;
}
ret = kr_dnssec_key_from_rdata(&key_b, NULL, key_b_rdata, key_b_rdlen);
if (ret != 0) {
dnssec_key_free(key_a);
return ret;
}
/* If the algorithm and the public key match, we can be sure
* that they are the same key. */
ret = kr_error(ENOENT);
dnssec_binary_t pk_a, pk_b;
if (dnssec_key_get_algorithm(key_a) == dnssec_key_get_algorithm(key_b) &&
dnssec_key_get_pubkey(key_a, &pk_a) == DNSSEC_EOK &&
dnssec_key_get_pubkey(key_b, &pk_b) == DNSSEC_EOK) {
if (pk_a.size == pk_b.size && memcmp(pk_a.data, pk_b.data, pk_a.size) == 0) {
ret = 0;
}
}
dnssec_key_free(key_a);
dnssec_key_free(key_b);
return ret;
}
int kr_dnssec_key_from_rdata(struct dnssec_key **key, const knot_dname_t *kown, const uint8_t *rdata, size_t rdlen)
{
if (!key || !rdata || rdlen == 0) {
return kr_error(EINVAL);
}
dnssec_key_t *new_key = NULL;
const dnssec_binary_t binary_key = {
.size = rdlen,
.data = (uint8_t *)rdata
};
int ret = dnssec_key_new(&new_key);
if (ret != DNSSEC_EOK) {
return kr_error(ENOMEM);
}
ret = dnssec_key_set_rdata(new_key, &binary_key);
if (ret != DNSSEC_EOK) {
dnssec_key_free(new_key);
return kr_error(ret);
}
if (kown) {
ret = dnssec_key_set_dname(new_key, kown);
if (ret != DNSSEC_EOK) {
dnssec_key_free(new_key);
return kr_error(ENOMEM);
}
}
*key = new_key;
return kr_ok();
}
void kr_dnssec_key_free(struct dnssec_key **key)
{
if (kr_fails_assert(key))
return;
dnssec_key_free(*key);
*key = NULL;
}
int kr_dnssec_matches_name_and_type(const ranked_rr_array_t *rrs, uint32_t qry_uid,
const knot_dname_t *name, uint16_t type)
{
int ret = kr_error(ENOENT);
for (size_t i = 0; i < rrs->len; ++i) {
const ranked_rr_array_entry_t *entry = rrs->at[i];
if (kr_fails_assert(!entry->in_progress))
return kr_error(EINVAL);
const knot_rrset_t *nsec = entry->rr;
if (entry->qry_uid != qry_uid || entry->yielded) {
continue;
}
if (nsec->type != KNOT_RRTYPE_NSEC &&
nsec->type != KNOT_RRTYPE_NSEC3) {
continue;
}
if (!kr_rank_test(entry->rank, KR_RANK_SECURE)) {
continue;
}
if (nsec->type == KNOT_RRTYPE_NSEC) {
ret = kr_nsec_matches_name_and_type(nsec, name, type);
} else {
ret = kr_nsec3_matches_name_and_type(nsec, name, type);
}
if (ret == kr_ok()) {
return kr_ok();
} else if (ret != kr_error(ENOENT)) {
return ret;
}
}
return ret;
}
|