2 * Copyright (C) 2004-2007, 2010, 2012 Internet Systems Consortium, Inc. ("ISC")
3 * Copyright (C) 2002, 2003 Internet Software Consortium.
5 * Permission to use, copy, modify, and/or distribute this software for any
6 * purpose with or without fee is hereby granted, provided that the above
7 * copyright notice and this permission notice appear in all copies.
9 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15 * PERFORMANCE OF THIS SOFTWARE.
18 /* $Id: ds.c,v 1.13 2010/12/23 23:47:08 tbox Exp $ */
26 #include <isc/buffer.h>
27 #include <isc/region.h>
33 #include <dns/fixedname.h>
35 #include <dns/rdata.h>
36 #include <dns/rdatastruct.h>
37 #include <dns/result.h>
41 #ifdef HAVE_OPENSSL_GOST
42 #include <dst/result.h>
43 #include <openssl/evp.h>
45 extern const EVP_MD * EVP_gost(void);
49 dns_ds_buildrdata(dns_name_t *owner, dns_rdata_t *key,
50 unsigned int digest_type, unsigned char *buffer,
53 dns_fixedname_t fname;
55 unsigned char digest[ISC_SHA384_DIGESTLENGTH];
62 #ifdef HAVE_OPENSSL_GOST
68 REQUIRE(key->type == dns_rdatatype_dnskey);
70 if (!dns_ds_digest_supported(digest_type))
71 return (ISC_R_NOTIMPLEMENTED);
73 dns_fixedname_init(&fname);
74 name = dns_fixedname_name(&fname);
75 (void)dns_name_downcase(owner, name, NULL);
77 memset(buffer, 0, DNS_DS_BUFFERSIZE);
78 isc_buffer_init(&b, buffer, DNS_DS_BUFFERSIZE);
80 switch (digest_type) {
81 case DNS_DSDIGEST_SHA1:
83 dns_name_toregion(name, &r);
84 isc_sha1_update(&sha1, r.base, r.length);
85 dns_rdata_toregion(key, &r);
86 INSIST(r.length >= 4);
87 isc_sha1_update(&sha1, r.base, r.length);
88 isc_sha1_final(&sha1, digest);
91 #ifdef HAVE_OPENSSL_GOST
94 EVP_MD_CTX_cleanup(&ctx); \
95 return (DST_R_CRYPTOFAILURE); \
98 case DNS_DSDIGEST_GOST:
101 return (DST_R_CRYPTOFAILURE);
102 EVP_MD_CTX_init(&ctx);
103 CHECK(EVP_DigestInit(&ctx, md));
104 dns_name_toregion(name, &r);
105 CHECK(EVP_DigestUpdate(&ctx,
106 (const void *) r.base,
108 dns_rdata_toregion(key, &r);
109 INSIST(r.length >= 4);
110 CHECK(EVP_DigestUpdate(&ctx,
111 (const void *) r.base,
113 CHECK(EVP_DigestFinal(&ctx, digest, NULL));
117 case DNS_DSDIGEST_SHA384:
118 isc_sha384_init(&sha384);
119 dns_name_toregion(name, &r);
120 isc_sha384_update(&sha384, r.base, r.length);
121 dns_rdata_toregion(key, &r);
122 INSIST(r.length >= 4);
123 isc_sha384_update(&sha384, r.base, r.length);
124 isc_sha384_final(digest, &sha384);
127 case DNS_DSDIGEST_SHA256:
129 isc_sha256_init(&sha256);
130 dns_name_toregion(name, &r);
131 isc_sha256_update(&sha256, r.base, r.length);
132 dns_rdata_toregion(key, &r);
133 INSIST(r.length >= 4);
134 isc_sha256_update(&sha256, r.base, r.length);
135 isc_sha256_final(digest, &sha256);
140 ds.common.rdclass = key->rdclass;
141 ds.common.rdtype = dns_rdatatype_ds;
142 ds.algorithm = r.base[3];
143 ds.key_tag = dst_region_computeid(&r, ds.algorithm);
144 ds.digest_type = digest_type;
145 switch (digest_type) {
146 case DNS_DSDIGEST_SHA1:
147 ds.length = ISC_SHA1_DIGESTLENGTH;
150 #ifdef HAVE_OPENSSL_GOST
151 case DNS_DSDIGEST_GOST:
152 ds.length = ISC_GOST_DIGESTLENGTH;
156 case DNS_DSDIGEST_SHA384:
157 ds.length = ISC_SHA384_DIGESTLENGTH;
160 case DNS_DSDIGEST_SHA256:
162 ds.length = ISC_SHA256_DIGESTLENGTH;
167 return (dns_rdata_fromstruct(rdata, key->rdclass, dns_rdatatype_ds,
172 dns_ds_digest_supported(unsigned int digest_type) {
173 #ifdef HAVE_OPENSSL_GOST
174 return (ISC_TF(digest_type == DNS_DSDIGEST_SHA1 ||
175 digest_type == DNS_DSDIGEST_SHA256 ||
176 digest_type == DNS_DSDIGEST_GOST ||
177 digest_type == DNS_DSDIGEST_SHA384));
179 return (ISC_TF(digest_type == DNS_DSDIGEST_SHA1 ||
180 digest_type == DNS_DSDIGEST_SHA256 ||
181 digest_type == DNS_DSDIGEST_SHA384));