2 * Copyright (C) 2009, 2011-2013, 2015 Internet Systems Consortium, Inc. ("ISC")
4 * Permission to use, copy, modify, and/or distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
8 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
9 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
10 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
11 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
12 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
13 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
14 * PERFORMANCE OF THIS SOFTWARE.
17 #ifndef GENERIC_KEYDATA_65533_C
18 #define GENERIC_KEYDATA_65533_C 1
21 #include <isc/stdtime.h>
25 #define RRTYPE_KEYDATA_ATTRIBUTES (0)
27 static inline isc_result_t
28 fromtext_keydata(ARGS_FROMTEXT) {
34 isc_uint32_t refresh, addhd, removehd;
36 REQUIRE(type == 65533);
45 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
47 RETTOK(dns_time32_fromtext(DNS_AS_STR(token), &refresh));
48 RETERR(uint32_tobuffer(refresh, target));
51 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
53 RETTOK(dns_time32_fromtext(DNS_AS_STR(token), &addhd));
54 RETERR(uint32_tobuffer(addhd, target));
56 /* remove hold-down */
57 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
59 RETTOK(dns_time32_fromtext(DNS_AS_STR(token), &removehd));
60 RETERR(uint32_tobuffer(removehd, target));
63 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
65 RETTOK(dns_keyflags_fromtext(&flags, &token.value.as_textregion));
66 RETERR(uint16_tobuffer(flags, target));
69 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
71 RETTOK(dns_secproto_fromtext(&proto, &token.value.as_textregion));
72 RETERR(mem_tobuffer(target, &proto, 1));
75 RETERR(isc_lex_getmastertoken(lexer, &token, isc_tokentype_string,
77 RETTOK(dns_secalg_fromtext(&alg, &token.value.as_textregion));
78 RETERR(mem_tobuffer(target, &alg, 1));
81 if ((flags & 0xc000) == 0xc000)
82 return (ISC_R_SUCCESS);
84 result = isc_base64_tobuffer(lexer, target, -1);
85 if (result != ISC_R_SUCCESS)
88 /* Ensure there's at least enough data to compute a key ID for MD5 */
89 if (alg == DST_ALG_RSAMD5 && isc_buffer_usedlength(target) < 19)
90 return (ISC_R_UNEXPECTEDEND);
92 return (ISC_R_SUCCESS);
95 static inline isc_result_t
96 totext_keydata(ARGS_TOTEXT) {
98 char buf[sizeof("64000")];
100 unsigned char algorithm;
101 unsigned long refresh, add, remove;
102 char algbuf[DNS_NAME_FORMATSIZE];
105 REQUIRE(rdata->type == 65533);
107 if ((tctx->flags & DNS_STYLEFLAG_KEYDATA) == 0 || rdata->length < 16)
108 return (unknown_totext(rdata, tctx, target));
110 dns_rdata_toregion(rdata, &sr);
113 refresh = uint32_fromregion(&sr);
114 isc_region_consume(&sr, 4);
115 RETERR(dns_time32_totext(refresh, target));
116 RETERR(str_totext(" ", target));
119 add = uint32_fromregion(&sr);
120 isc_region_consume(&sr, 4);
121 RETERR(dns_time32_totext(add, target));
122 RETERR(str_totext(" ", target));
124 /* remove hold-down */
125 remove = uint32_fromregion(&sr);
126 isc_region_consume(&sr, 4);
127 RETERR(dns_time32_totext(remove, target));
128 RETERR(str_totext(" ", target));
131 flags = uint16_fromregion(&sr);
132 isc_region_consume(&sr, 2);
133 sprintf(buf, "%u", flags);
134 RETERR(str_totext(buf, target));
135 RETERR(str_totext(" ", target));
136 if ((flags & DNS_KEYFLAG_KSK) != 0) {
137 if (flags & DNS_KEYFLAG_REVOKE)
138 keyinfo = "revoked KSK";
145 sprintf(buf, "%u", sr.base[0]);
146 isc_region_consume(&sr, 1);
147 RETERR(str_totext(buf, target));
148 RETERR(str_totext(" ", target));
151 algorithm = sr.base[0];
152 sprintf(buf, "%u", algorithm);
153 isc_region_consume(&sr, 1);
154 RETERR(str_totext(buf, target));
157 if ((flags & 0xc000) == 0xc000)
158 return (ISC_R_SUCCESS);
161 if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
162 RETERR(str_totext(" (", target));
163 RETERR(str_totext(tctx->linebreak, target));
164 if (tctx->width == 0) /* No splitting */
165 RETERR(isc_base64_totext(&sr, 60, "", target));
167 RETERR(isc_base64_totext(&sr, tctx->width - 2,
168 tctx->linebreak, target));
170 if ((tctx->flags & DNS_STYLEFLAG_RRCOMMENT) != 0)
171 RETERR(str_totext(tctx->linebreak, target));
172 else if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
173 RETERR(str_totext(" ", target));
175 if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0)
176 RETERR(str_totext(")", target));
178 if ((tctx->flags & DNS_STYLEFLAG_RRCOMMENT) != 0) {
180 char rbuf[ISC_FORMATHTTPTIMESTAMP_SIZE];
181 char abuf[ISC_FORMATHTTPTIMESTAMP_SIZE];
182 char dbuf[ISC_FORMATHTTPTIMESTAMP_SIZE];
185 RETERR(str_totext(" ; ", target));
186 RETERR(str_totext(keyinfo, target));
187 dns_secalg_format((dns_secalg_t) algorithm, algbuf,
189 RETERR(str_totext("; alg = ", target));
190 RETERR(str_totext(algbuf, target));
191 RETERR(str_totext("; key id = ", target));
192 dns_rdata_toregion(rdata, &tmpr);
193 /* Skip over refresh, addhd, and removehd */
194 isc_region_consume(&tmpr, 12);
195 sprintf(buf, "%u", dst_region_computeid(&tmpr, algorithm));
196 RETERR(str_totext(buf, target));
198 if ((tctx->flags & DNS_STYLEFLAG_MULTILINE) != 0) {
201 isc_stdtime_get(&now);
203 RETERR(str_totext(tctx->linebreak, target));
204 RETERR(str_totext("; next refresh: ", target));
205 isc_time_set(&t, refresh, 0);
206 isc_time_formathttptimestamp(&t, rbuf, sizeof(rbuf));
207 RETERR(str_totext(rbuf, target));
210 RETERR(str_totext(tctx->linebreak, target));
211 RETERR(str_totext("; no trust", target));
213 RETERR(str_totext(tctx->linebreak, target));
215 RETERR(str_totext("; trusted since: ",
218 RETERR(str_totext("; trust pending: ",
221 isc_time_set(&t, add, 0);
222 isc_time_formathttptimestamp(&t, abuf,
224 RETERR(str_totext(abuf, target));
228 RETERR(str_totext(tctx->linebreak, target));
229 RETERR(str_totext("; removal pending: ",
231 isc_time_set(&t, remove, 0);
232 isc_time_formathttptimestamp(&t, dbuf,
234 RETERR(str_totext(dbuf, target));
239 return (ISC_R_SUCCESS);
242 static inline isc_result_t
243 fromwire_keydata(ARGS_FROMWIRE) {
246 REQUIRE(type == 65533);
253 isc_buffer_activeregion(source, &sr);
254 isc_buffer_forward(source, sr.length);
255 return (mem_tobuffer(target, sr.base, sr.length));
258 static inline isc_result_t
259 towire_keydata(ARGS_TOWIRE) {
262 REQUIRE(rdata->type == 65533);
266 dns_rdata_toregion(rdata, &sr);
267 return (mem_tobuffer(target, sr.base, sr.length));
271 compare_keydata(ARGS_COMPARE) {
275 REQUIRE(rdata1->type == rdata2->type);
276 REQUIRE(rdata1->rdclass == rdata2->rdclass);
277 REQUIRE(rdata1->type == 65533);
279 dns_rdata_toregion(rdata1, &r1);
280 dns_rdata_toregion(rdata2, &r2);
281 return (isc_region_compare(&r1, &r2));
284 static inline isc_result_t
285 fromstruct_keydata(ARGS_FROMSTRUCT) {
286 dns_rdata_keydata_t *keydata = source;
288 REQUIRE(type == 65533);
289 REQUIRE(source != NULL);
290 REQUIRE(keydata->common.rdtype == type);
291 REQUIRE(keydata->common.rdclass == rdclass);
297 RETERR(uint32_tobuffer(keydata->refresh, target));
300 RETERR(uint32_tobuffer(keydata->addhd, target));
302 /* Remove hold-down */
303 RETERR(uint32_tobuffer(keydata->removehd, target));
306 RETERR(uint16_tobuffer(keydata->flags, target));
309 RETERR(uint8_tobuffer(keydata->protocol, target));
312 RETERR(uint8_tobuffer(keydata->algorithm, target));
315 return (mem_tobuffer(target, keydata->data, keydata->datalen));
318 static inline isc_result_t
319 tostruct_keydata(ARGS_TOSTRUCT) {
320 dns_rdata_keydata_t *keydata = target;
323 REQUIRE(rdata->type == 65533);
324 REQUIRE(target != NULL);
326 keydata->common.rdclass = rdata->rdclass;
327 keydata->common.rdtype = rdata->type;
328 ISC_LINK_INIT(&keydata->common, link);
330 dns_rdata_toregion(rdata, &sr);
334 return (ISC_R_UNEXPECTEDEND);
335 keydata->refresh = uint32_fromregion(&sr);
336 isc_region_consume(&sr, 4);
340 return (ISC_R_UNEXPECTEDEND);
341 keydata->addhd = uint32_fromregion(&sr);
342 isc_region_consume(&sr, 4);
344 /* Remove hold-down */
346 return (ISC_R_UNEXPECTEDEND);
347 keydata->removehd = uint32_fromregion(&sr);
348 isc_region_consume(&sr, 4);
352 return (ISC_R_UNEXPECTEDEND);
353 keydata->flags = uint16_fromregion(&sr);
354 isc_region_consume(&sr, 2);
358 return (ISC_R_UNEXPECTEDEND);
359 keydata->protocol = uint8_fromregion(&sr);
360 isc_region_consume(&sr, 1);
364 return (ISC_R_UNEXPECTEDEND);
365 keydata->algorithm = uint8_fromregion(&sr);
366 isc_region_consume(&sr, 1);
369 keydata->datalen = sr.length;
370 keydata->data = mem_maybedup(mctx, sr.base, keydata->datalen);
371 if (keydata->data == NULL)
372 return (ISC_R_NOMEMORY);
374 keydata->mctx = mctx;
375 return (ISC_R_SUCCESS);
379 freestruct_keydata(ARGS_FREESTRUCT) {
380 dns_rdata_keydata_t *keydata = (dns_rdata_keydata_t *) source;
382 REQUIRE(source != NULL);
383 REQUIRE(keydata->common.rdtype == 65533);
385 if (keydata->mctx == NULL)
388 if (keydata->data != NULL)
389 isc_mem_free(keydata->mctx, keydata->data);
390 keydata->mctx = NULL;
393 static inline isc_result_t
394 additionaldata_keydata(ARGS_ADDLDATA) {
395 REQUIRE(rdata->type == 65533);
401 return (ISC_R_SUCCESS);
404 static inline isc_result_t
405 digest_keydata(ARGS_DIGEST) {
408 REQUIRE(rdata->type == 65533);
410 dns_rdata_toregion(rdata, &r);
412 return ((digest)(arg, &r));
415 static inline isc_boolean_t
416 checkowner_keydata(ARGS_CHECKOWNER) {
418 REQUIRE(type == 65533);
428 static inline isc_boolean_t
429 checknames_keydata(ARGS_CHECKNAMES) {
431 REQUIRE(rdata->type == 65533);
441 casecompare_keydata(ARGS_COMPARE) {
442 return (compare_keydata(rdata1, rdata2));
445 #endif /* GENERIC_KEYDATA_65533_C */